diff options
Diffstat (limited to 'ansible_collections/google/cloud')
386 files changed, 8377 insertions, 7843 deletions
diff --git a/ansible_collections/google/cloud/.github/workflows/ansible-integration-tests.yml b/ansible_collections/google/cloud/.github/workflows/ansible-integration-tests.yml index 7fb920f6f..c7c63c84d 100644 --- a/ansible_collections/google/cloud/.github/workflows/ansible-integration-tests.yml +++ b/ansible_collections/google/cloud/.github/workflows/ansible-integration-tests.yml @@ -1,11 +1,12 @@ -name: "Run integration tests for the cloud.google collection" +--- +name: Run integration tests for the cloud.google collection on: pull_request: {} push: branches: master env: - GCP_SERVICE_ACCOUNT: "github-ci@ansible-gcp-ci.iam.gserviceaccount.com" - GCP_PROJECT: "ansible-gcp-ci" + GCP_SERVICE_ACCOUNT: github-ci@ansible-gcp-ci.iam.gserviceaccount.com + GCP_PROJECT: ansible-gcp-ci GCP_FOLDER_ID: "542027184392" jobs: integration: @@ -18,18 +19,20 @@ jobs: run: working-directory: ansible_collections/google/cloud strategy: + max-parallel: 1 matrix: ansible_version: - - stable-2.13 + - stable-2.14 + - stable-2.15 steps: - name: check out code - uses: actions/checkout@v2 + uses: actions/checkout@v4 with: path: ansible_collections/google/cloud - name: Set up Python - uses: actions/setup-python@v1 + uses: actions/setup-python@v4 with: - python-version: '3.9' # this is the minimum version required for Ansible 2.13 + python-version: '3.9' # this is the minimum version required for Ansible 2.15 - name: Install dependencies run: pip install -r requirements.txt - name: Install ansible-base (${{ matrix.ansible_version }}) @@ -53,15 +56,15 @@ jobs: env: CI_SERVICE_ACCOUNT_FILE_CONTENTS: ${{ secrets.CI_SERVICE_ACCOUNT_FILE_CONTENTS }} with: - service_account: "$GCP_SERVICE_ACCOUNT" - credentials_json: "${{ secrets.CI_SERVICE_ACCOUNT_FILE_CONTENTS }}" + service_account: $GCP_SERVICE_ACCOUNT + credentials_json: ${{ secrets.CI_SERVICE_ACCOUNT_FILE_CONTENTS }} - name: Set up Cloud SDK uses: google-github-actions/setup-gcloud@v1 - name: Run cleanup - run: | + run: | ./scripts/bootstrap-project.sh $GCP_PROJECT $GCP_SERVICE_ACCOUNT ./scripts/cleanup-project.sh $GCP_PROJECT $GCP_FOLDER_ID # run tests - name: Run integration tests # Add the -vvv flag to print out more output - run: ansible-test integration -v --color --python 3.9 --venv-system-site-packages
\ No newline at end of file + run: ansible-test integration -v --color --python 3.9 --venv-system-site-packages diff --git a/ansible_collections/google/cloud/.github/workflows/ansible-test.yml b/ansible_collections/google/cloud/.github/workflows/ansible-test.yml index 5ccdd1447..26078e86c 100644 --- a/ansible_collections/google/cloud/.github/workflows/ansible-test.yml +++ b/ansible_collections/google/cloud/.github/workflows/ansible-test.yml @@ -1,7 +1,8 @@ -name: "Run tests for the cloud.google collection" +--- +name: Run tests for the cloud.google collection on: [pull_request] env: - PYTHON_VERSION: "3.9" # minimum version for Ansible 2.14 + PYTHON_VERSION: "3.9" # minimum version for Ansible 2.15 jobs: sanity-and-lint: runs-on: ubuntu-latest @@ -12,13 +13,14 @@ jobs: matrix: ansible_version: - stable-2.14 + - stable-2.15 steps: - name: check out code - uses: actions/checkout@v2 + uses: actions/checkout@v4 with: path: ansible_collections/google/cloud - name: Set up Python - uses: actions/setup-python@v1 + uses: actions/setup-python@v4 with: python-version: ${{ env.PYTHON_VERSION }} # Automation-hub requires python2.7 sanity tests @@ -36,7 +38,7 @@ jobs: # validate-modules cannot be turned on until #498 is resolved. run: ansible-test sanity -v --color --skip validate-modules - name: Install ansible-lint - run: pip install ansible-lint==6.13.1 + run: pip install ansible-lint==6.22.0 - name: Run ansible-lint run: ansible-lint unit: @@ -48,16 +50,16 @@ jobs: matrix: ansible_version: - stable-2.14 - - stable-2.11 + - stable-2.15 steps: - name: check out code - uses: actions/checkout@v2 + uses: actions/checkout@v4 with: path: ansible_collections/google/cloud - name: Set up Python - uses: actions/setup-python@v1 + uses: actions/setup-python@v4 with: - python-version: "${{ env.PYTHON_VERSION }}" + python-version: ${{ env.PYTHON_VERSION }} - name: Install dependencies run: pip install -r requirements.txt - name: Install test dependencies @@ -65,4 +67,4 @@ jobs: - name: Install ansible-base (${{ matrix.ansible_version }}) run: pip install https://github.com/ansible/ansible/archive/${{ matrix.ansible_version }}.tar.gz --disable-pip-version-check - name: Run unit tests - run: ansible-test units -v --color --python "$PYTHON_VERSION"
\ No newline at end of file + run: ansible-test units -v --color --python "$PYTHON_VERSION" diff --git a/ansible_collections/google/cloud/.github/workflows/automationhub.yml b/ansible_collections/google/cloud/.github/workflows/automationhub.yml index 29e126283..6adb1380e 100644 --- a/ansible_collections/google/cloud/.github/workflows/automationhub.yml +++ b/ansible_collections/google/cloud/.github/workflows/automationhub.yml @@ -1,16 +1,16 @@ +--- name: Upload release to Automation Hub on: release: types: [created] - jobs: deploy: runs-on: ubuntu-latest steps: - - uses: actions/checkout@v1 + - uses: actions/checkout@v4 - name: Set up Python - uses: actions/setup-python@v1 + uses: actions/setup-python@v4 with: python-version: '3.x' - name: Install dependencies diff --git a/ansible_collections/google/cloud/.github/workflows/gcloud.yml b/ansible_collections/google/cloud/.github/workflows/gcloud.yml index 8100e1e6f..0fac68134 100644 --- a/ansible_collections/google/cloud/.github/workflows/gcloud.yml +++ b/ansible_collections/google/cloud/.github/workflows/gcloud.yml @@ -1,18 +1,19 @@ -name: "google.cloud.gcloud" +--- +name: google.cloud.gcloud on: push: paths: - - 'roles/gcloud/**' - - '.github/workflows/gcloud.yml' - - 'molecule/gcloud/**' + - roles/gcloud/** + - .github/workflows/gcloud.yml + - molecule/gcloud/** pull_request: paths: - - 'roles/gcloud/**' - - '.github/workflows/gcloud.yml' - - 'molecule/gcloud/**' + - roles/gcloud/** + - .github/workflows/gcloud.yml + - molecule/gcloud/** jobs: molecule: - runs-on: ubuntu-18.04 + runs-on: ubuntu-latest env: PY_COLORS: 1 ANSIBLE_FORCE_COLOR: 1 @@ -26,12 +27,12 @@ jobs: - gcloud steps: - name: Check out code - uses: actions/checkout@v1 + uses: actions/checkout@v4 with: path: ansible_collections/google/cloud - name: Set up Python 3.9 - uses: actions/setup-python@v1 + uses: actions/setup-python@v4 with: python-version: 3.9 @@ -47,9 +48,10 @@ jobs: sudo apt-get update sudo apt-get install -y docker-ce docker-ce-cli containerd.io python -m pip install --upgrade pip - pip install molecule[docker] yamllint ansible ansible-lint docker + pip install molecule-plugins[docker] yamllint ansible ansible-lint docker - name: Run role test + working-directory: ansible_collections/google/cloud run: >- molecule --version && ansible --version && diff --git a/ansible_collections/google/cloud/.github/workflows/gcsfuse.yml b/ansible_collections/google/cloud/.github/workflows/gcsfuse.yml index a58e6a373..2d0dbc1bb 100644 --- a/ansible_collections/google/cloud/.github/workflows/gcsfuse.yml +++ b/ansible_collections/google/cloud/.github/workflows/gcsfuse.yml @@ -1,4 +1,5 @@ -name: "google.cloud.gcsfuse" +--- +name: google.cloud.gcsfuse on: push: paths: @@ -10,7 +11,7 @@ on: - .github/workflows/gcsfuse.yml jobs: gcsfuse: - runs-on: ubuntu-18.04 + runs-on: ubuntu-latest env: PY_COLORS: 1 ANSIBLE_FORCE_COLOR: 1 @@ -21,12 +22,12 @@ jobs: - gcsfuse steps: - name: Check out code - uses: actions/checkout@v1 + uses: actions/checkout@v4 with: path: ansible_collections/google/cloud - name: Set up Python 3.9 - uses: actions/setup-python@v1 + uses: actions/setup-python@v4 with: python-version: 3.9 @@ -42,9 +43,10 @@ jobs: sudo apt-get update sudo apt-get install -y docker-ce docker-ce-cli containerd.io python -m pip install --upgrade pip - pip install molecule[docker] yamllint ansible ansible-lint docker + pip install molecule-plugins[docker] yamllint ansible ansible-lint docker - name: Run role test + working-directory: ansible_collections/google/cloud run: >- molecule --version && ansible --version && diff --git a/ansible_collections/google/cloud/.github/workflows/pythonpublish.yml b/ansible_collections/google/cloud/.github/workflows/pythonpublish.yml index 0318edfc4..dd460e685 100644 --- a/ansible_collections/google/cloud/.github/workflows/pythonpublish.yml +++ b/ansible_collections/google/cloud/.github/workflows/pythonpublish.yml @@ -1,16 +1,16 @@ +--- name: Upload release to Galaxy on: release: types: [created] - jobs: deploy: runs-on: ubuntu-latest steps: - - uses: actions/checkout@v1 + - uses: actions/checkout@v4 - name: Set up Python - uses: actions/setup-python@v1 + uses: actions/setup-python@v4 with: python-version: '3.x' - name: Install dependencies diff --git a/ansible_collections/google/cloud/.gitignore b/ansible_collections/google/cloud/.gitignore index d1aae87bf..e7a7d8f1b 100644 --- a/ansible_collections/google/cloud/.gitignore +++ b/ansible_collections/google/cloud/.gitignore @@ -6,3 +6,4 @@ tests/output/ __pycache__ *.tar.gz venv/ +changelogs/.plugin-cache.yaml diff --git a/ansible_collections/google/cloud/CHANGELOG.rst b/ansible_collections/google/cloud/CHANGELOG.rst index 795153473..663a9ab69 100644 --- a/ansible_collections/google/cloud/CHANGELOG.rst +++ b/ansible_collections/google/cloud/CHANGELOG.rst @@ -5,6 +5,37 @@ Google.Cloud Release Notes .. contents:: Topics +v1.3.0 +====== + +Minor Changes +------------- + +- anisble-test - integration tests are now run against 2.14.0 and 2.15.0 +- ansible - 2.14.0 is now the minimum version supported +- ansible-lint - fixed over a thousand reported errors +- ansible-lint - upgraded to 6.22 +- ansible-test - add support for GCP application default credentials (https://github.com/ansible-collections/google.cloud/issues/359). +- gcp_serviceusage_service - added backoff when checking for operation completion. +- gcp_serviceusage_service - use alloyb API for the integration test as spanner conflicts with other tests +- gcp_sql_ssl_cert - made sha1_fingerprint optional, which enables resource creation +- gcp_storage_default_object_acl - removed non-existent fields; the resource is not usable. + +v1.2.0 +====== + +Minor Changes +------------- + +- Add DataPlane V2 Support. +- Add auth support for GCP access tokens (#574). +- Add support for ip_allocation_policy->stack_type. + +Bugfixes +-------- + +- Use default service account if `service_account_email` is unset. + v1.1.3 ====== diff --git a/ansible_collections/google/cloud/CONTRIBUTING.md b/ansible_collections/google/cloud/CONTRIBUTING.md index 716d767c8..74c753d58 100644 --- a/ansible_collections/google/cloud/CONTRIBUTING.md +++ b/ansible_collections/google/cloud/CONTRIBUTING.md @@ -15,13 +15,25 @@ under a directory `ansible_collections`. Clone ensuring that hierarchy: ```shell mkdir -p $TARGET_DIR/ansible_collections/google -git clone <url> $TARGET_DIR/collections/google/cloud +git clone <url> $TARGET_DIR/ansible_collections/google/cloud +``` + +Then set up your Python virtual environment: + +```shell +cd $TARGET_DIR/ansible_collections/google/cloud +python3 -m venv venv +. ./venv/bin/activate +pip3 install -r requirements.txt +pip3 install -r requirements-test.txt +pip3 install ansible ``` ## Running tests -### prequisites for all tests +### Prequisites for all tests +- Install `gcloud` following [these instructions](https://cloud.google.com/sdk/docs/install). - Install the `ansible` package. - Some container runtime is necessary (e.g. `podman` or `docker`). The instructions use podman. @@ -29,18 +41,63 @@ git clone <url> $TARGET_DIR/collections/google/cloud ### Integration testing prequisites -#### Installing personal GCP credentials +#### Authentication with personal GCP credentials + +If you are running the integration tests locally the easiest way to +authenticate to GCP is using [application default credentials](https://cloud.google.com/sdk/docs/authorizing#adc). +Once you have installed `gcloud` and performed basic initialization (via `gcloud init`) run: + +```shell +gcloud auth application-default login +``` + +#### Authentication with service account credentials + +A service account may also be used to run the integration tests. You can create one using `gcloud`: + +```shell +gcloud iam service-accounts create ansible-test-account \ + --description="For running Anisble integration tests" \ + --display-name="Ansible Test Account" +``` + +You'll also need to export a key file. Here and below `$SERVICE_ACCOUNT_NAME` +is the full email address of the service account, in the form +`EMAIL@PROJECT_ID.iam.gserviceaccount.com`, e.g., if you used the +account name `ansible-test-account` as suggested above and your project +ID is `my-test-project`, use `ansible-test-account@my-test-project.iam.gserviceaccount.com`. + +```shell +gcloud iam service-accounts keys create /path/to/cred/file.json \ + --iam-account=ansible-test-account@my-test-project.iam.gserviceaccount.com +chmod 0600 /path/to/cred/file.json +``` + +Read the [best practices for managing service account keys](https://cloud.google.com/iam/docs/best-practices-for-managing-service-account-keys) +to learn how to keep your service account key and your GCP resources safe. + +#### Configuring test credentials The integration tests for this module require the use of real GCP credentials, and must provide -ansible-test those values. They can be added by authoring the following in `tests/integration/cloud-config-gcp.ini`: +ansible-test those values. They can be added by creating the file `tests/integration/cloud-config-gcp.ini`. + +If you are using personal (i.e., application default) credentials, add: + +``` +[default] +gcp_project: $PROJECT_ID +gcp_cred_kind: application +gcp_folder_id: $TEST_FOLDER (to create test projects) +``` + +If you are using a service account for credentials, add: ``` [default] -gcp_project: @PROJECT_ID -gcp_cred_file: @CRED_FILE -gcp_cred_kind: @CRED_KIND -gcp_cred_email: @EMAIL -gcp_folder_id: @TEST_FOLDER (to create test projects) +gcp_project: $PROJECT_ID +gcp_cred_file: /path/to/cred/file.json +gcp_cred_kind: serviceaccount +gcp_folder_id: $TEST_FOLDER (to create test projects) ``` #### Setting up the project for testing @@ -51,7 +108,8 @@ and is expected to be configured beforehand. For convenience, a bootstrap script is provided. NOTE: running this script will make irreversible changes in your -GCP project (e.g. create an AppEngine project): +GCP project (e.g. create an AppEngine project). You can omit +`$SERVICE_ACCOUNT_NAME` is you are using application default credentials. ```bash bash ./scripts/bootstrap-project.sh $PROJECT_ID $SERVICE_ACCOUNT_NAME @@ -66,10 +124,10 @@ Run `ansible-test integration`. Currently some tests are disabled as [test are b ### Prequisites for role tests If you would like to use podman, you must -install the `molecule[podman]` package in PyPI: +install the `molecule-plugins[podman]` package in PyPI: ``` -pip install --upgrade molecule[podman] +pip install --upgrade molecule-plugins[podman] ``` ### Running role tests @@ -92,7 +150,7 @@ ansible-lint ## Specific Tasks -The following enumerates detailed documentation for specific tasks related tot +The following enumerates detailed documentation for specific tasks related to the codebase. ### Updating the supported ansible-core version diff --git a/ansible_collections/google/cloud/FILES.json b/ansible_collections/google/cloud/FILES.json index fb1d61381..1dd95931b 100644 --- a/ansible_collections/google/cloud/FILES.json +++ b/ansible_collections/google/cloud/FILES.json @@ -8,38 +8,17 @@ "format": 1 }, { - "name": "README.md", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "bdd2f76b22792d422f1cdde90f23087bbcdf5e20689b7a38636863134ab19106", - "format": 1 - }, - { - "name": "changelogs", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, - "format": 1 - }, - { - "name": "changelogs/changelog.yaml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "6002770b6ce75ffd08c2b6cd16c89cacf1e8002b0110acbd8e0da0b55b94f394", - "format": 1 - }, - { - "name": "changelogs/.plugin-cache.yaml", + "name": "LICENSE", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "1e99d39043378da0c1e6a7caccbf0eddee0e215e2fdc9b6896318d51cae87d4f", + "chksum_sha256": "8ceb4b9ee5adedde47b31e975c1d90c73ad27b6b165a1dcd80c7c545eb65b903", "format": 1 }, { - "name": "changelogs/config.yaml", + "name": ".yamllint", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "9fd34b7976d067874a6433e49aa68b84e4fba5f67a8d5446e074629fd3431232", + "chksum_sha256": "5845e18e9f23155f423207df9abac970aed687c638620bc2c9ee06706191054b", "format": 1 }, { @@ -50,59 +29,24 @@ "format": 1 }, { - "name": ".gitignore", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "a2166c7f82586c11cedcf75d021f5e077f004bf1f809bbcde62d269e47d0d2af", - "format": 1 - }, - { - "name": ".yamllint", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "5845e18e9f23155f423207df9abac970aed687c638620bc2c9ee06706191054b", - "format": 1 - }, - { - "name": "test-fixtures", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, - "format": 1 - }, - { - "name": "test-fixtures/cloud-function.zip", + "name": "requirements-test.txt", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "ee1e4f66f4fa0eed5c6f6dcf77586a61c611c012cdde2c12469a32dbc787e052", + "chksum_sha256": "163167a063d01a440c2a19fa5879655d8b78378463fb825713de832f822738f6", "format": 1 }, { - "name": "test-fixtures/cloud-function-source", + "name": "meta", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "test-fixtures/cloud-function-source/build-function-zip.sh", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "0f90d1f2aff756f1e576595f756ceb3437b653657cbf75ae663f44c0bcab7a85", - "format": 1 - }, - { - "name": "test-fixtures/cloud-function-source/main.py", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "1d1d875a78943a05f939f77323f8c1c172e23d623a879e367d97759e353012cc", - "format": 1 - }, - { - "name": "test-fixtures/cloud-function-source/requirements.txt", + "name": "meta/runtime.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "900f6536a0bb496cb7390407df0515010a84b85e283f1e046580156e434d1836", + "chksum_sha256": "f86f1e59da294f6db2c9b8fc3fe3fb434c229e8b041d8d1f5a9b5363ae261986", "format": 1 }, { @@ -113,1991 +57,1977 @@ "format": 1 }, { - "name": "scripts/bootstrap-project.sh", + "name": "scripts/cleanup-project.sh", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "c42eea01e2d7231f7a08572ba5c350d958fbb6059e8530ec3976c317b28fe366", + "chksum_sha256": "d6649b1f636e09d512dba03abcd64497b1f8f342a6e5968fc6d403bde7c207cb", "format": 1 }, { - "name": "scripts/cleanup-project.sh", + "name": "scripts/bootstrap-project.sh", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "50f7f1eb44b247ff11fe3de36530baa48980aba85a6b6e486e99b77fa9bfb954", + "chksum_sha256": "04b48802ae161d5604345f7882de815cc6320acc8364464aa2dd78332deac001", "format": 1 }, { - "name": "LICENSE", + "name": "README.md", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8ceb4b9ee5adedde47b31e975c1d90c73ad27b6b165a1dcd80c7c545eb65b903", + "chksum_sha256": "bdd2f76b22792d422f1cdde90f23087bbcdf5e20689b7a38636863134ab19106", "format": 1 }, { - "name": "roles", + "name": "plugins", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/gcloud", + "name": "plugins/inventory", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/gcloud/README.md", + "name": "plugins/inventory/gcp_compute.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "700db6e9116d4b65967d2e9c33acd233996a07fed6cc5fd3575f6f100b205ee0", - "format": 1 - }, - { - "name": "roles/gcloud/vars", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "chksum_sha256": "029bc7e5d07c48136e993f6c0ee67d4dfec5696d9cc44d81d7940c15bac51c61", "format": 1 }, { - "name": "roles/gcloud/vars/main.yml", + "name": "plugins/README.md", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "f52d711103d50a437830c6fbcd04fb4bab49a0f82f6d26d1c791c6e8488dd090", + "chksum_sha256": "5be7ec7b71096d56e1cc48311b6a2266b77b5fdb9d1985b5bc625787b1e857c5", "format": 1 }, { - "name": "roles/gcloud/defaults", + "name": "plugins/modules", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/gcloud/defaults/main.yml", + "name": "plugins/modules/gcp_pubsub_topic.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "13431c8a6a6bdc94bada2120d5f83b6a21d9352301de938bcf0b48ed5f61e557", - "format": 1 - }, - { - "name": "roles/gcloud/tasks", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "chksum_sha256": "918b28bf38cc360405252052066358f0e83c31c055c978146108d3b402e7226b", "format": 1 }, { - "name": "roles/gcloud/tasks/package", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "plugins/modules/gcp_compute_target_pool_info.py", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "5fc2e6ab60792bda378aedb0fd6698a97dab0453bf395c10ead890ca9d56d497", "format": 1 }, { - "name": "roles/gcloud/tasks/package/debian.yml", + "name": "plugins/modules/gcp_redis_instance.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "1e6207fb00ea3354e5fdc80818452f935902a5c37d3eeaac71e50b1eeeb1c849", + "chksum_sha256": "c7ce1bd69be3ca0d83dae963374a8448382a24705fb27a9add85754551b9d0c7", "format": 1 }, { - "name": "roles/gcloud/tasks/package/redhat.yml", + "name": "plugins/modules/gcp_compute_region_disk.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "ca5125fea9ae694d20cf4ed385654e16861829e5483934805736ba5aa331e257", + "chksum_sha256": "ba4ddb5edb885143634b5a3176fa8c4c5a4dea645f1c7425f5c3e245acae25f9", "format": 1 }, { - "name": "roles/gcloud/tasks/package/main.yml", + "name": "plugins/modules/gcp_cloudtasks_queue.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "2b9c557c35ced987ae9d263b72459db3fa72243aab3d480e61abb0ca2863b002", + "chksum_sha256": "d11616a58ed618a28669cd604a4a89431b2252a0d25206903499d16e251192cc", "format": 1 }, { - "name": "roles/gcloud/tasks/archive", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "plugins/modules/gcp_spanner_instance.py", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "a4abb175d6e989d8110aa2d18eae426e3fa196c97aca6acc212d6b3af028eee4", "format": 1 }, { - "name": "roles/gcloud/tasks/archive/command_completion.yml", + "name": "plugins/modules/gcp_compute_reservation.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "665c35bbc194d32e036c7060b93312154a34cd00a9df6b3f4bde46b52e1ecdcb", + "chksum_sha256": "704fc0de50b5d99adc424554dbb84925df8a7946109f6ed240acfbcd1b20bedc", "format": 1 }, { - "name": "roles/gcloud/tasks/archive/archive_install.yml", + "name": "plugins/modules/gcp_compute_target_instance.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "7a7a4d8cebb72f4d2ea24a89d1e58bc13079b3918e4c2b620f308adb70626a63", + "chksum_sha256": "394ab44d54ebb208a503c350c585f3cd5197b2fc723c27cb80ab983b68b1f4a1", "format": 1 }, { - "name": "roles/gcloud/tasks/archive/main.yml", + "name": "plugins/modules/gcp_compute_backend_service_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "45c16fb9f00a994dcebaab0f31b5e406df5f942e4ace048d72a925f7526b0096", + "chksum_sha256": "23b04d81b2383bc17e2f42a07154118893308d5164f790565819d62325f61393", "format": 1 }, { - "name": "roles/gcloud/tasks/main.yml", + "name": "plugins/modules/gcp_sourcerepo_repository_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e4377e0e13216d665c5673eb397021014f69701032d72d10800023cb48941507", + "chksum_sha256": "446fa44670de275ef81b4d11689b3528e52575acb8e2268c49a2d6f3a5dab6df", "format": 1 }, { - "name": "roles/gcloud/meta", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "plugins/modules/gcp_iam_service_account.py", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "11a8b9ad09838886a487c6ea976ea4fc1f1cb7cb1c999fa05e5acb67be490466", "format": 1 }, { - "name": "roles/gcloud/meta/main.yml", + "name": "plugins/modules/gcp_compute_node_group.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "a9876e09039be32c4e13c914fc6957a8cbeaeb298171ba0ba13dff96e30eaaa0", + "chksum_sha256": "0611564d68d31f553d64aa32f31fb1398c80b0313d70026accf8cfe7ecdb3119", "format": 1 }, { - "name": "roles/gcp_http_lb", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "plugins/modules/gcp_spanner_database.py", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "e230ea5d9dd736cdfc489237979bec55ffec96168a65946bee16db0f939abea1", "format": 1 }, { - "name": "roles/gcp_http_lb/README.md", + "name": "plugins/modules/gcp_compute_firewall.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "81181c2882144e4f94701f8c5c00d309b2e4f836cc1469e74098c85e9ff6b060", + "chksum_sha256": "c24f8f2ba6c836c5c0367a92d7490c0745ad096df9352ff6aee682958a37e54d", "format": 1 }, { - "name": "roles/gcp_http_lb/vars", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "plugins/modules/gcp_compute_router_info.py", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "6a88ab70b8eaef4ddac7792b46a666d3a4e8b357233b4a1041be10eacbe359c9", "format": 1 }, { - "name": "roles/gcp_http_lb/vars/main.yml", + "name": "plugins/modules/gcp_compute_subnetwork_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "06cc6c8f6ad28db2bb4a77213c8272b09eead6d3ee2de8262b8cbf55224ceb9b", + "chksum_sha256": "1e414480380c0a492d99be77114e609daaa1600bafaf0e7d04b36f6c7c49e088", "format": 1 }, { - "name": "roles/gcp_http_lb/defaults", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "plugins/modules/gcp_compute_https_health_check_info.py", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "10ef96949d80b975e1eac42b7c2e3060791eccaa5865c821e6f882e1fbf3a76c", "format": 1 }, { - "name": "roles/gcp_http_lb/defaults/main.yml", + "name": "plugins/modules/gcp_compute_target_https_proxy.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "38c3b773c5e24378fe62615e28d6d70dd5b5db7951c6c2817b4e44f16afcab48", + "chksum_sha256": "36480d10c616323efb1a1153ceb2eb01b71affb2234b05eed8400f9a5b65fad6", "format": 1 }, { - "name": "roles/gcp_http_lb/tasks", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "plugins/modules/gcp_compute_health_check.py", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "822de3f7c76f3e2eb9a88caa7124eb8f81a3b5124098ed997b66f54906327172", "format": 1 }, { - "name": "roles/gcp_http_lb/tasks/main.yml", + "name": "plugins/modules/gcp_compute_autoscaler.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "f52706562b3c00bb48291cead932749b51f5e84ea193a803c3c1e7e328b41e1e", + "chksum_sha256": "f5df70f1b8d1d744affb9173166d375af1699d0fe4f16d33488a39b4dc339c40", "format": 1 }, { - "name": "roles/gcp_http_lb/meta", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "plugins/modules/gcp_dns_managed_zone.py", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "0c0341686d21a0d723eea828c7515fd3e7341127b67114acdbb2428fd5b6da1b", "format": 1 }, { - "name": "roles/gcp_http_lb/meta/main.yml", + "name": "plugins/modules/gcp_resourcemanager_project_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "9bb825b209ce2e26c4a971a5dc074020cc4ee48d64f21b1ab29f5965255ee9e7", + "chksum_sha256": "fae2d171d5100a3f60b95fb8b02ed021d318db9695231a7cd6d114cacf71da7e", "format": 1 }, { - "name": "roles/gcp_http_lb/tests", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "plugins/modules/gcp_compute_region_instance_group_manager_info.py", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "4015debcdf19fe5cc481c872a4dcf5bd1790942b2e11950d54c6ea006cb2423a", "format": 1 }, { - "name": "roles/gcp_http_lb/tests/inventory", + "name": "plugins/modules/gcp_container_node_pool.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e02233819b1a09844410549191813f7cc7ba360f21298578f4ba1727a27d87fc", + "chksum_sha256": "b39febd4f3165a788f8965f3c66a76e2b2b9ce8480f621433fe1034648aa6442", "format": 1 }, { - "name": "roles/gcp_http_lb/tests/test.yml", + "name": "plugins/modules/gcp_bigquery_table.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "cf4544185b76646beaaff765d5f21029c372e2f74acfa2b11e781f4c202492d6", + "chksum_sha256": "e9024bdca5fa1d50719ac34c2fdcf4c7bcd5724f9124abd524a05aa0903d79e1", "format": 1 }, { - "name": "roles/gcsfuse", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "plugins/modules/gcp_serviceusage_service.py", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "c9f16883f838e3bbdd07b4fbad3fbd6eb8572820691a4daeb21a519ef8770c14", "format": 1 }, { - "name": "roles/gcsfuse/README.md", + "name": "plugins/modules/gcp_bigquery_table_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "34c69736a29bf57b2000acc4db084d253df1c98bfe1d7ec2514838897574dd05", + "chksum_sha256": "47bbbd482163aca9ed1b0128e1ce6ecd3a93485e57fd4853e6060f66c9df9e23", "format": 1 }, { - "name": "roles/gcsfuse/vars", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "plugins/modules/gcp_compute_interconnect_attachment.py", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "47794c7c3c7b02abe55302e3e1cd2f2ce998dcdb1dd17f799ad6ef16f22655bb", "format": 1 }, { - "name": "roles/gcsfuse/vars/main.yml", + "name": "plugins/modules/gcp_compute_region_health_check.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "a505a2742e0c7b2937368440a796503791485c999a4b9fd6f0e90715b2af8fa2", + "chksum_sha256": "8be2b835d6d89ce1766843bfaffc7048d63b24e5af9b38fabc37cfcd57cdd632", "format": 1 }, { - "name": "roles/gcsfuse/defaults", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "plugins/modules/gcp_compute_global_forwarding_rule.py", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "9141a11eebafc85606eb8ddb1698f7769302d50bce6d8153d548923a6022dc83", "format": 1 }, { - "name": "roles/gcsfuse/defaults/main.yml", + "name": "plugins/modules/gcp_compute_ssl_policy.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "680a1514fdbeae910661c7c44bd0dbf7e254b61e78f2c35bab61d5a43a928baf", + "chksum_sha256": "794bf24c6c0663bfd996055e4742c7858d4de0f87f6111f2e95dd4b3cffc9cc8", "format": 1 }, { - "name": "roles/gcsfuse/tasks", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "plugins/modules/gcp_compute_target_vpn_gateway.py", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "926c805c59b9f7e8c7fd46210f192b4bb84a169173682ba7fe64bdfe7652c341", "format": 1 }, { - "name": "roles/gcsfuse/tasks/debian.yml", + "name": "plugins/modules/gcp_compute_instance_group_manager.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "79b58ca15b3f8d25cb7cb580a5db58abfed8a4f7e7cb59dbb59e033c65a0336b", + "chksum_sha256": "32d55ba3ba31097802a5219329a9d6d88892b9ecf0b89809ed5acd4c894c43ee", "format": 1 }, { - "name": "roles/gcsfuse/tasks/main.yml", + "name": "plugins/modules/gcp_appengine_firewall_rule.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "eb596bb164b1e6de5bb4311afdb5c089d4c510496852cba8cd4bbab9ec16a1d0", + "chksum_sha256": "17d1936d7dbe3b849857eb9c0529348a601940c946f0c0ab61acb9c6b7ad4240", "format": 1 }, { - "name": "roles/gcsfuse/meta", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "plugins/modules/gcp_compute_target_http_proxy_info.py", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "c8c9e39f13522376f65efc53314bca9080ec6f0e7c86bc17a18670a4817459a7", "format": 1 }, { - "name": "roles/gcsfuse/meta/main.yml", + "name": "plugins/modules/gcp_compute_vpn_tunnel.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "a88bfa311596bf887962c34be6eae17e598b3c14bb973a239bb21934cfaaa444", + "chksum_sha256": "5abc0d4e6caabf733e30fde7278f6c5953a08b34803b26271df451d286ed05dc", "format": 1 }, { - "name": "roles/gcsfuse/handlers", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "plugins/modules/gcp_compute_network_endpoint_group.py", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "3b4c8b76c23e103033834c8d09a70432df500bd9c29fc64c472fe65348bcc1d3", "format": 1 }, { - "name": "roles/gcsfuse/handlers/main.yml", + "name": "plugins/modules/gcp_compute_firewall_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "06f6404a01fe05252d5834e091751bde4d8d2272274e712f01ad455942285f6b", + "chksum_sha256": "c09ae8e89b92fbd5799e0ad1d6a416525c560b41c4ce28862669fc209b9d6dcc", "format": 1 }, { - "name": "CONTRIBUTING.md", + "name": "plugins/modules/gcp_cloudfunctions_cloud_function.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "855d0296b98cbeaf5a89f12582f5efc4b39128b7698b5edb0feffd127c19f3a6", + "chksum_sha256": "fc737596a63fc2844092fb9e57dc17db1dd16b43cc19ab24e39327d3514fac72", "format": 1 }, { - "name": ".gitmodules", + "name": "plugins/modules/gcp_compute_image_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "15d86ac1fb9c04f919875abab5cf78444795e93fc0b8319c0aba72e4cf8bb2a6", + "chksum_sha256": "9a158e7e4476268859f83a0637b8cdeec4673ee29c7a951e492023cba33bc511", "format": 1 }, { - "name": "MAINTAINING.md", + "name": "plugins/modules/gcp_compute_instance_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "db413a937f5143578335b9e7970865eb3b55f30b0c6ac91d1abbd96c323c5ae1", + "chksum_sha256": "f145717e3a15614f1245e789890242738a9fb4440adfba0c67f328b3c2ca1fd1", "format": 1 }, { - "name": ".vscode", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "plugins/modules/gcp_compute_instance.py", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "4a9e4bdd77064c107bc0555b576b4408a4157a95103e14ebeb5de95f3147197c", "format": 1 }, { - "name": ".vscode/settings.json", + "name": "plugins/modules/gcp_compute_disk_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "d1be9315fe97520591ad6aca56c5b6ee625d3d2c84633de40f0f0afcc13a12a1", + "chksum_sha256": "d6a4b0fa6dd8ae31b4a5f49e7401919267c0720e2a725ac5aa9e90bb6e0e1b14", "format": 1 }, { - "name": "plugins", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "plugins/modules/gcp_filestore_instance_info.py", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "49cd05a60d2e23ee31fc119c025d71a89d0f0cfd9d0a83373dc5abd8f885fd2f", "format": 1 }, { - "name": "plugins/README.md", + "name": "plugins/modules/gcp_kms_crypto_key.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "5be7ec7b71096d56e1cc48311b6a2266b77b5fdb9d1985b5bc625787b1e857c5", + "chksum_sha256": "5b59ed5ddc982da544c4ce1d6c63af1b59638a8f8ac37cf8fd917246b7a873bb", "format": 1 }, { - "name": "plugins/inventory", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "plugins/modules/gcp_compute_target_ssl_proxy.py", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "445e8d2252556135f8b21d4ae9c234b607fa2793ebe80cafcca96468fbfe04d7", "format": 1 }, { - "name": "plugins/inventory/gcp_compute.py", + "name": "plugins/modules/gcp_bigtable_instance.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "d3c4a03704684b554f0b7f3a1aa7257d1724ea376cb987f212a48021f05695f8", + "chksum_sha256": "593413c3f6bb88b62c0b8096b269123727b1fd1d0ee0a587acfd93321935876a", "format": 1 }, { - "name": "plugins/modules", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "plugins/modules/gcp_spanner_instance_info.py", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "4d1c85ea0d8d59f3f08d88f0c7d7613d9fc47cdaec475638f0b6ba1f48a9b92b", "format": 1 }, { - "name": "plugins/modules/gcp_compute_target_http_proxy.py", + "name": "plugins/modules/gcp_compute_region_url_map.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "a46c662a2a7f536effd8f6460d03f87823f668959acd91be844a10a70fafc07d", + "chksum_sha256": "7328409ec02a60d5f6c8587c08f030870b706b0a6a845462f858b6acbea62eb9", "format": 1 }, { - "name": "plugins/modules/gcp_compute_router.py", + "name": "plugins/modules/gcp_compute_snapshot.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "828f9230a5a5f85b810dcc74c10aa86071b72e77bc7f3f69c9f4fc8d694389b2", + "chksum_sha256": "d3bdd8c9a65c1521ff39dfc3c2f2dcb07d7a540d6d2ae554056d274eacb41630", "format": 1 }, { - "name": "plugins/modules/gcp_runtimeconfig_variable.py", + "name": "plugins/modules/gcp_compute_region_target_https_proxy.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "f30c415ac2489f3f03558794b2704d857b1df6fa9a80aabf8d18f17da2781ae1", + "chksum_sha256": "9179112a6564d9bd81ec2bd24dee37f02e3719215cbb567cf8904bbb764644d0", "format": 1 }, { - "name": "plugins/modules/gcp_storage_default_object_acl.py", + "name": "plugins/modules/gcp_iam_service_account_key.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "0b7dfd27408da62cb42be5fe8a95e87e3c7798f3cba79746ac54993a54da9d4c", + "chksum_sha256": "e972fe20cea4f8ad25607e1b5c4e2d3261523c147119689aed65c4d3002ff554", "format": 1 }, { - "name": "plugins/modules/gcp_redis_instance.py", + "name": "plugins/modules/gcp_compute_target_tcp_proxy.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "100ae06e7c5136633a5fd99416a6645144bd6afcbed50d5248539844bd53efd1", + "chksum_sha256": "5acda4cb2f949744291bf26361ccd96911bbb4161852aaf612fcb2706f4425e2", "format": 1 }, { - "name": "plugins/modules/gcp_compute_subnetwork.py", + "name": "plugins/modules/gcp_mlengine_model.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "be684076711dad9058d800bee512ad0031478fba911246ff1ea014d6452660fc", + "chksum_sha256": "7a091202836e9d2196b01eecf1afc7e5814cbc5944be7aa65fb4ed0adcf3d3c9", "format": 1 }, { - "name": "plugins/modules/gcp_compute_node_template.py", + "name": "plugins/modules/gcp_compute_url_map_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "dfb057ab3183155cfcaca5390684b58601a29be1cafaecc34993dda1ac5d484d", + "chksum_sha256": "1898bc671b8b899f7a75b45353a52d67c7a8e5f0cb1671199a2c5f407e6848db", "format": 1 }, { - "name": "plugins/modules/gcp_compute_region_instance_group_manager_info.py", + "name": "plugins/modules/gcp_compute_route_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "af1155f408322e1cfc6dae67d94306f451b23801366fa02e66e431a268dc150a", + "chksum_sha256": "cc60b656606f8d9c4951c535b89f8a9939ee6b535b0e7a9e5162eb7cbeaac7a4", "format": 1 }, { - "name": "plugins/modules/gcp_compute_network.py", + "name": "plugins/modules/gcp_resourcemanager_project.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "f8b64d9732b92550936c24883192b4a062a93d42944ae2f8ceea0cf3ad16fdc3", + "chksum_sha256": "3b453a639ebad87fc5c3eebb78eea4986f27b9167e405ce93ac4e74b748474b1", "format": 1 }, { - "name": "plugins/modules/gcp_compute_instance_group_manager.py", + "name": "plugins/modules/gcp_compute_backend_service.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "b461c74e9789b2569219498e287de22a35b9ca2fbae728e1e4cea701ffbbb4bc", + "chksum_sha256": "8091e1fa179f951239b54e0b44376e44617243a2c882f994875074730a789304", "format": 1 }, { - "name": "plugins/modules/gcp_compute_ssl_policy.py", + "name": "plugins/modules/gcp_dns_resource_record_set.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "5e5a53db2193ad67f95f7a2f655b847de9007e8c894f8b61dd1415a97081d27a", + "chksum_sha256": "92bfa0ac79fe0136e06f2e4aed6227f3f4b99626261d3559a3fc2606e230ee8a", "format": 1 }, { - "name": "plugins/modules/gcp_filestore_instance_info.py", + "name": "plugins/modules/gcp_compute_target_ssl_proxy_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "cebf36847bef432e0583b4a0cfb38e1522359562937210ac42210369af8370f2", + "chksum_sha256": "85f5a543c6be9522748ce2c8aa094ad4fae4ec5a456530159c5a056b5681f8af", "format": 1 }, { - "name": "plugins/modules/gcp_compute_instance.py", + "name": "plugins/modules/gcp_compute_region_target_http_proxy_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "0a23c61d6122f61b9289f795d5b745f42ee2cab63b6edc03c64b2acd89df2318", + "chksum_sha256": "1d939d90613402e6040c4e97c0ef4b2f565b536da56a93bfb8c5648cc8a5fcb4", "format": 1 }, { - "name": "plugins/modules/gcp_compute_region_backend_service_info.py", + "name": "plugins/modules/gcp_compute_region_health_check_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "37b09288dccf4e3deb135ab7aa5629b5830cc3bb863b7ba6fe7fefdf7de84c3f", + "chksum_sha256": "6ff2a68925f9c38af9da8ad91832d3212bf4fe7a500ebdc3394a1e07a7ab346b", "format": 1 }, { - "name": "plugins/modules/gcp_storage_object.py", + "name": "plugins/modules/gcp_compute_http_health_check_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "9bbd7fef0ba5be051d3092dc196a5b08c10e54080c555dd8a3e98b512c71ee31", + "chksum_sha256": "86bb11af5db7137f7d71fee7eb68a560f45657a4e1772b1e819430cc68a7c237", "format": 1 }, { - "name": "plugins/modules/gcp_compute_route.py", + "name": "plugins/modules/gcp_redis_instance_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e9fc323fba683f46f8d7aac33af2f7e0af29f0288df07c7a940b9f304537b7c5", + "chksum_sha256": "0f8b6ba39c56d492fdae25c4c93e1d059cadc54d59b3affcb48d094592d371c3", "format": 1 }, { - "name": "plugins/modules/gcp_compute_ssl_certificate.py", + "name": "plugins/modules/gcp_cloudscheduler_job_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "badebd74e39ad2b7e33d2ac1050cf4682c0a7922976ace02dfb47615b966a5ff", + "chksum_sha256": "1348168207292f67a45fa392512ec214667d331658ab6c50ca262711657244d9", "format": 1 }, { - "name": "plugins/modules/gcp_kms_key_ring_info.py", + "name": "plugins/modules/gcp_logging_metric.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "96d7ce97c8e77b93a682fba69410646457b697921191a5c8d52a51062c3e4350", + "chksum_sha256": "85ec7603d2795d95107fd8b38dc1ba2b0631f3496a211b9ee4dc08b7f020626d", "format": 1 }, { - "name": "plugins/modules/gcp_cloudbuild_trigger_info.py", + "name": "plugins/modules/gcp_compute_forwarding_rule_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "4f2e02b2ef1f2392a0b564b9eb67be6ea9a6281950869f0c7921e606502e2241", + "chksum_sha256": "e62d4603408c6548c55f571084098f6c915f0e778391c0d9d5cdc40b51488931", "format": 1 }, { - "name": "plugins/modules/gcp_container_cluster.py", + "name": "plugins/modules/gcp_mlengine_version.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "35182af210395bedbfeb583fc210a00fa773510c19465067e4f34da00022d31f", + "chksum_sha256": "57ddc3affc5b165dad6838cbbc5a0fd29e2c3e71449921b2bba2ad534d325d2e", "format": 1 }, { - "name": "plugins/modules/gcp_compute_target_instance.py", + "name": "plugins/modules/gcp_compute_interconnect_attachment_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "ad877ef2446fd8ae4553c1603a77e84014f85a251d0edcbae007a525b7910e78", + "chksum_sha256": "d18689e86891390dbb2877f3f3706421d4f0e6ca6df0881559e80e28f1ac1f83", "format": 1 }, { - "name": "plugins/modules/gcp_compute_vpn_tunnel.py", + "name": "plugins/modules/gcp_sql_instance_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "6ad616405843df5eedf1f5c9e4e672170cbbcfd0cacdd09495788b501d03fb5c", + "chksum_sha256": "4c36bdcc7e940346ac892d7ef5d48006fc06243e5506ba4e7d3733d01b86ef48", "format": 1 }, { - "name": "plugins/modules/gcp_cloudtasks_queue_info.py", + "name": "plugins/modules/gcp_compute_router.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "3ff879abc7d637989aac84cb06e2ef5c08eb197ef33633469825c813aa0dcfc4", + "chksum_sha256": "27569009cd337a61100a12ff45035844f4d55c8315beabf1180d425b3dd9526d", "format": 1 }, { - "name": "plugins/modules/gcp_compute_firewall.py", + "name": "plugins/modules/gcp_pubsub_subscription.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "ad472ac8d7f46949b8ac6ab49126106a9c455b48c35aae0819627effbde4d3d5", + "chksum_sha256": "f123bf5987d1f5b1bc1c9185e74519dc115523602ae3bebe3ea1cc989dcc7ab6", "format": 1 }, { - "name": "plugins/modules/gcp_filestore_instance.py", + "name": "plugins/modules/gcp_compute_node_group_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8f3244b8c5a6f3f4cd5d3d0faa540d03d33b5856241c0e7fa7b4bde6bfa1d5fb", + "chksum_sha256": "9aec873cb26ca48bdaa53fb87d732a8c130abb0916d17fadbe9b2d405e45ce3b", "format": 1 }, { - "name": "plugins/modules/gcp_resourcemanager_project.py", + "name": "plugins/modules/gcp_compute_target_instance_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "145b3eb57cbde878b6da721a0e53e7dc6a0c81a99656b20bade9c4103e398fa3", + "chksum_sha256": "350e66aa6f243187df8af76b5e18b2aec4fa7584f3983d4609f99ddc9ac42ab6", "format": 1 }, { - "name": "plugins/modules/gcp_dns_resource_record_set_info.py", + "name": "plugins/modules/gcp_container_node_pool_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "16064edd194165f42c47f400675063f2b5ad2d069cc7f290b42187f1000aeccf", + "chksum_sha256": "3639ea3685defc6aeb90909c4cdd6816ce28ae21d0b7f39f6b8c506e057fac96", "format": 1 }, { - "name": "plugins/modules/gcp_compute_target_ssl_proxy.py", + "name": "plugins/modules/gcp_cloudbuild_trigger_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "72ec56378109cdfe4c0b5f94b9a06325af4e3ba3e5f05d96533bd073e146d2cf", + "chksum_sha256": "dd7457fb787550c8293a26b8b086c5e8414727c32f72bbcc1e68d89facc2e806", "format": 1 }, { - "name": "plugins/modules/gcp_compute_backend_bucket_info.py", + "name": "plugins/modules/gcp_spanner_database_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "1ea9f227c804c103711d5601bc7f4bb3e943d7e4ec95c27f29a2027da557fc0d", + "chksum_sha256": "47c7954056911f41a05bf36d51149e792def4f81489f92e146134f334bab628a", "format": 1 }, { - "name": "plugins/modules/gcp_compute_region_url_map_info.py", + "name": "plugins/modules/gcp_compute_instance_group_manager_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "1741b6d136bdda5c6b7ad66c2cb51d1363e2e96d23686cda3ae0cf1b2da01980", + "chksum_sha256": "d8a543523abe3b35b48b9dc599d3e33beab2028eef5ffbbd1dad091d26fdbcd2", "format": 1 }, { - "name": "plugins/modules/gcp_compute_image_info.py", + "name": "plugins/modules/gcp_compute_region_instance_group_manager.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "11f0b47bd0ace58f1d132233d12decaa3ff1aaa21ed7ad550664c5cadc22b995", + "chksum_sha256": "67d533711c6a247db923bf36d258ff719c50a485010966361a77de138ba03ffd", "format": 1 }, { - "name": "plugins/modules/gcp_mlengine_model_info.py", + "name": "plugins/modules/gcp_compute_reservation_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "6b35eb80136d754c7e79c28d510f47ef3eacfb02752f9a1952c9483a642ff686", + "chksum_sha256": "e154eeb2a93e5bab6bfb3da86c75f254faf7b048d808d4f2674ea16a254a6a3b", "format": 1 }, { - "name": "plugins/modules/gcp_kms_key_ring.py", + "name": "plugins/modules/gcp_compute_backend_bucket_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "7fcf346b9d61c62aec4f374a2a3bc5570f9862bfa9144390c909a27a15a8702d", + "chksum_sha256": "ee77d0ac2fd7d3367af7fba36e754050d83ff879c29ee7e0713320b10c18b206", "format": 1 }, { - "name": "plugins/modules/gcp_dns_managed_zone.py", + "name": "plugins/modules/gcp_pubsub_topic_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "332ea663cf42160e487a17604e9881296812c4b7c9b35c8e38726694704d5856", + "chksum_sha256": "52635f5331624093d203c3a5eb1ec0c71e42c385b05c034d5f577f0182543b68", "format": 1 }, { - "name": "plugins/modules/gcp_sql_instance_info.py", + "name": "plugins/modules/gcp_compute_target_tcp_proxy_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "5d0feb5e4b818b487eda5daa5a0e71d612d3f854ab7132dc162bb6f307bcf2ab", + "chksum_sha256": "67a0b6138dad2e6b5eeff59cb3aa16a0827f0a9f5a302187d4b5e152c34a2ad2", "format": 1 }, { - "name": "plugins/modules/gcp_compute_target_http_proxy_info.py", + "name": "plugins/modules/gcp_compute_global_address.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "c524ed08f1d1d5ed44ed1adb5cd8bbc39424e14937bbe4f6ee80a17095ae399d", + "chksum_sha256": "368b58c4f1b2792cca6ff3b548cf9ae96873e906a65cb853709f54ce3212d1ea", "format": 1 }, { - "name": "plugins/modules/gcp_compute_http_health_check_info.py", + "name": "plugins/modules/gcp_compute_ssl_certificate_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "275c1caac87ebb0110c892011be1a16e822f9c1b92f2c1d900e2443578491294", + "chksum_sha256": "14d27a678a3431418cae191ac3376c3505cc4f8e19e5a2c90454ee4b1dbfacd3", "format": 1 }, { - "name": "plugins/modules/gcp_cloudscheduler_job_info.py", + "name": "plugins/modules/gcp_compute_ssl_certificate.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "d24ef38fb21c1013edd4572d9035762dcdaf86670d6b35e8bbaef9ae0bd76f96", + "chksum_sha256": "04db00cbf9d1ed9061fac234a54b365c2e16d492f0fc674ea6472bfdac277137", "format": 1 }, { - "name": "plugins/modules/gcp_compute_instance_template.py", + "name": "plugins/modules/gcp_dns_managed_zone_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "d9d69a5de068fbbf2af222910f6a2f7b038fbd6723fd1e3a9dd3e9aaf69ce0da", + "chksum_sha256": "384488d626e9f5189055011cfa414b5753890248d2828522288b8e9ab91b4de3", "format": 1 }, { - "name": "plugins/modules/gcp_container_node_pool_info.py", + "name": "plugins/modules/gcp_compute_instance_group_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "3434a4b71a9c176a0795b1ec7e0522d3b2c5ea2f12ce14c3979e7744a927c481", + "chksum_sha256": "e6a28b5474b2be500415707fc12498213c26f0a021449678cee4d207fa9079ac", "format": 1 }, { - "name": "plugins/modules/gcp_compute_target_pool.py", + "name": "plugins/modules/gcp_sql_user_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "61e6cdd1168bc5188b46251949d78c1e895c399a7263a176d8f37ca5ba927666", + "chksum_sha256": "1d5f788dd16acd7cdb7fb9bf41302930e45dcf4f3d88b275849a45aa3403f59e", "format": 1 }, { - "name": "plugins/modules/gcp_compute_ssl_certificate_info.py", + "name": "plugins/modules/gcp_compute_network_endpoint_group_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "3c7ebb58bc7b293c1832c4f59efc829042ee5345624f0c634193f0d1a6ec96eb", + "chksum_sha256": "0ee2779c6a9d013f0b66f352a5537a4a2303138b9f3d5fe1e209417ff0ee71a3", "format": 1 }, { - "name": "plugins/modules/gcp_compute_address_info.py", + "name": "plugins/modules/gcp_bigtable_instance_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "b639f63b468c98e459fdd543ff7776789cceac06a00c1dfe104ab5414a83d214", + "chksum_sha256": "5ad4434e8856e3ab6ad5f87a8e92ef6972bdc1586859d15403f28677c67fe17f", "format": 1 }, { - "name": "plugins/modules/gcp_serviceusage_service_info.py", + "name": "plugins/modules/gcp_runtimeconfig_variable_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "969f8e53f57118d437ac84227e295fabd4589c6c1500bb9f28bcfd0051accc0c", + "chksum_sha256": "4a70e1dc0076007e8304f68589e810a0eff1b8809964cde8d7f9cc7abccd51fc", "format": 1 }, { - "name": "plugins/modules/gcp_compute_instance_group_manager_info.py", + "name": "plugins/modules/gcp_compute_ssl_policy_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "0420df9aea30dbf4121f8ae235530cb8e5995212827ff1220b20ea707e2a7fa5", + "chksum_sha256": "2f7b957952d3ab774ec99300972056ba16a5c59d45aa9d168755a461b0d1fe1f", "format": 1 }, { - "name": "plugins/modules/gcp_compute_backend_service_info.py", + "name": "plugins/modules/gcp_compute_http_health_check.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "5157185c92b9fa127f23a13b0bb35dddf216c696b37316a625f4365ad72e5b95", + "chksum_sha256": "9290bf2bd67a71f7424ae3b2f5e04d036cc54b1f3b0d06cd841ecebefeb6cf96", "format": 1 }, { - "name": "plugins/modules/gcp_compute_disk_info.py", + "name": "plugins/modules/gcp_sql_instance.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "7312e6c082c7f7df1a73c8ada6966f8058f3f8fbc298bdb0544468c3c77a89c9", + "chksum_sha256": "788e17bac7280c631e2283e6632f13812e6086b35bf0075aa479975be6c7cdcb", "format": 1 }, { - "name": "plugins/modules/gcp_compute_instance_group.py", + "name": "plugins/modules/gcp_mlengine_version_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "4e567c665bc7e7c196b8c0d7b75a5541b208175dfe4580952763b83195fad32d", + "chksum_sha256": "5b959b7bb001989d78601e4d4d7908c736aec8cb6f39ea3e812579202839cdd0", "format": 1 }, { - "name": "plugins/modules/gcp_cloudscheduler_job.py", + "name": "plugins/modules/gcp_runtimeconfig_config_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "d409a760c812d7d0f79dd0818bc4987aa431f4413ac073f2d7e97d3001ac2d1c", + "chksum_sha256": "57570a09b2598916d21f68c4e20c6107d3ce6dd04eeda992d878f39d36de3887", "format": 1 }, { - "name": "plugins/modules/gcp_logging_metric.py", + "name": "plugins/modules/gcp_logging_metric_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e32f8cc1b57cbb47e458d7ad2e0af73fb92d250e20048f63247c0e59dabb8a2d", + "chksum_sha256": "59fe0022185e3a1be69079dfb086972cda41afec3bf8997e6124f3eb50425e82", "format": 1 }, { - "name": "plugins/modules/gcp_compute_forwarding_rule_info.py", + "name": "plugins/modules/gcp_compute_instance_template.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "02f4e9a4ec49afc3184bba24ae1385a45b8e4de7543259dfc75f3449b94a40d6", + "chksum_sha256": "a4a06e0a84ecfdd854970bbe4373b8d65f9a8e221f2579312f763d05353a41af", "format": 1 }, { - "name": "plugins/modules/gcp_compute_external_vpn_gateway.py", + "name": "plugins/modules/gcp_tpu_node_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "d05d05d2be455d482fb268f9a174993996e205e41aeacd356abc74816e26e8eb", + "chksum_sha256": "96d6516ab1046500de8c486695513627ff60392c6126f28ace4692630fb84fd5", "format": 1 }, { - "name": "plugins/modules/gcp_compute_address.py", + "name": "plugins/modules/gcp_compute_address_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "03f322bb4986ee7f374b0e06b30ef859878954238c8af55e192fa7259339516f", + "chksum_sha256": "ead25753161b5537ec163d00e93d756777f2b6dc99d60296c89639ca840a27a6", "format": 1 }, { - "name": "plugins/modules/gcp_bigquery_table.py", + "name": "plugins/modules/gcp_compute_instance_template_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "afecfe480188c2190c87064d866f503f25671f8de4b35de3ca2e48d92ea72c37", + "chksum_sha256": "3974df5365a4b94a7501bbfc43ecacda0fc8baf405231470dd24435fe100a6d7", "format": 1 }, { - "name": "plugins/modules/gcp_iam_service_account_key.py", + "name": "plugins/modules/gcp_iam_role_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "1603de86c7bf139738bb6821f57e7c1ce7d72570b060df5e174a379df464ea83", + "chksum_sha256": "01d2583fba8f95e27955da03915bf68290a8de551daac2f97350c9ec1b9222d4", "format": 1 }, { - "name": "plugins/modules/gcp_sql_ssl_cert.py", + "name": "plugins/modules/gcp_container_cluster.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "d45f2577732d0fb4bcc9bcae4fecf934b7a13d7fa4eaaa1c8ff38ab3e1626c9c", + "chksum_sha256": "58283f58c875ba24fab9c8ce9d465dd894f5280d8afaa629787693a186c07291", "format": 1 }, { - "name": "plugins/modules/gcp_iam_role.py", + "name": "plugins/modules/gcp_appengine_firewall_rule_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "7273f96d103bcf55728827b67ed9ab243a051ff878675545651868e9bf608273", + "chksum_sha256": "f06c8daa4ef7db2f1551d9d216543b771a4c820b4884c86d4dd3eb81962d21fe", "format": 1 }, { - "name": "plugins/modules/gcp_iam_service_account.py", + "name": "plugins/modules/gcp_storage_bucket.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "02e88f7c0e8cc6f3fd23eb131f29894d41b885223ef79a783b8938dad303e2d4", + "chksum_sha256": "9b70641def946ee1ee7fb8da57293c4a709748997fd80ea98605f9aea94ac6c0", "format": 1 }, { - "name": "plugins/modules/gcp_compute_region_instance_group_manager.py", + "name": "plugins/modules/gcp_iam_role.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "3d43b8b9b9eeaca374a54725c4068961f6205be2d592cf498fcfeac603c122e4", + "chksum_sha256": "6c5bbd9fffb50e943da042d0af0018db1b9dc70752f6b2286f45f290f7ca61bc", "format": 1 }, { - "name": "plugins/modules/gcp_pubsub_topic.py", + "name": "plugins/modules/gcp_compute_autoscaler_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "d67412fe5aa92d96edc8cfc805299500e4c1401c8e50b482dd6f1521a934e371", + "chksum_sha256": "2e3ed397a6c9d5c4ae375750f9f9cd0903eebb4ac19f6836816e1a9495197c8b", "format": 1 }, { - "name": "plugins/modules/gcp_compute_target_pool_info.py", + "name": "plugins/modules/gcp_container_cluster_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "a566909ee0a0442d9615abd73f2dd9522fffbb29521dd2f2bd6a75b4dac93637", + "chksum_sha256": "6bd590de8c1399a9f7be02e0e20f21870c736010d2b829403b74ab8bdf219b81", "format": 1 }, { - "name": "plugins/modules/gcp_compute_instance_info.py", + "name": "plugins/modules/gcp_storage_default_object_acl.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "1000e0b20c293560eb6fc6f4a10c3db4ba7da7819d85000e1a4127a39c0850a3", + "chksum_sha256": "1c8cc48439327e7164deafc41569ce3aea519cee66d20b33c95a5082c9585438", "format": 1 }, { - "name": "plugins/modules/gcp_tpu_node.py", + "name": "plugins/modules/gcp_storage_object.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "6de940ffebd69179b375c0eb8cc667dfdf310fc2cb348491ec901a8c9a5ddb4a", + "chksum_sha256": "27d4d79bf9c059e3699d0a18979e892a0909d128d3e60322f48c14e13504a054", "format": 1 }, { - "name": "plugins/modules/gcp_compute_node_group_info.py", + "name": "plugins/modules/gcp_kms_key_ring_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "85b25ee3b6c6dad4932ec4e90b9c9f292262390f78a8a1b1d81e34de6615f1c1", + "chksum_sha256": "760a1013ded4d23e3442bdd01e71fe54223e87e2192093c93fc30564bca3ac07", "format": 1 }, { - "name": "plugins/modules/gcp_compute_router_info.py", + "name": "plugins/modules/gcp_compute_route.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "b0ebcc257a94286465891ab6351f6bcc7633c6a9dc891505ded7d4ad3caaa7a4", + "chksum_sha256": "5a3a2ce5ec96387287cc90140339f0f8f52a889c9da9a170c7691a7b91b0a9b8", "format": 1 }, { - "name": "plugins/modules/gcp_compute_autoscaler.py", + "name": "plugins/modules/gcp_compute_image.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "952a920fcd39ef8d606c8e1900e0685cde6907f41e8cb12b6c20fb73dc559dbc", + "chksum_sha256": "b8461a28b137c3a9ba2b27fb8d8a4131953cf1eab4dc9d63e35a513bcf5b34c8", "format": 1 }, { - "name": "plugins/modules/gcp_serviceusage_service.py", + "name": "plugins/modules/gcp_sourcerepo_repository.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8b23f4fb30906778fada86d2ea57defffa94eb96ceb18466d732ae43b4e6324b", + "chksum_sha256": "e72bc310963ed578a8a4983b75e553a87ead48748ea8eb74ae54673a757b9721", "format": 1 }, { - "name": "plugins/modules/gcp_compute_https_health_check.py", + "name": "plugins/modules/gcp_cloudscheduler_job.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "6673a022a15889781dbde02bca85bf3180a8105bd43fd9297068ed289f8ddf1b", + "chksum_sha256": "24c94607d50ad52344bfc6cba2f092c3d4b7f07ad6b8dfc15f4d8836331a58f3", "format": 1 }, { - "name": "plugins/modules/gcp_appengine_firewall_rule.py", + "name": "plugins/modules/gcp_runtimeconfig_config.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "944c165360d93482691cd3d5afdfbba1379ff290965b2aceaeba98d3f7824104", + "chksum_sha256": "6adbc517971dfe1fe13fd211ca5dc035bd7141e82009dcd863f595cf3e12222e", "format": 1 }, { - "name": "plugins/modules/gcp_kms_crypto_key_info.py", + "name": "plugins/modules/gcp_compute_target_vpn_gateway_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "aa3c3f2f8a86c1202350afbe6d9adb59fc64fa9629dbfc99b76d853870e7e359", + "chksum_sha256": "c3a01357acbf10f26c5d873a188105225f8eda6db1d9e7ed4da38613f1ea7e3d", "format": 1 }, { - "name": "plugins/modules/gcp_compute_target_vpn_gateway.py", + "name": "plugins/modules/gcp_compute_health_check_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "798dc93ec4f49d75e57e8e0d9996dc02a3fb5608bef9209f4bb7289ead5d2c89", + "chksum_sha256": "c941385099938190614b0f0f4bc80f070e0420925dd00cc91019c8f7f2fcdccf", "format": 1 }, { "name": "plugins/modules/gcp_compute_global_forwarding_rule_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "d01ec906237ece8e4fd04bd912e39587661bfcf97a73dea379b8a8b630948af5", + "chksum_sha256": "4c6df1f42f55e2db660fcacb2d4a28765aebb2d3855dd48ca7588a109eebdc3a", "format": 1 }, { - "name": "plugins/modules/gcp_compute_region_health_check_info.py", + "name": "plugins/modules/gcp_compute_target_https_proxy_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "60cffc80e47f7e51e1c941106956cb6902a558b443a17a5dae11e4b4107965c6", + "chksum_sha256": "c364cbf44efba6469f9bc723b9172ecb6834eaad6f91cda83373ad030429f9d8", "format": 1 }, { - "name": "plugins/modules/gcp_compute_forwarding_rule.py", + "name": "plugins/modules/gcp_filestore_instance.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "86962fe25a97183b45f86c77818f674c13a1547cbab6fff09a0e32778e640e44", + "chksum_sha256": "542aadfe5acbcf8168f8f259904927671f835d45150a23336222b2be1f9750f2", "format": 1 }, { - "name": "plugins/modules/gcp_compute_https_health_check_info.py", + "name": "plugins/modules/gcp_bigquery_dataset_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "1bc8050e51b93c78eea82acfe5f622e295ecd9e84d9d19e8b6b6eaf6c9277eae", + "chksum_sha256": "8adb86c40084debe7e596a4e4542680e1114fb68c3784db82c2d64401f8b4d41", "format": 1 }, { - "name": "plugins/modules/gcp_sql_database_info.py", + "name": "plugins/modules/gcp_compute_vpn_tunnel_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "08d2ae212a624fb6a7e1ac0ff7dc9b9804b31fe9396809ff91da491c6fc3b800", + "chksum_sha256": "99aa270f3f4d933f8467371a33818fbe9927934ad4b6ae8d1ca1383a1afe57c4", "format": 1 }, { - "name": "plugins/modules/gcp_compute_health_check.py", + "name": "plugins/modules/gcp_cloudtasks_queue_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "c528cd76836c2908cc222de8d79996576dda2e3f1d4fb0288751552d01d05a13", + "chksum_sha256": "022783b0552c155f9e79a6d3e01a4767f9a436f4fbf7bd3b821052ebeb11ee51", "format": 1 }, { - "name": "plugins/modules/gcp_cloudtasks_queue.py", + "name": "plugins/modules/gcp_compute_resource_policy_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "186ecd6c6012b3982241c458f72680d8c3a5444dfe052e5ff7e849d455e48505", + "chksum_sha256": "7a724ee92dcd7a53fbad020e79c067c3f1d6f035a67aaad636a3a801ca5f3e0a", "format": 1 }, { - "name": "plugins/modules/gcp_compute_disk.py", + "name": "plugins/modules/gcp_sql_database_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "48073238f74f69f1c2624ba2048d180ac86eb2b1cfee94ba86446d03692f57f8", + "chksum_sha256": "167c8000a662ab56699d35a2ecfbe2305288054b073fbff18c48a75e0f8c830d", "format": 1 }, { - "name": "plugins/modules/gcp_compute_vpn_tunnel_info.py", + "name": "plugins/modules/gcp_compute_instance_group.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "9c388ff414d60942e021fd2830c555d5183a15d389ab5fae37981c8dcca5e0f2", + "chksum_sha256": "6ad612724cf203734631d4bb964876c073bd5502c0d8093f51851cac788a550b", "format": 1 }, { - "name": "plugins/modules/gcp_compute_region_disk.py", + "name": "plugins/modules/gcp_bigquery_dataset.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "b3eb1a1996096236ae114ee1135aba9cbfebdfb5e7d938152747bb601750c940", + "chksum_sha256": "8d1e41eeb9046c490b2be4c9a955f3cd63d24fbf0c2c1fddd7af27c8b897f2a6", "format": 1 }, { - "name": "plugins/modules/gcp_resourcemanager_project_info.py", + "name": "plugins/modules/gcp_dns_resource_record_set_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "d3658e3fa78bbe389d8ef71c2d61a8900be321dddd5d0223fe140fab6cc3e291", + "chksum_sha256": "ec4d1d56a1a907df292fad9836bcd7cd9714d5eac358864e34ea0d409c686a30", "format": 1 }, { - "name": "plugins/modules/gcp_compute_ssl_policy_info.py", + "name": "plugins/modules/gcp_iam_service_account_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "b0afbf3ef220f11885d72feff3d965245a3f8860fa2149b54e8fe451886ad182", + "chksum_sha256": "c591cca58ab0c409b6679ac5a51d1b6ada41bcd49268c999e615f477dcccf383", "format": 1 }, { - "name": "plugins/modules/gcp_compute_http_health_check.py", + "name": "plugins/modules/gcp_compute_global_address_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "c2aeda17ecfd12326d6778bba02f7558321cb77b25eb006bc56f1deca9ee4354", + "chksum_sha256": "7e377c9ca2573212dd7344c42be69d2c4ad464be0ee750da08c3d46f2e8ad613", "format": 1 }, { - "name": "plugins/modules/gcp_container_cluster_info.py", + "name": "plugins/modules/gcp_compute_region_backend_service_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "cd5c59981d4f7b80198e4ff479bebb9082c2d04545471140816da89a6c7567a1", + "chksum_sha256": "d4bc70d7812053c0301ba49153e874d592efd92e495caf69d71c75177a9b5cdd", "format": 1 }, { - "name": "plugins/modules/gcp_compute_global_forwarding_rule.py", + "name": "plugins/modules/gcp_compute_region_backend_service.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "bc0ce169595d7b63b1893206fe83f98d6c53fb0d0d70156e1f2c082122291d6c", + "chksum_sha256": "86b50293baacebcf5d64841b9b6e7e40340718e8be5432d14412050a7b83eac5", "format": 1 }, { - "name": "plugins/modules/gcp_runtimeconfig_variable_info.py", + "name": "plugins/modules/gcp_sql_database.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "c42a542712e2f0047226ddc1244c996c0108f74c03f1dfc886dfd093d00ddd8d", + "chksum_sha256": "1b5231f50822b5e593b9417f8d283f7dd029f83dedaa1303649e6a28ede79a12", "format": 1 }, { - "name": "plugins/modules/gcp_compute_resource_policy.py", + "name": "plugins/modules/gcp_serviceusage_service_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "a807bd0c01fe0cffb099aac1ee60476159c352e2a39f7bb69d66bbc3f3ebf0ee", + "chksum_sha256": "3e9883636ec693b6ca9473f4c754334ee74b50e10744fe373ca827bcf8b27048", "format": 1 }, { - "name": "plugins/modules/gcp_compute_global_address.py", + "name": "plugins/modules/gcp_compute_region_autoscaler_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "cc0c116f19ec409c2f95d031a271c534a5350167555e1c6d9e674b345c3be6eb", + "chksum_sha256": "06dd145476a890c08489d4d5c709bed6b7043984912bc62bacb6616409d3dc9f", "format": 1 }, { - "name": "plugins/modules/gcp_compute_region_backend_service.py", + "name": "plugins/modules/gcp_tpu_node.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "df946bf40baaaa25351382af5ea48a3017282611cda0b960a0ac05e3a70047a9", + "chksum_sha256": "0e069010a33556de63c1a667c829f3ab49e372b788aa57281845c4b1176a8e4e", "format": 1 }, { - "name": "plugins/modules/gcp_compute_network_endpoint_group_info.py", + "name": "plugins/modules/gcp_compute_region_target_https_proxy_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "221b9904993d0434f93cbdfcee734f2b9ca148a5019222fe8098e003c89ecb5d", + "chksum_sha256": "32fafde779cf60a8527bdbc725e9df17a9ab17786a4464268904c9f1de0ad489", "format": 1 }, { - "name": "plugins/modules/gcp_container_node_pool.py", + "name": "plugins/modules/gcp_sql_ssl_cert.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "470a4316ba10646a2050124091be234de0362abd6978b9e0fe86d52dfcab4ec3", + "chksum_sha256": "3c28940eb48fae55af30c6093e780cef23184a6e8ada86bbef246541dd71a9ff", "format": 1 }, { - "name": "plugins/modules/gcp_compute_target_tcp_proxy.py", + "name": "plugins/modules/gcp_compute_network.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "310854b29f39bc69829963d7d73f8a6b77d870b22b858f43118ba494d94016e1", + "chksum_sha256": "41d81ebe76bf026ded729004ca1ace28e206482374b84300781db3ae8f7dd77d", "format": 1 }, { - "name": "plugins/modules/gcp_compute_region_target_https_proxy_info.py", + "name": "plugins/modules/gcp_compute_resource_policy.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "096294a091424761ed062a9bdaffc07bcf67481f3d0c3137ff8a404df59edba3", + "chksum_sha256": "3f94ec52d60ecc476dbdea3971f0e34312ea214d6e864ead9508308851ad2983", "format": 1 }, { - "name": "plugins/modules/gcp_spanner_instance_info.py", + "name": "plugins/modules/gcp_kms_crypto_key_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "97fdf8f0c4e0f8d556397658dd16e3f4943b0d7bdf691ffe10f534beb56894a4", + "chksum_sha256": "1fdb75aed8891171e1ad5081a398ceadea2171c8b96d1f07859e5aa265e3ccc7", "format": 1 }, { - "name": "plugins/modules/gcp_compute_snapshot.py", + "name": "plugins/modules/gcp_compute_backend_bucket.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "13b18e612e7b71e2410da8986e5a6a633aa88790bc59b7834baffdfdea190390", + "chksum_sha256": "1a2844a509a4a5e60087ccfd10b37456fbe79790e93ce13256dd52b5d686384f", "format": 1 }, { - "name": "plugins/modules/gcp_compute_url_map.py", + "name": "plugins/modules/gcp_compute_external_vpn_gateway.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "767ba27ce950710de7dc74302fadc3987e8665d8ebcf80f43c0f1111f12a72ef", + "chksum_sha256": "1d504ddee4ed2aafad54525394c1c90d531db5dd43ae288145fe701f6d6747cc", "format": 1 }, { - "name": "plugins/modules/gcp_sql_user_info.py", + "name": "plugins/modules/gcp_compute_external_vpn_gateway_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "9f4ff5ac20538a43d15df0fbf61bb42dcde8625c18dbd69deeb5fa6defee881d", + "chksum_sha256": "9a342eef8b8547049410cdf8095255d9857e1613c20abea5ee2bf2431d2df03f", "format": 1 }, { - "name": "plugins/modules/gcp_runtimeconfig_config.py", + "name": "plugins/modules/gcp_compute_region_autoscaler.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "a1533cfbf5e02250eefb09788dfc313933a18d865073aec04c5749410887b01b", + "chksum_sha256": "6311c33ce987d962ed9ea848c4952e5dfaf79e653961ecf99771b3ba6e27e8a5", "format": 1 }, { - "name": "plugins/modules/gcp_compute_instance_group_info.py", + "name": "plugins/modules/gcp_cloudfunctions_cloud_function_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "d04a88f3f5deac7507151e3a195b81725b1e8c6dda19afae353fc586b2165cd5", + "chksum_sha256": "337c0e9d6fec6317e8d5e8ab3c4bb950f76ab14bc9d8b1f316b9accacfa32bc5", "format": 1 }, { - "name": "plugins/modules/gcp_pubsub_topic_info.py", + "name": "plugins/modules/gcp_compute_snapshot_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "f01efa57582c96786b893484c7a70ed58429a33ab94ab18798d3771eff6ace1d", + "chksum_sha256": "908f511a08b6a9782c39bf32d74d4c2e3ce798db6b0e42aa1aae9ea113a5083a", "format": 1 }, { - "name": "plugins/modules/gcp_mlengine_version_info.py", + "name": "plugins/modules/gcp_compute_target_pool.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "ef70a84d3beead1aeb9deb1b7720c1e6f95cca19aeed7b5d2854bde3c4ebe7a2", + "chksum_sha256": "10b63a8cc17bcea43162669256f926195663ab34d01a16c7862149d0e66b32c0", "format": 1 }, { - "name": "plugins/modules/gcp_compute_backend_bucket.py", + "name": "plugins/modules/gcp_storage_bucket_access_control.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "c56d451340845865d8d0230a5b1d45a1da7effb19e7d703cdf885cf7a071ca2e", + "chksum_sha256": "84fa0f336a98baa0f16d1151c383c5f8344082d591f84e712d111b3d2a96b4f2", "format": 1 }, { - "name": "plugins/modules/gcp_kms_crypto_key.py", + "name": "plugins/modules/gcp_compute_subnetwork.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "cc510d2a3849b2a6f45180a6575c72b3d9b7fa6220f853e0bccc6b90a30308bc", + "chksum_sha256": "78b646726a3cb2049f9b90e739b4208438dea73715d1311438efef780da4de21", "format": 1 }, { - "name": "plugins/modules/gcp_pubsub_subscription.py", + "name": "plugins/modules/gcp_compute_target_http_proxy.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "2cd1bed127532483cb107f31297410318b70bc78a2694db5f3c6507f5d918d9c", + "chksum_sha256": "a63920c15b6e077a1d7055ef0aba050084b31221abbfd0dc0b4554df60afecd6", "format": 1 }, { - "name": "plugins/modules/gcp_compute_region_disk_info.py", + "name": "plugins/modules/gcp_compute_network_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "3570603d65866510303ddc1fe0ad0959a8b439c48716d86a09f0e755424cea72", + "chksum_sha256": "005f9611c53e273c547207796a4c404e167574966c3a4c7fe7aa1dc21492db10", "format": 1 }, { - "name": "plugins/modules/gcp_compute_region_url_map.py", + "name": "plugins/modules/gcp_pubsub_subscription_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "269e783576372f3bbb025dcddbb43c0e32e93a9a02424bdd0a2c66c8a0389ffb", + "chksum_sha256": "6084520418893bbf980fd7c36aee06d9dc1a435370fba1a9da2fb5fe4be644fa", "format": 1 }, { - "name": "plugins/modules/gcp_iam_role_info.py", + "name": "plugins/modules/gcp_cloudbuild_trigger.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "78998260369e56d527477fc3fc3140771a92b40882593a547726debbd44dd819", + "chksum_sha256": "49d93e62258357a8ce5664b1a07475a192eb61930fedcac5a0e89720e2a002b8", "format": 1 }, { - "name": "plugins/modules/gcp_storage_bucket.py", + "name": "plugins/modules/gcp_sql_user.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "b943137ee637ecf565e4b3c399d20089851c0630da8fb2449995cda0ef2502ae", + "chksum_sha256": "1322c2a98afe07730c53c6b43c6e620bca4f93d4176cf3ca984feed6c848d9e9", "format": 1 }, { - "name": "plugins/modules/gcp_runtimeconfig_config_info.py", + "name": "plugins/modules/gcp_compute_region_disk_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "2a8d22fdbad92bb29b0e04c766ac44a749c082623c3237c7f3fc26dd426ce484", + "chksum_sha256": "b84a59a23c8178147a1dc47cfb55fef2b7855704ab09f4a52af7d47678c61c26", "format": 1 }, { - "name": "plugins/modules/gcp_compute_node_group.py", + "name": "plugins/modules/gcp_compute_disk.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "9e9cae58d67aff9b2e969ff332bd0f58718e2076de7d6652d89ec04a4eae5e21", + "chksum_sha256": "f6fb8fdd002854cb4cf571592bf6d1eb74c8f11af46ba13ecda64b33c8d13b61", "format": 1 }, { - "name": "plugins/modules/gcp_mlengine_version.py", + "name": "plugins/modules/gcp_kms_key_ring.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "889f11d14745285d66f25d41784dd6843a760bc35ad37bec6bfbb138be6db2de", + "chksum_sha256": "078966de09858e0ea988943fb952e89ff3a02354d7167b6167476347471c75f6", "format": 1 }, { - "name": "plugins/modules/gcp_appengine_firewall_rule_info.py", + "name": "plugins/modules/gcp_compute_region_target_http_proxy.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "c14b24a28343e901dc03a207818fc99785e84ac8282f968dbb1a3b76f3f38053", + "chksum_sha256": "58deab429b948e92f31e6cf3690f41ffcece4e4ec970750697cea5677cc71c38", "format": 1 }, { - "name": "plugins/modules/gcp_sql_user.py", + "name": "plugins/modules/gcp_mlengine_model_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "1f324c85ebc45da728495fc2952360cb0f726304ad882cb917924b0cb7568228", + "chksum_sha256": "b6ecc10584a07a2950f228f2b75838d02c28cf29ecf146eea9a354913453ef05", "format": 1 }, { - "name": "plugins/modules/gcp_spanner_database_info.py", + "name": "plugins/modules/gcp_compute_https_health_check.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "4467edc8d381c8b93feac3350922b80a811880aa6702a82c10d1c77660e31172", + "chksum_sha256": "845d82a0cafd55d694b46baa86913c248ce953f4a1e713c3cadef6b9b1dc45c4", "format": 1 }, { - "name": "plugins/modules/gcp_cloudfunctions_cloud_function.py", + "name": "plugins/modules/gcp_compute_node_template_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "c4f99156f6271ee27c4a171e969cfc65cbb218ff8ff86f84e53643534d7b1185", + "chksum_sha256": "d920d1ef0c6e1d0c1fd6fbb14b07fb5a1a26dd8e58a902c684ab1a57abebab30", "format": 1 }, { - "name": "plugins/modules/gcp_compute_region_autoscaler_info.py", + "name": "plugins/modules/gcp_compute_forwarding_rule.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "27ee339705fd66c48858646e61ef667a38f161fc6acdc39e58cf91f8c621304b", + "chksum_sha256": "355f8ade219e374968971124d978ba97b8daed895f73b1f070621911918cdeb4", "format": 1 }, { - "name": "plugins/modules/gcp_compute_global_address_info.py", + "name": "plugins/modules/gcp_compute_url_map.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "0ee379a396e222a2ad67a2fd377a31db18a410526b19846f3f61cfc247dde600", + "chksum_sha256": "09332a7cf89139c071f9c79ccefc31e6d7f936eb5bdfa47bb6f1f73ff71aa57a", "format": 1 }, { - "name": "plugins/modules/gcp_compute_node_template_info.py", + "name": "plugins/modules/gcp_compute_address.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "f89643f14e739071fec8ea94dc6e418f70aa03d96cdbf1e8b0be62c949316072", + "chksum_sha256": "d2f29b2590bb706fbfa334d75f9282e5764241275c5f8398073934deda90b6e7", "format": 1 }, { - "name": "plugins/modules/gcp_bigquery_dataset_info.py", + "name": "plugins/modules/gcp_compute_region_url_map_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e9c024f32a31340bbc18843402db367ca033b7dcf3d0de9a8de4756f60ec87a0", + "chksum_sha256": "9608a8fdfdeed523286ae682ff0c07a6ec8dd1ed717935f08d8ad517b488e817", "format": 1 }, { - "name": "plugins/modules/gcp_mlengine_model.py", + "name": "plugins/modules/gcp_compute_node_template.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "dc4a18d4e9df024c7d946c676e9f02d0a9ab0ffc0d8b66c3e5cb050ea1c4bdff", + "chksum_sha256": "262cb30e5295ceb2f1ca73f6168c7bfb1fcf546a84b78b8c982f428764b57b33", "format": 1 }, { - "name": "plugins/modules/gcp_compute_external_vpn_gateway_info.py", + "name": "plugins/modules/gcp_runtimeconfig_variable.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "04ce9f5704fe46bd571cb89e91277824563a5167831bb10e1bbdc6d24a6eea03", + "chksum_sha256": "a83a034253c8df2df3be673965c210d98daa38ca67ef3e3388a89a690eeae084", "format": 1 }, { - "name": "plugins/modules/gcp_compute_snapshot_info.py", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "2e399cd3a3b42e1c7bf798d3857be61ab8646bb1cec3c2173e7f921108bd7730", + "name": "plugins/doc_fragments", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "plugins/modules/gcp_pubsub_subscription_info.py", + "name": "plugins/doc_fragments/gcp.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "adebfa68696203b7c0dbaec10dbd1d49ba91e7f9aef4eb9276f376babc47e191", + "chksum_sha256": "49b16d5d3cdb515792f2b3df7ab676d5f2584f54b2d6f2e47e7c6e93560e1572", "format": 1 }, { - "name": "plugins/modules/gcp_sql_database.py", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "24e16f17849d0a9c329c20ec6ff72c1368cac7f9115ef13d1cd3c39390ed8736", + "name": "plugins/filter", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "plugins/modules/gcp_compute_target_https_proxy_info.py", + "name": "plugins/filter/gcp_kms_filters.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "1db67fbf72eb04fd24525568474e5302c59ce396bb5adc661c8788718ec577e5", + "chksum_sha256": "62a6cc6469714f45d98596ac510777868e1028b4d7f7a7b5a1ba2aa45e52933e", "format": 1 }, { - "name": "plugins/modules/gcp_compute_backend_service.py", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "2396dac990ab00d951875d90fa8628489297e4344c4bd077c5ccd1a85e78f011", + "name": "plugins/module_utils", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "plugins/modules/gcp_compute_target_tcp_proxy_info.py", + "name": "plugins/module_utils/gcp_utils.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8a4cfd11bae5a78f1311186e8d3994d86e25213cfcd9dfeba37def5140c283fb", + "chksum_sha256": "10fd2ea88c4db12de853b29919d44f38011234ee9a45577904df14ff4a48df52", "format": 1 }, { - "name": "plugins/modules/gcp_compute_autoscaler_info.py", + "name": ".ansible-lint", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "00422bb0193ce5458b34f804056e15a42b8efcb7e27103437aa17021449ee909", + "chksum_sha256": "39feb603f8a1728415020e55621bedc363dbf7942d06aac99d7c5c81208e5132", "format": 1 }, { - "name": "plugins/modules/gcp_sql_instance.py", + "name": ".gitmodules", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "a3339ad2a4295761b9ab945e7a9840aa41974e320234608610c223b02cb0d616", + "chksum_sha256": "15d86ac1fb9c04f919875abab5cf78444795e93fc0b8319c0aba72e4cf8bb2a6", "format": 1 }, { - "name": "plugins/modules/gcp_compute_interconnect_attachment.py", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "7a25efa704ffd995190e721025230acdd6bdf3b67057e5b436b98de38ccb3c60", + "name": ".vscode", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "plugins/modules/gcp_compute_firewall_info.py", + "name": ".vscode/settings.json", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "04a18838a7bd264618dcc675785d28db7b52373e941bc2403e2a9f1d52044727", + "chksum_sha256": "d1be9315fe97520591ad6aca56c5b6ee625d3d2c84633de40f0f0afcc13a12a1", "format": 1 }, { - "name": "plugins/modules/gcp_tpu_node_info.py", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "e967abeae865ba72decabe648938b7a7db82cf5b634affff2985a882a6d6eb35", + "name": "roles", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "plugins/modules/gcp_compute_target_vpn_gateway_info.py", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "a29f3cd1baf53ccf522e109ed5b281b1366bdecd9f97ab7c861f5968ebd41749", + "name": "roles/gcsfuse", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "plugins/modules/gcp_cloudfunctions_cloud_function_info.py", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "338f1c3c6c4484898d39f89a0e5e81638ec6f2924050e7e5d244e76a35b1dda7", + "name": "roles/gcsfuse/tasks", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "plugins/modules/gcp_compute_reservation.py", + "name": "roles/gcsfuse/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "13e63ec0e9b1afb564235662eebfcc7e3a6db92633ac47d457d7f49f57fa2c19", + "chksum_sha256": "eb596bb164b1e6de5bb4311afdb5c089d4c510496852cba8cd4bbab9ec16a1d0", "format": 1 }, { - "name": "plugins/modules/gcp_bigtable_instance_info.py", + "name": "roles/gcsfuse/tasks/debian.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "b81f3df1e212f2d13c1d86ab901f59dd77004fe5103d7db2cf21c1cd80a9b331", + "chksum_sha256": "56ca0e595d3bf5e3a812008b467e84dbf5fc0c766773a8f1ab0914b7bbdf91e9", "format": 1 }, { - "name": "plugins/modules/gcp_compute_region_target_http_proxy_info.py", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "382f61b45d93779dc57e20bce76ca9977da61585be1af8185472864f78f1de2d", + "name": "roles/gcsfuse/meta", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "plugins/modules/gcp_compute_target_https_proxy.py", + "name": "roles/gcsfuse/meta/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "25f49a8c2ea219983eaf3c9373991e0c979aeaa347d2846eaf167874863a4e9d", + "chksum_sha256": "a88bfa311596bf887962c34be6eae17e598b3c14bb973a239bb21934cfaaa444", "format": 1 }, { - "name": "plugins/modules/gcp_compute_region_health_check.py", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "c609bd188fbaf5cf15fdd4c438a496a1684d5d5ce15e45448ce69d696b689bf9", + "name": "roles/gcsfuse/defaults", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "plugins/modules/gcp_cloudbuild_trigger.py", + "name": "roles/gcsfuse/defaults/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "bad8598942ca7a008b6ae17f3056d56f0bec56994e4a8e0b15cf108cf4030e59", + "chksum_sha256": "680a1514fdbeae910661c7c44bd0dbf7e254b61e78f2c35bab61d5a43a928baf", "format": 1 }, { - "name": "plugins/modules/gcp_redis_instance_info.py", + "name": "roles/gcsfuse/README.md", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "390609cfc64b89e79f7c50c0f5415a54d0ea5ad767deb2d21dff18bc036b43ce", + "chksum_sha256": "34c69736a29bf57b2000acc4db084d253df1c98bfe1d7ec2514838897574dd05", "format": 1 }, { - "name": "plugins/modules/gcp_compute_network_endpoint_group.py", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "c2d24a45408fd9a1c9480f5c6d48d1740faea8a35bbf144561f81178ffcef961", + "name": "roles/gcsfuse/vars", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "plugins/modules/gcp_bigquery_table_info.py", + "name": "roles/gcsfuse/vars/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "94adfaba7dbcc8959fa03e9c18c0922f5a8e8bce4aad3c42c38076c564ca0039", + "chksum_sha256": "a505a2742e0c7b2937368440a796503791485c999a4b9fd6f0e90715b2af8fa2", "format": 1 }, { - "name": "plugins/modules/gcp_dns_managed_zone_info.py", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "1d99c7531f01c8c702bb3e56d18d2d0b4525b66ec25a22782d4ee49c5487f199", + "name": "roles/gcsfuse/handlers", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "plugins/modules/gcp_compute_subnetwork_info.py", + "name": "roles/gcsfuse/handlers/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8f2c4d04c0665b47481eb226bf2ed53215b93f3e9de617777da1f148268b721c", + "chksum_sha256": "06f6404a01fe05252d5834e091751bde4d8d2272274e712f01ad455942285f6b", "format": 1 }, { - "name": "plugins/modules/gcp_compute_network_info.py", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "839e763dce177f84f4896da9b76c9541948c2fa2938406a0c6988c28f71dafef", + "name": "roles/gcp_http_lb", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "plugins/modules/gcp_compute_region_target_https_proxy.py", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "e2ac7c2d8e1545d9891a408f0dfb3ee7759ba8dc343ef51e88b01576261a9b66", + "name": "roles/gcp_http_lb/tasks", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "plugins/modules/gcp_spanner_database.py", + "name": "roles/gcp_http_lb/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "75b88d66347cc0e35983eac94e27df7eb9fa4ed20c1a5916c7cd0298896bd170", + "chksum_sha256": "3450f6de0d80b96cb4d795c8361d2b0ae2771d03b77bc94b654169331ae95be1", "format": 1 }, { - "name": "plugins/modules/gcp_compute_route_info.py", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "91be38a6928f4511cf87861df03546b51e30d10d6fa5dcba16c16f0c49a3618d", + "name": "roles/gcp_http_lb/meta", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "plugins/modules/gcp_iam_service_account_info.py", + "name": "roles/gcp_http_lb/meta/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "4412201be31d964ef295bdeb287419f92738b40dd669fbab8427985a6dc522bd", + "chksum_sha256": "f157ed746f4b993f9d6fa60f52b51a85a288846851944bb2e2e4b0bad5dd786f", "format": 1 }, { - "name": "plugins/modules/gcp_dns_resource_record_set.py", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "2fc9439e625dd3a8bef43396cbfd1d915a7533ad7848e61393217178fe690e2c", + "name": "roles/gcp_http_lb/defaults", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "plugins/modules/gcp_bigquery_dataset.py", + "name": "roles/gcp_http_lb/defaults/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "120781767411c3fe7bfb089d5191a990257f9f9ba99dc389d94f6d453bdcf6f6", + "chksum_sha256": "d0e023bea4e519cb6fbff5ef68e46512601b804d2ed162822500587d6e3d8814", "format": 1 }, { - "name": "plugins/modules/gcp_storage_bucket_access_control.py", + "name": "roles/gcp_http_lb/README.md", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "d97c33511197d8e5fc56a0d8cc634de1a827b9bd00fac0a2f27bbe524513e1cd", + "chksum_sha256": "29e80b82e25d1ede84f5bc37385c72b50ecc0d6f72dcc26bd1692975602cd394", "format": 1 }, { - "name": "plugins/modules/gcp_compute_instance_template_info.py", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "7d2bcc171568499db088a4f7c4144bbccd775a68b18729d032642524d97fe7a7", + "name": "roles/gcp_http_lb/tests", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "plugins/modules/gcp_sourcerepo_repository_info.py", + "name": "roles/gcp_http_lb/tests/inventory", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "ba4f8bcf2b4dc75d1bd46183b931a1ff47db755c76ef8d0a5a426ce0a4ed1e59", + "chksum_sha256": "e02233819b1a09844410549191813f7cc7ba360f21298578f4ba1727a27d87fc", "format": 1 }, { - "name": "plugins/modules/gcp_compute_target_instance_info.py", + "name": "roles/gcp_http_lb/tests/test.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "964d39c1665192a2d62482f9934e50a2f347b42291d8f6d353cddb923312be8f", + "chksum_sha256": "8f9ba46442893a9daa93ab20d6b27faa349008c8edaf4631516b3d3e3d24c510", "format": 1 }, { - "name": "plugins/modules/gcp_logging_metric_info.py", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "7689e67ec920cbbd9d25bfe7a4864baf596b8f658890d30c0642e16b091cfda8", + "name": "roles/gcp_http_lb/vars", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "plugins/modules/gcp_compute_resource_policy_info.py", + "name": "roles/gcp_http_lb/vars/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "5d533f8aa91ad74364e68f740840c79c313d7661a51916d541a27963a535fb68", + "chksum_sha256": "87f8a34e1373c524be49c25c84999bd89d3a1ba732d29b356591f7dbcde134b8", "format": 1 }, { - "name": "plugins/modules/gcp_sourcerepo_repository.py", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "e5727a11bd4456e4325a5e1c2960844beb64c61d187e5eb3b30571466039fe8e", + "name": "roles/gcloud", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "plugins/modules/gcp_compute_health_check_info.py", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "cb5f33fb8811ac5e126fe7c5ccc4de2ddcae3ecabc5f682ad5fea2dbfc15e07a", + "name": "roles/gcloud/tasks", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "plugins/modules/gcp_compute_region_autoscaler.py", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "2325cedb8b276d629dd1794a0e21bd3a5349ad7b73ce8ad299d779195a9aa895", + "name": "roles/gcloud/tasks/archive", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "plugins/modules/gcp_compute_interconnect_attachment_info.py", + "name": "roles/gcloud/tasks/archive/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "c9482174981c6d959c593d841151e7edf5c9a26be0ff6a8a10289d23c51fae9c", + "chksum_sha256": "f3f64c25cd9218a4bf3a678d3ed4bde5b1fdfbd321a8af501c7e46c19c81473e", "format": 1 }, { - "name": "plugins/modules/gcp_bigtable_instance.py", + "name": "roles/gcloud/tasks/archive/command_completion.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "84d1ee4078cc20023cb8440aa31ca7e1d20e2031e61a478bea9609d4b8f5b7de", + "chksum_sha256": "a059802471bdfffbcea23c71a4110672848c4da40cbef52f891fc953d4dcb0fd", "format": 1 }, { - "name": "plugins/modules/gcp_compute_region_target_http_proxy.py", + "name": "roles/gcloud/tasks/archive/archive_install.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "614594990f138e3b55f7977f0f4bca29840ea2cda31dd7398c6c70661f42e66c", + "chksum_sha256": "5106c5899692e973e711cb7085153a47ca6b6822ca5bd8dbf5daf29e78c308bb", "format": 1 }, { - "name": "plugins/modules/gcp_spanner_instance.py", + "name": "roles/gcloud/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "9bd50b0fc0b598228095d635ef9bda39bbf1ffac9dc6f29470ed6256fd3ce8ff", + "chksum_sha256": "2b5eb27d74d6f1ef1371c2c81796508b9eb30ab3d5b65f374db9a52ffb4f7a14", "format": 1 }, { - "name": "plugins/modules/gcp_compute_url_map_info.py", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "7e57b4e3294940914122054114f1616970eaaad934ea528a5f010ce3027f9cdf", + "name": "roles/gcloud/tasks/package", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "plugins/modules/gcp_compute_reservation_info.py", + "name": "roles/gcloud/tasks/package/redhat.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "429db4ce816a3ad769e8422337c977059e9c29bb6dfc25bf4256efe596576056", + "chksum_sha256": "d2a229dd16400499d5b482d0417df90360c4259c12305fef1d88fdaeef5dacaf", "format": 1 }, { - "name": "plugins/modules/gcp_compute_target_ssl_proxy_info.py", + "name": "roles/gcloud/tasks/package/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "169ae16e04743e8eb888aa6f0a0c45d9e9f63315498659501c29d9df8deaefa6", + "chksum_sha256": "2b9c557c35ced987ae9d263b72459db3fa72243aab3d480e61abb0ca2863b002", "format": 1 }, { - "name": "plugins/modules/gcp_compute_image.py", + "name": "roles/gcloud/tasks/package/debian.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "df5ff8f7175c8283b1cbab625ba4143c0714429d1b6ca0145e326e91dd159ed2", + "chksum_sha256": "c4ba699bb2d47c73c9ba8d58b7cfd5e53930e4b5280de5ab04b39b80f105225f", "format": 1 }, { - "name": "plugins/module_utils", + "name": "roles/gcloud/meta", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "plugins/module_utils/gcp_utils.py", + "name": "roles/gcloud/meta/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8f82bcc0455283205eda855c388b128d42cff71baadb57ad5bf4de764e98f2c6", + "chksum_sha256": "a9876e09039be32c4e13c914fc6957a8cbeaeb298171ba0ba13dff96e30eaaa0", "format": 1 }, { - "name": "plugins/filter", + "name": "roles/gcloud/defaults", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "plugins/filter/gcp_kms_filters.py", + "name": "roles/gcloud/defaults/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "5ea7f176120e21c2d1064e534b72c55f83d38d6535ae7752531d3e75a532d1c0", + "chksum_sha256": "13431c8a6a6bdc94bada2120d5f83b6a21d9352301de938bcf0b48ed5f61e557", "format": 1 }, { - "name": "plugins/doc_fragments", + "name": "roles/gcloud/README.md", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "700db6e9116d4b65967d2e9c33acd233996a07fed6cc5fd3575f6f100b205ee0", + "format": 1 + }, + { + "name": "roles/gcloud/vars", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "plugins/doc_fragments/gcp.py", + "name": "roles/gcloud/vars/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "20730a43ed49d21639f60e2a44df0fc3954fb81dd1a36491ae14e751f195aa7b", + "chksum_sha256": "f52d711103d50a437830c6fbcd04fb4bab49a0f82f6d26d1c791c6e8488dd090", "format": 1 }, { - "name": ".ansible-lint", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "39feb603f8a1728415020e55621bedc363dbf7942d06aac99d7c5c81208e5132", + "name": "molecule", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": ".github", + "name": "molecule/gcsfuse", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": ".github/workflows", + "name": "molecule/gcsfuse/tests", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": ".github/workflows/ansible-test.yml", + "name": "molecule/gcsfuse/tests/test_default.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "5e65cc28791b3cc37ee0742d7d76b77844ea638d5975ecd350531cf8a3068fb7", + "chksum_sha256": "cb6e9becf8f75159ef50057058047caddd7ec06fd07f9ea7237eb0c3f822a198", "format": 1 }, { - "name": ".github/workflows/automationhub.yml", + "name": "molecule/gcsfuse/molecule.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "f67d130a99b08ede42b8070db99ea915e27f0ba8ff114bce98155632575b7ebe", + "chksum_sha256": "f1d656adaa6be9e41b73bc3a4a8b4798773ff66d5f535f86e4ee15c3d86843b8", "format": 1 }, { - "name": ".github/workflows/ansible-integration-tests.yml", + "name": "molecule/gcsfuse/Dockerfile.j2", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "951744f42efdb6d051a7ebdde068f6b69d66282d45961afa4577e48d0e98f32d", + "chksum_sha256": "5ef978855099e5b5118cb1198a2e27d5745c4a358670ba2e10d9004ce29c0324", "format": 1 }, { - "name": ".github/workflows/pythonpublish.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "c529e2810ae1f02ea98dcae1b78241d21a5988496ed5389b2ce8c37395323756", + "name": "molecule/gcsfuse/files", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": ".github/workflows/gcsfuse.yml", + "name": "molecule/gcsfuse/files/override.conf", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "3ce92a6d1bccc65db96fdae392a7b1e28d4a5df447094a88edab8275cd78c778", + "chksum_sha256": "27d57701a92b623757711f18aeba17f089df44c13cead5caca41418a62804d89", "format": 1 }, { - "name": ".github/workflows/gcloud.yml", + "name": "molecule/gcsfuse/verify.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e38b58e6cb896b3d6dbcc8f73caea012fe85f7420fa5a3c3e70ad7f0fb422712", + "chksum_sha256": "9aa5a08d70fea740d73c3c560dae4a7fc5166c486f24ac8739f2abb88bacc82f", "format": 1 }, { - "name": "CHANGELOG.rst", + "name": "molecule/gcsfuse/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "c489ae5526e7ac9bb7ae976994f82d5f39e005a0e95cc68da1f57ad5b6868b03", + "chksum_sha256": "b246124da724132200d8ce9cb76178abb483a5ae5c291d11fd44ea77d29e7146", "format": 1 }, { - "name": "requirements-test.txt", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "163167a063d01a440c2a19fa5879655d8b78378463fb825713de832f822738f6", + "name": "molecule/gcloud", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "meta", + "name": "molecule/gcloud/tests", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "meta/runtime.yml", + "name": "molecule/gcloud/tests/test_default.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "9008b0f78cfbe63b9d9f47b2c26d88f28978416ffdf5cd89624880285661e4f6", + "chksum_sha256": "cb6e9becf8f75159ef50057058047caddd7ec06fd07f9ea7237eb0c3f822a198", "format": 1 }, { - "name": "tests", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "molecule/gcloud/molecule.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "f1d656adaa6be9e41b73bc3a4a8b4798773ff66d5f535f86e4ee15c3d86843b8", "format": 1 }, { - "name": "tests/integration", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "molecule/gcloud/package_playbook.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "501d76e7d8b292e055fcd137a589296943709369a735e5b483d428e03beed38b", "format": 1 }, { - "name": "tests/integration/targets", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "molecule/gcloud/Dockerfile.j2", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "5ef978855099e5b5118cb1198a2e27d5745c4a358670ba2e10d9004ce29c0324", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_vpn_tunnel", + "name": "molecule/gcloud/files", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_vpn_tunnel/defaults", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "molecule/gcloud/files/override.conf", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "27d57701a92b623757711f18aeba17f089df44c13cead5caca41418a62804d89", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_vpn_tunnel/defaults/main.yml", + "name": "molecule/gcloud/archive_playbook.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", + "chksum_sha256": "f20365002e8801786c96e091c01e590dc15f32e652450a19571f42d5ebc8ec9c", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_vpn_tunnel/tasks", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "molecule/gcloud/verify.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "9aa5a08d70fea740d73c3c560dae4a7fc5166c486f24ac8739f2abb88bacc82f", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_vpn_tunnel/tasks/autogen.yml", + "name": "molecule/gcloud/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "125165d5e69d45ec8d5bd45a4db2cde395c5ada9cb6d713a5243ae83f697acd3", + "chksum_sha256": "fdb3bfc44f5c9530089d17c793cd7848e5e07bd7202e3e4fb7f4a382b1f0c410", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_vpn_tunnel/tasks/main.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10", + "name": "tests", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_vpn_tunnel/aliases", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "5dab10dc09ed5cb445c47bfd67629b39efb7bd68e65e6b773896a8eb507d588e", + "name": "tests/unit", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_vpn_tunnel/meta", + "name": "tests/unit/plugins", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_vpn_tunnel/meta/main.yml", + "name": "tests/unit/plugins/test_gcp_utils.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", + "chksum_sha256": "7cea31c6d0b65046d03d34a1409bd12e5f2bc059002e1fa8ca0535a3a3a242f2", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_region_backend_service", + "name": "tests/integration", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_region_backend_service/defaults", + "name": "tests/integration/targets", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_region_backend_service/defaults/main.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", - "format": 1 - }, - { - "name": "tests/integration/targets/gcp_compute_region_backend_service/tasks", + "name": "tests/integration/targets/gcp_compute_target_tcp_proxy", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_region_backend_service/tasks/autogen.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "8304b14c2b1b735a17046cc40273117676f6a82dc3cfbb680a44256ed80a6f34", + "name": "tests/integration/targets/gcp_compute_target_tcp_proxy/tasks", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_region_backend_service/tasks/main.yml", + "name": "tests/integration/targets/gcp_compute_target_tcp_proxy/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10", + "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_region_backend_service/aliases", + "name": "tests/integration/targets/gcp_compute_target_tcp_proxy/tasks/autogen.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", + "chksum_sha256": "db0ba1515a39f1709e3cbffe3c48a86c7195f052dfd80f6e6e99c4f4e47702f7", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_region_backend_service/meta", + "name": "tests/integration/targets/gcp_compute_target_tcp_proxy/meta", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_region_backend_service/meta/main.yml", + "name": "tests/integration/targets/gcp_compute_target_tcp_proxy/meta/main.yml", "ftype": "file", "chksum_type": "sha256", "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "tests/integration/targets/gcp_pubsub_topic", + "name": "tests/integration/targets/gcp_compute_target_tcp_proxy/defaults", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_pubsub_topic/defaults", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "tests/integration/targets/gcp_compute_target_tcp_proxy/defaults/main.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", "format": 1 }, { - "name": "tests/integration/targets/gcp_pubsub_topic/defaults/main.yml", + "name": "tests/integration/targets/gcp_compute_target_tcp_proxy/aliases", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", + "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", "format": 1 }, { - "name": "tests/integration/targets/gcp_pubsub_topic/tasks", + "name": "tests/integration/targets/gcp_dns_resource_record_set", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_pubsub_topic/tasks/autogen.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "3fea3370df0004d72f1caf5b5be4a8c43905b7d09781a0d1d26c8eeaad6c4789", + "name": "tests/integration/targets/gcp_dns_resource_record_set/tasks", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_pubsub_topic/tasks/main.yml", + "name": "tests/integration/targets/gcp_dns_resource_record_set/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10", + "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5", "format": 1 }, { - "name": "tests/integration/targets/gcp_pubsub_topic/aliases", + "name": "tests/integration/targets/gcp_dns_resource_record_set/tasks/autogen.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", + "chksum_sha256": "fd993acf9e029ccd0f8ad3a52bdbe32d6fc5bfec420452d9757a7df10ff728f8", "format": 1 }, { - "name": "tests/integration/targets/gcp_pubsub_topic/meta", + "name": "tests/integration/targets/gcp_dns_resource_record_set/meta", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_pubsub_topic/meta/main.yml", + "name": "tests/integration/targets/gcp_dns_resource_record_set/meta/main.yml", "ftype": "file", "chksum_type": "sha256", "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_node_template", + "name": "tests/integration/targets/gcp_dns_resource_record_set/defaults", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_node_template/defaults", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "tests/integration/targets/gcp_dns_resource_record_set/defaults/main.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_node_template/defaults/main.yml", + "name": "tests/integration/targets/gcp_dns_resource_record_set/aliases", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", + "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_node_template/tasks", + "name": "tests/integration/targets/gcp_compute_node_template", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_node_template/tasks/autogen.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "9d9acc79e76e0925f9a7b77ae030609d10cbbda8357bb5b25e043a83cde2f90d", + "name": "tests/integration/targets/gcp_compute_node_template/tasks", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { "name": "tests/integration/targets/gcp_compute_node_template/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10", + "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_node_template/aliases", + "name": "tests/integration/targets/gcp_compute_node_template/tasks/autogen.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", + "chksum_sha256": "576863f752cf25f6fb17189414f1f6604b6036635fb73264aa5166579b82d30d", "format": 1 }, { @@ -2115,808 +2045,808 @@ "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_disk", + "name": "tests/integration/targets/gcp_compute_node_template/defaults", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_disk/defaults", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "tests/integration/targets/gcp_compute_node_template/defaults/main.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_disk/defaults/main.yml", + "name": "tests/integration/targets/gcp_compute_node_template/aliases", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", + "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_disk/tasks", + "name": "tests/integration/targets/gcp_bigquery_dataset", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_disk/tasks/autogen.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "3457bb7071395c9872657cca634c25033d9da297124e98312417ea653cfc80e4", + "name": "tests/integration/targets/gcp_bigquery_dataset/tasks", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_disk/tasks/main.yml", + "name": "tests/integration/targets/gcp_bigquery_dataset/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10", + "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_disk/aliases", + "name": "tests/integration/targets/gcp_bigquery_dataset/tasks/autogen.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", + "chksum_sha256": "117819fa109c7918ba9db3e8cd3b88bc0abea7cbe992a9fb69b6b3ec762a8719", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_disk/meta", + "name": "tests/integration/targets/gcp_bigquery_dataset/meta", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_disk/meta/main.yml", + "name": "tests/integration/targets/gcp_bigquery_dataset/meta/main.yml", "ftype": "file", "chksum_type": "sha256", "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "tests/integration/targets/gcp_spanner_database", + "name": "tests/integration/targets/gcp_bigquery_dataset/defaults", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_spanner_database/defaults", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "tests/integration/targets/gcp_bigquery_dataset/defaults/main.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", "format": 1 }, { - "name": "tests/integration/targets/gcp_spanner_database/defaults/main.yml", + "name": "tests/integration/targets/gcp_bigquery_dataset/aliases", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", + "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", "format": 1 }, { - "name": "tests/integration/targets/gcp_spanner_database/tasks", + "name": "tests/integration/targets/gcp_compute_subnetwork", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_spanner_database/tasks/autogen.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "ab15b6bea0e4bc93955da80d06bcc325b1feb51eb1bc125e0519094527764e53", + "name": "tests/integration/targets/gcp_compute_subnetwork/tasks", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_spanner_database/tasks/main.yml", + "name": "tests/integration/targets/gcp_compute_subnetwork/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10", + "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5", "format": 1 }, { - "name": "tests/integration/targets/gcp_spanner_database/aliases", + "name": "tests/integration/targets/gcp_compute_subnetwork/tasks/autogen.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "9f5067f13c39b7c91589302770901c2874dc75ad06ef130a9d3af5e72118c4e8", + "chksum_sha256": "82de034e79aa6aa07b9055d8034e536a72f8aa4de83057f40236225449eefcfe", "format": 1 }, { - "name": "tests/integration/targets/gcp_spanner_database/meta", + "name": "tests/integration/targets/gcp_compute_subnetwork/meta", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_spanner_database/meta/main.yml", + "name": "tests/integration/targets/gcp_compute_subnetwork/meta/main.yml", "ftype": "file", "chksum_type": "sha256", "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_address", + "name": "tests/integration/targets/gcp_compute_subnetwork/defaults", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_address/defaults", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "tests/integration/targets/gcp_compute_subnetwork/defaults/main.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_address/defaults/main.yml", + "name": "tests/integration/targets/gcp_compute_subnetwork/aliases", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", + "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_address/tasks", + "name": "tests/integration/targets/gcp_compute_ssl_certificate", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_address/tasks/autogen.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "2eb5441988c85493d07e633b7c5fe9ea6e1b5e48e2e5b0b21f4bfd0996c7d3df", + "name": "tests/integration/targets/gcp_compute_ssl_certificate/tasks", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_address/tasks/main.yml", + "name": "tests/integration/targets/gcp_compute_ssl_certificate/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10", + "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_address/aliases", + "name": "tests/integration/targets/gcp_compute_ssl_certificate/tasks/autogen.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", + "chksum_sha256": "e91262b16e72168fb3fc8a53729cb046d04014fcfcf3dd42e0d02eb7d495bd29", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_address/meta", + "name": "tests/integration/targets/gcp_compute_ssl_certificate/meta", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_address/meta/main.yml", + "name": "tests/integration/targets/gcp_compute_ssl_certificate/meta/main.yml", "ftype": "file", "chksum_type": "sha256", "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "tests/integration/targets/gcp_appengine_firewall_rule", + "name": "tests/integration/targets/gcp_compute_ssl_certificate/defaults", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_appengine_firewall_rule/defaults", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "tests/integration/targets/gcp_compute_ssl_certificate/defaults/main.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", "format": 1 }, { - "name": "tests/integration/targets/gcp_appengine_firewall_rule/defaults/main.yml", + "name": "tests/integration/targets/gcp_compute_ssl_certificate/aliases", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", + "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", "format": 1 }, { - "name": "tests/integration/targets/gcp_appengine_firewall_rule/tasks", + "name": "tests/integration/targets/gcp_compute_target_ssl_proxy", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_appengine_firewall_rule/tasks/autogen.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "7298f7de86c07d56f1e1664106b767e2666b040ead334ebe948fec0035218354", + "name": "tests/integration/targets/gcp_compute_target_ssl_proxy/tasks", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_appengine_firewall_rule/tasks/main.yml", + "name": "tests/integration/targets/gcp_compute_target_ssl_proxy/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10", + "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5", "format": 1 }, { - "name": "tests/integration/targets/gcp_appengine_firewall_rule/aliases", + "name": "tests/integration/targets/gcp_compute_target_ssl_proxy/tasks/autogen.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", + "chksum_sha256": "c7131ed9350c8ce7d2c9eb4e0464acaf5283f53fe21b58ffca25965a183d75b7", "format": 1 }, { - "name": "tests/integration/targets/gcp_appengine_firewall_rule/meta", + "name": "tests/integration/targets/gcp_compute_target_ssl_proxy/meta", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_appengine_firewall_rule/meta/main.yml", + "name": "tests/integration/targets/gcp_compute_target_ssl_proxy/meta/main.yml", "ftype": "file", "chksum_type": "sha256", "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "tests/integration/targets/gcp_spanner_instance", + "name": "tests/integration/targets/gcp_compute_target_ssl_proxy/defaults", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_spanner_instance/defaults", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "tests/integration/targets/gcp_compute_target_ssl_proxy/defaults/main.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", "format": 1 }, { - "name": "tests/integration/targets/gcp_spanner_instance/defaults/main.yml", + "name": "tests/integration/targets/gcp_compute_target_ssl_proxy/aliases", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", + "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", "format": 1 }, { - "name": "tests/integration/targets/gcp_spanner_instance/tasks", + "name": "tests/integration/targets/gcp_compute_address", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_spanner_instance/tasks/autogen.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "5584f9f9295839d61520c3d63a73410ef373ed74d4dd7e8283284c2c94f05172", + "name": "tests/integration/targets/gcp_compute_address/tasks", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_spanner_instance/tasks/main.yml", + "name": "tests/integration/targets/gcp_compute_address/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10", + "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5", "format": 1 }, { - "name": "tests/integration/targets/gcp_spanner_instance/aliases", + "name": "tests/integration/targets/gcp_compute_address/tasks/autogen.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", + "chksum_sha256": "d669c7fb0649e0ed75163ab01f4caee15f362fc788fff24e8f118436549be820", "format": 1 }, { - "name": "tests/integration/targets/gcp_spanner_instance/meta", + "name": "tests/integration/targets/gcp_compute_address/meta", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_spanner_instance/meta/main.yml", + "name": "tests/integration/targets/gcp_compute_address/meta/main.yml", "ftype": "file", "chksum_type": "sha256", "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_target_ssl_proxy", + "name": "tests/integration/targets/gcp_compute_address/defaults", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_target_ssl_proxy/defaults", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "tests/integration/targets/gcp_compute_address/defaults/main.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_target_ssl_proxy/defaults/main.yml", + "name": "tests/integration/targets/gcp_compute_address/aliases", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", + "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_target_ssl_proxy/tasks", + "name": "tests/integration/targets/gcp_compute_external_vpn_gateway", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_target_ssl_proxy/tasks/autogen.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "ff2b4b42551ea3e16923e8bd03056357317b5669a3dfc0cef4be92fa2355d74a", + "name": "tests/integration/targets/gcp_compute_external_vpn_gateway/tasks", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_target_ssl_proxy/tasks/main.yml", + "name": "tests/integration/targets/gcp_compute_external_vpn_gateway/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10", + "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_target_ssl_proxy/aliases", + "name": "tests/integration/targets/gcp_compute_external_vpn_gateway/tasks/autogen.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", + "chksum_sha256": "e246b2701ea21250a3faec4d4e4cbbcdd5dc26e418a27b19c6683135a5902bff", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_target_ssl_proxy/meta", + "name": "tests/integration/targets/gcp_compute_external_vpn_gateway/meta", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_target_ssl_proxy/meta/main.yml", + "name": "tests/integration/targets/gcp_compute_external_vpn_gateway/meta/main.yml", "ftype": "file", "chksum_type": "sha256", "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "tests/integration/targets/gcp_kms_crypto_key", + "name": "tests/integration/targets/gcp_compute_external_vpn_gateway/defaults", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_kms_crypto_key/defaults", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "tests/integration/targets/gcp_compute_external_vpn_gateway/defaults/main.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", "format": 1 }, { - "name": "tests/integration/targets/gcp_kms_crypto_key/defaults/main.yml", + "name": "tests/integration/targets/gcp_compute_external_vpn_gateway/aliases", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", + "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", "format": 1 }, { - "name": "tests/integration/targets/gcp_kms_crypto_key/tasks", + "name": "tests/integration/targets/gcp_iam_role", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_kms_crypto_key/tasks/autogen.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "34fc4de9341be29f9629eb2336188bd06db7469d3877a493b7c7070d6b497f51", + "name": "tests/integration/targets/gcp_iam_role/tasks", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_kms_crypto_key/tasks/main.yml", + "name": "tests/integration/targets/gcp_iam_role/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10", + "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5", "format": 1 }, { - "name": "tests/integration/targets/gcp_kms_crypto_key/aliases", + "name": "tests/integration/targets/gcp_iam_role/tasks/autogen.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "5dab10dc09ed5cb445c47bfd67629b39efb7bd68e65e6b773896a8eb507d588e", + "chksum_sha256": "9573848b6188789b3c94ab22d1909bc318a99cc76d060f7637d2702b74883b8f", "format": 1 }, { - "name": "tests/integration/targets/gcp_kms_crypto_key/meta", + "name": "tests/integration/targets/gcp_iam_role/meta", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_kms_crypto_key/meta/main.yml", + "name": "tests/integration/targets/gcp_iam_role/meta/main.yml", "ftype": "file", "chksum_type": "sha256", "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_network", + "name": "tests/integration/targets/gcp_iam_role/defaults", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_network/defaults", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "tests/integration/targets/gcp_iam_role/defaults/main.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_network/defaults/main.yml", + "name": "tests/integration/targets/gcp_iam_role/aliases", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", + "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_network/tasks", + "name": "tests/integration/targets/gcp_compute_forwarding_rule", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_network/tasks/autogen.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "e25ca51ac3d883d165e0e620c9f68dcc7dc1bb06923e1564faafe1f5476f77ec", + "name": "tests/integration/targets/gcp_compute_forwarding_rule/tasks", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_network/tasks/main.yml", + "name": "tests/integration/targets/gcp_compute_forwarding_rule/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10", + "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_network/aliases", + "name": "tests/integration/targets/gcp_compute_forwarding_rule/tasks/autogen.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", + "chksum_sha256": "db38770b5a033fb7ffb41370fd837155a8862c20236f1dc92d8fb8fbcbd8ba82", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_network/meta", + "name": "tests/integration/targets/gcp_compute_forwarding_rule/meta", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_network/meta/main.yml", + "name": "tests/integration/targets/gcp_compute_forwarding_rule/meta/main.yml", "ftype": "file", "chksum_type": "sha256", "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "tests/integration/targets/gcp_iam_service_account", + "name": "tests/integration/targets/gcp_compute_forwarding_rule/defaults", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_iam_service_account/defaults", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "tests/integration/targets/gcp_compute_forwarding_rule/defaults/main.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", "format": 1 }, { - "name": "tests/integration/targets/gcp_iam_service_account/defaults/main.yml", + "name": "tests/integration/targets/gcp_compute_forwarding_rule/aliases", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", + "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", "format": 1 }, { - "name": "tests/integration/targets/gcp_iam_service_account/tasks", + "name": "tests/integration/targets/gcp_dns_managed_zone", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_iam_service_account/tasks/autogen.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "ac8a49a991f16904456dbde7d9bf9279a4ed15f9c4faa132a49ba53c7c7c4d4d", + "name": "tests/integration/targets/gcp_dns_managed_zone/tasks", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_iam_service_account/tasks/main.yml", + "name": "tests/integration/targets/gcp_dns_managed_zone/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10", + "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5", "format": 1 }, { - "name": "tests/integration/targets/gcp_iam_service_account/aliases", + "name": "tests/integration/targets/gcp_dns_managed_zone/tasks/autogen.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", + "chksum_sha256": "31c1361d50ce83166f5dbe614688ea3b88986183d5eb03f9139cd017d805ddb3", "format": 1 }, { - "name": "tests/integration/targets/gcp_iam_service_account/meta", + "name": "tests/integration/targets/gcp_dns_managed_zone/meta", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_iam_service_account/meta/main.yml", + "name": "tests/integration/targets/gcp_dns_managed_zone/meta/main.yml", "ftype": "file", "chksum_type": "sha256", "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_health_check", + "name": "tests/integration/targets/gcp_dns_managed_zone/defaults", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_health_check/defaults", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "tests/integration/targets/gcp_dns_managed_zone/defaults/main.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_health_check/defaults/main.yml", + "name": "tests/integration/targets/gcp_dns_managed_zone/aliases", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", + "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_health_check/tasks", + "name": "tests/integration/targets/gcp_serviceusage_service", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_health_check/tasks/autogen.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "977e212dba8ce932fe2bb83c5abf84fac04ddb3b9237687013654fc71b953d82", + "name": "tests/integration/targets/gcp_serviceusage_service/tasks", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_health_check/tasks/main.yml", + "name": "tests/integration/targets/gcp_serviceusage_service/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10", + "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_health_check/aliases", + "name": "tests/integration/targets/gcp_serviceusage_service/tasks/autogen.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", + "chksum_sha256": "81b6cb863e3be0b9bf509dd61f3d1dcea6338ad9bc0985ba2a31d7aa6e8ce256", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_health_check/meta", + "name": "tests/integration/targets/gcp_serviceusage_service/meta", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_health_check/meta/main.yml", + "name": "tests/integration/targets/gcp_serviceusage_service/meta/main.yml", "ftype": "file", "chksum_type": "sha256", "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "tests/integration/targets/gcp_kms_key_ring", + "name": "tests/integration/targets/gcp_serviceusage_service/defaults", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_kms_key_ring/defaults", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "tests/integration/targets/gcp_serviceusage_service/defaults/main.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", "format": 1 }, { - "name": "tests/integration/targets/gcp_kms_key_ring/defaults/main.yml", + "name": "tests/integration/targets/gcp_serviceusage_service/aliases", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", + "chksum_sha256": "c39528c4d7c2bdbbf0113f0588c1ab8f66a8f3f21c61c23de443c2abced58868", "format": 1 }, { - "name": "tests/integration/targets/gcp_kms_key_ring/tasks", + "name": "tests/integration/targets/gcp_cloudscheduler_job", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_kms_key_ring/tasks/autogen.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "25a0086c812cf17048726a55b8c19ea85225ee69b7e1c4d6acdd1df85ec8705f", + "name": "tests/integration/targets/gcp_cloudscheduler_job/tasks", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_kms_key_ring/tasks/main.yml", + "name": "tests/integration/targets/gcp_cloudscheduler_job/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10", + "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5", "format": 1 }, { - "name": "tests/integration/targets/gcp_kms_key_ring/aliases", + "name": "tests/integration/targets/gcp_cloudscheduler_job/tasks/autogen.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", + "chksum_sha256": "1ebeb815f6a7f9a83c4816fd23ab83a1a348786bdc7ad015257487dc6de63f68", "format": 1 }, { - "name": "tests/integration/targets/gcp_kms_key_ring/meta", + "name": "tests/integration/targets/gcp_cloudscheduler_job/meta", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_kms_key_ring/meta/main.yml", + "name": "tests/integration/targets/gcp_cloudscheduler_job/meta/main.yml", "ftype": "file", "chksum_type": "sha256", "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "tests/integration/targets/gcp_sql_user", + "name": "tests/integration/targets/gcp_cloudscheduler_job/defaults", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_sql_user/defaults", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "tests/integration/targets/gcp_cloudscheduler_job/defaults/main.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", "format": 1 }, { - "name": "tests/integration/targets/gcp_sql_user/defaults/main.yml", + "name": "tests/integration/targets/gcp_cloudscheduler_job/aliases", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", + "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", "format": 1 }, { - "name": "tests/integration/targets/gcp_sql_user/tasks", + "name": "tests/integration/targets/gcp_spanner_instance", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_sql_user/tasks/autogen.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "8e67dc659fbd62e56db2d18a039302c62e46d0a01deb77bf7d114b59f83453ad", + "name": "tests/integration/targets/gcp_spanner_instance/tasks", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_sql_user/tasks/main.yml", + "name": "tests/integration/targets/gcp_spanner_instance/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10", + "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5", "format": 1 }, { - "name": "tests/integration/targets/gcp_sql_user/aliases", + "name": "tests/integration/targets/gcp_spanner_instance/tasks/autogen.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", + "chksum_sha256": "a192cad3656e82b22d86652a688ea00814a468266001a5962ba86dfe4c6ac2c9", "format": 1 }, { - "name": "tests/integration/targets/gcp_sql_user/meta", + "name": "tests/integration/targets/gcp_spanner_instance/meta", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_sql_user/meta/main.yml", + "name": "tests/integration/targets/gcp_spanner_instance/meta/main.yml", "ftype": "file", "chksum_type": "sha256", "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_http_health_check", + "name": "tests/integration/targets/gcp_spanner_instance/defaults", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_http_health_check/defaults", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "tests/integration/targets/gcp_spanner_instance/defaults/main.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_http_health_check/defaults/main.yml", + "name": "tests/integration/targets/gcp_spanner_instance/aliases", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", + "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_http_health_check/tasks", + "name": "tests/integration/targets/gcp_compute_http_health_check", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_http_health_check/tasks/autogen.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "b23eda41cd00ba5e90dfb0efdc9caab91f6b62c5c6ce77bd0ffa39e51135c3b0", + "name": "tests/integration/targets/gcp_compute_http_health_check/tasks", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { "name": "tests/integration/targets/gcp_compute_http_health_check/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10", + "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_http_health_check/aliases", + "name": "tests/integration/targets/gcp_compute_http_health_check/tasks/autogen.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", + "chksum_sha256": "6c2b06a62ffb482fd2cd1f0f9c37d5e646d6fde56cf7b5459e20b09204b1bb7a", "format": 1 }, { @@ -2934,790 +2864,804 @@ "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_https_health_check", + "name": "tests/integration/targets/gcp_compute_http_health_check/defaults", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_https_health_check/defaults", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "tests/integration/targets/gcp_compute_http_health_check/defaults/main.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_https_health_check/defaults/main.yml", + "name": "tests/integration/targets/gcp_compute_http_health_check/aliases", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", + "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_https_health_check/tasks", + "name": "tests/integration/targets/gcp_sql_instance", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_https_health_check/tasks/autogen.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "784ea2883b01dcfea45cdd35f98c376b2763f67ea0995f0b8be2980c59c69d74", + "name": "tests/integration/targets/gcp_sql_instance/tasks", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_https_health_check/tasks/main.yml", + "name": "tests/integration/targets/gcp_sql_instance/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10", + "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_https_health_check/aliases", + "name": "tests/integration/targets/gcp_sql_instance/tasks/autogen.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", + "chksum_sha256": "bbac95325e0de0a4242f2239fe72e3f866af44d856e658610f58a25d240e6d33", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_https_health_check/meta", + "name": "tests/integration/targets/gcp_sql_instance/meta", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_https_health_check/meta/main.yml", + "name": "tests/integration/targets/gcp_sql_instance/meta/main.yml", "ftype": "file", "chksum_type": "sha256", "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_region_disk", + "name": "tests/integration/targets/gcp_sql_instance/defaults", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_region_disk/defaults", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "tests/integration/targets/gcp_sql_instance/defaults/main.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_region_disk/defaults/main.yml", + "name": "tests/integration/targets/gcp_sql_instance/aliases", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", + "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_region_disk/tasks", + "name": "tests/integration/targets/gcp_compute_backend_service", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_region_disk/tasks/autogen.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "5f98d20ee96e139fa05ceffc44d39464bb158034b07772e416716e5158ff08c6", + "name": "tests/integration/targets/gcp_compute_backend_service/tasks", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_region_disk/tasks/main.yml", + "name": "tests/integration/targets/gcp_compute_backend_service/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10", + "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_region_disk/aliases", + "name": "tests/integration/targets/gcp_compute_backend_service/tasks/autogen.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", + "chksum_sha256": "6e7e42aee75a5726a19be4c33bf5e4b1df56437df4d7dc0c7ad4e07311177098", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_region_disk/meta", + "name": "tests/integration/targets/gcp_compute_backend_service/meta", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_region_disk/meta/main.yml", + "name": "tests/integration/targets/gcp_compute_backend_service/meta/main.yml", "ftype": "file", "chksum_type": "sha256", "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_target_pool", + "name": "tests/integration/targets/gcp_compute_backend_service/defaults", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_target_pool/defaults", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "tests/integration/targets/gcp_compute_backend_service/defaults/main.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_target_pool/defaults/main.yml", + "name": "tests/integration/targets/gcp_compute_backend_service/aliases", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", + "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_target_pool/tasks", + "name": "tests/integration/targets/gcp_compute_vpn_tunnel", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_target_pool/tasks/autogen.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "ec1b5c5f4c6282761d76dc31211373b05de6b97ed74b8ce83f142e46e0ca138c", + "name": "tests/integration/targets/gcp_compute_vpn_tunnel/tasks", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_target_pool/tasks/main.yml", + "name": "tests/integration/targets/gcp_compute_vpn_tunnel/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10", + "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_target_pool/aliases", + "name": "tests/integration/targets/gcp_compute_vpn_tunnel/tasks/autogen.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", + "chksum_sha256": "34fcfe018500d82c45462e6c6b7a629bb4ed6b18a7198924e5494279c56e13c5", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_target_pool/meta", + "name": "tests/integration/targets/gcp_compute_vpn_tunnel/meta", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_target_pool/meta/main.yml", + "name": "tests/integration/targets/gcp_compute_vpn_tunnel/meta/main.yml", "ftype": "file", "chksum_type": "sha256", "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_instance", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, - "format": 1 - }, - { - "name": "tests/integration/targets/gcp_compute_instance/defaults", + "name": "tests/integration/targets/gcp_compute_vpn_tunnel/defaults", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_instance/defaults/main.yml", + "name": "tests/integration/targets/gcp_compute_vpn_tunnel/defaults/main.yml", "ftype": "file", "chksum_type": "sha256", "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_instance/tasks", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, - "format": 1 - }, - { - "name": "tests/integration/targets/gcp_compute_instance/tasks/autogen.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "7b421184eabb89f84814b6b726e801985ed577767fa69b3787d3431ee07087c0", - "format": 1 - }, - { - "name": "tests/integration/targets/gcp_compute_instance/tasks/main.yml", + "name": "tests/integration/targets/gcp_compute_vpn_tunnel/aliases", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10", + "chksum_sha256": "5dab10dc09ed5cb445c47bfd67629b39efb7bd68e65e6b773896a8eb507d588e", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_instance/aliases", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", + "name": "tests/integration/targets/gcp_compute_interconnect_attachment", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_instance/meta", + "name": "tests/integration/targets/gcp_compute_interconnect_attachment/meta", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_instance/meta/main.yml", + "name": "tests/integration/targets/gcp_compute_interconnect_attachment/meta/main.yml", "ftype": "file", "chksum_type": "sha256", "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "tests/integration/targets/gcp_sourcerepo_repository", + "name": "tests/integration/targets/gcp_compute_interconnect_attachment/defaults", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_sourcerepo_repository/defaults", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "tests/integration/targets/gcp_compute_interconnect_attachment/defaults/main.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "bd5ce1e4b6d6cd7f0b4881112f82d8cd3541d26a8c639151c95a6f11842f1617", "format": 1 }, { - "name": "tests/integration/targets/gcp_sourcerepo_repository/defaults/main.yml", + "name": "tests/integration/targets/gcp_compute_interconnect_attachment/aliases", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", + "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", "format": 1 }, { - "name": "tests/integration/targets/gcp_sourcerepo_repository/tasks", + "name": "tests/integration/targets/gcp_compute_global_address", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_sourcerepo_repository/tasks/autogen.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "636f22c39d748eff61cdf40e783924651703acf1956a9e19b64b71653db31360", + "name": "tests/integration/targets/gcp_compute_global_address/tasks", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_sourcerepo_repository/tasks/main.yml", + "name": "tests/integration/targets/gcp_compute_global_address/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10", + "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5", "format": 1 }, { - "name": "tests/integration/targets/gcp_sourcerepo_repository/aliases", + "name": "tests/integration/targets/gcp_compute_global_address/tasks/autogen.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", + "chksum_sha256": "e6a890e4786d0556905e7294c9a721247d423c9d8a22f9ff17146316ee021c11", "format": 1 }, { - "name": "tests/integration/targets/gcp_sourcerepo_repository/meta", + "name": "tests/integration/targets/gcp_compute_global_address/meta", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_sourcerepo_repository/meta/main.yml", + "name": "tests/integration/targets/gcp_compute_global_address/meta/main.yml", "ftype": "file", "chksum_type": "sha256", "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "tests/integration/targets/gcp_logging_metric", + "name": "tests/integration/targets/gcp_compute_global_address/defaults", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_logging_metric/defaults", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "tests/integration/targets/gcp_compute_global_address/defaults/main.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", "format": 1 }, { - "name": "tests/integration/targets/gcp_logging_metric/defaults/main.yml", + "name": "tests/integration/targets/gcp_compute_global_address/aliases", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", + "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", "format": 1 }, { - "name": "tests/integration/targets/gcp_logging_metric/tasks", + "name": "tests/integration/targets/gcp_compute_instance", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_logging_metric/tasks/autogen.yml", + "name": "tests/integration/targets/gcp_compute_instance/tasks", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, + "format": 1 + }, + { + "name": "tests/integration/targets/gcp_compute_instance/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "725f02db9ff6d31c60c8c757526c498a219fd3465879f8f5ea274d5a0b3534d7", + "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5", "format": 1 }, { - "name": "tests/integration/targets/gcp_logging_metric/tasks/main.yml", + "name": "tests/integration/targets/gcp_compute_instance/tasks/autogen.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10", + "chksum_sha256": "ca749c961c25599b932e2d503655a91306b9d4ab7a5a565698a665b496aea941", "format": 1 }, { - "name": "tests/integration/targets/gcp_logging_metric/aliases", + "name": "tests/integration/targets/gcp_compute_instance/meta", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, + "format": 1 + }, + { + "name": "tests/integration/targets/gcp_compute_instance/meta/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "5dab10dc09ed5cb445c47bfd67629b39efb7bd68e65e6b773896a8eb507d588e", + "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "tests/integration/targets/gcp_logging_metric/meta", + "name": "tests/integration/targets/gcp_compute_instance/defaults", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_logging_metric/meta/main.yml", + "name": "tests/integration/targets/gcp_compute_instance/defaults/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", + "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_managed_ssl_certificate", + "name": "tests/integration/targets/gcp_compute_instance/aliases", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", + "format": 1 + }, + { + "name": "tests/integration/targets/gcp_appengine_firewall_rule", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_managed_ssl_certificate/defaults", + "name": "tests/integration/targets/gcp_appengine_firewall_rule/tasks", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_managed_ssl_certificate/defaults/main.yml", + "name": "tests/integration/targets/gcp_appengine_firewall_rule/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e173e5a15d9174e198e85c764f303f04d96463d7e1af4685fdbeec2e5cf391d7", + "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_managed_ssl_certificate/aliases", + "name": "tests/integration/targets/gcp_appengine_firewall_rule/tasks/autogen.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "5dab10dc09ed5cb445c47bfd67629b39efb7bd68e65e6b773896a8eb507d588e", + "chksum_sha256": "3f56eff016d2109200c61174ecebaf43bcf1ef037a1b2bc00469c649237a66c0", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_managed_ssl_certificate/meta", + "name": "tests/integration/targets/gcp_appengine_firewall_rule/meta", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_managed_ssl_certificate/meta/main.yml", + "name": "tests/integration/targets/gcp_appengine_firewall_rule/meta/main.yml", "ftype": "file", "chksum_type": "sha256", "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "tests/integration/targets/gcp_bigquery_dataset", + "name": "tests/integration/targets/gcp_appengine_firewall_rule/defaults", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_bigquery_dataset/defaults", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "tests/integration/targets/gcp_appengine_firewall_rule/defaults/main.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", "format": 1 }, { - "name": "tests/integration/targets/gcp_bigquery_dataset/defaults/main.yml", + "name": "tests/integration/targets/gcp_appengine_firewall_rule/aliases", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", + "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", "format": 1 }, { - "name": "tests/integration/targets/gcp_bigquery_dataset/tasks", + "name": "tests/integration/targets/gcp_storage_default_object_acl", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_bigquery_dataset/tasks/autogen.yml", + "name": "tests/integration/targets/gcp_storage_default_object_acl/tasks", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, + "format": 1 + }, + { + "name": "tests/integration/targets/gcp_storage_default_object_acl/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "b5a7fe6b389dc2eca5ffe60197705f786cea715268d1c00e1d8abaffd7bc3d94", + "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5", "format": 1 }, { - "name": "tests/integration/targets/gcp_bigquery_dataset/tasks/main.yml", + "name": "tests/integration/targets/gcp_storage_default_object_acl/tasks/autogen.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10", + "chksum_sha256": "b50c90fc994904bb78aa3737a0f148580d931440e85cea6445c78d6f76cbfc2f", "format": 1 }, { - "name": "tests/integration/targets/gcp_bigquery_dataset/aliases", + "name": "tests/integration/targets/gcp_storage_default_object_acl/meta", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, + "format": 1 + }, + { + "name": "tests/integration/targets/gcp_storage_default_object_acl/meta/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", + "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "tests/integration/targets/gcp_bigquery_dataset/meta", + "name": "tests/integration/targets/gcp_storage_default_object_acl/defaults", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_bigquery_dataset/meta/main.yml", + "name": "tests/integration/targets/gcp_storage_default_object_acl/defaults/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", + "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", "format": 1 }, { - "name": "tests/integration/targets/gcp_iam_service_account_key", + "name": "tests/integration/targets/gcp_storage_default_object_acl/aliases", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", + "format": 1 + }, + { + "name": "tests/integration/targets/gcp_compute_backend_bucket", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_iam_service_account_key/defaults", + "name": "tests/integration/targets/gcp_compute_backend_bucket/tasks", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_iam_service_account_key/defaults/main.yml", + "name": "tests/integration/targets/gcp_compute_backend_bucket/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e173e5a15d9174e198e85c764f303f04d96463d7e1af4685fdbeec2e5cf391d7", + "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5", "format": 1 }, { - "name": "tests/integration/targets/gcp_iam_service_account_key/aliases", + "name": "tests/integration/targets/gcp_compute_backend_bucket/tasks/autogen.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", + "chksum_sha256": "7296ce1a954940cf2e73e83b61934361e05a69aa661440f32ca8af50bd37672e", "format": 1 }, { - "name": "tests/integration/targets/gcp_iam_service_account_key/meta", + "name": "tests/integration/targets/gcp_compute_backend_bucket/meta", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_iam_service_account_key/meta/main.yml", + "name": "tests/integration/targets/gcp_compute_backend_bucket/meta/main.yml", "ftype": "file", "chksum_type": "sha256", "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_url_map", + "name": "tests/integration/targets/gcp_compute_backend_bucket/defaults", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_url_map/defaults", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "tests/integration/targets/gcp_compute_backend_bucket/defaults/main.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_url_map/defaults/main.yml", + "name": "tests/integration/targets/gcp_compute_backend_bucket/aliases", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", + "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_url_map/tasks", + "name": "tests/integration/targets/gcp_compute_target_instance", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_url_map/tasks/autogen.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "49efcc77d33446fcd1217723be07aa41d98022dcccd7d24af55297f5b650ddbf", + "name": "tests/integration/targets/gcp_compute_target_instance/tasks", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_url_map/tasks/main.yml", + "name": "tests/integration/targets/gcp_compute_target_instance/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10", + "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_url_map/aliases", + "name": "tests/integration/targets/gcp_compute_target_instance/tasks/autogen.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", + "chksum_sha256": "a8bfeb54291aa5642be1deddd610b536cb1b64b3b35664c367ce81d973139a1e", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_url_map/meta", + "name": "tests/integration/targets/gcp_compute_target_instance/meta", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_url_map/meta/main.yml", + "name": "tests/integration/targets/gcp_compute_target_instance/meta/main.yml", "ftype": "file", "chksum_type": "sha256", "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_image", + "name": "tests/integration/targets/gcp_compute_target_instance/defaults", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_image/defaults", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "tests/integration/targets/gcp_compute_target_instance/defaults/main.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_image/defaults/main.yml", + "name": "tests/integration/targets/gcp_compute_target_instance/aliases", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", + "chksum_sha256": "5dab10dc09ed5cb445c47bfd67629b39efb7bd68e65e6b773896a8eb507d588e", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_image/tasks", + "name": "tests/integration/targets/gcp_compute_region_url_map", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_image/tasks/autogen.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "00555000c98b8dbe704c4112c0f5a353edf823fb47ecba6b0351d42614331e59", + "name": "tests/integration/targets/gcp_compute_region_url_map/tasks", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_image/tasks/main.yml", + "name": "tests/integration/targets/gcp_compute_region_url_map/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10", + "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_image/aliases", + "name": "tests/integration/targets/gcp_compute_region_url_map/tasks/autogen.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", + "chksum_sha256": "68ec554466caa95d5a04b68295512bf01bc6c69a05b70485c0fecd40cbb1b3d2", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_image/meta", + "name": "tests/integration/targets/gcp_compute_region_url_map/meta", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_image/meta/main.yml", + "name": "tests/integration/targets/gcp_compute_region_url_map/meta/main.yml", "ftype": "file", "chksum_type": "sha256", "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "tests/integration/targets/gcp_iam_role", + "name": "tests/integration/targets/gcp_compute_region_url_map/defaults", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_iam_role/defaults", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "tests/integration/targets/gcp_compute_region_url_map/defaults/main.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", "format": 1 }, { - "name": "tests/integration/targets/gcp_iam_role/defaults/main.yml", + "name": "tests/integration/targets/gcp_compute_region_url_map/aliases", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", + "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", "format": 1 }, { - "name": "tests/integration/targets/gcp_iam_role/tasks", + "name": "tests/integration/targets/gcp_compute_region_target_https_proxy", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_iam_role/tasks/autogen.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "77cdcc7ab732504489f569bfe78aa51d43f56ad15d46b181835051f4f728d682", + "name": "tests/integration/targets/gcp_compute_region_target_https_proxy/tasks", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_iam_role/tasks/main.yml", + "name": "tests/integration/targets/gcp_compute_region_target_https_proxy/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10", + "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5", "format": 1 }, { - "name": "tests/integration/targets/gcp_iam_role/aliases", + "name": "tests/integration/targets/gcp_compute_region_target_https_proxy/tasks/autogen.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", + "chksum_sha256": "8fea9619b34e73aac50e10b9d3a55c2d5fa6596ce9b77f84a9074243cc2283b2", "format": 1 }, { - "name": "tests/integration/targets/gcp_iam_role/meta", + "name": "tests/integration/targets/gcp_compute_region_target_https_proxy/meta", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_iam_role/meta/main.yml", + "name": "tests/integration/targets/gcp_compute_region_target_https_proxy/meta/main.yml", "ftype": "file", "chksum_type": "sha256", "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_node_group", + "name": "tests/integration/targets/gcp_compute_region_target_https_proxy/defaults", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_node_group/defaults", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "tests/integration/targets/gcp_compute_region_target_https_proxy/defaults/main.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_node_group/defaults/main.yml", + "name": "tests/integration/targets/gcp_compute_region_target_https_proxy/aliases", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", + "chksum_sha256": "94e3b292c9415f07fc0b6597f537ad347cde4bf7d629f34f74e2c5db9af03893", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_node_group/tasks", + "name": "tests/integration/targets/gcp_compute_instance_group_manager", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_node_group/tasks/autogen.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "1905a677c95260fde77daafb1eaed4b461b958b147df3a62763099668ca97e0b", + "name": "tests/integration/targets/gcp_compute_instance_group_manager/tasks", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_node_group/tasks/main.yml", + "name": "tests/integration/targets/gcp_compute_instance_group_manager/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10", + "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_node_group/aliases", + "name": "tests/integration/targets/gcp_compute_instance_group_manager/tasks/autogen.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "5e4f7328221273ee32b8a832b9d8886771fc64733f845175bb1373dcd1752985", + "chksum_sha256": "f40e8ffd7b317b7ff9703b9c884692b3ada8c902f7199506bd5a70e59fa9678f", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_node_group/meta", + "name": "tests/integration/targets/gcp_compute_instance_group_manager/meta", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_node_group/meta/main.yml", + "name": "tests/integration/targets/gcp_compute_instance_group_manager/meta/main.yml", "ftype": "file", "chksum_type": "sha256", "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_instance_group_manager", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, - "format": 1 - }, - { "name": "tests/integration/targets/gcp_compute_instance_group_manager/defaults", "ftype": "dir", "chksum_type": null, @@ -3732,3604 +3676,3646 @@ "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_instance_group_manager/tasks", + "name": "tests/integration/targets/gcp_compute_instance_group_manager/aliases", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", + "format": 1 + }, + { + "name": "tests/integration/targets/gcp_compute_region_instance_group_manager", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_instance_group_manager/tasks/autogen.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "c10919332060a0789a51ecd9bea389edb4bd26aa04609d1874543878f9e7765f", + "name": "tests/integration/targets/gcp_compute_region_instance_group_manager/tasks", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_instance_group_manager/tasks/main.yml", + "name": "tests/integration/targets/gcp_compute_region_instance_group_manager/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10", + "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_instance_group_manager/aliases", + "name": "tests/integration/targets/gcp_compute_region_instance_group_manager/tasks/autogen.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", + "chksum_sha256": "84105c00d877eab7523304db7fe634cea8374535dbe051fb3232ddeb8fe96935", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_instance_group_manager/meta", + "name": "tests/integration/targets/gcp_compute_region_instance_group_manager/meta", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_instance_group_manager/meta/main.yml", + "name": "tests/integration/targets/gcp_compute_region_instance_group_manager/meta/main.yml", "ftype": "file", "chksum_type": "sha256", "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_ssl_policy", + "name": "tests/integration/targets/gcp_compute_region_instance_group_manager/defaults", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_ssl_policy/defaults", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "tests/integration/targets/gcp_compute_region_instance_group_manager/defaults/main.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_ssl_policy/defaults/main.yml", + "name": "tests/integration/targets/gcp_compute_region_instance_group_manager/aliases", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", + "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_ssl_policy/tasks", + "name": "tests/integration/targets/gcp_compute_health_check", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_ssl_policy/tasks/autogen.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "aa0aaea65f50b2dc67318e544f76afccef8f05fcc22fb6fa86f0597a5532f0b2", + "name": "tests/integration/targets/gcp_compute_health_check/tasks", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_ssl_policy/tasks/main.yml", + "name": "tests/integration/targets/gcp_compute_health_check/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10", + "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_ssl_policy/aliases", + "name": "tests/integration/targets/gcp_compute_health_check/tasks/autogen.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", + "chksum_sha256": "f914f477848c3301558e57748addcd252fa86105a61c19234deb01f60a8604b8", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_ssl_policy/meta", + "name": "tests/integration/targets/gcp_compute_health_check/meta", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_ssl_policy/meta/main.yml", + "name": "tests/integration/targets/gcp_compute_health_check/meta/main.yml", "ftype": "file", "chksum_type": "sha256", "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_region_target_http_proxy", + "name": "tests/integration/targets/gcp_compute_health_check/defaults", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_region_target_http_proxy/defaults", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "tests/integration/targets/gcp_compute_health_check/defaults/main.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_region_target_http_proxy/defaults/main.yml", + "name": "tests/integration/targets/gcp_compute_health_check/aliases", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", + "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_region_target_http_proxy/tasks", + "name": "tests/integration/targets/gcp_runtimeconfig_config", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_region_target_http_proxy/tasks/autogen.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "310d5d66f11a12097117170981487e7724c127d873c32d2955cc114c2295a8b0", + "name": "tests/integration/targets/gcp_runtimeconfig_config/tasks", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_region_target_http_proxy/tasks/main.yml", + "name": "tests/integration/targets/gcp_runtimeconfig_config/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10", + "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_region_target_http_proxy/aliases", + "name": "tests/integration/targets/gcp_runtimeconfig_config/tasks/autogen.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", + "chksum_sha256": "069da08e2cf549339f8719d9be1d07a57b7897573a4707188d3918aa65147880", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_region_target_http_proxy/meta", + "name": "tests/integration/targets/gcp_runtimeconfig_config/meta", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_region_target_http_proxy/meta/main.yml", + "name": "tests/integration/targets/gcp_runtimeconfig_config/meta/main.yml", "ftype": "file", "chksum_type": "sha256", "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_target_https_proxy", + "name": "tests/integration/targets/gcp_runtimeconfig_config/defaults", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_target_https_proxy/defaults", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "tests/integration/targets/gcp_runtimeconfig_config/defaults/main.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_target_https_proxy/defaults/main.yml", + "name": "tests/integration/targets/gcp_runtimeconfig_config/aliases", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", + "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_target_https_proxy/tasks", + "name": "tests/integration/targets/gcp_compute_target_vpn_gateway", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_target_https_proxy/tasks/autogen.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "acce5561b42fcf97a412d11e054d491ad465af9b3c6bda02dbc23bb3fde4a78f", + "name": "tests/integration/targets/gcp_compute_target_vpn_gateway/tasks", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_target_https_proxy/tasks/main.yml", + "name": "tests/integration/targets/gcp_compute_target_vpn_gateway/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10", + "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_target_https_proxy/aliases", + "name": "tests/integration/targets/gcp_compute_target_vpn_gateway/tasks/autogen.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", + "chksum_sha256": "7380ef3ba40e65e51eb6e41a11627e6ced4fad5623c56ca6e7f08d516cce7288", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_target_https_proxy/meta", + "name": "tests/integration/targets/gcp_compute_target_vpn_gateway/meta", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_target_https_proxy/meta/main.yml", + "name": "tests/integration/targets/gcp_compute_target_vpn_gateway/meta/main.yml", "ftype": "file", "chksum_type": "sha256", "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "tests/integration/targets/gcp_bigquery_table", + "name": "tests/integration/targets/gcp_compute_target_vpn_gateway/defaults", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_bigquery_table/defaults", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "tests/integration/targets/gcp_compute_target_vpn_gateway/defaults/main.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", "format": 1 }, { - "name": "tests/integration/targets/gcp_bigquery_table/defaults/main.yml", + "name": "tests/integration/targets/gcp_compute_target_vpn_gateway/aliases", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", + "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", "format": 1 }, { - "name": "tests/integration/targets/gcp_bigquery_table/tasks", + "name": "tests/integration/targets/gcp_compute_global_forwarding_rule", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_bigquery_table/tasks/autogen.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "87072d7da15cce1b61018575252967298aeb29c708435e34e0dcece24ed3c2d7", + "name": "tests/integration/targets/gcp_compute_global_forwarding_rule/tasks", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_bigquery_table/tasks/main.yml", + "name": "tests/integration/targets/gcp_compute_global_forwarding_rule/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10", + "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5", "format": 1 }, { - "name": "tests/integration/targets/gcp_bigquery_table/aliases", + "name": "tests/integration/targets/gcp_compute_global_forwarding_rule/tasks/autogen.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", + "chksum_sha256": "b486f8b632db8b1a6f460f844265036efe64849d6822eb2088a2c4cbcf3be273", "format": 1 }, { - "name": "tests/integration/targets/gcp_bigquery_table/meta", + "name": "tests/integration/targets/gcp_compute_global_forwarding_rule/meta", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_bigquery_table/meta/main.yml", + "name": "tests/integration/targets/gcp_compute_global_forwarding_rule/meta/main.yml", "ftype": "file", "chksum_type": "sha256", "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "tests/integration/targets/gcp_sql_instance", + "name": "tests/integration/targets/gcp_compute_global_forwarding_rule/defaults", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_sql_instance/defaults", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "tests/integration/targets/gcp_compute_global_forwarding_rule/defaults/main.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", "format": 1 }, { - "name": "tests/integration/targets/gcp_sql_instance/defaults/main.yml", + "name": "tests/integration/targets/gcp_compute_global_forwarding_rule/aliases", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", + "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", "format": 1 }, { - "name": "tests/integration/targets/gcp_sql_instance/tasks", + "name": "tests/integration/targets/gcp_cloudtasks_queue", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_sql_instance/tasks/autogen.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "5a8ea074ec15bd8de72bd070ede0514ba7013bc4d4b56d401e7584e678c4eca3", + "name": "tests/integration/targets/gcp_cloudtasks_queue/tasks", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_sql_instance/tasks/main.yml", + "name": "tests/integration/targets/gcp_cloudtasks_queue/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10", + "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5", "format": 1 }, { - "name": "tests/integration/targets/gcp_sql_instance/aliases", + "name": "tests/integration/targets/gcp_cloudtasks_queue/tasks/autogen.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", + "chksum_sha256": "c04dcc4b7e8c8798bf4c95c0e883a0675e262e9311a980f955d25110c11bdfea", "format": 1 }, { - "name": "tests/integration/targets/gcp_sql_instance/meta", + "name": "tests/integration/targets/gcp_cloudtasks_queue/meta", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_sql_instance/meta/main.yml", + "name": "tests/integration/targets/gcp_cloudtasks_queue/meta/main.yml", "ftype": "file", "chksum_type": "sha256", "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_region_health_check", + "name": "tests/integration/targets/gcp_cloudtasks_queue/defaults", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_region_health_check/defaults", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "tests/integration/targets/gcp_cloudtasks_queue/defaults/main.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_region_health_check/defaults/main.yml", + "name": "tests/integration/targets/gcp_cloudtasks_queue/aliases", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", + "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_region_health_check/tasks", + "name": "tests/integration/targets/gcp_compute_disk", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_region_health_check/tasks/autogen.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "73cd5292a87c00c7afeac01ba445b9ee340e22c929202ba21736b02b7f4a8475", + "name": "tests/integration/targets/gcp_compute_disk/tasks", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_region_health_check/tasks/main.yml", + "name": "tests/integration/targets/gcp_compute_disk/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10", + "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_region_health_check/aliases", + "name": "tests/integration/targets/gcp_compute_disk/tasks/autogen.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", + "chksum_sha256": "c76e4258194d3352031694c252dafe99ce26aaa5fd1b6297a2a687c0bfd9960c", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_region_health_check/meta", + "name": "tests/integration/targets/gcp_compute_disk/meta", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_region_health_check/meta/main.yml", + "name": "tests/integration/targets/gcp_compute_disk/meta/main.yml", "ftype": "file", "chksum_type": "sha256", "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "tests/integration/targets/gcp_bigtable_instance", + "name": "tests/integration/targets/gcp_compute_disk/defaults", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_bigtable_instance/defaults", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "tests/integration/targets/gcp_compute_disk/defaults/main.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", "format": 1 }, { - "name": "tests/integration/targets/gcp_bigtable_instance/defaults/main.yml", + "name": "tests/integration/targets/gcp_compute_disk/aliases", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", + "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", "format": 1 }, { - "name": "tests/integration/targets/gcp_bigtable_instance/tasks", + "name": "tests/integration/targets/gcp_compute_network_endpoint_group", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_bigtable_instance/tasks/autogen.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "a4617849e4aa979b473a3cd831ae8ea67c9fa4ec50ee52883a689460a36827f5", + "name": "tests/integration/targets/gcp_compute_network_endpoint_group/tasks", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_bigtable_instance/tasks/main.yml", + "name": "tests/integration/targets/gcp_compute_network_endpoint_group/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10", + "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5", "format": 1 }, { - "name": "tests/integration/targets/gcp_bigtable_instance/aliases", + "name": "tests/integration/targets/gcp_compute_network_endpoint_group/tasks/autogen.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "6165de6d5352b3a386f558df0b34280af84d41b233d6862e505963ddd398ca50", + "chksum_sha256": "918f4b244fad3f725e341f0b115dea7d39791aa11916370073e7725625bda207", "format": 1 }, { - "name": "tests/integration/targets/gcp_bigtable_instance/meta", + "name": "tests/integration/targets/gcp_compute_network_endpoint_group/meta", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_bigtable_instance/meta/main.yml", + "name": "tests/integration/targets/gcp_compute_network_endpoint_group/meta/main.yml", "ftype": "file", "chksum_type": "sha256", "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_target_instance", + "name": "tests/integration/targets/gcp_compute_network_endpoint_group/defaults", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_target_instance/defaults", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "tests/integration/targets/gcp_compute_network_endpoint_group/defaults/main.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_target_instance/defaults/main.yml", + "name": "tests/integration/targets/gcp_compute_network_endpoint_group/aliases", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", + "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_target_instance/tasks", + "name": "tests/integration/targets/gcp_redis_instance", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_target_instance/tasks/autogen.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "ba18f5b2d4b672ada488a1b65854d715abea11e29dd7c03084979f3005ae326b", + "name": "tests/integration/targets/gcp_redis_instance/tasks", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_target_instance/tasks/main.yml", + "name": "tests/integration/targets/gcp_redis_instance/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10", + "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_target_instance/aliases", + "name": "tests/integration/targets/gcp_redis_instance/tasks/autogen.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "5dab10dc09ed5cb445c47bfd67629b39efb7bd68e65e6b773896a8eb507d588e", + "chksum_sha256": "cd1f8a43deef54e13d2502a8007ace1d46e8dc04c9f27c75652a027a9ca878e9", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_target_instance/meta", + "name": "tests/integration/targets/gcp_redis_instance/meta", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_target_instance/meta/main.yml", + "name": "tests/integration/targets/gcp_redis_instance/meta/main.yml", "ftype": "file", "chksum_type": "sha256", "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "tests/integration/targets/gcp_sql_database", + "name": "tests/integration/targets/gcp_redis_instance/defaults", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_sql_database/defaults", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "tests/integration/targets/gcp_redis_instance/defaults/main.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", "format": 1 }, { - "name": "tests/integration/targets/gcp_sql_database/defaults/main.yml", + "name": "tests/integration/targets/gcp_redis_instance/aliases", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", + "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", "format": 1 }, { - "name": "tests/integration/targets/gcp_sql_database/tasks", + "name": "tests/integration/targets/gcp_cloudfunctions_cloud_function", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_sql_database/tasks/autogen.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "e1d43b3936881dc039d8ed169403e139124610037155037004e8d4f399873cff", + "name": "tests/integration/targets/gcp_cloudfunctions_cloud_function/tasks", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_sql_database/tasks/main.yml", + "name": "tests/integration/targets/gcp_cloudfunctions_cloud_function/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10", + "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5", "format": 1 }, { - "name": "tests/integration/targets/gcp_sql_database/aliases", + "name": "tests/integration/targets/gcp_cloudfunctions_cloud_function/tasks/autogen.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", + "chksum_sha256": "6fd331ad29c137f5cac12478a90745964b9f19d028403bdc972aa9538ae164e7", "format": 1 }, { - "name": "tests/integration/targets/gcp_sql_database/meta", + "name": "tests/integration/targets/gcp_cloudfunctions_cloud_function/meta", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_sql_database/meta/main.yml", + "name": "tests/integration/targets/gcp_cloudfunctions_cloud_function/meta/main.yml", "ftype": "file", "chksum_type": "sha256", "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "tests/integration/targets/gcp_cloudscheduler_job", + "name": "tests/integration/targets/gcp_cloudfunctions_cloud_function/defaults", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_cloudscheduler_job/defaults", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "tests/integration/targets/gcp_cloudfunctions_cloud_function/defaults/main.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", "format": 1 }, { - "name": "tests/integration/targets/gcp_cloudscheduler_job/defaults/main.yml", + "name": "tests/integration/targets/gcp_cloudfunctions_cloud_function/aliases", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", + "chksum_sha256": "5dab10dc09ed5cb445c47bfd67629b39efb7bd68e65e6b773896a8eb507d588e", "format": 1 }, { - "name": "tests/integration/targets/gcp_cloudscheduler_job/tasks", + "name": "tests/integration/targets/gcp_compute_region_disk", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_cloudscheduler_job/tasks/autogen.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "b8d667d2df0c4d97c6a76a35fc45fb4d5d2bc06f0e6d99a2a55b6441644a103a", + "name": "tests/integration/targets/gcp_compute_region_disk/tasks", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_cloudscheduler_job/tasks/main.yml", + "name": "tests/integration/targets/gcp_compute_region_disk/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10", + "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5", "format": 1 }, { - "name": "tests/integration/targets/gcp_cloudscheduler_job/aliases", + "name": "tests/integration/targets/gcp_compute_region_disk/tasks/autogen.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", + "chksum_sha256": "d40b7314642a481b6ea28f1be1c741986687ea33b78323429d4186736dd56718", "format": 1 }, { - "name": "tests/integration/targets/gcp_cloudscheduler_job/meta", + "name": "tests/integration/targets/gcp_compute_region_disk/meta", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_cloudscheduler_job/meta/main.yml", + "name": "tests/integration/targets/gcp_compute_region_disk/meta/main.yml", "ftype": "file", "chksum_type": "sha256", "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_reservation", + "name": "tests/integration/targets/gcp_compute_region_disk/defaults", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_reservation/defaults", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "tests/integration/targets/gcp_compute_region_disk/defaults/main.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_reservation/defaults/main.yml", + "name": "tests/integration/targets/gcp_compute_region_disk/aliases", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", + "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_reservation/tasks", + "name": "tests/integration/targets/gcp_container_cluster", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_reservation/tasks/autogen.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "c92cc5cdffa7e1e90e6ee4fc144397cbd326f09af733c96198412f789e581d44", + "name": "tests/integration/targets/gcp_container_cluster/tasks", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_reservation/tasks/main.yml", + "name": "tests/integration/targets/gcp_container_cluster/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10", + "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_reservation/aliases", + "name": "tests/integration/targets/gcp_container_cluster/tasks/autogen.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", + "chksum_sha256": "8d86724b2089b25e3a25d7943eeb910b68dbeb3bf997bb307a1cad44477b1069", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_reservation/meta", + "name": "tests/integration/targets/gcp_container_cluster/meta", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_reservation/meta/main.yml", + "name": "tests/integration/targets/gcp_container_cluster/meta/main.yml", "ftype": "file", "chksum_type": "sha256", "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "tests/integration/targets/gcp_serviceusage_service", + "name": "tests/integration/targets/gcp_container_cluster/defaults", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_serviceusage_service/defaults", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "tests/integration/targets/gcp_container_cluster/defaults/main.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", "format": 1 }, { - "name": "tests/integration/targets/gcp_serviceusage_service/defaults/main.yml", + "name": "tests/integration/targets/gcp_container_cluster/aliases", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", + "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", "format": 1 }, { - "name": "tests/integration/targets/gcp_serviceusage_service/tasks", + "name": "tests/integration/targets/gcp_compute_instance_group", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_serviceusage_service/tasks/autogen.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "b8885bf122c174bc74bb76dba5c213c367a4f88b974e6fd87050f3dceedeb3ed", + "name": "tests/integration/targets/gcp_compute_instance_group/tasks", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_serviceusage_service/tasks/main.yml", + "name": "tests/integration/targets/gcp_compute_instance_group/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10", + "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5", "format": 1 }, { - "name": "tests/integration/targets/gcp_serviceusage_service/aliases", + "name": "tests/integration/targets/gcp_compute_instance_group/tasks/autogen.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "c39528c4d7c2bdbbf0113f0588c1ab8f66a8f3f21c61c23de443c2abced58868", + "chksum_sha256": "a6959510ffcf1c9a8f59fa5f63b0ebbd01d98b56cee55f51402ed0761cf29a80", "format": 1 }, { - "name": "tests/integration/targets/gcp_serviceusage_service/meta", + "name": "tests/integration/targets/gcp_compute_instance_group/meta", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_serviceusage_service/meta/main.yml", + "name": "tests/integration/targets/gcp_compute_instance_group/meta/main.yml", "ftype": "file", "chksum_type": "sha256", "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_forwarding_rule", + "name": "tests/integration/targets/gcp_compute_instance_group/defaults", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_forwarding_rule/defaults", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "tests/integration/targets/gcp_compute_instance_group/defaults/main.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_forwarding_rule/defaults/main.yml", + "name": "tests/integration/targets/gcp_compute_instance_group/aliases", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", + "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_forwarding_rule/tasks", + "name": "tests/integration/targets/gcp_compute_autoscaler", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_forwarding_rule/tasks/autogen.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "c9a8d30d4f9332b3ba4b13d47e64845ee13dd00b052fe5268faf50f9bdbf9ee9", + "name": "tests/integration/targets/gcp_compute_autoscaler/tasks", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_forwarding_rule/tasks/main.yml", + "name": "tests/integration/targets/gcp_compute_autoscaler/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10", + "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_forwarding_rule/aliases", + "name": "tests/integration/targets/gcp_compute_autoscaler/tasks/autogen.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", + "chksum_sha256": "99baa8073c7ceb7da716580508cd36979d3dc232406e48f3088493d32adb88f3", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_forwarding_rule/meta", + "name": "tests/integration/targets/gcp_compute_autoscaler/meta", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_forwarding_rule/meta/main.yml", + "name": "tests/integration/targets/gcp_compute_autoscaler/meta/main.yml", "ftype": "file", "chksum_type": "sha256", "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_global_address", + "name": "tests/integration/targets/gcp_compute_autoscaler/defaults", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_global_address/defaults", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "tests/integration/targets/gcp_compute_autoscaler/defaults/main.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_global_address/defaults/main.yml", + "name": "tests/integration/targets/gcp_compute_autoscaler/aliases", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", + "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_global_address/tasks", + "name": "tests/integration/targets/gcp_compute_image", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_global_address/tasks/autogen.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "030f1d0fee602777fc33bf69c29ade9d02cd76430bb96f9bef8bf4d73c238feb", + "name": "tests/integration/targets/gcp_compute_image/tasks", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_global_address/tasks/main.yml", + "name": "tests/integration/targets/gcp_compute_image/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10", + "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_global_address/aliases", + "name": "tests/integration/targets/gcp_compute_image/tasks/autogen.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", + "chksum_sha256": "e19823856b3b2d2d8f42e10b8a9f2d2cfc1a9e92b38e9700ce2b719290ef0415", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_global_address/meta", + "name": "tests/integration/targets/gcp_compute_image/meta", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_global_address/meta/main.yml", + "name": "tests/integration/targets/gcp_compute_image/meta/main.yml", "ftype": "file", "chksum_type": "sha256", "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_external_vpn_gateway", + "name": "tests/integration/targets/gcp_compute_image/defaults", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_external_vpn_gateway/defaults", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "tests/integration/targets/gcp_compute_image/defaults/main.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_external_vpn_gateway/defaults/main.yml", + "name": "tests/integration/targets/gcp_compute_image/aliases", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", + "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_external_vpn_gateway/tasks", + "name": "tests/integration/targets/gcp_logging_metric", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_external_vpn_gateway/tasks/autogen.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "52e2e22def34c8e3e3ee99a5bc52f8d62ca596fa3808fbc46baff6560cfd0705", + "name": "tests/integration/targets/gcp_logging_metric/tasks", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_external_vpn_gateway/tasks/main.yml", + "name": "tests/integration/targets/gcp_logging_metric/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10", + "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_external_vpn_gateway/aliases", + "name": "tests/integration/targets/gcp_logging_metric/tasks/autogen.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", + "chksum_sha256": "b937e23afcd2f4f5d2626b9854134828343cc8d8c4384f143412889de861db94", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_external_vpn_gateway/meta", + "name": "tests/integration/targets/gcp_logging_metric/meta", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_external_vpn_gateway/meta/main.yml", + "name": "tests/integration/targets/gcp_logging_metric/meta/main.yml", "ftype": "file", "chksum_type": "sha256", "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "tests/integration/targets/gcp_mlengine_model", + "name": "tests/integration/targets/gcp_logging_metric/defaults", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_mlengine_model/defaults", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "tests/integration/targets/gcp_logging_metric/defaults/main.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", "format": 1 }, { - "name": "tests/integration/targets/gcp_mlengine_model/defaults/main.yml", + "name": "tests/integration/targets/gcp_logging_metric/aliases", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", + "chksum_sha256": "5dab10dc09ed5cb445c47bfd67629b39efb7bd68e65e6b773896a8eb507d588e", "format": 1 }, { - "name": "tests/integration/targets/gcp_mlengine_model/tasks", + "name": "tests/integration/targets/gcp_compute_router", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_mlengine_model/tasks/autogen.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "a5c254b60df6b09b173c9da1b866a4380d199dd61809595c1b629df91c434a24", + "name": "tests/integration/targets/gcp_compute_router/tasks", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_mlengine_model/tasks/main.yml", + "name": "tests/integration/targets/gcp_compute_router/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10", + "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5", "format": 1 }, { - "name": "tests/integration/targets/gcp_mlengine_model/aliases", + "name": "tests/integration/targets/gcp_compute_router/tasks/autogen.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", + "chksum_sha256": "117c71ab911d70acc7ed4b92dd764484035faff0db4623a9e815421f585393f4", "format": 1 }, { - "name": "tests/integration/targets/gcp_mlengine_model/meta", + "name": "tests/integration/targets/gcp_compute_router/meta", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_mlengine_model/meta/main.yml", + "name": "tests/integration/targets/gcp_compute_router/meta/main.yml", "ftype": "file", "chksum_type": "sha256", "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_resource_policy", + "name": "tests/integration/targets/gcp_compute_router/defaults", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_resource_policy/defaults", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "tests/integration/targets/gcp_compute_router/defaults/main.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_resource_policy/defaults/main.yml", + "name": "tests/integration/targets/gcp_compute_router/aliases", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", + "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_resource_policy/tasks", + "name": "tests/integration/targets/gcp_compute_region_health_check", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_resource_policy/tasks/autogen.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "99bb6c11dd8d314cec094df68c987c6a5955054b4dffdc229d148841ab562314", + "name": "tests/integration/targets/gcp_compute_region_health_check/tasks", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_resource_policy/tasks/main.yml", + "name": "tests/integration/targets/gcp_compute_region_health_check/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10", + "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_resource_policy/aliases", + "name": "tests/integration/targets/gcp_compute_region_health_check/tasks/autogen.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", + "chksum_sha256": "cd5ff975624f396c1662e55933d8e18684d122e6acddefa742fcdeab7b5fcedd", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_resource_policy/meta", + "name": "tests/integration/targets/gcp_compute_region_health_check/meta", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_resource_policy/meta/main.yml", + "name": "tests/integration/targets/gcp_compute_region_health_check/meta/main.yml", "ftype": "file", "chksum_type": "sha256", "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_router", + "name": "tests/integration/targets/gcp_compute_region_health_check/defaults", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_router/defaults", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "tests/integration/targets/gcp_compute_region_health_check/defaults/main.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_router/defaults/main.yml", + "name": "tests/integration/targets/gcp_compute_region_health_check/aliases", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", + "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_router/tasks", + "name": "tests/integration/targets/gcp_compute_instance_template", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_router/tasks/autogen.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "9e79d3f8d00981cdf7a96732650b5facab08fe08098a25bdae79dda199b5f694", + "name": "tests/integration/targets/gcp_compute_instance_template/tasks", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_router/tasks/main.yml", + "name": "tests/integration/targets/gcp_compute_instance_template/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10", + "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_router/aliases", + "name": "tests/integration/targets/gcp_compute_instance_template/tasks/autogen.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", + "chksum_sha256": "6821b4c952f942c2dee58b4c0697f9e4469a1169861bb654ba35255ec439642e", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_router/meta", + "name": "tests/integration/targets/gcp_compute_instance_template/meta", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_router/meta/main.yml", + "name": "tests/integration/targets/gcp_compute_instance_template/meta/main.yml", "ftype": "file", "chksum_type": "sha256", "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "tests/integration/targets/gcp_container_node_pool", + "name": "tests/integration/targets/gcp_compute_instance_template/defaults", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_container_node_pool/defaults", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "tests/integration/targets/gcp_compute_instance_template/defaults/main.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", "format": 1 }, { - "name": "tests/integration/targets/gcp_container_node_pool/defaults/main.yml", + "name": "tests/integration/targets/gcp_compute_instance_template/aliases", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", + "chksum_sha256": "5dab10dc09ed5cb445c47bfd67629b39efb7bd68e65e6b773896a8eb507d588e", "format": 1 }, { - "name": "tests/integration/targets/gcp_container_node_pool/tasks", + "name": "tests/integration/targets/gcp_storage_bucket", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_container_node_pool/tasks/autogen.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "26d4f731bcc41af376fbd36b02959baf2ca10ec10cfdeab9494e6302cf2f73d3", + "name": "tests/integration/targets/gcp_storage_bucket/tasks", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_container_node_pool/tasks/main.yml", + "name": "tests/integration/targets/gcp_storage_bucket/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10", + "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5", "format": 1 }, { - "name": "tests/integration/targets/gcp_container_node_pool/aliases", + "name": "tests/integration/targets/gcp_storage_bucket/tasks/autogen.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", + "chksum_sha256": "6327bdd62bcf5a6a9146244b566597dff3636080dd91d5353c32c82bcf36aa6f", "format": 1 }, { - "name": "tests/integration/targets/gcp_container_node_pool/meta", + "name": "tests/integration/targets/gcp_storage_bucket/meta", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_container_node_pool/meta/main.yml", + "name": "tests/integration/targets/gcp_storage_bucket/meta/main.yml", "ftype": "file", "chksum_type": "sha256", "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_region_autoscaler", + "name": "tests/integration/targets/gcp_storage_bucket/defaults", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_region_autoscaler/defaults", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "tests/integration/targets/gcp_storage_bucket/defaults/main.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "3087d8090fde9451c1d45dbe3d8cd7a1f5284b4d036b9a69d1aebbc139d706dc", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_region_autoscaler/defaults/main.yml", + "name": "tests/integration/targets/gcp_storage_bucket/aliases", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", + "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_region_autoscaler/tasks", + "name": "tests/integration/targets/gcp_compute_url_map", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_region_autoscaler/tasks/autogen.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "c8bda0d218c7699d7dd9b222f32e8320327fac05b6d91d1f49d9bea83ff23ed5", + "name": "tests/integration/targets/gcp_compute_url_map/tasks", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_region_autoscaler/tasks/main.yml", + "name": "tests/integration/targets/gcp_compute_url_map/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10", + "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_region_autoscaler/aliases", + "name": "tests/integration/targets/gcp_compute_url_map/tasks/autogen.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", + "chksum_sha256": "c0d287ac5f2f300dd60fe168a0643d9305ae56c0f6bae34bfe859f794eeeb792", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_region_autoscaler/meta", + "name": "tests/integration/targets/gcp_compute_url_map/meta", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_region_autoscaler/meta/main.yml", + "name": "tests/integration/targets/gcp_compute_url_map/meta/main.yml", "ftype": "file", "chksum_type": "sha256", "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_backend_service", + "name": "tests/integration/targets/gcp_compute_url_map/defaults", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_backend_service/defaults", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "tests/integration/targets/gcp_compute_url_map/defaults/main.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_backend_service/defaults/main.yml", + "name": "tests/integration/targets/gcp_compute_url_map/aliases", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", + "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_backend_service/tasks", + "name": "tests/integration/targets/gcp_compute_snapshot", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_backend_service/tasks/autogen.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "27054f1f1bd30541e9b6eda592c36d4da5dac6107a1ceb3e5d1e42b165af844c", + "name": "tests/integration/targets/gcp_compute_snapshot/tasks", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_backend_service/tasks/main.yml", + "name": "tests/integration/targets/gcp_compute_snapshot/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10", + "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_backend_service/aliases", + "name": "tests/integration/targets/gcp_compute_snapshot/tasks/autogen.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", + "chksum_sha256": "dd29c08de904b05743694c466b6aa97e31bfb06fae73360a9419de2c661e4500", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_backend_service/meta", + "name": "tests/integration/targets/gcp_compute_snapshot/meta", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_backend_service/meta/main.yml", + "name": "tests/integration/targets/gcp_compute_snapshot/meta/main.yml", "ftype": "file", "chksum_type": "sha256", "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "tests/integration/targets/gcp_resourcemanager_project", + "name": "tests/integration/targets/gcp_compute_snapshot/defaults", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_resourcemanager_project/defaults", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "tests/integration/targets/gcp_compute_snapshot/defaults/main.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", "format": 1 }, { - "name": "tests/integration/targets/gcp_resourcemanager_project/defaults/main.yml", + "name": "tests/integration/targets/gcp_compute_snapshot/aliases", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", + "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", "format": 1 }, { - "name": "tests/integration/targets/gcp_resourcemanager_project/tasks", + "name": "tests/integration/targets/gcp_compute_https_health_check", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_resourcemanager_project/tasks/autogen.yml", + "name": "tests/integration/targets/gcp_compute_https_health_check/tasks", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, + "format": 1 + }, + { + "name": "tests/integration/targets/gcp_compute_https_health_check/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "2c78d5598e61b68b10a7c3a99619bac826e43ff05bc028725dc004e269f52df0", + "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5", "format": 1 }, { - "name": "tests/integration/targets/gcp_resourcemanager_project/tasks/main.yml", + "name": "tests/integration/targets/gcp_compute_https_health_check/tasks/autogen.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10", + "chksum_sha256": "21a75c47d3198f20e399179662fded8c65be521863545ca288dfdfaac21a0ebd", "format": 1 }, { - "name": "tests/integration/targets/gcp_resourcemanager_project/aliases", + "name": "tests/integration/targets/gcp_compute_https_health_check/meta", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, + "format": 1 + }, + { + "name": "tests/integration/targets/gcp_compute_https_health_check/meta/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "9e8a96b0ebfb9738c7eb615d58441ad79b7fff043c8b8db658ce9c518310bf52", + "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "tests/integration/targets/gcp_resourcemanager_project/meta", + "name": "tests/integration/targets/gcp_compute_https_health_check/defaults", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_resourcemanager_project/meta/main.yml", + "name": "tests/integration/targets/gcp_compute_https_health_check/defaults/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", + "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_interconnect_attachment", + "name": "tests/integration/targets/gcp_compute_https_health_check/aliases", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", + "format": 1 + }, + { + "name": "tests/integration/targets/gcp_filestore_instance", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_interconnect_attachment/defaults", + "name": "tests/integration/targets/gcp_filestore_instance/tasks", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_interconnect_attachment/defaults/main.yml", + "name": "tests/integration/targets/gcp_filestore_instance/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e173e5a15d9174e198e85c764f303f04d96463d7e1af4685fdbeec2e5cf391d7", + "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_interconnect_attachment/aliases", + "name": "tests/integration/targets/gcp_filestore_instance/tasks/autogen.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", + "chksum_sha256": "0c3b0eb038a6de86eabb7558d8c87462f35427399d1cdea2d20c50b53b3ba206", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_interconnect_attachment/meta", + "name": "tests/integration/targets/gcp_filestore_instance/meta", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_interconnect_attachment/meta/main.yml", + "name": "tests/integration/targets/gcp_filestore_instance/meta/main.yml", "ftype": "file", "chksum_type": "sha256", "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_target_http_proxy", + "name": "tests/integration/targets/gcp_filestore_instance/defaults", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_target_http_proxy/defaults", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "tests/integration/targets/gcp_filestore_instance/defaults/main.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_target_http_proxy/defaults/main.yml", + "name": "tests/integration/targets/gcp_filestore_instance/aliases", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", + "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_target_http_proxy/tasks", + "name": "tests/integration/targets/gcp_sql_user", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_target_http_proxy/tasks/autogen.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "673b3a5983827f1a40a49a56f7b0ad0d30baeb257e872d160f88ce87e03ab845", + "name": "tests/integration/targets/gcp_sql_user/tasks", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_target_http_proxy/tasks/main.yml", + "name": "tests/integration/targets/gcp_sql_user/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10", + "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_target_http_proxy/aliases", + "name": "tests/integration/targets/gcp_sql_user/tasks/autogen.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", + "chksum_sha256": "3c7a4aa8f50f706e4638b9d1397abfecf5b1fdd41faa3b6e15b7916bd9257e9c", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_target_http_proxy/meta", + "name": "tests/integration/targets/gcp_sql_user/meta", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_target_http_proxy/meta/main.yml", + "name": "tests/integration/targets/gcp_sql_user/meta/main.yml", "ftype": "file", "chksum_type": "sha256", "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_region_url_map", + "name": "tests/integration/targets/gcp_sql_user/defaults", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_region_url_map/defaults", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "tests/integration/targets/gcp_sql_user/defaults/main.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_region_url_map/defaults/main.yml", + "name": "tests/integration/targets/gcp_sql_user/aliases", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", + "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_region_url_map/tasks", + "name": "tests/integration/targets/gcp_compute_region_autoscaler", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_region_url_map/tasks/autogen.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "bde8dedd49df6e6f0dba3a8fb84558d0d075ebf35c17e1e9137bd739b4ba7aff", + "name": "tests/integration/targets/gcp_compute_region_autoscaler/tasks", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_region_url_map/tasks/main.yml", + "name": "tests/integration/targets/gcp_compute_region_autoscaler/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10", + "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_region_url_map/aliases", + "name": "tests/integration/targets/gcp_compute_region_autoscaler/tasks/autogen.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", + "chksum_sha256": "f3ec8cf709a7c114bb16ca33bc0fddd7ce3ddd919bf215435b23a07202a7db57", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_region_url_map/meta", + "name": "tests/integration/targets/gcp_compute_region_autoscaler/meta", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_region_url_map/meta/main.yml", + "name": "tests/integration/targets/gcp_compute_region_autoscaler/meta/main.yml", "ftype": "file", "chksum_type": "sha256", "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_subnetwork", + "name": "tests/integration/targets/gcp_compute_region_autoscaler/defaults", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_subnetwork/defaults", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "tests/integration/targets/gcp_compute_region_autoscaler/defaults/main.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_subnetwork/defaults/main.yml", + "name": "tests/integration/targets/gcp_compute_region_autoscaler/aliases", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", + "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_subnetwork/tasks", + "name": "tests/integration/targets/gcp_compute_route", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_subnetwork/tasks/autogen.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "133fdaac8a4b68473667edd756a360a99dee58a4d3de39c774d51031fe1eccfb", + "name": "tests/integration/targets/gcp_compute_route/tasks", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_subnetwork/tasks/main.yml", + "name": "tests/integration/targets/gcp_compute_route/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10", + "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_subnetwork/aliases", + "name": "tests/integration/targets/gcp_compute_route/tasks/autogen.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", + "chksum_sha256": "8142afae415dc3308ba280986c5f72c9c9a671afee7f8ad7f1b56324456c87c6", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_subnetwork/meta", + "name": "tests/integration/targets/gcp_compute_route/meta", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_subnetwork/meta/main.yml", + "name": "tests/integration/targets/gcp_compute_route/meta/main.yml", "ftype": "file", "chksum_type": "sha256", "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_region_target_https_proxy", + "name": "tests/integration/targets/gcp_compute_route/defaults", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_region_target_https_proxy/defaults", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "tests/integration/targets/gcp_compute_route/defaults/main.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_region_target_https_proxy/defaults/main.yml", + "name": "tests/integration/targets/gcp_compute_route/aliases", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", + "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_region_target_https_proxy/tasks", + "name": "tests/integration/targets/gcp_compute_ssl_policy", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_region_target_https_proxy/tasks/autogen.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "714674d2f7da36831a9a6b261955bfb77d394f199f6edbf746f2c1309931409b", + "name": "tests/integration/targets/gcp_compute_ssl_policy/tasks", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_region_target_https_proxy/tasks/main.yml", + "name": "tests/integration/targets/gcp_compute_ssl_policy/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10", + "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_region_target_https_proxy/aliases", + "name": "tests/integration/targets/gcp_compute_ssl_policy/tasks/autogen.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "94e3b292c9415f07fc0b6597f537ad347cde4bf7d629f34f74e2c5db9af03893", + "chksum_sha256": "575e4dfa9400e44c364c70f30bcbfaabe4f7e4b2a76baba281e1b0c2bc5d35cd", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_region_target_https_proxy/meta", + "name": "tests/integration/targets/gcp_compute_ssl_policy/meta", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_region_target_https_proxy/meta/main.yml", + "name": "tests/integration/targets/gcp_compute_ssl_policy/meta/main.yml", "ftype": "file", "chksum_type": "sha256", "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_instance_group", + "name": "tests/integration/targets/gcp_compute_ssl_policy/defaults", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_instance_group/defaults", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "tests/integration/targets/gcp_compute_ssl_policy/defaults/main.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_instance_group/defaults/main.yml", + "name": "tests/integration/targets/gcp_compute_ssl_policy/aliases", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", + "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_instance_group/tasks", + "name": "tests/integration/targets/gcp_kms_key_ring", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_instance_group/tasks/autogen.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "59c4bc199209b35385a9cfb2add5e750bf6b8c3ad0a555a10cd56d84130bd562", + "name": "tests/integration/targets/gcp_kms_key_ring/tasks", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_instance_group/tasks/main.yml", + "name": "tests/integration/targets/gcp_kms_key_ring/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10", + "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_instance_group/aliases", + "name": "tests/integration/targets/gcp_kms_key_ring/tasks/autogen.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", + "chksum_sha256": "3f700f0454cc0c53726cdf51a1dbddcadb23791a2a0f6191f1606dcc226b80c2", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_instance_group/meta", + "name": "tests/integration/targets/gcp_kms_key_ring/meta", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_instance_group/meta/main.yml", + "name": "tests/integration/targets/gcp_kms_key_ring/meta/main.yml", "ftype": "file", "chksum_type": "sha256", "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_firewall", + "name": "tests/integration/targets/gcp_kms_key_ring/defaults", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_firewall/defaults", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "tests/integration/targets/gcp_kms_key_ring/defaults/main.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_firewall/defaults/main.yml", + "name": "tests/integration/targets/gcp_kms_key_ring/aliases", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", + "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_firewall/tasks", + "name": "tests/integration/targets/gcp_sql_ssl_cert", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_firewall/tasks/update.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "cd09c1b481a7612aed41f1119bcb59c1a412321b137bc07b765bbbd38150418a", - "format": 1 - }, - { - "name": "tests/integration/targets/gcp_compute_firewall/tasks/autogen.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "83a0883c9904122f0233ad0b9368f7f0f1494c54634d1ac376863fb38c4e1842", + "name": "tests/integration/targets/gcp_sql_ssl_cert/tasks", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_firewall/tasks/main.yml", + "name": "tests/integration/targets/gcp_sql_ssl_cert/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "22dd7b88cc898d814a9bfa040af5aa7b03ed08d7bb9fc5d79342e87fc336ec49", + "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_firewall/aliases", + "name": "tests/integration/targets/gcp_sql_ssl_cert/tasks/autogen.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", + "chksum_sha256": "b11a3955cf8e5c77c7f3d0118c2ff6dbd4b589a522b277bd601100503f0b9b93", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_firewall/meta", + "name": "tests/integration/targets/gcp_sql_ssl_cert/meta", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_firewall/meta/main.yml", + "name": "tests/integration/targets/gcp_sql_ssl_cert/meta/main.yml", "ftype": "file", "chksum_type": "sha256", "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_autoscaler", + "name": "tests/integration/targets/gcp_sql_ssl_cert/defaults", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_autoscaler/defaults", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "tests/integration/targets/gcp_sql_ssl_cert/defaults/main.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_autoscaler/defaults/main.yml", + "name": "tests/integration/targets/gcp_sql_ssl_cert/aliases", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", + "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_autoscaler/tasks", + "name": "tests/integration/targets/gcp_kms_crypto_key", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_autoscaler/tasks/autogen.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "244abdc2bfab06c6e9294e4da33f1d4634b9a114d8d33056571d8adab60ec8b4", + "name": "tests/integration/targets/gcp_kms_crypto_key/tasks", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_autoscaler/tasks/main.yml", + "name": "tests/integration/targets/gcp_kms_crypto_key/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10", + "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_autoscaler/aliases", + "name": "tests/integration/targets/gcp_kms_crypto_key/tasks/autogen.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", + "chksum_sha256": "49db08f7fec717681fe44526a9f4f43de0b2dc9583d9f39b1cc51533942024b9", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_autoscaler/meta", + "name": "tests/integration/targets/gcp_kms_crypto_key/meta", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_autoscaler/meta/main.yml", + "name": "tests/integration/targets/gcp_kms_crypto_key/meta/main.yml", "ftype": "file", "chksum_type": "sha256", "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_global_forwarding_rule", + "name": "tests/integration/targets/gcp_kms_crypto_key/defaults", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_global_forwarding_rule/defaults", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "tests/integration/targets/gcp_kms_crypto_key/defaults/main.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_global_forwarding_rule/defaults/main.yml", + "name": "tests/integration/targets/gcp_kms_crypto_key/aliases", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", + "chksum_sha256": "5dab10dc09ed5cb445c47bfd67629b39efb7bd68e65e6b773896a8eb507d588e", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_global_forwarding_rule/tasks", + "name": "tests/integration/targets/gcp_bigquery_table", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_global_forwarding_rule/tasks/autogen.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "326c0088fd0a3a55048d6aa7002589ff58ecb40aadf9ba8c83d8664593047f52", + "name": "tests/integration/targets/gcp_bigquery_table/tasks", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_global_forwarding_rule/tasks/main.yml", + "name": "tests/integration/targets/gcp_bigquery_table/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10", + "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_global_forwarding_rule/aliases", + "name": "tests/integration/targets/gcp_bigquery_table/tasks/autogen.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", + "chksum_sha256": "075f61e576259596f7ef8876f3635fc6fdfba4842666b43008c9b7a04e5b152a", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_global_forwarding_rule/meta", + "name": "tests/integration/targets/gcp_bigquery_table/meta", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_global_forwarding_rule/meta/main.yml", + "name": "tests/integration/targets/gcp_bigquery_table/meta/main.yml", "ftype": "file", "chksum_type": "sha256", "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "tests/integration/targets/gcp_redis_instance", + "name": "tests/integration/targets/gcp_bigquery_table/defaults", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_redis_instance/defaults", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "tests/integration/targets/gcp_bigquery_table/defaults/main.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", "format": 1 }, { - "name": "tests/integration/targets/gcp_redis_instance/defaults/main.yml", + "name": "tests/integration/targets/gcp_bigquery_table/aliases", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", + "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", "format": 1 }, { - "name": "tests/integration/targets/gcp_redis_instance/tasks", + "name": "tests/integration/targets/gcp_storage_object", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_redis_instance/tasks/autogen.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "cca715a33977798f0e3f83bb57739c8cebc983864e5c7d93fd7644bba555aeea", - "format": 1 - }, - { - "name": "tests/integration/targets/gcp_redis_instance/tasks/main.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10", + "name": "tests/integration/targets/gcp_storage_object/tasks", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_redis_instance/aliases", + "name": "tests/integration/targets/gcp_storage_object/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", + "chksum_sha256": "19e3cd44f0712d335378d8a5666362355e7161308fa8bae5e9c35f81cdb87c7a", "format": 1 }, { - "name": "tests/integration/targets/gcp_redis_instance/meta", + "name": "tests/integration/targets/gcp_storage_object/meta", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_redis_instance/meta/main.yml", + "name": "tests/integration/targets/gcp_storage_object/meta/main.yml", "ftype": "file", "chksum_type": "sha256", "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "tests/integration/targets/gcp_storage_bucket", + "name": "tests/integration/targets/gcp_storage_object/defaults", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_storage_bucket/defaults", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "tests/integration/targets/gcp_storage_object/defaults/main.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", "format": 1 }, { - "name": "tests/integration/targets/gcp_storage_bucket/defaults/main.yml", + "name": "tests/integration/targets/gcp_storage_object/aliases", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "3087d8090fde9451c1d45dbe3d8cd7a1f5284b4d036b9a69d1aebbc139d706dc", + "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", "format": 1 }, { - "name": "tests/integration/targets/gcp_storage_bucket/tasks", + "name": "tests/integration/targets/gcp_compute_target_https_proxy", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_storage_bucket/tasks/autogen.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "e2a4ffd2d2b09e6bba34e034d96f6b398f2f93c11ee59ea542fca61a65205acb", + "name": "tests/integration/targets/gcp_compute_target_https_proxy/tasks", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_storage_bucket/tasks/main.yml", + "name": "tests/integration/targets/gcp_compute_target_https_proxy/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10", + "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5", "format": 1 }, { - "name": "tests/integration/targets/gcp_storage_bucket/aliases", + "name": "tests/integration/targets/gcp_compute_target_https_proxy/tasks/autogen.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", + "chksum_sha256": "7ee6a3a68b102433bd3fea2e31d8665d79f044876712784c36821fd153cbe7fb", "format": 1 }, { - "name": "tests/integration/targets/gcp_storage_bucket/meta", + "name": "tests/integration/targets/gcp_compute_target_https_proxy/meta", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_storage_bucket/meta/main.yml", + "name": "tests/integration/targets/gcp_compute_target_https_proxy/meta/main.yml", "ftype": "file", "chksum_type": "sha256", "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "tests/integration/targets/gcp_storage_bucket_access_control", + "name": "tests/integration/targets/gcp_compute_target_https_proxy/defaults", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_storage_bucket_access_control/defaults", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "tests/integration/targets/gcp_compute_target_https_proxy/defaults/main.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", "format": 1 }, { - "name": "tests/integration/targets/gcp_storage_bucket_access_control/defaults/main.yml", + "name": "tests/integration/targets/gcp_compute_target_https_proxy/aliases", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", + "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", "format": 1 }, { - "name": "tests/integration/targets/gcp_storage_bucket_access_control/tasks", + "name": "tests/integration/targets/gcp_container_node_pool", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_storage_bucket_access_control/tasks/autogen.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "3e9c925f60d9b3c652326af257f4db0f011a75000a57c415efd891e2e4f69fb6", + "name": "tests/integration/targets/gcp_container_node_pool/tasks", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_storage_bucket_access_control/tasks/main.yml", + "name": "tests/integration/targets/gcp_container_node_pool/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10", + "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5", "format": 1 }, { - "name": "tests/integration/targets/gcp_storage_bucket_access_control/aliases", + "name": "tests/integration/targets/gcp_container_node_pool/tasks/autogen.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", + "chksum_sha256": "8dc4de27969c631e7881612770b09ac333477cd0750a7fa42f92accde8c3c036", "format": 1 }, { - "name": "tests/integration/targets/gcp_storage_bucket_access_control/meta", + "name": "tests/integration/targets/gcp_container_node_pool/meta", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_storage_bucket_access_control/meta/main.yml", + "name": "tests/integration/targets/gcp_container_node_pool/meta/main.yml", "ftype": "file", "chksum_type": "sha256", "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "tests/integration/targets/gcp_sql_ssl_cert", + "name": "tests/integration/targets/gcp_container_node_pool/defaults", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_sql_ssl_cert/defaults", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "tests/integration/targets/gcp_container_node_pool/defaults/main.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", "format": 1 }, { - "name": "tests/integration/targets/gcp_sql_ssl_cert/defaults/main.yml", + "name": "tests/integration/targets/gcp_container_node_pool/aliases", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", + "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", "format": 1 }, { - "name": "tests/integration/targets/gcp_sql_ssl_cert/tasks", + "name": "tests/integration/targets/gcp_pubsub_subscription", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_sql_ssl_cert/tasks/autogen.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "fc97571dc5d631e9c1b2847480486d728561198a694c98428239e809948be03c", + "name": "tests/integration/targets/gcp_pubsub_subscription/tasks", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_sql_ssl_cert/tasks/main.yml", + "name": "tests/integration/targets/gcp_pubsub_subscription/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10", + "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5", "format": 1 }, { - "name": "tests/integration/targets/gcp_sql_ssl_cert/aliases", + "name": "tests/integration/targets/gcp_pubsub_subscription/tasks/autogen.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "2fe5796e1684ef3e4b021a5c5ca7438f563850b7d86fa8bb4d0b4ef900e15ae2", + "chksum_sha256": "32505284640b29f03a4a78d1e5617349c76c5f3c1c5d5afbc3a2e130b3f1595a", "format": 1 }, { - "name": "tests/integration/targets/gcp_sql_ssl_cert/meta", + "name": "tests/integration/targets/gcp_pubsub_subscription/meta", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_sql_ssl_cert/meta/main.yml", + "name": "tests/integration/targets/gcp_pubsub_subscription/meta/main.yml", "ftype": "file", "chksum_type": "sha256", "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "tests/integration/targets/gcp_tpu_node", + "name": "tests/integration/targets/gcp_pubsub_subscription/defaults", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_tpu_node/defaults", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "tests/integration/targets/gcp_pubsub_subscription/defaults/main.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", "format": 1 }, { - "name": "tests/integration/targets/gcp_tpu_node/defaults/main.yml", + "name": "tests/integration/targets/gcp_pubsub_subscription/aliases", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", + "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", "format": 1 }, { - "name": "tests/integration/targets/gcp_tpu_node/tasks", + "name": "tests/integration/targets/gcp_pubsub_topic", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_tpu_node/tasks/autogen.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "787298daba9a2f2fa0d6afda785192680f5905711b03e468987eebfb6d9ebee5", + "name": "tests/integration/targets/gcp_pubsub_topic/tasks", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_tpu_node/tasks/main.yml", + "name": "tests/integration/targets/gcp_pubsub_topic/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10", + "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5", "format": 1 }, { - "name": "tests/integration/targets/gcp_tpu_node/aliases", + "name": "tests/integration/targets/gcp_pubsub_topic/tasks/autogen.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", + "chksum_sha256": "824ebeaf2bfddd3b018f9ba81592b252d4576b62277754e9c2f36e48b159f137", "format": 1 }, { - "name": "tests/integration/targets/gcp_tpu_node/meta", + "name": "tests/integration/targets/gcp_pubsub_topic/meta", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_tpu_node/meta/main.yml", + "name": "tests/integration/targets/gcp_pubsub_topic/meta/main.yml", "ftype": "file", "chksum_type": "sha256", "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_region_instance_group_manager", + "name": "tests/integration/targets/gcp_pubsub_topic/defaults", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_region_instance_group_manager/defaults", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "tests/integration/targets/gcp_pubsub_topic/defaults/main.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_region_instance_group_manager/defaults/main.yml", + "name": "tests/integration/targets/gcp_pubsub_topic/aliases", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", + "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_region_instance_group_manager/tasks", + "name": "tests/integration/targets/gcp_resourcemanager_project", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_region_instance_group_manager/tasks/autogen.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "5f6ec8c7765f58feada732f2f29825348ed2fd8f177c050dfce759af56c3b987", + "name": "tests/integration/targets/gcp_resourcemanager_project/tasks", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_region_instance_group_manager/tasks/main.yml", + "name": "tests/integration/targets/gcp_resourcemanager_project/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10", + "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_region_instance_group_manager/aliases", + "name": "tests/integration/targets/gcp_resourcemanager_project/tasks/autogen.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", + "chksum_sha256": "611901e11ffa821682a5145307001becff8f465cc87d317f03e2fdd4868b357f", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_region_instance_group_manager/meta", + "name": "tests/integration/targets/gcp_resourcemanager_project/meta", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_region_instance_group_manager/meta/main.yml", + "name": "tests/integration/targets/gcp_resourcemanager_project/meta/main.yml", "ftype": "file", "chksum_type": "sha256", "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "tests/integration/targets/gcp_storage_object", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, - "format": 1 - }, - { - "name": "tests/integration/targets/gcp_storage_object/defaults", + "name": "tests/integration/targets/gcp_resourcemanager_project/defaults", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_storage_object/defaults/main.yml", + "name": "tests/integration/targets/gcp_resourcemanager_project/defaults/main.yml", "ftype": "file", "chksum_type": "sha256", "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", "format": 1 }, { - "name": "tests/integration/targets/gcp_storage_object/tasks", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, - "format": 1 - }, - { - "name": "tests/integration/targets/gcp_storage_object/tasks/main.yml", + "name": "tests/integration/targets/gcp_resourcemanager_project/aliases", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e4555f635fe3fecbf067d6b80d6e2001448613eb535c8e1c9be7dffca488121a", + "chksum_sha256": "9e8a96b0ebfb9738c7eb615d58441ad79b7fff043c8b8db658ce9c518310bf52", "format": 1 }, { - "name": "tests/integration/targets/gcp_storage_object/aliases", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", + "name": "tests/integration/targets/gcp_iam_service_account_key", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_storage_object/meta", + "name": "tests/integration/targets/gcp_iam_service_account_key/meta", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_storage_object/meta/main.yml", + "name": "tests/integration/targets/gcp_iam_service_account_key/meta/main.yml", "ftype": "file", "chksum_type": "sha256", "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "tests/integration/targets/gcp_storage_default_object_acl", + "name": "tests/integration/targets/gcp_iam_service_account_key/defaults", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_storage_default_object_acl/defaults", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "tests/integration/targets/gcp_iam_service_account_key/defaults/main.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "bd5ce1e4b6d6cd7f0b4881112f82d8cd3541d26a8c639151c95a6f11842f1617", "format": 1 }, { - "name": "tests/integration/targets/gcp_storage_default_object_acl/defaults/main.yml", + "name": "tests/integration/targets/gcp_iam_service_account_key/aliases", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", + "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", "format": 1 }, { - "name": "tests/integration/targets/gcp_storage_default_object_acl/tasks", + "name": "tests/integration/targets/gcp_compute_region_backend_service", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_storage_default_object_acl/tasks/autogen.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "85e6310906f350174979d0a48ef77a5e0d76c229ec067b4dfc15f31fd9c33dcf", + "name": "tests/integration/targets/gcp_compute_region_backend_service/tasks", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_storage_default_object_acl/tasks/main.yml", + "name": "tests/integration/targets/gcp_compute_region_backend_service/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10", + "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5", "format": 1 }, { - "name": "tests/integration/targets/gcp_storage_default_object_acl/aliases", + "name": "tests/integration/targets/gcp_compute_region_backend_service/tasks/autogen.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "4029f43c2014b1bc6e3291863328c0e7cf791ca6d846902a2b38352440528070", + "chksum_sha256": "35d6a3729f775201d6312661d211b35130a9bcb529340cd765805e1197a573bc", "format": 1 }, { - "name": "tests/integration/targets/gcp_storage_default_object_acl/meta", + "name": "tests/integration/targets/gcp_compute_region_backend_service/meta", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_storage_default_object_acl/meta/main.yml", + "name": "tests/integration/targets/gcp_compute_region_backend_service/meta/main.yml", "ftype": "file", "chksum_type": "sha256", "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "tests/integration/targets/gcp_runtimeconfig_variable", + "name": "tests/integration/targets/gcp_compute_region_backend_service/defaults", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_runtimeconfig_variable/defaults", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "tests/integration/targets/gcp_compute_region_backend_service/defaults/main.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", "format": 1 }, { - "name": "tests/integration/targets/gcp_runtimeconfig_variable/defaults/main.yml", + "name": "tests/integration/targets/gcp_compute_region_backend_service/aliases", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", + "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", "format": 1 }, { - "name": "tests/integration/targets/gcp_runtimeconfig_variable/tasks", + "name": "tests/integration/targets/gcp_compute_firewall", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_runtimeconfig_variable/tasks/autogen.yml", + "name": "tests/integration/targets/gcp_compute_firewall/tasks", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, + "format": 1 + }, + { + "name": "tests/integration/targets/gcp_compute_firewall/tasks/update.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "bd2647bee8783e9d96d8cb9d8f3e74b312060c4dd6c3c52c553f7e8f882cfe7a", + "chksum_sha256": "3fb4aac101161948f3c0c54d649b5ae6d6dbcc2601782fa066489bd46577ff2b", "format": 1 }, { - "name": "tests/integration/targets/gcp_runtimeconfig_variable/tasks/main.yml", + "name": "tests/integration/targets/gcp_compute_firewall/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10", + "chksum_sha256": "8b01376417fda5d0e323bef6ae87cd25d5b25a6be1e457a6c82b779453574ebc", "format": 1 }, { - "name": "tests/integration/targets/gcp_runtimeconfig_variable/aliases", + "name": "tests/integration/targets/gcp_compute_firewall/tasks/autogen.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", + "chksum_sha256": "208edd853dfcc2111731899d207df211a55cd045717c958c24e27dcb46c8d0b2", "format": 1 }, { - "name": "tests/integration/targets/gcp_runtimeconfig_variable/meta", + "name": "tests/integration/targets/gcp_compute_firewall/meta", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_runtimeconfig_variable/meta/main.yml", + "name": "tests/integration/targets/gcp_compute_firewall/meta/main.yml", "ftype": "file", "chksum_type": "sha256", "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_backend_bucket", + "name": "tests/integration/targets/gcp_compute_firewall/defaults", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_backend_bucket/defaults", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "tests/integration/targets/gcp_compute_firewall/defaults/main.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_backend_bucket/defaults/main.yml", + "name": "tests/integration/targets/gcp_compute_firewall/aliases", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", + "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_backend_bucket/tasks", + "name": "tests/integration/targets/gcp_compute_target_http_proxy", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_backend_bucket/tasks/autogen.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "38d1f55fdfd3135d951463b208b8c8b4ce5c237d7d459d76c1a398ee44244c11", + "name": "tests/integration/targets/gcp_compute_target_http_proxy/tasks", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_backend_bucket/tasks/main.yml", + "name": "tests/integration/targets/gcp_compute_target_http_proxy/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10", + "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_backend_bucket/aliases", + "name": "tests/integration/targets/gcp_compute_target_http_proxy/tasks/autogen.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", + "chksum_sha256": "3dfebd9ce4f1e9d8bb26ab61a6c4133687391f1d5808b5e914f3db74e6ec21b9", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_backend_bucket/meta", + "name": "tests/integration/targets/gcp_compute_target_http_proxy/meta", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_backend_bucket/meta/main.yml", + "name": "tests/integration/targets/gcp_compute_target_http_proxy/meta/main.yml", "ftype": "file", "chksum_type": "sha256", "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_snapshot", + "name": "tests/integration/targets/gcp_compute_target_http_proxy/defaults", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_snapshot/defaults", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "tests/integration/targets/gcp_compute_target_http_proxy/defaults/main.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_snapshot/defaults/main.yml", + "name": "tests/integration/targets/gcp_compute_target_http_proxy/aliases", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", + "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_snapshot/tasks", + "name": "tests/integration/targets/gcp_iam_service_account", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_snapshot/tasks/autogen.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "ca77bc063ac8f28eb9cdc3afcf68c51daec20e1ceed28f2b0e754f4079f49e30", + "name": "tests/integration/targets/gcp_iam_service_account/tasks", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_snapshot/tasks/main.yml", + "name": "tests/integration/targets/gcp_iam_service_account/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10", + "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_snapshot/aliases", + "name": "tests/integration/targets/gcp_iam_service_account/tasks/autogen.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", + "chksum_sha256": "69987aadcaa040b6d3c8999728659b448850c8b6e7852a07035ab1b8f87a3256", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_snapshot/meta", + "name": "tests/integration/targets/gcp_iam_service_account/meta", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_snapshot/meta/main.yml", + "name": "tests/integration/targets/gcp_iam_service_account/meta/main.yml", "ftype": "file", "chksum_type": "sha256", "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_route", + "name": "tests/integration/targets/gcp_iam_service_account/defaults", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_route/defaults", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "tests/integration/targets/gcp_iam_service_account/defaults/main.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_route/defaults/main.yml", + "name": "tests/integration/targets/gcp_iam_service_account/aliases", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", + "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_route/tasks", + "name": "tests/integration/targets/gcp_runtimeconfig_variable", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_route/tasks/autogen.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "3efc77c9feaeae76d96956d637594f49673114879f8867d969e353ff6fcf5f76", + "name": "tests/integration/targets/gcp_runtimeconfig_variable/tasks", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_route/tasks/main.yml", + "name": "tests/integration/targets/gcp_runtimeconfig_variable/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10", + "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_route/aliases", + "name": "tests/integration/targets/gcp_runtimeconfig_variable/tasks/autogen.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", + "chksum_sha256": "6310ddd1c456f0776e1a42b9cf4e39a8302bff121757a743e710f1a7c77ccbf3", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_route/meta", + "name": "tests/integration/targets/gcp_runtimeconfig_variable/meta", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_route/meta/main.yml", + "name": "tests/integration/targets/gcp_runtimeconfig_variable/meta/main.yml", "ftype": "file", "chksum_type": "sha256", "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_network_endpoint_group", + "name": "tests/integration/targets/gcp_runtimeconfig_variable/defaults", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_network_endpoint_group/defaults", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "tests/integration/targets/gcp_runtimeconfig_variable/defaults/main.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_network_endpoint_group/defaults/main.yml", + "name": "tests/integration/targets/gcp_runtimeconfig_variable/aliases", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", + "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_network_endpoint_group/tasks", + "name": "tests/integration/targets/gcp_compute_network", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_network_endpoint_group/tasks/autogen.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "3370733c5a337ef9316499a00845d9df8c95194ad332d60cff6fe21f20c065e5", + "name": "tests/integration/targets/gcp_compute_network/tasks", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_network_endpoint_group/tasks/main.yml", + "name": "tests/integration/targets/gcp_compute_network/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10", + "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_network_endpoint_group/aliases", + "name": "tests/integration/targets/gcp_compute_network/tasks/autogen.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", + "chksum_sha256": "9f33bfd2078dad54f0465c1bd72c17974776527b1d970881a459e9e852dab4dc", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_network_endpoint_group/meta", + "name": "tests/integration/targets/gcp_compute_network/meta", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_network_endpoint_group/meta/main.yml", + "name": "tests/integration/targets/gcp_compute_network/meta/main.yml", "ftype": "file", "chksum_type": "sha256", "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "tests/integration/targets/gcp_dns_resource_record_set", + "name": "tests/integration/targets/gcp_compute_network/defaults", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_dns_resource_record_set/defaults", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "tests/integration/targets/gcp_compute_network/defaults/main.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", "format": 1 }, { - "name": "tests/integration/targets/gcp_dns_resource_record_set/defaults/main.yml", + "name": "tests/integration/targets/gcp_compute_network/aliases", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", + "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", "format": 1 }, { - "name": "tests/integration/targets/gcp_dns_resource_record_set/tasks", + "name": "tests/integration/targets/gcp_compute_resource_policy", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_dns_resource_record_set/tasks/autogen.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "f0c70c6b9a8434310652b05a68a3dfdffd981df1f3fc022accc33c56aa4aa15b", + "name": "tests/integration/targets/gcp_compute_resource_policy/tasks", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_dns_resource_record_set/tasks/main.yml", + "name": "tests/integration/targets/gcp_compute_resource_policy/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10", + "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5", "format": 1 }, { - "name": "tests/integration/targets/gcp_dns_resource_record_set/aliases", + "name": "tests/integration/targets/gcp_compute_resource_policy/tasks/autogen.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", + "chksum_sha256": "35a8d0e2116e8e3070ce8a10572392fc4c78c23100c35bb046bf30fa96c3bddb", "format": 1 }, { - "name": "tests/integration/targets/gcp_dns_resource_record_set/meta", + "name": "tests/integration/targets/gcp_compute_resource_policy/meta", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_dns_resource_record_set/meta/main.yml", + "name": "tests/integration/targets/gcp_compute_resource_policy/meta/main.yml", "ftype": "file", "chksum_type": "sha256", "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_ssl_certificate", + "name": "tests/integration/targets/gcp_compute_resource_policy/defaults", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_ssl_certificate/defaults", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "tests/integration/targets/gcp_compute_resource_policy/defaults/main.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_ssl_certificate/defaults/main.yml", + "name": "tests/integration/targets/gcp_compute_resource_policy/aliases", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", + "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_ssl_certificate/tasks", + "name": "tests/integration/targets/gcp_compute_target_pool", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_ssl_certificate/tasks/autogen.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "99ca8395998646d466678152458e3312be7293d7ec121caf0aa8a70acb577380", + "name": "tests/integration/targets/gcp_compute_target_pool/tasks", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_ssl_certificate/tasks/main.yml", + "name": "tests/integration/targets/gcp_compute_target_pool/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10", + "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_ssl_certificate/aliases", + "name": "tests/integration/targets/gcp_compute_target_pool/tasks/autogen.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", + "chksum_sha256": "7b8ef782d1279da0efc02d6eb7edfa60084fbd26486f0f7ba33c559230b02ce2", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_ssl_certificate/meta", + "name": "tests/integration/targets/gcp_compute_target_pool/meta", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_ssl_certificate/meta/main.yml", + "name": "tests/integration/targets/gcp_compute_target_pool/meta/main.yml", "ftype": "file", "chksum_type": "sha256", "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "tests/integration/targets/gcp_cloudfunctions_cloud_function", + "name": "tests/integration/targets/gcp_compute_target_pool/defaults", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_cloudfunctions_cloud_function/defaults", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "tests/integration/targets/gcp_compute_target_pool/defaults/main.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", "format": 1 }, { - "name": "tests/integration/targets/gcp_cloudfunctions_cloud_function/defaults/main.yml", + "name": "tests/integration/targets/gcp_compute_target_pool/aliases", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", + "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", "format": 1 }, { - "name": "tests/integration/targets/gcp_cloudfunctions_cloud_function/tasks", + "name": "tests/integration/targets/gcp_sql_database", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_cloudfunctions_cloud_function/tasks/autogen.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "777419fdedf81e04fba3e1d62bcd1b87e78146c2ebdcf4dd2c4a19e7f5664568", + "name": "tests/integration/targets/gcp_sql_database/tasks", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_cloudfunctions_cloud_function/tasks/main.yml", + "name": "tests/integration/targets/gcp_sql_database/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10", + "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5", "format": 1 }, { - "name": "tests/integration/targets/gcp_cloudfunctions_cloud_function/aliases", + "name": "tests/integration/targets/gcp_sql_database/tasks/autogen.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "5dab10dc09ed5cb445c47bfd67629b39efb7bd68e65e6b773896a8eb507d588e", + "chksum_sha256": "974bf463cb5091aec9e821aa665347cd7a6ede2eecac093b948b564745c99994", "format": 1 }, { - "name": "tests/integration/targets/gcp_cloudfunctions_cloud_function/meta", + "name": "tests/integration/targets/gcp_sql_database/meta", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_cloudfunctions_cloud_function/meta/main.yml", + "name": "tests/integration/targets/gcp_sql_database/meta/main.yml", "ftype": "file", "chksum_type": "sha256", "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_target_tcp_proxy", + "name": "tests/integration/targets/gcp_sql_database/defaults", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_target_tcp_proxy/defaults", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "tests/integration/targets/gcp_sql_database/defaults/main.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_target_tcp_proxy/defaults/main.yml", + "name": "tests/integration/targets/gcp_sql_database/aliases", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", + "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_target_tcp_proxy/tasks", + "name": "tests/integration/targets/gcp_compute_node_group", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_target_tcp_proxy/tasks/autogen.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "04233bae3259f4c1a5c5a86aba4e01b9b77b944835e938e42285016a421e9830", + "name": "tests/integration/targets/gcp_compute_node_group/tasks", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_target_tcp_proxy/tasks/main.yml", + "name": "tests/integration/targets/gcp_compute_node_group/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10", + "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_target_tcp_proxy/aliases", + "name": "tests/integration/targets/gcp_compute_node_group/tasks/autogen.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", + "chksum_sha256": "cb9dbfc0fdfe34eaaaae6af5affd3acc3be696a368ebc6fd6b726ac3c573e185", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_target_tcp_proxy/meta", + "name": "tests/integration/targets/gcp_compute_node_group/meta", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_target_tcp_proxy/meta/main.yml", + "name": "tests/integration/targets/gcp_compute_node_group/meta/main.yml", "ftype": "file", "chksum_type": "sha256", "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_target_vpn_gateway", + "name": "tests/integration/targets/gcp_compute_node_group/defaults", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_target_vpn_gateway/defaults", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "tests/integration/targets/gcp_compute_node_group/defaults/main.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_target_vpn_gateway/defaults/main.yml", + "name": "tests/integration/targets/gcp_compute_node_group/aliases", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", + "chksum_sha256": "5e4f7328221273ee32b8a832b9d8886771fc64733f845175bb1373dcd1752985", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_target_vpn_gateway/tasks", + "name": "tests/integration/targets/gcp_compute_reservation", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_target_vpn_gateway/tasks/autogen.yml", + "name": "tests/integration/targets/gcp_compute_reservation/tasks", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, + "format": 1 + }, + { + "name": "tests/integration/targets/gcp_compute_reservation/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "0038f1ff726e2ebb5511d0773f016a6db01453190a6f9ae6d484505c531f0c93", + "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_target_vpn_gateway/tasks/main.yml", + "name": "tests/integration/targets/gcp_compute_reservation/tasks/autogen.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10", + "chksum_sha256": "374ed7baa01561f463a32386130590b9f569792a4899fe54570677b9ea459086", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_target_vpn_gateway/aliases", + "name": "tests/integration/targets/gcp_compute_reservation/meta", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, + "format": 1 + }, + { + "name": "tests/integration/targets/gcp_compute_reservation/meta/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", + "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_target_vpn_gateway/meta", + "name": "tests/integration/targets/gcp_compute_reservation/defaults", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_target_vpn_gateway/meta/main.yml", + "name": "tests/integration/targets/gcp_compute_reservation/defaults/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", + "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", "format": 1 }, { - "name": "tests/integration/targets/gcp_filestore_instance", + "name": "tests/integration/targets/gcp_compute_reservation/aliases", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", + "format": 1 + }, + { + "name": "tests/integration/targets/gcp_compute_managed_ssl_certificate", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_filestore_instance/defaults", + "name": "tests/integration/targets/gcp_compute_managed_ssl_certificate/meta", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_filestore_instance/defaults/main.yml", + "name": "tests/integration/targets/gcp_compute_managed_ssl_certificate/meta/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", + "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "tests/integration/targets/gcp_filestore_instance/tasks", + "name": "tests/integration/targets/gcp_compute_managed_ssl_certificate/defaults", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_filestore_instance/tasks/autogen.yml", + "name": "tests/integration/targets/gcp_compute_managed_ssl_certificate/defaults/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "85eec71117ff90ba1b741057507feb76d776ba0fc79e9b9a7e95cc02934a5950", + "chksum_sha256": "bd5ce1e4b6d6cd7f0b4881112f82d8cd3541d26a8c639151c95a6f11842f1617", "format": 1 }, { - "name": "tests/integration/targets/gcp_filestore_instance/tasks/main.yml", + "name": "tests/integration/targets/gcp_compute_managed_ssl_certificate/aliases", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10", + "chksum_sha256": "5dab10dc09ed5cb445c47bfd67629b39efb7bd68e65e6b773896a8eb507d588e", "format": 1 }, { - "name": "tests/integration/targets/gcp_filestore_instance/aliases", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", + "name": "tests/integration/targets/gcp_tpu_node", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_filestore_instance/meta", + "name": "tests/integration/targets/gcp_tpu_node/tasks", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_filestore_instance/meta/main.yml", + "name": "tests/integration/targets/gcp_tpu_node/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", + "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5", "format": 1 }, { - "name": "tests/integration/targets/gcp_container_cluster", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "tests/integration/targets/gcp_tpu_node/tasks/autogen.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "a5449965fc7a3bbb3ac88d5dd4197178fb472fedc816ffd10705185092f7dda0", "format": 1 }, { - "name": "tests/integration/targets/gcp_container_cluster/defaults", + "name": "tests/integration/targets/gcp_tpu_node/meta", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_container_cluster/defaults/main.yml", + "name": "tests/integration/targets/gcp_tpu_node/meta/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", + "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "tests/integration/targets/gcp_container_cluster/tasks", + "name": "tests/integration/targets/gcp_tpu_node/defaults", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_container_cluster/tasks/autogen.yml", + "name": "tests/integration/targets/gcp_tpu_node/defaults/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "4615024ae74a1f415c03ebe8c5bc7ba1afc89004ad6e310381c8064d9f3c928b", + "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", "format": 1 }, { - "name": "tests/integration/targets/gcp_container_cluster/tasks/main.yml", + "name": "tests/integration/targets/gcp_tpu_node/aliases", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10", + "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", "format": 1 }, { - "name": "tests/integration/targets/gcp_container_cluster/aliases", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", + "name": "tests/integration/targets/gcp_mlengine_model", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_container_cluster/meta", + "name": "tests/integration/targets/gcp_mlengine_model/tasks", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_container_cluster/meta/main.yml", + "name": "tests/integration/targets/gcp_mlengine_model/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", + "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5", "format": 1 }, { - "name": "tests/integration/targets/gcp_dns_managed_zone", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "tests/integration/targets/gcp_mlengine_model/tasks/autogen.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "fdeec13a3552c712598f5b377ff3f14558148a6420762998b82d9a13ef12461d", "format": 1 }, { - "name": "tests/integration/targets/gcp_dns_managed_zone/defaults", + "name": "tests/integration/targets/gcp_mlengine_model/meta", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_dns_managed_zone/defaults/main.yml", + "name": "tests/integration/targets/gcp_mlengine_model/meta/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", + "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "tests/integration/targets/gcp_dns_managed_zone/tasks", + "name": "tests/integration/targets/gcp_mlengine_model/defaults", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_dns_managed_zone/tasks/autogen.yml", + "name": "tests/integration/targets/gcp_mlengine_model/defaults/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e02ad7cc8139529ab4d22662876c66a202875a42d4fb82364a2a1bf04cca6d64", + "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", "format": 1 }, { - "name": "tests/integration/targets/gcp_dns_managed_zone/tasks/main.yml", + "name": "tests/integration/targets/gcp_mlengine_model/aliases", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10", + "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", "format": 1 }, { - "name": "tests/integration/targets/gcp_dns_managed_zone/aliases", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", + "name": "tests/integration/targets/gcp_cloudbuild_trigger", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_dns_managed_zone/meta", + "name": "tests/integration/targets/gcp_cloudbuild_trigger/meta", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_dns_managed_zone/meta/main.yml", + "name": "tests/integration/targets/gcp_cloudbuild_trigger/meta/main.yml", "ftype": "file", "chksum_type": "sha256", "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "tests/integration/targets/gcp_cloudtasks_queue", + "name": "tests/integration/targets/gcp_cloudbuild_trigger/defaults", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_cloudtasks_queue/defaults", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "tests/integration/targets/gcp_cloudbuild_trigger/defaults/main.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "bd5ce1e4b6d6cd7f0b4881112f82d8cd3541d26a8c639151c95a6f11842f1617", "format": 1 }, { - "name": "tests/integration/targets/gcp_cloudtasks_queue/defaults/main.yml", + "name": "tests/integration/targets/gcp_cloudbuild_trigger/aliases", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", + "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", "format": 1 }, { - "name": "tests/integration/targets/gcp_cloudtasks_queue/tasks", + "name": "tests/integration/targets/gcp_compute_region_target_http_proxy", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_cloudtasks_queue/tasks/autogen.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "131c093a22fec824efad68cfb2f476609e9cc91cafbd257e84c4d31f148cc905", + "name": "tests/integration/targets/gcp_compute_region_target_http_proxy/tasks", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_cloudtasks_queue/tasks/main.yml", + "name": "tests/integration/targets/gcp_compute_region_target_http_proxy/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10", + "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5", "format": 1 }, { - "name": "tests/integration/targets/gcp_cloudtasks_queue/aliases", + "name": "tests/integration/targets/gcp_compute_region_target_http_proxy/tasks/autogen.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", + "chksum_sha256": "ba4db0f3dc764e06b7260519f1a759c591a733c5d6b50d09296d515a5c00b8e6", "format": 1 }, { - "name": "tests/integration/targets/gcp_cloudtasks_queue/meta", + "name": "tests/integration/targets/gcp_compute_region_target_http_proxy/meta", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_cloudtasks_queue/meta/main.yml", + "name": "tests/integration/targets/gcp_compute_region_target_http_proxy/meta/main.yml", "ftype": "file", "chksum_type": "sha256", "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "tests/integration/targets/gcp_pubsub_subscription", + "name": "tests/integration/targets/gcp_compute_region_target_http_proxy/defaults", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_pubsub_subscription/defaults", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "tests/integration/targets/gcp_compute_region_target_http_proxy/defaults/main.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", "format": 1 }, { - "name": "tests/integration/targets/gcp_pubsub_subscription/defaults/main.yml", + "name": "tests/integration/targets/gcp_compute_region_target_http_proxy/aliases", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", + "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", "format": 1 }, { - "name": "tests/integration/targets/gcp_pubsub_subscription/tasks", + "name": "tests/integration/targets/gcp_bigtable_instance", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_pubsub_subscription/tasks/autogen.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "0eb97554bdf8eb57eedd4fd85ad5c38bd425d4bb2908e9825f5582f0df095605", + "name": "tests/integration/targets/gcp_bigtable_instance/tasks", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_pubsub_subscription/tasks/main.yml", + "name": "tests/integration/targets/gcp_bigtable_instance/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10", + "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5", "format": 1 }, { - "name": "tests/integration/targets/gcp_pubsub_subscription/aliases", + "name": "tests/integration/targets/gcp_bigtable_instance/tasks/autogen.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", + "chksum_sha256": "b48fb3000c82bb866ea5afde4cc58197d3820e6a07e077347f5df90d21fc7dd6", "format": 1 }, { - "name": "tests/integration/targets/gcp_pubsub_subscription/meta", + "name": "tests/integration/targets/gcp_bigtable_instance/meta", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_pubsub_subscription/meta/main.yml", + "name": "tests/integration/targets/gcp_bigtable_instance/meta/main.yml", "ftype": "file", "chksum_type": "sha256", "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_instance_template", + "name": "tests/integration/targets/gcp_bigtable_instance/defaults", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_instance_template/defaults", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "tests/integration/targets/gcp_bigtable_instance/defaults/main.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_instance_template/defaults/main.yml", + "name": "tests/integration/targets/gcp_bigtable_instance/aliases", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", + "chksum_sha256": "6165de6d5352b3a386f558df0b34280af84d41b233d6862e505963ddd398ca50", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_instance_template/tasks", + "name": "tests/integration/targets/gcp_storage_bucket_access_control", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_instance_template/tasks/autogen.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "b026316be5f008b4238e4b5203a2bf9350bbd8c29fad948823f87214c3ccf4e8", + "name": "tests/integration/targets/gcp_storage_bucket_access_control/tasks", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_instance_template/tasks/main.yml", + "name": "tests/integration/targets/gcp_storage_bucket_access_control/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10", + "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_instance_template/aliases", + "name": "tests/integration/targets/gcp_storage_bucket_access_control/tasks/autogen.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "5dab10dc09ed5cb445c47bfd67629b39efb7bd68e65e6b773896a8eb507d588e", + "chksum_sha256": "51ac666228f6f53b40e22fd24c477e01ac1825f0ed138b3999dc6094bc0a8173", "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_instance_template/meta", + "name": "tests/integration/targets/gcp_storage_bucket_access_control/meta", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_compute_instance_template/meta/main.yml", + "name": "tests/integration/targets/gcp_storage_bucket_access_control/meta/main.yml", "ftype": "file", "chksum_type": "sha256", "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "tests/integration/targets/gcp_runtimeconfig_config", + "name": "tests/integration/targets/gcp_storage_bucket_access_control/defaults", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_runtimeconfig_config/defaults", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "tests/integration/targets/gcp_storage_bucket_access_control/defaults/main.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", "format": 1 }, { - "name": "tests/integration/targets/gcp_runtimeconfig_config/defaults/main.yml", + "name": "tests/integration/targets/gcp_storage_bucket_access_control/aliases", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", + "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", "format": 1 }, { - "name": "tests/integration/targets/gcp_runtimeconfig_config/tasks", + "name": "tests/integration/targets/gcp_sourcerepo_repository", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_runtimeconfig_config/tasks/autogen.yml", + "name": "tests/integration/targets/gcp_sourcerepo_repository/tasks", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, + "format": 1 + }, + { + "name": "tests/integration/targets/gcp_sourcerepo_repository/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "b9d986f7a60843aeb31f6497d101748d14e80ee6d7f23c9d172ace6dacacc96f", + "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5", "format": 1 }, { - "name": "tests/integration/targets/gcp_runtimeconfig_config/tasks/main.yml", + "name": "tests/integration/targets/gcp_sourcerepo_repository/tasks/autogen.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10", + "chksum_sha256": "9387f2d699e12efa3940140dccea51765752b4a1a74400b127104a0484005728", "format": 1 }, { - "name": "tests/integration/targets/gcp_runtimeconfig_config/aliases", + "name": "tests/integration/targets/gcp_sourcerepo_repository/meta", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, + "format": 1 + }, + { + "name": "tests/integration/targets/gcp_sourcerepo_repository/meta/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", + "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "tests/integration/targets/gcp_runtimeconfig_config/meta", + "name": "tests/integration/targets/gcp_sourcerepo_repository/defaults", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_runtimeconfig_config/meta/main.yml", + "name": "tests/integration/targets/gcp_sourcerepo_repository/defaults/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", + "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", "format": 1 }, { - "name": "tests/integration/targets/gcp_cloudbuild_trigger", + "name": "tests/integration/targets/gcp_sourcerepo_repository/aliases", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", + "format": 1 + }, + { + "name": "tests/integration/targets/gcp_mlengine_version", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_cloudbuild_trigger/defaults", + "name": "tests/integration/targets/gcp_mlengine_version/tasks", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_cloudbuild_trigger/defaults/main.yml", + "name": "tests/integration/targets/gcp_mlengine_version/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e173e5a15d9174e198e85c764f303f04d96463d7e1af4685fdbeec2e5cf391d7", + "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5", "format": 1 }, { - "name": "tests/integration/targets/gcp_cloudbuild_trigger/aliases", + "name": "tests/integration/targets/gcp_mlengine_version/tasks/autogen.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805", + "chksum_sha256": "6e237e1a312b526512671f7eb5891c83972bf095c4a5efe02d2551f6132668e8", "format": 1 }, { - "name": "tests/integration/targets/gcp_cloudbuild_trigger/meta", + "name": "tests/integration/targets/gcp_mlengine_version/meta", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_cloudbuild_trigger/meta/main.yml", + "name": "tests/integration/targets/gcp_mlengine_version/meta/main.yml", "ftype": "file", "chksum_type": "sha256", "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "tests/integration/targets/gcp_mlengine_version", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, - "format": 1 - }, - { "name": "tests/integration/targets/gcp_mlengine_version/defaults", "ftype": "dir", "chksum_type": null, @@ -7344,213 +7330,220 @@ "format": 1 }, { - "name": "tests/integration/targets/gcp_mlengine_version/tasks", + "name": "tests/integration/targets/gcp_mlengine_version/aliases", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "4029f43c2014b1bc6e3291863328c0e7cf791ca6d846902a2b38352440528070", + "format": 1 + }, + { + "name": "tests/integration/targets/gcp_spanner_database", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_mlengine_version/tasks/autogen.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "29436018afabb28defe26dff6b11d1e00b58c1c111f5133b0ded8bd9e5f5a302", + "name": "tests/integration/targets/gcp_spanner_database/tasks", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_mlengine_version/tasks/main.yml", + "name": "tests/integration/targets/gcp_spanner_database/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10", + "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5", "format": 1 }, { - "name": "tests/integration/targets/gcp_mlengine_version/aliases", + "name": "tests/integration/targets/gcp_spanner_database/tasks/autogen.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "4029f43c2014b1bc6e3291863328c0e7cf791ca6d846902a2b38352440528070", + "chksum_sha256": "1cddc1e1b09253e5ee935e844b399d726359e13e22c67d5816d5380a23c58cd7", "format": 1 }, { - "name": "tests/integration/targets/gcp_mlengine_version/meta", + "name": "tests/integration/targets/gcp_spanner_database/meta", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/integration/targets/gcp_mlengine_version/meta/main.yml", + "name": "tests/integration/targets/gcp_spanner_database/meta/main.yml", "ftype": "file", "chksum_type": "sha256", "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "tests/unit", + "name": "tests/integration/targets/gcp_spanner_database/defaults", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "tests/unit/plugins", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "tests/integration/targets/gcp_spanner_database/defaults/main.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37", "format": 1 }, { - "name": "tests/unit/plugins/test_gcp_utils.py", + "name": "tests/integration/targets/gcp_spanner_database/aliases", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "7cea31c6d0b65046d03d34a1409bd12e5f2bc059002e1fa8ca0535a3a3a242f2", + "chksum_sha256": "9f5067f13c39b7c91589302770901c2874dc75ad06ef130a9d3af5e72118c4e8", "format": 1 }, { - "name": "molecule", + "name": "test-fixtures", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "molecule/gcloud", + "name": "test-fixtures/cloud-function.zip", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "ee1e4f66f4fa0eed5c6f6dcf77586a61c611c012cdde2c12469a32dbc787e052", + "format": 1 + }, + { + "name": "test-fixtures/cloud-function-source", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "molecule/gcloud/verify.yml", + "name": "test-fixtures/cloud-function-source/requirements.txt", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "59318a47464cb4dab36a73b6001bdfd412a9df91b797bc8263417113b58a1260", + "chksum_sha256": "900f6536a0bb496cb7390407df0515010a84b85e283f1e046580156e434d1836", "format": 1 }, { - "name": "molecule/gcloud/files", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "test-fixtures/cloud-function-source/main.py", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "1d1d875a78943a05f939f77323f8c1c172e23d623a879e367d97759e353012cc", "format": 1 }, { - "name": "molecule/gcloud/files/override.conf", + "name": "test-fixtures/cloud-function-source/build-function-zip.sh", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "27d57701a92b623757711f18aeba17f089df44c13cead5caca41418a62804d89", + "chksum_sha256": "0f90d1f2aff756f1e576595f756ceb3437b653657cbf75ae663f44c0bcab7a85", "format": 1 }, { - "name": "molecule/gcloud/molecule.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "b81502a94d4dcf36b575702f68433a777531032769048769a3f3eacb8f5bb451", + "name": "changelogs", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "molecule/gcloud/package_playbook.yml", + "name": "changelogs/config.yaml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "501d76e7d8b292e055fcd137a589296943709369a735e5b483d428e03beed38b", + "chksum_sha256": "ad67cc7c91ddfe0136c56ad2842e8c60b1cc9a85f3a7f93c5367d17b83ac7f69", "format": 1 }, { - "name": "molecule/gcloud/archive_playbook.yml", + "name": "changelogs/changelog.yaml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "f20365002e8801786c96e091c01e590dc15f32e652450a19571f42d5ebc8ec9c", + "chksum_sha256": "bfe804c69948886f2d22b695e45f51e2928b59941bd653778eb1750ec4c6559f", "format": 1 }, { - "name": "molecule/gcloud/converge.yml", + "name": "CHANGELOG.rst", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "a7b3ae518595986a5210e887de193c15eacc376c73bfb3964f099ad34e7a80e4", + "chksum_sha256": "3e67fc36b3fc805c95a31f7370d40818578ce44ebe91e3f5a769b3ef1b235c52", "format": 1 }, { - "name": "molecule/gcloud/Dockerfile.j2", + "name": ".gitignore", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "5ef978855099e5b5118cb1198a2e27d5745c4a358670ba2e10d9004ce29c0324", + "chksum_sha256": "aad3378139e7b6e10500395da734c01e005eb4a9975f67a40348d049c6a6128b", "format": 1 }, { - "name": "molecule/gcloud/tests", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "CONTRIBUTING.md", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "e483d5791cba22a7b2103594a4761067480b05feea70d8761465f6f96f7b8642", "format": 1 }, { - "name": "molecule/gcloud/tests/test_default.py", + "name": "MAINTAINING.md", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "cb6e9becf8f75159ef50057058047caddd7ec06fd07f9ea7237eb0c3f822a198", + "chksum_sha256": "e026f37292b9345e16684461f580ece1c31f4b4858f4e1da5de76001ce9505b8", "format": 1 }, { - "name": "molecule/gcsfuse", + "name": ".github", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "molecule/gcsfuse/verify.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "59318a47464cb4dab36a73b6001bdfd412a9df91b797bc8263417113b58a1260", - "format": 1 - }, - { - "name": "molecule/gcsfuse/files", + "name": ".github/workflows", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "molecule/gcsfuse/files/override.conf", + "name": ".github/workflows/pythonpublish.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "27d57701a92b623757711f18aeba17f089df44c13cead5caca41418a62804d89", + "chksum_sha256": "bf9b7fddcd410698ccecfc378391f61d73dc7152bc53bb3c2bed989ab5a6a747", "format": 1 }, { - "name": "molecule/gcsfuse/molecule.yml", + "name": ".github/workflows/automationhub.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "b81502a94d4dcf36b575702f68433a777531032769048769a3f3eacb8f5bb451", + "chksum_sha256": "1b953c0774ea04c2213111c2bf7335068bc784b7a7adc348f94ab94f2176d468", "format": 1 }, { - "name": "molecule/gcsfuse/converge.yml", + "name": ".github/workflows/gcloud.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "b246124da724132200d8ce9cb76178abb483a5ae5c291d11fd44ea77d29e7146", + "chksum_sha256": "ab0bea026db681830d2a9e2ef198a3e725d38b4f3209b5cd702b6b228c4a9a94", "format": 1 }, { - "name": "molecule/gcsfuse/Dockerfile.j2", + "name": ".github/workflows/ansible-integration-tests.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "5ef978855099e5b5118cb1198a2e27d5745c4a358670ba2e10d9004ce29c0324", + "chksum_sha256": "69b4a4d90e2c870d9723a9256714ce8d66dd6a0d7b7ed562029f4ccb4bcef47d", "format": 1 }, { - "name": "molecule/gcsfuse/tests", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": ".github/workflows/gcsfuse.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "814cd56758294eca96f90327a7bf68ced8bd2425844e486419420261e9ae0b16", "format": 1 }, { - "name": "molecule/gcsfuse/tests/test_default.py", + "name": ".github/workflows/ansible-test.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "cb6e9becf8f75159ef50057058047caddd7ec06fd07f9ea7237eb0c3f822a198", + "chksum_sha256": "2f3b8476af145f0b68b99ff1ee762335e55a9f95f29a8ef396cd276be0cdd15b", "format": 1 } ], diff --git a/ansible_collections/google/cloud/MAINTAINING.md b/ansible_collections/google/cloud/MAINTAINING.md index 97cc5e325..de14b75bd 100644 --- a/ansible_collections/google/cloud/MAINTAINING.md +++ b/ansible_collections/google/cloud/MAINTAINING.md @@ -58,6 +58,10 @@ antsibull-changelog release This will remove all the changelog fragments from ./changelogs/fragments and merge them into CHANGELOG.rst. +### Send a PR and merge + +Send a PR with these changes and merge them. + ### Create a new GitHub release Creating diff --git a/ansible_collections/google/cloud/MANIFEST.json b/ansible_collections/google/cloud/MANIFEST.json index 786bbdbbf..1bbf25952 100644 --- a/ansible_collections/google/cloud/MANIFEST.json +++ b/ansible_collections/google/cloud/MANIFEST.json @@ -2,10 +2,10 @@ "collection_info": { "namespace": "google", "name": "cloud", - "version": "1.1.3", + "version": "1.3.0", "authors": [ "Google <alexstephen@google.com>", - "Google <yusuketsutsumi@google.com>" + "Google <hawk@google.com>" ], "readme": "README.md", "tags": [ @@ -30,7 +30,7 @@ "name": "FILES.json", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "06e8a32de8311c65d60b3cf65a55838a6f827c1f274292e84879e674e36102bb", + "chksum_sha256": "4248ba4fb14ba63b224bca3eaccf6205c9833eb370000ea7567aef0ee9b992e1", "format": 1 }, "format": 1 diff --git a/ansible_collections/google/cloud/changelogs/.plugin-cache.yaml b/ansible_collections/google/cloud/changelogs/.plugin-cache.yaml deleted file mode 100644 index 3febdd4ce..000000000 --- a/ansible_collections/google/cloud/changelogs/.plugin-cache.yaml +++ /dev/null @@ -1,871 +0,0 @@ -objects: - role: {} -plugins: - become: {} - cache: {} - callback: {} - cliconf: {} - connection: {} - httpapi: {} - inventory: - gcp_compute: - description: Google Cloud Compute Engine inventory source - name: gcp_compute - version_added: null - lookup: {} - module: - gcp_appengine_firewall_rule: - description: Creates a GCP FirewallRule - name: gcp_appengine_firewall_rule - namespace: '' - version_added: null - gcp_appengine_firewall_rule_info: - description: Gather info for GCP FirewallRule - name: gcp_appengine_firewall_rule_info - namespace: '' - version_added: null - gcp_bigquery_dataset: - description: Creates a GCP Dataset - name: gcp_bigquery_dataset - namespace: '' - version_added: null - gcp_bigquery_dataset_info: - description: Gather info for GCP Dataset - name: gcp_bigquery_dataset_info - namespace: '' - version_added: null - gcp_bigquery_table: - description: Creates a GCP Table - name: gcp_bigquery_table - namespace: '' - version_added: null - gcp_bigquery_table_info: - description: Gather info for GCP Table - name: gcp_bigquery_table_info - namespace: '' - version_added: null - gcp_bigtable_instance: - description: Creates a GCP Instance - name: gcp_bigtable_instance - namespace: '' - version_added: null - gcp_bigtable_instance_info: - description: Gather info for GCP Instance - name: gcp_bigtable_instance_info - namespace: '' - version_added: null - gcp_cloudbuild_trigger: - description: Creates a GCP Trigger - name: gcp_cloudbuild_trigger - namespace: '' - version_added: null - gcp_cloudbuild_trigger_info: - description: Gather info for GCP Trigger - name: gcp_cloudbuild_trigger_info - namespace: '' - version_added: null - gcp_cloudfunctions_cloud_function: - description: Creates a GCP CloudFunction - name: gcp_cloudfunctions_cloud_function - namespace: '' - version_added: null - gcp_cloudfunctions_cloud_function_info: - description: Gather info for GCP CloudFunction - name: gcp_cloudfunctions_cloud_function_info - namespace: '' - version_added: null - gcp_cloudscheduler_job: - description: Creates a GCP Job - name: gcp_cloudscheduler_job - namespace: '' - version_added: null - gcp_cloudscheduler_job_info: - description: Gather info for GCP Job - name: gcp_cloudscheduler_job_info - namespace: '' - version_added: null - gcp_cloudtasks_queue: - description: Creates a GCP Queue - name: gcp_cloudtasks_queue - namespace: '' - version_added: null - gcp_cloudtasks_queue_info: - description: Gather info for GCP Queue - name: gcp_cloudtasks_queue_info - namespace: '' - version_added: null - gcp_compute_address: - description: Creates a GCP Address - name: gcp_compute_address - namespace: '' - version_added: null - gcp_compute_address_info: - description: Gather info for GCP Address - name: gcp_compute_address_info - namespace: '' - version_added: null - gcp_compute_autoscaler: - description: Creates a GCP Autoscaler - name: gcp_compute_autoscaler - namespace: '' - version_added: null - gcp_compute_autoscaler_info: - description: Gather info for GCP Autoscaler - name: gcp_compute_autoscaler_info - namespace: '' - version_added: null - gcp_compute_backend_bucket: - description: Creates a GCP BackendBucket - name: gcp_compute_backend_bucket - namespace: '' - version_added: null - gcp_compute_backend_bucket_info: - description: Gather info for GCP BackendBucket - name: gcp_compute_backend_bucket_info - namespace: '' - version_added: null - gcp_compute_backend_service: - description: Creates a GCP BackendService - name: gcp_compute_backend_service - namespace: '' - version_added: null - gcp_compute_backend_service_info: - description: Gather info for GCP BackendService - name: gcp_compute_backend_service_info - namespace: '' - version_added: null - gcp_compute_disk: - description: Creates a GCP Disk - name: gcp_compute_disk - namespace: '' - version_added: null - gcp_compute_disk_info: - description: Gather info for GCP Disk - name: gcp_compute_disk_info - namespace: '' - version_added: null - gcp_compute_external_vpn_gateway: - description: Creates a GCP ExternalVpnGateway - name: gcp_compute_external_vpn_gateway - namespace: '' - version_added: null - gcp_compute_external_vpn_gateway_info: - description: Gather info for GCP ExternalVpnGateway - name: gcp_compute_external_vpn_gateway_info - namespace: '' - version_added: null - gcp_compute_firewall: - description: Creates a GCP Firewall - name: gcp_compute_firewall - namespace: '' - version_added: null - gcp_compute_firewall_info: - description: Gather info for GCP Firewall - name: gcp_compute_firewall_info - namespace: '' - version_added: null - gcp_compute_forwarding_rule: - description: Creates a GCP ForwardingRule - name: gcp_compute_forwarding_rule - namespace: '' - version_added: null - gcp_compute_forwarding_rule_info: - description: Gather info for GCP ForwardingRule - name: gcp_compute_forwarding_rule_info - namespace: '' - version_added: null - gcp_compute_global_address: - description: Creates a GCP GlobalAddress - name: gcp_compute_global_address - namespace: '' - version_added: null - gcp_compute_global_address_info: - description: Gather info for GCP GlobalAddress - name: gcp_compute_global_address_info - namespace: '' - version_added: null - gcp_compute_global_forwarding_rule: - description: Creates a GCP GlobalForwardingRule - name: gcp_compute_global_forwarding_rule - namespace: '' - version_added: null - gcp_compute_global_forwarding_rule_info: - description: Gather info for GCP GlobalForwardingRule - name: gcp_compute_global_forwarding_rule_info - namespace: '' - version_added: null - gcp_compute_health_check: - description: Creates a GCP HealthCheck - name: gcp_compute_health_check - namespace: '' - version_added: null - gcp_compute_health_check_info: - description: Gather info for GCP HealthCheck - name: gcp_compute_health_check_info - namespace: '' - version_added: null - gcp_compute_http_health_check: - description: Creates a GCP HttpHealthCheck - name: gcp_compute_http_health_check - namespace: '' - version_added: null - gcp_compute_http_health_check_info: - description: Gather info for GCP HttpHealthCheck - name: gcp_compute_http_health_check_info - namespace: '' - version_added: null - gcp_compute_https_health_check: - description: Creates a GCP HttpsHealthCheck - name: gcp_compute_https_health_check - namespace: '' - version_added: null - gcp_compute_https_health_check_info: - description: Gather info for GCP HttpsHealthCheck - name: gcp_compute_https_health_check_info - namespace: '' - version_added: null - gcp_compute_image: - description: Creates a GCP Image - name: gcp_compute_image - namespace: '' - version_added: null - gcp_compute_image_info: - description: Gather info for GCP Image - name: gcp_compute_image_info - namespace: '' - version_added: null - gcp_compute_instance: - description: Creates a GCP Instance - name: gcp_compute_instance - namespace: '' - version_added: null - gcp_compute_instance_group: - description: Creates a GCP InstanceGroup - name: gcp_compute_instance_group - namespace: '' - version_added: null - gcp_compute_instance_group_info: - description: Gather info for GCP InstanceGroup - name: gcp_compute_instance_group_info - namespace: '' - version_added: null - gcp_compute_instance_group_manager: - description: Creates a GCP InstanceGroupManager - name: gcp_compute_instance_group_manager - namespace: '' - version_added: null - gcp_compute_instance_group_manager_info: - description: Gather info for GCP InstanceGroupManager - name: gcp_compute_instance_group_manager_info - namespace: '' - version_added: null - gcp_compute_instance_info: - description: Gather info for GCP Instance - name: gcp_compute_instance_info - namespace: '' - version_added: null - gcp_compute_instance_template: - description: Creates a GCP InstanceTemplate - name: gcp_compute_instance_template - namespace: '' - version_added: null - gcp_compute_instance_template_info: - description: Gather info for GCP InstanceTemplate - name: gcp_compute_instance_template_info - namespace: '' - version_added: null - gcp_compute_interconnect_attachment: - description: Creates a GCP InterconnectAttachment - name: gcp_compute_interconnect_attachment - namespace: '' - version_added: null - gcp_compute_interconnect_attachment_info: - description: Gather info for GCP InterconnectAttachment - name: gcp_compute_interconnect_attachment_info - namespace: '' - version_added: null - gcp_compute_network: - description: Creates a GCP Network - name: gcp_compute_network - namespace: '' - version_added: null - gcp_compute_network_endpoint_group: - description: Creates a GCP NetworkEndpointGroup - name: gcp_compute_network_endpoint_group - namespace: '' - version_added: null - gcp_compute_network_endpoint_group_info: - description: Gather info for GCP NetworkEndpointGroup - name: gcp_compute_network_endpoint_group_info - namespace: '' - version_added: null - gcp_compute_network_info: - description: Gather info for GCP Network - name: gcp_compute_network_info - namespace: '' - version_added: null - gcp_compute_node_group: - description: Creates a GCP NodeGroup - name: gcp_compute_node_group - namespace: '' - version_added: null - gcp_compute_node_group_info: - description: Gather info for GCP NodeGroup - name: gcp_compute_node_group_info - namespace: '' - version_added: null - gcp_compute_node_template: - description: Creates a GCP NodeTemplate - name: gcp_compute_node_template - namespace: '' - version_added: null - gcp_compute_node_template_info: - description: Gather info for GCP NodeTemplate - name: gcp_compute_node_template_info - namespace: '' - version_added: null - gcp_compute_region_autoscaler: - description: Creates a GCP RegionAutoscaler - name: gcp_compute_region_autoscaler - namespace: '' - version_added: null - gcp_compute_region_autoscaler_info: - description: Gather info for GCP RegionAutoscaler - name: gcp_compute_region_autoscaler_info - namespace: '' - version_added: null - gcp_compute_region_backend_service: - description: Creates a GCP RegionBackendService - name: gcp_compute_region_backend_service - namespace: '' - version_added: null - gcp_compute_region_backend_service_info: - description: Gather info for GCP RegionBackendService - name: gcp_compute_region_backend_service_info - namespace: '' - version_added: null - gcp_compute_region_disk: - description: Creates a GCP RegionDisk - name: gcp_compute_region_disk - namespace: '' - version_added: null - gcp_compute_region_disk_info: - description: Gather info for GCP RegionDisk - name: gcp_compute_region_disk_info - namespace: '' - version_added: null - gcp_compute_region_health_check: - description: Creates a GCP RegionHealthCheck - name: gcp_compute_region_health_check - namespace: '' - version_added: null - gcp_compute_region_health_check_info: - description: Gather info for GCP RegionHealthCheck - name: gcp_compute_region_health_check_info - namespace: '' - version_added: null - gcp_compute_region_instance_group_manager: - description: Creates a GCP RegionInstanceGroupManager - name: gcp_compute_region_instance_group_manager - namespace: '' - version_added: null - gcp_compute_region_instance_group_manager_info: - description: Gather info for GCP RegionInstanceGroupManager - name: gcp_compute_region_instance_group_manager_info - namespace: '' - version_added: null - gcp_compute_region_target_http_proxy: - description: Creates a GCP RegionTargetHttpProxy - name: gcp_compute_region_target_http_proxy - namespace: '' - version_added: null - gcp_compute_region_target_http_proxy_info: - description: Gather info for GCP RegionTargetHttpProxy - name: gcp_compute_region_target_http_proxy_info - namespace: '' - version_added: null - gcp_compute_region_target_https_proxy: - description: Creates a GCP RegionTargetHttpsProxy - name: gcp_compute_region_target_https_proxy - namespace: '' - version_added: null - gcp_compute_region_target_https_proxy_info: - description: Gather info for GCP RegionTargetHttpsProxy - name: gcp_compute_region_target_https_proxy_info - namespace: '' - version_added: null - gcp_compute_region_url_map: - description: Creates a GCP RegionUrlMap - name: gcp_compute_region_url_map - namespace: '' - version_added: null - gcp_compute_region_url_map_info: - description: Gather info for GCP RegionUrlMap - name: gcp_compute_region_url_map_info - namespace: '' - version_added: null - gcp_compute_reservation: - description: Creates a GCP Reservation - name: gcp_compute_reservation - namespace: '' - version_added: null - gcp_compute_reservation_info: - description: Gather info for GCP Reservation - name: gcp_compute_reservation_info - namespace: '' - version_added: null - gcp_compute_resource_policy: - description: Creates a GCP ResourcePolicy - name: gcp_compute_resource_policy - namespace: '' - version_added: null - gcp_compute_resource_policy_info: - description: Gather info for GCP ResourcePolicy - name: gcp_compute_resource_policy_info - namespace: '' - version_added: null - gcp_compute_route: - description: Creates a GCP Route - name: gcp_compute_route - namespace: '' - version_added: null - gcp_compute_route_info: - description: Gather info for GCP Route - name: gcp_compute_route_info - namespace: '' - version_added: null - gcp_compute_router: - description: Creates a GCP Router - name: gcp_compute_router - namespace: '' - version_added: null - gcp_compute_router_info: - description: Gather info for GCP Router - name: gcp_compute_router_info - namespace: '' - version_added: null - gcp_compute_snapshot: - description: Creates a GCP Snapshot - name: gcp_compute_snapshot - namespace: '' - version_added: null - gcp_compute_snapshot_info: - description: Gather info for GCP Snapshot - name: gcp_compute_snapshot_info - namespace: '' - version_added: null - gcp_compute_ssl_certificate: - description: Creates a GCP SslCertificate - name: gcp_compute_ssl_certificate - namespace: '' - version_added: null - gcp_compute_ssl_certificate_info: - description: Gather info for GCP SslCertificate - name: gcp_compute_ssl_certificate_info - namespace: '' - version_added: null - gcp_compute_ssl_policy: - description: Creates a GCP SslPolicy - name: gcp_compute_ssl_policy - namespace: '' - version_added: null - gcp_compute_ssl_policy_info: - description: Gather info for GCP SslPolicy - name: gcp_compute_ssl_policy_info - namespace: '' - version_added: null - gcp_compute_subnetwork: - description: Creates a GCP Subnetwork - name: gcp_compute_subnetwork - namespace: '' - version_added: null - gcp_compute_subnetwork_info: - description: Gather info for GCP Subnetwork - name: gcp_compute_subnetwork_info - namespace: '' - version_added: null - gcp_compute_target_http_proxy: - description: Creates a GCP TargetHttpProxy - name: gcp_compute_target_http_proxy - namespace: '' - version_added: null - gcp_compute_target_http_proxy_info: - description: Gather info for GCP TargetHttpProxy - name: gcp_compute_target_http_proxy_info - namespace: '' - version_added: null - gcp_compute_target_https_proxy: - description: Creates a GCP TargetHttpsProxy - name: gcp_compute_target_https_proxy - namespace: '' - version_added: null - gcp_compute_target_https_proxy_info: - description: Gather info for GCP TargetHttpsProxy - name: gcp_compute_target_https_proxy_info - namespace: '' - version_added: null - gcp_compute_target_instance: - description: Creates a GCP TargetInstance - name: gcp_compute_target_instance - namespace: '' - version_added: null - gcp_compute_target_instance_info: - description: Gather info for GCP TargetInstance - name: gcp_compute_target_instance_info - namespace: '' - version_added: null - gcp_compute_target_pool: - description: Creates a GCP TargetPool - name: gcp_compute_target_pool - namespace: '' - version_added: null - gcp_compute_target_pool_info: - description: Gather info for GCP TargetPool - name: gcp_compute_target_pool_info - namespace: '' - version_added: null - gcp_compute_target_ssl_proxy: - description: Creates a GCP TargetSslProxy - name: gcp_compute_target_ssl_proxy - namespace: '' - version_added: null - gcp_compute_target_ssl_proxy_info: - description: Gather info for GCP TargetSslProxy - name: gcp_compute_target_ssl_proxy_info - namespace: '' - version_added: null - gcp_compute_target_tcp_proxy: - description: Creates a GCP TargetTcpProxy - name: gcp_compute_target_tcp_proxy - namespace: '' - version_added: null - gcp_compute_target_tcp_proxy_info: - description: Gather info for GCP TargetTcpProxy - name: gcp_compute_target_tcp_proxy_info - namespace: '' - version_added: null - gcp_compute_target_vpn_gateway: - description: Creates a GCP TargetVpnGateway - name: gcp_compute_target_vpn_gateway - namespace: '' - version_added: null - gcp_compute_target_vpn_gateway_info: - description: Gather info for GCP TargetVpnGateway - name: gcp_compute_target_vpn_gateway_info - namespace: '' - version_added: null - gcp_compute_url_map: - description: Creates a GCP UrlMap - name: gcp_compute_url_map - namespace: '' - version_added: null - gcp_compute_url_map_info: - description: Gather info for GCP UrlMap - name: gcp_compute_url_map_info - namespace: '' - version_added: null - gcp_compute_vpn_tunnel: - description: Creates a GCP VpnTunnel - name: gcp_compute_vpn_tunnel - namespace: '' - version_added: null - gcp_compute_vpn_tunnel_info: - description: Gather info for GCP VpnTunnel - name: gcp_compute_vpn_tunnel_info - namespace: '' - version_added: null - gcp_container_cluster: - description: Creates a GCP Cluster - name: gcp_container_cluster - namespace: '' - version_added: null - gcp_container_cluster_info: - description: Gather info for GCP Cluster - name: gcp_container_cluster_info - namespace: '' - version_added: null - gcp_container_node_pool: - description: Creates a GCP NodePool - name: gcp_container_node_pool - namespace: '' - version_added: null - gcp_container_node_pool_info: - description: Gather info for GCP NodePool - name: gcp_container_node_pool_info - namespace: '' - version_added: null - gcp_dns_managed_zone: - description: Creates a GCP ManagedZone - name: gcp_dns_managed_zone - namespace: '' - version_added: null - gcp_dns_managed_zone_info: - description: Gather info for GCP ManagedZone - name: gcp_dns_managed_zone_info - namespace: '' - version_added: null - gcp_dns_resource_record_set: - description: Creates a GCP ResourceRecordSet - name: gcp_dns_resource_record_set - namespace: '' - version_added: null - gcp_dns_resource_record_set_info: - description: Gather info for GCP ResourceRecordSet - name: gcp_dns_resource_record_set_info - namespace: '' - version_added: null - gcp_filestore_instance: - description: Creates a GCP Instance - name: gcp_filestore_instance - namespace: '' - version_added: null - gcp_filestore_instance_info: - description: Gather info for GCP Instance - name: gcp_filestore_instance_info - namespace: '' - version_added: null - gcp_iam_role: - description: Creates a GCP Role - name: gcp_iam_role - namespace: '' - version_added: null - gcp_iam_role_info: - description: Gather info for GCP Role - name: gcp_iam_role_info - namespace: '' - version_added: null - gcp_iam_service_account: - description: Creates a GCP ServiceAccount - name: gcp_iam_service_account - namespace: '' - version_added: null - gcp_iam_service_account_info: - description: Gather info for GCP ServiceAccount - name: gcp_iam_service_account_info - namespace: '' - version_added: null - gcp_iam_service_account_key: - description: Creates a GCP ServiceAccountKey - name: gcp_iam_service_account_key - namespace: '' - version_added: null - gcp_kms_crypto_key: - description: Creates a GCP CryptoKey - name: gcp_kms_crypto_key - namespace: '' - version_added: null - gcp_kms_crypto_key_info: - description: Gather info for GCP CryptoKey - name: gcp_kms_crypto_key_info - namespace: '' - version_added: null - gcp_kms_key_ring: - description: Creates a GCP KeyRing - name: gcp_kms_key_ring - namespace: '' - version_added: null - gcp_kms_key_ring_info: - description: Gather info for GCP KeyRing - name: gcp_kms_key_ring_info - namespace: '' - version_added: null - gcp_logging_metric: - description: Creates a GCP Metric - name: gcp_logging_metric - namespace: '' - version_added: null - gcp_logging_metric_info: - description: Gather info for GCP Metric - name: gcp_logging_metric_info - namespace: '' - version_added: null - gcp_mlengine_model: - description: Creates a GCP Model - name: gcp_mlengine_model - namespace: '' - version_added: null - gcp_mlengine_model_info: - description: Gather info for GCP Model - name: gcp_mlengine_model_info - namespace: '' - version_added: null - gcp_mlengine_version: - description: Creates a GCP Version - name: gcp_mlengine_version - namespace: '' - version_added: null - gcp_mlengine_version_info: - description: Gather info for GCP Version - name: gcp_mlengine_version_info - namespace: '' - version_added: null - gcp_pubsub_subscription: - description: Creates a GCP Subscription - name: gcp_pubsub_subscription - namespace: '' - version_added: null - gcp_pubsub_subscription_info: - description: Gather info for GCP Subscription - name: gcp_pubsub_subscription_info - namespace: '' - version_added: null - gcp_pubsub_topic: - description: Creates a GCP Topic - name: gcp_pubsub_topic - namespace: '' - version_added: null - gcp_pubsub_topic_info: - description: Gather info for GCP Topic - name: gcp_pubsub_topic_info - namespace: '' - version_added: null - gcp_redis_instance: - description: Creates a GCP Instance - name: gcp_redis_instance - namespace: '' - version_added: null - gcp_redis_instance_info: - description: Gather info for GCP Instance - name: gcp_redis_instance_info - namespace: '' - version_added: null - gcp_resourcemanager_project: - description: Creates a GCP Project - name: gcp_resourcemanager_project - namespace: '' - version_added: null - gcp_resourcemanager_project_info: - description: Gather info for GCP Project - name: gcp_resourcemanager_project_info - namespace: '' - version_added: null - gcp_runtimeconfig_config: - description: Creates a GCP Config - name: gcp_runtimeconfig_config - namespace: '' - version_added: null - gcp_runtimeconfig_config_info: - description: Gather info for GCP Config - name: gcp_runtimeconfig_config_info - namespace: '' - version_added: null - gcp_runtimeconfig_variable: - description: Creates a GCP Variable - name: gcp_runtimeconfig_variable - namespace: '' - version_added: null - gcp_runtimeconfig_variable_info: - description: Gather info for GCP Variable - name: gcp_runtimeconfig_variable_info - namespace: '' - version_added: null - gcp_serviceusage_service: - description: Creates a GCP Service - name: gcp_serviceusage_service - namespace: '' - version_added: null - gcp_serviceusage_service_info: - description: Gather info for GCP Service - name: gcp_serviceusage_service_info - namespace: '' - version_added: null - gcp_sourcerepo_repository: - description: Creates a GCP Repository - name: gcp_sourcerepo_repository - namespace: '' - version_added: null - gcp_sourcerepo_repository_info: - description: Gather info for GCP Repository - name: gcp_sourcerepo_repository_info - namespace: '' - version_added: null - gcp_spanner_database: - description: Creates a GCP Database - name: gcp_spanner_database - namespace: '' - version_added: null - gcp_spanner_database_info: - description: Gather info for GCP Database - name: gcp_spanner_database_info - namespace: '' - version_added: null - gcp_spanner_instance: - description: Creates a GCP Instance - name: gcp_spanner_instance - namespace: '' - version_added: null - gcp_spanner_instance_info: - description: Gather info for GCP Instance - name: gcp_spanner_instance_info - namespace: '' - version_added: null - gcp_sql_database: - description: Creates a GCP Database - name: gcp_sql_database - namespace: '' - version_added: null - gcp_sql_database_info: - description: Gather info for GCP Database - name: gcp_sql_database_info - namespace: '' - version_added: null - gcp_sql_instance: - description: Creates a GCP Instance - name: gcp_sql_instance - namespace: '' - version_added: null - gcp_sql_instance_info: - description: Gather info for GCP Instance - name: gcp_sql_instance_info - namespace: '' - version_added: null - gcp_sql_ssl_cert: - description: Creates a GCP SslCert - name: gcp_sql_ssl_cert - namespace: '' - version_added: null - gcp_sql_user: - description: Creates a GCP User - name: gcp_sql_user - namespace: '' - version_added: null - gcp_sql_user_info: - description: Gather info for GCP User - name: gcp_sql_user_info - namespace: '' - version_added: null - gcp_storage_bucket: - description: Creates a GCP Bucket - name: gcp_storage_bucket - namespace: '' - version_added: null - gcp_storage_bucket_access_control: - description: Creates a GCP BucketAccessControl - name: gcp_storage_bucket_access_control - namespace: '' - version_added: null - gcp_storage_default_object_acl: - description: Creates a GCP DefaultObjectACL - name: gcp_storage_default_object_acl - namespace: '' - version_added: null - gcp_storage_object: - description: Creates a GCP Object - name: gcp_storage_object - namespace: '' - version_added: null - gcp_tpu_node: - description: Creates a GCP Node - name: gcp_tpu_node - namespace: '' - version_added: null - gcp_tpu_node_info: - description: Gather info for GCP Node - name: gcp_tpu_node_info - namespace: '' - version_added: null - netconf: {} - shell: {} - strategy: {} - vars: {} -version: 1.1.3 diff --git a/ansible_collections/google/cloud/changelogs/changelog.yaml b/ansible_collections/google/cloud/changelogs/changelog.yaml index 009454372..4d47e486b 100644 --- a/ansible_collections/google/cloud/changelogs/changelog.yaml +++ b/ansible_collections/google/cloud/changelogs/changelog.yaml @@ -46,3 +46,34 @@ releases: fragments: - gce-changelog.yaml release_date: '2023-03-04' + 1.2.0: + changes: + bugfixes: + - Use default service account if `service_account_email` is unset. + minor_changes: + - Add DataPlane V2 Support. + - Add auth support for GCP access tokens (#574). + - Add support for ip_allocation_policy->stack_type. + release_date: '2023-07-07' + 1.3.0: + changes: + minor_changes: + - anisble-test - integration tests are now run against 2.14.0 and 2.15.0 + - ansible - 2.14.0 is now the minimum version supported + - ansible-lint - fixed over a thousand reported errors + - ansible-lint - upgraded to 6.22 + - ansible-test - add support for GCP application default credentials (https://github.com/ansible-collections/google.cloud/issues/359). + - gcp_serviceusage_service - added backoff when checking for operation completion. + - gcp_serviceusage_service - use alloyb API for the integration test as spanner + conflicts with other tests + - gcp_sql_ssl_cert - made sha1_fingerprint optional, which enables resource + creation + - gcp_storage_default_object_acl - removed non-existent fields; the resource + is not usable. + fragments: + - app-default-creds.yml + - gcp_serviceusage_service.yml + - gcp_sql_ssl_cert.yml + - gcp_storage_default_object_acl.yml + - upgrade-versions.yml + release_date: '2023-11-22' diff --git a/ansible_collections/google/cloud/changelogs/config.yaml b/ansible_collections/google/cloud/changelogs/config.yaml index 9f7513d99..0b868692f 100644 --- a/ansible_collections/google/cloud/changelogs/config.yaml +++ b/ansible_collections/google/cloud/changelogs/config.yaml @@ -1,3 +1,4 @@ +--- changelog_filename_template: ../CHANGELOG.rst changelog_filename_version_depth: 0 changes_file: changelog.yaml @@ -11,22 +12,22 @@ prelude_section_name: release_summary prelude_section_title: Release Summary sanitize_changelog: true sections: -- - major_changes - - Major Changes -- - minor_changes - - Minor Changes -- - breaking_changes - - Breaking Changes / Porting Guide -- - deprecated_features - - Deprecated Features -- - removed_features - - Removed Features (previously deprecated) -- - security_fixes - - Security Fixes -- - bugfixes - - Bugfixes -- - known_issues - - Known Issues + - - major_changes + - Major Changes + - - minor_changes + - Minor Changes + - - breaking_changes + - Breaking Changes / Porting Guide + - - deprecated_features + - Deprecated Features + - - removed_features + - Removed Features (previously deprecated) + - - security_fixes + - Security Fixes + - - bugfixes + - Bugfixes + - - known_issues + - Known Issues title: Google.Cloud trivial_section_name: trivial use_fqcn: true diff --git a/ansible_collections/google/cloud/meta/runtime.yml b/ansible_collections/google/cloud/meta/runtime.yml index d28681a4d..ef3467047 100644 --- a/ansible_collections/google/cloud/meta/runtime.yml +++ b/ansible_collections/google/cloud/meta/runtime.yml @@ -1,5 +1,5 @@ --- -requires_ansible: '>=2.9.10' +requires_ansible: ">=2.14.0" action_groups: gcp: diff --git a/ansible_collections/google/cloud/molecule/gcloud/converge.yml b/ansible_collections/google/cloud/molecule/gcloud/converge.yml index 869474587..7382caebc 100644 --- a/ansible_collections/google/cloud/molecule/gcloud/converge.yml +++ b/ansible_collections/google/cloud/molecule/gcloud/converge.yml @@ -14,13 +14,13 @@ ansible.builtin.file: path: /etc/systemd/system/containerd.service.d state: directory - mode: 0755 + mode: "0755" when: ansible_service_mgr == "systemd" - name: Override file for containerd ansible.builtin.copy: src: files/override.conf dest: /etc/systemd/system/containerd.service.d/override.conf - mode: 0644 + mode: "0644" when: ansible_service_mgr == "systemd" roles: - role: google.cloud.gcloud diff --git a/ansible_collections/google/cloud/molecule/gcloud/molecule.yml b/ansible_collections/google/cloud/molecule/gcloud/molecule.yml index 7b7ab5473..707639af5 100644 --- a/ansible_collections/google/cloud/molecule/gcloud/molecule.yml +++ b/ansible_collections/google/cloud/molecule/gcloud/molecule.yml @@ -9,15 +9,15 @@ lint: | ansible-lint platforms: - name: instance - image: ubuntu:18.04 + image: ubuntu:20.04 privileged: true - ansible.builtin.command: "/lib/systemd/systemd" + ansible.builtin.command: /lib/systemd/systemd volumes: - /sys/fs/cgroup:/sys/fs/cgroup:ro - name: instance - image: debian:9 + image: debian:10 privileged: true - ansible.builtin.command: "/lib/systemd/systemd" + ansible.builtin.command: /lib/systemd/systemd volumes: - /sys/fs/cgroup:/sys/fs/cgroup:ro provisioner: diff --git a/ansible_collections/google/cloud/molecule/gcloud/verify.yml b/ansible_collections/google/cloud/molecule/gcloud/verify.yml index 86afba4ff..6e148b149 100644 --- a/ansible_collections/google/cloud/molecule/gcloud/verify.yml +++ b/ansible_collections/google/cloud/molecule/gcloud/verify.yml @@ -4,6 +4,6 @@ - name: Verify hosts: all tasks: - - name: Example assertion - ansible.builtin.assert: - that: true + - name: Example assertion + ansible.builtin.assert: + that: true diff --git a/ansible_collections/google/cloud/molecule/gcsfuse/molecule.yml b/ansible_collections/google/cloud/molecule/gcsfuse/molecule.yml index 7b7ab5473..707639af5 100644 --- a/ansible_collections/google/cloud/molecule/gcsfuse/molecule.yml +++ b/ansible_collections/google/cloud/molecule/gcsfuse/molecule.yml @@ -9,15 +9,15 @@ lint: | ansible-lint platforms: - name: instance - image: ubuntu:18.04 + image: ubuntu:20.04 privileged: true - ansible.builtin.command: "/lib/systemd/systemd" + ansible.builtin.command: /lib/systemd/systemd volumes: - /sys/fs/cgroup:/sys/fs/cgroup:ro - name: instance - image: debian:9 + image: debian:10 privileged: true - ansible.builtin.command: "/lib/systemd/systemd" + ansible.builtin.command: /lib/systemd/systemd volumes: - /sys/fs/cgroup:/sys/fs/cgroup:ro provisioner: diff --git a/ansible_collections/google/cloud/molecule/gcsfuse/verify.yml b/ansible_collections/google/cloud/molecule/gcsfuse/verify.yml index 86afba4ff..6e148b149 100644 --- a/ansible_collections/google/cloud/molecule/gcsfuse/verify.yml +++ b/ansible_collections/google/cloud/molecule/gcsfuse/verify.yml @@ -4,6 +4,6 @@ - name: Verify hosts: all tasks: - - name: Example assertion - ansible.builtin.assert: - that: true + - name: Example assertion + ansible.builtin.assert: + that: true diff --git a/ansible_collections/google/cloud/plugins/doc_fragments/gcp.py b/ansible_collections/google/cloud/plugins/doc_fragments/gcp.py index 5dfeb00e6..a2d521240 100644 --- a/ansible_collections/google/cloud/plugins/doc_fragments/gcp.py +++ b/ansible_collections/google/cloud/plugins/doc_fragments/gcp.py @@ -47,7 +47,7 @@ options: type: str notes: - for authentication, you can set service_account_file using the - c(gcp_service_account_file) env variable. + c(GCP_SERVICE_ACCOUNT_FILE) env variable. - for authentication, you can set service_account_contents using the c(GCP_SERVICE_ACCOUNT_CONTENTS) env variable. - For authentication, you can set service_account_email using the diff --git a/ansible_collections/google/cloud/plugins/filter/gcp_kms_filters.py b/ansible_collections/google/cloud/plugins/filter/gcp_kms_filters.py index 9be0be0df..44ae8d0ac 100644 --- a/ansible_collections/google/cloud/plugins/filter/gcp_kms_filters.py +++ b/ansible_collections/google/cloud/plugins/filter/gcp_kms_filters.py @@ -39,6 +39,7 @@ class GcpKmsFilter(): 'auth_kind': kwargs.get('auth_kind', None), 'service_account_file': kwargs.get('service_account_file', None), 'service_account_email': kwargs.get('service_account_email', None), + 'access_token': kwargs.get('access_token', None), } if not params['scopes']: params['scopes'] = ['https://www.googleapis.com/auth/cloudkms'] diff --git a/ansible_collections/google/cloud/plugins/inventory/gcp_compute.py b/ansible_collections/google/cloud/plugins/inventory/gcp_compute.py index d380acd96..f4743b292 100644 --- a/ansible_collections/google/cloud/plugins/inventory/gcp_compute.py +++ b/ansible_collections/google/cloud/plugins/inventory/gcp_compute.py @@ -39,7 +39,7 @@ DOCUMENTATION = """ description: > A list of filter value pairs. Available filters are listed here U(https://cloud.google.com/compute/docs/reference/rest/v1/instances/aggregatedList). - Each additional filter in the list will act be added as an AND condition + Each additional filter in the list will be added as an AND condition (filter1 and filter2) type: list hostnames: @@ -57,7 +57,7 @@ DOCUMENTATION = """ description: - The type of credential used. required: True - choices: ['application', 'serviceaccount', 'machineaccount'] + choices: ['application', 'serviceaccount', 'machineaccount', 'accesstoken'] env: - name: GCP_AUTH_KIND scopes: @@ -86,6 +86,11 @@ DOCUMENTATION = """ and the user does not wish to use the default email. env: - name: GCP_SERVICE_ACCOUNT_EMAIL + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + env: + - name: GCP_ACCESS_TOKEN vars_prefix: description: prefix to apply to host variables, does not include facts nor params default: '' @@ -232,7 +237,8 @@ class GcpInstance(object): for order in self.hostname_ordering: name = None if order.startswith("labels."): - name = self.json["labels"].get(order[7:]) + if "labels" in self.json: + name = self.json["labels"].get(order[7:]) elif order == "public_ip": name = self._get_publicip() elif order == "private_ip": @@ -558,6 +564,7 @@ class InventoryModule(BaseInventoryPlugin, Constructable, Cacheable): "service_account_file": self.get_option("service_account_file"), "service_account_contents": self.get_option("service_account_contents"), "service_account_email": self.get_option("service_account_email"), + "access_token": self.get_option("access_token"), } self.fake_module = GcpMockModule(params) diff --git a/ansible_collections/google/cloud/plugins/module_utils/gcp_utils.py b/ansible_collections/google/cloud/plugins/module_utils/gcp_utils.py index 203000cc6..baf9a6c02 100644 --- a/ansible_collections/google/cloud/plugins/module_utils/gcp_utils.py +++ b/ansible_collections/google/cloud/plugins/module_utils/gcp_utils.py @@ -5,7 +5,6 @@ from __future__ import (absolute_import, division, print_function) __metaclass__ = type -import ast import os import json @@ -18,15 +17,14 @@ except ImportError: try: import google.auth import google.auth.compute_engine - from google.oauth2 import service_account + from google.oauth2 import service_account, credentials as oauth2 from google.auth.transport.requests import AuthorizedSession HAS_GOOGLE_LIBRARIES = True except ImportError: HAS_GOOGLE_LIBRARIES = False from ansible.module_utils.basic import AnsibleModule, env_fallback -from ansible.module_utils.six import string_types -from ansible.module_utils._text import to_text, to_native +from ansible.module_utils._text import to_text def navigate_hash(source, path, default=None): @@ -213,6 +211,11 @@ class GcpSession(object): msg="Service Account File only works with Service Account-based authentication" ) + if self.module.params.get('access_token') is not None and self.module.params['auth_kind'] != 'accesstoken': + self.module.fail_json( + msg='Supplying access_token requires auth_kind set to accesstoken' + ) + def _credentials(self): cred_type = self.module.params['auth_kind'] @@ -246,8 +249,17 @@ class GcpSession(object): return svc_acct_creds.with_scopes(self.module.params['scopes']) if cred_type == 'machineaccount': - return google.auth.compute_engine.Credentials( - self.module.params['service_account_email']) + email = self.module.params['service_account_email'] + email = email if email is not None else "default" + return google.auth.compute_engine.Credentials(email) + + if cred_type == 'accesstoken': + access_token = self.module.params['access_token'] + if access_token is None: + self.module.fail_json( + msg='An access token must be supplied when auth_kind is accesstoken' + ) + return oauth2.Credentials(access_token, scopes=self.module.params['scopes']) self.module.fail_json(msg="Credential type '%s' not implemented" % cred_type) @@ -279,7 +291,7 @@ class GcpModule(AnsibleModule): auth_kind=dict( required=True, fallback=(env_fallback, ['GCP_AUTH_KIND']), - choices=['machineaccount', 'serviceaccount', 'application'], + choices=['machineaccount', 'serviceaccount', 'accesstoken', 'application'], type='str'), service_account_email=dict( required=False, @@ -294,6 +306,11 @@ class GcpModule(AnsibleModule): fallback=(env_fallback, ['GCP_SERVICE_ACCOUNT_CONTENTS']), no_log=True, type='jsonarg'), + access_token=dict( + required=False, + fallback=(env_fallback, ['GCP_ACCESS_TOKEN']), + no_log=True, + type='str'), scopes=dict( required=False, fallback=(env_fallback, ['GCP_SCOPES']), diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_appengine_firewall_rule.py b/ansible_collections/google/cloud/plugins/modules/gcp_appengine_firewall_rule.py index 508189fe0..f0dbd61c6 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_appengine_firewall_rule.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_appengine_firewall_rule.py @@ -87,6 +87,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -101,6 +102,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -121,6 +126,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -171,7 +178,7 @@ priority: # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest, replace_resource_dict +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest import json ################################################################################ diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_appengine_firewall_rule_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_appengine_firewall_rule_info.py index 639e16f85..7206b1570 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_appengine_firewall_rule_info.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_appengine_firewall_rule_info.py @@ -52,6 +52,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -66,6 +67,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -84,6 +89,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -134,7 +141,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_bigquery_dataset.py b/ansible_collections/google/cloud/plugins/modules/gcp_bigquery_dataset.py index 85ad27681..efc365ae7 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_bigquery_dataset.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_bigquery_dataset.py @@ -224,6 +224,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -238,6 +239,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -258,6 +263,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -472,7 +479,6 @@ from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import ( GcpModule, GcpRequest, remove_nones_from_dict, - replace_resource_dict, ) import json diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_bigquery_dataset_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_bigquery_dataset_info.py index cc4852147..ca689a638 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_bigquery_dataset_info.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_bigquery_dataset_info.py @@ -52,6 +52,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -66,6 +67,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -84,6 +89,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -295,7 +302,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_bigquery_table.py b/ansible_collections/google/cloud/plugins/modules/gcp_bigquery_table.py index d02d220cb..b0021e215 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_bigquery_table.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_bigquery_table.py @@ -475,6 +475,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -489,6 +490,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -994,7 +999,6 @@ from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import ( GcpModule, GcpRequest, remove_nones_from_dict, - replace_resource_dict, ) import json diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_bigquery_table_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_bigquery_table_info.py index 99b89acb1..a67af9590 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_bigquery_table_info.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_bigquery_table_info.py @@ -57,6 +57,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -71,6 +72,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -89,6 +94,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -574,7 +581,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_bigtable_instance.py b/ansible_collections/google/cloud/plugins/modules/gcp_bigtable_instance.py index b70b00456..e219cb22b 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_bigtable_instance.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_bigtable_instance.py @@ -117,6 +117,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -131,6 +132,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -235,7 +240,6 @@ from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import ( GcpModule, GcpRequest, remove_nones_from_dict, - replace_resource_dict, ) import json import time diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_bigtable_instance_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_bigtable_instance_info.py index deefad028..6c8f4160f 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_bigtable_instance_info.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_bigtable_instance_info.py @@ -52,6 +52,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -66,6 +67,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -84,6 +89,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -172,7 +179,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_cloudbuild_trigger.py b/ansible_collections/google/cloud/plugins/modules/gcp_cloudbuild_trigger.py index da506a0f0..b252f86f7 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_cloudbuild_trigger.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_cloudbuild_trigger.py @@ -727,6 +727,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -741,6 +742,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -761,6 +766,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -1482,7 +1489,6 @@ from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import ( GcpModule, GcpRequest, remove_nones_from_dict, - replace_resource_dict, ) import json diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_cloudbuild_trigger_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_cloudbuild_trigger_info.py index 78c4990aa..c8a9202d0 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_cloudbuild_trigger_info.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_cloudbuild_trigger_info.py @@ -52,6 +52,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -66,6 +67,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -84,6 +89,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -798,7 +805,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_cloudfunctions_cloud_function.py b/ansible_collections/google/cloud/plugins/modules/gcp_cloudfunctions_cloud_function.py index 0b3c38ce1..e09ed7be6 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_cloudfunctions_cloud_function.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_cloudfunctions_cloud_function.py @@ -174,6 +174,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -188,6 +189,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -369,7 +374,6 @@ from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import ( GcpModule, GcpRequest, remove_nones_from_dict, - replace_resource_dict, ) import json import re diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_cloudfunctions_cloud_function_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_cloudfunctions_cloud_function_info.py index 36fc75308..075fd8634 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_cloudfunctions_cloud_function_info.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_cloudfunctions_cloud_function_info.py @@ -57,6 +57,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -71,6 +72,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -89,6 +94,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -257,7 +264,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_cloudscheduler_job.py b/ansible_collections/google/cloud/plugins/modules/gcp_cloudscheduler_job.py index 40559ff4c..8a9305354 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_cloudscheduler_job.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_cloudscheduler_job.py @@ -310,6 +310,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -324,6 +325,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -344,6 +349,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -627,7 +634,6 @@ from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import ( GcpModule, GcpRequest, remove_nones_from_dict, - replace_resource_dict, ) import json diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_cloudscheduler_job_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_cloudscheduler_job_info.py index 4ab155ebb..29ba1236a 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_cloudscheduler_job_info.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_cloudscheduler_job_info.py @@ -57,6 +57,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -71,6 +72,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -89,6 +94,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -363,7 +370,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_cloudtasks_queue.py b/ansible_collections/google/cloud/plugins/modules/gcp_cloudtasks_queue.py index b2858599b..f8b98f488 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_cloudtasks_queue.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_cloudtasks_queue.py @@ -188,6 +188,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -202,6 +203,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -384,7 +389,6 @@ from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import ( GcpModule, GcpRequest, remove_nones_from_dict, - replace_resource_dict, ) import json import re diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_cloudtasks_queue_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_cloudtasks_queue_info.py index 95f306b40..631b10de3 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_cloudtasks_queue_info.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_cloudtasks_queue_info.py @@ -57,6 +57,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -71,6 +72,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -89,6 +94,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -263,7 +270,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_address.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_address.py index 122db491f..55fd596bb 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_address.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_address.py @@ -153,6 +153,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -167,6 +168,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -188,6 +193,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_address_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_address_info.py index bbd8c2c80..247d89272 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_address_info.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_address_info.py @@ -65,6 +65,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -79,6 +80,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -97,6 +102,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -219,7 +226,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_autoscaler.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_autoscaler.py index d3acc7846..267116f7f 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_autoscaler.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_autoscaler.py @@ -260,6 +260,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -274,6 +275,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -294,6 +299,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_autoscaler_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_autoscaler_info.py index f8df9f4d5..110c10da9 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_autoscaler_info.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_autoscaler_info.py @@ -64,6 +64,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -78,6 +79,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -96,6 +101,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -304,7 +311,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_backend_bucket.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_backend_bucket.py index 5746a0bab..420b59346 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_backend_bucket.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_backend_bucket.py @@ -174,6 +174,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -188,6 +189,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -208,6 +213,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -366,7 +373,6 @@ from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import ( GcpModule, GcpRequest, remove_nones_from_dict, - replace_resource_dict, ) import json import time diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_backend_bucket_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_backend_bucket_info.py index 31d098398..aaf40e327 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_backend_bucket_info.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_backend_bucket_info.py @@ -59,6 +59,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -73,6 +74,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -91,6 +96,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -236,7 +243,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_backend_service.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_backend_service.py index a637a9e9b..b259848ff 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_backend_service.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_backend_service.py @@ -702,6 +702,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -716,6 +717,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -736,6 +741,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -1410,7 +1417,6 @@ from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import ( GcpModule, GcpRequest, remove_nones_from_dict, - replace_resource_dict, ) import json import time diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_backend_service_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_backend_service_info.py index 415b28fd5..5e715778a 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_backend_service_info.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_backend_service_info.py @@ -59,6 +59,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -73,6 +74,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -91,6 +96,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -746,7 +753,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_disk.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_disk.py index 0dd36e2a1..8409cac7b 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_disk.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_disk.py @@ -238,6 +238,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -252,6 +253,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -272,6 +277,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_disk_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_disk_info.py index 1abc5c4ca..8e3646825 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_disk_info.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_disk_info.py @@ -64,6 +64,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -78,6 +79,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -96,6 +101,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -359,7 +366,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_external_vpn_gateway.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_external_vpn_gateway.py index 48471504e..e2d96b131 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_external_vpn_gateway.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_external_vpn_gateway.py @@ -104,6 +104,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -118,6 +119,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -137,6 +142,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -212,7 +219,6 @@ from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import ( GcpModule, GcpRequest, remove_nones_from_dict, - replace_resource_dict, ) import json import time diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_external_vpn_gateway_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_external_vpn_gateway_info.py index cb4772660..6e2e0d0f4 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_external_vpn_gateway_info.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_external_vpn_gateway_info.py @@ -59,6 +59,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -73,6 +74,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -91,6 +96,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -159,7 +166,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_firewall.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_firewall.py index 08f044492..cee64bc75 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_firewall.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_firewall.py @@ -263,6 +263,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -277,6 +278,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -297,6 +302,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_firewall_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_firewall_info.py index 6b90c57ea..dfc105ee1 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_firewall_info.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_firewall_info.py @@ -59,6 +59,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -73,6 +74,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -91,6 +96,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -306,7 +313,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_forwarding_rule.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_forwarding_rule.py index f1c13cc8b..8141605ea 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_forwarding_rule.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_forwarding_rule.py @@ -237,6 +237,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -251,6 +252,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -271,6 +276,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_forwarding_rule_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_forwarding_rule_info.py index f13135d54..87dcb899d 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_forwarding_rule_info.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_forwarding_rule_info.py @@ -65,6 +65,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -79,6 +80,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -97,6 +102,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -298,7 +305,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_global_address.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_global_address.py index d1f02bdff..22815350c 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_global_address.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_global_address.py @@ -124,6 +124,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -138,6 +139,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -158,6 +163,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_global_address_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_global_address_info.py index a6cc0b882..34aa1755b 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_global_address_info.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_global_address_info.py @@ -59,6 +59,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -73,6 +74,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -91,6 +96,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -189,7 +196,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_global_forwarding_rule.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_global_forwarding_rule.py index a9bb647f6..158caab88 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_global_forwarding_rule.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_global_forwarding_rule.py @@ -217,6 +217,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -231,6 +232,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_global_forwarding_rule_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_global_forwarding_rule_info.py index 292489cbf..735d622ac 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_global_forwarding_rule_info.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_global_forwarding_rule_info.py @@ -59,6 +59,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -73,6 +74,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -91,6 +96,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -273,7 +280,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_health_check.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_health_check.py index e48b07c64..ca4c6428f 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_health_check.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_health_check.py @@ -472,6 +472,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -486,6 +487,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -506,6 +511,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -916,7 +923,6 @@ from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import ( GcpModule, GcpRequest, remove_nones_from_dict, - replace_resource_dict, ) import json import time diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_health_check_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_health_check_info.py index 3f323c7f5..b6876f25d 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_health_check_info.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_health_check_info.py @@ -59,6 +59,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -73,6 +74,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -91,6 +96,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -511,7 +518,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_http_health_check.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_http_health_check.py index c5da8434f..ee1bae398 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_http_health_check.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_http_health_check.py @@ -125,6 +125,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -139,6 +140,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -159,6 +164,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -255,7 +262,7 @@ unhealthyThreshold: # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest, replace_resource_dict +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest import json import time diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_http_health_check_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_http_health_check_info.py index 2c77d1282..547fdc9ac 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_http_health_check_info.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_http_health_check_info.py @@ -59,6 +59,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -73,6 +74,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -91,6 +96,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -188,7 +195,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_https_health_check.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_https_health_check.py index 8a60ce15d..cd38bb192 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_https_health_check.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_https_health_check.py @@ -122,6 +122,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -136,6 +137,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -156,6 +161,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -252,7 +259,7 @@ unhealthyThreshold: # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest, replace_resource_dict +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest import json import time diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_https_health_check_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_https_health_check_info.py index 0ff65140d..58af6d454 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_https_health_check_info.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_https_health_check_info.py @@ -59,6 +59,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -73,6 +74,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -91,6 +96,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -188,7 +195,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_image.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_image.py index c7080564b..66d897a39 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_image.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_image.py @@ -229,6 +229,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -243,6 +244,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -263,6 +268,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_image_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_image_info.py index afd396270..2f1acd14d 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_image_info.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_image_info.py @@ -59,6 +59,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -73,6 +74,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -91,6 +96,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -335,7 +342,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_instance.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_instance.py index 703ec4c2f..1d7f56e9f 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_instance.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_instance.py @@ -522,6 +522,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -536,6 +537,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_instance_group.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_instance_group.py index 419e78845..8f65b4b27 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_instance_group.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_instance_group.py @@ -138,6 +138,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -152,6 +153,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_instance_group_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_instance_group_info.py index 6a3ec0c3b..a8d304569 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_instance_group_info.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_instance_group_info.py @@ -64,6 +64,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -78,6 +79,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -96,6 +101,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -197,7 +204,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_instance_group_manager.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_instance_group_manager.py index 6b6c05f16..776503d58 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_instance_group_manager.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_instance_group_manager.py @@ -136,6 +136,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -150,6 +151,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_instance_group_manager_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_instance_group_manager_info.py index 47ec986bb..16a6e5767 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_instance_group_manager_info.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_instance_group_manager_info.py @@ -64,6 +64,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -78,6 +79,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -96,6 +101,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -272,7 +279,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_instance_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_instance_info.py index 45ff87553..e12b957a3 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_instance_info.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_instance_info.py @@ -68,6 +68,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -82,6 +83,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -100,6 +105,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -601,7 +608,6 @@ from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import ( navigate_hash, GcpSession, GcpModule, - GcpRequest, ) import json diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_instance_template.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_instance_template.py index 078569263..ce4a8eb46 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_instance_template.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_instance_template.py @@ -485,6 +485,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -499,6 +500,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_instance_template_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_instance_template_info.py index b08cdfaab..2d337cf1b 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_instance_template_info.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_instance_template_info.py @@ -59,6 +59,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -73,6 +74,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -91,6 +96,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -544,7 +551,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_interconnect_attachment.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_interconnect_attachment.py index 7a2c8037c..5deac092b 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_interconnect_attachment.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_interconnect_attachment.py @@ -194,6 +194,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -208,6 +209,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_interconnect_attachment_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_interconnect_attachment_info.py index 933bdecb5..20b90bebe 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_interconnect_attachment_info.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_interconnect_attachment_info.py @@ -64,6 +64,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -78,6 +79,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -96,6 +101,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -304,7 +311,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_network.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_network.py index acaf59dcc..e093195fa 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_network.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_network.py @@ -108,6 +108,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -122,6 +123,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -142,6 +147,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -239,7 +246,6 @@ from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import ( GcpModule, GcpRequest, remove_nones_from_dict, - replace_resource_dict, ) import json import time diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_network_endpoint_group.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_network_endpoint_group.py index 9712c42d9..d6350de28 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_network_endpoint_group.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_network_endpoint_group.py @@ -124,6 +124,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -138,6 +139,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -158,6 +163,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_network_endpoint_group_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_network_endpoint_group_info.py index 8f9d1a8e8..b36afb099 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_network_endpoint_group_info.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_network_endpoint_group_info.py @@ -64,6 +64,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -78,6 +79,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -96,6 +101,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -176,7 +183,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_network_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_network_info.py index f2b7c498f..7896facb7 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_network_info.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_network_info.py @@ -59,6 +59,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -73,6 +74,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -91,6 +96,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -186,7 +193,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_node_group.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_node_group.py index e8bf72577..c42311079 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_node_group.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_node_group.py @@ -141,6 +141,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -155,6 +156,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -175,6 +180,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_node_group_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_node_group_info.py index 68f340994..6864c281c 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_node_group_info.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_node_group_info.py @@ -64,6 +64,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -78,6 +79,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -96,6 +101,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -203,7 +210,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_node_template.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_node_template.py index 5db26eaea..5de307c26 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_node_template.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_node_template.py @@ -135,6 +135,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -149,6 +150,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -169,6 +174,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -280,7 +287,6 @@ from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import ( GcpModule, GcpRequest, remove_nones_from_dict, - replace_resource_dict, ) import json import re diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_node_template_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_node_template_info.py index 6859ca83e..5219bc602 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_node_template_info.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_node_template_info.py @@ -64,6 +64,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -78,6 +79,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -96,6 +101,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -204,7 +211,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_autoscaler.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_autoscaler.py index 06cadd33f..6d4cca956 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_autoscaler.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_autoscaler.py @@ -237,6 +237,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -251,6 +252,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -271,6 +276,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -539,7 +546,6 @@ from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import ( GcpModule, GcpRequest, remove_nones_from_dict, - replace_resource_dict, ) import json import time diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_autoscaler_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_autoscaler_info.py index f53968e28..64114af2c 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_autoscaler_info.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_autoscaler_info.py @@ -64,6 +64,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -78,6 +79,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -96,6 +101,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -304,7 +311,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_backend_service.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_backend_service.py index 0ad1bcc5c..557e92d26 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_backend_service.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_backend_service.py @@ -718,6 +718,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -732,6 +733,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -752,6 +757,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_backend_service_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_backend_service_info.py index 74bea5cb0..685f48ff0 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_backend_service_info.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_backend_service_info.py @@ -64,6 +64,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -78,6 +79,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -96,6 +101,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -771,7 +778,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_disk.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_disk.py index 17d128562..673d925ae 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_disk.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_disk.py @@ -176,6 +176,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -190,6 +191,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -210,6 +215,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -398,7 +405,6 @@ from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import ( GcpModule, GcpRequest, remove_nones_from_dict, - replace_resource_dict, ) import json import re diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_disk_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_disk_info.py index 648b4b874..6e70b4dac 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_disk_info.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_disk_info.py @@ -64,6 +64,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -78,6 +79,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -96,6 +101,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -277,7 +284,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_health_check.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_health_check.py index 745f9a579..fcbad2136 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_health_check.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_health_check.py @@ -472,6 +472,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -486,6 +487,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -506,6 +511,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -922,7 +929,6 @@ from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import ( GcpModule, GcpRequest, remove_nones_from_dict, - replace_resource_dict, ) import json import re diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_health_check_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_health_check_info.py index d9d427694..38b4a7caa 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_health_check_info.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_health_check_info.py @@ -64,6 +64,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -78,6 +79,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -96,6 +101,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -522,7 +529,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_instance_group_manager.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_instance_group_manager.py index c2f77b8d5..267e7f17f 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_instance_group_manager.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_instance_group_manager.py @@ -154,6 +154,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -168,6 +169,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_instance_group_manager_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_instance_group_manager_info.py index b32014973..43816fd24 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_instance_group_manager_info.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_instance_group_manager_info.py @@ -64,6 +64,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -78,6 +79,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -96,6 +101,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -285,7 +292,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_target_http_proxy.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_target_http_proxy.py index ec2709564..c409f586e 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_target_http_proxy.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_target_http_proxy.py @@ -92,6 +92,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -106,6 +107,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -126,6 +131,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_target_http_proxy_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_target_http_proxy_info.py index 3ef0366ad..f53beca57 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_target_http_proxy_info.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_target_http_proxy_info.py @@ -64,6 +64,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -78,6 +79,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -96,6 +101,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -160,7 +167,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_target_https_proxy.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_target_https_proxy.py index 478563398..91dfd3cca 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_target_https_proxy.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_target_https_proxy.py @@ -100,6 +100,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -114,6 +115,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -134,6 +139,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_target_https_proxy_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_target_https_proxy_info.py index 0af28904c..fdb9f99ab 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_target_https_proxy_info.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_target_https_proxy_info.py @@ -64,6 +64,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -78,6 +79,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -96,6 +101,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -167,7 +174,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_url_map.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_url_map.py index ac46b1ca8..1d8c9c315 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_url_map.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_url_map.py @@ -1602,6 +1602,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -1616,6 +1617,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_url_map_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_url_map_info.py index ae5f174ca..3b5cdb71c 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_url_map_info.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_url_map_info.py @@ -64,6 +64,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -78,6 +79,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -96,6 +101,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -1588,7 +1595,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_reservation.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_reservation.py index 8c82f8417..c0a9dd029 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_reservation.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_reservation.py @@ -162,6 +162,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -176,6 +177,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -196,6 +201,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -349,7 +356,6 @@ from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import ( GcpModule, GcpRequest, remove_nones_from_dict, - replace_resource_dict, ) import json import time diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_reservation_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_reservation_info.py index ee9ae46ba..ba42f85f5 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_reservation_info.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_reservation_info.py @@ -64,6 +64,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -78,6 +79,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -96,6 +101,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -242,7 +249,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_resource_policy.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_resource_policy.py index 5a668ce09..756685f79 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_resource_policy.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_resource_policy.py @@ -274,6 +274,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -288,6 +289,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -533,7 +538,6 @@ from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import ( GcpModule, GcpRequest, remove_nones_from_dict, - replace_resource_dict, ) import json import time diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_resource_policy_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_resource_policy_info.py index 1aeb54766..545a3bfef 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_resource_policy_info.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_resource_policy_info.py @@ -64,6 +64,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -78,6 +79,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -96,6 +101,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -330,7 +337,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_route.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_route.py index 3da7d0fa6..12b8bec29 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_route.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_route.py @@ -174,6 +174,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -188,6 +189,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -208,6 +213,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_route_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_route_info.py index 034a3155e..86e9ab490 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_route_info.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_route_info.py @@ -59,6 +59,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -73,6 +74,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -91,6 +96,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -201,7 +208,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_router.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_router.py index 77efcbc40..d64d212f5 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_router.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_router.py @@ -141,6 +141,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -155,6 +156,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -175,6 +180,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_router_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_router_info.py index 25e148dfa..d595d1991 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_router_info.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_router_info.py @@ -64,6 +64,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -78,6 +79,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -96,6 +101,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -206,7 +213,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_snapshot.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_snapshot.py index 7f2a61695..5759fbfa0 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_snapshot.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_snapshot.py @@ -157,6 +157,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -171,6 +172,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -191,6 +196,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_snapshot_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_snapshot_info.py index e1d98952f..26963f3ce 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_snapshot_info.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_snapshot_info.py @@ -59,6 +59,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -73,6 +74,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -91,6 +96,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -244,7 +251,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_ssl_certificate.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_ssl_certificate.py index 15ddabafc..d2f4680da 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_ssl_certificate.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_ssl_certificate.py @@ -89,6 +89,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -103,6 +104,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -123,6 +128,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -208,7 +215,7 @@ privateKey: # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest, replace_resource_dict +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest import json import time diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_ssl_certificate_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_ssl_certificate_info.py index e030ce834..27b4ce260 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_ssl_certificate_info.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_ssl_certificate_info.py @@ -59,6 +59,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -73,6 +74,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -91,6 +96,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -155,7 +162,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_ssl_policy.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_ssl_policy.py index 57cda0d2f..64a62fda6 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_ssl_policy.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_ssl_policy.py @@ -99,6 +99,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -113,6 +114,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -133,6 +138,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -240,7 +247,6 @@ from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import ( GcpModule, GcpRequest, remove_nones_from_dict, - replace_resource_dict, ) import json import time diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_ssl_policy_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_ssl_policy_info.py index a194ebec7..04219c88e 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_ssl_policy_info.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_ssl_policy_info.py @@ -59,6 +59,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -73,6 +74,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -91,6 +96,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -191,7 +198,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_subnetwork.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_subnetwork.py index 3fc743802..7642dc214 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_subnetwork.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_subnetwork.py @@ -151,6 +151,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -165,6 +166,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -186,6 +191,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_subnetwork_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_subnetwork_info.py index 428e35dc5..5b126f29e 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_subnetwork_info.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_subnetwork_info.py @@ -64,6 +64,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -78,6 +79,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -96,6 +101,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -210,7 +217,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_http_proxy.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_http_proxy.py index 647a9c4ff..5e92ee6bb 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_http_proxy.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_http_proxy.py @@ -93,6 +93,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -107,6 +108,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -127,6 +132,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_http_proxy_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_http_proxy_info.py index 42fbfceba..6a78af427 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_http_proxy_info.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_http_proxy_info.py @@ -59,6 +59,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -73,6 +74,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -91,6 +96,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -155,7 +162,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_https_proxy.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_https_proxy.py index fa15ab92a..c6927302e 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_https_proxy.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_https_proxy.py @@ -121,6 +121,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -135,6 +136,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -155,6 +160,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_https_proxy_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_https_proxy_info.py index 197237c11..b4186a9ee 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_https_proxy_info.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_https_proxy_info.py @@ -59,6 +59,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -73,6 +74,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -91,6 +96,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -177,7 +184,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_instance.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_instance.py index e3fd58e68..686886dc0 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_instance.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_instance.py @@ -104,6 +104,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -118,6 +119,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -138,6 +143,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_instance_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_instance_info.py index 106f0ce43..791fb0a4b 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_instance_info.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_instance_info.py @@ -64,6 +64,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -78,6 +79,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -96,6 +101,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -162,7 +169,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_pool.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_pool.py index b5643afa5..48118c120 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_pool.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_pool.py @@ -146,6 +146,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -160,6 +161,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -180,6 +185,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_pool_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_pool_info.py index f61965156..54345a1bb 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_pool_info.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_pool_info.py @@ -64,6 +64,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -78,6 +79,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -96,6 +101,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -208,7 +215,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_ssl_proxy.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_ssl_proxy.py index 33bf10747..cd95c17fb 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_ssl_proxy.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_ssl_proxy.py @@ -111,6 +111,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -125,6 +126,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -145,6 +150,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_ssl_proxy_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_ssl_proxy_info.py index b6f17d8a8..e23e84170 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_ssl_proxy_info.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_ssl_proxy_info.py @@ -59,6 +59,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -73,6 +74,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -91,6 +96,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -167,7 +174,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_tcp_proxy.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_tcp_proxy.py index 29793bb89..945cb9cf8 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_tcp_proxy.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_tcp_proxy.py @@ -98,6 +98,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -112,6 +113,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -132,6 +137,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_tcp_proxy_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_tcp_proxy_info.py index 785f1aed7..65cc7759e 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_tcp_proxy_info.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_tcp_proxy_info.py @@ -59,6 +59,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -73,6 +74,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -91,6 +96,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -159,7 +166,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_vpn_gateway.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_vpn_gateway.py index 0c5e73309..e76bd4016 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_vpn_gateway.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_vpn_gateway.py @@ -91,6 +91,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -105,6 +106,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -124,6 +129,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_vpn_gateway_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_vpn_gateway_info.py index 24644af42..8d9763bb0 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_vpn_gateway_info.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_vpn_gateway_info.py @@ -64,6 +64,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -78,6 +79,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -96,6 +101,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -170,7 +177,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_url_map.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_url_map.py index ed35cfc07..2856e596a 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_url_map.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_url_map.py @@ -2547,6 +2547,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -2561,6 +2562,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -2580,6 +2585,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_url_map_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_url_map_info.py index 0bbc26207..fa5431a11 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_url_map_info.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_url_map_info.py @@ -59,6 +59,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -73,6 +74,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -91,6 +96,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -2471,7 +2478,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_vpn_tunnel.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_vpn_tunnel.py index 60705a64c..a59e469ae 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_vpn_tunnel.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_vpn_tunnel.py @@ -178,6 +178,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -192,6 +193,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -213,6 +218,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_vpn_tunnel_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_vpn_tunnel_info.py index e0ee1f9ed..7b3430aae 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_vpn_tunnel_info.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_vpn_tunnel_info.py @@ -64,6 +64,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -78,6 +79,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -96,6 +101,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -231,7 +238,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_container_cluster.py b/ansible_collections/google/cloud/plugins/modules/gcp_container_cluster.py index 968dfb3ad..0a5d94934 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_container_cluster.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_container_cluster.py @@ -552,6 +552,11 @@ options: - Set to /netmask (e.g. /14) to have a range chosen with a specific netmask. required: false type: str + stack_type: + description: + - 'The IP stack type of the cluster, possible values: (STACK_TYPE_UNSPECIFIED, IPV4, IPV4_IPV6)' + required: false + type: str initial_cluster_version: description: - The software version of the master endpoint and kubelets used in the cluster @@ -628,6 +633,11 @@ options: required: false type: dict suboptions: + datapath_provider: + description: + - The datapath provider selects the implementation of the Kubernetes networking model for service resolution and network policy enforcement. + required: false + type: str enable_intra_node_visibility: description: - Whether Intra-node visibility is enabled for this cluster. This makes same @@ -681,6 +691,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -695,6 +706,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -1252,6 +1267,11 @@ ipAllocationPolicy: - Set to /netmask (e.g. /14) to have a range chosen with a specific netmask. returned: success type: str + stackType: + description: + - 'The IP stack type of the cluster, possible values: (STACK_TYPE_UNSPECIFIED, IPV4, IPV4_IPV6)' + type: str + returned: success endpoint: description: - The IP address of this cluster's master endpoint. @@ -1474,7 +1494,6 @@ from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import ( GcpModule, GcpRequest, remove_nones_from_dict, - replace_resource_dict, ) import json import time @@ -1559,6 +1578,7 @@ def main(): node_ipv4_cidr_block=dict(type='str'), services_ipv4_cidr_block=dict(type='str'), tpu_ipv4_cidr_block=dict(type='str'), + stack_type=dict(type='str'), ), ), initial_cluster_version=dict(type='str'), @@ -1572,7 +1592,14 @@ def main(): binary_authorization=dict(type='dict', options=dict(enabled=dict(type='bool'))), release_channel=dict(type='dict', options=dict(channel=dict(type='str'))), shielded_nodes=dict(type='dict', options=dict(enabled=dict(type='bool'))), - network_config=dict(type='dict', options=dict(enable_intra_node_visibility=dict(type='bool'), default_snat_status=dict(type='bool'))), + network_config=dict( + type='dict', + options=dict( + enable_intra_node_visibility=dict(type='bool'), + default_snat_status=dict(type='bool'), + datapath_provider=dict(type='str'), + ), + ), enable_kubernetes_alpha=dict(type='bool'), location=dict(required=True, type='str', aliases=['zone']), kubectl_path=dict(type='str'), @@ -2248,6 +2275,7 @@ class ClusterIpallocationpolicy(object): u'nodeIpv4CidrBlock': self.request.get('node_ipv4_cidr_block'), u'servicesIpv4CidrBlock': self.request.get('services_ipv4_cidr_block'), u'tpuIpv4CidrBlock': self.request.get('tpu_ipv4_cidr_block'), + u'stackType': self.request.get('stack_type'), } ) @@ -2421,14 +2449,18 @@ class ClusterNetworkconfig(object): self.request = {} def to_request(self): - return remove_nones_from_dict( - {u'enableIntraNodeVisibility': self.request.get('enable_intra_node_visibility'), u'defaultSnatStatus': self.request.get('default_snat_status')} - ) + return remove_nones_from_dict({ + u'enableIntraNodeVisibility': self.request.get('enable_intra_node_visibility'), + u'defaultSnatStatus': self.request.get('default_snat_status'), + u'datapathProvider': self.request.get('datapath_provider'), + }) def from_response(self): - return remove_nones_from_dict( - {u'enableIntraNodeVisibility': self.request.get(u'enableIntraNodeVisibility'), u'defaultSnatStatus': self.request.get(u'defaultSnatStatus')} - ) + return remove_nones_from_dict({ + u'enableIntraNodeVisibility': self.request.get(u'enableIntraNodeVisibility'), + u'defaultSnatStatus': self.request.get(u'defaultSnatStatus'), + u'datapathProvider': self.request.get('datapath_provider'), + }) if __name__ == '__main__': diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_container_cluster_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_container_cluster_info.py index 77d57793f..0b90433c6 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_container_cluster_info.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_container_cluster_info.py @@ -60,6 +60,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -74,6 +75,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -92,6 +97,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -843,7 +850,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_container_node_pool.py b/ansible_collections/google/cloud/plugins/modules/gcp_container_node_pool.py index 82091a681..174083763 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_container_node_pool.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_container_node_pool.py @@ -358,6 +358,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -372,6 +373,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_container_node_pool_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_container_node_pool_info.py index 03c7ccda3..e27412abb 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_container_node_pool_info.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_container_node_pool_info.py @@ -70,6 +70,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -84,6 +85,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -102,6 +107,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -434,7 +441,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest, replace_resource_dict +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, replace_resource_dict import json ################################################################################ diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_dns_managed_zone.py b/ansible_collections/google/cloud/plugins/modules/gcp_dns_managed_zone.py index 5f4558090..83c327a86 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_dns_managed_zone.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_dns_managed_zone.py @@ -234,6 +234,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -248,6 +249,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -268,6 +273,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -476,7 +483,6 @@ from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import ( GcpModule, GcpRequest, remove_nones_from_dict, - replace_resource_dict, ) import json diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_dns_managed_zone_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_dns_managed_zone_info.py index c0905abe8..333bfcee7 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_dns_managed_zone_info.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_dns_managed_zone_info.py @@ -57,6 +57,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -71,6 +72,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -89,6 +94,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -292,7 +299,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_dns_resource_record_set.py b/ansible_collections/google/cloud/plugins/modules/gcp_dns_resource_record_set.py index cfa2058a9..c98220523 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_dns_resource_record_set.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_dns_resource_record_set.py @@ -94,6 +94,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -108,6 +109,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_dns_resource_record_set_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_dns_resource_record_set_info.py index 5fafd645f..622c31021 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_dns_resource_record_set_info.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_dns_resource_record_set_info.py @@ -59,6 +59,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -73,6 +74,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -91,6 +96,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -144,7 +151,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest, replace_resource_dict +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, replace_resource_dict import json ################################################################################ diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_filestore_instance.py b/ansible_collections/google/cloud/plugins/modules/gcp_filestore_instance.py index 7028ffeb4..7895f9c36 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_filestore_instance.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_filestore_instance.py @@ -131,6 +131,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -145,6 +146,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -167,6 +172,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -287,7 +294,6 @@ from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import ( GcpModule, GcpRequest, remove_nones_from_dict, - replace_resource_dict, ) import json import re diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_filestore_instance_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_filestore_instance_info.py index 713fcc6f9..55ab27caf 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_filestore_instance_info.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_filestore_instance_info.py @@ -57,6 +57,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -71,6 +72,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -89,6 +94,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -197,7 +204,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_iam_role.py b/ansible_collections/google/cloud/plugins/modules/gcp_iam_role.py index a87aa58f2..8af62c8e8 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_iam_role.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_iam_role.py @@ -93,6 +93,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -107,6 +108,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -178,7 +183,6 @@ from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import ( GcpSession, GcpModule, GcpRequest, - replace_resource_dict, ) import json diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_iam_role_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_iam_role_info.py index de791b251..35874cc2f 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_iam_role_info.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_iam_role_info.py @@ -52,6 +52,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -66,6 +67,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -84,6 +89,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -140,7 +147,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_iam_service_account.py b/ansible_collections/google/cloud/plugins/modules/gcp_iam_service_account.py index fa930145a..d93db04b2 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_iam_service_account.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_iam_service_account.py @@ -70,6 +70,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -84,6 +85,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -145,7 +150,7 @@ oauth2ClientId: # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest, replace_resource_dict +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest import json ################################################################################ diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_iam_service_account_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_iam_service_account_info.py index 5a0d94e13..b2017181f 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_iam_service_account_info.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_iam_service_account_info.py @@ -52,6 +52,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -66,6 +67,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -84,6 +89,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -139,7 +146,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_iam_service_account_key.py b/ansible_collections/google/cloud/plugins/modules/gcp_iam_service_account_key.py index 633fd7492..a34718d71 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_iam_service_account_key.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_iam_service_account_key.py @@ -71,8 +71,9 @@ options: type: dict path: description: - - The full name of the file that will hold the service account private key. The - management of this file will depend on the value of sync_file parameter. + - The full name of the file that will hold the service account private key. + - If the file already exists, it will attempt to be read. Ensure the file does + not exist or is alreay a valid key. - File path must be absolute. required: false type: path @@ -89,6 +90,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -103,6 +105,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -187,8 +193,9 @@ serviceAccount: type: dict path: description: - - The full name of the file that will hold the service account private key. The - management of this file will depend on the value of sync_file parameter. + - The full name of the file that will hold the service account private key. + - If the file already exists, it will attempt to be read. Ensure the file does + not exist or is alreay a valid key. - File path must be absolute. returned: success type: str @@ -198,12 +205,10 @@ path: # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest, replace_resource_dict +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, replace_resource_dict from ansible.module_utils._text import to_native import json import os -import mimetypes -import hashlib import base64 ################################################################################ diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_kms_crypto_key.py b/ansible_collections/google/cloud/plugins/modules/gcp_kms_crypto_key.py index bdd6fbc25..40bfae95e 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_kms_crypto_key.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_kms_crypto_key.py @@ -118,6 +118,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -132,6 +133,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -152,6 +157,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -258,7 +265,6 @@ from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import ( GcpModule, GcpRequest, remove_nones_from_dict, - replace_resource_dict, ) import json diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_kms_crypto_key_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_kms_crypto_key_info.py index 24e98a964..bc40b4846 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_kms_crypto_key_info.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_kms_crypto_key_info.py @@ -58,6 +58,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -72,6 +73,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -90,6 +95,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -182,7 +189,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_kms_key_ring.py b/ansible_collections/google/cloud/plugins/modules/gcp_kms_key_ring.py index 23bab157d..7f70faacb 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_kms_key_ring.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_kms_key_ring.py @@ -72,6 +72,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -86,6 +87,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -106,6 +111,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -147,7 +154,7 @@ location: # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest, replace_resource_dict +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest import json ################################################################################ diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_kms_key_ring_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_kms_key_ring_info.py index 01e8fadb0..39d3de925 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_kms_key_ring_info.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_kms_key_ring_info.py @@ -59,6 +59,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -73,6 +74,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -91,6 +96,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -135,7 +142,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_logging_metric.py b/ansible_collections/google/cloud/plugins/modules/gcp_logging_metric.py index 5d4740ce8..f89732401 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_logging_metric.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_logging_metric.py @@ -239,6 +239,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -253,6 +254,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -273,6 +278,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -494,7 +501,6 @@ from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import ( GcpModule, GcpRequest, remove_nones_from_dict, - replace_resource_dict, ) import json diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_logging_metric_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_logging_metric_info.py index 482a84047..76c323c33 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_logging_metric_info.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_logging_metric_info.py @@ -52,6 +52,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -66,6 +67,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -84,6 +89,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -286,7 +293,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_mlengine_model.py b/ansible_collections/google/cloud/plugins/modules/gcp_mlengine_model.py index d143c98b8..e3edaacec 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_mlengine_model.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_mlengine_model.py @@ -107,6 +107,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -121,6 +122,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -141,6 +146,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -217,7 +224,6 @@ from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import ( GcpModule, GcpRequest, remove_nones_from_dict, - replace_resource_dict, ) import json import time diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_mlengine_model_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_mlengine_model_info.py index cdd233058..11f28aee5 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_mlengine_model_info.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_mlengine_model_info.py @@ -52,6 +52,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -66,6 +67,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -84,6 +89,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -153,7 +160,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_mlengine_version.py b/ansible_collections/google/cloud/plugins/modules/gcp_mlengine_version.py index 5bb0620cc..e19fbe764 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_mlengine_version.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_mlengine_version.py @@ -170,6 +170,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -184,6 +185,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_mlengine_version_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_mlengine_version_info.py index da88e7b96..ecf928171 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_mlengine_version_info.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_mlengine_version_info.py @@ -62,6 +62,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -76,6 +77,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -94,6 +99,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -244,7 +251,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest, replace_resource_dict +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, replace_resource_dict import json ################################################################################ diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_pubsub_subscription.py b/ansible_collections/google/cloud/plugins/modules/gcp_pubsub_subscription.py index 08edb64f2..f39583bee 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_pubsub_subscription.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_pubsub_subscription.py @@ -273,6 +273,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -287,6 +288,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -307,6 +312,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_pubsub_subscription_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_pubsub_subscription_info.py index ee5cf64d1..b911131d7 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_pubsub_subscription_info.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_pubsub_subscription_info.py @@ -52,6 +52,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -66,6 +67,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -84,6 +89,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -317,7 +324,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_pubsub_topic.py b/ansible_collections/google/cloud/plugins/modules/gcp_pubsub_topic.py index 673df4967..28fdb0810 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_pubsub_topic.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_pubsub_topic.py @@ -117,6 +117,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -131,6 +132,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -151,6 +156,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -232,7 +239,6 @@ from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import ( GcpModule, GcpRequest, remove_nones_from_dict, - replace_resource_dict, ) import json import re diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_pubsub_topic_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_pubsub_topic_info.py index fa194013c..0dc6f4e0f 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_pubsub_topic_info.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_pubsub_topic_info.py @@ -52,6 +52,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -66,6 +67,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -84,6 +89,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -164,7 +171,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_redis_instance.py b/ansible_collections/google/cloud/plugins/modules/gcp_redis_instance.py index fe817c23e..ac8724a0e 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_redis_instance.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_redis_instance.py @@ -162,6 +162,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -176,6 +177,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -196,6 +201,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -401,7 +408,6 @@ from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import ( GcpModule, GcpRequest, remove_nones_from_dict, - replace_resource_dict, ) import json import time diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_redis_instance_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_redis_instance_info.py index 86b7d1ce4..33a9241ac 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_redis_instance_info.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_redis_instance_info.py @@ -57,6 +57,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -71,6 +72,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -89,6 +94,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -275,7 +282,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_resourcemanager_project.py b/ansible_collections/google/cloud/plugins/modules/gcp_resourcemanager_project.py index 045ec6ee3..cd2d099fa 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_resourcemanager_project.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_resourcemanager_project.py @@ -103,6 +103,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -117,6 +118,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -215,7 +220,6 @@ from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import ( GcpModule, GcpRequest, remove_nones_from_dict, - replace_resource_dict, ) import json import time diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_resourcemanager_project_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_resourcemanager_project_info.py index 1df386436..7d978299a 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_resourcemanager_project_info.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_resourcemanager_project_info.py @@ -52,6 +52,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -66,6 +67,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -89,6 +94,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -172,7 +179,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_runtimeconfig_config.py b/ansible_collections/google/cloud/plugins/modules/gcp_runtimeconfig_config.py index cad3c57e7..6fe439eb7 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_runtimeconfig_config.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_runtimeconfig_config.py @@ -71,6 +71,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -85,6 +86,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -126,7 +131,7 @@ name: # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest, replace_resource_dict +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest import json import re diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_runtimeconfig_config_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_runtimeconfig_config_info.py index c1aa11bb8..063c1cee9 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_runtimeconfig_config_info.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_runtimeconfig_config_info.py @@ -52,6 +52,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -66,6 +67,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -84,6 +89,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -119,7 +126,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_runtimeconfig_variable.py b/ansible_collections/google/cloud/plugins/modules/gcp_runtimeconfig_variable.py index 6d8de2370..8da87320e 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_runtimeconfig_variable.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_runtimeconfig_variable.py @@ -80,6 +80,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -94,6 +95,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -156,7 +161,7 @@ config: # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest, replace_resource_dict +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest import json import re diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_runtimeconfig_variable_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_runtimeconfig_variable_info.py index 7c882f64b..ec1adb922 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_runtimeconfig_variable_info.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_runtimeconfig_variable_info.py @@ -57,6 +57,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -71,6 +72,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -89,6 +94,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -135,7 +142,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_serviceusage_service.py b/ansible_collections/google/cloud/plugins/modules/gcp_serviceusage_service.py index fff0d7309..221f7b6c7 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_serviceusage_service.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_serviceusage_service.py @@ -71,6 +71,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -85,6 +86,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -104,6 +109,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -186,7 +193,6 @@ from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import ( GcpModule, GcpRequest, remove_nones_from_dict, - replace_resource_dict, ) import json import re @@ -375,9 +381,13 @@ def wait_for_operation(module, response): def wait_for_completion(status, op_result, module): op_id = navigate_hash(op_result, ['name']) op_uri = async_op_url(module, {'op_id': op_id}) + sleep_time = 1.0 while not status: raise_if_errors(op_result, ['error'], module) - time.sleep(1.0) + time.sleep(sleep_time) + sleep_time *= 2 + if sleep_time > 10.0: + sleep_time = 10.0 op_result = fetch_resource(module, op_uri, False) status = navigate_hash(op_result, ['done']) return op_result diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_serviceusage_service_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_serviceusage_service_info.py index 7c57233a1..1c49512ec 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_serviceusage_service_info.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_serviceusage_service_info.py @@ -52,6 +52,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -66,6 +67,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -84,6 +89,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -162,7 +169,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_sourcerepo_repository.py b/ansible_collections/google/cloud/plugins/modules/gcp_sourcerepo_repository.py index 4e902c149..178cee86a 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_sourcerepo_repository.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_sourcerepo_repository.py @@ -67,6 +67,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -81,6 +82,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -101,6 +106,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -141,7 +148,7 @@ size: # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest, replace_resource_dict +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest import json import re diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_sourcerepo_repository_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_sourcerepo_repository_info.py index a534ade7e..4a0d809b4 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_sourcerepo_repository_info.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_sourcerepo_repository_info.py @@ -52,6 +52,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -66,6 +67,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -84,6 +89,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -126,7 +133,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_spanner_database.py b/ansible_collections/google/cloud/plugins/modules/gcp_spanner_database.py index 4d7356fb3..6c6bce90b 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_spanner_database.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_spanner_database.py @@ -97,6 +97,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -111,6 +112,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -131,6 +136,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_spanner_database_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_spanner_database_info.py index 2f11f1ce4..2f45553d3 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_spanner_database_info.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_spanner_database_info.py @@ -62,6 +62,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -76,6 +77,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -94,6 +99,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -151,7 +158,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest, replace_resource_dict +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, replace_resource_dict import json ################################################################################ diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_spanner_instance.py b/ansible_collections/google/cloud/plugins/modules/gcp_spanner_instance.py index 8458042a0..deb212ff8 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_spanner_instance.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_spanner_instance.py @@ -100,6 +100,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -114,6 +115,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -134,6 +139,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -202,7 +209,7 @@ labels: # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest, replace_resource_dict +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest import json import time diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_spanner_instance_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_spanner_instance_info.py index 1fc5fce4f..90e25ddaa 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_spanner_instance_info.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_spanner_instance_info.py @@ -52,6 +52,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -66,6 +67,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -84,6 +89,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -149,7 +156,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_sql_database.py b/ansible_collections/google/cloud/plugins/modules/gcp_sql_database.py index c43673daf..685ffee1d 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_sql_database.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_sql_database.py @@ -87,6 +87,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -101,6 +102,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -176,7 +181,7 @@ instance: # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest, replace_resource_dict +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest import json import time diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_sql_database_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_sql_database_info.py index 4938076fd..dfc9bc9cb 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_sql_database_info.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_sql_database_info.py @@ -57,6 +57,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -71,6 +72,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -89,6 +94,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -142,7 +149,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_sql_instance.py b/ansible_collections/google/cloud/plugins/modules/gcp_sql_instance.py index bb19ecf9e..9f18a2f67 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_sql_instance.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_sql_instance.py @@ -370,6 +370,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -384,6 +385,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -809,7 +814,6 @@ from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import ( GcpModule, GcpRequest, remove_nones_from_dict, - replace_resource_dict, ) import json import time diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_sql_instance_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_sql_instance_info.py index 71d09d20e..afbc7c309 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_sql_instance_info.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_sql_instance_info.py @@ -52,6 +52,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -66,6 +67,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -84,6 +89,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -503,7 +510,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_sql_ssl_cert.py b/ansible_collections/google/cloud/plugins/modules/gcp_sql_ssl_cert.py index 96e9cc1b9..02519b30d 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_sql_ssl_cert.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_sql_ssl_cert.py @@ -88,7 +88,10 @@ options: sha1_fingerprint: description: - The SHA-1 of the certificate. - required: true + type: str + private_key: + description: + - The private key associated with the certificate. type: str project: description: @@ -103,6 +106,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -117,6 +121,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -193,6 +201,11 @@ sha1Fingerprint: - The SHA-1 of the certificate. returned: success type: str +privateKey: + description: + - The private key associated with the certificate. + returned: success + type: str ''' ################################################################################ @@ -220,7 +233,8 @@ def main(): create_time=dict(type='str'), expiration_time=dict(type='str'), instance=dict(required=True, type='dict'), - sha1_fingerprint=dict(required=True, type='str'), + sha1_fingerprint=dict(type='str'), + private_key=dict(type='str'), ) ) @@ -257,12 +271,11 @@ def main(): def create(module, link, kind): auth = GcpSession(module, 'sql') - return wait_for_operation(module, auth.post(link, resource_to_request(module))) + return wait_for_create_operation(module, auth.post(link, resource_to_request(module))) def update(module, link, kind): - auth = GcpSession(module, 'sql') - return wait_for_operation(module, auth.put(link, resource_to_request(module))) + module.fail_json(msg="SQL certificates cannot be modified") def delete(module, link, kind): @@ -293,7 +306,8 @@ def fetch_resource(module, link, kind, allow_not_found=True): def self_link(module): - res = {'project': module.params['project'], 'instance': replace_resource_dict(module.params['instance'], 'name')} + res = {'project': module.params['project'], 'instance': replace_resource_dict(module.params['instance'], 'name'), + 'sha1_fingerprint': module.params['sha1_fingerprint']} return "https://sqladmin.googleapis.com/sql/v1beta4/projects/{project}/instances/{instance}/sslCerts/{sha1_fingerprint}".format(**res) @@ -362,6 +376,31 @@ def async_op_url(module, extra_data=None): return url.format(**combined) +# The create response includes the certificate, but it's not usable until +# the operation completes. The create response is also the only place the +# private key is available, so return the newly created resource directly. +def wait_for_create_operation(module, response): + op_result = return_if_object(module, response, 'sql#operation') + if op_result is None: + return {} + status = navigate_hash(op_result, ['operation', 'status']) + wait_done = wait_for_create_completion(status, op_result, module) + res = navigate_hash(op_result, ['clientCert', 'certInfo']) + res.update({'privateKey': navigate_hash(op_result, ['clientCert', 'certPrivateKey'])}) + return res + + +def wait_for_create_completion(status, op_result, module): + op_id = navigate_hash(op_result, ['operation', 'name']) + op_uri = async_op_url(module, {'op_id': op_id}) + while status != 'DONE': + raise_if_errors(op_result, ['error', 'errors'], module) + time.sleep(1.0) + op_result = fetch_resource(module, op_uri, 'sql#operation', False) + status = navigate_hash(op_result, ['status']) + return op_result + + def wait_for_operation(module, response): op_result = return_if_object(module, response, 'sql#operation') if op_result is None: diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_sql_user.py b/ansible_collections/google/cloud/plugins/modules/gcp_sql_user.py index d7e211a83..ca2cbf4f9 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_sql_user.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_sql_user.py @@ -87,6 +87,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -101,6 +102,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_sql_user_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_sql_user_info.py index dfb3e08b1..762a73567 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_sql_user_info.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_sql_user_info.py @@ -62,6 +62,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -76,6 +77,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -94,6 +99,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -142,7 +149,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest, replace_resource_dict +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, replace_resource_dict import json ################################################################################ diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_storage_bucket.py b/ansible_collections/google/cloud/plugins/modules/gcp_storage_bucket.py index f9bad465d..18645d956 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_storage_bucket.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_storage_bucket.py @@ -414,6 +414,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -428,6 +429,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_storage_bucket_access_control.py b/ansible_collections/google/cloud/plugins/modules/gcp_storage_bucket_access_control.py index c6d36a81d..b2b1ea791 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_storage_bucket_access_control.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_storage_bucket_access_control.py @@ -95,6 +95,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -109,6 +110,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -129,6 +134,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_storage_default_object_acl.py b/ansible_collections/google/cloud/plugins/modules/gcp_storage_default_object_acl.py index 8a3b538bf..5bfea2f74 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_storage_default_object_acl.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_storage_default_object_acl.py @@ -60,11 +60,6 @@ options: bucket: description: - The name of the bucket. - - 'This field represents a link to a Bucket resource in GCP. It can be specified - in two ways. First, you can place a dictionary with key ''name'' and value of - your resource''s name Alternatively, you can add `register: name-of-resource` - to a gcp_storage_bucket task and then set this bucket field to "{{ name-of-resource - }}"' required: true type: dict entity: @@ -75,11 +70,6 @@ options: * project-team-{{projectId}} * allUsers * allAuthenticatedUsers .' required: true type: str - object: - description: - - The name of the object, if applied to an object. - required: false - type: str role: description: - The access permission for the entity. @@ -99,6 +89,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -113,6 +104,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -133,6 +128,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -188,21 +185,6 @@ entityId: - The ID for the entity. returned: success type: str -generation: - description: - - The content generation of the object, if applied to an object. - returned: success - type: int -id: - description: - - The ID of the access-control entry. - returned: success - type: str -object: - description: - - The name of the object, if applied to an object. - returned: success - type: str projectTeam: description: - The project team associated with the entity. @@ -264,10 +246,7 @@ def main(): state = module.params['state'] kind = 'storage#objectAccessControl' - if module.params['id']: - fetch = fetch_resource(module, self_link(module), kind) - else: - fetch = {} + fetch = fetch_resource(module, self_link(module), kind) changed = False if fetch: @@ -386,9 +365,6 @@ def response_to_hash(module, response): u'email': response.get(u'email'), u'entity': response.get(u'entity'), u'entityId': response.get(u'entityId'), - u'generation': response.get(u'generation'), - u'id': response.get(u'id'), - u'object': response.get(u'object'), u'projectTeam': DefaultObjectACLProjectteam(response.get(u'projectTeam', {}), module).from_response(), u'role': response.get(u'role'), } diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_storage_object.py b/ansible_collections/google/cloud/plugins/modules/gcp_storage_object.py index 6d497bd64..1411d0ffc 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_storage_object.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_storage_object.py @@ -69,6 +69,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -83,6 +84,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -146,17 +151,10 @@ storage_class: ################################################################################ from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import ( - navigate_hash, GcpSession, GcpModule, - GcpRequest, - replace_resource_dict, ) -import json import os -import mimetypes -import hashlib -import base64 try: import google.cloud diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_tpu_node.py b/ansible_collections/google/cloud/plugins/modules/gcp_tpu_node.py index 8a7e11fb0..32d599e9c 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_tpu_node.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_tpu_node.py @@ -130,6 +130,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -144,6 +145,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -164,6 +169,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -290,7 +297,6 @@ from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import ( GcpModule, GcpRequest, remove_nones_from_dict, - replace_resource_dict, ) import json import time diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_tpu_node_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_tpu_node_info.py index cd27a67a0..a01d08af7 100644 --- a/ansible_collections/google/cloud/plugins/modules/gcp_tpu_node_info.py +++ b/ansible_collections/google/cloud/plugins/modules/gcp_tpu_node_info.py @@ -57,6 +57,7 @@ options: - application - machineaccount - serviceaccount + - accesstoken service_account_contents: description: - The contents of a Service Account JSON file, either in a dictionary or as a @@ -71,6 +72,10 @@ options: - An optional service account email address if machineaccount is selected and the user does not wish to use the default email. type: str + access_token: + description: + - An OAuth2 access token if credential type is accesstoken. + type: str scopes: description: - Array of scopes to be used @@ -89,6 +94,8 @@ notes: env variable. - For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL) env variable. +- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN) + env variable. - For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable. - For authentication, you can set scopes using the C(GCP_SCOPES) env variable. - Environment variables values will only be used if the playbook values are not set. @@ -211,7 +218,7 @@ resources: ################################################################################ # Imports ################################################################################ -from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest +from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule import json ################################################################################ diff --git a/ansible_collections/google/cloud/roles/gcloud/tasks/archive/archive_install.yml b/ansible_collections/google/cloud/roles/gcloud/tasks/archive/archive_install.yml index 8f6a52aeb..5f0623066 100644 --- a/ansible_collections/google/cloud/roles/gcloud/tasks/archive/archive_install.yml +++ b/ansible_collections/google/cloud/roles/gcloud/tasks/archive/archive_install.yml @@ -2,20 +2,20 @@ - name: Gcloud | Archive | Ensure temp path exists ansible.builtin.file: path: "{{ gcloud_archive_path }}" - state: "directory" + state: directory mode: "0755" - name: Gcloud | Archive | Extract Cloud SDK archive ansible.builtin.unarchive: src: "{{ gcloud_archive_url }}" dest: "{{ gcloud_archive_path }}" - remote_src: yes + remote_src: true creates: "{{ gcloud_library_path }}" - name: Gcloud | Archive | Link binaries to /usr/bin (like package install) ansible.builtin.file: src: "{{ gcloud_library_path }}/bin/{{ item }}" - dest: "/usr/bin/{{ item }}" + dest: /usr/bin/{{ item }} state: link loop: - bq diff --git a/ansible_collections/google/cloud/roles/gcloud/tasks/archive/command_completion.yml b/ansible_collections/google/cloud/roles/gcloud/tasks/archive/command_completion.yml index d457c09d0..277210125 100644 --- a/ansible_collections/google/cloud/roles/gcloud/tasks/archive/command_completion.yml +++ b/ansible_collections/google/cloud/roles/gcloud/tasks/archive/command_completion.yml @@ -2,7 +2,7 @@ # task file to configure bash completion for gcloud - name: Gcloud | Archive | Debian | Ensure bash completion is installed ansible.builtin.apt: - name: "bash-completion" + name: bash-completion register: task_result until: task_result is success retries: 10 @@ -25,7 +25,7 @@ owner: root group: root state: directory - mode: 0755 + mode: "0755" - name: Gcloud | Archive | Link binaries to /usr/bin (like package install) ansible.builtin.file: diff --git a/ansible_collections/google/cloud/roles/gcloud/tasks/archive/main.yml b/ansible_collections/google/cloud/roles/gcloud/tasks/archive/main.yml index 989c89ba9..49eb87298 100644 --- a/ansible_collections/google/cloud/roles/gcloud/tasks/archive/main.yml +++ b/ansible_collections/google/cloud/roles/gcloud/tasks/archive/main.yml @@ -7,7 +7,7 @@ - name: Gcloud | Archive | Get gcloud_status ansible.builtin.debug: - var: "gcloud_status" + var: gcloud_status - name: Gcloud | Archive | Set installed version if installation exists when: gcloud_status.stat.exists @@ -30,11 +30,10 @@ {{ gcloud_installed_version }} is already installed. - name: Gcloud | Archive | Start installation - when: gcloud_installed_version is undefined or - gcloud_version is version(gcloud_installed_version, '>') + when: gcloud_installed_version is undefined or gcloud_version is version(gcloud_installed_version, '>') ansible.builtin.include_tasks: archive_install.yml -- name: Gcloud | Debian | Install the google-cloud-sdk additional components # noqa 301 +- name: Gcloud | Debian | Install the google-cloud-sdk additional components # noqa no-changed-when ansible.builtin.command: gcloud components install {{ item }} register: gcloud_install_comp_status changed_when: "'All components are up to date.' not in gcloud_install_comp_status.stderr_lines" diff --git a/ansible_collections/google/cloud/roles/gcloud/tasks/main.yml b/ansible_collections/google/cloud/roles/gcloud/tasks/main.yml index bdbd347a2..c7b646d7e 100644 --- a/ansible_collections/google/cloud/roles/gcloud/tasks/main.yml +++ b/ansible_collections/google/cloud/roles/gcloud/tasks/main.yml @@ -1,15 +1,14 @@ --- - - name: Gcloud | Load Distro and OS specific variables ansible.builtin.include_vars: "{{ lookup('first_found', params) }}" vars: params: files: - - "os/{{ ansible_distribution | lower }}.yml" - - "os/{{ ansible_os_family | lower }}.yml" + - os/{{ ansible_distribution | lower }}.yml + - os/{{ ansible_os_family | lower }}.yml - main.yml paths: - - 'vars' + - vars - name: Gcloud | Install the google-cloud-sdk from {{ gcloud_install_type }} ansible.builtin.include_tasks: "{{ gcloud_install_type }}/main.yml" diff --git a/ansible_collections/google/cloud/roles/gcloud/tasks/package/debian.yml b/ansible_collections/google/cloud/roles/gcloud/tasks/package/debian.yml index 6b0bf707a..726c79ee6 100644 --- a/ansible_collections/google/cloud/roles/gcloud/tasks/package/debian.yml +++ b/ansible_collections/google/cloud/roles/gcloud/tasks/package/debian.yml @@ -7,13 +7,13 @@ - name: Gcloud | Debian | Add the gcloud repository ansible.builtin.apt_repository: - repo: "deb {{ gcloud_apt_url }} {{ gcloud_apt_repo }} main" + repo: deb {{ gcloud_apt_url }} {{ gcloud_apt_repo }} main state: present filename: google-cloud-sdk - name: Gcloud | Debian | Install the google-cloud-sdk package ansible.builtin.apt: - name: "google-cloud-sdk" + name: google-cloud-sdk update_cache: "yes" register: task_result until: task_result is success @@ -22,7 +22,7 @@ - name: Gcloud | Debian | Install the google-cloud-sdk additional components ansible.builtin.apt: - name: "google-cloud-sdk-{{ item }}" + name: google-cloud-sdk-{{ item }} update_cache: "yes" register: task_result until: task_result is success diff --git a/ansible_collections/google/cloud/roles/gcloud/tasks/package/redhat.yml b/ansible_collections/google/cloud/roles/gcloud/tasks/package/redhat.yml index 50cdac5a1..8917561a2 100644 --- a/ansible_collections/google/cloud/roles/gcloud/tasks/package/redhat.yml +++ b/ansible_collections/google/cloud/roles/gcloud/tasks/package/redhat.yml @@ -4,16 +4,16 @@ name: google-cloud-sdk description: Google Cloud SDK baseurl: https://packages.cloud.google.com/yum/repos/cloud-sdk-el7-x86_64 - enabled: yes - gpgcheck: yes - repo_gpgcheck: yes + enabled: true + gpgcheck: true + repo_gpgcheck: true gpgkey: - https://packages.cloud.google.com/yum/doc/yum-key.gpg - https://packages.cloud.google.com/yum/doc/rpm-package-key.gpg - name: Gcloud | RHEL | Install the google-cloud-sdk package ansible.builtin.yum: - name: "google-cloud-sdk" + name: google-cloud-sdk update_cache: "yes" register: task_result until: task_result is success @@ -22,7 +22,7 @@ - name: Gcloud | Debian | Install the google-cloud-sdk additional components ansible.builtin.yum: - name: "google-cloud-sdk-{{ item }}" + name: google-cloud-sdk-{{ item }} update_cache: "yes" register: task_result until: task_result is success diff --git a/ansible_collections/google/cloud/roles/gcp_http_lb/README.md b/ansible_collections/google/cloud/roles/gcp_http_lb/README.md index 901de6e1a..89cbf69ae 100644 --- a/ansible_collections/google/cloud/roles/gcp_http_lb/README.md +++ b/ansible_collections/google/cloud/roles/gcp_http_lb/README.md @@ -14,8 +14,8 @@ Role Variables ``` gcp_http_lb_backend: the selflink for the backend that this load balancer will be supporting - gcp_project: the name of your gcp project - service_account_file: the path to your service account JSON file + gcp_http_lb_gcp_project: the name of your gcp project + gcp_http_lb_service_account_file: the path to your service account JSON file ``` Example Playbook diff --git a/ansible_collections/google/cloud/roles/gcp_http_lb/defaults/main.yml b/ansible_collections/google/cloud/roles/gcp_http_lb/defaults/main.yml index f705f01df..11f0870b2 100644 --- a/ansible_collections/google/cloud/roles/gcp_http_lb/defaults/main.yml +++ b/ansible_collections/google/cloud/roles/gcp_http_lb/defaults/main.yml @@ -2,13 +2,13 @@ # defaults file for gcp-http-lb gcp_http_lb_state: present gcp_http_lb_cdn: true -gcp_http_lb_name_prefix: 'gcp' +gcp_http_lb_name_prefix: gcp # Name schemes for resources being created -gcp_http_lb_globaladdress: "{{gcp_lb_name_prefix}}-globaladdress" -gcp_http_lb_instancegroup: "{{gcp_lb_name_prefix}}-instancegroup" -gcp_http_lb_healthcheck: "{{gcp_lb_name_prefix}}-healthcheck" -gcp_http_lb_backendservice: "{{gcp_lb_name_prefix}}-backendservice" -gcp_http_lb_urlmap: "{{gcp_lb_name_prefix}}-urlmap" -gcp_http_lb_httpproxy: "{{gcp_lb_name_prefix}}-httpproxy" -gcp_http_lb_forwardingrule: "{{gcp_lb_name_prefix}}-forwardingrule" +gcp_http_lb_globaladdress: "{{ gcp_lb_name_prefix }}-globaladdress" +gcp_http_lb_instancegroup: "{{ gcp_lb_name_prefix }}-instancegroup" +gcp_http_lb_healthcheck: "{{ gcp_lb_name_prefix }}-healthcheck" +gcp_http_lb_backendservice: "{{ gcp_lb_name_prefix }}-backendservice" +gcp_http_lb_urlmap: "{{ gcp_lb_name_prefix }}-urlmap" +gcp_http_lb_httpproxy: "{{ gcp_lb_name_prefix }}-httpproxy" +gcp_http_lb_forwardingrule: "{{ gcp_lb_name_prefix }}-forwardingrule" diff --git a/ansible_collections/google/cloud/roles/gcp_http_lb/meta/main.yml b/ansible_collections/google/cloud/roles/gcp_http_lb/meta/main.yml index 9ee910409..98cccc5cf 100644 --- a/ansible_collections/google/cloud/roles/gcp_http_lb/meta/main.yml +++ b/ansible_collections/google/cloud/roles/gcp_http_lb/meta/main.yml @@ -1,3 +1,4 @@ +--- galaxy_info: author: googlecloudplatform description: Create a HTTP Load Balancer on GCP @@ -16,7 +17,7 @@ galaxy_info: # - CC-BY license: GPLv3 - min_ansible_version: 2.7 + min_ansible_version: "2.7" # If this a Container Enabled role, provide the minimum Ansible Container version. # min_ansible_container_version: @@ -47,12 +48,12 @@ galaxy_info: # - 99.99 galaxy_tags: [] - # List tags for your role here, one per line. A tag is a keyword that describes - # and categorizes the role. Users find roles by searching for tags. Be sure to - # remove the '[]' above, if you add tags to this list. - # - # NOTE: A tag is limited to a single word comprised of alphanumeric characters. - # Maximum 20 tags per role. +# List tags for your role here, one per line. A tag is a keyword that describes +# and categorizes the role. Users find roles by searching for tags. Be sure to +# remove the '[]' above, if you add tags to this list. +# +# NOTE: A tag is limited to a single word comprised of alphanumeric characters. +# Maximum 20 tags per role. dependencies: [] # List your role dependencies here, one per line. Be sure to remove the '[]' above, diff --git a/ansible_collections/google/cloud/roles/gcp_http_lb/tasks/main.yml b/ansible_collections/google/cloud/roles/gcp_http_lb/tasks/main.yml index 8ed8f4d36..67826df41 100644 --- a/ansible_collections/google/cloud/roles/gcp_http_lb/tasks/main.yml +++ b/ansible_collections/google/cloud/roles/gcp_http_lb/tasks/main.yml @@ -1,65 +1,65 @@ --- -- name: create a global address for the load balancer. - gcp_compute_global_address: - name: "{{ gcp_http_lb_globaladdress }}" - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - state: "{{ gcp_http_lb_state }}" +- name: Create a global address for the load balancer. + google.cloud.gcp_compute_global_address: + name: "{{ gcp_http_lb_globaladdress }}" + project: "{{ gcp_http_lb_gcp_project }}" + auth_kind: "{{ gcp_http_lb_auth_kind }}" + service_account_file: "{{ gcp_http_lb_service_account_file }}" + state: "{{ gcp_http_lb_state }}" register: globaladdress -- name: create a http health check to verify lb working - gcp_compute_http_health_check: - name: "{{ gcp_http_lb_healthcheck }}" - healthy_threshold: 10 - port: 80 - timeout_sec: 2 - unhealthy_threshold: 5 - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - state: "{{ gcp_http_lb_state }}" +- name: Create a http health check to verify lb working + google.cloud.gcp_compute_http_health_check: + name: "{{ gcp_http_lb_healthcheck }}" + healthy_threshold: 10 + port: 80 + timeout_sec: 2 + unhealthy_threshold: 5 + project: "{{ gcp_http_lb_gcp_project }}" + auth_kind: "{{ gcp_http_lb_auth_kind }}" + service_account_file: "{{ gcp_http_lb_service_account_file }}" + state: "{{ gcp_http_lb_state }}" register: healthcheck -- name: create a backend service - gcp_compute_backend_service: - name: "{{ gcp_http_lb_backendservice }}" - backends: +- name: Create a backend service + google.cloud.gcp_compute_backend_service: + name: "{{ gcp_http_lb_backendservice }}" + backends: - group: "{{ gcp_http_lb_backend.selfLink }}" - health_checks: + health_checks: - "{{ healthcheck.selfLink }}" - enable_cdn: "{{ gcp_http_lb_cdn }}" - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - state: "{{ gcp_http_lb_state }}" + enable_cdn: "{{ gcp_http_lb_cdn }}" + project: "{{ gcp_http_lb_gcp_project }}" + auth_kind: "{{ gcp_http_lb_auth_kind }}" + service_account_file: "{{ gcp_http_lb_service_account_file }}" + state: "{{ gcp_http_lb_state }}" register: backendservice -- name: create a url map - gcp_compute_url_map: - name: "{{ gcp_http_lb_urlmap }}" - default_service: "{{ backendservice }}" - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - state: "{{ gcp_http_lb_state }}" +- name: Create a url map + google.cloud.gcp_compute_url_map: + name: "{{ gcp_http_lb_urlmap }}" + default_service: "{{ backendservice }}" + project: "{{ gcp_http_lb_gcp_project }}" + auth_kind: "{{ gcp_http_lb_auth_kind }}" + service_account_file: "{{ gcp_http_lb_service_account_file }}" + state: "{{ gcp_http_lb_state }}" register: urlmap -- name: create a target http proxy - gcp_compute_target_http_proxy: - name: "{{ gcp_http_lb_httpproxy }}" - url_map: "{{ urlmap }}" - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - state: "{{ gcp_http_lb_state }}" +- name: Create a target http proxy + google.cloud.gcp_compute_target_http_proxy: + name: "{{ gcp_http_lb_httpproxy }}" + url_map: "{{ urlmap }}" + project: "{{ gcp_http_lb_gcp_project }}" + auth_kind: "{{ gcp_http_lb_auth_kind }}" + service_account_file: "{{ gcp_http_lb_service_account_file }}" + state: "{{ gcp_http_lb_state }}" register: httpproxy -- name: create a global forwarding rule - gcp_compute_global_forwarding_rule: - name: "{{ gcp_http_lb_forwardingrule }}" - ip_address: "{{ globaladdress.address }}" - load_balancing_scheme: "EXTERNAL" - ip_protocol: TCP - port_range: 80-80 - target: "{{ httpproxy.selfLink }}" - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - state: "{{ gcp_http_lb_state }}" +- name: Create a global forwarding rule + google.cloud.gcp_compute_global_forwarding_rule: + name: "{{ gcp_http_lb_forwardingrule }}" + ip_address: "{{ globaladdress.address }}" + load_balancing_scheme: EXTERNAL + ip_protocol: TCP + port_range: 80-80 + target: "{{ httpproxy.selfLink }}" + project: "{{ gcp_http_lb_gcp_project }}" + auth_kind: "{{ gcp_http_lb_auth_kind }}" + service_account_file: "{{ gcp_http_lb_service_account_file }}" + state: "{{ gcp_http_lb_state }}" register: result diff --git a/ansible_collections/google/cloud/roles/gcp_http_lb/tests/test.yml b/ansible_collections/google/cloud/roles/gcp_http_lb/tests/test.yml index 341c7a4ed..6f659ef21 100644 --- a/ansible_collections/google/cloud/roles/gcp_http_lb/tests/test.yml +++ b/ansible_collections/google/cloud/roles/gcp_http_lb/tests/test.yml @@ -1,5 +1,6 @@ --- -- hosts: localhost +- name: Test gcp_http_lb role + hosts: localhost remote_user: root roles: - gcp_http_lb diff --git a/ansible_collections/google/cloud/roles/gcp_http_lb/vars/main.yml b/ansible_collections/google/cloud/roles/gcp_http_lb/vars/main.yml index ca9443f6f..f78469c95 100644 --- a/ansible_collections/google/cloud/roles/gcp_http_lb/vars/main.yml +++ b/ansible_collections/google/cloud/roles/gcp_http_lb/vars/main.yml @@ -1,12 +1,12 @@ --- # vars file for gcp-http-lb -vars: - # The backend this LB will be supporting. This will typically be a Instance Group: - # example: projects/sample-project/zones/us-central1-c/instanceGroups/sample-instance-group - gcp_http_lb_backend: your-backend - # The name of your GCP project - gcp_project: your-project - # The kind of authentication you will use (serviceaccount is recommended) - auth_kind: serviceaccount - # The path to your service account file (if using the serviceaccount auth kind) - service_account_file: path-to-service-account-file + +# The backend this LB will be supporting. This will typically be a Instance Group: +# example: projects/sample-project/zones/us-central1-c/instanceGroups/sample-instance-group +gcp_http_lb_backend: your-backend +# The name of your GCP project +gcp_http_lb_gcp_project: your-project +# The kind of authentication you will use (serviceaccount is recommended) +gcp_http_lb_auth_kind: serviceaccount +# The path to your service account file (if using the serviceaccount auth kind) +gcp_http_lb_service_account_file: path-to-service-account-file diff --git a/ansible_collections/google/cloud/roles/gcsfuse/tasks/debian.yml b/ansible_collections/google/cloud/roles/gcsfuse/tasks/debian.yml index 941f3bd42..be0847f49 100644 --- a/ansible_collections/google/cloud/roles/gcsfuse/tasks/debian.yml +++ b/ansible_collections/google/cloud/roles/gcsfuse/tasks/debian.yml @@ -1,7 +1,7 @@ --- - name: Gcsfuse | Ensure gpg is installed ansible.builtin.apt: - name: "gnupg" + name: gnupg register: task_result until: task_result is success retries: 10 @@ -14,13 +14,13 @@ - name: Gcsfuse | Add the apt repository ansible.builtin.apt_repository: - repo: deb http://packages.cloud.google.com/apt gcsfuse-{{ ansible_distribution_release }} main + repo: deb https://packages.cloud.google.com/apt gcsfuse-{{ ansible_distribution_release }} main state: present filename: gcsfuse - name: Gcsfuse | Install gcsfuse ansible.builtin.apt: - name: "gcsfuse" + name: gcsfuse update_cache: "yes" register: task_result until: task_result is success diff --git a/ansible_collections/google/cloud/scripts/bootstrap-project.sh b/ansible_collections/google/cloud/scripts/bootstrap-project.sh index 8dd2b2d00..a28f42c79 100755 --- a/ansible_collections/google/cloud/scripts/bootstrap-project.sh +++ b/ansible_collections/google/cloud/scripts/bootstrap-project.sh @@ -40,12 +40,15 @@ for SERVICE in "${SERVICE_LIST[@]}"; do gcloud services enable "$SERVICE" --project="$PROJECT_ID" done -for ROLE in "${REQUIRED_ROLE_LIST[@]}"; do - echo "enabling role $ROLE..." - gcloud projects add-iam-policy-binding "$PROJECT_ID" \ - --member="serviceAccount:$SERVICE_ACCOUNT_NAME" \ - --role="$ROLE" -done +if [ -n "$SERVICE_ACCOUNT_NAME" ] +then + for ROLE in "${REQUIRED_ROLE_LIST[@]}"; do + echo "enabling role $ROLE..." + gcloud projects add-iam-policy-binding "$PROJECT_ID" \ + --member="serviceAccount:$SERVICE_ACCOUNT_NAME" \ + --role="$ROLE" + done +fi if ! gcloud app describe --project="$PROJECT_ID" > /dev/null; then echo "creating appengine project..." diff --git a/ansible_collections/google/cloud/scripts/cleanup-project.sh b/ansible_collections/google/cloud/scripts/cleanup-project.sh index 4dd4ddb0a..b05a2f15f 100755 --- a/ansible_collections/google/cloud/scripts/cleanup-project.sh +++ b/ansible_collections/google/cloud/scripts/cleanup-project.sh @@ -40,8 +40,21 @@ cleanup_resource() { extra_list_arg="$3" extra_delete_arg="$4" - for resource_id in $(gcloud "${resource_group}" "${resource}" list --project="${PROJECT_ID}" --format="csv[no-heading](name)" "${extra_list_arg}"); do - gcloud "${resource_group}" "${resource}" delete "${resource_id}" --project="${PROJECT_ID}" -q "${extra_delete_arg}" + if [ -z "$extra_list_arg" ] + then + mapfile -t resources < <(gcloud "${resource_group}" "${resource}" list --project="${PROJECT_ID}" --format="csv[no-heading](name)") + else + mapfile -t resources < <(gcloud "${resource_group}" "${resource}" list --project="${PROJECT_ID}" --format="csv[no-heading](name)" "${extra_list_arg}") + fi + + for resource_id in "${resources[@]}" + do + if [ -z "$extra_delete_arg" ] + then + gcloud "${resource_group}" "${resource}" delete "${resource_id}" --project="${PROJECT_ID}" -q + else + gcloud "${resource_group}" "${resource}" delete "${resource_id}" --project="${PROJECT_ID}" -q "${extra_delete_arg}" + fi done } diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_appengine_firewall_rule/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_appengine_firewall_rule/tasks/autogen.yml index 4441d531c..a38d9a7f2 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_appengine_firewall_rule/tasks/autogen.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_appengine_firewall_rule/tasks/autogen.yml @@ -13,98 +13,98 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: delete a firewall rule +- name: Delete a firewall rule google.cloud.gcp_appengine_firewall_rule: priority: 1000 source_range: 10.0.0.0 action: ALLOW project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a firewall rule +- name: Create a firewall rule google.cloud.gcp_appengine_firewall_rule: priority: 1000 source_range: 10.0.0.0 action: ALLOW project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that firewall_rule was created +- name: Verify that firewall_rule was created google.cloud.gcp_appengine_firewall_rule_info: - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/cloud-platform + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/cloud-platform register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length >= 1 # ---------------------------------------------------------------------------- -- name: create a firewall rule that already exists +- name: Create a firewall rule that already exists google.cloud.gcp_appengine_firewall_rule: priority: 1000 source_range: 10.0.0.0 action: ALLOW project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a firewall rule +- name: Delete a firewall rule google.cloud.gcp_appengine_firewall_rule: priority: 1000 source_range: 10.0.0.0 action: ALLOW project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that firewall_rule was deleted +- name: Verify that firewall_rule was deleted google.cloud.gcp_appengine_firewall_rule_info: - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/cloud-platform + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/cloud-platform register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: # there is a default firewall rule that cannot be # deleted, so the length should be 1. - results['resources'] | length == 1 # ---------------------------------------------------------------------------- -- name: delete a firewall rule that does not exist +- name: Delete a firewall rule that does not exist google.cloud.gcp_appengine_firewall_rule: priority: 1000 source_range: 10.0.0.0 action: ALLOW project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_appengine_firewall_rule/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_appengine_firewall_rule/tasks/main.yml index 45d6e4917..fe47378c2 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_appengine_firewall_rule/tasks/main.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_appengine_firewall_rule/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_bigquery_dataset/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_bigquery_dataset/tasks/autogen.yml index 1f97074d9..71484a34d 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_bigquery_dataset/tasks/autogen.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_bigquery_dataset/tasks/autogen.yml @@ -13,96 +13,96 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: delete a dataset +- name: Delete a dataset google.cloud.gcp_bigquery_dataset: name: my_example_dataset dataset_reference: dataset_id: my_example_dataset project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a dataset +- name: Create a dataset google.cloud.gcp_bigquery_dataset: name: my_example_dataset dataset_reference: dataset_id: my_example_dataset project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that dataset was created +- name: Verify that dataset was created google.cloud.gcp_bigquery_dataset_info: - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/bigquery + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/bigquery register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | map(attribute='datasetReference') | map(attribute='datasetId') | select("match", ".*my_example_dataset.*") | list | length == 1 # ---------------------------------------------------------------------------- -- name: create a dataset that already exists +- name: Create a dataset that already exists google.cloud.gcp_bigquery_dataset: name: my_example_dataset dataset_reference: dataset_id: my_example_dataset project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a dataset +- name: Delete a dataset google.cloud.gcp_bigquery_dataset: name: my_example_dataset dataset_reference: dataset_id: my_example_dataset project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that dataset was deleted +- name: Verify that dataset was deleted google.cloud.gcp_bigquery_dataset_info: - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/bigquery + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/bigquery register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | map(attribute='datasetReference') | map(attribute='datasetId') | select("match", ".*my_example_dataset.*") | list | length == 0 # ---------------------------------------------------------------------------- -- name: delete a dataset that does not exist +- name: Delete a dataset that does not exist google.cloud.gcp_bigquery_dataset: name: my_example_dataset dataset_reference: dataset_id: my_example_dataset project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_bigquery_dataset/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_bigquery_dataset/tasks/main.yml index 45d6e4917..fe47378c2 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_bigquery_dataset/tasks/main.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_bigquery_dataset/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_bigquery_table/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_bigquery_table/tasks/autogen.yml index b795dbe9e..1e42d655d 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_bigquery_table/tasks/autogen.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_bigquery_table/tasks/autogen.yml @@ -13,17 +13,17 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: create a dataset +- name: Create a dataset google.cloud.gcp_bigquery_dataset: name: example_dataset dataset_reference: dataset_id: example_dataset project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: dataset -- name: delete a table +- name: Delete a table google.cloud.gcp_bigquery_table: name: example_table dataset: example_dataset @@ -33,10 +33,10 @@ table_id: example_table project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a table +- name: Create a table google.cloud.gcp_bigquery_table: name: example_table dataset: example_dataset @@ -46,28 +46,28 @@ table_id: example_table project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that table was created +- name: Verify that table was created google.cloud.gcp_bigquery_table_info: - dataset: example_dataset - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/bigquery + dataset: example_dataset + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/bigquery register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | map(attribute='tableReference') | map(attribute='tableId') | select("match", ".*example_table.*") | list | length == 1 # ---------------------------------------------------------------------------- -- name: create a table that already exists +- name: Create a table that already exists google.cloud.gcp_bigquery_table: name: example_table dataset: example_dataset @@ -77,15 +77,15 @@ table_id: example_table project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a table +- name: Delete a table google.cloud.gcp_bigquery_table: name: example_table dataset: example_dataset @@ -95,28 +95,28 @@ table_id: example_table project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that table was deleted +- name: Verify that table was deleted google.cloud.gcp_bigquery_table_info: - dataset: example_dataset - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/bigquery + dataset: example_dataset + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/bigquery register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | map(attribute='tableReference') | map(attribute='tableId') | select("match", ".*example_table.*") | list | length == 0 # ---------------------------------------------------------------------------- -- name: delete a table that does not exist +- name: Delete a table that does not exist google.cloud.gcp_bigquery_table: name: example_table dataset: example_dataset @@ -126,24 +126,24 @@ table_id: example_table project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #--------------------------------------------------------- # Post-test teardown # If errors happen, don't crash the playbook! -- name: delete a dataset +- name: Delete a dataset google.cloud.gcp_bigquery_dataset: name: example_dataset dataset_reference: dataset_id: example_dataset project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: dataset ignore_errors: true diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_bigquery_table/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_bigquery_table/tasks/main.yml index 45d6e4917..fe47378c2 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_bigquery_table/tasks/main.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_bigquery_table/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_bigtable_instance/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_bigtable_instance/tasks/autogen.yml index 23dccf596..7406950d1 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_bigtable_instance/tasks/autogen.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_bigtable_instance/tasks/autogen.yml @@ -13,107 +13,107 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: delete a instance +- name: Delete a instance google.cloud.gcp_bigtable_instance: name: my-instance display_name: My Test Cluster clusters: - - name: mycluster - location: projects/{{ gcp_project }}/locations/us-central1-a - serve_nodes: 1 + - name: mycluster + location: projects/{{ gcp_project }}/locations/us-central1-a + serve_nodes: 1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a instance +- name: Create a instance google.cloud.gcp_bigtable_instance: name: my-instance display_name: My Test Cluster clusters: - - name: mycluster - location: projects/{{ gcp_project }}/locations/us-central1-a - serve_nodes: 1 + - name: mycluster + location: projects/{{ gcp_project }}/locations/us-central1-a + serve_nodes: 1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that instance was created +- name: Verify that instance was created google.cloud.gcp_bigtable_instance_info: - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | map(attribute='name') | select("match", ".*my-instance.*") | list | length == 1 # ---------------------------------------------------------------------------- -- name: create a instance that already exists +- name: Create a instance that already exists google.cloud.gcp_bigtable_instance: name: my-instance display_name: My Test Cluster clusters: - - name: mycluster - location: projects/{{ gcp_project }}/locations/us-central1-a - serve_nodes: 1 + - name: mycluster + location: projects/{{ gcp_project }}/locations/us-central1-a + serve_nodes: 1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a instance +- name: Delete a instance google.cloud.gcp_bigtable_instance: name: my-instance display_name: My Test Cluster clusters: - - name: mycluster - location: projects/{{ gcp_project }}/locations/us-central1-a - serve_nodes: 1 + - name: mycluster + location: projects/{{ gcp_project }}/locations/us-central1-a + serve_nodes: 1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that instance was deleted +- name: Verify that instance was deleted google.cloud.gcp_bigtable_instance_info: - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | map(attribute='name') | select("match", ".*my-instance.*") | list | length == 0 # ---------------------------------------------------------------------------- -- name: delete a instance that does not exist +- name: Delete a instance that does not exist google.cloud.gcp_bigtable_instance: name: my-instance display_name: My Test Cluster clusters: - - name: mycluster - location: projects/{{ gcp_project }}/locations/us-central1-a - serve_nodes: 1 + - name: mycluster + location: projects/{{ gcp_project }}/locations/us-central1-a + serve_nodes: 1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_bigtable_instance/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_bigtable_instance/tasks/main.yml index 45d6e4917..fe47378c2 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_bigtable_instance/tasks/main.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_bigtable_instance/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_cloudbuild_trigger/defaults/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_cloudbuild_trigger/defaults/main.yml index aa87a2a8e..aa65c31f5 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_cloudbuild_trigger/defaults/main.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_cloudbuild_trigger/defaults/main.yml @@ -1,3 +1,3 @@ --- # defaults file -resource_name: '{{resource_prefix}}' +resource_name: "{{ resource_prefix }}" diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_cloudfunctions_cloud_function/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_cloudfunctions_cloud_function/tasks/autogen.yml index 530ac7098..da43b2154 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_cloudfunctions_cloud_function/tasks/autogen.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_cloudfunctions_cloud_function/tasks/autogen.yml @@ -13,113 +13,113 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: delete a cloud function +- name: Delete a cloud function google.cloud.gcp_cloudfunctions_cloud_function: name: "{{ resource_name }}" location: us-central1 entry_point: helloGET source_archive_url: gs://{{ gcp_project }}-ansible-testing/cloud-function.zip - trigger_http: 'true' + trigger_http: "true" project: "{{ gcp_project }}" - runtime: "python310" + runtime: python310 auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a cloud function +- name: Create a cloud function google.cloud.gcp_cloudfunctions_cloud_function: name: "{{ resource_name }}" location: us-central1 entry_point: helloGET source_archive_url: gs://{{ gcp_project }}-ansible-testing/cloud-function.zip - trigger_http: 'true' + trigger_http: "true" project: "{{ gcp_project }}" - runtime: "python310" + runtime: python310 auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that cloud_function was created +- name: Verify that cloud_function was created google.cloud.gcp_cloudfunctions_cloud_function_info: - location: us-central1 - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/cloud-platform + location: us-central1 + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/cloud-platform register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | map(attribute='name') | select("match", ".*{{ resource_name }}.*") | list | length == 1 # ---------------------------------------------------------------------------- -- name: create a cloud function that already exists +- name: Create a cloud function that already exists google.cloud.gcp_cloudfunctions_cloud_function: name: "{{ resource_name }}" location: us-central1 entry_point: helloGET source_archive_url: gs://{{ gcp_project }}-ansible-testing/cloud-function.zip - trigger_http: 'true' + trigger_http: "true" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" # runtime is not sent as it is optional for # existing functions. # runtime: "python310" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a cloud function +- name: Delete a cloud function google.cloud.gcp_cloudfunctions_cloud_function: name: "{{ resource_name }}" location: us-central1 entry_point: helloGET source_archive_url: gs://{{ gcp_project }}-ansible-testing/cloud-function.zip - trigger_http: 'true' + trigger_http: "true" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that cloud_function was deleted +- name: Verify that cloud_function was deleted google.cloud.gcp_cloudfunctions_cloud_function_info: - location: us-central1 - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/cloud-platform + location: us-central1 + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/cloud-platform register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | map(attribute='name') | select("match", ".*{{ resource_name }}.*") | list | length == 0 # ---------------------------------------------------------------------------- -- name: delete a cloud function that does not exist +- name: Delete a cloud function that does not exist google.cloud.gcp_cloudfunctions_cloud_function: name: "{{ resource_name }}" location: us-central1 entry_point: helloGET source_archive_url: gs://{{ gcp_project }}-ansible-testing/cloud-function.zip - trigger_http: 'true' + trigger_http: "true" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_cloudfunctions_cloud_function/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_cloudfunctions_cloud_function/tasks/main.yml index 45d6e4917..fe47378c2 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_cloudfunctions_cloud_function/tasks/main.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_cloudfunctions_cloud_function/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_cloudscheduler_job/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_cloudscheduler_job/tasks/autogen.yml index 3a1884c2d..917e323a0 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_cloudscheduler_job/tasks/autogen.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_cloudscheduler_job/tasks/autogen.yml @@ -13,7 +13,7 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: delete a job +- name: Delete a job google.cloud.gcp_cloudscheduler_job: name: job region: us-central1 @@ -27,13 +27,13 @@ service: web version: prod instance: my-instance-001 - relative_uri: "/ping" + relative_uri: /ping project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a job +- name: Create a job google.cloud.gcp_cloudscheduler_job: name: job region: us-central1 @@ -47,31 +47,31 @@ service: web version: prod instance: my-instance-001 - relative_uri: "/ping" + relative_uri: /ping project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that job was created +- name: Verify that job was created google.cloud.gcp_cloudscheduler_job_info: - region: us-central1 - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/cloud-platform + region: us-central1 + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/cloud-platform register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | map(attribute='name') | select("match", ".*job.*") | list | length == 1 # ---------------------------------------------------------------------------- -- name: create a job that already exists +- name: Create a job that already exists google.cloud.gcp_cloudscheduler_job: name: job region: us-central1 @@ -85,18 +85,18 @@ service: web version: prod instance: my-instance-001 - relative_uri: "/ping" + relative_uri: /ping project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a job +- name: Delete a job google.cloud.gcp_cloudscheduler_job: name: job region: us-central1 @@ -110,31 +110,31 @@ service: web version: prod instance: my-instance-001 - relative_uri: "/ping" + relative_uri: /ping project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that job was deleted +- name: Verify that job was deleted google.cloud.gcp_cloudscheduler_job_info: - region: us-central1 - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/cloud-platform + region: us-central1 + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/cloud-platform register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | map(attribute='name') | select("match", ".*job.*") | list | length == 0 # ---------------------------------------------------------------------------- -- name: delete a job that does not exist +- name: Delete a job that does not exist google.cloud.gcp_cloudscheduler_job: name: job region: us-central1 @@ -148,13 +148,13 @@ service: web version: prod instance: my-instance-001 - relative_uri: "/ping" + relative_uri: /ping project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_cloudscheduler_job/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_cloudscheduler_job/tasks/main.yml index 45d6e4917..fe47378c2 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_cloudscheduler_job/tasks/main.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_cloudscheduler_job/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_cloudtasks_queue/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_cloudtasks_queue/tasks/autogen.yml index c0f0e602c..6e1f70f22 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_cloudtasks_queue/tasks/autogen.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_cloudtasks_queue/tasks/autogen.yml @@ -13,93 +13,93 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: delete a queue +- name: Delete a queue google.cloud.gcp_cloudtasks_queue: name: "{{ resource_name }}" location: us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a queue +- name: Create a queue google.cloud.gcp_cloudtasks_queue: name: "{{ resource_name }}" location: us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that queue was created +- name: Verify that queue was created google.cloud.gcp_cloudtasks_queue_info: - location: us-central1 - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/cloud-platform + location: us-central1 + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/cloud-platform register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | map(attribute='name') | select("match", ".*{{ resource_name }}.*") | list | length == 1 # ---------------------------------------------------------------------------- -- name: create a queue that already exists +- name: Create a queue that already exists google.cloud.gcp_cloudtasks_queue: name: "{{ resource_name }}" location: us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a queue +- name: Delete a queue google.cloud.gcp_cloudtasks_queue: name: "{{ resource_name }}" location: us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that queue was deleted +- name: Verify that queue was deleted google.cloud.gcp_cloudtasks_queue_info: - location: us-central1 - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/cloud-platform + location: us-central1 + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/cloud-platform register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | map(attribute='name') | select("match", ".*{{ resource_name }}.*") | list | length == 0 # ---------------------------------------------------------------------------- -- name: delete a queue that does not exist +- name: Delete a queue that does not exist google.cloud.gcp_cloudtasks_queue: name: "{{ resource_name }}" location: us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_cloudtasks_queue/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_cloudtasks_queue/tasks/main.yml index 45d6e4917..fe47378c2 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_cloudtasks_queue/tasks/main.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_cloudtasks_queue/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_address/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_address/tasks/autogen.yml index 7a12e69e8..b4e9634dd 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_address/tasks/autogen.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_address/tasks/autogen.yml @@ -13,97 +13,97 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: delete a address +- name: Delete a address google.cloud.gcp_compute_address: name: test-address1 region: us-west1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a address +- name: Create a address google.cloud.gcp_compute_address: name: test-address1 region: us-west1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that address was created +- name: Verify that address was created google.cloud.gcp_compute_address_info: - filters: - - name = test-address1 - region: us-west1 - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = test-address1 + region: us-west1 + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 1 # ---------------------------------------------------------------------------- -- name: create a address that already exists +- name: Create a address that already exists google.cloud.gcp_compute_address: name: test-address1 region: us-west1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a address +- name: Delete a address google.cloud.gcp_compute_address: name: test-address1 region: us-west1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that address was deleted +- name: Verify that address was deleted google.cloud.gcp_compute_address_info: - filters: - - name = test-address1 - region: us-west1 - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = test-address1 + region: us-west1 + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 0 # ---------------------------------------------------------------------------- -- name: delete a address that does not exist +- name: Delete a address that does not exist google.cloud.gcp_compute_address: name: test-address1 region: us-west1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_address/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_address/tasks/main.yml index 45d6e4917..fe47378c2 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_address/tasks/main.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_address/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_autoscaler/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_autoscaler/tasks/autogen.yml index 5182fa982..4e1ad7687 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_autoscaler/tasks/autogen.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_autoscaler/tasks/autogen.yml @@ -13,46 +13,46 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: create a network +- name: Create a network google.cloud.gcp_compute_network: name: network-instancetemplate project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" auto_create_subnetworks: true state: present register: network -- name: create a address +- name: Create a address google.cloud.gcp_compute_address: name: address-instancetemplate region: us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: address -- name: create a instance template +- name: Create a instance template google.cloud.gcp_compute_instance_template: name: "{{ resource_name }}" properties: disks: - - auto_delete: 'true' - boot: 'true' - initialize_params: - source_image: projects/ubuntu-os-cloud/global/images/family/ubuntu-minimal-2204-lts + - auto_delete: "true" + boot: "true" + initialize_params: + source_image: projects/ubuntu-os-cloud/global/images/family/ubuntu-minimal-2204-lts machine_type: n1-standard-1 network_interfaces: - - network: "{{ network }}" - access_configs: - - name: test-config - type: ONE_TO_ONE_NAT - nat_ip: "{{ address }}" + - network: "{{ network }}" + access_configs: + - name: test-config + type: ONE_TO_ONE_NAT + nat_ip: "{{ address }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: instancetemplate -- name: create a instance group manager +- name: Create a instance group manager google.cloud.gcp_compute_instance_group_manager: name: "{{ resource_name }}" base_instance_name: test1-child @@ -61,10 +61,10 @@ zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: igm -- name: delete a autoscaler +- name: Delete a autoscaler google.cloud.gcp_compute_autoscaler: name: "{{ resource_name }}" zone: us-central1-a @@ -74,13 +74,13 @@ min_num_replicas: 1 cool_down_period_sec: 60 cpu_utilization: - utilization_target: 0.5 + utilization_target: !!float "0.5" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a autoscaler +- name: Create a autoscaler google.cloud.gcp_compute_autoscaler: name: "{{ resource_name }}" zone: us-central1-a @@ -90,33 +90,33 @@ min_num_replicas: 1 cool_down_period_sec: 60 cpu_utilization: - utilization_target: 0.5 + utilization_target: !!float "0.5" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that autoscaler was created +- name: Verify that autoscaler was created google.cloud.gcp_compute_autoscaler_info: - filters: - - name = {{ resource_name }} - zone: us-central1-a - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + zone: us-central1-a + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 1 # ---------------------------------------------------------------------------- -- name: create a autoscaler that already exists +- name: Create a autoscaler that already exists google.cloud.gcp_compute_autoscaler: name: "{{ resource_name }}" zone: us-central1-a @@ -126,18 +126,18 @@ min_num_replicas: 1 cool_down_period_sec: 60 cpu_utilization: - utilization_target: 0.5 + utilization_target: !!float "0.5" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a autoscaler +- name: Delete a autoscaler google.cloud.gcp_compute_autoscaler: name: "{{ resource_name }}" zone: us-central1-a @@ -147,33 +147,33 @@ min_num_replicas: 1 cool_down_period_sec: 60 cpu_utilization: - utilization_target: 0.5 + utilization_target: !!float "0.5" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that autoscaler was deleted +- name: Verify that autoscaler was deleted google.cloud.gcp_compute_autoscaler_info: - filters: - - name = {{ resource_name }} - zone: us-central1-a - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + zone: us-central1-a + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 0 # ---------------------------------------------------------------------------- -- name: delete a autoscaler that does not exist +- name: Delete a autoscaler that does not exist google.cloud.gcp_compute_autoscaler: name: "{{ resource_name }}" zone: us-central1-a @@ -183,20 +183,20 @@ min_num_replicas: 1 cool_down_period_sec: 60 cpu_utilization: - utilization_target: 0.5 + utilization_target: !!float "0.5" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #--------------------------------------------------------- # Post-test teardown # If errors happen, don't crash the playbook! -- name: delete a instance group manager +- name: Delete a instance group manager google.cloud.gcp_compute_instance_group_manager: name: "{{ resource_name }}" base_instance_name: test1-child @@ -205,48 +205,48 @@ zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: igm ignore_errors: true -- name: delete a instance template +- name: Delete a instance template google.cloud.gcp_compute_instance_template: name: "{{ resource_name }}" properties: disks: - - auto_delete: 'true' - boot: 'true' - initialize_params: - source_image: projects/ubuntu-os-cloud/global/images/family/ubuntu-minimal-2204-lts + - auto_delete: "true" + boot: "true" + initialize_params: + source_image: projects/ubuntu-os-cloud/global/images/family/ubuntu-minimal-2204-lts machine_type: n1-standard-1 network_interfaces: - - network: "{{ network }}" - access_configs: - - name: test-config - type: ONE_TO_ONE_NAT - nat_ip: "{{ address }}" + - network: "{{ network }}" + access_configs: + - name: test-config + type: ONE_TO_ONE_NAT + nat_ip: "{{ address }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: instancetemplate ignore_errors: true -- name: delete a address +- name: Delete a address google.cloud.gcp_compute_address: name: address-instancetemplate region: us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: address ignore_errors: true -- name: delete a network +- name: Delete a network google.cloud.gcp_compute_network: name: network-instancetemplate project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" auto_create_subnetworks: true state: absent register: network diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_autoscaler/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_autoscaler/tasks/main.yml index 45d6e4917..fe47378c2 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_autoscaler/tasks/main.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_autoscaler/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_backend_bucket/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_backend_bucket/tasks/autogen.yml index 48f2ee1b3..c54b02276 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_backend_bucket/tasks/autogen.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_backend_bucket/tasks/autogen.yml @@ -13,125 +13,125 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: create a bucket +- name: Create a bucket google.cloud.gcp_storage_bucket: name: bucket-backendbucket project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: bucket -- name: delete a backend bucket +- name: Delete a backend bucket google.cloud.gcp_compute_backend_bucket: name: "{{ resource_name }}" bucket_name: "{{ bucket.name }}" description: A BackendBucket to connect LNB w/ Storage Bucket - enable_cdn: 'true' + enable_cdn: "true" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a backend bucket +- name: Create a backend bucket google.cloud.gcp_compute_backend_bucket: name: "{{ resource_name }}" bucket_name: "{{ bucket.name }}" description: A BackendBucket to connect LNB w/ Storage Bucket - enable_cdn: 'true' + enable_cdn: "true" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that backend_bucket was created +- name: Verify that backend_bucket was created google.cloud.gcp_compute_backend_bucket_info: - filters: - - name = {{ resource_name }} - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 1 # ---------------------------------------------------------------------------- -- name: create a backend bucket that already exists +- name: Create a backend bucket that already exists google.cloud.gcp_compute_backend_bucket: name: "{{ resource_name }}" bucket_name: "{{ bucket.name }}" description: A BackendBucket to connect LNB w/ Storage Bucket - enable_cdn: 'true' + enable_cdn: "true" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a backend bucket +- name: Delete a backend bucket google.cloud.gcp_compute_backend_bucket: name: "{{ resource_name }}" bucket_name: "{{ bucket.name }}" description: A BackendBucket to connect LNB w/ Storage Bucket - enable_cdn: 'true' + enable_cdn: "true" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that backend_bucket was deleted +- name: Verify that backend_bucket was deleted google.cloud.gcp_compute_backend_bucket_info: - filters: - - name = {{ resource_name }} - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 0 # ---------------------------------------------------------------------------- -- name: delete a backend bucket that does not exist +- name: Delete a backend bucket that does not exist google.cloud.gcp_compute_backend_bucket: name: "{{ resource_name }}" bucket_name: "{{ bucket.name }}" description: A BackendBucket to connect LNB w/ Storage Bucket - enable_cdn: 'true' + enable_cdn: "true" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #--------------------------------------------------------- # Post-test teardown # If errors happen, don't crash the playbook! -- name: delete a bucket +- name: Delete a bucket google.cloud.gcp_storage_bucket: name: bucket-backendbucket project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: bucket ignore_errors: true diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_backend_bucket/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_backend_bucket/tasks/main.yml index 45d6e4917..fe47378c2 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_backend_bucket/tasks/main.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_backend_bucket/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_backend_service/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_backend_service/tasks/autogen.yml index fbe4b69a3..011a5d4cf 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_backend_service/tasks/autogen.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_backend_service/tasks/autogen.yml @@ -13,16 +13,16 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: create a instance group +- name: Create a instance group google.cloud.gcp_compute_instance_group: name: instancegroup-backendservice zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: instancegroup -- name: create a HTTP health check +- name: Create a HTTP health check google.cloud.gcp_compute_http_health_check: name: httphealthcheck-backendservice healthy_threshold: 10 @@ -31,125 +31,125 @@ unhealthy_threshold: 5 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: healthcheck -- name: delete a backend service +- name: Delete a backend service google.cloud.gcp_compute_backend_service: name: "{{ resource_name }}" backends: - - group: "{{ instancegroup.selfLink }}" + - group: "{{ instancegroup.selfLink }}" health_checks: - - "{{ healthcheck.selfLink }}" - enable_cdn: 'true' + - "{{ healthcheck.selfLink }}" + enable_cdn: "true" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a backend service +- name: Create a backend service google.cloud.gcp_compute_backend_service: name: "{{ resource_name }}" backends: - - group: "{{ instancegroup.selfLink }}" + - group: "{{ instancegroup.selfLink }}" health_checks: - - "{{ healthcheck.selfLink }}" - enable_cdn: 'true' + - "{{ healthcheck.selfLink }}" + enable_cdn: "true" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that backend_service was created +- name: Verify that backend_service was created google.cloud.gcp_compute_backend_service_info: - filters: - - name = {{ resource_name }} - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 1 # ---------------------------------------------------------------------------- -- name: create a backend service that already exists +- name: Create a backend service that already exists google.cloud.gcp_compute_backend_service: name: "{{ resource_name }}" backends: - - group: "{{ instancegroup.selfLink }}" + - group: "{{ instancegroup.selfLink }}" health_checks: - - "{{ healthcheck.selfLink }}" - enable_cdn: 'true' + - "{{ healthcheck.selfLink }}" + enable_cdn: "true" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a backend service +- name: Delete a backend service google.cloud.gcp_compute_backend_service: name: "{{ resource_name }}" backends: - - group: "{{ instancegroup.selfLink }}" + - group: "{{ instancegroup.selfLink }}" health_checks: - - "{{ healthcheck.selfLink }}" - enable_cdn: 'true' + - "{{ healthcheck.selfLink }}" + enable_cdn: "true" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that backend_service was deleted +- name: Verify that backend_service was deleted google.cloud.gcp_compute_backend_service_info: - filters: - - name = {{ resource_name }} - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 0 # ---------------------------------------------------------------------------- -- name: delete a backend service that does not exist +- name: Delete a backend service that does not exist google.cloud.gcp_compute_backend_service: name: "{{ resource_name }}" backends: - - group: "{{ instancegroup.selfLink }}" + - group: "{{ instancegroup.selfLink }}" health_checks: - - "{{ healthcheck.selfLink }}" - enable_cdn: 'true' + - "{{ healthcheck.selfLink }}" + enable_cdn: "true" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #--------------------------------------------------------- # Post-test teardown # If errors happen, don't crash the playbook! -- name: delete a HTTP health check +- name: Delete a HTTP health check google.cloud.gcp_compute_http_health_check: name: httphealthcheck-backendservice healthy_threshold: 10 @@ -158,17 +158,17 @@ unhealthy_threshold: 5 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: healthcheck ignore_errors: true -- name: delete a instance group +- name: Delete a instance group google.cloud.gcp_compute_instance_group: name: instancegroup-backendservice zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: instancegroup ignore_errors: true diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_backend_service/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_backend_service/tasks/main.yml index 45d6e4917..fe47378c2 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_backend_service/tasks/main.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_backend_service/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_disk/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_disk/tasks/autogen.yml index 5f81dd0d5..963797247 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_disk/tasks/autogen.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_disk/tasks/autogen.yml @@ -13,7 +13,7 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: delete a disk +- name: Delete a disk google.cloud.gcp_compute_disk: name: "{{ resource_name }}" size_gb: 50 @@ -22,10 +22,10 @@ zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a disk +- name: Create a disk google.cloud.gcp_compute_disk: name: "{{ resource_name }}" size_gb: 50 @@ -34,30 +34,30 @@ zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that disk was created +- name: Verify that disk was created google.cloud.gcp_compute_disk_info: - filters: - - name = {{ resource_name }} - zone: us-central1-a - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + zone: us-central1-a + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 1 # ---------------------------------------------------------------------------- -- name: create a disk that already exists +- name: Create a disk that already exists google.cloud.gcp_compute_disk: name: "{{ resource_name }}" size_gb: 50 @@ -66,15 +66,15 @@ zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a disk +- name: Delete a disk google.cloud.gcp_compute_disk: name: "{{ resource_name }}" size_gb: 50 @@ -83,30 +83,30 @@ zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that disk was deleted +- name: Verify that disk was deleted google.cloud.gcp_compute_disk_info: - filters: - - name = {{ resource_name }} - zone: us-central1-a - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + zone: us-central1-a + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 0 # ---------------------------------------------------------------------------- -- name: delete a disk that does not exist +- name: Delete a disk that does not exist google.cloud.gcp_compute_disk: name: "{{ resource_name }}" size_gb: 50 @@ -115,10 +115,10 @@ zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_disk/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_disk/tasks/main.yml index 45d6e4917..fe47378c2 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_disk/tasks/main.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_disk/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_external_vpn_gateway/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_external_vpn_gateway/tasks/autogen.yml index a2cd62321..f6fd6da77 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_external_vpn_gateway/tasks/autogen.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_external_vpn_gateway/tasks/autogen.yml @@ -13,115 +13,115 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: delete a external vpn gateway +- name: Delete a external vpn gateway google.cloud.gcp_compute_external_vpn_gateway: name: "{{ resource_name }}" redundancy_type: SINGLE_IP_INTERNALLY_REDUNDANT description: An externaly managed VPN gateway interfaces: - - id: 0 - ip_address: 8.8.8.8 + - id: 0 + ip_address: 8.8.8.8 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a external vpn gateway +- name: Create a external vpn gateway google.cloud.gcp_compute_external_vpn_gateway: name: "{{ resource_name }}" redundancy_type: SINGLE_IP_INTERNALLY_REDUNDANT description: An externalyl managed VPN gateway interfaces: - - id: 0 - ip_address: 8.8.8.8 + - id: 0 + ip_address: 8.8.8.8 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that external_vpn_gateway was created +- name: Verify that external_vpn_gateway was created google.cloud.gcp_compute_external_vpn_gateway_info: - filters: - - name = {{ resource_name }} - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 1 # ---------------------------------------------------------------------------- -- name: create a external vpn gateway that already exists +- name: Create a external vpn gateway that already exists google.cloud.gcp_compute_external_vpn_gateway: name: "{{ resource_name }}" redundancy_type: SINGLE_IP_INTERNALLY_REDUNDANT description: An externalyl managed VPN gateway interfaces: - - id: 0 - ip_address: 8.8.8.8 + - id: 0 + ip_address: 8.8.8.8 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a external vpn gateway +- name: Delete a external vpn gateway google.cloud.gcp_compute_external_vpn_gateway: name: "{{ resource_name }}" redundancy_type: SINGLE_IP_INTERNALLY_REDUNDANT description: An externalyl managed VPN gateway interfaces: - - id: 0 - ip_address: 8.8.8.8 + - id: 0 + ip_address: 8.8.8.8 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that external_vpn_gateway was deleted +- name: Verify that external_vpn_gateway was deleted google.cloud.gcp_compute_external_vpn_gateway_info: - filters: - - name = {{ resource_name }} - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 0 # ---------------------------------------------------------------------------- -- name: delete a external vpn gateway that does not exist +- name: Delete a external vpn gateway that does not exist google.cloud.gcp_compute_external_vpn_gateway: name: "{{ resource_name }}" redundancy_type: SINGLE_IP_INTERNALLY_REDUNDANT description: An externalyl managed VPN gateway interfaces: - - id: 0 - ip_address: 8.8.8.8 + - id: 0 + ip_address: 8.8.8.8 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_external_vpn_gateway/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_external_vpn_gateway/tasks/main.yml index 45d6e4917..fe47378c2 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_external_vpn_gateway/tasks/main.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_external_vpn_gateway/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_firewall/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_firewall/tasks/autogen.yml index 42d0f124e..bf51839d3 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_firewall/tasks/autogen.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_firewall/tasks/autogen.yml @@ -13,135 +13,135 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: delete a firewall +- name: Delete a firewall google.cloud.gcp_compute_firewall: name: "{{ resource_name }}" allowed: - - ip_protocol: tcp - ports: - - '22' + - ip_protocol: tcp + ports: + - "22" target_tags: - - test-ssh-server - - staging-ssh-server + - test-ssh-server + - staging-ssh-server source_tags: - - test-ssh-clients + - test-ssh-clients project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a firewall +- name: Create a firewall google.cloud.gcp_compute_firewall: name: "{{ resource_name }}" allowed: - - ip_protocol: tcp - ports: - - '22' + - ip_protocol: tcp + ports: + - "22" target_tags: - - test-ssh-server - - staging-ssh-server + - test-ssh-server + - staging-ssh-server source_tags: - - test-ssh-clients + - test-ssh-clients project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that firewall was created +- name: Verify that firewall was created google.cloud.gcp_compute_firewall_info: - filters: - - name = {{ resource_name }} - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 1 # ---------------------------------------------------------------------------- -- name: create a firewall that already exists +- name: Create a firewall that already exists google.cloud.gcp_compute_firewall: name: "{{ resource_name }}" allowed: - - ip_protocol: tcp - ports: - - '22' + - ip_protocol: tcp + ports: + - "22" target_tags: - - test-ssh-server - - staging-ssh-server + - test-ssh-server + - staging-ssh-server source_tags: - - test-ssh-clients + - test-ssh-clients project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a firewall +- name: Delete a firewall google.cloud.gcp_compute_firewall: name: "{{ resource_name }}" allowed: - - ip_protocol: tcp - ports: - - '22' + - ip_protocol: tcp + ports: + - "22" target_tags: - - test-ssh-server - - staging-ssh-server + - test-ssh-server + - staging-ssh-server source_tags: - - test-ssh-clients + - test-ssh-clients project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that firewall was deleted +- name: Verify that firewall was deleted google.cloud.gcp_compute_firewall_info: - filters: - - name = {{ resource_name }} - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 0 # ---------------------------------------------------------------------------- -- name: delete a firewall that does not exist +- name: Delete a firewall that does not exist google.cloud.gcp_compute_firewall: name: "{{ resource_name }}" allowed: - - ip_protocol: tcp - ports: - - '22' + - ip_protocol: tcp + ports: + - "22" target_tags: - - test-ssh-server - - staging-ssh-server + - test-ssh-server + - staging-ssh-server source_tags: - - test-ssh-clients + - test-ssh-clients project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_firewall/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_firewall/tasks/main.yml index 3cfb1cb12..b26677370 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_firewall/tasks/main.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_firewall/tasks/main.yml @@ -1,3 +1,5 @@ --- -- include_tasks: update.yml -- include_tasks: autogen.yml +- name: Update test + ansible.builtin.include_tasks: update.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_firewall/tasks/update.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_firewall/tasks/update.yml index 3ebbd21d0..3a2f73a9b 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_firewall/tasks/update.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_firewall/tasks/update.yml @@ -26,154 +26,154 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: delete a firewall +- name: Delete a firewall google.cloud.gcp_compute_firewall: name: "{{ resource_name }}" allowed: - - ip_protocol: tcp - ports: - - '22' + - ip_protocol: tcp + ports: + - "22" target_tags: - - test-ssh-server - - staging-ssh-server + - test-ssh-server + - staging-ssh-server source_tags: - - test-ssh-clients + - test-ssh-clients project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a firewall +- name: Create a firewall google.cloud.gcp_compute_firewall: name: "{{ resource_name }}" allowed: - - ip_protocol: tcp - ports: - - '22' + - ip_protocol: tcp + ports: + - "22" target_tags: - - test-ssh-server - - staging-ssh-server + - test-ssh-server + - staging-ssh-server source_tags: - - test-ssh-clients + - test-ssh-clients project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that firewall was created +- name: Verify that firewall was created google.cloud.gcp_compute_firewall_info: - filters: - - name = {{ resource_name }} - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 1 # ---------------------------------------------------------------------------- -- name: update the firewall +- name: Update the firewall google.cloud.gcp_compute_firewall: name: "{{ resource_name }}" allowed: - - ip_protocol: tcp - ports: - - '55' + - ip_protocol: tcp + ports: + - "55" target_tags: - - test-ssh-server - - staging-ssh-server + - test-ssh-server + - staging-ssh-server source_tags: - - test-ssh-clients + - test-ssh-clients project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true # ---------------------------------------------------------------------------- -- name: check firewall was updated. +- name: Check firewall was updated. google.cloud.gcp_compute_firewall_info: - filters: - - name = {{ resource_name }} - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 1 -- name: verify that update succeeded - assert: +- name: Verify that update succeeded + ansible.builtin.assert: that: - results['resources'][0]['allowed'][0]['ports'][0] == '55' #---------------------------------------------------------- -- name: delete a firewall +- name: Delete a firewall google.cloud.gcp_compute_firewall: name: "{{ resource_name }}" allowed: - - ip_protocol: tcp - ports: - - '22' + - ip_protocol: tcp + ports: + - "22" target_tags: - - test-ssh-server - - staging-ssh-server + - test-ssh-server + - staging-ssh-server source_tags: - - test-ssh-clients + - test-ssh-clients project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that firewall was deleted +- name: Verify that firewall was deleted google.cloud.gcp_compute_firewall_info: - filters: - - name = {{ resource_name }} - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 0 # ---------------------------------------------------------------------------- -- name: delete a firewall that does not exist +- name: Delete a firewall that does not exist google.cloud.gcp_compute_firewall: name: "{{ resource_name }}" allowed: - - ip_protocol: tcp - ports: - - '22' + - ip_protocol: tcp + ports: + - "22" target_tags: - - test-ssh-server - - staging-ssh-server + - test-ssh-server + - staging-ssh-server source_tags: - - test-ssh-clients + - test-ssh-clients project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_forwarding_rule/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_forwarding_rule/tasks/autogen.yml index 38c67df83..c26206fe7 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_forwarding_rule/tasks/autogen.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_forwarding_rule/tasks/autogen.yml @@ -13,25 +13,25 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: create a address +- name: Create a address google.cloud.gcp_compute_address: name: address-forwardingrule region: us-west1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: address -- name: create a target pool +- name: Create a target pool google.cloud.gcp_compute_target_pool: name: targetpool-forwardingrule region: us-west1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: targetpool -- name: delete a forwarding rule +- name: Delete a forwarding rule google.cloud.gcp_compute_forwarding_rule: name: "{{ resource_name }}" region: us-west1 @@ -41,10 +41,10 @@ ip_address: "{{ address.address }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a forwarding rule +- name: Create a forwarding rule google.cloud.gcp_compute_forwarding_rule: name: "{{ resource_name }}" region: us-west1 @@ -54,30 +54,30 @@ ip_address: "{{ address.address }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that forwarding_rule was created +- name: Verify that forwarding_rule was created google.cloud.gcp_compute_forwarding_rule_info: - filters: - - name = {{ resource_name }} - region: us-west1 - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + region: us-west1 + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 1 # ---------------------------------------------------------------------------- -- name: create a forwarding rule that already exists +- name: Create a forwarding rule that already exists google.cloud.gcp_compute_forwarding_rule: name: "{{ resource_name }}" region: us-west1 @@ -87,15 +87,15 @@ ip_address: "{{ address.address }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a forwarding rule +- name: Delete a forwarding rule google.cloud.gcp_compute_forwarding_rule: name: "{{ resource_name }}" region: us-west1 @@ -105,30 +105,30 @@ ip_address: "{{ address.address }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that forwarding_rule was deleted +- name: Verify that forwarding_rule was deleted google.cloud.gcp_compute_forwarding_rule_info: - filters: - - name = {{ resource_name }} - region: us-west1 - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + region: us-west1 + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 0 # ---------------------------------------------------------------------------- -- name: delete a forwarding rule that does not exist +- name: Delete a forwarding rule that does not exist google.cloud.gcp_compute_forwarding_rule: name: "{{ resource_name }}" region: us-west1 @@ -138,33 +138,33 @@ ip_address: "{{ address.address }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #--------------------------------------------------------- # Post-test teardown # If errors happen, don't crash the playbook! -- name: delete a target pool +- name: Delete a target pool google.cloud.gcp_compute_target_pool: name: targetpool-forwardingrule region: us-west1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: targetpool ignore_errors: true -- name: delete a address +- name: Delete a address google.cloud.gcp_compute_address: name: address-forwardingrule region: us-west1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: address ignore_errors: true diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_forwarding_rule/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_forwarding_rule/tasks/main.yml index 45d6e4917..fe47378c2 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_forwarding_rule/tasks/main.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_forwarding_rule/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_global_address/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_global_address/tasks/autogen.yml index ac99653fe..3333e3f51 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_global_address/tasks/autogen.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_global_address/tasks/autogen.yml @@ -13,90 +13,90 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: delete a global address +- name: Delete a global address google.cloud.gcp_compute_global_address: name: "{{ resource_name }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a global address +- name: Create a global address google.cloud.gcp_compute_global_address: name: "{{ resource_name }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that global_address was created +- name: Verify that global_address was created google.cloud.gcp_compute_global_address_info: - filters: - - name = {{ resource_name }} - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 1 # ---------------------------------------------------------------------------- -- name: create a global address that already exists +- name: Create a global address that already exists google.cloud.gcp_compute_global_address: name: "{{ resource_name }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a global address +- name: Delete a global address google.cloud.gcp_compute_global_address: name: "{{ resource_name }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that global_address was deleted +- name: Verify that global_address was deleted google.cloud.gcp_compute_global_address_info: - filters: - - name = {{ resource_name }} - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 0 # ---------------------------------------------------------------------------- -- name: delete a global address that does not exist +- name: Delete a global address that does not exist google.cloud.gcp_compute_global_address: name: "{{ resource_name }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_global_address/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_global_address/tasks/main.yml index 45d6e4917..fe47378c2 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_global_address/tasks/main.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_global_address/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_global_forwarding_rule/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_global_forwarding_rule/tasks/autogen.yml index 38d5d85da..93bab3afe 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_global_forwarding_rule/tasks/autogen.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_global_forwarding_rule/tasks/autogen.yml @@ -13,24 +13,24 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: create a global address +- name: Create a global address google.cloud.gcp_compute_global_address: name: globaladdress-globalforwardingrule project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: globaladdress -- name: create a instance group +- name: Create a instance group google.cloud.gcp_compute_instance_group: name: instancegroup-globalforwardingrule zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: instancegroup -- name: create a HTTP health check +- name: Create a HTTP health check google.cloud.gcp_compute_http_health_check: name: httphealthcheck-globalforwardingrule healthy_threshold: 10 @@ -39,41 +39,41 @@ unhealthy_threshold: 5 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: healthcheck -- name: create a backend service +- name: Create a backend service google.cloud.gcp_compute_backend_service: name: backendservice-globalforwardingrule backends: - - group: "{{ instancegroup.selfLink }}" + - group: "{{ instancegroup.selfLink }}" health_checks: - - "{{ healthcheck.selfLink }}" - enable_cdn: 'true' + - "{{ healthcheck.selfLink }}" + enable_cdn: "true" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: backendservice -- name: create a URL map +- name: Create a URL map google.cloud.gcp_compute_url_map: name: urlmap-globalforwardingrule default_service: "{{ backendservice }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: urlmap -- name: create a target HTTP proxy +- name: Create a target HTTP proxy google.cloud.gcp_compute_target_http_proxy: name: targethttpproxy-globalforwardingrule url_map: "{{ urlmap }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: httpproxy -- name: delete a global forwarding rule +- name: Delete a global forwarding rule google.cloud.gcp_compute_global_forwarding_rule: name: "{{ resource_name }}" ip_address: "{{ globaladdress.address }}" @@ -82,10 +82,10 @@ target: "{{ httpproxy.selfLink }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a global forwarding rule +- name: Create a global forwarding rule google.cloud.gcp_compute_global_forwarding_rule: name: "{{ resource_name }}" ip_address: "{{ globaladdress.address }}" @@ -94,29 +94,29 @@ target: "{{ httpproxy.selfLink }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that global_forwarding_rule was created +- name: Verify that global_forwarding_rule was created google.cloud.gcp_compute_global_forwarding_rule_info: - filters: - - name = {{ resource_name }} - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 1 # ---------------------------------------------------------------------------- -- name: create a global forwarding rule that already exists +- name: Create a global forwarding rule that already exists google.cloud.gcp_compute_global_forwarding_rule: name: "{{ resource_name }}" ip_address: "{{ globaladdress.address }}" @@ -125,15 +125,15 @@ target: "{{ httpproxy.selfLink }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a global forwarding rule +- name: Delete a global forwarding rule google.cloud.gcp_compute_global_forwarding_rule: name: "{{ resource_name }}" ip_address: "{{ globaladdress.address }}" @@ -142,29 +142,29 @@ target: "{{ httpproxy.selfLink }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that global_forwarding_rule was deleted +- name: Verify that global_forwarding_rule was deleted google.cloud.gcp_compute_global_forwarding_rule_info: - filters: - - name = {{ resource_name }} - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 0 # ---------------------------------------------------------------------------- -- name: delete a global forwarding rule that does not exist +- name: Delete a global forwarding rule that does not exist google.cloud.gcp_compute_global_forwarding_rule: name: "{{ resource_name }}" ip_address: "{{ globaladdress.address }}" @@ -173,51 +173,51 @@ target: "{{ httpproxy.selfLink }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #--------------------------------------------------------- # Post-test teardown # If errors happen, don't crash the playbook! -- name: delete a target HTTP proxy +- name: Delete a target HTTP proxy google.cloud.gcp_compute_target_http_proxy: name: targethttpproxy-globalforwardingrule url_map: "{{ urlmap }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: httpproxy ignore_errors: true -- name: delete a URL map +- name: Delete a URL map google.cloud.gcp_compute_url_map: name: urlmap-globalforwardingrule default_service: "{{ backendservice }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: urlmap ignore_errors: true -- name: delete a backend service +- name: Delete a backend service google.cloud.gcp_compute_backend_service: name: backendservice-globalforwardingrule backends: - - group: "{{ instancegroup.selfLink }}" + - group: "{{ instancegroup.selfLink }}" health_checks: - - "{{ healthcheck.selfLink }}" - enable_cdn: 'true' + - "{{ healthcheck.selfLink }}" + enable_cdn: "true" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: backendservice ignore_errors: true -- name: delete a HTTP health check +- name: Delete a HTTP health check google.cloud.gcp_compute_http_health_check: name: httphealthcheck-globalforwardingrule healthy_threshold: 10 @@ -226,26 +226,26 @@ unhealthy_threshold: 5 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: healthcheck ignore_errors: true -- name: delete a instance group +- name: Delete a instance group google.cloud.gcp_compute_instance_group: name: instancegroup-globalforwardingrule zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: instancegroup ignore_errors: true -- name: delete a global address +- name: Delete a global address google.cloud.gcp_compute_global_address: name: globaladdress-globalforwardingrule project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: globaladdress ignore_errors: true diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_global_forwarding_rule/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_global_forwarding_rule/tasks/main.yml index 45d6e4917..fe47378c2 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_global_forwarding_rule/tasks/main.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_global_forwarding_rule/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_health_check/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_health_check/tasks/autogen.yml index a2374c559..d529ec687 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_health_check/tasks/autogen.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_health_check/tasks/autogen.yml @@ -13,7 +13,7 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: delete a health check +- name: Delete a health check google.cloud.gcp_compute_health_check: name: "{{ resource_name }}" type: TCP @@ -26,10 +26,10 @@ unhealthy_threshold: 5 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a health check +- name: Create a health check google.cloud.gcp_compute_health_check: name: "{{ resource_name }}" type: TCP @@ -42,29 +42,29 @@ unhealthy_threshold: 5 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that health_check was created +- name: Verify that health_check was created google.cloud.gcp_compute_health_check_info: - filters: - - name = {{ resource_name }} - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 1 # ---------------------------------------------------------------------------- -- name: create a health check that already exists +- name: Create a health check that already exists google.cloud.gcp_compute_health_check: name: "{{ resource_name }}" type: TCP @@ -77,15 +77,15 @@ unhealthy_threshold: 5 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a health check +- name: Delete a health check google.cloud.gcp_compute_health_check: name: "{{ resource_name }}" type: TCP @@ -98,29 +98,29 @@ unhealthy_threshold: 5 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that health_check was deleted +- name: Verify that health_check was deleted google.cloud.gcp_compute_health_check_info: - filters: - - name = {{ resource_name }} - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 0 # ---------------------------------------------------------------------------- -- name: delete a health check that does not exist +- name: Delete a health check that does not exist google.cloud.gcp_compute_health_check: name: "{{ resource_name }}" type: TCP @@ -133,10 +133,10 @@ unhealthy_threshold: 5 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_health_check/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_health_check/tasks/main.yml index 45d6e4917..fe47378c2 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_health_check/tasks/main.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_health_check/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_http_health_check/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_http_health_check/tasks/autogen.yml index cbf8123d1..1ff3b89da 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_http_health_check/tasks/autogen.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_http_health_check/tasks/autogen.yml @@ -13,7 +13,7 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: delete a HTTP health check +- name: Delete a HTTP health check google.cloud.gcp_compute_http_health_check: name: "{{ resource_name }}" healthy_threshold: 10 @@ -22,10 +22,10 @@ unhealthy_threshold: 5 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a HTTP health check +- name: Create a HTTP health check google.cloud.gcp_compute_http_health_check: name: "{{ resource_name }}" healthy_threshold: 10 @@ -34,29 +34,29 @@ unhealthy_threshold: 5 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that http_health_check was created +- name: Verify that http_health_check was created google.cloud.gcp_compute_http_health_check_info: - filters: - - name = {{ resource_name }} - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 1 # ---------------------------------------------------------------------------- -- name: create a HTTP health check that already exists +- name: Create a HTTP health check that already exists google.cloud.gcp_compute_http_health_check: name: "{{ resource_name }}" healthy_threshold: 10 @@ -65,15 +65,15 @@ unhealthy_threshold: 5 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a HTTP health check +- name: Delete a HTTP health check google.cloud.gcp_compute_http_health_check: name: "{{ resource_name }}" healthy_threshold: 10 @@ -82,29 +82,29 @@ unhealthy_threshold: 5 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that http_health_check was deleted +- name: Verify that http_health_check was deleted google.cloud.gcp_compute_http_health_check_info: - filters: - - name = {{ resource_name }} - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 0 # ---------------------------------------------------------------------------- -- name: delete a HTTP health check that does not exist +- name: Delete a HTTP health check that does not exist google.cloud.gcp_compute_http_health_check: name: "{{ resource_name }}" healthy_threshold: 10 @@ -113,10 +113,10 @@ unhealthy_threshold: 5 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_http_health_check/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_http_health_check/tasks/main.yml index 45d6e4917..fe47378c2 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_http_health_check/tasks/main.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_http_health_check/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_https_health_check/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_https_health_check/tasks/autogen.yml index b53fb1dc4..c79968c03 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_https_health_check/tasks/autogen.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_https_health_check/tasks/autogen.yml @@ -13,7 +13,7 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: delete a HTTPS health check +- name: Delete a HTTPS health check google.cloud.gcp_compute_https_health_check: name: "{{ resource_name }}" healthy_threshold: 10 @@ -22,10 +22,10 @@ unhealthy_threshold: 5 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a HTTPS health check +- name: Create a HTTPS health check google.cloud.gcp_compute_https_health_check: name: "{{ resource_name }}" healthy_threshold: 10 @@ -34,29 +34,29 @@ unhealthy_threshold: 5 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that https_health_check was created +- name: Verify that https_health_check was created google.cloud.gcp_compute_https_health_check_info: - filters: - - name = {{ resource_name }} - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 1 # ---------------------------------------------------------------------------- -- name: create a HTTPS health check that already exists +- name: Create a HTTPS health check that already exists google.cloud.gcp_compute_https_health_check: name: "{{ resource_name }}" healthy_threshold: 10 @@ -65,15 +65,15 @@ unhealthy_threshold: 5 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a HTTPS health check +- name: Delete a HTTPS health check google.cloud.gcp_compute_https_health_check: name: "{{ resource_name }}" healthy_threshold: 10 @@ -82,29 +82,29 @@ unhealthy_threshold: 5 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that https_health_check was deleted +- name: Verify that https_health_check was deleted google.cloud.gcp_compute_https_health_check_info: - filters: - - name = {{ resource_name }} - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 0 # ---------------------------------------------------------------------------- -- name: delete a HTTPS health check that does not exist +- name: Delete a HTTPS health check that does not exist google.cloud.gcp_compute_https_health_check: name: "{{ resource_name }}" healthy_threshold: 10 @@ -113,10 +113,10 @@ unhealthy_threshold: 5 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_https_health_check/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_https_health_check/tasks/main.yml index 45d6e4917..fe47378c2 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_https_health_check/tasks/main.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_https_health_check/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_image/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_image/tasks/autogen.yml index 40fa8704b..e44f01021 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_image/tasks/autogen.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_image/tasks/autogen.yml @@ -13,117 +13,117 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: create a disk +- name: Create a disk google.cloud.gcp_compute_disk: name: disk-image zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: disk -- name: delete a image +- name: Delete a image google.cloud.gcp_compute_image: name: "{{ resource_name }}" source_disk: "{{ disk }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a image +- name: Create a image google.cloud.gcp_compute_image: name: "{{ resource_name }}" source_disk: "{{ disk }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that image was created +- name: Verify that image was created google.cloud.gcp_compute_image_info: - filters: - - name = {{ resource_name }} - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 1 # ---------------------------------------------------------------------------- -- name: create a image that already exists +- name: Create a image that already exists google.cloud.gcp_compute_image: name: "{{ resource_name }}" source_disk: "{{ disk }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a image +- name: Delete a image google.cloud.gcp_compute_image: name: "{{ resource_name }}" source_disk: "{{ disk }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that image was deleted +- name: Verify that image was deleted google.cloud.gcp_compute_image_info: - filters: - - name = {{ resource_name }} - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 0 # ---------------------------------------------------------------------------- -- name: delete a image that does not exist +- name: Delete a image that does not exist google.cloud.gcp_compute_image: name: "{{ resource_name }}" source_disk: "{{ disk }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #--------------------------------------------------------- # Post-test teardown # If errors happen, don't crash the playbook! -- name: delete a disk +- name: Delete a disk google.cloud.gcp_compute_disk: name: disk-image zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: disk ignore_errors: true diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_image/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_image/tasks/main.yml index 45d6e4917..fe47378c2 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_image/tasks/main.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_image/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_instance/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_instance/tasks/autogen.yml index 5c19f7bfd..fbec1e16d 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_instance/tasks/autogen.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_instance/tasks/autogen.yml @@ -13,7 +13,7 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: create a disk +- name: Create a disk google.cloud.gcp_compute_disk: name: "{{ resource_prefix }}" size_gb: 50 @@ -21,245 +21,245 @@ zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: disk -- name: create a network +- name: Create a network google.cloud.gcp_compute_network: name: "{{ resource_prefix }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" auto_create_subnetworks: true state: present register: network -- name: create a address +- name: Create a address google.cloud.gcp_compute_address: name: address-instance region: us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: address -- name: delete a instance +- name: Delete a instance google.cloud.gcp_compute_instance: name: "{{ resource_name }}" machine_type: n1-standard-1 disks: - - auto_delete: 'true' - boot: 'true' - source: "{{ disk }}" - - auto_delete: 'true' - interface: NVME - type: SCRATCH - initialize_params: - disk_type: local-ssd + - auto_delete: "true" + boot: "true" + source: "{{ disk }}" + - auto_delete: "true" + interface: NVME + type: SCRATCH + initialize_params: + disk_type: local-ssd metadata: - cost-center: '12345' + cost-center: "12345" labels: environment: production network_interfaces: - - network: "{{ network }}" - access_configs: - - name: External NAT - nat_ip: "{{ address }}" - type: ONE_TO_ONE_NAT + - network: "{{ network }}" + access_configs: + - name: External NAT + nat_ip: "{{ address }}" + type: ONE_TO_ONE_NAT zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a instance +- name: Create a instance google.cloud.gcp_compute_instance: name: "{{ resource_name }}" machine_type: n1-standard-1 disks: - - auto_delete: 'true' - boot: 'true' - source: "{{ disk }}" - - auto_delete: 'true' - interface: NVME - type: SCRATCH - initialize_params: - disk_type: local-ssd + - auto_delete: "true" + boot: "true" + source: "{{ disk }}" + - auto_delete: "true" + interface: NVME + type: SCRATCH + initialize_params: + disk_type: local-ssd metadata: - cost-center: '12345' + cost-center: "12345" labels: environment: production network_interfaces: - - network: "{{ network }}" - access_configs: - - name: External NAT - nat_ip: "{{ address }}" - type: ONE_TO_ONE_NAT + - network: "{{ network }}" + access_configs: + - name: External NAT + nat_ip: "{{ address }}" + type: ONE_TO_ONE_NAT zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that instance was created +- name: Verify that instance was created google.cloud.gcp_compute_instance_info: - filters: - - name = {{ resource_name }} - zone: us-central1-a - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + zone: us-central1-a + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 1 # ---------------------------------------------------------------------------- -- name: create a instance that already exists +- name: Create a instance that already exists google.cloud.gcp_compute_instance: name: "{{ resource_name }}" machine_type: n1-standard-1 disks: - - auto_delete: 'true' - boot: 'true' - source: "{{ disk }}" - - auto_delete: 'true' - interface: NVME - type: SCRATCH - initialize_params: - disk_type: local-ssd + - auto_delete: "true" + boot: "true" + source: "{{ disk }}" + - auto_delete: "true" + interface: NVME + type: SCRATCH + initialize_params: + disk_type: local-ssd metadata: - cost-center: '12345' + cost-center: "12345" labels: environment: production network_interfaces: - - network: "{{ network }}" - access_configs: - - name: External NAT - nat_ip: "{{ address }}" - type: ONE_TO_ONE_NAT + - network: "{{ network }}" + access_configs: + - name: External NAT + nat_ip: "{{ address }}" + type: ONE_TO_ONE_NAT zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a instance +- name: Delete a instance google.cloud.gcp_compute_instance: name: "{{ resource_name }}" machine_type: n1-standard-1 disks: - - auto_delete: 'true' - boot: 'true' - source: "{{ disk }}" - - auto_delete: 'true' - interface: NVME - type: SCRATCH - initialize_params: - disk_type: local-ssd + - auto_delete: "true" + boot: "true" + source: "{{ disk }}" + - auto_delete: "true" + interface: NVME + type: SCRATCH + initialize_params: + disk_type: local-ssd metadata: - cost-center: '12345' + cost-center: "12345" labels: environment: production network_interfaces: - - network: "{{ network }}" - access_configs: - - name: External NAT - nat_ip: "{{ address }}" - type: ONE_TO_ONE_NAT + - network: "{{ network }}" + access_configs: + - name: External NAT + nat_ip: "{{ address }}" + type: ONE_TO_ONE_NAT zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that instance was deleted +- name: Verify that instance was deleted google.cloud.gcp_compute_instance_info: - filters: - - name = {{ resource_name }} - zone: us-central1-a - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + zone: us-central1-a + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 0 # ---------------------------------------------------------------------------- -- name: delete a instance that does not exist +- name: Delete a instance that does not exist google.cloud.gcp_compute_instance: name: "{{ resource_name }}" machine_type: n1-standard-1 disks: - - auto_delete: 'true' - boot: 'true' - source: "{{ disk }}" - - auto_delete: 'true' - interface: NVME - type: SCRATCH - initialize_params: - disk_type: local-ssd + - auto_delete: "true" + boot: "true" + source: "{{ disk }}" + - auto_delete: "true" + interface: NVME + type: SCRATCH + initialize_params: + disk_type: local-ssd metadata: - cost-center: '12345' + cost-center: "12345" labels: environment: production network_interfaces: - - network: "{{ network }}" - access_configs: - - name: External NAT - nat_ip: "{{ address }}" - type: ONE_TO_ONE_NAT + - network: "{{ network }}" + access_configs: + - name: External NAT + nat_ip: "{{ address }}" + type: ONE_TO_ONE_NAT zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #--------------------------------------------------------- # Post-test teardown # If errors happen, don't crash the playbook! -- name: delete a address +- name: Delete a address google.cloud.gcp_compute_address: name: address-instance region: us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: address ignore_errors: true -- name: delete a network +- name: Delete a network google.cloud.gcp_compute_network: name: "{{ resource_prefix }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" auto_create_subnetworks: true state: absent register: network ignore_errors: true -- name: delete a disk +- name: Delete a disk google.cloud.gcp_compute_disk: name: "{{ resource_prefix }}" size_gb: 50 @@ -267,7 +267,7 @@ zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: disk ignore_errors: true diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_instance/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_instance/tasks/main.yml index 45d6e4917..fe47378c2 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_instance/tasks/main.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_instance/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_instance_group/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_instance_group/tasks/autogen.yml index 30893e403..340c8ca0c 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_instance_group/tasks/autogen.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_instance_group/tasks/autogen.yml @@ -13,138 +13,138 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: create a network +- name: Create a network google.cloud.gcp_compute_network: name: network-instancegroup project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" auto_create_subnetworks: true state: present register: network -- name: delete a instance group +- name: Delete a instance group google.cloud.gcp_compute_instance_group: name: "{{ resource_name }}" named_ports: - - name: ansible - port: 1234 + - name: ansible + port: 1234 network: "{{ network }}" zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a instance group +- name: Create a instance group google.cloud.gcp_compute_instance_group: name: "{{ resource_name }}" named_ports: - - name: ansible - port: 1234 + - name: ansible + port: 1234 network: "{{ network }}" zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that instance_group was created +- name: Verify that instance_group was created google.cloud.gcp_compute_instance_group_info: - filters: - - name = {{ resource_name }} - zone: us-central1-a - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + zone: us-central1-a + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 1 # ---------------------------------------------------------------------------- -- name: create a instance group that already exists +- name: Create a instance group that already exists google.cloud.gcp_compute_instance_group: name: "{{ resource_name }}" named_ports: - - name: ansible - port: 1234 + - name: ansible + port: 1234 network: "{{ network }}" zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a instance group +- name: Delete a instance group google.cloud.gcp_compute_instance_group: name: "{{ resource_name }}" named_ports: - - name: ansible - port: 1234 + - name: ansible + port: 1234 network: "{{ network }}" zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that instance_group was deleted +- name: Verify that instance_group was deleted google.cloud.gcp_compute_instance_group_info: - filters: - - name = {{ resource_name }} - zone: us-central1-a - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + zone: us-central1-a + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 0 # ---------------------------------------------------------------------------- -- name: delete a instance group that does not exist +- name: Delete a instance group that does not exist google.cloud.gcp_compute_instance_group: name: "{{ resource_name }}" named_ports: - - name: ansible - port: 1234 + - name: ansible + port: 1234 network: "{{ network }}" zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #--------------------------------------------------------- # Post-test teardown # If errors happen, don't crash the playbook! -- name: delete a network +- name: Delete a network google.cloud.gcp_compute_network: name: network-instancegroup project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" auto_create_subnetworks: true state: absent register: network diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_instance_group/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_instance_group/tasks/main.yml index 45d6e4917..fe47378c2 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_instance_group/tasks/main.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_instance_group/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_instance_group_manager/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_instance_group_manager/tasks/autogen.yml index 8ce7668b5..a60441e21 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_instance_group_manager/tasks/autogen.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_instance_group_manager/tasks/autogen.yml @@ -13,46 +13,46 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: create a network +- name: Create a network google.cloud.gcp_compute_network: name: network-instancetemplate project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" auto_create_subnetworks: true state: present register: network -- name: create a address +- name: Create a address google.cloud.gcp_compute_address: name: address-instancetemplate region: us-west1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: address -- name: create a instance template +- name: Create a instance template google.cloud.gcp_compute_instance_template: name: "{{ resource_name }}" properties: disks: - - auto_delete: 'true' - boot: 'true' - initialize_params: - source_image: projects/ubuntu-os-cloud/global/images/family/ubuntu-minimal-2204-lts + - auto_delete: "true" + boot: "true" + initialize_params: + source_image: projects/ubuntu-os-cloud/global/images/family/ubuntu-minimal-2204-lts machine_type: n1-standard-1 network_interfaces: - - network: "{{ network }}" - access_configs: - - name: test-config - type: ONE_TO_ONE_NAT - nat_ip: "{{ address }}" + - network: "{{ network }}" + access_configs: + - name: test-config + type: ONE_TO_ONE_NAT + nat_ip: "{{ address }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: instancetemplate -- name: delete a instance group manager +- name: Delete a instance group manager google.cloud.gcp_compute_instance_group_manager: name: "{{ resource_name }}" base_instance_name: test1-child @@ -61,10 +61,10 @@ zone: us-west1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a instance group manager +- name: Create a instance group manager google.cloud.gcp_compute_instance_group_manager: name: "{{ resource_name }}" base_instance_name: test1-child @@ -73,30 +73,30 @@ zone: us-west1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that instance_group_manager was created +- name: Verify that instance_group_manager was created google.cloud.gcp_compute_instance_group_manager_info: - filters: - - name = {{ resource_name }} - zone: us-west1-a - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + zone: us-west1-a + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 1 # ---------------------------------------------------------------------------- -- name: create a instance group manager that already exists +- name: Create a instance group manager that already exists google.cloud.gcp_compute_instance_group_manager: name: "{{ resource_name }}" base_instance_name: test1-child @@ -105,15 +105,15 @@ zone: us-west1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a instance group manager +- name: Delete a instance group manager google.cloud.gcp_compute_instance_group_manager: name: "{{ resource_name }}" base_instance_name: test1-child @@ -122,30 +122,30 @@ zone: us-west1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that instance_group_manager was deleted +- name: Verify that instance_group_manager was deleted google.cloud.gcp_compute_instance_group_manager_info: - filters: - - name = {{ resource_name }} - zone: us-west1-a - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + zone: us-west1-a + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 0 # ---------------------------------------------------------------------------- -- name: delete a instance group manager that does not exist +- name: Delete a instance group manager that does not exist google.cloud.gcp_compute_instance_group_manager: name: "{{ resource_name }}" base_instance_name: test1-child @@ -154,54 +154,54 @@ zone: us-west1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #--------------------------------------------------------- # Post-test teardown # If errors happen, don't crash the playbook! -- name: delete a instance template +- name: Delete a instance template google.cloud.gcp_compute_instance_template: name: "{{ resource_name }}" properties: disks: - - auto_delete: 'true' - boot: 'true' - initialize_params: - source_image: projects/ubuntu-os-cloud/global/images/family/ubuntu-minimal-2204-lts + - auto_delete: "true" + boot: "true" + initialize_params: + source_image: projects/ubuntu-os-cloud/global/images/family/ubuntu-minimal-2204-lts machine_type: n1-standard-1 network_interfaces: - - network: "{{ network }}" - access_configs: - - name: test-config - type: ONE_TO_ONE_NAT - nat_ip: "{{ address }}" + - network: "{{ network }}" + access_configs: + - name: test-config + type: ONE_TO_ONE_NAT + nat_ip: "{{ address }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: instancetemplate ignore_errors: true -- name: delete a address +- name: Delete a address google.cloud.gcp_compute_address: name: address-instancetemplate region: us-west1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: address ignore_errors: true -- name: delete a network +- name: Delete a network google.cloud.gcp_compute_network: name: network-instancetemplate project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" auto_create_subnetworks: true state: absent register: network diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_instance_group_manager/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_instance_group_manager/tasks/main.yml index 45d6e4917..fe47378c2 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_instance_group_manager/tasks/main.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_instance_group_manager/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_instance_template/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_instance_template/tasks/autogen.yml index 441a45597..72fb80983 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_instance_template/tasks/autogen.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_instance_template/tasks/autogen.yml @@ -13,195 +13,195 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: create a network +- name: Create a network google.cloud.gcp_compute_network: name: network-instancetemplate project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" auto_create_subnetworks: true state: present register: network -- name: create a address +- name: Create a address google.cloud.gcp_compute_address: name: address-instancetemplate region: us-west1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: address -- name: delete a instance template +- name: Delete a instance template google.cloud.gcp_compute_instance_template: name: "{{ resource_name }}" properties: disks: - - auto_delete: 'true' - boot: 'true' - initialize_params: - source_image: projects/ubuntu-os-cloud/global/images/family/ubuntu-minimal-2204-lts + - auto_delete: "true" + boot: "true" + initialize_params: + source_image: projects/ubuntu-os-cloud/global/images/family/ubuntu-minimal-2204-lts machine_type: n1-standard-1 network_interfaces: - - network: "{{ network }}" - access_configs: - - name: test-config - type: ONE_TO_ONE_NAT - nat_ip: "{{ address }}" + - network: "{{ network }}" + access_configs: + - name: test-config + type: ONE_TO_ONE_NAT + nat_ip: "{{ address }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a instance template +- name: Create a instance template google.cloud.gcp_compute_instance_template: name: "{{ resource_name }}" properties: disks: - - auto_delete: 'true' - boot: 'true' - initialize_params: - source_image: projects/ubuntu-os-cloud/global/images/family/ubuntu-minimal-2204-lts + - auto_delete: "true" + boot: "true" + initialize_params: + source_image: projects/ubuntu-os-cloud/global/images/family/ubuntu-minimal-2204-lts machine_type: n1-standard-1 network_interfaces: - - network: "{{ network }}" - access_configs: - - name: test-config - type: ONE_TO_ONE_NAT - nat_ip: "{{ address }}" + - network: "{{ network }}" + access_configs: + - name: test-config + type: ONE_TO_ONE_NAT + nat_ip: "{{ address }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that instance_template was created +- name: Verify that instance_template was created google.cloud.gcp_compute_instance_template_info: - filters: - - name = {{ resource_name }} - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 1 # ---------------------------------------------------------------------------- -- name: create a instance template that already exists +- name: Create a instance template that already exists google.cloud.gcp_compute_instance_template: name: "{{ resource_name }}" properties: disks: - - auto_delete: 'true' - boot: 'true' - initialize_params: - source_image: projects/ubuntu-os-cloud/global/images/family/ubuntu-minimal-2204-lts + - auto_delete: "true" + boot: "true" + initialize_params: + source_image: projects/ubuntu-os-cloud/global/images/family/ubuntu-minimal-2204-lts machine_type: n1-standard-1 network_interfaces: - - network: "{{ network }}" - access_configs: - - name: test-config - type: ONE_TO_ONE_NAT - nat_ip: "{{ address }}" + - network: "{{ network }}" + access_configs: + - name: test-config + type: ONE_TO_ONE_NAT + nat_ip: "{{ address }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a instance template +- name: Delete a instance template google.cloud.gcp_compute_instance_template: name: "{{ resource_name }}" properties: disks: - - auto_delete: 'true' - boot: 'true' - initialize_params: - source_image: projects/ubuntu-os-cloud/global/images/family/ubuntu-minimal-2204-lts + - auto_delete: "true" + boot: "true" + initialize_params: + source_image: projects/ubuntu-os-cloud/global/images/family/ubuntu-minimal-2204-lts machine_type: n1-standard-1 network_interfaces: - - network: "{{ network }}" - access_configs: - - name: test-config - type: ONE_TO_ONE_NAT - nat_ip: "{{ address }}" + - network: "{{ network }}" + access_configs: + - name: test-config + type: ONE_TO_ONE_NAT + nat_ip: "{{ address }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that instance_template was deleted +- name: Verify that instance_template was deleted google.cloud.gcp_compute_instance_template_info: - filters: - - name = {{ resource_name }} - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 0 # ---------------------------------------------------------------------------- -- name: delete a instance template that does not exist +- name: Delete a instance template that does not exist google.cloud.gcp_compute_instance_template: name: "{{ resource_name }}" properties: disks: - - auto_delete: 'true' - boot: 'true' - initialize_params: - source_image: projects/ubuntu-os-cloud/global/images/family/ubuntu-minimal-2204-lts + - auto_delete: "true" + boot: "true" + initialize_params: + source_image: projects/ubuntu-os-cloud/global/images/family/ubuntu-minimal-2204-lts machine_type: n1-standard-1 network_interfaces: - - network: "{{ network }}" - access_configs: - - name: test-config - type: ONE_TO_ONE_NAT - nat_ip: "{{ address }}" + - network: "{{ network }}" + access_configs: + - name: test-config + type: ONE_TO_ONE_NAT + nat_ip: "{{ address }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #--------------------------------------------------------- # Post-test teardown # If errors happen, don't crash the playbook! -- name: delete a address +- name: Delete a address google.cloud.gcp_compute_address: name: address-instancetemplate region: us-west1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: address ignore_errors: true -- name: delete a network +- name: Delete a network google.cloud.gcp_compute_network: name: network-instancetemplate project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" auto_create_subnetworks: true state: absent register: network diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_instance_template/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_instance_template/tasks/main.yml index 45d6e4917..fe47378c2 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_instance_template/tasks/main.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_instance_template/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_interconnect_attachment/defaults/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_interconnect_attachment/defaults/main.yml index aa87a2a8e..aa65c31f5 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_interconnect_attachment/defaults/main.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_interconnect_attachment/defaults/main.yml @@ -1,3 +1,3 @@ --- # defaults file -resource_name: '{{resource_prefix}}' +resource_name: "{{ resource_prefix }}" diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_managed_ssl_certificate/defaults/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_managed_ssl_certificate/defaults/main.yml index aa87a2a8e..aa65c31f5 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_managed_ssl_certificate/defaults/main.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_managed_ssl_certificate/defaults/main.yml @@ -1,3 +1,3 @@ --- # defaults file -resource_name: '{{resource_prefix}}' +resource_name: "{{ resource_prefix }}" diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_network/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_network/tasks/autogen.yml index 74dae7892..b887e2b17 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_network/tasks/autogen.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_network/tasks/autogen.yml @@ -13,95 +13,95 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: delete a network +- name: Delete a network google.cloud.gcp_compute_network: name: "{{ resource_name }}" - auto_create_subnetworks: 'true' + auto_create_subnetworks: "true" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a network +- name: Create a network google.cloud.gcp_compute_network: name: "{{ resource_name }}" - auto_create_subnetworks: 'true' + auto_create_subnetworks: "true" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that network was created +- name: Verify that network was created google.cloud.gcp_compute_network_info: - filters: - - name = {{ resource_name }} - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 1 # ---------------------------------------------------------------------------- -- name: create a network that already exists +- name: Create a network that already exists google.cloud.gcp_compute_network: name: "{{ resource_name }}" - auto_create_subnetworks: 'true' + auto_create_subnetworks: "true" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a network +- name: Delete a network google.cloud.gcp_compute_network: name: "{{ resource_name }}" - auto_create_subnetworks: 'true' + auto_create_subnetworks: "true" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that network was deleted +- name: Verify that network was deleted google.cloud.gcp_compute_network_info: - filters: - - name = {{ resource_name }} - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 0 # ---------------------------------------------------------------------------- -- name: delete a network that does not exist +- name: Delete a network that does not exist google.cloud.gcp_compute_network: name: "{{ resource_name }}" - auto_create_subnetworks: 'true' + auto_create_subnetworks: "true" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_network/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_network/tasks/main.yml index 45d6e4917..fe47378c2 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_network/tasks/main.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_network/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_network_endpoint_group/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_network_endpoint_group/tasks/autogen.yml index 8bf90de79..81f46d271 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_network_endpoint_group/tasks/autogen.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_network_endpoint_group/tasks/autogen.yml @@ -13,16 +13,16 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: create a network +- name: Create a network google.cloud.gcp_compute_network: name: "{{ resource_name }}" - auto_create_subnetworks: 'false' + auto_create_subnetworks: "false" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: network -- name: create a subnetwork +- name: Create a subnetwork google.cloud.gcp_compute_subnetwork: name: "{{ resource_name }}" ip_cidr_range: 10.0.0.0/16 @@ -30,10 +30,10 @@ network: "{{ network }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: subnetwork -- name: delete a network endpoint group +- name: Delete a network endpoint group google.cloud.gcp_compute_network_endpoint_group: name: "{{ resource_name }}" network: "{{ network }}" @@ -42,10 +42,10 @@ zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a network endpoint group +- name: Create a network endpoint group google.cloud.gcp_compute_network_endpoint_group: name: "{{ resource_name }}" network: "{{ network }}" @@ -54,30 +54,30 @@ zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that network_endpoint_group was created +- name: Verify that network_endpoint_group was created google.cloud.gcp_compute_network_endpoint_group_info: - filters: - - name = {{ resource_name }} - zone: us-central1-a - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + zone: us-central1-a + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 1 # ---------------------------------------------------------------------------- -- name: create a network endpoint group that already exists +- name: Create a network endpoint group that already exists google.cloud.gcp_compute_network_endpoint_group: name: "{{ resource_name }}" network: "{{ network }}" @@ -86,15 +86,15 @@ zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a network endpoint group +- name: Delete a network endpoint group google.cloud.gcp_compute_network_endpoint_group: name: "{{ resource_name }}" network: "{{ network }}" @@ -103,30 +103,30 @@ zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that network_endpoint_group was deleted +- name: Verify that network_endpoint_group was deleted google.cloud.gcp_compute_network_endpoint_group_info: - filters: - - name = {{ resource_name }} - zone: us-central1-a - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + zone: us-central1-a + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 0 # ---------------------------------------------------------------------------- -- name: delete a network endpoint group that does not exist +- name: Delete a network endpoint group that does not exist google.cloud.gcp_compute_network_endpoint_group: name: "{{ resource_name }}" network: "{{ network }}" @@ -135,17 +135,17 @@ zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #--------------------------------------------------------- # Post-test teardown # If errors happen, don't crash the playbook! -- name: delete a subnetwork +- name: Delete a subnetwork google.cloud.gcp_compute_subnetwork: name: "{{ resource_name }}" ip_cidr_range: 10.0.0.0/16 @@ -153,17 +153,17 @@ network: "{{ network }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: subnetwork ignore_errors: true -- name: delete a network +- name: Delete a network google.cloud.gcp_compute_network: name: "{{ resource_name }}" - auto_create_subnetworks: 'false' + auto_create_subnetworks: "false" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: network ignore_errors: true diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_network_endpoint_group/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_network_endpoint_group/tasks/main.yml index 45d6e4917..fe47378c2 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_network_endpoint_group/tasks/main.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_network_endpoint_group/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_node_group/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_node_group/tasks/autogen.yml index b5b07a2d8..25d46afa3 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_node_group/tasks/autogen.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_node_group/tasks/autogen.yml @@ -13,17 +13,17 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: create a node template +- name: Create a node template google.cloud.gcp_compute_node_template: name: "{{ resource_name }}" region: us-central1 node_type: n1-node-96-624 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: node_template -- name: delete a node group +- name: Delete a node group google.cloud.gcp_compute_node_group: name: "{{ resource_name }}" zone: us-central1-a @@ -32,10 +32,10 @@ node_template: "{{ node_template }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a node group +- name: Create a node group google.cloud.gcp_compute_node_group: name: "{{ resource_name }}" zone: us-central1-a @@ -44,30 +44,30 @@ node_template: "{{ node_template }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that node_group was created +- name: Verify that node_group was created google.cloud.gcp_compute_node_group_info: - filters: - - name = {{ resource_name }} - zone: us-central1-a - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + zone: us-central1-a + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 1 # ---------------------------------------------------------------------------- -- name: create a node group that already exists +- name: Create a node group that already exists google.cloud.gcp_compute_node_group: name: "{{ resource_name }}" zone: us-central1-a @@ -76,15 +76,15 @@ node_template: "{{ node_template }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a node group +- name: Delete a node group google.cloud.gcp_compute_node_group: name: "{{ resource_name }}" zone: us-central1-a @@ -93,30 +93,30 @@ node_template: "{{ node_template }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that node_group was deleted +- name: Verify that node_group was deleted google.cloud.gcp_compute_node_group_info: - filters: - - name = {{ resource_name }} - zone: us-central1-a - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + zone: us-central1-a + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 0 # ---------------------------------------------------------------------------- -- name: delete a node group that does not exist +- name: Delete a node group that does not exist google.cloud.gcp_compute_node_group: name: "{{ resource_name }}" zone: us-central1-a @@ -125,24 +125,24 @@ node_template: "{{ node_template }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #--------------------------------------------------------- # Post-test teardown # If errors happen, don't crash the playbook! -- name: delete a node template +- name: Delete a node template google.cloud.gcp_compute_node_template: name: "{{ resource_name }}" region: us-central1 node_type: n1-node-96-624 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: node_template ignore_errors: true diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_node_group/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_node_group/tasks/main.yml index 45d6e4917..fe47378c2 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_node_group/tasks/main.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_node_group/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_node_template/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_node_template/tasks/autogen.yml index cacc40bc5..f21ce6366 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_node_template/tasks/autogen.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_node_template/tasks/autogen.yml @@ -13,102 +13,102 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: delete a node template +- name: Delete a node template google.cloud.gcp_compute_node_template: name: "{{ resource_name }}" region: us-central1 node_type: n1-node-96-624 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a node template +- name: Create a node template google.cloud.gcp_compute_node_template: name: "{{ resource_name }}" region: us-central1 node_type: n1-node-96-624 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that node_template was created +- name: Verify that node_template was created google.cloud.gcp_compute_node_template_info: - filters: - - name = {{ resource_name }} - region: us-central1 - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + region: us-central1 + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 1 # ---------------------------------------------------------------------------- -- name: create a node template that already exists +- name: Create a node template that already exists google.cloud.gcp_compute_node_template: name: "{{ resource_name }}" region: us-central1 node_type: n1-node-96-624 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a node template +- name: Delete a node template google.cloud.gcp_compute_node_template: name: "{{ resource_name }}" region: us-central1 node_type: n1-node-96-624 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that node_template was deleted +- name: Verify that node_template was deleted google.cloud.gcp_compute_node_template_info: - filters: - - name = {{ resource_name }} - region: us-central1 - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + region: us-central1 + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 0 # ---------------------------------------------------------------------------- -- name: delete a node template that does not exist +- name: Delete a node template that does not exist google.cloud.gcp_compute_node_template: name: "{{ resource_name }}" region: us-central1 node_type: n1-node-96-624 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_node_template/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_node_template/tasks/main.yml index 45d6e4917..fe47378c2 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_node_template/tasks/main.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_node_template/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_autoscaler/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_autoscaler/tasks/autogen.yml index ba64d6f03..5a986a9f8 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_autoscaler/tasks/autogen.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_autoscaler/tasks/autogen.yml @@ -13,46 +13,46 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: create a network +- name: Create a network google.cloud.gcp_compute_network: name: network-instancetemplate project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" auto_create_subnetworks: true state: present register: network -- name: create a address +- name: Create a address google.cloud.gcp_compute_address: name: address-instancetemplate region: us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: address -- name: create a instance template +- name: Create a instance template google.cloud.gcp_compute_instance_template: name: "{{ resource_name }}" properties: disks: - - auto_delete: 'true' - boot: 'true' - initialize_params: - source_image: projects/ubuntu-os-cloud/global/images/family/ubuntu-minimal-2204-lts + - auto_delete: "true" + boot: "true" + initialize_params: + source_image: projects/ubuntu-os-cloud/global/images/family/ubuntu-minimal-2204-lts machine_type: n1-standard-1 network_interfaces: - - network: "{{ network }}" - access_configs: - - name: test-config - type: ONE_TO_ONE_NAT - nat_ip: "{{ address }}" + - network: "{{ network }}" + access_configs: + - name: test-config + type: ONE_TO_ONE_NAT + nat_ip: "{{ address }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: instancetemplate -- name: create a region instance group manager +- name: Create a region instance group manager google.cloud.gcp_compute_region_instance_group_manager: name: "{{ resource_name }}" base_instance_name: test1-child @@ -61,10 +61,10 @@ target_size: 3 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: igrm -- name: delete a region autoscaler +- name: Delete a region autoscaler google.cloud.gcp_compute_region_autoscaler: name: my-region-autoscaler region: us-central1 @@ -73,14 +73,14 @@ max_num_replicas: 5 cool_down_period_sec: 60 cpu_utilization: - utilization_target: 0.5 - target: "{{igrm.selfLink}}" + utilization_target: !!float "0.5" + target: "{{ igrm.selfLink }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a region autoscaler +- name: Create a region autoscaler google.cloud.gcp_compute_region_autoscaler: name: my-region-autoscaler region: us-central1 @@ -89,34 +89,34 @@ max_num_replicas: 5 cool_down_period_sec: 60 cpu_utilization: - utilization_target: 0.5 - target: "{{igrm.selfLink}}" + utilization_target: !!float "0.5" + target: "{{ igrm.selfLink }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that region_autoscaler was created +- name: Verify that region_autoscaler was created google.cloud.gcp_compute_region_autoscaler_info: - filters: - - name = my-region-autoscaler - region: us-central1 - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = my-region-autoscaler + region: us-central1 + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 1 # ---------------------------------------------------------------------------- -- name: create a region autoscaler that already exists +- name: Create a region autoscaler that already exists google.cloud.gcp_compute_region_autoscaler: name: my-region-autoscaler region: us-central1 @@ -125,19 +125,19 @@ max_num_replicas: 5 cool_down_period_sec: 60 cpu_utilization: - utilization_target: 0.5 - target: "{{igrm.selfLink}}" + utilization_target: !!float "0.5" + target: "{{ igrm.selfLink }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a region autoscaler +- name: Delete a region autoscaler google.cloud.gcp_compute_region_autoscaler: name: my-region-autoscaler region: us-central1 @@ -146,34 +146,34 @@ max_num_replicas: 5 cool_down_period_sec: 60 cpu_utilization: - utilization_target: 0.5 - target: "{{igrm.selfLink}}" + utilization_target: !!float "0.5" + target: "{{ igrm.selfLink }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that region_autoscaler was deleted +- name: Verify that region_autoscaler was deleted google.cloud.gcp_compute_region_autoscaler_info: - filters: - - name = my-region-autoscaler - region: us-central1 - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = my-region-autoscaler + region: us-central1 + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 0 # ---------------------------------------------------------------------------- -- name: delete a region autoscaler that does not exist +- name: Delete a region autoscaler that does not exist google.cloud.gcp_compute_region_autoscaler: name: my-region-autoscaler region: us-central1 @@ -182,21 +182,21 @@ max_num_replicas: 5 cool_down_period_sec: 60 cpu_utilization: - utilization_target: 0.5 - target: "{{igrm.selfLink}}" + utilization_target: !!float "0.5" + target: "{{ igrm.selfLink }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #--------------------------------------------------------- # Post-test teardown # If errors happen, don't crash the playbook! -- name: delete a region instance group manager +- name: Delete a region instance group manager google.cloud.gcp_compute_region_instance_group_manager: name: "{{ resource_name }}" base_instance_name: test1-child @@ -205,48 +205,48 @@ target_size: 3 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: igrm ignore_errors: true -- name: delete a instance template +- name: Delete a instance template google.cloud.gcp_compute_instance_template: name: "{{ resource_name }}" properties: disks: - - auto_delete: 'true' - boot: 'true' - initialize_params: - source_image: projects/ubuntu-os-cloud/global/images/family/ubuntu-minimal-2204-lts + - auto_delete: "true" + boot: "true" + initialize_params: + source_image: projects/ubuntu-os-cloud/global/images/family/ubuntu-minimal-2204-lts machine_type: n1-standard-1 network_interfaces: - - network: "{{ network }}" - access_configs: - - name: test-config - type: ONE_TO_ONE_NAT - nat_ip: "{{ address }}" + - network: "{{ network }}" + access_configs: + - name: test-config + type: ONE_TO_ONE_NAT + nat_ip: "{{ address }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: instancetemplate ignore_errors: true -- name: delete a address +- name: Delete a address google.cloud.gcp_compute_address: name: address-instancetemplate region: us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: address ignore_errors: true -- name: delete a network +- name: Delete a network google.cloud.gcp_compute_network: name: network-instancetemplate project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" auto_create_subnetworks: true state: absent register: network diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_autoscaler/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_autoscaler/tasks/main.yml index 45d6e4917..fe47378c2 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_autoscaler/tasks/main.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_autoscaler/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_backend_service/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_backend_service/tasks/autogen.yml index 6fdb3fa2b..beb644a7b 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_backend_service/tasks/autogen.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_backend_service/tasks/autogen.yml @@ -13,7 +13,7 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: create a health check +- name: Create a health check google.cloud.gcp_compute_health_check: name: "{{ resource_name }}" type: TCP @@ -23,132 +23,132 @@ timeout_sec: 1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: healthcheck -- name: delete a region backend service +- name: Delete a region backend service google.cloud.gcp_compute_region_backend_service: name: "{{ resource_name }}" region: us-central1 health_checks: - - "{{ healthcheck.selfLink }}" + - "{{ healthcheck.selfLink }}" connection_draining: draining_timeout_sec: 10 session_affinity: CLIENT_IP project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a region backend service +- name: Create a region backend service google.cloud.gcp_compute_region_backend_service: name: "{{ resource_name }}" region: us-central1 health_checks: - - "{{ healthcheck.selfLink }}" + - "{{ healthcheck.selfLink }}" connection_draining: draining_timeout_sec: 10 session_affinity: CLIENT_IP project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that region_backend_service was created +- name: Verify that region_backend_service was created google.cloud.gcp_compute_region_backend_service_info: - filters: - - name = {{ resource_name }} - region: us-central1 - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + region: us-central1 + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 1 # ---------------------------------------------------------------------------- -- name: create a region backend service that already exists +- name: Create a region backend service that already exists google.cloud.gcp_compute_region_backend_service: name: "{{ resource_name }}" region: us-central1 health_checks: - - "{{ healthcheck.selfLink }}" + - "{{ healthcheck.selfLink }}" connection_draining: draining_timeout_sec: 10 session_affinity: CLIENT_IP project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a region backend service +- name: Delete a region backend service google.cloud.gcp_compute_region_backend_service: name: "{{ resource_name }}" region: us-central1 health_checks: - - "{{ healthcheck.selfLink }}" + - "{{ healthcheck.selfLink }}" connection_draining: draining_timeout_sec: 10 session_affinity: CLIENT_IP project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that region_backend_service was deleted +- name: Verify that region_backend_service was deleted google.cloud.gcp_compute_region_backend_service_info: - filters: - - name = {{ resource_name }} - region: us-central1 - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + region: us-central1 + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 0 # ---------------------------------------------------------------------------- -- name: delete a region backend service that does not exist +- name: Delete a region backend service that does not exist google.cloud.gcp_compute_region_backend_service: name: "{{ resource_name }}" region: us-central1 health_checks: - - "{{ healthcheck.selfLink }}" + - "{{ healthcheck.selfLink }}" connection_draining: draining_timeout_sec: 10 session_affinity: CLIENT_IP project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #--------------------------------------------------------- # Post-test teardown # If errors happen, don't crash the playbook! -- name: delete a health check +- name: Delete a health check google.cloud.gcp_compute_health_check: name: "{{ resource_name }}" type: TCP @@ -158,7 +158,7 @@ timeout_sec: 1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: healthcheck ignore_errors: true diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_backend_service/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_backend_service/tasks/main.yml index 45d6e4917..fe47378c2 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_backend_service/tasks/main.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_backend_service/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_disk/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_disk/tasks/autogen.yml index 7a2e2e2cd..1b04a50d8 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_disk/tasks/autogen.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_disk/tasks/autogen.yml @@ -13,7 +13,7 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: delete a region disk +- name: Delete a region disk google.cloud.gcp_compute_region_disk: name: "{{ resource_name }}" size_gb: 500 @@ -21,14 +21,14 @@ raw_key: SGVsbG8gZnJvbSBHb29nbGUgQ2xvdWQgUGxhdGZvcm0= region: us-central1 replica_zones: - - https://www.googleapis.com/compute/v1/projects/{{ gcp_project }}/zones/us-central1-a - - https://www.googleapis.com/compute/v1/projects/{{ gcp_project }}/zones/us-central1-b + - https://www.googleapis.com/compute/v1/projects/{{ gcp_project }}/zones/us-central1-a + - https://www.googleapis.com/compute/v1/projects/{{ gcp_project }}/zones/us-central1-b project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a region disk +- name: Create a region disk google.cloud.gcp_compute_region_disk: name: "{{ resource_name }}" size_gb: 500 @@ -36,34 +36,34 @@ raw_key: SGVsbG8gZnJvbSBHb29nbGUgQ2xvdWQgUGxhdGZvcm0= region: us-central1 replica_zones: - - https://www.googleapis.com/compute/v1/projects/{{ gcp_project }}/zones/us-central1-a - - https://www.googleapis.com/compute/v1/projects/{{ gcp_project }}/zones/us-central1-b + - https://www.googleapis.com/compute/v1/projects/{{ gcp_project }}/zones/us-central1-a + - https://www.googleapis.com/compute/v1/projects/{{ gcp_project }}/zones/us-central1-b project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that region_disk was created +- name: Verify that region_disk was created google.cloud.gcp_compute_region_disk_info: - filters: - - name = {{ resource_name }} - region: us-central1 - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + region: us-central1 + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 1 # ---------------------------------------------------------------------------- -- name: create a region disk that already exists +- name: Create a region disk that already exists google.cloud.gcp_compute_region_disk: name: "{{ resource_name }}" size_gb: 500 @@ -71,19 +71,19 @@ raw_key: SGVsbG8gZnJvbSBHb29nbGUgQ2xvdWQgUGxhdGZvcm0= region: us-central1 replica_zones: - - https://www.googleapis.com/compute/v1/projects/{{ gcp_project }}/zones/us-central1-a - - https://www.googleapis.com/compute/v1/projects/{{ gcp_project }}/zones/us-central1-b + - https://www.googleapis.com/compute/v1/projects/{{ gcp_project }}/zones/us-central1-a + - https://www.googleapis.com/compute/v1/projects/{{ gcp_project }}/zones/us-central1-b project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a region disk +- name: Delete a region disk google.cloud.gcp_compute_region_disk: name: "{{ resource_name }}" size_gb: 500 @@ -91,34 +91,34 @@ raw_key: SGVsbG8gZnJvbSBHb29nbGUgQ2xvdWQgUGxhdGZvcm0= region: us-central1 replica_zones: - - https://www.googleapis.com/compute/v1/projects/{{ gcp_project }}/zones/us-central1-a - - https://www.googleapis.com/compute/v1/projects/{{ gcp_project }}/zones/us-central1-b + - https://www.googleapis.com/compute/v1/projects/{{ gcp_project }}/zones/us-central1-a + - https://www.googleapis.com/compute/v1/projects/{{ gcp_project }}/zones/us-central1-b project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that region_disk was deleted +- name: Verify that region_disk was deleted google.cloud.gcp_compute_region_disk_info: - filters: - - name = {{ resource_name }} - region: us-central1 - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + region: us-central1 + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 0 # ---------------------------------------------------------------------------- -- name: delete a region disk that does not exist +- name: Delete a region disk that does not exist google.cloud.gcp_compute_region_disk: name: "{{ resource_name }}" size_gb: 500 @@ -126,14 +126,14 @@ raw_key: SGVsbG8gZnJvbSBHb29nbGUgQ2xvdWQgUGxhdGZvcm0= region: us-central1 replica_zones: - - https://www.googleapis.com/compute/v1/projects/{{ gcp_project }}/zones/us-central1-a - - https://www.googleapis.com/compute/v1/projects/{{ gcp_project }}/zones/us-central1-b + - https://www.googleapis.com/compute/v1/projects/{{ gcp_project }}/zones/us-central1-a + - https://www.googleapis.com/compute/v1/projects/{{ gcp_project }}/zones/us-central1-b project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_disk/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_disk/tasks/main.yml index 45d6e4917..fe47378c2 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_disk/tasks/main.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_disk/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_health_check/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_health_check/tasks/autogen.yml index 498e018f9..badcfb842 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_health_check/tasks/autogen.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_health_check/tasks/autogen.yml @@ -13,7 +13,7 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: delete a region health check +- name: Delete a region health check google.cloud.gcp_compute_region_health_check: name: "{{ resource_name }}" type: TCP @@ -27,10 +27,10 @@ region: us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a region health check +- name: Create a region health check google.cloud.gcp_compute_region_health_check: name: "{{ resource_name }}" type: TCP @@ -44,30 +44,30 @@ region: us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that region_health_check was created +- name: Verify that region_health_check was created google.cloud.gcp_compute_region_health_check_info: - filters: - - name = {{ resource_name }} - region: us-central1 - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + region: us-central1 + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 1 # ---------------------------------------------------------------------------- -- name: create a region health check that already exists +- name: Create a region health check that already exists google.cloud.gcp_compute_region_health_check: name: "{{ resource_name }}" type: TCP @@ -81,15 +81,15 @@ region: us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a region health check +- name: Delete a region health check google.cloud.gcp_compute_region_health_check: name: "{{ resource_name }}" type: TCP @@ -103,30 +103,30 @@ region: us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that region_health_check was deleted +- name: Verify that region_health_check was deleted google.cloud.gcp_compute_region_health_check_info: - filters: - - name = {{ resource_name }} - region: us-central1 - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + region: us-central1 + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 0 # ---------------------------------------------------------------------------- -- name: delete a region health check that does not exist +- name: Delete a region health check that does not exist google.cloud.gcp_compute_region_health_check: name: "{{ resource_name }}" type: TCP @@ -140,10 +140,10 @@ region: us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_health_check/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_health_check/tasks/main.yml index 45d6e4917..fe47378c2 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_health_check/tasks/main.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_health_check/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_instance_group_manager/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_instance_group_manager/tasks/autogen.yml index 8c7f188a2..e60646420 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_instance_group_manager/tasks/autogen.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_instance_group_manager/tasks/autogen.yml @@ -13,46 +13,46 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: create a network +- name: Create a network google.cloud.gcp_compute_network: name: network-instancetemplate project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" auto_create_subnetworks: true state: present register: network -- name: create a address +- name: Create a address google.cloud.gcp_compute_address: name: address-instancetemplate region: us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: address -- name: create a instance template +- name: Create a instance template google.cloud.gcp_compute_instance_template: name: "{{ resource_name }}" properties: disks: - - auto_delete: 'true' - boot: 'true' - initialize_params: - source_image: projects/ubuntu-os-cloud/global/images/family/ubuntu-minimal-2204-lts + - auto_delete: "true" + boot: "true" + initialize_params: + source_image: projects/ubuntu-os-cloud/global/images/family/ubuntu-minimal-2204-lts machine_type: n1-standard-1 network_interfaces: - - network: "{{ network }}" - access_configs: - - name: test-config - type: ONE_TO_ONE_NAT - nat_ip: "{{ address }}" + - network: "{{ network }}" + access_configs: + - name: test-config + type: ONE_TO_ONE_NAT + nat_ip: "{{ address }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: instancetemplate -- name: delete a region instance group manager +- name: Delete a region instance group manager google.cloud.gcp_compute_region_instance_group_manager: name: "{{ resource_name }}" base_instance_name: test1-child @@ -61,10 +61,10 @@ target_size: 3 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a region instance group manager +- name: Create a region instance group manager google.cloud.gcp_compute_region_instance_group_manager: name: "{{ resource_name }}" base_instance_name: test1-child @@ -73,30 +73,30 @@ target_size: 3 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that region_instance_group_manager was created +- name: Verify that region_instance_group_manager was created google.cloud.gcp_compute_region_instance_group_manager_info: - filters: - - name = {{ resource_name }} - region: us-central1 - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + region: us-central1 + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 1 # ---------------------------------------------------------------------------- -- name: create a region instance group manager that already exists +- name: Create a region instance group manager that already exists google.cloud.gcp_compute_region_instance_group_manager: name: "{{ resource_name }}" base_instance_name: test1-child @@ -105,15 +105,15 @@ target_size: 3 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a region instance group manager +- name: Delete a region instance group manager google.cloud.gcp_compute_region_instance_group_manager: name: "{{ resource_name }}" base_instance_name: test1-child @@ -122,30 +122,30 @@ target_size: 3 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that region_instance_group_manager was deleted +- name: Verify that region_instance_group_manager was deleted google.cloud.gcp_compute_region_instance_group_manager_info: - filters: - - name = {{ resource_name }} - region: us-central1 - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + region: us-central1 + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 0 # ---------------------------------------------------------------------------- -- name: delete a region instance group manager that does not exist +- name: Delete a region instance group manager that does not exist google.cloud.gcp_compute_region_instance_group_manager: name: "{{ resource_name }}" base_instance_name: test1-child @@ -154,54 +154,54 @@ target_size: 3 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #--------------------------------------------------------- # Post-test teardown # If errors happen, don't crash the playbook! -- name: delete a instance template +- name: Delete a instance template google.cloud.gcp_compute_instance_template: name: "{{ resource_name }}" properties: disks: - - auto_delete: 'true' - boot: 'true' - initialize_params: - source_image: projects/ubuntu-os-cloud/global/images/family/ubuntu-minimal-2204-lts + - auto_delete: "true" + boot: "true" + initialize_params: + source_image: projects/ubuntu-os-cloud/global/images/family/ubuntu-minimal-2204-lts machine_type: n1-standard-1 network_interfaces: - - network: "{{ network }}" - access_configs: - - name: test-config - type: ONE_TO_ONE_NAT - nat_ip: "{{ address }}" + - network: "{{ network }}" + access_configs: + - name: test-config + type: ONE_TO_ONE_NAT + nat_ip: "{{ address }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: instancetemplate ignore_errors: true -- name: delete a address +- name: Delete a address google.cloud.gcp_compute_address: name: address-instancetemplate region: us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: address ignore_errors: true -- name: delete a network +- name: Delete a network google.cloud.gcp_compute_network: name: network-instancetemplate project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" auto_create_subnetworks: true state: absent register: network diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_instance_group_manager/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_instance_group_manager/tasks/main.yml index 45d6e4917..fe47378c2 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_instance_group_manager/tasks/main.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_instance_group_manager/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_target_http_proxy/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_target_http_proxy/tasks/autogen.yml index 9dcd75387..9c1da53dc 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_target_http_proxy/tasks/autogen.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_target_http_proxy/tasks/autogen.yml @@ -13,149 +13,149 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: create a backend service +- name: Create a backend service google.cloud.gcp_compute_region_backend_service: name: backendservice-targethttpproxy region: us-central1 - enable_cdn: 'true' + enable_cdn: "true" protocol: HTTP project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - load_balancing_scheme: "EXTERNAL" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + load_balancing_scheme: EXTERNAL state: present register: backendservice -- name: create a URL map +- name: Create a URL map google.cloud.gcp_compute_region_url_map: name: urlmap-targethttpproxy region: us-central1 default_service: "{{ backendservice }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: urlmap -- name: delete a region target HTTP proxy +- name: Delete a region target HTTP proxy google.cloud.gcp_compute_region_target_http_proxy: name: "{{ resource_name }}" region: us-central1 url_map: "{{ urlmap }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a region target HTTP proxy +- name: Create a region target HTTP proxy google.cloud.gcp_compute_region_target_http_proxy: name: "{{ resource_name }}" region: us-central1 url_map: "{{ urlmap }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that region_target_http_proxy was created +- name: Verify that region_target_http_proxy was created google.cloud.gcp_compute_region_target_http_proxy_info: - filters: - - name = {{ resource_name }} - region: us-central1 - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + region: us-central1 + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 1 # ---------------------------------------------------------------------------- -- name: create a region target HTTP proxy that already exists +- name: Create a region target HTTP proxy that already exists google.cloud.gcp_compute_region_target_http_proxy: name: "{{ resource_name }}" region: us-central1 url_map: "{{ urlmap }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a region target HTTP proxy +- name: Delete a region target HTTP proxy google.cloud.gcp_compute_region_target_http_proxy: name: "{{ resource_name }}" region: us-central1 url_map: "{{ urlmap }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that region_target_http_proxy was deleted +- name: Verify that region_target_http_proxy was deleted google.cloud.gcp_compute_region_target_http_proxy_info: - filters: - - name = {{ resource_name }} - region: us-central1 - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + region: us-central1 + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 0 # ---------------------------------------------------------------------------- -- name: delete a region target HTTP proxy that does not exist +- name: Delete a region target HTTP proxy that does not exist google.cloud.gcp_compute_region_target_http_proxy: name: "{{ resource_name }}" region: us-central1 url_map: "{{ urlmap }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #--------------------------------------------------------- # Post-test teardown # If errors happen, don't crash the playbook! -- name: delete a URL map +- name: Delete a URL map google.cloud.gcp_compute_region_url_map: name: urlmap-targethttpproxy region: us-central1 default_service: "{{ backendservice }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent - ignore_errors: true -- name: delete a backend service + ignore_errors: true # noqa: ignore-errors +- name: Delete a backend service google.cloud.gcp_compute_region_backend_service: name: backendservice-targethttpproxy region: us-central1 - enable_cdn: 'true' + enable_cdn: "true" protocol: HTTP project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - load_balancing_scheme: "EXTERNAL" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + load_balancing_scheme: EXTERNAL state: present - ignore_errors: true
\ No newline at end of file + ignore_errors: true # noqa: ignore-errors diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_target_http_proxy/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_target_http_proxy/tasks/main.yml index 45d6e4917..fe47378c2 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_target_http_proxy/tasks/main.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_target_http_proxy/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_target_https_proxy/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_target_https_proxy/tasks/autogen.yml index 9b52b77eb..ac02c562a 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_target_https_proxy/tasks/autogen.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_target_https_proxy/tasks/autogen.yml @@ -13,16 +13,16 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: create a instance group +- name: Create a instance group google.cloud.gcp_compute_instance_group: name: instancegroup-targethttpsproxy zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: instancegroup -- name: create a region health check +- name: Create a region health check google.cloud.gcp_compute_region_health_check: name: "{{ resource_name }}" type: HTTPS @@ -32,33 +32,33 @@ region: us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: healthcheck -- name: create a region backend service +- name: Create a region backend service google.cloud.gcp_compute_region_backend_service: name: backendservice-targethttpsproxy region: us-central1 backends: - - group: "{{ instancegroup.selfLink }}" + - group: "{{ instancegroup.selfLink }}" healthchecks: - - "{{ healthcheck.selfLink }}" + - "{{ healthcheck.selfLink }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: backendservice -- name: create a region URL map +- name: Create a region URL map google.cloud.gcp_compute_region_url_map: name: urlmap-targethttpsproxy region: us-central1 default_service: "{{ backendservice }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: urlmap -- name: create a SSL certificate +- name: Create a SSL certificate google.cloud.gcp_compute_ssl_certificate: name: sslcert-targethttpsproxy description: A certificate for testing. Do not use this certificate in production @@ -88,122 +88,122 @@ -----END EC PRIVATE KEY----- project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: sslcert -- name: delete a region target HTTPS proxy +- name: Delete a region target HTTPS proxy google.cloud.gcp_compute_region_target_https_proxy: name: "{{ resource_name }}" region: us-central1 ssl_certificates: - - "{{ sslcert }}" + - "{{ sslcert }}" # noqa: args[module] url_map: "{{ urlmap }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a region target HTTPS proxy +- name: Create a region target HTTPS proxy google.cloud.gcp_compute_region_target_https_proxy: name: "{{ resource_name }}" region: us-central1 ssl_certificates: - - "{{ sslcert }}" + - "{{ sslcert }}" # noqa: args[module] url_map: "{{ urlmap }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that region_target_https_proxy was created +- name: Verify that region_target_https_proxy was created google.cloud.gcp_compute_region_target_https_proxy_info: - filters: - - name = {{ resource_name }} - region: us-central1 - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + region: us-central1 + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 1 # ---------------------------------------------------------------------------- -- name: create a region target HTTPS proxy that already exists +- name: Create a region target HTTPS proxy that already exists google.cloud.gcp_compute_region_target_https_proxy: name: "{{ resource_name }}" region: us-central1 ssl_certificates: - - "{{ sslcert }}" + - "{{ sslcert }}" # noqa: args[module] url_map: "{{ urlmap }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a region target HTTPS proxy +- name: Delete a region target HTTPS proxy google.cloud.gcp_compute_region_target_https_proxy: name: "{{ resource_name }}" region: us-central1 ssl_certificates: - - "{{ sslcert }}" + - "{{ sslcert }}" # noqa: args[module] url_map: "{{ urlmap }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that region_target_https_proxy was deleted +- name: Verify that region_target_https_proxy was deleted google.cloud.gcp_compute_region_target_https_proxy_info: - filters: - - name = {{ resource_name }} - region: us-central1 - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + region: us-central1 + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 0 # ---------------------------------------------------------------------------- -- name: delete a region target HTTPS proxy that does not exist +- name: Delete a region target HTTPS proxy that does not exist google.cloud.gcp_compute_region_target_https_proxy: name: "{{ resource_name }}" region: us-central1 ssl_certificates: - - "{{ sslcert }}" + - "{{ sslcert }}" # noqa: args[module] url_map: "{{ urlmap }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #--------------------------------------------------------- # Post-test teardown # If errors happen, don't crash the playbook! -- name: delete a SSL certificate +- name: Delete a SSL certificate google.cloud.gcp_compute_ssl_certificate: name: sslcert-targethttpsproxy description: A certificate for testing. Do not use this certificate in production @@ -233,36 +233,36 @@ -----END EC PRIVATE KEY----- project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: sslcert ignore_errors: true -- name: delete a region URL map +- name: Delete a region URL map google.cloud.gcp_compute_region_url_map: name: urlmap-targethttpsproxy region: us-central1 default_service: "{{ backendservice }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: urlmap ignore_errors: true -- name: delete a region backend service +- name: Delete a region backend service google.cloud.gcp_compute_region_backend_service: name: backendservice-targethttpsproxy region: us-central1 backends: - - group: "{{ instancegroup.selfLink }}" + - group: "{{ instancegroup.selfLink }}" healthchecks: - - "{{ healthcheck.selfLink }}" + - "{{ healthcheck.selfLink }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: backendservice ignore_errors: true -- name: delete a region health check +- name: Delete a region health check google.cloud.gcp_compute_region_health_check: name: "{{ resource_name }}" type: HTTPS @@ -272,17 +272,17 @@ region: us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: healthcheck ignore_errors: true -- name: delete a instance group +- name: Delete a instance group google.cloud.gcp_compute_instance_group: name: instancegroup-targethttpsproxy zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: instancegroup ignore_errors: true diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_target_https_proxy/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_target_https_proxy/tasks/main.yml index 45d6e4917..fe47378c2 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_target_https_proxy/tasks/main.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_target_https_proxy/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_url_map/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_url_map/tasks/autogen.yml index 75e998c88..1cbfae962 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_url_map/tasks/autogen.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_url_map/tasks/autogen.yml @@ -13,128 +13,128 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: create a region backend service +- name: Create a region backend service google.cloud.gcp_compute_region_backend_service: name: "{{ resource_name }}" region: us-central1 protocol: HTTP project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - load_balancing_scheme: "EXTERNAL" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + load_balancing_scheme: EXTERNAL state: present register: backendservice -- name: delete a region URL map +- name: Delete a region URL map google.cloud.gcp_compute_region_url_map: name: "{{ resource_name }}" region: us-central1 default_service: "{{ backendservice }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a region URL map +- name: Create a region URL map google.cloud.gcp_compute_region_url_map: name: "{{ resource_name }}" region: us-central1 default_service: "{{ backendservice }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that region_url_map was created +- name: Verify that region_url_map was created google.cloud.gcp_compute_region_url_map_info: - filters: - - name = {{ resource_name }} - region: us-central1 - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + region: us-central1 + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 1 # ---------------------------------------------------------------------------- -- name: create a region URL map that already exists +- name: Create a region URL map that already exists google.cloud.gcp_compute_region_url_map: name: "{{ resource_name }}" region: us-central1 default_service: "{{ backendservice }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a region URL map +- name: Delete a region URL map google.cloud.gcp_compute_region_url_map: name: "{{ resource_name }}" region: us-central1 default_service: "{{ backendservice }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that region_url_map was deleted +- name: Verify that region_url_map was deleted google.cloud.gcp_compute_region_url_map_info: - filters: - - name = {{ resource_name }} - region: us-central1 - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + region: us-central1 + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 0 # ---------------------------------------------------------------------------- -- name: delete a region URL map that does not exist +- name: Delete a region URL map that does not exist google.cloud.gcp_compute_region_url_map: name: "{{ resource_name }}" region: us-central1 default_service: "{{ backendservice }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #--------------------------------------------------------- # Post-test teardown # If errors happen, don't crash the playbook! -- name: delete a region backend service +- name: Delete a region backend service google.cloud.gcp_compute_region_backend_service: name: "{{ resource_name }}" region: us-central1 protocol: HTTP project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - load_balancing_scheme: "EXTERNAL" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + load_balancing_scheme: EXTERNAL state: absent register: backendservice - ignore_errors: true
\ No newline at end of file + ignore_errors: true diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_url_map/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_url_map/tasks/main.yml index 45d6e4917..fe47378c2 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_url_map/tasks/main.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_url_map/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_reservation/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_reservation/tasks/autogen.yml index 8cf3a2558..7663bf5bc 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_reservation/tasks/autogen.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_reservation/tasks/autogen.yml @@ -13,7 +13,7 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: delete a reservation +- name: Delete a reservation google.cloud.gcp_compute_reservation: name: "{{ resource_name }}" zone: us-central1-a @@ -24,10 +24,10 @@ machine_type: n2-standard-2 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a reservation +- name: Create a reservation google.cloud.gcp_compute_reservation: name: "{{ resource_name }}" zone: us-central1-a @@ -38,30 +38,30 @@ machine_type: n2-standard-2 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that reservation was created +- name: Verify that reservation was created google.cloud.gcp_compute_reservation_info: - filters: - - name = {{ resource_name }} - zone: us-central1-a - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + zone: us-central1-a + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 1 # ---------------------------------------------------------------------------- -- name: create a reservation that already exists +- name: Create a reservation that already exists google.cloud.gcp_compute_reservation: name: "{{ resource_name }}" zone: us-central1-a @@ -72,15 +72,15 @@ machine_type: n2-standard-2 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a reservation +- name: Delete a reservation google.cloud.gcp_compute_reservation: name: "{{ resource_name }}" zone: us-central1-a @@ -91,30 +91,30 @@ machine_type: n2-standard-2 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that reservation was deleted +- name: Verify that reservation was deleted google.cloud.gcp_compute_reservation_info: - filters: - - name = {{ resource_name }} - zone: us-central1-a - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + zone: us-central1-a + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 0 # ---------------------------------------------------------------------------- -- name: delete a reservation that does not exist +- name: Delete a reservation that does not exist google.cloud.gcp_compute_reservation: name: "{{ resource_name }}" zone: us-central1-a @@ -125,10 +125,10 @@ machine_type: n2-standard-2 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_reservation/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_reservation/tasks/main.yml index 45d6e4917..fe47378c2 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_reservation/tasks/main.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_reservation/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_resource_policy/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_resource_policy/tasks/autogen.yml index 0910e5bb0..86647db0a 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_resource_policy/tasks/autogen.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_resource_policy/tasks/autogen.yml @@ -13,7 +13,7 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: delete a resource policy +- name: Delete a resource policy google.cloud.gcp_compute_resource_policy: name: "{{ resource_name }}" region: us-central1 @@ -21,13 +21,13 @@ schedule: daily_schedule: days_in_cycle: 1 - start_time: '04:00' + start_time: "04:00" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a resource policy +- name: Create a resource policy google.cloud.gcp_compute_resource_policy: name: "{{ resource_name }}" region: us-central1 @@ -35,33 +35,33 @@ schedule: daily_schedule: days_in_cycle: 1 - start_time: '04:00' + start_time: "04:00" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that resource_policy was created +- name: Verify that resource_policy was created google.cloud.gcp_compute_resource_policy_info: - filters: - - name = {{ resource_name }} - region: us-central1 - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + region: us-central1 + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 1 # ---------------------------------------------------------------------------- -- name: create a resource policy that already exists +- name: Create a resource policy that already exists google.cloud.gcp_compute_resource_policy: name: "{{ resource_name }}" region: us-central1 @@ -69,18 +69,18 @@ schedule: daily_schedule: days_in_cycle: 1 - start_time: '04:00' + start_time: "04:00" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a resource policy +- name: Delete a resource policy google.cloud.gcp_compute_resource_policy: name: "{{ resource_name }}" region: us-central1 @@ -88,33 +88,33 @@ schedule: daily_schedule: days_in_cycle: 1 - start_time: '04:00' + start_time: "04:00" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that resource_policy was deleted +- name: Verify that resource_policy was deleted google.cloud.gcp_compute_resource_policy_info: - filters: - - name = {{ resource_name }} - region: us-central1 - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + region: us-central1 + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 0 # ---------------------------------------------------------------------------- -- name: delete a resource policy that does not exist +- name: Delete a resource policy that does not exist google.cloud.gcp_compute_resource_policy: name: "{{ resource_name }}" region: us-central1 @@ -122,13 +122,13 @@ schedule: daily_schedule: days_in_cycle: 1 - start_time: '04:00' + start_time: "04:00" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_resource_policy/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_resource_policy/tasks/main.yml index 45d6e4917..fe47378c2 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_resource_policy/tasks/main.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_resource_policy/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_route/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_route/tasks/autogen.yml index bc32b3751..347c503c4 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_route/tasks/autogen.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_route/tasks/autogen.yml @@ -13,160 +13,160 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: create a network +- name: Create a network google.cloud.gcp_compute_network: name: network-route project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" auto_create_subnetworks: true state: present register: network -- name: delete a route +- name: Delete a route google.cloud.gcp_compute_route: name: "{{ resource_name }}" dest_range: 192.168.6.0/24 next_hop_gateway: global/gateways/default-internet-gateway network: "{{ network }}" tags: - - backends - - databases + - backends + - databases project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a route +- name: Create a route google.cloud.gcp_compute_route: name: "{{ resource_name }}" dest_range: 192.168.6.0/24 next_hop_gateway: global/gateways/default-internet-gateway network: "{{ network }}" tags: - - backends - - databases + - backends + - databases project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that route was created +- name: Verify that route was created google.cloud.gcp_compute_route_info: - filters: - - name = {{ resource_name }} - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 1 # ---------------------------------------------------------------------------- -- name: create a route that already exists +- name: Create a route that already exists google.cloud.gcp_compute_route: name: "{{ resource_name }}" dest_range: 192.168.6.0/24 next_hop_gateway: global/gateways/default-internet-gateway network: "{{ network }}" tags: - - backends - - databases + - backends + - databases project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false # --- -- name: update a route +- name: Update a route google.cloud.gcp_compute_route: name: "{{ resource_name }}" dest_range: 192.168.6.0/28 next_hop_gateway: global/gateways/default-internet-gateway network: "{{ network }}" tags: - - backends - - foobar + - backends + - foobar project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true #---------------------------------------------------------- -- name: delete a route +- name: Delete a route google.cloud.gcp_compute_route: name: "{{ resource_name }}" dest_range: 192.168.6.0/24 next_hop_gateway: global/gateways/default-internet-gateway network: "{{ network }}" tags: - - backends - - databases + - backends + - databases project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that route was deleted +- name: Verify that route was deleted google.cloud.gcp_compute_route_info: - filters: - - name = {{ resource_name }} - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 0 # ---------------------------------------------------------------------------- -- name: delete a route that does not exist +- name: Delete a route that does not exist google.cloud.gcp_compute_route: name: "{{ resource_name }}" dest_range: 192.168.6.0/24 next_hop_gateway: global/gateways/default-internet-gateway network: "{{ network }}" tags: - - backends - - databases + - backends + - databases project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #--------------------------------------------------------- # Post-test teardown # If errors happen, don't crash the playbook! -- name: delete a network +- name: Delete a network google.cloud.gcp_compute_network: name: network-route project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" auto_create_subnetworks: true state: absent register: network diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_route/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_route/tasks/main.yml index 45d6e4917..fe47378c2 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_route/tasks/main.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_route/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_router/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_router/tasks/autogen.yml index 0be0d142e..07acc6937 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_router/tasks/autogen.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_router/tasks/autogen.yml @@ -13,16 +13,16 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: create a network +- name: Create a network google.cloud.gcp_compute_network: name: network-router project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" auto_create_subnetworks: true state: present register: network -- name: delete a router +- name: Delete a router google.cloud.gcp_compute_router: name: "{{ resource_name }}" network: "{{ network }}" @@ -30,17 +30,17 @@ asn: 64514 advertise_mode: CUSTOM advertised_groups: - - ALL_SUBNETS + - ALL_SUBNETS advertised_ip_ranges: - - range: 1.2.3.4 - - range: 6.7.0.0/16 + - range: 1.2.3.4 + - range: 6.7.0.0/16 region: us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a router +- name: Create a router google.cloud.gcp_compute_router: name: "{{ resource_name }}" network: "{{ network }}" @@ -48,37 +48,37 @@ asn: 64514 advertise_mode: CUSTOM advertised_groups: - - ALL_SUBNETS + - ALL_SUBNETS advertised_ip_ranges: - - range: 1.2.3.4 - - range: 6.7.0.0/16 + - range: 1.2.3.4 + - range: 6.7.0.0/16 region: us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that router was created +- name: Verify that router was created google.cloud.gcp_compute_router_info: - filters: - - name = {{ resource_name }} - region: us-central1 - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + region: us-central1 + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 1 # ---------------------------------------------------------------------------- -- name: create a router that already exists +- name: Create a router that already exists google.cloud.gcp_compute_router: name: "{{ resource_name }}" network: "{{ network }}" @@ -86,22 +86,22 @@ asn: 64514 advertise_mode: CUSTOM advertised_groups: - - ALL_SUBNETS + - ALL_SUBNETS advertised_ip_ranges: - - range: 1.2.3.4 - - range: 6.7.0.0/16 + - range: 1.2.3.4 + - range: 6.7.0.0/16 region: us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a router +- name: Delete a router google.cloud.gcp_compute_router: name: "{{ resource_name }}" network: "{{ network }}" @@ -109,37 +109,37 @@ asn: 64514 advertise_mode: CUSTOM advertised_groups: - - ALL_SUBNETS + - ALL_SUBNETS advertised_ip_ranges: - - range: 1.2.3.4 - - range: 6.7.0.0/16 + - range: 1.2.3.4 + - range: 6.7.0.0/16 region: us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that router was deleted +- name: Verify that router was deleted google.cloud.gcp_compute_router_info: - filters: - - name = {{ resource_name }} - region: us-central1 - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + region: us-central1 + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 0 # ---------------------------------------------------------------------------- -- name: delete a router that does not exist +- name: Delete a router that does not exist google.cloud.gcp_compute_router: name: "{{ resource_name }}" network: "{{ network }}" @@ -147,29 +147,29 @@ asn: 64514 advertise_mode: CUSTOM advertised_groups: - - ALL_SUBNETS + - ALL_SUBNETS advertised_ip_ranges: - - range: 1.2.3.4 - - range: 6.7.0.0/16 + - range: 1.2.3.4 + - range: 6.7.0.0/16 region: us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #--------------------------------------------------------- # Post-test teardown # If errors happen, don't crash the playbook! -- name: delete a network +- name: Delete a network google.cloud.gcp_compute_network: name: network-router project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" auto_create_subnetworks: true state: absent register: network diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_router/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_router/tasks/main.yml index 45d6e4917..fe47378c2 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_router/tasks/main.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_router/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_snapshot/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_snapshot/tasks/autogen.yml index 64b4cb2e7..435284e08 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_snapshot/tasks/autogen.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_snapshot/tasks/autogen.yml @@ -13,16 +13,16 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: create a disk +- name: Create a disk google.cloud.gcp_compute_disk: name: disk-snapshot zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: disk -- name: delete a snapshot +- name: Delete a snapshot google.cloud.gcp_compute_snapshot: name: "{{ resource_name }}" source_disk: "{{ disk }}" @@ -31,10 +31,10 @@ my_label: value project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a snapshot +- name: Create a snapshot google.cloud.gcp_compute_snapshot: name: "{{ resource_name }}" source_disk: "{{ disk }}" @@ -43,29 +43,29 @@ my_label: value project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that snapshot was created +- name: Verify that snapshot was created google.cloud.gcp_compute_snapshot_info: - filters: - - name = {{ resource_name }} - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 1 # ---------------------------------------------------------------------------- -- name: create a snapshot that already exists +- name: Create a snapshot that already exists google.cloud.gcp_compute_snapshot: name: "{{ resource_name }}" source_disk: "{{ disk }}" @@ -74,15 +74,15 @@ my_label: value project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a snapshot +- name: Delete a snapshot google.cloud.gcp_compute_snapshot: name: "{{ resource_name }}" source_disk: "{{ disk }}" @@ -91,29 +91,29 @@ my_label: value project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that snapshot was deleted +- name: Verify that snapshot was deleted google.cloud.gcp_compute_snapshot_info: - filters: - - name = {{ resource_name }} - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 0 # ---------------------------------------------------------------------------- -- name: delete a snapshot that does not exist +- name: Delete a snapshot that does not exist google.cloud.gcp_compute_snapshot: name: "{{ resource_name }}" source_disk: "{{ disk }}" @@ -122,23 +122,23 @@ my_label: value project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #--------------------------------------------------------- # Post-test teardown # If errors happen, don't crash the playbook! -- name: delete a disk +- name: Delete a disk google.cloud.gcp_compute_disk: name: disk-snapshot zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: disk ignore_errors: true diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_snapshot/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_snapshot/tasks/main.yml index 45d6e4917..fe47378c2 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_snapshot/tasks/main.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_snapshot/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_ssl_certificate/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_ssl_certificate/tasks/autogen.yml index a8346cdeb..9d36683db 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_ssl_certificate/tasks/autogen.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_ssl_certificate/tasks/autogen.yml @@ -13,7 +13,7 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: delete a SSL certificate +- name: Delete a SSL certificate google.cloud.gcp_compute_ssl_certificate: name: "{{ resource_name }}" description: A certificate for testing. Do not use this certificate in production @@ -43,10 +43,10 @@ -----END EC PRIVATE KEY----- project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a SSL certificate +- name: Create a SSL certificate google.cloud.gcp_compute_ssl_certificate: name: "{{ resource_name }}" description: A certificate for testing. Do not use this certificate in production @@ -76,29 +76,29 @@ -----END EC PRIVATE KEY----- project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that ssl_certificate was created +- name: Verify that ssl_certificate was created google.cloud.gcp_compute_ssl_certificate_info: - filters: - - name = {{ resource_name }} - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 1 # ---------------------------------------------------------------------------- -- name: create a SSL certificate that already exists +- name: Create a SSL certificate that already exists google.cloud.gcp_compute_ssl_certificate: name: "{{ resource_name }}" description: A certificate for testing. Do not use this certificate in production @@ -128,15 +128,15 @@ -----END EC PRIVATE KEY----- project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a SSL certificate +- name: Delete a SSL certificate google.cloud.gcp_compute_ssl_certificate: name: "{{ resource_name }}" description: A certificate for testing. Do not use this certificate in production @@ -166,29 +166,29 @@ -----END EC PRIVATE KEY----- project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that ssl_certificate was deleted +- name: Verify that ssl_certificate was deleted google.cloud.gcp_compute_ssl_certificate_info: - filters: - - name = {{ resource_name }} - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 0 # ---------------------------------------------------------------------------- -- name: delete a SSL certificate that does not exist +- name: Delete a SSL certificate that does not exist google.cloud.gcp_compute_ssl_certificate: name: "{{ resource_name }}" description: A certificate for testing. Do not use this certificate in production @@ -218,10 +218,10 @@ -----END EC PRIVATE KEY----- project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_ssl_certificate/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_ssl_certificate/tasks/main.yml index 45d6e4917..fe47378c2 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_ssl_certificate/tasks/main.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_ssl_certificate/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_ssl_policy/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_ssl_policy/tasks/autogen.yml index 22bc04d28..adbba9f34 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_ssl_policy/tasks/autogen.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_ssl_policy/tasks/autogen.yml @@ -13,115 +13,115 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: delete a SSL policy +- name: Delete a SSL policy google.cloud.gcp_compute_ssl_policy: name: "{{ resource_name }}" profile: CUSTOM min_tls_version: TLS_1_2 custom_features: - - TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 - - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 + - TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 + - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a SSL policy +- name: Create a SSL policy google.cloud.gcp_compute_ssl_policy: name: "{{ resource_name }}" profile: CUSTOM min_tls_version: TLS_1_2 custom_features: - - TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 - - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 + - TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 + - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that ssl_policy was created +- name: Verify that ssl_policy was created google.cloud.gcp_compute_ssl_policy_info: - filters: - - name = {{ resource_name }} - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 1 # ---------------------------------------------------------------------------- -- name: create a SSL policy that already exists +- name: Create a SSL policy that already exists google.cloud.gcp_compute_ssl_policy: name: "{{ resource_name }}" profile: CUSTOM min_tls_version: TLS_1_2 custom_features: - - TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 - - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 + - TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 + - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a SSL policy +- name: Delete a SSL policy google.cloud.gcp_compute_ssl_policy: name: "{{ resource_name }}" profile: CUSTOM min_tls_version: TLS_1_2 custom_features: - - TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 - - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 + - TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 + - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that ssl_policy was deleted +- name: Verify that ssl_policy was deleted google.cloud.gcp_compute_ssl_policy_info: - filters: - - name = {{ resource_name }} - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 0 # ---------------------------------------------------------------------------- -- name: delete a SSL policy that does not exist +- name: Delete a SSL policy that does not exist google.cloud.gcp_compute_ssl_policy: name: "{{ resource_name }}" profile: CUSTOM min_tls_version: TLS_1_2 custom_features: - - TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 - - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 + - TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 + - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_ssl_policy/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_ssl_policy/tasks/main.yml index 45d6e4917..fe47378c2 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_ssl_policy/tasks/main.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_ssl_policy/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_subnetwork/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_subnetwork/tasks/autogen.yml index 3ea133024..6849ccac7 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_subnetwork/tasks/autogen.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_subnetwork/tasks/autogen.yml @@ -13,16 +13,16 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: create a network +- name: Create a network google.cloud.gcp_compute_network: name: network-subnetwork - auto_create_subnetworks: 'true' + auto_create_subnetworks: "true" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: network -- name: delete a subnetwork +- name: Delete a subnetwork google.cloud.gcp_compute_subnetwork: name: ansiblenet region: us-west1 @@ -30,10 +30,10 @@ ip_cidr_range: 172.16.0.0/16 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a subnetwork +- name: Create a subnetwork google.cloud.gcp_compute_subnetwork: name: ansiblenet region: us-west1 @@ -41,30 +41,30 @@ ip_cidr_range: 172.16.0.0/16 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that subnetwork was created +- name: Verify that subnetwork was created google.cloud.gcp_compute_subnetwork_info: - filters: - - name = ansiblenet - region: us-west1 - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = ansiblenet + region: us-west1 + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 1 # ---------------------------------------------------------------------------- -- name: create a subnetwork that already exists +- name: Create a subnetwork that already exists google.cloud.gcp_compute_subnetwork: name: ansiblenet region: us-west1 @@ -72,15 +72,15 @@ ip_cidr_range: 172.16.0.0/16 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a subnetwork +- name: Delete a subnetwork google.cloud.gcp_compute_subnetwork: name: ansiblenet region: us-west1 @@ -88,30 +88,30 @@ ip_cidr_range: 172.16.0.0/16 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that subnetwork was deleted +- name: Verify that subnetwork was deleted google.cloud.gcp_compute_subnetwork_info: - filters: - - name = ansiblenet - region: us-west1 - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = ansiblenet + region: us-west1 + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 0 # ---------------------------------------------------------------------------- -- name: delete a subnetwork that does not exist +- name: Delete a subnetwork that does not exist google.cloud.gcp_compute_subnetwork: name: ansiblenet region: us-west1 @@ -119,23 +119,23 @@ ip_cidr_range: 172.16.0.0/16 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #--------------------------------------------------------- # Post-test teardown # If errors happen, don't crash the playbook! -- name: delete a network +- name: Delete a network google.cloud.gcp_compute_network: name: network-subnetwork - auto_create_subnetworks: 'true' + auto_create_subnetworks: "true" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: network ignore_errors: true diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_subnetwork/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_subnetwork/tasks/main.yml index 45d6e4917..fe47378c2 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_subnetwork/tasks/main.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_subnetwork/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_http_proxy/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_http_proxy/tasks/autogen.yml index 6e25237ce..1c48c9db7 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_http_proxy/tasks/autogen.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_http_proxy/tasks/autogen.yml @@ -13,16 +13,16 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: create a instance group +- name: Create a instance group google.cloud.gcp_compute_instance_group: name: instancegroup-targethttpproxy zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: instancegroup -- name: create a HTTP health check +- name: Create a HTTP health check google.cloud.gcp_compute_http_health_check: name: httphealthcheck-targethttpproxy healthy_threshold: 10 @@ -31,151 +31,151 @@ unhealthy_threshold: 5 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: healthcheck -- name: create a backend service +- name: Create a backend service google.cloud.gcp_compute_backend_service: name: backendservice-targethttpproxy backends: - - group: "{{ instancegroup.selfLink }}" + - group: "{{ instancegroup.selfLink }}" health_checks: - - "{{ healthcheck.selfLink }}" - enable_cdn: 'true' + - "{{ healthcheck.selfLink }}" + enable_cdn: "true" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: backendservice -- name: create a URL map +- name: Create a URL map google.cloud.gcp_compute_url_map: name: urlmap-targethttpproxy default_service: "{{ backendservice }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: urlmap -- name: delete a target HTTP proxy +- name: Delete a target HTTP proxy google.cloud.gcp_compute_target_http_proxy: name: "{{ resource_name }}" url_map: "{{ urlmap }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a target HTTP proxy +- name: Create a target HTTP proxy google.cloud.gcp_compute_target_http_proxy: name: "{{ resource_name }}" url_map: "{{ urlmap }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that target_http_proxy was created +- name: Verify that target_http_proxy was created google.cloud.gcp_compute_target_http_proxy_info: - filters: - - name = {{ resource_name }} - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 1 # ---------------------------------------------------------------------------- -- name: create a target HTTP proxy that already exists +- name: Create a target HTTP proxy that already exists google.cloud.gcp_compute_target_http_proxy: name: "{{ resource_name }}" url_map: "{{ urlmap }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a target HTTP proxy +- name: Delete a target HTTP proxy google.cloud.gcp_compute_target_http_proxy: name: "{{ resource_name }}" url_map: "{{ urlmap }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that target_http_proxy was deleted +- name: Verify that target_http_proxy was deleted google.cloud.gcp_compute_target_http_proxy_info: - filters: - - name = {{ resource_name }} - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 0 # ---------------------------------------------------------------------------- -- name: delete a target HTTP proxy that does not exist +- name: Delete a target HTTP proxy that does not exist google.cloud.gcp_compute_target_http_proxy: name: "{{ resource_name }}" url_map: "{{ urlmap }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #--------------------------------------------------------- # Post-test teardown # If errors happen, don't crash the playbook! -- name: delete a URL map +- name: Delete a URL map google.cloud.gcp_compute_url_map: name: urlmap-targethttpproxy default_service: "{{ backendservice }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: urlmap ignore_errors: true -- name: delete a backend service +- name: Delete a backend service google.cloud.gcp_compute_backend_service: name: backendservice-targethttpproxy backends: - - group: "{{ instancegroup.selfLink }}" + - group: "{{ instancegroup.selfLink }}" health_checks: - - "{{ healthcheck.selfLink }}" - enable_cdn: 'true' + - "{{ healthcheck.selfLink }}" + enable_cdn: "true" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: backendservice ignore_errors: true -- name: delete a HTTP health check +- name: Delete a HTTP health check google.cloud.gcp_compute_http_health_check: name: httphealthcheck-targethttpproxy healthy_threshold: 10 @@ -184,17 +184,17 @@ unhealthy_threshold: 5 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: healthcheck ignore_errors: true -- name: delete a instance group +- name: Delete a instance group google.cloud.gcp_compute_instance_group: name: instancegroup-targethttpproxy zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: instancegroup ignore_errors: true diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_http_proxy/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_http_proxy/tasks/main.yml index 45d6e4917..fe47378c2 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_http_proxy/tasks/main.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_http_proxy/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_https_proxy/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_https_proxy/tasks/autogen.yml index 29b3ae0b0..5731d0870 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_https_proxy/tasks/autogen.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_https_proxy/tasks/autogen.yml @@ -13,16 +13,16 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: create a instance group +- name: Create a instance group google.cloud.gcp_compute_instance_group: name: instancegroup-targethttpsproxy zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: instancegroup -- name: create a HTTP health check +- name: Create a HTTP health check google.cloud.gcp_compute_http_health_check: name: httphealthcheck-targethttpsproxy healthy_threshold: 10 @@ -31,32 +31,32 @@ unhealthy_threshold: 5 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: healthcheck -- name: create a backend service +- name: Create a backend service google.cloud.gcp_compute_backend_service: name: backendservice-targethttpsproxy backends: - - group: "{{ instancegroup.selfLink }}" + - group: "{{ instancegroup.selfLink }}" health_checks: - - "{{ healthcheck.selfLink }}" - enable_cdn: 'true' + - "{{ healthcheck.selfLink }}" + enable_cdn: "true" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: backendservice -- name: create a URL map +- name: Create a URL map google.cloud.gcp_compute_url_map: name: urlmap-targethttpsproxy default_service: "{{ backendservice }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: urlmap -- name: create a SSL certificate +- name: Create a SSL certificate google.cloud.gcp_compute_ssl_certificate: name: sslcert-targethttpsproxy description: A certificate for testing. Do not use this certificate in production @@ -86,115 +86,115 @@ -----END EC PRIVATE KEY----- project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: sslcert -- name: delete a target HTTPS proxy +- name: Delete a target HTTPS proxy google.cloud.gcp_compute_target_https_proxy: name: "{{ resource_name }}" ssl_certificates: - - "{{ sslcert }}" + - "{{ sslcert }}" # noqa: args[module] url_map: "{{ urlmap }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a target HTTPS proxy +- name: Create a target HTTPS proxy google.cloud.gcp_compute_target_https_proxy: name: "{{ resource_name }}" ssl_certificates: - - "{{ sslcert }}" + - "{{ sslcert }}" # noqa: args[module] url_map: "{{ urlmap }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that target_https_proxy was created +- name: Verify that target_https_proxy was created google.cloud.gcp_compute_target_https_proxy_info: - filters: - - name = {{ resource_name }} - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 1 # ---------------------------------------------------------------------------- -- name: create a target HTTPS proxy that already exists +- name: Create a target HTTPS proxy that already exists google.cloud.gcp_compute_target_https_proxy: name: "{{ resource_name }}" ssl_certificates: - - "{{ sslcert }}" + - "{{ sslcert }}" # noqa: args[module] url_map: "{{ urlmap }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a target HTTPS proxy +- name: Delete a target HTTPS proxy google.cloud.gcp_compute_target_https_proxy: name: "{{ resource_name }}" ssl_certificates: - - "{{ sslcert }}" + - "{{ sslcert }}" # noqa: args[module] url_map: "{{ urlmap }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that target_https_proxy was deleted +- name: Verify that target_https_proxy was deleted google.cloud.gcp_compute_target_https_proxy_info: - filters: - - name = {{ resource_name }} - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 0 # ---------------------------------------------------------------------------- -- name: delete a target HTTPS proxy that does not exist +- name: Delete a target HTTPS proxy that does not exist google.cloud.gcp_compute_target_https_proxy: name: "{{ resource_name }}" ssl_certificates: - - "{{ sslcert }}" + - "{{ sslcert }}" # noqa: args[module] url_map: "{{ urlmap }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #--------------------------------------------------------- # Post-test teardown # If errors happen, don't crash the playbook! -- name: delete a SSL certificate +- name: Delete a SSL certificate google.cloud.gcp_compute_ssl_certificate: name: sslcert-targethttpsproxy description: A certificate for testing. Do not use this certificate in production @@ -224,35 +224,35 @@ -----END EC PRIVATE KEY----- project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: sslcert ignore_errors: true -- name: delete a URL map +- name: Delete a URL map google.cloud.gcp_compute_url_map: name: urlmap-targethttpsproxy default_service: "{{ backendservice }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: urlmap ignore_errors: true -- name: delete a backend service +- name: Delete a backend service google.cloud.gcp_compute_backend_service: name: backendservice-targethttpsproxy backends: - - group: "{{ instancegroup.selfLink }}" + - group: "{{ instancegroup.selfLink }}" health_checks: - - "{{ healthcheck.selfLink }}" - enable_cdn: 'true' + - "{{ healthcheck.selfLink }}" + enable_cdn: "true" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: backendservice ignore_errors: true -- name: delete a HTTP health check +- name: Delete a HTTP health check google.cloud.gcp_compute_http_health_check: name: httphealthcheck-targethttpsproxy healthy_threshold: 10 @@ -261,17 +261,17 @@ unhealthy_threshold: 5 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: healthcheck ignore_errors: true -- name: delete a instance group +- name: Delete a instance group google.cloud.gcp_compute_instance_group: name: instancegroup-targethttpsproxy zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: instancegroup ignore_errors: true diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_https_proxy/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_https_proxy/tasks/main.yml index 45d6e4917..fe47378c2 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_https_proxy/tasks/main.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_https_proxy/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_instance/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_instance/tasks/autogen.yml index 53418569e..74a01f61b 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_instance/tasks/autogen.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_instance/tasks/autogen.yml @@ -13,162 +13,162 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: create a network +- name: Create a network google.cloud.gcp_compute_network: name: network-instance project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" auto_create_subnetworks: true state: present register: network -- name: create a instance +- name: Create a instance google.cloud.gcp_compute_instance: name: "{{ resource_name }}" machine_type: n1-standard-1 disks: - - auto_delete: 'true' - boot: 'true' - initialize_params: - source_image: projects/ubuntu-os-cloud/global/images/family/ubuntu-minimal-2204-lts + - auto_delete: "true" + boot: "true" + initialize_params: + source_image: projects/ubuntu-os-cloud/global/images/family/ubuntu-minimal-2204-lts labels: environment: production network_interfaces: - - network: "{{ network }}" + - network: "{{ network }}" zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: instance -- name: delete a target instance +- name: Delete a target instance google.cloud.gcp_compute_target_instance: name: target instance: "{{ instance }}" zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a target instance +- name: Create a target instance google.cloud.gcp_compute_target_instance: name: target instance: "{{ instance }}" zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that target_instance was created +- name: Verify that target_instance was created google.cloud.gcp_compute_target_instance_info: - filters: - - name = target - zone: us-central1-a - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = target + zone: us-central1-a + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 1 # ---------------------------------------------------------------------------- -- name: create a target instance that already exists +- name: Create a target instance that already exists google.cloud.gcp_compute_target_instance: name: target instance: "{{ instance }}" zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a target instance +- name: Delete a target instance google.cloud.gcp_compute_target_instance: name: target instance: "{{ instance }}" zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that target_instance was deleted +- name: Verify that target_instance was deleted google.cloud.gcp_compute_target_instance_info: - filters: - - name = target - zone: us-central1-a - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = target + zone: us-central1-a + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 0 # ---------------------------------------------------------------------------- -- name: delete a target instance that does not exist +- name: Delete a target instance that does not exist google.cloud.gcp_compute_target_instance: name: target instance: "{{ instance }}" zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #--------------------------------------------------------- # Post-test teardown # If errors happen, don't crash the playbook! -- name: delete a instance +- name: Delete a instance google.cloud.gcp_compute_instance: name: "{{ resource_name }}" machine_type: n1-standard-1 disks: - - auto_delete: 'true' - boot: 'true' - initialize_params: - source_image: projects/ubuntu-os-cloud/global/images/family/ubuntu-minimal-2204-lts + - auto_delete: "true" + boot: "true" + initialize_params: + source_image: projects/ubuntu-os-cloud/global/images/family/ubuntu-minimal-2204-lts labels: environment: production network_interfaces: - - network: "{{ network }}" + - network: "{{ network }}" zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: instance ignore_errors: true -- name: delete a network +- name: Delete a network google.cloud.gcp_compute_network: name: network-instance project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" auto_create_subnetworks: true state: absent register: network diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_instance/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_instance/tasks/main.yml index 45d6e4917..fe47378c2 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_instance/tasks/main.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_instance/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_pool/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_pool/tasks/autogen.yml index 6fd609140..59a46d210 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_pool/tasks/autogen.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_pool/tasks/autogen.yml @@ -13,97 +13,97 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: delete a target pool +- name: Delete a target pool google.cloud.gcp_compute_target_pool: name: "{{ resource_name }}" region: us-west1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a target pool +- name: Create a target pool google.cloud.gcp_compute_target_pool: name: "{{ resource_name }}" region: us-west1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that target_pool was created +- name: Verify that target_pool was created google.cloud.gcp_compute_target_pool_info: - filters: - - name = {{ resource_name }} - region: us-west1 - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + region: us-west1 + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 1 # ---------------------------------------------------------------------------- -- name: create a target pool that already exists +- name: Create a target pool that already exists google.cloud.gcp_compute_target_pool: name: "{{ resource_name }}" region: us-west1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a target pool +- name: Delete a target pool google.cloud.gcp_compute_target_pool: name: "{{ resource_name }}" region: us-west1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that target_pool was deleted +- name: Verify that target_pool was deleted google.cloud.gcp_compute_target_pool_info: - filters: - - name = {{ resource_name }} - region: us-west1 - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + region: us-west1 + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 0 # ---------------------------------------------------------------------------- -- name: delete a target pool that does not exist +- name: Delete a target pool that does not exist google.cloud.gcp_compute_target_pool: name: "{{ resource_name }}" region: us-west1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_pool/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_pool/tasks/main.yml index 45d6e4917..fe47378c2 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_pool/tasks/main.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_pool/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_ssl_proxy/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_ssl_proxy/tasks/autogen.yml index 056e1f5ea..6142ec918 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_ssl_proxy/tasks/autogen.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_ssl_proxy/tasks/autogen.yml @@ -13,16 +13,16 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: create a instance group +- name: Create a instance group google.cloud.gcp_compute_instance_group: name: instancegroup-targetsslproxy zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: instancegroup -- name: create a health check +- name: Create a health check google.cloud.gcp_compute_health_check: name: healthcheck-targetsslproxy type: TCP @@ -35,23 +35,23 @@ unhealthy_threshold: 5 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: healthcheck -- name: create a backend service +- name: Create a backend service google.cloud.gcp_compute_backend_service: name: backendservice-targetsslproxy backends: - - group: "{{ instancegroup.selfLink }}" + - group: "{{ instancegroup.selfLink }}" health_checks: - - "{{ healthcheck.selfLink }}" + - "{{ healthcheck.selfLink }}" protocol: SSL project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: backendservice -- name: create a SSL certificate +- name: Create a SSL certificate google.cloud.gcp_compute_ssl_certificate: name: sslcert-targetsslproxy description: A certificate for testing. Do not use this certificate in production @@ -81,115 +81,115 @@ -----END EC PRIVATE KEY----- project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: sslcert -- name: delete a target SSL proxy +- name: Delete a target SSL proxy google.cloud.gcp_compute_target_ssl_proxy: name: "{{ resource_name }}" ssl_certificates: - - "{{ sslcert }}" + - "{{ sslcert }}" service: "{{ backendservice }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a target SSL proxy +- name: Create a target SSL proxy google.cloud.gcp_compute_target_ssl_proxy: name: "{{ resource_name }}" ssl_certificates: - - "{{ sslcert }}" + - "{{ sslcert }}" service: "{{ backendservice }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that target_ssl_proxy was created +- name: Verify that target_ssl_proxy was created google.cloud.gcp_compute_target_ssl_proxy_info: - filters: - - name = {{ resource_name }} - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 1 # ---------------------------------------------------------------------------- -- name: create a target SSL proxy that already exists +- name: Create a target SSL proxy that already exists google.cloud.gcp_compute_target_ssl_proxy: name: "{{ resource_name }}" ssl_certificates: - - "{{ sslcert }}" + - "{{ sslcert }}" service: "{{ backendservice }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a target SSL proxy +- name: Delete a target SSL proxy google.cloud.gcp_compute_target_ssl_proxy: name: "{{ resource_name }}" ssl_certificates: - - "{{ sslcert }}" + - "{{ sslcert }}" service: "{{ backendservice }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that target_ssl_proxy was deleted +- name: Verify that target_ssl_proxy was deleted google.cloud.gcp_compute_target_ssl_proxy_info: - filters: - - name = {{ resource_name }} - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 0 # ---------------------------------------------------------------------------- -- name: delete a target SSL proxy that does not exist +- name: Delete a target SSL proxy that does not exist google.cloud.gcp_compute_target_ssl_proxy: name: "{{ resource_name }}" ssl_certificates: - - "{{ sslcert }}" + - "{{ sslcert }}" service: "{{ backendservice }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #--------------------------------------------------------- # Post-test teardown # If errors happen, don't crash the playbook! -- name: delete a SSL certificate +- name: Delete a SSL certificate google.cloud.gcp_compute_ssl_certificate: name: sslcert-targetsslproxy description: A certificate for testing. Do not use this certificate in production @@ -219,25 +219,25 @@ -----END EC PRIVATE KEY----- project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: sslcert ignore_errors: true -- name: delete a backend service +- name: Delete a backend service google.cloud.gcp_compute_backend_service: name: backendservice-targetsslproxy backends: - - group: "{{ instancegroup.selfLink }}" + - group: "{{ instancegroup.selfLink }}" health_checks: - - "{{ healthcheck.selfLink }}" + - "{{ healthcheck.selfLink }}" protocol: SSL project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: backendservice ignore_errors: true -- name: delete a health check +- name: Delete a health check google.cloud.gcp_compute_health_check: name: healthcheck-targetsslproxy type: TCP @@ -250,17 +250,17 @@ unhealthy_threshold: 5 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: healthcheck ignore_errors: true -- name: delete a instance group +- name: Delete a instance group google.cloud.gcp_compute_instance_group: name: instancegroup-targetsslproxy zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: instancegroup ignore_errors: true diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_ssl_proxy/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_ssl_proxy/tasks/main.yml index 45d6e4917..fe47378c2 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_ssl_proxy/tasks/main.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_ssl_proxy/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_tcp_proxy/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_tcp_proxy/tasks/autogen.yml index 08a3ab467..82e3e5513 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_tcp_proxy/tasks/autogen.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_tcp_proxy/tasks/autogen.yml @@ -13,16 +13,16 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: create a instance group +- name: Create a instance group google.cloud.gcp_compute_instance_group: name: instancegroup-targettcpproxy zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: instancegroup -- name: create a health check +- name: Create a health check google.cloud.gcp_compute_health_check: name: healthcheck-targettcpproxy type: TCP @@ -35,137 +35,137 @@ unhealthy_threshold: 5 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: healthcheck -- name: create a backend service +- name: Create a backend service google.cloud.gcp_compute_backend_service: name: backendservice-targettcpproxy backends: - - group: "{{ instancegroup.selfLink }}" + - group: "{{ instancegroup.selfLink }}" health_checks: - - "{{ healthcheck.selfLink }}" + - "{{ healthcheck.selfLink }}" protocol: TCP project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: backendservice -- name: delete a target TCP proxy +- name: Delete a target TCP proxy google.cloud.gcp_compute_target_tcp_proxy: name: "{{ resource_name }}" proxy_header: PROXY_V1 service: "{{ backendservice }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a target TCP proxy +- name: Create a target TCP proxy google.cloud.gcp_compute_target_tcp_proxy: name: "{{ resource_name }}" proxy_header: PROXY_V1 service: "{{ backendservice }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that target_tcp_proxy was created +- name: Verify that target_tcp_proxy was created google.cloud.gcp_compute_target_tcp_proxy_info: - filters: - - name = {{ resource_name }} - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 1 # ---------------------------------------------------------------------------- -- name: create a target TCP proxy that already exists +- name: Create a target TCP proxy that already exists google.cloud.gcp_compute_target_tcp_proxy: name: "{{ resource_name }}" proxy_header: PROXY_V1 service: "{{ backendservice }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a target TCP proxy +- name: Delete a target TCP proxy google.cloud.gcp_compute_target_tcp_proxy: name: "{{ resource_name }}" proxy_header: PROXY_V1 service: "{{ backendservice }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that target_tcp_proxy was deleted +- name: Verify that target_tcp_proxy was deleted google.cloud.gcp_compute_target_tcp_proxy_info: - filters: - - name = {{ resource_name }} - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 0 # ---------------------------------------------------------------------------- -- name: delete a target TCP proxy that does not exist +- name: Delete a target TCP proxy that does not exist google.cloud.gcp_compute_target_tcp_proxy: name: "{{ resource_name }}" proxy_header: PROXY_V1 service: "{{ backendservice }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #--------------------------------------------------------- # Post-test teardown # If errors happen, don't crash the playbook! -- name: delete a backend service +- name: Delete a backend service google.cloud.gcp_compute_backend_service: name: backendservice-targettcpproxy backends: - - group: "{{ instancegroup.selfLink }}" + - group: "{{ instancegroup.selfLink }}" health_checks: - - "{{ healthcheck.selfLink }}" + - "{{ healthcheck.selfLink }}" protocol: TCP project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: backendservice ignore_errors: true -- name: delete a health check +- name: Delete a health check google.cloud.gcp_compute_health_check: name: healthcheck-targettcpproxy type: TCP @@ -178,17 +178,17 @@ unhealthy_threshold: 5 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: healthcheck ignore_errors: true -- name: delete a instance group +- name: Delete a instance group google.cloud.gcp_compute_instance_group: name: instancegroup-targettcpproxy zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: instancegroup ignore_errors: true diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_tcp_proxy/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_tcp_proxy/tasks/main.yml index 45d6e4917..fe47378c2 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_tcp_proxy/tasks/main.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_tcp_proxy/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_vpn_gateway/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_vpn_gateway/tasks/autogen.yml index 818f885bc..a14a14937 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_vpn_gateway/tasks/autogen.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_vpn_gateway/tasks/autogen.yml @@ -13,143 +13,143 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: create a address +- name: Create a address google.cloud.gcp_compute_address: name: address-vpngateway region: us-west1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: address -- name: create a network +- name: Create a network google.cloud.gcp_compute_network: name: network-vpngateway project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" auto_create_subnetworks: true state: present register: network -- name: delete a target vpn gateway +- name: Delete a target vpn gateway google.cloud.gcp_compute_target_vpn_gateway: name: "{{ resource_name }}" region: us-west1 network: "{{ network }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a target vpn gateway +- name: Create a target vpn gateway google.cloud.gcp_compute_target_vpn_gateway: name: "{{ resource_name }}" region: us-west1 network: "{{ network }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that target_vpn_gateway was created +- name: Verify that target_vpn_gateway was created google.cloud.gcp_compute_target_vpn_gateway_info: - filters: - - name = {{ resource_name }} - region: us-west1 - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + region: us-west1 + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 1 # ---------------------------------------------------------------------------- -- name: create a target vpn gateway that already exists +- name: Create a target vpn gateway that already exists google.cloud.gcp_compute_target_vpn_gateway: name: "{{ resource_name }}" region: us-west1 network: "{{ network }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a target vpn gateway +- name: Delete a target vpn gateway google.cloud.gcp_compute_target_vpn_gateway: name: "{{ resource_name }}" region: us-west1 network: "{{ network }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that target_vpn_gateway was deleted +- name: Verify that target_vpn_gateway was deleted google.cloud.gcp_compute_target_vpn_gateway_info: - filters: - - name = {{ resource_name }} - region: us-west1 - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + region: us-west1 + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 0 # ---------------------------------------------------------------------------- -- name: delete a target vpn gateway that does not exist +- name: Delete a target vpn gateway that does not exist google.cloud.gcp_compute_target_vpn_gateway: name: "{{ resource_name }}" region: us-west1 network: "{{ network }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #--------------------------------------------------------- # Post-test teardown # If errors happen, don't crash the playbook! -- name: delete a network +- name: Delete a network google.cloud.gcp_compute_network: name: network-vpngateway project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" auto_create_subnetworks: true state: absent register: network ignore_errors: true -- name: delete a address +- name: Delete a address google.cloud.gcp_compute_address: name: address-vpngateway region: us-west1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: address ignore_errors: true diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_vpn_gateway/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_vpn_gateway/tasks/main.yml index 45d6e4917..fe47378c2 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_vpn_gateway/tasks/main.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_vpn_gateway/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_url_map/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_url_map/tasks/autogen.yml index 8993b9e18..ead14fef0 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_url_map/tasks/autogen.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_url_map/tasks/autogen.yml @@ -13,16 +13,16 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: create a instance group +- name: Create a instance group google.cloud.gcp_compute_instance_group: name: instancegroup-urlmap zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: instancegroup -- name: create a HTTP health check +- name: Create a HTTP health check google.cloud.gcp_compute_http_health_check: name: httphealthcheck-urlmap healthy_threshold: 10 @@ -31,132 +31,132 @@ unhealthy_threshold: 5 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: healthcheck -- name: create a backend service +- name: Create a backend service google.cloud.gcp_compute_backend_service: name: backendservice-urlmap backends: - - group: "{{ instancegroup.selfLink }}" + - group: "{{ instancegroup.selfLink }}" health_checks: - - "{{ healthcheck.selfLink }}" - enable_cdn: 'true' + - "{{ healthcheck.selfLink }}" + enable_cdn: "true" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: backendservice -- name: delete a URL map +- name: Delete a URL map google.cloud.gcp_compute_url_map: name: "{{ resource_name }}" default_service: "{{ backendservice }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a URL map +- name: Create a URL map google.cloud.gcp_compute_url_map: name: "{{ resource_name }}" default_service: "{{ backendservice }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that url_map was created +- name: Verify that url_map was created google.cloud.gcp_compute_url_map_info: - filters: - - name = {{ resource_name }} - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 1 # ---------------------------------------------------------------------------- -- name: create a URL map that already exists +- name: Create a URL map that already exists google.cloud.gcp_compute_url_map: name: "{{ resource_name }}" default_service: "{{ backendservice }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a URL map +- name: Delete a URL map google.cloud.gcp_compute_url_map: name: "{{ resource_name }}" default_service: "{{ backendservice }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that url_map was deleted +- name: Verify that url_map was deleted google.cloud.gcp_compute_url_map_info: - filters: - - name = {{ resource_name }} - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 0 # ---------------------------------------------------------------------------- -- name: delete a URL map that does not exist +- name: Delete a URL map that does not exist google.cloud.gcp_compute_url_map: name: "{{ resource_name }}" default_service: "{{ backendservice }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #--------------------------------------------------------- # Post-test teardown # If errors happen, don't crash the playbook! -- name: delete a backend service +- name: Delete a backend service google.cloud.gcp_compute_backend_service: name: backendservice-urlmap backends: - - group: "{{ instancegroup.selfLink }}" + - group: "{{ instancegroup.selfLink }}" health_checks: - - "{{ healthcheck.selfLink }}" - enable_cdn: 'true' + - "{{ healthcheck.selfLink }}" + enable_cdn: "true" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: backendservice ignore_errors: true -- name: delete a HTTP health check +- name: Delete a HTTP health check google.cloud.gcp_compute_http_health_check: name: httphealthcheck-urlmap healthy_threshold: 10 @@ -165,17 +165,17 @@ unhealthy_threshold: 5 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: healthcheck ignore_errors: true -- name: delete a instance group +- name: Delete a instance group google.cloud.gcp_compute_instance_group: name: instancegroup-urlmap zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: instancegroup ignore_errors: true diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_url_map/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_url_map/tasks/main.yml index 45d6e4917..fe47378c2 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_url_map/tasks/main.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_url_map/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_vpn_tunnel/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_vpn_tunnel/tasks/autogen.yml index 21c4c6933..79d4e0550 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_vpn_tunnel/tasks/autogen.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_vpn_tunnel/tasks/autogen.yml @@ -13,34 +13,34 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: create a address +- name: Create a address google.cloud.gcp_compute_address: name: address region: us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: address -- name: create a forward address +- name: Create a forward address google.cloud.gcp_compute_address: name: address-forwardingrule region: us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: address_forwardingrule -- name: create a network +- name: Create a network google.cloud.gcp_compute_network: name: network-vpn-tunnel project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" auto_create_subnetworks: true state: present register: network -- name: create a disk +- name: Create a disk google.cloud.gcp_compute_disk: name: "{{ resource_prefix }}" size_gb: 50 @@ -48,39 +48,39 @@ zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: disk -- name: create a instance +- name: Create a instance google.cloud.gcp_compute_instance: name: "{{ resource_name }}" machine_type: n1-standard-1 disks: - - auto_delete: 'true' - boot: 'true' - source: "{{ disk }}" - - auto_delete: 'true' - interface: NVME - type: SCRATCH - initialize_params: - disk_type: local-ssd + - auto_delete: "true" + boot: "true" + source: "{{ disk }}" + - auto_delete: "true" + interface: NVME + type: SCRATCH + initialize_params: + disk_type: local-ssd metadata: - cost-center: '12345' + cost-center: "12345" labels: environment: production network_interfaces: - - network: "{{ network }}" - access_configs: - - name: External NAT - nat_ip: "{{ address }}" - type: ONE_TO_ONE_NAT + - network: "{{ network }}" + access_configs: + - name: External NAT + nat_ip: "{{ address }}" + type: ONE_TO_ONE_NAT zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: create a router +- name: Create a router google.cloud.gcp_compute_router: name: router-vpn-tunnel network: "{{ network }}" @@ -88,27 +88,27 @@ asn: 64514 advertise_mode: CUSTOM advertised_groups: - - ALL_SUBNETS + - ALL_SUBNETS advertised_ip_ranges: - - range: 1.2.3.4 - - range: 6.7.0.0/16 + - range: 1.2.3.4 + - range: 6.7.0.0/16 region: us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: router -- name: create a target vpn gateway +- name: Create a target vpn gateway google.cloud.gcp_compute_target_vpn_gateway: name: gateway-vpn-tunnel region: us-central1 network: "{{ network }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: gateway -- name: create a forwarding rule +- name: Create a forwarding rule google.cloud.gcp_compute_forwarding_rule: name: "{{ resource_name }}" region: us-central1 @@ -117,10 +117,10 @@ ip_address: "{{ address_forwardingrule.address }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: create a UDP-500 forwarding rule +- name: Create a UDP-500 forwarding rule google.cloud.gcp_compute_forwarding_rule: name: "{{ resource_name }}-udp" region: us-central1 @@ -130,10 +130,10 @@ ip_address: "{{ address_forwardingrule.address }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: create a UDP-4500 forwarding rule +- name: Create a UDP-4500 forwarding rule google.cloud.gcp_compute_forwarding_rule: name: "{{ resource_name }}-udp-4500" region: us-central1 @@ -143,10 +143,10 @@ ip_address: "{{ address_forwardingrule.address }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: delete a vpn tunnel +- name: Delete a vpn tunnel google.cloud.gcp_compute_vpn_tunnel: name: "{{ resource_name }}" region: us-central1 @@ -155,11 +155,11 @@ shared_secret: super secret project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - peer_ip: "{{address.address}}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + peer_ip: "{{ address.address }}" state: absent #---------------------------------------------------------- -- name: create a vpn tunnel +- name: Create a vpn tunnel google.cloud.gcp_compute_vpn_tunnel: name: "{{ resource_name }}" region: us-central1 @@ -168,101 +168,101 @@ shared_secret: super secret project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - peer_ip: "{{address.address}}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + peer_ip: "{{ address.address }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that vpn_tunnel was created +- name: Verify that vpn_tunnel was created google.cloud.gcp_compute_vpn_tunnel_info: - filters: - - name = {{ resource_name }} - region: us-central1 - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + region: us-central1 + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 1 # ---------------------------------------------------------------------------- -- name: create a vpn tunnel that already exists +- name: Create a vpn tunnel that already exists google.cloud.gcp_compute_vpn_tunnel: name: "{{ resource_name }}" region: us-central1 target_vpn_gateway: "{{ gateway }}" router: "{{ router }}" - peer_ip: "{{address.address}}" + peer_ip: "{{ address.address }}" shared_secret: super secret project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a vpn tunnel +- name: Delete a vpn tunnel google.cloud.gcp_compute_vpn_tunnel: name: "{{ resource_name }}" region: us-central1 target_vpn_gateway: "{{ gateway }}" router: "{{ router }}" - peer_ip: "{{address.address}}" + peer_ip: "{{ address.address }}" shared_secret: super secret project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that vpn_tunnel was deleted +- name: Verify that vpn_tunnel was deleted google.cloud.gcp_compute_vpn_tunnel_info: - filters: - - name = {{ resource_name }} - region: us-central1 - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/compute + filters: + - name = {{ resource_name }} + region: us-central1 + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/compute register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 0 # ---------------------------------------------------------------------------- -- name: delete a vpn tunnel that does not exist +- name: Delete a vpn tunnel that does not exist google.cloud.gcp_compute_vpn_tunnel: name: "{{ resource_name }}" region: us-central1 target_vpn_gateway: "{{ gateway }}" router: "{{ router }}" - peer_ip: "{{address.address}}" + peer_ip: "{{ address.address }}" shared_secret: super secret project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #--------------------------------------------------------- # Post-test teardown -- name: delete a UDP-4500 forwarding rule +- name: Delete a UDP-4500 forwarding rule google.cloud.gcp_compute_forwarding_rule: name: "{{ resource_name }}-udp-4500" region: us-central1 @@ -272,11 +272,11 @@ ip_address: "{{ address.address }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent ignore_errors: true register: result -- name: delete a UDP forwarding rule +- name: Delete a UDP forwarding rule google.cloud.gcp_compute_forwarding_rule: name: "{{ resource_name }}-udp" region: us-central1 @@ -286,36 +286,36 @@ ip_address: "{{ address.address }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent ignore_errors: true register: result -- name: delete a forwarding rule +- name: Delete a forwarding rule google.cloud.gcp_compute_forwarding_rule: name: "{{ resource_name }}" region: us-central1 target: "{{ gateway.selfLink }}" ip_protocol: ESP - ip_address: "104.197.5.203" + ip_address: 104.197.5.203 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent ignore_errors: true register: result # If errors happen, don't crash the playbook! -- name: delete a target vpn gateway +- name: Delete a target vpn gateway google.cloud.gcp_compute_target_vpn_gateway: name: gateway-vpn-tunnel region: us-central1 network: "{{ network }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: gateway ignore_errors: true -- name: delete a router +- name: Delete a router google.cloud.gcp_compute_router: name: router-vpn-tunnel network: "{{ network }}" @@ -323,46 +323,46 @@ asn: 64514 advertise_mode: CUSTOM advertised_groups: - - ALL_SUBNETS + - ALL_SUBNETS advertised_ip_ranges: - - range: 1.2.3.4 - - range: 6.7.0.0/16 + - range: 1.2.3.4 + - range: 6.7.0.0/16 region: us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: router ignore_errors: true -- name: delete a instance +- name: Delete a instance google.cloud.gcp_compute_instance: name: "{{ resource_name }}" machine_type: n1-standard-1 disks: - - auto_delete: 'true' - boot: 'true' - source: "{{ disk }}" - - auto_delete: 'true' - interface: NVME - type: SCRATCH - initialize_params: - disk_type: local-ssd + - auto_delete: "true" + boot: "true" + source: "{{ disk }}" + - auto_delete: "true" + interface: NVME + type: SCRATCH + initialize_params: + disk_type: local-ssd metadata: - cost-center: '12345' + cost-center: "12345" labels: environment: production network_interfaces: - - network: "{{ network }}" - access_configs: - - name: External NAT - nat_ip: "{{ address }}" - type: ONE_TO_ONE_NAT + - network: "{{ network }}" + access_configs: + - name: External NAT + nat_ip: "{{ address }}" + type: ONE_TO_ONE_NAT zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent -- name: delete a disk +- name: Delete a disk google.cloud.gcp_compute_disk: name: "{{ resource_prefix }}" size_gb: 50 @@ -370,27 +370,27 @@ zone: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: disk ignore_errors: true -- name: delete a network +- name: Delete a network google.cloud.gcp_compute_network: name: network-vpn-tunnel project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" auto_create_subnetworks: true state: absent register: network ignore_errors: true -- name: delete a address +- name: Delete a address google.cloud.gcp_compute_address: name: address region: us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: address - ignore_errors: true
\ No newline at end of file + ignore_errors: true diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_vpn_tunnel/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_vpn_tunnel/tasks/main.yml index 45d6e4917..fe47378c2 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_vpn_tunnel/tasks/main.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_vpn_tunnel/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_container_cluster/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_container_cluster/tasks/autogen.yml index b8dedbe86..4a845eac0 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_container_cluster/tasks/autogen.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_container_cluster/tasks/autogen.yml @@ -13,7 +13,7 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: delete a cluster +- name: Delete a cluster google.cloud.gcp_container_cluster: name: my-cluster initial_node_count: 2 @@ -22,11 +22,11 @@ disk_size_gb: 500 location: us-central1-a project: "{{ gcp_project }}" - auth_kind: "serviceaccount" - service_account_file: "{{ gcp_cred_file }}" + auth_kind: serviceaccount + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a cluster +- name: Create a cluster google.cloud.gcp_container_cluster: name: my-cluster initial_node_count: 2 @@ -35,29 +35,29 @@ disk_size_gb: 500 location: us-central1-a project: "{{ gcp_project }}" - auth_kind: "serviceaccount" - service_account_file: "{{ gcp_cred_file }}" + auth_kind: serviceaccount + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that cluster was created +- name: Verify that cluster was created google.cloud.gcp_container_cluster_info: - location: us-central1-a - project: "{{ gcp_project }}" - auth_kind: "serviceaccount" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/cloud-platform + location: us-central1-a + project: "{{ gcp_project }}" + auth_kind: serviceaccount + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/cloud-platform register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - "'my-cluster' in \"{{ results['resources'] | map(attribute='name') | list }}\"" # ---------------------------------------------------------------------------- -- name: create a cluster that already exists +- name: Create a cluster that already exists google.cloud.gcp_container_cluster: name: my-cluster initial_node_count: 2 @@ -66,16 +66,16 @@ disk_size_gb: 500 location: us-central1-a project: "{{ gcp_project }}" - auth_kind: "serviceaccount" - service_account_file: "{{ gcp_cred_file }}" + auth_kind: serviceaccount + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a cluster +- name: Delete a cluster google.cloud.gcp_container_cluster: name: my-cluster initial_node_count: 2 @@ -84,29 +84,29 @@ disk_size_gb: 500 location: us-central1-a project: "{{ gcp_project }}" - auth_kind: "serviceaccount" - service_account_file: "{{ gcp_cred_file }}" + auth_kind: serviceaccount + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that cluster was deleted +- name: Verify that cluster was deleted google.cloud.gcp_container_cluster_info: - location: us-central1-a - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/cloud-platform + location: us-central1-a + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/cloud-platform register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - "'my-cluster' not in \"{{ results['resources'] | map(attribute='name') | list }}\"" # ---------------------------------------------------------------------------- -- name: delete a cluster that does not exist +- name: Delete a cluster that does not exist google.cloud.gcp_container_cluster: name: my-cluster initial_node_count: 2 @@ -115,11 +115,11 @@ disk_size_gb: 500 location: us-central1-a project: "{{ gcp_project }}" - auth_kind: "serviceaccount" - service_account_file: "{{ gcp_cred_file }}" + auth_kind: serviceaccount + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_container_cluster/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_container_cluster/tasks/main.yml index 45d6e4917..fe47378c2 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_container_cluster/tasks/main.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_container_cluster/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_container_node_pool/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_container_node_pool/tasks/autogen.yml index e45251570..ae04f3049 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_container_node_pool/tasks/autogen.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_container_node_pool/tasks/autogen.yml @@ -13,17 +13,17 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: create a cluster +- name: Create a cluster google.cloud.gcp_container_cluster: name: cluster-nodepool initial_node_count: 4 location: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: cluster -- name: delete a node pool +- name: Delete a node pool google.cloud.gcp_container_node_pool: name: my-pool initial_node_count: 4 @@ -31,10 +31,10 @@ location: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a node pool +- name: Create a node pool google.cloud.gcp_container_node_pool: name: my-pool initial_node_count: 4 @@ -42,29 +42,29 @@ location: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that node_pool was created +- name: Verify that node_pool was created google.cloud.gcp_container_node_pool_info: - cluster: "{{ cluster }}" - location: us-central1-a - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/cloud-platform + cluster: "{{ cluster }}" + location: us-central1-a + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/cloud-platform register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - "'my-pool' in \"{{ results['resources'] | map(attribute='name') | list }}\"" # ---------------------------------------------------------------------------- -- name: create a node pool that already exists +- name: Create a node pool that already exists google.cloud.gcp_container_node_pool: name: my-pool initial_node_count: 4 @@ -72,15 +72,15 @@ location: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a node pool +- name: Delete a node pool google.cloud.gcp_container_node_pool: name: my-pool initial_node_count: 4 @@ -88,29 +88,29 @@ location: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that node_pool was deleted +- name: Verify that node_pool was deleted google.cloud.gcp_container_node_pool_info: - cluster: "{{ cluster }}" - location: us-central1-a - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/cloud-platform + cluster: "{{ cluster }}" + location: us-central1-a + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/cloud-platform register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - "'my-pool' not in \"{{ results['resources'] | map(attribute='name') | list }}\"" # ---------------------------------------------------------------------------- -- name: delete a node pool that does not exist +- name: Delete a node pool that does not exist google.cloud.gcp_container_node_pool: name: my-pool initial_node_count: 4 @@ -118,24 +118,24 @@ location: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #--------------------------------------------------------- # Post-test teardown # If errors happen, don't crash the playbook! -- name: delete a cluster +- name: Delete a cluster google.cloud.gcp_container_cluster: name: cluster-nodepool initial_node_count: 4 location: us-central1-a project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: cluster ignore_errors: true diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_container_node_pool/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_container_node_pool/tasks/main.yml index 45d6e4917..fe47378c2 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_container_node_pool/tasks/main.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_container_node_pool/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_dns_managed_zone/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_dns_managed_zone/tasks/autogen.yml index 9c73f7714..2e7b2bfbe 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_dns_managed_zone/tasks/autogen.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_dns_managed_zone/tasks/autogen.yml @@ -13,98 +13,98 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: delete a managed zone +- name: Delete a managed zone google.cloud.gcp_dns_managed_zone: name: "{{ resource_name }}" dns_name: test.somewild2.example.com. description: test zone project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a managed zone +- name: Create a managed zone google.cloud.gcp_dns_managed_zone: name: "{{ resource_name }}" dns_name: test.somewild2.example.com. description: test zone project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that managed_zone was created +- name: Verify that managed_zone was created google.cloud.gcp_dns_managed_zone_info: - dns_name: test.somewild2.example.com. - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/ndev.clouddns.readwrite + dns_name: test.somewild2.example.com. + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/ndev.clouddns.readwrite register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 1 # ---------------------------------------------------------------------------- -- name: create a managed zone that already exists +- name: Create a managed zone that already exists google.cloud.gcp_dns_managed_zone: name: "{{ resource_name }}" dns_name: test.somewild2.example.com. description: test zone project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a managed zone +- name: Delete a managed zone google.cloud.gcp_dns_managed_zone: name: "{{ resource_name }}" dns_name: test.somewild2.example.com. description: test zone project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that managed_zone was deleted +- name: Verify that managed_zone was deleted google.cloud.gcp_dns_managed_zone_info: - dns_name: test.somewild2.example.com. - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/ndev.clouddns.readwrite + dns_name: test.somewild2.example.com. + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/ndev.clouddns.readwrite register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | length == 0 # ---------------------------------------------------------------------------- -- name: delete a managed zone that does not exist +- name: Delete a managed zone that does not exist google.cloud.gcp_dns_managed_zone: name: "{{ resource_name }}" dns_name: test.somewild2.example.com. description: test zone project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_dns_managed_zone/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_dns_managed_zone/tasks/main.yml index 45d6e4917..fe47378c2 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_dns_managed_zone/tasks/main.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_dns_managed_zone/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_dns_resource_record_set/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_dns_resource_record_set/tasks/autogen.yml index a2b4d340e..67fe3e328 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_dns_resource_record_set/tasks/autogen.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_dns_resource_record_set/tasks/autogen.yml @@ -13,142 +13,142 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: create a managed zone +- name: Create a managed zone google.cloud.gcp_dns_managed_zone: name: managedzone-rrs dns_name: testzone-4.com. description: test zone project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: managed_zone -- name: delete a resource record set +- name: Delete a resource record set google.cloud.gcp_dns_resource_record_set: name: www.testzone-4.com. managed_zone: "{{ managed_zone }}" type: A ttl: 600 target: - - 10.1.2.3 - - 40.5.6.7 + - 10.1.2.3 + - 40.5.6.7 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a resource record set +- name: Create a resource record set google.cloud.gcp_dns_resource_record_set: name: www.testzone-4.com. managed_zone: "{{ managed_zone }}" type: A ttl: 600 target: - - 10.1.2.3 - - 40.5.6.7 + - 10.1.2.3 + - 40.5.6.7 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that resource_record_set was created +- name: Verify that resource_record_set was created google.cloud.gcp_dns_resource_record_set_info: - managed_zone: "{{ managed_zone }}" - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/ndev.clouddns.readwrite + managed_zone: "{{ managed_zone }}" + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/ndev.clouddns.readwrite register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - "'www.testzone-4.com.'in \"{{ results['resources'] | map(attribute='name') | list }}\"" # ---------------------------------------------------------------------------- -- name: create a resource record set that already exists +- name: Create a resource record set that already exists google.cloud.gcp_dns_resource_record_set: name: www.testzone-4.com. managed_zone: "{{ managed_zone }}" type: A ttl: 600 target: - - 10.1.2.3 - - 40.5.6.7 + - 10.1.2.3 + - 40.5.6.7 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a resource record set +- name: Delete a resource record set google.cloud.gcp_dns_resource_record_set: name: www.testzone-4.com. managed_zone: "{{ managed_zone }}" type: A ttl: 600 target: - - 10.1.2.3 - - 40.5.6.7 + - 10.1.2.3 + - 40.5.6.7 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that resource_record_set was deleted +- name: Verify that resource_record_set was deleted google.cloud.gcp_dns_resource_record_set_info: - managed_zone: "{{ managed_zone }}" - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/ndev.clouddns.readwrite + managed_zone: "{{ managed_zone }}" + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/ndev.clouddns.readwrite register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - "'www.testzone-4.com.'not in \"{{ results['resources'] | map(attribute='name') | list }}\"" # ---------------------------------------------------------------------------- -- name: delete a resource record set that does not exist +- name: Delete a resource record set that does not exist google.cloud.gcp_dns_resource_record_set: name: www.testzone-4.com. managed_zone: "{{ managed_zone }}" type: A ttl: 600 target: - - 10.1.2.3 - - 40.5.6.7 + - 10.1.2.3 + - 40.5.6.7 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #--------------------------------------------------------- # Post-test teardown # If errors happen, don't crash the playbook! -- name: delete a managed zone +- name: Delete a managed zone google.cloud.gcp_dns_managed_zone: name: managedzone-rrs dns_name: testzone-4.com. description: test zone project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: managed_zone ignore_errors: true diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_dns_resource_record_set/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_dns_resource_record_set/tasks/main.yml index 45d6e4917..fe47378c2 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_dns_resource_record_set/tasks/main.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_dns_resource_record_set/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_filestore_instance/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_filestore_instance/tasks/autogen.yml index 9617679b3..20a7bde7c 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_filestore_instance/tasks/autogen.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_filestore_instance/tasks/autogen.yml @@ -13,133 +13,133 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: delete a instance +- name: Delete a instance google.cloud.gcp_filestore_instance: name: "{{ resource_name }}" zone: us-central1-b tier: PREMIUM file_shares: - - capacity_gb: 2660 - name: share1 + - capacity_gb: 2660 + name: share1 networks: - - network: default - modes: - - MODE_IPV4 + - network: default + modes: + - MODE_IPV4 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a instance +- name: Create a instance google.cloud.gcp_filestore_instance: name: "{{ resource_name }}" zone: us-central1-b tier: PREMIUM file_shares: - - capacity_gb: 2660 - name: share1 + - capacity_gb: 2660 + name: share1 networks: - - network: default - modes: - - MODE_IPV4 + - network: default + modes: + - MODE_IPV4 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that instance was created +- name: Verify that instance was created google.cloud.gcp_filestore_instance_info: - zone: us-central1-b - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/cloud-platform + zone: us-central1-b + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/cloud-platform register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | map(attribute='name') | select("match", ".*{{ resource_name }}.*") | list | length == 1 # ---------------------------------------------------------------------------- -- name: create a instance that already exists +- name: Create a instance that already exists google.cloud.gcp_filestore_instance: name: "{{ resource_name }}" zone: us-central1-b tier: PREMIUM file_shares: - - capacity_gb: 2660 - name: share1 + - capacity_gb: 2660 + name: share1 networks: - - network: default - modes: - - MODE_IPV4 + - network: default + modes: + - MODE_IPV4 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a instance +- name: Delete a instance google.cloud.gcp_filestore_instance: name: "{{ resource_name }}" zone: us-central1-b tier: PREMIUM file_shares: - - capacity_gb: 2660 - name: share1 + - capacity_gb: 2660 + name: share1 networks: - - network: default - modes: - - MODE_IPV4 + - network: default + modes: + - MODE_IPV4 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that instance was deleted +- name: Verify that instance was deleted google.cloud.gcp_filestore_instance_info: - zone: us-central1-b - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/cloud-platform + zone: us-central1-b + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/cloud-platform register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | map(attribute='name') | select("match", ".*{{ resource_name }}.*") | list | length == 0 # ---------------------------------------------------------------------------- -- name: delete a instance that does not exist +- name: Delete a instance that does not exist google.cloud.gcp_filestore_instance: name: "{{ resource_name }}" zone: us-central1-b tier: PREMIUM file_shares: - - capacity_gb: 2660 - name: share1 + - capacity_gb: 2660 + name: share1 networks: - - network: default - modes: - - MODE_IPV4 + - network: default + modes: + - MODE_IPV4 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_filestore_instance/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_filestore_instance/tasks/main.yml index 45d6e4917..fe47378c2 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_filestore_instance/tasks/main.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_filestore_instance/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_iam_role/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_iam_role/tasks/autogen.yml index b78a3dff2..d4afe3579 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_iam_role/tasks/autogen.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_iam_role/tasks/autogen.yml @@ -13,136 +13,136 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: delete a role +- name: Delete a role google.cloud.gcp_iam_role: name: "{{ resource_prefix[0:30].replace('-', '_') }}" title: My Custom Role description: My custom role description included_permissions: - - iam.roles.list - - iam.roles.create - - iam.roles.delete + - iam.roles.list + - iam.roles.create + - iam.roles.delete project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a role +- name: Create a role google.cloud.gcp_iam_role: name: "{{ resource_prefix[0:30].replace('-', '_') }}" title: My Custom Role description: My custom role description included_permissions: - - iam.roles.list - - iam.roles.create - - iam.roles.delete + - iam.roles.list + - iam.roles.create + - iam.roles.delete project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that role was created +- name: Verify that role was created google.cloud.gcp_iam_role_info: - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/iam + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/iam register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | map(attribute='name') | select("match", ".*{{ resource_prefix[0:30].replace('-', '_') }}.*") | list | length == 1 # ---------------------------------------------------------------------------- -- name: create a role that already exists +- name: Create a role that already exists google.cloud.gcp_iam_role: name: "{{ resource_prefix[0:30].replace('-', '_') }}" title: My Custom Role description: My custom role description included_permissions: - - iam.roles.list - - iam.roles.create - - iam.roles.delete + - iam.roles.list + - iam.roles.create + - iam.roles.delete project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false # ---------------------------------------------------------------------------- -- name: modify an IAM role that already exists +- name: Modify an IAM role that already exists google.cloud.gcp_iam_role: name: "{{ resource_prefix[0:30].replace('-', '_') }}" title: My Custom Role description: My custom role description included_permissions: - - storage.buckets.get - - storage.buckets.list - - storage.objects.get - - storage.objects.list + - storage.buckets.get + - storage.buckets.list + - storage.objects.get + - storage.objects.list project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true #---------------------------------------------------------- -- name: delete a role +- name: Delete a role google.cloud.gcp_iam_role: name: "{{ resource_prefix[0:30].replace('-', '_') }}" title: My Custom Role description: My custom role description included_permissions: - - iam.roles.list - - iam.roles.create - - iam.roles.delete + - iam.roles.list + - iam.roles.create + - iam.roles.delete project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that role was deleted +- name: Verify that role was deleted google.cloud.gcp_iam_role_info: - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/iam + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/iam register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | map(attribute='name') | select("match", ".*{{ resource_prefix[0:30].replace('-', '_') }}.*") | list | length == 0 # ---------------------------------------------------------------------------- -- name: delete a role that does not exist +- name: Delete a role that does not exist google.cloud.gcp_iam_role: name: "{{ resource_prefix[0:30].replace('-', '_') }}" title: My Custom Role description: My custom role description included_permissions: - - iam.roles.list - - iam.roles.create - - iam.roles.delete + - iam.roles.list + - iam.roles.create + - iam.roles.delete project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_iam_role/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_iam_role/tasks/main.yml index 45d6e4917..fe47378c2 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_iam_role/tasks/main.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_iam_role/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_iam_service_account/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_iam_service_account/tasks/autogen.yml index 367c9d8b9..9a4106dc8 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_iam_service_account/tasks/autogen.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_iam_service_account/tasks/autogen.yml @@ -13,91 +13,93 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: delete a service account +- name: Delete a service account google.cloud.gcp_iam_service_account: name: service-{{ resource_name.split("-")[-1] }}@{{ gcp_project }}.iam.gserviceaccount.com display_name: My Ansible test key project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a service account +- name: Create a service account google.cloud.gcp_iam_service_account: name: service-{{ resource_name.split("-")[-1] }}@{{ gcp_project }}.iam.gserviceaccount.com display_name: My Ansible test key project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that service_account was created +- name: Verify that service_account was created google.cloud.gcp_iam_service_account_info: - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/iam + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/iam register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - - results['resources'] | map(attribute='name') | select("match", ".*service-{{ resource_name.split("-")[-1] }}@{{ gcp_project }}.iam.gserviceaccount.com.*") | list | length == 1 + - results['resources'] | map(attribute='name') | select("match", ".*service-{{ resource_name.split("-")[-1] }}@{{ gcp_project }}.iam.gserviceaccount.com.*") + | list | length == 1 # ---------------------------------------------------------------------------- -- name: create a service account that already exists +- name: Create a service account that already exists google.cloud.gcp_iam_service_account: name: service-{{ resource_name.split("-")[-1] }}@{{ gcp_project }}.iam.gserviceaccount.com display_name: My Ansible test key project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a service account +- name: Delete a service account google.cloud.gcp_iam_service_account: name: service-{{ resource_name.split("-")[-1] }}@{{ gcp_project }}.iam.gserviceaccount.com display_name: My Ansible test key project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that service_account was deleted +- name: Verify that service_account was deleted google.cloud.gcp_iam_service_account_info: - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/iam + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/iam register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - - results['resources'] | map(attribute='name') | select("match", ".*service-{{ resource_name.split("-")[-1] }}@{{ gcp_project }}.iam.gserviceaccount.com.*") | list | length == 0 + - results['resources'] | map(attribute='name') | select("match", ".*service-{{ resource_name.split("-")[-1] }}@{{ gcp_project }}.iam.gserviceaccount.com.*") + | list | length == 0 # ---------------------------------------------------------------------------- -- name: delete a service account that does not exist +- name: Delete a service account that does not exist google.cloud.gcp_iam_service_account: name: service-{{ resource_name.split("-")[-1] }}@{{ gcp_project }}.iam.gserviceaccount.com display_name: My Ansible test key project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_iam_service_account/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_iam_service_account/tasks/main.yml index 45d6e4917..fe47378c2 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_iam_service_account/tasks/main.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_iam_service_account/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_iam_service_account_key/defaults/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_iam_service_account_key/defaults/main.yml index aa87a2a8e..aa65c31f5 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_iam_service_account_key/defaults/main.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_iam_service_account_key/defaults/main.yml @@ -1,3 +1,3 @@ --- # defaults file -resource_name: '{{resource_prefix}}' +resource_name: "{{ resource_prefix }}" diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_kms_crypto_key/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_kms_crypto_key/tasks/autogen.yml index ef2252c86..0e270778a 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_kms_crypto_key/tasks/autogen.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_kms_crypto_key/tasks/autogen.yml @@ -13,61 +13,61 @@ --- # Pre-test setup -- name: create a key ring - gcp_kms_key_ring: +- name: Create a key ring + google.cloud.gcp_kms_key_ring: name: key-key-ring location: us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: keyring -- name: delete a crypto key - gcp_kms_crypto_key: +- name: Delete a crypto key + google.cloud.gcp_kms_crypto_key: name: "{{ resource_name }}" key_ring: projects/{{ gcp_project }}/locations/us-central1/keyRings/key-key-ring project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a crypto key - gcp_kms_crypto_key: +- name: Create a crypto key + google.cloud.gcp_kms_crypto_key: name: "{{ resource_name }}" key_ring: projects/{{ gcp_project }}/locations/us-central1/keyRings/key-key-ring project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that crypto_key was created - gcp_kms_crypto_key_info: - key_ring: "projects/{{ gcp_project }}/locations/us-central1/keyRings/key-key-ring" - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/cloudkms +- name: Verify that crypto_key was created + google.cloud.gcp_kms_crypto_key_info: + key_ring: projects/{{ gcp_project }}/locations/us-central1/keyRings/key-key-ring + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/cloudkms register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | map(attribute='name') | select("match", ".*{{ resource_name }}.*") | list | length == 1 # ---------------------------------------------------------------------------- -- name: create a crypto key that already exists - gcp_kms_crypto_key: +- name: Create a crypto key that already exists + google.cloud.gcp_kms_crypto_key: name: "{{ resource_name }}" key_ring: projects/{{ gcp_project }}/locations/us-central1/keyRings/key-key-ring project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_kms_crypto_key/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_kms_crypto_key/tasks/main.yml index 45d6e4917..fe47378c2 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_kms_crypto_key/tasks/main.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_kms_crypto_key/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_kms_key_ring/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_kms_key_ring/tasks/autogen.yml index 34999ab1b..b0af43c17 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_kms_key_ring/tasks/autogen.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_kms_key_ring/tasks/autogen.yml @@ -1,3 +1,4 @@ +--- # Copyright 2019 Google Inc. # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. @@ -12,52 +13,52 @@ # limitations under the License. # Pre-test setup -- name: delete a key ring - gcp_kms_key_ring: +- name: Delete a key ring + google.cloud.gcp_kms_key_ring: name: "{{ resource_name }}" location: us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a key ring - gcp_kms_key_ring: +- name: Create a key ring + google.cloud.gcp_kms_key_ring: name: "{{ resource_name }}" location: us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that key_ring was created - gcp_kms_key_ring_info: - location: us-central1 - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/cloudkms +- name: Verify that key_ring was created + google.cloud.gcp_kms_key_ring_info: + location: us-central1 + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/cloudkms register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | map(attribute='name') | select("match", ".*{{ resource_name }}.*") | list | length == 1 # ---------------------------------------------------------------------------- -- name: create a key ring that already exists - gcp_kms_key_ring: +- name: Create a key ring that already exists + google.cloud.gcp_kms_key_ring: name: "{{ resource_name }}" location: us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_kms_key_ring/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_kms_key_ring/tasks/main.yml index 45d6e4917..fe47378c2 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_kms_key_ring/tasks/main.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_kms_key_ring/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_logging_metric/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_logging_metric/tasks/autogen.yml index bc4de15cc..90a77b05c 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_logging_metric/tasks/autogen.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_logging_metric/tasks/autogen.yml @@ -13,18 +13,18 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: delete a metric +- name: Delete a metric google.cloud.gcp_logging_metric: name: "{{ resource_name }}" filter: resource.type=gae_app AND severity>=ERROR metric_descriptor: metric_kind: DELTA value_type: DISTRIBUTION - unit: '1' + unit: "1" labels: - - key: mass - value_type: STRING - description: amount of matter + - key: mass + value_type: STRING + description: amount of matter value_extractor: EXTRACT(jsonPayload.request) label_extractors: mass: EXTRACT(jsonPayload.request) @@ -35,21 +35,21 @@ offset: 1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a metric +- name: Create a metric google.cloud.gcp_logging_metric: name: "{{ resource_name }}" filter: resource.type=gae_app AND severity>=ERROR metric_descriptor: metric_kind: DELTA value_type: DISTRIBUTION - unit: '1' + unit: "1" labels: - - key: mass - value_type: STRING - description: amount of matter + - key: mass + value_type: STRING + description: amount of matter value_extractor: EXTRACT(jsonPayload.request) label_extractors: mass: EXTRACT(jsonPayload.request) @@ -60,38 +60,38 @@ offset: 1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that metric was created +- name: Verify that metric was created google.cloud.gcp_logging_metric_info: - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/cloud-platform + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/cloud-platform register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | map(attribute='name') | select("match", ".*{{ resource_name }}.*") | list | length == 1 # ---------------------------------------------------------------------------- -- name: create a metric that already exists +- name: Create a metric that already exists google.cloud.gcp_logging_metric: name: "{{ resource_name }}" filter: resource.type=gae_app AND severity>=ERROR metric_descriptor: metric_kind: DELTA value_type: DISTRIBUTION - unit: '1' + unit: "1" labels: - - key: mass - value_type: STRING - description: amount of matter + - key: mass + value_type: STRING + description: amount of matter value_extractor: EXTRACT(jsonPayload.request) label_extractors: mass: EXTRACT(jsonPayload.request) @@ -102,26 +102,26 @@ offset: 1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a metric +- name: Delete a metric google.cloud.gcp_logging_metric: name: "{{ resource_name }}" filter: resource.type=gae_app AND severity>=ERROR metric_descriptor: metric_kind: DELTA value_type: DISTRIBUTION - unit: '1' + unit: "1" labels: - - key: mass - value_type: STRING - description: amount of matter + - key: mass + value_type: STRING + description: amount of matter value_extractor: EXTRACT(jsonPayload.request) label_extractors: mass: EXTRACT(jsonPayload.request) @@ -132,38 +132,38 @@ offset: 1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that metric was deleted +- name: Verify that metric was deleted google.cloud.gcp_logging_metric_info: - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/cloud-platform + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/cloud-platform register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | map(attribute='name') | select("match", ".*{{ resource_name }}.*") | list | length == 0 # ---------------------------------------------------------------------------- -- name: delete a metric that does not exist +- name: Delete a metric that does not exist google.cloud.gcp_logging_metric: name: "{{ resource_name }}" filter: resource.type=gae_app AND severity>=ERROR metric_descriptor: metric_kind: DELTA value_type: DISTRIBUTION - unit: '1' + unit: "1" labels: - - key: mass - value_type: STRING - description: amount of matter + - key: mass + value_type: STRING + description: amount of matter value_extractor: EXTRACT(jsonPayload.request) label_extractors: mass: EXTRACT(jsonPayload.request) @@ -174,10 +174,10 @@ offset: 1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_logging_metric/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_logging_metric/tasks/main.yml index 45d6e4917..fe47378c2 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_logging_metric/tasks/main.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_logging_metric/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_mlengine_model/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_mlengine_model/tasks/autogen.yml index 8b15c3ddb..619a49c1c 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_mlengine_model/tasks/autogen.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_mlengine_model/tasks/autogen.yml @@ -13,101 +13,101 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: delete a model +- name: Delete a model google.cloud.gcp_mlengine_model: name: "{{ resource_name | replace('-', '_') }}" description: My model regions: - - us-central1 + - us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a model +- name: Create a model google.cloud.gcp_mlengine_model: name: "{{ resource_name | replace('-', '_') }}" description: My model regions: - - us-central1 + - us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that model was created +- name: Verify that model was created google.cloud.gcp_mlengine_model_info: - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/cloud-platform + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/cloud-platform register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | map(attribute='name') | select("match", ".*{{ resource_name | replace('-', '_') }}.*") | list | length == 1 # ---------------------------------------------------------------------------- -- name: create a model that already exists +- name: Create a model that already exists google.cloud.gcp_mlengine_model: name: "{{ resource_name | replace('-', '_') }}" description: My model regions: - - us-central1 + - us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a model +- name: Delete a model google.cloud.gcp_mlengine_model: name: "{{ resource_name | replace('-', '_') }}" description: My model regions: - - us-central1 + - us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that model was deleted +- name: Verify that model was deleted google.cloud.gcp_mlengine_model_info: - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/cloud-platform + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/cloud-platform register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | map(attribute='name') | select("match", ".*{{ resource_name | replace('-', '_') }}.*") | list | length == 0 # ---------------------------------------------------------------------------- -- name: delete a model that does not exist +- name: Delete a model that does not exist google.cloud.gcp_mlengine_model: name: "{{ resource_name | replace('-', '_') }}" description: My model regions: - - us-central1 + - us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_mlengine_model/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_mlengine_model/tasks/main.yml index 45d6e4917..fe47378c2 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_mlengine_model/tasks/main.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_mlengine_model/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_mlengine_version/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_mlengine_version/tasks/autogen.yml index 2a9da56fc..d68bad0bc 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_mlengine_version/tasks/autogen.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_mlengine_version/tasks/autogen.yml @@ -13,143 +13,143 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: create a model +- name: Create a model google.cloud.gcp_mlengine_model: name: model_version description: My model regions: - - us-central1 - online_prediction_logging: 'true' - online_prediction_console_logging: 'true' + - us-central1 + online_prediction_logging: "true" + online_prediction_console_logging: "true" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: model -- name: delete a version +- name: Delete a version google.cloud.gcp_mlengine_version: name: "{{ resource_name | replace('-', '_') }}" model: "{{ model }}" runtime_version: 1.13 python_version: 3.5 - is_default: 'true' + is_default: "true" deployment_uri: gs://ansible-cloudml-bucket/ project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a version +- name: Create a version google.cloud.gcp_mlengine_version: name: "{{ resource_name | replace('-', '_') }}" model: "{{ model }}" runtime_version: 1.13 python_version: 3.5 - is_default: 'true' + is_default: "true" deployment_uri: gs://ansible-cloudml-bucket/ project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that version was created +- name: Verify that version was created google.cloud.gcp_mlengine_version_info: - model: "{{ model }}" - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/cloud-platform + model: "{{ model }}" + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/cloud-platform register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | map(attribute='name') | select("match", ".*{{ resource_name | replace('-', '_') }}.*") | list | length == 1 # ---------------------------------------------------------------------------- -- name: create a version that already exists +- name: Create a version that already exists google.cloud.gcp_mlengine_version: name: "{{ resource_name | replace('-', '_') }}" model: "{{ model }}" runtime_version: 1.13 python_version: 3.5 - is_default: 'true' + is_default: "true" deployment_uri: gs://ansible-cloudml-bucket/ project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a version +- name: Delete a version google.cloud.gcp_mlengine_version: name: "{{ resource_name | replace('-', '_') }}" model: "{{ model }}" runtime_version: 1.13 python_version: 3.5 - is_default: 'true' + is_default: "true" deployment_uri: gs://ansible-cloudml-bucket/ project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that version was deleted +- name: Verify that version was deleted google.cloud.gcp_mlengine_version_info: - model: "{{ model }}" - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/cloud-platform + model: "{{ model }}" + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/cloud-platform register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | map(attribute='name') | select("match", ".*{{ resource_name | replace('-', '_') }}.*") | list | length == 0 # ---------------------------------------------------------------------------- -- name: delete a version that does not exist +- name: Delete a version that does not exist google.cloud.gcp_mlengine_version: name: "{{ resource_name | replace('-', '_') }}" model: "{{ model }}" runtime_version: 1.13 python_version: 3.5 - is_default: 'true' + is_default: "true" deployment_uri: gs://ansible-cloudml-bucket/ project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #--------------------------------------------------------- # Post-test teardown # If errors happen, don't crash the playbook! -- name: delete a model +- name: Delete a model google.cloud.gcp_mlengine_model: name: model_version description: My model regions: - - us-central1 - online_prediction_logging: 'true' - online_prediction_console_logging: 'true' + - us-central1 + online_prediction_logging: "true" + online_prediction_console_logging: "true" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: model ignore_errors: true diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_mlengine_version/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_mlengine_version/tasks/main.yml index 45d6e4917..fe47378c2 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_mlengine_version/tasks/main.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_mlengine_version/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_pubsub_subscription/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_pubsub_subscription/tasks/autogen.yml index be5852074..ca78eb436 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_pubsub_subscription/tasks/autogen.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_pubsub_subscription/tasks/autogen.yml @@ -13,116 +13,116 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: create a topic +- name: Create a topic google.cloud.gcp_pubsub_topic: name: topic-subscription project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: topic -- name: delete a subscription +- name: Delete a subscription google.cloud.gcp_pubsub_subscription: name: "{{ resource_name }}" topic: "{{ topic }}" ack_deadline_seconds: 300 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a subscription +- name: Create a subscription google.cloud.gcp_pubsub_subscription: name: "{{ resource_name }}" topic: "{{ topic }}" ack_deadline_seconds: 300 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that subscription was created +- name: Verify that subscription was created google.cloud.gcp_pubsub_subscription_info: - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/pubsub + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/pubsub register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - - "\"{{resource_name}}\" in \"{{ results['resources'] | map(attribute='name') | list }}\"" + - "\"{{ resource_name }}\" in \"{{ results['resources'] | map(attribute='name') | list }}\"" # ---------------------------------------------------------------------------- -- name: create a subscription that already exists +- name: Create a subscription that already exists google.cloud.gcp_pubsub_subscription: name: "{{ resource_name }}" topic: "{{ topic }}" ack_deadline_seconds: 300 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a subscription +- name: Delete a subscription google.cloud.gcp_pubsub_subscription: name: "{{ resource_name }}" topic: "{{ topic }}" ack_deadline_seconds: 300 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that subscription was deleted +- name: Verify that subscription was deleted google.cloud.gcp_pubsub_subscription_info: - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/pubsub + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/pubsub register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - - "\"{{resource_name}}\" not in \"{{ results['resources'] | map(attribute='name') | list }}\"" + - "\"{{ resource_name }}\" not in \"{{ results['resources'] | map(attribute='name') | list }}\"" # ---------------------------------------------------------------------------- -- name: delete a subscription that does not exist +- name: Delete a subscription that does not exist google.cloud.gcp_pubsub_subscription: name: "{{ resource_name }}" topic: "{{ topic }}" ack_deadline_seconds: 300 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #--------------------------------------------------------- # Post-test teardown # If errors happen, don't crash the playbook! -- name: delete a topic +- name: Delete a topic google.cloud.gcp_pubsub_topic: name: topic-subscription project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: topic ignore_errors: true diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_pubsub_subscription/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_pubsub_subscription/tasks/main.yml index 45d6e4917..fe47378c2 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_pubsub_subscription/tasks/main.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_pubsub_subscription/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_pubsub_topic/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_pubsub_topic/tasks/autogen.yml index 5d811a1e0..0c0dbdc96 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_pubsub_topic/tasks/autogen.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_pubsub_topic/tasks/autogen.yml @@ -13,86 +13,86 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: delete a topic +- name: Delete a topic google.cloud.gcp_pubsub_topic: name: test-topic1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a topic +- name: Create a topic google.cloud.gcp_pubsub_topic: name: test-topic1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that topic was created +- name: Verify that topic was created google.cloud.gcp_pubsub_topic_info: - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/pubsub + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/pubsub register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - "'test-topic1' in \"{{ results['resources'] | map(attribute='name') | list }}\"" # ---------------------------------------------------------------------------- -- name: create a topic that already exists +- name: Create a topic that already exists google.cloud.gcp_pubsub_topic: name: test-topic1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a topic +- name: Delete a topic google.cloud.gcp_pubsub_topic: name: test-topic1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that topic was deleted +- name: Verify that topic was deleted google.cloud.gcp_pubsub_topic_info: - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/pubsub + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/pubsub register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - "'test-topic1' not in \"{{ results['resources'] | map(attribute='name') | list }}\"" # ---------------------------------------------------------------------------- -- name: delete a topic that does not exist +- name: Delete a topic that does not exist google.cloud.gcp_pubsub_topic: name: test-topic1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_pubsub_topic/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_pubsub_topic/tasks/main.yml index 45d6e4917..fe47378c2 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_pubsub_topic/tasks/main.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_pubsub_topic/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_redis_instance/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_redis_instance/tasks/autogen.yml index 99805586c..cea48d6b8 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_redis_instance/tasks/autogen.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_redis_instance/tasks/autogen.yml @@ -13,16 +13,16 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: create a network +- name: Create a network google.cloud.gcp_compute_network: name: network-instance project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" auto_create_subnetworks: true state: present register: network -- name: delete a instance +- name: Delete a instance google.cloud.gcp_redis_instance: name: instance37 tier: STANDARD_HA @@ -37,10 +37,10 @@ other_key: other_val project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a instance +- name: Create a instance google.cloud.gcp_redis_instance: name: instance37 tier: STANDARD_HA @@ -55,28 +55,28 @@ other_key: other_val project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that instance was created +- name: Verify that instance was created google.cloud.gcp_redis_instance_info: - region: us-central1 - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/cloud-platform + region: us-central1 + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/cloud-platform register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | map(attribute='name') | select("match", ".*instance37.*") | list | length == 1 # ---------------------------------------------------------------------------- -- name: create a instance that already exists +- name: Create a instance that already exists google.cloud.gcp_redis_instance: name: instance37 tier: STANDARD_HA @@ -91,15 +91,15 @@ other_key: other_val project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a instance +- name: Delete a instance google.cloud.gcp_redis_instance: name: instance37 tier: STANDARD_HA @@ -114,28 +114,28 @@ other_key: other_val project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that instance was deleted +- name: Verify that instance was deleted google.cloud.gcp_redis_instance_info: - region: us-central1 - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/cloud-platform + region: us-central1 + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/cloud-platform register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | map(attribute='name') | select("match", ".*instance37.*") | list | length == 0 # ---------------------------------------------------------------------------- -- name: delete a instance that does not exist +- name: Delete a instance that does not exist google.cloud.gcp_redis_instance: name: instance37 tier: STANDARD_HA @@ -150,22 +150,22 @@ other_key: other_val project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #--------------------------------------------------------- # Post-test teardown # If errors happen, don't crash the playbook! -- name: delete a network +- name: Delete a network google.cloud.gcp_compute_network: name: network-instance project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" auto_create_subnetworks: true state: absent register: network diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_redis_instance/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_redis_instance/tasks/main.yml index 45d6e4917..fe47378c2 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_redis_instance/tasks/main.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_redis_instance/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_resourcemanager_project/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_resourcemanager_project/tasks/autogen.yml index 539b3ace3..5545d0edc 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_resourcemanager_project/tasks/autogen.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_resourcemanager_project/tasks/autogen.yml @@ -13,111 +13,113 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: delete a project +- name: Delete a project google.cloud.gcp_resourcemanager_project: name: "{{ resource_prefix[0:30] }}" id: "{{ resource_prefix[0:30] }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" parent: type: folder id: "{{ gcp_folder_id }}" state: absent #---------------------------------------------------------- -- name: create a project +- name: Create a project google.cloud.gcp_resourcemanager_project: name: "{{ resource_prefix[0:30] }}" id: "{{ resource_prefix[0:30] }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" parent: type: folder id: "{{ gcp_folder_id }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true - name: Pause for 2 minutes for project to appear ansible.builtin.pause: minutes: 2 -- name: verify that project was created +- name: Verify that project was created google.cloud.gcp_resourcemanager_project_info: - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - # choose 1000 projects so iterate past the deleted ones. - page_size: 1000 - scopes: - - https://www.googleapis.com/auth/cloud-platform + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + # choose 1000 projects so iterate past the deleted ones. + page_size: 1000 + scopes: + - https://www.googleapis.com/auth/cloud-platform register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - - results['resources'] | selectattr("lifecycleState", "equalto", "ACTIVE") | map(attribute='name') | select("match", ".*{{ resource_prefix[0:30] }}.*") | list | length == 1 + - results['resources'] | selectattr("lifecycleState", "equalto", "ACTIVE") | map(attribute='name') | select("match", ".*{{ resource_prefix[0:30] }}.*") | list + | length == 1 # ---------------------------------------------------------------------------- -- name: create a project that already exists +- name: Create a project that already exists google.cloud.gcp_resourcemanager_project: name: "{{ resource_prefix[0:30] }}" id: "{{ resource_prefix[0:30] }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" parent: type: folder id: "{{ gcp_folder_id }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a project +- name: Delete a project google.cloud.gcp_resourcemanager_project: name: "{{ resource_prefix[0:30] }}" id: "{{ resource_prefix[0:30] }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" parent: type: folder id: "{{ gcp_folder_id }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true - name: Pause for 2 minutes for project to appear ansible.builtin.pause: minutes: 2 -- name: verify that project was deleted +- name: Verify that project was deleted google.cloud.gcp_resourcemanager_project_info: - project: "{{ resource_prefix[0:30] }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - # choose 1000 projects so iterate past the deleted ones. - page_size: 1000 - scopes: - - https://www.googleapis.com/auth/cloud-platform + project: "{{ resource_prefix[0:30] }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + # choose 1000 projects so iterate past the deleted ones. + page_size: 1000 + scopes: + - https://www.googleapis.com/auth/cloud-platform register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - - results['resources'] | selectattr("lifecycleState", "equalto", "DELETE_REQUESTED") | map(attribute='name') | select("match", ".*{{ resource_prefix[0:30] }}.*") | list | length == 1 + - results['resources'] | selectattr("lifecycleState", "equalto", "DELETE_REQUESTED") | map(attribute='name') | select("match", ".*{{ resource_prefix[0:30] }}.*") + | list | length == 1 # ---------------------------------------------------------------------------- -- name: delete a project that does not exist +- name: Delete a project that does not exist google.cloud.gcp_resourcemanager_project: name: "{{ resource_prefix[0:30] }}" id: "{{ resource_prefix[0:30] }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" parent: type: folder id: "{{ gcp_folder_id }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_resourcemanager_project/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_resourcemanager_project/tasks/main.yml index 45d6e4917..fe47378c2 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_resourcemanager_project/tasks/main.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_resourcemanager_project/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_runtimeconfig_config/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_runtimeconfig_config/tasks/autogen.yml index b14ef65bc..3eebf1be3 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_runtimeconfig_config/tasks/autogen.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_runtimeconfig_config/tasks/autogen.yml @@ -13,91 +13,91 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: delete a config +- name: Delete a config google.cloud.gcp_runtimeconfig_config: name: "{{ resource_name }}" description: My config project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a config +- name: Create a config google.cloud.gcp_runtimeconfig_config: name: "{{ resource_name }}" description: My config project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that config was created +- name: Verify that config was created google.cloud.gcp_runtimeconfig_config_info: - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/cloudruntimeconfig + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/cloudruntimeconfig register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | map(attribute='name') | select("match", ".*{{ resource_name }}.*") | list | length == 1 # ---------------------------------------------------------------------------- -- name: create a config that already exists +- name: Create a config that already exists google.cloud.gcp_runtimeconfig_config: name: "{{ resource_name }}" description: My config project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a config +- name: Delete a config google.cloud.gcp_runtimeconfig_config: name: "{{ resource_name }}" description: My config project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that config was deleted +- name: Verify that config was deleted google.cloud.gcp_runtimeconfig_config_info: - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/cloudruntimeconfig + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/cloudruntimeconfig register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | map(attribute='name') | select("match", ".*{{ resource_name }}.*") | list | length == 0 # ---------------------------------------------------------------------------- -- name: delete a config that does not exist +- name: Delete a config that does not exist google.cloud.gcp_runtimeconfig_config: name: "{{ resource_name }}" description: My config project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_runtimeconfig_config/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_runtimeconfig_config/tasks/main.yml index 45d6e4917..fe47378c2 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_runtimeconfig_config/tasks/main.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_runtimeconfig_config/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_runtimeconfig_variable/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_runtimeconfig_variable/tasks/autogen.yml index fcfefb37a..4a790dcee 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_runtimeconfig_variable/tasks/autogen.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_runtimeconfig_variable/tasks/autogen.yml @@ -13,120 +13,120 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: create a config +- name: Create a config google.cloud.gcp_runtimeconfig_config: name: my-config description: My config project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: config -- name: delete a variable +- name: Delete a variable google.cloud.gcp_runtimeconfig_variable: name: prod-variables/hostname config: my-config text: example.com project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a variable +- name: Create a variable google.cloud.gcp_runtimeconfig_variable: name: prod-variables/hostname config: my-config text: example.com project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that variable was created +- name: Verify that variable was created google.cloud.gcp_runtimeconfig_variable_info: - config: my-config - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/cloudruntimeconfig + config: my-config + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/cloudruntimeconfig register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | map(attribute='name') | select("match", ".*prod-variables/hostname.*") | list | length == 1 # ---------------------------------------------------------------------------- -- name: create a variable that already exists +- name: Create a variable that already exists google.cloud.gcp_runtimeconfig_variable: name: prod-variables/hostname config: my-config text: example.com project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a variable +- name: Delete a variable google.cloud.gcp_runtimeconfig_variable: name: prod-variables/hostname config: my-config text: example.com project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that variable was deleted +- name: Verify that variable was deleted google.cloud.gcp_runtimeconfig_variable_info: - config: my-config - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/cloudruntimeconfig + config: my-config + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/cloudruntimeconfig register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | map(attribute='name') | select("match", ".*prod-variables/hostname.*") | list | length == 0 # ---------------------------------------------------------------------------- -- name: delete a variable that does not exist +- name: Delete a variable that does not exist google.cloud.gcp_runtimeconfig_variable: name: prod-variables/hostname config: my-config text: example.com project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #--------------------------------------------------------- # Post-test teardown # If errors happen, don't crash the playbook! -- name: delete a config +- name: Delete a config google.cloud.gcp_runtimeconfig_config: name: my-config description: My config project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: config ignore_errors: true diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_runtimeconfig_variable/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_runtimeconfig_variable/tasks/main.yml index 45d6e4917..fe47378c2 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_runtimeconfig_variable/tasks/main.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_runtimeconfig_variable/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_serviceusage_service/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_serviceusage_service/tasks/autogen.yml index 6db157360..666da8f6b 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_serviceusage_service/tasks/autogen.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_serviceusage_service/tasks/autogen.yml @@ -13,62 +13,62 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: delete a service +- name: Delete a service google.cloud.gcp_serviceusage_service: - name: spanner.googleapis.com + name: alloydb.googleapis.com project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a service +- name: Create a service google.cloud.gcp_serviceusage_service: - name: spanner.googleapis.com + name: alloydb.googleapis.com project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that service was created +- name: Verify that service was created google.cloud.gcp_serviceusage_service_info: - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/cloud-platform + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/cloud-platform register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - - "'{{ (results['resources'] | selectattr('name', 'search', 'spanner.googleapis.com') | list | first).state }}' == 'ENABLED'" + - "'{{ (results['resources'] | selectattr('name', 'search', 'alloydb.googleapis.com') | list | first).state }}' == 'ENABLED'" # ---------------------------------------------------------------------------- -- name: create a service that already exists +- name: Create a service that already exists google.cloud.gcp_serviceusage_service: - name: spanner.googleapis.com + name: alloydb.googleapis.com project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a service +- name: Delete a service google.cloud.gcp_serviceusage_service: - name: spanner.googleapis.com + name: alloydb.googleapis.com project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true # TODO(@toumorokoshi): investigate if the pause helps @@ -76,28 +76,28 @@ # - name: Pause for 1 minute to keep from hitting quota limit # ansible.builtin.pause: # minutes: 1 -- name: verify that service was deleted +- name: Verify that service was deleted google.cloud.gcp_serviceusage_service_info: - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/cloud-platform + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/cloud-platform register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - - "'{{ (results['resources'] | selectattr('name', 'search', 'spanner.googleapis.com') | list | first).state }}' == 'DISABLED'" + - "'{{ (results['resources'] | selectattr('name', 'search', 'alloydb.googleapis.com') | list | first).state }}' == 'DISABLED'" # ---------------------------------------------------------------------------- -- name: delete a service that does not exist +- name: Delete a service that does not exist google.cloud.gcp_serviceusage_service: - name: spanner.googleapis.com + name: alloydb.googleapis.com project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_serviceusage_service/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_serviceusage_service/tasks/main.yml index 45d6e4917..fe47378c2 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_serviceusage_service/tasks/main.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_serviceusage_service/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_sourcerepo_repository/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_sourcerepo_repository/tasks/autogen.yml index adeff088f..0bc805810 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_sourcerepo_repository/tasks/autogen.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_sourcerepo_repository/tasks/autogen.yml @@ -13,86 +13,86 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: delete a repository +- name: Delete a repository google.cloud.gcp_sourcerepo_repository: name: "{{ resource_name }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a repository +- name: Create a repository google.cloud.gcp_sourcerepo_repository: name: "{{ resource_name }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that repository was created +- name: Verify that repository was created google.cloud.gcp_sourcerepo_repository_info: - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/cloud-platform + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/cloud-platform register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | map(attribute='name') | select("match", ".*{{ resource_name }}.*") | list | length == 1 # ---------------------------------------------------------------------------- -- name: create a repository that already exists +- name: Create a repository that already exists google.cloud.gcp_sourcerepo_repository: name: "{{ resource_name }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a repository +- name: Delete a repository google.cloud.gcp_sourcerepo_repository: name: "{{ resource_name }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that repository was deleted +- name: Verify that repository was deleted google.cloud.gcp_sourcerepo_repository_info: - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/cloud-platform + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/cloud-platform register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | map(attribute='name') | select("match", ".*{{ resource_name }}.*") | list | length == 0 # ---------------------------------------------------------------------------- -- name: delete a repository that does not exist +- name: Delete a repository that does not exist google.cloud.gcp_sourcerepo_repository: name: "{{ resource_name }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_sourcerepo_repository/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_sourcerepo_repository/tasks/main.yml index 45d6e4917..fe47378c2 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_sourcerepo_repository/tasks/main.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_sourcerepo_repository/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_spanner_database/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_spanner_database/tasks/autogen.yml index cf1b808cb..a3aa4cca2 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_spanner_database/tasks/autogen.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_spanner_database/tasks/autogen.yml @@ -13,7 +13,7 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: create a instance +- name: Create a instance google.cloud.gcp_spanner_instance: name: instance-database display_name: My Spanner Instance @@ -23,29 +23,29 @@ config: regional-us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: instance -- name: delete a database +- name: Delete a database google.cloud.gcp_spanner_database: name: webstore instance: "{{ instance }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a database +- name: Create a database google.cloud.gcp_spanner_database: name: webstore instance: "{{ instance }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true # - name: verify that database was created @@ -53,7 +53,7 @@ # instance: "{{ instance }}" # project: "{{ gcp_project }}" # auth_kind: "{{ gcp_cred_kind }}" -# service_account_file: "{{ gcp_cred_file }}" +# service_account_file: "{{ gcp_cred_file | default(omit) }}" # scopes: # - https://www.googleapis.com/auth/spanner.admin # register: results @@ -62,31 +62,31 @@ # that: # - results['resources'] | map(attribute='name') | select("match", ".*webstore.*") | list | length == 1 # ---------------------------------------------------------------------------- -- name: create a database that already exists +- name: Create a database that already exists google.cloud.gcp_spanner_database: name: webstore instance: "{{ instance }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a database +- name: Delete a database google.cloud.gcp_spanner_database: name: webstore instance: "{{ instance }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true # commented out due to a flakey List endpoint @@ -98,7 +98,7 @@ # instance: "{{ instance }}" # project: "{{ gcp_project }}" # auth_kind: "{{ gcp_cred_kind }}" -# service_account_file: "{{ gcp_cred_file }}" +# service_account_file: "{{ gcp_cred_file | default(omit) }}" # scopes: # - https://www.googleapis.com/auth/spanner.admin # register: results @@ -107,23 +107,23 @@ # that: # - results['resources'] | map(attribute='name') | select("match", ".*webstore.*") | list | length == 0 # ---------------------------------------------------------------------------- -- name: delete a database that does not exist +- name: Delete a database that does not exist google.cloud.gcp_spanner_database: name: webstore instance: "{{ instance }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #--------------------------------------------------------- # Post-test teardown # If errors happen, don't crash the playbook! -- name: delete a instance +- name: Delete a instance google.cloud.gcp_spanner_instance: name: instance-database display_name: My Spanner Instance @@ -133,7 +133,7 @@ config: regional-us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: instance ignore_errors: true diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_spanner_database/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_spanner_database/tasks/main.yml index 45d6e4917..fe47378c2 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_spanner_database/tasks/main.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_spanner_database/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_spanner_instance/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_spanner_instance/tasks/autogen.yml index fdf82dda2..daae5c896 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_spanner_instance/tasks/autogen.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_spanner_instance/tasks/autogen.yml @@ -13,7 +13,7 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: delete a instance +- name: Delete a instance google.cloud.gcp_spanner_instance: name: testinstance display_name: My Spanner Instance @@ -23,10 +23,10 @@ config: regional-us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a instance +- name: Create a instance google.cloud.gcp_spanner_instance: name: testinstance display_name: My Spanner Instance @@ -36,27 +36,27 @@ config: regional-us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that instance was created +- name: Verify that instance was created google.cloud.gcp_spanner_instance_info: - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/spanner.admin + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/spanner.admin register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | map(attribute='name') | select("match", ".*testinstance.*") | list | length == 1 # ---------------------------------------------------------------------------- -- name: create a instance that already exists +- name: Create a instance that already exists google.cloud.gcp_spanner_instance: name: testinstance display_name: My Spanner Instance @@ -66,15 +66,15 @@ config: regional-us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a instance +- name: Delete a instance google.cloud.gcp_spanner_instance: name: testinstance display_name: My Spanner Instance @@ -84,27 +84,27 @@ config: regional-us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that instance was deleted +- name: Verify that instance was deleted google.cloud.gcp_spanner_instance_info: - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/spanner.admin + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/spanner.admin register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | map(attribute='name') | select("match", ".*testinstance.*") | list | length == 0 # ---------------------------------------------------------------------------- -- name: delete a instance that does not exist +- name: Delete a instance that does not exist google.cloud.gcp_spanner_instance: name: testinstance display_name: My Spanner Instance @@ -114,10 +114,10 @@ config: regional-us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_spanner_instance/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_spanner_instance/tasks/main.yml index 45d6e4917..fe47378c2 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_spanner_instance/tasks/main.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_spanner_instance/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_sql_database/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_sql_database/tasks/autogen.yml index 1661f839c..dd87faa83 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_sql_database/tasks/autogen.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_sql_database/tasks/autogen.yml @@ -13,132 +13,132 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: create a instance +- name: Create a instance google.cloud.gcp_sql_instance: - name: "{{resource_name}}-3" + name: "{{ resource_name }}-3" settings: ip_configuration: authorized_networks: - - name: google dns server - value: 8.8.8.8/32 + - name: google dns server + value: 8.8.8.8/32 tier: db-n1-standard-1 region: us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: instance -- name: delete a database +- name: Delete a database google.cloud.gcp_sql_database: name: "{{ resource_name }}" - charset: utf8 + charset: utf8mb4 instance: "{{ instance.name }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a database +- name: Create a database google.cloud.gcp_sql_database: name: "{{ resource_name }}" - charset: utf8 + charset: utf8mb4 instance: "{{ instance.name }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that database was created +- name: Verify that database was created google.cloud.gcp_sql_database_info: - instance: "{{ instance.name }}" - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/sqlservice.admin + instance: "{{ instance.name }}" + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/sqlservice.admin register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - - "\"{{resource_name}}\" in \"{{ results['resources'] | map(attribute='name') | list }}\"" + - "\"{{ resource_name }}\" in \"{{ results['resources'] | map(attribute='name') | list }}\"" # ---------------------------------------------------------------------------- -- name: create a database that already exists +- name: Create a database that already exists google.cloud.gcp_sql_database: name: "{{ resource_name }}" - charset: utf8 + charset: utf8mb4 instance: "{{ instance.name }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a database +- name: Delete a database google.cloud.gcp_sql_database: name: "{{ resource_name }}" - charset: utf8 + charset: utf8mb4 instance: "{{ instance.name }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that database was deleted +- name: Verify that database was deleted google.cloud.gcp_sql_database_info: - instance: "{{ instance.name }}" - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/sqlservice.admin + instance: "{{ instance.name }}" + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/sqlservice.admin register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - - "\"{{resource_name}}\" not in \"{{ results['resources'] | map(attribute='name') | list }}\"" + - "\"{{ resource_name }}\" not in \"{{ results['resources'] | map(attribute='name') | list }}\"" # ---------------------------------------------------------------------------- -- name: delete a database that does not exist +- name: Delete a database that does not exist google.cloud.gcp_sql_database: name: "{{ resource_name }}" - charset: utf8 + charset: utf8mb4 instance: "{{ instance.name }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #--------------------------------------------------------- # Post-test teardown # If errors happen, don't crash the playbook! -- name: delete a instance +- name: Delete a instance google.cloud.gcp_sql_instance: - name: "{{resource_name}}-3" + name: "{{ resource_name }}-3" settings: ip_configuration: authorized_networks: - - name: google dns server - value: 8.8.8.8/32 + - name: google dns server + value: 8.8.8.8/32 tier: db-n1-standard-1 region: us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: instance ignore_errors: true diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_sql_database/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_sql_database/tasks/main.yml index 45d6e4917..fe47378c2 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_sql_database/tasks/main.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_sql_database/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_sql_instance/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_sql_instance/tasks/autogen.yml index cb1a4756d..c57de05a5 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_sql_instance/tasks/autogen.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_sql_instance/tasks/autogen.yml @@ -13,121 +13,121 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: delete a instance +- name: Delete a instance google.cloud.gcp_sql_instance: - name: "{{resource_name}}-2" + name: "{{ resource_name }}-2" settings: ip_configuration: authorized_networks: - - name: google dns server - value: 8.8.8.8/32 + - name: google dns server + value: 8.8.8.8/32 tier: db-n1-standard-1 region: us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a instance +- name: Create a instance google.cloud.gcp_sql_instance: - name: "{{resource_name}}-2" + name: "{{ resource_name }}-2" settings: ip_configuration: authorized_networks: - - name: google dns server - value: 8.8.8.8/32 + - name: google dns server + value: 8.8.8.8/32 tier: db-n1-standard-1 region: us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that instance was created +- name: Verify that instance was created google.cloud.gcp_sql_instance_info: - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/sqlservice.admin + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/sqlservice.admin register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - - results['resources'] | map(attribute='name') | select("match", ".*{{resource_name}}-2.*") | list | length == 1 + - results['resources'] | map(attribute='name') | select("match", ".*{{ resource_name }}-2.*") | list | length == 1 # ---------------------------------------------------------------------------- -- name: create a instance that already exists +- name: Create a instance that already exists google.cloud.gcp_sql_instance: - name: "{{resource_name}}-2" + name: "{{ resource_name }}-2" settings: ip_configuration: authorized_networks: - - name: google dns server - value: 8.8.8.8/32 + - name: google dns server + value: 8.8.8.8/32 tier: db-n1-standard-1 region: us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a instance +- name: Delete a instance google.cloud.gcp_sql_instance: - name: "{{resource_name}}-2" + name: "{{ resource_name }}-2" settings: ip_configuration: authorized_networks: - - name: google dns server - value: 8.8.8.8/32 + - name: google dns server + value: 8.8.8.8/32 tier: db-n1-standard-1 region: us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that instance was deleted +- name: Verify that instance was deleted google.cloud.gcp_sql_instance_info: - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/sqlservice.admin + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/sqlservice.admin register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - - results['resources'] | map(attribute='name') | select("match", ".*{{resource_name}}-2.*") | list | length == 0 + - results['resources'] | map(attribute='name') | select("match", ".*{{ resource_name }}-2.*") | list | length == 0 # ---------------------------------------------------------------------------- -- name: delete a instance that does not exist +- name: Delete a instance that does not exist google.cloud.gcp_sql_instance: - name: "{{resource_name}}-2" + name: "{{ resource_name }}-2" settings: ip_configuration: authorized_networks: - - name: google dns server - value: 8.8.8.8/32 + - name: google dns server + value: 8.8.8.8/32 tier: db-n1-standard-1 region: us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_sql_instance/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_sql_instance/tasks/main.yml index 45d6e4917..fe47378c2 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_sql_instance/tasks/main.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_sql_instance/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_sql_ssl_cert/aliases b/ansible_collections/google/cloud/tests/integration/targets/gcp_sql_ssl_cert/aliases index 8189da3c4..0e4419e32 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_sql_ssl_cert/aliases +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_sql_ssl_cert/aliases @@ -1,4 +1 @@ -cloud/gcp -# unsupported as gcp_sql_ssl_cert_info resource -# does not exist. -unsupported +cloud/gcp
\ No newline at end of file diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_sql_ssl_cert/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_sql_ssl_cert/tasks/autogen.yml index cc22adcd5..c24746dff 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_sql_ssl_cert/tasks/autogen.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_sql_ssl_cert/tasks/autogen.yml @@ -13,75 +13,92 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: create a instance +- name: Create a instance google.cloud.gcp_sql_instance: - name: "{{resource_name}}-2" + name: "{{ resource_name }}-2" settings: ip_configuration: authorized_networks: - - name: google dns server - value: 8.8.8.8/32 + - name: google dns server + value: 8.8.8.8/32 tier: db-n1-standard-1 region: us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: instance -- name: delete a SSL cert +- name: Delete a non-existent SSL cert google.cloud.gcp_sql_ssl_cert: - common_name: "{{resource_name}}" - instance: "{{instance['name'}}" + common_name: "{{ resource_name }}" + instance: + name: "{{ instance['name'] }}" + sha1_fingerprint: "f572d396fae9206628714fb2ce00f72e94f2258f" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a SSL cert +- name: Create an SSL cert google.cloud.gcp_sql_ssl_cert: - common_name: "{{resource_name}}" - instance: "{{instance['name'}}" + common_name: "{{ resource_name }}" + instance: + name: "{{ instance['name'] }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - # SslCert is not altered, just verified. - - result.changed == false -- name: verify that ssl_cert was created - google.cloud.gcp_sql_ssl_cert_info: - filters: - - name = - instance: "{{instance['name'}}" - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/sqlservice.admin - register: results -- name: verify that command succeeded - assert: + - result.changed == true +- name: Peform a no-op update to verify the cert was created + google.cloud.gcp_sql_ssl_cert: + instance: + name: "{{ instance['name'] }}" + sha1_fingerprint: "{{ result['sha1Fingerprint'] }}" + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + state: present + register: updates +- name: Verify that command succeeded + ansible.builtin.assert: + that: + - updates.changed == false +#---------------------------------------------------------- +- name: Delete an SSL cert + google.cloud.gcp_sql_ssl_cert: + common_name: "{{ resource_name }}" + instance: + name: "{{ instance['name'] }}" + sha1_fingerprint: "{{ result['sha1Fingerprint'] }}" + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + state: absent + register: result +- name: Assert changed is true + ansible.builtin.assert: that: - - results['resources'] | length == 1 + - result.changed == true #--------------------------------------------------------- # Post-test teardown # If errors happen, don't crash the playbook! -- name: delete a instance +- name: Delete a instance google.cloud.gcp_sql_instance: - name: "{{resource_name}}-2" + name: "{{ resource_name }}-2" settings: ip_configuration: authorized_networks: - - name: google dns server - value: 8.8.8.8/32 + - name: google dns server + value: 8.8.8.8/32 tier: db-n1-standard-1 region: us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: instance ignore_errors: true diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_sql_ssl_cert/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_sql_ssl_cert/tasks/main.yml index 45d6e4917..fe47378c2 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_sql_ssl_cert/tasks/main.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_sql_ssl_cert/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_sql_user/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_sql_user/tasks/autogen.yml index c5aace2c7..20ddbea25 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_sql_user/tasks/autogen.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_sql_user/tasks/autogen.yml @@ -13,22 +13,22 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: create a instance +- name: Create a instance google.cloud.gcp_sql_instance: - name: "{{resource_name}}-1" + name: "{{ resource_name }}-1" settings: ip_configuration: authorized_networks: - - name: google dns server - value: 8.8.8.8/32 + - name: google dns server + value: 8.8.8.8/32 tier: db-n1-standard-1 region: us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: instance -- name: delete a user +- name: Delete a user google.cloud.gcp_sql_user: name: test-user host: 10.1.2.3 @@ -36,10 +36,10 @@ instance: "{{ instance }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a user +- name: Create a user google.cloud.gcp_sql_user: name: test-user host: 10.1.2.3 @@ -47,28 +47,28 @@ instance: "{{ instance }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that user was created +- name: Verify that user was created google.cloud.gcp_sql_user_info: - instance: "{{ instance }}" - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/sqlservice.admin + instance: "{{ instance }}" + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/sqlservice.admin register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - "'test-user' in \"{{ results['resources'] | map(attribute='name') | list }}\"" # ---------------------------------------------------------------------------- -- name: create a user that already exists +- name: Create a user that already exists google.cloud.gcp_sql_user: name: test-user host: 10.1.2.3 @@ -76,15 +76,15 @@ instance: "{{ instance }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a user +- name: Delete a user google.cloud.gcp_sql_user: name: test-user host: 10.1.2.3 @@ -92,28 +92,28 @@ instance: "{{ instance }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that user was deleted +- name: Verify that user was deleted google.cloud.gcp_sql_user_info: - instance: "{{ instance }}" - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/sqlservice.admin + instance: "{{ instance }}" + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/sqlservice.admin register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - "'test-user' not in \"{{ results['resources'] | map(attribute='name') | list }}\"" # ---------------------------------------------------------------------------- -- name: delete a user that does not exist +- name: Delete a user that does not exist google.cloud.gcp_sql_user: name: test-user host: 10.1.2.3 @@ -121,29 +121,29 @@ instance: "{{ instance }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #--------------------------------------------------------- # Post-test teardown # If errors happen, don't crash the playbook! -- name: delete a instance +- name: Delete a instance google.cloud.gcp_sql_instance: - name: "{{resource_name}}-1" + name: "{{ resource_name }}-1" settings: ip_configuration: authorized_networks: - - name: google dns server - value: 8.8.8.8/32 + - name: google dns server + value: 8.8.8.8/32 tier: db-n1-standard-1 region: us-central1 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: instance ignore_errors: true diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_sql_user/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_sql_user/tasks/main.yml index 45d6e4917..fe47378c2 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_sql_user/tasks/main.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_sql_user/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_storage_bucket/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_storage_bucket/tasks/autogen.yml index b6d83e4eb..f5ccacabe 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_storage_bucket/tasks/autogen.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_storage_bucket/tasks/autogen.yml @@ -13,62 +13,62 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: delete a bucket +- name: Delete a bucket google.cloud.gcp_storage_bucket: name: "{{ resource_name }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a bucket +- name: Create a bucket google.cloud.gcp_storage_bucket: name: "{{ resource_name }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true # ---------------------------------------------------------------------------- -- name: create a bucket that already exists +- name: Create a bucket that already exists google.cloud.gcp_storage_bucket: name: "{{ resource_name }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a bucket +- name: Delete a bucket google.cloud.gcp_storage_bucket: name: "{{ resource_name }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true # ---------------------------------------------------------------------------- -- name: delete a bucket that does not exist +- name: Delete a bucket that does not exist google.cloud.gcp_storage_bucket: name: "{{ resource_name }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_storage_bucket/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_storage_bucket/tasks/main.yml index 45d6e4917..fe47378c2 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_storage_bucket/tasks/main.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_storage_bucket/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_storage_bucket_access_control/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_storage_bucket_access_control/tasks/autogen.yml index ebde9a323..762e0f6cd 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_storage_bucket_access_control/tasks/autogen.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_storage_bucket_access_control/tasks/autogen.yml @@ -13,92 +13,92 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: create a bucket +- name: Create a bucket google.cloud.gcp_storage_bucket: name: "{{ resource_name }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: bucket -- name: delete a bucket access control +- name: Delete a bucket access control google.cloud.gcp_storage_bucket_access_control: bucket: "{{ bucket }}" entity: user-alexstephen@google.com role: WRITER project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a bucket access control +- name: Create a bucket access control google.cloud.gcp_storage_bucket_access_control: bucket: "{{ bucket }}" entity: user-alexstephen@google.com role: WRITER project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true # ---------------------------------------------------------------------------- -- name: create a bucket access control that already exists +- name: Create a bucket access control that already exists google.cloud.gcp_storage_bucket_access_control: bucket: "{{ bucket }}" entity: user-alexstephen@google.com role: WRITER project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a bucket access control +- name: Delete a bucket access control google.cloud.gcp_storage_bucket_access_control: bucket: "{{ bucket }}" entity: user-alexstephen@google.com role: WRITER project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true # ---------------------------------------------------------------------------- -- name: delete a bucket access control that does not exist +- name: Delete a bucket access control that does not exist google.cloud.gcp_storage_bucket_access_control: bucket: "{{ bucket }}" entity: user-alexstephen@google.com role: WRITER project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #--------------------------------------------------------- # Post-test teardown # If errors happen, don't crash the playbook! -- name: delete a bucket +- name: Delete a bucket google.cloud.gcp_storage_bucket: name: "{{ resource_name }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: bucket ignore_errors: true diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_storage_bucket_access_control/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_storage_bucket_access_control/tasks/main.yml index 45d6e4917..fe47378c2 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_storage_bucket_access_control/tasks/main.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_storage_bucket_access_control/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_storage_default_object_acl/aliases b/ansible_collections/google/cloud/tests/integration/targets/gcp_storage_default_object_acl/aliases index ff7eb2d4e..0e4419e32 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_storage_default_object_acl/aliases +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_storage_default_object_acl/aliases @@ -1,2 +1 @@ -cloud/gcp -unsupported
\ No newline at end of file +cloud/gcp
\ No newline at end of file diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_storage_default_object_acl/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_storage_default_object_acl/tasks/autogen.yml index 6f091e9b9..6f4368432 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_storage_default_object_acl/tasks/autogen.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_storage_default_object_acl/tasks/autogen.yml @@ -13,87 +13,92 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: create a bucket +- name: Create a bucket google.cloud.gcp_storage_bucket: name: "{{ resource_name }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: bucket -- name: delete a default object acl +- name: Delete a default object acl google.cloud.gcp_storage_default_object_acl: bucket: "{{ bucket }}" - entity: OWNER:user-alexstephen@google.com + entity: user-alexstephen@google.com + role: READER project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a default object acl +- name: Create a default object acl google.cloud.gcp_storage_default_object_acl: bucket: "{{ bucket }}" - entity: OWNER:user-alexstephen@google.com + entity: user-alexstephen@google.com + role: READER project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true # ---------------------------------------------------------------------------- -- name: create a default object acl that already exists +- name: Create a default object acl that already exists google.cloud.gcp_storage_default_object_acl: bucket: "{{ bucket }}" - entity: OWNER:user-alexstephen@google.com + entity: user-alexstephen@google.com + role: READER project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a default object acl +- name: Delete a default object acl google.cloud.gcp_storage_default_object_acl: bucket: "{{ bucket }}" - entity: OWNER:user-alexstephen@google.com + entity: user-alexstephen@google.com + role: READER project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true # ---------------------------------------------------------------------------- -- name: delete a default object acl that does not exist +- name: Delete a default object acl that does not exist google.cloud.gcp_storage_default_object_acl: bucket: "{{ bucket }}" - entity: OWNER:user-alexstephen@google.com + entity: user-alexstephen@google.com + role: READER project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #--------------------------------------------------------- # Post-test teardown # If errors happen, don't crash the playbook! -- name: delete a bucket +- name: Delete a bucket google.cloud.gcp_storage_bucket: name: "{{ resource_name }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: bucket ignore_errors: true diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_storage_default_object_acl/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_storage_default_object_acl/tasks/main.yml index 45d6e4917..fe47378c2 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_storage_default_object_acl/tasks/main.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_storage_default_object_acl/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_storage_object/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_storage_object/tasks/main.yml index 497d425a5..4d6d31f3e 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_storage_object/tasks/main.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_storage_object/tasks/main.yml @@ -1,75 +1,76 @@ --- # Pre-test setup -- name: create a temp file for uploading - tempfile: +- name: Create a temp file for uploading + ansible.builtin.tempfile: state: file register: upload_temp -- name: create a temp file for downloading - tempfile: +- name: Create a temp file for downloading + ansible.builtin.tempfile: state: file register: download_temp -- name: put content in the tempfile - copy: - content: "Ansible GCS test file" +- name: Put content in the tempfile + ansible.builtin.copy: + content: Ansible GCS test file dest: "{{ upload_temp.path }}" -- name: create a bucket + mode: 0644 +- name: Create a bucket google.cloud.gcp_storage_bucket: name: "{{ resource_name }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: bucket #---------------------------------------------------------- -- name: upload the object to gcs +- name: Upload the object to gcs google.cloud.gcp_storage_object: - action: 'upload' + action: upload bucket: "{{ bucket.name }}" src: "{{ upload_temp.path }}" - dest: "ansible/{{ resource_name }}" + dest: ansible/{{ resource_name }} project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true # ---------------------------------------------------------------------------- -- name: download the object to disk +- name: Download the object to disk google.cloud.gcp_storage_object: - action: 'download' + action: download bucket: "{{ bucket.name }}" - src: "ansible/{{ resource_name }}" + src: ansible/{{ resource_name }} dest: "{{ download_temp.path }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true # ---------------------------------------------------------------------------- -- name: delete the object +- name: Delete the object google.cloud.gcp_storage_object: - action: 'delete' + action: delete bucket: "{{ bucket.name }}" - src: "ansible/{{ resource_name }}" + src: ansible/{{ resource_name }} project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true # ---------------------------------------------------------------------------- -- name: delete the bucket +- name: Delete the bucket google.cloud.gcp_storage_bucket: name: "{{ resource_name }}" project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: bucket diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_tpu_node/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_tpu_node/tasks/autogen.yml index e44d63226..196aa6a9d 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_tpu_node/tasks/autogen.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_tpu_node/tasks/autogen.yml @@ -13,108 +13,108 @@ # # ---------------------------------------------------------------------------- # Pre-test setup -- name: delete a node +- name: Delete a node google.cloud.gcp_tpu_node: name: "{{ resource_name }}" zone: us-central1-a - accelerator_type: "v2-32" - tensorflow_version: '2.10.0' + accelerator_type: v2-32 + tensorflow_version: 2.10.0 cidr_block: 10.2.0.0/29 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent #---------------------------------------------------------- -- name: create a node +- name: Create a node google.cloud.gcp_tpu_node: name: "{{ resource_name }}" zone: us-central1-a - accelerator_type: "v2-32" - tensorflow_version: '2.10.0' + accelerator_type: v2-32 + tensorflow_version: 2.10.0 cidr_block: 10.2.0.0/29 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that node was created +- name: Verify that node was created google.cloud.gcp_tpu_node_info: - zone: us-central1-a - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/cloud-platform + zone: us-central1-a + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/cloud-platform register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | map(attribute='name') | select("match", ".*{{ resource_name }}.*") | list | length == 1 # ---------------------------------------------------------------------------- -- name: create a node that already exists +- name: Create a node that already exists google.cloud.gcp_tpu_node: name: "{{ resource_name }}" zone: us-central1-a - accelerator_type: "v2-32" - tensorflow_version: '2.10.0' + accelerator_type: v2-32 + tensorflow_version: 2.10.0 cidr_block: 10.2.0.0/29 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: present register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false #---------------------------------------------------------- -- name: delete a node +- name: Delete a node google.cloud.gcp_tpu_node: name: "{{ resource_name }}" zone: us-central1-a - accelerator_type: "v2-32" - tensorflow_version: '2.10.0' + accelerator_type: v2-32 + tensorflow_version: 2.10.0 cidr_block: 10.2.0.0/29 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is true - assert: +- name: Assert changed is true + ansible.builtin.assert: that: - result.changed == true -- name: verify that node was deleted +- name: Verify that node was deleted google.cloud.gcp_tpu_node_info: - zone: us-central1-a - project: "{{ gcp_project }}" - auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" - scopes: - - https://www.googleapis.com/auth/cloud-platform + zone: us-central1-a + project: "{{ gcp_project }}" + auth_kind: "{{ gcp_cred_kind }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" + scopes: + - https://www.googleapis.com/auth/cloud-platform register: results -- name: verify that command succeeded - assert: +- name: Verify that command succeeded + ansible.builtin.assert: that: - results['resources'] | map(attribute='name') | select("match", ".*{{ resource_name }}.*") | list | length == 0 # ---------------------------------------------------------------------------- -- name: delete a node that does not exist +- name: Delete a node that does not exist google.cloud.gcp_tpu_node: name: "{{ resource_name }}" zone: us-central1-a - accelerator_type: "v2-32" - tensorflow_version: '2.10.0' + accelerator_type: v2-32 + tensorflow_version: 2.10.0 cidr_block: 10.2.0.0/29 project: "{{ gcp_project }}" auth_kind: "{{ gcp_cred_kind }}" - service_account_file: "{{ gcp_cred_file }}" + service_account_file: "{{ gcp_cred_file | default(omit) }}" state: absent register: result -- name: assert changed is false - assert: +- name: Assert changed is false + ansible.builtin.assert: that: - result.changed == false diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_tpu_node/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_tpu_node/tasks/main.yml index 45d6e4917..fe47378c2 100644 --- a/ansible_collections/google/cloud/tests/integration/targets/gcp_tpu_node/tasks/main.yml +++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_tpu_node/tasks/main.yml @@ -1,2 +1,3 @@ --- -- include_tasks: autogen.yml +- name: Generated tests + ansible.builtin.include_tasks: autogen.yml |