diff --git a/.ansible-lint b/.ansible-lint index c77c6a8..0c5e668 100644 --- a/.ansible-lint +++ b/.ansible-lint @@ -1,10 +1,10 @@ --- +profile: production parseable: true skip_list: - ANSIBLE0010 use_default_rules: true verbosity: 1 exclude_paths: - - ./roles/gcp_http_lb/ - - ./tests/ - - ./plugins + # Ignore submodule https://github.com/GoogleCloudPlatform/google-cloud-ops-agents-ansible + - roles/google_cloud_ops_agents/ diff --git a/.github/workflows/ansible-integration-tests.yml b/.github/workflows/ansible-integration-tests.yml new file mode 100644 index 0000000..ce18e0e --- /dev/null +++ b/.github/workflows/ansible-integration-tests.yml @@ -0,0 +1,73 @@ +--- +name: Run integration tests for the cloud.google collection +on: + pull_request: {} + push: + branches: master +env: + GCP_SERVICE_ACCOUNT: github-ci@ansible-gcp-ci.iam.gserviceaccount.com + GCP_PROJECT: ansible-gcp-ci + GCP_FOLDER_ID: "542027184392" +jobs: + integration: + # NOTE: GitHub does not allow secrets to be used + # in PRs sent from forks. As such, this configuration is for + # PRs that the maintainers would like to send to test. + if: github.event_name != 'pull_request' || github.event.pull_request.head.repo.full_name == github.repository + runs-on: ubuntu-latest + defaults: + run: + working-directory: ansible_collections/google/cloud + strategy: + max-parallel: 1 + matrix: + # Our current version strategy is to support both supported versions of ansible-core + # and test against the minimum version of Python supported by both. If/when we change + # the integration tests to support parallelism we can revisit. + ansible_version: + - stable-2.16 + - stable-2.17 + steps: + - name: check out code + uses: actions/checkout@v4 + with: + path: ansible_collections/google/cloud + - name: Set up Python + uses: actions/setup-python@v4 + with: + python-version: '3.10' # this is the minimum version required for Ansible 2.16 + - name: Install dependencies + run: pip install -r requirements.txt + - name: Install ansible-base (${{ matrix.ansible_version }}) + run: pip install https://github.com/ansible/ansible/archive/${{ matrix.ansible_version }}.tar.gz --disable-pip-version-check + # bootstrap integration env + - name: Write integration-test configuration files + env: + CI_SERVICE_ACCOUNT_FILE_CONTENTS: ${{ secrets.CI_SERVICE_ACCOUNT_FILE_CONTENTS }} + run: | + echo "$CI_SERVICE_ACCOUNT_FILE_CONTENTS" > /tmp/service-account-key.json + echo "[default] + gcp_project: $GCP_PROJECT + gcp_cred_file: /tmp/service-account-key.json + gcp_cred_kind: serviceaccount + gcp_cred_email: $GCP_SERVICE_ACCOUNT + gcp_folder_id: $GCP_FOLDER_ID + " > ./tests/integration/cloud-config-gcp.ini + # cleanup test environment + - name: Auth to Gcloud + uses: google-github-actions/auth@v1 + env: + CI_SERVICE_ACCOUNT_FILE_CONTENTS: ${{ secrets.CI_SERVICE_ACCOUNT_FILE_CONTENTS }} + with: + service_account: $GCP_SERVICE_ACCOUNT + credentials_json: ${{ secrets.CI_SERVICE_ACCOUNT_FILE_CONTENTS }} + - name: Set up Cloud SDK + uses: google-github-actions/setup-gcloud@v1 + - name: Run cleanup + run: | + ./scripts/bootstrap-project.sh $GCP_PROJECT $GCP_SERVICE_ACCOUNT + ./scripts/cleanup-project.sh $GCP_PROJECT $GCP_FOLDER_ID + # run tests + - name: Run integration tests + # Add the -vvv flag to print out more output + run: ansible-test integration -v --color --python 3.10 --venv-system-site-packages diff --git a/.github/workflows/ansible-test.yml b/.github/workflows/ansible-test.yml new file mode 100644 index 0000000..e9fea6a --- /dev/null +++ b/.github/workflows/ansible-test.yml @@ -0,0 +1,71 @@ +--- +name: Run tests for the cloud.google collection +on: [pull_request] +jobs: + sanity-and-lint: + runs-on: ubuntu-latest + defaults: + run: + working-directory: ansible_collections/google/cloud + strategy: + matrix: + # Our version strategy is to test against the current and previous version + # of ansible-core and each major version of Python supported by both. + # https://docs.ansible.com/ansible/latest/reference_appendices/release_and_maintenance.html#ansible-core-support-matrix + ansible_version: + - stable-2.16 + - stable-2.17 + python_version: + - '3.10' + - '3.11' + - '3.12' + steps: + - name: check out code + uses: actions/checkout@v4 + with: + path: ansible_collections/google/cloud + submodules: 'true' + - name: Set up Python + uses: actions/setup-python@v4 + with: + python-version: ${{ matrix.python_version }} + - name: Install ansible-base (${{ matrix.ansible_version }}) + run: pip install https://github.com/ansible/ansible/archive/${{ matrix.ansible_version }}.tar.gz --disable-pip-version-check + - name: Run ansible-test sanity + # validate-modules cannot be turned on until #498 is resolved. + run: ansible-test sanity -v --color --skip validate-modules + - name: Install ansible-lint + run: pip install ansible-lint==24.7.0 + - name: Run ansible-lint + run: ansible-lint --exclude roles/google_cloud_ops_agents/ + unit: + runs-on: ubuntu-latest + defaults: + run: + working-directory: ansible_collections/google/cloud + strategy: + matrix: + ansible_version: + - stable-2.16 + - stable-2.17 + python_version: + - '3.10' + - '3.11' + - '3.12' + steps: + - name: check out code + uses: actions/checkout@v4 + with: + path: ansible_collections/google/cloud + - name: Set up Python + uses: actions/setup-python@v4 + with: + python-version: ${{ matrix.python_version }} + - name: Install dependencies + run: pip install -r requirements.txt + - name: Install test dependencies + run: pip install -r requirements-test.txt + - name: Install ansible-base (${{ matrix.ansible_version }}) + run: pip install https://github.com/ansible/ansible/archive/${{ matrix.ansible_version }}.tar.gz --disable-pip-version-check + - name: Run unit tests + run: ansible-test units -v --color --python "${{ matrix.python_version }}" diff --git a/.github/workflows/automationhub.yml b/.github/workflows/automationhub.yml index 969904c..6adb138 100644 --- a/.github/workflows/automationhub.yml +++ b/.github/workflows/automationhub.yml @@ -1,16 +1,16 @@ +--- name: Upload release to Automation Hub on: release: types: [created] - jobs: deploy: runs-on: ubuntu-latest steps: - - uses: actions/checkout@v1 + - uses: actions/checkout@v4 - name: Set up Python - uses: actions/setup-python@v1 + uses: actions/setup-python@v4 with: python-version: '3.x' - name: Install dependencies @@ -22,4 +22,4 @@ jobs: ANSIBLE_AUTOMATION_HUB_API_KEY: ${{ secrets.ANSIBLE_AUTOMATION_HUB_API_KEY }} run: | ansible-galaxy collection build . - ansible-galaxy collection publish *.tar.gz --api-key=$ANSIBLE_GALAXY_API_KEY -s=https://cloud.redhat.com/api/automation-hub/ + ansible-galaxy collection publish *.tar.gz --api-key=$ANSIBLE_AUTOMATION_HUB_API_KEY -s=https://cloud.redhat.com/api/automation-hub/ diff --git a/.github/workflows/gcloud.yml b/.github/workflows/gcloud.yml index 341fb85..711ef94 100644 --- a/.github/workflows/gcloud.yml +++ b/.github/workflows/gcloud.yml @@ -1,18 +1,19 @@ -name: "google.cloud.gcloud" +--- +name: google.cloud.gcloud on: push: paths: - - 'roles/gcloud/**' - - '.github/workflows/gcloud.yml' - - 'molecule/gcloud/**' + - roles/gcloud/** + - .github/workflows/gcloud.yml + - molecule/gcloud/** pull_request: paths: - - 'roles/gcloud/**' - - '.github/workflows/gcloud.yml' - - 'molecule/gcloud/**' + - roles/gcloud/** + - .github/workflows/gcloud.yml + - molecule/gcloud/** jobs: molecule: - runs-on: ubuntu-18.04 + runs-on: ubuntu-latest env: PY_COLORS: 1 ANSIBLE_FORCE_COLOR: 1 @@ -22,41 +23,38 @@ jobs: molecule_playbook: - archive_playbook.yml - package_playbook.yml - molecule_distro: - - distro: centos:7 - command: /usr/sbin/init - - distro: centos:8 - command: /usr/sbin/init - - distro: ubuntu:16.04 - command: /sbin/init - - distro: ubuntu:18.04 - command: /lib/systemd/systemd - - distro: debian:9 - command: /lib/systemd/systemd collection_role: - gcloud steps: - name: Check out code - uses: actions/checkout@v1 + uses: actions/checkout@v4 with: path: ansible_collections/google/cloud - - name: Set up Python 3.8 - uses: actions/setup-python@v1 + - name: Set up Python 3.10 + uses: actions/setup-python@v4 with: - python-version: 3.8 + python-version: '3.10' - name: Install dependencies run: | - sudo apt install docker + sudo apt-get install -y apt-transport-https ca-certificates curl gnupg \ + lsb-release + curl -fsSL https://download.docker.com/linux/ubuntu/gpg | sudo gpg \ + --dearmor -o /usr/share/keyrings/docker-archive-keyring.gpg + echo \ + "deb [arch=amd64 signed-by=/usr/share/keyrings/docker-archive-keyring.gpg] https://download.docker.com/linux/ubuntu \ + $(lsb_release -cs) stable" | sudo tee /etc/apt/sources.list.d/docker.list > /dev/null + sudo apt-get update + sudo apt-get install -y docker-ce docker-ce-cli containerd.io python -m pip install --upgrade pip - pip install molecule yamllint ansible-lint docker + pip install molecule-plugins[docker] yamllint ansible ansible-lint docker - name: Run role test + working-directory: ansible_collections/google/cloud run: >- molecule --version && ansible --version && - MOLECULE_COMMAND=${{ matrix.molecule_distro.command }} - MOLECULE_DISTRO=${{ matrix.molecule_distro.distro }} MOLECULE_PLAYBOOK=${{ matrix.molecule_playbook }} + MOLECULE_NO_LOG="false" molecule --debug test -s ${{ matrix.collection_role }} diff --git a/.github/workflows/gcsfuse.yml b/.github/workflows/gcsfuse.yml index 75a610e..8898703 100644 --- a/.github/workflows/gcsfuse.yml +++ b/.github/workflows/gcsfuse.yml @@ -1,4 +1,5 @@ -name: "google.cloud.gcsfuse" +--- +name: google.cloud.gcsfuse on: push: paths: @@ -10,43 +11,44 @@ on: - .github/workflows/gcsfuse.yml jobs: gcsfuse: - runs-on: ubuntu-18.04 + runs-on: ubuntu-latest env: PY_COLORS: 1 ANSIBLE_FORCE_COLOR: 1 strategy: fail-fast: false matrix: - molecule_distro: - - distro: ubuntu:16.04 - command: /sbin/init - - distro: ubuntu:18.04 - command: /lib/systemd/systemd - - distro: debian:9 - command: /lib/systemd/systemd collection_role: - gcsfuse steps: - name: Check out code - uses: actions/checkout@v1 + uses: actions/checkout@v4 with: path: ansible_collections/google/cloud - - name: Set up Python 3.8 - uses: actions/setup-python@v1 + - name: Set up Python 3.10 + uses: actions/setup-python@v4 with: - python-version: 3.8 + python-version: '3.10' - name: Install dependencies run: | - sudo apt install docker + sudo apt-get install -y apt-transport-https ca-certificates curl gnupg \ + lsb-release + curl -fsSL https://download.docker.com/linux/ubuntu/gpg | sudo gpg \ + --dearmor -o /usr/share/keyrings/docker-archive-keyring.gpg + echo \ + "deb [arch=amd64 signed-by=/usr/share/keyrings/docker-archive-keyring.gpg] https://download.docker.com/linux/ubuntu \ + $(lsb_release -cs) stable" | sudo tee /etc/apt/sources.list.d/docker.list > /dev/null + sudo apt-get update + sudo apt-get install -y docker-ce docker-ce-cli containerd.io python -m pip install --upgrade pip - pip install molecule yamllint ansible-lint docker + pip install molecule-plugins[docker] yamllint ansible ansible-lint docker - name: Run role test + working-directory: ansible_collections/google/cloud run: >- molecule --version && ansible --version && - MOLECULE_COMMAND=${{ matrix.molecule_distro.command }} - MOLECULE_DISTRO=${{ matrix.molecule_distro.distro }} + MOLECULE_NO_LOG="false" molecule --debug test -s ${{ matrix.collection_role }} diff --git a/.github/workflows/pythonpublish.yml b/.github/workflows/pythonpublish.yml index 0318edf..dd460e6 100644 --- a/.github/workflows/pythonpublish.yml +++ b/.github/workflows/pythonpublish.yml @@ -1,16 +1,16 @@ +--- name: Upload release to Galaxy on: release: types: [created] - jobs: deploy: runs-on: ubuntu-latest steps: - - uses: actions/checkout@v1 + - uses: actions/checkout@v4 - name: Set up Python - uses: actions/setup-python@v1 + uses: actions/setup-python@v4 with: python-version: '3.x' - name: Install dependencies diff --git a/.gitignore b/.gitignore new file mode 100644 index 0000000..6e7ddb7 --- /dev/null +++ b/.gitignore @@ -0,0 +1,10 @@ +# personal credentials are added here: do not check in. +tests/integration/cloud-config-gcp.ini +ansible.cfg +# running ansible integration tests adds files here. +tests/integration/inventory +tests/output/ +__pycache__ +*.tar.gz +venv/ +changelogs/.plugin-cache.yaml diff --git a/.vscode/settings.json b/.vscode/settings.json new file mode 100644 index 0000000..a7d0fc7 --- /dev/null +++ b/.vscode/settings.json @@ -0,0 +1,3 @@ +{ + "esbonio.sphinx.confDir": "" +} \ No newline at end of file diff --git a/CHANGELOG.rst b/CHANGELOG.rst new file mode 100644 index 0000000..7e76c68 --- /dev/null +++ b/CHANGELOG.rst @@ -0,0 +1,110 @@ +========================== +Google.Cloud Release Notes +========================== + +.. contents:: Topics + +v1.4.1 +====== + +Bugfixes +-------- + +- gcp_kms_filters - add DOCUMENTATION string +- gcp_secret_manager - make an f-string usage backward compatible + +v1.4.0 +====== + +Minor Changes +------------- + +- ansible - 2.16.0 is now the minimum version supported +- ansible - 3.10 is now the minimum Python version +- ansible-test - integration tests are now run against 2.16.0 and 2.17.0 +- gcloud role - use dnf instead of yum on RHEL +- gcp_secret_manager - add as a module and lookup plugin (https://github.com/ansible-collections/google.cloud/pull/578) +- gcp_secret_manager - support more than 10 versions (https://github.com/ansible-collections/google.cloud/pull/634) +- restore google_cloud_ops_agents submodule (https://github.com/ansible-collections/google.cloud/pull/594) + +Bugfixes +-------- + +- ansible-lint - remove jinja templates from test assertions + +v1.3.0 +====== + +Minor Changes +------------- + +- anisble-test - integration tests are now run against 2.14.0 and 2.15.0 +- ansible - 2.14.0 is now the minimum version supported +- ansible-lint - fixed over a thousand reported errors +- ansible-lint - upgraded to 6.22 +- ansible-test - add support for GCP application default credentials (https://github.com/ansible-collections/google.cloud/issues/359). +- gcp_serviceusage_service - added backoff when checking for operation completion. +- gcp_serviceusage_service - use alloyb API for the integration test as spanner conflicts with other tests +- gcp_sql_ssl_cert - made sha1_fingerprint optional, which enables resource creation +- gcp_storage_default_object_acl - removed non-existent fields; the resource is not usable. + +v1.2.0 +====== + +Minor Changes +------------- + +- Add DataPlane V2 Support. +- Add auth support for GCP access tokens (#574). +- Add support for ip_allocation_policy->stack_type. + +Bugfixes +-------- + +- Use default service account if `service_account_email` is unset. + +v1.1.3 +====== + +Bugfixes +-------- + +- gcp_compute_instance_info: fix incorrect documentation for filter which incorrectly pointed to the gcloud filter logic rather than the API (fixes #549) + +v1.1.2 +====== + +Bugfixes +-------- + +- fix `gcp_compute` no longer being a valid name of the inventory plugin + +v1.1.1 +====== + +Bugfixes +-------- + +- fix collection to work with Python 2.7 + +v1.1.0 +====== + +Minor Changes +------------- + +- GCE inventory plugin - a new option ``name_suffix``, to add a suffix to the name parameter. + +Bugfixes +-------- + +- Disk has been fixed to send the sourceSnapshot parameter. +- gcp_cloudtasks_queue - was not functional before, and is now functional. +- gcp_compute_* - these resources use the correct selflink (www.googleapis.com) as the domain, no longer erroneously reporting changes after an execution. +- gcp_compute_backend_service - no longer erroneously reports changes after an execution for ``capacity_scaler``. +- gcp_container_cluster - support GKE clusters greater than 1.19+, which cannot use basic-auth. +- gcp_crypto_key - skip_initial_version_creation defaults to the correct value. +- gcp_iam_role - now properly undeletes and recognizes soft deleted roles as absent. +- gcp_iam_role - update of a role is functional (GitHub +- gcp_spanner_database - recognize a non-existent resource as absent. +- gcp_storage_object - fix for correct version of dependency requirement. diff --git a/CONTRIBUTING.md b/CONTRIBUTING.md new file mode 100644 index 0000000..74c753d --- /dev/null +++ b/CONTRIBUTING.md @@ -0,0 +1,159 @@ +# Contributing to the google.cloud collection + +## Workflow summary + +1. [Clone the repository](#cloning). +1. Make the desired code change. +1. Add a [changelog fragment](https://docs.ansible.com/ansible/devel/community/development_process.html#changelogs-how-to) to describe your change. +1. [Run integration tests locally and ensure they pass](running-integration-tests). +1. Create a PR. + +## Cloning + +The `ansible-test` command expects that the repository is in a directory that matches it's collection, +under a directory `ansible_collections`. Clone ensuring that hierarchy: + +```shell +mkdir -p $TARGET_DIR/ansible_collections/google +git clone $TARGET_DIR/ansible_collections/google/cloud +``` + +Then set up your Python virtual environment: + +```shell +cd $TARGET_DIR/ansible_collections/google/cloud +python3 -m venv venv +. ./venv/bin/activate +pip3 install -r requirements.txt +pip3 install -r requirements-test.txt +pip3 install ansible +``` + +## Running tests + +### Prequisites for all tests + +- Install `gcloud` following [these instructions](https://cloud.google.com/sdk/docs/install). +- Install the `ansible` package. +- Some container runtime is necessary (e.g. `podman` or `docker`). The instructions use podman. + +## Running integration tests + +### Integration testing prequisites + +#### Authentication with personal GCP credentials + +If you are running the integration tests locally the easiest way to +authenticate to GCP is using [application default credentials](https://cloud.google.com/sdk/docs/authorizing#adc). +Once you have installed `gcloud` and performed basic initialization (via `gcloud init`) run: + +```shell +gcloud auth application-default login +``` + +#### Authentication with service account credentials + +A service account may also be used to run the integration tests. You can create one using `gcloud`: + +```shell +gcloud iam service-accounts create ansible-test-account \ + --description="For running Anisble integration tests" \ + --display-name="Ansible Test Account" +``` + +You'll also need to export a key file. Here and below `$SERVICE_ACCOUNT_NAME` +is the full email address of the service account, in the form +`EMAIL@PROJECT_ID.iam.gserviceaccount.com`, e.g., if you used the +account name `ansible-test-account` as suggested above and your project +ID is `my-test-project`, use `ansible-test-account@my-test-project.iam.gserviceaccount.com`. + +```shell +gcloud iam service-accounts keys create /path/to/cred/file.json \ + --iam-account=ansible-test-account@my-test-project.iam.gserviceaccount.com +chmod 0600 /path/to/cred/file.json +``` + +Read the [best practices for managing service account keys](https://cloud.google.com/iam/docs/best-practices-for-managing-service-account-keys) +to learn how to keep your service account key and your GCP resources safe. + +#### Configuring test credentials + +The integration tests for this module require the use of real GCP credentials, and must provide +ansible-test those values. They can be added by creating the file `tests/integration/cloud-config-gcp.ini`. + +If you are using personal (i.e., application default) credentials, add: + +``` +[default] +gcp_project: $PROJECT_ID +gcp_cred_kind: application +gcp_folder_id: $TEST_FOLDER (to create test projects) +``` + +If you are using a service account for credentials, add: + +``` +[default] +gcp_project: $PROJECT_ID +gcp_cred_file: /path/to/cred/file.json +gcp_cred_kind: serviceaccount +gcp_folder_id: $TEST_FOLDER (to create test projects) +``` + +#### Setting up the project for testing + +Some of the setup of the project itself is done outside of the test, +and is expected to be configured beforehand. + +For convenience, a bootstrap script is provided. + +NOTE: running this script will make irreversible changes in your +GCP project (e.g. create an AppEngine project). You can omit +`$SERVICE_ACCOUNT_NAME` is you are using application default credentials. + +```bash +bash ./scripts/bootstrap-project.sh $PROJECT_ID $SERVICE_ACCOUNT_NAME +``` + +### Running + +Run `ansible-test integration`. Currently some tests are disabled as [test are being verified and added](https://github.com/ansible-collections/google.cloud/issues/499). + +## Role tests + +### Prequisites for role tests + +If you would like to use podman, you must +install the `molecule-plugins[podman]` package in PyPI: + +``` +pip install --upgrade molecule-plugins[podman] +``` + +### Running role tests + +Ansible roles are tested via molecule. + +```sh +module debug --test -s ${ROLE} +``` + +Role is the name of the role (e.g. gcloud, gcsfuse). + +Add `-d podman` if you would like to use the podman driver. + +If the linting fails, that is generally due to `ansible-lint`, which can be run directly: + +``` +ansible-lint +``` + +## Specific Tasks + +The following enumerates detailed documentation for specific tasks related to +the codebase. + +### Updating the supported ansible-core version + +1. modify the [ansible-integration-tests.yaml](.github/workflows/ansible-integration-tests.yml) to the version of ansible-core that you would like to test against. +1. (optional) update the version of ansible-core version required in [meta/runtime.yaml](meta/runtime.yml). \ No newline at end of file diff --git a/MAINTAINING.md b/MAINTAINING.md new file mode 100644 index 0000000..de14b75 --- /dev/null +++ b/MAINTAINING.md @@ -0,0 +1,84 @@ +# Maintainer Documentation + +## See CONTRIBUTING.md for more tasks + +[CONTRIBUTING.md](./CONTRIBUTING.md) contains more instructions that could +apply to contributors and not just maintainers (e.g. update ansible-core version). + +## CI GCP Project Configuration + +To enable running integration tests, a test GCP project must be provided. + +There is a Google-maintained CI project, `ansible-gcp-ci`, that is used for this purpose. For any questions or modification to this project, please contact a maintainer who is employed by Google. + +## Reviewing PRs + +### Merging PRs + +Since running the full set of integration tests requires the usage of GCP +credentials which are stored as a secret, maintainers must verify that tests pass the integration test run that runs on push to the master branch after accepting a change. + +## Release Process + +### Overview + +The process is as follows: + +1. Update the version of the collection. +1. Update the changelog. +2. Create a GitHub release to tag the repo and begin the publishing process. + +### Steps + +#### Update Collection Version + +Modify the [galaxy.yaml](./galaxy.yml) file to the desired collection version: + +```yaml +version: {NEW_VERSION} +``` + +Ansible collection versions [must follow SEMVER](https://docs.ansible.com/ansible/devel/dev_guide/developing_collections_distributing.html#collection-versions). + +Alpha / beta releases are optional. + +#### Update the changelog + +Providing a valid [CHANGELOG.rst](./CHANGELOG.rst) is required for a certifiable +collection release. + +Use the [antsibull-changelog](https://github.com/ansible-community/antsibull-changelog) +tool to generate the changelog: + +```sh +pip install antsibull-changelog +antsibull-changelog release +``` + +This will remove all the changelog fragments from ./changelogs/fragments and +merge them into CHANGELOG.rst. + +### Send a PR and merge + +Send a PR with these changes and merge them. + +### Create a new GitHub release + +Creating + +- [publish to Ansible Galaxy](./.github/workflows/pythonpublish.yml). + +### Publish to Automation Hub + +*note*: As automation Hub only accepts production releases, this step +is only required for new full releases. + +This step does not use GitHub actions, as API keys for Automation Hub +expire after 30 days of no use, and a maintainer may find themselves +refreshing tokens every time anyway. + +Steps: + +1. Build the package locally: `ansible-galaxy collection build .` +1. [Go to the Automation Hub my-namespaces page, then click on Google](https://console.redhat.com/ansible/automation-hub/repo/published/my-namespaces/google/) +1. Publish the package \ No newline at end of file diff --git a/README.md b/README.md index 4fa7e9b..5c3f7da 100644 --- a/README.md +++ b/README.md @@ -1,7 +1,18 @@ # Google Cloud Platform Ansible Collection This collection provides a series of Ansible modules and plugins for interacting with the [Google Cloud Platform](https://cloud.google.com) -This collection works with Ansible 2.9+ +This collection works with Ansible 2.16+ + +# Communication + +* Join the Ansible forum: + * [Get Help](https://forum.ansible.com/c/help/6): get help or help others. Please use appropriate tags, for example `cloud`. + * [Social Spaces](https://forum.ansible.com/c/chat/4): gather and interact with fellow enthusiasts. + * [News & Announcements](https://forum.ansible.com/c/news/5): track project-wide announcements including social events. + +* The Ansible [Bullhorn newsletter](https://docs.ansible.com/ansible/devel/community/communication.html#the-bullhorn): used to announce releases and important changes. + +For more information about communication, see the [Ansible communication guide](https://docs.ansible.com/ansible/devel/community/communication.html). # Installation ```bash @@ -9,89 +20,90 @@ ansible-galaxy collection install google.cloud ``` # Resources Supported - * App Engine FirewallRule (gcp_appengine_firewall_rule, gcp_appengine_firewall_rule_facts) - * BigQuery Dataset (gcp_bigquery_dataset, gcp_bigquery_dataset_facts) - * BigQuery Table (gcp_bigquery_table, gcp_bigquery_table_facts) - * Cloud Bigtable Instance (gcp_bigtable_instance, gcp_bigtable_instance_facts) - * Cloud Build Trigger (gcp_cloudbuild_trigger, gcp_cloudbuild_trigger_facts) - * Cloud Functions CloudFunction (gcp_cloudfunctions_cloud_function, gcp_cloudfunctions_cloud_function_facts) - * Cloud Scheduler Job (gcp_cloudscheduler_job, gcp_cloudscheduler_job_facts) - * Cloud Tasks Queue (gcp_cloudtasks_queue, gcp_cloudtasks_queue_facts) - * Compute Engine Address (gcp_compute_address, gcp_compute_address_facts) - * Compute Engine Autoscaler (gcp_compute_autoscaler, gcp_compute_autoscaler_facts) - * Compute Engine BackendBucket (gcp_compute_backend_bucket, gcp_compute_backend_bucket_facts) - * Compute Engine BackendService (gcp_compute_backend_service, gcp_compute_backend_service_facts) - * Compute Engine RegionBackendService (gcp_compute_region_backend_service, gcp_compute_region_backend_service_facts) - * Compute Engine Disk (gcp_compute_disk, gcp_compute_disk_facts) - * Compute Engine Firewall (gcp_compute_firewall, gcp_compute_firewall_facts) - * Compute Engine ForwardingRule (gcp_compute_forwarding_rule, gcp_compute_forwarding_rule_facts) - * Compute Engine GlobalAddress (gcp_compute_global_address, gcp_compute_global_address_facts) - * Compute Engine GlobalForwardingRule (gcp_compute_global_forwarding_rule, gcp_compute_global_forwarding_rule_facts) - * Compute Engine HttpHealthCheck (gcp_compute_http_health_check, gcp_compute_http_health_check_facts) - * Compute Engine HttpsHealthCheck (gcp_compute_https_health_check, gcp_compute_https_health_check_facts) - * Compute Engine HealthCheck (gcp_compute_health_check, gcp_compute_health_check_facts) - * Compute Engine InstanceTemplate (gcp_compute_instance_template, gcp_compute_instance_template_facts) - * Compute Engine Image (gcp_compute_image, gcp_compute_image_facts) - * Compute Engine Instance (gcp_compute_instance, gcp_compute_instance_facts) - * Compute Engine InstanceGroup (gcp_compute_instance_group, gcp_compute_instance_group_facts) - * Compute Engine InstanceGroupManager (gcp_compute_instance_group_manager, gcp_compute_instance_group_manager_facts) - * Compute Engine RegionInstanceGroupManager (gcp_compute_region_instance_group_manager, gcp_compute_region_instance_group_manager_facts) - * Compute Engine InterconnectAttachment (gcp_compute_interconnect_attachment, gcp_compute_interconnect_attachment_facts) - * Compute Engine Network (gcp_compute_network, gcp_compute_network_facts) - * Compute Engine NetworkEndpointGroup (gcp_compute_network_endpoint_group, gcp_compute_network_endpoint_group_facts) - * Compute Engine NodeGroup (gcp_compute_node_group, gcp_compute_node_group_facts) - * Compute Engine NodeTemplate (gcp_compute_node_template, gcp_compute_node_template_facts) - * Compute Engine RegionAutoscaler (gcp_compute_region_autoscaler, gcp_compute_region_autoscaler_facts) - * Compute Engine RegionDisk (gcp_compute_region_disk, gcp_compute_region_disk_facts) - * Compute Engine RegionUrlMap (gcp_compute_region_url_map, gcp_compute_region_url_map_facts) - * Compute Engine RegionHealthCheck (gcp_compute_region_health_check, gcp_compute_region_health_check_facts) - * Compute Engine ResourcePolicy (gcp_compute_resource_policy, gcp_compute_resource_policy_facts) - * Compute Engine Route (gcp_compute_route, gcp_compute_route_facts) - * Compute Engine Router (gcp_compute_router, gcp_compute_router_facts) - * Compute Engine Snapshot (gcp_compute_snapshot, gcp_compute_snapshot_facts) - * Compute Engine SslCertificate (gcp_compute_ssl_certificate, gcp_compute_ssl_certificate_facts) - * Compute Engine Reservation (gcp_compute_reservation, gcp_compute_reservation_facts) - * Compute Engine SslPolicy (gcp_compute_ssl_policy, gcp_compute_ssl_policy_facts) - * Compute Engine Subnetwork (gcp_compute_subnetwork, gcp_compute_subnetwork_facts) - * Compute Engine TargetHttpProxy (gcp_compute_target_http_proxy, gcp_compute_target_http_proxy_facts) - * Compute Engine TargetHttpsProxy (gcp_compute_target_https_proxy, gcp_compute_target_https_proxy_facts) - * Compute Engine RegionTargetHttpProxy (gcp_compute_region_target_http_proxy, gcp_compute_region_target_http_proxy_facts) - * Compute Engine RegionTargetHttpsProxy (gcp_compute_region_target_https_proxy, gcp_compute_region_target_https_proxy_facts) - * Compute Engine TargetInstance (gcp_compute_target_instance, gcp_compute_target_instance_facts) - * Compute Engine TargetPool (gcp_compute_target_pool, gcp_compute_target_pool_facts) - * Compute Engine TargetSslProxy (gcp_compute_target_ssl_proxy, gcp_compute_target_ssl_proxy_facts) - * Compute Engine TargetTcpProxy (gcp_compute_target_tcp_proxy, gcp_compute_target_tcp_proxy_facts) - * Compute Engine TargetVpnGateway (gcp_compute_target_vpn_gateway, gcp_compute_target_vpn_gateway_facts) - * Compute Engine UrlMap (gcp_compute_url_map, gcp_compute_url_map_facts) - * Compute Engine VpnTunnel (gcp_compute_vpn_tunnel, gcp_compute_vpn_tunnel_facts) - * Google Kubernetes Engine Cluster (gcp_container_cluster, gcp_container_cluster_facts) - * Google Kubernetes Engine NodePool (gcp_container_node_pool, gcp_container_node_pool_facts) - * Cloud DNS ManagedZone (gcp_dns_managed_zone, gcp_dns_managed_zone_facts) - * Cloud DNS ResourceRecordSet (gcp_dns_resource_record_set, gcp_dns_resource_record_set_facts) - * Filestore Instance (gcp_filestore_instance, gcp_filestore_instance_facts) - * Cloud IAM Role (gcp_iam_role, gcp_iam_role_facts) - * Cloud IAM ServiceAccount (gcp_iam_service_account, gcp_iam_service_account_facts) - * Cloud IAM ServiceAccountKey (gcp_iam_service_account_key, gcp_iam_service_account_key_facts) - * Cloud Key Management Service KeyRing (gcp_kms_key_ring, gcp_kms_key_ring_facts) - * Cloud Key Management Service CryptoKey (gcp_kms_crypto_key, gcp_kms_crypto_key_facts) - * Cloud (Stackdriver) Logging Metric (gcp_logging_metric, gcp_logging_metric_facts) - * ML Engine Model (gcp_mlengine_model, gcp_mlengine_model_facts) - * ML Engine Version (gcp_mlengine_version, gcp_mlengine_version_facts) - * Cloud Pub/Sub Topic (gcp_pubsub_topic, gcp_pubsub_topic_facts) - * Cloud Pub/Sub Subscription (gcp_pubsub_subscription, gcp_pubsub_subscription_facts) - * Memorystore (Redis) Instance (gcp_redis_instance, gcp_redis_instance_facts) - * Resource Manager Project (gcp_resourcemanager_project, gcp_resourcemanager_project_facts) - * Runtime Configurator Config (gcp_runtimeconfig_config, gcp_runtimeconfig_config_facts) - * Runtime Configurator Variable (gcp_runtimeconfig_variable, gcp_runtimeconfig_variable_facts) - * Service Usage Service (gcp_serviceusage_service, gcp_serviceusage_service_facts) - * Cloud Source Repositories Repository (gcp_sourcerepo_repository, gcp_sourcerepo_repository_facts) - * Cloud Spanner Instance (gcp_spanner_instance, gcp_spanner_instance_facts) - * Cloud Spanner Database (gcp_spanner_database, gcp_spanner_database_facts) - * Cloud SQL Instance (gcp_sql_instance, gcp_sql_instance_facts) - * Cloud SQL Database (gcp_sql_database, gcp_sql_database_facts) - * Cloud SQL User (gcp_sql_user, gcp_sql_user_facts) - * Cloud SQL SslCert (gcp_sql_ssl_cert, gcp_sql_ssl_cert_facts) - * Cloud Storage Bucket (gcp_storage_bucket, gcp_storage_bucket_facts) - * Cloud Storage BucketAccessControl (gcp_storage_bucket_access_control, gcp_storage_bucket_access_control_facts) - * Cloud Storage DefaultObjectACL (gcp_storage_default_object_acl, gcp_storage_default_object_acl_facts) - * Cloud TPU Node (gcp_tpu_node, gcp_tpu_node_facts) + * App Engine FirewallRule (gcp_appengine_firewall_rule, gcp_appengine_firewall_rule_info) + * BigQuery Dataset (gcp_bigquery_dataset, gcp_bigquery_dataset_info) + * BigQuery Table (gcp_bigquery_table, gcp_bigquery_table_info) + * Cloud Bigtable Instance (gcp_bigtable_instance, gcp_bigtable_instance_info) + * Cloud Build Trigger (gcp_cloudbuild_trigger, gcp_cloudbuild_trigger_info) + * Cloud Functions CloudFunction (gcp_cloudfunctions_cloud_function, gcp_cloudfunctions_cloud_function_info) + * Cloud Scheduler Job (gcp_cloudscheduler_job, gcp_cloudscheduler_job_info) + * Cloud Tasks Queue (gcp_cloudtasks_queue, gcp_cloudtasks_queue_info) + * Compute Engine Address (gcp_compute_address, gcp_compute_address_info) + * Compute Engine Autoscaler (gcp_compute_autoscaler, gcp_compute_autoscaler_info) + * Compute Engine BackendBucket (gcp_compute_backend_bucket, gcp_compute_backend_bucket_info) + * Compute Engine BackendService (gcp_compute_backend_service, gcp_compute_backend_service_info) + * Compute Engine RegionBackendService (gcp_compute_region_backend_service, gcp_compute_region_backend_service_info) + * Compute Engine Disk (gcp_compute_disk, gcp_compute_disk_info) + * Compute Engine Firewall (gcp_compute_firewall, gcp_compute_firewall_info) + * Compute Engine ForwardingRule (gcp_compute_forwarding_rule, gcp_compute_forwarding_rule_info) + * Compute Engine GlobalAddress (gcp_compute_global_address, gcp_compute_global_address_info) + * Compute Engine GlobalForwardingRule (gcp_compute_global_forwarding_rule, gcp_compute_global_forwarding_rule_info) + * Compute Engine HttpHealthCheck (gcp_compute_http_health_check, gcp_compute_http_health_check_info) + * Compute Engine HttpsHealthCheck (gcp_compute_https_health_check, gcp_compute_https_health_check_info) + * Compute Engine HealthCheck (gcp_compute_health_check, gcp_compute_health_check_info) + * Compute Engine InstanceTemplate (gcp_compute_instance_template, gcp_compute_instance_template_info) + * Compute Engine Image (gcp_compute_image, gcp_compute_image_info) + * Compute Engine Instance (gcp_compute_instance, gcp_compute_instance_info) + * Compute Engine InstanceGroup (gcp_compute_instance_group, gcp_compute_instance_group_info) + * Compute Engine InstanceGroupManager (gcp_compute_instance_group_manager, gcp_compute_instance_group_manager_info) + * Compute Engine RegionInstanceGroupManager (gcp_compute_region_instance_group_manager, gcp_compute_region_instance_group_manager_info) + * Compute Engine InterconnectAttachment (gcp_compute_interconnect_attachment, gcp_compute_interconnect_attachment_info) + * Compute Engine Network (gcp_compute_network, gcp_compute_network_info) + * Compute Engine NetworkEndpointGroup (gcp_compute_network_endpoint_group, gcp_compute_network_endpoint_group_info) + * Compute Engine NodeGroup (gcp_compute_node_group, gcp_compute_node_group_info) + * Compute Engine NodeTemplate (gcp_compute_node_template, gcp_compute_node_template_info) + * Compute Engine RegionAutoscaler (gcp_compute_region_autoscaler, gcp_compute_region_autoscaler_info) + * Compute Engine RegionDisk (gcp_compute_region_disk, gcp_compute_region_disk_info) + * Compute Engine RegionUrlMap (gcp_compute_region_url_map, gcp_compute_region_url_map_info) + * Compute Engine RegionHealthCheck (gcp_compute_region_health_check, gcp_compute_region_health_check_info) + * Compute Engine ResourcePolicy (gcp_compute_resource_policy, gcp_compute_resource_policy_info) + * Compute Engine Route (gcp_compute_route, gcp_compute_route_info) + * Compute Engine Router (gcp_compute_router, gcp_compute_router_info) + * Compute Engine Snapshot (gcp_compute_snapshot, gcp_compute_snapshot_info) + * Compute Engine SslCertificate (gcp_compute_ssl_certificate, gcp_compute_ssl_certificate_info) + * Compute Engine Reservation (gcp_compute_reservation, gcp_compute_reservation_info) + * Compute Engine SslPolicy (gcp_compute_ssl_policy, gcp_compute_ssl_policy_info) + * Compute Engine Subnetwork (gcp_compute_subnetwork, gcp_compute_subnetwork_info) + * Compute Engine TargetHttpProxy (gcp_compute_target_http_proxy, gcp_compute_target_http_proxy_info) + * Compute Engine TargetHttpsProxy (gcp_compute_target_https_proxy, gcp_compute_target_https_proxy_info) + * Compute Engine RegionTargetHttpProxy (gcp_compute_region_target_http_proxy, gcp_compute_region_target_http_proxy_info) + * Compute Engine RegionTargetHttpsProxy (gcp_compute_region_target_https_proxy, gcp_compute_region_target_https_proxy_info) + * Compute Engine TargetInstance (gcp_compute_target_instance, gcp_compute_target_instance_info) + * Compute Engine TargetPool (gcp_compute_target_pool, gcp_compute_target_pool_info) + * Compute Engine TargetSslProxy (gcp_compute_target_ssl_proxy, gcp_compute_target_ssl_proxy_info) + * Compute Engine TargetTcpProxy (gcp_compute_target_tcp_proxy, gcp_compute_target_tcp_proxy_info) + * Compute Engine TargetVpnGateway (gcp_compute_target_vpn_gateway, gcp_compute_target_vpn_gateway_info) + * Compute Engine UrlMap (gcp_compute_url_map, gcp_compute_url_map_info) + * Compute Engine VpnTunnel (gcp_compute_vpn_tunnel, gcp_compute_vpn_tunnel_info) + * Google Kubernetes Engine Cluster (gcp_container_cluster, gcp_container_cluster_info) + * Google Kubernetes Engine NodePool (gcp_container_node_pool, gcp_container_node_pool_info) + * Cloud DNS ManagedZone (gcp_dns_managed_zone, gcp_dns_managed_zone_info) + * Cloud DNS ResourceRecordSet (gcp_dns_resource_record_set, gcp_dns_resource_record_set_info) + * Filestore Instance (gcp_filestore_instance, gcp_filestore_instance_info) + * Cloud IAM Role (gcp_iam_role, gcp_iam_role_info) + * Cloud IAM ServiceAccount (gcp_iam_service_account, gcp_iam_service_account_info) + * Cloud IAM ServiceAccountKey (gcp_iam_service_account_key, gcp_iam_service_account_key_info) + * Cloud Key Management Service KeyRing (gcp_kms_key_ring, gcp_kms_key_ring_info) + * Cloud Key Management Service CryptoKey (gcp_kms_crypto_key, gcp_kms_crypto_key_info) + * Cloud (Stackdriver) Logging Metric (gcp_logging_metric, gcp_logging_metric_info) + * ML Engine Model (gcp_mlengine_model, gcp_mlengine_model_info) + * ML Engine Version (gcp_mlengine_version, gcp_mlengine_version_info) + * Cloud Pub/Sub Topic (gcp_pubsub_topic, gcp_pubsub_topic_info) + * Cloud Pub/Sub Subscription (gcp_pubsub_subscription, gcp_pubsub_subscription_info) + * Memorystore (Redis) Instance (gcp_redis_instance, gcp_redis_instance_info) + * Resource Manager Project (gcp_resourcemanager_project, gcp_resourcemanager_project_info) + * Runtime Configurator Config (gcp_runtimeconfig_config, gcp_runtimeconfig_config_info) + * Runtime Configurator Variable (gcp_runtimeconfig_variable, gcp_runtimeconfig_variable_info) + * Service Usage Service (gcp_serviceusage_service, gcp_serviceusage_service_info) + * Cloud Source Repositories Repository (gcp_sourcerepo_repository, gcp_sourcerepo_repository_info) + * Cloud Spanner Instance (gcp_spanner_instance, gcp_spanner_instance_info) + * Cloud Spanner Database (gcp_spanner_database, gcp_spanner_database_info) + * Cloud SQL Instance (gcp_sql_instance, gcp_sql_instance_info) + * Cloud SQL Database (gcp_sql_database, gcp_sql_database_info) + * Cloud SQL User (gcp_sql_user, gcp_sql_user_info) + * Cloud SQL SslCert (gcp_sql_ssl_cert, gcp_sql_ssl_cert_info) + * Cloud Storage Bucket (gcp_storage_bucket, gcp_storage_bucket_info) + * Cloud Storage BucketAccessControl (gcp_storage_bucket_access_control, gcp_storage_bucket_access_control_info) + * Cloud Storage DefaultObjectACL (gcp_storage_default_object_acl, gcp_storage_default_object_acl_info) + * Cloud TPU Node (gcp_tpu_node, gcp_tpu_node_info) + * Secret Manager (gcp_secret_manager) diff --git a/changelogs/changelog.yaml b/changelogs/changelog.yaml new file mode 100644 index 0000000..738da7b --- /dev/null +++ b/changelogs/changelog.yaml @@ -0,0 +1,102 @@ +ancestor: null +releases: + 1.1.0: + changes: + bugfixes: + - Disk has been fixed to send the sourceSnapshot parameter. + - gcp_cloudtasks_queue - was not functional before, and is now functional. + - gcp_compute_* - these resources use the correct selflink (www.googleapis.com) + as the domain, no longer erroneously reporting changes after an execution. + - gcp_compute_backend_service - no longer erroneously reports changes after + an execution for ``capacity_scaler``. + - gcp_container_cluster - support GKE clusters greater than 1.19+, which cannot + use basic-auth. + - gcp_crypto_key - skip_initial_version_creation defaults to the correct value. + - gcp_iam_role - now properly undeletes and recognizes soft deleted roles as + absent. + - gcp_iam_role - update of a role is functional (GitHub + - gcp_spanner_database - recognize a non-existent resource as absent. + - gcp_storage_object - fix for correct version of dependency requirement. + minor_changes: + - GCE inventory plugin - a new option ``name_suffix``, to add a suffix to the + name parameter. + fragments: + - 0001_disk.yml + - bugfixes.yaml + release_date: '2022-12-16' + 1.1.1: + changes: + bugfixes: + - fix collection to work with Python 2.7 + fragments: + - fix-2.7.yml + release_date: '2022-12-16' + 1.1.2: + changes: + bugfixes: + - fix `gcp_compute` no longer being a valid name of the inventory plugin + fragments: + - fix-inventory-plugin.yml + release_date: '2022-12-21' + 1.1.3: + changes: + bugfixes: + - 'gcp_compute_instance_info: fix incorrect documentation for filter which incorrectly + pointed to the gcloud filter logic rather than the API (fixes #549)' + fragments: + - gce-changelog.yaml + release_date: '2023-03-04' + 1.2.0: + changes: + bugfixes: + - Use default service account if `service_account_email` is unset. + minor_changes: + - Add DataPlane V2 Support. + - Add auth support for GCP access tokens (#574). + - Add support for ip_allocation_policy->stack_type. + release_date: '2023-07-07' + 1.3.0: + changes: + minor_changes: + - anisble-test - integration tests are now run against 2.14.0 and 2.15.0 + - ansible - 2.14.0 is now the minimum version supported + - ansible-lint - fixed over a thousand reported errors + - ansible-lint - upgraded to 6.22 + - ansible-test - add support for GCP application default credentials (https://github.com/ansible-collections/google.cloud/issues/359). + - gcp_serviceusage_service - added backoff when checking for operation completion. + - gcp_serviceusage_service - use alloyb API for the integration test as spanner + conflicts with other tests + - gcp_sql_ssl_cert - made sha1_fingerprint optional, which enables resource + creation + - gcp_storage_default_object_acl - removed non-existent fields; the resource + is not usable. + fragments: + - app-default-creds.yml + - gcp_serviceusage_service.yml + - gcp_sql_ssl_cert.yml + - gcp_storage_default_object_acl.yml + - upgrade-versions.yml + release_date: '2023-11-22' + 1.4.0: + changes: + bugfixes: + - ansible-lint - remove jinja templates from test assertions + minor_changes: + - ansible - 2.16.0 is now the minimum version supported + - ansible - 3.10 is now the minimum Python version + - ansible-test - integration tests are now run against 2.16.0 and 2.17.0 + - gcloud role - use dnf instead of yum on RHEL + - gcp_secret_manager - add as a module and lookup plugin (https://github.com/ansible-collections/google.cloud/pull/578) + - gcp_secret_manager - support more than 10 versions (https://github.com/ansible-collections/google.cloud/pull/634) + - restore google_cloud_ops_agents submodule (https://github.com/ansible-collections/google.cloud/pull/594) + fragments: + - release-1-4-0.yml + release_date: '2024-08-21' + 1.4.1: + changes: + bugfixes: + - gcp_kms_filters - add DOCUMENTATION string + - gcp_secret_manager - make an f-string usage backward compatible + fragments: + - release-1-4-1.yml + release_date: '2024-08-22' diff --git a/changelogs/config.yaml b/changelogs/config.yaml new file mode 100644 index 0000000..0b86869 --- /dev/null +++ b/changelogs/config.yaml @@ -0,0 +1,33 @@ +--- +changelog_filename_template: ../CHANGELOG.rst +changelog_filename_version_depth: 0 +changes_file: changelog.yaml +changes_format: combined +ignore_other_fragment_extensions: true +keep_fragments: false +mention_ancestor: true +new_plugins_after_name: removed_features +notesdir: fragments +prelude_section_name: release_summary +prelude_section_title: Release Summary +sanitize_changelog: true +sections: + - - major_changes + - Major Changes + - - minor_changes + - Minor Changes + - - breaking_changes + - Breaking Changes / Porting Guide + - - deprecated_features + - Deprecated Features + - - removed_features + - Removed Features (previously deprecated) + - - security_fixes + - Security Fixes + - - bugfixes + - Bugfixes + - - known_issues + - Known Issues +title: Google.Cloud +trivial_section_name: trivial +use_fqcn: true diff --git a/changelogs/fragments/0001_disk.yml b/changelogs/fragments/0001_disk.yml deleted file mode 100644 index 2fccc03..0000000 --- a/changelogs/fragments/0001_disk.yml +++ /dev/null @@ -1,2 +0,0 @@ -bugfixes: - - Disk has been fixed to send the sourceSnapshot parameter. diff --git a/galaxy.yml b/galaxy.yml index f47d2f5..abd99cb 100644 --- a/galaxy.yml +++ b/galaxy.yml @@ -1,3 +1,4 @@ +--- ### REQUIRED # The namespace of the collection. This can be a company/brand/organization or product namespace under which all @@ -9,7 +10,7 @@ namespace: google name: cloud # The version of the collection. Must be compatible with semantic versioning -version: 1.0.2 +version: 1.4.1 # The path to the Markdown (.md) readme file. This path is relative to the root of the collection readme: README.md @@ -17,8 +18,8 @@ readme: README.md # A list of the collection's content authors. Can be just the name or in the format 'Full Name (url) # @nicks:irc/im.site#channel' authors: -- Google - + - Google + - Google ### OPTIONAL but strongly recommended @@ -28,7 +29,7 @@ description: The Google Cloud Platform collection. # Either a single license or a list of licenses for content inside of a collection. Ansible Galaxy currently only # accepts L(SPDX,https://spdx.org/licenses/) licenses. This key is mutually exclusive with 'license_file' license: -- GPL-2.0-or-later + - GPL-2.0-or-later # The path to the license file for the collection. This path is relative to the root of the collection. This key is # mutually exclusive with 'license' @@ -37,11 +38,11 @@ license: # A list of tags you want to associate with the collection for indexing/searching. A tag name has the same character # requirements as 'namespace' and 'name' tags: - - cloud - - gcsfuse - - stackdriver - - logging - - monitoring + - cloud + - gcsfuse + - stackdriver + - logging + - monitoring # Collections that this collection requires to be installed for it to be usable. The key of the dict is the # collection label 'namespace.name'. The value is a version range @@ -60,3 +61,6 @@ homepage: http://cloud.google.com # The URL to the collection issue tracker issues: https://github.com/ansible-collections/google.cloud/issues + +build_ignore: + - venv diff --git a/meta/runtime.yml b/meta/runtime.yml index 31ab772..0f2f2a5 100644 --- a/meta/runtime.yml +++ b/meta/runtime.yml @@ -1,5 +1,5 @@ --- -requires_ansible: '>=2.9' +requires_ansible: ">=2.16.0" action_groups: gcp: @@ -152,6 +152,7 @@ action_groups: - gcp_runtimeconfig_config_info - gcp_runtimeconfig_variable - gcp_runtimeconfig_variable_info + - gcp_secret_manager - gcp_serviceusage_service - gcp_serviceusage_service_info - gcp_sourcerepo_repository diff --git a/molecule/gcloud/archive_playbook.yml b/molecule/gcloud/archive_playbook.yml index 52ab0de..97c84af 100644 --- a/molecule/gcloud/archive_playbook.yml +++ b/molecule/gcloud/archive_playbook.yml @@ -3,10 +3,10 @@ hosts: all pre_tasks: - name: Install gpg for apt_key - apt: + ansible.builtin.apt: name: gnupg update_cache: true - when: ansible_os_family|lower == "debian" + when: ansible_os_family | lower == "debian" roles: - role: google.cloud.gcloud gcloud_install_type: archive diff --git a/molecule/gcloud/converge.yml b/molecule/gcloud/converge.yml index 6889b4b..7382cae 100644 --- a/molecule/gcloud/converge.yml +++ b/molecule/gcloud/converge.yml @@ -3,21 +3,24 @@ hosts: all pre_tasks: - name: Update package cache - package: update_cache=yes + ansible.builtin.package: + update_cache: "yes" changed_when: false register: task_result until: task_result is success retries: 10 delay: 2 - - name: create containerd folder - file: + - name: Create containerd folder + ansible.builtin.file: path: /etc/systemd/system/containerd.service.d state: directory + mode: "0755" when: ansible_service_mgr == "systemd" - - name: override file for containerd - copy: + - name: Override file for containerd + ansible.builtin.copy: src: files/override.conf dest: /etc/systemd/system/containerd.service.d/override.conf + mode: "0644" when: ansible_service_mgr == "systemd" roles: - role: google.cloud.gcloud diff --git a/molecule/gcloud/molecule.yml b/molecule/gcloud/molecule.yml index da1ce65..707639a 100644 --- a/molecule/gcloud/molecule.yml +++ b/molecule/gcloud/molecule.yml @@ -9,9 +9,15 @@ lint: | ansible-lint platforms: - name: instance - image: ${MOLECULE_DISTRO:-ubuntu:xenial} + image: ubuntu:20.04 privileged: true - command: ${MOLECULE_COMMAND:-"sleep infinity"} + ansible.builtin.command: /lib/systemd/systemd + volumes: + - /sys/fs/cgroup:/sys/fs/cgroup:ro + - name: instance + image: debian:10 + privileged: true + ansible.builtin.command: /lib/systemd/systemd volumes: - /sys/fs/cgroup:/sys/fs/cgroup:ro provisioner: diff --git a/molecule/gcloud/package_playbook.yml b/molecule/gcloud/package_playbook.yml index fab1d85..68af24e 100644 --- a/molecule/gcloud/package_playbook.yml +++ b/molecule/gcloud/package_playbook.yml @@ -3,10 +3,10 @@ hosts: all pre_tasks: - name: Install gpg for apt_key - apt: + ansible.builtin.apt: name: gnupg update_cache: true - when: ansible_os_family|lower == "debian" + when: ansible_os_family | lower == "debian" roles: - role: google.cloud.gcloud gcloud_additional_components: diff --git a/molecule/gcloud/verify.yml b/molecule/gcloud/verify.yml index a82dd6f..6e148b1 100644 --- a/molecule/gcloud/verify.yml +++ b/molecule/gcloud/verify.yml @@ -4,6 +4,6 @@ - name: Verify hosts: all tasks: - - name: Example assertion - assert: - that: true + - name: Example assertion + ansible.builtin.assert: + that: true diff --git a/molecule/gcsfuse/converge.yml b/molecule/gcsfuse/converge.yml index f4c2bce..d24daf0 100644 --- a/molecule/gcsfuse/converge.yml +++ b/molecule/gcsfuse/converge.yml @@ -2,23 +2,13 @@ - name: Converge hosts: all pre_tasks: - - name: Using apt update the packages - apt: - update_cache: yes - when: ansible_os_family == "Debian" - - name: Using apt update the packages - yum: - update_cache: yes - when: ansible_os_family == "RedHat" - - name: create containerd folder - file: - path: /etc/systemd/system/containerd.service.d - state: directory - when: ansible_service_mgr == "systemd" - - name: override file for containerd - copy: - src: files/override.conf - dest: /etc/systemd/system/containerd.service.d/override.conf - when: ansible_service_mgr == "systemd" + - name: Update package cache + ansible.builtin.package: + update_cache: "yes" + changed_when: false + register: task_result + until: task_result is success + retries: 10 + delay: 2 roles: - role: google.cloud.gcsfuse diff --git a/molecule/gcsfuse/molecule.yml b/molecule/gcsfuse/molecule.yml index da1ce65..707639a 100644 --- a/molecule/gcsfuse/molecule.yml +++ b/molecule/gcsfuse/molecule.yml @@ -9,9 +9,15 @@ lint: | ansible-lint platforms: - name: instance - image: ${MOLECULE_DISTRO:-ubuntu:xenial} + image: ubuntu:20.04 privileged: true - command: ${MOLECULE_COMMAND:-"sleep infinity"} + ansible.builtin.command: /lib/systemd/systemd + volumes: + - /sys/fs/cgroup:/sys/fs/cgroup:ro + - name: instance + image: debian:10 + privileged: true + ansible.builtin.command: /lib/systemd/systemd volumes: - /sys/fs/cgroup:/sys/fs/cgroup:ro provisioner: diff --git a/molecule/gcsfuse/verify.yml b/molecule/gcsfuse/verify.yml index a82dd6f..6e148b1 100644 --- a/molecule/gcsfuse/verify.yml +++ b/molecule/gcsfuse/verify.yml @@ -4,6 +4,6 @@ - name: Verify hosts: all tasks: - - name: Example assertion - assert: - that: true + - name: Example assertion + ansible.builtin.assert: + that: true diff --git a/plugins/doc_fragments/gcp.py b/plugins/doc_fragments/gcp.py index 5dfeb00..a2d5212 100644 --- a/plugins/doc_fragments/gcp.py +++ b/plugins/doc_fragments/gcp.py @@ -47,7 +47,7 @@ options: type: str notes: - for authentication, you can set service_account_file using the - c(gcp_service_account_file) env variable. + c(GCP_SERVICE_ACCOUNT_FILE) env variable. - for authentication, you can set service_account_contents using the c(GCP_SERVICE_ACCOUNT_CONTENTS) env variable. - For authentication, you can set service_account_email using the diff --git a/plugins/filter/gcp_kms_filters.py b/plugins/filter/gcp_kms_filters.py index 9be0be0..4a08c1a 100644 --- a/plugins/filter/gcp_kms_filters.py +++ b/plugins/filter/gcp_kms_filters.py @@ -13,6 +13,15 @@ from __future__ import (absolute_import, division, print_function) __metaclass__ = type +DOCUMENTATION = ''' + author: + - Eric Anderson + name: gcp_kms_filters + short_description: Support auth tokens as a Filter plugin + description: + - Enables the 'accesstoken' authentication choice. +''' + from ansible.errors import AnsibleError from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import GcpSession @@ -39,6 +48,7 @@ class GcpKmsFilter(): 'auth_kind': kwargs.get('auth_kind', None), 'service_account_file': kwargs.get('service_account_file', None), 'service_account_email': kwargs.get('service_account_email', None), + 'access_token': kwargs.get('access_token', None), } if not params['scopes']: params['scopes'] = ['https://www.googleapis.com/auth/cloudkms'] diff --git a/plugins/inventory/gcp_compute.py b/plugins/inventory/gcp_compute.py index 154b691..2734628 100644 --- a/plugins/inventory/gcp_compute.py +++ b/plugins/inventory/gcp_compute.py @@ -22,7 +22,7 @@ DOCUMENTATION = """ plugin: description: token that ensures this is a source file for the 'gcp_compute' plugin. required: True - choices: ['google.cloud.gcp_compute'] + choices: ['google.cloud.gcp_compute', 'gcp_compute'] zones: description: A list of regions in which to describe GCE instances. If none provided, it defaults to all zones available to a given project. @@ -39,7 +39,7 @@ DOCUMENTATION = """ description: > A list of filter value pairs. Available filters are listed here U(https://cloud.google.com/compute/docs/reference/rest/v1/instances/aggregatedList). - Each additional filter in the list will act be added as an AND condition + Each additional filter in the list will be added as an AND condition (filter1 and filter2) type: list hostnames: @@ -48,30 +48,31 @@ DOCUMENTATION = """ 'public_ip', 'private_ip', 'name' or 'labels.vm_name'. default: ['public_ip', 'private_ip', 'name'] type: list + name_suffix: + description: Custom domain suffix. If set, this string will be appended to all hosts. + default: "" + type: string + required: False auth_kind: description: - The type of credential used. required: True - choices: ['application', 'serviceaccount', 'machineaccount'] + choices: ['application', 'serviceaccount', 'machineaccount', 'accesstoken'] env: - name: GCP_AUTH_KIND - version_added: "2.8.2" scopes: description: list of authentication scopes type: list default: ['https://www.googleapis.com/auth/compute'] env: - name: GCP_SCOPES - version_added: "2.8.2" service_account_file: description: - The path of a Service Account JSON file if serviceaccount is selected as type. type: path env: - name: GCP_SERVICE_ACCOUNT_FILE - version_added: "2.8.2" - name: GCE_CREDENTIALS_FILE_PATH - version_added: "2.8" service_account_contents: description: - A string representing the contents of a Service Account JSON file. This should not be passed in as a dictionary, @@ -79,14 +80,17 @@ DOCUMENTATION = """ type: string env: - name: GCP_SERVICE_ACCOUNT_CONTENTS - version_added: "2.8.2" service_account_email: description: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. env: - name: GCP_SERVICE_ACCOUNT_EMAIL - version_added: "2.8.2" + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + env: + - name: GCP_ACCESS_TOKEN vars_prefix: description: prefix to apply to host variables, does not include facts nor params default: '' @@ -100,7 +104,6 @@ DOCUMENTATION = """ which group names end up being used as. type: bool default: False - version_added: '2.8' retrieve_image_info: description: - Populate the C(image) host fact for the instances returned with the GCP image name @@ -109,7 +112,6 @@ DOCUMENTATION = """ - Unless this option is enabled, the C(image) host variable will be C(null) type: bool default: False - version_added: '2.8' """ EXAMPLES = """ @@ -120,8 +122,8 @@ projects: - gcp-prod-gke-100 - gcp-cicd-101 filters: - - machineType = n1-standard-1 - - scheduling.automaticRestart = true AND machineType = n1-standard-1 + - status = RUNNING + - scheduling.automaticRestart = true AND status = RUNNING service_account_file: /tmp/service_account.json auth_kind: serviceaccount scopes: @@ -131,6 +133,7 @@ keyed_groups: # Create groups from GCE labels - prefix: gcp key: labels +name_suffix: .example.com hostnames: # List host by name instead of the default public ip - name @@ -164,9 +167,12 @@ class GcpMockModule(object): class GcpInstance(object): - def __init__(self, json, hostname_ordering, project_disks, should_format=True): + def __init__( + self, json, hostname_ordering, project_disks, should_format=True, name_suffix="" + ): self.hostname_ordering = hostname_ordering self.project_disks = project_disks + self.name_suffix = name_suffix self.json = json if should_format: self.convert() @@ -203,8 +209,8 @@ class GcpInstance(object): def _format_network_info(self, address): """ - :param address: A GCP network address - :return a dict with network shortname and region + :param address: A GCP network address + :return a dict with network shortname and region """ split = address.split("/") region = "" @@ -216,8 +222,8 @@ class GcpInstance(object): def _format_metadata(self, metadata): """ - :param metadata: A list of dicts where each dict has keys "key" and "value" - :return a dict with key/value pairs for each in list. + :param metadata: A list of dicts where each dict has keys "key" and "value" + :return a dict with key/value pairs for each in list. """ new_metadata = {} for pair in metadata: @@ -226,7 +232,7 @@ class GcpInstance(object): def hostname(self): """ - :return the hostname of this instance + :return the hostname of this instance """ for order in self.hostname_ordering: name = None @@ -238,7 +244,7 @@ class GcpInstance(object): elif order == "private_ip": name = self._get_privateip() elif order == "name": - name = self.json[u"name"] + name = self.json["name"] + self.name_suffix else: raise AnsibleParserError("%s is not a valid hostname precedent" % order) @@ -249,20 +255,20 @@ class GcpInstance(object): def _get_publicip(self): """ - :return the publicIP of this instance or None + :return the publicIP of this instance or None """ # Get public IP if exists for interface in self.json["networkInterfaces"]: if "accessConfigs" in interface: for accessConfig in interface["accessConfigs"]: if "natIP" in accessConfig: - return accessConfig[u"natIP"] + return accessConfig["natIP"] return None def _get_image(self): """ - :param instance: A instance response from GCP - :return the image of this instance or None + :param instance: A instance response from GCP + :return the image of this instance or None """ image = None if self.project_disks and "disks" in self.json: @@ -273,13 +279,13 @@ class GcpInstance(object): def _get_privateip(self): """ - :param item: A host response from GCP - :return the privateIP of this instance or None + :param item: A host response from GCP + :return the privateIP of this instance or None """ # Fallback: Get private IP - for interface in self.json[u"networkInterfaces"]: + for interface in self.json["networkInterfaces"]: if "networkIP" in interface: - return interface[u"networkIP"] + return interface["networkIP"] class InventoryModule(BaseInventoryPlugin, Constructable, Cacheable): @@ -297,7 +303,7 @@ class InventoryModule(BaseInventoryPlugin, Constructable, Cacheable): def _populate_host(self, item): """ - :param item: A GCP instance + :param item: A GCP instance """ hostname = item.hostname() self.inventory.add_host(hostname) @@ -315,8 +321,8 @@ class InventoryModule(BaseInventoryPlugin, Constructable, Cacheable): def verify_file(self, path): """ - :param path: the path to the inventory config file - :return the contents of the config file + :param path: the path to the inventory config file + :return the contents of the config file """ if super(InventoryModule, self).verify_file(path): if path.endswith(("gcp.yml", "gcp.yaml")): @@ -327,10 +333,10 @@ class InventoryModule(BaseInventoryPlugin, Constructable, Cacheable): def fetch_list(self, params, link, query): """ - :param params: a dict containing all of the fields relevant to build URL - :param link: a formatted URL - :param query: a formatted query string - :return the JSON response containing a list of instances. + :param params: a dict containing all of the fields relevant to build URL + :param link: a formatted URL + :param query: a formatted query string + :return the JSON response containing a list of instances. """ lists = [] resp = self._return_if_object( @@ -343,7 +349,10 @@ class InventoryModule(BaseInventoryPlugin, Constructable, Cacheable): self.fake_module, self.auth_session.get( link, - params={"filter": query, "pageToken": resp.get("nextPageToken")}, + params={ + "filter": query, + "pageToken": resp.get("nextPageToken"), + }, ), ) lists.append(resp.get("items")) @@ -364,8 +373,8 @@ class InventoryModule(BaseInventoryPlugin, Constructable, Cacheable): def _get_query_options(self, filters): """ - :param config_data: contents of the inventory config file - :return A fully built query string + :param config_data: contents of the inventory config file + :return A fully built query string """ if not filters: return "" @@ -385,9 +394,9 @@ class InventoryModule(BaseInventoryPlugin, Constructable, Cacheable): def _return_if_object(self, module, response): """ - :param module: A GcpModule - :param response: A Requests response object - :return JSON response + :param module: A GcpModule + :param response: A Requests response object + :return JSON response """ # If not found, return nothing. if response.status_code == 404: @@ -412,9 +421,9 @@ class InventoryModule(BaseInventoryPlugin, Constructable, Cacheable): def _add_hosts(self, items, config_data, format_items=True, project_disks=None): """ - :param items: A list of hosts - :param config_data: configuration data - :param format_items: format items or not + :param items: A list of hosts + :param config_data: configuration data + :param format_items: format items or not """ if not items: return @@ -423,9 +432,11 @@ class InventoryModule(BaseInventoryPlugin, Constructable, Cacheable): if self.get_option("hostnames"): hostname_ordering = self.get_option("hostnames") + name_suffix = self.get_option("name_suffix") + for host_json in items: host = GcpInstance( - host_json, hostname_ordering, project_disks, format_items + host_json, hostname_ordering, project_disks, format_items, name_suffix ) self._populate_host(host) @@ -442,7 +453,7 @@ class InventoryModule(BaseInventoryPlugin, Constructable, Cacheable): def _get_project_disks(self, config_data, query): """ - project space disk images + project space disk images """ try: @@ -508,20 +519,20 @@ class InventoryModule(BaseInventoryPlugin, Constructable, Cacheable): def fetch_projects(self, params, link, query): module = GcpMockModule(params) - auth = GcpSession(module, 'cloudresourcemanager') - response = auth.get(link, params={'filter': query}) + auth = GcpSession(module, "cloudresourcemanager") + response = auth.get(link, params={"filter": query}) return self._return_if_object(module, response) def projects_for_folder(self, config_data, folder): - link = 'https://cloudresourcemanager.googleapis.com/v1/projects'.format() - query = 'parent.id = {0}'.format(folder) + link = "https://cloudresourcemanager.googleapis.com/v1/projects" + query = "parent.id = {0}".format(folder) projects = [] - config_data['scopes'] = ['https://www.googleapis.com/auth/cloud-platform'] + config_data["scopes"] = ["https://www.googleapis.com/auth/cloud-platform"] projects_response = self.fetch_projects(config_data, link, query) - if 'projects' in projects_response: - for item in projects_response.get('projects'): - projects.append(item['projectId']) + if "projects" in projects_response: + for item in projects_response.get("projects"): + projects.append(item["projectId"]) return projects def parse(self, inventory, loader, path, cache=True): @@ -553,6 +564,7 @@ class InventoryModule(BaseInventoryPlugin, Constructable, Cacheable): "service_account_file": self.get_option("service_account_file"), "service_account_contents": self.get_option("service_account_contents"), "service_account_email": self.get_option("service_account_email"), + "access_token": self.get_option("access_token"), } self.fake_module = GcpMockModule(params) diff --git a/plugins/lookup/gcp_secret_manager.py b/plugins/lookup/gcp_secret_manager.py new file mode 100644 index 0000000..b3eeaf9 --- /dev/null +++ b/plugins/lookup/gcp_secret_manager.py @@ -0,0 +1,246 @@ +# GNU General Public License v3.0+ (see LICENSES/GPL-3.0-or-later.txt or https://www.gnu.org/licenses/gpl-3.0.txt) +# SPDX-License-Identifier: GPL-3.0-or-later + +from __future__ import (absolute_import, division, print_function) +__metaclass__ = type + +DOCUMENTATION = ''' + author: + - Dave Costakos + name: gcp_secret_manager + short_description: Get Secrets from Google Cloud as a Lookup plugin + description: + - retrieve secret keys in Secret Manager for use in playbooks + - see https://cloud.google.com/iam/docs/service-account-creds for details on creating + credentials for Google Cloud and the format of such credentials + - once a secret value is retreived, it is returned decoded. It is up to the developer + to maintain secrecy of this value once returned. + + options: + key: + description: + - the name of the secret to look up in Secret Manager + type: str + required: True + aliases: + - name + - secret + - secret_id + project: + description: + - The name of the google cloud project + - defaults to OS env variable GCP_PROJECT if not present + type: str + auth_kind: + description: + - the type of authentication to use with Google Cloud (i.e. serviceaccount or machineaccount) + - defaults to OS env variable GCP_AUTH_KIND if not present + type: str + version: + description: + - the version name of your secret to retrieve + type: str + default: latest + required: False + service_account_email: + description: + - email associated with the service account + - defaults to OS env variable GCP_SERVICE_ACCOUNT_EMAIL if not present + type: str + required: False + service_account_file: + description: + - JSON Credential file obtained from Google Cloud + - defaults to OS env variable GCP_SERVICE_ACCOUNT_FILE if not present + - see https://cloud.google.com/iam/docs/service-account-creds for details + type: str + required: False + service_account_info: + description: + - JSON Object representing the contents of a service_account_file obtained from Google Cloud + - defaults to OS env variable GCP_SERVICE_ACCOUNT_INFO if not present + type: jsonarg + required: False + access_token: + description: + - support for GCP Access Token + - defaults to OS env variable GCP_ACCESS_TOKEN if not present + type: str + required: False + on_error: + description: + - how to handle errors + - strict means raise an exception + - warn means warn, and return none + - ignore means just return none + type: str + required: False + choices: + - 'strict' + - 'warn' + - 'ignore' + default: 'strict' + scopes: + description: + - Authenticaiton scopes for Google Secret Manager + type: list + default: ["https://www.googleapis.com/auth/cloud-platform"] +''' + +EXAMPLES = ''' +- name: Test secret using env variables for credentials + ansible.builtin.debug: + msg: "{{ lookup('google.cloud.gcp_secret_manager', key='secret_key') }}" + +- name: Test secret using explicit credentials + ansible.builtin.debug: + msg: "{{ lookup('google.cloud.gcp_secret_manager', key='secret_key', project='project', auth_kind='serviceaccount', service_account_file='file.json') }}" + +- name: Test getting specific version of a secret (old version) + ansible.builtin.debug: + msg: "{{ lookup('google.cloud.gcp_secret_manager', key='secret_key', version='1') }}" + +- name: Test getting specific version of a secret (new version) + ansible.builtin.debug: + msg: "{{ lookup('google.cloud.gcp_secret_manager', key='secret_key', version='2') }}" +''' + +RETURN = ''' + _raw: + description: the contents of the secret requested (please use "no_log" to not expose this secret) + type: list + elements: str +''' + +################################################################################ +# Imports +################################################################################ + +import os +import base64 + +from ansible.plugins.lookup import LookupBase +from ansible.errors import AnsibleError +from ansible.utils.display import Display + +try: + import requests + HAS_REQUESTS = True +except ImportError: + HAS_REQUESTS = False + +try: + from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import ( + GcpSession, + ) + HAS_GOOGLE_CLOUD_COLLECTION = True +except ImportError: + HAS_GOOGLE_CLOUD_COLLECTION = False + + +class GcpLookupException(Exception): + pass + + +class GcpMockModule(object): + def __init__(self, params): + self.params = params + + def fail_json(self, *args, **kwargs): + raise AnsibleError(kwargs["msg"]) + + def raise_for_status(self, response): + try: + response.raise_for_status() + except getattr(requests.exceptions, "RequestException"): + self.fail_json(msg="GCP returned error: %s" % response.json()) + + +class LookupModule(LookupBase): + def run(self, terms=None, variables=None, **kwargs): + self._display = Display() + if not HAS_GOOGLE_CLOUD_COLLECTION: + raise AnsibleError( + """gcp_secret lookup needs a supported version of the google.cloud + collection installed. Use `ansible-galaxy collection install google.cloud` + to install it""" + ) + self.set_options(var_options=variables, direct=kwargs) + params = { + "key": self.get_option("key"), + "version": self.get_option("version"), + "access_token": self.get_option("access_token"), + "scopes": self.get_option("scopes"), + "on_error": self.get_option("on_error") + } + + params['name'] = params['key'] + + # support GCP_* env variables for some parameters + for param in ["project", "auth_kind", "service_account_file", "service_account_info", "service_account_email", "access_token"]: + params[param] = self.fallback_from_env(param) + + self._display.vvv(msg=f"Module Parameters: {params}") + fake_module = GcpMockModule(params) + result = self.get_secret(fake_module) + return [base64.b64decode(result)] + + def fallback_from_env(self, arg): + if self.get_option(arg): + return self.get_option(arg) + else: + env_name = f"GCP_{arg.upper()}" + if env_name in os.environ: + self.set_option(arg, os.environ[env_name]) + return self.get_option(arg) + + # set version to the latest version because + # we can't be sure that "latest" is always going + # to be set if secret versions get disabled + # see https://issuetracker.google.com/issues/286489671 + def get_latest_version(self, module, auth): + url = "https://secretmanager.googleapis.com/v1/projects/{project}/secrets/{name}/versions?filter=state:ENABLED".format( + **module.params + ) + response = auth.get(url) + self._display.vvv(msg=f"List Version Response: {response.status_code} for {response.request.url}: {response.json()}") + if response.status_code != 200: + self.raise_error(module, f"unable to list versions of secret {response.status_code}") + version_list = response.json() + if "versions" in version_list: + versions_numbers = [] + for version in version_list['versions']: + versions_numbers.append(version['name'].split('/')[-1]) + return sorted(versions_numbers, key=int)[-1] + else: + self.raise_error(module, f"Unable to list secret versions via {response.request.url}: {response.json()}") + + def raise_error(self, module, msg): + if module.params['on_error'] == 'strict': + raise GcpLookupException(msg) + elif module.params['on_error'] == 'warn': + self._display.warning(msg) + + return None + + def get_secret(self, module): + auth = GcpSession(module, "secretmanager") + if module.params['version'] == "latest": + module.params['calc_version'] = self.get_latest_version(module, auth) + else: + module.params['calc_version'] = module.params['version'] + + # there was an error listing secret versions + if module.params['calc_version'] is None: + return '' + + url = "https://secretmanager.googleapis.com/v1/projects/{project}/secrets/{name}/versions/{calc_version}:access".format( + **module.params + ) + response = auth.get(url) + self._display.vvv(msg=f"Response: {response.status_code} for {response.request.url}: {response.json()}") + if response.status_code != 200: + self.raise_error(module, f"Failed to lookup secret value via {response.request.url} {response.status_code}") + return '' + + return response.json()['payload']['data'] diff --git a/plugins/module_utils/gcp_utils.py b/plugins/module_utils/gcp_utils.py index 2dc0668..baf9a6c 100644 --- a/plugins/module_utils/gcp_utils.py +++ b/plugins/module_utils/gcp_utils.py @@ -5,7 +5,6 @@ from __future__ import (absolute_import, division, print_function) __metaclass__ = type -import ast import os import json @@ -18,15 +17,14 @@ except ImportError: try: import google.auth import google.auth.compute_engine - from google.oauth2 import service_account + from google.oauth2 import service_account, credentials as oauth2 from google.auth.transport.requests import AuthorizedSession HAS_GOOGLE_LIBRARIES = True except ImportError: HAS_GOOGLE_LIBRARIES = False from ansible.module_utils.basic import AnsibleModule, env_fallback -from ansible.module_utils.six import string_types -from ansible.module_utils._text import to_text, to_native +from ansible.module_utils._text import to_text def navigate_hash(source, path, default=None): @@ -107,12 +105,12 @@ class GcpSession(object): kwargs = {'json': body} return self.full_delete(url, **kwargs) - def put(self, url, body=None): + def put(self, url, body=None, params=None): """ This method should be avoided in favor of full_put """ kwargs = {'json': body} - return self.full_put(url, **kwargs) + return self.full_put(url, params=params, **kwargs) def patch(self, url, body=None, **kwargs): """ @@ -213,29 +211,56 @@ class GcpSession(object): msg="Service Account File only works with Service Account-based authentication" ) + if self.module.params.get('access_token') is not None and self.module.params['auth_kind'] != 'accesstoken': + self.module.fail_json( + msg='Supplying access_token requires auth_kind set to accesstoken' + ) + def _credentials(self): cred_type = self.module.params['auth_kind'] + if cred_type == 'application': credentials, project_id = google.auth.default(scopes=self.module.params['scopes']) return credentials - if cred_type == 'serviceaccount' and self.module.params.get('service_account_file'): - path = os.path.realpath(os.path.expanduser(self.module.params['service_account_file'])) - if not os.path.exists(path): + + if cred_type == 'serviceaccount': + service_account_file = self.module.params.get('service_account_file') + service_account_contents = self.module.params.get('service_account_contents') + if service_account_file is not None: + path = os.path.realpath(os.path.expanduser(service_account_file)) + try: + svc_acct_creds = service_account.Credentials.from_service_account_file(path) + except OSError as e: + self.module.fail_json( + msg="Unable to read service_account_file at %s: %s" % (path, e.strerror) + ) + elif service_account_contents is not None: + try: + info = json.loads(service_account_contents) + except json.decoder.JSONDecodeError as e: + self.module.fail_json( + msg="Unable to decode service_account_contents as JSON: %s" % e + ) + svc_acct_creds = service_account.Credentials.from_service_account_info(info) + else: self.module.fail_json( - msg="Unable to find service_account_file at '%s'" % path + msg='Service Account authentication requires setting either service_account_file or service_account_contents' ) - return service_account.Credentials.from_service_account_file(path).with_scopes(self.module.params['scopes']) - if cred_type == 'serviceaccount' and self.module.params.get('service_account_contents'): - try: - cred = json.loads(self.module.params.get('service_account_contents')) - except json.decoder.JSONDecodeError as e: - self.module.fail_json( - msg="Unable to decode service_account_contents as JSON" - ) - return service_account.Credentials.from_service_account_info(cred).with_scopes(self.module.params['scopes']) + return svc_acct_creds.with_scopes(self.module.params['scopes']) + if cred_type == 'machineaccount': - return google.auth.compute_engine.Credentials( - self.module.params['service_account_email']) + email = self.module.params['service_account_email'] + email = email if email is not None else "default" + return google.auth.compute_engine.Credentials(email) + + if cred_type == 'accesstoken': + access_token = self.module.params['access_token'] + if access_token is None: + self.module.fail_json( + msg='An access token must be supplied when auth_kind is accesstoken' + ) + return oauth2.Credentials(access_token, scopes=self.module.params['scopes']) + self.module.fail_json(msg="Credential type '%s' not implemented" % cred_type) def _headers(self): @@ -266,7 +291,7 @@ class GcpModule(AnsibleModule): auth_kind=dict( required=True, fallback=(env_fallback, ['GCP_AUTH_KIND']), - choices=['machineaccount', 'serviceaccount', 'application'], + choices=['machineaccount', 'serviceaccount', 'accesstoken', 'application'], type='str'), service_account_email=dict( required=False, @@ -281,6 +306,11 @@ class GcpModule(AnsibleModule): fallback=(env_fallback, ['GCP_SERVICE_ACCOUNT_CONTENTS']), no_log=True, type='jsonarg'), + access_token=dict( + required=False, + fallback=(env_fallback, ['GCP_ACCESS_TOKEN']), + no_log=True, + type='str'), scopes=dict( required=False, fallback=(env_fallback, ['GCP_SCOPES']), @@ -305,7 +335,14 @@ class GcpModule(AnsibleModule): try: response.raise_for_status() except getattr(requests.exceptions, 'RequestException') as inst: - self.fail_json(msg="GCP returned error: %s" % response.json()) + self.fail_json( + msg="GCP returned error: %s" % response.json(), + request={ + "url": response.request.url, + "body": response.request.body, + "method": response.request.method, + } + ) def _merge_dictionaries(self, a, b): new = a.copy() @@ -342,7 +379,7 @@ class GcpRequest(object): def _compare_dicts(self, req_dict, resp_dict): difference = {} for key in req_dict: - if resp_dict.get(key): + if resp_dict.get(key) is not None: difference[key] = self._compare_value(req_dict.get(key), resp_dict.get(key)) # Remove all empty values from difference. @@ -388,7 +425,7 @@ class GcpRequest(object): diff = None # If a None is found, a difference does not exist. # Only differing values matter. - if not resp_value: + if resp_value is None: return None # Can assume non-None types at this point. @@ -424,7 +461,7 @@ class GcpRequest(object): # Value1 False, resp_value 'false' if not req_value and to_text(resp_value) == 'false': return None - return resp_value + return True # to_text may throw UnicodeErrors. # These errors shouldn't crash Ansible and should be hidden. diff --git a/plugins/modules/gcp_appengine_firewall_rule.py b/plugins/modules/gcp_appengine_firewall_rule.py index 508189f..f0dbd61 100644 --- a/plugins/modules/gcp_appengine_firewall_rule.py +++ b/plugins/modules/gcp_appengine_firewall_rule.py @@ -87,6 +87,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -101,6 +102,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -121,6 +126,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -171,7 +178,7 @@ priority: # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest, replace_resource_dict +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest import json ################################################################################ diff --git a/plugins/modules/gcp_appengine_firewall_rule_info.py b/plugins/modules/gcp_appengine_firewall_rule_info.py index 639e16f..7206b15 100644 --- a/plugins/modules/gcp_appengine_firewall_rule_info.py +++ b/plugins/modules/gcp_appengine_firewall_rule_info.py @@ -52,6 +52,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -66,6 +67,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -84,6 +89,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -134,7 +141,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/plugins/modules/gcp_bigquery_dataset.py b/plugins/modules/gcp_bigquery_dataset.py index 85ad276..efc365a 100644 --- a/plugins/modules/gcp_bigquery_dataset.py +++ b/plugins/modules/gcp_bigquery_dataset.py @@ -224,6 +224,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -238,6 +239,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -258,6 +263,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -472,7 +479,6 @@ from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import ( GcpModule, GcpRequest, remove_nones_from_dict, - replace_resource_dict, ) import json diff --git a/plugins/modules/gcp_bigquery_dataset_info.py b/plugins/modules/gcp_bigquery_dataset_info.py index cc48521..ca689a6 100644 --- a/plugins/modules/gcp_bigquery_dataset_info.py +++ b/plugins/modules/gcp_bigquery_dataset_info.py @@ -52,6 +52,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -66,6 +67,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -84,6 +89,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -295,7 +302,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/plugins/modules/gcp_bigquery_table.py b/plugins/modules/gcp_bigquery_table.py index d02d220..b0021e2 100644 --- a/plugins/modules/gcp_bigquery_table.py +++ b/plugins/modules/gcp_bigquery_table.py @@ -475,6 +475,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -489,6 +490,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -994,7 +999,6 @@ from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import ( GcpModule, GcpRequest, remove_nones_from_dict, - replace_resource_dict, ) import json diff --git a/plugins/modules/gcp_bigquery_table_info.py b/plugins/modules/gcp_bigquery_table_info.py index 99b89ac..a67af95 100644 --- a/plugins/modules/gcp_bigquery_table_info.py +++ b/plugins/modules/gcp_bigquery_table_info.py @@ -57,6 +57,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -71,6 +72,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -89,6 +94,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -574,7 +581,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/plugins/modules/gcp_bigtable_instance.py b/plugins/modules/gcp_bigtable_instance.py index ab36973..e219cb2 100644 --- a/plugins/modules/gcp_bigtable_instance.py +++ b/plugins/modules/gcp_bigtable_instance.py @@ -117,6 +117,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -131,6 +132,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -235,7 +240,6 @@ from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import ( GcpModule, GcpRequest, remove_nones_from_dict, - replace_resource_dict, ) import json import time @@ -264,7 +268,7 @@ def main(): ) if not module.params['scopes']: - module.params['scopes'] = ['https://www.googleapis.com/auth/bigtable'] + module.params['scopes'] = ['https://www.googleapis.com/auth/cloud-platform'] state = module.params['state'] diff --git a/plugins/modules/gcp_bigtable_instance_info.py b/plugins/modules/gcp_bigtable_instance_info.py index 68307a2..6c8f416 100644 --- a/plugins/modules/gcp_bigtable_instance_info.py +++ b/plugins/modules/gcp_bigtable_instance_info.py @@ -52,6 +52,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -66,6 +67,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -84,6 +89,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -172,7 +179,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ @@ -184,7 +191,7 @@ def main(): module = GcpModule(argument_spec=dict()) if not module.params['scopes']: - module.params['scopes'] = ['https://www.googleapis.com/auth/bigtable'] + module.params['scopes'] = ['https://www.googleapis.com/auth/cloud-platform'] return_value = {'resources': fetch_list(module, collection(module))} module.exit_json(**return_value) diff --git a/plugins/modules/gcp_cloudbuild_trigger.py b/plugins/modules/gcp_cloudbuild_trigger.py index da506a0..b252f86 100644 --- a/plugins/modules/gcp_cloudbuild_trigger.py +++ b/plugins/modules/gcp_cloudbuild_trigger.py @@ -727,6 +727,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -741,6 +742,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -761,6 +766,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -1482,7 +1489,6 @@ from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import ( GcpModule, GcpRequest, remove_nones_from_dict, - replace_resource_dict, ) import json diff --git a/plugins/modules/gcp_cloudbuild_trigger_info.py b/plugins/modules/gcp_cloudbuild_trigger_info.py index 78c4990..c8a9202 100644 --- a/plugins/modules/gcp_cloudbuild_trigger_info.py +++ b/plugins/modules/gcp_cloudbuild_trigger_info.py @@ -52,6 +52,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -66,6 +67,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -84,6 +89,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -798,7 +805,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/plugins/modules/gcp_cloudfunctions_cloud_function.py b/plugins/modules/gcp_cloudfunctions_cloud_function.py index a3f68dc..e09ed7b 100644 --- a/plugins/modules/gcp_cloudfunctions_cloud_function.py +++ b/plugins/modules/gcp_cloudfunctions_cloud_function.py @@ -25,9 +25,13 @@ __metaclass__ = type # Documentation ################################################################################ -ANSIBLE_METADATA = {'metadata_version': '1.1', 'status': ["preview"], 'supported_by': 'community'} +ANSIBLE_METADATA = { + "metadata_version": "1.1", + "status": ["preview"], + "supported_by": "community", +} -DOCUMENTATION = ''' +DOCUMENTATION = """ --- module: gcp_cloudfunctions_cloud_function description: @@ -69,8 +73,8 @@ options: type: str runtime: description: - - The runtime in which the function is going to run. If empty, defaults to Node.js - 6. + - The runtime in which to run the function. Required when deploying a new function, + optional when updating an existing function. required: false type: str timeout: @@ -170,6 +174,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -184,6 +189,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -195,9 +204,9 @@ options: - This should not be set unless you know what you're doing. - This only alters the User Agent string for any API requests. type: str -''' +""" -EXAMPLES = ''' +EXAMPLES = """ - name: create a cloud function google.cloud.gcp_cloudfunctions_cloud_function: name: test_object @@ -209,9 +218,9 @@ EXAMPLES = ''' auth_kind: serviceaccount service_account_file: "/tmp/auth.pem" state: present -''' +""" -RETURN = ''' +RETURN = """ name: description: - A user-defined name of the function. Function names must be unique globally and @@ -353,7 +362,7 @@ trigger_http: - Use HTTP to trigger this function. returned: success type: bool -''' +""" ################################################################################ # Imports @@ -365,7 +374,6 @@ from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import ( GcpModule, GcpRequest, remove_nones_from_dict, - replace_resource_dict, ) import json import re @@ -381,43 +389,50 @@ def main(): module = GcpModule( argument_spec=dict( - state=dict(default='present', choices=['present', 'absent'], type='str'), - name=dict(required=True, type='str'), - description=dict(type='str'), - entry_point=dict(type='str'), - runtime=dict(type='str'), - timeout=dict(type='str'), - available_memory_mb=dict(type='int'), - labels=dict(type='dict'), - environment_variables=dict(type='dict'), - source_archive_url=dict(type='str'), - source_upload_url=dict(type='str'), - source_repository=dict(type='dict', options=dict(url=dict(required=True, type='str'))), - https_trigger=dict(type='dict', options=dict()), - event_trigger=dict( - type='dict', options=dict(event_type=dict(required=True, type='str'), resource=dict(required=True, type='str'), service=dict(type='str')) + state=dict(default="present", choices=["present", "absent"], type="str"), + name=dict(required=True, type="str"), + description=dict(type="str"), + entry_point=dict(type="str"), + runtime=dict(type="str"), + timeout=dict(type="str"), + available_memory_mb=dict(type="int"), + labels=dict(type="dict"), + environment_variables=dict(type="dict"), + source_archive_url=dict(type="str"), + source_upload_url=dict(type="str"), + source_repository=dict( + type="dict", options=dict(url=dict(required=True, type="str")) ), - location=dict(required=True, type='str'), - trigger_http=dict(type='bool'), + https_trigger=dict(type="dict", options=dict()), + event_trigger=dict( + type="dict", + options=dict( + event_type=dict(required=True, type="str"), + resource=dict(required=True, type="str"), + service=dict(type="str"), + ), + ), + location=dict(required=True, type="str"), + trigger_http=dict(type="bool"), ) ) - if not module.params['scopes']: - module.params['scopes'] = ['https://www.googleapis.com/auth/cloud-platform'] + if not module.params["scopes"]: + module.params["scopes"] = ["https://www.googleapis.com/auth/cloud-platform"] - state = module.params['state'] + state = module.params["state"] fetch = fetch_resource(module, self_link(module)) changed = False # Need to set triggerHttps to {} if boolean true. - if fetch and fetch.get('httpsTrigger') and module.params['trigger_http']: - module.params['https_trigger'] = fetch.get('httpsTrigger') - elif module.params['trigger_http']: - module.params['https_trigger'] = {} + if fetch and fetch.get("httpsTrigger") and module.params["trigger_http"]: + module.params["https_trigger"] = fetch.get("httpsTrigger") + elif module.params["trigger_http"]: + module.params["https_trigger"] = {} if fetch: - if state == 'present': + if state == "present": if is_different(module, fetch): update(module, self_link(module), fetch) fetch = fetch_resource(module, self_link(module)) @@ -427,101 +442,115 @@ def main(): fetch = {} changed = True else: - if state == 'present': + if state == "present": fetch = create(module, collection(module)) changed = True else: fetch = {} - fetch.update({'changed': changed}) + fetch.update({"changed": changed}) module.exit_json(**fetch) def create(module, link): - auth = GcpSession(module, 'cloudfunctions') + auth = GcpSession(module, "cloudfunctions") return wait_for_operation(module, auth.post(link, resource_to_request(module))) def update(module, link, fetch): - auth = GcpSession(module, 'cloudfunctions') - params = {'updateMask': updateMask(resource_to_request(module), response_to_hash(module, fetch))} + auth = GcpSession(module, "cloudfunctions") + params = { + "updateMask": updateMask( + resource_to_request(module), response_to_hash(module, fetch) + ) + } request = resource_to_request(module) - del request['name'] + del request["name"] return wait_for_operation(module, auth.put(link, request, params=params)) def updateMask(request, response): update_mask = [] - if request.get('name') != response.get('name'): - update_mask.append('name') - if request.get('description') != response.get('description'): - update_mask.append('description') - if request.get('entryPoint') != response.get('entryPoint'): - update_mask.append('entryPoint') - if request.get('runtime') != response.get('runtime'): - update_mask.append('runtime') - if request.get('timeout') != response.get('timeout'): - update_mask.append('timeout') - if request.get('availableMemoryMb') != response.get('availableMemoryMb'): - update_mask.append('availableMemoryMb') - if request.get('labels') != response.get('labels'): - update_mask.append('labels') - if request.get('environmentVariables') != response.get('environmentVariables'): - update_mask.append('environmentVariables') - if request.get('sourceArchiveUrl') != response.get('sourceArchiveUrl'): - update_mask.append('sourceArchiveUrl') - if request.get('sourceUploadUrl') != response.get('sourceUploadUrl'): - update_mask.append('sourceUploadUrl') - if request.get('sourceRepository') != response.get('sourceRepository'): - update_mask.append('sourceRepository') - if request.get('httpsTrigger') != response.get('httpsTrigger'): - update_mask.append('httpsTrigger') - if request.get('eventTrigger') != response.get('eventTrigger'): - update_mask.append('eventTrigger') - if request.get('location') != response.get('location'): - update_mask.append('location') - if request.get('trigger_http') != response.get('trigger_http'): - update_mask.append('trigger_http') - return ','.join(update_mask) + if request.get("name") != response.get("name"): + update_mask.append("name") + if request.get("description") != response.get("description"): + update_mask.append("description") + if request.get("entryPoint") != response.get("entryPoint"): + update_mask.append("entryPoint") + if request.get("runtime") != response.get("runtime"): + update_mask.append("runtime") + if request.get("timeout") != response.get("timeout"): + update_mask.append("timeout") + if request.get("availableMemoryMb") != response.get("availableMemoryMb"): + update_mask.append("availableMemoryMb") + if request.get("labels") != response.get("labels"): + update_mask.append("labels") + if request.get("environmentVariables") != response.get("environmentVariables"): + update_mask.append("environmentVariables") + if request.get("sourceArchiveUrl") != response.get("sourceArchiveUrl"): + update_mask.append("sourceArchiveUrl") + if request.get("sourceUploadUrl") != response.get("sourceUploadUrl"): + update_mask.append("sourceUploadUrl") + if request.get("sourceRepository") != response.get("sourceRepository"): + update_mask.append("sourceRepository") + if request.get("httpsTrigger") != response.get("httpsTrigger"): + update_mask.append("httpsTrigger") + if request.get("eventTrigger") != response.get("eventTrigger"): + update_mask.append("eventTrigger") + if request.get("location") != response.get("location"): + update_mask.append("location") + if request.get("trigger_http") != response.get("trigger_http"): + update_mask.append("trigger_http") + return ",".join(update_mask) def delete(module, link): - auth = GcpSession(module, 'cloudfunctions') + auth = GcpSession(module, "cloudfunctions") return wait_for_operation(module, auth.delete(link)) def resource_to_request(module): request = { - u'name': name_pattern(module.params.get('name'), module), - u'description': module.params.get('description'), - u'entryPoint': module.params.get('entry_point'), - u'runtime': module.params.get('runtime'), - u'timeout': module.params.get('timeout'), - u'availableMemoryMb': module.params.get('available_memory_mb'), - u'labels': module.params.get('labels'), - u'environmentVariables': module.params.get('environment_variables'), - u'sourceArchiveUrl': module.params.get('source_archive_url'), - u'sourceUploadUrl': module.params.get('source_upload_url'), - u'sourceRepository': CloudFunctionSourcerepository(module.params.get('source_repository', {}), module).to_request(), - u'httpsTrigger': CloudFunctionHttpstrigger(module.params.get('https_trigger', {}), module).to_request(), - u'eventTrigger': CloudFunctionEventtrigger(module.params.get('event_trigger', {}), module).to_request(), + "name": name_pattern(module.params.get("name"), module), + "description": module.params.get("description"), + "entryPoint": module.params.get("entry_point"), + "runtime": module.params.get("runtime"), + "timeout": module.params.get("timeout"), + "availableMemoryMb": module.params.get("available_memory_mb"), + "labels": module.params.get("labels"), + "environmentVariables": module.params.get("environment_variables"), + "sourceArchiveUrl": module.params.get("source_archive_url"), + "sourceUploadUrl": module.params.get("source_upload_url"), + "sourceRepository": CloudFunctionSourcerepository( + module.params.get("source_repository", {}), module + ).to_request(), + "httpsTrigger": CloudFunctionHttpstrigger( + module.params.get("https_trigger", {}), module + ).to_request(), + "eventTrigger": CloudFunctionEventtrigger( + module.params.get("event_trigger", {}), module + ).to_request(), } request = encode_request(request, module) return request def fetch_resource(module, link, allow_not_found=True): - auth = GcpSession(module, 'cloudfunctions') + auth = GcpSession(module, "cloudfunctions") return return_if_object(module, auth.get(link), allow_not_found) def self_link(module): - return "https://cloudfunctions.googleapis.com/v1/projects/{project}/locations/{location}/functions/{name}".format(**module.params) + return "https://cloudfunctions.googleapis.com/v1/projects/{project}/locations/{location}/functions/{name}".format( + **module.params + ) def collection(module): - return "https://cloudfunctions.googleapis.com/v1/projects/{project}/locations/{location}/functions".format(**module.params) + return "https://cloudfunctions.googleapis.com/v1/projects/{project}/locations/{location}/functions".format( + **module.params + ) def return_if_object(module, response, allow_not_found=False): @@ -536,11 +565,11 @@ def return_if_object(module, response, allow_not_found=False): try: module.raise_for_status(response) result = response.json() - except getattr(json.decoder, 'JSONDecodeError', ValueError): + except getattr(json.decoder, "JSONDecodeError", ValueError): module.fail_json(msg="Invalid JSON response with error: %s" % response.text) - if navigate_hash(result, ['error', 'errors']): - module.fail_json(msg=navigate_hash(result, ['error', 'errors'])) + if navigate_hash(result, ["error", "errors"]): + module.fail_json(msg=navigate_hash(result, ["error", "errors"])) return result @@ -567,23 +596,29 @@ def is_different(module, response): # This is for doing comparisons with Ansible's current parameters. def response_to_hash(module, response): return { - u'name': response.get(u'name'), - u'description': response.get(u'description'), - u'status': response.get(u'status'), - u'entryPoint': response.get(u'entryPoint'), - u'runtime': response.get(u'runtime'), - u'timeout': response.get(u'timeout'), - u'availableMemoryMb': response.get(u'availableMemoryMb'), - u'serviceAccountEmail': response.get(u'serviceAccountEmail'), - u'updateTime': response.get(u'updateTime'), - u'versionId': response.get(u'versionId'), - u'labels': response.get(u'labels'), - u'environmentVariables': response.get(u'environmentVariables'), - u'sourceArchiveUrl': response.get(u'sourceArchiveUrl'), - u'sourceUploadUrl': response.get(u'sourceUploadUrl'), - u'sourceRepository': CloudFunctionSourcerepository(response.get(u'sourceRepository', {}), module).from_response(), - u'httpsTrigger': CloudFunctionHttpstrigger(response.get(u'httpsTrigger', {}), module).from_response(), - u'eventTrigger': CloudFunctionEventtrigger(response.get(u'eventTrigger', {}), module).from_response(), + "name": response.get("name"), + "description": response.get("description"), + "status": response.get("status"), + "entryPoint": response.get("entryPoint"), + "runtime": response.get("runtime"), + "timeout": response.get("timeout"), + "availableMemoryMb": response.get("availableMemoryMb"), + "serviceAccountEmail": response.get("serviceAccountEmail"), + "updateTime": response.get("updateTime"), + "versionId": response.get("versionId"), + "labels": response.get("labels"), + "environmentVariables": response.get("environmentVariables"), + "sourceArchiveUrl": response.get("sourceArchiveUrl"), + "sourceUploadUrl": response.get("sourceUploadUrl"), + "sourceRepository": CloudFunctionSourcerepository( + response.get("sourceRepository", {}), module + ).from_response(), + "httpsTrigger": CloudFunctionHttpstrigger( + response.get("httpsTrigger", {}), module + ).from_response(), + "eventTrigger": CloudFunctionEventtrigger( + response.get("eventTrigger", {}), module + ).from_response(), } @@ -594,7 +629,9 @@ def name_pattern(name, module): regex = r"projects/.*/locations/.*/functions/.*" if not re.match(regex, name): - name = "projects/{project}/locations/{location}/functions/{name}".format(**module.params) + name = "projects/{project}/locations/{location}/functions/{name}".format( + **module.params + ) return name @@ -612,20 +649,20 @@ def wait_for_operation(module, response): op_result = return_if_object(module, response) if op_result is None: return {} - status = navigate_hash(op_result, ['done']) + status = navigate_hash(op_result, ["done"]) wait_done = wait_for_completion(status, op_result, module) - raise_if_errors(wait_done, ['error'], module) - return navigate_hash(wait_done, ['response']) + raise_if_errors(wait_done, ["error"], module) + return navigate_hash(wait_done, ["response"]) def wait_for_completion(status, op_result, module): - op_id = navigate_hash(op_result, ['name']) - op_uri = async_op_url(module, {'op_id': op_id}) + op_id = navigate_hash(op_result, ["name"]) + op_uri = async_op_url(module, {"op_id": op_id}) while not status: - raise_if_errors(op_result, ['error'], module) + raise_if_errors(op_result, ["error"], module) time.sleep(1.0) op_result = fetch_resource(module, op_uri, False) - status = navigate_hash(op_result, ['done']) + status = navigate_hash(op_result, ["done"]) return op_result @@ -641,8 +678,8 @@ def encode_request(request, module): if v or v is False: return_vals[k] = v - if module.params['trigger_http'] and not return_vals.get('httpsTrigger'): - return_vals['httpsTrigger'] = {} + if module.params["trigger_http"] and not return_vals.get("httpsTrigger"): + return_vals["httpsTrigger"] = {} return return_vals @@ -656,10 +693,10 @@ class CloudFunctionSourcerepository(object): self.request = {} def to_request(self): - return remove_nones_from_dict({u'url': self.request.get('url')}) + return remove_nones_from_dict({"url": self.request.get("url")}) def from_response(self): - return remove_nones_from_dict({u'url': self.request.get(u'url')}) + return remove_nones_from_dict({"url": self.request.get("url")}) class CloudFunctionHttpstrigger(object): @@ -687,14 +724,22 @@ class CloudFunctionEventtrigger(object): def to_request(self): return remove_nones_from_dict( - {u'eventType': self.request.get('event_type'), u'resource': self.request.get('resource'), u'service': self.request.get('service')} + { + "eventType": self.request.get("event_type"), + "resource": self.request.get("resource"), + "service": self.request.get("service"), + } ) def from_response(self): return remove_nones_from_dict( - {u'eventType': self.request.get(u'eventType'), u'resource': self.request.get(u'resource'), u'service': self.request.get(u'service')} + { + "eventType": self.request.get("eventType"), + "resource": self.request.get("resource"), + "service": self.request.get("service"), + } ) -if __name__ == '__main__': +if __name__ == "__main__": main() diff --git a/plugins/modules/gcp_cloudfunctions_cloud_function_info.py b/plugins/modules/gcp_cloudfunctions_cloud_function_info.py index 36fc753..075fd86 100644 --- a/plugins/modules/gcp_cloudfunctions_cloud_function_info.py +++ b/plugins/modules/gcp_cloudfunctions_cloud_function_info.py @@ -57,6 +57,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -71,6 +72,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -89,6 +94,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -257,7 +264,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/plugins/modules/gcp_cloudscheduler_job.py b/plugins/modules/gcp_cloudscheduler_job.py index 40559ff..8a93053 100644 --- a/plugins/modules/gcp_cloudscheduler_job.py +++ b/plugins/modules/gcp_cloudscheduler_job.py @@ -310,6 +310,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -324,6 +325,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -344,6 +349,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -627,7 +634,6 @@ from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import ( GcpModule, GcpRequest, remove_nones_from_dict, - replace_resource_dict, ) import json diff --git a/plugins/modules/gcp_cloudscheduler_job_info.py b/plugins/modules/gcp_cloudscheduler_job_info.py index 4ab155e..29ba123 100644 --- a/plugins/modules/gcp_cloudscheduler_job_info.py +++ b/plugins/modules/gcp_cloudscheduler_job_info.py @@ -57,6 +57,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -71,6 +72,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -89,6 +94,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -363,7 +370,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/plugins/modules/gcp_cloudtasks_queue.py b/plugins/modules/gcp_cloudtasks_queue.py index 0b83803..f8b98f4 100644 --- a/plugins/modules/gcp_cloudtasks_queue.py +++ b/plugins/modules/gcp_cloudtasks_queue.py @@ -188,6 +188,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -202,6 +203,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -384,7 +389,6 @@ from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import ( GcpModule, GcpRequest, remove_nones_from_dict, - replace_resource_dict, ) import json import re @@ -489,7 +493,6 @@ def delete(module, link): def resource_to_request(module): request = { - u'location': module.params.get('location'), u'name': name_pattern(module.params.get('name'), module), u'appEngineRoutingOverride': QueueAppengineroutingoverride(module.params.get('app_engine_routing_override', {}), module).to_request(), u'rateLimits': QueueRatelimits(module.params.get('rate_limits', {}), module).to_request(), diff --git a/plugins/modules/gcp_cloudtasks_queue_info.py b/plugins/modules/gcp_cloudtasks_queue_info.py index 95f306b..631b10d 100644 --- a/plugins/modules/gcp_cloudtasks_queue_info.py +++ b/plugins/modules/gcp_cloudtasks_queue_info.py @@ -57,6 +57,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -71,6 +72,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -89,6 +94,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -263,7 +270,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/plugins/modules/gcp_compute_address.py b/plugins/modules/gcp_compute_address.py index 122db49..55fd596 100644 --- a/plugins/modules/gcp_compute_address.py +++ b/plugins/modules/gcp_compute_address.py @@ -153,6 +153,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -167,6 +168,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -188,6 +193,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. diff --git a/plugins/modules/gcp_compute_address_info.py b/plugins/modules/gcp_compute_address_info.py index bbd8c2c..247d892 100644 --- a/plugins/modules/gcp_compute_address_info.py +++ b/plugins/modules/gcp_compute_address_info.py @@ -65,6 +65,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -79,6 +80,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -97,6 +102,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -219,7 +226,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/plugins/modules/gcp_compute_autoscaler.py b/plugins/modules/gcp_compute_autoscaler.py index d3acc78..267116f 100644 --- a/plugins/modules/gcp_compute_autoscaler.py +++ b/plugins/modules/gcp_compute_autoscaler.py @@ -260,6 +260,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -274,6 +275,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -294,6 +299,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. diff --git a/plugins/modules/gcp_compute_autoscaler_info.py b/plugins/modules/gcp_compute_autoscaler_info.py index f8df9f4..110c10d 100644 --- a/plugins/modules/gcp_compute_autoscaler_info.py +++ b/plugins/modules/gcp_compute_autoscaler_info.py @@ -64,6 +64,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -78,6 +79,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -96,6 +101,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -304,7 +311,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/plugins/modules/gcp_compute_backend_bucket.py b/plugins/modules/gcp_compute_backend_bucket.py index 5746a0b..420b593 100644 --- a/plugins/modules/gcp_compute_backend_bucket.py +++ b/plugins/modules/gcp_compute_backend_bucket.py @@ -174,6 +174,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -188,6 +189,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -208,6 +213,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -366,7 +373,6 @@ from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import ( GcpModule, GcpRequest, remove_nones_from_dict, - replace_resource_dict, ) import json import time diff --git a/plugins/modules/gcp_compute_backend_bucket_info.py b/plugins/modules/gcp_compute_backend_bucket_info.py index 31d0983..aaf40e3 100644 --- a/plugins/modules/gcp_compute_backend_bucket_info.py +++ b/plugins/modules/gcp_compute_backend_bucket_info.py @@ -59,6 +59,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -73,6 +74,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -91,6 +96,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -236,7 +243,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/plugins/modules/gcp_compute_backend_service.py b/plugins/modules/gcp_compute_backend_service.py index a5e2803..b259848 100644 --- a/plugins/modules/gcp_compute_backend_service.py +++ b/plugins/modules/gcp_compute_backend_service.py @@ -25,9 +25,13 @@ __metaclass__ = type # Documentation ################################################################################ -ANSIBLE_METADATA = {'metadata_version': '1.1', 'status': ["preview"], 'supported_by': 'community'} +ANSIBLE_METADATA = { + "metadata_version": "1.1", + "status": ["preview"], + "supported_by": "community", +} -DOCUMENTATION = ''' +DOCUMENTATION = """ --- module: gcp_compute_backend_service description: @@ -698,6 +702,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -712,6 +717,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -732,13 +741,15 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. - The I(service_account_email) and I(service_account_file) options are mutually exclusive. -''' +""" -EXAMPLES = ''' +EXAMPLES = """ - name: create a instance group google.cloud.gcp_compute_instance_group: name: instancegroup-backendservice @@ -774,9 +785,9 @@ EXAMPLES = ''' auth_kind: serviceaccount service_account_file: "/tmp/auth.pem" state: present -''' +""" -RETURN = ''' +RETURN = """ affinityCookieTtlSec: description: - Lifetime of cookies in seconds if session_affinity is GENERATED_COOKIE. If set @@ -1394,7 +1405,7 @@ logConfig: - The default value is 1.0. returned: success type: str -''' +""" ################################################################################ # Imports @@ -1406,7 +1417,6 @@ from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import ( GcpModule, GcpRequest, remove_nones_from_dict, - replace_resource_dict, ) import json import time @@ -1421,126 +1431,159 @@ def main(): module = GcpModule( argument_spec=dict( - state=dict(default='present', choices=['present', 'absent'], type='str'), - affinity_cookie_ttl_sec=dict(type='int'), + state=dict(default="present", choices=["present", "absent"], type="str"), + affinity_cookie_ttl_sec=dict(type="int"), + fingerprint=dict(type="str"), backends=dict( - type='list', - elements='dict', + type="list", + elements="dict", options=dict( - balancing_mode=dict(default='UTILIZATION', type='str'), - capacity_scaler=dict(default=1.0, type='str'), - description=dict(type='str'), - group=dict(required=True, type='str'), - max_connections=dict(type='int'), - max_connections_per_instance=dict(type='int'), - max_connections_per_endpoint=dict(type='int'), - max_rate=dict(type='int'), - max_rate_per_instance=dict(type='str'), - max_rate_per_endpoint=dict(type='str'), - max_utilization=dict(type='str'), + balancing_mode=dict(default="UTILIZATION", type="str"), + # TODO: capacity_scaler does some value normalization + # server-side, so there needs to be a way to do proper + # value comparison. + capacity_scaler=dict(default="1", type="str"), + description=dict(type="str"), + group=dict(required=True, type="str"), + max_connections=dict(type="int"), + max_connections_per_instance=dict(type="int"), + max_connections_per_endpoint=dict(type="int"), + max_rate=dict(type="int"), + max_rate_per_instance=dict(type="str"), + max_rate_per_endpoint=dict(type="str"), + max_utilization=dict(type="str"), ), ), circuit_breakers=dict( - type='dict', + type="dict", options=dict( - max_requests_per_connection=dict(type='int'), - max_connections=dict(default=1024, type='int'), - max_pending_requests=dict(default=1024, type='int'), - max_requests=dict(default=1024, type='int'), - max_retries=dict(default=3, type='int'), + max_requests_per_connection=dict(type="int"), + max_connections=dict(default=1024, type="int"), + max_pending_requests=dict(default=1024, type="int"), + max_requests=dict(default=1024, type="int"), + max_retries=dict(default=3, type="int"), ), ), consistent_hash=dict( - type='dict', + type="dict", options=dict( http_cookie=dict( - type='dict', + type="dict", options=dict( - ttl=dict(type='dict', options=dict(seconds=dict(required=True, type='int'), nanos=dict(type='int'))), - name=dict(type='str'), - path=dict(type='str'), + ttl=dict( + type="dict", + options=dict( + seconds=dict(required=True, type="int"), + nanos=dict(type="int"), + ), + ), + name=dict(type="str"), + path=dict(type="str"), ), ), - http_header_name=dict(type='str'), - minimum_ring_size=dict(default=1024, type='int'), + http_header_name=dict(type="str"), + minimum_ring_size=dict(default=1024, type="int"), ), ), cdn_policy=dict( - type='dict', + type="dict", options=dict( cache_key_policy=dict( - type='dict', + type="dict", options=dict( - include_host=dict(type='bool'), - include_protocol=dict(type='bool'), - include_query_string=dict(type='bool'), - query_string_blacklist=dict(type='list', elements='str'), - query_string_whitelist=dict(type='list', elements='str'), + include_host=dict(type="bool"), + include_protocol=dict(type="bool"), + include_query_string=dict(type="bool"), + query_string_blacklist=dict(type="list", elements="str"), + query_string_whitelist=dict(type="list", elements="str"), ), ), - signed_url_cache_max_age_sec=dict(default=3600, type='int'), - default_ttl=dict(type='int'), - max_ttl=dict(type='int'), - client_ttl=dict(type='int'), - negative_caching=dict(type='bool'), - negative_caching_policy=dict(type='list', elements='dict', options=dict(code=dict(type='int'), ttl=dict(type='int'))), - cache_mode=dict(type='str'), - serve_while_stale=dict(type='int'), + signed_url_cache_max_age_sec=dict(default=3600, type="int"), + default_ttl=dict(type="int"), + max_ttl=dict(type="int"), + client_ttl=dict(type="int"), + negative_caching=dict(type="bool"), + negative_caching_policy=dict( + type="list", + elements="dict", + options=dict(code=dict(type="int"), ttl=dict(type="int")), + ), + cache_mode=dict(type="str"), + serve_while_stale=dict(type="int"), ), ), - connection_draining=dict(type='dict', options=dict(draining_timeout_sec=dict(default=300, type='int'))), - custom_request_headers=dict(type='list', elements='str'), - custom_response_headers=dict(type='list', elements='str'), - description=dict(type='str'), - enable_cdn=dict(type='bool'), - health_checks=dict(type='list', elements='str'), + connection_draining=dict( + type="dict", + options=dict(draining_timeout_sec=dict(default=300, type="int")), + ), + custom_request_headers=dict(type="list", elements="str"), + custom_response_headers=dict(type="list", elements="str"), + description=dict(type="str"), + enable_cdn=dict(type="bool"), + health_checks=dict(type="list", elements="str"), iap=dict( - type='dict', + type="dict", options=dict( - enabled=dict(type='bool'), - oauth2_client_id=dict(required=True, type='str'), - oauth2_client_secret=dict(required=True, type='str', no_log=True), + enabled=dict(type="bool"), + oauth2_client_id=dict(required=True, type="str"), + oauth2_client_secret=dict(required=True, type="str", no_log=True), ), ), - load_balancing_scheme=dict(default='EXTERNAL', type='str'), - locality_lb_policy=dict(type='str'), - name=dict(required=True, type='str'), + load_balancing_scheme=dict(default="EXTERNAL", type="str"), + locality_lb_policy=dict(type="str"), + name=dict(required=True, type="str"), outlier_detection=dict( - type='dict', + type="dict", options=dict( - base_ejection_time=dict(type='dict', options=dict(seconds=dict(required=True, type='int'), nanos=dict(type='int'))), - consecutive_errors=dict(default=5, type='int'), - consecutive_gateway_failure=dict(default=5, type='int'), - enforcing_consecutive_errors=dict(default=100, type='int'), - enforcing_consecutive_gateway_failure=dict(default=0, type='int'), - enforcing_success_rate=dict(default=100, type='int'), - interval=dict(type='dict', options=dict(seconds=dict(required=True, type='int'), nanos=dict(type='int'))), - max_ejection_percent=dict(default=10, type='int'), - success_rate_minimum_hosts=dict(default=5, type='int'), - success_rate_request_volume=dict(default=100, type='int'), - success_rate_stdev_factor=dict(default=1900, type='int'), + base_ejection_time=dict( + type="dict", + options=dict( + seconds=dict(required=True, type="int"), + nanos=dict(type="int"), + ), + ), + consecutive_errors=dict(default=5, type="int"), + consecutive_gateway_failure=dict(default=5, type="int"), + enforcing_consecutive_errors=dict(default=100, type="int"), + enforcing_consecutive_gateway_failure=dict(default=0, type="int"), + enforcing_success_rate=dict(default=100, type="int"), + interval=dict( + type="dict", + options=dict( + seconds=dict(required=True, type="int"), + nanos=dict(type="int"), + ), + ), + max_ejection_percent=dict(default=10, type="int"), + success_rate_minimum_hosts=dict(default=5, type="int"), + success_rate_request_volume=dict(default=100, type="int"), + success_rate_stdev_factor=dict(default=1900, type="int"), ), ), - port_name=dict(type='str'), - protocol=dict(type='str'), - security_policy=dict(type='str'), - session_affinity=dict(type='str'), - timeout_sec=dict(type='int', aliases=['timeout_seconds']), - log_config=dict(type='dict', options=dict(enable=dict(type='bool'), sample_rate=dict(type='str'))), + port_name=dict(type="str"), + protocol=dict(type="str"), + security_policy=dict(type="str"), + session_affinity=dict(type="str"), + timeout_sec=dict(type="int", aliases=["timeout_seconds"]), + log_config=dict( + type="dict", + options=dict(enable=dict(type="bool"), sample_rate=dict(type="str")), + ), ) ) - if not module.params['scopes']: - module.params['scopes'] = ['https://www.googleapis.com/auth/compute'] + if not module.params["scopes"]: + module.params["scopes"] = ["https://www.googleapis.com/auth/compute"] - state = module.params['state'] - kind = 'compute#backendService' + state = module.params["state"] + kind = "compute#backendService" fetch = fetch_resource(module, self_link(module), kind) changed = False if fetch: - if state == 'present': + module.params["fingerprint"] = fetch["fingerprint"] + if state == "present": if is_different(module, fetch): update(module, self_link(module), kind) fetch = fetch_resource(module, self_link(module), kind) @@ -1550,57 +1593,72 @@ def main(): fetch = {} changed = True else: - if state == 'present': + if state == "present": fetch = create(module, collection(module), kind) changed = True else: fetch = {} - fetch.update({'changed': changed}) + fetch.update({"changed": changed}) module.exit_json(**fetch) def create(module, link, kind): - auth = GcpSession(module, 'compute') + auth = GcpSession(module, "compute") return wait_for_operation(module, auth.post(link, resource_to_request(module))) def update(module, link, kind): - auth = GcpSession(module, 'compute') + auth = GcpSession(module, "compute") return wait_for_operation(module, auth.put(link, resource_to_request(module))) def delete(module, link, kind): - auth = GcpSession(module, 'compute') + auth = GcpSession(module, "compute") return wait_for_operation(module, auth.delete(link)) def resource_to_request(module): request = { - u'kind': 'compute#backendService', - u'affinityCookieTtlSec': module.params.get('affinity_cookie_ttl_sec'), - u'backends': BackendServiceBackendsArray(module.params.get('backends', []), module).to_request(), - u'circuitBreakers': BackendServiceCircuitbreakers(module.params.get('circuit_breakers', {}), module).to_request(), - u'consistentHash': BackendServiceConsistenthash(module.params.get('consistent_hash', {}), module).to_request(), - u'cdnPolicy': BackendServiceCdnpolicy(module.params.get('cdn_policy', {}), module).to_request(), - u'connectionDraining': BackendServiceConnectiondraining(module.params.get('connection_draining', {}), module).to_request(), - u'customRequestHeaders': module.params.get('custom_request_headers'), - u'customResponseHeaders': module.params.get('custom_response_headers'), - u'description': module.params.get('description'), - u'enableCDN': module.params.get('enable_cdn'), - u'healthChecks': module.params.get('health_checks'), - u'iap': BackendServiceIap(module.params.get('iap', {}), module).to_request(), - u'loadBalancingScheme': module.params.get('load_balancing_scheme'), - u'localityLbPolicy': module.params.get('locality_lb_policy'), - u'name': module.params.get('name'), - u'outlierDetection': BackendServiceOutlierdetection(module.params.get('outlier_detection', {}), module).to_request(), - u'portName': module.params.get('port_name'), - u'protocol': module.params.get('protocol'), - u'securityPolicy': module.params.get('security_policy'), - u'sessionAffinity': module.params.get('session_affinity'), - u'timeoutSec': module.params.get('timeout_sec'), - u'logConfig': BackendServiceLogconfig(module.params.get('log_config', {}), module).to_request(), + "kind": "compute#backendService", + "affinityCookieTtlSec": module.params.get("affinity_cookie_ttl_sec"), + "backends": BackendServiceBackendsArray( + module.params.get("backends", []), module + ).to_request(), + "circuitBreakers": BackendServiceCircuitbreakers( + module.params.get("circuit_breakers", {}), module + ).to_request(), + "consistentHash": BackendServiceConsistenthash( + module.params.get("consistent_hash", {}), module + ).to_request(), + "cdnPolicy": BackendServiceCdnpolicy( + module.params.get("cdn_policy", {}), module + ).to_request(), + "connectionDraining": BackendServiceConnectiondraining( + module.params.get("connection_draining", {}), module + ).to_request(), + "customRequestHeaders": module.params.get("custom_request_headers"), + "customResponseHeaders": module.params.get("custom_response_headers"), + "description": module.params.get("description"), + "enableCDN": module.params.get("enable_cdn"), + "healthChecks": module.params.get("health_checks"), + "iap": BackendServiceIap(module.params.get("iap", {}), module).to_request(), + "loadBalancingScheme": module.params.get("load_balancing_scheme"), + "localityLbPolicy": module.params.get("locality_lb_policy"), + "name": module.params.get("name"), + "outlierDetection": BackendServiceOutlierdetection( + module.params.get("outlier_detection", {}), module + ).to_request(), + "portName": module.params.get("port_name"), + "protocol": module.params.get("protocol"), + "securityPolicy": module.params.get("security_policy"), + "sessionAffinity": module.params.get("session_affinity"), + "timeoutSec": module.params.get("timeout_sec"), + "logConfig": BackendServiceLogconfig( + module.params.get("log_config", {}), module + ).to_request(), + "fingerprint": module.params.get("fingerprint"), } return_vals = {} for k, v in request.items(): @@ -1611,16 +1669,20 @@ def resource_to_request(module): def fetch_resource(module, link, kind, allow_not_found=True): - auth = GcpSession(module, 'compute') + auth = GcpSession(module, "compute") return return_if_object(module, auth.get(link), kind, allow_not_found) def self_link(module): - return "https://compute.googleapis.com/compute/v1/projects/{project}/global/backendServices/{name}".format(**module.params) + return "https://compute.googleapis.com/compute/v1/projects/{project}/global/backendServices/{name}".format( + **module.params + ) def collection(module): - return "https://compute.googleapis.com/compute/v1/projects/{project}/global/backendServices".format(**module.params) + return "https://compute.googleapis.com/compute/v1/projects/{project}/global/backendServices".format( + **module.params + ) def return_if_object(module, response, kind, allow_not_found=False): @@ -1635,11 +1697,11 @@ def return_if_object(module, response, kind, allow_not_found=False): try: module.raise_for_status(response) result = response.json() - except getattr(json.decoder, 'JSONDecodeError', ValueError): + except getattr(json.decoder, "JSONDecodeError", ValueError): module.fail_json(msg="Invalid JSON response with error: %s" % response.text) - if navigate_hash(result, ['error', 'errors']): - module.fail_json(msg=navigate_hash(result, ['error', 'errors'])) + if navigate_hash(result, ["error", "errors"]): + module.fail_json(msg=navigate_hash(result, ["error", "errors"])) return result @@ -1659,6 +1721,9 @@ def is_different(module, response): if k in response: request_vals[k] = v + # req = GcpRequest(request_vals) + # res = GcpRequest(response_vals) + # import epdb; epdb.serve() return GcpRequest(request_vals) != GcpRequest(response_vals) @@ -1666,31 +1731,45 @@ def is_different(module, response): # This is for doing comparisons with Ansible's current parameters. def response_to_hash(module, response): return { - u'affinityCookieTtlSec': response.get(u'affinityCookieTtlSec'), - u'backends': BackendServiceBackendsArray(response.get(u'backends', []), module).from_response(), - u'circuitBreakers': BackendServiceCircuitbreakers(response.get(u'circuitBreakers', {}), module).from_response(), - u'consistentHash': BackendServiceConsistenthash(response.get(u'consistentHash', {}), module).from_response(), - u'cdnPolicy': BackendServiceCdnpolicy(response.get(u'cdnPolicy', {}), module).from_response(), - u'connectionDraining': BackendServiceConnectiondraining(response.get(u'connectionDraining', {}), module).from_response(), - u'creationTimestamp': response.get(u'creationTimestamp'), - u'customRequestHeaders': response.get(u'customRequestHeaders'), - u'customResponseHeaders': response.get(u'customResponseHeaders'), - u'fingerprint': response.get(u'fingerprint'), - u'description': response.get(u'description'), - u'enableCDN': response.get(u'enableCDN'), - u'healthChecks': response.get(u'healthChecks'), - u'id': response.get(u'id'), - u'iap': BackendServiceIap(response.get(u'iap', {}), module).from_response(), - u'loadBalancingScheme': module.params.get('load_balancing_scheme'), - u'localityLbPolicy': response.get(u'localityLbPolicy'), - u'name': module.params.get('name'), - u'outlierDetection': BackendServiceOutlierdetection(response.get(u'outlierDetection', {}), module).from_response(), - u'portName': response.get(u'portName'), - u'protocol': response.get(u'protocol'), - u'securityPolicy': response.get(u'securityPolicy'), - u'sessionAffinity': response.get(u'sessionAffinity'), - u'timeoutSec': response.get(u'timeoutSec'), - u'logConfig': BackendServiceLogconfig(response.get(u'logConfig', {}), module).from_response(), + "affinityCookieTtlSec": response.get("affinityCookieTtlSec"), + "backends": BackendServiceBackendsArray( + response.get("backends", []), module + ).from_response(), + "circuitBreakers": BackendServiceCircuitbreakers( + response.get("circuitBreakers", {}), module + ).from_response(), + "consistentHash": BackendServiceConsistenthash( + response.get("consistentHash", {}), module + ).from_response(), + "cdnPolicy": BackendServiceCdnpolicy( + response.get("cdnPolicy", {}), module + ).from_response(), + "connectionDraining": BackendServiceConnectiondraining( + response.get("connectionDraining", {}), module + ).from_response(), + "creationTimestamp": response.get("creationTimestamp"), + "customRequestHeaders": response.get("customRequestHeaders"), + "customResponseHeaders": response.get("customResponseHeaders"), + "fingerprint": response.get("fingerprint"), + "description": response.get("description"), + "enableCDN": response.get("enableCDN"), + "healthChecks": response.get("healthChecks"), + "id": response.get("id"), + "iap": BackendServiceIap(response.get("iap", {}), module).from_response(), + "loadBalancingScheme": module.params.get("load_balancing_scheme"), + "localityLbPolicy": response.get("localityLbPolicy"), + "name": module.params.get("name"), + "outlierDetection": BackendServiceOutlierdetection( + response.get("outlierDetection", {}), module + ).from_response(), + "portName": response.get("portName"), + "protocol": response.get("protocol"), + "securityPolicy": response.get("securityPolicy"), + "sessionAffinity": response.get("sessionAffinity"), + "timeoutSec": response.get("timeoutSec"), + "logConfig": BackendServiceLogconfig( + response.get("logConfig", {}), module + ).from_response(), } @@ -1704,22 +1783,24 @@ def async_op_url(module, extra_data=None): def wait_for_operation(module, response): - op_result = return_if_object(module, response, 'compute#operation') + op_result = return_if_object(module, response, "compute#operation") if op_result is None: return {} - status = navigate_hash(op_result, ['status']) + status = navigate_hash(op_result, ["status"]) wait_done = wait_for_completion(status, op_result, module) - return fetch_resource(module, navigate_hash(wait_done, ['targetLink']), 'compute#backendService') + return fetch_resource( + module, navigate_hash(wait_done, ["targetLink"]), "compute#backendService" + ) def wait_for_completion(status, op_result, module): - op_id = navigate_hash(op_result, ['name']) - op_uri = async_op_url(module, {'op_id': op_id}) - while status != 'DONE': - raise_if_errors(op_result, ['error', 'errors'], module) + op_id = navigate_hash(op_result, ["name"]) + op_uri = async_op_url(module, {"op_id": op_id}) + while status != "DONE": + raise_if_errors(op_result, ["error", "errors"], module) time.sleep(1.0) - op_result = fetch_resource(module, op_uri, 'compute#operation', False) - status = navigate_hash(op_result, ['status']) + op_result = fetch_resource(module, op_uri, "compute#operation", False) + status = navigate_hash(op_result, ["status"]) return op_result @@ -1752,34 +1833,34 @@ class BackendServiceBackendsArray(object): def _request_for_item(self, item): return remove_nones_from_dict( { - u'balancingMode': item.get('balancing_mode'), - u'capacityScaler': item.get('capacity_scaler'), - u'description': item.get('description'), - u'group': item.get('group'), - u'maxConnections': item.get('max_connections'), - u'maxConnectionsPerInstance': item.get('max_connections_per_instance'), - u'maxConnectionsPerEndpoint': item.get('max_connections_per_endpoint'), - u'maxRate': item.get('max_rate'), - u'maxRatePerInstance': item.get('max_rate_per_instance'), - u'maxRatePerEndpoint': item.get('max_rate_per_endpoint'), - u'maxUtilization': item.get('max_utilization'), + "balancingMode": item.get("balancing_mode"), + "capacityScaler": item.get("capacity_scaler"), + "description": item.get("description"), + "group": item.get("group"), + "maxConnections": item.get("max_connections"), + "maxConnectionsPerInstance": item.get("max_connections_per_instance"), + "maxConnectionsPerEndpoint": item.get("max_connections_per_endpoint"), + "maxRate": item.get("max_rate"), + "maxRatePerInstance": item.get("max_rate_per_instance"), + "maxRatePerEndpoint": item.get("max_rate_per_endpoint"), + "maxUtilization": item.get("max_utilization"), } ) def _response_from_item(self, item): return remove_nones_from_dict( { - u'balancingMode': item.get(u'balancingMode'), - u'capacityScaler': item.get(u'capacityScaler'), - u'description': item.get(u'description'), - u'group': item.get(u'group'), - u'maxConnections': item.get(u'maxConnections'), - u'maxConnectionsPerInstance': item.get(u'maxConnectionsPerInstance'), - u'maxConnectionsPerEndpoint': item.get(u'maxConnectionsPerEndpoint'), - u'maxRate': item.get(u'maxRate'), - u'maxRatePerInstance': item.get(u'maxRatePerInstance'), - u'maxRatePerEndpoint': item.get(u'maxRatePerEndpoint'), - u'maxUtilization': item.get(u'maxUtilization'), + "balancingMode": item.get("balancingMode"), + "capacityScaler": item.get("capacityScaler"), + "description": item.get("description"), + "group": item.get("group"), + "maxConnections": item.get("maxConnections"), + "maxConnectionsPerInstance": item.get("maxConnectionsPerInstance"), + "maxConnectionsPerEndpoint": item.get("maxConnectionsPerEndpoint"), + "maxRate": item.get("maxRate"), + "maxRatePerInstance": item.get("maxRatePerInstance"), + "maxRatePerEndpoint": item.get("maxRatePerEndpoint"), + "maxUtilization": item.get("maxUtilization"), } ) @@ -1795,22 +1876,26 @@ class BackendServiceCircuitbreakers(object): def to_request(self): return remove_nones_from_dict( { - u'maxRequestsPerConnection': self.request.get('max_requests_per_connection'), - u'maxConnections': self.request.get('max_connections'), - u'maxPendingRequests': self.request.get('max_pending_requests'), - u'maxRequests': self.request.get('max_requests'), - u'maxRetries': self.request.get('max_retries'), + "maxRequestsPerConnection": self.request.get( + "max_requests_per_connection" + ), + "maxConnections": self.request.get("max_connections"), + "maxPendingRequests": self.request.get("max_pending_requests"), + "maxRequests": self.request.get("max_requests"), + "maxRetries": self.request.get("max_retries"), } ) def from_response(self): return remove_nones_from_dict( { - u'maxRequestsPerConnection': self.request.get(u'maxRequestsPerConnection'), - u'maxConnections': self.request.get(u'maxConnections'), - u'maxPendingRequests': self.request.get(u'maxPendingRequests'), - u'maxRequests': self.request.get(u'maxRequests'), - u'maxRetries': self.request.get(u'maxRetries'), + "maxRequestsPerConnection": self.request.get( + "maxRequestsPerConnection" + ), + "maxConnections": self.request.get("maxConnections"), + "maxPendingRequests": self.request.get("maxPendingRequests"), + "maxRequests": self.request.get("maxRequests"), + "maxRetries": self.request.get("maxRetries"), } ) @@ -1826,18 +1911,22 @@ class BackendServiceConsistenthash(object): def to_request(self): return remove_nones_from_dict( { - u'httpCookie': BackendServiceHttpcookie(self.request.get('http_cookie', {}), self.module).to_request(), - u'httpHeaderName': self.request.get('http_header_name'), - u'minimumRingSize': self.request.get('minimum_ring_size'), + "httpCookie": BackendServiceHttpcookie( + self.request.get("http_cookie", {}), self.module + ).to_request(), + "httpHeaderName": self.request.get("http_header_name"), + "minimumRingSize": self.request.get("minimum_ring_size"), } ) def from_response(self): return remove_nones_from_dict( { - u'httpCookie': BackendServiceHttpcookie(self.request.get(u'httpCookie', {}), self.module).from_response(), - u'httpHeaderName': self.request.get(u'httpHeaderName'), - u'minimumRingSize': self.request.get(u'minimumRingSize'), + "httpCookie": BackendServiceHttpcookie( + self.request.get("httpCookie", {}), self.module + ).from_response(), + "httpHeaderName": self.request.get("httpHeaderName"), + "minimumRingSize": self.request.get("minimumRingSize"), } ) @@ -1853,18 +1942,22 @@ class BackendServiceHttpcookie(object): def to_request(self): return remove_nones_from_dict( { - u'ttl': BackendServiceTtl(self.request.get('ttl', {}), self.module).to_request(), - u'name': self.request.get('name'), - u'path': self.request.get('path'), + "ttl": BackendServiceTtl( + self.request.get("ttl", {}), self.module + ).to_request(), + "name": self.request.get("name"), + "path": self.request.get("path"), } ) def from_response(self): return remove_nones_from_dict( { - u'ttl': BackendServiceTtl(self.request.get(u'ttl', {}), self.module).from_response(), - u'name': self.request.get(u'name'), - u'path': self.request.get(u'path'), + "ttl": BackendServiceTtl( + self.request.get("ttl", {}), self.module + ).from_response(), + "name": self.request.get("name"), + "path": self.request.get("path"), } ) @@ -1878,10 +1971,14 @@ class BackendServiceTtl(object): self.request = {} def to_request(self): - return remove_nones_from_dict({u'seconds': self.request.get('seconds'), u'nanos': self.request.get('nanos')}) + return remove_nones_from_dict( + {"seconds": self.request.get("seconds"), "nanos": self.request.get("nanos")} + ) def from_response(self): - return remove_nones_from_dict({u'seconds': self.request.get(u'seconds'), u'nanos': self.request.get(u'nanos')}) + return remove_nones_from_dict( + {"seconds": self.request.get("seconds"), "nanos": self.request.get("nanos")} + ) class BackendServiceCdnpolicy(object): @@ -1895,30 +1992,40 @@ class BackendServiceCdnpolicy(object): def to_request(self): return remove_nones_from_dict( { - u'cacheKeyPolicy': BackendServiceCachekeypolicy(self.request.get('cache_key_policy', {}), self.module).to_request(), - u'signedUrlCacheMaxAgeSec': self.request.get('signed_url_cache_max_age_sec'), - u'defaultTtl': self.request.get('default_ttl'), - u'maxTtl': self.request.get('max_ttl'), - u'clientTtl': self.request.get('client_ttl'), - u'negativeCaching': self.request.get('negative_caching'), - u'negativeCachingPolicy': BackendServiceNegativecachingpolicyArray(self.request.get('negative_caching_policy', []), self.module).to_request(), - u'cacheMode': self.request.get('cache_mode'), - u'serveWhileStale': self.request.get('serve_while_stale'), + "cacheKeyPolicy": BackendServiceCachekeypolicy( + self.request.get("cache_key_policy", {}), self.module + ).to_request(), + "signedUrlCacheMaxAgeSec": self.request.get( + "signed_url_cache_max_age_sec" + ), + "defaultTtl": self.request.get("default_ttl"), + "maxTtl": self.request.get("max_ttl"), + "clientTtl": self.request.get("client_ttl"), + "negativeCaching": self.request.get("negative_caching"), + "negativeCachingPolicy": BackendServiceNegativecachingpolicyArray( + self.request.get("negative_caching_policy", []), self.module + ).to_request(), + "cacheMode": self.request.get("cache_mode"), + "serveWhileStale": self.request.get("serve_while_stale"), } ) def from_response(self): return remove_nones_from_dict( { - u'cacheKeyPolicy': BackendServiceCachekeypolicy(self.request.get(u'cacheKeyPolicy', {}), self.module).from_response(), - u'signedUrlCacheMaxAgeSec': self.request.get(u'signedUrlCacheMaxAgeSec'), - u'defaultTtl': self.request.get(u'defaultTtl'), - u'maxTtl': self.request.get(u'maxTtl'), - u'clientTtl': self.request.get(u'clientTtl'), - u'negativeCaching': self.request.get(u'negativeCaching'), - u'negativeCachingPolicy': BackendServiceNegativecachingpolicyArray(self.request.get(u'negativeCachingPolicy', []), self.module).from_response(), - u'cacheMode': self.request.get(u'cacheMode'), - u'serveWhileStale': self.request.get(u'serveWhileStale'), + "cacheKeyPolicy": BackendServiceCachekeypolicy( + self.request.get("cacheKeyPolicy", {}), self.module + ).from_response(), + "signedUrlCacheMaxAgeSec": self.request.get("signedUrlCacheMaxAgeSec"), + "defaultTtl": self.request.get("defaultTtl"), + "maxTtl": self.request.get("maxTtl"), + "clientTtl": self.request.get("clientTtl"), + "negativeCaching": self.request.get("negativeCaching"), + "negativeCachingPolicy": BackendServiceNegativecachingpolicyArray( + self.request.get("negativeCachingPolicy", []), self.module + ).from_response(), + "cacheMode": self.request.get("cacheMode"), + "serveWhileStale": self.request.get("serveWhileStale"), } ) @@ -1934,22 +2041,22 @@ class BackendServiceCachekeypolicy(object): def to_request(self): return remove_nones_from_dict( { - u'includeHost': self.request.get('include_host'), - u'includeProtocol': self.request.get('include_protocol'), - u'includeQueryString': self.request.get('include_query_string'), - u'queryStringBlacklist': self.request.get('query_string_blacklist'), - u'queryStringWhitelist': self.request.get('query_string_whitelist'), + "includeHost": self.request.get("include_host"), + "includeProtocol": self.request.get("include_protocol"), + "includeQueryString": self.request.get("include_query_string"), + "queryStringBlacklist": self.request.get("query_string_blacklist"), + "queryStringWhitelist": self.request.get("query_string_whitelist"), } ) def from_response(self): return remove_nones_from_dict( { - u'includeHost': self.request.get(u'includeHost'), - u'includeProtocol': self.request.get(u'includeProtocol'), - u'includeQueryString': self.request.get(u'includeQueryString'), - u'queryStringBlacklist': self.request.get(u'queryStringBlacklist'), - u'queryStringWhitelist': self.request.get(u'queryStringWhitelist'), + "includeHost": self.request.get("includeHost"), + "includeProtocol": self.request.get("includeProtocol"), + "includeQueryString": self.request.get("includeQueryString"), + "queryStringBlacklist": self.request.get("queryStringBlacklist"), + "queryStringWhitelist": self.request.get("queryStringWhitelist"), } ) @@ -1975,10 +2082,14 @@ class BackendServiceNegativecachingpolicyArray(object): return items def _request_for_item(self, item): - return remove_nones_from_dict({u'code': item.get('code'), u'ttl': item.get('ttl')}) + return remove_nones_from_dict( + {"code": item.get("code"), "ttl": item.get("ttl")} + ) def _response_from_item(self, item): - return remove_nones_from_dict({u'code': item.get(u'code'), u'ttl': item.get(u'ttl')}) + return remove_nones_from_dict( + {"code": item.get("code"), "ttl": item.get("ttl")} + ) class BackendServiceConnectiondraining(object): @@ -1990,10 +2101,14 @@ class BackendServiceConnectiondraining(object): self.request = {} def to_request(self): - return remove_nones_from_dict({u'drainingTimeoutSec': self.request.get('draining_timeout_sec')}) + return remove_nones_from_dict( + {"drainingTimeoutSec": self.request.get("draining_timeout_sec")} + ) def from_response(self): - return remove_nones_from_dict({u'drainingTimeoutSec': self.request.get(u'drainingTimeoutSec')}) + return remove_nones_from_dict( + {"drainingTimeoutSec": self.request.get("drainingTimeoutSec")} + ) class BackendServiceIap(object): @@ -2007,18 +2122,18 @@ class BackendServiceIap(object): def to_request(self): return remove_nones_from_dict( { - u'enabled': self.request.get('enabled'), - u'oauth2ClientId': self.request.get('oauth2_client_id'), - u'oauth2ClientSecret': self.request.get('oauth2_client_secret'), + "enabled": self.request.get("enabled"), + "oauth2ClientId": self.request.get("oauth2_client_id"), + "oauth2ClientSecret": self.request.get("oauth2_client_secret"), } ) def from_response(self): return remove_nones_from_dict( { - u'enabled': self.request.get(u'enabled'), - u'oauth2ClientId': self.request.get(u'oauth2ClientId'), - u'oauth2ClientSecret': self.request.get(u'oauth2ClientSecret'), + "enabled": self.request.get("enabled"), + "oauth2ClientId": self.request.get("oauth2ClientId"), + "oauth2ClientSecret": self.request.get("oauth2ClientSecret"), } ) @@ -2034,34 +2149,60 @@ class BackendServiceOutlierdetection(object): def to_request(self): return remove_nones_from_dict( { - u'baseEjectionTime': BackendServiceBaseejectiontime(self.request.get('base_ejection_time', {}), self.module).to_request(), - u'consecutiveErrors': self.request.get('consecutive_errors'), - u'consecutiveGatewayFailure': self.request.get('consecutive_gateway_failure'), - u'enforcingConsecutiveErrors': self.request.get('enforcing_consecutive_errors'), - u'enforcingConsecutiveGatewayFailure': self.request.get('enforcing_consecutive_gateway_failure'), - u'enforcingSuccessRate': self.request.get('enforcing_success_rate'), - u'interval': BackendServiceInterval(self.request.get('interval', {}), self.module).to_request(), - u'maxEjectionPercent': self.request.get('max_ejection_percent'), - u'successRateMinimumHosts': self.request.get('success_rate_minimum_hosts'), - u'successRateRequestVolume': self.request.get('success_rate_request_volume'), - u'successRateStdevFactor': self.request.get('success_rate_stdev_factor'), + "baseEjectionTime": BackendServiceBaseejectiontime( + self.request.get("base_ejection_time", {}), self.module + ).to_request(), + "consecutiveErrors": self.request.get("consecutive_errors"), + "consecutiveGatewayFailure": self.request.get( + "consecutive_gateway_failure" + ), + "enforcingConsecutiveErrors": self.request.get( + "enforcing_consecutive_errors" + ), + "enforcingConsecutiveGatewayFailure": self.request.get( + "enforcing_consecutive_gateway_failure" + ), + "enforcingSuccessRate": self.request.get("enforcing_success_rate"), + "interval": BackendServiceInterval( + self.request.get("interval", {}), self.module + ).to_request(), + "maxEjectionPercent": self.request.get("max_ejection_percent"), + "successRateMinimumHosts": self.request.get( + "success_rate_minimum_hosts" + ), + "successRateRequestVolume": self.request.get( + "success_rate_request_volume" + ), + "successRateStdevFactor": self.request.get("success_rate_stdev_factor"), } ) def from_response(self): return remove_nones_from_dict( { - u'baseEjectionTime': BackendServiceBaseejectiontime(self.request.get(u'baseEjectionTime', {}), self.module).from_response(), - u'consecutiveErrors': self.request.get(u'consecutiveErrors'), - u'consecutiveGatewayFailure': self.request.get(u'consecutiveGatewayFailure'), - u'enforcingConsecutiveErrors': self.request.get(u'enforcingConsecutiveErrors'), - u'enforcingConsecutiveGatewayFailure': self.request.get(u'enforcingConsecutiveGatewayFailure'), - u'enforcingSuccessRate': self.request.get(u'enforcingSuccessRate'), - u'interval': BackendServiceInterval(self.request.get(u'interval', {}), self.module).from_response(), - u'maxEjectionPercent': self.request.get(u'maxEjectionPercent'), - u'successRateMinimumHosts': self.request.get(u'successRateMinimumHosts'), - u'successRateRequestVolume': self.request.get(u'successRateRequestVolume'), - u'successRateStdevFactor': self.request.get(u'successRateStdevFactor'), + "baseEjectionTime": BackendServiceBaseejectiontime( + self.request.get("baseEjectionTime", {}), self.module + ).from_response(), + "consecutiveErrors": self.request.get("consecutiveErrors"), + "consecutiveGatewayFailure": self.request.get( + "consecutiveGatewayFailure" + ), + "enforcingConsecutiveErrors": self.request.get( + "enforcingConsecutiveErrors" + ), + "enforcingConsecutiveGatewayFailure": self.request.get( + "enforcingConsecutiveGatewayFailure" + ), + "enforcingSuccessRate": self.request.get("enforcingSuccessRate"), + "interval": BackendServiceInterval( + self.request.get("interval", {}), self.module + ).from_response(), + "maxEjectionPercent": self.request.get("maxEjectionPercent"), + "successRateMinimumHosts": self.request.get("successRateMinimumHosts"), + "successRateRequestVolume": self.request.get( + "successRateRequestVolume" + ), + "successRateStdevFactor": self.request.get("successRateStdevFactor"), } ) @@ -2075,10 +2216,14 @@ class BackendServiceBaseejectiontime(object): self.request = {} def to_request(self): - return remove_nones_from_dict({u'seconds': self.request.get('seconds'), u'nanos': self.request.get('nanos')}) + return remove_nones_from_dict( + {"seconds": self.request.get("seconds"), "nanos": self.request.get("nanos")} + ) def from_response(self): - return remove_nones_from_dict({u'seconds': self.request.get(u'seconds'), u'nanos': self.request.get(u'nanos')}) + return remove_nones_from_dict( + {"seconds": self.request.get("seconds"), "nanos": self.request.get("nanos")} + ) class BackendServiceInterval(object): @@ -2090,10 +2235,14 @@ class BackendServiceInterval(object): self.request = {} def to_request(self): - return remove_nones_from_dict({u'seconds': self.request.get('seconds'), u'nanos': self.request.get('nanos')}) + return remove_nones_from_dict( + {"seconds": self.request.get("seconds"), "nanos": self.request.get("nanos")} + ) def from_response(self): - return remove_nones_from_dict({u'seconds': self.request.get(u'seconds'), u'nanos': self.request.get(u'nanos')}) + return remove_nones_from_dict( + {"seconds": self.request.get("seconds"), "nanos": self.request.get("nanos")} + ) class BackendServiceLogconfig(object): @@ -2105,11 +2254,21 @@ class BackendServiceLogconfig(object): self.request = {} def to_request(self): - return remove_nones_from_dict({u'enable': self.request.get('enable'), u'sampleRate': self.request.get('sample_rate')}) + return remove_nones_from_dict( + { + "enable": self.request.get("enable"), + "sampleRate": self.request.get("sample_rate"), + } + ) def from_response(self): - return remove_nones_from_dict({u'enable': self.request.get(u'enable'), u'sampleRate': self.request.get(u'sampleRate')}) + return remove_nones_from_dict( + { + "enable": self.request.get("enable"), + "sampleRate": self.request.get("sampleRate"), + } + ) -if __name__ == '__main__': +if __name__ == "__main__": main() diff --git a/plugins/modules/gcp_compute_backend_service_info.py b/plugins/modules/gcp_compute_backend_service_info.py index 415b28f..5e71577 100644 --- a/plugins/modules/gcp_compute_backend_service_info.py +++ b/plugins/modules/gcp_compute_backend_service_info.py @@ -59,6 +59,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -73,6 +74,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -91,6 +96,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -746,7 +753,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/plugins/modules/gcp_compute_disk.py b/plugins/modules/gcp_compute_disk.py index 0dd36e2..8409cac 100644 --- a/plugins/modules/gcp_compute_disk.py +++ b/plugins/modules/gcp_compute_disk.py @@ -238,6 +238,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -252,6 +253,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -272,6 +277,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. diff --git a/plugins/modules/gcp_compute_disk_info.py b/plugins/modules/gcp_compute_disk_info.py index 1abc5c4..8e36468 100644 --- a/plugins/modules/gcp_compute_disk_info.py +++ b/plugins/modules/gcp_compute_disk_info.py @@ -64,6 +64,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -78,6 +79,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -96,6 +101,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -359,7 +366,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/plugins/modules/gcp_compute_external_vpn_gateway.py b/plugins/modules/gcp_compute_external_vpn_gateway.py index 4847150..e2d96b1 100644 --- a/plugins/modules/gcp_compute_external_vpn_gateway.py +++ b/plugins/modules/gcp_compute_external_vpn_gateway.py @@ -104,6 +104,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -118,6 +119,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -137,6 +142,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -212,7 +219,6 @@ from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import ( GcpModule, GcpRequest, remove_nones_from_dict, - replace_resource_dict, ) import json import time diff --git a/plugins/modules/gcp_compute_external_vpn_gateway_info.py b/plugins/modules/gcp_compute_external_vpn_gateway_info.py index cb47726..6e2e0d0 100644 --- a/plugins/modules/gcp_compute_external_vpn_gateway_info.py +++ b/plugins/modules/gcp_compute_external_vpn_gateway_info.py @@ -59,6 +59,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -73,6 +74,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -91,6 +96,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -159,7 +166,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/plugins/modules/gcp_compute_firewall.py b/plugins/modules/gcp_compute_firewall.py index 08f0444..cee64bc 100644 --- a/plugins/modules/gcp_compute_firewall.py +++ b/plugins/modules/gcp_compute_firewall.py @@ -263,6 +263,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -277,6 +278,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -297,6 +302,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. diff --git a/plugins/modules/gcp_compute_firewall_info.py b/plugins/modules/gcp_compute_firewall_info.py index 6b90c57..dfc105e 100644 --- a/plugins/modules/gcp_compute_firewall_info.py +++ b/plugins/modules/gcp_compute_firewall_info.py @@ -59,6 +59,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -73,6 +74,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -91,6 +96,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -306,7 +313,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/plugins/modules/gcp_compute_forwarding_rule.py b/plugins/modules/gcp_compute_forwarding_rule.py index f1c13cc..8141605 100644 --- a/plugins/modules/gcp_compute_forwarding_rule.py +++ b/plugins/modules/gcp_compute_forwarding_rule.py @@ -237,6 +237,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -251,6 +252,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -271,6 +276,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. diff --git a/plugins/modules/gcp_compute_forwarding_rule_info.py b/plugins/modules/gcp_compute_forwarding_rule_info.py index f13135d..87dcb89 100644 --- a/plugins/modules/gcp_compute_forwarding_rule_info.py +++ b/plugins/modules/gcp_compute_forwarding_rule_info.py @@ -65,6 +65,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -79,6 +80,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -97,6 +102,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -298,7 +305,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/plugins/modules/gcp_compute_global_address.py b/plugins/modules/gcp_compute_global_address.py index d1f02bd..2281535 100644 --- a/plugins/modules/gcp_compute_global_address.py +++ b/plugins/modules/gcp_compute_global_address.py @@ -124,6 +124,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -138,6 +139,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -158,6 +163,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. diff --git a/plugins/modules/gcp_compute_global_address_info.py b/plugins/modules/gcp_compute_global_address_info.py index a6cc0b8..34aa175 100644 --- a/plugins/modules/gcp_compute_global_address_info.py +++ b/plugins/modules/gcp_compute_global_address_info.py @@ -59,6 +59,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -73,6 +74,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -91,6 +96,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -189,7 +196,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/plugins/modules/gcp_compute_global_forwarding_rule.py b/plugins/modules/gcp_compute_global_forwarding_rule.py index a9bb647..158caab 100644 --- a/plugins/modules/gcp_compute_global_forwarding_rule.py +++ b/plugins/modules/gcp_compute_global_forwarding_rule.py @@ -217,6 +217,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -231,6 +232,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used diff --git a/plugins/modules/gcp_compute_global_forwarding_rule_info.py b/plugins/modules/gcp_compute_global_forwarding_rule_info.py index 292489c..735d622 100644 --- a/plugins/modules/gcp_compute_global_forwarding_rule_info.py +++ b/plugins/modules/gcp_compute_global_forwarding_rule_info.py @@ -59,6 +59,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -73,6 +74,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -91,6 +96,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -273,7 +280,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/plugins/modules/gcp_compute_health_check.py b/plugins/modules/gcp_compute_health_check.py index e48b07c..ca4c642 100644 --- a/plugins/modules/gcp_compute_health_check.py +++ b/plugins/modules/gcp_compute_health_check.py @@ -472,6 +472,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -486,6 +487,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -506,6 +511,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -916,7 +923,6 @@ from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import ( GcpModule, GcpRequest, remove_nones_from_dict, - replace_resource_dict, ) import json import time diff --git a/plugins/modules/gcp_compute_health_check_info.py b/plugins/modules/gcp_compute_health_check_info.py index 3f323c7..b6876f2 100644 --- a/plugins/modules/gcp_compute_health_check_info.py +++ b/plugins/modules/gcp_compute_health_check_info.py @@ -59,6 +59,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -73,6 +74,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -91,6 +96,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -511,7 +518,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/plugins/modules/gcp_compute_http_health_check.py b/plugins/modules/gcp_compute_http_health_check.py index c5da843..ee1bae3 100644 --- a/plugins/modules/gcp_compute_http_health_check.py +++ b/plugins/modules/gcp_compute_http_health_check.py @@ -125,6 +125,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -139,6 +140,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -159,6 +164,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -255,7 +262,7 @@ unhealthyThreshold: # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest, replace_resource_dict +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest import json import time diff --git a/plugins/modules/gcp_compute_http_health_check_info.py b/plugins/modules/gcp_compute_http_health_check_info.py index 2c77d12..547fdc9 100644 --- a/plugins/modules/gcp_compute_http_health_check_info.py +++ b/plugins/modules/gcp_compute_http_health_check_info.py @@ -59,6 +59,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -73,6 +74,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -91,6 +96,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -188,7 +195,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/plugins/modules/gcp_compute_https_health_check.py b/plugins/modules/gcp_compute_https_health_check.py index 8a60ce1..cd38bb1 100644 --- a/plugins/modules/gcp_compute_https_health_check.py +++ b/plugins/modules/gcp_compute_https_health_check.py @@ -122,6 +122,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -136,6 +137,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -156,6 +161,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -252,7 +259,7 @@ unhealthyThreshold: # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest, replace_resource_dict +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest import json import time diff --git a/plugins/modules/gcp_compute_https_health_check_info.py b/plugins/modules/gcp_compute_https_health_check_info.py index 0ff6514..58af6d4 100644 --- a/plugins/modules/gcp_compute_https_health_check_info.py +++ b/plugins/modules/gcp_compute_https_health_check_info.py @@ -59,6 +59,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -73,6 +74,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -91,6 +96,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -188,7 +195,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/plugins/modules/gcp_compute_image.py b/plugins/modules/gcp_compute_image.py index c708056..66d897a 100644 --- a/plugins/modules/gcp_compute_image.py +++ b/plugins/modules/gcp_compute_image.py @@ -229,6 +229,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -243,6 +244,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -263,6 +268,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. diff --git a/plugins/modules/gcp_compute_image_info.py b/plugins/modules/gcp_compute_image_info.py index afd3962..2f1acd1 100644 --- a/plugins/modules/gcp_compute_image_info.py +++ b/plugins/modules/gcp_compute_image_info.py @@ -59,6 +59,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -73,6 +74,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -91,6 +96,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -335,7 +342,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/plugins/modules/gcp_compute_instance.py b/plugins/modules/gcp_compute_instance.py index b62286d..1d7f56e 100644 --- a/plugins/modules/gcp_compute_instance.py +++ b/plugins/modules/gcp_compute_instance.py @@ -522,6 +522,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -536,6 +537,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -827,7 +832,8 @@ metadata: type: dict machineType: description: - - A reference to a machine type which defines VM kind. + - A reference to a machine type which defines VM kind. See https://cloud.google.com/compute/docs/machine-types + for a list of current valid machine types. returned: success type: str minCpuPlatform: @@ -1378,9 +1384,9 @@ def disk_type_selflink(name, params): def machine_type_selflink(name, params): if name is None: return - url = r"https://compute.googleapis.com/compute/v1/projects/.*/zones/.*/machineTypes/.*" + url = r"https://www.googleapis.com/compute/v1/projects/.*/zones/.*/machineTypes/.*" if not re.match(url, name): - name = "https://compute.googleapis.com/compute/v1/projects/{project}/zones/{zone}/machineTypes/%s".format(**params) % name + name = "https://www.googleapis.com/compute/v1/projects/{project}/zones/{zone}/machineTypes/%s".format(**params) % name return name diff --git a/plugins/modules/gcp_compute_instance_group.py b/plugins/modules/gcp_compute_instance_group.py index 419e788..8f65b4b 100644 --- a/plugins/modules/gcp_compute_instance_group.py +++ b/plugins/modules/gcp_compute_instance_group.py @@ -138,6 +138,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -152,6 +153,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used diff --git a/plugins/modules/gcp_compute_instance_group_info.py b/plugins/modules/gcp_compute_instance_group_info.py index 6a3ec0c..a8d3045 100644 --- a/plugins/modules/gcp_compute_instance_group_info.py +++ b/plugins/modules/gcp_compute_instance_group_info.py @@ -64,6 +64,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -78,6 +79,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -96,6 +101,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -197,7 +204,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/plugins/modules/gcp_compute_instance_group_manager.py b/plugins/modules/gcp_compute_instance_group_manager.py index 6b6c05f..776503d 100644 --- a/plugins/modules/gcp_compute_instance_group_manager.py +++ b/plugins/modules/gcp_compute_instance_group_manager.py @@ -136,6 +136,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -150,6 +151,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used diff --git a/plugins/modules/gcp_compute_instance_group_manager_info.py b/plugins/modules/gcp_compute_instance_group_manager_info.py index 47ec986..16a6e57 100644 --- a/plugins/modules/gcp_compute_instance_group_manager_info.py +++ b/plugins/modules/gcp_compute_instance_group_manager_info.py @@ -64,6 +64,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -78,6 +79,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -96,6 +101,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -272,7 +279,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/plugins/modules/gcp_compute_instance_info.py b/plugins/modules/gcp_compute_instance_info.py index 5b402fc..e12b957 100644 --- a/plugins/modules/gcp_compute_instance_info.py +++ b/plugins/modules/gcp_compute_instance_info.py @@ -25,9 +25,13 @@ __metaclass__ = type # Documentation ################################################################################ -ANSIBLE_METADATA = {'metadata_version': '1.1', 'status': ["preview"], 'supported_by': 'community'} +ANSIBLE_METADATA = { + "metadata_version": "1.1", + "status": ["preview"], + "supported_by": "community", +} -DOCUMENTATION = ''' +DOCUMENTATION = """ --- module: gcp_compute_instance_info description: @@ -41,7 +45,7 @@ requirements: options: filters: description: - - A list of filter value pairs. Available filters are listed here U(https://cloud.google.com/sdk/gcloud/reference/topic/filters). + - A list of filter value pairs. Available filters are listed here U(https://cloud.google.com/compute/docs/reference/rest/v1/instances/list) - Each additional filter in the list will act be added as an AND condition (filter1 and filter2) . type: list @@ -64,6 +68,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -78,6 +83,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -96,13 +105,15 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. - The I(service_account_email) and I(service_account_file) options are mutually exclusive. -''' +""" -EXAMPLES = ''' +EXAMPLES = """ - name: get info on an instance gcp_compute_instance_info: zone: us-central1-a @@ -111,9 +122,9 @@ EXAMPLES = ''' project: test_project auth_kind: serviceaccount service_account_file: "/tmp/auth.pem" -''' +""" -RETURN = ''' +RETURN = """ resources: description: List of resources returned: always @@ -588,12 +599,16 @@ resources: - A reference to the zone where the machine resides. returned: success type: str -''' +""" ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import ( + navigate_hash, + GcpSession, + GcpModule, +) import json ################################################################################ @@ -602,27 +617,40 @@ import json def main(): - module = GcpModule(argument_spec=dict(filters=dict(type='list', elements='str'), zone=dict(required=True, type='str'))) + module = GcpModule( + argument_spec=dict( + filters=dict(type="list", elements="str"), + zone=dict(required=True, type="str"), + ) + ) - if not module.params['scopes']: - module.params['scopes'] = ['https://www.googleapis.com/auth/compute'] + if not module.params["scopes"]: + module.params["scopes"] = ["https://www.googleapis.com/auth/compute"] - return_value = {'resources': fetch_list(module, collection(module), query_options(module.params['filters']))} + return_value = { + "resources": fetch_list( + module, collection(module), query_options(module.params["filters"]) + ) + } module.exit_json(**return_value) def collection(module): - return "https://compute.googleapis.com/compute/v1/projects/{project}/zones/{zone}/instances".format(**module.params) + return "https://compute.googleapis.com/compute/v1/projects/{project}/zones/{zone}/instances".format( + **module.params + ) def fetch_list(module, link, query): - auth = GcpSession(module, 'compute') - return auth.list(link, return_if_object, array_name='items', params={'filter': query}) + auth = GcpSession(module, "compute") + return auth.list( + link, return_if_object, array_name="items", params={"filter": query} + ) def query_options(filters): if not filters: - return '' + return "" if len(filters) == 1: return filters[0] @@ -630,12 +658,12 @@ def query_options(filters): queries = [] for f in filters: # For multiple queries, all queries should have () - if f[0] != '(' and f[-1] != ')': - queries.append("(%s)" % ''.join(f)) + if f[0] != "(" and f[-1] != ")": + queries.append("(%s)" % "".join(f)) else: queries.append(f) - return ' '.join(queries) + return " ".join(queries) def return_if_object(module, response): @@ -650,11 +678,11 @@ def return_if_object(module, response): try: module.raise_for_status(response) result = response.json() - except getattr(json.decoder, 'JSONDecodeError', ValueError) as inst: + except getattr(json.decoder, "JSONDecodeError", ValueError) as inst: module.fail_json(msg="Invalid JSON response with error: %s" % inst) - if navigate_hash(result, ['error', 'errors']): - module.fail_json(msg=navigate_hash(result, ['error', 'errors'])) + if navigate_hash(result, ["error", "errors"]): + module.fail_json(msg=navigate_hash(result, ["error", "errors"])) return result diff --git a/plugins/modules/gcp_compute_instance_template.py b/plugins/modules/gcp_compute_instance_template.py index 0785692..ce4a8eb 100644 --- a/plugins/modules/gcp_compute_instance_template.py +++ b/plugins/modules/gcp_compute_instance_template.py @@ -485,6 +485,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -499,6 +500,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used diff --git a/plugins/modules/gcp_compute_instance_template_info.py b/plugins/modules/gcp_compute_instance_template_info.py index b08cdfa..2d337cf 100644 --- a/plugins/modules/gcp_compute_instance_template_info.py +++ b/plugins/modules/gcp_compute_instance_template_info.py @@ -59,6 +59,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -73,6 +74,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -91,6 +96,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -544,7 +551,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/plugins/modules/gcp_compute_interconnect_attachment.py b/plugins/modules/gcp_compute_interconnect_attachment.py index 7a2c803..5deac09 100644 --- a/plugins/modules/gcp_compute_interconnect_attachment.py +++ b/plugins/modules/gcp_compute_interconnect_attachment.py @@ -194,6 +194,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -208,6 +209,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used diff --git a/plugins/modules/gcp_compute_interconnect_attachment_info.py b/plugins/modules/gcp_compute_interconnect_attachment_info.py index 933bdec..20b90be 100644 --- a/plugins/modules/gcp_compute_interconnect_attachment_info.py +++ b/plugins/modules/gcp_compute_interconnect_attachment_info.py @@ -64,6 +64,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -78,6 +79,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -96,6 +101,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -304,7 +311,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/plugins/modules/gcp_compute_network.py b/plugins/modules/gcp_compute_network.py index acaf59d..e093195 100644 --- a/plugins/modules/gcp_compute_network.py +++ b/plugins/modules/gcp_compute_network.py @@ -108,6 +108,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -122,6 +123,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -142,6 +147,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -239,7 +246,6 @@ from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import ( GcpModule, GcpRequest, remove_nones_from_dict, - replace_resource_dict, ) import json import time diff --git a/plugins/modules/gcp_compute_network_endpoint_group.py b/plugins/modules/gcp_compute_network_endpoint_group.py index 9712c42..d6350de 100644 --- a/plugins/modules/gcp_compute_network_endpoint_group.py +++ b/plugins/modules/gcp_compute_network_endpoint_group.py @@ -124,6 +124,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -138,6 +139,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -158,6 +163,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. diff --git a/plugins/modules/gcp_compute_network_endpoint_group_info.py b/plugins/modules/gcp_compute_network_endpoint_group_info.py index 8f9d1a8..b36afb0 100644 --- a/plugins/modules/gcp_compute_network_endpoint_group_info.py +++ b/plugins/modules/gcp_compute_network_endpoint_group_info.py @@ -64,6 +64,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -78,6 +79,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -96,6 +101,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -176,7 +183,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/plugins/modules/gcp_compute_network_info.py b/plugins/modules/gcp_compute_network_info.py index f2b7c49..7896fac 100644 --- a/plugins/modules/gcp_compute_network_info.py +++ b/plugins/modules/gcp_compute_network_info.py @@ -59,6 +59,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -73,6 +74,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -91,6 +96,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -186,7 +193,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/plugins/modules/gcp_compute_node_group.py b/plugins/modules/gcp_compute_node_group.py index e8bf725..c423110 100644 --- a/plugins/modules/gcp_compute_node_group.py +++ b/plugins/modules/gcp_compute_node_group.py @@ -141,6 +141,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -155,6 +156,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -175,6 +180,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. diff --git a/plugins/modules/gcp_compute_node_group_info.py b/plugins/modules/gcp_compute_node_group_info.py index 68f3409..6864c28 100644 --- a/plugins/modules/gcp_compute_node_group_info.py +++ b/plugins/modules/gcp_compute_node_group_info.py @@ -64,6 +64,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -78,6 +79,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -96,6 +101,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -203,7 +210,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/plugins/modules/gcp_compute_node_template.py b/plugins/modules/gcp_compute_node_template.py index 5db26ea..5de307c 100644 --- a/plugins/modules/gcp_compute_node_template.py +++ b/plugins/modules/gcp_compute_node_template.py @@ -135,6 +135,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -149,6 +150,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -169,6 +174,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -280,7 +287,6 @@ from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import ( GcpModule, GcpRequest, remove_nones_from_dict, - replace_resource_dict, ) import json import re diff --git a/plugins/modules/gcp_compute_node_template_info.py b/plugins/modules/gcp_compute_node_template_info.py index 6859ca8..5219bc6 100644 --- a/plugins/modules/gcp_compute_node_template_info.py +++ b/plugins/modules/gcp_compute_node_template_info.py @@ -64,6 +64,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -78,6 +79,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -96,6 +101,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -204,7 +211,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/plugins/modules/gcp_compute_region_autoscaler.py b/plugins/modules/gcp_compute_region_autoscaler.py index 06cadd3..6d4cca9 100644 --- a/plugins/modules/gcp_compute_region_autoscaler.py +++ b/plugins/modules/gcp_compute_region_autoscaler.py @@ -237,6 +237,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -251,6 +252,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -271,6 +276,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -539,7 +546,6 @@ from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import ( GcpModule, GcpRequest, remove_nones_from_dict, - replace_resource_dict, ) import json import time diff --git a/plugins/modules/gcp_compute_region_autoscaler_info.py b/plugins/modules/gcp_compute_region_autoscaler_info.py index f53968e..64114af 100644 --- a/plugins/modules/gcp_compute_region_autoscaler_info.py +++ b/plugins/modules/gcp_compute_region_autoscaler_info.py @@ -64,6 +64,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -78,6 +79,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -96,6 +101,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -304,7 +311,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/plugins/modules/gcp_compute_region_backend_service.py b/plugins/modules/gcp_compute_region_backend_service.py index 0ad1bcc..557e92d 100644 --- a/plugins/modules/gcp_compute_region_backend_service.py +++ b/plugins/modules/gcp_compute_region_backend_service.py @@ -718,6 +718,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -732,6 +733,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -752,6 +757,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. diff --git a/plugins/modules/gcp_compute_region_backend_service_info.py b/plugins/modules/gcp_compute_region_backend_service_info.py index 74bea5c..685f48f 100644 --- a/plugins/modules/gcp_compute_region_backend_service_info.py +++ b/plugins/modules/gcp_compute_region_backend_service_info.py @@ -64,6 +64,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -78,6 +79,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -96,6 +101,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -771,7 +778,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/plugins/modules/gcp_compute_region_disk.py b/plugins/modules/gcp_compute_region_disk.py index 17d1285..673d925 100644 --- a/plugins/modules/gcp_compute_region_disk.py +++ b/plugins/modules/gcp_compute_region_disk.py @@ -176,6 +176,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -190,6 +191,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -210,6 +215,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -398,7 +405,6 @@ from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import ( GcpModule, GcpRequest, remove_nones_from_dict, - replace_resource_dict, ) import json import re diff --git a/plugins/modules/gcp_compute_region_disk_info.py b/plugins/modules/gcp_compute_region_disk_info.py index 648b4b8..6e70b4d 100644 --- a/plugins/modules/gcp_compute_region_disk_info.py +++ b/plugins/modules/gcp_compute_region_disk_info.py @@ -64,6 +64,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -78,6 +79,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -96,6 +101,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -277,7 +284,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/plugins/modules/gcp_compute_region_health_check.py b/plugins/modules/gcp_compute_region_health_check.py index 745f9a5..fcbad21 100644 --- a/plugins/modules/gcp_compute_region_health_check.py +++ b/plugins/modules/gcp_compute_region_health_check.py @@ -472,6 +472,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -486,6 +487,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -506,6 +511,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -922,7 +929,6 @@ from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import ( GcpModule, GcpRequest, remove_nones_from_dict, - replace_resource_dict, ) import json import re diff --git a/plugins/modules/gcp_compute_region_health_check_info.py b/plugins/modules/gcp_compute_region_health_check_info.py index d9d4276..38b4a7c 100644 --- a/plugins/modules/gcp_compute_region_health_check_info.py +++ b/plugins/modules/gcp_compute_region_health_check_info.py @@ -64,6 +64,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -78,6 +79,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -96,6 +101,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -522,7 +529,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/plugins/modules/gcp_compute_region_instance_group_manager.py b/plugins/modules/gcp_compute_region_instance_group_manager.py index c2f77b8..267e7f1 100644 --- a/plugins/modules/gcp_compute_region_instance_group_manager.py +++ b/plugins/modules/gcp_compute_region_instance_group_manager.py @@ -154,6 +154,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -168,6 +169,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used diff --git a/plugins/modules/gcp_compute_region_instance_group_manager_info.py b/plugins/modules/gcp_compute_region_instance_group_manager_info.py index b320149..43816fd 100644 --- a/plugins/modules/gcp_compute_region_instance_group_manager_info.py +++ b/plugins/modules/gcp_compute_region_instance_group_manager_info.py @@ -64,6 +64,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -78,6 +79,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -96,6 +101,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -285,7 +292,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/plugins/modules/gcp_compute_region_target_http_proxy.py b/plugins/modules/gcp_compute_region_target_http_proxy.py index ec27095..c409f58 100644 --- a/plugins/modules/gcp_compute_region_target_http_proxy.py +++ b/plugins/modules/gcp_compute_region_target_http_proxy.py @@ -92,6 +92,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -106,6 +107,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -126,6 +131,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. diff --git a/plugins/modules/gcp_compute_region_target_http_proxy_info.py b/plugins/modules/gcp_compute_region_target_http_proxy_info.py index 3ef0366..f53beca 100644 --- a/plugins/modules/gcp_compute_region_target_http_proxy_info.py +++ b/plugins/modules/gcp_compute_region_target_http_proxy_info.py @@ -64,6 +64,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -78,6 +79,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -96,6 +101,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -160,7 +167,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/plugins/modules/gcp_compute_region_target_https_proxy.py b/plugins/modules/gcp_compute_region_target_https_proxy.py index 4785633..91dfd3c 100644 --- a/plugins/modules/gcp_compute_region_target_https_proxy.py +++ b/plugins/modules/gcp_compute_region_target_https_proxy.py @@ -100,6 +100,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -114,6 +115,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -134,6 +139,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. diff --git a/plugins/modules/gcp_compute_region_target_https_proxy_info.py b/plugins/modules/gcp_compute_region_target_https_proxy_info.py index 0af2890..fdb9f99 100644 --- a/plugins/modules/gcp_compute_region_target_https_proxy_info.py +++ b/plugins/modules/gcp_compute_region_target_https_proxy_info.py @@ -64,6 +64,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -78,6 +79,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -96,6 +101,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -167,7 +174,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/plugins/modules/gcp_compute_region_url_map.py b/plugins/modules/gcp_compute_region_url_map.py index d1ce756..1d8c9c3 100644 --- a/plugins/modules/gcp_compute_region_url_map.py +++ b/plugins/modules/gcp_compute_region_url_map.py @@ -961,7 +961,7 @@ options: paths: description: - 'The list of path patterns to match. Each must start with / and the - only place a \* is allowed is at the end following a /. The string fed + only place a \\ * is allowed is at the end following a /. The string fed to the path matcher does not include any text after the first ? or #, and those chars are not allowed here.' elements: str @@ -1602,6 +1602,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -1616,6 +1617,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -2522,7 +2527,7 @@ pathMatchers: paths: description: - 'The list of path patterns to match. Each must start with / and the only - place a \* is allowed is at the end following a /. The string fed to the + place a \\* is allowed is at the end following a /. The string fed to the path matcher does not include any text after the first ? or #, and those chars are not allowed here.' returned: success diff --git a/plugins/modules/gcp_compute_region_url_map_info.py b/plugins/modules/gcp_compute_region_url_map_info.py index 55df4e9..3b5cdb7 100644 --- a/plugins/modules/gcp_compute_region_url_map_info.py +++ b/plugins/modules/gcp_compute_region_url_map_info.py @@ -64,6 +64,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -78,6 +79,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -96,6 +101,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -991,7 +998,7 @@ resources: paths: description: - 'The list of path patterns to match. Each must start with / and the - only place a \* is allowed is at the end following a /. The string + only place a \\* is allowed is at the end following a /. The string fed to the path matcher does not include any text after the first ? or #, and those chars are not allowed here.' returned: success @@ -1588,7 +1595,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/plugins/modules/gcp_compute_reservation.py b/plugins/modules/gcp_compute_reservation.py index 8c82f84..c0a9dd0 100644 --- a/plugins/modules/gcp_compute_reservation.py +++ b/plugins/modules/gcp_compute_reservation.py @@ -162,6 +162,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -176,6 +177,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -196,6 +201,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -349,7 +356,6 @@ from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import ( GcpModule, GcpRequest, remove_nones_from_dict, - replace_resource_dict, ) import json import time diff --git a/plugins/modules/gcp_compute_reservation_info.py b/plugins/modules/gcp_compute_reservation_info.py index ee9ae46..ba42f85 100644 --- a/plugins/modules/gcp_compute_reservation_info.py +++ b/plugins/modules/gcp_compute_reservation_info.py @@ -64,6 +64,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -78,6 +79,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -96,6 +101,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -242,7 +249,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/plugins/modules/gcp_compute_resource_policy.py b/plugins/modules/gcp_compute_resource_policy.py index 5a668ce..756685f 100644 --- a/plugins/modules/gcp_compute_resource_policy.py +++ b/plugins/modules/gcp_compute_resource_policy.py @@ -274,6 +274,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -288,6 +289,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -533,7 +538,6 @@ from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import ( GcpModule, GcpRequest, remove_nones_from_dict, - replace_resource_dict, ) import json import time diff --git a/plugins/modules/gcp_compute_resource_policy_info.py b/plugins/modules/gcp_compute_resource_policy_info.py index 1aeb547..545a3bf 100644 --- a/plugins/modules/gcp_compute_resource_policy_info.py +++ b/plugins/modules/gcp_compute_resource_policy_info.py @@ -64,6 +64,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -78,6 +79,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -96,6 +101,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -330,7 +337,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/plugins/modules/gcp_compute_route.py b/plugins/modules/gcp_compute_route.py index 3da7d0f..12b8bec 100644 --- a/plugins/modules/gcp_compute_route.py +++ b/plugins/modules/gcp_compute_route.py @@ -174,6 +174,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -188,6 +189,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -208,6 +213,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. diff --git a/plugins/modules/gcp_compute_route_info.py b/plugins/modules/gcp_compute_route_info.py index 034a315..86e9ab4 100644 --- a/plugins/modules/gcp_compute_route_info.py +++ b/plugins/modules/gcp_compute_route_info.py @@ -59,6 +59,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -73,6 +74,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -91,6 +96,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -201,7 +208,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/plugins/modules/gcp_compute_router.py b/plugins/modules/gcp_compute_router.py index 77efcbc..d64d212 100644 --- a/plugins/modules/gcp_compute_router.py +++ b/plugins/modules/gcp_compute_router.py @@ -141,6 +141,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -155,6 +156,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -175,6 +180,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. diff --git a/plugins/modules/gcp_compute_router_info.py b/plugins/modules/gcp_compute_router_info.py index 25e148d..d595d19 100644 --- a/plugins/modules/gcp_compute_router_info.py +++ b/plugins/modules/gcp_compute_router_info.py @@ -64,6 +64,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -78,6 +79,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -96,6 +101,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -206,7 +213,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/plugins/modules/gcp_compute_snapshot.py b/plugins/modules/gcp_compute_snapshot.py index 7f2a616..5759fbf 100644 --- a/plugins/modules/gcp_compute_snapshot.py +++ b/plugins/modules/gcp_compute_snapshot.py @@ -157,6 +157,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -171,6 +172,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -191,6 +196,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. diff --git a/plugins/modules/gcp_compute_snapshot_info.py b/plugins/modules/gcp_compute_snapshot_info.py index e1d9895..26963f3 100644 --- a/plugins/modules/gcp_compute_snapshot_info.py +++ b/plugins/modules/gcp_compute_snapshot_info.py @@ -59,6 +59,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -73,6 +74,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -91,6 +96,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -244,7 +251,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/plugins/modules/gcp_compute_ssl_certificate.py b/plugins/modules/gcp_compute_ssl_certificate.py index 5d0ef0f..d2f4680 100644 --- a/plugins/modules/gcp_compute_ssl_certificate.py +++ b/plugins/modules/gcp_compute_ssl_certificate.py @@ -89,6 +89,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -103,6 +104,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -123,6 +128,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -133,7 +140,6 @@ EXAMPLES = ''' - name: create a SSL certificate google.cloud.gcp_compute_ssl_certificate: name: test_object - region: us-central1 description: A certificate for testing. Do not use this certificate in production certificate: |- -----BEGIN CERTIFICATE----- @@ -209,7 +215,7 @@ privateKey: # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest, replace_resource_dict +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest import json import time diff --git a/plugins/modules/gcp_compute_ssl_certificate_info.py b/plugins/modules/gcp_compute_ssl_certificate_info.py index e030ce8..27b4ce2 100644 --- a/plugins/modules/gcp_compute_ssl_certificate_info.py +++ b/plugins/modules/gcp_compute_ssl_certificate_info.py @@ -59,6 +59,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -73,6 +74,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -91,6 +96,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -155,7 +162,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/plugins/modules/gcp_compute_ssl_policy.py b/plugins/modules/gcp_compute_ssl_policy.py index 57cda0d..64a62fd 100644 --- a/plugins/modules/gcp_compute_ssl_policy.py +++ b/plugins/modules/gcp_compute_ssl_policy.py @@ -99,6 +99,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -113,6 +114,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -133,6 +138,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -240,7 +247,6 @@ from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import ( GcpModule, GcpRequest, remove_nones_from_dict, - replace_resource_dict, ) import json import time diff --git a/plugins/modules/gcp_compute_ssl_policy_info.py b/plugins/modules/gcp_compute_ssl_policy_info.py index a194ebe..04219c8 100644 --- a/plugins/modules/gcp_compute_ssl_policy_info.py +++ b/plugins/modules/gcp_compute_ssl_policy_info.py @@ -59,6 +59,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -73,6 +74,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -91,6 +96,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -191,7 +198,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/plugins/modules/gcp_compute_subnetwork.py b/plugins/modules/gcp_compute_subnetwork.py index 3fc7438..7642dc2 100644 --- a/plugins/modules/gcp_compute_subnetwork.py +++ b/plugins/modules/gcp_compute_subnetwork.py @@ -151,6 +151,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -165,6 +166,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -186,6 +191,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. diff --git a/plugins/modules/gcp_compute_subnetwork_info.py b/plugins/modules/gcp_compute_subnetwork_info.py index 428e35d..5b126f2 100644 --- a/plugins/modules/gcp_compute_subnetwork_info.py +++ b/plugins/modules/gcp_compute_subnetwork_info.py @@ -64,6 +64,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -78,6 +79,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -96,6 +101,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -210,7 +217,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/plugins/modules/gcp_compute_target_http_proxy.py b/plugins/modules/gcp_compute_target_http_proxy.py index 647a9c4..5e92ee6 100644 --- a/plugins/modules/gcp_compute_target_http_proxy.py +++ b/plugins/modules/gcp_compute_target_http_proxy.py @@ -93,6 +93,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -107,6 +108,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -127,6 +132,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. diff --git a/plugins/modules/gcp_compute_target_http_proxy_info.py b/plugins/modules/gcp_compute_target_http_proxy_info.py index 42fbfce..6a78af4 100644 --- a/plugins/modules/gcp_compute_target_http_proxy_info.py +++ b/plugins/modules/gcp_compute_target_http_proxy_info.py @@ -59,6 +59,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -73,6 +74,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -91,6 +96,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -155,7 +162,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/plugins/modules/gcp_compute_target_https_proxy.py b/plugins/modules/gcp_compute_target_https_proxy.py index fa15ab9..c692730 100644 --- a/plugins/modules/gcp_compute_target_https_proxy.py +++ b/plugins/modules/gcp_compute_target_https_proxy.py @@ -121,6 +121,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -135,6 +136,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -155,6 +160,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. diff --git a/plugins/modules/gcp_compute_target_https_proxy_info.py b/plugins/modules/gcp_compute_target_https_proxy_info.py index 197237c..b4186a9 100644 --- a/plugins/modules/gcp_compute_target_https_proxy_info.py +++ b/plugins/modules/gcp_compute_target_https_proxy_info.py @@ -59,6 +59,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -73,6 +74,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -91,6 +96,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -177,7 +184,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/plugins/modules/gcp_compute_target_instance.py b/plugins/modules/gcp_compute_target_instance.py index e3fd58e..686886d 100644 --- a/plugins/modules/gcp_compute_target_instance.py +++ b/plugins/modules/gcp_compute_target_instance.py @@ -104,6 +104,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -118,6 +119,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -138,6 +143,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. diff --git a/plugins/modules/gcp_compute_target_instance_info.py b/plugins/modules/gcp_compute_target_instance_info.py index 106f0ce..791fb0a 100644 --- a/plugins/modules/gcp_compute_target_instance_info.py +++ b/plugins/modules/gcp_compute_target_instance_info.py @@ -64,6 +64,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -78,6 +79,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -96,6 +101,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -162,7 +169,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/plugins/modules/gcp_compute_target_pool.py b/plugins/modules/gcp_compute_target_pool.py index b5643af..48118c1 100644 --- a/plugins/modules/gcp_compute_target_pool.py +++ b/plugins/modules/gcp_compute_target_pool.py @@ -146,6 +146,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -160,6 +161,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -180,6 +185,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. diff --git a/plugins/modules/gcp_compute_target_pool_info.py b/plugins/modules/gcp_compute_target_pool_info.py index f619651..54345a1 100644 --- a/plugins/modules/gcp_compute_target_pool_info.py +++ b/plugins/modules/gcp_compute_target_pool_info.py @@ -64,6 +64,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -78,6 +79,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -96,6 +101,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -208,7 +215,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/plugins/modules/gcp_compute_target_ssl_proxy.py b/plugins/modules/gcp_compute_target_ssl_proxy.py index 33bf107..cd95c17 100644 --- a/plugins/modules/gcp_compute_target_ssl_proxy.py +++ b/plugins/modules/gcp_compute_target_ssl_proxy.py @@ -111,6 +111,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -125,6 +126,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -145,6 +150,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. diff --git a/plugins/modules/gcp_compute_target_ssl_proxy_info.py b/plugins/modules/gcp_compute_target_ssl_proxy_info.py index b6f17d8..e23e841 100644 --- a/plugins/modules/gcp_compute_target_ssl_proxy_info.py +++ b/plugins/modules/gcp_compute_target_ssl_proxy_info.py @@ -59,6 +59,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -73,6 +74,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -91,6 +96,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -167,7 +174,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/plugins/modules/gcp_compute_target_tcp_proxy.py b/plugins/modules/gcp_compute_target_tcp_proxy.py index 29793bb..945cb9c 100644 --- a/plugins/modules/gcp_compute_target_tcp_proxy.py +++ b/plugins/modules/gcp_compute_target_tcp_proxy.py @@ -98,6 +98,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -112,6 +113,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -132,6 +137,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. diff --git a/plugins/modules/gcp_compute_target_tcp_proxy_info.py b/plugins/modules/gcp_compute_target_tcp_proxy_info.py index 785f1ae..65cc775 100644 --- a/plugins/modules/gcp_compute_target_tcp_proxy_info.py +++ b/plugins/modules/gcp_compute_target_tcp_proxy_info.py @@ -59,6 +59,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -73,6 +74,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -91,6 +96,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -159,7 +166,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/plugins/modules/gcp_compute_target_vpn_gateway.py b/plugins/modules/gcp_compute_target_vpn_gateway.py index 0c5e733..e76bd40 100644 --- a/plugins/modules/gcp_compute_target_vpn_gateway.py +++ b/plugins/modules/gcp_compute_target_vpn_gateway.py @@ -91,6 +91,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -105,6 +106,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -124,6 +129,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. diff --git a/plugins/modules/gcp_compute_target_vpn_gateway_info.py b/plugins/modules/gcp_compute_target_vpn_gateway_info.py index 24644af..8d9763b 100644 --- a/plugins/modules/gcp_compute_target_vpn_gateway_info.py +++ b/plugins/modules/gcp_compute_target_vpn_gateway_info.py @@ -64,6 +64,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -78,6 +79,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -96,6 +101,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -170,7 +177,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/plugins/modules/gcp_compute_url_map.py b/plugins/modules/gcp_compute_url_map.py index bb8ab41..2856e59 100644 --- a/plugins/modules/gcp_compute_url_map.py +++ b/plugins/modules/gcp_compute_url_map.py @@ -325,7 +325,7 @@ options: paths: description: - 'The list of path patterns to match. Each must start with / and the - only place a \* is allowed is at the end following a /. The string fed + only place a \\* is allowed is at the end following a /. The string fed to the path matcher does not include any text after the first ? or #, and those chars are not allowed here.' elements: str @@ -2547,6 +2547,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -2561,6 +2562,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -2580,6 +2585,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -2899,7 +2906,7 @@ pathMatchers: paths: description: - 'The list of path patterns to match. Each must start with / and the only - place a \* is allowed is at the end following a /. The string fed to the + place a \\* is allowed is at the end following a /. The string fed to the path matcher does not include any text after the first ? or #, and those chars are not allowed here.' returned: success @@ -4972,6 +4979,7 @@ def main(): state=dict(default='present', choices=['present', 'absent'], type='str'), default_service=dict(type='dict'), description=dict(type='str'), + fingerprint=dict(type='str'), header_action=dict( type='dict', options=dict( @@ -5486,6 +5494,7 @@ def main(): changed = False if fetch: + module.params['fingerprint'] = fetch['fingerprint'] if state == 'present': if is_different(module, fetch): update(module, self_link(module), kind) @@ -5534,6 +5543,7 @@ def resource_to_request(module): u'tests': UrlMapTestsArray(module.params.get('tests', []), module).to_request(), u'defaultUrlRedirect': UrlMapDefaulturlredirect(module.params.get('default_url_redirect', {}), module).to_request(), u'defaultRouteAction': UrlMapDefaultrouteaction(module.params.get('default_route_action', {}), module).to_request(), + u'fingerprint': module.params.get('fingerprint') } return_vals = {} for k, v in request.items(): diff --git a/plugins/modules/gcp_compute_url_map_info.py b/plugins/modules/gcp_compute_url_map_info.py index 88d1dd7..fa5431a 100644 --- a/plugins/modules/gcp_compute_url_map_info.py +++ b/plugins/modules/gcp_compute_url_map_info.py @@ -59,6 +59,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -73,6 +74,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -91,6 +96,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -382,7 +389,7 @@ resources: paths: description: - 'The list of path patterns to match. Each must start with / and the - only place a \* is allowed is at the end following a /. The string + only place a \\* is allowed is at the end following a /. The string fed to the path matcher does not include any text after the first ? or #, and those chars are not allowed here.' returned: success @@ -2471,7 +2478,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/plugins/modules/gcp_compute_vpn_tunnel.py b/plugins/modules/gcp_compute_vpn_tunnel.py index d54d081..a59e469 100644 --- a/plugins/modules/gcp_compute_vpn_tunnel.py +++ b/plugins/modules/gcp_compute_vpn_tunnel.py @@ -178,6 +178,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -192,6 +193,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -213,6 +218,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -527,15 +534,22 @@ def return_if_object(module, response, kind, allow_not_found=False): def is_different(module, response): request = resource_to_request(module) response = response_to_hash(module, response) + # shared_secret is returned with stars instead of the + # actual secret + keys_to_ignore = ("sharedSecret") # Remove all output-only from response. response_vals = {} for k, v in response.items(): + if k in keys_to_ignore: + continue if k in request: response_vals[k] = v request_vals = {} for k, v in request.items(): + if k in keys_to_ignore: + continue if k in response: request_vals[k] = v diff --git a/plugins/modules/gcp_compute_vpn_tunnel_info.py b/plugins/modules/gcp_compute_vpn_tunnel_info.py index e0ee1f9..7b3430a 100644 --- a/plugins/modules/gcp_compute_vpn_tunnel_info.py +++ b/plugins/modules/gcp_compute_vpn_tunnel_info.py @@ -64,6 +64,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -78,6 +79,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -96,6 +101,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -231,7 +238,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/plugins/modules/gcp_container_cluster.py b/plugins/modules/gcp_container_cluster.py index 1460d68..0a5d949 100644 --- a/plugins/modules/gcp_container_cluster.py +++ b/plugins/modules/gcp_container_cluster.py @@ -259,6 +259,7 @@ options: username: description: - The username to use for HTTP basic authentication to the master endpoint. + (unsupported with GKE >= 1.19). required: false type: str password: @@ -266,6 +267,7 @@ options: - The password to use for HTTP basic authentication to the master endpoint. Because the master endpoint is open to the Internet, you should create a strong password with a minimum of 16 characters. + (unsupported with GKE >= 1.19). required: false type: str client_certificate_config: @@ -550,6 +552,11 @@ options: - Set to /netmask (e.g. /14) to have a range chosen with a specific netmask. required: false type: str + stack_type: + description: + - 'The IP stack type of the cluster, possible values: (STACK_TYPE_UNSPECIFIED, IPV4, IPV4_IPV6)' + required: false + type: str initial_cluster_version: description: - The software version of the master endpoint and kubelets used in the cluster @@ -626,6 +633,11 @@ options: required: false type: dict suboptions: + datapath_provider: + description: + - The datapath provider selects the implementation of the Kubernetes networking model for service resolution and network policy enforcement. + required: false + type: str enable_intra_node_visibility: description: - Whether Intra-node visibility is enabled for this cluster. This makes same @@ -679,6 +691,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -693,6 +706,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -711,9 +728,6 @@ EXAMPLES = ''' google.cloud.gcp_container_cluster: name: my-cluster initial_node_count: 2 - master_auth: - username: cluster_admin - password: my-secret-password node_config: machine_type: n1-standard-4 disk_size_gb: 500 @@ -930,6 +944,7 @@ masterAuth: username: description: - The username to use for HTTP basic authentication to the master endpoint. + (unsupported with GKE >= 1.19). returned: success type: str password: @@ -937,6 +952,7 @@ masterAuth: - The password to use for HTTP basic authentication to the master endpoint. Because the master endpoint is open to the Internet, you should create a strong password with a minimum of 16 characters. + (unsupported with GKE >= 1.19). returned: success type: str clientCertificateConfig: @@ -1251,6 +1267,11 @@ ipAllocationPolicy: - Set to /netmask (e.g. /14) to have a range chosen with a specific netmask. returned: success type: str + stackType: + description: + - 'The IP stack type of the cluster, possible values: (STACK_TYPE_UNSPECIFIED, IPV4, IPV4_IPV6)' + type: str + returned: success endpoint: description: - The IP address of this cluster's master endpoint. @@ -1473,7 +1494,6 @@ from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import ( GcpModule, GcpRequest, remove_nones_from_dict, - replace_resource_dict, ) import json import time @@ -1558,6 +1578,7 @@ def main(): node_ipv4_cidr_block=dict(type='str'), services_ipv4_cidr_block=dict(type='str'), tpu_ipv4_cidr_block=dict(type='str'), + stack_type=dict(type='str'), ), ), initial_cluster_version=dict(type='str'), @@ -1571,7 +1592,14 @@ def main(): binary_authorization=dict(type='dict', options=dict(enabled=dict(type='bool'))), release_channel=dict(type='dict', options=dict(channel=dict(type='str'))), shielded_nodes=dict(type='dict', options=dict(enabled=dict(type='bool'))), - network_config=dict(type='dict', options=dict(enable_intra_node_visibility=dict(type='bool'), default_snat_status=dict(type='bool'))), + network_config=dict( + type='dict', + options=dict( + enable_intra_node_visibility=dict(type='bool'), + default_snat_status=dict(type='bool'), + datapath_provider=dict(type='str'), + ), + ), enable_kubernetes_alpha=dict(type='bool'), location=dict(required=True, type='str', aliases=['zone']), kubectl_path=dict(type='str'), @@ -1857,6 +1885,29 @@ class Kubectl(object): if not context: context = self.module.params['name'] + user = { + 'name': context, + 'user': { + 'auth-provider': { + 'config': { + 'access-token': token, + 'cmd-args': 'config config-helper --format=json', + 'cmd-path': '/usr/lib64/google-cloud-sdk/bin/gcloud', + 'expiry-key': '{.credential.token_expiry}', + 'token-key': '{.credential.access_token}', + }, + 'name': 'gcp', + }, + }, + } + + auth_keyword = self.fetch['masterAuth'].keys() + if 'username' in auth_keyword and 'password' in auth_keyword: + user['user']['auth-provider'].update({ + 'username': str(self.fetch['masterAuth']['username']), + 'password': str(self.fetch['masterAuth']['password']), + }) + return { 'apiVersion': 'v1', 'clusters': [{'name': context, 'cluster': {'certificate-authority-data': str(self.fetch['masterAuth']['clusterCaCertificate'])}}], @@ -1864,25 +1915,7 @@ class Kubectl(object): 'current-context': context, 'kind': 'Config', 'preferences': {}, - 'users': [ - { - 'name': context, - 'user': { - 'auth-provider': { - 'config': { - 'access-token': token, - 'cmd-args': 'config config-helper --format=json', - 'cmd-path': '/usr/lib64/google-cloud-sdk/bin/gcloud', - 'expiry-key': '{.credential.token_expiry}', - 'token-key': '{.credential.access_token}', - }, - 'name': 'gcp', - }, - 'username': str(self.fetch['masterAuth']['username']), - 'password': str(self.fetch['masterAuth']['password']), - }, - } - ], + 'users': [user], } """ @@ -2242,6 +2275,7 @@ class ClusterIpallocationpolicy(object): u'nodeIpv4CidrBlock': self.request.get('node_ipv4_cidr_block'), u'servicesIpv4CidrBlock': self.request.get('services_ipv4_cidr_block'), u'tpuIpv4CidrBlock': self.request.get('tpu_ipv4_cidr_block'), + u'stackType': self.request.get('stack_type'), } ) @@ -2415,14 +2449,18 @@ class ClusterNetworkconfig(object): self.request = {} def to_request(self): - return remove_nones_from_dict( - {u'enableIntraNodeVisibility': self.request.get('enable_intra_node_visibility'), u'defaultSnatStatus': self.request.get('default_snat_status')} - ) + return remove_nones_from_dict({ + u'enableIntraNodeVisibility': self.request.get('enable_intra_node_visibility'), + u'defaultSnatStatus': self.request.get('default_snat_status'), + u'datapathProvider': self.request.get('datapath_provider'), + }) def from_response(self): - return remove_nones_from_dict( - {u'enableIntraNodeVisibility': self.request.get(u'enableIntraNodeVisibility'), u'defaultSnatStatus': self.request.get(u'defaultSnatStatus')} - ) + return remove_nones_from_dict({ + u'enableIntraNodeVisibility': self.request.get(u'enableIntraNodeVisibility'), + u'defaultSnatStatus': self.request.get(u'defaultSnatStatus'), + u'datapathProvider': self.request.get('datapath_provider'), + }) if __name__ == '__main__': diff --git a/plugins/modules/gcp_container_cluster_info.py b/plugins/modules/gcp_container_cluster_info.py index 77d5779..0b90433 100644 --- a/plugins/modules/gcp_container_cluster_info.py +++ b/plugins/modules/gcp_container_cluster_info.py @@ -60,6 +60,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -74,6 +75,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -92,6 +97,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -843,7 +850,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/plugins/modules/gcp_container_node_pool.py b/plugins/modules/gcp_container_node_pool.py index 82091a6..1740837 100644 --- a/plugins/modules/gcp_container_node_pool.py +++ b/plugins/modules/gcp_container_node_pool.py @@ -358,6 +358,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -372,6 +373,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used diff --git a/plugins/modules/gcp_container_node_pool_info.py b/plugins/modules/gcp_container_node_pool_info.py index 03c7ccd..e27412a 100644 --- a/plugins/modules/gcp_container_node_pool_info.py +++ b/plugins/modules/gcp_container_node_pool_info.py @@ -70,6 +70,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -84,6 +85,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -102,6 +107,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -434,7 +441,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest, replace_resource_dict +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, replace_resource_dict import json ################################################################################ diff --git a/plugins/modules/gcp_dns_managed_zone.py b/plugins/modules/gcp_dns_managed_zone.py index 5f45580..83c327a 100644 --- a/plugins/modules/gcp_dns_managed_zone.py +++ b/plugins/modules/gcp_dns_managed_zone.py @@ -234,6 +234,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -248,6 +249,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -268,6 +273,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -476,7 +483,6 @@ from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import ( GcpModule, GcpRequest, remove_nones_from_dict, - replace_resource_dict, ) import json diff --git a/plugins/modules/gcp_dns_managed_zone_info.py b/plugins/modules/gcp_dns_managed_zone_info.py index c0905ab..333bfce 100644 --- a/plugins/modules/gcp_dns_managed_zone_info.py +++ b/plugins/modules/gcp_dns_managed_zone_info.py @@ -57,6 +57,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -71,6 +72,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -89,6 +94,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -292,7 +299,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/plugins/modules/gcp_dns_resource_record_set.py b/plugins/modules/gcp_dns_resource_record_set.py index cfa2058..c982205 100644 --- a/plugins/modules/gcp_dns_resource_record_set.py +++ b/plugins/modules/gcp_dns_resource_record_set.py @@ -94,6 +94,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -108,6 +109,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used diff --git a/plugins/modules/gcp_dns_resource_record_set_info.py b/plugins/modules/gcp_dns_resource_record_set_info.py index 5fafd64..622c310 100644 --- a/plugins/modules/gcp_dns_resource_record_set_info.py +++ b/plugins/modules/gcp_dns_resource_record_set_info.py @@ -59,6 +59,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -73,6 +74,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -91,6 +96,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -144,7 +151,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest, replace_resource_dict +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, replace_resource_dict import json ################################################################################ diff --git a/plugins/modules/gcp_filestore_instance.py b/plugins/modules/gcp_filestore_instance.py index 6ea212f..7895f9c 100644 --- a/plugins/modules/gcp_filestore_instance.py +++ b/plugins/modules/gcp_filestore_instance.py @@ -131,6 +131,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -145,6 +146,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -159,7 +164,7 @@ options: notes: - 'API Reference: U(https://cloud.google.com/filestore/docs/reference/rest/v1beta1/projects.locations.instances/create)' - 'Official Documentation: U(https://cloud.google.com/filestore/docs/creating-instances)' -- 'Use with Kubernetes: U(https://cloud.google.com/filestore/docs/accessing-fileshares)' +- 'Use with Kubernetes: U(https://cloud.google.com/filestore/docs/csi-driver)' - 'Copying Data In/Out: U(https://cloud.google.com/filestore/docs/copying-data)' - for authentication, you can set service_account_file using the C(GCP_SERVICE_ACCOUNT_FILE) env variable. @@ -167,6 +172,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -287,7 +294,6 @@ from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import ( GcpModule, GcpRequest, remove_nones_from_dict, - replace_resource_dict, ) import json import re diff --git a/plugins/modules/gcp_filestore_instance_info.py b/plugins/modules/gcp_filestore_instance_info.py index 713fcc6..55ab27c 100644 --- a/plugins/modules/gcp_filestore_instance_info.py +++ b/plugins/modules/gcp_filestore_instance_info.py @@ -57,6 +57,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -71,6 +72,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -89,6 +94,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -197,7 +204,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/plugins/modules/gcp_iam_role.py b/plugins/modules/gcp_iam_role.py index 6911a8b..8af62c8 100644 --- a/plugins/modules/gcp_iam_role.py +++ b/plugins/modules/gcp_iam_role.py @@ -25,9 +25,13 @@ __metaclass__ = type # Documentation ################################################################################ -ANSIBLE_METADATA = {'metadata_version': '1.1', 'status': ["preview"], 'supported_by': 'community'} +ANSIBLE_METADATA = { + "metadata_version": "1.1", + "status": ["preview"], + "supported_by": "community", +} -DOCUMENTATION = ''' +DOCUMENTATION = """ --- module: gcp_iam_role description: @@ -89,6 +93,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -103,6 +108,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -114,9 +123,9 @@ options: - This should not be set unless you know what you're doing. - This only alters the User Agent string for any API requests. type: str -''' +""" -EXAMPLES = ''' +EXAMPLES = """ - name: create a role google.cloud.gcp_iam_role: name: myCustomRole2 @@ -130,9 +139,9 @@ EXAMPLES = ''' auth_kind: serviceaccount service_account_file: "/tmp/auth.pem" state: present -''' +""" -RETURN = ''' +RETURN = """ name: description: - The name of the role. @@ -163,13 +172,18 @@ deleted: - The current deleted state of the role. returned: success type: bool -''' +""" ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest, replace_resource_dict +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import ( + navigate_hash, + GcpSession, + GcpModule, + GcpRequest, +) import json ################################################################################ @@ -182,85 +196,99 @@ def main(): module = GcpModule( argument_spec=dict( - state=dict(default='present', choices=['present', 'absent'], type='str'), - name=dict(required=True, type='str'), - title=dict(type='str'), - description=dict(type='str'), - included_permissions=dict(type='list', elements='str'), - stage=dict(type='str'), + state=dict(default="present", choices=["present", "absent"], type="str"), + name=dict(required=True, type="str"), + title=dict(type="str"), + description=dict(type="str"), + included_permissions=dict(type="list", elements="str"), + stage=dict(type="str"), ) ) - if not module.params['scopes']: - module.params['scopes'] = ['https://www.googleapis.com/auth/iam'] + if not module.params["scopes"]: + module.params["scopes"] = ["https://www.googleapis.com/auth/iam"] - state = module.params['state'] + state = module.params["state"] fetch = fetch_resource(module, self_link(module)) changed = False if fetch: - if state == 'present': - if is_different(module, fetch): + if state == "present": + if fetch.get("deleted"): + undelete(module, self_link(module), fetch["etag"]) + changed = True + elif is_different(module, fetch): update(module, self_link(module), fetch) fetch = fetch_resource(module, self_link(module)) changed = True - else: + elif not fetch.get("deleted"): delete(module, self_link(module)) fetch = {} changed = True else: - if state == 'present': + if state == "present": fetch = create(module, collection(module)) changed = True else: fetch = {} - fetch.update({'changed': changed}) + fetch.update({"changed": changed}) module.exit_json(**fetch) def create(module, link): - auth = GcpSession(module, 'iam') + auth = GcpSession(module, "iam") return return_if_object(module, auth.post(link, resource_to_create(module))) +def undelete(module, link, etag): + auth = GcpSession(module, "iam") + return return_if_object(module, auth.post(link + ":undelete", { + "etag": etag + })) + + def update(module, link, fetch): - auth = GcpSession(module, 'iam') - params = {'updateMask': updateMask(resource_to_request(module), response_to_hash(module, fetch))} + auth = GcpSession(module, "iam") + params = { + "updateMask": updateMask( + resource_to_request(module), response_to_hash(module, fetch) + ) + } request = resource_to_request(module) - del request['name'] - return return_if_object(module, auth.put(link, request, params=params)) + del request["name"] + return return_if_object(module, auth.patch(link, request, params=params)) def updateMask(request, response): update_mask = [] - if request.get('name') != response.get('name'): - update_mask.append('name') - if request.get('title') != response.get('title'): - update_mask.append('title') - if request.get('description') != response.get('description'): - update_mask.append('description') - if request.get('includedPermissions') != response.get('includedPermissions'): - update_mask.append('includedPermissions') - if request.get('stage') != response.get('stage'): - update_mask.append('stage') - return ','.join(update_mask) + if request.get("name") != response.get("name"): + update_mask.append("name") + if request.get("title") != response.get("title"): + update_mask.append("title") + if request.get("description") != response.get("description"): + update_mask.append("description") + if request.get("includedPermissions") != response.get("includedPermissions"): + update_mask.append("includedPermissions") + if request.get("stage") != response.get("stage"): + update_mask.append("stage") + return ",".join(update_mask) def delete(module, link): - auth = GcpSession(module, 'iam') - return return_if_object(module, auth.delete(link)) + auth = GcpSession(module, "iam") + return return_if_object(module, auth.delete(link), allow_not_found=True) def resource_to_request(module): request = { - u'name': module.params.get('name'), - u'title': module.params.get('title'), - u'description': module.params.get('description'), - u'includedPermissions': module.params.get('included_permissions'), - u'stage': module.params.get('stage'), + "name": module.params.get("name"), + "title": module.params.get("title"), + "description": module.params.get("description"), + "includedPermissions": module.params.get("included_permissions"), + "stage": module.params.get("stage"), } return_vals = {} for k, v in request.items(): @@ -271,16 +299,20 @@ def resource_to_request(module): def fetch_resource(module, link, allow_not_found=True): - auth = GcpSession(module, 'iam') + auth = GcpSession(module, "iam") return return_if_object(module, auth.get(link), allow_not_found) def self_link(module): - return "https://iam.googleapis.com/v1/projects/{project}/roles/{name}".format(**module.params) + return "https://iam.googleapis.com/v1/projects/{project}/roles/{name}".format( + **module.params + ) def collection(module): - return "https://iam.googleapis.com/v1/projects/{project}/roles".format(**module.params) + return "https://iam.googleapis.com/v1/projects/{project}/roles".format( + **module.params + ) def return_if_object(module, response, allow_not_found=False): @@ -292,16 +324,22 @@ def return_if_object(module, response, allow_not_found=False): if response.status_code == 204: return None + # catches and edge case specific to IAM roles where the role not + # existing returns 400. + if (allow_not_found and response.status_code == 400 + and "You can't delete role_id" in response.text): + return None + try: module.raise_for_status(response) result = response.json() - except getattr(json.decoder, 'JSONDecodeError', ValueError): + except getattr(json.decoder, "JSONDecodeError", ValueError): module.fail_json(msg="Invalid JSON response with error: %s" % response.text) result = decode_response(result, module) - if navigate_hash(result, ['error', 'errors']): - module.fail_json(msg=navigate_hash(result, ['error', 'errors'])) + if navigate_hash(result, ["error", "errors"]): + module.fail_json(msg=navigate_hash(result, ["error", "errors"])) return result @@ -329,26 +367,26 @@ def is_different(module, response): # This is for doing comparisons with Ansible's current parameters. def response_to_hash(module, response): return { - u'name': response.get(u'name'), - u'title': response.get(u'title'), - u'description': response.get(u'description'), - u'includedPermissions': response.get(u'includedPermissions'), - u'stage': response.get(u'stage'), - u'deleted': response.get(u'deleted'), + "name": response.get("name"), + "title": response.get("title"), + "description": response.get("description"), + "includedPermissions": response.get("includedPermissions"), + "stage": response.get("stage"), + "deleted": response.get("deleted"), } def resource_to_create(module): role = resource_to_request(module) - del role['name'] - return {'roleId': module.params['name'], 'role': role} + del role["name"] + return {"roleId": module.params["name"], "role": role} def decode_response(response, module): - if 'name' in response: - response['name'] = response['name'].split('/')[-1] + if "name" in response: + response["name"] = response["name"].split("/")[-1] return response -if __name__ == '__main__': +if __name__ == "__main__": main() diff --git a/plugins/modules/gcp_iam_role_info.py b/plugins/modules/gcp_iam_role_info.py index de791b2..35874cc 100644 --- a/plugins/modules/gcp_iam_role_info.py +++ b/plugins/modules/gcp_iam_role_info.py @@ -52,6 +52,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -66,6 +67,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -84,6 +89,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -140,7 +147,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/plugins/modules/gcp_iam_service_account.py b/plugins/modules/gcp_iam_service_account.py index fa93014..d93db04 100644 --- a/plugins/modules/gcp_iam_service_account.py +++ b/plugins/modules/gcp_iam_service_account.py @@ -70,6 +70,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -84,6 +85,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -145,7 +150,7 @@ oauth2ClientId: # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest, replace_resource_dict +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest import json ################################################################################ diff --git a/plugins/modules/gcp_iam_service_account_info.py b/plugins/modules/gcp_iam_service_account_info.py index 5a0d94e..b201718 100644 --- a/plugins/modules/gcp_iam_service_account_info.py +++ b/plugins/modules/gcp_iam_service_account_info.py @@ -52,6 +52,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -66,6 +67,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -84,6 +89,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -139,7 +146,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/plugins/modules/gcp_iam_service_account_key.py b/plugins/modules/gcp_iam_service_account_key.py index 633fd74..a34718d 100644 --- a/plugins/modules/gcp_iam_service_account_key.py +++ b/plugins/modules/gcp_iam_service_account_key.py @@ -71,8 +71,9 @@ options: type: dict path: description: - - The full name of the file that will hold the service account private key. The - management of this file will depend on the value of sync_file parameter. + - The full name of the file that will hold the service account private key. + - If the file already exists, it will attempt to be read. Ensure the file does + not exist or is alreay a valid key. - File path must be absolute. required: false type: path @@ -89,6 +90,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -103,6 +105,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -187,8 +193,9 @@ serviceAccount: type: dict path: description: - - The full name of the file that will hold the service account private key. The - management of this file will depend on the value of sync_file parameter. + - The full name of the file that will hold the service account private key. + - If the file already exists, it will attempt to be read. Ensure the file does + not exist or is alreay a valid key. - File path must be absolute. returned: success type: str @@ -198,12 +205,10 @@ path: # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest, replace_resource_dict +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, replace_resource_dict from ansible.module_utils._text import to_native import json import os -import mimetypes -import hashlib import base64 ################################################################################ diff --git a/plugins/modules/gcp_kms_crypto_key.py b/plugins/modules/gcp_kms_crypto_key.py index 03b69d4..40bfae9 100644 --- a/plugins/modules/gcp_kms_crypto_key.py +++ b/plugins/modules/gcp_kms_crypto_key.py @@ -118,6 +118,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -132,6 +133,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -152,6 +157,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -258,7 +265,6 @@ from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import ( GcpModule, GcpRequest, remove_nones_from_dict, - replace_resource_dict, ) import json @@ -279,7 +285,7 @@ def main(): rotation_period=dict(type='str'), version_template=dict(type='dict', options=dict(algorithm=dict(required=True, type='str'), protection_level=dict(type='str'))), key_ring=dict(required=True, type='str'), - skip_initial_version_creation=dict(type='bool'), + skip_initial_version_creation=dict(type='bool', default=False), ) ) diff --git a/plugins/modules/gcp_kms_crypto_key_info.py b/plugins/modules/gcp_kms_crypto_key_info.py index 24e98a9..bc40b48 100644 --- a/plugins/modules/gcp_kms_crypto_key_info.py +++ b/plugins/modules/gcp_kms_crypto_key_info.py @@ -58,6 +58,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -72,6 +73,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -90,6 +95,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -182,7 +189,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/plugins/modules/gcp_kms_key_ring.py b/plugins/modules/gcp_kms_key_ring.py index 23bab15..7f70faa 100644 --- a/plugins/modules/gcp_kms_key_ring.py +++ b/plugins/modules/gcp_kms_key_ring.py @@ -72,6 +72,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -86,6 +87,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -106,6 +111,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -147,7 +154,7 @@ location: # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest, replace_resource_dict +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest import json ################################################################################ diff --git a/plugins/modules/gcp_kms_key_ring_info.py b/plugins/modules/gcp_kms_key_ring_info.py index 01e8fad..39d3de9 100644 --- a/plugins/modules/gcp_kms_key_ring_info.py +++ b/plugins/modules/gcp_kms_key_ring_info.py @@ -59,6 +59,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -73,6 +74,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -91,6 +96,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -135,7 +142,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/plugins/modules/gcp_logging_metric.py b/plugins/modules/gcp_logging_metric.py index 5d4740c..f897324 100644 --- a/plugins/modules/gcp_logging_metric.py +++ b/plugins/modules/gcp_logging_metric.py @@ -239,6 +239,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -253,6 +254,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -273,6 +278,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -494,7 +501,6 @@ from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import ( GcpModule, GcpRequest, remove_nones_from_dict, - replace_resource_dict, ) import json diff --git a/plugins/modules/gcp_logging_metric_info.py b/plugins/modules/gcp_logging_metric_info.py index 482a840..76c323c 100644 --- a/plugins/modules/gcp_logging_metric_info.py +++ b/plugins/modules/gcp_logging_metric_info.py @@ -52,6 +52,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -66,6 +67,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -84,6 +89,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -286,7 +293,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/plugins/modules/gcp_mlengine_model.py b/plugins/modules/gcp_mlengine_model.py index d143c98..e3edaac 100644 --- a/plugins/modules/gcp_mlengine_model.py +++ b/plugins/modules/gcp_mlengine_model.py @@ -107,6 +107,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -121,6 +122,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -141,6 +146,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -217,7 +224,6 @@ from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import ( GcpModule, GcpRequest, remove_nones_from_dict, - replace_resource_dict, ) import json import time diff --git a/plugins/modules/gcp_mlengine_model_info.py b/plugins/modules/gcp_mlengine_model_info.py index cdd2330..11f28ae 100644 --- a/plugins/modules/gcp_mlengine_model_info.py +++ b/plugins/modules/gcp_mlengine_model_info.py @@ -52,6 +52,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -66,6 +67,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -84,6 +89,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -153,7 +160,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/plugins/modules/gcp_mlengine_version.py b/plugins/modules/gcp_mlengine_version.py index 5bb0620..e19fbe7 100644 --- a/plugins/modules/gcp_mlengine_version.py +++ b/plugins/modules/gcp_mlengine_version.py @@ -170,6 +170,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -184,6 +185,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used diff --git a/plugins/modules/gcp_mlengine_version_info.py b/plugins/modules/gcp_mlengine_version_info.py index da88e7b..ecf9281 100644 --- a/plugins/modules/gcp_mlengine_version_info.py +++ b/plugins/modules/gcp_mlengine_version_info.py @@ -62,6 +62,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -76,6 +77,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -94,6 +99,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -244,7 +251,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest, replace_resource_dict +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, replace_resource_dict import json ################################################################################ diff --git a/plugins/modules/gcp_pubsub_subscription.py b/plugins/modules/gcp_pubsub_subscription.py index 08edb64..f39583b 100644 --- a/plugins/modules/gcp_pubsub_subscription.py +++ b/plugins/modules/gcp_pubsub_subscription.py @@ -273,6 +273,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -287,6 +288,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -307,6 +312,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. diff --git a/plugins/modules/gcp_pubsub_subscription_info.py b/plugins/modules/gcp_pubsub_subscription_info.py index ee5cf64..b911131 100644 --- a/plugins/modules/gcp_pubsub_subscription_info.py +++ b/plugins/modules/gcp_pubsub_subscription_info.py @@ -52,6 +52,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -66,6 +67,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -84,6 +89,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -317,7 +324,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/plugins/modules/gcp_pubsub_topic.py b/plugins/modules/gcp_pubsub_topic.py index 673df49..28fdb08 100644 --- a/plugins/modules/gcp_pubsub_topic.py +++ b/plugins/modules/gcp_pubsub_topic.py @@ -117,6 +117,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -131,6 +132,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -151,6 +156,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -232,7 +239,6 @@ from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import ( GcpModule, GcpRequest, remove_nones_from_dict, - replace_resource_dict, ) import json import re diff --git a/plugins/modules/gcp_pubsub_topic_info.py b/plugins/modules/gcp_pubsub_topic_info.py index fa19401..0dc6f4e 100644 --- a/plugins/modules/gcp_pubsub_topic_info.py +++ b/plugins/modules/gcp_pubsub_topic_info.py @@ -52,6 +52,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -66,6 +67,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -84,6 +89,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -164,7 +171,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/plugins/modules/gcp_redis_instance.py b/plugins/modules/gcp_redis_instance.py index fe817c2..ac8724a 100644 --- a/plugins/modules/gcp_redis_instance.py +++ b/plugins/modules/gcp_redis_instance.py @@ -162,6 +162,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -176,6 +177,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -196,6 +201,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -401,7 +408,6 @@ from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import ( GcpModule, GcpRequest, remove_nones_from_dict, - replace_resource_dict, ) import json import time diff --git a/plugins/modules/gcp_redis_instance_info.py b/plugins/modules/gcp_redis_instance_info.py index 86b7d1c..33a9241 100644 --- a/plugins/modules/gcp_redis_instance_info.py +++ b/plugins/modules/gcp_redis_instance_info.py @@ -57,6 +57,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -71,6 +72,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -89,6 +94,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -275,7 +282,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/plugins/modules/gcp_resourcemanager_project.py b/plugins/modules/gcp_resourcemanager_project.py index 41664bf..cd2d099 100644 --- a/plugins/modules/gcp_resourcemanager_project.py +++ b/plugins/modules/gcp_resourcemanager_project.py @@ -103,6 +103,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -117,6 +118,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -134,7 +139,7 @@ EXAMPLES = ''' - name: create a project google.cloud.gcp_resourcemanager_project: name: My Sample Project - id: alextest-{{ 10000000000 | random }} + id: ansible-test-{{ 10000000000 | random }} auth_kind: serviceaccount service_account_file: "/tmp/auth.pem" parent: @@ -203,6 +208,8 @@ id: type: str ''' +ACTIVE = "ACTIVE" + ################################################################################ # Imports ################################################################################ @@ -213,7 +220,6 @@ from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import ( GcpModule, GcpRequest, remove_nones_from_dict, - replace_resource_dict, ) import json import time @@ -250,7 +256,7 @@ def main(): update(module, self_link(module)) fetch = fetch_resource(module, self_link(module)) changed = True - else: + elif fetch.get("lifecycleState") == ACTIVE: delete(module, self_link(module)) fetch = {} changed = True @@ -375,7 +381,7 @@ def async_op_url(module, extra_data=None): def wait_for_operation(module, response): op_result = return_if_object(module, response) - if op_result is None: + if not op_result: return {} status = navigate_hash(op_result, ['done']) wait_done = wait_for_completion(status, op_result, module) diff --git a/plugins/modules/gcp_resourcemanager_project_info.py b/plugins/modules/gcp_resourcemanager_project_info.py index ab7981e..7d97829 100644 --- a/plugins/modules/gcp_resourcemanager_project_info.py +++ b/plugins/modules/gcp_resourcemanager_project_info.py @@ -52,6 +52,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -66,6 +67,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -77,6 +82,11 @@ options: - This should not be set unless you know what you're doing. - This only alters the User Agent string for any API requests. type: str + page_size: + description: + - Indicates the number of projects that should be returned by the API + request + type: str notes: - for authentication, you can set service_account_file using the C(GCP_SERVICE_ACCOUNT_FILE) env variable. @@ -84,6 +94,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -96,6 +108,7 @@ EXAMPLES = ''' project: test_project auth_kind: serviceaccount service_account_file: "/tmp/auth.pem" + page_size: 100 ''' RETURN = ''' @@ -166,7 +179,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ @@ -175,7 +188,9 @@ import json def main(): - module = GcpModule(argument_spec=dict()) + module = GcpModule(argument_spec=dict( + page_size=dict(type='int') + )) if not module.params['scopes']: module.params['scopes'] = ['https://www.googleapis.com/auth/cloud-platform'] @@ -190,7 +205,10 @@ def collection(module): def fetch_list(module, link): auth = GcpSession(module, 'resourcemanager') - return auth.list(link, return_if_object, array_name='projects') + params = {} + if "page_size" in module.params: + params["pageSize"] = module.params.get("page_size") + return auth.list(link, return_if_object, array_name='projects', params=params) def return_if_object(module, response): diff --git a/plugins/modules/gcp_runtimeconfig_config.py b/plugins/modules/gcp_runtimeconfig_config.py index cad3c57..6fe439e 100644 --- a/plugins/modules/gcp_runtimeconfig_config.py +++ b/plugins/modules/gcp_runtimeconfig_config.py @@ -71,6 +71,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -85,6 +86,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -126,7 +131,7 @@ name: # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest, replace_resource_dict +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest import json import re diff --git a/plugins/modules/gcp_runtimeconfig_config_info.py b/plugins/modules/gcp_runtimeconfig_config_info.py index c1aa11b..063c1ce 100644 --- a/plugins/modules/gcp_runtimeconfig_config_info.py +++ b/plugins/modules/gcp_runtimeconfig_config_info.py @@ -52,6 +52,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -66,6 +67,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -84,6 +89,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -119,7 +126,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/plugins/modules/gcp_runtimeconfig_variable.py b/plugins/modules/gcp_runtimeconfig_variable.py index 6d8de23..8da8732 100644 --- a/plugins/modules/gcp_runtimeconfig_variable.py +++ b/plugins/modules/gcp_runtimeconfig_variable.py @@ -80,6 +80,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -94,6 +95,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -156,7 +161,7 @@ config: # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest, replace_resource_dict +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest import json import re diff --git a/plugins/modules/gcp_runtimeconfig_variable_info.py b/plugins/modules/gcp_runtimeconfig_variable_info.py index 7c882f6..ec1adb9 100644 --- a/plugins/modules/gcp_runtimeconfig_variable_info.py +++ b/plugins/modules/gcp_runtimeconfig_variable_info.py @@ -57,6 +57,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -71,6 +72,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -89,6 +94,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -135,7 +142,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/plugins/modules/gcp_secret_manager.py b/plugins/modules/gcp_secret_manager.py new file mode 100644 index 0000000..a02a402 --- /dev/null +++ b/plugins/modules/gcp_secret_manager.py @@ -0,0 +1,457 @@ +#!/usr/bin/python + +# GNU General Public License v3.0+ (see LICENSES/GPL-3.0-or-later.txt +# or https://www.gnu.org/licenses/gpl-3.0.txt) +# SPDX-License-Identifier: GPL-3.0-or-later + +################################################################################ +# Documentation +################################################################################ + + +from __future__ import absolute_import, division, print_function + +__metaclass__ = type + +ANSIBLE_METADATA = {'metadata_version': '1.1', 'status': ["preview"], 'supported_by': 'community'} + +DOCUMENTATION = ''' +--- +module: gcp_secret_manager +description: +- Access secrets stored in Google Secrets Manager. +- Create new secrets. +- Create new secret values. +- Add/remove versions of secrets. +- Please note that other features like etags, replication, annontation expected to be managed outside of Ansible. +short_description: Access and Update Google Cloud Secrets Manager objects +author: Dave Costakos @RedHat +requirements: +- python >= 2.6 +- requests >= 2.18.4 +- google-auth >= 1.3.0 +options: + project: + description: + - The Google Cloud Platform project to use. + type: str + auth_kind: + description: + - The type of credential used. + type: str + required: true + choices: + - application + - machineaccount + - serviceaccount + service_account_contents: + description: + - The contents of a Service Account JSON file, either in a dictionary or as a + JSON string that represents it. + type: jsonarg + service_account_file: + description: + - The path of a Service Account JSON file if serviceaccount is selected as type. + type: path + service_account_email: + description: + - An optional service account email address if machineaccount is selected and + the user does not wish to use the default email. + type: str + scopes: + description: + - Array of scopes to be used + type: list + elements: str + name: + description: + - Name of the secret to be used + type: str + required: true + aliases: + - key + - secret + - secret_id + value: + description: + - The secret value that the secret should have + - this will be set upon create + - If the secret value is not this, a new version will be added with this value + type: str + state: + description: + - whether the secret should exist + default: present + choices: + - absent + - present + type: str + return_value: + description: + - if true, the value of the secret will be returned unencrypted to Ansible + - if false, no value will be returned or decrypted + type: bool + default: true + version: + description: + - A version label to apply to the secret + - Default is "latest" which is the newest version of the secret + - The special "all" is also acceptable on delete (which will delete all versions of a secret) + type: str + default: latest + labels: + description: + - A set of key-value pairs to assign as labels to asecret + - only used in creation + - Note that the "value" piece of a label must contain only readable chars + type: dict +notes: +- 'API Reference: U(https://cloud.google.com/secret-manager/docs/reference/rests)' +- 'Official Documentation: U(https://cloud.google.com/secret-manager/docs/overview)' +- for authentication, you can set service_account_file using the C(GCP_SERVICE_ACCOUNT_FILE) + env variable. +- for authentication, you can set service_account_contents using the C(GCP_SERVICE_ACCOUNT_CONTENTS) + env variable. +- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) + env variable. +- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. +- For authentication, you can set scopes using the C(GCP_SCOPES) env variable. +- Environment variables values will only be used if the playbook values are not set. +- The I(service_account_email) and I(service_account_file) options are mutually exclusive. +''' + +EXAMPLES = r''' +- name: Create a new secret + google.cloud.gcp_secret_manager: + name: secret_key + value: super_secret + state: present + auth_kind: serviceaccount + service_account_file: service_account_creds.json + +- name: Ensure the secretexists, fail otherwise and return the value + google.cloud.gcp_secret_manager: + name: secret_key + state: present + +- name: Ensure secret exists but don't return the value + google.cloud.gcp_secret_manager: + name: secret_key + state: present + return_value: false + +- name: Add a new version of a secret + google.cloud.gcp_secret_manager: + name: secret_key + value: updated super secret + state: present + +- name: Delete version 1 of a secret (but not the secret itself) + google.cloud.gcp_secret_manager: + name: secret_key + version: 1 + state: absent + +- name: Delete all versions of a secret + google.cloud.gcp_secret_manager: + name: secret_key + version: all + state: absent + +- name: Create a secret with labels + google.cloud.gcp_secret_manager: + name: secret_key + value: super_secret + labels: + key_name: "ansible_rox" +''' + +RETURN = r''' +resources: + description: List of resources + returned: always + type: complex + name: + description: + - The name of the secret + returned: success + type: str + version: + description: + - the version number of the secret returned + returned: success + type: str + url: + description: + - the Google Cloud URL used to make the request + returned: success + type: str + status_code: + description: + - the HTTP status code of the response to Google Cloud + returned: success + type: str + msg: + description: + - A message indicating what was done (or not done) + returned: success, failure + type: str + value: + description: + - The decrypted secret value, please use care with this + returned: success + type: str + payload: + description: + - The base 64 secret payload including CRC for validation + retunred: success + type: dict +''' + +################################################################################ +# Imports +################################################################################ + +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import ( + navigate_hash, + GcpSession, + GcpModule +) + +# for decoding and validating secrets +import json +import base64 +import copy + + +def get_auth(module): + return GcpSession(module, 'secret-manager') + + +def self_access_link(module): + return "https://secretmanager.googleapis.com/v1/projects/{project}/secrets/{name}/versions/{calc_version}:access".format(**module.params) + + +def self_get_link(module): + return "https://secretmanager.googleapis.com/v1/projects/{project}/secrets/{name}/versions/{calc_version}".format(**module.params) + + +def self_update_link(module): + return "https://secretmanager.googleapis.com/v1/projects/{project}/secrets/{name}/versions/{calc_version:version}".format(**module.params) + + +def self_list_link(module): + return "https://secretmanager.googleapis.com/v1/projects/{project}/secrets/{name}/versions?filter=state:ENABLED".format(**module.params) + + +def self_delete_link(module): + return "https://secretmanager.googleapis.com/v1/projects/{project}/secrets/{name}".format(**module.params) + + +def fetch_resource(module, allow_not_found=True): + auth = get_auth(module) + # set version to the latest version because + # we can't be sure that "latest" is always going + # to be set if secret versions get disabled + # see https://issuetracker.google.com/issues/286489671 + if module.params['version'] == "latest" or module.params['version'] == 'all': + version_list = list_secret_versions(module) + latest_version = None + if version_list is None: + return None + + if "versions" in version_list: + versions_numbers = [] + for version in version_list['versions']: + versions_numbers.append(version['name'].split('/')[-1]) + latest_version = sorted(versions_numbers, key=int)[-1] + module.params['calc_version'] = latest_version + else: + # if this occurs, there are no available secret versions + # handle the corner case that we tried to delete + # a secret version that doesn't exist + if module.params['state'] == "absent": + return {"action": "delete_secret"} + + link = self_access_link(module) + access_obj = return_if_object(module, auth.get(link), allow_not_found) + if access_obj is None: + return None + link = self_get_link(module) + get_obj = return_if_object(module, auth.get(link), allow_not_found) + if get_obj is None: + return None + return merge_dicts(get_obj, access_obj) + + +def merge_dicts(x, y): + z = copy.deepcopy(x) + z.update(y) + return z + + +# create secret is a create call + an add version call +def create_secret(module): + # build the payload + payload = {"replication": {"automatic": {}}} + if module.params['labels']: + payload['labels'] = module.params['labels'] + + url = "https://secretmanager.googleapis.com/v1/projects/{project}/secrets".format(**module.params) + auth = get_auth(module) + post_response = auth.post(url, body=payload, params={'secretId': module.params['name']}) + # validate create + module.raise_for_status(post_response) + return update_secret(module) + + +def update_secret(module): + # build the payload + b64_value = base64.b64encode(module.params['value'].encode("utf-8")).decode("utf-8") + payload = { + u'payload': { + u'data': b64_value + } + } + auth = get_auth(module) + url = "https://secretmanager.googleapis.com/v1/projects/{project}/secrets/{name}:addVersion".format(**module.params) + return return_if_object(module, auth.post(url, payload), False) + + +def list_secret_versions(module): + # filter by only enabled secrets + url = self_list_link(module) + auth = get_auth(module) + return return_if_object(module, auth.get(url), True) + + +# technically we're destroying the version +def delete_secret(module, destroy_all=False): + # delete secret does not take "latest" as a default version + # get the latest version if it doesn't exist in the request + version = module.params['version'] + auth = get_auth(module) + if version.lower() == "all" or destroy_all: + url = self_delete_link(module) + return return_if_object(module, auth.delete(url)) + else: + url = self_get_link(module) + ":destroy" + return return_if_object(module, auth.post(url, {}), False) + + +def return_if_object(module, response, allow_not_found=False): + # If not found, return nothing. + if allow_not_found and response.status_code == 404: + return None + + if response.status_code == 409: + module.params['info'] = "exists already" + return None + + # probably a code error + if response.status_code == 400: + module.fail_json(msg="unexpected REST failure: %s" % response.json()['error']) + + # If no content, return nothing. + if response.status_code == 204: + return None + + try: + module.raise_for_status(response) + result = response.json() + result['url'] = response.request.url + result['status_code'] = response.status_code + if "name" in result: + result['version'] = result['name'].split("/")[-1] + result['name'] = result['name'].split("/")[3] + + # base64 decode the value + if "payload" in result and "data" in result['payload']: + result['value'] = base64.b64decode(result['payload']['data']).decode("utf-8") + + except getattr(json.decoder, 'JSONDecodeError', ValueError): + module.fail_json(msg="Invalid JSON response with error: %s" % response.text) + + if navigate_hash(result, ['error', 'errors']): + module.fail_json(msg=navigate_hash(result, ['error', 'errors'])) + + return result + + +def main(): + # limited support for parameters described in the "Secret" resource + # in order to simplify and deploy primary use cases + # expectation is customers needing to support additional capabilities + # in the SecretPayload will do so outside of Ansible. + # ref: https://cloud.google.com/secret-manager/docs/reference/rest/v1/projects.secrets#Secret + module = GcpModule( + argument_spec=dict( + state=dict(default='present', choices=['present', 'absent'], type='str'), + name=dict(required=True, type='str', aliases=['key', 'secret', 'secret_id']), + value=dict(required=False, type='str'), + version=dict(required=False, type='str', default='latest'), + return_value=dict(required=False, type='bool', default=True), + labels=dict(required=False, type='dict', default=dict()) + ) + ) + + if not module.params['scopes']: + module.params['scopes'] = ["https://www.googleapis.com/auth/cloud-platform"] + + module.params['calc_version'] = module.params['version'] + + state = module.params['state'] + fetch = fetch_resource(module, allow_not_found=True) + changed = False + + # nothing came back, so the secret doesn't exist + if not fetch: + # doesn't exist, must create + if module.params.get('value') and state == 'present': + # create a new secret + fetch = create_secret(module) + changed = True + # specified present but no value + # fail, let the user know + # that no secret could be created without a value to encrypt + elif state == 'present': + module.fail_json(msg="secret '{name}' not present in '{project}' and no value for the secret is provided".format(**module.params)) + + # secret is absent, success + else: + fetch = {"msg": "secret '{name}' in project '{project}' not present".format(**module.params)} + + else: + # delete the secret version (latest if no version is specified) + if state == "absent": + # delete the secret + fetch = delete_secret(module, ("action" in fetch)) + fetch['msg'] = "Secret Destroyed, it may take time to propagate" + changed = True + + # check to see if the values are the same, and update if neede + if "value" in fetch and module.params.get('value') is not None: + # Update secret + if fetch['value'] != module.params['value']: + update_secret(module) + changed = True + else: + fetch['msg'] = "values identical, no need to update secret" + + # pop value data if return_value == false + if module.params['return_value'] is False: + fetch.pop('value') + fetch.pop('payload') + if "msg" in fetch: + fetch['msg'] = "{} | not returning secret value since 'return_value is set to false".format(fetch['msg']) + else: + fetch['msg'] = "not returning secret value since 'return_value is set to false" + + fetch['changed'] = changed + fetch['name'] = module.params['name'] + + module.exit_json(**fetch) + + +if __name__ == "__main__": + main() diff --git a/plugins/modules/gcp_serviceusage_service.py b/plugins/modules/gcp_serviceusage_service.py index fff0d73..221f7b6 100644 --- a/plugins/modules/gcp_serviceusage_service.py +++ b/plugins/modules/gcp_serviceusage_service.py @@ -71,6 +71,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -85,6 +86,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -104,6 +109,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -186,7 +193,6 @@ from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import ( GcpModule, GcpRequest, remove_nones_from_dict, - replace_resource_dict, ) import json import re @@ -375,9 +381,13 @@ def wait_for_operation(module, response): def wait_for_completion(status, op_result, module): op_id = navigate_hash(op_result, ['name']) op_uri = async_op_url(module, {'op_id': op_id}) + sleep_time = 1.0 while not status: raise_if_errors(op_result, ['error'], module) - time.sleep(1.0) + time.sleep(sleep_time) + sleep_time *= 2 + if sleep_time > 10.0: + sleep_time = 10.0 op_result = fetch_resource(module, op_uri, False) status = navigate_hash(op_result, ['done']) return op_result diff --git a/plugins/modules/gcp_serviceusage_service_info.py b/plugins/modules/gcp_serviceusage_service_info.py index 7c57233..1c49512 100644 --- a/plugins/modules/gcp_serviceusage_service_info.py +++ b/plugins/modules/gcp_serviceusage_service_info.py @@ -52,6 +52,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -66,6 +67,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -84,6 +89,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -162,7 +169,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/plugins/modules/gcp_sourcerepo_repository.py b/plugins/modules/gcp_sourcerepo_repository.py index 4e902c1..178cee8 100644 --- a/plugins/modules/gcp_sourcerepo_repository.py +++ b/plugins/modules/gcp_sourcerepo_repository.py @@ -67,6 +67,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -81,6 +82,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -101,6 +106,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -141,7 +148,7 @@ size: # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest, replace_resource_dict +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest import json import re diff --git a/plugins/modules/gcp_sourcerepo_repository_info.py b/plugins/modules/gcp_sourcerepo_repository_info.py index a534ade..4a0d809 100644 --- a/plugins/modules/gcp_sourcerepo_repository_info.py +++ b/plugins/modules/gcp_sourcerepo_repository_info.py @@ -52,6 +52,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -66,6 +67,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -84,6 +89,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -126,7 +133,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/plugins/modules/gcp_spanner_database.py b/plugins/modules/gcp_spanner_database.py index 6a91c25..6c6bce9 100644 --- a/plugins/modules/gcp_spanner_database.py +++ b/plugins/modules/gcp_spanner_database.py @@ -97,6 +97,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -111,6 +112,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -131,6 +136,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -286,7 +293,7 @@ def extra_statements_update(module, request, response): def delete(module, link): auth = GcpSession(module, 'spanner') - return wait_for_operation(module, auth.delete(link)) + return return_if_object(module, auth.delete(link)) def resource_to_request(module): diff --git a/plugins/modules/gcp_spanner_database_info.py b/plugins/modules/gcp_spanner_database_info.py index 2f11f1c..2f45553 100644 --- a/plugins/modules/gcp_spanner_database_info.py +++ b/plugins/modules/gcp_spanner_database_info.py @@ -62,6 +62,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -76,6 +77,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -94,6 +99,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -151,7 +158,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest, replace_resource_dict +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, replace_resource_dict import json ################################################################################ diff --git a/plugins/modules/gcp_spanner_instance.py b/plugins/modules/gcp_spanner_instance.py index 8458042..deb212f 100644 --- a/plugins/modules/gcp_spanner_instance.py +++ b/plugins/modules/gcp_spanner_instance.py @@ -100,6 +100,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -114,6 +115,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -134,6 +139,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -202,7 +209,7 @@ labels: # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest, replace_resource_dict +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest import json import time diff --git a/plugins/modules/gcp_spanner_instance_info.py b/plugins/modules/gcp_spanner_instance_info.py index 1fc5fce..90e25dd 100644 --- a/plugins/modules/gcp_spanner_instance_info.py +++ b/plugins/modules/gcp_spanner_instance_info.py @@ -52,6 +52,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -66,6 +67,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -84,6 +89,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -149,7 +156,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/plugins/modules/gcp_sql_database.py b/plugins/modules/gcp_sql_database.py index c43673d..685ffee 100644 --- a/plugins/modules/gcp_sql_database.py +++ b/plugins/modules/gcp_sql_database.py @@ -87,6 +87,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -101,6 +102,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -176,7 +181,7 @@ instance: # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest, replace_resource_dict +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest import json import time diff --git a/plugins/modules/gcp_sql_database_info.py b/plugins/modules/gcp_sql_database_info.py index 4938076..dfc9bc9 100644 --- a/plugins/modules/gcp_sql_database_info.py +++ b/plugins/modules/gcp_sql_database_info.py @@ -57,6 +57,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -71,6 +72,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -89,6 +94,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -142,7 +149,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/plugins/modules/gcp_sql_instance.py b/plugins/modules/gcp_sql_instance.py index bb19ecf..9f18a2f 100644 --- a/plugins/modules/gcp_sql_instance.py +++ b/plugins/modules/gcp_sql_instance.py @@ -370,6 +370,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -384,6 +385,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -809,7 +814,6 @@ from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import ( GcpModule, GcpRequest, remove_nones_from_dict, - replace_resource_dict, ) import json import time diff --git a/plugins/modules/gcp_sql_instance_info.py b/plugins/modules/gcp_sql_instance_info.py index 71d09d2..afbc7c3 100644 --- a/plugins/modules/gcp_sql_instance_info.py +++ b/plugins/modules/gcp_sql_instance_info.py @@ -52,6 +52,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -66,6 +67,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -84,6 +89,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -503,7 +510,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/plugins/modules/gcp_sql_ssl_cert.py b/plugins/modules/gcp_sql_ssl_cert.py index 96e9cc1..02519b3 100644 --- a/plugins/modules/gcp_sql_ssl_cert.py +++ b/plugins/modules/gcp_sql_ssl_cert.py @@ -88,7 +88,10 @@ options: sha1_fingerprint: description: - The SHA-1 of the certificate. - required: true + type: str + private_key: + description: + - The private key associated with the certificate. type: str project: description: @@ -103,6 +106,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -117,6 +121,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -193,6 +201,11 @@ sha1Fingerprint: - The SHA-1 of the certificate. returned: success type: str +privateKey: + description: + - The private key associated with the certificate. + returned: success + type: str ''' ################################################################################ @@ -220,7 +233,8 @@ def main(): create_time=dict(type='str'), expiration_time=dict(type='str'), instance=dict(required=True, type='dict'), - sha1_fingerprint=dict(required=True, type='str'), + sha1_fingerprint=dict(type='str'), + private_key=dict(type='str'), ) ) @@ -257,12 +271,11 @@ def main(): def create(module, link, kind): auth = GcpSession(module, 'sql') - return wait_for_operation(module, auth.post(link, resource_to_request(module))) + return wait_for_create_operation(module, auth.post(link, resource_to_request(module))) def update(module, link, kind): - auth = GcpSession(module, 'sql') - return wait_for_operation(module, auth.put(link, resource_to_request(module))) + module.fail_json(msg="SQL certificates cannot be modified") def delete(module, link, kind): @@ -293,7 +306,8 @@ def fetch_resource(module, link, kind, allow_not_found=True): def self_link(module): - res = {'project': module.params['project'], 'instance': replace_resource_dict(module.params['instance'], 'name')} + res = {'project': module.params['project'], 'instance': replace_resource_dict(module.params['instance'], 'name'), + 'sha1_fingerprint': module.params['sha1_fingerprint']} return "https://sqladmin.googleapis.com/sql/v1beta4/projects/{project}/instances/{instance}/sslCerts/{sha1_fingerprint}".format(**res) @@ -362,6 +376,31 @@ def async_op_url(module, extra_data=None): return url.format(**combined) +# The create response includes the certificate, but it's not usable until +# the operation completes. The create response is also the only place the +# private key is available, so return the newly created resource directly. +def wait_for_create_operation(module, response): + op_result = return_if_object(module, response, 'sql#operation') + if op_result is None: + return {} + status = navigate_hash(op_result, ['operation', 'status']) + wait_done = wait_for_create_completion(status, op_result, module) + res = navigate_hash(op_result, ['clientCert', 'certInfo']) + res.update({'privateKey': navigate_hash(op_result, ['clientCert', 'certPrivateKey'])}) + return res + + +def wait_for_create_completion(status, op_result, module): + op_id = navigate_hash(op_result, ['operation', 'name']) + op_uri = async_op_url(module, {'op_id': op_id}) + while status != 'DONE': + raise_if_errors(op_result, ['error', 'errors'], module) + time.sleep(1.0) + op_result = fetch_resource(module, op_uri, 'sql#operation', False) + status = navigate_hash(op_result, ['status']) + return op_result + + def wait_for_operation(module, response): op_result = return_if_object(module, response, 'sql#operation') if op_result is None: diff --git a/plugins/modules/gcp_sql_user.py b/plugins/modules/gcp_sql_user.py index d7e211a..ca2cbf4 100644 --- a/plugins/modules/gcp_sql_user.py +++ b/plugins/modules/gcp_sql_user.py @@ -87,6 +87,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -101,6 +102,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used diff --git a/plugins/modules/gcp_sql_user_info.py b/plugins/modules/gcp_sql_user_info.py index dfb3e08..762a735 100644 --- a/plugins/modules/gcp_sql_user_info.py +++ b/plugins/modules/gcp_sql_user_info.py @@ -62,6 +62,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -76,6 +77,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -94,6 +99,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -142,7 +149,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest, replace_resource_dict +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, replace_resource_dict import json ################################################################################ diff --git a/plugins/modules/gcp_storage_bucket.py b/plugins/modules/gcp_storage_bucket.py index f9bad46..18645d9 100644 --- a/plugins/modules/gcp_storage_bucket.py +++ b/plugins/modules/gcp_storage_bucket.py @@ -414,6 +414,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -428,6 +429,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used diff --git a/plugins/modules/gcp_storage_bucket_access_control.py b/plugins/modules/gcp_storage_bucket_access_control.py index c6d36a8..b2b1ea7 100644 --- a/plugins/modules/gcp_storage_bucket_access_control.py +++ b/plugins/modules/gcp_storage_bucket_access_control.py @@ -95,6 +95,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -109,6 +110,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -129,6 +134,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. diff --git a/plugins/modules/gcp_storage_default_object_acl.py b/plugins/modules/gcp_storage_default_object_acl.py index 8a3b538..5bfea2f 100644 --- a/plugins/modules/gcp_storage_default_object_acl.py +++ b/plugins/modules/gcp_storage_default_object_acl.py @@ -60,11 +60,6 @@ options: bucket: description: - The name of the bucket. - - 'This field represents a link to a Bucket resource in GCP. It can be specified - in two ways. First, you can place a dictionary with key ''name'' and value of - your resource''s name Alternatively, you can add `register: name-of-resource` - to a gcp_storage_bucket task and then set this bucket field to "{{ name-of-resource - }}"' required: true type: dict entity: @@ -75,11 +70,6 @@ options: * project-team-{{projectId}} * allUsers * allAuthenticatedUsers .' required: true type: str - object: - description: - - The name of the object, if applied to an object. - required: false - type: str role: description: - The access permission for the entity. @@ -99,6 +89,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -113,6 +104,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -133,6 +128,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -188,21 +185,6 @@ entityId: - The ID for the entity. returned: success type: str -generation: - description: - - The content generation of the object, if applied to an object. - returned: success - type: int -id: - description: - - The ID of the access-control entry. - returned: success - type: str -object: - description: - - The name of the object, if applied to an object. - returned: success - type: str projectTeam: description: - The project team associated with the entity. @@ -264,10 +246,7 @@ def main(): state = module.params['state'] kind = 'storage#objectAccessControl' - if module.params['id']: - fetch = fetch_resource(module, self_link(module), kind) - else: - fetch = {} + fetch = fetch_resource(module, self_link(module), kind) changed = False if fetch: @@ -386,9 +365,6 @@ def response_to_hash(module, response): u'email': response.get(u'email'), u'entity': response.get(u'entity'), u'entityId': response.get(u'entityId'), - u'generation': response.get(u'generation'), - u'id': response.get(u'id'), - u'object': response.get(u'object'), u'projectTeam': DefaultObjectACLProjectteam(response.get(u'projectTeam', {}), module).from_response(), u'role': response.get(u'role'), } diff --git a/plugins/modules/gcp_storage_object.py b/plugins/modules/gcp_storage_object.py index a6f4b14..1411d0f 100644 --- a/plugins/modules/gcp_storage_object.py +++ b/plugins/modules/gcp_storage_object.py @@ -28,7 +28,7 @@ requirements: - python >= 2.6 - requests >= 2.18.4 - google-auth >= 1.3.0 -- google-cloud-storage >= 1.2..0 +- google-cloud-storage >= 1.2.0 options: action: description: @@ -43,11 +43,12 @@ options: src: description: - Source location of file (may be local machine or cloud depending on action). Cloud locations need to be urlencoded including slashes. - required: false + required: true type: path dest: description: - Destination location of file (may be local machine or cloud depending on action). Cloud location need to be urlencoded including slashes. + Required for upload and download. required: false type: path bucket: @@ -68,6 +69,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -82,6 +84,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -96,7 +102,7 @@ options: """ EXAMPLES = """ -- name: create a object +- name: Download an object google.cloud.gcp_storage_object: action: download bucket: ansible-bucket @@ -105,7 +111,6 @@ EXAMPLES = """ project: test_project auth_kind: serviceaccount service_account_file: "/tmp/auth.pem" - state: present """ RETURN = """ @@ -146,17 +151,10 @@ storage_class: ################################################################################ from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import ( - navigate_hash, GcpSession, GcpModule, - GcpRequest, - replace_resource_dict, ) -import json import os -import mimetypes -import hashlib -import base64 try: import google.cloud @@ -184,6 +182,11 @@ def main(): ) ) + if module.params["action"] == "upload" and module.params["dest"] is None: + module.fail_json( + msg="`dest` parameter is None: `dest` is required for the upload operation" + ) + if not HAS_GOOGLE_STORAGE_LIBRARY: module.fail_json(msg="Please install the google-cloud-storage Python library") @@ -194,11 +197,12 @@ def main(): creds = GcpSession(module, "storage")._credentials() client = storage.Client( - project=module.params['project'], - credentials=creds, client_info=ClientInfo(user_agent="Google-Ansible-MM-object") + project=module.params["project"], + credentials=creds, + client_info=ClientInfo(user_agent="Google-Ansible-MM-object"), ) - bucket = client.get_bucket(module.params['bucket']) + bucket = client.get_bucket(module.params["bucket"]) remote_file_exists = Blob(remote_file_path(module), bucket).exists() local_file_exists = os.path.isfile(local_file_path(module)) @@ -238,7 +242,7 @@ def main(): def download_file(module, client, name, dest): try: - bucket = client.get_bucket(module.params['bucket']) + bucket = client.get_bucket(module.params["bucket"]) blob = Blob(name, bucket) with open(dest, "wb") as file_obj: blob.download_to_file(file_obj) @@ -249,7 +253,7 @@ def download_file(module, client, name, dest): def upload_file(module, client, src, dest): try: - bucket = client.get_bucket(module.params['bucket']) + bucket = client.get_bucket(module.params["bucket"]) blob = Blob(dest, bucket) with open(src, "rb") as file_obj: blob.upload_from_file(file_obj) @@ -260,7 +264,7 @@ def upload_file(module, client, src, dest): def delete_file(module, client, name): try: - bucket = client.get_bucket(module.params['bucket']) + bucket = client.get_bucket(module.params["bucket"]) blob = Blob(name, bucket) blob.delete() return {} @@ -286,14 +290,12 @@ def remote_file_path(module): def blob_to_dict(blob): return { - 'bucket': { - 'name': blob.bucket.path - }, - 'cache_control': blob.cache_control, - 'chunk_size': blob.chunk_size, - 'media_link': blob.media_link, - 'self_link': blob.self_link, - 'storage_class': blob.storage_class + "bucket": {"name": blob.bucket.path}, + "cache_control": blob.cache_control, + "chunk_size": blob.chunk_size, + "media_link": blob.media_link, + "self_link": blob.self_link, + "storage_class": blob.storage_class, } diff --git a/plugins/modules/gcp_tpu_node.py b/plugins/modules/gcp_tpu_node.py index 8a7e11f..32d599e 100644 --- a/plugins/modules/gcp_tpu_node.py +++ b/plugins/modules/gcp_tpu_node.py @@ -130,6 +130,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -144,6 +145,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -164,6 +169,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -290,7 +297,6 @@ from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import ( GcpModule, GcpRequest, remove_nones_from_dict, - replace_resource_dict, ) import json import time diff --git a/plugins/modules/gcp_tpu_node_info.py b/plugins/modules/gcp_tpu_node_info.py index cd27a67..a01d08a 100644 --- a/plugins/modules/gcp_tpu_node_info.py +++ b/plugins/modules/gcp_tpu_node_info.py @@ -57,6 +57,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -71,6 +72,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -89,6 +94,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -211,7 +218,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/requirements-test.txt b/requirements-test.txt new file mode 100644 index 0000000..ce44d15 --- /dev/null +++ b/requirements-test.txt @@ -0,0 +1,3 @@ +pytest +pytest-forked +pytest-xdist \ No newline at end of file diff --git a/requirements.txt b/requirements.txt index 8840a83..fef75ca 100644 --- a/requirements.txt +++ b/requirements.txt @@ -1,2 +1,3 @@ requests google-auth +google-cloud-storage diff --git a/roles/gcloud/LICENSE b/roles/gcloud/LICENSE deleted file mode 100644 index 616fc1e..0000000 --- a/roles/gcloud/LICENSE +++ /dev/null @@ -1,21 +0,0 @@ -MIT License - -Copyright (c) 2019 Eric Anderson - -Permission is hereby granted, free of charge, to any person obtaining a copy -of this software and associated documentation files (the "Software"), to deal -in the Software without restriction, including without limitation the rights -to use, copy, modify, merge, publish, distribute, sublicense, and/or sell -copies of the Software, and to permit persons to whom the Software is -furnished to do so, subject to the following conditions: - -The above copyright notice and this permission notice shall be included in all -copies or substantial portions of the Software. - -THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR -IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, -FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE -AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER -LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, -OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE -SOFTWARE. diff --git a/roles/gcloud/README.md b/roles/gcloud/README.md index dfc365a..8c6b83a 100644 --- a/roles/gcloud/README.md +++ b/roles/gcloud/README.md @@ -1,6 +1,4 @@ -# ericsysmin.gcloud - -[![Build Status](https://travis-ci.org/ericsysmin/ansible-role-gcloud.svg?branch=master)](https://travis-ci.org/ericsysmin/ansible-role-gcloud) +# google.cloud.gcloud This role installs the gcloud command-line tool on a linux system. @@ -48,7 +46,7 @@ All variables which can be overridden are stored in defaults/main.yml file as we ```yaml - hosts: servers roles: - - role: ericsysmin.gcloud + - role: google.cloud.gcloud ``` ## License diff --git a/roles/gcloud/defaults/main.yml b/roles/gcloud/defaults/main.yml index b5c4534..deeec69 100644 --- a/roles/gcloud/defaults/main.yml +++ b/roles/gcloud/defaults/main.yml @@ -5,7 +5,7 @@ gcloud_install_type: package # default values for gcloud apt installation gcloud_apt_key: https://packages.cloud.google.com/apt/doc/apt-key.gpg gcloud_apt_url: http://packages.cloud.google.com/apt -gcloud_apt_repo: cloud-sdk-{{ ansible_distribution_release }} +gcloud_apt_repo: cloud-sdk # default values for gcloud yum installation gcloud_yum_baseurl: https://packages.cloud.google.com/yum/repos/cloud-sdk-el7-x86_64 diff --git a/roles/gcloud/meta/main.yml b/roles/gcloud/meta/main.yml index 50918c4..049ed0e 100644 --- a/roles/gcloud/meta/main.yml +++ b/roles/gcloud/meta/main.yml @@ -3,9 +3,8 @@ galaxy_info: role_name: gcloud author: Eric Anderson description: Ansible role to install google-cloud-sdk - company: Avi Networks - license: MIT - min_ansible_version: 2.4 + license: GPL-3.0 + min_ansible_version: "2.9" platforms: - name: Ubuntu versions: diff --git a/roles/gcloud/tasks/archive/archive_install.yml b/roles/gcloud/tasks/archive/archive_install.yml index b1a6606..5f06230 100644 --- a/roles/gcloud/tasks/archive/archive_install.yml +++ b/roles/gcloud/tasks/archive/archive_install.yml @@ -1,18 +1,21 @@ --- -- name: gcloud | Archive | Ensure temp path exists - file: path={{ gcloud_archive_path }} state=directory +- name: Gcloud | Archive | Ensure temp path exists + ansible.builtin.file: + path: "{{ gcloud_archive_path }}" + state: directory + mode: "0755" -- name: gcloud | Archive | Extract Cloud SDK archive - unarchive: +- name: Gcloud | Archive | Extract Cloud SDK archive + ansible.builtin.unarchive: src: "{{ gcloud_archive_url }}" dest: "{{ gcloud_archive_path }}" - remote_src: yes + remote_src: true creates: "{{ gcloud_library_path }}" -- name: gcloud | Archive | Link binaries to /usr/bin (like package install) - file: +- name: Gcloud | Archive | Link binaries to /usr/bin (like package install) + ansible.builtin.file: src: "{{ gcloud_library_path }}/bin/{{ item }}" - dest: "/usr/bin/{{ item }}" + dest: /usr/bin/{{ item }} state: link loop: - bq @@ -22,12 +25,13 @@ - gsutil when: not gcloud_install_script -- name: gcloud | Archive | Add command completion - include_tasks: command_completion.yml +- name: Gcloud | Archive | Add command completion + ansible.builtin.include_tasks: command_completion.yml when: gcloud_command_completion -- name: gcloud | Archive | Install into Path - command: >- +- name: Gcloud | Archive | Install into Path + changed_when: false + ansible.builtin.command: >- {{ gcloud_archive_path }}/install.sh --quiet --usage-reporting {{ gcloud_usage_reporting | lower }} {% if gcloud_profile_path %} @@ -37,7 +41,7 @@ --path-update {{ gcloud_update_path | lower }} {% if gcloud_override_components | length > 0 %}--override-components {% for component in gcloud_override_components %}{{ component }} - {% if loop.index < gcloud_override_components | length %} + {% if loop.index < gcloud_override_components | length %} {% endif %} {% endfor %} {% endif %} diff --git a/roles/gcloud/tasks/archive/command_completion.yml b/roles/gcloud/tasks/archive/command_completion.yml index 866dbfb..a130e33 100644 --- a/roles/gcloud/tasks/archive/command_completion.yml +++ b/roles/gcloud/tasks/archive/command_completion.yml @@ -1,15 +1,16 @@ --- # task file to configure bash completion for gcloud -- name: gcloud | Archive | Debian | Ensure bash completion is installed - apt: name=bash-completion +- name: Gcloud | Archive | Debian | Ensure bash completion is installed + ansible.builtin.apt: + name: bash-completion register: task_result until: task_result is success retries: 10 delay: 2 when: ansible_os_family == "Debian" -- name: gcloud | Archive | RedHat | Ensure bash completion is installed - yum: +- name: Gcloud | Archive | RedHat | Ensure bash completion is installed + ansible.builtin.dnf: name: - bash-completion register: task_result @@ -18,15 +19,16 @@ delay: 2 when: ansible_os_family == "RedHat" -- name: gcloud | Archive | Ensure bash_completion.d directory exists - file: +- name: Gcloud | Archive | Ensure bash_completion.d directory exists + ansible.builtin.file: path: /etc/bash_completion.d owner: root group: root state: directory + mode: "0755" -- name: gcloud | Archive | Link binaries to /usr/bin (like package install) - file: +- name: Gcloud | Archive | Link binaries to /usr/bin (like package install) + ansible.builtin.file: src: "{{ gcloud_library_path }}/completion.bash.inc" dest: /etc/bash_completion.d/gcloud state: link diff --git a/roles/gcloud/tasks/archive/main.yml b/roles/gcloud/tasks/archive/main.yml index 7fff493..49eb872 100644 --- a/roles/gcloud/tasks/archive/main.yml +++ b/roles/gcloud/tasks/archive/main.yml @@ -1,37 +1,40 @@ --- # tasks to install gcloud via archive -- name: gcloud | Archive | Look for existing Google Cloud SDK installation - stat: +- name: Gcloud | Archive | Look for existing Google Cloud SDK installation + ansible.builtin.stat: path: "{{ gcloud_archive_path }}/google-cloud-sdk/VERSION" register: gcloud_status -- debug: var=gcloud_status +- name: Gcloud | Archive | Get gcloud_status + ansible.builtin.debug: + var: gcloud_status -- name: gcloud | Archive | Set installed version if installation exists +- name: Gcloud | Archive | Set installed version if installation exists + when: gcloud_status.stat.exists block: - - name: gcloud | Archive | Importing contents of {{ gcloud_archive_path }}/google-cloud-sdk/VERSION - slurp: + - name: Gcloud | Archive | Importing contents of ./google-cloud-sdk/VERSION in {{ gcloud_archive_path }} + ansible.builtin.slurp: src: "{{ gcloud_archive_path }}/google-cloud-sdk/VERSION" register: gcloud_installed_version_data - - name: gcloud | Archive | Setting the gcloud_installed_version variable/fact - set_fact: - gcloud_installed_version: "{{ (gcloud_installed_version_data.content|b64decode|trim) }}" - - debug: + - name: Gcloud | Archive | Setting the gcloud_installed_version variable/fact + ansible.builtin.set_fact: + gcloud_installed_version: "{{ (gcloud_installed_version_data.content | b64decode | trim) }}" + - name: Gcloud | Archive | get the gcloud_installed_version + ansible.builtin.debug: msg: "google-cloud-sdk: {{ gcloud_installed_version }} is installed" - - debug: + - name: Gcloud | Archive | Version already installed + when: gcloud_version == gcloud_installed_version + ansible.builtin.debug: msg: >- Skipping installation of google-cloud-sdk version {{ gcloud_version }} when {{ gcloud_installed_version }} is already installed. - when: gcloud_version == gcloud_installed_version - when: gcloud_status.stat.exists -- name: gcloud | Archive | Start installation - include_tasks: archive_install.yml - when: gcloud_installed_version is undefined or - gcloud_version is version(gcloud_installed_version, '>') +- name: Gcloud | Archive | Start installation + when: gcloud_installed_version is undefined or gcloud_version is version(gcloud_installed_version, '>') + ansible.builtin.include_tasks: archive_install.yml -- name: gcloud | Debian | Install the google-cloud-sdk additional components # noqa 301 - command: gcloud components install {{ item }} +- name: Gcloud | Debian | Install the google-cloud-sdk additional components # noqa no-changed-when + ansible.builtin.command: gcloud components install {{ item }} register: gcloud_install_comp_status changed_when: "'All components are up to date.' not in gcloud_install_comp_status.stderr_lines" loop: "{{ gcloud_additional_components }}" diff --git a/roles/gcloud/tasks/main.yml b/roles/gcloud/tasks/main.yml index 090852f..c7b646d 100644 --- a/roles/gcloud/tasks/main.yml +++ b/roles/gcloud/tasks/main.yml @@ -1,15 +1,14 @@ --- - -- name: gcloud | Load Distro and OS specific variables - include_vars: "{{ lookup('first_found', params) }}" +- name: Gcloud | Load Distro and OS specific variables + ansible.builtin.include_vars: "{{ lookup('first_found', params) }}" vars: params: files: - - "os/{{ ansible_distribution|lower }}.yml" - - "os/{{ ansible_os_family|lower }}.yml" + - os/{{ ansible_distribution | lower }}.yml + - os/{{ ansible_os_family | lower }}.yml - main.yml paths: - - 'vars' + - vars -- name: gcloud | Install the google-cloud-sdk from {{ gcloud_install_type }} - include_tasks: "{{ gcloud_install_type }}/main.yml" +- name: Gcloud | Install the google-cloud-sdk from {{ gcloud_install_type }} + ansible.builtin.include_tasks: "{{ gcloud_install_type }}/main.yml" diff --git a/roles/gcloud/tasks/package/debian.yml b/roles/gcloud/tasks/package/debian.yml index f38df34..726c79e 100644 --- a/roles/gcloud/tasks/package/debian.yml +++ b/roles/gcloud/tasks/package/debian.yml @@ -1,25 +1,29 @@ --- # tasks that install gcloud on debian -- name: gcloud | Debian | Add an Apt signing key, uses whichever key is at the URL - apt_key: +- name: Gcloud | Debian | Add an Apt signing key, uses whichever key is at the URL + ansible.builtin.apt_key: url: "{{ gcloud_apt_key }}" state: present -- name: gcloud | Debian | Add the gcloud repository - apt_repository: - repo: "deb {{ gcloud_apt_url }} {{ gcloud_apt_repo }} main" +- name: Gcloud | Debian | Add the gcloud repository + ansible.builtin.apt_repository: + repo: deb {{ gcloud_apt_url }} {{ gcloud_apt_repo }} main state: present filename: google-cloud-sdk -- name: gcloud | Debian | Install the google-cloud-sdk package - apt: name=google-cloud-sdk update_cache=yes +- name: Gcloud | Debian | Install the google-cloud-sdk package + ansible.builtin.apt: + name: google-cloud-sdk + update_cache: "yes" register: task_result until: task_result is success retries: 10 delay: 2 -- name: gcloud | Debian | Install the google-cloud-sdk additional components - apt: name=google-cloud-sdk-{{ item }} update_cache=yes +- name: Gcloud | Debian | Install the google-cloud-sdk additional components + ansible.builtin.apt: + name: google-cloud-sdk-{{ item }} + update_cache: "yes" register: task_result until: task_result is success retries: 10 diff --git a/roles/gcloud/tasks/package/main.yml b/roles/gcloud/tasks/package/main.yml index c9b64ee..61bf28a 100644 --- a/roles/gcloud/tasks/package/main.yml +++ b/roles/gcloud/tasks/package/main.yml @@ -1,5 +1,5 @@ --- # tasks file for gcloud -- name: gcloud | Start package installation for specific distro - include_tasks: "{{ ansible_os_family|lower }}.yml" +- name: Gcloud | Start package installation for specific distro + ansible.builtin.include_tasks: "{{ ansible_os_family | lower }}.yml" diff --git a/roles/gcloud/tasks/package/redhat.yml b/roles/gcloud/tasks/package/redhat.yml index 1a8a17c..156d545 100644 --- a/roles/gcloud/tasks/package/redhat.yml +++ b/roles/gcloud/tasks/package/redhat.yml @@ -1,26 +1,29 @@ --- -- name: gcloud | RHEL | Add an Apt signing key, uses whichever key is at the URL - yum_repository: +# https://cloud.google.com/sdk/docs/install#rpm +- name: Gcloud | RHEL | Add a dnf signing key, uses whichever key is at the URL + ansible.builtin.yum_repository: name: google-cloud-sdk description: Google Cloud SDK - file: google-cloud-sdk - baseurl: https://packages.cloud.google.com/yum/repos/cloud-sdk-el7-x86_64 - enabled: yes - gpgcheck: yes - repo_gpgcheck: yes + baseurl: https://packages.cloud.google.com/yum/repos/cloud-sdk-el9-x86_64 + enabled: true + gpgcheck: true + repo_gpgcheck: false gpgkey: - - https://packages.cloud.google.com/yum/doc/yum-key.gpg - https://packages.cloud.google.com/yum/doc/rpm-package-key.gpg -- name: gcloud | RHEL | Install the google-cloud-sdk package - yum: name=google-cloud-sdk update_cache=yes +- name: Gcloud | RHEL | Install the google-cloud-sdk package + ansible.builtin.dnf: + name: google-cloud-sdk + update_cache: "yes" register: task_result until: task_result is success retries: 10 delay: 2 -- name: gcloud | Debian | Install the google-cloud-sdk additional components - yum: name=google-cloud-sdk-{{ item }} update_cache=yes +- name: Gcloud | Debian | Install the google-cloud-sdk additional components + ansible.builtin.dnf: + name: google-cloud-sdk-{{ item }} + update_cache: "yes" register: task_result until: task_result is success retries: 10 diff --git a/roles/gcp_http_lb/README.md b/roles/gcp_http_lb/README.md index 901de6e..89cbf69 100644 --- a/roles/gcp_http_lb/README.md +++ b/roles/gcp_http_lb/README.md @@ -14,8 +14,8 @@ Role Variables ``` gcp_http_lb_backend: the selflink for the backend that this load balancer will be supporting - gcp_project: the name of your gcp project - service_account_file: the path to your service account JSON file + gcp_http_lb_gcp_project: the name of your gcp project + gcp_http_lb_service_account_file: the path to your service account JSON file ``` Example Playbook diff --git a/roles/gcp_http_lb/defaults/main.yml b/roles/gcp_http_lb/defaults/main.yml index f705f01..11f0870 100644 --- a/roles/gcp_http_lb/defaults/main.yml +++ b/roles/gcp_http_lb/defaults/main.yml @@ -2,13 +2,13 @@ # defaults file for gcp-http-lb gcp_http_lb_state: present gcp_http_lb_cdn: true -gcp_http_lb_name_prefix: 'gcp' +gcp_http_lb_name_prefix: gcp # Name schemes for resources being created -gcp_http_lb_globaladdress: "{{gcp_lb_name_prefix}}-globaladdress" -gcp_http_lb_instancegroup: "{{gcp_lb_name_prefix}}-instancegroup" -gcp_http_lb_healthcheck: "{{gcp_lb_name_prefix}}-healthcheck" -gcp_http_lb_backendservice: "{{gcp_lb_name_prefix}}-backendservice" -gcp_http_lb_urlmap: "{{gcp_lb_name_prefix}}-urlmap" -gcp_http_lb_httpproxy: "{{gcp_lb_name_prefix}}-httpproxy" -gcp_http_lb_forwardingrule: "{{gcp_lb_name_prefix}}-forwardingrule" +gcp_http_lb_globaladdress: "{{ gcp_lb_name_prefix }}-globaladdress" +gcp_http_lb_instancegroup: "{{ gcp_lb_name_prefix }}-instancegroup" +gcp_http_lb_healthcheck: "{{ gcp_lb_name_prefix }}-healthcheck" +gcp_http_lb_backendservice: "{{ gcp_lb_name_prefix }}-backendservice" +gcp_http_lb_urlmap: "{{ gcp_lb_name_prefix }}-urlmap" +gcp_http_lb_httpproxy: "{{ gcp_lb_name_prefix }}-httpproxy" +gcp_http_lb_forwardingrule: "{{ gcp_lb_name_prefix }}-forwardingrule" diff --git a/roles/gcp_http_lb/meta/main.yml b/roles/gcp_http_lb/meta/main.yml index 9ee9104..98cccc5 100644 --- a/roles/gcp_http_lb/meta/main.yml +++ b/roles/gcp_http_lb/meta/main.yml @@ -1,3 +1,4 @@ +--- galaxy_info: author: googlecloudplatform description: Create a HTTP Load Balancer on GCP @@ -16,7 +17,7 @@ galaxy_info: # - CC-BY license: GPLv3 - min_ansible_version: 2.7 + min_ansible_version: "2.7" # If this a Container Enabled role, provide the minimum Ansible Container version. # min_ansible_container_version: @@ -47,12 +48,12 @@ galaxy_info: # - 99.99 galaxy_tags: [] - # List tags for your role here, one per line. A tag is a keyword that describes - # and categorizes the role. Users find roles by searching for tags. Be sure to - # remove the '[]' above, if you add tags to this list. - # - # NOTE: A tag is limited to a single word comprised of alphanumeric characters. - # Maximum 20 tags per role. +# List tags for your role here, one per line. A tag is a keyword that describes +# and categorizes the role. Users find roles by searching for tags. Be sure to +# remove the '[]' above, if you add tags to this list. +# +# NOTE: A tag is limited to a single word comprised of alphanumeric characters. +# Maximum 20 tags per role. dependencies: [] # List your role dependencies here, one per line. Be sure to remove the '[]' above, diff --git a/roles/gcp_http_lb/tasks/main.yml b/roles/gcp_http_lb/tasks/main.yml index 8ed8f4d..67826df 100644 --- a/roles/gcp_http_lb/tasks/main.yml +++ b/roles/gcp_http_lb/tasks/main.yml @@ -1,65 +1,65 @@ --- -- name: create a global address for the load balancer. - gcp_compute_global_address: - name: "{{ gcp_http_lb_globaladdress }}" - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - state: "{{ gcp_http_lb_state }}" +- name: Create a global address for the load balancer. + google.cloud.gcp_compute_global_address: + name: "{{ gcp_http_lb_globaladdress }}" + project: "{{ gcp_http_lb_gcp_project }}" + auth_kind: "{{ gcp_http_lb_auth_kind }}" + service_account_file: "{{ gcp_http_lb_service_account_file }}" + state: "{{ gcp_http_lb_state }}" register: globaladdress -- name: create a http health check to verify lb working - gcp_compute_http_health_check: - name: "{{ gcp_http_lb_healthcheck }}" - healthy_threshold: 10 - port: 80 - timeout_sec: 2 - unhealthy_threshold: 5 - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - state: "{{ gcp_http_lb_state }}" +- name: Create a http health check to verify lb working + google.cloud.gcp_compute_http_health_check: + name: "{{ gcp_http_lb_healthcheck }}" + healthy_threshold: 10 + port: 80 + timeout_sec: 2 + unhealthy_threshold: 5 + project: "{{ gcp_http_lb_gcp_project }}" + auth_kind: "{{ gcp_http_lb_auth_kind }}" + service_account_file: "{{ gcp_http_lb_service_account_file }}" + state: "{{ gcp_http_lb_state }}" register: healthcheck -- name: create a backend service - gcp_compute_backend_service: - name: "{{ gcp_http_lb_backendservice }}" - backends: +- name: Create a backend service + google.cloud.gcp_compute_backend_service: + name: "{{ gcp_http_lb_backendservice }}" + backends: - group: "{{ gcp_http_lb_backend.selfLink }}" - health_checks: + health_checks: - "{{ healthcheck.selfLink }}" - enable_cdn: "{{ gcp_http_lb_cdn }}" - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - state: "{{ gcp_http_lb_state }}" + enable_cdn: "{{ gcp_http_lb_cdn }}" + project: "{{ gcp_http_lb_gcp_project }}" + auth_kind: "{{ gcp_http_lb_auth_kind }}" + service_account_file: "{{ gcp_http_lb_service_account_file }}" + state: "{{ gcp_http_lb_state }}" register: backendservice -- name: create a url map - gcp_compute_url_map: - name: "{{ gcp_http_lb_urlmap }}" - default_service: "{{ backendservice }}" - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - state: "{{ gcp_http_lb_state }}" +- name: Create a url map + google.cloud.gcp_compute_url_map: + name: "{{ gcp_http_lb_urlmap }}" + default_service: "{{ backendservice }}" + project: "{{ gcp_http_lb_gcp_project }}" + auth_kind: "{{ gcp_http_lb_auth_kind }}" + service_account_file: "{{ gcp_http_lb_service_account_file }}" + state: "{{ gcp_http_lb_state }}" register: urlmap -- name: create a target http proxy - gcp_compute_target_http_proxy: - name: "{{ gcp_http_lb_httpproxy }}" - url_map: "{{ urlmap }}" - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - state: "{{ gcp_http_lb_state }}" +- name: Create a target http proxy + google.cloud.gcp_compute_target_http_proxy: + name: "{{ gcp_http_lb_httpproxy }}" + url_map: "{{ urlmap }}" + project: "{{ gcp_http_lb_gcp_project }}" + auth_kind: "{{ gcp_http_lb_auth_kind }}" + service_account_file: "{{ gcp_http_lb_service_account_file }}" + state: "{{ gcp_http_lb_state }}" register: httpproxy -- name: create a global forwarding rule - gcp_compute_global_forwarding_rule: - name: "{{ gcp_http_lb_forwardingrule }}" - ip_address: "{{ globaladdress.address }}" - load_balancing_scheme: "EXTERNAL" - ip_protocol: TCP - port_range: 80-80 - target: "{{ httpproxy.selfLink }}" - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - state: "{{ gcp_http_lb_state }}" +- name: Create a global forwarding rule + google.cloud.gcp_compute_global_forwarding_rule: + name: "{{ gcp_http_lb_forwardingrule }}" + ip_address: "{{ globaladdress.address }}" + load_balancing_scheme: EXTERNAL + ip_protocol: TCP + port_range: 80-80 + target: "{{ httpproxy.selfLink }}" + project: "{{ gcp_http_lb_gcp_project }}" + auth_kind: "{{ gcp_http_lb_auth_kind }}" + service_account_file: "{{ gcp_http_lb_service_account_file }}" + state: "{{ gcp_http_lb_state }}" register: result diff --git a/roles/gcp_http_lb/tests/test.yml b/roles/gcp_http_lb/tests/test.yml index 341c7a4..6f659ef 100644 --- a/roles/gcp_http_lb/tests/test.yml +++ b/roles/gcp_http_lb/tests/test.yml @@ -1,5 +1,6 @@ --- -- hosts: localhost +- name: Test gcp_http_lb role + hosts: localhost remote_user: root roles: - gcp_http_lb diff --git a/roles/gcp_http_lb/vars/main.yml b/roles/gcp_http_lb/vars/main.yml index ca9443f..f78469c 100644 --- a/roles/gcp_http_lb/vars/main.yml +++ b/roles/gcp_http_lb/vars/main.yml @@ -1,12 +1,12 @@ --- # vars file for gcp-http-lb -vars: - # The backend this LB will be supporting. This will typically be a Instance Group: - # example: projects/sample-project/zones/us-central1-c/instanceGroups/sample-instance-group - gcp_http_lb_backend: your-backend - # The name of your GCP project - gcp_project: your-project - # The kind of authentication you will use (serviceaccount is recommended) - auth_kind: serviceaccount - # The path to your service account file (if using the serviceaccount auth kind) - service_account_file: path-to-service-account-file + +# The backend this LB will be supporting. This will typically be a Instance Group: +# example: projects/sample-project/zones/us-central1-c/instanceGroups/sample-instance-group +gcp_http_lb_backend: your-backend +# The name of your GCP project +gcp_http_lb_gcp_project: your-project +# The kind of authentication you will use (serviceaccount is recommended) +gcp_http_lb_auth_kind: serviceaccount +# The path to your service account file (if using the serviceaccount auth kind) +gcp_http_lb_service_account_file: path-to-service-account-file diff --git a/roles/gcsfuse/meta/main.yml b/roles/gcsfuse/meta/main.yml new file mode 100644 index 0000000..05c5764 --- /dev/null +++ b/roles/gcsfuse/meta/main.yml @@ -0,0 +1,20 @@ +--- +galaxy_info: + role_name: gcsfuse + author: Eric Anderson + description: Ansible role to install gcsfuse + license: GPL-3.0 + min_ansible_version: "2.9" + platforms: + - name: Ubuntu + versions: + - precise + - trusty + - xenial + - bionic + galaxy_tags: + - gcloud + - google + - gcsfuse + - fuse +dependencies: [] diff --git a/roles/gcsfuse/tasks/debian.yml b/roles/gcsfuse/tasks/debian.yml index 9443524..be0847f 100644 --- a/roles/gcsfuse/tasks/debian.yml +++ b/roles/gcsfuse/tasks/debian.yml @@ -1,24 +1,27 @@ --- -- name: gcsfuse | Ensure gpg is installed - apt: name=gnupg +- name: Gcsfuse | Ensure gpg is installed + ansible.builtin.apt: + name: gnupg register: task_result until: task_result is success retries: 10 delay: 2 -- name: gcsfuse | Add an apt signing key - apt_key: +- name: Gcsfuse | Add an apt signing key + ansible.builtin.apt_key: url: https://packages.cloud.google.com/apt/doc/apt-key.gpg state: present -- name: gcsfuse | Add the apt repository - apt_repository: - repo: deb http://packages.cloud.google.com/apt gcsfuse-{{ ansible_distribution_release }} main +- name: Gcsfuse | Add the apt repository + ansible.builtin.apt_repository: + repo: deb https://packages.cloud.google.com/apt gcsfuse-{{ ansible_distribution_release }} main state: present filename: gcsfuse -- name: gcsfuse | Install gcsfuse - apt: name=gcsfuse update_cache=yes +- name: Gcsfuse | Install gcsfuse + ansible.builtin.apt: + name: gcsfuse + update_cache: "yes" register: task_result until: task_result is success retries: 10 diff --git a/roles/gcsfuse/tasks/main.yml b/roles/gcsfuse/tasks/main.yml index c5432c5..b7989f9 100644 --- a/roles/gcsfuse/tasks/main.yml +++ b/roles/gcsfuse/tasks/main.yml @@ -1,4 +1,4 @@ --- # tasks file for google.cloud.gcsfuse - -- include_tasks: "{{ ansible_os_family|lower }}.yml" +- name: Main + ansible.builtin.include_tasks: "{{ ansible_os_family | lower }}.yml" diff --git a/roles/google_cloud_ops_agents b/roles/google_cloud_ops_agents index 9a36582..99adb1e 160000 --- a/roles/google_cloud_ops_agents +++ b/roles/google_cloud_ops_agents @@ -1 +1 @@ -Subproject commit 9a36582f0d762e386a56e698d896c22bebf6d904 +Subproject commit 99adb1edafb02c3573eaf680266205295ba7f159 diff --git a/scripts/bootstrap-project.sh b/scripts/bootstrap-project.sh new file mode 100755 index 0000000..a28f42c --- /dev/null +++ b/scripts/bootstrap-project.sh @@ -0,0 +1,70 @@ +#!/usr/bin/env bash +# Bootstrap-project sets a project up so that ansible-test integration +# can be run. +# +# dependencies: +# - google-cloud-sdk (gcloud) +# +# +PROJECT_ID="${1}" +SERVICE_ACCOUNT_NAME="${2}" +SERVICE_LIST=( + "appengine" + "bigtableadmin.googleapis.com" + "cloudbuild.googleapis.com" + "cloudfunctions" + "cloudkms.googleapis.com" + "cloudresourcemanager.googleapis.com" + "cloudscheduler.googleapis.com" + "cloudtasks.googleapis.com" + "container" + "dns" + "file.googleapis.com" + "ml.googleapis.com" + "redis.googleapis.com" + "runtimeconfig.googleapis.com" + "sourcerepo.googleapis.com" + "spanner.googleapis.com" + "sqladmin.googleapis.com" + "storage.googleapis.com" + "tpu.googleapis.com" +) + +REQUIRED_ROLE_LIST=( + "roles/storage.objectAdmin" + "roles/source.admin" +) + +for SERVICE in "${SERVICE_LIST[@]}"; do + echo "enabling service $SERVICE..." + gcloud services enable "$SERVICE" --project="$PROJECT_ID" +done + +if [ -n "$SERVICE_ACCOUNT_NAME" ] +then + for ROLE in "${REQUIRED_ROLE_LIST[@]}"; do + echo "enabling role $ROLE..." + gcloud projects add-iam-policy-binding "$PROJECT_ID" \ + --member="serviceAccount:$SERVICE_ACCOUNT_NAME" \ + --role="$ROLE" + done +fi + +if ! gcloud app describe --project="$PROJECT_ID" > /dev/null; then + echo "creating appengine project..." + gcloud app create --project="$PROJECT_ID" --region=us-central +fi + +# create and upload cloud function for testing + +BUCKET_NAME="gs://${PROJECT_ID}-ansible-testing" + +if ! gcloud storage buckets describe "${BUCKET_NAME}" > /dev/null; then + gcloud storage buckets create "${BUCKET_NAME}" --project="${PROJECT_ID}" +fi + +gsutil cp ./test-fixtures/cloud-function.zip "${BUCKET_NAME}" + + +# The following is hard to automate, so echo +echo "Done! It may take up to 10 minutes for some of the changes to fully propagate." \ No newline at end of file diff --git a/scripts/cleanup-project.sh b/scripts/cleanup-project.sh new file mode 100755 index 0000000..76f9714 --- /dev/null +++ b/scripts/cleanup-project.sh @@ -0,0 +1,71 @@ +#!/usr/bin/env bash +# cleanup-project cleans up an ansible testing project +# +# WARNING: do not run tests against a project while +# this is running, or else your tests will fail. +# +# dependencies: +# - google-cloud-sdk (gcloudgcloud ) +set -e +PROJECT_ID="${1}" +FOLDER_ID="${2}" +# service account is unused today +# SERVICE_ACCOUNT_NAME="${2}" +ZONE="us-central1-a" + +main() { + # note: the ordering here is deliberate, to start with + # leaf resources and work upwards to parent resources. + cleanup_resource "container" "clusters" "" "--zone=$ZONE" + cleanup_resource_per_region "compute" "vpn-tunnels" + cleanup_resource "compute" "instances" "" "--zone=$ZONE" + cleanup_resource_per_region "compute" "addresses" + cleanup_resource "compute" "target-http-proxies" "" "--global" + cleanup_resource "compute" "forwarding-rules" "--global" "--global" + cleanup_resource "compute" "forwarding-rules" \ + "--regions=us-central1" "--region=us-central1" + cleanup_resource "compute" "url-maps" "--global" "--global" + cleanup_resource "compute" "url-maps" \ + "--regions=us-central1" "--region=us-central1" + cleanup_resource "compute" "backend-services" "--global" "--global" + cleanup_resource "compute" "backend-services" \ + "--regions=us-central1" "--region=us-central1" + for resource in $(gcloud projects list --filter="parent.id:$FOLDER_ID" --format="csv[no-heading](PROJECT_ID)"); do + gcloud projects delete "${resource}" -q + done +} + +cleanup_resource() { + resource_group="$1" + resource="$2" + extra_list_arg="$3" + extra_delete_arg="$4" + + if [ -z "$extra_list_arg" ] + then + mapfile -t resources < <(gcloud "${resource_group}" "${resource}" list --project="${PROJECT_ID}" --format="csv[no-heading](name)") + else + mapfile -t resources < <(gcloud "${resource_group}" "${resource}" list --project="${PROJECT_ID}" --format="csv[no-heading](name)" "${extra_list_arg}") + fi + + for resource_id in "${resources[@]}" + do + if [ -z "$extra_delete_arg" ] + then + gcloud "${resource_group}" "${resource}" delete "${resource_id}" --project="${PROJECT_ID}" -q + else + gcloud "${resource_group}" "${resource}" delete "${resource_id}" --project="${PROJECT_ID}" -q "${extra_delete_arg}" + fi + done +} + +cleanup_resource_per_region() { + resource_group="$1" + resource="$2" + for resource_and_region in $(gcloud "${resource_group}" "${resource}" list --project="${PROJECT_ID}" --format="csv[no-heading](name,region)"); do + read -r resource_id region < <(echo "$resource_and_region" | tr "," " ") + gcloud "${resource_group}" "${resource}" delete "${resource_id}" --project="${PROJECT_ID}" -q --region="${region}" + done +} + +main \ No newline at end of file diff --git a/test-fixtures/cloud-function-source/build-function-zip.sh b/test-fixtures/cloud-function-source/build-function-zip.sh new file mode 100755 index 0000000..2ff2577 --- /dev/null +++ b/test-fixtures/cloud-function-source/build-function-zip.sh @@ -0,0 +1,7 @@ +#!/usr/bin/env bash +# Build the cloud function zip file, +# in the desired cloud function source format. +if [ -f ../cloud-function.zip ]; then + rm ../cloud-function.zip +fi +zip ../cloud-function.zip ./* \ No newline at end of file diff --git a/test-fixtures/cloud-function-source/main.py b/test-fixtures/cloud-function-source/main.py new file mode 100644 index 0000000..2578c41 --- /dev/null +++ b/test-fixtures/cloud-function-source/main.py @@ -0,0 +1,10 @@ +import functions_framework + + +# Register an HTTP function with the Functions Framework +@functions_framework.http +def helloGET(request): + # Your code here + + # Return an HTTP response + return "OK" diff --git a/test-fixtures/cloud-function-source/requirements.txt b/test-fixtures/cloud-function-source/requirements.txt new file mode 100644 index 0000000..a675cdd --- /dev/null +++ b/test-fixtures/cloud-function-source/requirements.txt @@ -0,0 +1 @@ +functions-framework==3.* diff --git a/test-fixtures/cloud-function.zip b/test-fixtures/cloud-function.zip new file mode 100644 index 0000000..8d3d090 Binary files /dev/null and b/test-fixtures/cloud-function.zip differ diff --git a/tests/integration/targets/gcp_appengine_firewall_rule/aliases b/tests/integration/targets/gcp_appengine_firewall_rule/aliases index 9812f01..0e4419e 100644 --- a/tests/integration/targets/gcp_appengine_firewall_rule/aliases +++ b/tests/integration/targets/gcp_appengine_firewall_rule/aliases @@ -1,2 +1 @@ -cloud/gcp -unsupported +cloud/gcp \ No newline at end of file diff --git a/tests/integration/targets/gcp_appengine_firewall_rule/tasks/autogen.yml b/tests/integration/targets/gcp_appengine_firewall_rule/tasks/autogen.yml index 4f87ea5..a38d9a7 100644 --- a/tests/integration/targets/gcp_appengine_firewall_rule/tasks/autogen.yml +++ b/tests/integration/targets/gcp_appengine_firewall_rule/tasks/autogen.yml @@ -13,96 +13,98 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: delete a firewall rule +- name: Delete a firewall rule google.cloud.gcp_appengine_firewall_rule: priority: 1000 source_range: 10.0.0.0 action: ALLOW project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a firewall rule +- name: Create a firewall rule google.cloud.gcp_appengine_firewall_rule: priority: 1000 source_range: 10.0.0.0 action: ALLOW project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that firewall_rule was created +- name: Verify that firewall_rule was created google.cloud.gcp_appengine_firewall_rule_info: - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/cloud-platform + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/cloud-platform register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length >= 1 # ---------------------------------------------------------------------------- -- name: create a firewall rule that already exists +- name: Create a firewall rule that already exists google.cloud.gcp_appengine_firewall_rule: priority: 1000 source_range: 10.0.0.0 action: ALLOW project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a firewall rule +- name: Delete a firewall rule google.cloud.gcp_appengine_firewall_rule: priority: 1000 source_range: 10.0.0.0 action: ALLOW project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that firewall_rule was deleted +- name: Verify that firewall_rule was deleted google.cloud.gcp_appengine_firewall_rule_info: - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/cloud-platform + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/cloud-platform register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - - results['resources'] | length == 0 + # there is a default firewall rule that cannot be + # deleted, so the length should be 1. + - results['resources'] | length == 1 # ---------------------------------------------------------------------------- -- name: delete a firewall rule that does not exist +- name: Delete a firewall rule that does not exist google.cloud.gcp_appengine_firewall_rule: priority: 1000 source_range: 10.0.0.0 action: ALLOW project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false diff --git a/tests/integration/targets/gcp_appengine_firewall_rule/tasks/main.yml b/tests/integration/targets/gcp_appengine_firewall_rule/tasks/main.yml index 45d6e49..fe47378 100644 --- a/tests/integration/targets/gcp_appengine_firewall_rule/tasks/main.yml +++ b/tests/integration/targets/gcp_appengine_firewall_rule/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/tests/integration/targets/gcp_bigquery_dataset/aliases b/tests/integration/targets/gcp_bigquery_dataset/aliases index 9812f01..0e4419e 100644 --- a/tests/integration/targets/gcp_bigquery_dataset/aliases +++ b/tests/integration/targets/gcp_bigquery_dataset/aliases @@ -1,2 +1 @@ -cloud/gcp -unsupported +cloud/gcp \ No newline at end of file diff --git a/tests/integration/targets/gcp_bigquery_dataset/tasks/autogen.yml b/tests/integration/targets/gcp_bigquery_dataset/tasks/autogen.yml index 1f97074..71484a3 100644 --- a/tests/integration/targets/gcp_bigquery_dataset/tasks/autogen.yml +++ b/tests/integration/targets/gcp_bigquery_dataset/tasks/autogen.yml @@ -13,96 +13,96 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: delete a dataset +- name: Delete a dataset google.cloud.gcp_bigquery_dataset: name: my_example_dataset dataset_reference: dataset_id: my_example_dataset project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a dataset +- name: Create a dataset google.cloud.gcp_bigquery_dataset: name: my_example_dataset dataset_reference: dataset_id: my_example_dataset project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that dataset was created +- name: Verify that dataset was created google.cloud.gcp_bigquery_dataset_info: - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/bigquery + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/bigquery register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | map(attribute='datasetReference') | map(attribute='datasetId') | select("match", ".*my_example_dataset.*") | list | length == 1 # ---------------------------------------------------------------------------- -- name: create a dataset that already exists +- name: Create a dataset that already exists google.cloud.gcp_bigquery_dataset: name: my_example_dataset dataset_reference: dataset_id: my_example_dataset project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a dataset +- name: Delete a dataset google.cloud.gcp_bigquery_dataset: name: my_example_dataset dataset_reference: dataset_id: my_example_dataset project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that dataset was deleted +- name: Verify that dataset was deleted google.cloud.gcp_bigquery_dataset_info: - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/bigquery + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/bigquery register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | map(attribute='datasetReference') | map(attribute='datasetId') | select("match", ".*my_example_dataset.*") | list | length == 0 # ---------------------------------------------------------------------------- -- name: delete a dataset that does not exist +- name: Delete a dataset that does not exist google.cloud.gcp_bigquery_dataset: name: my_example_dataset dataset_reference: dataset_id: my_example_dataset project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false diff --git a/tests/integration/targets/gcp_bigquery_dataset/tasks/main.yml b/tests/integration/targets/gcp_bigquery_dataset/tasks/main.yml index 45d6e49..fe47378 100644 --- a/tests/integration/targets/gcp_bigquery_dataset/tasks/main.yml +++ b/tests/integration/targets/gcp_bigquery_dataset/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/tests/integration/targets/gcp_bigquery_table/aliases b/tests/integration/targets/gcp_bigquery_table/aliases index 9812f01..0e4419e 100644 --- a/tests/integration/targets/gcp_bigquery_table/aliases +++ b/tests/integration/targets/gcp_bigquery_table/aliases @@ -1,2 +1 @@ -cloud/gcp -unsupported +cloud/gcp \ No newline at end of file diff --git a/tests/integration/targets/gcp_bigquery_table/tasks/autogen.yml b/tests/integration/targets/gcp_bigquery_table/tasks/autogen.yml index b795dbe..1e42d65 100644 --- a/tests/integration/targets/gcp_bigquery_table/tasks/autogen.yml +++ b/tests/integration/targets/gcp_bigquery_table/tasks/autogen.yml @@ -13,17 +13,17 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: create a dataset +- name: Create a dataset google.cloud.gcp_bigquery_dataset: name: example_dataset dataset_reference: dataset_id: example_dataset project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: dataset -- name: delete a table +- name: Delete a table google.cloud.gcp_bigquery_table: name: example_table dataset: example_dataset @@ -33,10 +33,10 @@ table_id: example_table project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a table +- name: Create a table google.cloud.gcp_bigquery_table: name: example_table dataset: example_dataset @@ -46,28 +46,28 @@ table_id: example_table project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that table was created +- name: Verify that table was created google.cloud.gcp_bigquery_table_info: - dataset: example_dataset - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/bigquery + dataset: example_dataset + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/bigquery register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | map(attribute='tableReference') | map(attribute='tableId') | select("match", ".*example_table.*") | list | length == 1 # ---------------------------------------------------------------------------- -- name: create a table that already exists +- name: Create a table that already exists google.cloud.gcp_bigquery_table: name: example_table dataset: example_dataset @@ -77,15 +77,15 @@ table_id: example_table project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a table +- name: Delete a table google.cloud.gcp_bigquery_table: name: example_table dataset: example_dataset @@ -95,28 +95,28 @@ table_id: example_table project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that table was deleted +- name: Verify that table was deleted google.cloud.gcp_bigquery_table_info: - dataset: example_dataset - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/bigquery + dataset: example_dataset + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/bigquery register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | map(attribute='tableReference') | map(attribute='tableId') | select("match", ".*example_table.*") | list | length == 0 # ---------------------------------------------------------------------------- -- name: delete a table that does not exist +- name: Delete a table that does not exist google.cloud.gcp_bigquery_table: name: example_table dataset: example_dataset @@ -126,24 +126,24 @@ table_id: example_table project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #--------------------------------------------------------- # Post-test teardown # If errors happen, don't crash the playbook! -- name: delete a dataset +- name: Delete a dataset google.cloud.gcp_bigquery_dataset: name: example_dataset dataset_reference: dataset_id: example_dataset project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: dataset ignore_errors: true diff --git a/tests/integration/targets/gcp_bigquery_table/tasks/main.yml b/tests/integration/targets/gcp_bigquery_table/tasks/main.yml index 45d6e49..fe47378 100644 --- a/tests/integration/targets/gcp_bigquery_table/tasks/main.yml +++ b/tests/integration/targets/gcp_bigquery_table/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/tests/integration/targets/gcp_bigtable_instance/aliases b/tests/integration/targets/gcp_bigtable_instance/aliases index 9812f01..3575898 100644 --- a/tests/integration/targets/gcp_bigtable_instance/aliases +++ b/tests/integration/targets/gcp_bigtable_instance/aliases @@ -1,2 +1,3 @@ cloud/gcp -unsupported +# the test is still flakey currently +unsupported \ No newline at end of file diff --git a/tests/integration/targets/gcp_bigtable_instance/tasks/autogen.yml b/tests/integration/targets/gcp_bigtable_instance/tasks/autogen.yml index fa9ae5e..7406950 100644 --- a/tests/integration/targets/gcp_bigtable_instance/tasks/autogen.yml +++ b/tests/integration/targets/gcp_bigtable_instance/tasks/autogen.yml @@ -13,111 +13,107 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: delete a instance +- name: Delete a instance google.cloud.gcp_bigtable_instance: name: my-instance display_name: My Test Cluster clusters: - - name: mycluster - location: projects/{{ gcp_project }}/locations/us-central1-a - serve_nodes: 1 + - name: mycluster + location: projects/{{ gcp_project }}/locations/us-central1-a + serve_nodes: 1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a instance +- name: Create a instance google.cloud.gcp_bigtable_instance: name: my-instance display_name: My Test Cluster clusters: - - name: mycluster - location: projects/{{ gcp_project }}/locations/us-central1-a - serve_nodes: 1 + - name: mycluster + location: projects/{{ gcp_project }}/locations/us-central1-a + serve_nodes: 1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that instance was created +- name: Verify that instance was created google.cloud.gcp_bigtable_instance_info: - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/bigtable + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | map(attribute='name') | select("match", ".*my-instance.*") | list | length == 1 # ---------------------------------------------------------------------------- -- name: create a instance that already exists +- name: Create a instance that already exists google.cloud.gcp_bigtable_instance: name: my-instance display_name: My Test Cluster clusters: - - name: mycluster - location: projects/{{ gcp_project }}/locations/us-central1-a - serve_nodes: 1 + - name: mycluster + location: projects/{{ gcp_project }}/locations/us-central1-a + serve_nodes: 1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a instance +- name: Delete a instance google.cloud.gcp_bigtable_instance: name: my-instance display_name: My Test Cluster clusters: - - name: mycluster - location: projects/{{ gcp_project }}/locations/us-central1-a - serve_nodes: 1 + - name: mycluster + location: projects/{{ gcp_project }}/locations/us-central1-a + serve_nodes: 1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that instance was deleted +- name: Verify that instance was deleted google.cloud.gcp_bigtable_instance_info: - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/bigtable + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | map(attribute='name') | select("match", ".*my-instance.*") | list | length == 0 # ---------------------------------------------------------------------------- -- name: delete a instance that does not exist +- name: Delete a instance that does not exist google.cloud.gcp_bigtable_instance: name: my-instance display_name: My Test Cluster clusters: - - name: mycluster - location: projects/{{ gcp_project }}/locations/us-central1-a - serve_nodes: 1 + - name: mycluster + location: projects/{{ gcp_project }}/locations/us-central1-a + serve_nodes: 1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false diff --git a/tests/integration/targets/gcp_bigtable_instance/tasks/main.yml b/tests/integration/targets/gcp_bigtable_instance/tasks/main.yml index 45d6e49..fe47378 100644 --- a/tests/integration/targets/gcp_bigtable_instance/tasks/main.yml +++ b/tests/integration/targets/gcp_bigtable_instance/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/tests/integration/targets/gcp_cloudbuild_trigger/aliases b/tests/integration/targets/gcp_cloudbuild_trigger/aliases index 9812f01..0e4419e 100644 --- a/tests/integration/targets/gcp_cloudbuild_trigger/aliases +++ b/tests/integration/targets/gcp_cloudbuild_trigger/aliases @@ -1,2 +1 @@ -cloud/gcp -unsupported +cloud/gcp \ No newline at end of file diff --git a/tests/integration/targets/gcp_cloudbuild_trigger/defaults/main.yml b/tests/integration/targets/gcp_cloudbuild_trigger/defaults/main.yml index aa87a2a..aa65c31 100644 --- a/tests/integration/targets/gcp_cloudbuild_trigger/defaults/main.yml +++ b/tests/integration/targets/gcp_cloudbuild_trigger/defaults/main.yml @@ -1,3 +1,3 @@ --- # defaults file -resource_name: '{{resource_prefix}}' +resource_name: "{{ resource_prefix }}" diff --git a/tests/integration/targets/gcp_cloudfunctions_cloud_function/aliases b/tests/integration/targets/gcp_cloudfunctions_cloud_function/aliases index 9812f01..26507c2 100644 --- a/tests/integration/targets/gcp_cloudfunctions_cloud_function/aliases +++ b/tests/integration/targets/gcp_cloudfunctions_cloud_function/aliases @@ -1,2 +1 @@ cloud/gcp -unsupported diff --git a/tests/integration/targets/gcp_cloudfunctions_cloud_function/tasks/autogen.yml b/tests/integration/targets/gcp_cloudfunctions_cloud_function/tasks/autogen.yml index 5d8c29c..da43b21 100644 --- a/tests/integration/targets/gcp_cloudfunctions_cloud_function/tasks/autogen.yml +++ b/tests/integration/targets/gcp_cloudfunctions_cloud_function/tasks/autogen.yml @@ -13,108 +13,113 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: delete a cloud function +- name: Delete a cloud function google.cloud.gcp_cloudfunctions_cloud_function: name: "{{ resource_name }}" location: us-central1 entry_point: helloGET - source_archive_url: gs://ansible-cloudfunctions-bucket/function.zip - trigger_http: 'true' + source_archive_url: gs://{{ gcp_project }}-ansible-testing/cloud-function.zip + trigger_http: "true" project: "{{ gcp_project }}" + runtime: python310 auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a cloud function +- name: Create a cloud function google.cloud.gcp_cloudfunctions_cloud_function: name: "{{ resource_name }}" location: us-central1 entry_point: helloGET - source_archive_url: gs://ansible-cloudfunctions-bucket/function.zip - trigger_http: 'true' + source_archive_url: gs://{{ gcp_project }}-ansible-testing/cloud-function.zip + trigger_http: "true" project: "{{ gcp_project }}" + runtime: python310 auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that cloud_function was created +- name: Verify that cloud_function was created google.cloud.gcp_cloudfunctions_cloud_function_info: - location: us-central1 - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/cloud-platform + location: us-central1 + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/cloud-platform register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | map(attribute='name') | select("match", ".*{{ resource_name }}.*") | list | length == 1 # ---------------------------------------------------------------------------- -- name: create a cloud function that already exists +- name: Create a cloud function that already exists google.cloud.gcp_cloudfunctions_cloud_function: name: "{{ resource_name }}" location: us-central1 entry_point: helloGET - source_archive_url: gs://ansible-cloudfunctions-bucket/function.zip - trigger_http: 'true' + source_archive_url: gs://{{ gcp_project }}-ansible-testing/cloud-function.zip + trigger_http: "true" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + # runtime is not sent as it is optional for + # existing functions. + # runtime: "python310" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a cloud function +- name: Delete a cloud function google.cloud.gcp_cloudfunctions_cloud_function: name: "{{ resource_name }}" location: us-central1 entry_point: helloGET - source_archive_url: gs://ansible-cloudfunctions-bucket/function.zip - trigger_http: 'true' + source_archive_url: gs://{{ gcp_project }}-ansible-testing/cloud-function.zip + trigger_http: "true" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that cloud_function was deleted +- name: Verify that cloud_function was deleted google.cloud.gcp_cloudfunctions_cloud_function_info: - location: us-central1 - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/cloud-platform + location: us-central1 + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/cloud-platform register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | map(attribute='name') | select("match", ".*{{ resource_name }}.*") | list | length == 0 # ---------------------------------------------------------------------------- -- name: delete a cloud function that does not exist +- name: Delete a cloud function that does not exist google.cloud.gcp_cloudfunctions_cloud_function: name: "{{ resource_name }}" location: us-central1 entry_point: helloGET - source_archive_url: gs://ansible-cloudfunctions-bucket/function.zip - trigger_http: 'true' + source_archive_url: gs://{{ gcp_project }}-ansible-testing/cloud-function.zip + trigger_http: "true" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false diff --git a/tests/integration/targets/gcp_cloudfunctions_cloud_function/tasks/main.yml b/tests/integration/targets/gcp_cloudfunctions_cloud_function/tasks/main.yml index 45d6e49..fe47378 100644 --- a/tests/integration/targets/gcp_cloudfunctions_cloud_function/tasks/main.yml +++ b/tests/integration/targets/gcp_cloudfunctions_cloud_function/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/tests/integration/targets/gcp_cloudscheduler_job/aliases b/tests/integration/targets/gcp_cloudscheduler_job/aliases index 9812f01..0e4419e 100644 --- a/tests/integration/targets/gcp_cloudscheduler_job/aliases +++ b/tests/integration/targets/gcp_cloudscheduler_job/aliases @@ -1,2 +1 @@ -cloud/gcp -unsupported +cloud/gcp \ No newline at end of file diff --git a/tests/integration/targets/gcp_cloudscheduler_job/tasks/autogen.yml b/tests/integration/targets/gcp_cloudscheduler_job/tasks/autogen.yml index 3a1884c..917e323 100644 --- a/tests/integration/targets/gcp_cloudscheduler_job/tasks/autogen.yml +++ b/tests/integration/targets/gcp_cloudscheduler_job/tasks/autogen.yml @@ -13,7 +13,7 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: delete a job +- name: Delete a job google.cloud.gcp_cloudscheduler_job: name: job region: us-central1 @@ -27,13 +27,13 @@ service: web version: prod instance: my-instance-001 - relative_uri: "/ping" + relative_uri: /ping project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a job +- name: Create a job google.cloud.gcp_cloudscheduler_job: name: job region: us-central1 @@ -47,31 +47,31 @@ service: web version: prod instance: my-instance-001 - relative_uri: "/ping" + relative_uri: /ping project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that job was created +- name: Verify that job was created google.cloud.gcp_cloudscheduler_job_info: - region: us-central1 - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/cloud-platform + region: us-central1 + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/cloud-platform register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | map(attribute='name') | select("match", ".*job.*") | list | length == 1 # ---------------------------------------------------------------------------- -- name: create a job that already exists +- name: Create a job that already exists google.cloud.gcp_cloudscheduler_job: name: job region: us-central1 @@ -85,18 +85,18 @@ service: web version: prod instance: my-instance-001 - relative_uri: "/ping" + relative_uri: /ping project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a job +- name: Delete a job google.cloud.gcp_cloudscheduler_job: name: job region: us-central1 @@ -110,31 +110,31 @@ service: web version: prod instance: my-instance-001 - relative_uri: "/ping" + relative_uri: /ping project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that job was deleted +- name: Verify that job was deleted google.cloud.gcp_cloudscheduler_job_info: - region: us-central1 - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/cloud-platform + region: us-central1 + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/cloud-platform register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | map(attribute='name') | select("match", ".*job.*") | list | length == 0 # ---------------------------------------------------------------------------- -- name: delete a job that does not exist +- name: Delete a job that does not exist google.cloud.gcp_cloudscheduler_job: name: job region: us-central1 @@ -148,13 +148,13 @@ service: web version: prod instance: my-instance-001 - relative_uri: "/ping" + relative_uri: /ping project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false diff --git a/tests/integration/targets/gcp_cloudscheduler_job/tasks/main.yml b/tests/integration/targets/gcp_cloudscheduler_job/tasks/main.yml index 45d6e49..fe47378 100644 --- a/tests/integration/targets/gcp_cloudscheduler_job/tasks/main.yml +++ b/tests/integration/targets/gcp_cloudscheduler_job/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/tests/integration/targets/gcp_cloudtasks_queue/aliases b/tests/integration/targets/gcp_cloudtasks_queue/aliases index 9812f01..0e4419e 100644 --- a/tests/integration/targets/gcp_cloudtasks_queue/aliases +++ b/tests/integration/targets/gcp_cloudtasks_queue/aliases @@ -1,2 +1 @@ -cloud/gcp -unsupported +cloud/gcp \ No newline at end of file diff --git a/tests/integration/targets/gcp_cloudtasks_queue/tasks/autogen.yml b/tests/integration/targets/gcp_cloudtasks_queue/tasks/autogen.yml index c0f0e60..6e1f70f 100644 --- a/tests/integration/targets/gcp_cloudtasks_queue/tasks/autogen.yml +++ b/tests/integration/targets/gcp_cloudtasks_queue/tasks/autogen.yml @@ -13,93 +13,93 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: delete a queue +- name: Delete a queue google.cloud.gcp_cloudtasks_queue: name: "{{ resource_name }}" location: us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a queue +- name: Create a queue google.cloud.gcp_cloudtasks_queue: name: "{{ resource_name }}" location: us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that queue was created +- name: Verify that queue was created google.cloud.gcp_cloudtasks_queue_info: - location: us-central1 - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/cloud-platform + location: us-central1 + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/cloud-platform register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | map(attribute='name') | select("match", ".*{{ resource_name }}.*") | list | length == 1 # ---------------------------------------------------------------------------- -- name: create a queue that already exists +- name: Create a queue that already exists google.cloud.gcp_cloudtasks_queue: name: "{{ resource_name }}" location: us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a queue +- name: Delete a queue google.cloud.gcp_cloudtasks_queue: name: "{{ resource_name }}" location: us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that queue was deleted +- name: Verify that queue was deleted google.cloud.gcp_cloudtasks_queue_info: - location: us-central1 - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/cloud-platform + location: us-central1 + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/cloud-platform register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | map(attribute='name') | select("match", ".*{{ resource_name }}.*") | list | length == 0 # ---------------------------------------------------------------------------- -- name: delete a queue that does not exist +- name: Delete a queue that does not exist google.cloud.gcp_cloudtasks_queue: name: "{{ resource_name }}" location: us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false diff --git a/tests/integration/targets/gcp_cloudtasks_queue/tasks/main.yml b/tests/integration/targets/gcp_cloudtasks_queue/tasks/main.yml index 45d6e49..fe47378 100644 --- a/tests/integration/targets/gcp_cloudtasks_queue/tasks/main.yml +++ b/tests/integration/targets/gcp_cloudtasks_queue/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/tests/integration/targets/gcp_compute_address/aliases b/tests/integration/targets/gcp_compute_address/aliases index 9812f01..0e4419e 100644 --- a/tests/integration/targets/gcp_compute_address/aliases +++ b/tests/integration/targets/gcp_compute_address/aliases @@ -1,2 +1 @@ -cloud/gcp -unsupported +cloud/gcp \ No newline at end of file diff --git a/tests/integration/targets/gcp_compute_address/tasks/autogen.yml b/tests/integration/targets/gcp_compute_address/tasks/autogen.yml index 7a12e69..b4e9634 100644 --- a/tests/integration/targets/gcp_compute_address/tasks/autogen.yml +++ b/tests/integration/targets/gcp_compute_address/tasks/autogen.yml @@ -13,97 +13,97 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: delete a address +- name: Delete a address google.cloud.gcp_compute_address: name: test-address1 region: us-west1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a address +- name: Create a address google.cloud.gcp_compute_address: name: test-address1 region: us-west1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that address was created +- name: Verify that address was created google.cloud.gcp_compute_address_info: - filters: - - name = test-address1 - region: us-west1 - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = test-address1 + region: us-west1 + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 1 # ---------------------------------------------------------------------------- -- name: create a address that already exists +- name: Create a address that already exists google.cloud.gcp_compute_address: name: test-address1 region: us-west1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a address +- name: Delete a address google.cloud.gcp_compute_address: name: test-address1 region: us-west1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that address was deleted +- name: Verify that address was deleted google.cloud.gcp_compute_address_info: - filters: - - name = test-address1 - region: us-west1 - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = test-address1 + region: us-west1 + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 0 # ---------------------------------------------------------------------------- -- name: delete a address that does not exist +- name: Delete a address that does not exist google.cloud.gcp_compute_address: name: test-address1 region: us-west1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false diff --git a/tests/integration/targets/gcp_compute_address/tasks/main.yml b/tests/integration/targets/gcp_compute_address/tasks/main.yml index 45d6e49..fe47378 100644 --- a/tests/integration/targets/gcp_compute_address/tasks/main.yml +++ b/tests/integration/targets/gcp_compute_address/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/tests/integration/targets/gcp_compute_autoscaler/aliases b/tests/integration/targets/gcp_compute_autoscaler/aliases index 9812f01..0e4419e 100644 --- a/tests/integration/targets/gcp_compute_autoscaler/aliases +++ b/tests/integration/targets/gcp_compute_autoscaler/aliases @@ -1,2 +1 @@ -cloud/gcp -unsupported +cloud/gcp \ No newline at end of file diff --git a/tests/integration/targets/gcp_compute_autoscaler/tasks/autogen.yml b/tests/integration/targets/gcp_compute_autoscaler/tasks/autogen.yml index 10192d9..4e1ad76 100644 --- a/tests/integration/targets/gcp_compute_autoscaler/tasks/autogen.yml +++ b/tests/integration/targets/gcp_compute_autoscaler/tasks/autogen.yml @@ -13,45 +13,46 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: create a network +- name: Create a network google.cloud.gcp_compute_network: name: network-instancetemplate project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + auto_create_subnetworks: true state: present register: network -- name: create a address +- name: Create a address google.cloud.gcp_compute_address: name: address-instancetemplate region: us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: address -- name: create a instance template +- name: Create a instance template google.cloud.gcp_compute_instance_template: name: "{{ resource_name }}" properties: disks: - - auto_delete: 'true' - boot: 'true' - initialize_params: - source_image: projects/ubuntu-os-cloud/global/images/family/ubuntu-1604-lts + - auto_delete: "true" + boot: "true" + initialize_params: + source_image: projects/ubuntu-os-cloud/global/images/family/ubuntu-minimal-2204-lts machine_type: n1-standard-1 network_interfaces: - - network: "{{ network }}" - access_configs: - - name: test-config - type: ONE_TO_ONE_NAT - nat_ip: "{{ address }}" + - network: "{{ network }}" + access_configs: + - name: test-config + type: ONE_TO_ONE_NAT + nat_ip: "{{ address }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: instancetemplate -- name: create a instance group manager +- name: Create a instance group manager google.cloud.gcp_compute_instance_group_manager: name: "{{ resource_name }}" base_instance_name: test1-child @@ -60,10 +61,10 @@ zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: igm -- name: delete a autoscaler +- name: Delete a autoscaler google.cloud.gcp_compute_autoscaler: name: "{{ resource_name }}" zone: us-central1-a @@ -73,13 +74,13 @@ min_num_replicas: 1 cool_down_period_sec: 60 cpu_utilization: - utilization_target: 0.5 + utilization_target: !!float "0.5" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a autoscaler +- name: Create a autoscaler google.cloud.gcp_compute_autoscaler: name: "{{ resource_name }}" zone: us-central1-a @@ -89,33 +90,33 @@ min_num_replicas: 1 cool_down_period_sec: 60 cpu_utilization: - utilization_target: 0.5 + utilization_target: !!float "0.5" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that autoscaler was created +- name: Verify that autoscaler was created google.cloud.gcp_compute_autoscaler_info: - filters: - - name = {{ resource_name }} - zone: us-central1-a - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + zone: us-central1-a + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 1 # ---------------------------------------------------------------------------- -- name: create a autoscaler that already exists +- name: Create a autoscaler that already exists google.cloud.gcp_compute_autoscaler: name: "{{ resource_name }}" zone: us-central1-a @@ -125,18 +126,18 @@ min_num_replicas: 1 cool_down_period_sec: 60 cpu_utilization: - utilization_target: 0.5 + utilization_target: !!float "0.5" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a autoscaler +- name: Delete a autoscaler google.cloud.gcp_compute_autoscaler: name: "{{ resource_name }}" zone: us-central1-a @@ -146,33 +147,33 @@ min_num_replicas: 1 cool_down_period_sec: 60 cpu_utilization: - utilization_target: 0.5 + utilization_target: !!float "0.5" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that autoscaler was deleted +- name: Verify that autoscaler was deleted google.cloud.gcp_compute_autoscaler_info: - filters: - - name = {{ resource_name }} - zone: us-central1-a - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + zone: us-central1-a + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 0 # ---------------------------------------------------------------------------- -- name: delete a autoscaler that does not exist +- name: Delete a autoscaler that does not exist google.cloud.gcp_compute_autoscaler: name: "{{ resource_name }}" zone: us-central1-a @@ -182,20 +183,20 @@ min_num_replicas: 1 cool_down_period_sec: 60 cpu_utilization: - utilization_target: 0.5 + utilization_target: !!float "0.5" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #--------------------------------------------------------- # Post-test teardown # If errors happen, don't crash the playbook! -- name: delete a instance group manager +- name: Delete a instance group manager google.cloud.gcp_compute_instance_group_manager: name: "{{ resource_name }}" base_instance_name: test1-child @@ -204,48 +205,49 @@ zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: igm ignore_errors: true -- name: delete a instance template +- name: Delete a instance template google.cloud.gcp_compute_instance_template: name: "{{ resource_name }}" properties: disks: - - auto_delete: 'true' - boot: 'true' - initialize_params: - source_image: projects/ubuntu-os-cloud/global/images/family/ubuntu-1604-lts + - auto_delete: "true" + boot: "true" + initialize_params: + source_image: projects/ubuntu-os-cloud/global/images/family/ubuntu-minimal-2204-lts machine_type: n1-standard-1 network_interfaces: - - network: "{{ network }}" - access_configs: - - name: test-config - type: ONE_TO_ONE_NAT - nat_ip: "{{ address }}" + - network: "{{ network }}" + access_configs: + - name: test-config + type: ONE_TO_ONE_NAT + nat_ip: "{{ address }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: instancetemplate ignore_errors: true -- name: delete a address +- name: Delete a address google.cloud.gcp_compute_address: name: address-instancetemplate region: us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: address ignore_errors: true -- name: delete a network +- name: Delete a network google.cloud.gcp_compute_network: name: network-instancetemplate project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + auto_create_subnetworks: true state: absent register: network ignore_errors: true diff --git a/tests/integration/targets/gcp_compute_autoscaler/tasks/main.yml b/tests/integration/targets/gcp_compute_autoscaler/tasks/main.yml index 45d6e49..fe47378 100644 --- a/tests/integration/targets/gcp_compute_autoscaler/tasks/main.yml +++ b/tests/integration/targets/gcp_compute_autoscaler/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/tests/integration/targets/gcp_compute_backend_bucket/aliases b/tests/integration/targets/gcp_compute_backend_bucket/aliases index 9812f01..0e4419e 100644 --- a/tests/integration/targets/gcp_compute_backend_bucket/aliases +++ b/tests/integration/targets/gcp_compute_backend_bucket/aliases @@ -1,2 +1 @@ -cloud/gcp -unsupported +cloud/gcp \ No newline at end of file diff --git a/tests/integration/targets/gcp_compute_backend_bucket/tasks/autogen.yml b/tests/integration/targets/gcp_compute_backend_bucket/tasks/autogen.yml index 48f2ee1..c54b022 100644 --- a/tests/integration/targets/gcp_compute_backend_bucket/tasks/autogen.yml +++ b/tests/integration/targets/gcp_compute_backend_bucket/tasks/autogen.yml @@ -13,125 +13,125 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: create a bucket +- name: Create a bucket google.cloud.gcp_storage_bucket: name: bucket-backendbucket project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: bucket -- name: delete a backend bucket +- name: Delete a backend bucket google.cloud.gcp_compute_backend_bucket: name: "{{ resource_name }}" bucket_name: "{{ bucket.name }}" description: A BackendBucket to connect LNB w/ Storage Bucket - enable_cdn: 'true' + enable_cdn: "true" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a backend bucket +- name: Create a backend bucket google.cloud.gcp_compute_backend_bucket: name: "{{ resource_name }}" bucket_name: "{{ bucket.name }}" description: A BackendBucket to connect LNB w/ Storage Bucket - enable_cdn: 'true' + enable_cdn: "true" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that backend_bucket was created +- name: Verify that backend_bucket was created google.cloud.gcp_compute_backend_bucket_info: - filters: - - name = {{ resource_name }} - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 1 # ---------------------------------------------------------------------------- -- name: create a backend bucket that already exists +- name: Create a backend bucket that already exists google.cloud.gcp_compute_backend_bucket: name: "{{ resource_name }}" bucket_name: "{{ bucket.name }}" description: A BackendBucket to connect LNB w/ Storage Bucket - enable_cdn: 'true' + enable_cdn: "true" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a backend bucket +- name: Delete a backend bucket google.cloud.gcp_compute_backend_bucket: name: "{{ resource_name }}" bucket_name: "{{ bucket.name }}" description: A BackendBucket to connect LNB w/ Storage Bucket - enable_cdn: 'true' + enable_cdn: "true" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that backend_bucket was deleted +- name: Verify that backend_bucket was deleted google.cloud.gcp_compute_backend_bucket_info: - filters: - - name = {{ resource_name }} - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 0 # ---------------------------------------------------------------------------- -- name: delete a backend bucket that does not exist +- name: Delete a backend bucket that does not exist google.cloud.gcp_compute_backend_bucket: name: "{{ resource_name }}" bucket_name: "{{ bucket.name }}" description: A BackendBucket to connect LNB w/ Storage Bucket - enable_cdn: 'true' + enable_cdn: "true" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #--------------------------------------------------------- # Post-test teardown # If errors happen, don't crash the playbook! -- name: delete a bucket +- name: Delete a bucket google.cloud.gcp_storage_bucket: name: bucket-backendbucket project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: bucket ignore_errors: true diff --git a/tests/integration/targets/gcp_compute_backend_bucket/tasks/main.yml b/tests/integration/targets/gcp_compute_backend_bucket/tasks/main.yml index 45d6e49..fe47378 100644 --- a/tests/integration/targets/gcp_compute_backend_bucket/tasks/main.yml +++ b/tests/integration/targets/gcp_compute_backend_bucket/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/tests/integration/targets/gcp_compute_backend_service/aliases b/tests/integration/targets/gcp_compute_backend_service/aliases index 9812f01..0e4419e 100644 --- a/tests/integration/targets/gcp_compute_backend_service/aliases +++ b/tests/integration/targets/gcp_compute_backend_service/aliases @@ -1,2 +1 @@ -cloud/gcp -unsupported +cloud/gcp \ No newline at end of file diff --git a/tests/integration/targets/gcp_compute_backend_service/tasks/autogen.yml b/tests/integration/targets/gcp_compute_backend_service/tasks/autogen.yml index fbe4b69..011a5d4 100644 --- a/tests/integration/targets/gcp_compute_backend_service/tasks/autogen.yml +++ b/tests/integration/targets/gcp_compute_backend_service/tasks/autogen.yml @@ -13,16 +13,16 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: create a instance group +- name: Create a instance group google.cloud.gcp_compute_instance_group: name: instancegroup-backendservice zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: instancegroup -- name: create a HTTP health check +- name: Create a HTTP health check google.cloud.gcp_compute_http_health_check: name: httphealthcheck-backendservice healthy_threshold: 10 @@ -31,125 +31,125 @@ unhealthy_threshold: 5 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: healthcheck -- name: delete a backend service +- name: Delete a backend service google.cloud.gcp_compute_backend_service: name: "{{ resource_name }}" backends: - - group: "{{ instancegroup.selfLink }}" + - group: "{{ instancegroup.selfLink }}" health_checks: - - "{{ healthcheck.selfLink }}" - enable_cdn: 'true' + - "{{ healthcheck.selfLink }}" + enable_cdn: "true" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a backend service +- name: Create a backend service google.cloud.gcp_compute_backend_service: name: "{{ resource_name }}" backends: - - group: "{{ instancegroup.selfLink }}" + - group: "{{ instancegroup.selfLink }}" health_checks: - - "{{ healthcheck.selfLink }}" - enable_cdn: 'true' + - "{{ healthcheck.selfLink }}" + enable_cdn: "true" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that backend_service was created +- name: Verify that backend_service was created google.cloud.gcp_compute_backend_service_info: - filters: - - name = {{ resource_name }} - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 1 # ---------------------------------------------------------------------------- -- name: create a backend service that already exists +- name: Create a backend service that already exists google.cloud.gcp_compute_backend_service: name: "{{ resource_name }}" backends: - - group: "{{ instancegroup.selfLink }}" + - group: "{{ instancegroup.selfLink }}" health_checks: - - "{{ healthcheck.selfLink }}" - enable_cdn: 'true' + - "{{ healthcheck.selfLink }}" + enable_cdn: "true" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a backend service +- name: Delete a backend service google.cloud.gcp_compute_backend_service: name: "{{ resource_name }}" backends: - - group: "{{ instancegroup.selfLink }}" + - group: "{{ instancegroup.selfLink }}" health_checks: - - "{{ healthcheck.selfLink }}" - enable_cdn: 'true' + - "{{ healthcheck.selfLink }}" + enable_cdn: "true" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that backend_service was deleted +- name: Verify that backend_service was deleted google.cloud.gcp_compute_backend_service_info: - filters: - - name = {{ resource_name }} - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 0 # ---------------------------------------------------------------------------- -- name: delete a backend service that does not exist +- name: Delete a backend service that does not exist google.cloud.gcp_compute_backend_service: name: "{{ resource_name }}" backends: - - group: "{{ instancegroup.selfLink }}" + - group: "{{ instancegroup.selfLink }}" health_checks: - - "{{ healthcheck.selfLink }}" - enable_cdn: 'true' + - "{{ healthcheck.selfLink }}" + enable_cdn: "true" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #--------------------------------------------------------- # Post-test teardown # If errors happen, don't crash the playbook! -- name: delete a HTTP health check +- name: Delete a HTTP health check google.cloud.gcp_compute_http_health_check: name: httphealthcheck-backendservice healthy_threshold: 10 @@ -158,17 +158,17 @@ unhealthy_threshold: 5 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: healthcheck ignore_errors: true -- name: delete a instance group +- name: Delete a instance group google.cloud.gcp_compute_instance_group: name: instancegroup-backendservice zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: instancegroup ignore_errors: true diff --git a/tests/integration/targets/gcp_compute_backend_service/tasks/main.yml b/tests/integration/targets/gcp_compute_backend_service/tasks/main.yml index 45d6e49..fe47378 100644 --- a/tests/integration/targets/gcp_compute_backend_service/tasks/main.yml +++ b/tests/integration/targets/gcp_compute_backend_service/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/tests/integration/targets/gcp_compute_disk/aliases b/tests/integration/targets/gcp_compute_disk/aliases index 9812f01..0e4419e 100644 --- a/tests/integration/targets/gcp_compute_disk/aliases +++ b/tests/integration/targets/gcp_compute_disk/aliases @@ -1,2 +1 @@ -cloud/gcp -unsupported +cloud/gcp \ No newline at end of file diff --git a/tests/integration/targets/gcp_compute_disk/tasks/autogen.yml b/tests/integration/targets/gcp_compute_disk/tasks/autogen.yml index 5f81dd0..9637972 100644 --- a/tests/integration/targets/gcp_compute_disk/tasks/autogen.yml +++ b/tests/integration/targets/gcp_compute_disk/tasks/autogen.yml @@ -13,7 +13,7 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: delete a disk +- name: Delete a disk google.cloud.gcp_compute_disk: name: "{{ resource_name }}" size_gb: 50 @@ -22,10 +22,10 @@ zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a disk +- name: Create a disk google.cloud.gcp_compute_disk: name: "{{ resource_name }}" size_gb: 50 @@ -34,30 +34,30 @@ zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that disk was created +- name: Verify that disk was created google.cloud.gcp_compute_disk_info: - filters: - - name = {{ resource_name }} - zone: us-central1-a - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + zone: us-central1-a + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 1 # ---------------------------------------------------------------------------- -- name: create a disk that already exists +- name: Create a disk that already exists google.cloud.gcp_compute_disk: name: "{{ resource_name }}" size_gb: 50 @@ -66,15 +66,15 @@ zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a disk +- name: Delete a disk google.cloud.gcp_compute_disk: name: "{{ resource_name }}" size_gb: 50 @@ -83,30 +83,30 @@ zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that disk was deleted +- name: Verify that disk was deleted google.cloud.gcp_compute_disk_info: - filters: - - name = {{ resource_name }} - zone: us-central1-a - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + zone: us-central1-a + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 0 # ---------------------------------------------------------------------------- -- name: delete a disk that does not exist +- name: Delete a disk that does not exist google.cloud.gcp_compute_disk: name: "{{ resource_name }}" size_gb: 50 @@ -115,10 +115,10 @@ zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false diff --git a/tests/integration/targets/gcp_compute_disk/tasks/main.yml b/tests/integration/targets/gcp_compute_disk/tasks/main.yml index 45d6e49..fe47378 100644 --- a/tests/integration/targets/gcp_compute_disk/tasks/main.yml +++ b/tests/integration/targets/gcp_compute_disk/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/tests/integration/targets/gcp_compute_external_vpn_gateway/aliases b/tests/integration/targets/gcp_compute_external_vpn_gateway/aliases index 9812f01..0e4419e 100644 --- a/tests/integration/targets/gcp_compute_external_vpn_gateway/aliases +++ b/tests/integration/targets/gcp_compute_external_vpn_gateway/aliases @@ -1,2 +1 @@ -cloud/gcp -unsupported +cloud/gcp \ No newline at end of file diff --git a/tests/integration/targets/gcp_compute_external_vpn_gateway/tasks/autogen.yml b/tests/integration/targets/gcp_compute_external_vpn_gateway/tasks/autogen.yml index 094b45b..f6fd6da 100644 --- a/tests/integration/targets/gcp_compute_external_vpn_gateway/tasks/autogen.yml +++ b/tests/integration/targets/gcp_compute_external_vpn_gateway/tasks/autogen.yml @@ -13,115 +13,115 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: delete a external vpn gateway +- name: Delete a external vpn gateway google.cloud.gcp_compute_external_vpn_gateway: name: "{{ resource_name }}" redundancy_type: SINGLE_IP_INTERNALLY_REDUNDANT - descrpition: An externalyl managed VPN gateway + description: An externaly managed VPN gateway interfaces: - - id: 0 - ip_address: 8.8.8.8 + - id: 0 + ip_address: 8.8.8.8 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a external vpn gateway +- name: Create a external vpn gateway google.cloud.gcp_compute_external_vpn_gateway: name: "{{ resource_name }}" redundancy_type: SINGLE_IP_INTERNALLY_REDUNDANT - descrpition: An externalyl managed VPN gateway + description: An externalyl managed VPN gateway interfaces: - - id: 0 - ip_address: 8.8.8.8 + - id: 0 + ip_address: 8.8.8.8 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that external_vpn_gateway was created +- name: Verify that external_vpn_gateway was created google.cloud.gcp_compute_external_vpn_gateway_info: - filters: - - name = {{ resource_name }} - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 1 # ---------------------------------------------------------------------------- -- name: create a external vpn gateway that already exists +- name: Create a external vpn gateway that already exists google.cloud.gcp_compute_external_vpn_gateway: name: "{{ resource_name }}" redundancy_type: SINGLE_IP_INTERNALLY_REDUNDANT - descrpition: An externalyl managed VPN gateway + description: An externalyl managed VPN gateway interfaces: - - id: 0 - ip_address: 8.8.8.8 + - id: 0 + ip_address: 8.8.8.8 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a external vpn gateway +- name: Delete a external vpn gateway google.cloud.gcp_compute_external_vpn_gateway: name: "{{ resource_name }}" redundancy_type: SINGLE_IP_INTERNALLY_REDUNDANT - descrpition: An externalyl managed VPN gateway + description: An externalyl managed VPN gateway interfaces: - - id: 0 - ip_address: 8.8.8.8 + - id: 0 + ip_address: 8.8.8.8 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that external_vpn_gateway was deleted +- name: Verify that external_vpn_gateway was deleted google.cloud.gcp_compute_external_vpn_gateway_info: - filters: - - name = {{ resource_name }} - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 0 # ---------------------------------------------------------------------------- -- name: delete a external vpn gateway that does not exist +- name: Delete a external vpn gateway that does not exist google.cloud.gcp_compute_external_vpn_gateway: name: "{{ resource_name }}" redundancy_type: SINGLE_IP_INTERNALLY_REDUNDANT - descrpition: An externalyl managed VPN gateway + description: An externalyl managed VPN gateway interfaces: - - id: 0 - ip_address: 8.8.8.8 + - id: 0 + ip_address: 8.8.8.8 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false diff --git a/tests/integration/targets/gcp_compute_external_vpn_gateway/tasks/main.yml b/tests/integration/targets/gcp_compute_external_vpn_gateway/tasks/main.yml index 45d6e49..fe47378 100644 --- a/tests/integration/targets/gcp_compute_external_vpn_gateway/tasks/main.yml +++ b/tests/integration/targets/gcp_compute_external_vpn_gateway/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/tests/integration/targets/gcp_compute_firewall/aliases b/tests/integration/targets/gcp_compute_firewall/aliases index 9812f01..0e4419e 100644 --- a/tests/integration/targets/gcp_compute_firewall/aliases +++ b/tests/integration/targets/gcp_compute_firewall/aliases @@ -1,2 +1 @@ -cloud/gcp -unsupported +cloud/gcp \ No newline at end of file diff --git a/tests/integration/targets/gcp_compute_firewall/tasks/autogen.yml b/tests/integration/targets/gcp_compute_firewall/tasks/autogen.yml index 42d0f12..bf51839 100644 --- a/tests/integration/targets/gcp_compute_firewall/tasks/autogen.yml +++ b/tests/integration/targets/gcp_compute_firewall/tasks/autogen.yml @@ -13,135 +13,135 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: delete a firewall +- name: Delete a firewall google.cloud.gcp_compute_firewall: name: "{{ resource_name }}" allowed: - - ip_protocol: tcp - ports: - - '22' + - ip_protocol: tcp + ports: + - "22" target_tags: - - test-ssh-server - - staging-ssh-server + - test-ssh-server + - staging-ssh-server source_tags: - - test-ssh-clients + - test-ssh-clients project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a firewall +- name: Create a firewall google.cloud.gcp_compute_firewall: name: "{{ resource_name }}" allowed: - - ip_protocol: tcp - ports: - - '22' + - ip_protocol: tcp + ports: + - "22" target_tags: - - test-ssh-server - - staging-ssh-server + - test-ssh-server + - staging-ssh-server source_tags: - - test-ssh-clients + - test-ssh-clients project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that firewall was created +- name: Verify that firewall was created google.cloud.gcp_compute_firewall_info: - filters: - - name = {{ resource_name }} - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 1 # ---------------------------------------------------------------------------- -- name: create a firewall that already exists +- name: Create a firewall that already exists google.cloud.gcp_compute_firewall: name: "{{ resource_name }}" allowed: - - ip_protocol: tcp - ports: - - '22' + - ip_protocol: tcp + ports: + - "22" target_tags: - - test-ssh-server - - staging-ssh-server + - test-ssh-server + - staging-ssh-server source_tags: - - test-ssh-clients + - test-ssh-clients project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a firewall +- name: Delete a firewall google.cloud.gcp_compute_firewall: name: "{{ resource_name }}" allowed: - - ip_protocol: tcp - ports: - - '22' + - ip_protocol: tcp + ports: + - "22" target_tags: - - test-ssh-server - - staging-ssh-server + - test-ssh-server + - staging-ssh-server source_tags: - - test-ssh-clients + - test-ssh-clients project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that firewall was deleted +- name: Verify that firewall was deleted google.cloud.gcp_compute_firewall_info: - filters: - - name = {{ resource_name }} - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 0 # ---------------------------------------------------------------------------- -- name: delete a firewall that does not exist +- name: Delete a firewall that does not exist google.cloud.gcp_compute_firewall: name: "{{ resource_name }}" allowed: - - ip_protocol: tcp - ports: - - '22' + - ip_protocol: tcp + ports: + - "22" target_tags: - - test-ssh-server - - staging-ssh-server + - test-ssh-server + - staging-ssh-server source_tags: - - test-ssh-clients + - test-ssh-clients project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false diff --git a/tests/integration/targets/gcp_compute_firewall/tasks/main.yml b/tests/integration/targets/gcp_compute_firewall/tasks/main.yml index 3cfb1cb..b266773 100644 --- a/tests/integration/targets/gcp_compute_firewall/tasks/main.yml +++ b/tests/integration/targets/gcp_compute_firewall/tasks/main.yml @@ -1,3 +1,5 @@ --- -- include_tasks: update.yml -- include_tasks: autogen.yml +- name: Update test + ansible.builtin.include_tasks: update.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/tests/integration/targets/gcp_compute_firewall/tasks/update.yml b/tests/integration/targets/gcp_compute_firewall/tasks/update.yml index 3ebbd21..3a2f73a 100644 --- a/tests/integration/targets/gcp_compute_firewall/tasks/update.yml +++ b/tests/integration/targets/gcp_compute_firewall/tasks/update.yml @@ -26,154 +26,154 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: delete a firewall +- name: Delete a firewall google.cloud.gcp_compute_firewall: name: "{{ resource_name }}" allowed: - - ip_protocol: tcp - ports: - - '22' + - ip_protocol: tcp + ports: + - "22" target_tags: - - test-ssh-server - - staging-ssh-server + - test-ssh-server + - staging-ssh-server source_tags: - - test-ssh-clients + - test-ssh-clients project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a firewall +- name: Create a firewall google.cloud.gcp_compute_firewall: name: "{{ resource_name }}" allowed: - - ip_protocol: tcp - ports: - - '22' + - ip_protocol: tcp + ports: + - "22" target_tags: - - test-ssh-server - - staging-ssh-server + - test-ssh-server + - staging-ssh-server source_tags: - - test-ssh-clients + - test-ssh-clients project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that firewall was created +- name: Verify that firewall was created google.cloud.gcp_compute_firewall_info: - filters: - - name = {{ resource_name }} - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 1 # ---------------------------------------------------------------------------- -- name: update the firewall +- name: Update the firewall google.cloud.gcp_compute_firewall: name: "{{ resource_name }}" allowed: - - ip_protocol: tcp - ports: - - '55' + - ip_protocol: tcp + ports: + - "55" target_tags: - - test-ssh-server - - staging-ssh-server + - test-ssh-server + - staging-ssh-server source_tags: - - test-ssh-clients + - test-ssh-clients project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true # ---------------------------------------------------------------------------- -- name: check firewall was updated. +- name: Check firewall was updated. google.cloud.gcp_compute_firewall_info: - filters: - - name = {{ resource_name }} - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 1 -- name: verify that update succeeded - assert: +- name: Verify that update succeeded + ansible.builtin.assert: that: - results['resources'][0]['allowed'][0]['ports'][0] == '55' #---------------------------------------------------------- -- name: delete a firewall +- name: Delete a firewall google.cloud.gcp_compute_firewall: name: "{{ resource_name }}" allowed: - - ip_protocol: tcp - ports: - - '22' + - ip_protocol: tcp + ports: + - "22" target_tags: - - test-ssh-server - - staging-ssh-server + - test-ssh-server + - staging-ssh-server source_tags: - - test-ssh-clients + - test-ssh-clients project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that firewall was deleted +- name: Verify that firewall was deleted google.cloud.gcp_compute_firewall_info: - filters: - - name = {{ resource_name }} - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 0 # ---------------------------------------------------------------------------- -- name: delete a firewall that does not exist +- name: Delete a firewall that does not exist google.cloud.gcp_compute_firewall: name: "{{ resource_name }}" allowed: - - ip_protocol: tcp - ports: - - '22' + - ip_protocol: tcp + ports: + - "22" target_tags: - - test-ssh-server - - staging-ssh-server + - test-ssh-server + - staging-ssh-server source_tags: - - test-ssh-clients + - test-ssh-clients project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false diff --git a/tests/integration/targets/gcp_compute_forwarding_rule/aliases b/tests/integration/targets/gcp_compute_forwarding_rule/aliases index 9812f01..0e4419e 100644 --- a/tests/integration/targets/gcp_compute_forwarding_rule/aliases +++ b/tests/integration/targets/gcp_compute_forwarding_rule/aliases @@ -1,2 +1 @@ -cloud/gcp -unsupported +cloud/gcp \ No newline at end of file diff --git a/tests/integration/targets/gcp_compute_forwarding_rule/tasks/autogen.yml b/tests/integration/targets/gcp_compute_forwarding_rule/tasks/autogen.yml index 01c5028..c26206f 100644 --- a/tests/integration/targets/gcp_compute_forwarding_rule/tasks/autogen.yml +++ b/tests/integration/targets/gcp_compute_forwarding_rule/tasks/autogen.yml @@ -13,158 +13,158 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: create a address +- name: Create a address google.cloud.gcp_compute_address: name: address-forwardingrule region: us-west1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: address -- name: create a target pool +- name: Create a target pool google.cloud.gcp_compute_target_pool: name: targetpool-forwardingrule region: us-west1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: targetpool -- name: delete a forwarding rule +- name: Delete a forwarding rule google.cloud.gcp_compute_forwarding_rule: name: "{{ resource_name }}" region: us-west1 - target: "{{ targetpool }}" + target: "{{ targetpool.selfLink }}" ip_protocol: TCP port_range: 80-80 ip_address: "{{ address.address }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a forwarding rule +- name: Create a forwarding rule google.cloud.gcp_compute_forwarding_rule: name: "{{ resource_name }}" region: us-west1 - target: "{{ targetpool }}" + target: "{{ targetpool.selfLink }}" ip_protocol: TCP port_range: 80-80 ip_address: "{{ address.address }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that forwarding_rule was created +- name: Verify that forwarding_rule was created google.cloud.gcp_compute_forwarding_rule_info: - filters: - - name = {{ resource_name }} - region: us-west1 - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + region: us-west1 + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 1 # ---------------------------------------------------------------------------- -- name: create a forwarding rule that already exists +- name: Create a forwarding rule that already exists google.cloud.gcp_compute_forwarding_rule: name: "{{ resource_name }}" region: us-west1 - target: "{{ targetpool }}" + target: "{{ targetpool.selfLink }}" ip_protocol: TCP port_range: 80-80 ip_address: "{{ address.address }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a forwarding rule +- name: Delete a forwarding rule google.cloud.gcp_compute_forwarding_rule: name: "{{ resource_name }}" region: us-west1 - target: "{{ targetpool }}" + target: "{{ targetpool.selfLink }}" ip_protocol: TCP port_range: 80-80 ip_address: "{{ address.address }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that forwarding_rule was deleted +- name: Verify that forwarding_rule was deleted google.cloud.gcp_compute_forwarding_rule_info: - filters: - - name = {{ resource_name }} - region: us-west1 - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + region: us-west1 + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 0 # ---------------------------------------------------------------------------- -- name: delete a forwarding rule that does not exist +- name: Delete a forwarding rule that does not exist google.cloud.gcp_compute_forwarding_rule: name: "{{ resource_name }}" region: us-west1 - target: "{{ targetpool }}" + target: "{{ targetpool.selfLink }}" ip_protocol: TCP port_range: 80-80 ip_address: "{{ address.address }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #--------------------------------------------------------- # Post-test teardown # If errors happen, don't crash the playbook! -- name: delete a target pool +- name: Delete a target pool google.cloud.gcp_compute_target_pool: name: targetpool-forwardingrule region: us-west1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: targetpool ignore_errors: true -- name: delete a address +- name: Delete a address google.cloud.gcp_compute_address: name: address-forwardingrule region: us-west1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: address ignore_errors: true diff --git a/tests/integration/targets/gcp_compute_forwarding_rule/tasks/main.yml b/tests/integration/targets/gcp_compute_forwarding_rule/tasks/main.yml index 45d6e49..fe47378 100644 --- a/tests/integration/targets/gcp_compute_forwarding_rule/tasks/main.yml +++ b/tests/integration/targets/gcp_compute_forwarding_rule/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/tests/integration/targets/gcp_compute_global_address/aliases b/tests/integration/targets/gcp_compute_global_address/aliases index 9812f01..0e4419e 100644 --- a/tests/integration/targets/gcp_compute_global_address/aliases +++ b/tests/integration/targets/gcp_compute_global_address/aliases @@ -1,2 +1 @@ -cloud/gcp -unsupported +cloud/gcp \ No newline at end of file diff --git a/tests/integration/targets/gcp_compute_global_address/tasks/autogen.yml b/tests/integration/targets/gcp_compute_global_address/tasks/autogen.yml index ac99653..3333e3f 100644 --- a/tests/integration/targets/gcp_compute_global_address/tasks/autogen.yml +++ b/tests/integration/targets/gcp_compute_global_address/tasks/autogen.yml @@ -13,90 +13,90 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: delete a global address +- name: Delete a global address google.cloud.gcp_compute_global_address: name: "{{ resource_name }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a global address +- name: Create a global address google.cloud.gcp_compute_global_address: name: "{{ resource_name }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that global_address was created +- name: Verify that global_address was created google.cloud.gcp_compute_global_address_info: - filters: - - name = {{ resource_name }} - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 1 # ---------------------------------------------------------------------------- -- name: create a global address that already exists +- name: Create a global address that already exists google.cloud.gcp_compute_global_address: name: "{{ resource_name }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a global address +- name: Delete a global address google.cloud.gcp_compute_global_address: name: "{{ resource_name }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that global_address was deleted +- name: Verify that global_address was deleted google.cloud.gcp_compute_global_address_info: - filters: - - name = {{ resource_name }} - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 0 # ---------------------------------------------------------------------------- -- name: delete a global address that does not exist +- name: Delete a global address that does not exist google.cloud.gcp_compute_global_address: name: "{{ resource_name }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false diff --git a/tests/integration/targets/gcp_compute_global_address/tasks/main.yml b/tests/integration/targets/gcp_compute_global_address/tasks/main.yml index 45d6e49..fe47378 100644 --- a/tests/integration/targets/gcp_compute_global_address/tasks/main.yml +++ b/tests/integration/targets/gcp_compute_global_address/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/tests/integration/targets/gcp_compute_global_forwarding_rule/aliases b/tests/integration/targets/gcp_compute_global_forwarding_rule/aliases index 9812f01..0e4419e 100644 --- a/tests/integration/targets/gcp_compute_global_forwarding_rule/aliases +++ b/tests/integration/targets/gcp_compute_global_forwarding_rule/aliases @@ -1,2 +1 @@ -cloud/gcp -unsupported +cloud/gcp \ No newline at end of file diff --git a/tests/integration/targets/gcp_compute_global_forwarding_rule/tasks/autogen.yml b/tests/integration/targets/gcp_compute_global_forwarding_rule/tasks/autogen.yml index 38d5d85..93bab3a 100644 --- a/tests/integration/targets/gcp_compute_global_forwarding_rule/tasks/autogen.yml +++ b/tests/integration/targets/gcp_compute_global_forwarding_rule/tasks/autogen.yml @@ -13,24 +13,24 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: create a global address +- name: Create a global address google.cloud.gcp_compute_global_address: name: globaladdress-globalforwardingrule project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: globaladdress -- name: create a instance group +- name: Create a instance group google.cloud.gcp_compute_instance_group: name: instancegroup-globalforwardingrule zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: instancegroup -- name: create a HTTP health check +- name: Create a HTTP health check google.cloud.gcp_compute_http_health_check: name: httphealthcheck-globalforwardingrule healthy_threshold: 10 @@ -39,41 +39,41 @@ unhealthy_threshold: 5 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: healthcheck -- name: create a backend service +- name: Create a backend service google.cloud.gcp_compute_backend_service: name: backendservice-globalforwardingrule backends: - - group: "{{ instancegroup.selfLink }}" + - group: "{{ instancegroup.selfLink }}" health_checks: - - "{{ healthcheck.selfLink }}" - enable_cdn: 'true' + - "{{ healthcheck.selfLink }}" + enable_cdn: "true" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: backendservice -- name: create a URL map +- name: Create a URL map google.cloud.gcp_compute_url_map: name: urlmap-globalforwardingrule default_service: "{{ backendservice }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: urlmap -- name: create a target HTTP proxy +- name: Create a target HTTP proxy google.cloud.gcp_compute_target_http_proxy: name: targethttpproxy-globalforwardingrule url_map: "{{ urlmap }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: httpproxy -- name: delete a global forwarding rule +- name: Delete a global forwarding rule google.cloud.gcp_compute_global_forwarding_rule: name: "{{ resource_name }}" ip_address: "{{ globaladdress.address }}" @@ -82,10 +82,10 @@ target: "{{ httpproxy.selfLink }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a global forwarding rule +- name: Create a global forwarding rule google.cloud.gcp_compute_global_forwarding_rule: name: "{{ resource_name }}" ip_address: "{{ globaladdress.address }}" @@ -94,29 +94,29 @@ target: "{{ httpproxy.selfLink }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that global_forwarding_rule was created +- name: Verify that global_forwarding_rule was created google.cloud.gcp_compute_global_forwarding_rule_info: - filters: - - name = {{ resource_name }} - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 1 # ---------------------------------------------------------------------------- -- name: create a global forwarding rule that already exists +- name: Create a global forwarding rule that already exists google.cloud.gcp_compute_global_forwarding_rule: name: "{{ resource_name }}" ip_address: "{{ globaladdress.address }}" @@ -125,15 +125,15 @@ target: "{{ httpproxy.selfLink }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a global forwarding rule +- name: Delete a global forwarding rule google.cloud.gcp_compute_global_forwarding_rule: name: "{{ resource_name }}" ip_address: "{{ globaladdress.address }}" @@ -142,29 +142,29 @@ target: "{{ httpproxy.selfLink }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that global_forwarding_rule was deleted +- name: Verify that global_forwarding_rule was deleted google.cloud.gcp_compute_global_forwarding_rule_info: - filters: - - name = {{ resource_name }} - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 0 # ---------------------------------------------------------------------------- -- name: delete a global forwarding rule that does not exist +- name: Delete a global forwarding rule that does not exist google.cloud.gcp_compute_global_forwarding_rule: name: "{{ resource_name }}" ip_address: "{{ globaladdress.address }}" @@ -173,51 +173,51 @@ target: "{{ httpproxy.selfLink }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #--------------------------------------------------------- # Post-test teardown # If errors happen, don't crash the playbook! -- name: delete a target HTTP proxy +- name: Delete a target HTTP proxy google.cloud.gcp_compute_target_http_proxy: name: targethttpproxy-globalforwardingrule url_map: "{{ urlmap }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: httpproxy ignore_errors: true -- name: delete a URL map +- name: Delete a URL map google.cloud.gcp_compute_url_map: name: urlmap-globalforwardingrule default_service: "{{ backendservice }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: urlmap ignore_errors: true -- name: delete a backend service +- name: Delete a backend service google.cloud.gcp_compute_backend_service: name: backendservice-globalforwardingrule backends: - - group: "{{ instancegroup.selfLink }}" + - group: "{{ instancegroup.selfLink }}" health_checks: - - "{{ healthcheck.selfLink }}" - enable_cdn: 'true' + - "{{ healthcheck.selfLink }}" + enable_cdn: "true" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: backendservice ignore_errors: true -- name: delete a HTTP health check +- name: Delete a HTTP health check google.cloud.gcp_compute_http_health_check: name: httphealthcheck-globalforwardingrule healthy_threshold: 10 @@ -226,26 +226,26 @@ unhealthy_threshold: 5 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: healthcheck ignore_errors: true -- name: delete a instance group +- name: Delete a instance group google.cloud.gcp_compute_instance_group: name: instancegroup-globalforwardingrule zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: instancegroup ignore_errors: true -- name: delete a global address +- name: Delete a global address google.cloud.gcp_compute_global_address: name: globaladdress-globalforwardingrule project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: globaladdress ignore_errors: true diff --git a/tests/integration/targets/gcp_compute_global_forwarding_rule/tasks/main.yml b/tests/integration/targets/gcp_compute_global_forwarding_rule/tasks/main.yml index 45d6e49..fe47378 100644 --- a/tests/integration/targets/gcp_compute_global_forwarding_rule/tasks/main.yml +++ b/tests/integration/targets/gcp_compute_global_forwarding_rule/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/tests/integration/targets/gcp_compute_health_check/aliases b/tests/integration/targets/gcp_compute_health_check/aliases index 9812f01..0e4419e 100644 --- a/tests/integration/targets/gcp_compute_health_check/aliases +++ b/tests/integration/targets/gcp_compute_health_check/aliases @@ -1,2 +1 @@ -cloud/gcp -unsupported +cloud/gcp \ No newline at end of file diff --git a/tests/integration/targets/gcp_compute_health_check/tasks/autogen.yml b/tests/integration/targets/gcp_compute_health_check/tasks/autogen.yml index a2374c5..d529ec6 100644 --- a/tests/integration/targets/gcp_compute_health_check/tasks/autogen.yml +++ b/tests/integration/targets/gcp_compute_health_check/tasks/autogen.yml @@ -13,7 +13,7 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: delete a health check +- name: Delete a health check google.cloud.gcp_compute_health_check: name: "{{ resource_name }}" type: TCP @@ -26,10 +26,10 @@ unhealthy_threshold: 5 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a health check +- name: Create a health check google.cloud.gcp_compute_health_check: name: "{{ resource_name }}" type: TCP @@ -42,29 +42,29 @@ unhealthy_threshold: 5 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that health_check was created +- name: Verify that health_check was created google.cloud.gcp_compute_health_check_info: - filters: - - name = {{ resource_name }} - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 1 # ---------------------------------------------------------------------------- -- name: create a health check that already exists +- name: Create a health check that already exists google.cloud.gcp_compute_health_check: name: "{{ resource_name }}" type: TCP @@ -77,15 +77,15 @@ unhealthy_threshold: 5 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a health check +- name: Delete a health check google.cloud.gcp_compute_health_check: name: "{{ resource_name }}" type: TCP @@ -98,29 +98,29 @@ unhealthy_threshold: 5 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that health_check was deleted +- name: Verify that health_check was deleted google.cloud.gcp_compute_health_check_info: - filters: - - name = {{ resource_name }} - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 0 # ---------------------------------------------------------------------------- -- name: delete a health check that does not exist +- name: Delete a health check that does not exist google.cloud.gcp_compute_health_check: name: "{{ resource_name }}" type: TCP @@ -133,10 +133,10 @@ unhealthy_threshold: 5 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false diff --git a/tests/integration/targets/gcp_compute_health_check/tasks/main.yml b/tests/integration/targets/gcp_compute_health_check/tasks/main.yml index 45d6e49..fe47378 100644 --- a/tests/integration/targets/gcp_compute_health_check/tasks/main.yml +++ b/tests/integration/targets/gcp_compute_health_check/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/tests/integration/targets/gcp_compute_http_health_check/aliases b/tests/integration/targets/gcp_compute_http_health_check/aliases index 9812f01..0e4419e 100644 --- a/tests/integration/targets/gcp_compute_http_health_check/aliases +++ b/tests/integration/targets/gcp_compute_http_health_check/aliases @@ -1,2 +1 @@ -cloud/gcp -unsupported +cloud/gcp \ No newline at end of file diff --git a/tests/integration/targets/gcp_compute_http_health_check/tasks/autogen.yml b/tests/integration/targets/gcp_compute_http_health_check/tasks/autogen.yml index cbf8123..1ff3b89 100644 --- a/tests/integration/targets/gcp_compute_http_health_check/tasks/autogen.yml +++ b/tests/integration/targets/gcp_compute_http_health_check/tasks/autogen.yml @@ -13,7 +13,7 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: delete a HTTP health check +- name: Delete a HTTP health check google.cloud.gcp_compute_http_health_check: name: "{{ resource_name }}" healthy_threshold: 10 @@ -22,10 +22,10 @@ unhealthy_threshold: 5 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a HTTP health check +- name: Create a HTTP health check google.cloud.gcp_compute_http_health_check: name: "{{ resource_name }}" healthy_threshold: 10 @@ -34,29 +34,29 @@ unhealthy_threshold: 5 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that http_health_check was created +- name: Verify that http_health_check was created google.cloud.gcp_compute_http_health_check_info: - filters: - - name = {{ resource_name }} - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 1 # ---------------------------------------------------------------------------- -- name: create a HTTP health check that already exists +- name: Create a HTTP health check that already exists google.cloud.gcp_compute_http_health_check: name: "{{ resource_name }}" healthy_threshold: 10 @@ -65,15 +65,15 @@ unhealthy_threshold: 5 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a HTTP health check +- name: Delete a HTTP health check google.cloud.gcp_compute_http_health_check: name: "{{ resource_name }}" healthy_threshold: 10 @@ -82,29 +82,29 @@ unhealthy_threshold: 5 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that http_health_check was deleted +- name: Verify that http_health_check was deleted google.cloud.gcp_compute_http_health_check_info: - filters: - - name = {{ resource_name }} - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 0 # ---------------------------------------------------------------------------- -- name: delete a HTTP health check that does not exist +- name: Delete a HTTP health check that does not exist google.cloud.gcp_compute_http_health_check: name: "{{ resource_name }}" healthy_threshold: 10 @@ -113,10 +113,10 @@ unhealthy_threshold: 5 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false diff --git a/tests/integration/targets/gcp_compute_http_health_check/tasks/main.yml b/tests/integration/targets/gcp_compute_http_health_check/tasks/main.yml index 45d6e49..fe47378 100644 --- a/tests/integration/targets/gcp_compute_http_health_check/tasks/main.yml +++ b/tests/integration/targets/gcp_compute_http_health_check/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/tests/integration/targets/gcp_compute_https_health_check/aliases b/tests/integration/targets/gcp_compute_https_health_check/aliases index 9812f01..0e4419e 100644 --- a/tests/integration/targets/gcp_compute_https_health_check/aliases +++ b/tests/integration/targets/gcp_compute_https_health_check/aliases @@ -1,2 +1 @@ -cloud/gcp -unsupported +cloud/gcp \ No newline at end of file diff --git a/tests/integration/targets/gcp_compute_https_health_check/tasks/autogen.yml b/tests/integration/targets/gcp_compute_https_health_check/tasks/autogen.yml index b53fb1d..c79968c 100644 --- a/tests/integration/targets/gcp_compute_https_health_check/tasks/autogen.yml +++ b/tests/integration/targets/gcp_compute_https_health_check/tasks/autogen.yml @@ -13,7 +13,7 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: delete a HTTPS health check +- name: Delete a HTTPS health check google.cloud.gcp_compute_https_health_check: name: "{{ resource_name }}" healthy_threshold: 10 @@ -22,10 +22,10 @@ unhealthy_threshold: 5 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a HTTPS health check +- name: Create a HTTPS health check google.cloud.gcp_compute_https_health_check: name: "{{ resource_name }}" healthy_threshold: 10 @@ -34,29 +34,29 @@ unhealthy_threshold: 5 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that https_health_check was created +- name: Verify that https_health_check was created google.cloud.gcp_compute_https_health_check_info: - filters: - - name = {{ resource_name }} - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 1 # ---------------------------------------------------------------------------- -- name: create a HTTPS health check that already exists +- name: Create a HTTPS health check that already exists google.cloud.gcp_compute_https_health_check: name: "{{ resource_name }}" healthy_threshold: 10 @@ -65,15 +65,15 @@ unhealthy_threshold: 5 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a HTTPS health check +- name: Delete a HTTPS health check google.cloud.gcp_compute_https_health_check: name: "{{ resource_name }}" healthy_threshold: 10 @@ -82,29 +82,29 @@ unhealthy_threshold: 5 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that https_health_check was deleted +- name: Verify that https_health_check was deleted google.cloud.gcp_compute_https_health_check_info: - filters: - - name = {{ resource_name }} - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 0 # ---------------------------------------------------------------------------- -- name: delete a HTTPS health check that does not exist +- name: Delete a HTTPS health check that does not exist google.cloud.gcp_compute_https_health_check: name: "{{ resource_name }}" healthy_threshold: 10 @@ -113,10 +113,10 @@ unhealthy_threshold: 5 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false diff --git a/tests/integration/targets/gcp_compute_https_health_check/tasks/main.yml b/tests/integration/targets/gcp_compute_https_health_check/tasks/main.yml index 45d6e49..fe47378 100644 --- a/tests/integration/targets/gcp_compute_https_health_check/tasks/main.yml +++ b/tests/integration/targets/gcp_compute_https_health_check/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/tests/integration/targets/gcp_compute_image/aliases b/tests/integration/targets/gcp_compute_image/aliases index 9812f01..0e4419e 100644 --- a/tests/integration/targets/gcp_compute_image/aliases +++ b/tests/integration/targets/gcp_compute_image/aliases @@ -1,2 +1 @@ -cloud/gcp -unsupported +cloud/gcp \ No newline at end of file diff --git a/tests/integration/targets/gcp_compute_image/tasks/autogen.yml b/tests/integration/targets/gcp_compute_image/tasks/autogen.yml index 40fa870..e44f010 100644 --- a/tests/integration/targets/gcp_compute_image/tasks/autogen.yml +++ b/tests/integration/targets/gcp_compute_image/tasks/autogen.yml @@ -13,117 +13,117 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: create a disk +- name: Create a disk google.cloud.gcp_compute_disk: name: disk-image zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: disk -- name: delete a image +- name: Delete a image google.cloud.gcp_compute_image: name: "{{ resource_name }}" source_disk: "{{ disk }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a image +- name: Create a image google.cloud.gcp_compute_image: name: "{{ resource_name }}" source_disk: "{{ disk }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that image was created +- name: Verify that image was created google.cloud.gcp_compute_image_info: - filters: - - name = {{ resource_name }} - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 1 # ---------------------------------------------------------------------------- -- name: create a image that already exists +- name: Create a image that already exists google.cloud.gcp_compute_image: name: "{{ resource_name }}" source_disk: "{{ disk }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a image +- name: Delete a image google.cloud.gcp_compute_image: name: "{{ resource_name }}" source_disk: "{{ disk }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that image was deleted +- name: Verify that image was deleted google.cloud.gcp_compute_image_info: - filters: - - name = {{ resource_name }} - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 0 # ---------------------------------------------------------------------------- -- name: delete a image that does not exist +- name: Delete a image that does not exist google.cloud.gcp_compute_image: name: "{{ resource_name }}" source_disk: "{{ disk }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #--------------------------------------------------------- # Post-test teardown # If errors happen, don't crash the playbook! -- name: delete a disk +- name: Delete a disk google.cloud.gcp_compute_disk: name: disk-image zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: disk ignore_errors: true diff --git a/tests/integration/targets/gcp_compute_image/tasks/main.yml b/tests/integration/targets/gcp_compute_image/tasks/main.yml index 45d6e49..fe47378 100644 --- a/tests/integration/targets/gcp_compute_image/tasks/main.yml +++ b/tests/integration/targets/gcp_compute_image/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/tests/integration/targets/gcp_compute_instance/aliases b/tests/integration/targets/gcp_compute_instance/aliases index 9812f01..0e4419e 100644 --- a/tests/integration/targets/gcp_compute_instance/aliases +++ b/tests/integration/targets/gcp_compute_instance/aliases @@ -1,2 +1 @@ -cloud/gcp -unsupported +cloud/gcp \ No newline at end of file diff --git a/tests/integration/targets/gcp_compute_instance/tasks/autogen.yml b/tests/integration/targets/gcp_compute_instance/tasks/autogen.yml index fb88569..fbec1e1 100644 --- a/tests/integration/targets/gcp_compute_instance/tasks/autogen.yml +++ b/tests/integration/targets/gcp_compute_instance/tasks/autogen.yml @@ -13,264 +13,261 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: create a disk +- name: Create a disk google.cloud.gcp_compute_disk: - name: disk-instance + name: "{{ resource_prefix }}" size_gb: 50 - source_image: projects/ubuntu-os-cloud/global/images/family/ubuntu-1604-lts + source_image: projects/ubuntu-os-cloud/global/images/family/ubuntu-minimal-2204-lts zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: disk -- name: create a network +- name: Create a network google.cloud.gcp_compute_network: - name: network-instance + name: "{{ resource_prefix }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + auto_create_subnetworks: true state: present register: network -- name: create a address +- name: Create a address google.cloud.gcp_compute_address: name: address-instance region: us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: address -- name: delete a instance +- name: Delete a instance google.cloud.gcp_compute_instance: name: "{{ resource_name }}" machine_type: n1-standard-1 disks: - - auto_delete: 'true' - boot: 'true' - source: "{{ disk }}" - - auto_delete: 'true' - interface: NVME - type: SCRATCH - initialize_params: - disk_type: local-ssd + - auto_delete: "true" + boot: "true" + source: "{{ disk }}" + - auto_delete: "true" + interface: NVME + type: SCRATCH + initialize_params: + disk_type: local-ssd metadata: - startup-script-url: gs:://graphite-playground/bootstrap.sh - cost-center: '12345' + cost-center: "12345" labels: environment: production network_interfaces: - - network: "{{ network }}" - access_configs: - - name: External NAT - nat_ip: "{{ address }}" - type: ONE_TO_ONE_NAT + - network: "{{ network }}" + access_configs: + - name: External NAT + nat_ip: "{{ address }}" + type: ONE_TO_ONE_NAT zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a instance +- name: Create a instance google.cloud.gcp_compute_instance: name: "{{ resource_name }}" machine_type: n1-standard-1 disks: - - auto_delete: 'true' - boot: 'true' - source: "{{ disk }}" - - auto_delete: 'true' - interface: NVME - type: SCRATCH - initialize_params: - disk_type: local-ssd + - auto_delete: "true" + boot: "true" + source: "{{ disk }}" + - auto_delete: "true" + interface: NVME + type: SCRATCH + initialize_params: + disk_type: local-ssd metadata: - startup-script-url: gs:://graphite-playground/bootstrap.sh - cost-center: '12345' + cost-center: "12345" labels: environment: production network_interfaces: - - network: "{{ network }}" - access_configs: - - name: External NAT - nat_ip: "{{ address }}" - type: ONE_TO_ONE_NAT + - network: "{{ network }}" + access_configs: + - name: External NAT + nat_ip: "{{ address }}" + type: ONE_TO_ONE_NAT zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that instance was created +- name: Verify that instance was created google.cloud.gcp_compute_instance_info: - filters: - - name = {{ resource_name }} - zone: us-central1-a - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + zone: us-central1-a + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 1 # ---------------------------------------------------------------------------- -- name: create a instance that already exists +- name: Create a instance that already exists google.cloud.gcp_compute_instance: name: "{{ resource_name }}" machine_type: n1-standard-1 disks: - - auto_delete: 'true' - boot: 'true' - source: "{{ disk }}" - - auto_delete: 'true' - interface: NVME - type: SCRATCH - initialize_params: - disk_type: local-ssd + - auto_delete: "true" + boot: "true" + source: "{{ disk }}" + - auto_delete: "true" + interface: NVME + type: SCRATCH + initialize_params: + disk_type: local-ssd metadata: - startup-script-url: gs:://graphite-playground/bootstrap.sh - cost-center: '12345' + cost-center: "12345" labels: environment: production network_interfaces: - - network: "{{ network }}" - access_configs: - - name: External NAT - nat_ip: "{{ address }}" - type: ONE_TO_ONE_NAT + - network: "{{ network }}" + access_configs: + - name: External NAT + nat_ip: "{{ address }}" + type: ONE_TO_ONE_NAT zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a instance +- name: Delete a instance google.cloud.gcp_compute_instance: name: "{{ resource_name }}" machine_type: n1-standard-1 disks: - - auto_delete: 'true' - boot: 'true' - source: "{{ disk }}" - - auto_delete: 'true' - interface: NVME - type: SCRATCH - initialize_params: - disk_type: local-ssd + - auto_delete: "true" + boot: "true" + source: "{{ disk }}" + - auto_delete: "true" + interface: NVME + type: SCRATCH + initialize_params: + disk_type: local-ssd metadata: - startup-script-url: gs:://graphite-playground/bootstrap.sh - cost-center: '12345' + cost-center: "12345" labels: environment: production network_interfaces: - - network: "{{ network }}" - access_configs: - - name: External NAT - nat_ip: "{{ address }}" - type: ONE_TO_ONE_NAT + - network: "{{ network }}" + access_configs: + - name: External NAT + nat_ip: "{{ address }}" + type: ONE_TO_ONE_NAT zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that instance was deleted +- name: Verify that instance was deleted google.cloud.gcp_compute_instance_info: - filters: - - name = {{ resource_name }} - zone: us-central1-a - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + zone: us-central1-a + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 0 # ---------------------------------------------------------------------------- -- name: delete a instance that does not exist +- name: Delete a instance that does not exist google.cloud.gcp_compute_instance: name: "{{ resource_name }}" machine_type: n1-standard-1 disks: - - auto_delete: 'true' - boot: 'true' - source: "{{ disk }}" - - auto_delete: 'true' - interface: NVME - type: SCRATCH - initialize_params: - disk_type: local-ssd + - auto_delete: "true" + boot: "true" + source: "{{ disk }}" + - auto_delete: "true" + interface: NVME + type: SCRATCH + initialize_params: + disk_type: local-ssd metadata: - startup-script-url: gs:://graphite-playground/bootstrap.sh - cost-center: '12345' + cost-center: "12345" labels: environment: production network_interfaces: - - network: "{{ network }}" - access_configs: - - name: External NAT - nat_ip: "{{ address }}" - type: ONE_TO_ONE_NAT + - network: "{{ network }}" + access_configs: + - name: External NAT + nat_ip: "{{ address }}" + type: ONE_TO_ONE_NAT zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #--------------------------------------------------------- # Post-test teardown # If errors happen, don't crash the playbook! -- name: delete a address +- name: Delete a address google.cloud.gcp_compute_address: name: address-instance region: us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: address ignore_errors: true -- name: delete a network +- name: Delete a network google.cloud.gcp_compute_network: - name: network-instance + name: "{{ resource_prefix }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + auto_create_subnetworks: true state: absent register: network ignore_errors: true -- name: delete a disk +- name: Delete a disk google.cloud.gcp_compute_disk: - name: disk-instance + name: "{{ resource_prefix }}" size_gb: 50 - source_image: projects/ubuntu-os-cloud/global/images/family/ubuntu-1604-lts + source_image: projects/ubuntu-os-cloud/global/images/family/ubuntu-minimal-2204-lts zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: disk ignore_errors: true diff --git a/tests/integration/targets/gcp_compute_instance/tasks/main.yml b/tests/integration/targets/gcp_compute_instance/tasks/main.yml index 45d6e49..fe47378 100644 --- a/tests/integration/targets/gcp_compute_instance/tasks/main.yml +++ b/tests/integration/targets/gcp_compute_instance/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/tests/integration/targets/gcp_compute_instance_group/aliases b/tests/integration/targets/gcp_compute_instance_group/aliases index 9812f01..0e4419e 100644 --- a/tests/integration/targets/gcp_compute_instance_group/aliases +++ b/tests/integration/targets/gcp_compute_instance_group/aliases @@ -1,2 +1 @@ -cloud/gcp -unsupported +cloud/gcp \ No newline at end of file diff --git a/tests/integration/targets/gcp_compute_instance_group/tasks/autogen.yml b/tests/integration/targets/gcp_compute_instance_group/tasks/autogen.yml index 87ac081..340c8ca 100644 --- a/tests/integration/targets/gcp_compute_instance_group/tasks/autogen.yml +++ b/tests/integration/targets/gcp_compute_instance_group/tasks/autogen.yml @@ -13,137 +13,139 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: create a network +- name: Create a network google.cloud.gcp_compute_network: name: network-instancegroup project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + auto_create_subnetworks: true state: present register: network -- name: delete a instance group +- name: Delete a instance group google.cloud.gcp_compute_instance_group: name: "{{ resource_name }}" named_ports: - - name: ansible - port: 1234 + - name: ansible + port: 1234 network: "{{ network }}" zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a instance group +- name: Create a instance group google.cloud.gcp_compute_instance_group: name: "{{ resource_name }}" named_ports: - - name: ansible - port: 1234 + - name: ansible + port: 1234 network: "{{ network }}" zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that instance_group was created +- name: Verify that instance_group was created google.cloud.gcp_compute_instance_group_info: - filters: - - name = {{ resource_name }} - zone: us-central1-a - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + zone: us-central1-a + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 1 # ---------------------------------------------------------------------------- -- name: create a instance group that already exists +- name: Create a instance group that already exists google.cloud.gcp_compute_instance_group: name: "{{ resource_name }}" named_ports: - - name: ansible - port: 1234 + - name: ansible + port: 1234 network: "{{ network }}" zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a instance group +- name: Delete a instance group google.cloud.gcp_compute_instance_group: name: "{{ resource_name }}" named_ports: - - name: ansible - port: 1234 + - name: ansible + port: 1234 network: "{{ network }}" zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that instance_group was deleted +- name: Verify that instance_group was deleted google.cloud.gcp_compute_instance_group_info: - filters: - - name = {{ resource_name }} - zone: us-central1-a - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + zone: us-central1-a + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 0 # ---------------------------------------------------------------------------- -- name: delete a instance group that does not exist +- name: Delete a instance group that does not exist google.cloud.gcp_compute_instance_group: name: "{{ resource_name }}" named_ports: - - name: ansible - port: 1234 + - name: ansible + port: 1234 network: "{{ network }}" zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #--------------------------------------------------------- # Post-test teardown # If errors happen, don't crash the playbook! -- name: delete a network +- name: Delete a network google.cloud.gcp_compute_network: name: network-instancegroup project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + auto_create_subnetworks: true state: absent register: network ignore_errors: true diff --git a/tests/integration/targets/gcp_compute_instance_group/tasks/main.yml b/tests/integration/targets/gcp_compute_instance_group/tasks/main.yml index 45d6e49..fe47378 100644 --- a/tests/integration/targets/gcp_compute_instance_group/tasks/main.yml +++ b/tests/integration/targets/gcp_compute_instance_group/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/tests/integration/targets/gcp_compute_instance_group_manager/aliases b/tests/integration/targets/gcp_compute_instance_group_manager/aliases index 9812f01..0e4419e 100644 --- a/tests/integration/targets/gcp_compute_instance_group_manager/aliases +++ b/tests/integration/targets/gcp_compute_instance_group_manager/aliases @@ -1,2 +1 @@ -cloud/gcp -unsupported +cloud/gcp \ No newline at end of file diff --git a/tests/integration/targets/gcp_compute_instance_group_manager/tasks/autogen.yml b/tests/integration/targets/gcp_compute_instance_group_manager/tasks/autogen.yml index bdb26d3..a60441e 100644 --- a/tests/integration/targets/gcp_compute_instance_group_manager/tasks/autogen.yml +++ b/tests/integration/targets/gcp_compute_instance_group_manager/tasks/autogen.yml @@ -13,45 +13,46 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: create a network +- name: Create a network google.cloud.gcp_compute_network: name: network-instancetemplate project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + auto_create_subnetworks: true state: present register: network -- name: create a address +- name: Create a address google.cloud.gcp_compute_address: name: address-instancetemplate region: us-west1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: address -- name: create a instance template +- name: Create a instance template google.cloud.gcp_compute_instance_template: name: "{{ resource_name }}" properties: disks: - - auto_delete: 'true' - boot: 'true' - initialize_params: - source_image: projects/ubuntu-os-cloud/global/images/family/ubuntu-1604-lts + - auto_delete: "true" + boot: "true" + initialize_params: + source_image: projects/ubuntu-os-cloud/global/images/family/ubuntu-minimal-2204-lts machine_type: n1-standard-1 network_interfaces: - - network: "{{ network }}" - access_configs: - - name: test-config - type: ONE_TO_ONE_NAT - nat_ip: "{{ address }}" + - network: "{{ network }}" + access_configs: + - name: test-config + type: ONE_TO_ONE_NAT + nat_ip: "{{ address }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: instancetemplate -- name: delete a instance group manager +- name: Delete a instance group manager google.cloud.gcp_compute_instance_group_manager: name: "{{ resource_name }}" base_instance_name: test1-child @@ -60,10 +61,10 @@ zone: us-west1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a instance group manager +- name: Create a instance group manager google.cloud.gcp_compute_instance_group_manager: name: "{{ resource_name }}" base_instance_name: test1-child @@ -72,30 +73,30 @@ zone: us-west1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that instance_group_manager was created +- name: Verify that instance_group_manager was created google.cloud.gcp_compute_instance_group_manager_info: - filters: - - name = {{ resource_name }} - zone: us-west1-a - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + zone: us-west1-a + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 1 # ---------------------------------------------------------------------------- -- name: create a instance group manager that already exists +- name: Create a instance group manager that already exists google.cloud.gcp_compute_instance_group_manager: name: "{{ resource_name }}" base_instance_name: test1-child @@ -104,15 +105,15 @@ zone: us-west1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a instance group manager +- name: Delete a instance group manager google.cloud.gcp_compute_instance_group_manager: name: "{{ resource_name }}" base_instance_name: test1-child @@ -121,30 +122,30 @@ zone: us-west1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that instance_group_manager was deleted +- name: Verify that instance_group_manager was deleted google.cloud.gcp_compute_instance_group_manager_info: - filters: - - name = {{ resource_name }} - zone: us-west1-a - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + zone: us-west1-a + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 0 # ---------------------------------------------------------------------------- -- name: delete a instance group manager that does not exist +- name: Delete a instance group manager that does not exist google.cloud.gcp_compute_instance_group_manager: name: "{{ resource_name }}" base_instance_name: test1-child @@ -153,54 +154,55 @@ zone: us-west1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #--------------------------------------------------------- # Post-test teardown # If errors happen, don't crash the playbook! -- name: delete a instance template +- name: Delete a instance template google.cloud.gcp_compute_instance_template: name: "{{ resource_name }}" properties: disks: - - auto_delete: 'true' - boot: 'true' - initialize_params: - source_image: projects/ubuntu-os-cloud/global/images/family/ubuntu-1604-lts + - auto_delete: "true" + boot: "true" + initialize_params: + source_image: projects/ubuntu-os-cloud/global/images/family/ubuntu-minimal-2204-lts machine_type: n1-standard-1 network_interfaces: - - network: "{{ network }}" - access_configs: - - name: test-config - type: ONE_TO_ONE_NAT - nat_ip: "{{ address }}" + - network: "{{ network }}" + access_configs: + - name: test-config + type: ONE_TO_ONE_NAT + nat_ip: "{{ address }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: instancetemplate ignore_errors: true -- name: delete a address +- name: Delete a address google.cloud.gcp_compute_address: name: address-instancetemplate region: us-west1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: address ignore_errors: true -- name: delete a network +- name: Delete a network google.cloud.gcp_compute_network: name: network-instancetemplate project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + auto_create_subnetworks: true state: absent register: network ignore_errors: true diff --git a/tests/integration/targets/gcp_compute_instance_group_manager/tasks/main.yml b/tests/integration/targets/gcp_compute_instance_group_manager/tasks/main.yml index 45d6e49..fe47378 100644 --- a/tests/integration/targets/gcp_compute_instance_group_manager/tasks/main.yml +++ b/tests/integration/targets/gcp_compute_instance_group_manager/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/tests/integration/targets/gcp_compute_instance_template/aliases b/tests/integration/targets/gcp_compute_instance_template/aliases index 9812f01..26507c2 100644 --- a/tests/integration/targets/gcp_compute_instance_template/aliases +++ b/tests/integration/targets/gcp_compute_instance_template/aliases @@ -1,2 +1 @@ cloud/gcp -unsupported diff --git a/tests/integration/targets/gcp_compute_instance_template/tasks/autogen.yml b/tests/integration/targets/gcp_compute_instance_template/tasks/autogen.yml index a80d7c4..72fb809 100644 --- a/tests/integration/targets/gcp_compute_instance_template/tasks/autogen.yml +++ b/tests/integration/targets/gcp_compute_instance_template/tasks/autogen.yml @@ -13,194 +13,196 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: create a network +- name: Create a network google.cloud.gcp_compute_network: name: network-instancetemplate project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + auto_create_subnetworks: true state: present register: network -- name: create a address +- name: Create a address google.cloud.gcp_compute_address: name: address-instancetemplate region: us-west1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: address -- name: delete a instance template +- name: Delete a instance template google.cloud.gcp_compute_instance_template: name: "{{ resource_name }}" properties: disks: - - auto_delete: 'true' - boot: 'true' - initialize_params: - source_image: projects/ubuntu-os-cloud/global/images/family/ubuntu-1604-lts + - auto_delete: "true" + boot: "true" + initialize_params: + source_image: projects/ubuntu-os-cloud/global/images/family/ubuntu-minimal-2204-lts machine_type: n1-standard-1 network_interfaces: - - network: "{{ network }}" - access_configs: - - name: test-config - type: ONE_TO_ONE_NAT - nat_ip: "{{ address }}" + - network: "{{ network }}" + access_configs: + - name: test-config + type: ONE_TO_ONE_NAT + nat_ip: "{{ address }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a instance template +- name: Create a instance template google.cloud.gcp_compute_instance_template: name: "{{ resource_name }}" properties: disks: - - auto_delete: 'true' - boot: 'true' - initialize_params: - source_image: projects/ubuntu-os-cloud/global/images/family/ubuntu-1604-lts + - auto_delete: "true" + boot: "true" + initialize_params: + source_image: projects/ubuntu-os-cloud/global/images/family/ubuntu-minimal-2204-lts machine_type: n1-standard-1 network_interfaces: - - network: "{{ network }}" - access_configs: - - name: test-config - type: ONE_TO_ONE_NAT - nat_ip: "{{ address }}" + - network: "{{ network }}" + access_configs: + - name: test-config + type: ONE_TO_ONE_NAT + nat_ip: "{{ address }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that instance_template was created +- name: Verify that instance_template was created google.cloud.gcp_compute_instance_template_info: - filters: - - name = {{ resource_name }} - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 1 # ---------------------------------------------------------------------------- -- name: create a instance template that already exists +- name: Create a instance template that already exists google.cloud.gcp_compute_instance_template: name: "{{ resource_name }}" properties: disks: - - auto_delete: 'true' - boot: 'true' - initialize_params: - source_image: projects/ubuntu-os-cloud/global/images/family/ubuntu-1604-lts + - auto_delete: "true" + boot: "true" + initialize_params: + source_image: projects/ubuntu-os-cloud/global/images/family/ubuntu-minimal-2204-lts machine_type: n1-standard-1 network_interfaces: - - network: "{{ network }}" - access_configs: - - name: test-config - type: ONE_TO_ONE_NAT - nat_ip: "{{ address }}" + - network: "{{ network }}" + access_configs: + - name: test-config + type: ONE_TO_ONE_NAT + nat_ip: "{{ address }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a instance template +- name: Delete a instance template google.cloud.gcp_compute_instance_template: name: "{{ resource_name }}" properties: disks: - - auto_delete: 'true' - boot: 'true' - initialize_params: - source_image: projects/ubuntu-os-cloud/global/images/family/ubuntu-1604-lts + - auto_delete: "true" + boot: "true" + initialize_params: + source_image: projects/ubuntu-os-cloud/global/images/family/ubuntu-minimal-2204-lts machine_type: n1-standard-1 network_interfaces: - - network: "{{ network }}" - access_configs: - - name: test-config - type: ONE_TO_ONE_NAT - nat_ip: "{{ address }}" + - network: "{{ network }}" + access_configs: + - name: test-config + type: ONE_TO_ONE_NAT + nat_ip: "{{ address }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that instance_template was deleted +- name: Verify that instance_template was deleted google.cloud.gcp_compute_instance_template_info: - filters: - - name = {{ resource_name }} - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 0 # ---------------------------------------------------------------------------- -- name: delete a instance template that does not exist +- name: Delete a instance template that does not exist google.cloud.gcp_compute_instance_template: name: "{{ resource_name }}" properties: disks: - - auto_delete: 'true' - boot: 'true' - initialize_params: - source_image: projects/ubuntu-os-cloud/global/images/family/ubuntu-1604-lts + - auto_delete: "true" + boot: "true" + initialize_params: + source_image: projects/ubuntu-os-cloud/global/images/family/ubuntu-minimal-2204-lts machine_type: n1-standard-1 network_interfaces: - - network: "{{ network }}" - access_configs: - - name: test-config - type: ONE_TO_ONE_NAT - nat_ip: "{{ address }}" + - network: "{{ network }}" + access_configs: + - name: test-config + type: ONE_TO_ONE_NAT + nat_ip: "{{ address }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #--------------------------------------------------------- # Post-test teardown # If errors happen, don't crash the playbook! -- name: delete a address +- name: Delete a address google.cloud.gcp_compute_address: name: address-instancetemplate region: us-west1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: address ignore_errors: true -- name: delete a network +- name: Delete a network google.cloud.gcp_compute_network: name: network-instancetemplate project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + auto_create_subnetworks: true state: absent register: network ignore_errors: true diff --git a/tests/integration/targets/gcp_compute_instance_template/tasks/main.yml b/tests/integration/targets/gcp_compute_instance_template/tasks/main.yml index 45d6e49..fe47378 100644 --- a/tests/integration/targets/gcp_compute_instance_template/tasks/main.yml +++ b/tests/integration/targets/gcp_compute_instance_template/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/tests/integration/targets/gcp_compute_interconnect_attachment/aliases b/tests/integration/targets/gcp_compute_interconnect_attachment/aliases index 9812f01..0e4419e 100644 --- a/tests/integration/targets/gcp_compute_interconnect_attachment/aliases +++ b/tests/integration/targets/gcp_compute_interconnect_attachment/aliases @@ -1,2 +1 @@ -cloud/gcp -unsupported +cloud/gcp \ No newline at end of file diff --git a/tests/integration/targets/gcp_compute_interconnect_attachment/defaults/main.yml b/tests/integration/targets/gcp_compute_interconnect_attachment/defaults/main.yml index aa87a2a..aa65c31 100644 --- a/tests/integration/targets/gcp_compute_interconnect_attachment/defaults/main.yml +++ b/tests/integration/targets/gcp_compute_interconnect_attachment/defaults/main.yml @@ -1,3 +1,3 @@ --- # defaults file -resource_name: '{{resource_prefix}}' +resource_name: "{{ resource_prefix }}" diff --git a/tests/integration/targets/gcp_compute_managed_ssl_certificate/aliases b/tests/integration/targets/gcp_compute_managed_ssl_certificate/aliases index 9812f01..26507c2 100644 --- a/tests/integration/targets/gcp_compute_managed_ssl_certificate/aliases +++ b/tests/integration/targets/gcp_compute_managed_ssl_certificate/aliases @@ -1,2 +1 @@ cloud/gcp -unsupported diff --git a/tests/integration/targets/gcp_compute_managed_ssl_certificate/defaults/main.yml b/tests/integration/targets/gcp_compute_managed_ssl_certificate/defaults/main.yml index aa87a2a..aa65c31 100644 --- a/tests/integration/targets/gcp_compute_managed_ssl_certificate/defaults/main.yml +++ b/tests/integration/targets/gcp_compute_managed_ssl_certificate/defaults/main.yml @@ -1,3 +1,3 @@ --- # defaults file -resource_name: '{{resource_prefix}}' +resource_name: "{{ resource_prefix }}" diff --git a/tests/integration/targets/gcp_compute_network/aliases b/tests/integration/targets/gcp_compute_network/aliases index 9812f01..0e4419e 100644 --- a/tests/integration/targets/gcp_compute_network/aliases +++ b/tests/integration/targets/gcp_compute_network/aliases @@ -1,2 +1 @@ -cloud/gcp -unsupported +cloud/gcp \ No newline at end of file diff --git a/tests/integration/targets/gcp_compute_network/tasks/autogen.yml b/tests/integration/targets/gcp_compute_network/tasks/autogen.yml index 74dae78..b887e2b 100644 --- a/tests/integration/targets/gcp_compute_network/tasks/autogen.yml +++ b/tests/integration/targets/gcp_compute_network/tasks/autogen.yml @@ -13,95 +13,95 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: delete a network +- name: Delete a network google.cloud.gcp_compute_network: name: "{{ resource_name }}" - auto_create_subnetworks: 'true' + auto_create_subnetworks: "true" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a network +- name: Create a network google.cloud.gcp_compute_network: name: "{{ resource_name }}" - auto_create_subnetworks: 'true' + auto_create_subnetworks: "true" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that network was created +- name: Verify that network was created google.cloud.gcp_compute_network_info: - filters: - - name = {{ resource_name }} - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 1 # ---------------------------------------------------------------------------- -- name: create a network that already exists +- name: Create a network that already exists google.cloud.gcp_compute_network: name: "{{ resource_name }}" - auto_create_subnetworks: 'true' + auto_create_subnetworks: "true" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a network +- name: Delete a network google.cloud.gcp_compute_network: name: "{{ resource_name }}" - auto_create_subnetworks: 'true' + auto_create_subnetworks: "true" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that network was deleted +- name: Verify that network was deleted google.cloud.gcp_compute_network_info: - filters: - - name = {{ resource_name }} - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 0 # ---------------------------------------------------------------------------- -- name: delete a network that does not exist +- name: Delete a network that does not exist google.cloud.gcp_compute_network: name: "{{ resource_name }}" - auto_create_subnetworks: 'true' + auto_create_subnetworks: "true" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false diff --git a/tests/integration/targets/gcp_compute_network/tasks/main.yml b/tests/integration/targets/gcp_compute_network/tasks/main.yml index 45d6e49..fe47378 100644 --- a/tests/integration/targets/gcp_compute_network/tasks/main.yml +++ b/tests/integration/targets/gcp_compute_network/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/tests/integration/targets/gcp_compute_network_endpoint_group/aliases b/tests/integration/targets/gcp_compute_network_endpoint_group/aliases index 9812f01..0e4419e 100644 --- a/tests/integration/targets/gcp_compute_network_endpoint_group/aliases +++ b/tests/integration/targets/gcp_compute_network_endpoint_group/aliases @@ -1,2 +1 @@ -cloud/gcp -unsupported +cloud/gcp \ No newline at end of file diff --git a/tests/integration/targets/gcp_compute_network_endpoint_group/tasks/autogen.yml b/tests/integration/targets/gcp_compute_network_endpoint_group/tasks/autogen.yml index 8bf90de..81f46d2 100644 --- a/tests/integration/targets/gcp_compute_network_endpoint_group/tasks/autogen.yml +++ b/tests/integration/targets/gcp_compute_network_endpoint_group/tasks/autogen.yml @@ -13,16 +13,16 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: create a network +- name: Create a network google.cloud.gcp_compute_network: name: "{{ resource_name }}" - auto_create_subnetworks: 'false' + auto_create_subnetworks: "false" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: network -- name: create a subnetwork +- name: Create a subnetwork google.cloud.gcp_compute_subnetwork: name: "{{ resource_name }}" ip_cidr_range: 10.0.0.0/16 @@ -30,10 +30,10 @@ network: "{{ network }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: subnetwork -- name: delete a network endpoint group +- name: Delete a network endpoint group google.cloud.gcp_compute_network_endpoint_group: name: "{{ resource_name }}" network: "{{ network }}" @@ -42,10 +42,10 @@ zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a network endpoint group +- name: Create a network endpoint group google.cloud.gcp_compute_network_endpoint_group: name: "{{ resource_name }}" network: "{{ network }}" @@ -54,30 +54,30 @@ zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that network_endpoint_group was created +- name: Verify that network_endpoint_group was created google.cloud.gcp_compute_network_endpoint_group_info: - filters: - - name = {{ resource_name }} - zone: us-central1-a - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + zone: us-central1-a + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 1 # ---------------------------------------------------------------------------- -- name: create a network endpoint group that already exists +- name: Create a network endpoint group that already exists google.cloud.gcp_compute_network_endpoint_group: name: "{{ resource_name }}" network: "{{ network }}" @@ -86,15 +86,15 @@ zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a network endpoint group +- name: Delete a network endpoint group google.cloud.gcp_compute_network_endpoint_group: name: "{{ resource_name }}" network: "{{ network }}" @@ -103,30 +103,30 @@ zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that network_endpoint_group was deleted +- name: Verify that network_endpoint_group was deleted google.cloud.gcp_compute_network_endpoint_group_info: - filters: - - name = {{ resource_name }} - zone: us-central1-a - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + zone: us-central1-a + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 0 # ---------------------------------------------------------------------------- -- name: delete a network endpoint group that does not exist +- name: Delete a network endpoint group that does not exist google.cloud.gcp_compute_network_endpoint_group: name: "{{ resource_name }}" network: "{{ network }}" @@ -135,17 +135,17 @@ zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #--------------------------------------------------------- # Post-test teardown # If errors happen, don't crash the playbook! -- name: delete a subnetwork +- name: Delete a subnetwork google.cloud.gcp_compute_subnetwork: name: "{{ resource_name }}" ip_cidr_range: 10.0.0.0/16 @@ -153,17 +153,17 @@ network: "{{ network }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: subnetwork ignore_errors: true -- name: delete a network +- name: Delete a network google.cloud.gcp_compute_network: name: "{{ resource_name }}" - auto_create_subnetworks: 'false' + auto_create_subnetworks: "false" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: network ignore_errors: true diff --git a/tests/integration/targets/gcp_compute_network_endpoint_group/tasks/main.yml b/tests/integration/targets/gcp_compute_network_endpoint_group/tasks/main.yml index 45d6e49..fe47378 100644 --- a/tests/integration/targets/gcp_compute_network_endpoint_group/tasks/main.yml +++ b/tests/integration/targets/gcp_compute_network_endpoint_group/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/tests/integration/targets/gcp_compute_node_group/aliases b/tests/integration/targets/gcp_compute_node_group/aliases index 9812f01..5ce6d4c 100644 --- a/tests/integration/targets/gcp_compute_node_group/aliases +++ b/tests/integration/targets/gcp_compute_node_group/aliases @@ -1,2 +1,5 @@ cloud/gcp +# this test cannot run in CI, as the minimum +# node group size is beyond the compute quota +# limit of a default project. unsupported diff --git a/tests/integration/targets/gcp_compute_node_group/tasks/autogen.yml b/tests/integration/targets/gcp_compute_node_group/tasks/autogen.yml index b5b07a2..25d46af 100644 --- a/tests/integration/targets/gcp_compute_node_group/tasks/autogen.yml +++ b/tests/integration/targets/gcp_compute_node_group/tasks/autogen.yml @@ -13,17 +13,17 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: create a node template +- name: Create a node template google.cloud.gcp_compute_node_template: name: "{{ resource_name }}" region: us-central1 node_type: n1-node-96-624 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: node_template -- name: delete a node group +- name: Delete a node group google.cloud.gcp_compute_node_group: name: "{{ resource_name }}" zone: us-central1-a @@ -32,10 +32,10 @@ node_template: "{{ node_template }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a node group +- name: Create a node group google.cloud.gcp_compute_node_group: name: "{{ resource_name }}" zone: us-central1-a @@ -44,30 +44,30 @@ node_template: "{{ node_template }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that node_group was created +- name: Verify that node_group was created google.cloud.gcp_compute_node_group_info: - filters: - - name = {{ resource_name }} - zone: us-central1-a - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + zone: us-central1-a + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 1 # ---------------------------------------------------------------------------- -- name: create a node group that already exists +- name: Create a node group that already exists google.cloud.gcp_compute_node_group: name: "{{ resource_name }}" zone: us-central1-a @@ -76,15 +76,15 @@ node_template: "{{ node_template }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a node group +- name: Delete a node group google.cloud.gcp_compute_node_group: name: "{{ resource_name }}" zone: us-central1-a @@ -93,30 +93,30 @@ node_template: "{{ node_template }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that node_group was deleted +- name: Verify that node_group was deleted google.cloud.gcp_compute_node_group_info: - filters: - - name = {{ resource_name }} - zone: us-central1-a - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + zone: us-central1-a + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 0 # ---------------------------------------------------------------------------- -- name: delete a node group that does not exist +- name: Delete a node group that does not exist google.cloud.gcp_compute_node_group: name: "{{ resource_name }}" zone: us-central1-a @@ -125,24 +125,24 @@ node_template: "{{ node_template }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #--------------------------------------------------------- # Post-test teardown # If errors happen, don't crash the playbook! -- name: delete a node template +- name: Delete a node template google.cloud.gcp_compute_node_template: name: "{{ resource_name }}" region: us-central1 node_type: n1-node-96-624 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: node_template ignore_errors: true diff --git a/tests/integration/targets/gcp_compute_node_group/tasks/main.yml b/tests/integration/targets/gcp_compute_node_group/tasks/main.yml index 45d6e49..fe47378 100644 --- a/tests/integration/targets/gcp_compute_node_group/tasks/main.yml +++ b/tests/integration/targets/gcp_compute_node_group/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/tests/integration/targets/gcp_compute_node_template/aliases b/tests/integration/targets/gcp_compute_node_template/aliases index 9812f01..0e4419e 100644 --- a/tests/integration/targets/gcp_compute_node_template/aliases +++ b/tests/integration/targets/gcp_compute_node_template/aliases @@ -1,2 +1 @@ -cloud/gcp -unsupported +cloud/gcp \ No newline at end of file diff --git a/tests/integration/targets/gcp_compute_node_template/tasks/autogen.yml b/tests/integration/targets/gcp_compute_node_template/tasks/autogen.yml index cacc40b..f21ce63 100644 --- a/tests/integration/targets/gcp_compute_node_template/tasks/autogen.yml +++ b/tests/integration/targets/gcp_compute_node_template/tasks/autogen.yml @@ -13,102 +13,102 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: delete a node template +- name: Delete a node template google.cloud.gcp_compute_node_template: name: "{{ resource_name }}" region: us-central1 node_type: n1-node-96-624 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a node template +- name: Create a node template google.cloud.gcp_compute_node_template: name: "{{ resource_name }}" region: us-central1 node_type: n1-node-96-624 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that node_template was created +- name: Verify that node_template was created google.cloud.gcp_compute_node_template_info: - filters: - - name = {{ resource_name }} - region: us-central1 - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + region: us-central1 + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 1 # ---------------------------------------------------------------------------- -- name: create a node template that already exists +- name: Create a node template that already exists google.cloud.gcp_compute_node_template: name: "{{ resource_name }}" region: us-central1 node_type: n1-node-96-624 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a node template +- name: Delete a node template google.cloud.gcp_compute_node_template: name: "{{ resource_name }}" region: us-central1 node_type: n1-node-96-624 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that node_template was deleted +- name: Verify that node_template was deleted google.cloud.gcp_compute_node_template_info: - filters: - - name = {{ resource_name }} - region: us-central1 - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + region: us-central1 + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 0 # ---------------------------------------------------------------------------- -- name: delete a node template that does not exist +- name: Delete a node template that does not exist google.cloud.gcp_compute_node_template: name: "{{ resource_name }}" region: us-central1 node_type: n1-node-96-624 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false diff --git a/tests/integration/targets/gcp_compute_node_template/tasks/main.yml b/tests/integration/targets/gcp_compute_node_template/tasks/main.yml index 45d6e49..fe47378 100644 --- a/tests/integration/targets/gcp_compute_node_template/tasks/main.yml +++ b/tests/integration/targets/gcp_compute_node_template/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/tests/integration/targets/gcp_compute_region_autoscaler/aliases b/tests/integration/targets/gcp_compute_region_autoscaler/aliases index 9812f01..0e4419e 100644 --- a/tests/integration/targets/gcp_compute_region_autoscaler/aliases +++ b/tests/integration/targets/gcp_compute_region_autoscaler/aliases @@ -1,2 +1 @@ -cloud/gcp -unsupported +cloud/gcp \ No newline at end of file diff --git a/tests/integration/targets/gcp_compute_region_autoscaler/tasks/autogen.yml b/tests/integration/targets/gcp_compute_region_autoscaler/tasks/autogen.yml index 0273aa1..5a986a9 100644 --- a/tests/integration/targets/gcp_compute_region_autoscaler/tasks/autogen.yml +++ b/tests/integration/targets/gcp_compute_region_autoscaler/tasks/autogen.yml @@ -13,45 +13,46 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: create a network +- name: Create a network google.cloud.gcp_compute_network: name: network-instancetemplate project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + auto_create_subnetworks: true state: present register: network -- name: create a address +- name: Create a address google.cloud.gcp_compute_address: name: address-instancetemplate region: us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: address -- name: create a instance template +- name: Create a instance template google.cloud.gcp_compute_instance_template: name: "{{ resource_name }}" properties: disks: - - auto_delete: 'true' - boot: 'true' - initialize_params: - source_image: projects/ubuntu-os-cloud/global/images/family/ubuntu-1604-lts + - auto_delete: "true" + boot: "true" + initialize_params: + source_image: projects/ubuntu-os-cloud/global/images/family/ubuntu-minimal-2204-lts machine_type: n1-standard-1 network_interfaces: - - network: "{{ network }}" - access_configs: - - name: test-config - type: ONE_TO_ONE_NAT - nat_ip: "{{ address }}" + - network: "{{ network }}" + access_configs: + - name: test-config + type: ONE_TO_ONE_NAT + nat_ip: "{{ address }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: instancetemplate -- name: create a region instance group manager +- name: Create a region instance group manager google.cloud.gcp_compute_region_instance_group_manager: name: "{{ resource_name }}" base_instance_name: test1-child @@ -60,10 +61,10 @@ target_size: 3 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: igrm -- name: delete a region autoscaler +- name: Delete a region autoscaler google.cloud.gcp_compute_region_autoscaler: name: my-region-autoscaler region: us-central1 @@ -72,14 +73,14 @@ max_num_replicas: 5 cool_down_period_sec: 60 cpu_utilization: - utilization_target: 0.5 - target: "{{igrm.selfLink}}" + utilization_target: !!float "0.5" + target: "{{ igrm.selfLink }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a region autoscaler +- name: Create a region autoscaler google.cloud.gcp_compute_region_autoscaler: name: my-region-autoscaler region: us-central1 @@ -88,34 +89,34 @@ max_num_replicas: 5 cool_down_period_sec: 60 cpu_utilization: - utilization_target: 0.5 - target: "{{igrm.selfLink}}" + utilization_target: !!float "0.5" + target: "{{ igrm.selfLink }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that region_autoscaler was created +- name: Verify that region_autoscaler was created google.cloud.gcp_compute_region_autoscaler_info: - filters: - - name = my-region-autoscaler - region: us-central1 - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = my-region-autoscaler + region: us-central1 + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 1 # ---------------------------------------------------------------------------- -- name: create a region autoscaler that already exists +- name: Create a region autoscaler that already exists google.cloud.gcp_compute_region_autoscaler: name: my-region-autoscaler region: us-central1 @@ -124,19 +125,19 @@ max_num_replicas: 5 cool_down_period_sec: 60 cpu_utilization: - utilization_target: 0.5 - target: "{{igrm.selfLink}}" + utilization_target: !!float "0.5" + target: "{{ igrm.selfLink }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a region autoscaler +- name: Delete a region autoscaler google.cloud.gcp_compute_region_autoscaler: name: my-region-autoscaler region: us-central1 @@ -145,34 +146,34 @@ max_num_replicas: 5 cool_down_period_sec: 60 cpu_utilization: - utilization_target: 0.5 - target: "{{igrm.selfLink}}" + utilization_target: !!float "0.5" + target: "{{ igrm.selfLink }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that region_autoscaler was deleted +- name: Verify that region_autoscaler was deleted google.cloud.gcp_compute_region_autoscaler_info: - filters: - - name = my-region-autoscaler - region: us-central1 - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = my-region-autoscaler + region: us-central1 + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 0 # ---------------------------------------------------------------------------- -- name: delete a region autoscaler that does not exist +- name: Delete a region autoscaler that does not exist google.cloud.gcp_compute_region_autoscaler: name: my-region-autoscaler region: us-central1 @@ -181,21 +182,21 @@ max_num_replicas: 5 cool_down_period_sec: 60 cpu_utilization: - utilization_target: 0.5 - target: "{{igrm.selfLink}}" + utilization_target: !!float "0.5" + target: "{{ igrm.selfLink }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #--------------------------------------------------------- # Post-test teardown # If errors happen, don't crash the playbook! -- name: delete a region instance group manager +- name: Delete a region instance group manager google.cloud.gcp_compute_region_instance_group_manager: name: "{{ resource_name }}" base_instance_name: test1-child @@ -204,48 +205,49 @@ target_size: 3 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: igrm ignore_errors: true -- name: delete a instance template +- name: Delete a instance template google.cloud.gcp_compute_instance_template: name: "{{ resource_name }}" properties: disks: - - auto_delete: 'true' - boot: 'true' - initialize_params: - source_image: projects/ubuntu-os-cloud/global/images/family/ubuntu-1604-lts + - auto_delete: "true" + boot: "true" + initialize_params: + source_image: projects/ubuntu-os-cloud/global/images/family/ubuntu-minimal-2204-lts machine_type: n1-standard-1 network_interfaces: - - network: "{{ network }}" - access_configs: - - name: test-config - type: ONE_TO_ONE_NAT - nat_ip: "{{ address }}" + - network: "{{ network }}" + access_configs: + - name: test-config + type: ONE_TO_ONE_NAT + nat_ip: "{{ address }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: instancetemplate ignore_errors: true -- name: delete a address +- name: Delete a address google.cloud.gcp_compute_address: name: address-instancetemplate region: us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: address ignore_errors: true -- name: delete a network +- name: Delete a network google.cloud.gcp_compute_network: name: network-instancetemplate project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + auto_create_subnetworks: true state: absent register: network ignore_errors: true diff --git a/tests/integration/targets/gcp_compute_region_autoscaler/tasks/main.yml b/tests/integration/targets/gcp_compute_region_autoscaler/tasks/main.yml index 45d6e49..fe47378 100644 --- a/tests/integration/targets/gcp_compute_region_autoscaler/tasks/main.yml +++ b/tests/integration/targets/gcp_compute_region_autoscaler/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/tests/integration/targets/gcp_compute_region_backend_service/aliases b/tests/integration/targets/gcp_compute_region_backend_service/aliases index 9812f01..0e4419e 100644 --- a/tests/integration/targets/gcp_compute_region_backend_service/aliases +++ b/tests/integration/targets/gcp_compute_region_backend_service/aliases @@ -1,2 +1 @@ -cloud/gcp -unsupported +cloud/gcp \ No newline at end of file diff --git a/tests/integration/targets/gcp_compute_region_backend_service/tasks/autogen.yml b/tests/integration/targets/gcp_compute_region_backend_service/tasks/autogen.yml index 6fdb3fa..beb644a 100644 --- a/tests/integration/targets/gcp_compute_region_backend_service/tasks/autogen.yml +++ b/tests/integration/targets/gcp_compute_region_backend_service/tasks/autogen.yml @@ -13,7 +13,7 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: create a health check +- name: Create a health check google.cloud.gcp_compute_health_check: name: "{{ resource_name }}" type: TCP @@ -23,132 +23,132 @@ timeout_sec: 1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: healthcheck -- name: delete a region backend service +- name: Delete a region backend service google.cloud.gcp_compute_region_backend_service: name: "{{ resource_name }}" region: us-central1 health_checks: - - "{{ healthcheck.selfLink }}" + - "{{ healthcheck.selfLink }}" connection_draining: draining_timeout_sec: 10 session_affinity: CLIENT_IP project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a region backend service +- name: Create a region backend service google.cloud.gcp_compute_region_backend_service: name: "{{ resource_name }}" region: us-central1 health_checks: - - "{{ healthcheck.selfLink }}" + - "{{ healthcheck.selfLink }}" connection_draining: draining_timeout_sec: 10 session_affinity: CLIENT_IP project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that region_backend_service was created +- name: Verify that region_backend_service was created google.cloud.gcp_compute_region_backend_service_info: - filters: - - name = {{ resource_name }} - region: us-central1 - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + region: us-central1 + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 1 # ---------------------------------------------------------------------------- -- name: create a region backend service that already exists +- name: Create a region backend service that already exists google.cloud.gcp_compute_region_backend_service: name: "{{ resource_name }}" region: us-central1 health_checks: - - "{{ healthcheck.selfLink }}" + - "{{ healthcheck.selfLink }}" connection_draining: draining_timeout_sec: 10 session_affinity: CLIENT_IP project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a region backend service +- name: Delete a region backend service google.cloud.gcp_compute_region_backend_service: name: "{{ resource_name }}" region: us-central1 health_checks: - - "{{ healthcheck.selfLink }}" + - "{{ healthcheck.selfLink }}" connection_draining: draining_timeout_sec: 10 session_affinity: CLIENT_IP project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that region_backend_service was deleted +- name: Verify that region_backend_service was deleted google.cloud.gcp_compute_region_backend_service_info: - filters: - - name = {{ resource_name }} - region: us-central1 - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + region: us-central1 + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 0 # ---------------------------------------------------------------------------- -- name: delete a region backend service that does not exist +- name: Delete a region backend service that does not exist google.cloud.gcp_compute_region_backend_service: name: "{{ resource_name }}" region: us-central1 health_checks: - - "{{ healthcheck.selfLink }}" + - "{{ healthcheck.selfLink }}" connection_draining: draining_timeout_sec: 10 session_affinity: CLIENT_IP project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #--------------------------------------------------------- # Post-test teardown # If errors happen, don't crash the playbook! -- name: delete a health check +- name: Delete a health check google.cloud.gcp_compute_health_check: name: "{{ resource_name }}" type: TCP @@ -158,7 +158,7 @@ timeout_sec: 1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: healthcheck ignore_errors: true diff --git a/tests/integration/targets/gcp_compute_region_backend_service/tasks/main.yml b/tests/integration/targets/gcp_compute_region_backend_service/tasks/main.yml index 45d6e49..fe47378 100644 --- a/tests/integration/targets/gcp_compute_region_backend_service/tasks/main.yml +++ b/tests/integration/targets/gcp_compute_region_backend_service/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/tests/integration/targets/gcp_compute_region_disk/aliases b/tests/integration/targets/gcp_compute_region_disk/aliases index 9812f01..0e4419e 100644 --- a/tests/integration/targets/gcp_compute_region_disk/aliases +++ b/tests/integration/targets/gcp_compute_region_disk/aliases @@ -1,2 +1 @@ -cloud/gcp -unsupported +cloud/gcp \ No newline at end of file diff --git a/tests/integration/targets/gcp_compute_region_disk/tasks/autogen.yml b/tests/integration/targets/gcp_compute_region_disk/tasks/autogen.yml index 3463be3..1b04a50 100644 --- a/tests/integration/targets/gcp_compute_region_disk/tasks/autogen.yml +++ b/tests/integration/targets/gcp_compute_region_disk/tasks/autogen.yml @@ -13,7 +13,7 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: delete a region disk +- name: Delete a region disk google.cloud.gcp_compute_region_disk: name: "{{ resource_name }}" size_gb: 500 @@ -21,14 +21,14 @@ raw_key: SGVsbG8gZnJvbSBHb29nbGUgQ2xvdWQgUGxhdGZvcm0= region: us-central1 replica_zones: - - https://www.googleapis.com/compute/v1/projects/google.com:graphite-playground/zones/us-central1-a - - https://www.googleapis.com/compute/v1/projects/google.com:graphite-playground/zones/us-central1-b + - https://www.googleapis.com/compute/v1/projects/{{ gcp_project }}/zones/us-central1-a + - https://www.googleapis.com/compute/v1/projects/{{ gcp_project }}/zones/us-central1-b project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a region disk +- name: Create a region disk google.cloud.gcp_compute_region_disk: name: "{{ resource_name }}" size_gb: 500 @@ -36,34 +36,34 @@ raw_key: SGVsbG8gZnJvbSBHb29nbGUgQ2xvdWQgUGxhdGZvcm0= region: us-central1 replica_zones: - - https://www.googleapis.com/compute/v1/projects/google.com:graphite-playground/zones/us-central1-a - - https://www.googleapis.com/compute/v1/projects/google.com:graphite-playground/zones/us-central1-b + - https://www.googleapis.com/compute/v1/projects/{{ gcp_project }}/zones/us-central1-a + - https://www.googleapis.com/compute/v1/projects/{{ gcp_project }}/zones/us-central1-b project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that region_disk was created +- name: Verify that region_disk was created google.cloud.gcp_compute_region_disk_info: - filters: - - name = {{ resource_name }} - region: us-central1 - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + region: us-central1 + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 1 # ---------------------------------------------------------------------------- -- name: create a region disk that already exists +- name: Create a region disk that already exists google.cloud.gcp_compute_region_disk: name: "{{ resource_name }}" size_gb: 500 @@ -71,19 +71,19 @@ raw_key: SGVsbG8gZnJvbSBHb29nbGUgQ2xvdWQgUGxhdGZvcm0= region: us-central1 replica_zones: - - https://www.googleapis.com/compute/v1/projects/google.com:graphite-playground/zones/us-central1-a - - https://www.googleapis.com/compute/v1/projects/google.com:graphite-playground/zones/us-central1-b + - https://www.googleapis.com/compute/v1/projects/{{ gcp_project }}/zones/us-central1-a + - https://www.googleapis.com/compute/v1/projects/{{ gcp_project }}/zones/us-central1-b project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a region disk +- name: Delete a region disk google.cloud.gcp_compute_region_disk: name: "{{ resource_name }}" size_gb: 500 @@ -91,34 +91,34 @@ raw_key: SGVsbG8gZnJvbSBHb29nbGUgQ2xvdWQgUGxhdGZvcm0= region: us-central1 replica_zones: - - https://www.googleapis.com/compute/v1/projects/google.com:graphite-playground/zones/us-central1-a - - https://www.googleapis.com/compute/v1/projects/google.com:graphite-playground/zones/us-central1-b + - https://www.googleapis.com/compute/v1/projects/{{ gcp_project }}/zones/us-central1-a + - https://www.googleapis.com/compute/v1/projects/{{ gcp_project }}/zones/us-central1-b project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that region_disk was deleted +- name: Verify that region_disk was deleted google.cloud.gcp_compute_region_disk_info: - filters: - - name = {{ resource_name }} - region: us-central1 - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + region: us-central1 + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 0 # ---------------------------------------------------------------------------- -- name: delete a region disk that does not exist +- name: Delete a region disk that does not exist google.cloud.gcp_compute_region_disk: name: "{{ resource_name }}" size_gb: 500 @@ -126,14 +126,14 @@ raw_key: SGVsbG8gZnJvbSBHb29nbGUgQ2xvdWQgUGxhdGZvcm0= region: us-central1 replica_zones: - - https://www.googleapis.com/compute/v1/projects/google.com:graphite-playground/zones/us-central1-a - - https://www.googleapis.com/compute/v1/projects/google.com:graphite-playground/zones/us-central1-b + - https://www.googleapis.com/compute/v1/projects/{{ gcp_project }}/zones/us-central1-a + - https://www.googleapis.com/compute/v1/projects/{{ gcp_project }}/zones/us-central1-b project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false diff --git a/tests/integration/targets/gcp_compute_region_disk/tasks/main.yml b/tests/integration/targets/gcp_compute_region_disk/tasks/main.yml index 45d6e49..fe47378 100644 --- a/tests/integration/targets/gcp_compute_region_disk/tasks/main.yml +++ b/tests/integration/targets/gcp_compute_region_disk/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/tests/integration/targets/gcp_compute_region_health_check/aliases b/tests/integration/targets/gcp_compute_region_health_check/aliases index 9812f01..0e4419e 100644 --- a/tests/integration/targets/gcp_compute_region_health_check/aliases +++ b/tests/integration/targets/gcp_compute_region_health_check/aliases @@ -1,2 +1 @@ -cloud/gcp -unsupported +cloud/gcp \ No newline at end of file diff --git a/tests/integration/targets/gcp_compute_region_health_check/tasks/autogen.yml b/tests/integration/targets/gcp_compute_region_health_check/tasks/autogen.yml index 498e018..badcfb8 100644 --- a/tests/integration/targets/gcp_compute_region_health_check/tasks/autogen.yml +++ b/tests/integration/targets/gcp_compute_region_health_check/tasks/autogen.yml @@ -13,7 +13,7 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: delete a region health check +- name: Delete a region health check google.cloud.gcp_compute_region_health_check: name: "{{ resource_name }}" type: TCP @@ -27,10 +27,10 @@ region: us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a region health check +- name: Create a region health check google.cloud.gcp_compute_region_health_check: name: "{{ resource_name }}" type: TCP @@ -44,30 +44,30 @@ region: us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that region_health_check was created +- name: Verify that region_health_check was created google.cloud.gcp_compute_region_health_check_info: - filters: - - name = {{ resource_name }} - region: us-central1 - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + region: us-central1 + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 1 # ---------------------------------------------------------------------------- -- name: create a region health check that already exists +- name: Create a region health check that already exists google.cloud.gcp_compute_region_health_check: name: "{{ resource_name }}" type: TCP @@ -81,15 +81,15 @@ region: us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a region health check +- name: Delete a region health check google.cloud.gcp_compute_region_health_check: name: "{{ resource_name }}" type: TCP @@ -103,30 +103,30 @@ region: us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that region_health_check was deleted +- name: Verify that region_health_check was deleted google.cloud.gcp_compute_region_health_check_info: - filters: - - name = {{ resource_name }} - region: us-central1 - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + region: us-central1 + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 0 # ---------------------------------------------------------------------------- -- name: delete a region health check that does not exist +- name: Delete a region health check that does not exist google.cloud.gcp_compute_region_health_check: name: "{{ resource_name }}" type: TCP @@ -140,10 +140,10 @@ region: us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false diff --git a/tests/integration/targets/gcp_compute_region_health_check/tasks/main.yml b/tests/integration/targets/gcp_compute_region_health_check/tasks/main.yml index 45d6e49..fe47378 100644 --- a/tests/integration/targets/gcp_compute_region_health_check/tasks/main.yml +++ b/tests/integration/targets/gcp_compute_region_health_check/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/tests/integration/targets/gcp_compute_region_instance_group_manager/aliases b/tests/integration/targets/gcp_compute_region_instance_group_manager/aliases index 9812f01..0e4419e 100644 --- a/tests/integration/targets/gcp_compute_region_instance_group_manager/aliases +++ b/tests/integration/targets/gcp_compute_region_instance_group_manager/aliases @@ -1,2 +1 @@ -cloud/gcp -unsupported +cloud/gcp \ No newline at end of file diff --git a/tests/integration/targets/gcp_compute_region_instance_group_manager/tasks/autogen.yml b/tests/integration/targets/gcp_compute_region_instance_group_manager/tasks/autogen.yml index c430581..e606464 100644 --- a/tests/integration/targets/gcp_compute_region_instance_group_manager/tasks/autogen.yml +++ b/tests/integration/targets/gcp_compute_region_instance_group_manager/tasks/autogen.yml @@ -13,45 +13,46 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: create a network +- name: Create a network google.cloud.gcp_compute_network: name: network-instancetemplate project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + auto_create_subnetworks: true state: present register: network -- name: create a address +- name: Create a address google.cloud.gcp_compute_address: name: address-instancetemplate region: us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: address -- name: create a instance template +- name: Create a instance template google.cloud.gcp_compute_instance_template: name: "{{ resource_name }}" properties: disks: - - auto_delete: 'true' - boot: 'true' - initialize_params: - source_image: projects/ubuntu-os-cloud/global/images/family/ubuntu-1604-lts + - auto_delete: "true" + boot: "true" + initialize_params: + source_image: projects/ubuntu-os-cloud/global/images/family/ubuntu-minimal-2204-lts machine_type: n1-standard-1 network_interfaces: - - network: "{{ network }}" - access_configs: - - name: test-config - type: ONE_TO_ONE_NAT - nat_ip: "{{ address }}" + - network: "{{ network }}" + access_configs: + - name: test-config + type: ONE_TO_ONE_NAT + nat_ip: "{{ address }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: instancetemplate -- name: delete a region instance group manager +- name: Delete a region instance group manager google.cloud.gcp_compute_region_instance_group_manager: name: "{{ resource_name }}" base_instance_name: test1-child @@ -60,10 +61,10 @@ target_size: 3 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a region instance group manager +- name: Create a region instance group manager google.cloud.gcp_compute_region_instance_group_manager: name: "{{ resource_name }}" base_instance_name: test1-child @@ -72,30 +73,30 @@ target_size: 3 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that region_instance_group_manager was created +- name: Verify that region_instance_group_manager was created google.cloud.gcp_compute_region_instance_group_manager_info: - filters: - - name = {{ resource_name }} - region: us-central1 - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + region: us-central1 + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 1 # ---------------------------------------------------------------------------- -- name: create a region instance group manager that already exists +- name: Create a region instance group manager that already exists google.cloud.gcp_compute_region_instance_group_manager: name: "{{ resource_name }}" base_instance_name: test1-child @@ -104,15 +105,15 @@ target_size: 3 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a region instance group manager +- name: Delete a region instance group manager google.cloud.gcp_compute_region_instance_group_manager: name: "{{ resource_name }}" base_instance_name: test1-child @@ -121,30 +122,30 @@ target_size: 3 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that region_instance_group_manager was deleted +- name: Verify that region_instance_group_manager was deleted google.cloud.gcp_compute_region_instance_group_manager_info: - filters: - - name = {{ resource_name }} - region: us-central1 - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + region: us-central1 + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 0 # ---------------------------------------------------------------------------- -- name: delete a region instance group manager that does not exist +- name: Delete a region instance group manager that does not exist google.cloud.gcp_compute_region_instance_group_manager: name: "{{ resource_name }}" base_instance_name: test1-child @@ -153,54 +154,55 @@ target_size: 3 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #--------------------------------------------------------- # Post-test teardown # If errors happen, don't crash the playbook! -- name: delete a instance template +- name: Delete a instance template google.cloud.gcp_compute_instance_template: name: "{{ resource_name }}" properties: disks: - - auto_delete: 'true' - boot: 'true' - initialize_params: - source_image: projects/ubuntu-os-cloud/global/images/family/ubuntu-1604-lts + - auto_delete: "true" + boot: "true" + initialize_params: + source_image: projects/ubuntu-os-cloud/global/images/family/ubuntu-minimal-2204-lts machine_type: n1-standard-1 network_interfaces: - - network: "{{ network }}" - access_configs: - - name: test-config - type: ONE_TO_ONE_NAT - nat_ip: "{{ address }}" + - network: "{{ network }}" + access_configs: + - name: test-config + type: ONE_TO_ONE_NAT + nat_ip: "{{ address }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: instancetemplate ignore_errors: true -- name: delete a address +- name: Delete a address google.cloud.gcp_compute_address: name: address-instancetemplate region: us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: address ignore_errors: true -- name: delete a network +- name: Delete a network google.cloud.gcp_compute_network: name: network-instancetemplate project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + auto_create_subnetworks: true state: absent register: network ignore_errors: true diff --git a/tests/integration/targets/gcp_compute_region_instance_group_manager/tasks/main.yml b/tests/integration/targets/gcp_compute_region_instance_group_manager/tasks/main.yml index 45d6e49..fe47378 100644 --- a/tests/integration/targets/gcp_compute_region_instance_group_manager/tasks/main.yml +++ b/tests/integration/targets/gcp_compute_region_instance_group_manager/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/tests/integration/targets/gcp_compute_region_target_http_proxy/aliases b/tests/integration/targets/gcp_compute_region_target_http_proxy/aliases index 9812f01..0e4419e 100644 --- a/tests/integration/targets/gcp_compute_region_target_http_proxy/aliases +++ b/tests/integration/targets/gcp_compute_region_target_http_proxy/aliases @@ -1,2 +1 @@ -cloud/gcp -unsupported +cloud/gcp \ No newline at end of file diff --git a/tests/integration/targets/gcp_compute_region_target_http_proxy/tasks/autogen.yml b/tests/integration/targets/gcp_compute_region_target_http_proxy/tasks/autogen.yml index abb8447..9c1da53 100644 --- a/tests/integration/targets/gcp_compute_region_target_http_proxy/tasks/autogen.yml +++ b/tests/integration/targets/gcp_compute_region_target_http_proxy/tasks/autogen.yml @@ -13,195 +13,149 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: create a instance group - google.cloud.gcp_compute_instance_group: - name: instancegroup-targethttpproxy - zone: us-central1-a - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - state: present - register: instancegroup -- name: create a HTTP health check - google.cloud.gcp_compute_http_health_check: - name: httphealthcheck-targethttpproxy - healthy_threshold: 10 - port: 8080 - timeout_sec: 2 - unhealthy_threshold: 5 - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - state: present - register: healthcheck -- name: create a backend service - google.cloud.gcp_compute_backend_service: +- name: Create a backend service + google.cloud.gcp_compute_region_backend_service: name: backendservice-targethttpproxy - backends: - - group: "{{ instancegroup.selfLink }}" - health_checks: - - "{{ healthcheck.selfLink }}" - enable_cdn: 'true' + region: us-central1 + enable_cdn: "true" + protocol: HTTP project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + load_balancing_scheme: EXTERNAL state: present register: backendservice -- name: create a URL map - google.cloud.gcp_compute_url_map: +- name: Create a URL map + google.cloud.gcp_compute_region_url_map: name: urlmap-targethttpproxy + region: us-central1 default_service: "{{ backendservice }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: urlmap -- name: delete a region target HTTP proxy +- name: Delete a region target HTTP proxy google.cloud.gcp_compute_region_target_http_proxy: name: "{{ resource_name }}" region: us-central1 url_map: "{{ urlmap }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a region target HTTP proxy +- name: Create a region target HTTP proxy google.cloud.gcp_compute_region_target_http_proxy: name: "{{ resource_name }}" region: us-central1 url_map: "{{ urlmap }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that region_target_http_proxy was created +- name: Verify that region_target_http_proxy was created google.cloud.gcp_compute_region_target_http_proxy_info: - filters: - - name = {{ resource_name }} - region: us-central1 - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + region: us-central1 + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 1 # ---------------------------------------------------------------------------- -- name: create a region target HTTP proxy that already exists +- name: Create a region target HTTP proxy that already exists google.cloud.gcp_compute_region_target_http_proxy: name: "{{ resource_name }}" region: us-central1 url_map: "{{ urlmap }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a region target HTTP proxy +- name: Delete a region target HTTP proxy google.cloud.gcp_compute_region_target_http_proxy: name: "{{ resource_name }}" region: us-central1 url_map: "{{ urlmap }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that region_target_http_proxy was deleted +- name: Verify that region_target_http_proxy was deleted google.cloud.gcp_compute_region_target_http_proxy_info: - filters: - - name = {{ resource_name }} - region: us-central1 - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + region: us-central1 + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 0 # ---------------------------------------------------------------------------- -- name: delete a region target HTTP proxy that does not exist +- name: Delete a region target HTTP proxy that does not exist google.cloud.gcp_compute_region_target_http_proxy: name: "{{ resource_name }}" region: us-central1 url_map: "{{ urlmap }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #--------------------------------------------------------- # Post-test teardown # If errors happen, don't crash the playbook! -- name: delete a URL map - google.cloud.gcp_compute_url_map: +- name: Delete a URL map + google.cloud.gcp_compute_region_url_map: name: urlmap-targethttpproxy + region: us-central1 default_service: "{{ backendservice }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent - register: urlmap - ignore_errors: true -- name: delete a backend service - google.cloud.gcp_compute_backend_service: + ignore_errors: true # noqa: ignore-errors +- name: Delete a backend service + google.cloud.gcp_compute_region_backend_service: name: backendservice-targethttpproxy - backends: - - group: "{{ instancegroup.selfLink }}" - health_checks: - - "{{ healthcheck.selfLink }}" - enable_cdn: 'true' + region: us-central1 + enable_cdn: "true" + protocol: HTTP project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - state: absent - register: backendservice - ignore_errors: true -- name: delete a HTTP health check - google.cloud.gcp_compute_http_health_check: - name: httphealthcheck-targethttpproxy - healthy_threshold: 10 - port: 8080 - timeout_sec: 2 - unhealthy_threshold: 5 - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - state: absent - register: healthcheck - ignore_errors: true -- name: delete a instance group - google.cloud.gcp_compute_instance_group: - name: instancegroup-targethttpproxy - zone: us-central1-a - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - state: absent - register: instancegroup - ignore_errors: true + service_account_file: "{{ gcp_cred_file | default(omit) }}" + load_balancing_scheme: EXTERNAL + state: present + ignore_errors: true # noqa: ignore-errors diff --git a/tests/integration/targets/gcp_compute_region_target_http_proxy/tasks/main.yml b/tests/integration/targets/gcp_compute_region_target_http_proxy/tasks/main.yml index 45d6e49..fe47378 100644 --- a/tests/integration/targets/gcp_compute_region_target_http_proxy/tasks/main.yml +++ b/tests/integration/targets/gcp_compute_region_target_http_proxy/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/tests/integration/targets/gcp_compute_region_target_https_proxy/aliases b/tests/integration/targets/gcp_compute_region_target_https_proxy/aliases index 9812f01..d129945 100644 --- a/tests/integration/targets/gcp_compute_region_target_https_proxy/aliases +++ b/tests/integration/targets/gcp_compute_region_target_https_proxy/aliases @@ -1,2 +1,4 @@ cloud/gcp +# unsupported as testing this resource requires +# a missing resource (compute_regional_ssl_cert) unsupported diff --git a/tests/integration/targets/gcp_compute_region_target_https_proxy/tasks/autogen.yml b/tests/integration/targets/gcp_compute_region_target_https_proxy/tasks/autogen.yml index 9b52b77..ac02c56 100644 --- a/tests/integration/targets/gcp_compute_region_target_https_proxy/tasks/autogen.yml +++ b/tests/integration/targets/gcp_compute_region_target_https_proxy/tasks/autogen.yml @@ -13,16 +13,16 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: create a instance group +- name: Create a instance group google.cloud.gcp_compute_instance_group: name: instancegroup-targethttpsproxy zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: instancegroup -- name: create a region health check +- name: Create a region health check google.cloud.gcp_compute_region_health_check: name: "{{ resource_name }}" type: HTTPS @@ -32,33 +32,33 @@ region: us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: healthcheck -- name: create a region backend service +- name: Create a region backend service google.cloud.gcp_compute_region_backend_service: name: backendservice-targethttpsproxy region: us-central1 backends: - - group: "{{ instancegroup.selfLink }}" + - group: "{{ instancegroup.selfLink }}" healthchecks: - - "{{ healthcheck.selfLink }}" + - "{{ healthcheck.selfLink }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: backendservice -- name: create a region URL map +- name: Create a region URL map google.cloud.gcp_compute_region_url_map: name: urlmap-targethttpsproxy region: us-central1 default_service: "{{ backendservice }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: urlmap -- name: create a SSL certificate +- name: Create a SSL certificate google.cloud.gcp_compute_ssl_certificate: name: sslcert-targethttpsproxy description: A certificate for testing. Do not use this certificate in production @@ -88,122 +88,122 @@ -----END EC PRIVATE KEY----- project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: sslcert -- name: delete a region target HTTPS proxy +- name: Delete a region target HTTPS proxy google.cloud.gcp_compute_region_target_https_proxy: name: "{{ resource_name }}" region: us-central1 ssl_certificates: - - "{{ sslcert }}" + - "{{ sslcert }}" # noqa: args[module] url_map: "{{ urlmap }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a region target HTTPS proxy +- name: Create a region target HTTPS proxy google.cloud.gcp_compute_region_target_https_proxy: name: "{{ resource_name }}" region: us-central1 ssl_certificates: - - "{{ sslcert }}" + - "{{ sslcert }}" # noqa: args[module] url_map: "{{ urlmap }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that region_target_https_proxy was created +- name: Verify that region_target_https_proxy was created google.cloud.gcp_compute_region_target_https_proxy_info: - filters: - - name = {{ resource_name }} - region: us-central1 - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + region: us-central1 + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 1 # ---------------------------------------------------------------------------- -- name: create a region target HTTPS proxy that already exists +- name: Create a region target HTTPS proxy that already exists google.cloud.gcp_compute_region_target_https_proxy: name: "{{ resource_name }}" region: us-central1 ssl_certificates: - - "{{ sslcert }}" + - "{{ sslcert }}" # noqa: args[module] url_map: "{{ urlmap }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a region target HTTPS proxy +- name: Delete a region target HTTPS proxy google.cloud.gcp_compute_region_target_https_proxy: name: "{{ resource_name }}" region: us-central1 ssl_certificates: - - "{{ sslcert }}" + - "{{ sslcert }}" # noqa: args[module] url_map: "{{ urlmap }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that region_target_https_proxy was deleted +- name: Verify that region_target_https_proxy was deleted google.cloud.gcp_compute_region_target_https_proxy_info: - filters: - - name = {{ resource_name }} - region: us-central1 - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + region: us-central1 + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 0 # ---------------------------------------------------------------------------- -- name: delete a region target HTTPS proxy that does not exist +- name: Delete a region target HTTPS proxy that does not exist google.cloud.gcp_compute_region_target_https_proxy: name: "{{ resource_name }}" region: us-central1 ssl_certificates: - - "{{ sslcert }}" + - "{{ sslcert }}" # noqa: args[module] url_map: "{{ urlmap }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #--------------------------------------------------------- # Post-test teardown # If errors happen, don't crash the playbook! -- name: delete a SSL certificate +- name: Delete a SSL certificate google.cloud.gcp_compute_ssl_certificate: name: sslcert-targethttpsproxy description: A certificate for testing. Do not use this certificate in production @@ -233,36 +233,36 @@ -----END EC PRIVATE KEY----- project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: sslcert ignore_errors: true -- name: delete a region URL map +- name: Delete a region URL map google.cloud.gcp_compute_region_url_map: name: urlmap-targethttpsproxy region: us-central1 default_service: "{{ backendservice }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: urlmap ignore_errors: true -- name: delete a region backend service +- name: Delete a region backend service google.cloud.gcp_compute_region_backend_service: name: backendservice-targethttpsproxy region: us-central1 backends: - - group: "{{ instancegroup.selfLink }}" + - group: "{{ instancegroup.selfLink }}" healthchecks: - - "{{ healthcheck.selfLink }}" + - "{{ healthcheck.selfLink }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: backendservice ignore_errors: true -- name: delete a region health check +- name: Delete a region health check google.cloud.gcp_compute_region_health_check: name: "{{ resource_name }}" type: HTTPS @@ -272,17 +272,17 @@ region: us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: healthcheck ignore_errors: true -- name: delete a instance group +- name: Delete a instance group google.cloud.gcp_compute_instance_group: name: instancegroup-targethttpsproxy zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: instancegroup ignore_errors: true diff --git a/tests/integration/targets/gcp_compute_region_target_https_proxy/tasks/main.yml b/tests/integration/targets/gcp_compute_region_target_https_proxy/tasks/main.yml index 45d6e49..fe47378 100644 --- a/tests/integration/targets/gcp_compute_region_target_https_proxy/tasks/main.yml +++ b/tests/integration/targets/gcp_compute_region_target_https_proxy/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/tests/integration/targets/gcp_compute_region_url_map/aliases b/tests/integration/targets/gcp_compute_region_url_map/aliases index 9812f01..0e4419e 100644 --- a/tests/integration/targets/gcp_compute_region_url_map/aliases +++ b/tests/integration/targets/gcp_compute_region_url_map/aliases @@ -1,2 +1 @@ -cloud/gcp -unsupported +cloud/gcp \ No newline at end of file diff --git a/tests/integration/targets/gcp_compute_region_url_map/tasks/autogen.yml b/tests/integration/targets/gcp_compute_region_url_map/tasks/autogen.yml index b47476c..1cbfae9 100644 --- a/tests/integration/targets/gcp_compute_region_url_map/tasks/autogen.yml +++ b/tests/integration/targets/gcp_compute_region_url_map/tasks/autogen.yml @@ -13,157 +13,128 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: create a health check - google.cloud.gcp_compute_health_check: - name: "{{ resource_name }}" - type: HTTP - http_health_check: - port: 80 - check_interval_sec: 1 - timeout_sec: 1 - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - state: present - register: healthcheck -- name: create a region backend service +- name: Create a region backend service google.cloud.gcp_compute_region_backend_service: name: "{{ resource_name }}" region: us-central1 - health_checks: - - "{{ healthcheck.selfLink }}" protocol: HTTP project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + load_balancing_scheme: EXTERNAL state: present register: backendservice -- name: delete a region URL map +- name: Delete a region URL map google.cloud.gcp_compute_region_url_map: name: "{{ resource_name }}" region: us-central1 default_service: "{{ backendservice }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a region URL map +- name: Create a region URL map google.cloud.gcp_compute_region_url_map: name: "{{ resource_name }}" region: us-central1 default_service: "{{ backendservice }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that region_url_map was created +- name: Verify that region_url_map was created google.cloud.gcp_compute_region_url_map_info: - filters: - - name = {{ resource_name }} - region: us-central1 - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + region: us-central1 + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 1 # ---------------------------------------------------------------------------- -- name: create a region URL map that already exists +- name: Create a region URL map that already exists google.cloud.gcp_compute_region_url_map: name: "{{ resource_name }}" region: us-central1 default_service: "{{ backendservice }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a region URL map +- name: Delete a region URL map google.cloud.gcp_compute_region_url_map: name: "{{ resource_name }}" region: us-central1 default_service: "{{ backendservice }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that region_url_map was deleted +- name: Verify that region_url_map was deleted google.cloud.gcp_compute_region_url_map_info: - filters: - - name = {{ resource_name }} - region: us-central1 - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + region: us-central1 + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 0 # ---------------------------------------------------------------------------- -- name: delete a region URL map that does not exist +- name: Delete a region URL map that does not exist google.cloud.gcp_compute_region_url_map: name: "{{ resource_name }}" region: us-central1 default_service: "{{ backendservice }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #--------------------------------------------------------- # Post-test teardown # If errors happen, don't crash the playbook! -- name: delete a region backend service +- name: Delete a region backend service google.cloud.gcp_compute_region_backend_service: name: "{{ resource_name }}" region: us-central1 - health_checks: - - "{{ healthcheck.selfLink }}" protocol: HTTP project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + load_balancing_scheme: EXTERNAL state: absent register: backendservice ignore_errors: true -- name: delete a health check - google.cloud.gcp_compute_health_check: - name: "{{ resource_name }}" - type: HTTP - http_health_check: - port: 80 - check_interval_sec: 1 - timeout_sec: 1 - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - state: absent - register: healthcheck - ignore_errors: true diff --git a/tests/integration/targets/gcp_compute_region_url_map/tasks/main.yml b/tests/integration/targets/gcp_compute_region_url_map/tasks/main.yml index 45d6e49..fe47378 100644 --- a/tests/integration/targets/gcp_compute_region_url_map/tasks/main.yml +++ b/tests/integration/targets/gcp_compute_region_url_map/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/tests/integration/targets/gcp_compute_reservation/aliases b/tests/integration/targets/gcp_compute_reservation/aliases index 9812f01..0e4419e 100644 --- a/tests/integration/targets/gcp_compute_reservation/aliases +++ b/tests/integration/targets/gcp_compute_reservation/aliases @@ -1,2 +1 @@ -cloud/gcp -unsupported +cloud/gcp \ No newline at end of file diff --git a/tests/integration/targets/gcp_compute_reservation/tasks/autogen.yml b/tests/integration/targets/gcp_compute_reservation/tasks/autogen.yml index 8cf3a25..7663bf5 100644 --- a/tests/integration/targets/gcp_compute_reservation/tasks/autogen.yml +++ b/tests/integration/targets/gcp_compute_reservation/tasks/autogen.yml @@ -13,7 +13,7 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: delete a reservation +- name: Delete a reservation google.cloud.gcp_compute_reservation: name: "{{ resource_name }}" zone: us-central1-a @@ -24,10 +24,10 @@ machine_type: n2-standard-2 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a reservation +- name: Create a reservation google.cloud.gcp_compute_reservation: name: "{{ resource_name }}" zone: us-central1-a @@ -38,30 +38,30 @@ machine_type: n2-standard-2 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that reservation was created +- name: Verify that reservation was created google.cloud.gcp_compute_reservation_info: - filters: - - name = {{ resource_name }} - zone: us-central1-a - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + zone: us-central1-a + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 1 # ---------------------------------------------------------------------------- -- name: create a reservation that already exists +- name: Create a reservation that already exists google.cloud.gcp_compute_reservation: name: "{{ resource_name }}" zone: us-central1-a @@ -72,15 +72,15 @@ machine_type: n2-standard-2 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a reservation +- name: Delete a reservation google.cloud.gcp_compute_reservation: name: "{{ resource_name }}" zone: us-central1-a @@ -91,30 +91,30 @@ machine_type: n2-standard-2 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that reservation was deleted +- name: Verify that reservation was deleted google.cloud.gcp_compute_reservation_info: - filters: - - name = {{ resource_name }} - zone: us-central1-a - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + zone: us-central1-a + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 0 # ---------------------------------------------------------------------------- -- name: delete a reservation that does not exist +- name: Delete a reservation that does not exist google.cloud.gcp_compute_reservation: name: "{{ resource_name }}" zone: us-central1-a @@ -125,10 +125,10 @@ machine_type: n2-standard-2 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false diff --git a/tests/integration/targets/gcp_compute_reservation/tasks/main.yml b/tests/integration/targets/gcp_compute_reservation/tasks/main.yml index 45d6e49..fe47378 100644 --- a/tests/integration/targets/gcp_compute_reservation/tasks/main.yml +++ b/tests/integration/targets/gcp_compute_reservation/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/tests/integration/targets/gcp_compute_resource_policy/aliases b/tests/integration/targets/gcp_compute_resource_policy/aliases index 9812f01..0e4419e 100644 --- a/tests/integration/targets/gcp_compute_resource_policy/aliases +++ b/tests/integration/targets/gcp_compute_resource_policy/aliases @@ -1,2 +1 @@ -cloud/gcp -unsupported +cloud/gcp \ No newline at end of file diff --git a/tests/integration/targets/gcp_compute_resource_policy/tasks/autogen.yml b/tests/integration/targets/gcp_compute_resource_policy/tasks/autogen.yml index 0910e5b..86647db 100644 --- a/tests/integration/targets/gcp_compute_resource_policy/tasks/autogen.yml +++ b/tests/integration/targets/gcp_compute_resource_policy/tasks/autogen.yml @@ -13,7 +13,7 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: delete a resource policy +- name: Delete a resource policy google.cloud.gcp_compute_resource_policy: name: "{{ resource_name }}" region: us-central1 @@ -21,13 +21,13 @@ schedule: daily_schedule: days_in_cycle: 1 - start_time: '04:00' + start_time: "04:00" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a resource policy +- name: Create a resource policy google.cloud.gcp_compute_resource_policy: name: "{{ resource_name }}" region: us-central1 @@ -35,33 +35,33 @@ schedule: daily_schedule: days_in_cycle: 1 - start_time: '04:00' + start_time: "04:00" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that resource_policy was created +- name: Verify that resource_policy was created google.cloud.gcp_compute_resource_policy_info: - filters: - - name = {{ resource_name }} - region: us-central1 - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + region: us-central1 + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 1 # ---------------------------------------------------------------------------- -- name: create a resource policy that already exists +- name: Create a resource policy that already exists google.cloud.gcp_compute_resource_policy: name: "{{ resource_name }}" region: us-central1 @@ -69,18 +69,18 @@ schedule: daily_schedule: days_in_cycle: 1 - start_time: '04:00' + start_time: "04:00" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a resource policy +- name: Delete a resource policy google.cloud.gcp_compute_resource_policy: name: "{{ resource_name }}" region: us-central1 @@ -88,33 +88,33 @@ schedule: daily_schedule: days_in_cycle: 1 - start_time: '04:00' + start_time: "04:00" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that resource_policy was deleted +- name: Verify that resource_policy was deleted google.cloud.gcp_compute_resource_policy_info: - filters: - - name = {{ resource_name }} - region: us-central1 - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + region: us-central1 + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 0 # ---------------------------------------------------------------------------- -- name: delete a resource policy that does not exist +- name: Delete a resource policy that does not exist google.cloud.gcp_compute_resource_policy: name: "{{ resource_name }}" region: us-central1 @@ -122,13 +122,13 @@ schedule: daily_schedule: days_in_cycle: 1 - start_time: '04:00' + start_time: "04:00" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false diff --git a/tests/integration/targets/gcp_compute_resource_policy/tasks/main.yml b/tests/integration/targets/gcp_compute_resource_policy/tasks/main.yml index 45d6e49..fe47378 100644 --- a/tests/integration/targets/gcp_compute_resource_policy/tasks/main.yml +++ b/tests/integration/targets/gcp_compute_resource_policy/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/tests/integration/targets/gcp_compute_route/aliases b/tests/integration/targets/gcp_compute_route/aliases index 9812f01..0e4419e 100644 --- a/tests/integration/targets/gcp_compute_route/aliases +++ b/tests/integration/targets/gcp_compute_route/aliases @@ -1,2 +1 @@ -cloud/gcp -unsupported +cloud/gcp \ No newline at end of file diff --git a/tests/integration/targets/gcp_compute_route/tasks/autogen.yml b/tests/integration/targets/gcp_compute_route/tasks/autogen.yml index cd11426..347c503 100644 --- a/tests/integration/targets/gcp_compute_route/tasks/autogen.yml +++ b/tests/integration/targets/gcp_compute_route/tasks/autogen.yml @@ -13,140 +13,161 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: create a network +- name: Create a network google.cloud.gcp_compute_network: name: network-route project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + auto_create_subnetworks: true state: present register: network -- name: delete a route +- name: Delete a route google.cloud.gcp_compute_route: name: "{{ resource_name }}" dest_range: 192.168.6.0/24 next_hop_gateway: global/gateways/default-internet-gateway network: "{{ network }}" tags: - - backends - - databases + - backends + - databases project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a route +- name: Create a route google.cloud.gcp_compute_route: name: "{{ resource_name }}" dest_range: 192.168.6.0/24 next_hop_gateway: global/gateways/default-internet-gateway network: "{{ network }}" tags: - - backends - - databases + - backends + - databases project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that route was created +- name: Verify that route was created google.cloud.gcp_compute_route_info: - filters: - - name = {{ resource_name }} - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 1 # ---------------------------------------------------------------------------- -- name: create a route that already exists +- name: Create a route that already exists google.cloud.gcp_compute_route: name: "{{ resource_name }}" dest_range: 192.168.6.0/24 next_hop_gateway: global/gateways/default-internet-gateway network: "{{ network }}" tags: - - backends - - databases + - backends + - databases project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false +# --- +- name: Update a route + google.cloud.gcp_compute_route: + name: "{{ resource_name }}" + dest_range: 192.168.6.0/28 + next_hop_gateway: global/gateways/default-internet-gateway + network: "{{ network }}" + tags: + - backends + - foobar + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + state: present + register: result +- name: Assert changed is true + ansible.builtin.assert: + that: + - result.changed == true #---------------------------------------------------------- -- name: delete a route +- name: Delete a route google.cloud.gcp_compute_route: name: "{{ resource_name }}" dest_range: 192.168.6.0/24 next_hop_gateway: global/gateways/default-internet-gateway network: "{{ network }}" tags: - - backends - - databases + - backends + - databases project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that route was deleted +- name: Verify that route was deleted google.cloud.gcp_compute_route_info: - filters: - - name = {{ resource_name }} - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 0 # ---------------------------------------------------------------------------- -- name: delete a route that does not exist +- name: Delete a route that does not exist google.cloud.gcp_compute_route: name: "{{ resource_name }}" dest_range: 192.168.6.0/24 next_hop_gateway: global/gateways/default-internet-gateway network: "{{ network }}" tags: - - backends - - databases + - backends + - databases project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #--------------------------------------------------------- # Post-test teardown # If errors happen, don't crash the playbook! -- name: delete a network +- name: Delete a network google.cloud.gcp_compute_network: name: network-route project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + auto_create_subnetworks: true state: absent register: network ignore_errors: true diff --git a/tests/integration/targets/gcp_compute_route/tasks/main.yml b/tests/integration/targets/gcp_compute_route/tasks/main.yml index 45d6e49..fe47378 100644 --- a/tests/integration/targets/gcp_compute_route/tasks/main.yml +++ b/tests/integration/targets/gcp_compute_route/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/tests/integration/targets/gcp_compute_router/aliases b/tests/integration/targets/gcp_compute_router/aliases index 9812f01..0e4419e 100644 --- a/tests/integration/targets/gcp_compute_router/aliases +++ b/tests/integration/targets/gcp_compute_router/aliases @@ -1,2 +1 @@ -cloud/gcp -unsupported +cloud/gcp \ No newline at end of file diff --git a/tests/integration/targets/gcp_compute_router/tasks/autogen.yml b/tests/integration/targets/gcp_compute_router/tasks/autogen.yml index dbe8108..07acc69 100644 --- a/tests/integration/targets/gcp_compute_router/tasks/autogen.yml +++ b/tests/integration/targets/gcp_compute_router/tasks/autogen.yml @@ -13,15 +13,16 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: create a network +- name: Create a network google.cloud.gcp_compute_network: name: network-router project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + auto_create_subnetworks: true state: present register: network -- name: delete a router +- name: Delete a router google.cloud.gcp_compute_router: name: "{{ resource_name }}" network: "{{ network }}" @@ -29,17 +30,17 @@ asn: 64514 advertise_mode: CUSTOM advertised_groups: - - ALL_SUBNETS + - ALL_SUBNETS advertised_ip_ranges: - - range: 1.2.3.4 - - range: 6.7.0.0/16 + - range: 1.2.3.4 + - range: 6.7.0.0/16 region: us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a router +- name: Create a router google.cloud.gcp_compute_router: name: "{{ resource_name }}" network: "{{ network }}" @@ -47,37 +48,37 @@ asn: 64514 advertise_mode: CUSTOM advertised_groups: - - ALL_SUBNETS + - ALL_SUBNETS advertised_ip_ranges: - - range: 1.2.3.4 - - range: 6.7.0.0/16 + - range: 1.2.3.4 + - range: 6.7.0.0/16 region: us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that router was created +- name: Verify that router was created google.cloud.gcp_compute_router_info: - filters: - - name = {{ resource_name }} - region: us-central1 - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + region: us-central1 + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 1 # ---------------------------------------------------------------------------- -- name: create a router that already exists +- name: Create a router that already exists google.cloud.gcp_compute_router: name: "{{ resource_name }}" network: "{{ network }}" @@ -85,22 +86,22 @@ asn: 64514 advertise_mode: CUSTOM advertised_groups: - - ALL_SUBNETS + - ALL_SUBNETS advertised_ip_ranges: - - range: 1.2.3.4 - - range: 6.7.0.0/16 + - range: 1.2.3.4 + - range: 6.7.0.0/16 region: us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a router +- name: Delete a router google.cloud.gcp_compute_router: name: "{{ resource_name }}" network: "{{ network }}" @@ -108,37 +109,37 @@ asn: 64514 advertise_mode: CUSTOM advertised_groups: - - ALL_SUBNETS + - ALL_SUBNETS advertised_ip_ranges: - - range: 1.2.3.4 - - range: 6.7.0.0/16 + - range: 1.2.3.4 + - range: 6.7.0.0/16 region: us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that router was deleted +- name: Verify that router was deleted google.cloud.gcp_compute_router_info: - filters: - - name = {{ resource_name }} - region: us-central1 - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + region: us-central1 + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 0 # ---------------------------------------------------------------------------- -- name: delete a router that does not exist +- name: Delete a router that does not exist google.cloud.gcp_compute_router: name: "{{ resource_name }}" network: "{{ network }}" @@ -146,29 +147,30 @@ asn: 64514 advertise_mode: CUSTOM advertised_groups: - - ALL_SUBNETS + - ALL_SUBNETS advertised_ip_ranges: - - range: 1.2.3.4 - - range: 6.7.0.0/16 + - range: 1.2.3.4 + - range: 6.7.0.0/16 region: us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #--------------------------------------------------------- # Post-test teardown # If errors happen, don't crash the playbook! -- name: delete a network +- name: Delete a network google.cloud.gcp_compute_network: name: network-router project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + auto_create_subnetworks: true state: absent register: network ignore_errors: true diff --git a/tests/integration/targets/gcp_compute_router/tasks/main.yml b/tests/integration/targets/gcp_compute_router/tasks/main.yml index 45d6e49..fe47378 100644 --- a/tests/integration/targets/gcp_compute_router/tasks/main.yml +++ b/tests/integration/targets/gcp_compute_router/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/tests/integration/targets/gcp_compute_snapshot/aliases b/tests/integration/targets/gcp_compute_snapshot/aliases index 9812f01..0e4419e 100644 --- a/tests/integration/targets/gcp_compute_snapshot/aliases +++ b/tests/integration/targets/gcp_compute_snapshot/aliases @@ -1,2 +1 @@ -cloud/gcp -unsupported +cloud/gcp \ No newline at end of file diff --git a/tests/integration/targets/gcp_compute_snapshot/tasks/autogen.yml b/tests/integration/targets/gcp_compute_snapshot/tasks/autogen.yml index 64b4cb2..435284e 100644 --- a/tests/integration/targets/gcp_compute_snapshot/tasks/autogen.yml +++ b/tests/integration/targets/gcp_compute_snapshot/tasks/autogen.yml @@ -13,16 +13,16 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: create a disk +- name: Create a disk google.cloud.gcp_compute_disk: name: disk-snapshot zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: disk -- name: delete a snapshot +- name: Delete a snapshot google.cloud.gcp_compute_snapshot: name: "{{ resource_name }}" source_disk: "{{ disk }}" @@ -31,10 +31,10 @@ my_label: value project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a snapshot +- name: Create a snapshot google.cloud.gcp_compute_snapshot: name: "{{ resource_name }}" source_disk: "{{ disk }}" @@ -43,29 +43,29 @@ my_label: value project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that snapshot was created +- name: Verify that snapshot was created google.cloud.gcp_compute_snapshot_info: - filters: - - name = {{ resource_name }} - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 1 # ---------------------------------------------------------------------------- -- name: create a snapshot that already exists +- name: Create a snapshot that already exists google.cloud.gcp_compute_snapshot: name: "{{ resource_name }}" source_disk: "{{ disk }}" @@ -74,15 +74,15 @@ my_label: value project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a snapshot +- name: Delete a snapshot google.cloud.gcp_compute_snapshot: name: "{{ resource_name }}" source_disk: "{{ disk }}" @@ -91,29 +91,29 @@ my_label: value project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that snapshot was deleted +- name: Verify that snapshot was deleted google.cloud.gcp_compute_snapshot_info: - filters: - - name = {{ resource_name }} - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 0 # ---------------------------------------------------------------------------- -- name: delete a snapshot that does not exist +- name: Delete a snapshot that does not exist google.cloud.gcp_compute_snapshot: name: "{{ resource_name }}" source_disk: "{{ disk }}" @@ -122,23 +122,23 @@ my_label: value project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #--------------------------------------------------------- # Post-test teardown # If errors happen, don't crash the playbook! -- name: delete a disk +- name: Delete a disk google.cloud.gcp_compute_disk: name: disk-snapshot zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: disk ignore_errors: true diff --git a/tests/integration/targets/gcp_compute_snapshot/tasks/main.yml b/tests/integration/targets/gcp_compute_snapshot/tasks/main.yml index 45d6e49..fe47378 100644 --- a/tests/integration/targets/gcp_compute_snapshot/tasks/main.yml +++ b/tests/integration/targets/gcp_compute_snapshot/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/tests/integration/targets/gcp_compute_ssl_certificate/aliases b/tests/integration/targets/gcp_compute_ssl_certificate/aliases index 9812f01..0e4419e 100644 --- a/tests/integration/targets/gcp_compute_ssl_certificate/aliases +++ b/tests/integration/targets/gcp_compute_ssl_certificate/aliases @@ -1,2 +1 @@ -cloud/gcp -unsupported +cloud/gcp \ No newline at end of file diff --git a/tests/integration/targets/gcp_compute_ssl_certificate/tasks/autogen.yml b/tests/integration/targets/gcp_compute_ssl_certificate/tasks/autogen.yml index 911bc63..9d36683 100644 --- a/tests/integration/targets/gcp_compute_ssl_certificate/tasks/autogen.yml +++ b/tests/integration/targets/gcp_compute_ssl_certificate/tasks/autogen.yml @@ -13,10 +13,9 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: delete a SSL certificate +- name: Delete a SSL certificate google.cloud.gcp_compute_ssl_certificate: name: "{{ resource_name }}" - region: us-central1 description: A certificate for testing. Do not use this certificate in production certificate: |- -----BEGIN CERTIFICATE----- @@ -44,13 +43,12 @@ -----END EC PRIVATE KEY----- project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a SSL certificate +- name: Create a SSL certificate google.cloud.gcp_compute_ssl_certificate: name: "{{ resource_name }}" - region: us-central1 description: A certificate for testing. Do not use this certificate in production certificate: |- -----BEGIN CERTIFICATE----- @@ -78,32 +76,31 @@ -----END EC PRIVATE KEY----- project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that ssl_certificate was created +- name: Verify that ssl_certificate was created google.cloud.gcp_compute_ssl_certificate_info: - filters: - - name = {{ resource_name }} - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 1 # ---------------------------------------------------------------------------- -- name: create a SSL certificate that already exists +- name: Create a SSL certificate that already exists google.cloud.gcp_compute_ssl_certificate: name: "{{ resource_name }}" - region: us-central1 description: A certificate for testing. Do not use this certificate in production certificate: |- -----BEGIN CERTIFICATE----- @@ -131,18 +128,17 @@ -----END EC PRIVATE KEY----- project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a SSL certificate +- name: Delete a SSL certificate google.cloud.gcp_compute_ssl_certificate: name: "{{ resource_name }}" - region: us-central1 description: A certificate for testing. Do not use this certificate in production certificate: |- -----BEGIN CERTIFICATE----- @@ -170,32 +166,31 @@ -----END EC PRIVATE KEY----- project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that ssl_certificate was deleted +- name: Verify that ssl_certificate was deleted google.cloud.gcp_compute_ssl_certificate_info: - filters: - - name = {{ resource_name }} - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 0 # ---------------------------------------------------------------------------- -- name: delete a SSL certificate that does not exist +- name: Delete a SSL certificate that does not exist google.cloud.gcp_compute_ssl_certificate: name: "{{ resource_name }}" - region: us-central1 description: A certificate for testing. Do not use this certificate in production certificate: |- -----BEGIN CERTIFICATE----- @@ -223,10 +218,10 @@ -----END EC PRIVATE KEY----- project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false diff --git a/tests/integration/targets/gcp_compute_ssl_certificate/tasks/main.yml b/tests/integration/targets/gcp_compute_ssl_certificate/tasks/main.yml index 45d6e49..fe47378 100644 --- a/tests/integration/targets/gcp_compute_ssl_certificate/tasks/main.yml +++ b/tests/integration/targets/gcp_compute_ssl_certificate/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/tests/integration/targets/gcp_compute_ssl_policy/aliases b/tests/integration/targets/gcp_compute_ssl_policy/aliases index 9812f01..0e4419e 100644 --- a/tests/integration/targets/gcp_compute_ssl_policy/aliases +++ b/tests/integration/targets/gcp_compute_ssl_policy/aliases @@ -1,2 +1 @@ -cloud/gcp -unsupported +cloud/gcp \ No newline at end of file diff --git a/tests/integration/targets/gcp_compute_ssl_policy/tasks/autogen.yml b/tests/integration/targets/gcp_compute_ssl_policy/tasks/autogen.yml index 22bc04d..adbba9f 100644 --- a/tests/integration/targets/gcp_compute_ssl_policy/tasks/autogen.yml +++ b/tests/integration/targets/gcp_compute_ssl_policy/tasks/autogen.yml @@ -13,115 +13,115 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: delete a SSL policy +- name: Delete a SSL policy google.cloud.gcp_compute_ssl_policy: name: "{{ resource_name }}" profile: CUSTOM min_tls_version: TLS_1_2 custom_features: - - TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 - - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 + - TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 + - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a SSL policy +- name: Create a SSL policy google.cloud.gcp_compute_ssl_policy: name: "{{ resource_name }}" profile: CUSTOM min_tls_version: TLS_1_2 custom_features: - - TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 - - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 + - TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 + - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that ssl_policy was created +- name: Verify that ssl_policy was created google.cloud.gcp_compute_ssl_policy_info: - filters: - - name = {{ resource_name }} - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 1 # ---------------------------------------------------------------------------- -- name: create a SSL policy that already exists +- name: Create a SSL policy that already exists google.cloud.gcp_compute_ssl_policy: name: "{{ resource_name }}" profile: CUSTOM min_tls_version: TLS_1_2 custom_features: - - TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 - - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 + - TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 + - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a SSL policy +- name: Delete a SSL policy google.cloud.gcp_compute_ssl_policy: name: "{{ resource_name }}" profile: CUSTOM min_tls_version: TLS_1_2 custom_features: - - TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 - - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 + - TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 + - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that ssl_policy was deleted +- name: Verify that ssl_policy was deleted google.cloud.gcp_compute_ssl_policy_info: - filters: - - name = {{ resource_name }} - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 0 # ---------------------------------------------------------------------------- -- name: delete a SSL policy that does not exist +- name: Delete a SSL policy that does not exist google.cloud.gcp_compute_ssl_policy: name: "{{ resource_name }}" profile: CUSTOM min_tls_version: TLS_1_2 custom_features: - - TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 - - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 + - TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 + - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false diff --git a/tests/integration/targets/gcp_compute_ssl_policy/tasks/main.yml b/tests/integration/targets/gcp_compute_ssl_policy/tasks/main.yml index 45d6e49..fe47378 100644 --- a/tests/integration/targets/gcp_compute_ssl_policy/tasks/main.yml +++ b/tests/integration/targets/gcp_compute_ssl_policy/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/tests/integration/targets/gcp_compute_subnetwork/aliases b/tests/integration/targets/gcp_compute_subnetwork/aliases index 9812f01..0e4419e 100644 --- a/tests/integration/targets/gcp_compute_subnetwork/aliases +++ b/tests/integration/targets/gcp_compute_subnetwork/aliases @@ -1,2 +1 @@ -cloud/gcp -unsupported +cloud/gcp \ No newline at end of file diff --git a/tests/integration/targets/gcp_compute_subnetwork/tasks/autogen.yml b/tests/integration/targets/gcp_compute_subnetwork/tasks/autogen.yml index 3ea1330..6849cca 100644 --- a/tests/integration/targets/gcp_compute_subnetwork/tasks/autogen.yml +++ b/tests/integration/targets/gcp_compute_subnetwork/tasks/autogen.yml @@ -13,16 +13,16 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: create a network +- name: Create a network google.cloud.gcp_compute_network: name: network-subnetwork - auto_create_subnetworks: 'true' + auto_create_subnetworks: "true" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: network -- name: delete a subnetwork +- name: Delete a subnetwork google.cloud.gcp_compute_subnetwork: name: ansiblenet region: us-west1 @@ -30,10 +30,10 @@ ip_cidr_range: 172.16.0.0/16 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a subnetwork +- name: Create a subnetwork google.cloud.gcp_compute_subnetwork: name: ansiblenet region: us-west1 @@ -41,30 +41,30 @@ ip_cidr_range: 172.16.0.0/16 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that subnetwork was created +- name: Verify that subnetwork was created google.cloud.gcp_compute_subnetwork_info: - filters: - - name = ansiblenet - region: us-west1 - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = ansiblenet + region: us-west1 + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 1 # ---------------------------------------------------------------------------- -- name: create a subnetwork that already exists +- name: Create a subnetwork that already exists google.cloud.gcp_compute_subnetwork: name: ansiblenet region: us-west1 @@ -72,15 +72,15 @@ ip_cidr_range: 172.16.0.0/16 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a subnetwork +- name: Delete a subnetwork google.cloud.gcp_compute_subnetwork: name: ansiblenet region: us-west1 @@ -88,30 +88,30 @@ ip_cidr_range: 172.16.0.0/16 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that subnetwork was deleted +- name: Verify that subnetwork was deleted google.cloud.gcp_compute_subnetwork_info: - filters: - - name = ansiblenet - region: us-west1 - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = ansiblenet + region: us-west1 + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 0 # ---------------------------------------------------------------------------- -- name: delete a subnetwork that does not exist +- name: Delete a subnetwork that does not exist google.cloud.gcp_compute_subnetwork: name: ansiblenet region: us-west1 @@ -119,23 +119,23 @@ ip_cidr_range: 172.16.0.0/16 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #--------------------------------------------------------- # Post-test teardown # If errors happen, don't crash the playbook! -- name: delete a network +- name: Delete a network google.cloud.gcp_compute_network: name: network-subnetwork - auto_create_subnetworks: 'true' + auto_create_subnetworks: "true" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: network ignore_errors: true diff --git a/tests/integration/targets/gcp_compute_subnetwork/tasks/main.yml b/tests/integration/targets/gcp_compute_subnetwork/tasks/main.yml index 45d6e49..fe47378 100644 --- a/tests/integration/targets/gcp_compute_subnetwork/tasks/main.yml +++ b/tests/integration/targets/gcp_compute_subnetwork/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/tests/integration/targets/gcp_compute_target_http_proxy/aliases b/tests/integration/targets/gcp_compute_target_http_proxy/aliases index 9812f01..0e4419e 100644 --- a/tests/integration/targets/gcp_compute_target_http_proxy/aliases +++ b/tests/integration/targets/gcp_compute_target_http_proxy/aliases @@ -1,2 +1 @@ -cloud/gcp -unsupported +cloud/gcp \ No newline at end of file diff --git a/tests/integration/targets/gcp_compute_target_http_proxy/tasks/autogen.yml b/tests/integration/targets/gcp_compute_target_http_proxy/tasks/autogen.yml index 6e25237..1c48c9d 100644 --- a/tests/integration/targets/gcp_compute_target_http_proxy/tasks/autogen.yml +++ b/tests/integration/targets/gcp_compute_target_http_proxy/tasks/autogen.yml @@ -13,16 +13,16 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: create a instance group +- name: Create a instance group google.cloud.gcp_compute_instance_group: name: instancegroup-targethttpproxy zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: instancegroup -- name: create a HTTP health check +- name: Create a HTTP health check google.cloud.gcp_compute_http_health_check: name: httphealthcheck-targethttpproxy healthy_threshold: 10 @@ -31,151 +31,151 @@ unhealthy_threshold: 5 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: healthcheck -- name: create a backend service +- name: Create a backend service google.cloud.gcp_compute_backend_service: name: backendservice-targethttpproxy backends: - - group: "{{ instancegroup.selfLink }}" + - group: "{{ instancegroup.selfLink }}" health_checks: - - "{{ healthcheck.selfLink }}" - enable_cdn: 'true' + - "{{ healthcheck.selfLink }}" + enable_cdn: "true" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: backendservice -- name: create a URL map +- name: Create a URL map google.cloud.gcp_compute_url_map: name: urlmap-targethttpproxy default_service: "{{ backendservice }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: urlmap -- name: delete a target HTTP proxy +- name: Delete a target HTTP proxy google.cloud.gcp_compute_target_http_proxy: name: "{{ resource_name }}" url_map: "{{ urlmap }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a target HTTP proxy +- name: Create a target HTTP proxy google.cloud.gcp_compute_target_http_proxy: name: "{{ resource_name }}" url_map: "{{ urlmap }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that target_http_proxy was created +- name: Verify that target_http_proxy was created google.cloud.gcp_compute_target_http_proxy_info: - filters: - - name = {{ resource_name }} - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 1 # ---------------------------------------------------------------------------- -- name: create a target HTTP proxy that already exists +- name: Create a target HTTP proxy that already exists google.cloud.gcp_compute_target_http_proxy: name: "{{ resource_name }}" url_map: "{{ urlmap }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a target HTTP proxy +- name: Delete a target HTTP proxy google.cloud.gcp_compute_target_http_proxy: name: "{{ resource_name }}" url_map: "{{ urlmap }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that target_http_proxy was deleted +- name: Verify that target_http_proxy was deleted google.cloud.gcp_compute_target_http_proxy_info: - filters: - - name = {{ resource_name }} - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 0 # ---------------------------------------------------------------------------- -- name: delete a target HTTP proxy that does not exist +- name: Delete a target HTTP proxy that does not exist google.cloud.gcp_compute_target_http_proxy: name: "{{ resource_name }}" url_map: "{{ urlmap }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #--------------------------------------------------------- # Post-test teardown # If errors happen, don't crash the playbook! -- name: delete a URL map +- name: Delete a URL map google.cloud.gcp_compute_url_map: name: urlmap-targethttpproxy default_service: "{{ backendservice }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: urlmap ignore_errors: true -- name: delete a backend service +- name: Delete a backend service google.cloud.gcp_compute_backend_service: name: backendservice-targethttpproxy backends: - - group: "{{ instancegroup.selfLink }}" + - group: "{{ instancegroup.selfLink }}" health_checks: - - "{{ healthcheck.selfLink }}" - enable_cdn: 'true' + - "{{ healthcheck.selfLink }}" + enable_cdn: "true" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: backendservice ignore_errors: true -- name: delete a HTTP health check +- name: Delete a HTTP health check google.cloud.gcp_compute_http_health_check: name: httphealthcheck-targethttpproxy healthy_threshold: 10 @@ -184,17 +184,17 @@ unhealthy_threshold: 5 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: healthcheck ignore_errors: true -- name: delete a instance group +- name: Delete a instance group google.cloud.gcp_compute_instance_group: name: instancegroup-targethttpproxy zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: instancegroup ignore_errors: true diff --git a/tests/integration/targets/gcp_compute_target_http_proxy/tasks/main.yml b/tests/integration/targets/gcp_compute_target_http_proxy/tasks/main.yml index 45d6e49..fe47378 100644 --- a/tests/integration/targets/gcp_compute_target_http_proxy/tasks/main.yml +++ b/tests/integration/targets/gcp_compute_target_http_proxy/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/tests/integration/targets/gcp_compute_target_https_proxy/aliases b/tests/integration/targets/gcp_compute_target_https_proxy/aliases index 9812f01..0e4419e 100644 --- a/tests/integration/targets/gcp_compute_target_https_proxy/aliases +++ b/tests/integration/targets/gcp_compute_target_https_proxy/aliases @@ -1,2 +1 @@ -cloud/gcp -unsupported +cloud/gcp \ No newline at end of file diff --git a/tests/integration/targets/gcp_compute_target_https_proxy/tasks/autogen.yml b/tests/integration/targets/gcp_compute_target_https_proxy/tasks/autogen.yml index 29b3ae0..5731d08 100644 --- a/tests/integration/targets/gcp_compute_target_https_proxy/tasks/autogen.yml +++ b/tests/integration/targets/gcp_compute_target_https_proxy/tasks/autogen.yml @@ -13,16 +13,16 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: create a instance group +- name: Create a instance group google.cloud.gcp_compute_instance_group: name: instancegroup-targethttpsproxy zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: instancegroup -- name: create a HTTP health check +- name: Create a HTTP health check google.cloud.gcp_compute_http_health_check: name: httphealthcheck-targethttpsproxy healthy_threshold: 10 @@ -31,32 +31,32 @@ unhealthy_threshold: 5 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: healthcheck -- name: create a backend service +- name: Create a backend service google.cloud.gcp_compute_backend_service: name: backendservice-targethttpsproxy backends: - - group: "{{ instancegroup.selfLink }}" + - group: "{{ instancegroup.selfLink }}" health_checks: - - "{{ healthcheck.selfLink }}" - enable_cdn: 'true' + - "{{ healthcheck.selfLink }}" + enable_cdn: "true" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: backendservice -- name: create a URL map +- name: Create a URL map google.cloud.gcp_compute_url_map: name: urlmap-targethttpsproxy default_service: "{{ backendservice }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: urlmap -- name: create a SSL certificate +- name: Create a SSL certificate google.cloud.gcp_compute_ssl_certificate: name: sslcert-targethttpsproxy description: A certificate for testing. Do not use this certificate in production @@ -86,115 +86,115 @@ -----END EC PRIVATE KEY----- project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: sslcert -- name: delete a target HTTPS proxy +- name: Delete a target HTTPS proxy google.cloud.gcp_compute_target_https_proxy: name: "{{ resource_name }}" ssl_certificates: - - "{{ sslcert }}" + - "{{ sslcert }}" # noqa: args[module] url_map: "{{ urlmap }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a target HTTPS proxy +- name: Create a target HTTPS proxy google.cloud.gcp_compute_target_https_proxy: name: "{{ resource_name }}" ssl_certificates: - - "{{ sslcert }}" + - "{{ sslcert }}" # noqa: args[module] url_map: "{{ urlmap }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that target_https_proxy was created +- name: Verify that target_https_proxy was created google.cloud.gcp_compute_target_https_proxy_info: - filters: - - name = {{ resource_name }} - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 1 # ---------------------------------------------------------------------------- -- name: create a target HTTPS proxy that already exists +- name: Create a target HTTPS proxy that already exists google.cloud.gcp_compute_target_https_proxy: name: "{{ resource_name }}" ssl_certificates: - - "{{ sslcert }}" + - "{{ sslcert }}" # noqa: args[module] url_map: "{{ urlmap }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a target HTTPS proxy +- name: Delete a target HTTPS proxy google.cloud.gcp_compute_target_https_proxy: name: "{{ resource_name }}" ssl_certificates: - - "{{ sslcert }}" + - "{{ sslcert }}" # noqa: args[module] url_map: "{{ urlmap }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that target_https_proxy was deleted +- name: Verify that target_https_proxy was deleted google.cloud.gcp_compute_target_https_proxy_info: - filters: - - name = {{ resource_name }} - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 0 # ---------------------------------------------------------------------------- -- name: delete a target HTTPS proxy that does not exist +- name: Delete a target HTTPS proxy that does not exist google.cloud.gcp_compute_target_https_proxy: name: "{{ resource_name }}" ssl_certificates: - - "{{ sslcert }}" + - "{{ sslcert }}" # noqa: args[module] url_map: "{{ urlmap }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #--------------------------------------------------------- # Post-test teardown # If errors happen, don't crash the playbook! -- name: delete a SSL certificate +- name: Delete a SSL certificate google.cloud.gcp_compute_ssl_certificate: name: sslcert-targethttpsproxy description: A certificate for testing. Do not use this certificate in production @@ -224,35 +224,35 @@ -----END EC PRIVATE KEY----- project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: sslcert ignore_errors: true -- name: delete a URL map +- name: Delete a URL map google.cloud.gcp_compute_url_map: name: urlmap-targethttpsproxy default_service: "{{ backendservice }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: urlmap ignore_errors: true -- name: delete a backend service +- name: Delete a backend service google.cloud.gcp_compute_backend_service: name: backendservice-targethttpsproxy backends: - - group: "{{ instancegroup.selfLink }}" + - group: "{{ instancegroup.selfLink }}" health_checks: - - "{{ healthcheck.selfLink }}" - enable_cdn: 'true' + - "{{ healthcheck.selfLink }}" + enable_cdn: "true" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: backendservice ignore_errors: true -- name: delete a HTTP health check +- name: Delete a HTTP health check google.cloud.gcp_compute_http_health_check: name: httphealthcheck-targethttpsproxy healthy_threshold: 10 @@ -261,17 +261,17 @@ unhealthy_threshold: 5 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: healthcheck ignore_errors: true -- name: delete a instance group +- name: Delete a instance group google.cloud.gcp_compute_instance_group: name: instancegroup-targethttpsproxy zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: instancegroup ignore_errors: true diff --git a/tests/integration/targets/gcp_compute_target_https_proxy/tasks/main.yml b/tests/integration/targets/gcp_compute_target_https_proxy/tasks/main.yml index 45d6e49..fe47378 100644 --- a/tests/integration/targets/gcp_compute_target_https_proxy/tasks/main.yml +++ b/tests/integration/targets/gcp_compute_target_https_proxy/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/tests/integration/targets/gcp_compute_target_instance/aliases b/tests/integration/targets/gcp_compute_target_instance/aliases index 9812f01..26507c2 100644 --- a/tests/integration/targets/gcp_compute_target_instance/aliases +++ b/tests/integration/targets/gcp_compute_target_instance/aliases @@ -1,2 +1 @@ cloud/gcp -unsupported diff --git a/tests/integration/targets/gcp_compute_target_instance/tasks/autogen.yml b/tests/integration/targets/gcp_compute_target_instance/tasks/autogen.yml index 2985918..74a01f6 100644 --- a/tests/integration/targets/gcp_compute_target_instance/tasks/autogen.yml +++ b/tests/integration/targets/gcp_compute_target_instance/tasks/autogen.yml @@ -13,161 +13,163 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: create a network +- name: Create a network google.cloud.gcp_compute_network: name: network-instance project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + auto_create_subnetworks: true state: present register: network -- name: create a instance +- name: Create a instance google.cloud.gcp_compute_instance: name: "{{ resource_name }}" machine_type: n1-standard-1 disks: - - auto_delete: 'true' - boot: 'true' - initialize_params: - source_image: projects/ubuntu-os-cloud/global/images/family/ubuntu-1604-lts + - auto_delete: "true" + boot: "true" + initialize_params: + source_image: projects/ubuntu-os-cloud/global/images/family/ubuntu-minimal-2204-lts labels: environment: production network_interfaces: - - network: "{{ network }}" + - network: "{{ network }}" zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: instance -- name: delete a target instance +- name: Delete a target instance google.cloud.gcp_compute_target_instance: name: target instance: "{{ instance }}" zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a target instance +- name: Create a target instance google.cloud.gcp_compute_target_instance: name: target instance: "{{ instance }}" zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that target_instance was created +- name: Verify that target_instance was created google.cloud.gcp_compute_target_instance_info: - filters: - - name = target - zone: us-central1-a - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = target + zone: us-central1-a + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 1 # ---------------------------------------------------------------------------- -- name: create a target instance that already exists +- name: Create a target instance that already exists google.cloud.gcp_compute_target_instance: name: target instance: "{{ instance }}" zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a target instance +- name: Delete a target instance google.cloud.gcp_compute_target_instance: name: target instance: "{{ instance }}" zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that target_instance was deleted +- name: Verify that target_instance was deleted google.cloud.gcp_compute_target_instance_info: - filters: - - name = target - zone: us-central1-a - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = target + zone: us-central1-a + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 0 # ---------------------------------------------------------------------------- -- name: delete a target instance that does not exist +- name: Delete a target instance that does not exist google.cloud.gcp_compute_target_instance: name: target instance: "{{ instance }}" zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #--------------------------------------------------------- # Post-test teardown # If errors happen, don't crash the playbook! -- name: delete a instance +- name: Delete a instance google.cloud.gcp_compute_instance: name: "{{ resource_name }}" machine_type: n1-standard-1 disks: - - auto_delete: 'true' - boot: 'true' - initialize_params: - source_image: projects/ubuntu-os-cloud/global/images/family/ubuntu-1604-lts + - auto_delete: "true" + boot: "true" + initialize_params: + source_image: projects/ubuntu-os-cloud/global/images/family/ubuntu-minimal-2204-lts labels: environment: production network_interfaces: - - network: "{{ network }}" + - network: "{{ network }}" zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: instance ignore_errors: true -- name: delete a network +- name: Delete a network google.cloud.gcp_compute_network: name: network-instance project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + auto_create_subnetworks: true state: absent register: network ignore_errors: true diff --git a/tests/integration/targets/gcp_compute_target_instance/tasks/main.yml b/tests/integration/targets/gcp_compute_target_instance/tasks/main.yml index 45d6e49..fe47378 100644 --- a/tests/integration/targets/gcp_compute_target_instance/tasks/main.yml +++ b/tests/integration/targets/gcp_compute_target_instance/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/tests/integration/targets/gcp_compute_target_pool/aliases b/tests/integration/targets/gcp_compute_target_pool/aliases index 9812f01..0e4419e 100644 --- a/tests/integration/targets/gcp_compute_target_pool/aliases +++ b/tests/integration/targets/gcp_compute_target_pool/aliases @@ -1,2 +1 @@ -cloud/gcp -unsupported +cloud/gcp \ No newline at end of file diff --git a/tests/integration/targets/gcp_compute_target_pool/tasks/autogen.yml b/tests/integration/targets/gcp_compute_target_pool/tasks/autogen.yml index 6fd6091..59a46d2 100644 --- a/tests/integration/targets/gcp_compute_target_pool/tasks/autogen.yml +++ b/tests/integration/targets/gcp_compute_target_pool/tasks/autogen.yml @@ -13,97 +13,97 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: delete a target pool +- name: Delete a target pool google.cloud.gcp_compute_target_pool: name: "{{ resource_name }}" region: us-west1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a target pool +- name: Create a target pool google.cloud.gcp_compute_target_pool: name: "{{ resource_name }}" region: us-west1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that target_pool was created +- name: Verify that target_pool was created google.cloud.gcp_compute_target_pool_info: - filters: - - name = {{ resource_name }} - region: us-west1 - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + region: us-west1 + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 1 # ---------------------------------------------------------------------------- -- name: create a target pool that already exists +- name: Create a target pool that already exists google.cloud.gcp_compute_target_pool: name: "{{ resource_name }}" region: us-west1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a target pool +- name: Delete a target pool google.cloud.gcp_compute_target_pool: name: "{{ resource_name }}" region: us-west1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that target_pool was deleted +- name: Verify that target_pool was deleted google.cloud.gcp_compute_target_pool_info: - filters: - - name = {{ resource_name }} - region: us-west1 - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + region: us-west1 + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 0 # ---------------------------------------------------------------------------- -- name: delete a target pool that does not exist +- name: Delete a target pool that does not exist google.cloud.gcp_compute_target_pool: name: "{{ resource_name }}" region: us-west1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false diff --git a/tests/integration/targets/gcp_compute_target_pool/tasks/main.yml b/tests/integration/targets/gcp_compute_target_pool/tasks/main.yml index 45d6e49..fe47378 100644 --- a/tests/integration/targets/gcp_compute_target_pool/tasks/main.yml +++ b/tests/integration/targets/gcp_compute_target_pool/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/tests/integration/targets/gcp_compute_target_ssl_proxy/aliases b/tests/integration/targets/gcp_compute_target_ssl_proxy/aliases index 9812f01..0e4419e 100644 --- a/tests/integration/targets/gcp_compute_target_ssl_proxy/aliases +++ b/tests/integration/targets/gcp_compute_target_ssl_proxy/aliases @@ -1,2 +1 @@ -cloud/gcp -unsupported +cloud/gcp \ No newline at end of file diff --git a/tests/integration/targets/gcp_compute_target_ssl_proxy/tasks/autogen.yml b/tests/integration/targets/gcp_compute_target_ssl_proxy/tasks/autogen.yml index 056e1f5..6142ec9 100644 --- a/tests/integration/targets/gcp_compute_target_ssl_proxy/tasks/autogen.yml +++ b/tests/integration/targets/gcp_compute_target_ssl_proxy/tasks/autogen.yml @@ -13,16 +13,16 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: create a instance group +- name: Create a instance group google.cloud.gcp_compute_instance_group: name: instancegroup-targetsslproxy zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: instancegroup -- name: create a health check +- name: Create a health check google.cloud.gcp_compute_health_check: name: healthcheck-targetsslproxy type: TCP @@ -35,23 +35,23 @@ unhealthy_threshold: 5 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: healthcheck -- name: create a backend service +- name: Create a backend service google.cloud.gcp_compute_backend_service: name: backendservice-targetsslproxy backends: - - group: "{{ instancegroup.selfLink }}" + - group: "{{ instancegroup.selfLink }}" health_checks: - - "{{ healthcheck.selfLink }}" + - "{{ healthcheck.selfLink }}" protocol: SSL project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: backendservice -- name: create a SSL certificate +- name: Create a SSL certificate google.cloud.gcp_compute_ssl_certificate: name: sslcert-targetsslproxy description: A certificate for testing. Do not use this certificate in production @@ -81,115 +81,115 @@ -----END EC PRIVATE KEY----- project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: sslcert -- name: delete a target SSL proxy +- name: Delete a target SSL proxy google.cloud.gcp_compute_target_ssl_proxy: name: "{{ resource_name }}" ssl_certificates: - - "{{ sslcert }}" + - "{{ sslcert }}" service: "{{ backendservice }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a target SSL proxy +- name: Create a target SSL proxy google.cloud.gcp_compute_target_ssl_proxy: name: "{{ resource_name }}" ssl_certificates: - - "{{ sslcert }}" + - "{{ sslcert }}" service: "{{ backendservice }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that target_ssl_proxy was created +- name: Verify that target_ssl_proxy was created google.cloud.gcp_compute_target_ssl_proxy_info: - filters: - - name = {{ resource_name }} - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 1 # ---------------------------------------------------------------------------- -- name: create a target SSL proxy that already exists +- name: Create a target SSL proxy that already exists google.cloud.gcp_compute_target_ssl_proxy: name: "{{ resource_name }}" ssl_certificates: - - "{{ sslcert }}" + - "{{ sslcert }}" service: "{{ backendservice }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a target SSL proxy +- name: Delete a target SSL proxy google.cloud.gcp_compute_target_ssl_proxy: name: "{{ resource_name }}" ssl_certificates: - - "{{ sslcert }}" + - "{{ sslcert }}" service: "{{ backendservice }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that target_ssl_proxy was deleted +- name: Verify that target_ssl_proxy was deleted google.cloud.gcp_compute_target_ssl_proxy_info: - filters: - - name = {{ resource_name }} - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 0 # ---------------------------------------------------------------------------- -- name: delete a target SSL proxy that does not exist +- name: Delete a target SSL proxy that does not exist google.cloud.gcp_compute_target_ssl_proxy: name: "{{ resource_name }}" ssl_certificates: - - "{{ sslcert }}" + - "{{ sslcert }}" service: "{{ backendservice }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #--------------------------------------------------------- # Post-test teardown # If errors happen, don't crash the playbook! -- name: delete a SSL certificate +- name: Delete a SSL certificate google.cloud.gcp_compute_ssl_certificate: name: sslcert-targetsslproxy description: A certificate for testing. Do not use this certificate in production @@ -219,25 +219,25 @@ -----END EC PRIVATE KEY----- project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: sslcert ignore_errors: true -- name: delete a backend service +- name: Delete a backend service google.cloud.gcp_compute_backend_service: name: backendservice-targetsslproxy backends: - - group: "{{ instancegroup.selfLink }}" + - group: "{{ instancegroup.selfLink }}" health_checks: - - "{{ healthcheck.selfLink }}" + - "{{ healthcheck.selfLink }}" protocol: SSL project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: backendservice ignore_errors: true -- name: delete a health check +- name: Delete a health check google.cloud.gcp_compute_health_check: name: healthcheck-targetsslproxy type: TCP @@ -250,17 +250,17 @@ unhealthy_threshold: 5 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: healthcheck ignore_errors: true -- name: delete a instance group +- name: Delete a instance group google.cloud.gcp_compute_instance_group: name: instancegroup-targetsslproxy zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: instancegroup ignore_errors: true diff --git a/tests/integration/targets/gcp_compute_target_ssl_proxy/tasks/main.yml b/tests/integration/targets/gcp_compute_target_ssl_proxy/tasks/main.yml index 45d6e49..fe47378 100644 --- a/tests/integration/targets/gcp_compute_target_ssl_proxy/tasks/main.yml +++ b/tests/integration/targets/gcp_compute_target_ssl_proxy/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/tests/integration/targets/gcp_compute_target_tcp_proxy/aliases b/tests/integration/targets/gcp_compute_target_tcp_proxy/aliases index 9812f01..0e4419e 100644 --- a/tests/integration/targets/gcp_compute_target_tcp_proxy/aliases +++ b/tests/integration/targets/gcp_compute_target_tcp_proxy/aliases @@ -1,2 +1 @@ -cloud/gcp -unsupported +cloud/gcp \ No newline at end of file diff --git a/tests/integration/targets/gcp_compute_target_tcp_proxy/tasks/autogen.yml b/tests/integration/targets/gcp_compute_target_tcp_proxy/tasks/autogen.yml index 08a3ab4..82e3e55 100644 --- a/tests/integration/targets/gcp_compute_target_tcp_proxy/tasks/autogen.yml +++ b/tests/integration/targets/gcp_compute_target_tcp_proxy/tasks/autogen.yml @@ -13,16 +13,16 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: create a instance group +- name: Create a instance group google.cloud.gcp_compute_instance_group: name: instancegroup-targettcpproxy zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: instancegroup -- name: create a health check +- name: Create a health check google.cloud.gcp_compute_health_check: name: healthcheck-targettcpproxy type: TCP @@ -35,137 +35,137 @@ unhealthy_threshold: 5 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: healthcheck -- name: create a backend service +- name: Create a backend service google.cloud.gcp_compute_backend_service: name: backendservice-targettcpproxy backends: - - group: "{{ instancegroup.selfLink }}" + - group: "{{ instancegroup.selfLink }}" health_checks: - - "{{ healthcheck.selfLink }}" + - "{{ healthcheck.selfLink }}" protocol: TCP project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: backendservice -- name: delete a target TCP proxy +- name: Delete a target TCP proxy google.cloud.gcp_compute_target_tcp_proxy: name: "{{ resource_name }}" proxy_header: PROXY_V1 service: "{{ backendservice }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a target TCP proxy +- name: Create a target TCP proxy google.cloud.gcp_compute_target_tcp_proxy: name: "{{ resource_name }}" proxy_header: PROXY_V1 service: "{{ backendservice }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that target_tcp_proxy was created +- name: Verify that target_tcp_proxy was created google.cloud.gcp_compute_target_tcp_proxy_info: - filters: - - name = {{ resource_name }} - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 1 # ---------------------------------------------------------------------------- -- name: create a target TCP proxy that already exists +- name: Create a target TCP proxy that already exists google.cloud.gcp_compute_target_tcp_proxy: name: "{{ resource_name }}" proxy_header: PROXY_V1 service: "{{ backendservice }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a target TCP proxy +- name: Delete a target TCP proxy google.cloud.gcp_compute_target_tcp_proxy: name: "{{ resource_name }}" proxy_header: PROXY_V1 service: "{{ backendservice }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that target_tcp_proxy was deleted +- name: Verify that target_tcp_proxy was deleted google.cloud.gcp_compute_target_tcp_proxy_info: - filters: - - name = {{ resource_name }} - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 0 # ---------------------------------------------------------------------------- -- name: delete a target TCP proxy that does not exist +- name: Delete a target TCP proxy that does not exist google.cloud.gcp_compute_target_tcp_proxy: name: "{{ resource_name }}" proxy_header: PROXY_V1 service: "{{ backendservice }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #--------------------------------------------------------- # Post-test teardown # If errors happen, don't crash the playbook! -- name: delete a backend service +- name: Delete a backend service google.cloud.gcp_compute_backend_service: name: backendservice-targettcpproxy backends: - - group: "{{ instancegroup.selfLink }}" + - group: "{{ instancegroup.selfLink }}" health_checks: - - "{{ healthcheck.selfLink }}" + - "{{ healthcheck.selfLink }}" protocol: TCP project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: backendservice ignore_errors: true -- name: delete a health check +- name: Delete a health check google.cloud.gcp_compute_health_check: name: healthcheck-targettcpproxy type: TCP @@ -178,17 +178,17 @@ unhealthy_threshold: 5 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: healthcheck ignore_errors: true -- name: delete a instance group +- name: Delete a instance group google.cloud.gcp_compute_instance_group: name: instancegroup-targettcpproxy zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: instancegroup ignore_errors: true diff --git a/tests/integration/targets/gcp_compute_target_tcp_proxy/tasks/main.yml b/tests/integration/targets/gcp_compute_target_tcp_proxy/tasks/main.yml index 45d6e49..fe47378 100644 --- a/tests/integration/targets/gcp_compute_target_tcp_proxy/tasks/main.yml +++ b/tests/integration/targets/gcp_compute_target_tcp_proxy/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/tests/integration/targets/gcp_compute_target_vpn_gateway/aliases b/tests/integration/targets/gcp_compute_target_vpn_gateway/aliases index 9812f01..0e4419e 100644 --- a/tests/integration/targets/gcp_compute_target_vpn_gateway/aliases +++ b/tests/integration/targets/gcp_compute_target_vpn_gateway/aliases @@ -1,2 +1 @@ -cloud/gcp -unsupported +cloud/gcp \ No newline at end of file diff --git a/tests/integration/targets/gcp_compute_target_vpn_gateway/tasks/autogen.yml b/tests/integration/targets/gcp_compute_target_vpn_gateway/tasks/autogen.yml index c5f9cb3..a14a149 100644 --- a/tests/integration/targets/gcp_compute_target_vpn_gateway/tasks/autogen.yml +++ b/tests/integration/targets/gcp_compute_target_vpn_gateway/tasks/autogen.yml @@ -13,141 +13,143 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: create a address +- name: Create a address google.cloud.gcp_compute_address: name: address-vpngateway region: us-west1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: address -- name: create a network +- name: Create a network google.cloud.gcp_compute_network: name: network-vpngateway project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + auto_create_subnetworks: true state: present register: network -- name: delete a target vpn gateway +- name: Delete a target vpn gateway google.cloud.gcp_compute_target_vpn_gateway: name: "{{ resource_name }}" region: us-west1 network: "{{ network }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a target vpn gateway +- name: Create a target vpn gateway google.cloud.gcp_compute_target_vpn_gateway: name: "{{ resource_name }}" region: us-west1 network: "{{ network }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that target_vpn_gateway was created +- name: Verify that target_vpn_gateway was created google.cloud.gcp_compute_target_vpn_gateway_info: - filters: - - name = {{ resource_name }} - region: us-west1 - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + region: us-west1 + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 1 # ---------------------------------------------------------------------------- -- name: create a target vpn gateway that already exists +- name: Create a target vpn gateway that already exists google.cloud.gcp_compute_target_vpn_gateway: name: "{{ resource_name }}" region: us-west1 network: "{{ network }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a target vpn gateway +- name: Delete a target vpn gateway google.cloud.gcp_compute_target_vpn_gateway: name: "{{ resource_name }}" region: us-west1 network: "{{ network }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that target_vpn_gateway was deleted +- name: Verify that target_vpn_gateway was deleted google.cloud.gcp_compute_target_vpn_gateway_info: - filters: - - name = {{ resource_name }} - region: us-west1 - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + region: us-west1 + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 0 # ---------------------------------------------------------------------------- -- name: delete a target vpn gateway that does not exist +- name: Delete a target vpn gateway that does not exist google.cloud.gcp_compute_target_vpn_gateway: name: "{{ resource_name }}" region: us-west1 network: "{{ network }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #--------------------------------------------------------- # Post-test teardown # If errors happen, don't crash the playbook! -- name: delete a network +- name: Delete a network google.cloud.gcp_compute_network: name: network-vpngateway project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + auto_create_subnetworks: true state: absent register: network ignore_errors: true -- name: delete a address +- name: Delete a address google.cloud.gcp_compute_address: name: address-vpngateway region: us-west1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: address ignore_errors: true diff --git a/tests/integration/targets/gcp_compute_target_vpn_gateway/tasks/main.yml b/tests/integration/targets/gcp_compute_target_vpn_gateway/tasks/main.yml index 45d6e49..fe47378 100644 --- a/tests/integration/targets/gcp_compute_target_vpn_gateway/tasks/main.yml +++ b/tests/integration/targets/gcp_compute_target_vpn_gateway/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/tests/integration/targets/gcp_compute_url_map/aliases b/tests/integration/targets/gcp_compute_url_map/aliases index 9812f01..0e4419e 100644 --- a/tests/integration/targets/gcp_compute_url_map/aliases +++ b/tests/integration/targets/gcp_compute_url_map/aliases @@ -1,2 +1 @@ -cloud/gcp -unsupported +cloud/gcp \ No newline at end of file diff --git a/tests/integration/targets/gcp_compute_url_map/tasks/autogen.yml b/tests/integration/targets/gcp_compute_url_map/tasks/autogen.yml index 8993b9e..ead14fe 100644 --- a/tests/integration/targets/gcp_compute_url_map/tasks/autogen.yml +++ b/tests/integration/targets/gcp_compute_url_map/tasks/autogen.yml @@ -13,16 +13,16 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: create a instance group +- name: Create a instance group google.cloud.gcp_compute_instance_group: name: instancegroup-urlmap zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: instancegroup -- name: create a HTTP health check +- name: Create a HTTP health check google.cloud.gcp_compute_http_health_check: name: httphealthcheck-urlmap healthy_threshold: 10 @@ -31,132 +31,132 @@ unhealthy_threshold: 5 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: healthcheck -- name: create a backend service +- name: Create a backend service google.cloud.gcp_compute_backend_service: name: backendservice-urlmap backends: - - group: "{{ instancegroup.selfLink }}" + - group: "{{ instancegroup.selfLink }}" health_checks: - - "{{ healthcheck.selfLink }}" - enable_cdn: 'true' + - "{{ healthcheck.selfLink }}" + enable_cdn: "true" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: backendservice -- name: delete a URL map +- name: Delete a URL map google.cloud.gcp_compute_url_map: name: "{{ resource_name }}" default_service: "{{ backendservice }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a URL map +- name: Create a URL map google.cloud.gcp_compute_url_map: name: "{{ resource_name }}" default_service: "{{ backendservice }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that url_map was created +- name: Verify that url_map was created google.cloud.gcp_compute_url_map_info: - filters: - - name = {{ resource_name }} - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 1 # ---------------------------------------------------------------------------- -- name: create a URL map that already exists +- name: Create a URL map that already exists google.cloud.gcp_compute_url_map: name: "{{ resource_name }}" default_service: "{{ backendservice }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a URL map +- name: Delete a URL map google.cloud.gcp_compute_url_map: name: "{{ resource_name }}" default_service: "{{ backendservice }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that url_map was deleted +- name: Verify that url_map was deleted google.cloud.gcp_compute_url_map_info: - filters: - - name = {{ resource_name }} - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 0 # ---------------------------------------------------------------------------- -- name: delete a URL map that does not exist +- name: Delete a URL map that does not exist google.cloud.gcp_compute_url_map: name: "{{ resource_name }}" default_service: "{{ backendservice }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #--------------------------------------------------------- # Post-test teardown # If errors happen, don't crash the playbook! -- name: delete a backend service +- name: Delete a backend service google.cloud.gcp_compute_backend_service: name: backendservice-urlmap backends: - - group: "{{ instancegroup.selfLink }}" + - group: "{{ instancegroup.selfLink }}" health_checks: - - "{{ healthcheck.selfLink }}" - enable_cdn: 'true' + - "{{ healthcheck.selfLink }}" + enable_cdn: "true" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: backendservice ignore_errors: true -- name: delete a HTTP health check +- name: Delete a HTTP health check google.cloud.gcp_compute_http_health_check: name: httphealthcheck-urlmap healthy_threshold: 10 @@ -165,17 +165,17 @@ unhealthy_threshold: 5 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: healthcheck ignore_errors: true -- name: delete a instance group +- name: Delete a instance group google.cloud.gcp_compute_instance_group: name: instancegroup-urlmap zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: instancegroup ignore_errors: true diff --git a/tests/integration/targets/gcp_compute_url_map/tasks/main.yml b/tests/integration/targets/gcp_compute_url_map/tasks/main.yml index 45d6e49..fe47378 100644 --- a/tests/integration/targets/gcp_compute_url_map/tasks/main.yml +++ b/tests/integration/targets/gcp_compute_url_map/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/tests/integration/targets/gcp_compute_vpn_tunnel/aliases b/tests/integration/targets/gcp_compute_vpn_tunnel/aliases index 9812f01..26507c2 100644 --- a/tests/integration/targets/gcp_compute_vpn_tunnel/aliases +++ b/tests/integration/targets/gcp_compute_vpn_tunnel/aliases @@ -1,2 +1 @@ cloud/gcp -unsupported diff --git a/tests/integration/targets/gcp_compute_vpn_tunnel/tasks/autogen.yml b/tests/integration/targets/gcp_compute_vpn_tunnel/tasks/autogen.yml index 1c9ef37..79d4e05 100644 --- a/tests/integration/targets/gcp_compute_vpn_tunnel/tasks/autogen.yml +++ b/tests/integration/targets/gcp_compute_vpn_tunnel/tasks/autogen.yml @@ -13,15 +13,74 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: create a network +- name: Create a address + google.cloud.gcp_compute_address: + name: address + region: us-central1 + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + state: present + register: address +- name: Create a forward address + google.cloud.gcp_compute_address: + name: address-forwardingrule + region: us-central1 + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + state: present + register: address_forwardingrule +- name: Create a network google.cloud.gcp_compute_network: name: network-vpn-tunnel project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + auto_create_subnetworks: true state: present register: network -- name: create a router +- name: Create a disk + google.cloud.gcp_compute_disk: + name: "{{ resource_prefix }}" + size_gb: 50 + source_image: projects/ubuntu-os-cloud/global/images/family/ubuntu-minimal-2204-lts + zone: us-central1-a + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + state: present + register: disk +- name: Create a instance + google.cloud.gcp_compute_instance: + name: "{{ resource_name }}" + machine_type: n1-standard-1 + disks: + - auto_delete: "true" + boot: "true" + source: "{{ disk }}" + - auto_delete: "true" + interface: NVME + type: SCRATCH + initialize_params: + disk_type: local-ssd + metadata: + cost-center: "12345" + labels: + environment: production + network_interfaces: + - network: "{{ network }}" + access_configs: + - name: External NAT + nat_ip: "{{ address }}" + type: ONE_TO_ONE_NAT + zone: us-central1-a + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + state: present + register: result +- name: Create a router google.cloud.gcp_compute_router: name: router-vpn-tunnel network: "{{ network }}" @@ -29,150 +88,234 @@ asn: 64514 advertise_mode: CUSTOM advertised_groups: - - ALL_SUBNETS + - ALL_SUBNETS advertised_ip_ranges: - - range: 1.2.3.4 - - range: 6.7.0.0/16 + - range: 1.2.3.4 + - range: 6.7.0.0/16 region: us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: router -- name: create a target vpn gateway +- name: Create a target vpn gateway google.cloud.gcp_compute_target_vpn_gateway: name: gateway-vpn-tunnel - region: us-west1 + region: us-central1 network: "{{ network }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: gateway -- name: delete a vpn tunnel - google.cloud.gcp_compute_vpn_tunnel: +- name: Create a forwarding rule + google.cloud.gcp_compute_forwarding_rule: name: "{{ resource_name }}" - region: us-west1 - target_vpn_gateway: "{{ gateway }}" - router: "{{ router }}" - shared_secret: super secret + region: us-central1 + target: "{{ gateway.selfLink }}" + ip_protocol: ESP + ip_address: "{{ address_forwardingrule.address }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - state: absent -#---------------------------------------------------------- -- name: create a vpn tunnel - google.cloud.gcp_compute_vpn_tunnel: - name: "{{ resource_name }}" - region: us-west1 - target_vpn_gateway: "{{ gateway }}" - router: "{{ router }}" - shared_secret: super secret - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Create a UDP-500 forwarding rule + google.cloud.gcp_compute_forwarding_rule: + name: "{{ resource_name }}-udp" + region: us-central1 + target: "{{ gateway.selfLink }}" + ip_protocol: UDP + port_range: 500-500 + ip_address: "{{ address_forwardingrule.address }}" + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + state: present + register: result +- name: Create a UDP-4500 forwarding rule + google.cloud.gcp_compute_forwarding_rule: + name: "{{ resource_name }}-udp-4500" + region: us-central1 + target: "{{ gateway.selfLink }}" + ip_protocol: UDP + port_range: 4500-4500 + ip_address: "{{ address_forwardingrule.address }}" + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + state: present + register: result +- name: Delete a vpn tunnel + google.cloud.gcp_compute_vpn_tunnel: + name: "{{ resource_name }}" + region: us-central1 + target_vpn_gateway: "{{ gateway }}" + router: "{{ router }}" + shared_secret: super secret + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + peer_ip: "{{ address.address }}" + state: absent +#---------------------------------------------------------- +- name: Create a vpn tunnel + google.cloud.gcp_compute_vpn_tunnel: + name: "{{ resource_name }}" + region: us-central1 + target_vpn_gateway: "{{ gateway }}" + router: "{{ router }}" + shared_secret: super secret + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + peer_ip: "{{ address.address }}" + state: present + register: result +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that vpn_tunnel was created +- name: Verify that vpn_tunnel was created google.cloud.gcp_compute_vpn_tunnel_info: - filters: - - name = {{ resource_name }} - region: us-west1 - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + region: us-central1 + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 1 # ---------------------------------------------------------------------------- -- name: create a vpn tunnel that already exists +- name: Create a vpn tunnel that already exists google.cloud.gcp_compute_vpn_tunnel: name: "{{ resource_name }}" - region: us-west1 + region: us-central1 target_vpn_gateway: "{{ gateway }}" router: "{{ router }}" + peer_ip: "{{ address.address }}" shared_secret: super secret project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a vpn tunnel +- name: Delete a vpn tunnel google.cloud.gcp_compute_vpn_tunnel: name: "{{ resource_name }}" - region: us-west1 + region: us-central1 target_vpn_gateway: "{{ gateway }}" router: "{{ router }}" + peer_ip: "{{ address.address }}" shared_secret: super secret project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that vpn_tunnel was deleted +- name: Verify that vpn_tunnel was deleted google.cloud.gcp_compute_vpn_tunnel_info: - filters: - - name = {{ resource_name }} - region: us-west1 - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + region: us-central1 + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 0 # ---------------------------------------------------------------------------- -- name: delete a vpn tunnel that does not exist +- name: Delete a vpn tunnel that does not exist google.cloud.gcp_compute_vpn_tunnel: name: "{{ resource_name }}" - region: us-west1 + region: us-central1 target_vpn_gateway: "{{ gateway }}" router: "{{ router }}" + peer_ip: "{{ address.address }}" shared_secret: super secret project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #--------------------------------------------------------- # Post-test teardown +- name: Delete a UDP-4500 forwarding rule + google.cloud.gcp_compute_forwarding_rule: + name: "{{ resource_name }}-udp-4500" + region: us-central1 + target: "{{ gateway.selfLink }}" + ip_protocol: UDP + port_range: 4500-4500 + ip_address: "{{ address.address }}" + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + state: absent + ignore_errors: true + register: result +- name: Delete a UDP forwarding rule + google.cloud.gcp_compute_forwarding_rule: + name: "{{ resource_name }}-udp" + region: us-central1 + target: "{{ gateway.selfLink }}" + ip_protocol: UDP + port_range: 500-500 + ip_address: "{{ address.address }}" + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + state: absent + ignore_errors: true + register: result +- name: Delete a forwarding rule + google.cloud.gcp_compute_forwarding_rule: + name: "{{ resource_name }}" + region: us-central1 + target: "{{ gateway.selfLink }}" + ip_protocol: ESP + ip_address: 104.197.5.203 + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + state: absent + ignore_errors: true + register: result # If errors happen, don't crash the playbook! -- name: delete a target vpn gateway +- name: Delete a target vpn gateway google.cloud.gcp_compute_target_vpn_gateway: name: gateway-vpn-tunnel - region: us-west1 + region: us-central1 network: "{{ network }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: gateway ignore_errors: true -- name: delete a router +- name: Delete a router google.cloud.gcp_compute_router: name: router-vpn-tunnel network: "{{ network }}" @@ -180,23 +323,74 @@ asn: 64514 advertise_mode: CUSTOM advertised_groups: - - ALL_SUBNETS + - ALL_SUBNETS advertised_ip_ranges: - - range: 1.2.3.4 - - range: 6.7.0.0/16 + - range: 1.2.3.4 + - range: 6.7.0.0/16 region: us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: router ignore_errors: true -- name: delete a network +- name: Delete a instance + google.cloud.gcp_compute_instance: + name: "{{ resource_name }}" + machine_type: n1-standard-1 + disks: + - auto_delete: "true" + boot: "true" + source: "{{ disk }}" + - auto_delete: "true" + interface: NVME + type: SCRATCH + initialize_params: + disk_type: local-ssd + metadata: + cost-center: "12345" + labels: + environment: production + network_interfaces: + - network: "{{ network }}" + access_configs: + - name: External NAT + nat_ip: "{{ address }}" + type: ONE_TO_ONE_NAT + zone: us-central1-a + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + state: absent +- name: Delete a disk + google.cloud.gcp_compute_disk: + name: "{{ resource_prefix }}" + size_gb: 50 + source_image: projects/ubuntu-os-cloud/global/images/family/ubuntu-1604-lts + zone: us-central1-a + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + state: absent + register: disk + ignore_errors: true +- name: Delete a network google.cloud.gcp_compute_network: name: network-vpn-tunnel project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + auto_create_subnetworks: true state: absent register: network ignore_errors: true +- name: Delete a address + google.cloud.gcp_compute_address: + name: address + region: us-central1 + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + state: absent + register: address + ignore_errors: true diff --git a/tests/integration/targets/gcp_compute_vpn_tunnel/tasks/main.yml b/tests/integration/targets/gcp_compute_vpn_tunnel/tasks/main.yml index 45d6e49..fe47378 100644 --- a/tests/integration/targets/gcp_compute_vpn_tunnel/tasks/main.yml +++ b/tests/integration/targets/gcp_compute_vpn_tunnel/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/tests/integration/targets/gcp_container_cluster/aliases b/tests/integration/targets/gcp_container_cluster/aliases index 9812f01..0e4419e 100644 --- a/tests/integration/targets/gcp_container_cluster/aliases +++ b/tests/integration/targets/gcp_container_cluster/aliases @@ -1,2 +1 @@ -cloud/gcp -unsupported +cloud/gcp \ No newline at end of file diff --git a/tests/integration/targets/gcp_container_cluster/tasks/autogen.yml b/tests/integration/targets/gcp_container_cluster/tasks/autogen.yml index 689027c..f3c1d12 100644 --- a/tests/integration/targets/gcp_container_cluster/tasks/autogen.yml +++ b/tests/integration/targets/gcp_container_cluster/tasks/autogen.yml @@ -13,128 +13,113 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: delete a cluster +- name: Delete a cluster google.cloud.gcp_container_cluster: name: my-cluster initial_node_count: 2 - master_auth: - username: cluster_admin - password: my-secret-password node_config: machine_type: n1-standard-4 disk_size_gb: 500 location: us-central1-a project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + auth_kind: serviceaccount + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a cluster +- name: Create a cluster google.cloud.gcp_container_cluster: name: my-cluster initial_node_count: 2 - master_auth: - username: cluster_admin - password: my-secret-password node_config: machine_type: n1-standard-4 disk_size_gb: 500 location: us-central1-a project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + auth_kind: serviceaccount + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that cluster was created +- name: Verify that cluster was created google.cloud.gcp_container_cluster_info: - location: us-central1-a - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/cloud-platform + location: us-central1-a + project: "{{ gcp_project }}" + auth_kind: serviceaccount + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/cloud-platform register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - - "'my-cluster' in \"{{ results['resources'] | map(attribute='name') | list }}\"" + - results['resources'] | map(attribute='name') | select("match", ".*my-cluster.*") | list | length == 1 # ---------------------------------------------------------------------------- -- name: create a cluster that already exists +- name: Create a cluster that already exists google.cloud.gcp_container_cluster: name: my-cluster initial_node_count: 2 - master_auth: - username: cluster_admin - password: my-secret-password node_config: machine_type: n1-standard-4 disk_size_gb: 500 location: us-central1-a project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + auth_kind: serviceaccount + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a cluster +- name: Delete a cluster google.cloud.gcp_container_cluster: name: my-cluster initial_node_count: 2 - master_auth: - username: cluster_admin - password: my-secret-password node_config: machine_type: n1-standard-4 disk_size_gb: 500 location: us-central1-a project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + auth_kind: serviceaccount + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that cluster was deleted +- name: Verify that cluster was deleted google.cloud.gcp_container_cluster_info: - location: us-central1-a - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/cloud-platform + location: us-central1-a + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/cloud-platform register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - - "'my-cluster' not in \"{{ results['resources'] | map(attribute='name') | list }}\"" + - results['resources'] | map(attribute='name') | select("match", ".*my-cluster.*") | list | length == 0 # ---------------------------------------------------------------------------- -- name: delete a cluster that does not exist +- name: Delete a cluster that does not exist google.cloud.gcp_container_cluster: name: my-cluster initial_node_count: 2 - master_auth: - username: cluster_admin - password: my-secret-password node_config: machine_type: n1-standard-4 disk_size_gb: 500 location: us-central1-a project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + auth_kind: serviceaccount + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false diff --git a/tests/integration/targets/gcp_container_cluster/tasks/main.yml b/tests/integration/targets/gcp_container_cluster/tasks/main.yml index 45d6e49..fe47378 100644 --- a/tests/integration/targets/gcp_container_cluster/tasks/main.yml +++ b/tests/integration/targets/gcp_container_cluster/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/tests/integration/targets/gcp_container_node_pool/aliases b/tests/integration/targets/gcp_container_node_pool/aliases index 9812f01..0e4419e 100644 --- a/tests/integration/targets/gcp_container_node_pool/aliases +++ b/tests/integration/targets/gcp_container_node_pool/aliases @@ -1,2 +1 @@ -cloud/gcp -unsupported +cloud/gcp \ No newline at end of file diff --git a/tests/integration/targets/gcp_container_node_pool/tasks/autogen.yml b/tests/integration/targets/gcp_container_node_pool/tasks/autogen.yml index e452515..84fe978 100644 --- a/tests/integration/targets/gcp_container_node_pool/tasks/autogen.yml +++ b/tests/integration/targets/gcp_container_node_pool/tasks/autogen.yml @@ -13,17 +13,17 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: create a cluster +- name: Create a cluster google.cloud.gcp_container_cluster: name: cluster-nodepool initial_node_count: 4 location: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: cluster -- name: delete a node pool +- name: Delete a node pool google.cloud.gcp_container_node_pool: name: my-pool initial_node_count: 4 @@ -31,10 +31,10 @@ location: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a node pool +- name: Create a node pool google.cloud.gcp_container_node_pool: name: my-pool initial_node_count: 4 @@ -42,29 +42,29 @@ location: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that node_pool was created +- name: Verify that node_pool was created google.cloud.gcp_container_node_pool_info: - cluster: "{{ cluster }}" - location: us-central1-a - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/cloud-platform + cluster: "{{ cluster }}" + location: us-central1-a + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/cloud-platform register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - - "'my-pool' in \"{{ results['resources'] | map(attribute='name') | list }}\"" + - results['resources'] | map(attribute='name') | select("match", ".*my-pool.*") | list | length == 1 # ---------------------------------------------------------------------------- -- name: create a node pool that already exists +- name: Create a node pool that already exists google.cloud.gcp_container_node_pool: name: my-pool initial_node_count: 4 @@ -72,15 +72,15 @@ location: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a node pool +- name: Delete a node pool google.cloud.gcp_container_node_pool: name: my-pool initial_node_count: 4 @@ -88,29 +88,29 @@ location: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that node_pool was deleted +- name: Verify that node_pool was deleted google.cloud.gcp_container_node_pool_info: - cluster: "{{ cluster }}" - location: us-central1-a - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/cloud-platform + cluster: "{{ cluster }}" + location: us-central1-a + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/cloud-platform register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - - "'my-pool' not in \"{{ results['resources'] | map(attribute='name') | list }}\"" + - results['resources'] | map(attribute='name') | select("match", ".*my-pool.*") | list | length == 0 # ---------------------------------------------------------------------------- -- name: delete a node pool that does not exist +- name: Delete a node pool that does not exist google.cloud.gcp_container_node_pool: name: my-pool initial_node_count: 4 @@ -118,24 +118,24 @@ location: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #--------------------------------------------------------- # Post-test teardown # If errors happen, don't crash the playbook! -- name: delete a cluster +- name: Delete a cluster google.cloud.gcp_container_cluster: name: cluster-nodepool initial_node_count: 4 location: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: cluster ignore_errors: true diff --git a/tests/integration/targets/gcp_container_node_pool/tasks/main.yml b/tests/integration/targets/gcp_container_node_pool/tasks/main.yml index 45d6e49..fe47378 100644 --- a/tests/integration/targets/gcp_container_node_pool/tasks/main.yml +++ b/tests/integration/targets/gcp_container_node_pool/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/tests/integration/targets/gcp_dns_managed_zone/aliases b/tests/integration/targets/gcp_dns_managed_zone/aliases index 9812f01..0e4419e 100644 --- a/tests/integration/targets/gcp_dns_managed_zone/aliases +++ b/tests/integration/targets/gcp_dns_managed_zone/aliases @@ -1,2 +1 @@ -cloud/gcp -unsupported +cloud/gcp \ No newline at end of file diff --git a/tests/integration/targets/gcp_dns_managed_zone/tasks/autogen.yml b/tests/integration/targets/gcp_dns_managed_zone/tasks/autogen.yml index 9c73f77..2e7b2bf 100644 --- a/tests/integration/targets/gcp_dns_managed_zone/tasks/autogen.yml +++ b/tests/integration/targets/gcp_dns_managed_zone/tasks/autogen.yml @@ -13,98 +13,98 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: delete a managed zone +- name: Delete a managed zone google.cloud.gcp_dns_managed_zone: name: "{{ resource_name }}" dns_name: test.somewild2.example.com. description: test zone project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a managed zone +- name: Create a managed zone google.cloud.gcp_dns_managed_zone: name: "{{ resource_name }}" dns_name: test.somewild2.example.com. description: test zone project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that managed_zone was created +- name: Verify that managed_zone was created google.cloud.gcp_dns_managed_zone_info: - dns_name: test.somewild2.example.com. - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/ndev.clouddns.readwrite + dns_name: test.somewild2.example.com. + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/ndev.clouddns.readwrite register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 1 # ---------------------------------------------------------------------------- -- name: create a managed zone that already exists +- name: Create a managed zone that already exists google.cloud.gcp_dns_managed_zone: name: "{{ resource_name }}" dns_name: test.somewild2.example.com. description: test zone project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a managed zone +- name: Delete a managed zone google.cloud.gcp_dns_managed_zone: name: "{{ resource_name }}" dns_name: test.somewild2.example.com. description: test zone project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that managed_zone was deleted +- name: Verify that managed_zone was deleted google.cloud.gcp_dns_managed_zone_info: - dns_name: test.somewild2.example.com. - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/ndev.clouddns.readwrite + dns_name: test.somewild2.example.com. + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/ndev.clouddns.readwrite register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 0 # ---------------------------------------------------------------------------- -- name: delete a managed zone that does not exist +- name: Delete a managed zone that does not exist google.cloud.gcp_dns_managed_zone: name: "{{ resource_name }}" dns_name: test.somewild2.example.com. description: test zone project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false diff --git a/tests/integration/targets/gcp_dns_managed_zone/tasks/main.yml b/tests/integration/targets/gcp_dns_managed_zone/tasks/main.yml index 45d6e49..fe47378 100644 --- a/tests/integration/targets/gcp_dns_managed_zone/tasks/main.yml +++ b/tests/integration/targets/gcp_dns_managed_zone/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/tests/integration/targets/gcp_dns_resource_record_set/aliases b/tests/integration/targets/gcp_dns_resource_record_set/aliases index 9812f01..0e4419e 100644 --- a/tests/integration/targets/gcp_dns_resource_record_set/aliases +++ b/tests/integration/targets/gcp_dns_resource_record_set/aliases @@ -1,2 +1 @@ -cloud/gcp -unsupported +cloud/gcp \ No newline at end of file diff --git a/tests/integration/targets/gcp_dns_resource_record_set/tasks/autogen.yml b/tests/integration/targets/gcp_dns_resource_record_set/tasks/autogen.yml index a2b4d34..c8ca535 100644 --- a/tests/integration/targets/gcp_dns_resource_record_set/tasks/autogen.yml +++ b/tests/integration/targets/gcp_dns_resource_record_set/tasks/autogen.yml @@ -13,142 +13,142 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: create a managed zone +- name: Create a managed zone google.cloud.gcp_dns_managed_zone: name: managedzone-rrs dns_name: testzone-4.com. description: test zone project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: managed_zone -- name: delete a resource record set +- name: Delete a resource record set google.cloud.gcp_dns_resource_record_set: name: www.testzone-4.com. managed_zone: "{{ managed_zone }}" type: A ttl: 600 target: - - 10.1.2.3 - - 40.5.6.7 + - 10.1.2.3 + - 40.5.6.7 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a resource record set +- name: Create a resource record set google.cloud.gcp_dns_resource_record_set: name: www.testzone-4.com. managed_zone: "{{ managed_zone }}" type: A ttl: 600 target: - - 10.1.2.3 - - 40.5.6.7 + - 10.1.2.3 + - 40.5.6.7 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that resource_record_set was created +- name: Verify that resource_record_set was created google.cloud.gcp_dns_resource_record_set_info: - managed_zone: "{{ managed_zone }}" - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/ndev.clouddns.readwrite + managed_zone: "{{ managed_zone }}" + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/ndev.clouddns.readwrite register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - - "'www.testzone-4.com.'in \"{{ results['resources'] | map(attribute='name') | list }}\"" + - results['resources'] | map(attribute='name') | select("match", ".*www\\.testzone-4\\.com.*") | list | length == 1 # ---------------------------------------------------------------------------- -- name: create a resource record set that already exists +- name: Create a resource record set that already exists google.cloud.gcp_dns_resource_record_set: name: www.testzone-4.com. managed_zone: "{{ managed_zone }}" type: A ttl: 600 target: - - 10.1.2.3 - - 40.5.6.7 + - 10.1.2.3 + - 40.5.6.7 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a resource record set +- name: Delete a resource record set google.cloud.gcp_dns_resource_record_set: name: www.testzone-4.com. managed_zone: "{{ managed_zone }}" type: A ttl: 600 target: - - 10.1.2.3 - - 40.5.6.7 + - 10.1.2.3 + - 40.5.6.7 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that resource_record_set was deleted +- name: Verify that resource_record_set was deleted google.cloud.gcp_dns_resource_record_set_info: - managed_zone: "{{ managed_zone }}" - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/ndev.clouddns.readwrite + managed_zone: "{{ managed_zone }}" + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/ndev.clouddns.readwrite register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - - "'www.testzone-4.com.'not in \"{{ results['resources'] | map(attribute='name') | list }}\"" + - results['resources'] | map(attribute='name') | select("match", ".*www\\.testzone-4\\.com.*") | list | length == 0 # ---------------------------------------------------------------------------- -- name: delete a resource record set that does not exist +- name: Delete a resource record set that does not exist google.cloud.gcp_dns_resource_record_set: name: www.testzone-4.com. managed_zone: "{{ managed_zone }}" type: A ttl: 600 target: - - 10.1.2.3 - - 40.5.6.7 + - 10.1.2.3 + - 40.5.6.7 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #--------------------------------------------------------- # Post-test teardown # If errors happen, don't crash the playbook! -- name: delete a managed zone +- name: Delete a managed zone google.cloud.gcp_dns_managed_zone: name: managedzone-rrs dns_name: testzone-4.com. description: test zone project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: managed_zone ignore_errors: true diff --git a/tests/integration/targets/gcp_dns_resource_record_set/tasks/main.yml b/tests/integration/targets/gcp_dns_resource_record_set/tasks/main.yml index 45d6e49..fe47378 100644 --- a/tests/integration/targets/gcp_dns_resource_record_set/tasks/main.yml +++ b/tests/integration/targets/gcp_dns_resource_record_set/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/tests/integration/targets/gcp_filestore_instance/aliases b/tests/integration/targets/gcp_filestore_instance/aliases index 9812f01..0e4419e 100644 --- a/tests/integration/targets/gcp_filestore_instance/aliases +++ b/tests/integration/targets/gcp_filestore_instance/aliases @@ -1,2 +1 @@ -cloud/gcp -unsupported +cloud/gcp \ No newline at end of file diff --git a/tests/integration/targets/gcp_filestore_instance/tasks/autogen.yml b/tests/integration/targets/gcp_filestore_instance/tasks/autogen.yml index 9617679..20a7bde 100644 --- a/tests/integration/targets/gcp_filestore_instance/tasks/autogen.yml +++ b/tests/integration/targets/gcp_filestore_instance/tasks/autogen.yml @@ -13,133 +13,133 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: delete a instance +- name: Delete a instance google.cloud.gcp_filestore_instance: name: "{{ resource_name }}" zone: us-central1-b tier: PREMIUM file_shares: - - capacity_gb: 2660 - name: share1 + - capacity_gb: 2660 + name: share1 networks: - - network: default - modes: - - MODE_IPV4 + - network: default + modes: + - MODE_IPV4 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a instance +- name: Create a instance google.cloud.gcp_filestore_instance: name: "{{ resource_name }}" zone: us-central1-b tier: PREMIUM file_shares: - - capacity_gb: 2660 - name: share1 + - capacity_gb: 2660 + name: share1 networks: - - network: default - modes: - - MODE_IPV4 + - network: default + modes: + - MODE_IPV4 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that instance was created +- name: Verify that instance was created google.cloud.gcp_filestore_instance_info: - zone: us-central1-b - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/cloud-platform + zone: us-central1-b + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/cloud-platform register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | map(attribute='name') | select("match", ".*{{ resource_name }}.*") | list | length == 1 # ---------------------------------------------------------------------------- -- name: create a instance that already exists +- name: Create a instance that already exists google.cloud.gcp_filestore_instance: name: "{{ resource_name }}" zone: us-central1-b tier: PREMIUM file_shares: - - capacity_gb: 2660 - name: share1 + - capacity_gb: 2660 + name: share1 networks: - - network: default - modes: - - MODE_IPV4 + - network: default + modes: + - MODE_IPV4 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a instance +- name: Delete a instance google.cloud.gcp_filestore_instance: name: "{{ resource_name }}" zone: us-central1-b tier: PREMIUM file_shares: - - capacity_gb: 2660 - name: share1 + - capacity_gb: 2660 + name: share1 networks: - - network: default - modes: - - MODE_IPV4 + - network: default + modes: + - MODE_IPV4 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that instance was deleted +- name: Verify that instance was deleted google.cloud.gcp_filestore_instance_info: - zone: us-central1-b - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/cloud-platform + zone: us-central1-b + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/cloud-platform register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | map(attribute='name') | select("match", ".*{{ resource_name }}.*") | list | length == 0 # ---------------------------------------------------------------------------- -- name: delete a instance that does not exist +- name: Delete a instance that does not exist google.cloud.gcp_filestore_instance: name: "{{ resource_name }}" zone: us-central1-b tier: PREMIUM file_shares: - - capacity_gb: 2660 - name: share1 + - capacity_gb: 2660 + name: share1 networks: - - network: default - modes: - - MODE_IPV4 + - network: default + modes: + - MODE_IPV4 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false diff --git a/tests/integration/targets/gcp_filestore_instance/tasks/main.yml b/tests/integration/targets/gcp_filestore_instance/tasks/main.yml index 45d6e49..fe47378 100644 --- a/tests/integration/targets/gcp_filestore_instance/tasks/main.yml +++ b/tests/integration/targets/gcp_filestore_instance/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/tests/integration/targets/gcp_iam_role/aliases b/tests/integration/targets/gcp_iam_role/aliases index 9812f01..0e4419e 100644 --- a/tests/integration/targets/gcp_iam_role/aliases +++ b/tests/integration/targets/gcp_iam_role/aliases @@ -1,2 +1 @@ -cloud/gcp -unsupported +cloud/gcp \ No newline at end of file diff --git a/tests/integration/targets/gcp_iam_role/tasks/autogen.yml b/tests/integration/targets/gcp_iam_role/tasks/autogen.yml index 9e55c27..d4afe35 100644 --- a/tests/integration/targets/gcp_iam_role/tasks/autogen.yml +++ b/tests/integration/targets/gcp_iam_role/tasks/autogen.yml @@ -13,116 +13,136 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: delete a role +- name: Delete a role google.cloud.gcp_iam_role: - name: myCustomRole2 + name: "{{ resource_prefix[0:30].replace('-', '_') }}" title: My Custom Role description: My custom role description included_permissions: - - iam.roles.list - - iam.roles.create - - iam.roles.delete + - iam.roles.list + - iam.roles.create + - iam.roles.delete project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a role +- name: Create a role google.cloud.gcp_iam_role: - name: myCustomRole2 + name: "{{ resource_prefix[0:30].replace('-', '_') }}" title: My Custom Role description: My custom role description included_permissions: - - iam.roles.list - - iam.roles.create - - iam.roles.delete + - iam.roles.list + - iam.roles.create + - iam.roles.delete project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that role was created +- name: Verify that role was created google.cloud.gcp_iam_role_info: - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/iam + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/iam register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - - results['resources'] | map(attribute='name') | select("match", ".*myCustomRole2.*") | list | length == 1 + - results['resources'] | map(attribute='name') | select("match", ".*{{ resource_prefix[0:30].replace('-', '_') }}.*") | list | length == 1 # ---------------------------------------------------------------------------- -- name: create a role that already exists +- name: Create a role that already exists google.cloud.gcp_iam_role: - name: myCustomRole2 + name: "{{ resource_prefix[0:30].replace('-', '_') }}" title: My Custom Role description: My custom role description included_permissions: - - iam.roles.list - - iam.roles.create - - iam.roles.delete + - iam.roles.list + - iam.roles.create + - iam.roles.delete project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false +# ---------------------------------------------------------------------------- +- name: Modify an IAM role that already exists + google.cloud.gcp_iam_role: + name: "{{ resource_prefix[0:30].replace('-', '_') }}" + title: My Custom Role + description: My custom role description + included_permissions: + - storage.buckets.get + - storage.buckets.list + - storage.objects.get + - storage.objects.list + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + state: present + register: result +- name: Assert changed is true + ansible.builtin.assert: + that: + - result.changed == true #---------------------------------------------------------- -- name: delete a role +- name: Delete a role google.cloud.gcp_iam_role: - name: myCustomRole2 + name: "{{ resource_prefix[0:30].replace('-', '_') }}" title: My Custom Role description: My custom role description included_permissions: - - iam.roles.list - - iam.roles.create - - iam.roles.delete + - iam.roles.list + - iam.roles.create + - iam.roles.delete project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that role was deleted +- name: Verify that role was deleted google.cloud.gcp_iam_role_info: - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/iam + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/iam register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - - results['resources'] | map(attribute='name') | select("match", ".*myCustomRole2.*") | list | length == 0 + - results['resources'] | map(attribute='name') | select("match", ".*{{ resource_prefix[0:30].replace('-', '_') }}.*") | list | length == 0 # ---------------------------------------------------------------------------- -- name: delete a role that does not exist +- name: Delete a role that does not exist google.cloud.gcp_iam_role: - name: myCustomRole2 + name: "{{ resource_prefix[0:30].replace('-', '_') }}" title: My Custom Role description: My custom role description included_permissions: - - iam.roles.list - - iam.roles.create - - iam.roles.delete + - iam.roles.list + - iam.roles.create + - iam.roles.delete project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false diff --git a/tests/integration/targets/gcp_iam_role/tasks/main.yml b/tests/integration/targets/gcp_iam_role/tasks/main.yml index 45d6e49..fe47378 100644 --- a/tests/integration/targets/gcp_iam_role/tasks/main.yml +++ b/tests/integration/targets/gcp_iam_role/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/tests/integration/targets/gcp_iam_service_account/aliases b/tests/integration/targets/gcp_iam_service_account/aliases index 9812f01..0e4419e 100644 --- a/tests/integration/targets/gcp_iam_service_account/aliases +++ b/tests/integration/targets/gcp_iam_service_account/aliases @@ -1,2 +1 @@ -cloud/gcp -unsupported +cloud/gcp \ No newline at end of file diff --git a/tests/integration/targets/gcp_iam_service_account/tasks/autogen.yml b/tests/integration/targets/gcp_iam_service_account/tasks/autogen.yml index 9c70ab3..9a4106d 100644 --- a/tests/integration/targets/gcp_iam_service_account/tasks/autogen.yml +++ b/tests/integration/targets/gcp_iam_service_account/tasks/autogen.yml @@ -13,91 +13,93 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: delete a service account +- name: Delete a service account google.cloud.gcp_iam_service_account: - name: sa-{{ resource_name.split("-")[-1] }}@graphite-playground.google.com.iam.gserviceaccount.com + name: service-{{ resource_name.split("-")[-1] }}@{{ gcp_project }}.iam.gserviceaccount.com display_name: My Ansible test key project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a service account +- name: Create a service account google.cloud.gcp_iam_service_account: - name: sa-{{ resource_name.split("-")[-1] }}@graphite-playground.google.com.iam.gserviceaccount.com + name: service-{{ resource_name.split("-")[-1] }}@{{ gcp_project }}.iam.gserviceaccount.com display_name: My Ansible test key project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that service_account was created +- name: Verify that service_account was created google.cloud.gcp_iam_service_account_info: - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/iam + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/iam register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - - results['resources'] | map(attribute='name') | select("match", ".*sa-{{ resource_name.split("-")[-1] }}@graphite-playground.google.com.iam.gserviceaccount.com.*") | list | length == 1 + - results['resources'] | map(attribute='name') | select("match", ".*service-{{ resource_name.split("-")[-1] }}@{{ gcp_project }}.iam.gserviceaccount.com.*") + | list | length == 1 # ---------------------------------------------------------------------------- -- name: create a service account that already exists +- name: Create a service account that already exists google.cloud.gcp_iam_service_account: - name: sa-{{ resource_name.split("-")[-1] }}@graphite-playground.google.com.iam.gserviceaccount.com + name: service-{{ resource_name.split("-")[-1] }}@{{ gcp_project }}.iam.gserviceaccount.com display_name: My Ansible test key project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a service account +- name: Delete a service account google.cloud.gcp_iam_service_account: - name: sa-{{ resource_name.split("-")[-1] }}@graphite-playground.google.com.iam.gserviceaccount.com + name: service-{{ resource_name.split("-")[-1] }}@{{ gcp_project }}.iam.gserviceaccount.com display_name: My Ansible test key project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that service_account was deleted +- name: Verify that service_account was deleted google.cloud.gcp_iam_service_account_info: - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/iam + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/iam register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - - results['resources'] | map(attribute='name') | select("match", ".*sa-{{ resource_name.split("-")[-1] }}@graphite-playground.google.com.iam.gserviceaccount.com.*") | list | length == 0 + - results['resources'] | map(attribute='name') | select("match", ".*service-{{ resource_name.split("-")[-1] }}@{{ gcp_project }}.iam.gserviceaccount.com.*") + | list | length == 0 # ---------------------------------------------------------------------------- -- name: delete a service account that does not exist +- name: Delete a service account that does not exist google.cloud.gcp_iam_service_account: - name: sa-{{ resource_name.split("-")[-1] }}@graphite-playground.google.com.iam.gserviceaccount.com + name: service-{{ resource_name.split("-")[-1] }}@{{ gcp_project }}.iam.gserviceaccount.com display_name: My Ansible test key project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false diff --git a/tests/integration/targets/gcp_iam_service_account/tasks/main.yml b/tests/integration/targets/gcp_iam_service_account/tasks/main.yml index 45d6e49..fe47378 100644 --- a/tests/integration/targets/gcp_iam_service_account/tasks/main.yml +++ b/tests/integration/targets/gcp_iam_service_account/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/tests/integration/targets/gcp_iam_service_account_key/aliases b/tests/integration/targets/gcp_iam_service_account_key/aliases index 9812f01..0e4419e 100644 --- a/tests/integration/targets/gcp_iam_service_account_key/aliases +++ b/tests/integration/targets/gcp_iam_service_account_key/aliases @@ -1,2 +1 @@ -cloud/gcp -unsupported +cloud/gcp \ No newline at end of file diff --git a/tests/integration/targets/gcp_iam_service_account_key/defaults/main.yml b/tests/integration/targets/gcp_iam_service_account_key/defaults/main.yml index aa87a2a..aa65c31 100644 --- a/tests/integration/targets/gcp_iam_service_account_key/defaults/main.yml +++ b/tests/integration/targets/gcp_iam_service_account_key/defaults/main.yml @@ -1,3 +1,3 @@ --- # defaults file -resource_name: '{{resource_prefix}}' +resource_name: "{{ resource_prefix }}" diff --git a/tests/integration/targets/gcp_kms_crypto_key/aliases b/tests/integration/targets/gcp_kms_crypto_key/aliases index 9812f01..26507c2 100644 --- a/tests/integration/targets/gcp_kms_crypto_key/aliases +++ b/tests/integration/targets/gcp_kms_crypto_key/aliases @@ -1,2 +1 @@ cloud/gcp -unsupported diff --git a/tests/integration/targets/gcp_kms_crypto_key/tasks/autogen.yml b/tests/integration/targets/gcp_kms_crypto_key/tasks/autogen.yml index ef2252c..0e27077 100644 --- a/tests/integration/targets/gcp_kms_crypto_key/tasks/autogen.yml +++ b/tests/integration/targets/gcp_kms_crypto_key/tasks/autogen.yml @@ -13,61 +13,61 @@ --- # Pre-test setup -- name: create a key ring - gcp_kms_key_ring: +- name: Create a key ring + google.cloud.gcp_kms_key_ring: name: key-key-ring location: us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: keyring -- name: delete a crypto key - gcp_kms_crypto_key: +- name: Delete a crypto key + google.cloud.gcp_kms_crypto_key: name: "{{ resource_name }}" key_ring: projects/{{ gcp_project }}/locations/us-central1/keyRings/key-key-ring project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a crypto key - gcp_kms_crypto_key: +- name: Create a crypto key + google.cloud.gcp_kms_crypto_key: name: "{{ resource_name }}" key_ring: projects/{{ gcp_project }}/locations/us-central1/keyRings/key-key-ring project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that crypto_key was created - gcp_kms_crypto_key_info: - key_ring: "projects/{{ gcp_project }}/locations/us-central1/keyRings/key-key-ring" - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/cloudkms +- name: Verify that crypto_key was created + google.cloud.gcp_kms_crypto_key_info: + key_ring: projects/{{ gcp_project }}/locations/us-central1/keyRings/key-key-ring + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/cloudkms register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | map(attribute='name') | select("match", ".*{{ resource_name }}.*") | list | length == 1 # ---------------------------------------------------------------------------- -- name: create a crypto key that already exists - gcp_kms_crypto_key: +- name: Create a crypto key that already exists + google.cloud.gcp_kms_crypto_key: name: "{{ resource_name }}" key_ring: projects/{{ gcp_project }}/locations/us-central1/keyRings/key-key-ring project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false diff --git a/tests/integration/targets/gcp_kms_crypto_key/tasks/main.yml b/tests/integration/targets/gcp_kms_crypto_key/tasks/main.yml index 45d6e49..fe47378 100644 --- a/tests/integration/targets/gcp_kms_crypto_key/tasks/main.yml +++ b/tests/integration/targets/gcp_kms_crypto_key/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/tests/integration/targets/gcp_kms_key_ring/aliases b/tests/integration/targets/gcp_kms_key_ring/aliases index 9812f01..0e4419e 100644 --- a/tests/integration/targets/gcp_kms_key_ring/aliases +++ b/tests/integration/targets/gcp_kms_key_ring/aliases @@ -1,2 +1 @@ -cloud/gcp -unsupported +cloud/gcp \ No newline at end of file diff --git a/tests/integration/targets/gcp_kms_key_ring/tasks/autogen.yml b/tests/integration/targets/gcp_kms_key_ring/tasks/autogen.yml index 34999ab..b0af43c 100644 --- a/tests/integration/targets/gcp_kms_key_ring/tasks/autogen.yml +++ b/tests/integration/targets/gcp_kms_key_ring/tasks/autogen.yml @@ -1,3 +1,4 @@ +--- # Copyright 2019 Google Inc. # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. @@ -12,52 +13,52 @@ # limitations under the License. # Pre-test setup -- name: delete a key ring - gcp_kms_key_ring: +- name: Delete a key ring + google.cloud.gcp_kms_key_ring: name: "{{ resource_name }}" location: us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a key ring - gcp_kms_key_ring: +- name: Create a key ring + google.cloud.gcp_kms_key_ring: name: "{{ resource_name }}" location: us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that key_ring was created - gcp_kms_key_ring_info: - location: us-central1 - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/cloudkms +- name: Verify that key_ring was created + google.cloud.gcp_kms_key_ring_info: + location: us-central1 + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/cloudkms register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | map(attribute='name') | select("match", ".*{{ resource_name }}.*") | list | length == 1 # ---------------------------------------------------------------------------- -- name: create a key ring that already exists - gcp_kms_key_ring: +- name: Create a key ring that already exists + google.cloud.gcp_kms_key_ring: name: "{{ resource_name }}" location: us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false diff --git a/tests/integration/targets/gcp_kms_key_ring/tasks/main.yml b/tests/integration/targets/gcp_kms_key_ring/tasks/main.yml index 45d6e49..fe47378 100644 --- a/tests/integration/targets/gcp_kms_key_ring/tasks/main.yml +++ b/tests/integration/targets/gcp_kms_key_ring/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/tests/integration/targets/gcp_logging_metric/aliases b/tests/integration/targets/gcp_logging_metric/aliases index 9812f01..26507c2 100644 --- a/tests/integration/targets/gcp_logging_metric/aliases +++ b/tests/integration/targets/gcp_logging_metric/aliases @@ -1,2 +1 @@ cloud/gcp -unsupported diff --git a/tests/integration/targets/gcp_logging_metric/tasks/autogen.yml b/tests/integration/targets/gcp_logging_metric/tasks/autogen.yml index bc4de15..90a77b0 100644 --- a/tests/integration/targets/gcp_logging_metric/tasks/autogen.yml +++ b/tests/integration/targets/gcp_logging_metric/tasks/autogen.yml @@ -13,18 +13,18 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: delete a metric +- name: Delete a metric google.cloud.gcp_logging_metric: name: "{{ resource_name }}" filter: resource.type=gae_app AND severity>=ERROR metric_descriptor: metric_kind: DELTA value_type: DISTRIBUTION - unit: '1' + unit: "1" labels: - - key: mass - value_type: STRING - description: amount of matter + - key: mass + value_type: STRING + description: amount of matter value_extractor: EXTRACT(jsonPayload.request) label_extractors: mass: EXTRACT(jsonPayload.request) @@ -35,21 +35,21 @@ offset: 1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a metric +- name: Create a metric google.cloud.gcp_logging_metric: name: "{{ resource_name }}" filter: resource.type=gae_app AND severity>=ERROR metric_descriptor: metric_kind: DELTA value_type: DISTRIBUTION - unit: '1' + unit: "1" labels: - - key: mass - value_type: STRING - description: amount of matter + - key: mass + value_type: STRING + description: amount of matter value_extractor: EXTRACT(jsonPayload.request) label_extractors: mass: EXTRACT(jsonPayload.request) @@ -60,38 +60,38 @@ offset: 1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that metric was created +- name: Verify that metric was created google.cloud.gcp_logging_metric_info: - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/cloud-platform + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/cloud-platform register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | map(attribute='name') | select("match", ".*{{ resource_name }}.*") | list | length == 1 # ---------------------------------------------------------------------------- -- name: create a metric that already exists +- name: Create a metric that already exists google.cloud.gcp_logging_metric: name: "{{ resource_name }}" filter: resource.type=gae_app AND severity>=ERROR metric_descriptor: metric_kind: DELTA value_type: DISTRIBUTION - unit: '1' + unit: "1" labels: - - key: mass - value_type: STRING - description: amount of matter + - key: mass + value_type: STRING + description: amount of matter value_extractor: EXTRACT(jsonPayload.request) label_extractors: mass: EXTRACT(jsonPayload.request) @@ -102,26 +102,26 @@ offset: 1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a metric +- name: Delete a metric google.cloud.gcp_logging_metric: name: "{{ resource_name }}" filter: resource.type=gae_app AND severity>=ERROR metric_descriptor: metric_kind: DELTA value_type: DISTRIBUTION - unit: '1' + unit: "1" labels: - - key: mass - value_type: STRING - description: amount of matter + - key: mass + value_type: STRING + description: amount of matter value_extractor: EXTRACT(jsonPayload.request) label_extractors: mass: EXTRACT(jsonPayload.request) @@ -132,38 +132,38 @@ offset: 1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that metric was deleted +- name: Verify that metric was deleted google.cloud.gcp_logging_metric_info: - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/cloud-platform + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/cloud-platform register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | map(attribute='name') | select("match", ".*{{ resource_name }}.*") | list | length == 0 # ---------------------------------------------------------------------------- -- name: delete a metric that does not exist +- name: Delete a metric that does not exist google.cloud.gcp_logging_metric: name: "{{ resource_name }}" filter: resource.type=gae_app AND severity>=ERROR metric_descriptor: metric_kind: DELTA value_type: DISTRIBUTION - unit: '1' + unit: "1" labels: - - key: mass - value_type: STRING - description: amount of matter + - key: mass + value_type: STRING + description: amount of matter value_extractor: EXTRACT(jsonPayload.request) label_extractors: mass: EXTRACT(jsonPayload.request) @@ -174,10 +174,10 @@ offset: 1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false diff --git a/tests/integration/targets/gcp_logging_metric/tasks/main.yml b/tests/integration/targets/gcp_logging_metric/tasks/main.yml index 45d6e49..fe47378 100644 --- a/tests/integration/targets/gcp_logging_metric/tasks/main.yml +++ b/tests/integration/targets/gcp_logging_metric/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/tests/integration/targets/gcp_mlengine_model/aliases b/tests/integration/targets/gcp_mlengine_model/aliases index 9812f01..0e4419e 100644 --- a/tests/integration/targets/gcp_mlengine_model/aliases +++ b/tests/integration/targets/gcp_mlengine_model/aliases @@ -1,2 +1 @@ -cloud/gcp -unsupported +cloud/gcp \ No newline at end of file diff --git a/tests/integration/targets/gcp_mlengine_model/tasks/autogen.yml b/tests/integration/targets/gcp_mlengine_model/tasks/autogen.yml index 8b15c3d..619a49c 100644 --- a/tests/integration/targets/gcp_mlengine_model/tasks/autogen.yml +++ b/tests/integration/targets/gcp_mlengine_model/tasks/autogen.yml @@ -13,101 +13,101 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: delete a model +- name: Delete a model google.cloud.gcp_mlengine_model: name: "{{ resource_name | replace('-', '_') }}" description: My model regions: - - us-central1 + - us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a model +- name: Create a model google.cloud.gcp_mlengine_model: name: "{{ resource_name | replace('-', '_') }}" description: My model regions: - - us-central1 + - us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that model was created +- name: Verify that model was created google.cloud.gcp_mlengine_model_info: - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/cloud-platform + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/cloud-platform register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | map(attribute='name') | select("match", ".*{{ resource_name | replace('-', '_') }}.*") | list | length == 1 # ---------------------------------------------------------------------------- -- name: create a model that already exists +- name: Create a model that already exists google.cloud.gcp_mlengine_model: name: "{{ resource_name | replace('-', '_') }}" description: My model regions: - - us-central1 + - us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a model +- name: Delete a model google.cloud.gcp_mlengine_model: name: "{{ resource_name | replace('-', '_') }}" description: My model regions: - - us-central1 + - us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that model was deleted +- name: Verify that model was deleted google.cloud.gcp_mlengine_model_info: - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/cloud-platform + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/cloud-platform register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | map(attribute='name') | select("match", ".*{{ resource_name | replace('-', '_') }}.*") | list | length == 0 # ---------------------------------------------------------------------------- -- name: delete a model that does not exist +- name: Delete a model that does not exist google.cloud.gcp_mlengine_model: name: "{{ resource_name | replace('-', '_') }}" description: My model regions: - - us-central1 + - us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false diff --git a/tests/integration/targets/gcp_mlengine_model/tasks/main.yml b/tests/integration/targets/gcp_mlengine_model/tasks/main.yml index 45d6e49..fe47378 100644 --- a/tests/integration/targets/gcp_mlengine_model/tasks/main.yml +++ b/tests/integration/targets/gcp_mlengine_model/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/tests/integration/targets/gcp_mlengine_version/aliases b/tests/integration/targets/gcp_mlengine_version/aliases index 9812f01..ff7eb2d 100644 --- a/tests/integration/targets/gcp_mlengine_version/aliases +++ b/tests/integration/targets/gcp_mlengine_version/aliases @@ -1,2 +1,2 @@ cloud/gcp -unsupported +unsupported \ No newline at end of file diff --git a/tests/integration/targets/gcp_mlengine_version/tasks/autogen.yml b/tests/integration/targets/gcp_mlengine_version/tasks/autogen.yml index 2a9da56..d68bad0 100644 --- a/tests/integration/targets/gcp_mlengine_version/tasks/autogen.yml +++ b/tests/integration/targets/gcp_mlengine_version/tasks/autogen.yml @@ -13,143 +13,143 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: create a model +- name: Create a model google.cloud.gcp_mlengine_model: name: model_version description: My model regions: - - us-central1 - online_prediction_logging: 'true' - online_prediction_console_logging: 'true' + - us-central1 + online_prediction_logging: "true" + online_prediction_console_logging: "true" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: model -- name: delete a version +- name: Delete a version google.cloud.gcp_mlengine_version: name: "{{ resource_name | replace('-', '_') }}" model: "{{ model }}" runtime_version: 1.13 python_version: 3.5 - is_default: 'true' + is_default: "true" deployment_uri: gs://ansible-cloudml-bucket/ project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a version +- name: Create a version google.cloud.gcp_mlengine_version: name: "{{ resource_name | replace('-', '_') }}" model: "{{ model }}" runtime_version: 1.13 python_version: 3.5 - is_default: 'true' + is_default: "true" deployment_uri: gs://ansible-cloudml-bucket/ project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that version was created +- name: Verify that version was created google.cloud.gcp_mlengine_version_info: - model: "{{ model }}" - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/cloud-platform + model: "{{ model }}" + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/cloud-platform register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | map(attribute='name') | select("match", ".*{{ resource_name | replace('-', '_') }}.*") | list | length == 1 # ---------------------------------------------------------------------------- -- name: create a version that already exists +- name: Create a version that already exists google.cloud.gcp_mlengine_version: name: "{{ resource_name | replace('-', '_') }}" model: "{{ model }}" runtime_version: 1.13 python_version: 3.5 - is_default: 'true' + is_default: "true" deployment_uri: gs://ansible-cloudml-bucket/ project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a version +- name: Delete a version google.cloud.gcp_mlengine_version: name: "{{ resource_name | replace('-', '_') }}" model: "{{ model }}" runtime_version: 1.13 python_version: 3.5 - is_default: 'true' + is_default: "true" deployment_uri: gs://ansible-cloudml-bucket/ project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that version was deleted +- name: Verify that version was deleted google.cloud.gcp_mlengine_version_info: - model: "{{ model }}" - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/cloud-platform + model: "{{ model }}" + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/cloud-platform register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | map(attribute='name') | select("match", ".*{{ resource_name | replace('-', '_') }}.*") | list | length == 0 # ---------------------------------------------------------------------------- -- name: delete a version that does not exist +- name: Delete a version that does not exist google.cloud.gcp_mlengine_version: name: "{{ resource_name | replace('-', '_') }}" model: "{{ model }}" runtime_version: 1.13 python_version: 3.5 - is_default: 'true' + is_default: "true" deployment_uri: gs://ansible-cloudml-bucket/ project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #--------------------------------------------------------- # Post-test teardown # If errors happen, don't crash the playbook! -- name: delete a model +- name: Delete a model google.cloud.gcp_mlengine_model: name: model_version description: My model regions: - - us-central1 - online_prediction_logging: 'true' - online_prediction_console_logging: 'true' + - us-central1 + online_prediction_logging: "true" + online_prediction_console_logging: "true" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: model ignore_errors: true diff --git a/tests/integration/targets/gcp_mlengine_version/tasks/main.yml b/tests/integration/targets/gcp_mlengine_version/tasks/main.yml index 45d6e49..fe47378 100644 --- a/tests/integration/targets/gcp_mlengine_version/tasks/main.yml +++ b/tests/integration/targets/gcp_mlengine_version/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/tests/integration/targets/gcp_pubsub_subscription/aliases b/tests/integration/targets/gcp_pubsub_subscription/aliases index 9812f01..0e4419e 100644 --- a/tests/integration/targets/gcp_pubsub_subscription/aliases +++ b/tests/integration/targets/gcp_pubsub_subscription/aliases @@ -1,2 +1 @@ -cloud/gcp -unsupported +cloud/gcp \ No newline at end of file diff --git a/tests/integration/targets/gcp_pubsub_subscription/tasks/autogen.yml b/tests/integration/targets/gcp_pubsub_subscription/tasks/autogen.yml index be58520..6aeaa58 100644 --- a/tests/integration/targets/gcp_pubsub_subscription/tasks/autogen.yml +++ b/tests/integration/targets/gcp_pubsub_subscription/tasks/autogen.yml @@ -13,116 +13,116 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: create a topic +- name: Create a topic google.cloud.gcp_pubsub_topic: name: topic-subscription project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: topic -- name: delete a subscription +- name: Delete a subscription google.cloud.gcp_pubsub_subscription: name: "{{ resource_name }}" topic: "{{ topic }}" ack_deadline_seconds: 300 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a subscription +- name: Create a subscription google.cloud.gcp_pubsub_subscription: name: "{{ resource_name }}" topic: "{{ topic }}" ack_deadline_seconds: 300 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that subscription was created +- name: Verify that subscription was created google.cloud.gcp_pubsub_subscription_info: - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/pubsub + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/pubsub register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - - "\"{{resource_name}}\" in \"{{ results['resources'] | map(attribute='name') | list }}\"" + - results['resources'] | map(attribute='name') | select("match", ".*{{ resource_name }}.*") | list | length == 1 # ---------------------------------------------------------------------------- -- name: create a subscription that already exists +- name: Create a subscription that already exists google.cloud.gcp_pubsub_subscription: name: "{{ resource_name }}" topic: "{{ topic }}" ack_deadline_seconds: 300 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a subscription +- name: Delete a subscription google.cloud.gcp_pubsub_subscription: name: "{{ resource_name }}" topic: "{{ topic }}" ack_deadline_seconds: 300 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that subscription was deleted +- name: Verify that subscription was deleted google.cloud.gcp_pubsub_subscription_info: - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/pubsub + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/pubsub register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - - "\"{{resource_name}}\" not in \"{{ results['resources'] | map(attribute='name') | list }}\"" + - results['resources'] | map(attribute='name') | select("match", ".*{{ resource_name }}.*") | list | length == 0 # ---------------------------------------------------------------------------- -- name: delete a subscription that does not exist +- name: Delete a subscription that does not exist google.cloud.gcp_pubsub_subscription: name: "{{ resource_name }}" topic: "{{ topic }}" ack_deadline_seconds: 300 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #--------------------------------------------------------- # Post-test teardown # If errors happen, don't crash the playbook! -- name: delete a topic +- name: Delete a topic google.cloud.gcp_pubsub_topic: name: topic-subscription project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: topic ignore_errors: true diff --git a/tests/integration/targets/gcp_pubsub_subscription/tasks/main.yml b/tests/integration/targets/gcp_pubsub_subscription/tasks/main.yml index 45d6e49..fe47378 100644 --- a/tests/integration/targets/gcp_pubsub_subscription/tasks/main.yml +++ b/tests/integration/targets/gcp_pubsub_subscription/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/tests/integration/targets/gcp_pubsub_topic/aliases b/tests/integration/targets/gcp_pubsub_topic/aliases index 9812f01..0e4419e 100644 --- a/tests/integration/targets/gcp_pubsub_topic/aliases +++ b/tests/integration/targets/gcp_pubsub_topic/aliases @@ -1,2 +1 @@ -cloud/gcp -unsupported +cloud/gcp \ No newline at end of file diff --git a/tests/integration/targets/gcp_pubsub_topic/tasks/autogen.yml b/tests/integration/targets/gcp_pubsub_topic/tasks/autogen.yml index 5d811a1..d9f3cd3 100644 --- a/tests/integration/targets/gcp_pubsub_topic/tasks/autogen.yml +++ b/tests/integration/targets/gcp_pubsub_topic/tasks/autogen.yml @@ -13,86 +13,86 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: delete a topic +- name: Delete a topic google.cloud.gcp_pubsub_topic: name: test-topic1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a topic +- name: Create a topic google.cloud.gcp_pubsub_topic: name: test-topic1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that topic was created +- name: Verify that topic was created google.cloud.gcp_pubsub_topic_info: - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/pubsub + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/pubsub register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - - "'test-topic1' in \"{{ results['resources'] | map(attribute='name') | list }}\"" + - results['resources'] | map(attribute='name') | select("match", ".*test-topic1.*") | list | length == 1 # ---------------------------------------------------------------------------- -- name: create a topic that already exists +- name: Create a topic that already exists google.cloud.gcp_pubsub_topic: name: test-topic1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a topic +- name: Delete a topic google.cloud.gcp_pubsub_topic: name: test-topic1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that topic was deleted +- name: Verify that topic was deleted google.cloud.gcp_pubsub_topic_info: - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/pubsub + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/pubsub register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - - "'test-topic1' not in \"{{ results['resources'] | map(attribute='name') | list }}\"" + - results['resources'] | map(attribute='name') | select("match", ".*test-topic1.*") | list | length == 0 # ---------------------------------------------------------------------------- -- name: delete a topic that does not exist +- name: Delete a topic that does not exist google.cloud.gcp_pubsub_topic: name: test-topic1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false diff --git a/tests/integration/targets/gcp_pubsub_topic/tasks/main.yml b/tests/integration/targets/gcp_pubsub_topic/tasks/main.yml index 45d6e49..fe47378 100644 --- a/tests/integration/targets/gcp_pubsub_topic/tasks/main.yml +++ b/tests/integration/targets/gcp_pubsub_topic/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/tests/integration/targets/gcp_redis_instance/aliases b/tests/integration/targets/gcp_redis_instance/aliases index 9812f01..0e4419e 100644 --- a/tests/integration/targets/gcp_redis_instance/aliases +++ b/tests/integration/targets/gcp_redis_instance/aliases @@ -1,2 +1 @@ -cloud/gcp -unsupported +cloud/gcp \ No newline at end of file diff --git a/tests/integration/targets/gcp_redis_instance/tasks/autogen.yml b/tests/integration/targets/gcp_redis_instance/tasks/autogen.yml index 3580c1a..cea48d6 100644 --- a/tests/integration/targets/gcp_redis_instance/tasks/autogen.yml +++ b/tests/integration/targets/gcp_redis_instance/tasks/autogen.yml @@ -13,15 +13,16 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: create a network +- name: Create a network google.cloud.gcp_compute_network: name: network-instance project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + auto_create_subnetworks: true state: present register: network -- name: delete a instance +- name: Delete a instance google.cloud.gcp_redis_instance: name: instance37 tier: STANDARD_HA @@ -36,10 +37,10 @@ other_key: other_val project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a instance +- name: Create a instance google.cloud.gcp_redis_instance: name: instance37 tier: STANDARD_HA @@ -54,28 +55,28 @@ other_key: other_val project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that instance was created +- name: Verify that instance was created google.cloud.gcp_redis_instance_info: - region: us-central1 - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/cloud-platform + region: us-central1 + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/cloud-platform register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | map(attribute='name') | select("match", ".*instance37.*") | list | length == 1 # ---------------------------------------------------------------------------- -- name: create a instance that already exists +- name: Create a instance that already exists google.cloud.gcp_redis_instance: name: instance37 tier: STANDARD_HA @@ -90,15 +91,15 @@ other_key: other_val project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a instance +- name: Delete a instance google.cloud.gcp_redis_instance: name: instance37 tier: STANDARD_HA @@ -113,28 +114,28 @@ other_key: other_val project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that instance was deleted +- name: Verify that instance was deleted google.cloud.gcp_redis_instance_info: - region: us-central1 - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/cloud-platform + region: us-central1 + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/cloud-platform register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | map(attribute='name') | select("match", ".*instance37.*") | list | length == 0 # ---------------------------------------------------------------------------- -- name: delete a instance that does not exist +- name: Delete a instance that does not exist google.cloud.gcp_redis_instance: name: instance37 tier: STANDARD_HA @@ -149,22 +150,23 @@ other_key: other_val project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #--------------------------------------------------------- # Post-test teardown # If errors happen, don't crash the playbook! -- name: delete a network +- name: Delete a network google.cloud.gcp_compute_network: name: network-instance project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + auto_create_subnetworks: true state: absent register: network ignore_errors: true diff --git a/tests/integration/targets/gcp_redis_instance/tasks/main.yml b/tests/integration/targets/gcp_redis_instance/tasks/main.yml index 45d6e49..fe47378 100644 --- a/tests/integration/targets/gcp_redis_instance/tasks/main.yml +++ b/tests/integration/targets/gcp_redis_instance/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/tests/integration/targets/gcp_resourcemanager_project/aliases b/tests/integration/targets/gcp_resourcemanager_project/aliases index 9812f01..72efdb9 100644 --- a/tests/integration/targets/gcp_resourcemanager_project/aliases +++ b/tests/integration/targets/gcp_resourcemanager_project/aliases @@ -1,2 +1,4 @@ cloud/gcp -unsupported +# unsupported as CI test project does not support +# creating folders / projects to test. +unsupported \ No newline at end of file diff --git a/tests/integration/targets/gcp_resourcemanager_project/tasks/autogen.yml b/tests/integration/targets/gcp_resourcemanager_project/tasks/autogen.yml index 81043b0..5545d0e 100644 --- a/tests/integration/targets/gcp_resourcemanager_project/tasks/autogen.yml +++ b/tests/integration/targets/gcp_resourcemanager_project/tasks/autogen.yml @@ -13,101 +13,113 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: delete a project +- name: Delete a project google.cloud.gcp_resourcemanager_project: - name: My Sample Project - id: alextest-{{ 10000000000 | random }} + name: "{{ resource_prefix[0:30] }}" + id: "{{ resource_prefix[0:30] }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" parent: - type: organization - id: 636173955921 + type: folder + id: "{{ gcp_folder_id }}" state: absent #---------------------------------------------------------- -- name: create a project +- name: Create a project google.cloud.gcp_resourcemanager_project: - name: My Sample Project - id: alextest-{{ 10000000000 | random }} + name: "{{ resource_prefix[0:30] }}" + id: "{{ resource_prefix[0:30] }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" parent: - type: organization - id: 636173955921 + type: folder + id: "{{ gcp_folder_id }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that project was created +- name: Pause for 2 minutes for project to appear + ansible.builtin.pause: + minutes: 2 +- name: Verify that project was created google.cloud.gcp_resourcemanager_project_info: - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/cloud-platform - register: results -- name: verify that command succeeded - assert: - that: - - results['resources'] | map(attribute='name') | select("match", ".*My Sample Project.*") | list | length == 1 -# ---------------------------------------------------------------------------- -- name: create a project that already exists - google.cloud.gcp_resourcemanager_project: - name: My Sample Project - id: alextest-{{ 10000000000 | random }} + project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + # choose 1000 projects so iterate past the deleted ones. + page_size: 1000 + scopes: + - https://www.googleapis.com/auth/cloud-platform + register: results +- name: Verify that command succeeded + ansible.builtin.assert: + that: + - results['resources'] | selectattr("lifecycleState", "equalto", "ACTIVE") | map(attribute='name') | select("match", ".*{{ resource_prefix[0:30] }}.*") | list + | length == 1 +# ---------------------------------------------------------------------------- +- name: Create a project that already exists + google.cloud.gcp_resourcemanager_project: + name: "{{ resource_prefix[0:30] }}" + id: "{{ resource_prefix[0:30] }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" parent: - type: organization - id: 636173955921 + type: folder + id: "{{ gcp_folder_id }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a project +- name: Delete a project google.cloud.gcp_resourcemanager_project: - name: My Sample Project - id: alextest-{{ 10000000000 | random }} + name: "{{ resource_prefix[0:30] }}" + id: "{{ resource_prefix[0:30] }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" parent: - type: organization - id: 636173955921 + type: folder + id: "{{ gcp_folder_id }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that project was deleted +- name: Pause for 2 minutes for project to appear + ansible.builtin.pause: + minutes: 2 +- name: Verify that project was deleted google.cloud.gcp_resourcemanager_project_info: - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/cloud-platform - register: results -- name: verify that command succeeded - assert: - that: - - results['resources'] | map(attribute='name') | select("match", ".*My Sample Project.*") | list | length == 0 -# ---------------------------------------------------------------------------- -- name: delete a project that does not exist - google.cloud.gcp_resourcemanager_project: - name: My Sample Project - id: alextest-{{ 10000000000 | random }} + project: "{{ resource_prefix[0:30] }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + # choose 1000 projects so iterate past the deleted ones. + page_size: 1000 + scopes: + - https://www.googleapis.com/auth/cloud-platform + register: results +- name: Verify that command succeeded + ansible.builtin.assert: + that: + - results['resources'] | selectattr("lifecycleState", "equalto", "DELETE_REQUESTED") | map(attribute='name') | select("match", ".*{{ resource_prefix[0:30] }}.*") + | list | length == 1 +# ---------------------------------------------------------------------------- +- name: Delete a project that does not exist + google.cloud.gcp_resourcemanager_project: + name: "{{ resource_prefix[0:30] }}" + id: "{{ resource_prefix[0:30] }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" parent: - type: organization - id: 636173955921 + type: folder + id: "{{ gcp_folder_id }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false diff --git a/tests/integration/targets/gcp_resourcemanager_project/tasks/main.yml b/tests/integration/targets/gcp_resourcemanager_project/tasks/main.yml index 45d6e49..fe47378 100644 --- a/tests/integration/targets/gcp_resourcemanager_project/tasks/main.yml +++ b/tests/integration/targets/gcp_resourcemanager_project/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/tests/integration/targets/gcp_runtimeconfig_config/aliases b/tests/integration/targets/gcp_runtimeconfig_config/aliases index 9812f01..0e4419e 100644 --- a/tests/integration/targets/gcp_runtimeconfig_config/aliases +++ b/tests/integration/targets/gcp_runtimeconfig_config/aliases @@ -1,2 +1 @@ -cloud/gcp -unsupported +cloud/gcp \ No newline at end of file diff --git a/tests/integration/targets/gcp_runtimeconfig_config/tasks/autogen.yml b/tests/integration/targets/gcp_runtimeconfig_config/tasks/autogen.yml index b14ef65..3eebf1b 100644 --- a/tests/integration/targets/gcp_runtimeconfig_config/tasks/autogen.yml +++ b/tests/integration/targets/gcp_runtimeconfig_config/tasks/autogen.yml @@ -13,91 +13,91 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: delete a config +- name: Delete a config google.cloud.gcp_runtimeconfig_config: name: "{{ resource_name }}" description: My config project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a config +- name: Create a config google.cloud.gcp_runtimeconfig_config: name: "{{ resource_name }}" description: My config project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that config was created +- name: Verify that config was created google.cloud.gcp_runtimeconfig_config_info: - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/cloudruntimeconfig + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/cloudruntimeconfig register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | map(attribute='name') | select("match", ".*{{ resource_name }}.*") | list | length == 1 # ---------------------------------------------------------------------------- -- name: create a config that already exists +- name: Create a config that already exists google.cloud.gcp_runtimeconfig_config: name: "{{ resource_name }}" description: My config project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a config +- name: Delete a config google.cloud.gcp_runtimeconfig_config: name: "{{ resource_name }}" description: My config project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that config was deleted +- name: Verify that config was deleted google.cloud.gcp_runtimeconfig_config_info: - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/cloudruntimeconfig + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/cloudruntimeconfig register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | map(attribute='name') | select("match", ".*{{ resource_name }}.*") | list | length == 0 # ---------------------------------------------------------------------------- -- name: delete a config that does not exist +- name: Delete a config that does not exist google.cloud.gcp_runtimeconfig_config: name: "{{ resource_name }}" description: My config project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false diff --git a/tests/integration/targets/gcp_runtimeconfig_config/tasks/main.yml b/tests/integration/targets/gcp_runtimeconfig_config/tasks/main.yml index 45d6e49..fe47378 100644 --- a/tests/integration/targets/gcp_runtimeconfig_config/tasks/main.yml +++ b/tests/integration/targets/gcp_runtimeconfig_config/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/tests/integration/targets/gcp_runtimeconfig_variable/aliases b/tests/integration/targets/gcp_runtimeconfig_variable/aliases index 9812f01..0e4419e 100644 --- a/tests/integration/targets/gcp_runtimeconfig_variable/aliases +++ b/tests/integration/targets/gcp_runtimeconfig_variable/aliases @@ -1,2 +1 @@ -cloud/gcp -unsupported +cloud/gcp \ No newline at end of file diff --git a/tests/integration/targets/gcp_runtimeconfig_variable/tasks/autogen.yml b/tests/integration/targets/gcp_runtimeconfig_variable/tasks/autogen.yml index fcfefb3..4a790dc 100644 --- a/tests/integration/targets/gcp_runtimeconfig_variable/tasks/autogen.yml +++ b/tests/integration/targets/gcp_runtimeconfig_variable/tasks/autogen.yml @@ -13,120 +13,120 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: create a config +- name: Create a config google.cloud.gcp_runtimeconfig_config: name: my-config description: My config project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: config -- name: delete a variable +- name: Delete a variable google.cloud.gcp_runtimeconfig_variable: name: prod-variables/hostname config: my-config text: example.com project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a variable +- name: Create a variable google.cloud.gcp_runtimeconfig_variable: name: prod-variables/hostname config: my-config text: example.com project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that variable was created +- name: Verify that variable was created google.cloud.gcp_runtimeconfig_variable_info: - config: my-config - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/cloudruntimeconfig + config: my-config + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/cloudruntimeconfig register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | map(attribute='name') | select("match", ".*prod-variables/hostname.*") | list | length == 1 # ---------------------------------------------------------------------------- -- name: create a variable that already exists +- name: Create a variable that already exists google.cloud.gcp_runtimeconfig_variable: name: prod-variables/hostname config: my-config text: example.com project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a variable +- name: Delete a variable google.cloud.gcp_runtimeconfig_variable: name: prod-variables/hostname config: my-config text: example.com project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that variable was deleted +- name: Verify that variable was deleted google.cloud.gcp_runtimeconfig_variable_info: - config: my-config - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/cloudruntimeconfig + config: my-config + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/cloudruntimeconfig register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | map(attribute='name') | select("match", ".*prod-variables/hostname.*") | list | length == 0 # ---------------------------------------------------------------------------- -- name: delete a variable that does not exist +- name: Delete a variable that does not exist google.cloud.gcp_runtimeconfig_variable: name: prod-variables/hostname config: my-config text: example.com project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #--------------------------------------------------------- # Post-test teardown # If errors happen, don't crash the playbook! -- name: delete a config +- name: Delete a config google.cloud.gcp_runtimeconfig_config: name: my-config description: My config project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: config ignore_errors: true diff --git a/tests/integration/targets/gcp_runtimeconfig_variable/tasks/main.yml b/tests/integration/targets/gcp_runtimeconfig_variable/tasks/main.yml index 45d6e49..fe47378 100644 --- a/tests/integration/targets/gcp_runtimeconfig_variable/tasks/main.yml +++ b/tests/integration/targets/gcp_runtimeconfig_variable/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/tests/integration/targets/gcp_serviceusage_service/tasks/autogen.yml b/tests/integration/targets/gcp_serviceusage_service/tasks/autogen.yml index 473a198..666da8f 100644 --- a/tests/integration/targets/gcp_serviceusage_service/tasks/autogen.yml +++ b/tests/integration/targets/gcp_serviceusage_service/tasks/autogen.yml @@ -13,86 +13,91 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: delete a service +- name: Delete a service google.cloud.gcp_serviceusage_service: - name: spanner.googleapis.com + name: alloydb.googleapis.com project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a service +- name: Create a service google.cloud.gcp_serviceusage_service: - name: spanner.googleapis.com + name: alloydb.googleapis.com project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that service was created +- name: Verify that service was created google.cloud.gcp_serviceusage_service_info: - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/cloud-platform - register: results -- name: verify that command succeeded - assert: - that: - - "'{{ (results['resources'] | selectattr('name', 'search', 'spanner.googleapis.com') | list | first).state }}' == 'ENABLED'" -# ---------------------------------------------------------------------------- -- name: create a service that already exists - google.cloud.gcp_serviceusage_service: - name: spanner.googleapis.com project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/cloud-platform + register: results +- name: Verify that command succeeded + ansible.builtin.assert: + that: + - "'{{ (results['resources'] | selectattr('name', 'search', 'alloydb.googleapis.com') | list | first).state }}' == 'ENABLED'" +# ---------------------------------------------------------------------------- +- name: Create a service that already exists + google.cloud.gcp_serviceusage_service: + name: alloydb.googleapis.com + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a service +- name: Delete a service google.cloud.gcp_serviceusage_service: - name: spanner.googleapis.com + name: alloydb.googleapis.com project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that service was deleted +# TODO(@toumorokoshi): investigate if the pause helps +# prevent quota issues. +# - name: Pause for 1 minute to keep from hitting quota limit +# ansible.builtin.pause: +# minutes: 1 +- name: Verify that service was deleted google.cloud.gcp_serviceusage_service_info: - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/cloud-platform - register: results -- name: verify that command succeeded - assert: - that: - - "'{{ (results['resources'] | selectattr('name', 'search', 'spanner.googleapis.com') | list | first).state }}' == 'DISABLED'" -# ---------------------------------------------------------------------------- -- name: delete a service that does not exist - google.cloud.gcp_serviceusage_service: - name: spanner.googleapis.com project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/cloud-platform + register: results +- name: Verify that command succeeded + ansible.builtin.assert: + that: + - "'{{ (results['resources'] | selectattr('name', 'search', 'alloydb.googleapis.com') | list | first).state }}' == 'DISABLED'" +# ---------------------------------------------------------------------------- +- name: Delete a service that does not exist + google.cloud.gcp_serviceusage_service: + name: alloydb.googleapis.com + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false diff --git a/tests/integration/targets/gcp_serviceusage_service/tasks/main.yml b/tests/integration/targets/gcp_serviceusage_service/tasks/main.yml index 45d6e49..fe47378 100644 --- a/tests/integration/targets/gcp_serviceusage_service/tasks/main.yml +++ b/tests/integration/targets/gcp_serviceusage_service/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/tests/integration/targets/gcp_sourcerepo_repository/aliases b/tests/integration/targets/gcp_sourcerepo_repository/aliases index 9812f01..0e4419e 100644 --- a/tests/integration/targets/gcp_sourcerepo_repository/aliases +++ b/tests/integration/targets/gcp_sourcerepo_repository/aliases @@ -1,2 +1 @@ -cloud/gcp -unsupported +cloud/gcp \ No newline at end of file diff --git a/tests/integration/targets/gcp_sourcerepo_repository/tasks/autogen.yml b/tests/integration/targets/gcp_sourcerepo_repository/tasks/autogen.yml index adeff08..0bc8058 100644 --- a/tests/integration/targets/gcp_sourcerepo_repository/tasks/autogen.yml +++ b/tests/integration/targets/gcp_sourcerepo_repository/tasks/autogen.yml @@ -13,86 +13,86 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: delete a repository +- name: Delete a repository google.cloud.gcp_sourcerepo_repository: name: "{{ resource_name }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a repository +- name: Create a repository google.cloud.gcp_sourcerepo_repository: name: "{{ resource_name }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that repository was created +- name: Verify that repository was created google.cloud.gcp_sourcerepo_repository_info: - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/cloud-platform + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/cloud-platform register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | map(attribute='name') | select("match", ".*{{ resource_name }}.*") | list | length == 1 # ---------------------------------------------------------------------------- -- name: create a repository that already exists +- name: Create a repository that already exists google.cloud.gcp_sourcerepo_repository: name: "{{ resource_name }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a repository +- name: Delete a repository google.cloud.gcp_sourcerepo_repository: name: "{{ resource_name }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that repository was deleted +- name: Verify that repository was deleted google.cloud.gcp_sourcerepo_repository_info: - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/cloud-platform + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/cloud-platform register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | map(attribute='name') | select("match", ".*{{ resource_name }}.*") | list | length == 0 # ---------------------------------------------------------------------------- -- name: delete a repository that does not exist +- name: Delete a repository that does not exist google.cloud.gcp_sourcerepo_repository: name: "{{ resource_name }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false diff --git a/tests/integration/targets/gcp_sourcerepo_repository/tasks/main.yml b/tests/integration/targets/gcp_sourcerepo_repository/tasks/main.yml index 45d6e49..fe47378 100644 --- a/tests/integration/targets/gcp_sourcerepo_repository/tasks/main.yml +++ b/tests/integration/targets/gcp_sourcerepo_repository/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/tests/integration/targets/gcp_spanner_database/aliases b/tests/integration/targets/gcp_spanner_database/aliases index 9812f01..5e0135c 100644 --- a/tests/integration/targets/gcp_spanner_database/aliases +++ b/tests/integration/targets/gcp_spanner_database/aliases @@ -1,2 +1,3 @@ cloud/gcp -unsupported +# tests can be flakey +unsupported \ No newline at end of file diff --git a/tests/integration/targets/gcp_spanner_database/tasks/autogen.yml b/tests/integration/targets/gcp_spanner_database/tasks/autogen.yml index 1f4762d..a3aa4cc 100644 --- a/tests/integration/targets/gcp_spanner_database/tasks/autogen.yml +++ b/tests/integration/targets/gcp_spanner_database/tasks/autogen.yml @@ -13,7 +13,7 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: create a instance +- name: Create a instance google.cloud.gcp_spanner_instance: name: instance-database display_name: My Spanner Instance @@ -23,103 +23,107 @@ config: regional-us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: instance -- name: delete a database +- name: Delete a database google.cloud.gcp_spanner_database: name: webstore instance: "{{ instance }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a database +- name: Create a database google.cloud.gcp_spanner_database: name: webstore instance: "{{ instance }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that database was created - google.cloud.gcp_spanner_database_info: - instance: "{{ instance }}" - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/spanner.admin - register: results -- name: verify that command succeeded - assert: - that: - - results['resources'] | map(attribute='name') | select("match", ".*webstore.*") | list | length == 1 +# - name: verify that database was created +# google.cloud.gcp_spanner_database_info: +# instance: "{{ instance }}" +# project: "{{ gcp_project }}" +# auth_kind: "{{ gcp_cred_kind }}" +# service_account_file: "{{ gcp_cred_file | default(omit) }}" +# scopes: +# - https://www.googleapis.com/auth/spanner.admin +# register: results +# - name: verify that command succeeded +# assert: +# that: +# - results['resources'] | map(attribute='name') | select("match", ".*webstore.*") | list | length == 1 # ---------------------------------------------------------------------------- -- name: create a database that already exists +- name: Create a database that already exists google.cloud.gcp_spanner_database: name: webstore instance: "{{ instance }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a database +- name: Delete a database google.cloud.gcp_spanner_database: name: webstore instance: "{{ instance }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that database was deleted - google.cloud.gcp_spanner_database_info: - instance: "{{ instance }}" - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/spanner.admin - register: results -- name: verify that command succeeded - assert: - that: - - results['resources'] | map(attribute='name') | select("match", ".*webstore.*") | list | length == 0 +# commented out due to a flakey List endpoint +# on the spanner API. (requests continue to return +# 404s intermittently). +# uncomment if it's desired to test the info. +# - name: verify that database was deleted +# google.cloud.gcp_spanner_database_info: +# instance: "{{ instance }}" +# project: "{{ gcp_project }}" +# auth_kind: "{{ gcp_cred_kind }}" +# service_account_file: "{{ gcp_cred_file | default(omit) }}" +# scopes: +# - https://www.googleapis.com/auth/spanner.admin +# register: results +# - name: verify that command succeeded +# assert: +# that: +# - results['resources'] | map(attribute='name') | select("match", ".*webstore.*") | list | length == 0 # ---------------------------------------------------------------------------- -- name: delete a database that does not exist +- name: Delete a database that does not exist google.cloud.gcp_spanner_database: name: webstore instance: "{{ instance }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #--------------------------------------------------------- # Post-test teardown # If errors happen, don't crash the playbook! -- name: delete a instance +- name: Delete a instance google.cloud.gcp_spanner_instance: name: instance-database display_name: My Spanner Instance @@ -129,7 +133,7 @@ config: regional-us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: instance ignore_errors: true diff --git a/tests/integration/targets/gcp_spanner_database/tasks/main.yml b/tests/integration/targets/gcp_spanner_database/tasks/main.yml index 45d6e49..fe47378 100644 --- a/tests/integration/targets/gcp_spanner_database/tasks/main.yml +++ b/tests/integration/targets/gcp_spanner_database/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/tests/integration/targets/gcp_spanner_instance/aliases b/tests/integration/targets/gcp_spanner_instance/aliases index 9812f01..0e4419e 100644 --- a/tests/integration/targets/gcp_spanner_instance/aliases +++ b/tests/integration/targets/gcp_spanner_instance/aliases @@ -1,2 +1 @@ -cloud/gcp -unsupported +cloud/gcp \ No newline at end of file diff --git a/tests/integration/targets/gcp_spanner_instance/tasks/autogen.yml b/tests/integration/targets/gcp_spanner_instance/tasks/autogen.yml index fdf82dd..daae5c8 100644 --- a/tests/integration/targets/gcp_spanner_instance/tasks/autogen.yml +++ b/tests/integration/targets/gcp_spanner_instance/tasks/autogen.yml @@ -13,7 +13,7 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: delete a instance +- name: Delete a instance google.cloud.gcp_spanner_instance: name: testinstance display_name: My Spanner Instance @@ -23,10 +23,10 @@ config: regional-us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a instance +- name: Create a instance google.cloud.gcp_spanner_instance: name: testinstance display_name: My Spanner Instance @@ -36,27 +36,27 @@ config: regional-us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that instance was created +- name: Verify that instance was created google.cloud.gcp_spanner_instance_info: - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/spanner.admin + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/spanner.admin register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | map(attribute='name') | select("match", ".*testinstance.*") | list | length == 1 # ---------------------------------------------------------------------------- -- name: create a instance that already exists +- name: Create a instance that already exists google.cloud.gcp_spanner_instance: name: testinstance display_name: My Spanner Instance @@ -66,15 +66,15 @@ config: regional-us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a instance +- name: Delete a instance google.cloud.gcp_spanner_instance: name: testinstance display_name: My Spanner Instance @@ -84,27 +84,27 @@ config: regional-us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that instance was deleted +- name: Verify that instance was deleted google.cloud.gcp_spanner_instance_info: - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/spanner.admin + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/spanner.admin register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | map(attribute='name') | select("match", ".*testinstance.*") | list | length == 0 # ---------------------------------------------------------------------------- -- name: delete a instance that does not exist +- name: Delete a instance that does not exist google.cloud.gcp_spanner_instance: name: testinstance display_name: My Spanner Instance @@ -114,10 +114,10 @@ config: regional-us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false diff --git a/tests/integration/targets/gcp_spanner_instance/tasks/main.yml b/tests/integration/targets/gcp_spanner_instance/tasks/main.yml index 45d6e49..fe47378 100644 --- a/tests/integration/targets/gcp_spanner_instance/tasks/main.yml +++ b/tests/integration/targets/gcp_spanner_instance/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/tests/integration/targets/gcp_sql_database/aliases b/tests/integration/targets/gcp_sql_database/aliases index 9812f01..0e4419e 100644 --- a/tests/integration/targets/gcp_sql_database/aliases +++ b/tests/integration/targets/gcp_sql_database/aliases @@ -1,2 +1 @@ -cloud/gcp -unsupported +cloud/gcp \ No newline at end of file diff --git a/tests/integration/targets/gcp_sql_database/tasks/autogen.yml b/tests/integration/targets/gcp_sql_database/tasks/autogen.yml index 1661f83..a84096f 100644 --- a/tests/integration/targets/gcp_sql_database/tasks/autogen.yml +++ b/tests/integration/targets/gcp_sql_database/tasks/autogen.yml @@ -13,132 +13,132 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: create a instance +- name: Create a instance google.cloud.gcp_sql_instance: - name: "{{resource_name}}-3" + name: "{{ resource_name }}-3" settings: ip_configuration: authorized_networks: - - name: google dns server - value: 8.8.8.8/32 + - name: google dns server + value: 8.8.8.8/32 tier: db-n1-standard-1 region: us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: instance -- name: delete a database +- name: Delete a database google.cloud.gcp_sql_database: name: "{{ resource_name }}" - charset: utf8 + charset: utf8mb4 instance: "{{ instance.name }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a database +- name: Create a database google.cloud.gcp_sql_database: name: "{{ resource_name }}" - charset: utf8 + charset: utf8mb4 instance: "{{ instance.name }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that database was created +- name: Verify that database was created google.cloud.gcp_sql_database_info: - instance: "{{ instance.name }}" - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/sqlservice.admin - register: results -- name: verify that command succeeded - assert: - that: - - "\"{{resource_name}}\" in \"{{ results['resources'] | map(attribute='name') | list }}\"" -# ---------------------------------------------------------------------------- -- name: create a database that already exists - google.cloud.gcp_sql_database: - name: "{{ resource_name }}" - charset: utf8 instance: "{{ instance.name }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/sqlservice.admin + register: results +- name: Verify that command succeeded + ansible.builtin.assert: + that: + - results['resources'] | map(attribute='name') | select("match", ".*{{ resource_name }}.*") | list | length == 1 +# ---------------------------------------------------------------------------- +- name: Create a database that already exists + google.cloud.gcp_sql_database: + name: "{{ resource_name }}" + charset: utf8mb4 + instance: "{{ instance.name }}" + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a database +- name: Delete a database google.cloud.gcp_sql_database: name: "{{ resource_name }}" - charset: utf8 + charset: utf8mb4 instance: "{{ instance.name }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that database was deleted +- name: Verify that database was deleted google.cloud.gcp_sql_database_info: - instance: "{{ instance.name }}" - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/sqlservice.admin - register: results -- name: verify that command succeeded - assert: - that: - - "\"{{resource_name}}\" not in \"{{ results['resources'] | map(attribute='name') | list }}\"" -# ---------------------------------------------------------------------------- -- name: delete a database that does not exist - google.cloud.gcp_sql_database: - name: "{{ resource_name }}" - charset: utf8 instance: "{{ instance.name }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/sqlservice.admin + register: results +- name: Verify that command succeeded + ansible.builtin.assert: + that: + - results['resources'] | map(attribute='name') | select("match", ".*{{ resource_name }}.*") | list | length == 0 +# ---------------------------------------------------------------------------- +- name: Delete a database that does not exist + google.cloud.gcp_sql_database: + name: "{{ resource_name }}" + charset: utf8mb4 + instance: "{{ instance.name }}" + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #--------------------------------------------------------- # Post-test teardown # If errors happen, don't crash the playbook! -- name: delete a instance +- name: Delete a instance google.cloud.gcp_sql_instance: - name: "{{resource_name}}-3" + name: "{{ resource_name }}-3" settings: ip_configuration: authorized_networks: - - name: google dns server - value: 8.8.8.8/32 + - name: google dns server + value: 8.8.8.8/32 tier: db-n1-standard-1 region: us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: instance ignore_errors: true diff --git a/tests/integration/targets/gcp_sql_database/tasks/main.yml b/tests/integration/targets/gcp_sql_database/tasks/main.yml index 45d6e49..fe47378 100644 --- a/tests/integration/targets/gcp_sql_database/tasks/main.yml +++ b/tests/integration/targets/gcp_sql_database/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/tests/integration/targets/gcp_sql_instance/aliases b/tests/integration/targets/gcp_sql_instance/aliases index 9812f01..0e4419e 100644 --- a/tests/integration/targets/gcp_sql_instance/aliases +++ b/tests/integration/targets/gcp_sql_instance/aliases @@ -1,2 +1 @@ -cloud/gcp -unsupported +cloud/gcp \ No newline at end of file diff --git a/tests/integration/targets/gcp_sql_instance/tasks/autogen.yml b/tests/integration/targets/gcp_sql_instance/tasks/autogen.yml index cb1a475..c57de05 100644 --- a/tests/integration/targets/gcp_sql_instance/tasks/autogen.yml +++ b/tests/integration/targets/gcp_sql_instance/tasks/autogen.yml @@ -13,121 +13,121 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: delete a instance +- name: Delete a instance google.cloud.gcp_sql_instance: - name: "{{resource_name}}-2" + name: "{{ resource_name }}-2" settings: ip_configuration: authorized_networks: - - name: google dns server - value: 8.8.8.8/32 + - name: google dns server + value: 8.8.8.8/32 tier: db-n1-standard-1 region: us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a instance +- name: Create a instance google.cloud.gcp_sql_instance: - name: "{{resource_name}}-2" + name: "{{ resource_name }}-2" settings: ip_configuration: authorized_networks: - - name: google dns server - value: 8.8.8.8/32 + - name: google dns server + value: 8.8.8.8/32 tier: db-n1-standard-1 region: us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that instance was created +- name: Verify that instance was created google.cloud.gcp_sql_instance_info: - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/sqlservice.admin + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/sqlservice.admin register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - - results['resources'] | map(attribute='name') | select("match", ".*{{resource_name}}-2.*") | list | length == 1 + - results['resources'] | map(attribute='name') | select("match", ".*{{ resource_name }}-2.*") | list | length == 1 # ---------------------------------------------------------------------------- -- name: create a instance that already exists +- name: Create a instance that already exists google.cloud.gcp_sql_instance: - name: "{{resource_name}}-2" + name: "{{ resource_name }}-2" settings: ip_configuration: authorized_networks: - - name: google dns server - value: 8.8.8.8/32 + - name: google dns server + value: 8.8.8.8/32 tier: db-n1-standard-1 region: us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a instance +- name: Delete a instance google.cloud.gcp_sql_instance: - name: "{{resource_name}}-2" + name: "{{ resource_name }}-2" settings: ip_configuration: authorized_networks: - - name: google dns server - value: 8.8.8.8/32 + - name: google dns server + value: 8.8.8.8/32 tier: db-n1-standard-1 region: us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that instance was deleted +- name: Verify that instance was deleted google.cloud.gcp_sql_instance_info: - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/sqlservice.admin + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/sqlservice.admin register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - - results['resources'] | map(attribute='name') | select("match", ".*{{resource_name}}-2.*") | list | length == 0 + - results['resources'] | map(attribute='name') | select("match", ".*{{ resource_name }}-2.*") | list | length == 0 # ---------------------------------------------------------------------------- -- name: delete a instance that does not exist +- name: Delete a instance that does not exist google.cloud.gcp_sql_instance: - name: "{{resource_name}}-2" + name: "{{ resource_name }}-2" settings: ip_configuration: authorized_networks: - - name: google dns server - value: 8.8.8.8/32 + - name: google dns server + value: 8.8.8.8/32 tier: db-n1-standard-1 region: us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false diff --git a/tests/integration/targets/gcp_sql_instance/tasks/main.yml b/tests/integration/targets/gcp_sql_instance/tasks/main.yml index 45d6e49..fe47378 100644 --- a/tests/integration/targets/gcp_sql_instance/tasks/main.yml +++ b/tests/integration/targets/gcp_sql_instance/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/tests/integration/targets/gcp_sql_ssl_cert/aliases b/tests/integration/targets/gcp_sql_ssl_cert/aliases index 9812f01..0e4419e 100644 --- a/tests/integration/targets/gcp_sql_ssl_cert/aliases +++ b/tests/integration/targets/gcp_sql_ssl_cert/aliases @@ -1,2 +1 @@ -cloud/gcp -unsupported +cloud/gcp \ No newline at end of file diff --git a/tests/integration/targets/gcp_sql_ssl_cert/tasks/autogen.yml b/tests/integration/targets/gcp_sql_ssl_cert/tasks/autogen.yml index cc22adc..c24746d 100644 --- a/tests/integration/targets/gcp_sql_ssl_cert/tasks/autogen.yml +++ b/tests/integration/targets/gcp_sql_ssl_cert/tasks/autogen.yml @@ -13,75 +13,92 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: create a instance +- name: Create a instance google.cloud.gcp_sql_instance: - name: "{{resource_name}}-2" + name: "{{ resource_name }}-2" settings: ip_configuration: authorized_networks: - - name: google dns server - value: 8.8.8.8/32 + - name: google dns server + value: 8.8.8.8/32 tier: db-n1-standard-1 region: us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: instance -- name: delete a SSL cert +- name: Delete a non-existent SSL cert google.cloud.gcp_sql_ssl_cert: - common_name: "{{resource_name}}" - instance: "{{instance['name'}}" + common_name: "{{ resource_name }}" + instance: + name: "{{ instance['name'] }}" + sha1_fingerprint: "f572d396fae9206628714fb2ce00f72e94f2258f" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a SSL cert +- name: Create an SSL cert google.cloud.gcp_sql_ssl_cert: - common_name: "{{resource_name}}" - instance: "{{instance['name'}}" + common_name: "{{ resource_name }}" + instance: + name: "{{ instance['name'] }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - # SslCert is not altered, just verified. - - result.changed == false -- name: verify that ssl_cert was created - google.cloud.gcp_sql_ssl_cert_info: - filters: - - name = - instance: "{{instance['name'}}" - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/sqlservice.admin - register: results -- name: verify that command succeeded - assert: + - result.changed == true +- name: Peform a no-op update to verify the cert was created + google.cloud.gcp_sql_ssl_cert: + instance: + name: "{{ instance['name'] }}" + sha1_fingerprint: "{{ result['sha1Fingerprint'] }}" + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + state: present + register: updates +- name: Verify that command succeeded + ansible.builtin.assert: that: - - results['resources'] | length == 1 + - updates.changed == false +#---------------------------------------------------------- +- name: Delete an SSL cert + google.cloud.gcp_sql_ssl_cert: + common_name: "{{ resource_name }}" + instance: + name: "{{ instance['name'] }}" + sha1_fingerprint: "{{ result['sha1Fingerprint'] }}" + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + state: absent + register: result +- name: Assert changed is true + ansible.builtin.assert: + that: + - result.changed == true #--------------------------------------------------------- # Post-test teardown # If errors happen, don't crash the playbook! -- name: delete a instance +- name: Delete a instance google.cloud.gcp_sql_instance: - name: "{{resource_name}}-2" + name: "{{ resource_name }}-2" settings: ip_configuration: authorized_networks: - - name: google dns server - value: 8.8.8.8/32 + - name: google dns server + value: 8.8.8.8/32 tier: db-n1-standard-1 region: us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: instance ignore_errors: true diff --git a/tests/integration/targets/gcp_sql_ssl_cert/tasks/main.yml b/tests/integration/targets/gcp_sql_ssl_cert/tasks/main.yml index 45d6e49..fe47378 100644 --- a/tests/integration/targets/gcp_sql_ssl_cert/tasks/main.yml +++ b/tests/integration/targets/gcp_sql_ssl_cert/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/tests/integration/targets/gcp_sql_user/aliases b/tests/integration/targets/gcp_sql_user/aliases index 9812f01..0e4419e 100644 --- a/tests/integration/targets/gcp_sql_user/aliases +++ b/tests/integration/targets/gcp_sql_user/aliases @@ -1,2 +1 @@ -cloud/gcp -unsupported +cloud/gcp \ No newline at end of file diff --git a/tests/integration/targets/gcp_sql_user/tasks/autogen.yml b/tests/integration/targets/gcp_sql_user/tasks/autogen.yml index c5aace2..0a820cf 100644 --- a/tests/integration/targets/gcp_sql_user/tasks/autogen.yml +++ b/tests/integration/targets/gcp_sql_user/tasks/autogen.yml @@ -13,22 +13,22 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: create a instance +- name: Create a instance google.cloud.gcp_sql_instance: - name: "{{resource_name}}-1" + name: "{{ resource_name }}-1" settings: ip_configuration: authorized_networks: - - name: google dns server - value: 8.8.8.8/32 + - name: google dns server + value: 8.8.8.8/32 tier: db-n1-standard-1 region: us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: instance -- name: delete a user +- name: Delete a user google.cloud.gcp_sql_user: name: test-user host: 10.1.2.3 @@ -36,10 +36,10 @@ instance: "{{ instance }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a user +- name: Create a user google.cloud.gcp_sql_user: name: test-user host: 10.1.2.3 @@ -47,28 +47,28 @@ instance: "{{ instance }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that user was created +- name: Verify that user was created google.cloud.gcp_sql_user_info: - instance: "{{ instance }}" - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/sqlservice.admin + instance: "{{ instance }}" + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/sqlservice.admin register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - - "'test-user' in \"{{ results['resources'] | map(attribute='name') | list }}\"" + - results['resources'] | map(attribute='name') | select("match", ".*test-user.*") | list | length == 1 # ---------------------------------------------------------------------------- -- name: create a user that already exists +- name: Create a user that already exists google.cloud.gcp_sql_user: name: test-user host: 10.1.2.3 @@ -76,15 +76,15 @@ instance: "{{ instance }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a user +- name: Delete a user google.cloud.gcp_sql_user: name: test-user host: 10.1.2.3 @@ -92,28 +92,28 @@ instance: "{{ instance }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that user was deleted +- name: Verify that user was deleted google.cloud.gcp_sql_user_info: - instance: "{{ instance }}" - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/sqlservice.admin + instance: "{{ instance }}" + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/sqlservice.admin register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - - "'test-user' not in \"{{ results['resources'] | map(attribute='name') | list }}\"" + - results['resources'] | map(attribute='name') | select("match", ".*test-user.*") | list | length == 0 # ---------------------------------------------------------------------------- -- name: delete a user that does not exist +- name: Delete a user that does not exist google.cloud.gcp_sql_user: name: test-user host: 10.1.2.3 @@ -121,29 +121,29 @@ instance: "{{ instance }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #--------------------------------------------------------- # Post-test teardown # If errors happen, don't crash the playbook! -- name: delete a instance +- name: Delete a instance google.cloud.gcp_sql_instance: - name: "{{resource_name}}-1" + name: "{{ resource_name }}-1" settings: ip_configuration: authorized_networks: - - name: google dns server - value: 8.8.8.8/32 + - name: google dns server + value: 8.8.8.8/32 tier: db-n1-standard-1 region: us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: instance ignore_errors: true diff --git a/tests/integration/targets/gcp_sql_user/tasks/main.yml b/tests/integration/targets/gcp_sql_user/tasks/main.yml index 45d6e49..fe47378 100644 --- a/tests/integration/targets/gcp_sql_user/tasks/main.yml +++ b/tests/integration/targets/gcp_sql_user/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/tests/integration/targets/gcp_storage_bucket/aliases b/tests/integration/targets/gcp_storage_bucket/aliases index 9812f01..0e4419e 100644 --- a/tests/integration/targets/gcp_storage_bucket/aliases +++ b/tests/integration/targets/gcp_storage_bucket/aliases @@ -1,2 +1 @@ -cloud/gcp -unsupported +cloud/gcp \ No newline at end of file diff --git a/tests/integration/targets/gcp_storage_bucket/defaults/main.yml b/tests/integration/targets/gcp_storage_bucket/defaults/main.yml index ba66644..10f1ec1 100644 --- a/tests/integration/targets/gcp_storage_bucket/defaults/main.yml +++ b/tests/integration/targets/gcp_storage_bucket/defaults/main.yml @@ -1,2 +1,2 @@ --- -resource_name: "{{ resource_prefix }}" +resource_name: "{{ gcp_project }}-ansible-test-bucket" diff --git a/tests/integration/targets/gcp_storage_bucket/tasks/autogen.yml b/tests/integration/targets/gcp_storage_bucket/tasks/autogen.yml index c82302e..f5ccaca 100644 --- a/tests/integration/targets/gcp_storage_bucket/tasks/autogen.yml +++ b/tests/integration/targets/gcp_storage_bucket/tasks/autogen.yml @@ -13,62 +13,62 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: delete a bucket +- name: Delete a bucket google.cloud.gcp_storage_bucket: - name: ansible-storage-module + name: "{{ resource_name }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a bucket +- name: Create a bucket google.cloud.gcp_storage_bucket: - name: ansible-storage-module + name: "{{ resource_name }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true # ---------------------------------------------------------------------------- -- name: create a bucket that already exists +- name: Create a bucket that already exists google.cloud.gcp_storage_bucket: - name: ansible-storage-module + name: "{{ resource_name }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a bucket +- name: Delete a bucket google.cloud.gcp_storage_bucket: - name: ansible-storage-module + name: "{{ resource_name }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true # ---------------------------------------------------------------------------- -- name: delete a bucket that does not exist +- name: Delete a bucket that does not exist google.cloud.gcp_storage_bucket: - name: ansible-storage-module + name: "{{ resource_name }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false diff --git a/tests/integration/targets/gcp_storage_bucket/tasks/main.yml b/tests/integration/targets/gcp_storage_bucket/tasks/main.yml index 45d6e49..fe47378 100644 --- a/tests/integration/targets/gcp_storage_bucket/tasks/main.yml +++ b/tests/integration/targets/gcp_storage_bucket/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/tests/integration/targets/gcp_storage_bucket_access_control/aliases b/tests/integration/targets/gcp_storage_bucket_access_control/aliases index 9812f01..0e4419e 100644 --- a/tests/integration/targets/gcp_storage_bucket_access_control/aliases +++ b/tests/integration/targets/gcp_storage_bucket_access_control/aliases @@ -1,2 +1 @@ -cloud/gcp -unsupported +cloud/gcp \ No newline at end of file diff --git a/tests/integration/targets/gcp_storage_bucket_access_control/tasks/autogen.yml b/tests/integration/targets/gcp_storage_bucket_access_control/tasks/autogen.yml index ebde9a3..762e0f6 100644 --- a/tests/integration/targets/gcp_storage_bucket_access_control/tasks/autogen.yml +++ b/tests/integration/targets/gcp_storage_bucket_access_control/tasks/autogen.yml @@ -13,92 +13,92 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: create a bucket +- name: Create a bucket google.cloud.gcp_storage_bucket: name: "{{ resource_name }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: bucket -- name: delete a bucket access control +- name: Delete a bucket access control google.cloud.gcp_storage_bucket_access_control: bucket: "{{ bucket }}" entity: user-alexstephen@google.com role: WRITER project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a bucket access control +- name: Create a bucket access control google.cloud.gcp_storage_bucket_access_control: bucket: "{{ bucket }}" entity: user-alexstephen@google.com role: WRITER project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true # ---------------------------------------------------------------------------- -- name: create a bucket access control that already exists +- name: Create a bucket access control that already exists google.cloud.gcp_storage_bucket_access_control: bucket: "{{ bucket }}" entity: user-alexstephen@google.com role: WRITER project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a bucket access control +- name: Delete a bucket access control google.cloud.gcp_storage_bucket_access_control: bucket: "{{ bucket }}" entity: user-alexstephen@google.com role: WRITER project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true # ---------------------------------------------------------------------------- -- name: delete a bucket access control that does not exist +- name: Delete a bucket access control that does not exist google.cloud.gcp_storage_bucket_access_control: bucket: "{{ bucket }}" entity: user-alexstephen@google.com role: WRITER project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #--------------------------------------------------------- # Post-test teardown # If errors happen, don't crash the playbook! -- name: delete a bucket +- name: Delete a bucket google.cloud.gcp_storage_bucket: name: "{{ resource_name }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: bucket ignore_errors: true diff --git a/tests/integration/targets/gcp_storage_bucket_access_control/tasks/main.yml b/tests/integration/targets/gcp_storage_bucket_access_control/tasks/main.yml index 45d6e49..fe47378 100644 --- a/tests/integration/targets/gcp_storage_bucket_access_control/tasks/main.yml +++ b/tests/integration/targets/gcp_storage_bucket_access_control/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/tests/integration/targets/gcp_storage_default_object_acl/aliases b/tests/integration/targets/gcp_storage_default_object_acl/aliases index 9812f01..0e4419e 100644 --- a/tests/integration/targets/gcp_storage_default_object_acl/aliases +++ b/tests/integration/targets/gcp_storage_default_object_acl/aliases @@ -1,2 +1 @@ -cloud/gcp -unsupported +cloud/gcp \ No newline at end of file diff --git a/tests/integration/targets/gcp_storage_default_object_acl/tasks/autogen.yml b/tests/integration/targets/gcp_storage_default_object_acl/tasks/autogen.yml index 6f091e9..6f43684 100644 --- a/tests/integration/targets/gcp_storage_default_object_acl/tasks/autogen.yml +++ b/tests/integration/targets/gcp_storage_default_object_acl/tasks/autogen.yml @@ -13,87 +13,92 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: create a bucket +- name: Create a bucket google.cloud.gcp_storage_bucket: name: "{{ resource_name }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: bucket -- name: delete a default object acl +- name: Delete a default object acl google.cloud.gcp_storage_default_object_acl: bucket: "{{ bucket }}" - entity: OWNER:user-alexstephen@google.com + entity: user-alexstephen@google.com + role: READER project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a default object acl +- name: Create a default object acl google.cloud.gcp_storage_default_object_acl: bucket: "{{ bucket }}" - entity: OWNER:user-alexstephen@google.com + entity: user-alexstephen@google.com + role: READER project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true # ---------------------------------------------------------------------------- -- name: create a default object acl that already exists +- name: Create a default object acl that already exists google.cloud.gcp_storage_default_object_acl: bucket: "{{ bucket }}" - entity: OWNER:user-alexstephen@google.com + entity: user-alexstephen@google.com + role: READER project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a default object acl +- name: Delete a default object acl google.cloud.gcp_storage_default_object_acl: bucket: "{{ bucket }}" - entity: OWNER:user-alexstephen@google.com + entity: user-alexstephen@google.com + role: READER project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true # ---------------------------------------------------------------------------- -- name: delete a default object acl that does not exist +- name: Delete a default object acl that does not exist google.cloud.gcp_storage_default_object_acl: bucket: "{{ bucket }}" - entity: OWNER:user-alexstephen@google.com + entity: user-alexstephen@google.com + role: READER project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #--------------------------------------------------------- # Post-test teardown # If errors happen, don't crash the playbook! -- name: delete a bucket +- name: Delete a bucket google.cloud.gcp_storage_bucket: name: "{{ resource_name }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: bucket ignore_errors: true diff --git a/tests/integration/targets/gcp_storage_default_object_acl/tasks/main.yml b/tests/integration/targets/gcp_storage_default_object_acl/tasks/main.yml index 45d6e49..fe47378 100644 --- a/tests/integration/targets/gcp_storage_default_object_acl/tasks/main.yml +++ b/tests/integration/targets/gcp_storage_default_object_acl/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/tests/integration/targets/gcp_storage_object/aliases b/tests/integration/targets/gcp_storage_object/aliases index 9812f01..0e4419e 100644 --- a/tests/integration/targets/gcp_storage_object/aliases +++ b/tests/integration/targets/gcp_storage_object/aliases @@ -1,2 +1 @@ -cloud/gcp -unsupported +cloud/gcp \ No newline at end of file diff --git a/tests/integration/targets/gcp_storage_object/tasks/main.yml b/tests/integration/targets/gcp_storage_object/tasks/main.yml index 497d425..4d6d31f 100644 --- a/tests/integration/targets/gcp_storage_object/tasks/main.yml +++ b/tests/integration/targets/gcp_storage_object/tasks/main.yml @@ -1,75 +1,76 @@ --- # Pre-test setup -- name: create a temp file for uploading - tempfile: +- name: Create a temp file for uploading + ansible.builtin.tempfile: state: file register: upload_temp -- name: create a temp file for downloading - tempfile: +- name: Create a temp file for downloading + ansible.builtin.tempfile: state: file register: download_temp -- name: put content in the tempfile - copy: - content: "Ansible GCS test file" +- name: Put content in the tempfile + ansible.builtin.copy: + content: Ansible GCS test file dest: "{{ upload_temp.path }}" -- name: create a bucket + mode: 0644 +- name: Create a bucket google.cloud.gcp_storage_bucket: name: "{{ resource_name }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: bucket #---------------------------------------------------------- -- name: upload the object to gcs +- name: Upload the object to gcs google.cloud.gcp_storage_object: - action: 'upload' + action: upload bucket: "{{ bucket.name }}" src: "{{ upload_temp.path }}" - dest: "ansible/{{ resource_name }}" + dest: ansible/{{ resource_name }} project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true # ---------------------------------------------------------------------------- -- name: download the object to disk +- name: Download the object to disk google.cloud.gcp_storage_object: - action: 'download' + action: download bucket: "{{ bucket.name }}" - src: "ansible/{{ resource_name }}" + src: ansible/{{ resource_name }} dest: "{{ download_temp.path }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true # ---------------------------------------------------------------------------- -- name: delete the object +- name: Delete the object google.cloud.gcp_storage_object: - action: 'delete' + action: delete bucket: "{{ bucket.name }}" - src: "ansible/{{ resource_name }}" + src: ansible/{{ resource_name }} project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true # ---------------------------------------------------------------------------- -- name: delete the bucket +- name: Delete the bucket google.cloud.gcp_storage_bucket: name: "{{ resource_name }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: bucket diff --git a/tests/integration/targets/gcp_tpu_node/aliases b/tests/integration/targets/gcp_tpu_node/aliases index 9812f01..0e4419e 100644 --- a/tests/integration/targets/gcp_tpu_node/aliases +++ b/tests/integration/targets/gcp_tpu_node/aliases @@ -1,2 +1 @@ -cloud/gcp -unsupported +cloud/gcp \ No newline at end of file diff --git a/tests/integration/targets/gcp_tpu_node/tasks/autogen.yml b/tests/integration/targets/gcp_tpu_node/tasks/autogen.yml index 4f00836..196aa6a 100644 --- a/tests/integration/targets/gcp_tpu_node/tasks/autogen.yml +++ b/tests/integration/targets/gcp_tpu_node/tasks/autogen.yml @@ -13,108 +13,108 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: delete a node +- name: Delete a node google.cloud.gcp_tpu_node: name: "{{ resource_name }}" - zone: us-central1-b - accelerator_type: v3-8 - tensorflow_version: '1.11' + zone: us-central1-a + accelerator_type: v2-32 + tensorflow_version: 2.10.0 cidr_block: 10.2.0.0/29 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a node +- name: Create a node google.cloud.gcp_tpu_node: name: "{{ resource_name }}" - zone: us-central1-b - accelerator_type: v3-8 - tensorflow_version: '1.11' + zone: us-central1-a + accelerator_type: v2-32 + tensorflow_version: 2.10.0 cidr_block: 10.2.0.0/29 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that node was created +- name: Verify that node was created google.cloud.gcp_tpu_node_info: - zone: us-central1-b - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/cloud-platform + zone: us-central1-a + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/cloud-platform register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | map(attribute='name') | select("match", ".*{{ resource_name }}.*") | list | length == 1 # ---------------------------------------------------------------------------- -- name: create a node that already exists +- name: Create a node that already exists google.cloud.gcp_tpu_node: name: "{{ resource_name }}" - zone: us-central1-b - accelerator_type: v3-8 - tensorflow_version: '1.11' + zone: us-central1-a + accelerator_type: v2-32 + tensorflow_version: 2.10.0 cidr_block: 10.2.0.0/29 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a node +- name: Delete a node google.cloud.gcp_tpu_node: name: "{{ resource_name }}" - zone: us-central1-b - accelerator_type: v3-8 - tensorflow_version: '1.11' + zone: us-central1-a + accelerator_type: v2-32 + tensorflow_version: 2.10.0 cidr_block: 10.2.0.0/29 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that node was deleted +- name: Verify that node was deleted google.cloud.gcp_tpu_node_info: - zone: us-central1-b - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/cloud-platform + zone: us-central1-a + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/cloud-platform register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | map(attribute='name') | select("match", ".*{{ resource_name }}.*") | list | length == 0 # ---------------------------------------------------------------------------- -- name: delete a node that does not exist +- name: Delete a node that does not exist google.cloud.gcp_tpu_node: name: "{{ resource_name }}" - zone: us-central1-b - accelerator_type: v3-8 - tensorflow_version: '1.11' + zone: us-central1-a + accelerator_type: v2-32 + tensorflow_version: 2.10.0 cidr_block: 10.2.0.0/29 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false diff --git a/tests/integration/targets/gcp_tpu_node/tasks/main.yml b/tests/integration/targets/gcp_tpu_node/tasks/main.yml index 45d6e49..fe47378 100644 --- a/tests/integration/targets/gcp_tpu_node/tasks/main.yml +++ b/tests/integration/targets/gcp_tpu_node/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/tests/unit/plugins/test_gcp_utils.py b/tests/unit/plugins/test_gcp_utils.py index a69f36a..804bbbb 100644 --- a/tests/unit/plugins/test_gcp_utils.py +++ b/tests/unit/plugins/test_gcp_utils.py @@ -16,235 +16,154 @@ # You should have received a copy of the GNU General Public License # along with Ansible. If not, see . -from __future__ import (absolute_import, division, print_function) +from __future__ import absolute_import, division, print_function -from ansible_collections.community.general.tests.unit.compat import unittest -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import (GcpRequest, - navigate_hash, - remove_nones_from_dict, - replace_resource_dict) +import unittest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import ( + GcpRequest, + navigate_hash, + remove_nones_from_dict, + replace_resource_dict, +) __metaclass__ = type class ReplaceResourceDictTestCase(unittest.TestCase): def test_given_dict(self): - value = { - 'selfLink': 'value' - } - self.assertEqual(replace_resource_dict(value, 'selfLink'), value['selfLink']) + value = {"selfLink": "value"} + self.assertEqual(replace_resource_dict(value, "selfLink"), value["selfLink"]) def test_given_array(self): - value = { - 'selfLink': 'value' - } - self.assertEqual(replace_resource_dict([value] * 3, 'selfLink'), [value['selfLink']] * 3) + value = {"selfLink": "value"} + self.assertEqual( + replace_resource_dict([value] * 3, "selfLink"), [value["selfLink"]] * 3 + ) class NavigateHashTestCase(unittest.TestCase): def test_one_level(self): - value = { - 'key': 'value' - } - self.assertEqual(navigate_hash(value, ['key']), value['key']) + value = {"key": "value"} + self.assertEqual(navigate_hash(value, ["key"]), value["key"]) def test_multilevel(self): - value = { - 'key': { - 'key2': 'value' - } - } - self.assertEqual(navigate_hash(value, ['key', 'key2']), value['key']['key2']) + value = {"key": {"key2": "value"}} + self.assertEqual(navigate_hash(value, ["key", "key2"]), value["key"]["key2"]) def test_default(self): - value = { - 'key': 'value' - } - default = 'not found' - self.assertEqual(navigate_hash(value, ['key', 'key2'], default), default) + value = {"key": "value"} + default = "not found" + self.assertEqual(navigate_hash(value, ["key", "key2"], default), default) class RemoveNonesFromDictTestCase(unittest.TestCase): def test_remove_nones(self): - value = { - 'key': None, - 'good': 'value' - } - value_correct = { - 'good': 'value' - } + value = {"key": None, "good": "value"} + value_correct = {"good": "value"} self.assertEqual(remove_nones_from_dict(value), value_correct) def test_remove_empty_arrays(self): - value = { - 'key': [], - 'good': 'value' - } - value_correct = { - 'good': 'value' - } + value = {"key": [], "good": "value"} + value_correct = {"good": "value"} self.assertEqual(remove_nones_from_dict(value), value_correct) def test_remove_empty_dicts(self): - value = { - 'key': {}, - 'good': 'value' - } - value_correct = { - 'good': 'value' - } + value = {"key": {}, "good": "value"} + value_correct = {"good": "value"} self.assertEqual(remove_nones_from_dict(value), value_correct) class GCPRequestDifferenceTestCase(unittest.TestCase): def test_simple_no_difference(self): - value1 = { - 'foo': 'bar', - 'test': 'original' - } + value1 = {"foo": "bar", "test": "original"} request = GcpRequest(value1) self.assertEqual(request, request) def test_simple_different(self): - value1 = { - 'foo': 'bar', - 'test': 'original' - } - value2 = { - 'foo': 'bar', - 'test': 'different' - } - difference = { - 'test': 'original' - } + value1 = {"foo": "bar", "test": "original"} + value2 = {"foo": "bar", "test": "different"} + difference = {"test": "original"} request1 = GcpRequest(value1) request2 = GcpRequest(value2) - self.assertNotEquals(request1, request2) + self.assertNotEqual(request1, request2) self.assertEqual(request1.difference(request2), difference) def test_nested_dictionaries_no_difference(self): - value1 = { - 'foo': { - 'quiet': { - 'tree': 'test' - }, - 'bar': 'baz' - }, - 'test': 'original' - } + value1 = {"foo": {"quiet": {"tree": "test"}, "bar": "baz"}, "test": "original"} request = GcpRequest(value1) self.assertEqual(request, request) def test_nested_dictionaries_with_difference(self): - value1 = { - 'foo': { - 'quiet': { - 'tree': 'test' - }, - 'bar': 'baz' - }, - 'test': 'original' - } - value2 = { - 'foo': { - 'quiet': { - 'tree': 'baz' - }, - 'bar': 'hello' - }, - 'test': 'original' - } - difference = { - 'foo': { - 'quiet': { - 'tree': 'test' - }, - 'bar': 'baz' - } - } + value1 = {"foo": {"quiet": {"tree": "test"}, "bar": "baz"}, "test": "original"} + value2 = {"foo": {"quiet": {"tree": "baz"}, "bar": "hello"}, "test": "original"} + difference = {"foo": {"quiet": {"tree": "test"}, "bar": "baz"}} request1 = GcpRequest(value1) request2 = GcpRequest(value2) - self.assertNotEquals(request1, request2) + self.assertNotEqual(request1, request2) self.assertEqual(request1.difference(request2), difference) def test_arrays_strings_no_difference(self): - value1 = { - 'foo': [ - 'baz', - 'bar' - ] - } + value1 = {"foo": ["baz", "bar"]} request = GcpRequest(value1) self.assertEqual(request, request) def test_arrays_strings_with_difference(self): value1 = { - 'foo': [ - 'baz', - 'bar', + "foo": [ + "baz", + "bar", ] } - value2 = { - 'foo': [ - 'baz', - 'hello' - ] - } + value2 = {"foo": ["baz", "hello"]} difference = { - 'foo': [ - 'bar', + "foo": [ + "bar", ] } request1 = GcpRequest(value1) request2 = GcpRequest(value2) - self.assertNotEquals(request1, request2) + self.assertNotEqual(request1, request2) self.assertEqual(request1.difference(request2), difference) def test_arrays_dicts_with_no_difference(self): - value1 = { - 'foo': [ - { - 'test': 'value', - 'foo': 'bar' - }, - { - 'different': 'dict' - } - ] - } + value1 = {"foo": [{"test": "value", "foo": "bar"}, {"different": "dict"}]} request = GcpRequest(value1) self.assertEqual(request, request) def test_arrays_dicts_with_difference(self): - value1 = { - 'foo': [ - { - 'test': 'value', - 'foo': 'bar' - }, - { - 'different': 'dict' - } - ] - } + value1 = {"foo": [{"test": "value", "foo": "bar"}, {"different": "dict"}]} value2 = { - 'foo': [ - { - 'test': 'value2', - 'foo': 'bar2' - }, + "foo": [ + {"test": "value2", "foo": "bar2"}, ] } + difference = {"foo": [{"test": "value", "foo": "bar"}]} + request1 = GcpRequest(value1) + request2 = GcpRequest(value2) + self.assertNotEqual(request1, request2) + self.assertEqual(request1.difference(request2), difference) + + def test_dicts_boolean_with_difference(self): + value1 = { + "foo": True, + "bar": False, + "baz": True, + "qux": False, + } + + value2 = { + "foo": True, + "bar": False, + "baz": False, + "qux": True, + } + difference = { - 'foo': [ - { - 'test': 'value', - 'foo': 'bar' - } - ] + "baz": True, + "qux": True, } request1 = GcpRequest(value1) request2 = GcpRequest(value2) - self.assertNotEquals(request1, request2) + self.assertNotEqual(request1, request2) self.assertEqual(request1.difference(request2), difference)