summaryrefslogtreecommitdiffstats
path: root/ansible_collections/google/cloud
diff options
context:
space:
mode:
Diffstat (limited to 'ansible_collections/google/cloud')
-rw-r--r--ansible_collections/google/cloud/.github/workflows/ansible-integration-tests.yml25
-rw-r--r--ansible_collections/google/cloud/.github/workflows/ansible-test.yml22
-rw-r--r--ansible_collections/google/cloud/.github/workflows/automationhub.yml6
-rw-r--r--ansible_collections/google/cloud/.github/workflows/gcloud.yml24
-rw-r--r--ansible_collections/google/cloud/.github/workflows/gcsfuse.yml12
-rw-r--r--ansible_collections/google/cloud/.github/workflows/pythonpublish.yml6
-rw-r--r--ansible_collections/google/cloud/.gitignore1
-rw-r--r--ansible_collections/google/cloud/CHANGELOG.rst31
-rw-r--r--ansible_collections/google/cloud/CONTRIBUTING.md84
-rw-r--r--ansible_collections/google/cloud/FILES.json4597
-rw-r--r--ansible_collections/google/cloud/MAINTAINING.md4
-rw-r--r--ansible_collections/google/cloud/MANIFEST.json6
-rw-r--r--ansible_collections/google/cloud/changelogs/.plugin-cache.yaml871
-rw-r--r--ansible_collections/google/cloud/changelogs/changelog.yaml31
-rw-r--r--ansible_collections/google/cloud/changelogs/config.yaml33
-rw-r--r--ansible_collections/google/cloud/meta/runtime.yml2
-rw-r--r--ansible_collections/google/cloud/molecule/gcloud/converge.yml4
-rw-r--r--ansible_collections/google/cloud/molecule/gcloud/molecule.yml8
-rw-r--r--ansible_collections/google/cloud/molecule/gcloud/verify.yml6
-rw-r--r--ansible_collections/google/cloud/molecule/gcsfuse/molecule.yml8
-rw-r--r--ansible_collections/google/cloud/molecule/gcsfuse/verify.yml6
-rw-r--r--ansible_collections/google/cloud/plugins/doc_fragments/gcp.py2
-rw-r--r--ansible_collections/google/cloud/plugins/filter/gcp_kms_filters.py1
-rw-r--r--ansible_collections/google/cloud/plugins/inventory/gcp_compute.py13
-rw-r--r--ansible_collections/google/cloud/plugins/module_utils/gcp_utils.py31
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_appengine_firewall_rule.py9
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_appengine_firewall_rule_info.py9
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_bigquery_dataset.py8
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_bigquery_dataset_info.py9
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_bigquery_table.py6
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_bigquery_table_info.py9
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_bigtable_instance.py6
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_bigtable_instance_info.py9
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_cloudbuild_trigger.py8
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_cloudbuild_trigger_info.py9
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_cloudfunctions_cloud_function.py6
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_cloudfunctions_cloud_function_info.py9
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_cloudscheduler_job.py8
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_cloudscheduler_job_info.py9
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_cloudtasks_queue.py6
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_cloudtasks_queue_info.py9
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_compute_address.py7
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_compute_address_info.py9
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_compute_autoscaler.py7
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_compute_autoscaler_info.py9
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_compute_backend_bucket.py8
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_compute_backend_bucket_info.py9
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_compute_backend_service.py8
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_compute_backend_service_info.py9
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_compute_disk.py7
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_compute_disk_info.py9
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_compute_external_vpn_gateway.py8
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_compute_external_vpn_gateway_info.py9
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_compute_firewall.py7
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_compute_firewall_info.py9
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_compute_forwarding_rule.py7
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_compute_forwarding_rule_info.py9
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_compute_global_address.py7
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_compute_global_address_info.py9
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_compute_global_forwarding_rule.py5
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_compute_global_forwarding_rule_info.py9
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_compute_health_check.py8
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_compute_health_check_info.py9
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_compute_http_health_check.py9
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_compute_http_health_check_info.py9
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_compute_https_health_check.py9
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_compute_https_health_check_info.py9
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_compute_image.py7
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_compute_image_info.py9
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_compute_instance.py5
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_compute_instance_group.py5
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_compute_instance_group_info.py9
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_compute_instance_group_manager.py5
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_compute_instance_group_manager_info.py9
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_compute_instance_info.py8
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_compute_instance_template.py5
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_compute_instance_template_info.py9
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_compute_interconnect_attachment.py5
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_compute_interconnect_attachment_info.py9
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_compute_network.py8
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_compute_network_endpoint_group.py7
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_compute_network_endpoint_group_info.py9
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_compute_network_info.py9
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_compute_node_group.py7
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_compute_node_group_info.py9
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_compute_node_template.py8
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_compute_node_template_info.py9
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_compute_region_autoscaler.py8
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_compute_region_autoscaler_info.py9
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_compute_region_backend_service.py7
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_compute_region_backend_service_info.py9
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_compute_region_disk.py8
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_compute_region_disk_info.py9
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_compute_region_health_check.py8
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_compute_region_health_check_info.py9
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_compute_region_instance_group_manager.py5
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_compute_region_instance_group_manager_info.py9
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_compute_region_target_http_proxy.py7
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_compute_region_target_http_proxy_info.py9
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_compute_region_target_https_proxy.py7
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_compute_region_target_https_proxy_info.py9
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_compute_region_url_map.py5
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_compute_region_url_map_info.py9
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_compute_reservation.py8
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_compute_reservation_info.py9
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_compute_resource_policy.py6
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_compute_resource_policy_info.py9
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_compute_route.py7
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_compute_route_info.py9
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_compute_router.py7
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_compute_router_info.py9
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_compute_snapshot.py7
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_compute_snapshot_info.py9
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_compute_ssl_certificate.py9
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_compute_ssl_certificate_info.py9
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_compute_ssl_policy.py8
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_compute_ssl_policy_info.py9
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_compute_subnetwork.py7
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_compute_subnetwork_info.py9
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_compute_target_http_proxy.py7
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_compute_target_http_proxy_info.py9
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_compute_target_https_proxy.py7
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_compute_target_https_proxy_info.py9
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_compute_target_instance.py7
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_compute_target_instance_info.py9
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_compute_target_pool.py7
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_compute_target_pool_info.py9
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_compute_target_ssl_proxy.py7
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_compute_target_ssl_proxy_info.py9
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_compute_target_tcp_proxy.py7
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_compute_target_tcp_proxy_info.py9
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_compute_target_vpn_gateway.py7
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_compute_target_vpn_gateway_info.py9
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_compute_url_map.py7
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_compute_url_map_info.py9
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_compute_vpn_tunnel.py7
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_compute_vpn_tunnel_info.py9
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_container_cluster.py48
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_container_cluster_info.py9
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_container_node_pool.py5
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_container_node_pool_info.py9
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_dns_managed_zone.py8
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_dns_managed_zone_info.py9
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_dns_resource_record_set.py5
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_dns_resource_record_set_info.py9
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_filestore_instance.py8
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_filestore_instance_info.py9
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_iam_role.py6
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_iam_role_info.py9
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_iam_service_account.py7
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_iam_service_account_info.py9
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_iam_service_account_key.py19
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_kms_crypto_key.py8
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_kms_crypto_key_info.py9
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_kms_key_ring.py9
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_kms_key_ring_info.py9
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_logging_metric.py8
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_logging_metric_info.py9
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_mlengine_model.py8
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_mlengine_model_info.py9
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_mlengine_version.py5
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_mlengine_version_info.py9
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_pubsub_subscription.py7
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_pubsub_subscription_info.py9
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_pubsub_topic.py8
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_pubsub_topic_info.py9
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_redis_instance.py8
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_redis_instance_info.py9
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_resourcemanager_project.py6
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_resourcemanager_project_info.py9
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_runtimeconfig_config.py7
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_runtimeconfig_config_info.py9
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_runtimeconfig_variable.py7
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_runtimeconfig_variable_info.py9
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_serviceusage_service.py14
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_serviceusage_service_info.py9
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_sourcerepo_repository.py9
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_sourcerepo_repository_info.py9
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_spanner_database.py7
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_spanner_database_info.py9
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_spanner_instance.py9
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_spanner_instance_info.py9
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_sql_database.py7
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_sql_database_info.py9
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_sql_instance.py6
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_sql_instance_info.py9
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_sql_ssl_cert.py51
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_sql_user.py5
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_sql_user_info.py9
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_storage_bucket.py5
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_storage_bucket_access_control.py7
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_storage_default_object_acl.py40
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_storage_object.py12
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_tpu_node.py8
-rw-r--r--ansible_collections/google/cloud/plugins/modules/gcp_tpu_node_info.py9
-rw-r--r--ansible_collections/google/cloud/roles/gcloud/tasks/archive/archive_install.yml6
-rw-r--r--ansible_collections/google/cloud/roles/gcloud/tasks/archive/command_completion.yml4
-rw-r--r--ansible_collections/google/cloud/roles/gcloud/tasks/archive/main.yml7
-rw-r--r--ansible_collections/google/cloud/roles/gcloud/tasks/main.yml7
-rw-r--r--ansible_collections/google/cloud/roles/gcloud/tasks/package/debian.yml6
-rw-r--r--ansible_collections/google/cloud/roles/gcloud/tasks/package/redhat.yml10
-rw-r--r--ansible_collections/google/cloud/roles/gcp_http_lb/README.md4
-rw-r--r--ansible_collections/google/cloud/roles/gcp_http_lb/defaults/main.yml16
-rw-r--r--ansible_collections/google/cloud/roles/gcp_http_lb/meta/main.yml15
-rw-r--r--ansible_collections/google/cloud/roles/gcp_http_lb/tasks/main.yml112
-rw-r--r--ansible_collections/google/cloud/roles/gcp_http_lb/tests/test.yml3
-rw-r--r--ansible_collections/google/cloud/roles/gcp_http_lb/vars/main.yml20
-rw-r--r--ansible_collections/google/cloud/roles/gcsfuse/tasks/debian.yml6
-rwxr-xr-xansible_collections/google/cloud/scripts/bootstrap-project.sh15
-rwxr-xr-xansible_collections/google/cloud/scripts/cleanup-project.sh17
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_appengine_firewall_rule/tasks/autogen.yml68
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_appengine_firewall_rule/tasks/main.yml3
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_bigquery_dataset/tasks/autogen.yml68
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_bigquery_dataset/tasks/main.yml3
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_bigquery_table/tasks/autogen.yml80
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_bigquery_table/tasks/main.yml3
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_bigtable_instance/tasks/autogen.yml90
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_bigtable_instance/tasks/main.yml3
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_cloudbuild_trigger/defaults/main.yml2
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_cloudfunctions_cloud_function/tasks/autogen.yml86
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_cloudfunctions_cloud_function/tasks/main.yml3
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_cloudscheduler_job/tasks/autogen.yml82
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_cloudscheduler_job/tasks/main.yml3
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_cloudtasks_queue/tasks/autogen.yml72
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_cloudtasks_queue/tasks/main.yml3
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_compute_address/tasks/autogen.yml80
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_compute_address/tasks/main.yml3
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_compute_autoscaler/tasks/autogen.yml158
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_compute_autoscaler/tasks/main.yml3
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_compute_backend_bucket/tasks/autogen.yml94
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_compute_backend_bucket/tasks/main.yml3
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_compute_backend_service/tasks/autogen.yml122
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_compute_backend_service/tasks/main.yml3
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_compute_disk/tasks/autogen.yml80
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_compute_disk/tasks/main.yml3
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_compute_external_vpn_gateway/tasks/autogen.yml96
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_compute_external_vpn_gateway/tasks/main.yml3
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_compute_firewall/tasks/autogen.yml136
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_compute_firewall/tasks/main.yml6
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_compute_firewall/tasks/update.yml160
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_compute_forwarding_rule/tasks/autogen.yml96
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_compute_forwarding_rule/tasks/main.yml3
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_compute_global_address/tasks/autogen.yml76
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_compute_global_address/tasks/main.yml3
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_compute_global_forwarding_rule/tasks/autogen.yml136
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_compute_global_forwarding_rule/tasks/main.yml3
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_compute_health_check/tasks/autogen.yml76
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_compute_health_check/tasks/main.yml3
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_compute_http_health_check/tasks/autogen.yml76
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_compute_http_health_check/tasks/main.yml3
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_compute_https_health_check/tasks/autogen.yml76
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_compute_https_health_check/tasks/main.yml3
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_compute_image/tasks/autogen.yml84
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_compute_image/tasks/main.yml3
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_compute_instance/tasks/autogen.yml244
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_compute_instance/tasks/main.yml3
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_compute_instance_group/tasks/autogen.yml108
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_compute_instance_group/tasks/main.yml3
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_compute_instance_group_manager/tasks/autogen.yml140
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_compute_instance_group_manager/tasks/main.yml3
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_compute_instance_template/tasks/autogen.yml182
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_compute_instance_template/tasks/main.yml3
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_compute_interconnect_attachment/defaults/main.yml2
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_compute_managed_ssl_certificate/defaults/main.yml2
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_compute_network/tasks/autogen.yml86
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_compute_network/tasks/main.yml3
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_compute_network_endpoint_group/tasks/autogen.yml100
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_compute_network_endpoint_group/tasks/main.yml3
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_compute_node_group/tasks/autogen.yml88
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_compute_node_group/tasks/main.yml3
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_compute_node_template/tasks/autogen.yml80
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_compute_node_template/tasks/main.yml3
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_autoscaler/tasks/autogen.yml168
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_autoscaler/tasks/main.yml3
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_backend_service/tasks/autogen.yml98
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_backend_service/tasks/main.yml3
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_disk/tasks/autogen.yml100
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_disk/tasks/main.yml3
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_health_check/tasks/autogen.yml80
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_health_check/tasks/main.yml3
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_instance_group_manager/tasks/autogen.yml140
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_instance_group_manager/tasks/main.yml3
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_target_http_proxy/tasks/autogen.yml108
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_target_http_proxy/tasks/main.yml3
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_target_https_proxy/tasks/autogen.yml138
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_target_https_proxy/tasks/main.yml3
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_url_map/tasks/autogen.yml94
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_url_map/tasks/main.yml3
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_compute_reservation/tasks/autogen.yml80
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_compute_reservation/tasks/main.yml3
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_compute_resource_policy/tasks/autogen.yml90
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_compute_resource_policy/tasks/main.yml3
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_compute_route/tasks/autogen.yml116
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_compute_route/tasks/main.yml3
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_compute_router/tasks/autogen.yml118
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_compute_router/tasks/main.yml3
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_compute_snapshot/tasks/autogen.yml84
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_compute_snapshot/tasks/main.yml3
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_compute_ssl_certificate/tasks/autogen.yml76
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_compute_ssl_certificate/tasks/main.yml3
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_compute_ssl_policy/tasks/autogen.yml96
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_compute_ssl_policy/tasks/main.yml3
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_compute_subnetwork/tasks/autogen.yml92
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_compute_subnetwork/tasks/main.yml3
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_http_proxy/tasks/autogen.yml120
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_http_proxy/tasks/main.yml3
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_https_proxy/tasks/autogen.yml138
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_https_proxy/tasks/main.yml3
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_instance/tasks/autogen.yml116
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_instance/tasks/main.yml3
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_pool/tasks/autogen.yml80
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_pool/tasks/main.yml3
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_ssl_proxy/tasks/autogen.yml126
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_ssl_proxy/tasks/main.yml3
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_tcp_proxy/tasks/autogen.yml108
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_tcp_proxy/tasks/main.yml3
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_vpn_gateway/tasks/autogen.yml96
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_vpn_gateway/tasks/main.yml3
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_compute_url_map/tasks/autogen.yml112
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_compute_url_map/tasks/main.yml3
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_compute_vpn_tunnel/tasks/autogen.yml238
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_compute_vpn_tunnel/tasks/main.yml3
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_container_cluster/tasks/autogen.yml82
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_container_cluster/tasks/main.yml3
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_container_node_pool/tasks/autogen.yml84
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_container_node_pool/tasks/main.yml3
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_dns_managed_zone/tasks/autogen.yml72
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_dns_managed_zone/tasks/main.yml3
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_dns_resource_record_set/tasks/autogen.yml100
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_dns_resource_record_set/tasks/main.yml3
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_filestore_instance/tasks/autogen.yml122
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_filestore_instance/tasks/main.yml3
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_iam_role/tasks/autogen.yml114
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_iam_role/tasks/main.yml3
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_iam_service_account/tasks/autogen.yml74
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_iam_service_account/tasks/main.yml3
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_iam_service_account_key/defaults/main.yml2
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_kms_crypto_key/tasks/autogen.yml52
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_kms_crypto_key/tasks/main.yml3
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_kms_key_ring/tasks/autogen.yml47
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_kms_key_ring/tasks/main.yml3
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_logging_metric/tasks/autogen.yml108
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_logging_metric/tasks/main.yml3
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_mlengine_model/tasks/autogen.yml78
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_mlengine_model/tasks/main.yml3
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_mlengine_version/tasks/autogen.yml102
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_mlengine_version/tasks/main.yml3
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_pubsub_subscription/tasks/autogen.yml80
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_pubsub_subscription/tasks/main.yml3
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_pubsub_topic/tasks/autogen.yml68
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_pubsub_topic/tasks/main.yml3
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_redis_instance/tasks/autogen.yml80
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_redis_instance/tasks/main.yml3
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_resourcemanager_project/tasks/autogen.yml82
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_resourcemanager_project/tasks/main.yml3
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_runtimeconfig_config/tasks/autogen.yml68
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_runtimeconfig_config/tasks/main.yml3
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_runtimeconfig_variable/tasks/autogen.yml80
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_runtimeconfig_variable/tasks/main.yml3
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_serviceusage_service/tasks/autogen.yml82
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_serviceusage_service/tasks/main.yml3
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_sourcerepo_repository/tasks/autogen.yml68
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_sourcerepo_repository/tasks/main.yml3
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_spanner_database/tasks/autogen.yml48
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_spanner_database/tasks/main.yml3
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_spanner_instance/tasks/autogen.yml68
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_spanner_instance/tasks/main.yml3
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_sql_database/tasks/autogen.yml106
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_sql_database/tasks/main.yml3
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_sql_instance/tasks/autogen.yml102
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_sql_instance/tasks/main.yml3
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_sql_ssl_cert/aliases5
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_sql_ssl_cert/tasks/autogen.yml89
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_sql_ssl_cert/tasks/main.yml3
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_sql_user/tasks/autogen.yml92
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_sql_user/tasks/main.yml3
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_storage_bucket/tasks/autogen.yml36
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_storage_bucket/tasks/main.yml3
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_storage_bucket_access_control/tasks/autogen.yml44
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_storage_bucket_access_control/tasks/main.yml3
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_storage_default_object_acl/aliases3
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_storage_default_object_acl/tasks/autogen.yml59
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_storage_default_object_acl/tasks/main.yml3
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_storage_object/tasks/main.yml59
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_tpu_node/tasks/autogen.yml92
-rw-r--r--ansible_collections/google/cloud/tests/integration/targets/gcp_tpu_node/tasks/main.yml3
386 files changed, 8377 insertions, 7843 deletions
diff --git a/ansible_collections/google/cloud/.github/workflows/ansible-integration-tests.yml b/ansible_collections/google/cloud/.github/workflows/ansible-integration-tests.yml
index 7fb920f6f..c7c63c84d 100644
--- a/ansible_collections/google/cloud/.github/workflows/ansible-integration-tests.yml
+++ b/ansible_collections/google/cloud/.github/workflows/ansible-integration-tests.yml
@@ -1,11 +1,12 @@
-name: "Run integration tests for the cloud.google collection"
+---
+name: Run integration tests for the cloud.google collection
on:
pull_request: {}
push:
branches: master
env:
- GCP_SERVICE_ACCOUNT: "github-ci@ansible-gcp-ci.iam.gserviceaccount.com"
- GCP_PROJECT: "ansible-gcp-ci"
+ GCP_SERVICE_ACCOUNT: github-ci@ansible-gcp-ci.iam.gserviceaccount.com
+ GCP_PROJECT: ansible-gcp-ci
GCP_FOLDER_ID: "542027184392"
jobs:
integration:
@@ -18,18 +19,20 @@ jobs:
run:
working-directory: ansible_collections/google/cloud
strategy:
+ max-parallel: 1
matrix:
ansible_version:
- - stable-2.13
+ - stable-2.14
+ - stable-2.15
steps:
- name: check out code
- uses: actions/checkout@v2
+ uses: actions/checkout@v4
with:
path: ansible_collections/google/cloud
- name: Set up Python
- uses: actions/setup-python@v1
+ uses: actions/setup-python@v4
with:
- python-version: '3.9' # this is the minimum version required for Ansible 2.13
+ python-version: '3.9' # this is the minimum version required for Ansible 2.15
- name: Install dependencies
run: pip install -r requirements.txt
- name: Install ansible-base (${{ matrix.ansible_version }})
@@ -53,15 +56,15 @@ jobs:
env:
CI_SERVICE_ACCOUNT_FILE_CONTENTS: ${{ secrets.CI_SERVICE_ACCOUNT_FILE_CONTENTS }}
with:
- service_account: "$GCP_SERVICE_ACCOUNT"
- credentials_json: "${{ secrets.CI_SERVICE_ACCOUNT_FILE_CONTENTS }}"
+ service_account: $GCP_SERVICE_ACCOUNT
+ credentials_json: ${{ secrets.CI_SERVICE_ACCOUNT_FILE_CONTENTS }}
- name: Set up Cloud SDK
uses: google-github-actions/setup-gcloud@v1
- name: Run cleanup
- run: |
+ run: |
./scripts/bootstrap-project.sh $GCP_PROJECT $GCP_SERVICE_ACCOUNT
./scripts/cleanup-project.sh $GCP_PROJECT $GCP_FOLDER_ID
# run tests
- name: Run integration tests
# Add the -vvv flag to print out more output
- run: ansible-test integration -v --color --python 3.9 --venv-system-site-packages \ No newline at end of file
+ run: ansible-test integration -v --color --python 3.9 --venv-system-site-packages
diff --git a/ansible_collections/google/cloud/.github/workflows/ansible-test.yml b/ansible_collections/google/cloud/.github/workflows/ansible-test.yml
index 5ccdd1447..26078e86c 100644
--- a/ansible_collections/google/cloud/.github/workflows/ansible-test.yml
+++ b/ansible_collections/google/cloud/.github/workflows/ansible-test.yml
@@ -1,7 +1,8 @@
-name: "Run tests for the cloud.google collection"
+---
+name: Run tests for the cloud.google collection
on: [pull_request]
env:
- PYTHON_VERSION: "3.9" # minimum version for Ansible 2.14
+ PYTHON_VERSION: "3.9" # minimum version for Ansible 2.15
jobs:
sanity-and-lint:
runs-on: ubuntu-latest
@@ -12,13 +13,14 @@ jobs:
matrix:
ansible_version:
- stable-2.14
+ - stable-2.15
steps:
- name: check out code
- uses: actions/checkout@v2
+ uses: actions/checkout@v4
with:
path: ansible_collections/google/cloud
- name: Set up Python
- uses: actions/setup-python@v1
+ uses: actions/setup-python@v4
with:
python-version: ${{ env.PYTHON_VERSION }}
# Automation-hub requires python2.7 sanity tests
@@ -36,7 +38,7 @@ jobs:
# validate-modules cannot be turned on until #498 is resolved.
run: ansible-test sanity -v --color --skip validate-modules
- name: Install ansible-lint
- run: pip install ansible-lint==6.13.1
+ run: pip install ansible-lint==6.22.0
- name: Run ansible-lint
run: ansible-lint
unit:
@@ -48,16 +50,16 @@ jobs:
matrix:
ansible_version:
- stable-2.14
- - stable-2.11
+ - stable-2.15
steps:
- name: check out code
- uses: actions/checkout@v2
+ uses: actions/checkout@v4
with:
path: ansible_collections/google/cloud
- name: Set up Python
- uses: actions/setup-python@v1
+ uses: actions/setup-python@v4
with:
- python-version: "${{ env.PYTHON_VERSION }}"
+ python-version: ${{ env.PYTHON_VERSION }}
- name: Install dependencies
run: pip install -r requirements.txt
- name: Install test dependencies
@@ -65,4 +67,4 @@ jobs:
- name: Install ansible-base (${{ matrix.ansible_version }})
run: pip install https://github.com/ansible/ansible/archive/${{ matrix.ansible_version }}.tar.gz --disable-pip-version-check
- name: Run unit tests
- run: ansible-test units -v --color --python "$PYTHON_VERSION" \ No newline at end of file
+ run: ansible-test units -v --color --python "$PYTHON_VERSION"
diff --git a/ansible_collections/google/cloud/.github/workflows/automationhub.yml b/ansible_collections/google/cloud/.github/workflows/automationhub.yml
index 29e126283..6adb1380e 100644
--- a/ansible_collections/google/cloud/.github/workflows/automationhub.yml
+++ b/ansible_collections/google/cloud/.github/workflows/automationhub.yml
@@ -1,16 +1,16 @@
+---
name: Upload release to Automation Hub
on:
release:
types: [created]
-
jobs:
deploy:
runs-on: ubuntu-latest
steps:
- - uses: actions/checkout@v1
+ - uses: actions/checkout@v4
- name: Set up Python
- uses: actions/setup-python@v1
+ uses: actions/setup-python@v4
with:
python-version: '3.x'
- name: Install dependencies
diff --git a/ansible_collections/google/cloud/.github/workflows/gcloud.yml b/ansible_collections/google/cloud/.github/workflows/gcloud.yml
index 8100e1e6f..0fac68134 100644
--- a/ansible_collections/google/cloud/.github/workflows/gcloud.yml
+++ b/ansible_collections/google/cloud/.github/workflows/gcloud.yml
@@ -1,18 +1,19 @@
-name: "google.cloud.gcloud"
+---
+name: google.cloud.gcloud
on:
push:
paths:
- - 'roles/gcloud/**'
- - '.github/workflows/gcloud.yml'
- - 'molecule/gcloud/**'
+ - roles/gcloud/**
+ - .github/workflows/gcloud.yml
+ - molecule/gcloud/**
pull_request:
paths:
- - 'roles/gcloud/**'
- - '.github/workflows/gcloud.yml'
- - 'molecule/gcloud/**'
+ - roles/gcloud/**
+ - .github/workflows/gcloud.yml
+ - molecule/gcloud/**
jobs:
molecule:
- runs-on: ubuntu-18.04
+ runs-on: ubuntu-latest
env:
PY_COLORS: 1
ANSIBLE_FORCE_COLOR: 1
@@ -26,12 +27,12 @@ jobs:
- gcloud
steps:
- name: Check out code
- uses: actions/checkout@v1
+ uses: actions/checkout@v4
with:
path: ansible_collections/google/cloud
- name: Set up Python 3.9
- uses: actions/setup-python@v1
+ uses: actions/setup-python@v4
with:
python-version: 3.9
@@ -47,9 +48,10 @@ jobs:
sudo apt-get update
sudo apt-get install -y docker-ce docker-ce-cli containerd.io
python -m pip install --upgrade pip
- pip install molecule[docker] yamllint ansible ansible-lint docker
+ pip install molecule-plugins[docker] yamllint ansible ansible-lint docker
- name: Run role test
+ working-directory: ansible_collections/google/cloud
run: >-
molecule --version &&
ansible --version &&
diff --git a/ansible_collections/google/cloud/.github/workflows/gcsfuse.yml b/ansible_collections/google/cloud/.github/workflows/gcsfuse.yml
index a58e6a373..2d0dbc1bb 100644
--- a/ansible_collections/google/cloud/.github/workflows/gcsfuse.yml
+++ b/ansible_collections/google/cloud/.github/workflows/gcsfuse.yml
@@ -1,4 +1,5 @@
-name: "google.cloud.gcsfuse"
+---
+name: google.cloud.gcsfuse
on:
push:
paths:
@@ -10,7 +11,7 @@ on:
- .github/workflows/gcsfuse.yml
jobs:
gcsfuse:
- runs-on: ubuntu-18.04
+ runs-on: ubuntu-latest
env:
PY_COLORS: 1
ANSIBLE_FORCE_COLOR: 1
@@ -21,12 +22,12 @@ jobs:
- gcsfuse
steps:
- name: Check out code
- uses: actions/checkout@v1
+ uses: actions/checkout@v4
with:
path: ansible_collections/google/cloud
- name: Set up Python 3.9
- uses: actions/setup-python@v1
+ uses: actions/setup-python@v4
with:
python-version: 3.9
@@ -42,9 +43,10 @@ jobs:
sudo apt-get update
sudo apt-get install -y docker-ce docker-ce-cli containerd.io
python -m pip install --upgrade pip
- pip install molecule[docker] yamllint ansible ansible-lint docker
+ pip install molecule-plugins[docker] yamllint ansible ansible-lint docker
- name: Run role test
+ working-directory: ansible_collections/google/cloud
run: >-
molecule --version &&
ansible --version &&
diff --git a/ansible_collections/google/cloud/.github/workflows/pythonpublish.yml b/ansible_collections/google/cloud/.github/workflows/pythonpublish.yml
index 0318edfc4..dd460e685 100644
--- a/ansible_collections/google/cloud/.github/workflows/pythonpublish.yml
+++ b/ansible_collections/google/cloud/.github/workflows/pythonpublish.yml
@@ -1,16 +1,16 @@
+---
name: Upload release to Galaxy
on:
release:
types: [created]
-
jobs:
deploy:
runs-on: ubuntu-latest
steps:
- - uses: actions/checkout@v1
+ - uses: actions/checkout@v4
- name: Set up Python
- uses: actions/setup-python@v1
+ uses: actions/setup-python@v4
with:
python-version: '3.x'
- name: Install dependencies
diff --git a/ansible_collections/google/cloud/.gitignore b/ansible_collections/google/cloud/.gitignore
index d1aae87bf..e7a7d8f1b 100644
--- a/ansible_collections/google/cloud/.gitignore
+++ b/ansible_collections/google/cloud/.gitignore
@@ -6,3 +6,4 @@ tests/output/
__pycache__
*.tar.gz
venv/
+changelogs/.plugin-cache.yaml
diff --git a/ansible_collections/google/cloud/CHANGELOG.rst b/ansible_collections/google/cloud/CHANGELOG.rst
index 795153473..663a9ab69 100644
--- a/ansible_collections/google/cloud/CHANGELOG.rst
+++ b/ansible_collections/google/cloud/CHANGELOG.rst
@@ -5,6 +5,37 @@ Google.Cloud Release Notes
.. contents:: Topics
+v1.3.0
+======
+
+Minor Changes
+-------------
+
+- anisble-test - integration tests are now run against 2.14.0 and 2.15.0
+- ansible - 2.14.0 is now the minimum version supported
+- ansible-lint - fixed over a thousand reported errors
+- ansible-lint - upgraded to 6.22
+- ansible-test - add support for GCP application default credentials (https://github.com/ansible-collections/google.cloud/issues/359).
+- gcp_serviceusage_service - added backoff when checking for operation completion.
+- gcp_serviceusage_service - use alloyb API for the integration test as spanner conflicts with other tests
+- gcp_sql_ssl_cert - made sha1_fingerprint optional, which enables resource creation
+- gcp_storage_default_object_acl - removed non-existent fields; the resource is not usable.
+
+v1.2.0
+======
+
+Minor Changes
+-------------
+
+- Add DataPlane V2 Support.
+- Add auth support for GCP access tokens (#574).
+- Add support for ip_allocation_policy->stack_type.
+
+Bugfixes
+--------
+
+- Use default service account if `service_account_email` is unset.
+
v1.1.3
======
diff --git a/ansible_collections/google/cloud/CONTRIBUTING.md b/ansible_collections/google/cloud/CONTRIBUTING.md
index 716d767c8..74c753d58 100644
--- a/ansible_collections/google/cloud/CONTRIBUTING.md
+++ b/ansible_collections/google/cloud/CONTRIBUTING.md
@@ -15,13 +15,25 @@ under a directory `ansible_collections`. Clone ensuring that hierarchy:
```shell
mkdir -p $TARGET_DIR/ansible_collections/google
-git clone <url> $TARGET_DIR/collections/google/cloud
+git clone <url> $TARGET_DIR/ansible_collections/google/cloud
+```
+
+Then set up your Python virtual environment:
+
+```shell
+cd $TARGET_DIR/ansible_collections/google/cloud
+python3 -m venv venv
+. ./venv/bin/activate
+pip3 install -r requirements.txt
+pip3 install -r requirements-test.txt
+pip3 install ansible
```
## Running tests
-### prequisites for all tests
+### Prequisites for all tests
+- Install `gcloud` following [these instructions](https://cloud.google.com/sdk/docs/install).
- Install the `ansible` package.
- Some container runtime is necessary (e.g. `podman` or `docker`). The instructions use podman.
@@ -29,18 +41,63 @@ git clone <url> $TARGET_DIR/collections/google/cloud
### Integration testing prequisites
-#### Installing personal GCP credentials
+#### Authentication with personal GCP credentials
+
+If you are running the integration tests locally the easiest way to
+authenticate to GCP is using [application default credentials](https://cloud.google.com/sdk/docs/authorizing#adc).
+Once you have installed `gcloud` and performed basic initialization (via `gcloud init`) run:
+
+```shell
+gcloud auth application-default login
+```
+
+#### Authentication with service account credentials
+
+A service account may also be used to run the integration tests. You can create one using `gcloud`:
+
+```shell
+gcloud iam service-accounts create ansible-test-account \
+ --description="For running Anisble integration tests" \
+ --display-name="Ansible Test Account"
+```
+
+You'll also need to export a key file. Here and below `$SERVICE_ACCOUNT_NAME`
+is the full email address of the service account, in the form
+`EMAIL@PROJECT_ID.iam.gserviceaccount.com`, e.g., if you used the
+account name `ansible-test-account` as suggested above and your project
+ID is `my-test-project`, use `ansible-test-account@my-test-project.iam.gserviceaccount.com`.
+
+```shell
+gcloud iam service-accounts keys create /path/to/cred/file.json \
+ --iam-account=ansible-test-account@my-test-project.iam.gserviceaccount.com
+chmod 0600 /path/to/cred/file.json
+```
+
+Read the [best practices for managing service account keys](https://cloud.google.com/iam/docs/best-practices-for-managing-service-account-keys)
+to learn how to keep your service account key and your GCP resources safe.
+
+#### Configuring test credentials
The integration tests for this module require the use of real GCP credentials, and must provide
-ansible-test those values. They can be added by authoring the following in `tests/integration/cloud-config-gcp.ini`:
+ansible-test those values. They can be added by creating the file `tests/integration/cloud-config-gcp.ini`.
+
+If you are using personal (i.e., application default) credentials, add:
+
+```
+[default]
+gcp_project: $PROJECT_ID
+gcp_cred_kind: application
+gcp_folder_id: $TEST_FOLDER (to create test projects)
+```
+
+If you are using a service account for credentials, add:
```
[default]
-gcp_project: @PROJECT_ID
-gcp_cred_file: @CRED_FILE
-gcp_cred_kind: @CRED_KIND
-gcp_cred_email: @EMAIL
-gcp_folder_id: @TEST_FOLDER (to create test projects)
+gcp_project: $PROJECT_ID
+gcp_cred_file: /path/to/cred/file.json
+gcp_cred_kind: serviceaccount
+gcp_folder_id: $TEST_FOLDER (to create test projects)
```
#### Setting up the project for testing
@@ -51,7 +108,8 @@ and is expected to be configured beforehand.
For convenience, a bootstrap script is provided.
NOTE: running this script will make irreversible changes in your
-GCP project (e.g. create an AppEngine project):
+GCP project (e.g. create an AppEngine project). You can omit
+`$SERVICE_ACCOUNT_NAME` is you are using application default credentials.
```bash
bash ./scripts/bootstrap-project.sh $PROJECT_ID $SERVICE_ACCOUNT_NAME
@@ -66,10 +124,10 @@ Run `ansible-test integration`. Currently some tests are disabled as [test are b
### Prequisites for role tests
If you would like to use podman, you must
-install the `molecule[podman]` package in PyPI:
+install the `molecule-plugins[podman]` package in PyPI:
```
-pip install --upgrade molecule[podman]
+pip install --upgrade molecule-plugins[podman]
```
### Running role tests
@@ -92,7 +150,7 @@ ansible-lint
## Specific Tasks
-The following enumerates detailed documentation for specific tasks related tot
+The following enumerates detailed documentation for specific tasks related to
the codebase.
### Updating the supported ansible-core version
diff --git a/ansible_collections/google/cloud/FILES.json b/ansible_collections/google/cloud/FILES.json
index fb1d61381..1dd95931b 100644
--- a/ansible_collections/google/cloud/FILES.json
+++ b/ansible_collections/google/cloud/FILES.json
@@ -8,38 +8,17 @@
"format": 1
},
{
- "name": "README.md",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "bdd2f76b22792d422f1cdde90f23087bbcdf5e20689b7a38636863134ab19106",
- "format": 1
- },
- {
- "name": "changelogs",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
- "format": 1
- },
- {
- "name": "changelogs/changelog.yaml",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "6002770b6ce75ffd08c2b6cd16c89cacf1e8002b0110acbd8e0da0b55b94f394",
- "format": 1
- },
- {
- "name": "changelogs/.plugin-cache.yaml",
+ "name": "LICENSE",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "1e99d39043378da0c1e6a7caccbf0eddee0e215e2fdc9b6896318d51cae87d4f",
+ "chksum_sha256": "8ceb4b9ee5adedde47b31e975c1d90c73ad27b6b165a1dcd80c7c545eb65b903",
"format": 1
},
{
- "name": "changelogs/config.yaml",
+ "name": ".yamllint",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "9fd34b7976d067874a6433e49aa68b84e4fba5f67a8d5446e074629fd3431232",
+ "chksum_sha256": "5845e18e9f23155f423207df9abac970aed687c638620bc2c9ee06706191054b",
"format": 1
},
{
@@ -50,59 +29,24 @@
"format": 1
},
{
- "name": ".gitignore",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "a2166c7f82586c11cedcf75d021f5e077f004bf1f809bbcde62d269e47d0d2af",
- "format": 1
- },
- {
- "name": ".yamllint",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "5845e18e9f23155f423207df9abac970aed687c638620bc2c9ee06706191054b",
- "format": 1
- },
- {
- "name": "test-fixtures",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
- "format": 1
- },
- {
- "name": "test-fixtures/cloud-function.zip",
+ "name": "requirements-test.txt",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "ee1e4f66f4fa0eed5c6f6dcf77586a61c611c012cdde2c12469a32dbc787e052",
+ "chksum_sha256": "163167a063d01a440c2a19fa5879655d8b78378463fb825713de832f822738f6",
"format": 1
},
{
- "name": "test-fixtures/cloud-function-source",
+ "name": "meta",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "test-fixtures/cloud-function-source/build-function-zip.sh",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "0f90d1f2aff756f1e576595f756ceb3437b653657cbf75ae663f44c0bcab7a85",
- "format": 1
- },
- {
- "name": "test-fixtures/cloud-function-source/main.py",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "1d1d875a78943a05f939f77323f8c1c172e23d623a879e367d97759e353012cc",
- "format": 1
- },
- {
- "name": "test-fixtures/cloud-function-source/requirements.txt",
+ "name": "meta/runtime.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "900f6536a0bb496cb7390407df0515010a84b85e283f1e046580156e434d1836",
+ "chksum_sha256": "f86f1e59da294f6db2c9b8fc3fe3fb434c229e8b041d8d1f5a9b5363ae261986",
"format": 1
},
{
@@ -113,1991 +57,1977 @@
"format": 1
},
{
- "name": "scripts/bootstrap-project.sh",
+ "name": "scripts/cleanup-project.sh",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "c42eea01e2d7231f7a08572ba5c350d958fbb6059e8530ec3976c317b28fe366",
+ "chksum_sha256": "d6649b1f636e09d512dba03abcd64497b1f8f342a6e5968fc6d403bde7c207cb",
"format": 1
},
{
- "name": "scripts/cleanup-project.sh",
+ "name": "scripts/bootstrap-project.sh",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "50f7f1eb44b247ff11fe3de36530baa48980aba85a6b6e486e99b77fa9bfb954",
+ "chksum_sha256": "04b48802ae161d5604345f7882de815cc6320acc8364464aa2dd78332deac001",
"format": 1
},
{
- "name": "LICENSE",
+ "name": "README.md",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "8ceb4b9ee5adedde47b31e975c1d90c73ad27b6b165a1dcd80c7c545eb65b903",
+ "chksum_sha256": "bdd2f76b22792d422f1cdde90f23087bbcdf5e20689b7a38636863134ab19106",
"format": 1
},
{
- "name": "roles",
+ "name": "plugins",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "roles/gcloud",
+ "name": "plugins/inventory",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "roles/gcloud/README.md",
+ "name": "plugins/inventory/gcp_compute.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "700db6e9116d4b65967d2e9c33acd233996a07fed6cc5fd3575f6f100b205ee0",
- "format": 1
- },
- {
- "name": "roles/gcloud/vars",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "chksum_sha256": "029bc7e5d07c48136e993f6c0ee67d4dfec5696d9cc44d81d7940c15bac51c61",
"format": 1
},
{
- "name": "roles/gcloud/vars/main.yml",
+ "name": "plugins/README.md",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "f52d711103d50a437830c6fbcd04fb4bab49a0f82f6d26d1c791c6e8488dd090",
+ "chksum_sha256": "5be7ec7b71096d56e1cc48311b6a2266b77b5fdb9d1985b5bc625787b1e857c5",
"format": 1
},
{
- "name": "roles/gcloud/defaults",
+ "name": "plugins/modules",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "roles/gcloud/defaults/main.yml",
+ "name": "plugins/modules/gcp_pubsub_topic.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "13431c8a6a6bdc94bada2120d5f83b6a21d9352301de938bcf0b48ed5f61e557",
- "format": 1
- },
- {
- "name": "roles/gcloud/tasks",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "chksum_sha256": "918b28bf38cc360405252052066358f0e83c31c055c978146108d3b402e7226b",
"format": 1
},
{
- "name": "roles/gcloud/tasks/package",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "plugins/modules/gcp_compute_target_pool_info.py",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "5fc2e6ab60792bda378aedb0fd6698a97dab0453bf395c10ead890ca9d56d497",
"format": 1
},
{
- "name": "roles/gcloud/tasks/package/debian.yml",
+ "name": "plugins/modules/gcp_redis_instance.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "1e6207fb00ea3354e5fdc80818452f935902a5c37d3eeaac71e50b1eeeb1c849",
+ "chksum_sha256": "c7ce1bd69be3ca0d83dae963374a8448382a24705fb27a9add85754551b9d0c7",
"format": 1
},
{
- "name": "roles/gcloud/tasks/package/redhat.yml",
+ "name": "plugins/modules/gcp_compute_region_disk.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "ca5125fea9ae694d20cf4ed385654e16861829e5483934805736ba5aa331e257",
+ "chksum_sha256": "ba4ddb5edb885143634b5a3176fa8c4c5a4dea645f1c7425f5c3e245acae25f9",
"format": 1
},
{
- "name": "roles/gcloud/tasks/package/main.yml",
+ "name": "plugins/modules/gcp_cloudtasks_queue.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "2b9c557c35ced987ae9d263b72459db3fa72243aab3d480e61abb0ca2863b002",
+ "chksum_sha256": "d11616a58ed618a28669cd604a4a89431b2252a0d25206903499d16e251192cc",
"format": 1
},
{
- "name": "roles/gcloud/tasks/archive",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "plugins/modules/gcp_spanner_instance.py",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "a4abb175d6e989d8110aa2d18eae426e3fa196c97aca6acc212d6b3af028eee4",
"format": 1
},
{
- "name": "roles/gcloud/tasks/archive/command_completion.yml",
+ "name": "plugins/modules/gcp_compute_reservation.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "665c35bbc194d32e036c7060b93312154a34cd00a9df6b3f4bde46b52e1ecdcb",
+ "chksum_sha256": "704fc0de50b5d99adc424554dbb84925df8a7946109f6ed240acfbcd1b20bedc",
"format": 1
},
{
- "name": "roles/gcloud/tasks/archive/archive_install.yml",
+ "name": "plugins/modules/gcp_compute_target_instance.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "7a7a4d8cebb72f4d2ea24a89d1e58bc13079b3918e4c2b620f308adb70626a63",
+ "chksum_sha256": "394ab44d54ebb208a503c350c585f3cd5197b2fc723c27cb80ab983b68b1f4a1",
"format": 1
},
{
- "name": "roles/gcloud/tasks/archive/main.yml",
+ "name": "plugins/modules/gcp_compute_backend_service_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "45c16fb9f00a994dcebaab0f31b5e406df5f942e4ace048d72a925f7526b0096",
+ "chksum_sha256": "23b04d81b2383bc17e2f42a07154118893308d5164f790565819d62325f61393",
"format": 1
},
{
- "name": "roles/gcloud/tasks/main.yml",
+ "name": "plugins/modules/gcp_sourcerepo_repository_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "e4377e0e13216d665c5673eb397021014f69701032d72d10800023cb48941507",
+ "chksum_sha256": "446fa44670de275ef81b4d11689b3528e52575acb8e2268c49a2d6f3a5dab6df",
"format": 1
},
{
- "name": "roles/gcloud/meta",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "plugins/modules/gcp_iam_service_account.py",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "11a8b9ad09838886a487c6ea976ea4fc1f1cb7cb1c999fa05e5acb67be490466",
"format": 1
},
{
- "name": "roles/gcloud/meta/main.yml",
+ "name": "plugins/modules/gcp_compute_node_group.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "a9876e09039be32c4e13c914fc6957a8cbeaeb298171ba0ba13dff96e30eaaa0",
+ "chksum_sha256": "0611564d68d31f553d64aa32f31fb1398c80b0313d70026accf8cfe7ecdb3119",
"format": 1
},
{
- "name": "roles/gcp_http_lb",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "plugins/modules/gcp_spanner_database.py",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "e230ea5d9dd736cdfc489237979bec55ffec96168a65946bee16db0f939abea1",
"format": 1
},
{
- "name": "roles/gcp_http_lb/README.md",
+ "name": "plugins/modules/gcp_compute_firewall.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "81181c2882144e4f94701f8c5c00d309b2e4f836cc1469e74098c85e9ff6b060",
+ "chksum_sha256": "c24f8f2ba6c836c5c0367a92d7490c0745ad096df9352ff6aee682958a37e54d",
"format": 1
},
{
- "name": "roles/gcp_http_lb/vars",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "plugins/modules/gcp_compute_router_info.py",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "6a88ab70b8eaef4ddac7792b46a666d3a4e8b357233b4a1041be10eacbe359c9",
"format": 1
},
{
- "name": "roles/gcp_http_lb/vars/main.yml",
+ "name": "plugins/modules/gcp_compute_subnetwork_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "06cc6c8f6ad28db2bb4a77213c8272b09eead6d3ee2de8262b8cbf55224ceb9b",
+ "chksum_sha256": "1e414480380c0a492d99be77114e609daaa1600bafaf0e7d04b36f6c7c49e088",
"format": 1
},
{
- "name": "roles/gcp_http_lb/defaults",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "plugins/modules/gcp_compute_https_health_check_info.py",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "10ef96949d80b975e1eac42b7c2e3060791eccaa5865c821e6f882e1fbf3a76c",
"format": 1
},
{
- "name": "roles/gcp_http_lb/defaults/main.yml",
+ "name": "plugins/modules/gcp_compute_target_https_proxy.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "38c3b773c5e24378fe62615e28d6d70dd5b5db7951c6c2817b4e44f16afcab48",
+ "chksum_sha256": "36480d10c616323efb1a1153ceb2eb01b71affb2234b05eed8400f9a5b65fad6",
"format": 1
},
{
- "name": "roles/gcp_http_lb/tasks",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "plugins/modules/gcp_compute_health_check.py",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "822de3f7c76f3e2eb9a88caa7124eb8f81a3b5124098ed997b66f54906327172",
"format": 1
},
{
- "name": "roles/gcp_http_lb/tasks/main.yml",
+ "name": "plugins/modules/gcp_compute_autoscaler.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "f52706562b3c00bb48291cead932749b51f5e84ea193a803c3c1e7e328b41e1e",
+ "chksum_sha256": "f5df70f1b8d1d744affb9173166d375af1699d0fe4f16d33488a39b4dc339c40",
"format": 1
},
{
- "name": "roles/gcp_http_lb/meta",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "plugins/modules/gcp_dns_managed_zone.py",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "0c0341686d21a0d723eea828c7515fd3e7341127b67114acdbb2428fd5b6da1b",
"format": 1
},
{
- "name": "roles/gcp_http_lb/meta/main.yml",
+ "name": "plugins/modules/gcp_resourcemanager_project_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "9bb825b209ce2e26c4a971a5dc074020cc4ee48d64f21b1ab29f5965255ee9e7",
+ "chksum_sha256": "fae2d171d5100a3f60b95fb8b02ed021d318db9695231a7cd6d114cacf71da7e",
"format": 1
},
{
- "name": "roles/gcp_http_lb/tests",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "plugins/modules/gcp_compute_region_instance_group_manager_info.py",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "4015debcdf19fe5cc481c872a4dcf5bd1790942b2e11950d54c6ea006cb2423a",
"format": 1
},
{
- "name": "roles/gcp_http_lb/tests/inventory",
+ "name": "plugins/modules/gcp_container_node_pool.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "e02233819b1a09844410549191813f7cc7ba360f21298578f4ba1727a27d87fc",
+ "chksum_sha256": "b39febd4f3165a788f8965f3c66a76e2b2b9ce8480f621433fe1034648aa6442",
"format": 1
},
{
- "name": "roles/gcp_http_lb/tests/test.yml",
+ "name": "plugins/modules/gcp_bigquery_table.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "cf4544185b76646beaaff765d5f21029c372e2f74acfa2b11e781f4c202492d6",
+ "chksum_sha256": "e9024bdca5fa1d50719ac34c2fdcf4c7bcd5724f9124abd524a05aa0903d79e1",
"format": 1
},
{
- "name": "roles/gcsfuse",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "plugins/modules/gcp_serviceusage_service.py",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "c9f16883f838e3bbdd07b4fbad3fbd6eb8572820691a4daeb21a519ef8770c14",
"format": 1
},
{
- "name": "roles/gcsfuse/README.md",
+ "name": "plugins/modules/gcp_bigquery_table_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "34c69736a29bf57b2000acc4db084d253df1c98bfe1d7ec2514838897574dd05",
+ "chksum_sha256": "47bbbd482163aca9ed1b0128e1ce6ecd3a93485e57fd4853e6060f66c9df9e23",
"format": 1
},
{
- "name": "roles/gcsfuse/vars",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "plugins/modules/gcp_compute_interconnect_attachment.py",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "47794c7c3c7b02abe55302e3e1cd2f2ce998dcdb1dd17f799ad6ef16f22655bb",
"format": 1
},
{
- "name": "roles/gcsfuse/vars/main.yml",
+ "name": "plugins/modules/gcp_compute_region_health_check.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "a505a2742e0c7b2937368440a796503791485c999a4b9fd6f0e90715b2af8fa2",
+ "chksum_sha256": "8be2b835d6d89ce1766843bfaffc7048d63b24e5af9b38fabc37cfcd57cdd632",
"format": 1
},
{
- "name": "roles/gcsfuse/defaults",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "plugins/modules/gcp_compute_global_forwarding_rule.py",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "9141a11eebafc85606eb8ddb1698f7769302d50bce6d8153d548923a6022dc83",
"format": 1
},
{
- "name": "roles/gcsfuse/defaults/main.yml",
+ "name": "plugins/modules/gcp_compute_ssl_policy.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "680a1514fdbeae910661c7c44bd0dbf7e254b61e78f2c35bab61d5a43a928baf",
+ "chksum_sha256": "794bf24c6c0663bfd996055e4742c7858d4de0f87f6111f2e95dd4b3cffc9cc8",
"format": 1
},
{
- "name": "roles/gcsfuse/tasks",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "plugins/modules/gcp_compute_target_vpn_gateway.py",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "926c805c59b9f7e8c7fd46210f192b4bb84a169173682ba7fe64bdfe7652c341",
"format": 1
},
{
- "name": "roles/gcsfuse/tasks/debian.yml",
+ "name": "plugins/modules/gcp_compute_instance_group_manager.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "79b58ca15b3f8d25cb7cb580a5db58abfed8a4f7e7cb59dbb59e033c65a0336b",
+ "chksum_sha256": "32d55ba3ba31097802a5219329a9d6d88892b9ecf0b89809ed5acd4c894c43ee",
"format": 1
},
{
- "name": "roles/gcsfuse/tasks/main.yml",
+ "name": "plugins/modules/gcp_appengine_firewall_rule.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "eb596bb164b1e6de5bb4311afdb5c089d4c510496852cba8cd4bbab9ec16a1d0",
+ "chksum_sha256": "17d1936d7dbe3b849857eb9c0529348a601940c946f0c0ab61acb9c6b7ad4240",
"format": 1
},
{
- "name": "roles/gcsfuse/meta",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "plugins/modules/gcp_compute_target_http_proxy_info.py",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "c8c9e39f13522376f65efc53314bca9080ec6f0e7c86bc17a18670a4817459a7",
"format": 1
},
{
- "name": "roles/gcsfuse/meta/main.yml",
+ "name": "plugins/modules/gcp_compute_vpn_tunnel.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "a88bfa311596bf887962c34be6eae17e598b3c14bb973a239bb21934cfaaa444",
+ "chksum_sha256": "5abc0d4e6caabf733e30fde7278f6c5953a08b34803b26271df451d286ed05dc",
"format": 1
},
{
- "name": "roles/gcsfuse/handlers",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "plugins/modules/gcp_compute_network_endpoint_group.py",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "3b4c8b76c23e103033834c8d09a70432df500bd9c29fc64c472fe65348bcc1d3",
"format": 1
},
{
- "name": "roles/gcsfuse/handlers/main.yml",
+ "name": "plugins/modules/gcp_compute_firewall_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "06f6404a01fe05252d5834e091751bde4d8d2272274e712f01ad455942285f6b",
+ "chksum_sha256": "c09ae8e89b92fbd5799e0ad1d6a416525c560b41c4ce28862669fc209b9d6dcc",
"format": 1
},
{
- "name": "CONTRIBUTING.md",
+ "name": "plugins/modules/gcp_cloudfunctions_cloud_function.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "855d0296b98cbeaf5a89f12582f5efc4b39128b7698b5edb0feffd127c19f3a6",
+ "chksum_sha256": "fc737596a63fc2844092fb9e57dc17db1dd16b43cc19ab24e39327d3514fac72",
"format": 1
},
{
- "name": ".gitmodules",
+ "name": "plugins/modules/gcp_compute_image_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "15d86ac1fb9c04f919875abab5cf78444795e93fc0b8319c0aba72e4cf8bb2a6",
+ "chksum_sha256": "9a158e7e4476268859f83a0637b8cdeec4673ee29c7a951e492023cba33bc511",
"format": 1
},
{
- "name": "MAINTAINING.md",
+ "name": "plugins/modules/gcp_compute_instance_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "db413a937f5143578335b9e7970865eb3b55f30b0c6ac91d1abbd96c323c5ae1",
+ "chksum_sha256": "f145717e3a15614f1245e789890242738a9fb4440adfba0c67f328b3c2ca1fd1",
"format": 1
},
{
- "name": ".vscode",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "plugins/modules/gcp_compute_instance.py",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "4a9e4bdd77064c107bc0555b576b4408a4157a95103e14ebeb5de95f3147197c",
"format": 1
},
{
- "name": ".vscode/settings.json",
+ "name": "plugins/modules/gcp_compute_disk_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "d1be9315fe97520591ad6aca56c5b6ee625d3d2c84633de40f0f0afcc13a12a1",
+ "chksum_sha256": "d6a4b0fa6dd8ae31b4a5f49e7401919267c0720e2a725ac5aa9e90bb6e0e1b14",
"format": 1
},
{
- "name": "plugins",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "plugins/modules/gcp_filestore_instance_info.py",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "49cd05a60d2e23ee31fc119c025d71a89d0f0cfd9d0a83373dc5abd8f885fd2f",
"format": 1
},
{
- "name": "plugins/README.md",
+ "name": "plugins/modules/gcp_kms_crypto_key.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "5be7ec7b71096d56e1cc48311b6a2266b77b5fdb9d1985b5bc625787b1e857c5",
+ "chksum_sha256": "5b59ed5ddc982da544c4ce1d6c63af1b59638a8f8ac37cf8fd917246b7a873bb",
"format": 1
},
{
- "name": "plugins/inventory",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "plugins/modules/gcp_compute_target_ssl_proxy.py",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "445e8d2252556135f8b21d4ae9c234b607fa2793ebe80cafcca96468fbfe04d7",
"format": 1
},
{
- "name": "plugins/inventory/gcp_compute.py",
+ "name": "plugins/modules/gcp_bigtable_instance.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "d3c4a03704684b554f0b7f3a1aa7257d1724ea376cb987f212a48021f05695f8",
+ "chksum_sha256": "593413c3f6bb88b62c0b8096b269123727b1fd1d0ee0a587acfd93321935876a",
"format": 1
},
{
- "name": "plugins/modules",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "plugins/modules/gcp_spanner_instance_info.py",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "4d1c85ea0d8d59f3f08d88f0c7d7613d9fc47cdaec475638f0b6ba1f48a9b92b",
"format": 1
},
{
- "name": "plugins/modules/gcp_compute_target_http_proxy.py",
+ "name": "plugins/modules/gcp_compute_region_url_map.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "a46c662a2a7f536effd8f6460d03f87823f668959acd91be844a10a70fafc07d",
+ "chksum_sha256": "7328409ec02a60d5f6c8587c08f030870b706b0a6a845462f858b6acbea62eb9",
"format": 1
},
{
- "name": "plugins/modules/gcp_compute_router.py",
+ "name": "plugins/modules/gcp_compute_snapshot.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "828f9230a5a5f85b810dcc74c10aa86071b72e77bc7f3f69c9f4fc8d694389b2",
+ "chksum_sha256": "d3bdd8c9a65c1521ff39dfc3c2f2dcb07d7a540d6d2ae554056d274eacb41630",
"format": 1
},
{
- "name": "plugins/modules/gcp_runtimeconfig_variable.py",
+ "name": "plugins/modules/gcp_compute_region_target_https_proxy.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "f30c415ac2489f3f03558794b2704d857b1df6fa9a80aabf8d18f17da2781ae1",
+ "chksum_sha256": "9179112a6564d9bd81ec2bd24dee37f02e3719215cbb567cf8904bbb764644d0",
"format": 1
},
{
- "name": "plugins/modules/gcp_storage_default_object_acl.py",
+ "name": "plugins/modules/gcp_iam_service_account_key.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "0b7dfd27408da62cb42be5fe8a95e87e3c7798f3cba79746ac54993a54da9d4c",
+ "chksum_sha256": "e972fe20cea4f8ad25607e1b5c4e2d3261523c147119689aed65c4d3002ff554",
"format": 1
},
{
- "name": "plugins/modules/gcp_redis_instance.py",
+ "name": "plugins/modules/gcp_compute_target_tcp_proxy.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "100ae06e7c5136633a5fd99416a6645144bd6afcbed50d5248539844bd53efd1",
+ "chksum_sha256": "5acda4cb2f949744291bf26361ccd96911bbb4161852aaf612fcb2706f4425e2",
"format": 1
},
{
- "name": "plugins/modules/gcp_compute_subnetwork.py",
+ "name": "plugins/modules/gcp_mlengine_model.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "be684076711dad9058d800bee512ad0031478fba911246ff1ea014d6452660fc",
+ "chksum_sha256": "7a091202836e9d2196b01eecf1afc7e5814cbc5944be7aa65fb4ed0adcf3d3c9",
"format": 1
},
{
- "name": "plugins/modules/gcp_compute_node_template.py",
+ "name": "plugins/modules/gcp_compute_url_map_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "dfb057ab3183155cfcaca5390684b58601a29be1cafaecc34993dda1ac5d484d",
+ "chksum_sha256": "1898bc671b8b899f7a75b45353a52d67c7a8e5f0cb1671199a2c5f407e6848db",
"format": 1
},
{
- "name": "plugins/modules/gcp_compute_region_instance_group_manager_info.py",
+ "name": "plugins/modules/gcp_compute_route_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "af1155f408322e1cfc6dae67d94306f451b23801366fa02e66e431a268dc150a",
+ "chksum_sha256": "cc60b656606f8d9c4951c535b89f8a9939ee6b535b0e7a9e5162eb7cbeaac7a4",
"format": 1
},
{
- "name": "plugins/modules/gcp_compute_network.py",
+ "name": "plugins/modules/gcp_resourcemanager_project.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "f8b64d9732b92550936c24883192b4a062a93d42944ae2f8ceea0cf3ad16fdc3",
+ "chksum_sha256": "3b453a639ebad87fc5c3eebb78eea4986f27b9167e405ce93ac4e74b748474b1",
"format": 1
},
{
- "name": "plugins/modules/gcp_compute_instance_group_manager.py",
+ "name": "plugins/modules/gcp_compute_backend_service.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "b461c74e9789b2569219498e287de22a35b9ca2fbae728e1e4cea701ffbbb4bc",
+ "chksum_sha256": "8091e1fa179f951239b54e0b44376e44617243a2c882f994875074730a789304",
"format": 1
},
{
- "name": "plugins/modules/gcp_compute_ssl_policy.py",
+ "name": "plugins/modules/gcp_dns_resource_record_set.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "5e5a53db2193ad67f95f7a2f655b847de9007e8c894f8b61dd1415a97081d27a",
+ "chksum_sha256": "92bfa0ac79fe0136e06f2e4aed6227f3f4b99626261d3559a3fc2606e230ee8a",
"format": 1
},
{
- "name": "plugins/modules/gcp_filestore_instance_info.py",
+ "name": "plugins/modules/gcp_compute_target_ssl_proxy_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "cebf36847bef432e0583b4a0cfb38e1522359562937210ac42210369af8370f2",
+ "chksum_sha256": "85f5a543c6be9522748ce2c8aa094ad4fae4ec5a456530159c5a056b5681f8af",
"format": 1
},
{
- "name": "plugins/modules/gcp_compute_instance.py",
+ "name": "plugins/modules/gcp_compute_region_target_http_proxy_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "0a23c61d6122f61b9289f795d5b745f42ee2cab63b6edc03c64b2acd89df2318",
+ "chksum_sha256": "1d939d90613402e6040c4e97c0ef4b2f565b536da56a93bfb8c5648cc8a5fcb4",
"format": 1
},
{
- "name": "plugins/modules/gcp_compute_region_backend_service_info.py",
+ "name": "plugins/modules/gcp_compute_region_health_check_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "37b09288dccf4e3deb135ab7aa5629b5830cc3bb863b7ba6fe7fefdf7de84c3f",
+ "chksum_sha256": "6ff2a68925f9c38af9da8ad91832d3212bf4fe7a500ebdc3394a1e07a7ab346b",
"format": 1
},
{
- "name": "plugins/modules/gcp_storage_object.py",
+ "name": "plugins/modules/gcp_compute_http_health_check_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "9bbd7fef0ba5be051d3092dc196a5b08c10e54080c555dd8a3e98b512c71ee31",
+ "chksum_sha256": "86bb11af5db7137f7d71fee7eb68a560f45657a4e1772b1e819430cc68a7c237",
"format": 1
},
{
- "name": "plugins/modules/gcp_compute_route.py",
+ "name": "plugins/modules/gcp_redis_instance_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "e9fc323fba683f46f8d7aac33af2f7e0af29f0288df07c7a940b9f304537b7c5",
+ "chksum_sha256": "0f8b6ba39c56d492fdae25c4c93e1d059cadc54d59b3affcb48d094592d371c3",
"format": 1
},
{
- "name": "plugins/modules/gcp_compute_ssl_certificate.py",
+ "name": "plugins/modules/gcp_cloudscheduler_job_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "badebd74e39ad2b7e33d2ac1050cf4682c0a7922976ace02dfb47615b966a5ff",
+ "chksum_sha256": "1348168207292f67a45fa392512ec214667d331658ab6c50ca262711657244d9",
"format": 1
},
{
- "name": "plugins/modules/gcp_kms_key_ring_info.py",
+ "name": "plugins/modules/gcp_logging_metric.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "96d7ce97c8e77b93a682fba69410646457b697921191a5c8d52a51062c3e4350",
+ "chksum_sha256": "85ec7603d2795d95107fd8b38dc1ba2b0631f3496a211b9ee4dc08b7f020626d",
"format": 1
},
{
- "name": "plugins/modules/gcp_cloudbuild_trigger_info.py",
+ "name": "plugins/modules/gcp_compute_forwarding_rule_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "4f2e02b2ef1f2392a0b564b9eb67be6ea9a6281950869f0c7921e606502e2241",
+ "chksum_sha256": "e62d4603408c6548c55f571084098f6c915f0e778391c0d9d5cdc40b51488931",
"format": 1
},
{
- "name": "plugins/modules/gcp_container_cluster.py",
+ "name": "plugins/modules/gcp_mlengine_version.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "35182af210395bedbfeb583fc210a00fa773510c19465067e4f34da00022d31f",
+ "chksum_sha256": "57ddc3affc5b165dad6838cbbc5a0fd29e2c3e71449921b2bba2ad534d325d2e",
"format": 1
},
{
- "name": "plugins/modules/gcp_compute_target_instance.py",
+ "name": "plugins/modules/gcp_compute_interconnect_attachment_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "ad877ef2446fd8ae4553c1603a77e84014f85a251d0edcbae007a525b7910e78",
+ "chksum_sha256": "d18689e86891390dbb2877f3f3706421d4f0e6ca6df0881559e80e28f1ac1f83",
"format": 1
},
{
- "name": "plugins/modules/gcp_compute_vpn_tunnel.py",
+ "name": "plugins/modules/gcp_sql_instance_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "6ad616405843df5eedf1f5c9e4e672170cbbcfd0cacdd09495788b501d03fb5c",
+ "chksum_sha256": "4c36bdcc7e940346ac892d7ef5d48006fc06243e5506ba4e7d3733d01b86ef48",
"format": 1
},
{
- "name": "plugins/modules/gcp_cloudtasks_queue_info.py",
+ "name": "plugins/modules/gcp_compute_router.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "3ff879abc7d637989aac84cb06e2ef5c08eb197ef33633469825c813aa0dcfc4",
+ "chksum_sha256": "27569009cd337a61100a12ff45035844f4d55c8315beabf1180d425b3dd9526d",
"format": 1
},
{
- "name": "plugins/modules/gcp_compute_firewall.py",
+ "name": "plugins/modules/gcp_pubsub_subscription.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "ad472ac8d7f46949b8ac6ab49126106a9c455b48c35aae0819627effbde4d3d5",
+ "chksum_sha256": "f123bf5987d1f5b1bc1c9185e74519dc115523602ae3bebe3ea1cc989dcc7ab6",
"format": 1
},
{
- "name": "plugins/modules/gcp_filestore_instance.py",
+ "name": "plugins/modules/gcp_compute_node_group_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "8f3244b8c5a6f3f4cd5d3d0faa540d03d33b5856241c0e7fa7b4bde6bfa1d5fb",
+ "chksum_sha256": "9aec873cb26ca48bdaa53fb87d732a8c130abb0916d17fadbe9b2d405e45ce3b",
"format": 1
},
{
- "name": "plugins/modules/gcp_resourcemanager_project.py",
+ "name": "plugins/modules/gcp_compute_target_instance_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "145b3eb57cbde878b6da721a0e53e7dc6a0c81a99656b20bade9c4103e398fa3",
+ "chksum_sha256": "350e66aa6f243187df8af76b5e18b2aec4fa7584f3983d4609f99ddc9ac42ab6",
"format": 1
},
{
- "name": "plugins/modules/gcp_dns_resource_record_set_info.py",
+ "name": "plugins/modules/gcp_container_node_pool_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "16064edd194165f42c47f400675063f2b5ad2d069cc7f290b42187f1000aeccf",
+ "chksum_sha256": "3639ea3685defc6aeb90909c4cdd6816ce28ae21d0b7f39f6b8c506e057fac96",
"format": 1
},
{
- "name": "plugins/modules/gcp_compute_target_ssl_proxy.py",
+ "name": "plugins/modules/gcp_cloudbuild_trigger_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "72ec56378109cdfe4c0b5f94b9a06325af4e3ba3e5f05d96533bd073e146d2cf",
+ "chksum_sha256": "dd7457fb787550c8293a26b8b086c5e8414727c32f72bbcc1e68d89facc2e806",
"format": 1
},
{
- "name": "plugins/modules/gcp_compute_backend_bucket_info.py",
+ "name": "plugins/modules/gcp_spanner_database_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "1ea9f227c804c103711d5601bc7f4bb3e943d7e4ec95c27f29a2027da557fc0d",
+ "chksum_sha256": "47c7954056911f41a05bf36d51149e792def4f81489f92e146134f334bab628a",
"format": 1
},
{
- "name": "plugins/modules/gcp_compute_region_url_map_info.py",
+ "name": "plugins/modules/gcp_compute_instance_group_manager_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "1741b6d136bdda5c6b7ad66c2cb51d1363e2e96d23686cda3ae0cf1b2da01980",
+ "chksum_sha256": "d8a543523abe3b35b48b9dc599d3e33beab2028eef5ffbbd1dad091d26fdbcd2",
"format": 1
},
{
- "name": "plugins/modules/gcp_compute_image_info.py",
+ "name": "plugins/modules/gcp_compute_region_instance_group_manager.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "11f0b47bd0ace58f1d132233d12decaa3ff1aaa21ed7ad550664c5cadc22b995",
+ "chksum_sha256": "67d533711c6a247db923bf36d258ff719c50a485010966361a77de138ba03ffd",
"format": 1
},
{
- "name": "plugins/modules/gcp_mlengine_model_info.py",
+ "name": "plugins/modules/gcp_compute_reservation_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "6b35eb80136d754c7e79c28d510f47ef3eacfb02752f9a1952c9483a642ff686",
+ "chksum_sha256": "e154eeb2a93e5bab6bfb3da86c75f254faf7b048d808d4f2674ea16a254a6a3b",
"format": 1
},
{
- "name": "plugins/modules/gcp_kms_key_ring.py",
+ "name": "plugins/modules/gcp_compute_backend_bucket_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "7fcf346b9d61c62aec4f374a2a3bc5570f9862bfa9144390c909a27a15a8702d",
+ "chksum_sha256": "ee77d0ac2fd7d3367af7fba36e754050d83ff879c29ee7e0713320b10c18b206",
"format": 1
},
{
- "name": "plugins/modules/gcp_dns_managed_zone.py",
+ "name": "plugins/modules/gcp_pubsub_topic_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "332ea663cf42160e487a17604e9881296812c4b7c9b35c8e38726694704d5856",
+ "chksum_sha256": "52635f5331624093d203c3a5eb1ec0c71e42c385b05c034d5f577f0182543b68",
"format": 1
},
{
- "name": "plugins/modules/gcp_sql_instance_info.py",
+ "name": "plugins/modules/gcp_compute_target_tcp_proxy_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "5d0feb5e4b818b487eda5daa5a0e71d612d3f854ab7132dc162bb6f307bcf2ab",
+ "chksum_sha256": "67a0b6138dad2e6b5eeff59cb3aa16a0827f0a9f5a302187d4b5e152c34a2ad2",
"format": 1
},
{
- "name": "plugins/modules/gcp_compute_target_http_proxy_info.py",
+ "name": "plugins/modules/gcp_compute_global_address.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "c524ed08f1d1d5ed44ed1adb5cd8bbc39424e14937bbe4f6ee80a17095ae399d",
+ "chksum_sha256": "368b58c4f1b2792cca6ff3b548cf9ae96873e906a65cb853709f54ce3212d1ea",
"format": 1
},
{
- "name": "plugins/modules/gcp_compute_http_health_check_info.py",
+ "name": "plugins/modules/gcp_compute_ssl_certificate_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "275c1caac87ebb0110c892011be1a16e822f9c1b92f2c1d900e2443578491294",
+ "chksum_sha256": "14d27a678a3431418cae191ac3376c3505cc4f8e19e5a2c90454ee4b1dbfacd3",
"format": 1
},
{
- "name": "plugins/modules/gcp_cloudscheduler_job_info.py",
+ "name": "plugins/modules/gcp_compute_ssl_certificate.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "d24ef38fb21c1013edd4572d9035762dcdaf86670d6b35e8bbaef9ae0bd76f96",
+ "chksum_sha256": "04db00cbf9d1ed9061fac234a54b365c2e16d492f0fc674ea6472bfdac277137",
"format": 1
},
{
- "name": "plugins/modules/gcp_compute_instance_template.py",
+ "name": "plugins/modules/gcp_dns_managed_zone_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "d9d69a5de068fbbf2af222910f6a2f7b038fbd6723fd1e3a9dd3e9aaf69ce0da",
+ "chksum_sha256": "384488d626e9f5189055011cfa414b5753890248d2828522288b8e9ab91b4de3",
"format": 1
},
{
- "name": "plugins/modules/gcp_container_node_pool_info.py",
+ "name": "plugins/modules/gcp_compute_instance_group_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "3434a4b71a9c176a0795b1ec7e0522d3b2c5ea2f12ce14c3979e7744a927c481",
+ "chksum_sha256": "e6a28b5474b2be500415707fc12498213c26f0a021449678cee4d207fa9079ac",
"format": 1
},
{
- "name": "plugins/modules/gcp_compute_target_pool.py",
+ "name": "plugins/modules/gcp_sql_user_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "61e6cdd1168bc5188b46251949d78c1e895c399a7263a176d8f37ca5ba927666",
+ "chksum_sha256": "1d5f788dd16acd7cdb7fb9bf41302930e45dcf4f3d88b275849a45aa3403f59e",
"format": 1
},
{
- "name": "plugins/modules/gcp_compute_ssl_certificate_info.py",
+ "name": "plugins/modules/gcp_compute_network_endpoint_group_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "3c7ebb58bc7b293c1832c4f59efc829042ee5345624f0c634193f0d1a6ec96eb",
+ "chksum_sha256": "0ee2779c6a9d013f0b66f352a5537a4a2303138b9f3d5fe1e209417ff0ee71a3",
"format": 1
},
{
- "name": "plugins/modules/gcp_compute_address_info.py",
+ "name": "plugins/modules/gcp_bigtable_instance_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "b639f63b468c98e459fdd543ff7776789cceac06a00c1dfe104ab5414a83d214",
+ "chksum_sha256": "5ad4434e8856e3ab6ad5f87a8e92ef6972bdc1586859d15403f28677c67fe17f",
"format": 1
},
{
- "name": "plugins/modules/gcp_serviceusage_service_info.py",
+ "name": "plugins/modules/gcp_runtimeconfig_variable_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "969f8e53f57118d437ac84227e295fabd4589c6c1500bb9f28bcfd0051accc0c",
+ "chksum_sha256": "4a70e1dc0076007e8304f68589e810a0eff1b8809964cde8d7f9cc7abccd51fc",
"format": 1
},
{
- "name": "plugins/modules/gcp_compute_instance_group_manager_info.py",
+ "name": "plugins/modules/gcp_compute_ssl_policy_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "0420df9aea30dbf4121f8ae235530cb8e5995212827ff1220b20ea707e2a7fa5",
+ "chksum_sha256": "2f7b957952d3ab774ec99300972056ba16a5c59d45aa9d168755a461b0d1fe1f",
"format": 1
},
{
- "name": "plugins/modules/gcp_compute_backend_service_info.py",
+ "name": "plugins/modules/gcp_compute_http_health_check.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "5157185c92b9fa127f23a13b0bb35dddf216c696b37316a625f4365ad72e5b95",
+ "chksum_sha256": "9290bf2bd67a71f7424ae3b2f5e04d036cc54b1f3b0d06cd841ecebefeb6cf96",
"format": 1
},
{
- "name": "plugins/modules/gcp_compute_disk_info.py",
+ "name": "plugins/modules/gcp_sql_instance.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "7312e6c082c7f7df1a73c8ada6966f8058f3f8fbc298bdb0544468c3c77a89c9",
+ "chksum_sha256": "788e17bac7280c631e2283e6632f13812e6086b35bf0075aa479975be6c7cdcb",
"format": 1
},
{
- "name": "plugins/modules/gcp_compute_instance_group.py",
+ "name": "plugins/modules/gcp_mlengine_version_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "4e567c665bc7e7c196b8c0d7b75a5541b208175dfe4580952763b83195fad32d",
+ "chksum_sha256": "5b959b7bb001989d78601e4d4d7908c736aec8cb6f39ea3e812579202839cdd0",
"format": 1
},
{
- "name": "plugins/modules/gcp_cloudscheduler_job.py",
+ "name": "plugins/modules/gcp_runtimeconfig_config_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "d409a760c812d7d0f79dd0818bc4987aa431f4413ac073f2d7e97d3001ac2d1c",
+ "chksum_sha256": "57570a09b2598916d21f68c4e20c6107d3ce6dd04eeda992d878f39d36de3887",
"format": 1
},
{
- "name": "plugins/modules/gcp_logging_metric.py",
+ "name": "plugins/modules/gcp_logging_metric_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "e32f8cc1b57cbb47e458d7ad2e0af73fb92d250e20048f63247c0e59dabb8a2d",
+ "chksum_sha256": "59fe0022185e3a1be69079dfb086972cda41afec3bf8997e6124f3eb50425e82",
"format": 1
},
{
- "name": "plugins/modules/gcp_compute_forwarding_rule_info.py",
+ "name": "plugins/modules/gcp_compute_instance_template.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "02f4e9a4ec49afc3184bba24ae1385a45b8e4de7543259dfc75f3449b94a40d6",
+ "chksum_sha256": "a4a06e0a84ecfdd854970bbe4373b8d65f9a8e221f2579312f763d05353a41af",
"format": 1
},
{
- "name": "plugins/modules/gcp_compute_external_vpn_gateway.py",
+ "name": "plugins/modules/gcp_tpu_node_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "d05d05d2be455d482fb268f9a174993996e205e41aeacd356abc74816e26e8eb",
+ "chksum_sha256": "96d6516ab1046500de8c486695513627ff60392c6126f28ace4692630fb84fd5",
"format": 1
},
{
- "name": "plugins/modules/gcp_compute_address.py",
+ "name": "plugins/modules/gcp_compute_address_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "03f322bb4986ee7f374b0e06b30ef859878954238c8af55e192fa7259339516f",
+ "chksum_sha256": "ead25753161b5537ec163d00e93d756777f2b6dc99d60296c89639ca840a27a6",
"format": 1
},
{
- "name": "plugins/modules/gcp_bigquery_table.py",
+ "name": "plugins/modules/gcp_compute_instance_template_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "afecfe480188c2190c87064d866f503f25671f8de4b35de3ca2e48d92ea72c37",
+ "chksum_sha256": "3974df5365a4b94a7501bbfc43ecacda0fc8baf405231470dd24435fe100a6d7",
"format": 1
},
{
- "name": "plugins/modules/gcp_iam_service_account_key.py",
+ "name": "plugins/modules/gcp_iam_role_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "1603de86c7bf139738bb6821f57e7c1ce7d72570b060df5e174a379df464ea83",
+ "chksum_sha256": "01d2583fba8f95e27955da03915bf68290a8de551daac2f97350c9ec1b9222d4",
"format": 1
},
{
- "name": "plugins/modules/gcp_sql_ssl_cert.py",
+ "name": "plugins/modules/gcp_container_cluster.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "d45f2577732d0fb4bcc9bcae4fecf934b7a13d7fa4eaaa1c8ff38ab3e1626c9c",
+ "chksum_sha256": "58283f58c875ba24fab9c8ce9d465dd894f5280d8afaa629787693a186c07291",
"format": 1
},
{
- "name": "plugins/modules/gcp_iam_role.py",
+ "name": "plugins/modules/gcp_appengine_firewall_rule_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "7273f96d103bcf55728827b67ed9ab243a051ff878675545651868e9bf608273",
+ "chksum_sha256": "f06c8daa4ef7db2f1551d9d216543b771a4c820b4884c86d4dd3eb81962d21fe",
"format": 1
},
{
- "name": "plugins/modules/gcp_iam_service_account.py",
+ "name": "plugins/modules/gcp_storage_bucket.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "02e88f7c0e8cc6f3fd23eb131f29894d41b885223ef79a783b8938dad303e2d4",
+ "chksum_sha256": "9b70641def946ee1ee7fb8da57293c4a709748997fd80ea98605f9aea94ac6c0",
"format": 1
},
{
- "name": "plugins/modules/gcp_compute_region_instance_group_manager.py",
+ "name": "plugins/modules/gcp_iam_role.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "3d43b8b9b9eeaca374a54725c4068961f6205be2d592cf498fcfeac603c122e4",
+ "chksum_sha256": "6c5bbd9fffb50e943da042d0af0018db1b9dc70752f6b2286f45f290f7ca61bc",
"format": 1
},
{
- "name": "plugins/modules/gcp_pubsub_topic.py",
+ "name": "plugins/modules/gcp_compute_autoscaler_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "d67412fe5aa92d96edc8cfc805299500e4c1401c8e50b482dd6f1521a934e371",
+ "chksum_sha256": "2e3ed397a6c9d5c4ae375750f9f9cd0903eebb4ac19f6836816e1a9495197c8b",
"format": 1
},
{
- "name": "plugins/modules/gcp_compute_target_pool_info.py",
+ "name": "plugins/modules/gcp_container_cluster_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "a566909ee0a0442d9615abd73f2dd9522fffbb29521dd2f2bd6a75b4dac93637",
+ "chksum_sha256": "6bd590de8c1399a9f7be02e0e20f21870c736010d2b829403b74ab8bdf219b81",
"format": 1
},
{
- "name": "plugins/modules/gcp_compute_instance_info.py",
+ "name": "plugins/modules/gcp_storage_default_object_acl.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "1000e0b20c293560eb6fc6f4a10c3db4ba7da7819d85000e1a4127a39c0850a3",
+ "chksum_sha256": "1c8cc48439327e7164deafc41569ce3aea519cee66d20b33c95a5082c9585438",
"format": 1
},
{
- "name": "plugins/modules/gcp_tpu_node.py",
+ "name": "plugins/modules/gcp_storage_object.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "6de940ffebd69179b375c0eb8cc667dfdf310fc2cb348491ec901a8c9a5ddb4a",
+ "chksum_sha256": "27d4d79bf9c059e3699d0a18979e892a0909d128d3e60322f48c14e13504a054",
"format": 1
},
{
- "name": "plugins/modules/gcp_compute_node_group_info.py",
+ "name": "plugins/modules/gcp_kms_key_ring_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "85b25ee3b6c6dad4932ec4e90b9c9f292262390f78a8a1b1d81e34de6615f1c1",
+ "chksum_sha256": "760a1013ded4d23e3442bdd01e71fe54223e87e2192093c93fc30564bca3ac07",
"format": 1
},
{
- "name": "plugins/modules/gcp_compute_router_info.py",
+ "name": "plugins/modules/gcp_compute_route.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "b0ebcc257a94286465891ab6351f6bcc7633c6a9dc891505ded7d4ad3caaa7a4",
+ "chksum_sha256": "5a3a2ce5ec96387287cc90140339f0f8f52a889c9da9a170c7691a7b91b0a9b8",
"format": 1
},
{
- "name": "plugins/modules/gcp_compute_autoscaler.py",
+ "name": "plugins/modules/gcp_compute_image.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "952a920fcd39ef8d606c8e1900e0685cde6907f41e8cb12b6c20fb73dc559dbc",
+ "chksum_sha256": "b8461a28b137c3a9ba2b27fb8d8a4131953cf1eab4dc9d63e35a513bcf5b34c8",
"format": 1
},
{
- "name": "plugins/modules/gcp_serviceusage_service.py",
+ "name": "plugins/modules/gcp_sourcerepo_repository.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "8b23f4fb30906778fada86d2ea57defffa94eb96ceb18466d732ae43b4e6324b",
+ "chksum_sha256": "e72bc310963ed578a8a4983b75e553a87ead48748ea8eb74ae54673a757b9721",
"format": 1
},
{
- "name": "plugins/modules/gcp_compute_https_health_check.py",
+ "name": "plugins/modules/gcp_cloudscheduler_job.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "6673a022a15889781dbde02bca85bf3180a8105bd43fd9297068ed289f8ddf1b",
+ "chksum_sha256": "24c94607d50ad52344bfc6cba2f092c3d4b7f07ad6b8dfc15f4d8836331a58f3",
"format": 1
},
{
- "name": "plugins/modules/gcp_appengine_firewall_rule.py",
+ "name": "plugins/modules/gcp_runtimeconfig_config.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "944c165360d93482691cd3d5afdfbba1379ff290965b2aceaeba98d3f7824104",
+ "chksum_sha256": "6adbc517971dfe1fe13fd211ca5dc035bd7141e82009dcd863f595cf3e12222e",
"format": 1
},
{
- "name": "plugins/modules/gcp_kms_crypto_key_info.py",
+ "name": "plugins/modules/gcp_compute_target_vpn_gateway_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "aa3c3f2f8a86c1202350afbe6d9adb59fc64fa9629dbfc99b76d853870e7e359",
+ "chksum_sha256": "c3a01357acbf10f26c5d873a188105225f8eda6db1d9e7ed4da38613f1ea7e3d",
"format": 1
},
{
- "name": "plugins/modules/gcp_compute_target_vpn_gateway.py",
+ "name": "plugins/modules/gcp_compute_health_check_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "798dc93ec4f49d75e57e8e0d9996dc02a3fb5608bef9209f4bb7289ead5d2c89",
+ "chksum_sha256": "c941385099938190614b0f0f4bc80f070e0420925dd00cc91019c8f7f2fcdccf",
"format": 1
},
{
"name": "plugins/modules/gcp_compute_global_forwarding_rule_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "d01ec906237ece8e4fd04bd912e39587661bfcf97a73dea379b8a8b630948af5",
+ "chksum_sha256": "4c6df1f42f55e2db660fcacb2d4a28765aebb2d3855dd48ca7588a109eebdc3a",
"format": 1
},
{
- "name": "plugins/modules/gcp_compute_region_health_check_info.py",
+ "name": "plugins/modules/gcp_compute_target_https_proxy_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "60cffc80e47f7e51e1c941106956cb6902a558b443a17a5dae11e4b4107965c6",
+ "chksum_sha256": "c364cbf44efba6469f9bc723b9172ecb6834eaad6f91cda83373ad030429f9d8",
"format": 1
},
{
- "name": "plugins/modules/gcp_compute_forwarding_rule.py",
+ "name": "plugins/modules/gcp_filestore_instance.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "86962fe25a97183b45f86c77818f674c13a1547cbab6fff09a0e32778e640e44",
+ "chksum_sha256": "542aadfe5acbcf8168f8f259904927671f835d45150a23336222b2be1f9750f2",
"format": 1
},
{
- "name": "plugins/modules/gcp_compute_https_health_check_info.py",
+ "name": "plugins/modules/gcp_bigquery_dataset_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "1bc8050e51b93c78eea82acfe5f622e295ecd9e84d9d19e8b6b6eaf6c9277eae",
+ "chksum_sha256": "8adb86c40084debe7e596a4e4542680e1114fb68c3784db82c2d64401f8b4d41",
"format": 1
},
{
- "name": "plugins/modules/gcp_sql_database_info.py",
+ "name": "plugins/modules/gcp_compute_vpn_tunnel_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "08d2ae212a624fb6a7e1ac0ff7dc9b9804b31fe9396809ff91da491c6fc3b800",
+ "chksum_sha256": "99aa270f3f4d933f8467371a33818fbe9927934ad4b6ae8d1ca1383a1afe57c4",
"format": 1
},
{
- "name": "plugins/modules/gcp_compute_health_check.py",
+ "name": "plugins/modules/gcp_cloudtasks_queue_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "c528cd76836c2908cc222de8d79996576dda2e3f1d4fb0288751552d01d05a13",
+ "chksum_sha256": "022783b0552c155f9e79a6d3e01a4767f9a436f4fbf7bd3b821052ebeb11ee51",
"format": 1
},
{
- "name": "plugins/modules/gcp_cloudtasks_queue.py",
+ "name": "plugins/modules/gcp_compute_resource_policy_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "186ecd6c6012b3982241c458f72680d8c3a5444dfe052e5ff7e849d455e48505",
+ "chksum_sha256": "7a724ee92dcd7a53fbad020e79c067c3f1d6f035a67aaad636a3a801ca5f3e0a",
"format": 1
},
{
- "name": "plugins/modules/gcp_compute_disk.py",
+ "name": "plugins/modules/gcp_sql_database_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "48073238f74f69f1c2624ba2048d180ac86eb2b1cfee94ba86446d03692f57f8",
+ "chksum_sha256": "167c8000a662ab56699d35a2ecfbe2305288054b073fbff18c48a75e0f8c830d",
"format": 1
},
{
- "name": "plugins/modules/gcp_compute_vpn_tunnel_info.py",
+ "name": "plugins/modules/gcp_compute_instance_group.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "9c388ff414d60942e021fd2830c555d5183a15d389ab5fae37981c8dcca5e0f2",
+ "chksum_sha256": "6ad612724cf203734631d4bb964876c073bd5502c0d8093f51851cac788a550b",
"format": 1
},
{
- "name": "plugins/modules/gcp_compute_region_disk.py",
+ "name": "plugins/modules/gcp_bigquery_dataset.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "b3eb1a1996096236ae114ee1135aba9cbfebdfb5e7d938152747bb601750c940",
+ "chksum_sha256": "8d1e41eeb9046c490b2be4c9a955f3cd63d24fbf0c2c1fddd7af27c8b897f2a6",
"format": 1
},
{
- "name": "plugins/modules/gcp_resourcemanager_project_info.py",
+ "name": "plugins/modules/gcp_dns_resource_record_set_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "d3658e3fa78bbe389d8ef71c2d61a8900be321dddd5d0223fe140fab6cc3e291",
+ "chksum_sha256": "ec4d1d56a1a907df292fad9836bcd7cd9714d5eac358864e34ea0d409c686a30",
"format": 1
},
{
- "name": "plugins/modules/gcp_compute_ssl_policy_info.py",
+ "name": "plugins/modules/gcp_iam_service_account_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "b0afbf3ef220f11885d72feff3d965245a3f8860fa2149b54e8fe451886ad182",
+ "chksum_sha256": "c591cca58ab0c409b6679ac5a51d1b6ada41bcd49268c999e615f477dcccf383",
"format": 1
},
{
- "name": "plugins/modules/gcp_compute_http_health_check.py",
+ "name": "plugins/modules/gcp_compute_global_address_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "c2aeda17ecfd12326d6778bba02f7558321cb77b25eb006bc56f1deca9ee4354",
+ "chksum_sha256": "7e377c9ca2573212dd7344c42be69d2c4ad464be0ee750da08c3d46f2e8ad613",
"format": 1
},
{
- "name": "plugins/modules/gcp_container_cluster_info.py",
+ "name": "plugins/modules/gcp_compute_region_backend_service_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "cd5c59981d4f7b80198e4ff479bebb9082c2d04545471140816da89a6c7567a1",
+ "chksum_sha256": "d4bc70d7812053c0301ba49153e874d592efd92e495caf69d71c75177a9b5cdd",
"format": 1
},
{
- "name": "plugins/modules/gcp_compute_global_forwarding_rule.py",
+ "name": "plugins/modules/gcp_compute_region_backend_service.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "bc0ce169595d7b63b1893206fe83f98d6c53fb0d0d70156e1f2c082122291d6c",
+ "chksum_sha256": "86b50293baacebcf5d64841b9b6e7e40340718e8be5432d14412050a7b83eac5",
"format": 1
},
{
- "name": "plugins/modules/gcp_runtimeconfig_variable_info.py",
+ "name": "plugins/modules/gcp_sql_database.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "c42a542712e2f0047226ddc1244c996c0108f74c03f1dfc886dfd093d00ddd8d",
+ "chksum_sha256": "1b5231f50822b5e593b9417f8d283f7dd029f83dedaa1303649e6a28ede79a12",
"format": 1
},
{
- "name": "plugins/modules/gcp_compute_resource_policy.py",
+ "name": "plugins/modules/gcp_serviceusage_service_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "a807bd0c01fe0cffb099aac1ee60476159c352e2a39f7bb69d66bbc3f3ebf0ee",
+ "chksum_sha256": "3e9883636ec693b6ca9473f4c754334ee74b50e10744fe373ca827bcf8b27048",
"format": 1
},
{
- "name": "plugins/modules/gcp_compute_global_address.py",
+ "name": "plugins/modules/gcp_compute_region_autoscaler_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "cc0c116f19ec409c2f95d031a271c534a5350167555e1c6d9e674b345c3be6eb",
+ "chksum_sha256": "06dd145476a890c08489d4d5c709bed6b7043984912bc62bacb6616409d3dc9f",
"format": 1
},
{
- "name": "plugins/modules/gcp_compute_region_backend_service.py",
+ "name": "plugins/modules/gcp_tpu_node.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "df946bf40baaaa25351382af5ea48a3017282611cda0b960a0ac05e3a70047a9",
+ "chksum_sha256": "0e069010a33556de63c1a667c829f3ab49e372b788aa57281845c4b1176a8e4e",
"format": 1
},
{
- "name": "plugins/modules/gcp_compute_network_endpoint_group_info.py",
+ "name": "plugins/modules/gcp_compute_region_target_https_proxy_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "221b9904993d0434f93cbdfcee734f2b9ca148a5019222fe8098e003c89ecb5d",
+ "chksum_sha256": "32fafde779cf60a8527bdbc725e9df17a9ab17786a4464268904c9f1de0ad489",
"format": 1
},
{
- "name": "plugins/modules/gcp_container_node_pool.py",
+ "name": "plugins/modules/gcp_sql_ssl_cert.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "470a4316ba10646a2050124091be234de0362abd6978b9e0fe86d52dfcab4ec3",
+ "chksum_sha256": "3c28940eb48fae55af30c6093e780cef23184a6e8ada86bbef246541dd71a9ff",
"format": 1
},
{
- "name": "plugins/modules/gcp_compute_target_tcp_proxy.py",
+ "name": "plugins/modules/gcp_compute_network.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "310854b29f39bc69829963d7d73f8a6b77d870b22b858f43118ba494d94016e1",
+ "chksum_sha256": "41d81ebe76bf026ded729004ca1ace28e206482374b84300781db3ae8f7dd77d",
"format": 1
},
{
- "name": "plugins/modules/gcp_compute_region_target_https_proxy_info.py",
+ "name": "plugins/modules/gcp_compute_resource_policy.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "096294a091424761ed062a9bdaffc07bcf67481f3d0c3137ff8a404df59edba3",
+ "chksum_sha256": "3f94ec52d60ecc476dbdea3971f0e34312ea214d6e864ead9508308851ad2983",
"format": 1
},
{
- "name": "plugins/modules/gcp_spanner_instance_info.py",
+ "name": "plugins/modules/gcp_kms_crypto_key_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "97fdf8f0c4e0f8d556397658dd16e3f4943b0d7bdf691ffe10f534beb56894a4",
+ "chksum_sha256": "1fdb75aed8891171e1ad5081a398ceadea2171c8b96d1f07859e5aa265e3ccc7",
"format": 1
},
{
- "name": "plugins/modules/gcp_compute_snapshot.py",
+ "name": "plugins/modules/gcp_compute_backend_bucket.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "13b18e612e7b71e2410da8986e5a6a633aa88790bc59b7834baffdfdea190390",
+ "chksum_sha256": "1a2844a509a4a5e60087ccfd10b37456fbe79790e93ce13256dd52b5d686384f",
"format": 1
},
{
- "name": "plugins/modules/gcp_compute_url_map.py",
+ "name": "plugins/modules/gcp_compute_external_vpn_gateway.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "767ba27ce950710de7dc74302fadc3987e8665d8ebcf80f43c0f1111f12a72ef",
+ "chksum_sha256": "1d504ddee4ed2aafad54525394c1c90d531db5dd43ae288145fe701f6d6747cc",
"format": 1
},
{
- "name": "plugins/modules/gcp_sql_user_info.py",
+ "name": "plugins/modules/gcp_compute_external_vpn_gateway_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "9f4ff5ac20538a43d15df0fbf61bb42dcde8625c18dbd69deeb5fa6defee881d",
+ "chksum_sha256": "9a342eef8b8547049410cdf8095255d9857e1613c20abea5ee2bf2431d2df03f",
"format": 1
},
{
- "name": "plugins/modules/gcp_runtimeconfig_config.py",
+ "name": "plugins/modules/gcp_compute_region_autoscaler.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "a1533cfbf5e02250eefb09788dfc313933a18d865073aec04c5749410887b01b",
+ "chksum_sha256": "6311c33ce987d962ed9ea848c4952e5dfaf79e653961ecf99771b3ba6e27e8a5",
"format": 1
},
{
- "name": "plugins/modules/gcp_compute_instance_group_info.py",
+ "name": "plugins/modules/gcp_cloudfunctions_cloud_function_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "d04a88f3f5deac7507151e3a195b81725b1e8c6dda19afae353fc586b2165cd5",
+ "chksum_sha256": "337c0e9d6fec6317e8d5e8ab3c4bb950f76ab14bc9d8b1f316b9accacfa32bc5",
"format": 1
},
{
- "name": "plugins/modules/gcp_pubsub_topic_info.py",
+ "name": "plugins/modules/gcp_compute_snapshot_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "f01efa57582c96786b893484c7a70ed58429a33ab94ab18798d3771eff6ace1d",
+ "chksum_sha256": "908f511a08b6a9782c39bf32d74d4c2e3ce798db6b0e42aa1aae9ea113a5083a",
"format": 1
},
{
- "name": "plugins/modules/gcp_mlengine_version_info.py",
+ "name": "plugins/modules/gcp_compute_target_pool.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "ef70a84d3beead1aeb9deb1b7720c1e6f95cca19aeed7b5d2854bde3c4ebe7a2",
+ "chksum_sha256": "10b63a8cc17bcea43162669256f926195663ab34d01a16c7862149d0e66b32c0",
"format": 1
},
{
- "name": "plugins/modules/gcp_compute_backend_bucket.py",
+ "name": "plugins/modules/gcp_storage_bucket_access_control.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "c56d451340845865d8d0230a5b1d45a1da7effb19e7d703cdf885cf7a071ca2e",
+ "chksum_sha256": "84fa0f336a98baa0f16d1151c383c5f8344082d591f84e712d111b3d2a96b4f2",
"format": 1
},
{
- "name": "plugins/modules/gcp_kms_crypto_key.py",
+ "name": "plugins/modules/gcp_compute_subnetwork.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "cc510d2a3849b2a6f45180a6575c72b3d9b7fa6220f853e0bccc6b90a30308bc",
+ "chksum_sha256": "78b646726a3cb2049f9b90e739b4208438dea73715d1311438efef780da4de21",
"format": 1
},
{
- "name": "plugins/modules/gcp_pubsub_subscription.py",
+ "name": "plugins/modules/gcp_compute_target_http_proxy.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "2cd1bed127532483cb107f31297410318b70bc78a2694db5f3c6507f5d918d9c",
+ "chksum_sha256": "a63920c15b6e077a1d7055ef0aba050084b31221abbfd0dc0b4554df60afecd6",
"format": 1
},
{
- "name": "plugins/modules/gcp_compute_region_disk_info.py",
+ "name": "plugins/modules/gcp_compute_network_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "3570603d65866510303ddc1fe0ad0959a8b439c48716d86a09f0e755424cea72",
+ "chksum_sha256": "005f9611c53e273c547207796a4c404e167574966c3a4c7fe7aa1dc21492db10",
"format": 1
},
{
- "name": "plugins/modules/gcp_compute_region_url_map.py",
+ "name": "plugins/modules/gcp_pubsub_subscription_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "269e783576372f3bbb025dcddbb43c0e32e93a9a02424bdd0a2c66c8a0389ffb",
+ "chksum_sha256": "6084520418893bbf980fd7c36aee06d9dc1a435370fba1a9da2fb5fe4be644fa",
"format": 1
},
{
- "name": "plugins/modules/gcp_iam_role_info.py",
+ "name": "plugins/modules/gcp_cloudbuild_trigger.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "78998260369e56d527477fc3fc3140771a92b40882593a547726debbd44dd819",
+ "chksum_sha256": "49d93e62258357a8ce5664b1a07475a192eb61930fedcac5a0e89720e2a002b8",
"format": 1
},
{
- "name": "plugins/modules/gcp_storage_bucket.py",
+ "name": "plugins/modules/gcp_sql_user.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "b943137ee637ecf565e4b3c399d20089851c0630da8fb2449995cda0ef2502ae",
+ "chksum_sha256": "1322c2a98afe07730c53c6b43c6e620bca4f93d4176cf3ca984feed6c848d9e9",
"format": 1
},
{
- "name": "plugins/modules/gcp_runtimeconfig_config_info.py",
+ "name": "plugins/modules/gcp_compute_region_disk_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "2a8d22fdbad92bb29b0e04c766ac44a749c082623c3237c7f3fc26dd426ce484",
+ "chksum_sha256": "b84a59a23c8178147a1dc47cfb55fef2b7855704ab09f4a52af7d47678c61c26",
"format": 1
},
{
- "name": "plugins/modules/gcp_compute_node_group.py",
+ "name": "plugins/modules/gcp_compute_disk.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "9e9cae58d67aff9b2e969ff332bd0f58718e2076de7d6652d89ec04a4eae5e21",
+ "chksum_sha256": "f6fb8fdd002854cb4cf571592bf6d1eb74c8f11af46ba13ecda64b33c8d13b61",
"format": 1
},
{
- "name": "plugins/modules/gcp_mlengine_version.py",
+ "name": "plugins/modules/gcp_kms_key_ring.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "889f11d14745285d66f25d41784dd6843a760bc35ad37bec6bfbb138be6db2de",
+ "chksum_sha256": "078966de09858e0ea988943fb952e89ff3a02354d7167b6167476347471c75f6",
"format": 1
},
{
- "name": "plugins/modules/gcp_appengine_firewall_rule_info.py",
+ "name": "plugins/modules/gcp_compute_region_target_http_proxy.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "c14b24a28343e901dc03a207818fc99785e84ac8282f968dbb1a3b76f3f38053",
+ "chksum_sha256": "58deab429b948e92f31e6cf3690f41ffcece4e4ec970750697cea5677cc71c38",
"format": 1
},
{
- "name": "plugins/modules/gcp_sql_user.py",
+ "name": "plugins/modules/gcp_mlengine_model_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "1f324c85ebc45da728495fc2952360cb0f726304ad882cb917924b0cb7568228",
+ "chksum_sha256": "b6ecc10584a07a2950f228f2b75838d02c28cf29ecf146eea9a354913453ef05",
"format": 1
},
{
- "name": "plugins/modules/gcp_spanner_database_info.py",
+ "name": "plugins/modules/gcp_compute_https_health_check.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "4467edc8d381c8b93feac3350922b80a811880aa6702a82c10d1c77660e31172",
+ "chksum_sha256": "845d82a0cafd55d694b46baa86913c248ce953f4a1e713c3cadef6b9b1dc45c4",
"format": 1
},
{
- "name": "plugins/modules/gcp_cloudfunctions_cloud_function.py",
+ "name": "plugins/modules/gcp_compute_node_template_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "c4f99156f6271ee27c4a171e969cfc65cbb218ff8ff86f84e53643534d7b1185",
+ "chksum_sha256": "d920d1ef0c6e1d0c1fd6fbb14b07fb5a1a26dd8e58a902c684ab1a57abebab30",
"format": 1
},
{
- "name": "plugins/modules/gcp_compute_region_autoscaler_info.py",
+ "name": "plugins/modules/gcp_compute_forwarding_rule.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "27ee339705fd66c48858646e61ef667a38f161fc6acdc39e58cf91f8c621304b",
+ "chksum_sha256": "355f8ade219e374968971124d978ba97b8daed895f73b1f070621911918cdeb4",
"format": 1
},
{
- "name": "plugins/modules/gcp_compute_global_address_info.py",
+ "name": "plugins/modules/gcp_compute_url_map.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "0ee379a396e222a2ad67a2fd377a31db18a410526b19846f3f61cfc247dde600",
+ "chksum_sha256": "09332a7cf89139c071f9c79ccefc31e6d7f936eb5bdfa47bb6f1f73ff71aa57a",
"format": 1
},
{
- "name": "plugins/modules/gcp_compute_node_template_info.py",
+ "name": "plugins/modules/gcp_compute_address.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "f89643f14e739071fec8ea94dc6e418f70aa03d96cdbf1e8b0be62c949316072",
+ "chksum_sha256": "d2f29b2590bb706fbfa334d75f9282e5764241275c5f8398073934deda90b6e7",
"format": 1
},
{
- "name": "plugins/modules/gcp_bigquery_dataset_info.py",
+ "name": "plugins/modules/gcp_compute_region_url_map_info.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "e9c024f32a31340bbc18843402db367ca033b7dcf3d0de9a8de4756f60ec87a0",
+ "chksum_sha256": "9608a8fdfdeed523286ae682ff0c07a6ec8dd1ed717935f08d8ad517b488e817",
"format": 1
},
{
- "name": "plugins/modules/gcp_mlengine_model.py",
+ "name": "plugins/modules/gcp_compute_node_template.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "dc4a18d4e9df024c7d946c676e9f02d0a9ab0ffc0d8b66c3e5cb050ea1c4bdff",
+ "chksum_sha256": "262cb30e5295ceb2f1ca73f6168c7bfb1fcf546a84b78b8c982f428764b57b33",
"format": 1
},
{
- "name": "plugins/modules/gcp_compute_external_vpn_gateway_info.py",
+ "name": "plugins/modules/gcp_runtimeconfig_variable.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "04ce9f5704fe46bd571cb89e91277824563a5167831bb10e1bbdc6d24a6eea03",
+ "chksum_sha256": "a83a034253c8df2df3be673965c210d98daa38ca67ef3e3388a89a690eeae084",
"format": 1
},
{
- "name": "plugins/modules/gcp_compute_snapshot_info.py",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "2e399cd3a3b42e1c7bf798d3857be61ab8646bb1cec3c2173e7f921108bd7730",
+ "name": "plugins/doc_fragments",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": "plugins/modules/gcp_pubsub_subscription_info.py",
+ "name": "plugins/doc_fragments/gcp.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "adebfa68696203b7c0dbaec10dbd1d49ba91e7f9aef4eb9276f376babc47e191",
+ "chksum_sha256": "49b16d5d3cdb515792f2b3df7ab676d5f2584f54b2d6f2e47e7c6e93560e1572",
"format": 1
},
{
- "name": "plugins/modules/gcp_sql_database.py",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "24e16f17849d0a9c329c20ec6ff72c1368cac7f9115ef13d1cd3c39390ed8736",
+ "name": "plugins/filter",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": "plugins/modules/gcp_compute_target_https_proxy_info.py",
+ "name": "plugins/filter/gcp_kms_filters.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "1db67fbf72eb04fd24525568474e5302c59ce396bb5adc661c8788718ec577e5",
+ "chksum_sha256": "62a6cc6469714f45d98596ac510777868e1028b4d7f7a7b5a1ba2aa45e52933e",
"format": 1
},
{
- "name": "plugins/modules/gcp_compute_backend_service.py",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "2396dac990ab00d951875d90fa8628489297e4344c4bd077c5ccd1a85e78f011",
+ "name": "plugins/module_utils",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": "plugins/modules/gcp_compute_target_tcp_proxy_info.py",
+ "name": "plugins/module_utils/gcp_utils.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "8a4cfd11bae5a78f1311186e8d3994d86e25213cfcd9dfeba37def5140c283fb",
+ "chksum_sha256": "10fd2ea88c4db12de853b29919d44f38011234ee9a45577904df14ff4a48df52",
"format": 1
},
{
- "name": "plugins/modules/gcp_compute_autoscaler_info.py",
+ "name": ".ansible-lint",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "00422bb0193ce5458b34f804056e15a42b8efcb7e27103437aa17021449ee909",
+ "chksum_sha256": "39feb603f8a1728415020e55621bedc363dbf7942d06aac99d7c5c81208e5132",
"format": 1
},
{
- "name": "plugins/modules/gcp_sql_instance.py",
+ "name": ".gitmodules",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "a3339ad2a4295761b9ab945e7a9840aa41974e320234608610c223b02cb0d616",
+ "chksum_sha256": "15d86ac1fb9c04f919875abab5cf78444795e93fc0b8319c0aba72e4cf8bb2a6",
"format": 1
},
{
- "name": "plugins/modules/gcp_compute_interconnect_attachment.py",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "7a25efa704ffd995190e721025230acdd6bdf3b67057e5b436b98de38ccb3c60",
+ "name": ".vscode",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": "plugins/modules/gcp_compute_firewall_info.py",
+ "name": ".vscode/settings.json",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "04a18838a7bd264618dcc675785d28db7b52373e941bc2403e2a9f1d52044727",
+ "chksum_sha256": "d1be9315fe97520591ad6aca56c5b6ee625d3d2c84633de40f0f0afcc13a12a1",
"format": 1
},
{
- "name": "plugins/modules/gcp_tpu_node_info.py",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "e967abeae865ba72decabe648938b7a7db82cf5b634affff2985a882a6d6eb35",
+ "name": "roles",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": "plugins/modules/gcp_compute_target_vpn_gateway_info.py",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "a29f3cd1baf53ccf522e109ed5b281b1366bdecd9f97ab7c861f5968ebd41749",
+ "name": "roles/gcsfuse",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": "plugins/modules/gcp_cloudfunctions_cloud_function_info.py",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "338f1c3c6c4484898d39f89a0e5e81638ec6f2924050e7e5d244e76a35b1dda7",
+ "name": "roles/gcsfuse/tasks",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": "plugins/modules/gcp_compute_reservation.py",
+ "name": "roles/gcsfuse/tasks/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "13e63ec0e9b1afb564235662eebfcc7e3a6db92633ac47d457d7f49f57fa2c19",
+ "chksum_sha256": "eb596bb164b1e6de5bb4311afdb5c089d4c510496852cba8cd4bbab9ec16a1d0",
"format": 1
},
{
- "name": "plugins/modules/gcp_bigtable_instance_info.py",
+ "name": "roles/gcsfuse/tasks/debian.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "b81f3df1e212f2d13c1d86ab901f59dd77004fe5103d7db2cf21c1cd80a9b331",
+ "chksum_sha256": "56ca0e595d3bf5e3a812008b467e84dbf5fc0c766773a8f1ab0914b7bbdf91e9",
"format": 1
},
{
- "name": "plugins/modules/gcp_compute_region_target_http_proxy_info.py",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "382f61b45d93779dc57e20bce76ca9977da61585be1af8185472864f78f1de2d",
+ "name": "roles/gcsfuse/meta",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": "plugins/modules/gcp_compute_target_https_proxy.py",
+ "name": "roles/gcsfuse/meta/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "25f49a8c2ea219983eaf3c9373991e0c979aeaa347d2846eaf167874863a4e9d",
+ "chksum_sha256": "a88bfa311596bf887962c34be6eae17e598b3c14bb973a239bb21934cfaaa444",
"format": 1
},
{
- "name": "plugins/modules/gcp_compute_region_health_check.py",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "c609bd188fbaf5cf15fdd4c438a496a1684d5d5ce15e45448ce69d696b689bf9",
+ "name": "roles/gcsfuse/defaults",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": "plugins/modules/gcp_cloudbuild_trigger.py",
+ "name": "roles/gcsfuse/defaults/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "bad8598942ca7a008b6ae17f3056d56f0bec56994e4a8e0b15cf108cf4030e59",
+ "chksum_sha256": "680a1514fdbeae910661c7c44bd0dbf7e254b61e78f2c35bab61d5a43a928baf",
"format": 1
},
{
- "name": "plugins/modules/gcp_redis_instance_info.py",
+ "name": "roles/gcsfuse/README.md",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "390609cfc64b89e79f7c50c0f5415a54d0ea5ad767deb2d21dff18bc036b43ce",
+ "chksum_sha256": "34c69736a29bf57b2000acc4db084d253df1c98bfe1d7ec2514838897574dd05",
"format": 1
},
{
- "name": "plugins/modules/gcp_compute_network_endpoint_group.py",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "c2d24a45408fd9a1c9480f5c6d48d1740faea8a35bbf144561f81178ffcef961",
+ "name": "roles/gcsfuse/vars",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": "plugins/modules/gcp_bigquery_table_info.py",
+ "name": "roles/gcsfuse/vars/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "94adfaba7dbcc8959fa03e9c18c0922f5a8e8bce4aad3c42c38076c564ca0039",
+ "chksum_sha256": "a505a2742e0c7b2937368440a796503791485c999a4b9fd6f0e90715b2af8fa2",
"format": 1
},
{
- "name": "plugins/modules/gcp_dns_managed_zone_info.py",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "1d99c7531f01c8c702bb3e56d18d2d0b4525b66ec25a22782d4ee49c5487f199",
+ "name": "roles/gcsfuse/handlers",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": "plugins/modules/gcp_compute_subnetwork_info.py",
+ "name": "roles/gcsfuse/handlers/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "8f2c4d04c0665b47481eb226bf2ed53215b93f3e9de617777da1f148268b721c",
+ "chksum_sha256": "06f6404a01fe05252d5834e091751bde4d8d2272274e712f01ad455942285f6b",
"format": 1
},
{
- "name": "plugins/modules/gcp_compute_network_info.py",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "839e763dce177f84f4896da9b76c9541948c2fa2938406a0c6988c28f71dafef",
+ "name": "roles/gcp_http_lb",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": "plugins/modules/gcp_compute_region_target_https_proxy.py",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "e2ac7c2d8e1545d9891a408f0dfb3ee7759ba8dc343ef51e88b01576261a9b66",
+ "name": "roles/gcp_http_lb/tasks",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": "plugins/modules/gcp_spanner_database.py",
+ "name": "roles/gcp_http_lb/tasks/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "75b88d66347cc0e35983eac94e27df7eb9fa4ed20c1a5916c7cd0298896bd170",
+ "chksum_sha256": "3450f6de0d80b96cb4d795c8361d2b0ae2771d03b77bc94b654169331ae95be1",
"format": 1
},
{
- "name": "plugins/modules/gcp_compute_route_info.py",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "91be38a6928f4511cf87861df03546b51e30d10d6fa5dcba16c16f0c49a3618d",
+ "name": "roles/gcp_http_lb/meta",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": "plugins/modules/gcp_iam_service_account_info.py",
+ "name": "roles/gcp_http_lb/meta/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "4412201be31d964ef295bdeb287419f92738b40dd669fbab8427985a6dc522bd",
+ "chksum_sha256": "f157ed746f4b993f9d6fa60f52b51a85a288846851944bb2e2e4b0bad5dd786f",
"format": 1
},
{
- "name": "plugins/modules/gcp_dns_resource_record_set.py",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "2fc9439e625dd3a8bef43396cbfd1d915a7533ad7848e61393217178fe690e2c",
+ "name": "roles/gcp_http_lb/defaults",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": "plugins/modules/gcp_bigquery_dataset.py",
+ "name": "roles/gcp_http_lb/defaults/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "120781767411c3fe7bfb089d5191a990257f9f9ba99dc389d94f6d453bdcf6f6",
+ "chksum_sha256": "d0e023bea4e519cb6fbff5ef68e46512601b804d2ed162822500587d6e3d8814",
"format": 1
},
{
- "name": "plugins/modules/gcp_storage_bucket_access_control.py",
+ "name": "roles/gcp_http_lb/README.md",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "d97c33511197d8e5fc56a0d8cc634de1a827b9bd00fac0a2f27bbe524513e1cd",
+ "chksum_sha256": "29e80b82e25d1ede84f5bc37385c72b50ecc0d6f72dcc26bd1692975602cd394",
"format": 1
},
{
- "name": "plugins/modules/gcp_compute_instance_template_info.py",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "7d2bcc171568499db088a4f7c4144bbccd775a68b18729d032642524d97fe7a7",
+ "name": "roles/gcp_http_lb/tests",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": "plugins/modules/gcp_sourcerepo_repository_info.py",
+ "name": "roles/gcp_http_lb/tests/inventory",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "ba4f8bcf2b4dc75d1bd46183b931a1ff47db755c76ef8d0a5a426ce0a4ed1e59",
+ "chksum_sha256": "e02233819b1a09844410549191813f7cc7ba360f21298578f4ba1727a27d87fc",
"format": 1
},
{
- "name": "plugins/modules/gcp_compute_target_instance_info.py",
+ "name": "roles/gcp_http_lb/tests/test.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "964d39c1665192a2d62482f9934e50a2f347b42291d8f6d353cddb923312be8f",
+ "chksum_sha256": "8f9ba46442893a9daa93ab20d6b27faa349008c8edaf4631516b3d3e3d24c510",
"format": 1
},
{
- "name": "plugins/modules/gcp_logging_metric_info.py",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "7689e67ec920cbbd9d25bfe7a4864baf596b8f658890d30c0642e16b091cfda8",
+ "name": "roles/gcp_http_lb/vars",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": "plugins/modules/gcp_compute_resource_policy_info.py",
+ "name": "roles/gcp_http_lb/vars/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "5d533f8aa91ad74364e68f740840c79c313d7661a51916d541a27963a535fb68",
+ "chksum_sha256": "87f8a34e1373c524be49c25c84999bd89d3a1ba732d29b356591f7dbcde134b8",
"format": 1
},
{
- "name": "plugins/modules/gcp_sourcerepo_repository.py",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "e5727a11bd4456e4325a5e1c2960844beb64c61d187e5eb3b30571466039fe8e",
+ "name": "roles/gcloud",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": "plugins/modules/gcp_compute_health_check_info.py",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "cb5f33fb8811ac5e126fe7c5ccc4de2ddcae3ecabc5f682ad5fea2dbfc15e07a",
+ "name": "roles/gcloud/tasks",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": "plugins/modules/gcp_compute_region_autoscaler.py",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "2325cedb8b276d629dd1794a0e21bd3a5349ad7b73ce8ad299d779195a9aa895",
+ "name": "roles/gcloud/tasks/archive",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": "plugins/modules/gcp_compute_interconnect_attachment_info.py",
+ "name": "roles/gcloud/tasks/archive/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "c9482174981c6d959c593d841151e7edf5c9a26be0ff6a8a10289d23c51fae9c",
+ "chksum_sha256": "f3f64c25cd9218a4bf3a678d3ed4bde5b1fdfbd321a8af501c7e46c19c81473e",
"format": 1
},
{
- "name": "plugins/modules/gcp_bigtable_instance.py",
+ "name": "roles/gcloud/tasks/archive/command_completion.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "84d1ee4078cc20023cb8440aa31ca7e1d20e2031e61a478bea9609d4b8f5b7de",
+ "chksum_sha256": "a059802471bdfffbcea23c71a4110672848c4da40cbef52f891fc953d4dcb0fd",
"format": 1
},
{
- "name": "plugins/modules/gcp_compute_region_target_http_proxy.py",
+ "name": "roles/gcloud/tasks/archive/archive_install.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "614594990f138e3b55f7977f0f4bca29840ea2cda31dd7398c6c70661f42e66c",
+ "chksum_sha256": "5106c5899692e973e711cb7085153a47ca6b6822ca5bd8dbf5daf29e78c308bb",
"format": 1
},
{
- "name": "plugins/modules/gcp_spanner_instance.py",
+ "name": "roles/gcloud/tasks/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "9bd50b0fc0b598228095d635ef9bda39bbf1ffac9dc6f29470ed6256fd3ce8ff",
+ "chksum_sha256": "2b5eb27d74d6f1ef1371c2c81796508b9eb30ab3d5b65f374db9a52ffb4f7a14",
"format": 1
},
{
- "name": "plugins/modules/gcp_compute_url_map_info.py",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "7e57b4e3294940914122054114f1616970eaaad934ea528a5f010ce3027f9cdf",
+ "name": "roles/gcloud/tasks/package",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": "plugins/modules/gcp_compute_reservation_info.py",
+ "name": "roles/gcloud/tasks/package/redhat.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "429db4ce816a3ad769e8422337c977059e9c29bb6dfc25bf4256efe596576056",
+ "chksum_sha256": "d2a229dd16400499d5b482d0417df90360c4259c12305fef1d88fdaeef5dacaf",
"format": 1
},
{
- "name": "plugins/modules/gcp_compute_target_ssl_proxy_info.py",
+ "name": "roles/gcloud/tasks/package/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "169ae16e04743e8eb888aa6f0a0c45d9e9f63315498659501c29d9df8deaefa6",
+ "chksum_sha256": "2b9c557c35ced987ae9d263b72459db3fa72243aab3d480e61abb0ca2863b002",
"format": 1
},
{
- "name": "plugins/modules/gcp_compute_image.py",
+ "name": "roles/gcloud/tasks/package/debian.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "df5ff8f7175c8283b1cbab625ba4143c0714429d1b6ca0145e326e91dd159ed2",
+ "chksum_sha256": "c4ba699bb2d47c73c9ba8d58b7cfd5e53930e4b5280de5ab04b39b80f105225f",
"format": 1
},
{
- "name": "plugins/module_utils",
+ "name": "roles/gcloud/meta",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "plugins/module_utils/gcp_utils.py",
+ "name": "roles/gcloud/meta/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "8f82bcc0455283205eda855c388b128d42cff71baadb57ad5bf4de764e98f2c6",
+ "chksum_sha256": "a9876e09039be32c4e13c914fc6957a8cbeaeb298171ba0ba13dff96e30eaaa0",
"format": 1
},
{
- "name": "plugins/filter",
+ "name": "roles/gcloud/defaults",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "plugins/filter/gcp_kms_filters.py",
+ "name": "roles/gcloud/defaults/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "5ea7f176120e21c2d1064e534b72c55f83d38d6535ae7752531d3e75a532d1c0",
+ "chksum_sha256": "13431c8a6a6bdc94bada2120d5f83b6a21d9352301de938bcf0b48ed5f61e557",
"format": 1
},
{
- "name": "plugins/doc_fragments",
+ "name": "roles/gcloud/README.md",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "700db6e9116d4b65967d2e9c33acd233996a07fed6cc5fd3575f6f100b205ee0",
+ "format": 1
+ },
+ {
+ "name": "roles/gcloud/vars",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "plugins/doc_fragments/gcp.py",
+ "name": "roles/gcloud/vars/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "20730a43ed49d21639f60e2a44df0fc3954fb81dd1a36491ae14e751f195aa7b",
+ "chksum_sha256": "f52d711103d50a437830c6fbcd04fb4bab49a0f82f6d26d1c791c6e8488dd090",
"format": 1
},
{
- "name": ".ansible-lint",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "39feb603f8a1728415020e55621bedc363dbf7942d06aac99d7c5c81208e5132",
+ "name": "molecule",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": ".github",
+ "name": "molecule/gcsfuse",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": ".github/workflows",
+ "name": "molecule/gcsfuse/tests",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": ".github/workflows/ansible-test.yml",
+ "name": "molecule/gcsfuse/tests/test_default.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "5e65cc28791b3cc37ee0742d7d76b77844ea638d5975ecd350531cf8a3068fb7",
+ "chksum_sha256": "cb6e9becf8f75159ef50057058047caddd7ec06fd07f9ea7237eb0c3f822a198",
"format": 1
},
{
- "name": ".github/workflows/automationhub.yml",
+ "name": "molecule/gcsfuse/molecule.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "f67d130a99b08ede42b8070db99ea915e27f0ba8ff114bce98155632575b7ebe",
+ "chksum_sha256": "f1d656adaa6be9e41b73bc3a4a8b4798773ff66d5f535f86e4ee15c3d86843b8",
"format": 1
},
{
- "name": ".github/workflows/ansible-integration-tests.yml",
+ "name": "molecule/gcsfuse/Dockerfile.j2",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "951744f42efdb6d051a7ebdde068f6b69d66282d45961afa4577e48d0e98f32d",
+ "chksum_sha256": "5ef978855099e5b5118cb1198a2e27d5745c4a358670ba2e10d9004ce29c0324",
"format": 1
},
{
- "name": ".github/workflows/pythonpublish.yml",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "c529e2810ae1f02ea98dcae1b78241d21a5988496ed5389b2ce8c37395323756",
+ "name": "molecule/gcsfuse/files",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": ".github/workflows/gcsfuse.yml",
+ "name": "molecule/gcsfuse/files/override.conf",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "3ce92a6d1bccc65db96fdae392a7b1e28d4a5df447094a88edab8275cd78c778",
+ "chksum_sha256": "27d57701a92b623757711f18aeba17f089df44c13cead5caca41418a62804d89",
"format": 1
},
{
- "name": ".github/workflows/gcloud.yml",
+ "name": "molecule/gcsfuse/verify.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "e38b58e6cb896b3d6dbcc8f73caea012fe85f7420fa5a3c3e70ad7f0fb422712",
+ "chksum_sha256": "9aa5a08d70fea740d73c3c560dae4a7fc5166c486f24ac8739f2abb88bacc82f",
"format": 1
},
{
- "name": "CHANGELOG.rst",
+ "name": "molecule/gcsfuse/converge.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "c489ae5526e7ac9bb7ae976994f82d5f39e005a0e95cc68da1f57ad5b6868b03",
+ "chksum_sha256": "b246124da724132200d8ce9cb76178abb483a5ae5c291d11fd44ea77d29e7146",
"format": 1
},
{
- "name": "requirements-test.txt",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "163167a063d01a440c2a19fa5879655d8b78378463fb825713de832f822738f6",
+ "name": "molecule/gcloud",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": "meta",
+ "name": "molecule/gcloud/tests",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "meta/runtime.yml",
+ "name": "molecule/gcloud/tests/test_default.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "9008b0f78cfbe63b9d9f47b2c26d88f28978416ffdf5cd89624880285661e4f6",
+ "chksum_sha256": "cb6e9becf8f75159ef50057058047caddd7ec06fd07f9ea7237eb0c3f822a198",
"format": 1
},
{
- "name": "tests",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "molecule/gcloud/molecule.yml",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "f1d656adaa6be9e41b73bc3a4a8b4798773ff66d5f535f86e4ee15c3d86843b8",
"format": 1
},
{
- "name": "tests/integration",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "molecule/gcloud/package_playbook.yml",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "501d76e7d8b292e055fcd137a589296943709369a735e5b483d428e03beed38b",
"format": 1
},
{
- "name": "tests/integration/targets",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "molecule/gcloud/Dockerfile.j2",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "5ef978855099e5b5118cb1198a2e27d5745c4a358670ba2e10d9004ce29c0324",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_vpn_tunnel",
+ "name": "molecule/gcloud/files",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_vpn_tunnel/defaults",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "molecule/gcloud/files/override.conf",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "27d57701a92b623757711f18aeba17f089df44c13cead5caca41418a62804d89",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_vpn_tunnel/defaults/main.yml",
+ "name": "molecule/gcloud/archive_playbook.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
+ "chksum_sha256": "f20365002e8801786c96e091c01e590dc15f32e652450a19571f42d5ebc8ec9c",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_vpn_tunnel/tasks",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "molecule/gcloud/verify.yml",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "9aa5a08d70fea740d73c3c560dae4a7fc5166c486f24ac8739f2abb88bacc82f",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_vpn_tunnel/tasks/autogen.yml",
+ "name": "molecule/gcloud/converge.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "125165d5e69d45ec8d5bd45a4db2cde395c5ada9cb6d713a5243ae83f697acd3",
+ "chksum_sha256": "fdb3bfc44f5c9530089d17c793cd7848e5e07bd7202e3e4fb7f4a382b1f0c410",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_vpn_tunnel/tasks/main.yml",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10",
+ "name": "tests",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_vpn_tunnel/aliases",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "5dab10dc09ed5cb445c47bfd67629b39efb7bd68e65e6b773896a8eb507d588e",
+ "name": "tests/unit",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_vpn_tunnel/meta",
+ "name": "tests/unit/plugins",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_vpn_tunnel/meta/main.yml",
+ "name": "tests/unit/plugins/test_gcp_utils.py",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
+ "chksum_sha256": "7cea31c6d0b65046d03d34a1409bd12e5f2bc059002e1fa8ca0535a3a3a242f2",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_region_backend_service",
+ "name": "tests/integration",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_region_backend_service/defaults",
+ "name": "tests/integration/targets",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_region_backend_service/defaults/main.yml",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
- "format": 1
- },
- {
- "name": "tests/integration/targets/gcp_compute_region_backend_service/tasks",
+ "name": "tests/integration/targets/gcp_compute_target_tcp_proxy",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_region_backend_service/tasks/autogen.yml",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "8304b14c2b1b735a17046cc40273117676f6a82dc3cfbb680a44256ed80a6f34",
+ "name": "tests/integration/targets/gcp_compute_target_tcp_proxy/tasks",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_region_backend_service/tasks/main.yml",
+ "name": "tests/integration/targets/gcp_compute_target_tcp_proxy/tasks/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10",
+ "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_region_backend_service/aliases",
+ "name": "tests/integration/targets/gcp_compute_target_tcp_proxy/tasks/autogen.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
+ "chksum_sha256": "db0ba1515a39f1709e3cbffe3c48a86c7195f052dfd80f6e6e99c4f4e47702f7",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_region_backend_service/meta",
+ "name": "tests/integration/targets/gcp_compute_target_tcp_proxy/meta",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_region_backend_service/meta/main.yml",
+ "name": "tests/integration/targets/gcp_compute_target_tcp_proxy/meta/main.yml",
"ftype": "file",
"chksum_type": "sha256",
"chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_pubsub_topic",
+ "name": "tests/integration/targets/gcp_compute_target_tcp_proxy/defaults",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_pubsub_topic/defaults",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "tests/integration/targets/gcp_compute_target_tcp_proxy/defaults/main.yml",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_pubsub_topic/defaults/main.yml",
+ "name": "tests/integration/targets/gcp_compute_target_tcp_proxy/aliases",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
+ "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_pubsub_topic/tasks",
+ "name": "tests/integration/targets/gcp_dns_resource_record_set",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_pubsub_topic/tasks/autogen.yml",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "3fea3370df0004d72f1caf5b5be4a8c43905b7d09781a0d1d26c8eeaad6c4789",
+ "name": "tests/integration/targets/gcp_dns_resource_record_set/tasks",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_pubsub_topic/tasks/main.yml",
+ "name": "tests/integration/targets/gcp_dns_resource_record_set/tasks/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10",
+ "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_pubsub_topic/aliases",
+ "name": "tests/integration/targets/gcp_dns_resource_record_set/tasks/autogen.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
+ "chksum_sha256": "fd993acf9e029ccd0f8ad3a52bdbe32d6fc5bfec420452d9757a7df10ff728f8",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_pubsub_topic/meta",
+ "name": "tests/integration/targets/gcp_dns_resource_record_set/meta",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_pubsub_topic/meta/main.yml",
+ "name": "tests/integration/targets/gcp_dns_resource_record_set/meta/main.yml",
"ftype": "file",
"chksum_type": "sha256",
"chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_node_template",
+ "name": "tests/integration/targets/gcp_dns_resource_record_set/defaults",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_node_template/defaults",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "tests/integration/targets/gcp_dns_resource_record_set/defaults/main.yml",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_node_template/defaults/main.yml",
+ "name": "tests/integration/targets/gcp_dns_resource_record_set/aliases",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
+ "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_node_template/tasks",
+ "name": "tests/integration/targets/gcp_compute_node_template",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_node_template/tasks/autogen.yml",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "9d9acc79e76e0925f9a7b77ae030609d10cbbda8357bb5b25e043a83cde2f90d",
+ "name": "tests/integration/targets/gcp_compute_node_template/tasks",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
"name": "tests/integration/targets/gcp_compute_node_template/tasks/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10",
+ "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_node_template/aliases",
+ "name": "tests/integration/targets/gcp_compute_node_template/tasks/autogen.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
+ "chksum_sha256": "576863f752cf25f6fb17189414f1f6604b6036635fb73264aa5166579b82d30d",
"format": 1
},
{
@@ -2115,808 +2045,808 @@
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_disk",
+ "name": "tests/integration/targets/gcp_compute_node_template/defaults",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_disk/defaults",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "tests/integration/targets/gcp_compute_node_template/defaults/main.yml",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_disk/defaults/main.yml",
+ "name": "tests/integration/targets/gcp_compute_node_template/aliases",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
+ "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_disk/tasks",
+ "name": "tests/integration/targets/gcp_bigquery_dataset",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_disk/tasks/autogen.yml",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "3457bb7071395c9872657cca634c25033d9da297124e98312417ea653cfc80e4",
+ "name": "tests/integration/targets/gcp_bigquery_dataset/tasks",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_disk/tasks/main.yml",
+ "name": "tests/integration/targets/gcp_bigquery_dataset/tasks/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10",
+ "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_disk/aliases",
+ "name": "tests/integration/targets/gcp_bigquery_dataset/tasks/autogen.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
+ "chksum_sha256": "117819fa109c7918ba9db3e8cd3b88bc0abea7cbe992a9fb69b6b3ec762a8719",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_disk/meta",
+ "name": "tests/integration/targets/gcp_bigquery_dataset/meta",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_disk/meta/main.yml",
+ "name": "tests/integration/targets/gcp_bigquery_dataset/meta/main.yml",
"ftype": "file",
"chksum_type": "sha256",
"chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_spanner_database",
+ "name": "tests/integration/targets/gcp_bigquery_dataset/defaults",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_spanner_database/defaults",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "tests/integration/targets/gcp_bigquery_dataset/defaults/main.yml",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_spanner_database/defaults/main.yml",
+ "name": "tests/integration/targets/gcp_bigquery_dataset/aliases",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
+ "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_spanner_database/tasks",
+ "name": "tests/integration/targets/gcp_compute_subnetwork",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_spanner_database/tasks/autogen.yml",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "ab15b6bea0e4bc93955da80d06bcc325b1feb51eb1bc125e0519094527764e53",
+ "name": "tests/integration/targets/gcp_compute_subnetwork/tasks",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_spanner_database/tasks/main.yml",
+ "name": "tests/integration/targets/gcp_compute_subnetwork/tasks/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10",
+ "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_spanner_database/aliases",
+ "name": "tests/integration/targets/gcp_compute_subnetwork/tasks/autogen.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "9f5067f13c39b7c91589302770901c2874dc75ad06ef130a9d3af5e72118c4e8",
+ "chksum_sha256": "82de034e79aa6aa07b9055d8034e536a72f8aa4de83057f40236225449eefcfe",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_spanner_database/meta",
+ "name": "tests/integration/targets/gcp_compute_subnetwork/meta",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_spanner_database/meta/main.yml",
+ "name": "tests/integration/targets/gcp_compute_subnetwork/meta/main.yml",
"ftype": "file",
"chksum_type": "sha256",
"chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_address",
+ "name": "tests/integration/targets/gcp_compute_subnetwork/defaults",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_address/defaults",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "tests/integration/targets/gcp_compute_subnetwork/defaults/main.yml",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_address/defaults/main.yml",
+ "name": "tests/integration/targets/gcp_compute_subnetwork/aliases",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
+ "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_address/tasks",
+ "name": "tests/integration/targets/gcp_compute_ssl_certificate",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_address/tasks/autogen.yml",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "2eb5441988c85493d07e633b7c5fe9ea6e1b5e48e2e5b0b21f4bfd0996c7d3df",
+ "name": "tests/integration/targets/gcp_compute_ssl_certificate/tasks",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_address/tasks/main.yml",
+ "name": "tests/integration/targets/gcp_compute_ssl_certificate/tasks/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10",
+ "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_address/aliases",
+ "name": "tests/integration/targets/gcp_compute_ssl_certificate/tasks/autogen.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
+ "chksum_sha256": "e91262b16e72168fb3fc8a53729cb046d04014fcfcf3dd42e0d02eb7d495bd29",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_address/meta",
+ "name": "tests/integration/targets/gcp_compute_ssl_certificate/meta",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_address/meta/main.yml",
+ "name": "tests/integration/targets/gcp_compute_ssl_certificate/meta/main.yml",
"ftype": "file",
"chksum_type": "sha256",
"chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_appengine_firewall_rule",
+ "name": "tests/integration/targets/gcp_compute_ssl_certificate/defaults",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_appengine_firewall_rule/defaults",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "tests/integration/targets/gcp_compute_ssl_certificate/defaults/main.yml",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_appengine_firewall_rule/defaults/main.yml",
+ "name": "tests/integration/targets/gcp_compute_ssl_certificate/aliases",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
+ "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_appengine_firewall_rule/tasks",
+ "name": "tests/integration/targets/gcp_compute_target_ssl_proxy",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_appengine_firewall_rule/tasks/autogen.yml",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "7298f7de86c07d56f1e1664106b767e2666b040ead334ebe948fec0035218354",
+ "name": "tests/integration/targets/gcp_compute_target_ssl_proxy/tasks",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_appengine_firewall_rule/tasks/main.yml",
+ "name": "tests/integration/targets/gcp_compute_target_ssl_proxy/tasks/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10",
+ "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_appengine_firewall_rule/aliases",
+ "name": "tests/integration/targets/gcp_compute_target_ssl_proxy/tasks/autogen.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
+ "chksum_sha256": "c7131ed9350c8ce7d2c9eb4e0464acaf5283f53fe21b58ffca25965a183d75b7",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_appengine_firewall_rule/meta",
+ "name": "tests/integration/targets/gcp_compute_target_ssl_proxy/meta",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_appengine_firewall_rule/meta/main.yml",
+ "name": "tests/integration/targets/gcp_compute_target_ssl_proxy/meta/main.yml",
"ftype": "file",
"chksum_type": "sha256",
"chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_spanner_instance",
+ "name": "tests/integration/targets/gcp_compute_target_ssl_proxy/defaults",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_spanner_instance/defaults",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "tests/integration/targets/gcp_compute_target_ssl_proxy/defaults/main.yml",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_spanner_instance/defaults/main.yml",
+ "name": "tests/integration/targets/gcp_compute_target_ssl_proxy/aliases",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
+ "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_spanner_instance/tasks",
+ "name": "tests/integration/targets/gcp_compute_address",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_spanner_instance/tasks/autogen.yml",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "5584f9f9295839d61520c3d63a73410ef373ed74d4dd7e8283284c2c94f05172",
+ "name": "tests/integration/targets/gcp_compute_address/tasks",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_spanner_instance/tasks/main.yml",
+ "name": "tests/integration/targets/gcp_compute_address/tasks/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10",
+ "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_spanner_instance/aliases",
+ "name": "tests/integration/targets/gcp_compute_address/tasks/autogen.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
+ "chksum_sha256": "d669c7fb0649e0ed75163ab01f4caee15f362fc788fff24e8f118436549be820",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_spanner_instance/meta",
+ "name": "tests/integration/targets/gcp_compute_address/meta",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_spanner_instance/meta/main.yml",
+ "name": "tests/integration/targets/gcp_compute_address/meta/main.yml",
"ftype": "file",
"chksum_type": "sha256",
"chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_target_ssl_proxy",
+ "name": "tests/integration/targets/gcp_compute_address/defaults",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_target_ssl_proxy/defaults",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "tests/integration/targets/gcp_compute_address/defaults/main.yml",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_target_ssl_proxy/defaults/main.yml",
+ "name": "tests/integration/targets/gcp_compute_address/aliases",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
+ "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_target_ssl_proxy/tasks",
+ "name": "tests/integration/targets/gcp_compute_external_vpn_gateway",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_target_ssl_proxy/tasks/autogen.yml",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "ff2b4b42551ea3e16923e8bd03056357317b5669a3dfc0cef4be92fa2355d74a",
+ "name": "tests/integration/targets/gcp_compute_external_vpn_gateway/tasks",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_target_ssl_proxy/tasks/main.yml",
+ "name": "tests/integration/targets/gcp_compute_external_vpn_gateway/tasks/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10",
+ "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_target_ssl_proxy/aliases",
+ "name": "tests/integration/targets/gcp_compute_external_vpn_gateway/tasks/autogen.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
+ "chksum_sha256": "e246b2701ea21250a3faec4d4e4cbbcdd5dc26e418a27b19c6683135a5902bff",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_target_ssl_proxy/meta",
+ "name": "tests/integration/targets/gcp_compute_external_vpn_gateway/meta",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_target_ssl_proxy/meta/main.yml",
+ "name": "tests/integration/targets/gcp_compute_external_vpn_gateway/meta/main.yml",
"ftype": "file",
"chksum_type": "sha256",
"chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_kms_crypto_key",
+ "name": "tests/integration/targets/gcp_compute_external_vpn_gateway/defaults",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_kms_crypto_key/defaults",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "tests/integration/targets/gcp_compute_external_vpn_gateway/defaults/main.yml",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_kms_crypto_key/defaults/main.yml",
+ "name": "tests/integration/targets/gcp_compute_external_vpn_gateway/aliases",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
+ "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_kms_crypto_key/tasks",
+ "name": "tests/integration/targets/gcp_iam_role",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_kms_crypto_key/tasks/autogen.yml",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "34fc4de9341be29f9629eb2336188bd06db7469d3877a493b7c7070d6b497f51",
+ "name": "tests/integration/targets/gcp_iam_role/tasks",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_kms_crypto_key/tasks/main.yml",
+ "name": "tests/integration/targets/gcp_iam_role/tasks/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10",
+ "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_kms_crypto_key/aliases",
+ "name": "tests/integration/targets/gcp_iam_role/tasks/autogen.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "5dab10dc09ed5cb445c47bfd67629b39efb7bd68e65e6b773896a8eb507d588e",
+ "chksum_sha256": "9573848b6188789b3c94ab22d1909bc318a99cc76d060f7637d2702b74883b8f",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_kms_crypto_key/meta",
+ "name": "tests/integration/targets/gcp_iam_role/meta",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_kms_crypto_key/meta/main.yml",
+ "name": "tests/integration/targets/gcp_iam_role/meta/main.yml",
"ftype": "file",
"chksum_type": "sha256",
"chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_network",
+ "name": "tests/integration/targets/gcp_iam_role/defaults",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_network/defaults",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "tests/integration/targets/gcp_iam_role/defaults/main.yml",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_network/defaults/main.yml",
+ "name": "tests/integration/targets/gcp_iam_role/aliases",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
+ "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_network/tasks",
+ "name": "tests/integration/targets/gcp_compute_forwarding_rule",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_network/tasks/autogen.yml",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "e25ca51ac3d883d165e0e620c9f68dcc7dc1bb06923e1564faafe1f5476f77ec",
+ "name": "tests/integration/targets/gcp_compute_forwarding_rule/tasks",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_network/tasks/main.yml",
+ "name": "tests/integration/targets/gcp_compute_forwarding_rule/tasks/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10",
+ "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_network/aliases",
+ "name": "tests/integration/targets/gcp_compute_forwarding_rule/tasks/autogen.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
+ "chksum_sha256": "db38770b5a033fb7ffb41370fd837155a8862c20236f1dc92d8fb8fbcbd8ba82",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_network/meta",
+ "name": "tests/integration/targets/gcp_compute_forwarding_rule/meta",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_network/meta/main.yml",
+ "name": "tests/integration/targets/gcp_compute_forwarding_rule/meta/main.yml",
"ftype": "file",
"chksum_type": "sha256",
"chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_iam_service_account",
+ "name": "tests/integration/targets/gcp_compute_forwarding_rule/defaults",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_iam_service_account/defaults",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "tests/integration/targets/gcp_compute_forwarding_rule/defaults/main.yml",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_iam_service_account/defaults/main.yml",
+ "name": "tests/integration/targets/gcp_compute_forwarding_rule/aliases",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
+ "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_iam_service_account/tasks",
+ "name": "tests/integration/targets/gcp_dns_managed_zone",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_iam_service_account/tasks/autogen.yml",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "ac8a49a991f16904456dbde7d9bf9279a4ed15f9c4faa132a49ba53c7c7c4d4d",
+ "name": "tests/integration/targets/gcp_dns_managed_zone/tasks",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_iam_service_account/tasks/main.yml",
+ "name": "tests/integration/targets/gcp_dns_managed_zone/tasks/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10",
+ "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_iam_service_account/aliases",
+ "name": "tests/integration/targets/gcp_dns_managed_zone/tasks/autogen.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
+ "chksum_sha256": "31c1361d50ce83166f5dbe614688ea3b88986183d5eb03f9139cd017d805ddb3",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_iam_service_account/meta",
+ "name": "tests/integration/targets/gcp_dns_managed_zone/meta",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_iam_service_account/meta/main.yml",
+ "name": "tests/integration/targets/gcp_dns_managed_zone/meta/main.yml",
"ftype": "file",
"chksum_type": "sha256",
"chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_health_check",
+ "name": "tests/integration/targets/gcp_dns_managed_zone/defaults",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_health_check/defaults",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "tests/integration/targets/gcp_dns_managed_zone/defaults/main.yml",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_health_check/defaults/main.yml",
+ "name": "tests/integration/targets/gcp_dns_managed_zone/aliases",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
+ "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_health_check/tasks",
+ "name": "tests/integration/targets/gcp_serviceusage_service",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_health_check/tasks/autogen.yml",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "977e212dba8ce932fe2bb83c5abf84fac04ddb3b9237687013654fc71b953d82",
+ "name": "tests/integration/targets/gcp_serviceusage_service/tasks",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_health_check/tasks/main.yml",
+ "name": "tests/integration/targets/gcp_serviceusage_service/tasks/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10",
+ "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_health_check/aliases",
+ "name": "tests/integration/targets/gcp_serviceusage_service/tasks/autogen.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
+ "chksum_sha256": "81b6cb863e3be0b9bf509dd61f3d1dcea6338ad9bc0985ba2a31d7aa6e8ce256",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_health_check/meta",
+ "name": "tests/integration/targets/gcp_serviceusage_service/meta",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_health_check/meta/main.yml",
+ "name": "tests/integration/targets/gcp_serviceusage_service/meta/main.yml",
"ftype": "file",
"chksum_type": "sha256",
"chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_kms_key_ring",
+ "name": "tests/integration/targets/gcp_serviceusage_service/defaults",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_kms_key_ring/defaults",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "tests/integration/targets/gcp_serviceusage_service/defaults/main.yml",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_kms_key_ring/defaults/main.yml",
+ "name": "tests/integration/targets/gcp_serviceusage_service/aliases",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
+ "chksum_sha256": "c39528c4d7c2bdbbf0113f0588c1ab8f66a8f3f21c61c23de443c2abced58868",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_kms_key_ring/tasks",
+ "name": "tests/integration/targets/gcp_cloudscheduler_job",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_kms_key_ring/tasks/autogen.yml",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "25a0086c812cf17048726a55b8c19ea85225ee69b7e1c4d6acdd1df85ec8705f",
+ "name": "tests/integration/targets/gcp_cloudscheduler_job/tasks",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_kms_key_ring/tasks/main.yml",
+ "name": "tests/integration/targets/gcp_cloudscheduler_job/tasks/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10",
+ "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_kms_key_ring/aliases",
+ "name": "tests/integration/targets/gcp_cloudscheduler_job/tasks/autogen.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
+ "chksum_sha256": "1ebeb815f6a7f9a83c4816fd23ab83a1a348786bdc7ad015257487dc6de63f68",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_kms_key_ring/meta",
+ "name": "tests/integration/targets/gcp_cloudscheduler_job/meta",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_kms_key_ring/meta/main.yml",
+ "name": "tests/integration/targets/gcp_cloudscheduler_job/meta/main.yml",
"ftype": "file",
"chksum_type": "sha256",
"chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_sql_user",
+ "name": "tests/integration/targets/gcp_cloudscheduler_job/defaults",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_sql_user/defaults",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "tests/integration/targets/gcp_cloudscheduler_job/defaults/main.yml",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_sql_user/defaults/main.yml",
+ "name": "tests/integration/targets/gcp_cloudscheduler_job/aliases",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
+ "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_sql_user/tasks",
+ "name": "tests/integration/targets/gcp_spanner_instance",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_sql_user/tasks/autogen.yml",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "8e67dc659fbd62e56db2d18a039302c62e46d0a01deb77bf7d114b59f83453ad",
+ "name": "tests/integration/targets/gcp_spanner_instance/tasks",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_sql_user/tasks/main.yml",
+ "name": "tests/integration/targets/gcp_spanner_instance/tasks/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10",
+ "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_sql_user/aliases",
+ "name": "tests/integration/targets/gcp_spanner_instance/tasks/autogen.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
+ "chksum_sha256": "a192cad3656e82b22d86652a688ea00814a468266001a5962ba86dfe4c6ac2c9",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_sql_user/meta",
+ "name": "tests/integration/targets/gcp_spanner_instance/meta",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_sql_user/meta/main.yml",
+ "name": "tests/integration/targets/gcp_spanner_instance/meta/main.yml",
"ftype": "file",
"chksum_type": "sha256",
"chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_http_health_check",
+ "name": "tests/integration/targets/gcp_spanner_instance/defaults",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_http_health_check/defaults",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "tests/integration/targets/gcp_spanner_instance/defaults/main.yml",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_http_health_check/defaults/main.yml",
+ "name": "tests/integration/targets/gcp_spanner_instance/aliases",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
+ "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_http_health_check/tasks",
+ "name": "tests/integration/targets/gcp_compute_http_health_check",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_http_health_check/tasks/autogen.yml",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "b23eda41cd00ba5e90dfb0efdc9caab91f6b62c5c6ce77bd0ffa39e51135c3b0",
+ "name": "tests/integration/targets/gcp_compute_http_health_check/tasks",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
"name": "tests/integration/targets/gcp_compute_http_health_check/tasks/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10",
+ "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_http_health_check/aliases",
+ "name": "tests/integration/targets/gcp_compute_http_health_check/tasks/autogen.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
+ "chksum_sha256": "6c2b06a62ffb482fd2cd1f0f9c37d5e646d6fde56cf7b5459e20b09204b1bb7a",
"format": 1
},
{
@@ -2934,790 +2864,804 @@
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_https_health_check",
+ "name": "tests/integration/targets/gcp_compute_http_health_check/defaults",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_https_health_check/defaults",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "tests/integration/targets/gcp_compute_http_health_check/defaults/main.yml",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_https_health_check/defaults/main.yml",
+ "name": "tests/integration/targets/gcp_compute_http_health_check/aliases",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
+ "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_https_health_check/tasks",
+ "name": "tests/integration/targets/gcp_sql_instance",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_https_health_check/tasks/autogen.yml",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "784ea2883b01dcfea45cdd35f98c376b2763f67ea0995f0b8be2980c59c69d74",
+ "name": "tests/integration/targets/gcp_sql_instance/tasks",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_https_health_check/tasks/main.yml",
+ "name": "tests/integration/targets/gcp_sql_instance/tasks/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10",
+ "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_https_health_check/aliases",
+ "name": "tests/integration/targets/gcp_sql_instance/tasks/autogen.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
+ "chksum_sha256": "bbac95325e0de0a4242f2239fe72e3f866af44d856e658610f58a25d240e6d33",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_https_health_check/meta",
+ "name": "tests/integration/targets/gcp_sql_instance/meta",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_https_health_check/meta/main.yml",
+ "name": "tests/integration/targets/gcp_sql_instance/meta/main.yml",
"ftype": "file",
"chksum_type": "sha256",
"chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_region_disk",
+ "name": "tests/integration/targets/gcp_sql_instance/defaults",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_region_disk/defaults",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "tests/integration/targets/gcp_sql_instance/defaults/main.yml",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_region_disk/defaults/main.yml",
+ "name": "tests/integration/targets/gcp_sql_instance/aliases",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
+ "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_region_disk/tasks",
+ "name": "tests/integration/targets/gcp_compute_backend_service",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_region_disk/tasks/autogen.yml",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "5f98d20ee96e139fa05ceffc44d39464bb158034b07772e416716e5158ff08c6",
+ "name": "tests/integration/targets/gcp_compute_backend_service/tasks",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_region_disk/tasks/main.yml",
+ "name": "tests/integration/targets/gcp_compute_backend_service/tasks/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10",
+ "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_region_disk/aliases",
+ "name": "tests/integration/targets/gcp_compute_backend_service/tasks/autogen.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
+ "chksum_sha256": "6e7e42aee75a5726a19be4c33bf5e4b1df56437df4d7dc0c7ad4e07311177098",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_region_disk/meta",
+ "name": "tests/integration/targets/gcp_compute_backend_service/meta",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_region_disk/meta/main.yml",
+ "name": "tests/integration/targets/gcp_compute_backend_service/meta/main.yml",
"ftype": "file",
"chksum_type": "sha256",
"chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_target_pool",
+ "name": "tests/integration/targets/gcp_compute_backend_service/defaults",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_target_pool/defaults",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "tests/integration/targets/gcp_compute_backend_service/defaults/main.yml",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_target_pool/defaults/main.yml",
+ "name": "tests/integration/targets/gcp_compute_backend_service/aliases",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
+ "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_target_pool/tasks",
+ "name": "tests/integration/targets/gcp_compute_vpn_tunnel",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_target_pool/tasks/autogen.yml",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "ec1b5c5f4c6282761d76dc31211373b05de6b97ed74b8ce83f142e46e0ca138c",
+ "name": "tests/integration/targets/gcp_compute_vpn_tunnel/tasks",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_target_pool/tasks/main.yml",
+ "name": "tests/integration/targets/gcp_compute_vpn_tunnel/tasks/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10",
+ "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_target_pool/aliases",
+ "name": "tests/integration/targets/gcp_compute_vpn_tunnel/tasks/autogen.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
+ "chksum_sha256": "34fcfe018500d82c45462e6c6b7a629bb4ed6b18a7198924e5494279c56e13c5",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_target_pool/meta",
+ "name": "tests/integration/targets/gcp_compute_vpn_tunnel/meta",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_target_pool/meta/main.yml",
+ "name": "tests/integration/targets/gcp_compute_vpn_tunnel/meta/main.yml",
"ftype": "file",
"chksum_type": "sha256",
"chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_instance",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
- "format": 1
- },
- {
- "name": "tests/integration/targets/gcp_compute_instance/defaults",
+ "name": "tests/integration/targets/gcp_compute_vpn_tunnel/defaults",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_instance/defaults/main.yml",
+ "name": "tests/integration/targets/gcp_compute_vpn_tunnel/defaults/main.yml",
"ftype": "file",
"chksum_type": "sha256",
"chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_instance/tasks",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
- "format": 1
- },
- {
- "name": "tests/integration/targets/gcp_compute_instance/tasks/autogen.yml",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "7b421184eabb89f84814b6b726e801985ed577767fa69b3787d3431ee07087c0",
- "format": 1
- },
- {
- "name": "tests/integration/targets/gcp_compute_instance/tasks/main.yml",
+ "name": "tests/integration/targets/gcp_compute_vpn_tunnel/aliases",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10",
+ "chksum_sha256": "5dab10dc09ed5cb445c47bfd67629b39efb7bd68e65e6b773896a8eb507d588e",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_instance/aliases",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
+ "name": "tests/integration/targets/gcp_compute_interconnect_attachment",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_instance/meta",
+ "name": "tests/integration/targets/gcp_compute_interconnect_attachment/meta",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_instance/meta/main.yml",
+ "name": "tests/integration/targets/gcp_compute_interconnect_attachment/meta/main.yml",
"ftype": "file",
"chksum_type": "sha256",
"chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_sourcerepo_repository",
+ "name": "tests/integration/targets/gcp_compute_interconnect_attachment/defaults",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_sourcerepo_repository/defaults",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "tests/integration/targets/gcp_compute_interconnect_attachment/defaults/main.yml",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "bd5ce1e4b6d6cd7f0b4881112f82d8cd3541d26a8c639151c95a6f11842f1617",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_sourcerepo_repository/defaults/main.yml",
+ "name": "tests/integration/targets/gcp_compute_interconnect_attachment/aliases",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
+ "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_sourcerepo_repository/tasks",
+ "name": "tests/integration/targets/gcp_compute_global_address",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_sourcerepo_repository/tasks/autogen.yml",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "636f22c39d748eff61cdf40e783924651703acf1956a9e19b64b71653db31360",
+ "name": "tests/integration/targets/gcp_compute_global_address/tasks",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_sourcerepo_repository/tasks/main.yml",
+ "name": "tests/integration/targets/gcp_compute_global_address/tasks/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10",
+ "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_sourcerepo_repository/aliases",
+ "name": "tests/integration/targets/gcp_compute_global_address/tasks/autogen.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
+ "chksum_sha256": "e6a890e4786d0556905e7294c9a721247d423c9d8a22f9ff17146316ee021c11",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_sourcerepo_repository/meta",
+ "name": "tests/integration/targets/gcp_compute_global_address/meta",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_sourcerepo_repository/meta/main.yml",
+ "name": "tests/integration/targets/gcp_compute_global_address/meta/main.yml",
"ftype": "file",
"chksum_type": "sha256",
"chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_logging_metric",
+ "name": "tests/integration/targets/gcp_compute_global_address/defaults",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_logging_metric/defaults",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "tests/integration/targets/gcp_compute_global_address/defaults/main.yml",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_logging_metric/defaults/main.yml",
+ "name": "tests/integration/targets/gcp_compute_global_address/aliases",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
+ "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_logging_metric/tasks",
+ "name": "tests/integration/targets/gcp_compute_instance",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_logging_metric/tasks/autogen.yml",
+ "name": "tests/integration/targets/gcp_compute_instance/tasks",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
+ "format": 1
+ },
+ {
+ "name": "tests/integration/targets/gcp_compute_instance/tasks/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "725f02db9ff6d31c60c8c757526c498a219fd3465879f8f5ea274d5a0b3534d7",
+ "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_logging_metric/tasks/main.yml",
+ "name": "tests/integration/targets/gcp_compute_instance/tasks/autogen.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10",
+ "chksum_sha256": "ca749c961c25599b932e2d503655a91306b9d4ab7a5a565698a665b496aea941",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_logging_metric/aliases",
+ "name": "tests/integration/targets/gcp_compute_instance/meta",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
+ "format": 1
+ },
+ {
+ "name": "tests/integration/targets/gcp_compute_instance/meta/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "5dab10dc09ed5cb445c47bfd67629b39efb7bd68e65e6b773896a8eb507d588e",
+ "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_logging_metric/meta",
+ "name": "tests/integration/targets/gcp_compute_instance/defaults",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_logging_metric/meta/main.yml",
+ "name": "tests/integration/targets/gcp_compute_instance/defaults/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
+ "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_managed_ssl_certificate",
+ "name": "tests/integration/targets/gcp_compute_instance/aliases",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
+ "format": 1
+ },
+ {
+ "name": "tests/integration/targets/gcp_appengine_firewall_rule",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_managed_ssl_certificate/defaults",
+ "name": "tests/integration/targets/gcp_appengine_firewall_rule/tasks",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_managed_ssl_certificate/defaults/main.yml",
+ "name": "tests/integration/targets/gcp_appengine_firewall_rule/tasks/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "e173e5a15d9174e198e85c764f303f04d96463d7e1af4685fdbeec2e5cf391d7",
+ "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_managed_ssl_certificate/aliases",
+ "name": "tests/integration/targets/gcp_appengine_firewall_rule/tasks/autogen.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "5dab10dc09ed5cb445c47bfd67629b39efb7bd68e65e6b773896a8eb507d588e",
+ "chksum_sha256": "3f56eff016d2109200c61174ecebaf43bcf1ef037a1b2bc00469c649237a66c0",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_managed_ssl_certificate/meta",
+ "name": "tests/integration/targets/gcp_appengine_firewall_rule/meta",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_managed_ssl_certificate/meta/main.yml",
+ "name": "tests/integration/targets/gcp_appengine_firewall_rule/meta/main.yml",
"ftype": "file",
"chksum_type": "sha256",
"chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_bigquery_dataset",
+ "name": "tests/integration/targets/gcp_appengine_firewall_rule/defaults",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_bigquery_dataset/defaults",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "tests/integration/targets/gcp_appengine_firewall_rule/defaults/main.yml",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_bigquery_dataset/defaults/main.yml",
+ "name": "tests/integration/targets/gcp_appengine_firewall_rule/aliases",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
+ "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_bigquery_dataset/tasks",
+ "name": "tests/integration/targets/gcp_storage_default_object_acl",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_bigquery_dataset/tasks/autogen.yml",
+ "name": "tests/integration/targets/gcp_storage_default_object_acl/tasks",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
+ "format": 1
+ },
+ {
+ "name": "tests/integration/targets/gcp_storage_default_object_acl/tasks/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "b5a7fe6b389dc2eca5ffe60197705f786cea715268d1c00e1d8abaffd7bc3d94",
+ "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_bigquery_dataset/tasks/main.yml",
+ "name": "tests/integration/targets/gcp_storage_default_object_acl/tasks/autogen.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10",
+ "chksum_sha256": "b50c90fc994904bb78aa3737a0f148580d931440e85cea6445c78d6f76cbfc2f",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_bigquery_dataset/aliases",
+ "name": "tests/integration/targets/gcp_storage_default_object_acl/meta",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
+ "format": 1
+ },
+ {
+ "name": "tests/integration/targets/gcp_storage_default_object_acl/meta/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
+ "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_bigquery_dataset/meta",
+ "name": "tests/integration/targets/gcp_storage_default_object_acl/defaults",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_bigquery_dataset/meta/main.yml",
+ "name": "tests/integration/targets/gcp_storage_default_object_acl/defaults/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
+ "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_iam_service_account_key",
+ "name": "tests/integration/targets/gcp_storage_default_object_acl/aliases",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
+ "format": 1
+ },
+ {
+ "name": "tests/integration/targets/gcp_compute_backend_bucket",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_iam_service_account_key/defaults",
+ "name": "tests/integration/targets/gcp_compute_backend_bucket/tasks",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_iam_service_account_key/defaults/main.yml",
+ "name": "tests/integration/targets/gcp_compute_backend_bucket/tasks/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "e173e5a15d9174e198e85c764f303f04d96463d7e1af4685fdbeec2e5cf391d7",
+ "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_iam_service_account_key/aliases",
+ "name": "tests/integration/targets/gcp_compute_backend_bucket/tasks/autogen.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
+ "chksum_sha256": "7296ce1a954940cf2e73e83b61934361e05a69aa661440f32ca8af50bd37672e",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_iam_service_account_key/meta",
+ "name": "tests/integration/targets/gcp_compute_backend_bucket/meta",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_iam_service_account_key/meta/main.yml",
+ "name": "tests/integration/targets/gcp_compute_backend_bucket/meta/main.yml",
"ftype": "file",
"chksum_type": "sha256",
"chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_url_map",
+ "name": "tests/integration/targets/gcp_compute_backend_bucket/defaults",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_url_map/defaults",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "tests/integration/targets/gcp_compute_backend_bucket/defaults/main.yml",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_url_map/defaults/main.yml",
+ "name": "tests/integration/targets/gcp_compute_backend_bucket/aliases",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
+ "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_url_map/tasks",
+ "name": "tests/integration/targets/gcp_compute_target_instance",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_url_map/tasks/autogen.yml",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "49efcc77d33446fcd1217723be07aa41d98022dcccd7d24af55297f5b650ddbf",
+ "name": "tests/integration/targets/gcp_compute_target_instance/tasks",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_url_map/tasks/main.yml",
+ "name": "tests/integration/targets/gcp_compute_target_instance/tasks/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10",
+ "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_url_map/aliases",
+ "name": "tests/integration/targets/gcp_compute_target_instance/tasks/autogen.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
+ "chksum_sha256": "a8bfeb54291aa5642be1deddd610b536cb1b64b3b35664c367ce81d973139a1e",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_url_map/meta",
+ "name": "tests/integration/targets/gcp_compute_target_instance/meta",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_url_map/meta/main.yml",
+ "name": "tests/integration/targets/gcp_compute_target_instance/meta/main.yml",
"ftype": "file",
"chksum_type": "sha256",
"chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_image",
+ "name": "tests/integration/targets/gcp_compute_target_instance/defaults",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_image/defaults",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "tests/integration/targets/gcp_compute_target_instance/defaults/main.yml",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_image/defaults/main.yml",
+ "name": "tests/integration/targets/gcp_compute_target_instance/aliases",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
+ "chksum_sha256": "5dab10dc09ed5cb445c47bfd67629b39efb7bd68e65e6b773896a8eb507d588e",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_image/tasks",
+ "name": "tests/integration/targets/gcp_compute_region_url_map",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_image/tasks/autogen.yml",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "00555000c98b8dbe704c4112c0f5a353edf823fb47ecba6b0351d42614331e59",
+ "name": "tests/integration/targets/gcp_compute_region_url_map/tasks",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_image/tasks/main.yml",
+ "name": "tests/integration/targets/gcp_compute_region_url_map/tasks/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10",
+ "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_image/aliases",
+ "name": "tests/integration/targets/gcp_compute_region_url_map/tasks/autogen.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
+ "chksum_sha256": "68ec554466caa95d5a04b68295512bf01bc6c69a05b70485c0fecd40cbb1b3d2",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_image/meta",
+ "name": "tests/integration/targets/gcp_compute_region_url_map/meta",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_image/meta/main.yml",
+ "name": "tests/integration/targets/gcp_compute_region_url_map/meta/main.yml",
"ftype": "file",
"chksum_type": "sha256",
"chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_iam_role",
+ "name": "tests/integration/targets/gcp_compute_region_url_map/defaults",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_iam_role/defaults",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "tests/integration/targets/gcp_compute_region_url_map/defaults/main.yml",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_iam_role/defaults/main.yml",
+ "name": "tests/integration/targets/gcp_compute_region_url_map/aliases",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
+ "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_iam_role/tasks",
+ "name": "tests/integration/targets/gcp_compute_region_target_https_proxy",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_iam_role/tasks/autogen.yml",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "77cdcc7ab732504489f569bfe78aa51d43f56ad15d46b181835051f4f728d682",
+ "name": "tests/integration/targets/gcp_compute_region_target_https_proxy/tasks",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_iam_role/tasks/main.yml",
+ "name": "tests/integration/targets/gcp_compute_region_target_https_proxy/tasks/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10",
+ "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_iam_role/aliases",
+ "name": "tests/integration/targets/gcp_compute_region_target_https_proxy/tasks/autogen.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
+ "chksum_sha256": "8fea9619b34e73aac50e10b9d3a55c2d5fa6596ce9b77f84a9074243cc2283b2",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_iam_role/meta",
+ "name": "tests/integration/targets/gcp_compute_region_target_https_proxy/meta",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_iam_role/meta/main.yml",
+ "name": "tests/integration/targets/gcp_compute_region_target_https_proxy/meta/main.yml",
"ftype": "file",
"chksum_type": "sha256",
"chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_node_group",
+ "name": "tests/integration/targets/gcp_compute_region_target_https_proxy/defaults",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_node_group/defaults",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "tests/integration/targets/gcp_compute_region_target_https_proxy/defaults/main.yml",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_node_group/defaults/main.yml",
+ "name": "tests/integration/targets/gcp_compute_region_target_https_proxy/aliases",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
+ "chksum_sha256": "94e3b292c9415f07fc0b6597f537ad347cde4bf7d629f34f74e2c5db9af03893",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_node_group/tasks",
+ "name": "tests/integration/targets/gcp_compute_instance_group_manager",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_node_group/tasks/autogen.yml",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "1905a677c95260fde77daafb1eaed4b461b958b147df3a62763099668ca97e0b",
+ "name": "tests/integration/targets/gcp_compute_instance_group_manager/tasks",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_node_group/tasks/main.yml",
+ "name": "tests/integration/targets/gcp_compute_instance_group_manager/tasks/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10",
+ "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_node_group/aliases",
+ "name": "tests/integration/targets/gcp_compute_instance_group_manager/tasks/autogen.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "5e4f7328221273ee32b8a832b9d8886771fc64733f845175bb1373dcd1752985",
+ "chksum_sha256": "f40e8ffd7b317b7ff9703b9c884692b3ada8c902f7199506bd5a70e59fa9678f",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_node_group/meta",
+ "name": "tests/integration/targets/gcp_compute_instance_group_manager/meta",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_node_group/meta/main.yml",
+ "name": "tests/integration/targets/gcp_compute_instance_group_manager/meta/main.yml",
"ftype": "file",
"chksum_type": "sha256",
"chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_instance_group_manager",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
- "format": 1
- },
- {
"name": "tests/integration/targets/gcp_compute_instance_group_manager/defaults",
"ftype": "dir",
"chksum_type": null,
@@ -3732,3604 +3676,3646 @@
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_instance_group_manager/tasks",
+ "name": "tests/integration/targets/gcp_compute_instance_group_manager/aliases",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
+ "format": 1
+ },
+ {
+ "name": "tests/integration/targets/gcp_compute_region_instance_group_manager",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_instance_group_manager/tasks/autogen.yml",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "c10919332060a0789a51ecd9bea389edb4bd26aa04609d1874543878f9e7765f",
+ "name": "tests/integration/targets/gcp_compute_region_instance_group_manager/tasks",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_instance_group_manager/tasks/main.yml",
+ "name": "tests/integration/targets/gcp_compute_region_instance_group_manager/tasks/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10",
+ "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_instance_group_manager/aliases",
+ "name": "tests/integration/targets/gcp_compute_region_instance_group_manager/tasks/autogen.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
+ "chksum_sha256": "84105c00d877eab7523304db7fe634cea8374535dbe051fb3232ddeb8fe96935",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_instance_group_manager/meta",
+ "name": "tests/integration/targets/gcp_compute_region_instance_group_manager/meta",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_instance_group_manager/meta/main.yml",
+ "name": "tests/integration/targets/gcp_compute_region_instance_group_manager/meta/main.yml",
"ftype": "file",
"chksum_type": "sha256",
"chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_ssl_policy",
+ "name": "tests/integration/targets/gcp_compute_region_instance_group_manager/defaults",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_ssl_policy/defaults",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "tests/integration/targets/gcp_compute_region_instance_group_manager/defaults/main.yml",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_ssl_policy/defaults/main.yml",
+ "name": "tests/integration/targets/gcp_compute_region_instance_group_manager/aliases",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
+ "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_ssl_policy/tasks",
+ "name": "tests/integration/targets/gcp_compute_health_check",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_ssl_policy/tasks/autogen.yml",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "aa0aaea65f50b2dc67318e544f76afccef8f05fcc22fb6fa86f0597a5532f0b2",
+ "name": "tests/integration/targets/gcp_compute_health_check/tasks",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_ssl_policy/tasks/main.yml",
+ "name": "tests/integration/targets/gcp_compute_health_check/tasks/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10",
+ "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_ssl_policy/aliases",
+ "name": "tests/integration/targets/gcp_compute_health_check/tasks/autogen.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
+ "chksum_sha256": "f914f477848c3301558e57748addcd252fa86105a61c19234deb01f60a8604b8",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_ssl_policy/meta",
+ "name": "tests/integration/targets/gcp_compute_health_check/meta",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_ssl_policy/meta/main.yml",
+ "name": "tests/integration/targets/gcp_compute_health_check/meta/main.yml",
"ftype": "file",
"chksum_type": "sha256",
"chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_region_target_http_proxy",
+ "name": "tests/integration/targets/gcp_compute_health_check/defaults",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_region_target_http_proxy/defaults",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "tests/integration/targets/gcp_compute_health_check/defaults/main.yml",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_region_target_http_proxy/defaults/main.yml",
+ "name": "tests/integration/targets/gcp_compute_health_check/aliases",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
+ "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_region_target_http_proxy/tasks",
+ "name": "tests/integration/targets/gcp_runtimeconfig_config",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_region_target_http_proxy/tasks/autogen.yml",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "310d5d66f11a12097117170981487e7724c127d873c32d2955cc114c2295a8b0",
+ "name": "tests/integration/targets/gcp_runtimeconfig_config/tasks",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_region_target_http_proxy/tasks/main.yml",
+ "name": "tests/integration/targets/gcp_runtimeconfig_config/tasks/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10",
+ "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_region_target_http_proxy/aliases",
+ "name": "tests/integration/targets/gcp_runtimeconfig_config/tasks/autogen.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
+ "chksum_sha256": "069da08e2cf549339f8719d9be1d07a57b7897573a4707188d3918aa65147880",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_region_target_http_proxy/meta",
+ "name": "tests/integration/targets/gcp_runtimeconfig_config/meta",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_region_target_http_proxy/meta/main.yml",
+ "name": "tests/integration/targets/gcp_runtimeconfig_config/meta/main.yml",
"ftype": "file",
"chksum_type": "sha256",
"chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_target_https_proxy",
+ "name": "tests/integration/targets/gcp_runtimeconfig_config/defaults",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_target_https_proxy/defaults",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "tests/integration/targets/gcp_runtimeconfig_config/defaults/main.yml",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_target_https_proxy/defaults/main.yml",
+ "name": "tests/integration/targets/gcp_runtimeconfig_config/aliases",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
+ "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_target_https_proxy/tasks",
+ "name": "tests/integration/targets/gcp_compute_target_vpn_gateway",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_target_https_proxy/tasks/autogen.yml",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "acce5561b42fcf97a412d11e054d491ad465af9b3c6bda02dbc23bb3fde4a78f",
+ "name": "tests/integration/targets/gcp_compute_target_vpn_gateway/tasks",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_target_https_proxy/tasks/main.yml",
+ "name": "tests/integration/targets/gcp_compute_target_vpn_gateway/tasks/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10",
+ "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_target_https_proxy/aliases",
+ "name": "tests/integration/targets/gcp_compute_target_vpn_gateway/tasks/autogen.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
+ "chksum_sha256": "7380ef3ba40e65e51eb6e41a11627e6ced4fad5623c56ca6e7f08d516cce7288",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_target_https_proxy/meta",
+ "name": "tests/integration/targets/gcp_compute_target_vpn_gateway/meta",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_target_https_proxy/meta/main.yml",
+ "name": "tests/integration/targets/gcp_compute_target_vpn_gateway/meta/main.yml",
"ftype": "file",
"chksum_type": "sha256",
"chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_bigquery_table",
+ "name": "tests/integration/targets/gcp_compute_target_vpn_gateway/defaults",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_bigquery_table/defaults",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "tests/integration/targets/gcp_compute_target_vpn_gateway/defaults/main.yml",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_bigquery_table/defaults/main.yml",
+ "name": "tests/integration/targets/gcp_compute_target_vpn_gateway/aliases",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
+ "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_bigquery_table/tasks",
+ "name": "tests/integration/targets/gcp_compute_global_forwarding_rule",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_bigquery_table/tasks/autogen.yml",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "87072d7da15cce1b61018575252967298aeb29c708435e34e0dcece24ed3c2d7",
+ "name": "tests/integration/targets/gcp_compute_global_forwarding_rule/tasks",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_bigquery_table/tasks/main.yml",
+ "name": "tests/integration/targets/gcp_compute_global_forwarding_rule/tasks/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10",
+ "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_bigquery_table/aliases",
+ "name": "tests/integration/targets/gcp_compute_global_forwarding_rule/tasks/autogen.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
+ "chksum_sha256": "b486f8b632db8b1a6f460f844265036efe64849d6822eb2088a2c4cbcf3be273",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_bigquery_table/meta",
+ "name": "tests/integration/targets/gcp_compute_global_forwarding_rule/meta",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_bigquery_table/meta/main.yml",
+ "name": "tests/integration/targets/gcp_compute_global_forwarding_rule/meta/main.yml",
"ftype": "file",
"chksum_type": "sha256",
"chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_sql_instance",
+ "name": "tests/integration/targets/gcp_compute_global_forwarding_rule/defaults",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_sql_instance/defaults",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "tests/integration/targets/gcp_compute_global_forwarding_rule/defaults/main.yml",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_sql_instance/defaults/main.yml",
+ "name": "tests/integration/targets/gcp_compute_global_forwarding_rule/aliases",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
+ "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_sql_instance/tasks",
+ "name": "tests/integration/targets/gcp_cloudtasks_queue",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_sql_instance/tasks/autogen.yml",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "5a8ea074ec15bd8de72bd070ede0514ba7013bc4d4b56d401e7584e678c4eca3",
+ "name": "tests/integration/targets/gcp_cloudtasks_queue/tasks",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_sql_instance/tasks/main.yml",
+ "name": "tests/integration/targets/gcp_cloudtasks_queue/tasks/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10",
+ "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_sql_instance/aliases",
+ "name": "tests/integration/targets/gcp_cloudtasks_queue/tasks/autogen.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
+ "chksum_sha256": "c04dcc4b7e8c8798bf4c95c0e883a0675e262e9311a980f955d25110c11bdfea",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_sql_instance/meta",
+ "name": "tests/integration/targets/gcp_cloudtasks_queue/meta",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_sql_instance/meta/main.yml",
+ "name": "tests/integration/targets/gcp_cloudtasks_queue/meta/main.yml",
"ftype": "file",
"chksum_type": "sha256",
"chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_region_health_check",
+ "name": "tests/integration/targets/gcp_cloudtasks_queue/defaults",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_region_health_check/defaults",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "tests/integration/targets/gcp_cloudtasks_queue/defaults/main.yml",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_region_health_check/defaults/main.yml",
+ "name": "tests/integration/targets/gcp_cloudtasks_queue/aliases",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
+ "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_region_health_check/tasks",
+ "name": "tests/integration/targets/gcp_compute_disk",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_region_health_check/tasks/autogen.yml",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "73cd5292a87c00c7afeac01ba445b9ee340e22c929202ba21736b02b7f4a8475",
+ "name": "tests/integration/targets/gcp_compute_disk/tasks",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_region_health_check/tasks/main.yml",
+ "name": "tests/integration/targets/gcp_compute_disk/tasks/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10",
+ "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_region_health_check/aliases",
+ "name": "tests/integration/targets/gcp_compute_disk/tasks/autogen.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
+ "chksum_sha256": "c76e4258194d3352031694c252dafe99ce26aaa5fd1b6297a2a687c0bfd9960c",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_region_health_check/meta",
+ "name": "tests/integration/targets/gcp_compute_disk/meta",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_region_health_check/meta/main.yml",
+ "name": "tests/integration/targets/gcp_compute_disk/meta/main.yml",
"ftype": "file",
"chksum_type": "sha256",
"chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_bigtable_instance",
+ "name": "tests/integration/targets/gcp_compute_disk/defaults",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_bigtable_instance/defaults",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "tests/integration/targets/gcp_compute_disk/defaults/main.yml",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_bigtable_instance/defaults/main.yml",
+ "name": "tests/integration/targets/gcp_compute_disk/aliases",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
+ "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_bigtable_instance/tasks",
+ "name": "tests/integration/targets/gcp_compute_network_endpoint_group",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_bigtable_instance/tasks/autogen.yml",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "a4617849e4aa979b473a3cd831ae8ea67c9fa4ec50ee52883a689460a36827f5",
+ "name": "tests/integration/targets/gcp_compute_network_endpoint_group/tasks",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_bigtable_instance/tasks/main.yml",
+ "name": "tests/integration/targets/gcp_compute_network_endpoint_group/tasks/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10",
+ "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_bigtable_instance/aliases",
+ "name": "tests/integration/targets/gcp_compute_network_endpoint_group/tasks/autogen.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "6165de6d5352b3a386f558df0b34280af84d41b233d6862e505963ddd398ca50",
+ "chksum_sha256": "918f4b244fad3f725e341f0b115dea7d39791aa11916370073e7725625bda207",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_bigtable_instance/meta",
+ "name": "tests/integration/targets/gcp_compute_network_endpoint_group/meta",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_bigtable_instance/meta/main.yml",
+ "name": "tests/integration/targets/gcp_compute_network_endpoint_group/meta/main.yml",
"ftype": "file",
"chksum_type": "sha256",
"chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_target_instance",
+ "name": "tests/integration/targets/gcp_compute_network_endpoint_group/defaults",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_target_instance/defaults",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "tests/integration/targets/gcp_compute_network_endpoint_group/defaults/main.yml",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_target_instance/defaults/main.yml",
+ "name": "tests/integration/targets/gcp_compute_network_endpoint_group/aliases",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
+ "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_target_instance/tasks",
+ "name": "tests/integration/targets/gcp_redis_instance",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_target_instance/tasks/autogen.yml",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "ba18f5b2d4b672ada488a1b65854d715abea11e29dd7c03084979f3005ae326b",
+ "name": "tests/integration/targets/gcp_redis_instance/tasks",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_target_instance/tasks/main.yml",
+ "name": "tests/integration/targets/gcp_redis_instance/tasks/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10",
+ "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_target_instance/aliases",
+ "name": "tests/integration/targets/gcp_redis_instance/tasks/autogen.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "5dab10dc09ed5cb445c47bfd67629b39efb7bd68e65e6b773896a8eb507d588e",
+ "chksum_sha256": "cd1f8a43deef54e13d2502a8007ace1d46e8dc04c9f27c75652a027a9ca878e9",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_target_instance/meta",
+ "name": "tests/integration/targets/gcp_redis_instance/meta",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_target_instance/meta/main.yml",
+ "name": "tests/integration/targets/gcp_redis_instance/meta/main.yml",
"ftype": "file",
"chksum_type": "sha256",
"chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_sql_database",
+ "name": "tests/integration/targets/gcp_redis_instance/defaults",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_sql_database/defaults",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "tests/integration/targets/gcp_redis_instance/defaults/main.yml",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_sql_database/defaults/main.yml",
+ "name": "tests/integration/targets/gcp_redis_instance/aliases",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
+ "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_sql_database/tasks",
+ "name": "tests/integration/targets/gcp_cloudfunctions_cloud_function",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_sql_database/tasks/autogen.yml",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "e1d43b3936881dc039d8ed169403e139124610037155037004e8d4f399873cff",
+ "name": "tests/integration/targets/gcp_cloudfunctions_cloud_function/tasks",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_sql_database/tasks/main.yml",
+ "name": "tests/integration/targets/gcp_cloudfunctions_cloud_function/tasks/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10",
+ "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_sql_database/aliases",
+ "name": "tests/integration/targets/gcp_cloudfunctions_cloud_function/tasks/autogen.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
+ "chksum_sha256": "6fd331ad29c137f5cac12478a90745964b9f19d028403bdc972aa9538ae164e7",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_sql_database/meta",
+ "name": "tests/integration/targets/gcp_cloudfunctions_cloud_function/meta",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_sql_database/meta/main.yml",
+ "name": "tests/integration/targets/gcp_cloudfunctions_cloud_function/meta/main.yml",
"ftype": "file",
"chksum_type": "sha256",
"chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_cloudscheduler_job",
+ "name": "tests/integration/targets/gcp_cloudfunctions_cloud_function/defaults",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_cloudscheduler_job/defaults",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "tests/integration/targets/gcp_cloudfunctions_cloud_function/defaults/main.yml",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_cloudscheduler_job/defaults/main.yml",
+ "name": "tests/integration/targets/gcp_cloudfunctions_cloud_function/aliases",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
+ "chksum_sha256": "5dab10dc09ed5cb445c47bfd67629b39efb7bd68e65e6b773896a8eb507d588e",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_cloudscheduler_job/tasks",
+ "name": "tests/integration/targets/gcp_compute_region_disk",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_cloudscheduler_job/tasks/autogen.yml",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "b8d667d2df0c4d97c6a76a35fc45fb4d5d2bc06f0e6d99a2a55b6441644a103a",
+ "name": "tests/integration/targets/gcp_compute_region_disk/tasks",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_cloudscheduler_job/tasks/main.yml",
+ "name": "tests/integration/targets/gcp_compute_region_disk/tasks/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10",
+ "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_cloudscheduler_job/aliases",
+ "name": "tests/integration/targets/gcp_compute_region_disk/tasks/autogen.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
+ "chksum_sha256": "d40b7314642a481b6ea28f1be1c741986687ea33b78323429d4186736dd56718",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_cloudscheduler_job/meta",
+ "name": "tests/integration/targets/gcp_compute_region_disk/meta",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_cloudscheduler_job/meta/main.yml",
+ "name": "tests/integration/targets/gcp_compute_region_disk/meta/main.yml",
"ftype": "file",
"chksum_type": "sha256",
"chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_reservation",
+ "name": "tests/integration/targets/gcp_compute_region_disk/defaults",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_reservation/defaults",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "tests/integration/targets/gcp_compute_region_disk/defaults/main.yml",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_reservation/defaults/main.yml",
+ "name": "tests/integration/targets/gcp_compute_region_disk/aliases",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
+ "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_reservation/tasks",
+ "name": "tests/integration/targets/gcp_container_cluster",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_reservation/tasks/autogen.yml",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "c92cc5cdffa7e1e90e6ee4fc144397cbd326f09af733c96198412f789e581d44",
+ "name": "tests/integration/targets/gcp_container_cluster/tasks",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_reservation/tasks/main.yml",
+ "name": "tests/integration/targets/gcp_container_cluster/tasks/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10",
+ "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_reservation/aliases",
+ "name": "tests/integration/targets/gcp_container_cluster/tasks/autogen.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
+ "chksum_sha256": "8d86724b2089b25e3a25d7943eeb910b68dbeb3bf997bb307a1cad44477b1069",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_reservation/meta",
+ "name": "tests/integration/targets/gcp_container_cluster/meta",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_reservation/meta/main.yml",
+ "name": "tests/integration/targets/gcp_container_cluster/meta/main.yml",
"ftype": "file",
"chksum_type": "sha256",
"chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_serviceusage_service",
+ "name": "tests/integration/targets/gcp_container_cluster/defaults",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_serviceusage_service/defaults",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "tests/integration/targets/gcp_container_cluster/defaults/main.yml",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_serviceusage_service/defaults/main.yml",
+ "name": "tests/integration/targets/gcp_container_cluster/aliases",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
+ "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_serviceusage_service/tasks",
+ "name": "tests/integration/targets/gcp_compute_instance_group",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_serviceusage_service/tasks/autogen.yml",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "b8885bf122c174bc74bb76dba5c213c367a4f88b974e6fd87050f3dceedeb3ed",
+ "name": "tests/integration/targets/gcp_compute_instance_group/tasks",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_serviceusage_service/tasks/main.yml",
+ "name": "tests/integration/targets/gcp_compute_instance_group/tasks/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10",
+ "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_serviceusage_service/aliases",
+ "name": "tests/integration/targets/gcp_compute_instance_group/tasks/autogen.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "c39528c4d7c2bdbbf0113f0588c1ab8f66a8f3f21c61c23de443c2abced58868",
+ "chksum_sha256": "a6959510ffcf1c9a8f59fa5f63b0ebbd01d98b56cee55f51402ed0761cf29a80",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_serviceusage_service/meta",
+ "name": "tests/integration/targets/gcp_compute_instance_group/meta",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_serviceusage_service/meta/main.yml",
+ "name": "tests/integration/targets/gcp_compute_instance_group/meta/main.yml",
"ftype": "file",
"chksum_type": "sha256",
"chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_forwarding_rule",
+ "name": "tests/integration/targets/gcp_compute_instance_group/defaults",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_forwarding_rule/defaults",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "tests/integration/targets/gcp_compute_instance_group/defaults/main.yml",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_forwarding_rule/defaults/main.yml",
+ "name": "tests/integration/targets/gcp_compute_instance_group/aliases",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
+ "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_forwarding_rule/tasks",
+ "name": "tests/integration/targets/gcp_compute_autoscaler",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_forwarding_rule/tasks/autogen.yml",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "c9a8d30d4f9332b3ba4b13d47e64845ee13dd00b052fe5268faf50f9bdbf9ee9",
+ "name": "tests/integration/targets/gcp_compute_autoscaler/tasks",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_forwarding_rule/tasks/main.yml",
+ "name": "tests/integration/targets/gcp_compute_autoscaler/tasks/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10",
+ "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_forwarding_rule/aliases",
+ "name": "tests/integration/targets/gcp_compute_autoscaler/tasks/autogen.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
+ "chksum_sha256": "99baa8073c7ceb7da716580508cd36979d3dc232406e48f3088493d32adb88f3",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_forwarding_rule/meta",
+ "name": "tests/integration/targets/gcp_compute_autoscaler/meta",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_forwarding_rule/meta/main.yml",
+ "name": "tests/integration/targets/gcp_compute_autoscaler/meta/main.yml",
"ftype": "file",
"chksum_type": "sha256",
"chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_global_address",
+ "name": "tests/integration/targets/gcp_compute_autoscaler/defaults",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_global_address/defaults",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "tests/integration/targets/gcp_compute_autoscaler/defaults/main.yml",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_global_address/defaults/main.yml",
+ "name": "tests/integration/targets/gcp_compute_autoscaler/aliases",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
+ "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_global_address/tasks",
+ "name": "tests/integration/targets/gcp_compute_image",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_global_address/tasks/autogen.yml",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "030f1d0fee602777fc33bf69c29ade9d02cd76430bb96f9bef8bf4d73c238feb",
+ "name": "tests/integration/targets/gcp_compute_image/tasks",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_global_address/tasks/main.yml",
+ "name": "tests/integration/targets/gcp_compute_image/tasks/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10",
+ "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_global_address/aliases",
+ "name": "tests/integration/targets/gcp_compute_image/tasks/autogen.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
+ "chksum_sha256": "e19823856b3b2d2d8f42e10b8a9f2d2cfc1a9e92b38e9700ce2b719290ef0415",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_global_address/meta",
+ "name": "tests/integration/targets/gcp_compute_image/meta",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_global_address/meta/main.yml",
+ "name": "tests/integration/targets/gcp_compute_image/meta/main.yml",
"ftype": "file",
"chksum_type": "sha256",
"chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_external_vpn_gateway",
+ "name": "tests/integration/targets/gcp_compute_image/defaults",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_external_vpn_gateway/defaults",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "tests/integration/targets/gcp_compute_image/defaults/main.yml",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_external_vpn_gateway/defaults/main.yml",
+ "name": "tests/integration/targets/gcp_compute_image/aliases",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
+ "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_external_vpn_gateway/tasks",
+ "name": "tests/integration/targets/gcp_logging_metric",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_external_vpn_gateway/tasks/autogen.yml",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "52e2e22def34c8e3e3ee99a5bc52f8d62ca596fa3808fbc46baff6560cfd0705",
+ "name": "tests/integration/targets/gcp_logging_metric/tasks",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_external_vpn_gateway/tasks/main.yml",
+ "name": "tests/integration/targets/gcp_logging_metric/tasks/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10",
+ "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_external_vpn_gateway/aliases",
+ "name": "tests/integration/targets/gcp_logging_metric/tasks/autogen.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
+ "chksum_sha256": "b937e23afcd2f4f5d2626b9854134828343cc8d8c4384f143412889de861db94",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_external_vpn_gateway/meta",
+ "name": "tests/integration/targets/gcp_logging_metric/meta",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_external_vpn_gateway/meta/main.yml",
+ "name": "tests/integration/targets/gcp_logging_metric/meta/main.yml",
"ftype": "file",
"chksum_type": "sha256",
"chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_mlengine_model",
+ "name": "tests/integration/targets/gcp_logging_metric/defaults",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_mlengine_model/defaults",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "tests/integration/targets/gcp_logging_metric/defaults/main.yml",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_mlengine_model/defaults/main.yml",
+ "name": "tests/integration/targets/gcp_logging_metric/aliases",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
+ "chksum_sha256": "5dab10dc09ed5cb445c47bfd67629b39efb7bd68e65e6b773896a8eb507d588e",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_mlengine_model/tasks",
+ "name": "tests/integration/targets/gcp_compute_router",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_mlengine_model/tasks/autogen.yml",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "a5c254b60df6b09b173c9da1b866a4380d199dd61809595c1b629df91c434a24",
+ "name": "tests/integration/targets/gcp_compute_router/tasks",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_mlengine_model/tasks/main.yml",
+ "name": "tests/integration/targets/gcp_compute_router/tasks/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10",
+ "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_mlengine_model/aliases",
+ "name": "tests/integration/targets/gcp_compute_router/tasks/autogen.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
+ "chksum_sha256": "117c71ab911d70acc7ed4b92dd764484035faff0db4623a9e815421f585393f4",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_mlengine_model/meta",
+ "name": "tests/integration/targets/gcp_compute_router/meta",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_mlengine_model/meta/main.yml",
+ "name": "tests/integration/targets/gcp_compute_router/meta/main.yml",
"ftype": "file",
"chksum_type": "sha256",
"chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_resource_policy",
+ "name": "tests/integration/targets/gcp_compute_router/defaults",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_resource_policy/defaults",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "tests/integration/targets/gcp_compute_router/defaults/main.yml",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_resource_policy/defaults/main.yml",
+ "name": "tests/integration/targets/gcp_compute_router/aliases",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
+ "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_resource_policy/tasks",
+ "name": "tests/integration/targets/gcp_compute_region_health_check",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_resource_policy/tasks/autogen.yml",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "99bb6c11dd8d314cec094df68c987c6a5955054b4dffdc229d148841ab562314",
+ "name": "tests/integration/targets/gcp_compute_region_health_check/tasks",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_resource_policy/tasks/main.yml",
+ "name": "tests/integration/targets/gcp_compute_region_health_check/tasks/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10",
+ "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_resource_policy/aliases",
+ "name": "tests/integration/targets/gcp_compute_region_health_check/tasks/autogen.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
+ "chksum_sha256": "cd5ff975624f396c1662e55933d8e18684d122e6acddefa742fcdeab7b5fcedd",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_resource_policy/meta",
+ "name": "tests/integration/targets/gcp_compute_region_health_check/meta",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_resource_policy/meta/main.yml",
+ "name": "tests/integration/targets/gcp_compute_region_health_check/meta/main.yml",
"ftype": "file",
"chksum_type": "sha256",
"chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_router",
+ "name": "tests/integration/targets/gcp_compute_region_health_check/defaults",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_router/defaults",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "tests/integration/targets/gcp_compute_region_health_check/defaults/main.yml",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_router/defaults/main.yml",
+ "name": "tests/integration/targets/gcp_compute_region_health_check/aliases",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
+ "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_router/tasks",
+ "name": "tests/integration/targets/gcp_compute_instance_template",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_router/tasks/autogen.yml",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "9e79d3f8d00981cdf7a96732650b5facab08fe08098a25bdae79dda199b5f694",
+ "name": "tests/integration/targets/gcp_compute_instance_template/tasks",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_router/tasks/main.yml",
+ "name": "tests/integration/targets/gcp_compute_instance_template/tasks/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10",
+ "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_router/aliases",
+ "name": "tests/integration/targets/gcp_compute_instance_template/tasks/autogen.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
+ "chksum_sha256": "6821b4c952f942c2dee58b4c0697f9e4469a1169861bb654ba35255ec439642e",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_router/meta",
+ "name": "tests/integration/targets/gcp_compute_instance_template/meta",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_router/meta/main.yml",
+ "name": "tests/integration/targets/gcp_compute_instance_template/meta/main.yml",
"ftype": "file",
"chksum_type": "sha256",
"chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_container_node_pool",
+ "name": "tests/integration/targets/gcp_compute_instance_template/defaults",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_container_node_pool/defaults",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "tests/integration/targets/gcp_compute_instance_template/defaults/main.yml",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_container_node_pool/defaults/main.yml",
+ "name": "tests/integration/targets/gcp_compute_instance_template/aliases",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
+ "chksum_sha256": "5dab10dc09ed5cb445c47bfd67629b39efb7bd68e65e6b773896a8eb507d588e",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_container_node_pool/tasks",
+ "name": "tests/integration/targets/gcp_storage_bucket",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_container_node_pool/tasks/autogen.yml",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "26d4f731bcc41af376fbd36b02959baf2ca10ec10cfdeab9494e6302cf2f73d3",
+ "name": "tests/integration/targets/gcp_storage_bucket/tasks",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_container_node_pool/tasks/main.yml",
+ "name": "tests/integration/targets/gcp_storage_bucket/tasks/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10",
+ "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_container_node_pool/aliases",
+ "name": "tests/integration/targets/gcp_storage_bucket/tasks/autogen.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
+ "chksum_sha256": "6327bdd62bcf5a6a9146244b566597dff3636080dd91d5353c32c82bcf36aa6f",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_container_node_pool/meta",
+ "name": "tests/integration/targets/gcp_storage_bucket/meta",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_container_node_pool/meta/main.yml",
+ "name": "tests/integration/targets/gcp_storage_bucket/meta/main.yml",
"ftype": "file",
"chksum_type": "sha256",
"chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_region_autoscaler",
+ "name": "tests/integration/targets/gcp_storage_bucket/defaults",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_region_autoscaler/defaults",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "tests/integration/targets/gcp_storage_bucket/defaults/main.yml",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "3087d8090fde9451c1d45dbe3d8cd7a1f5284b4d036b9a69d1aebbc139d706dc",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_region_autoscaler/defaults/main.yml",
+ "name": "tests/integration/targets/gcp_storage_bucket/aliases",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
+ "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_region_autoscaler/tasks",
+ "name": "tests/integration/targets/gcp_compute_url_map",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_region_autoscaler/tasks/autogen.yml",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "c8bda0d218c7699d7dd9b222f32e8320327fac05b6d91d1f49d9bea83ff23ed5",
+ "name": "tests/integration/targets/gcp_compute_url_map/tasks",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_region_autoscaler/tasks/main.yml",
+ "name": "tests/integration/targets/gcp_compute_url_map/tasks/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10",
+ "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_region_autoscaler/aliases",
+ "name": "tests/integration/targets/gcp_compute_url_map/tasks/autogen.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
+ "chksum_sha256": "c0d287ac5f2f300dd60fe168a0643d9305ae56c0f6bae34bfe859f794eeeb792",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_region_autoscaler/meta",
+ "name": "tests/integration/targets/gcp_compute_url_map/meta",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_region_autoscaler/meta/main.yml",
+ "name": "tests/integration/targets/gcp_compute_url_map/meta/main.yml",
"ftype": "file",
"chksum_type": "sha256",
"chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_backend_service",
+ "name": "tests/integration/targets/gcp_compute_url_map/defaults",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_backend_service/defaults",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "tests/integration/targets/gcp_compute_url_map/defaults/main.yml",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_backend_service/defaults/main.yml",
+ "name": "tests/integration/targets/gcp_compute_url_map/aliases",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
+ "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_backend_service/tasks",
+ "name": "tests/integration/targets/gcp_compute_snapshot",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_backend_service/tasks/autogen.yml",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "27054f1f1bd30541e9b6eda592c36d4da5dac6107a1ceb3e5d1e42b165af844c",
+ "name": "tests/integration/targets/gcp_compute_snapshot/tasks",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_backend_service/tasks/main.yml",
+ "name": "tests/integration/targets/gcp_compute_snapshot/tasks/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10",
+ "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_backend_service/aliases",
+ "name": "tests/integration/targets/gcp_compute_snapshot/tasks/autogen.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
+ "chksum_sha256": "dd29c08de904b05743694c466b6aa97e31bfb06fae73360a9419de2c661e4500",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_backend_service/meta",
+ "name": "tests/integration/targets/gcp_compute_snapshot/meta",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_backend_service/meta/main.yml",
+ "name": "tests/integration/targets/gcp_compute_snapshot/meta/main.yml",
"ftype": "file",
"chksum_type": "sha256",
"chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_resourcemanager_project",
+ "name": "tests/integration/targets/gcp_compute_snapshot/defaults",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_resourcemanager_project/defaults",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "tests/integration/targets/gcp_compute_snapshot/defaults/main.yml",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_resourcemanager_project/defaults/main.yml",
+ "name": "tests/integration/targets/gcp_compute_snapshot/aliases",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
+ "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_resourcemanager_project/tasks",
+ "name": "tests/integration/targets/gcp_compute_https_health_check",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_resourcemanager_project/tasks/autogen.yml",
+ "name": "tests/integration/targets/gcp_compute_https_health_check/tasks",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
+ "format": 1
+ },
+ {
+ "name": "tests/integration/targets/gcp_compute_https_health_check/tasks/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "2c78d5598e61b68b10a7c3a99619bac826e43ff05bc028725dc004e269f52df0",
+ "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_resourcemanager_project/tasks/main.yml",
+ "name": "tests/integration/targets/gcp_compute_https_health_check/tasks/autogen.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10",
+ "chksum_sha256": "21a75c47d3198f20e399179662fded8c65be521863545ca288dfdfaac21a0ebd",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_resourcemanager_project/aliases",
+ "name": "tests/integration/targets/gcp_compute_https_health_check/meta",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
+ "format": 1
+ },
+ {
+ "name": "tests/integration/targets/gcp_compute_https_health_check/meta/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "9e8a96b0ebfb9738c7eb615d58441ad79b7fff043c8b8db658ce9c518310bf52",
+ "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_resourcemanager_project/meta",
+ "name": "tests/integration/targets/gcp_compute_https_health_check/defaults",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_resourcemanager_project/meta/main.yml",
+ "name": "tests/integration/targets/gcp_compute_https_health_check/defaults/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
+ "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_interconnect_attachment",
+ "name": "tests/integration/targets/gcp_compute_https_health_check/aliases",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
+ "format": 1
+ },
+ {
+ "name": "tests/integration/targets/gcp_filestore_instance",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_interconnect_attachment/defaults",
+ "name": "tests/integration/targets/gcp_filestore_instance/tasks",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_interconnect_attachment/defaults/main.yml",
+ "name": "tests/integration/targets/gcp_filestore_instance/tasks/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "e173e5a15d9174e198e85c764f303f04d96463d7e1af4685fdbeec2e5cf391d7",
+ "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_interconnect_attachment/aliases",
+ "name": "tests/integration/targets/gcp_filestore_instance/tasks/autogen.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
+ "chksum_sha256": "0c3b0eb038a6de86eabb7558d8c87462f35427399d1cdea2d20c50b53b3ba206",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_interconnect_attachment/meta",
+ "name": "tests/integration/targets/gcp_filestore_instance/meta",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_interconnect_attachment/meta/main.yml",
+ "name": "tests/integration/targets/gcp_filestore_instance/meta/main.yml",
"ftype": "file",
"chksum_type": "sha256",
"chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_target_http_proxy",
+ "name": "tests/integration/targets/gcp_filestore_instance/defaults",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_target_http_proxy/defaults",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "tests/integration/targets/gcp_filestore_instance/defaults/main.yml",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_target_http_proxy/defaults/main.yml",
+ "name": "tests/integration/targets/gcp_filestore_instance/aliases",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
+ "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_target_http_proxy/tasks",
+ "name": "tests/integration/targets/gcp_sql_user",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_target_http_proxy/tasks/autogen.yml",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "673b3a5983827f1a40a49a56f7b0ad0d30baeb257e872d160f88ce87e03ab845",
+ "name": "tests/integration/targets/gcp_sql_user/tasks",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_target_http_proxy/tasks/main.yml",
+ "name": "tests/integration/targets/gcp_sql_user/tasks/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10",
+ "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_target_http_proxy/aliases",
+ "name": "tests/integration/targets/gcp_sql_user/tasks/autogen.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
+ "chksum_sha256": "3c7a4aa8f50f706e4638b9d1397abfecf5b1fdd41faa3b6e15b7916bd9257e9c",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_target_http_proxy/meta",
+ "name": "tests/integration/targets/gcp_sql_user/meta",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_target_http_proxy/meta/main.yml",
+ "name": "tests/integration/targets/gcp_sql_user/meta/main.yml",
"ftype": "file",
"chksum_type": "sha256",
"chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_region_url_map",
+ "name": "tests/integration/targets/gcp_sql_user/defaults",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_region_url_map/defaults",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "tests/integration/targets/gcp_sql_user/defaults/main.yml",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_region_url_map/defaults/main.yml",
+ "name": "tests/integration/targets/gcp_sql_user/aliases",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
+ "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_region_url_map/tasks",
+ "name": "tests/integration/targets/gcp_compute_region_autoscaler",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_region_url_map/tasks/autogen.yml",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "bde8dedd49df6e6f0dba3a8fb84558d0d075ebf35c17e1e9137bd739b4ba7aff",
+ "name": "tests/integration/targets/gcp_compute_region_autoscaler/tasks",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_region_url_map/tasks/main.yml",
+ "name": "tests/integration/targets/gcp_compute_region_autoscaler/tasks/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10",
+ "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_region_url_map/aliases",
+ "name": "tests/integration/targets/gcp_compute_region_autoscaler/tasks/autogen.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
+ "chksum_sha256": "f3ec8cf709a7c114bb16ca33bc0fddd7ce3ddd919bf215435b23a07202a7db57",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_region_url_map/meta",
+ "name": "tests/integration/targets/gcp_compute_region_autoscaler/meta",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_region_url_map/meta/main.yml",
+ "name": "tests/integration/targets/gcp_compute_region_autoscaler/meta/main.yml",
"ftype": "file",
"chksum_type": "sha256",
"chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_subnetwork",
+ "name": "tests/integration/targets/gcp_compute_region_autoscaler/defaults",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_subnetwork/defaults",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "tests/integration/targets/gcp_compute_region_autoscaler/defaults/main.yml",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_subnetwork/defaults/main.yml",
+ "name": "tests/integration/targets/gcp_compute_region_autoscaler/aliases",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
+ "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_subnetwork/tasks",
+ "name": "tests/integration/targets/gcp_compute_route",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_subnetwork/tasks/autogen.yml",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "133fdaac8a4b68473667edd756a360a99dee58a4d3de39c774d51031fe1eccfb",
+ "name": "tests/integration/targets/gcp_compute_route/tasks",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_subnetwork/tasks/main.yml",
+ "name": "tests/integration/targets/gcp_compute_route/tasks/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10",
+ "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_subnetwork/aliases",
+ "name": "tests/integration/targets/gcp_compute_route/tasks/autogen.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
+ "chksum_sha256": "8142afae415dc3308ba280986c5f72c9c9a671afee7f8ad7f1b56324456c87c6",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_subnetwork/meta",
+ "name": "tests/integration/targets/gcp_compute_route/meta",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_subnetwork/meta/main.yml",
+ "name": "tests/integration/targets/gcp_compute_route/meta/main.yml",
"ftype": "file",
"chksum_type": "sha256",
"chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_region_target_https_proxy",
+ "name": "tests/integration/targets/gcp_compute_route/defaults",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_region_target_https_proxy/defaults",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "tests/integration/targets/gcp_compute_route/defaults/main.yml",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_region_target_https_proxy/defaults/main.yml",
+ "name": "tests/integration/targets/gcp_compute_route/aliases",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
+ "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_region_target_https_proxy/tasks",
+ "name": "tests/integration/targets/gcp_compute_ssl_policy",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_region_target_https_proxy/tasks/autogen.yml",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "714674d2f7da36831a9a6b261955bfb77d394f199f6edbf746f2c1309931409b",
+ "name": "tests/integration/targets/gcp_compute_ssl_policy/tasks",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_region_target_https_proxy/tasks/main.yml",
+ "name": "tests/integration/targets/gcp_compute_ssl_policy/tasks/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10",
+ "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_region_target_https_proxy/aliases",
+ "name": "tests/integration/targets/gcp_compute_ssl_policy/tasks/autogen.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "94e3b292c9415f07fc0b6597f537ad347cde4bf7d629f34f74e2c5db9af03893",
+ "chksum_sha256": "575e4dfa9400e44c364c70f30bcbfaabe4f7e4b2a76baba281e1b0c2bc5d35cd",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_region_target_https_proxy/meta",
+ "name": "tests/integration/targets/gcp_compute_ssl_policy/meta",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_region_target_https_proxy/meta/main.yml",
+ "name": "tests/integration/targets/gcp_compute_ssl_policy/meta/main.yml",
"ftype": "file",
"chksum_type": "sha256",
"chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_instance_group",
+ "name": "tests/integration/targets/gcp_compute_ssl_policy/defaults",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_instance_group/defaults",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "tests/integration/targets/gcp_compute_ssl_policy/defaults/main.yml",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_instance_group/defaults/main.yml",
+ "name": "tests/integration/targets/gcp_compute_ssl_policy/aliases",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
+ "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_instance_group/tasks",
+ "name": "tests/integration/targets/gcp_kms_key_ring",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_instance_group/tasks/autogen.yml",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "59c4bc199209b35385a9cfb2add5e750bf6b8c3ad0a555a10cd56d84130bd562",
+ "name": "tests/integration/targets/gcp_kms_key_ring/tasks",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_instance_group/tasks/main.yml",
+ "name": "tests/integration/targets/gcp_kms_key_ring/tasks/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10",
+ "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_instance_group/aliases",
+ "name": "tests/integration/targets/gcp_kms_key_ring/tasks/autogen.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
+ "chksum_sha256": "3f700f0454cc0c53726cdf51a1dbddcadb23791a2a0f6191f1606dcc226b80c2",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_instance_group/meta",
+ "name": "tests/integration/targets/gcp_kms_key_ring/meta",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_instance_group/meta/main.yml",
+ "name": "tests/integration/targets/gcp_kms_key_ring/meta/main.yml",
"ftype": "file",
"chksum_type": "sha256",
"chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_firewall",
+ "name": "tests/integration/targets/gcp_kms_key_ring/defaults",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_firewall/defaults",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "tests/integration/targets/gcp_kms_key_ring/defaults/main.yml",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_firewall/defaults/main.yml",
+ "name": "tests/integration/targets/gcp_kms_key_ring/aliases",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
+ "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_firewall/tasks",
+ "name": "tests/integration/targets/gcp_sql_ssl_cert",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_firewall/tasks/update.yml",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "cd09c1b481a7612aed41f1119bcb59c1a412321b137bc07b765bbbd38150418a",
- "format": 1
- },
- {
- "name": "tests/integration/targets/gcp_compute_firewall/tasks/autogen.yml",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "83a0883c9904122f0233ad0b9368f7f0f1494c54634d1ac376863fb38c4e1842",
+ "name": "tests/integration/targets/gcp_sql_ssl_cert/tasks",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_firewall/tasks/main.yml",
+ "name": "tests/integration/targets/gcp_sql_ssl_cert/tasks/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "22dd7b88cc898d814a9bfa040af5aa7b03ed08d7bb9fc5d79342e87fc336ec49",
+ "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_firewall/aliases",
+ "name": "tests/integration/targets/gcp_sql_ssl_cert/tasks/autogen.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
+ "chksum_sha256": "b11a3955cf8e5c77c7f3d0118c2ff6dbd4b589a522b277bd601100503f0b9b93",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_firewall/meta",
+ "name": "tests/integration/targets/gcp_sql_ssl_cert/meta",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_firewall/meta/main.yml",
+ "name": "tests/integration/targets/gcp_sql_ssl_cert/meta/main.yml",
"ftype": "file",
"chksum_type": "sha256",
"chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_autoscaler",
+ "name": "tests/integration/targets/gcp_sql_ssl_cert/defaults",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_autoscaler/defaults",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "tests/integration/targets/gcp_sql_ssl_cert/defaults/main.yml",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_autoscaler/defaults/main.yml",
+ "name": "tests/integration/targets/gcp_sql_ssl_cert/aliases",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
+ "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_autoscaler/tasks",
+ "name": "tests/integration/targets/gcp_kms_crypto_key",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_autoscaler/tasks/autogen.yml",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "244abdc2bfab06c6e9294e4da33f1d4634b9a114d8d33056571d8adab60ec8b4",
+ "name": "tests/integration/targets/gcp_kms_crypto_key/tasks",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_autoscaler/tasks/main.yml",
+ "name": "tests/integration/targets/gcp_kms_crypto_key/tasks/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10",
+ "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_autoscaler/aliases",
+ "name": "tests/integration/targets/gcp_kms_crypto_key/tasks/autogen.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
+ "chksum_sha256": "49db08f7fec717681fe44526a9f4f43de0b2dc9583d9f39b1cc51533942024b9",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_autoscaler/meta",
+ "name": "tests/integration/targets/gcp_kms_crypto_key/meta",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_autoscaler/meta/main.yml",
+ "name": "tests/integration/targets/gcp_kms_crypto_key/meta/main.yml",
"ftype": "file",
"chksum_type": "sha256",
"chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_global_forwarding_rule",
+ "name": "tests/integration/targets/gcp_kms_crypto_key/defaults",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_global_forwarding_rule/defaults",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "tests/integration/targets/gcp_kms_crypto_key/defaults/main.yml",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_global_forwarding_rule/defaults/main.yml",
+ "name": "tests/integration/targets/gcp_kms_crypto_key/aliases",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
+ "chksum_sha256": "5dab10dc09ed5cb445c47bfd67629b39efb7bd68e65e6b773896a8eb507d588e",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_global_forwarding_rule/tasks",
+ "name": "tests/integration/targets/gcp_bigquery_table",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_global_forwarding_rule/tasks/autogen.yml",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "326c0088fd0a3a55048d6aa7002589ff58ecb40aadf9ba8c83d8664593047f52",
+ "name": "tests/integration/targets/gcp_bigquery_table/tasks",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_global_forwarding_rule/tasks/main.yml",
+ "name": "tests/integration/targets/gcp_bigquery_table/tasks/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10",
+ "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_global_forwarding_rule/aliases",
+ "name": "tests/integration/targets/gcp_bigquery_table/tasks/autogen.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
+ "chksum_sha256": "075f61e576259596f7ef8876f3635fc6fdfba4842666b43008c9b7a04e5b152a",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_global_forwarding_rule/meta",
+ "name": "tests/integration/targets/gcp_bigquery_table/meta",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_global_forwarding_rule/meta/main.yml",
+ "name": "tests/integration/targets/gcp_bigquery_table/meta/main.yml",
"ftype": "file",
"chksum_type": "sha256",
"chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_redis_instance",
+ "name": "tests/integration/targets/gcp_bigquery_table/defaults",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_redis_instance/defaults",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "tests/integration/targets/gcp_bigquery_table/defaults/main.yml",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_redis_instance/defaults/main.yml",
+ "name": "tests/integration/targets/gcp_bigquery_table/aliases",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
+ "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_redis_instance/tasks",
+ "name": "tests/integration/targets/gcp_storage_object",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_redis_instance/tasks/autogen.yml",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "cca715a33977798f0e3f83bb57739c8cebc983864e5c7d93fd7644bba555aeea",
- "format": 1
- },
- {
- "name": "tests/integration/targets/gcp_redis_instance/tasks/main.yml",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10",
+ "name": "tests/integration/targets/gcp_storage_object/tasks",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_redis_instance/aliases",
+ "name": "tests/integration/targets/gcp_storage_object/tasks/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
+ "chksum_sha256": "19e3cd44f0712d335378d8a5666362355e7161308fa8bae5e9c35f81cdb87c7a",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_redis_instance/meta",
+ "name": "tests/integration/targets/gcp_storage_object/meta",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_redis_instance/meta/main.yml",
+ "name": "tests/integration/targets/gcp_storage_object/meta/main.yml",
"ftype": "file",
"chksum_type": "sha256",
"chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_storage_bucket",
+ "name": "tests/integration/targets/gcp_storage_object/defaults",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_storage_bucket/defaults",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "tests/integration/targets/gcp_storage_object/defaults/main.yml",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_storage_bucket/defaults/main.yml",
+ "name": "tests/integration/targets/gcp_storage_object/aliases",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "3087d8090fde9451c1d45dbe3d8cd7a1f5284b4d036b9a69d1aebbc139d706dc",
+ "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_storage_bucket/tasks",
+ "name": "tests/integration/targets/gcp_compute_target_https_proxy",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_storage_bucket/tasks/autogen.yml",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "e2a4ffd2d2b09e6bba34e034d96f6b398f2f93c11ee59ea542fca61a65205acb",
+ "name": "tests/integration/targets/gcp_compute_target_https_proxy/tasks",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_storage_bucket/tasks/main.yml",
+ "name": "tests/integration/targets/gcp_compute_target_https_proxy/tasks/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10",
+ "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_storage_bucket/aliases",
+ "name": "tests/integration/targets/gcp_compute_target_https_proxy/tasks/autogen.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
+ "chksum_sha256": "7ee6a3a68b102433bd3fea2e31d8665d79f044876712784c36821fd153cbe7fb",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_storage_bucket/meta",
+ "name": "tests/integration/targets/gcp_compute_target_https_proxy/meta",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_storage_bucket/meta/main.yml",
+ "name": "tests/integration/targets/gcp_compute_target_https_proxy/meta/main.yml",
"ftype": "file",
"chksum_type": "sha256",
"chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_storage_bucket_access_control",
+ "name": "tests/integration/targets/gcp_compute_target_https_proxy/defaults",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_storage_bucket_access_control/defaults",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "tests/integration/targets/gcp_compute_target_https_proxy/defaults/main.yml",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_storage_bucket_access_control/defaults/main.yml",
+ "name": "tests/integration/targets/gcp_compute_target_https_proxy/aliases",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
+ "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_storage_bucket_access_control/tasks",
+ "name": "tests/integration/targets/gcp_container_node_pool",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_storage_bucket_access_control/tasks/autogen.yml",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "3e9c925f60d9b3c652326af257f4db0f011a75000a57c415efd891e2e4f69fb6",
+ "name": "tests/integration/targets/gcp_container_node_pool/tasks",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_storage_bucket_access_control/tasks/main.yml",
+ "name": "tests/integration/targets/gcp_container_node_pool/tasks/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10",
+ "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_storage_bucket_access_control/aliases",
+ "name": "tests/integration/targets/gcp_container_node_pool/tasks/autogen.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
+ "chksum_sha256": "8dc4de27969c631e7881612770b09ac333477cd0750a7fa42f92accde8c3c036",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_storage_bucket_access_control/meta",
+ "name": "tests/integration/targets/gcp_container_node_pool/meta",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_storage_bucket_access_control/meta/main.yml",
+ "name": "tests/integration/targets/gcp_container_node_pool/meta/main.yml",
"ftype": "file",
"chksum_type": "sha256",
"chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_sql_ssl_cert",
+ "name": "tests/integration/targets/gcp_container_node_pool/defaults",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_sql_ssl_cert/defaults",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "tests/integration/targets/gcp_container_node_pool/defaults/main.yml",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_sql_ssl_cert/defaults/main.yml",
+ "name": "tests/integration/targets/gcp_container_node_pool/aliases",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
+ "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_sql_ssl_cert/tasks",
+ "name": "tests/integration/targets/gcp_pubsub_subscription",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_sql_ssl_cert/tasks/autogen.yml",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "fc97571dc5d631e9c1b2847480486d728561198a694c98428239e809948be03c",
+ "name": "tests/integration/targets/gcp_pubsub_subscription/tasks",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_sql_ssl_cert/tasks/main.yml",
+ "name": "tests/integration/targets/gcp_pubsub_subscription/tasks/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10",
+ "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_sql_ssl_cert/aliases",
+ "name": "tests/integration/targets/gcp_pubsub_subscription/tasks/autogen.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "2fe5796e1684ef3e4b021a5c5ca7438f563850b7d86fa8bb4d0b4ef900e15ae2",
+ "chksum_sha256": "32505284640b29f03a4a78d1e5617349c76c5f3c1c5d5afbc3a2e130b3f1595a",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_sql_ssl_cert/meta",
+ "name": "tests/integration/targets/gcp_pubsub_subscription/meta",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_sql_ssl_cert/meta/main.yml",
+ "name": "tests/integration/targets/gcp_pubsub_subscription/meta/main.yml",
"ftype": "file",
"chksum_type": "sha256",
"chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_tpu_node",
+ "name": "tests/integration/targets/gcp_pubsub_subscription/defaults",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_tpu_node/defaults",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "tests/integration/targets/gcp_pubsub_subscription/defaults/main.yml",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_tpu_node/defaults/main.yml",
+ "name": "tests/integration/targets/gcp_pubsub_subscription/aliases",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
+ "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_tpu_node/tasks",
+ "name": "tests/integration/targets/gcp_pubsub_topic",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_tpu_node/tasks/autogen.yml",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "787298daba9a2f2fa0d6afda785192680f5905711b03e468987eebfb6d9ebee5",
+ "name": "tests/integration/targets/gcp_pubsub_topic/tasks",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_tpu_node/tasks/main.yml",
+ "name": "tests/integration/targets/gcp_pubsub_topic/tasks/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10",
+ "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_tpu_node/aliases",
+ "name": "tests/integration/targets/gcp_pubsub_topic/tasks/autogen.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
+ "chksum_sha256": "824ebeaf2bfddd3b018f9ba81592b252d4576b62277754e9c2f36e48b159f137",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_tpu_node/meta",
+ "name": "tests/integration/targets/gcp_pubsub_topic/meta",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_tpu_node/meta/main.yml",
+ "name": "tests/integration/targets/gcp_pubsub_topic/meta/main.yml",
"ftype": "file",
"chksum_type": "sha256",
"chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_region_instance_group_manager",
+ "name": "tests/integration/targets/gcp_pubsub_topic/defaults",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_region_instance_group_manager/defaults",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "tests/integration/targets/gcp_pubsub_topic/defaults/main.yml",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_region_instance_group_manager/defaults/main.yml",
+ "name": "tests/integration/targets/gcp_pubsub_topic/aliases",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
+ "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_region_instance_group_manager/tasks",
+ "name": "tests/integration/targets/gcp_resourcemanager_project",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_region_instance_group_manager/tasks/autogen.yml",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "5f6ec8c7765f58feada732f2f29825348ed2fd8f177c050dfce759af56c3b987",
+ "name": "tests/integration/targets/gcp_resourcemanager_project/tasks",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_region_instance_group_manager/tasks/main.yml",
+ "name": "tests/integration/targets/gcp_resourcemanager_project/tasks/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10",
+ "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_region_instance_group_manager/aliases",
+ "name": "tests/integration/targets/gcp_resourcemanager_project/tasks/autogen.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
+ "chksum_sha256": "611901e11ffa821682a5145307001becff8f465cc87d317f03e2fdd4868b357f",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_region_instance_group_manager/meta",
+ "name": "tests/integration/targets/gcp_resourcemanager_project/meta",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_region_instance_group_manager/meta/main.yml",
+ "name": "tests/integration/targets/gcp_resourcemanager_project/meta/main.yml",
"ftype": "file",
"chksum_type": "sha256",
"chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_storage_object",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
- "format": 1
- },
- {
- "name": "tests/integration/targets/gcp_storage_object/defaults",
+ "name": "tests/integration/targets/gcp_resourcemanager_project/defaults",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_storage_object/defaults/main.yml",
+ "name": "tests/integration/targets/gcp_resourcemanager_project/defaults/main.yml",
"ftype": "file",
"chksum_type": "sha256",
"chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_storage_object/tasks",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
- "format": 1
- },
- {
- "name": "tests/integration/targets/gcp_storage_object/tasks/main.yml",
+ "name": "tests/integration/targets/gcp_resourcemanager_project/aliases",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "e4555f635fe3fecbf067d6b80d6e2001448613eb535c8e1c9be7dffca488121a",
+ "chksum_sha256": "9e8a96b0ebfb9738c7eb615d58441ad79b7fff043c8b8db658ce9c518310bf52",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_storage_object/aliases",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
+ "name": "tests/integration/targets/gcp_iam_service_account_key",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_storage_object/meta",
+ "name": "tests/integration/targets/gcp_iam_service_account_key/meta",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_storage_object/meta/main.yml",
+ "name": "tests/integration/targets/gcp_iam_service_account_key/meta/main.yml",
"ftype": "file",
"chksum_type": "sha256",
"chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_storage_default_object_acl",
+ "name": "tests/integration/targets/gcp_iam_service_account_key/defaults",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_storage_default_object_acl/defaults",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "tests/integration/targets/gcp_iam_service_account_key/defaults/main.yml",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "bd5ce1e4b6d6cd7f0b4881112f82d8cd3541d26a8c639151c95a6f11842f1617",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_storage_default_object_acl/defaults/main.yml",
+ "name": "tests/integration/targets/gcp_iam_service_account_key/aliases",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
+ "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_storage_default_object_acl/tasks",
+ "name": "tests/integration/targets/gcp_compute_region_backend_service",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_storage_default_object_acl/tasks/autogen.yml",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "85e6310906f350174979d0a48ef77a5e0d76c229ec067b4dfc15f31fd9c33dcf",
+ "name": "tests/integration/targets/gcp_compute_region_backend_service/tasks",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_storage_default_object_acl/tasks/main.yml",
+ "name": "tests/integration/targets/gcp_compute_region_backend_service/tasks/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10",
+ "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_storage_default_object_acl/aliases",
+ "name": "tests/integration/targets/gcp_compute_region_backend_service/tasks/autogen.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "4029f43c2014b1bc6e3291863328c0e7cf791ca6d846902a2b38352440528070",
+ "chksum_sha256": "35d6a3729f775201d6312661d211b35130a9bcb529340cd765805e1197a573bc",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_storage_default_object_acl/meta",
+ "name": "tests/integration/targets/gcp_compute_region_backend_service/meta",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_storage_default_object_acl/meta/main.yml",
+ "name": "tests/integration/targets/gcp_compute_region_backend_service/meta/main.yml",
"ftype": "file",
"chksum_type": "sha256",
"chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_runtimeconfig_variable",
+ "name": "tests/integration/targets/gcp_compute_region_backend_service/defaults",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_runtimeconfig_variable/defaults",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "tests/integration/targets/gcp_compute_region_backend_service/defaults/main.yml",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_runtimeconfig_variable/defaults/main.yml",
+ "name": "tests/integration/targets/gcp_compute_region_backend_service/aliases",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
+ "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_runtimeconfig_variable/tasks",
+ "name": "tests/integration/targets/gcp_compute_firewall",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_runtimeconfig_variable/tasks/autogen.yml",
+ "name": "tests/integration/targets/gcp_compute_firewall/tasks",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
+ "format": 1
+ },
+ {
+ "name": "tests/integration/targets/gcp_compute_firewall/tasks/update.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "bd2647bee8783e9d96d8cb9d8f3e74b312060c4dd6c3c52c553f7e8f882cfe7a",
+ "chksum_sha256": "3fb4aac101161948f3c0c54d649b5ae6d6dbcc2601782fa066489bd46577ff2b",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_runtimeconfig_variable/tasks/main.yml",
+ "name": "tests/integration/targets/gcp_compute_firewall/tasks/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10",
+ "chksum_sha256": "8b01376417fda5d0e323bef6ae87cd25d5b25a6be1e457a6c82b779453574ebc",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_runtimeconfig_variable/aliases",
+ "name": "tests/integration/targets/gcp_compute_firewall/tasks/autogen.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
+ "chksum_sha256": "208edd853dfcc2111731899d207df211a55cd045717c958c24e27dcb46c8d0b2",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_runtimeconfig_variable/meta",
+ "name": "tests/integration/targets/gcp_compute_firewall/meta",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_runtimeconfig_variable/meta/main.yml",
+ "name": "tests/integration/targets/gcp_compute_firewall/meta/main.yml",
"ftype": "file",
"chksum_type": "sha256",
"chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_backend_bucket",
+ "name": "tests/integration/targets/gcp_compute_firewall/defaults",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_backend_bucket/defaults",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "tests/integration/targets/gcp_compute_firewall/defaults/main.yml",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_backend_bucket/defaults/main.yml",
+ "name": "tests/integration/targets/gcp_compute_firewall/aliases",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
+ "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_backend_bucket/tasks",
+ "name": "tests/integration/targets/gcp_compute_target_http_proxy",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_backend_bucket/tasks/autogen.yml",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "38d1f55fdfd3135d951463b208b8c8b4ce5c237d7d459d76c1a398ee44244c11",
+ "name": "tests/integration/targets/gcp_compute_target_http_proxy/tasks",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_backend_bucket/tasks/main.yml",
+ "name": "tests/integration/targets/gcp_compute_target_http_proxy/tasks/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10",
+ "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_backend_bucket/aliases",
+ "name": "tests/integration/targets/gcp_compute_target_http_proxy/tasks/autogen.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
+ "chksum_sha256": "3dfebd9ce4f1e9d8bb26ab61a6c4133687391f1d5808b5e914f3db74e6ec21b9",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_backend_bucket/meta",
+ "name": "tests/integration/targets/gcp_compute_target_http_proxy/meta",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_backend_bucket/meta/main.yml",
+ "name": "tests/integration/targets/gcp_compute_target_http_proxy/meta/main.yml",
"ftype": "file",
"chksum_type": "sha256",
"chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_snapshot",
+ "name": "tests/integration/targets/gcp_compute_target_http_proxy/defaults",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_snapshot/defaults",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "tests/integration/targets/gcp_compute_target_http_proxy/defaults/main.yml",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_snapshot/defaults/main.yml",
+ "name": "tests/integration/targets/gcp_compute_target_http_proxy/aliases",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
+ "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_snapshot/tasks",
+ "name": "tests/integration/targets/gcp_iam_service_account",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_snapshot/tasks/autogen.yml",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "ca77bc063ac8f28eb9cdc3afcf68c51daec20e1ceed28f2b0e754f4079f49e30",
+ "name": "tests/integration/targets/gcp_iam_service_account/tasks",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_snapshot/tasks/main.yml",
+ "name": "tests/integration/targets/gcp_iam_service_account/tasks/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10",
+ "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_snapshot/aliases",
+ "name": "tests/integration/targets/gcp_iam_service_account/tasks/autogen.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
+ "chksum_sha256": "69987aadcaa040b6d3c8999728659b448850c8b6e7852a07035ab1b8f87a3256",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_snapshot/meta",
+ "name": "tests/integration/targets/gcp_iam_service_account/meta",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_snapshot/meta/main.yml",
+ "name": "tests/integration/targets/gcp_iam_service_account/meta/main.yml",
"ftype": "file",
"chksum_type": "sha256",
"chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_route",
+ "name": "tests/integration/targets/gcp_iam_service_account/defaults",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_route/defaults",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "tests/integration/targets/gcp_iam_service_account/defaults/main.yml",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_route/defaults/main.yml",
+ "name": "tests/integration/targets/gcp_iam_service_account/aliases",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
+ "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_route/tasks",
+ "name": "tests/integration/targets/gcp_runtimeconfig_variable",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_route/tasks/autogen.yml",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "3efc77c9feaeae76d96956d637594f49673114879f8867d969e353ff6fcf5f76",
+ "name": "tests/integration/targets/gcp_runtimeconfig_variable/tasks",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_route/tasks/main.yml",
+ "name": "tests/integration/targets/gcp_runtimeconfig_variable/tasks/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10",
+ "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_route/aliases",
+ "name": "tests/integration/targets/gcp_runtimeconfig_variable/tasks/autogen.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
+ "chksum_sha256": "6310ddd1c456f0776e1a42b9cf4e39a8302bff121757a743e710f1a7c77ccbf3",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_route/meta",
+ "name": "tests/integration/targets/gcp_runtimeconfig_variable/meta",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_route/meta/main.yml",
+ "name": "tests/integration/targets/gcp_runtimeconfig_variable/meta/main.yml",
"ftype": "file",
"chksum_type": "sha256",
"chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_network_endpoint_group",
+ "name": "tests/integration/targets/gcp_runtimeconfig_variable/defaults",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_network_endpoint_group/defaults",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "tests/integration/targets/gcp_runtimeconfig_variable/defaults/main.yml",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_network_endpoint_group/defaults/main.yml",
+ "name": "tests/integration/targets/gcp_runtimeconfig_variable/aliases",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
+ "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_network_endpoint_group/tasks",
+ "name": "tests/integration/targets/gcp_compute_network",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_network_endpoint_group/tasks/autogen.yml",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "3370733c5a337ef9316499a00845d9df8c95194ad332d60cff6fe21f20c065e5",
+ "name": "tests/integration/targets/gcp_compute_network/tasks",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_network_endpoint_group/tasks/main.yml",
+ "name": "tests/integration/targets/gcp_compute_network/tasks/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10",
+ "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_network_endpoint_group/aliases",
+ "name": "tests/integration/targets/gcp_compute_network/tasks/autogen.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
+ "chksum_sha256": "9f33bfd2078dad54f0465c1bd72c17974776527b1d970881a459e9e852dab4dc",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_network_endpoint_group/meta",
+ "name": "tests/integration/targets/gcp_compute_network/meta",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_network_endpoint_group/meta/main.yml",
+ "name": "tests/integration/targets/gcp_compute_network/meta/main.yml",
"ftype": "file",
"chksum_type": "sha256",
"chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_dns_resource_record_set",
+ "name": "tests/integration/targets/gcp_compute_network/defaults",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_dns_resource_record_set/defaults",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "tests/integration/targets/gcp_compute_network/defaults/main.yml",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_dns_resource_record_set/defaults/main.yml",
+ "name": "tests/integration/targets/gcp_compute_network/aliases",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
+ "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_dns_resource_record_set/tasks",
+ "name": "tests/integration/targets/gcp_compute_resource_policy",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_dns_resource_record_set/tasks/autogen.yml",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "f0c70c6b9a8434310652b05a68a3dfdffd981df1f3fc022accc33c56aa4aa15b",
+ "name": "tests/integration/targets/gcp_compute_resource_policy/tasks",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_dns_resource_record_set/tasks/main.yml",
+ "name": "tests/integration/targets/gcp_compute_resource_policy/tasks/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10",
+ "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_dns_resource_record_set/aliases",
+ "name": "tests/integration/targets/gcp_compute_resource_policy/tasks/autogen.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
+ "chksum_sha256": "35a8d0e2116e8e3070ce8a10572392fc4c78c23100c35bb046bf30fa96c3bddb",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_dns_resource_record_set/meta",
+ "name": "tests/integration/targets/gcp_compute_resource_policy/meta",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_dns_resource_record_set/meta/main.yml",
+ "name": "tests/integration/targets/gcp_compute_resource_policy/meta/main.yml",
"ftype": "file",
"chksum_type": "sha256",
"chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_ssl_certificate",
+ "name": "tests/integration/targets/gcp_compute_resource_policy/defaults",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_ssl_certificate/defaults",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "tests/integration/targets/gcp_compute_resource_policy/defaults/main.yml",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_ssl_certificate/defaults/main.yml",
+ "name": "tests/integration/targets/gcp_compute_resource_policy/aliases",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
+ "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_ssl_certificate/tasks",
+ "name": "tests/integration/targets/gcp_compute_target_pool",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_ssl_certificate/tasks/autogen.yml",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "99ca8395998646d466678152458e3312be7293d7ec121caf0aa8a70acb577380",
+ "name": "tests/integration/targets/gcp_compute_target_pool/tasks",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_ssl_certificate/tasks/main.yml",
+ "name": "tests/integration/targets/gcp_compute_target_pool/tasks/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10",
+ "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_ssl_certificate/aliases",
+ "name": "tests/integration/targets/gcp_compute_target_pool/tasks/autogen.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
+ "chksum_sha256": "7b8ef782d1279da0efc02d6eb7edfa60084fbd26486f0f7ba33c559230b02ce2",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_ssl_certificate/meta",
+ "name": "tests/integration/targets/gcp_compute_target_pool/meta",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_ssl_certificate/meta/main.yml",
+ "name": "tests/integration/targets/gcp_compute_target_pool/meta/main.yml",
"ftype": "file",
"chksum_type": "sha256",
"chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_cloudfunctions_cloud_function",
+ "name": "tests/integration/targets/gcp_compute_target_pool/defaults",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_cloudfunctions_cloud_function/defaults",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "tests/integration/targets/gcp_compute_target_pool/defaults/main.yml",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_cloudfunctions_cloud_function/defaults/main.yml",
+ "name": "tests/integration/targets/gcp_compute_target_pool/aliases",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
+ "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_cloudfunctions_cloud_function/tasks",
+ "name": "tests/integration/targets/gcp_sql_database",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_cloudfunctions_cloud_function/tasks/autogen.yml",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "777419fdedf81e04fba3e1d62bcd1b87e78146c2ebdcf4dd2c4a19e7f5664568",
+ "name": "tests/integration/targets/gcp_sql_database/tasks",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_cloudfunctions_cloud_function/tasks/main.yml",
+ "name": "tests/integration/targets/gcp_sql_database/tasks/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10",
+ "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_cloudfunctions_cloud_function/aliases",
+ "name": "tests/integration/targets/gcp_sql_database/tasks/autogen.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "5dab10dc09ed5cb445c47bfd67629b39efb7bd68e65e6b773896a8eb507d588e",
+ "chksum_sha256": "974bf463cb5091aec9e821aa665347cd7a6ede2eecac093b948b564745c99994",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_cloudfunctions_cloud_function/meta",
+ "name": "tests/integration/targets/gcp_sql_database/meta",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_cloudfunctions_cloud_function/meta/main.yml",
+ "name": "tests/integration/targets/gcp_sql_database/meta/main.yml",
"ftype": "file",
"chksum_type": "sha256",
"chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_target_tcp_proxy",
+ "name": "tests/integration/targets/gcp_sql_database/defaults",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_target_tcp_proxy/defaults",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "tests/integration/targets/gcp_sql_database/defaults/main.yml",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_target_tcp_proxy/defaults/main.yml",
+ "name": "tests/integration/targets/gcp_sql_database/aliases",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
+ "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_target_tcp_proxy/tasks",
+ "name": "tests/integration/targets/gcp_compute_node_group",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_target_tcp_proxy/tasks/autogen.yml",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "04233bae3259f4c1a5c5a86aba4e01b9b77b944835e938e42285016a421e9830",
+ "name": "tests/integration/targets/gcp_compute_node_group/tasks",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_target_tcp_proxy/tasks/main.yml",
+ "name": "tests/integration/targets/gcp_compute_node_group/tasks/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10",
+ "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_target_tcp_proxy/aliases",
+ "name": "tests/integration/targets/gcp_compute_node_group/tasks/autogen.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
+ "chksum_sha256": "cb9dbfc0fdfe34eaaaae6af5affd3acc3be696a368ebc6fd6b726ac3c573e185",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_target_tcp_proxy/meta",
+ "name": "tests/integration/targets/gcp_compute_node_group/meta",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_target_tcp_proxy/meta/main.yml",
+ "name": "tests/integration/targets/gcp_compute_node_group/meta/main.yml",
"ftype": "file",
"chksum_type": "sha256",
"chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_target_vpn_gateway",
+ "name": "tests/integration/targets/gcp_compute_node_group/defaults",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_target_vpn_gateway/defaults",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "tests/integration/targets/gcp_compute_node_group/defaults/main.yml",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_target_vpn_gateway/defaults/main.yml",
+ "name": "tests/integration/targets/gcp_compute_node_group/aliases",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
+ "chksum_sha256": "5e4f7328221273ee32b8a832b9d8886771fc64733f845175bb1373dcd1752985",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_target_vpn_gateway/tasks",
+ "name": "tests/integration/targets/gcp_compute_reservation",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_target_vpn_gateway/tasks/autogen.yml",
+ "name": "tests/integration/targets/gcp_compute_reservation/tasks",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
+ "format": 1
+ },
+ {
+ "name": "tests/integration/targets/gcp_compute_reservation/tasks/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "0038f1ff726e2ebb5511d0773f016a6db01453190a6f9ae6d484505c531f0c93",
+ "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_target_vpn_gateway/tasks/main.yml",
+ "name": "tests/integration/targets/gcp_compute_reservation/tasks/autogen.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10",
+ "chksum_sha256": "374ed7baa01561f463a32386130590b9f569792a4899fe54570677b9ea459086",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_target_vpn_gateway/aliases",
+ "name": "tests/integration/targets/gcp_compute_reservation/meta",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
+ "format": 1
+ },
+ {
+ "name": "tests/integration/targets/gcp_compute_reservation/meta/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
+ "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_target_vpn_gateway/meta",
+ "name": "tests/integration/targets/gcp_compute_reservation/defaults",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_target_vpn_gateway/meta/main.yml",
+ "name": "tests/integration/targets/gcp_compute_reservation/defaults/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
+ "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_filestore_instance",
+ "name": "tests/integration/targets/gcp_compute_reservation/aliases",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
+ "format": 1
+ },
+ {
+ "name": "tests/integration/targets/gcp_compute_managed_ssl_certificate",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_filestore_instance/defaults",
+ "name": "tests/integration/targets/gcp_compute_managed_ssl_certificate/meta",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_filestore_instance/defaults/main.yml",
+ "name": "tests/integration/targets/gcp_compute_managed_ssl_certificate/meta/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
+ "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_filestore_instance/tasks",
+ "name": "tests/integration/targets/gcp_compute_managed_ssl_certificate/defaults",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_filestore_instance/tasks/autogen.yml",
+ "name": "tests/integration/targets/gcp_compute_managed_ssl_certificate/defaults/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "85eec71117ff90ba1b741057507feb76d776ba0fc79e9b9a7e95cc02934a5950",
+ "chksum_sha256": "bd5ce1e4b6d6cd7f0b4881112f82d8cd3541d26a8c639151c95a6f11842f1617",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_filestore_instance/tasks/main.yml",
+ "name": "tests/integration/targets/gcp_compute_managed_ssl_certificate/aliases",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10",
+ "chksum_sha256": "5dab10dc09ed5cb445c47bfd67629b39efb7bd68e65e6b773896a8eb507d588e",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_filestore_instance/aliases",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
+ "name": "tests/integration/targets/gcp_tpu_node",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_filestore_instance/meta",
+ "name": "tests/integration/targets/gcp_tpu_node/tasks",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_filestore_instance/meta/main.yml",
+ "name": "tests/integration/targets/gcp_tpu_node/tasks/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
+ "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_container_cluster",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "tests/integration/targets/gcp_tpu_node/tasks/autogen.yml",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "a5449965fc7a3bbb3ac88d5dd4197178fb472fedc816ffd10705185092f7dda0",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_container_cluster/defaults",
+ "name": "tests/integration/targets/gcp_tpu_node/meta",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_container_cluster/defaults/main.yml",
+ "name": "tests/integration/targets/gcp_tpu_node/meta/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
+ "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_container_cluster/tasks",
+ "name": "tests/integration/targets/gcp_tpu_node/defaults",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_container_cluster/tasks/autogen.yml",
+ "name": "tests/integration/targets/gcp_tpu_node/defaults/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "4615024ae74a1f415c03ebe8c5bc7ba1afc89004ad6e310381c8064d9f3c928b",
+ "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_container_cluster/tasks/main.yml",
+ "name": "tests/integration/targets/gcp_tpu_node/aliases",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10",
+ "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_container_cluster/aliases",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
+ "name": "tests/integration/targets/gcp_mlengine_model",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_container_cluster/meta",
+ "name": "tests/integration/targets/gcp_mlengine_model/tasks",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_container_cluster/meta/main.yml",
+ "name": "tests/integration/targets/gcp_mlengine_model/tasks/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
+ "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_dns_managed_zone",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "tests/integration/targets/gcp_mlengine_model/tasks/autogen.yml",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "fdeec13a3552c712598f5b377ff3f14558148a6420762998b82d9a13ef12461d",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_dns_managed_zone/defaults",
+ "name": "tests/integration/targets/gcp_mlengine_model/meta",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_dns_managed_zone/defaults/main.yml",
+ "name": "tests/integration/targets/gcp_mlengine_model/meta/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
+ "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_dns_managed_zone/tasks",
+ "name": "tests/integration/targets/gcp_mlengine_model/defaults",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_dns_managed_zone/tasks/autogen.yml",
+ "name": "tests/integration/targets/gcp_mlengine_model/defaults/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "e02ad7cc8139529ab4d22662876c66a202875a42d4fb82364a2a1bf04cca6d64",
+ "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_dns_managed_zone/tasks/main.yml",
+ "name": "tests/integration/targets/gcp_mlengine_model/aliases",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10",
+ "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_dns_managed_zone/aliases",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
+ "name": "tests/integration/targets/gcp_cloudbuild_trigger",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_dns_managed_zone/meta",
+ "name": "tests/integration/targets/gcp_cloudbuild_trigger/meta",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_dns_managed_zone/meta/main.yml",
+ "name": "tests/integration/targets/gcp_cloudbuild_trigger/meta/main.yml",
"ftype": "file",
"chksum_type": "sha256",
"chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_cloudtasks_queue",
+ "name": "tests/integration/targets/gcp_cloudbuild_trigger/defaults",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_cloudtasks_queue/defaults",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "tests/integration/targets/gcp_cloudbuild_trigger/defaults/main.yml",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "bd5ce1e4b6d6cd7f0b4881112f82d8cd3541d26a8c639151c95a6f11842f1617",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_cloudtasks_queue/defaults/main.yml",
+ "name": "tests/integration/targets/gcp_cloudbuild_trigger/aliases",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
+ "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_cloudtasks_queue/tasks",
+ "name": "tests/integration/targets/gcp_compute_region_target_http_proxy",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_cloudtasks_queue/tasks/autogen.yml",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "131c093a22fec824efad68cfb2f476609e9cc91cafbd257e84c4d31f148cc905",
+ "name": "tests/integration/targets/gcp_compute_region_target_http_proxy/tasks",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_cloudtasks_queue/tasks/main.yml",
+ "name": "tests/integration/targets/gcp_compute_region_target_http_proxy/tasks/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10",
+ "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_cloudtasks_queue/aliases",
+ "name": "tests/integration/targets/gcp_compute_region_target_http_proxy/tasks/autogen.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
+ "chksum_sha256": "ba4db0f3dc764e06b7260519f1a759c591a733c5d6b50d09296d515a5c00b8e6",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_cloudtasks_queue/meta",
+ "name": "tests/integration/targets/gcp_compute_region_target_http_proxy/meta",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_cloudtasks_queue/meta/main.yml",
+ "name": "tests/integration/targets/gcp_compute_region_target_http_proxy/meta/main.yml",
"ftype": "file",
"chksum_type": "sha256",
"chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_pubsub_subscription",
+ "name": "tests/integration/targets/gcp_compute_region_target_http_proxy/defaults",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_pubsub_subscription/defaults",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "tests/integration/targets/gcp_compute_region_target_http_proxy/defaults/main.yml",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_pubsub_subscription/defaults/main.yml",
+ "name": "tests/integration/targets/gcp_compute_region_target_http_proxy/aliases",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
+ "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_pubsub_subscription/tasks",
+ "name": "tests/integration/targets/gcp_bigtable_instance",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_pubsub_subscription/tasks/autogen.yml",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "0eb97554bdf8eb57eedd4fd85ad5c38bd425d4bb2908e9825f5582f0df095605",
+ "name": "tests/integration/targets/gcp_bigtable_instance/tasks",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_pubsub_subscription/tasks/main.yml",
+ "name": "tests/integration/targets/gcp_bigtable_instance/tasks/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10",
+ "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_pubsub_subscription/aliases",
+ "name": "tests/integration/targets/gcp_bigtable_instance/tasks/autogen.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
+ "chksum_sha256": "b48fb3000c82bb866ea5afde4cc58197d3820e6a07e077347f5df90d21fc7dd6",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_pubsub_subscription/meta",
+ "name": "tests/integration/targets/gcp_bigtable_instance/meta",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_pubsub_subscription/meta/main.yml",
+ "name": "tests/integration/targets/gcp_bigtable_instance/meta/main.yml",
"ftype": "file",
"chksum_type": "sha256",
"chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_instance_template",
+ "name": "tests/integration/targets/gcp_bigtable_instance/defaults",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_instance_template/defaults",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "tests/integration/targets/gcp_bigtable_instance/defaults/main.yml",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_instance_template/defaults/main.yml",
+ "name": "tests/integration/targets/gcp_bigtable_instance/aliases",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
+ "chksum_sha256": "6165de6d5352b3a386f558df0b34280af84d41b233d6862e505963ddd398ca50",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_instance_template/tasks",
+ "name": "tests/integration/targets/gcp_storage_bucket_access_control",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_instance_template/tasks/autogen.yml",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "b026316be5f008b4238e4b5203a2bf9350bbd8c29fad948823f87214c3ccf4e8",
+ "name": "tests/integration/targets/gcp_storage_bucket_access_control/tasks",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_instance_template/tasks/main.yml",
+ "name": "tests/integration/targets/gcp_storage_bucket_access_control/tasks/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10",
+ "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_instance_template/aliases",
+ "name": "tests/integration/targets/gcp_storage_bucket_access_control/tasks/autogen.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "5dab10dc09ed5cb445c47bfd67629b39efb7bd68e65e6b773896a8eb507d588e",
+ "chksum_sha256": "51ac666228f6f53b40e22fd24c477e01ac1825f0ed138b3999dc6094bc0a8173",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_instance_template/meta",
+ "name": "tests/integration/targets/gcp_storage_bucket_access_control/meta",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_compute_instance_template/meta/main.yml",
+ "name": "tests/integration/targets/gcp_storage_bucket_access_control/meta/main.yml",
"ftype": "file",
"chksum_type": "sha256",
"chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_runtimeconfig_config",
+ "name": "tests/integration/targets/gcp_storage_bucket_access_control/defaults",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_runtimeconfig_config/defaults",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "tests/integration/targets/gcp_storage_bucket_access_control/defaults/main.yml",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_runtimeconfig_config/defaults/main.yml",
+ "name": "tests/integration/targets/gcp_storage_bucket_access_control/aliases",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
+ "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_runtimeconfig_config/tasks",
+ "name": "tests/integration/targets/gcp_sourcerepo_repository",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_runtimeconfig_config/tasks/autogen.yml",
+ "name": "tests/integration/targets/gcp_sourcerepo_repository/tasks",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
+ "format": 1
+ },
+ {
+ "name": "tests/integration/targets/gcp_sourcerepo_repository/tasks/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "b9d986f7a60843aeb31f6497d101748d14e80ee6d7f23c9d172ace6dacacc96f",
+ "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_runtimeconfig_config/tasks/main.yml",
+ "name": "tests/integration/targets/gcp_sourcerepo_repository/tasks/autogen.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10",
+ "chksum_sha256": "9387f2d699e12efa3940140dccea51765752b4a1a74400b127104a0484005728",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_runtimeconfig_config/aliases",
+ "name": "tests/integration/targets/gcp_sourcerepo_repository/meta",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
+ "format": 1
+ },
+ {
+ "name": "tests/integration/targets/gcp_sourcerepo_repository/meta/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
+ "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_runtimeconfig_config/meta",
+ "name": "tests/integration/targets/gcp_sourcerepo_repository/defaults",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_runtimeconfig_config/meta/main.yml",
+ "name": "tests/integration/targets/gcp_sourcerepo_repository/defaults/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
+ "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_cloudbuild_trigger",
+ "name": "tests/integration/targets/gcp_sourcerepo_repository/aliases",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
+ "format": 1
+ },
+ {
+ "name": "tests/integration/targets/gcp_mlengine_version",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_cloudbuild_trigger/defaults",
+ "name": "tests/integration/targets/gcp_mlengine_version/tasks",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_cloudbuild_trigger/defaults/main.yml",
+ "name": "tests/integration/targets/gcp_mlengine_version/tasks/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "e173e5a15d9174e198e85c764f303f04d96463d7e1af4685fdbeec2e5cf391d7",
+ "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_cloudbuild_trigger/aliases",
+ "name": "tests/integration/targets/gcp_mlengine_version/tasks/autogen.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "907b60c0d98c6dd7c54b326bcb92860413e7cd66017d8daf94aa9fca85a74805",
+ "chksum_sha256": "6e237e1a312b526512671f7eb5891c83972bf095c4a5efe02d2551f6132668e8",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_cloudbuild_trigger/meta",
+ "name": "tests/integration/targets/gcp_mlengine_version/meta",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_cloudbuild_trigger/meta/main.yml",
+ "name": "tests/integration/targets/gcp_mlengine_version/meta/main.yml",
"ftype": "file",
"chksum_type": "sha256",
"chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_mlengine_version",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
- "format": 1
- },
- {
"name": "tests/integration/targets/gcp_mlengine_version/defaults",
"ftype": "dir",
"chksum_type": null,
@@ -7344,213 +7330,220 @@
"format": 1
},
{
- "name": "tests/integration/targets/gcp_mlengine_version/tasks",
+ "name": "tests/integration/targets/gcp_mlengine_version/aliases",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "4029f43c2014b1bc6e3291863328c0e7cf791ca6d846902a2b38352440528070",
+ "format": 1
+ },
+ {
+ "name": "tests/integration/targets/gcp_spanner_database",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_mlengine_version/tasks/autogen.yml",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "29436018afabb28defe26dff6b11d1e00b58c1c111f5133b0ded8bd9e5f5a302",
+ "name": "tests/integration/targets/gcp_spanner_database/tasks",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_mlengine_version/tasks/main.yml",
+ "name": "tests/integration/targets/gcp_spanner_database/tasks/main.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "78219be7b4d80b9a090c2a72b71a4cfe8c1c603e95c209702900df50c272af10",
+ "chksum_sha256": "529a4852ab627fc2df51b9335590961c758bcbf738c98a3ac8b2754f6b3c52e5",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_mlengine_version/aliases",
+ "name": "tests/integration/targets/gcp_spanner_database/tasks/autogen.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "4029f43c2014b1bc6e3291863328c0e7cf791ca6d846902a2b38352440528070",
+ "chksum_sha256": "1cddc1e1b09253e5ee935e844b399d726359e13e22c67d5816d5380a23c58cd7",
"format": 1
},
{
- "name": "tests/integration/targets/gcp_mlengine_version/meta",
+ "name": "tests/integration/targets/gcp_spanner_database/meta",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/integration/targets/gcp_mlengine_version/meta/main.yml",
+ "name": "tests/integration/targets/gcp_spanner_database/meta/main.yml",
"ftype": "file",
"chksum_type": "sha256",
"chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
"format": 1
},
{
- "name": "tests/unit",
+ "name": "tests/integration/targets/gcp_spanner_database/defaults",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "tests/unit/plugins",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "tests/integration/targets/gcp_spanner_database/defaults/main.yml",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "8a0962c014444703a91b0148a5403b294e870d63ddb0350af9796ce337875c37",
"format": 1
},
{
- "name": "tests/unit/plugins/test_gcp_utils.py",
+ "name": "tests/integration/targets/gcp_spanner_database/aliases",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "7cea31c6d0b65046d03d34a1409bd12e5f2bc059002e1fa8ca0535a3a3a242f2",
+ "chksum_sha256": "9f5067f13c39b7c91589302770901c2874dc75ad06ef130a9d3af5e72118c4e8",
"format": 1
},
{
- "name": "molecule",
+ "name": "test-fixtures",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "molecule/gcloud",
+ "name": "test-fixtures/cloud-function.zip",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "ee1e4f66f4fa0eed5c6f6dcf77586a61c611c012cdde2c12469a32dbc787e052",
+ "format": 1
+ },
+ {
+ "name": "test-fixtures/cloud-function-source",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "molecule/gcloud/verify.yml",
+ "name": "test-fixtures/cloud-function-source/requirements.txt",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "59318a47464cb4dab36a73b6001bdfd412a9df91b797bc8263417113b58a1260",
+ "chksum_sha256": "900f6536a0bb496cb7390407df0515010a84b85e283f1e046580156e434d1836",
"format": 1
},
{
- "name": "molecule/gcloud/files",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "test-fixtures/cloud-function-source/main.py",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "1d1d875a78943a05f939f77323f8c1c172e23d623a879e367d97759e353012cc",
"format": 1
},
{
- "name": "molecule/gcloud/files/override.conf",
+ "name": "test-fixtures/cloud-function-source/build-function-zip.sh",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "27d57701a92b623757711f18aeba17f089df44c13cead5caca41418a62804d89",
+ "chksum_sha256": "0f90d1f2aff756f1e576595f756ceb3437b653657cbf75ae663f44c0bcab7a85",
"format": 1
},
{
- "name": "molecule/gcloud/molecule.yml",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "b81502a94d4dcf36b575702f68433a777531032769048769a3f3eacb8f5bb451",
+ "name": "changelogs",
+ "ftype": "dir",
+ "chksum_type": null,
+ "chksum_sha256": null,
"format": 1
},
{
- "name": "molecule/gcloud/package_playbook.yml",
+ "name": "changelogs/config.yaml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "501d76e7d8b292e055fcd137a589296943709369a735e5b483d428e03beed38b",
+ "chksum_sha256": "ad67cc7c91ddfe0136c56ad2842e8c60b1cc9a85f3a7f93c5367d17b83ac7f69",
"format": 1
},
{
- "name": "molecule/gcloud/archive_playbook.yml",
+ "name": "changelogs/changelog.yaml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "f20365002e8801786c96e091c01e590dc15f32e652450a19571f42d5ebc8ec9c",
+ "chksum_sha256": "bfe804c69948886f2d22b695e45f51e2928b59941bd653778eb1750ec4c6559f",
"format": 1
},
{
- "name": "molecule/gcloud/converge.yml",
+ "name": "CHANGELOG.rst",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "a7b3ae518595986a5210e887de193c15eacc376c73bfb3964f099ad34e7a80e4",
+ "chksum_sha256": "3e67fc36b3fc805c95a31f7370d40818578ce44ebe91e3f5a769b3ef1b235c52",
"format": 1
},
{
- "name": "molecule/gcloud/Dockerfile.j2",
+ "name": ".gitignore",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "5ef978855099e5b5118cb1198a2e27d5745c4a358670ba2e10d9004ce29c0324",
+ "chksum_sha256": "aad3378139e7b6e10500395da734c01e005eb4a9975f67a40348d049c6a6128b",
"format": 1
},
{
- "name": "molecule/gcloud/tests",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": "CONTRIBUTING.md",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "e483d5791cba22a7b2103594a4761067480b05feea70d8761465f6f96f7b8642",
"format": 1
},
{
- "name": "molecule/gcloud/tests/test_default.py",
+ "name": "MAINTAINING.md",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "cb6e9becf8f75159ef50057058047caddd7ec06fd07f9ea7237eb0c3f822a198",
+ "chksum_sha256": "e026f37292b9345e16684461f580ece1c31f4b4858f4e1da5de76001ce9505b8",
"format": 1
},
{
- "name": "molecule/gcsfuse",
+ "name": ".github",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "molecule/gcsfuse/verify.yml",
- "ftype": "file",
- "chksum_type": "sha256",
- "chksum_sha256": "59318a47464cb4dab36a73b6001bdfd412a9df91b797bc8263417113b58a1260",
- "format": 1
- },
- {
- "name": "molecule/gcsfuse/files",
+ "name": ".github/workflows",
"ftype": "dir",
"chksum_type": null,
"chksum_sha256": null,
"format": 1
},
{
- "name": "molecule/gcsfuse/files/override.conf",
+ "name": ".github/workflows/pythonpublish.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "27d57701a92b623757711f18aeba17f089df44c13cead5caca41418a62804d89",
+ "chksum_sha256": "bf9b7fddcd410698ccecfc378391f61d73dc7152bc53bb3c2bed989ab5a6a747",
"format": 1
},
{
- "name": "molecule/gcsfuse/molecule.yml",
+ "name": ".github/workflows/automationhub.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "b81502a94d4dcf36b575702f68433a777531032769048769a3f3eacb8f5bb451",
+ "chksum_sha256": "1b953c0774ea04c2213111c2bf7335068bc784b7a7adc348f94ab94f2176d468",
"format": 1
},
{
- "name": "molecule/gcsfuse/converge.yml",
+ "name": ".github/workflows/gcloud.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "b246124da724132200d8ce9cb76178abb483a5ae5c291d11fd44ea77d29e7146",
+ "chksum_sha256": "ab0bea026db681830d2a9e2ef198a3e725d38b4f3209b5cd702b6b228c4a9a94",
"format": 1
},
{
- "name": "molecule/gcsfuse/Dockerfile.j2",
+ "name": ".github/workflows/ansible-integration-tests.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "5ef978855099e5b5118cb1198a2e27d5745c4a358670ba2e10d9004ce29c0324",
+ "chksum_sha256": "69b4a4d90e2c870d9723a9256714ce8d66dd6a0d7b7ed562029f4ccb4bcef47d",
"format": 1
},
{
- "name": "molecule/gcsfuse/tests",
- "ftype": "dir",
- "chksum_type": null,
- "chksum_sha256": null,
+ "name": ".github/workflows/gcsfuse.yml",
+ "ftype": "file",
+ "chksum_type": "sha256",
+ "chksum_sha256": "814cd56758294eca96f90327a7bf68ced8bd2425844e486419420261e9ae0b16",
"format": 1
},
{
- "name": "molecule/gcsfuse/tests/test_default.py",
+ "name": ".github/workflows/ansible-test.yml",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "cb6e9becf8f75159ef50057058047caddd7ec06fd07f9ea7237eb0c3f822a198",
+ "chksum_sha256": "2f3b8476af145f0b68b99ff1ee762335e55a9f95f29a8ef396cd276be0cdd15b",
"format": 1
}
],
diff --git a/ansible_collections/google/cloud/MAINTAINING.md b/ansible_collections/google/cloud/MAINTAINING.md
index 97cc5e325..de14b75bd 100644
--- a/ansible_collections/google/cloud/MAINTAINING.md
+++ b/ansible_collections/google/cloud/MAINTAINING.md
@@ -58,6 +58,10 @@ antsibull-changelog release
This will remove all the changelog fragments from ./changelogs/fragments and
merge them into CHANGELOG.rst.
+### Send a PR and merge
+
+Send a PR with these changes and merge them.
+
### Create a new GitHub release
Creating
diff --git a/ansible_collections/google/cloud/MANIFEST.json b/ansible_collections/google/cloud/MANIFEST.json
index 786bbdbbf..1bbf25952 100644
--- a/ansible_collections/google/cloud/MANIFEST.json
+++ b/ansible_collections/google/cloud/MANIFEST.json
@@ -2,10 +2,10 @@
"collection_info": {
"namespace": "google",
"name": "cloud",
- "version": "1.1.3",
+ "version": "1.3.0",
"authors": [
"Google <alexstephen@google.com>",
- "Google <yusuketsutsumi@google.com>"
+ "Google <hawk@google.com>"
],
"readme": "README.md",
"tags": [
@@ -30,7 +30,7 @@
"name": "FILES.json",
"ftype": "file",
"chksum_type": "sha256",
- "chksum_sha256": "06e8a32de8311c65d60b3cf65a55838a6f827c1f274292e84879e674e36102bb",
+ "chksum_sha256": "4248ba4fb14ba63b224bca3eaccf6205c9833eb370000ea7567aef0ee9b992e1",
"format": 1
},
"format": 1
diff --git a/ansible_collections/google/cloud/changelogs/.plugin-cache.yaml b/ansible_collections/google/cloud/changelogs/.plugin-cache.yaml
deleted file mode 100644
index 3febdd4ce..000000000
--- a/ansible_collections/google/cloud/changelogs/.plugin-cache.yaml
+++ /dev/null
@@ -1,871 +0,0 @@
-objects:
- role: {}
-plugins:
- become: {}
- cache: {}
- callback: {}
- cliconf: {}
- connection: {}
- httpapi: {}
- inventory:
- gcp_compute:
- description: Google Cloud Compute Engine inventory source
- name: gcp_compute
- version_added: null
- lookup: {}
- module:
- gcp_appengine_firewall_rule:
- description: Creates a GCP FirewallRule
- name: gcp_appengine_firewall_rule
- namespace: ''
- version_added: null
- gcp_appengine_firewall_rule_info:
- description: Gather info for GCP FirewallRule
- name: gcp_appengine_firewall_rule_info
- namespace: ''
- version_added: null
- gcp_bigquery_dataset:
- description: Creates a GCP Dataset
- name: gcp_bigquery_dataset
- namespace: ''
- version_added: null
- gcp_bigquery_dataset_info:
- description: Gather info for GCP Dataset
- name: gcp_bigquery_dataset_info
- namespace: ''
- version_added: null
- gcp_bigquery_table:
- description: Creates a GCP Table
- name: gcp_bigquery_table
- namespace: ''
- version_added: null
- gcp_bigquery_table_info:
- description: Gather info for GCP Table
- name: gcp_bigquery_table_info
- namespace: ''
- version_added: null
- gcp_bigtable_instance:
- description: Creates a GCP Instance
- name: gcp_bigtable_instance
- namespace: ''
- version_added: null
- gcp_bigtable_instance_info:
- description: Gather info for GCP Instance
- name: gcp_bigtable_instance_info
- namespace: ''
- version_added: null
- gcp_cloudbuild_trigger:
- description: Creates a GCP Trigger
- name: gcp_cloudbuild_trigger
- namespace: ''
- version_added: null
- gcp_cloudbuild_trigger_info:
- description: Gather info for GCP Trigger
- name: gcp_cloudbuild_trigger_info
- namespace: ''
- version_added: null
- gcp_cloudfunctions_cloud_function:
- description: Creates a GCP CloudFunction
- name: gcp_cloudfunctions_cloud_function
- namespace: ''
- version_added: null
- gcp_cloudfunctions_cloud_function_info:
- description: Gather info for GCP CloudFunction
- name: gcp_cloudfunctions_cloud_function_info
- namespace: ''
- version_added: null
- gcp_cloudscheduler_job:
- description: Creates a GCP Job
- name: gcp_cloudscheduler_job
- namespace: ''
- version_added: null
- gcp_cloudscheduler_job_info:
- description: Gather info for GCP Job
- name: gcp_cloudscheduler_job_info
- namespace: ''
- version_added: null
- gcp_cloudtasks_queue:
- description: Creates a GCP Queue
- name: gcp_cloudtasks_queue
- namespace: ''
- version_added: null
- gcp_cloudtasks_queue_info:
- description: Gather info for GCP Queue
- name: gcp_cloudtasks_queue_info
- namespace: ''
- version_added: null
- gcp_compute_address:
- description: Creates a GCP Address
- name: gcp_compute_address
- namespace: ''
- version_added: null
- gcp_compute_address_info:
- description: Gather info for GCP Address
- name: gcp_compute_address_info
- namespace: ''
- version_added: null
- gcp_compute_autoscaler:
- description: Creates a GCP Autoscaler
- name: gcp_compute_autoscaler
- namespace: ''
- version_added: null
- gcp_compute_autoscaler_info:
- description: Gather info for GCP Autoscaler
- name: gcp_compute_autoscaler_info
- namespace: ''
- version_added: null
- gcp_compute_backend_bucket:
- description: Creates a GCP BackendBucket
- name: gcp_compute_backend_bucket
- namespace: ''
- version_added: null
- gcp_compute_backend_bucket_info:
- description: Gather info for GCP BackendBucket
- name: gcp_compute_backend_bucket_info
- namespace: ''
- version_added: null
- gcp_compute_backend_service:
- description: Creates a GCP BackendService
- name: gcp_compute_backend_service
- namespace: ''
- version_added: null
- gcp_compute_backend_service_info:
- description: Gather info for GCP BackendService
- name: gcp_compute_backend_service_info
- namespace: ''
- version_added: null
- gcp_compute_disk:
- description: Creates a GCP Disk
- name: gcp_compute_disk
- namespace: ''
- version_added: null
- gcp_compute_disk_info:
- description: Gather info for GCP Disk
- name: gcp_compute_disk_info
- namespace: ''
- version_added: null
- gcp_compute_external_vpn_gateway:
- description: Creates a GCP ExternalVpnGateway
- name: gcp_compute_external_vpn_gateway
- namespace: ''
- version_added: null
- gcp_compute_external_vpn_gateway_info:
- description: Gather info for GCP ExternalVpnGateway
- name: gcp_compute_external_vpn_gateway_info
- namespace: ''
- version_added: null
- gcp_compute_firewall:
- description: Creates a GCP Firewall
- name: gcp_compute_firewall
- namespace: ''
- version_added: null
- gcp_compute_firewall_info:
- description: Gather info for GCP Firewall
- name: gcp_compute_firewall_info
- namespace: ''
- version_added: null
- gcp_compute_forwarding_rule:
- description: Creates a GCP ForwardingRule
- name: gcp_compute_forwarding_rule
- namespace: ''
- version_added: null
- gcp_compute_forwarding_rule_info:
- description: Gather info for GCP ForwardingRule
- name: gcp_compute_forwarding_rule_info
- namespace: ''
- version_added: null
- gcp_compute_global_address:
- description: Creates a GCP GlobalAddress
- name: gcp_compute_global_address
- namespace: ''
- version_added: null
- gcp_compute_global_address_info:
- description: Gather info for GCP GlobalAddress
- name: gcp_compute_global_address_info
- namespace: ''
- version_added: null
- gcp_compute_global_forwarding_rule:
- description: Creates a GCP GlobalForwardingRule
- name: gcp_compute_global_forwarding_rule
- namespace: ''
- version_added: null
- gcp_compute_global_forwarding_rule_info:
- description: Gather info for GCP GlobalForwardingRule
- name: gcp_compute_global_forwarding_rule_info
- namespace: ''
- version_added: null
- gcp_compute_health_check:
- description: Creates a GCP HealthCheck
- name: gcp_compute_health_check
- namespace: ''
- version_added: null
- gcp_compute_health_check_info:
- description: Gather info for GCP HealthCheck
- name: gcp_compute_health_check_info
- namespace: ''
- version_added: null
- gcp_compute_http_health_check:
- description: Creates a GCP HttpHealthCheck
- name: gcp_compute_http_health_check
- namespace: ''
- version_added: null
- gcp_compute_http_health_check_info:
- description: Gather info for GCP HttpHealthCheck
- name: gcp_compute_http_health_check_info
- namespace: ''
- version_added: null
- gcp_compute_https_health_check:
- description: Creates a GCP HttpsHealthCheck
- name: gcp_compute_https_health_check
- namespace: ''
- version_added: null
- gcp_compute_https_health_check_info:
- description: Gather info for GCP HttpsHealthCheck
- name: gcp_compute_https_health_check_info
- namespace: ''
- version_added: null
- gcp_compute_image:
- description: Creates a GCP Image
- name: gcp_compute_image
- namespace: ''
- version_added: null
- gcp_compute_image_info:
- description: Gather info for GCP Image
- name: gcp_compute_image_info
- namespace: ''
- version_added: null
- gcp_compute_instance:
- description: Creates a GCP Instance
- name: gcp_compute_instance
- namespace: ''
- version_added: null
- gcp_compute_instance_group:
- description: Creates a GCP InstanceGroup
- name: gcp_compute_instance_group
- namespace: ''
- version_added: null
- gcp_compute_instance_group_info:
- description: Gather info for GCP InstanceGroup
- name: gcp_compute_instance_group_info
- namespace: ''
- version_added: null
- gcp_compute_instance_group_manager:
- description: Creates a GCP InstanceGroupManager
- name: gcp_compute_instance_group_manager
- namespace: ''
- version_added: null
- gcp_compute_instance_group_manager_info:
- description: Gather info for GCP InstanceGroupManager
- name: gcp_compute_instance_group_manager_info
- namespace: ''
- version_added: null
- gcp_compute_instance_info:
- description: Gather info for GCP Instance
- name: gcp_compute_instance_info
- namespace: ''
- version_added: null
- gcp_compute_instance_template:
- description: Creates a GCP InstanceTemplate
- name: gcp_compute_instance_template
- namespace: ''
- version_added: null
- gcp_compute_instance_template_info:
- description: Gather info for GCP InstanceTemplate
- name: gcp_compute_instance_template_info
- namespace: ''
- version_added: null
- gcp_compute_interconnect_attachment:
- description: Creates a GCP InterconnectAttachment
- name: gcp_compute_interconnect_attachment
- namespace: ''
- version_added: null
- gcp_compute_interconnect_attachment_info:
- description: Gather info for GCP InterconnectAttachment
- name: gcp_compute_interconnect_attachment_info
- namespace: ''
- version_added: null
- gcp_compute_network:
- description: Creates a GCP Network
- name: gcp_compute_network
- namespace: ''
- version_added: null
- gcp_compute_network_endpoint_group:
- description: Creates a GCP NetworkEndpointGroup
- name: gcp_compute_network_endpoint_group
- namespace: ''
- version_added: null
- gcp_compute_network_endpoint_group_info:
- description: Gather info for GCP NetworkEndpointGroup
- name: gcp_compute_network_endpoint_group_info
- namespace: ''
- version_added: null
- gcp_compute_network_info:
- description: Gather info for GCP Network
- name: gcp_compute_network_info
- namespace: ''
- version_added: null
- gcp_compute_node_group:
- description: Creates a GCP NodeGroup
- name: gcp_compute_node_group
- namespace: ''
- version_added: null
- gcp_compute_node_group_info:
- description: Gather info for GCP NodeGroup
- name: gcp_compute_node_group_info
- namespace: ''
- version_added: null
- gcp_compute_node_template:
- description: Creates a GCP NodeTemplate
- name: gcp_compute_node_template
- namespace: ''
- version_added: null
- gcp_compute_node_template_info:
- description: Gather info for GCP NodeTemplate
- name: gcp_compute_node_template_info
- namespace: ''
- version_added: null
- gcp_compute_region_autoscaler:
- description: Creates a GCP RegionAutoscaler
- name: gcp_compute_region_autoscaler
- namespace: ''
- version_added: null
- gcp_compute_region_autoscaler_info:
- description: Gather info for GCP RegionAutoscaler
- name: gcp_compute_region_autoscaler_info
- namespace: ''
- version_added: null
- gcp_compute_region_backend_service:
- description: Creates a GCP RegionBackendService
- name: gcp_compute_region_backend_service
- namespace: ''
- version_added: null
- gcp_compute_region_backend_service_info:
- description: Gather info for GCP RegionBackendService
- name: gcp_compute_region_backend_service_info
- namespace: ''
- version_added: null
- gcp_compute_region_disk:
- description: Creates a GCP RegionDisk
- name: gcp_compute_region_disk
- namespace: ''
- version_added: null
- gcp_compute_region_disk_info:
- description: Gather info for GCP RegionDisk
- name: gcp_compute_region_disk_info
- namespace: ''
- version_added: null
- gcp_compute_region_health_check:
- description: Creates a GCP RegionHealthCheck
- name: gcp_compute_region_health_check
- namespace: ''
- version_added: null
- gcp_compute_region_health_check_info:
- description: Gather info for GCP RegionHealthCheck
- name: gcp_compute_region_health_check_info
- namespace: ''
- version_added: null
- gcp_compute_region_instance_group_manager:
- description: Creates a GCP RegionInstanceGroupManager
- name: gcp_compute_region_instance_group_manager
- namespace: ''
- version_added: null
- gcp_compute_region_instance_group_manager_info:
- description: Gather info for GCP RegionInstanceGroupManager
- name: gcp_compute_region_instance_group_manager_info
- namespace: ''
- version_added: null
- gcp_compute_region_target_http_proxy:
- description: Creates a GCP RegionTargetHttpProxy
- name: gcp_compute_region_target_http_proxy
- namespace: ''
- version_added: null
- gcp_compute_region_target_http_proxy_info:
- description: Gather info for GCP RegionTargetHttpProxy
- name: gcp_compute_region_target_http_proxy_info
- namespace: ''
- version_added: null
- gcp_compute_region_target_https_proxy:
- description: Creates a GCP RegionTargetHttpsProxy
- name: gcp_compute_region_target_https_proxy
- namespace: ''
- version_added: null
- gcp_compute_region_target_https_proxy_info:
- description: Gather info for GCP RegionTargetHttpsProxy
- name: gcp_compute_region_target_https_proxy_info
- namespace: ''
- version_added: null
- gcp_compute_region_url_map:
- description: Creates a GCP RegionUrlMap
- name: gcp_compute_region_url_map
- namespace: ''
- version_added: null
- gcp_compute_region_url_map_info:
- description: Gather info for GCP RegionUrlMap
- name: gcp_compute_region_url_map_info
- namespace: ''
- version_added: null
- gcp_compute_reservation:
- description: Creates a GCP Reservation
- name: gcp_compute_reservation
- namespace: ''
- version_added: null
- gcp_compute_reservation_info:
- description: Gather info for GCP Reservation
- name: gcp_compute_reservation_info
- namespace: ''
- version_added: null
- gcp_compute_resource_policy:
- description: Creates a GCP ResourcePolicy
- name: gcp_compute_resource_policy
- namespace: ''
- version_added: null
- gcp_compute_resource_policy_info:
- description: Gather info for GCP ResourcePolicy
- name: gcp_compute_resource_policy_info
- namespace: ''
- version_added: null
- gcp_compute_route:
- description: Creates a GCP Route
- name: gcp_compute_route
- namespace: ''
- version_added: null
- gcp_compute_route_info:
- description: Gather info for GCP Route
- name: gcp_compute_route_info
- namespace: ''
- version_added: null
- gcp_compute_router:
- description: Creates a GCP Router
- name: gcp_compute_router
- namespace: ''
- version_added: null
- gcp_compute_router_info:
- description: Gather info for GCP Router
- name: gcp_compute_router_info
- namespace: ''
- version_added: null
- gcp_compute_snapshot:
- description: Creates a GCP Snapshot
- name: gcp_compute_snapshot
- namespace: ''
- version_added: null
- gcp_compute_snapshot_info:
- description: Gather info for GCP Snapshot
- name: gcp_compute_snapshot_info
- namespace: ''
- version_added: null
- gcp_compute_ssl_certificate:
- description: Creates a GCP SslCertificate
- name: gcp_compute_ssl_certificate
- namespace: ''
- version_added: null
- gcp_compute_ssl_certificate_info:
- description: Gather info for GCP SslCertificate
- name: gcp_compute_ssl_certificate_info
- namespace: ''
- version_added: null
- gcp_compute_ssl_policy:
- description: Creates a GCP SslPolicy
- name: gcp_compute_ssl_policy
- namespace: ''
- version_added: null
- gcp_compute_ssl_policy_info:
- description: Gather info for GCP SslPolicy
- name: gcp_compute_ssl_policy_info
- namespace: ''
- version_added: null
- gcp_compute_subnetwork:
- description: Creates a GCP Subnetwork
- name: gcp_compute_subnetwork
- namespace: ''
- version_added: null
- gcp_compute_subnetwork_info:
- description: Gather info for GCP Subnetwork
- name: gcp_compute_subnetwork_info
- namespace: ''
- version_added: null
- gcp_compute_target_http_proxy:
- description: Creates a GCP TargetHttpProxy
- name: gcp_compute_target_http_proxy
- namespace: ''
- version_added: null
- gcp_compute_target_http_proxy_info:
- description: Gather info for GCP TargetHttpProxy
- name: gcp_compute_target_http_proxy_info
- namespace: ''
- version_added: null
- gcp_compute_target_https_proxy:
- description: Creates a GCP TargetHttpsProxy
- name: gcp_compute_target_https_proxy
- namespace: ''
- version_added: null
- gcp_compute_target_https_proxy_info:
- description: Gather info for GCP TargetHttpsProxy
- name: gcp_compute_target_https_proxy_info
- namespace: ''
- version_added: null
- gcp_compute_target_instance:
- description: Creates a GCP TargetInstance
- name: gcp_compute_target_instance
- namespace: ''
- version_added: null
- gcp_compute_target_instance_info:
- description: Gather info for GCP TargetInstance
- name: gcp_compute_target_instance_info
- namespace: ''
- version_added: null
- gcp_compute_target_pool:
- description: Creates a GCP TargetPool
- name: gcp_compute_target_pool
- namespace: ''
- version_added: null
- gcp_compute_target_pool_info:
- description: Gather info for GCP TargetPool
- name: gcp_compute_target_pool_info
- namespace: ''
- version_added: null
- gcp_compute_target_ssl_proxy:
- description: Creates a GCP TargetSslProxy
- name: gcp_compute_target_ssl_proxy
- namespace: ''
- version_added: null
- gcp_compute_target_ssl_proxy_info:
- description: Gather info for GCP TargetSslProxy
- name: gcp_compute_target_ssl_proxy_info
- namespace: ''
- version_added: null
- gcp_compute_target_tcp_proxy:
- description: Creates a GCP TargetTcpProxy
- name: gcp_compute_target_tcp_proxy
- namespace: ''
- version_added: null
- gcp_compute_target_tcp_proxy_info:
- description: Gather info for GCP TargetTcpProxy
- name: gcp_compute_target_tcp_proxy_info
- namespace: ''
- version_added: null
- gcp_compute_target_vpn_gateway:
- description: Creates a GCP TargetVpnGateway
- name: gcp_compute_target_vpn_gateway
- namespace: ''
- version_added: null
- gcp_compute_target_vpn_gateway_info:
- description: Gather info for GCP TargetVpnGateway
- name: gcp_compute_target_vpn_gateway_info
- namespace: ''
- version_added: null
- gcp_compute_url_map:
- description: Creates a GCP UrlMap
- name: gcp_compute_url_map
- namespace: ''
- version_added: null
- gcp_compute_url_map_info:
- description: Gather info for GCP UrlMap
- name: gcp_compute_url_map_info
- namespace: ''
- version_added: null
- gcp_compute_vpn_tunnel:
- description: Creates a GCP VpnTunnel
- name: gcp_compute_vpn_tunnel
- namespace: ''
- version_added: null
- gcp_compute_vpn_tunnel_info:
- description: Gather info for GCP VpnTunnel
- name: gcp_compute_vpn_tunnel_info
- namespace: ''
- version_added: null
- gcp_container_cluster:
- description: Creates a GCP Cluster
- name: gcp_container_cluster
- namespace: ''
- version_added: null
- gcp_container_cluster_info:
- description: Gather info for GCP Cluster
- name: gcp_container_cluster_info
- namespace: ''
- version_added: null
- gcp_container_node_pool:
- description: Creates a GCP NodePool
- name: gcp_container_node_pool
- namespace: ''
- version_added: null
- gcp_container_node_pool_info:
- description: Gather info for GCP NodePool
- name: gcp_container_node_pool_info
- namespace: ''
- version_added: null
- gcp_dns_managed_zone:
- description: Creates a GCP ManagedZone
- name: gcp_dns_managed_zone
- namespace: ''
- version_added: null
- gcp_dns_managed_zone_info:
- description: Gather info for GCP ManagedZone
- name: gcp_dns_managed_zone_info
- namespace: ''
- version_added: null
- gcp_dns_resource_record_set:
- description: Creates a GCP ResourceRecordSet
- name: gcp_dns_resource_record_set
- namespace: ''
- version_added: null
- gcp_dns_resource_record_set_info:
- description: Gather info for GCP ResourceRecordSet
- name: gcp_dns_resource_record_set_info
- namespace: ''
- version_added: null
- gcp_filestore_instance:
- description: Creates a GCP Instance
- name: gcp_filestore_instance
- namespace: ''
- version_added: null
- gcp_filestore_instance_info:
- description: Gather info for GCP Instance
- name: gcp_filestore_instance_info
- namespace: ''
- version_added: null
- gcp_iam_role:
- description: Creates a GCP Role
- name: gcp_iam_role
- namespace: ''
- version_added: null
- gcp_iam_role_info:
- description: Gather info for GCP Role
- name: gcp_iam_role_info
- namespace: ''
- version_added: null
- gcp_iam_service_account:
- description: Creates a GCP ServiceAccount
- name: gcp_iam_service_account
- namespace: ''
- version_added: null
- gcp_iam_service_account_info:
- description: Gather info for GCP ServiceAccount
- name: gcp_iam_service_account_info
- namespace: ''
- version_added: null
- gcp_iam_service_account_key:
- description: Creates a GCP ServiceAccountKey
- name: gcp_iam_service_account_key
- namespace: ''
- version_added: null
- gcp_kms_crypto_key:
- description: Creates a GCP CryptoKey
- name: gcp_kms_crypto_key
- namespace: ''
- version_added: null
- gcp_kms_crypto_key_info:
- description: Gather info for GCP CryptoKey
- name: gcp_kms_crypto_key_info
- namespace: ''
- version_added: null
- gcp_kms_key_ring:
- description: Creates a GCP KeyRing
- name: gcp_kms_key_ring
- namespace: ''
- version_added: null
- gcp_kms_key_ring_info:
- description: Gather info for GCP KeyRing
- name: gcp_kms_key_ring_info
- namespace: ''
- version_added: null
- gcp_logging_metric:
- description: Creates a GCP Metric
- name: gcp_logging_metric
- namespace: ''
- version_added: null
- gcp_logging_metric_info:
- description: Gather info for GCP Metric
- name: gcp_logging_metric_info
- namespace: ''
- version_added: null
- gcp_mlengine_model:
- description: Creates a GCP Model
- name: gcp_mlengine_model
- namespace: ''
- version_added: null
- gcp_mlengine_model_info:
- description: Gather info for GCP Model
- name: gcp_mlengine_model_info
- namespace: ''
- version_added: null
- gcp_mlengine_version:
- description: Creates a GCP Version
- name: gcp_mlengine_version
- namespace: ''
- version_added: null
- gcp_mlengine_version_info:
- description: Gather info for GCP Version
- name: gcp_mlengine_version_info
- namespace: ''
- version_added: null
- gcp_pubsub_subscription:
- description: Creates a GCP Subscription
- name: gcp_pubsub_subscription
- namespace: ''
- version_added: null
- gcp_pubsub_subscription_info:
- description: Gather info for GCP Subscription
- name: gcp_pubsub_subscription_info
- namespace: ''
- version_added: null
- gcp_pubsub_topic:
- description: Creates a GCP Topic
- name: gcp_pubsub_topic
- namespace: ''
- version_added: null
- gcp_pubsub_topic_info:
- description: Gather info for GCP Topic
- name: gcp_pubsub_topic_info
- namespace: ''
- version_added: null
- gcp_redis_instance:
- description: Creates a GCP Instance
- name: gcp_redis_instance
- namespace: ''
- version_added: null
- gcp_redis_instance_info:
- description: Gather info for GCP Instance
- name: gcp_redis_instance_info
- namespace: ''
- version_added: null
- gcp_resourcemanager_project:
- description: Creates a GCP Project
- name: gcp_resourcemanager_project
- namespace: ''
- version_added: null
- gcp_resourcemanager_project_info:
- description: Gather info for GCP Project
- name: gcp_resourcemanager_project_info
- namespace: ''
- version_added: null
- gcp_runtimeconfig_config:
- description: Creates a GCP Config
- name: gcp_runtimeconfig_config
- namespace: ''
- version_added: null
- gcp_runtimeconfig_config_info:
- description: Gather info for GCP Config
- name: gcp_runtimeconfig_config_info
- namespace: ''
- version_added: null
- gcp_runtimeconfig_variable:
- description: Creates a GCP Variable
- name: gcp_runtimeconfig_variable
- namespace: ''
- version_added: null
- gcp_runtimeconfig_variable_info:
- description: Gather info for GCP Variable
- name: gcp_runtimeconfig_variable_info
- namespace: ''
- version_added: null
- gcp_serviceusage_service:
- description: Creates a GCP Service
- name: gcp_serviceusage_service
- namespace: ''
- version_added: null
- gcp_serviceusage_service_info:
- description: Gather info for GCP Service
- name: gcp_serviceusage_service_info
- namespace: ''
- version_added: null
- gcp_sourcerepo_repository:
- description: Creates a GCP Repository
- name: gcp_sourcerepo_repository
- namespace: ''
- version_added: null
- gcp_sourcerepo_repository_info:
- description: Gather info for GCP Repository
- name: gcp_sourcerepo_repository_info
- namespace: ''
- version_added: null
- gcp_spanner_database:
- description: Creates a GCP Database
- name: gcp_spanner_database
- namespace: ''
- version_added: null
- gcp_spanner_database_info:
- description: Gather info for GCP Database
- name: gcp_spanner_database_info
- namespace: ''
- version_added: null
- gcp_spanner_instance:
- description: Creates a GCP Instance
- name: gcp_spanner_instance
- namespace: ''
- version_added: null
- gcp_spanner_instance_info:
- description: Gather info for GCP Instance
- name: gcp_spanner_instance_info
- namespace: ''
- version_added: null
- gcp_sql_database:
- description: Creates a GCP Database
- name: gcp_sql_database
- namespace: ''
- version_added: null
- gcp_sql_database_info:
- description: Gather info for GCP Database
- name: gcp_sql_database_info
- namespace: ''
- version_added: null
- gcp_sql_instance:
- description: Creates a GCP Instance
- name: gcp_sql_instance
- namespace: ''
- version_added: null
- gcp_sql_instance_info:
- description: Gather info for GCP Instance
- name: gcp_sql_instance_info
- namespace: ''
- version_added: null
- gcp_sql_ssl_cert:
- description: Creates a GCP SslCert
- name: gcp_sql_ssl_cert
- namespace: ''
- version_added: null
- gcp_sql_user:
- description: Creates a GCP User
- name: gcp_sql_user
- namespace: ''
- version_added: null
- gcp_sql_user_info:
- description: Gather info for GCP User
- name: gcp_sql_user_info
- namespace: ''
- version_added: null
- gcp_storage_bucket:
- description: Creates a GCP Bucket
- name: gcp_storage_bucket
- namespace: ''
- version_added: null
- gcp_storage_bucket_access_control:
- description: Creates a GCP BucketAccessControl
- name: gcp_storage_bucket_access_control
- namespace: ''
- version_added: null
- gcp_storage_default_object_acl:
- description: Creates a GCP DefaultObjectACL
- name: gcp_storage_default_object_acl
- namespace: ''
- version_added: null
- gcp_storage_object:
- description: Creates a GCP Object
- name: gcp_storage_object
- namespace: ''
- version_added: null
- gcp_tpu_node:
- description: Creates a GCP Node
- name: gcp_tpu_node
- namespace: ''
- version_added: null
- gcp_tpu_node_info:
- description: Gather info for GCP Node
- name: gcp_tpu_node_info
- namespace: ''
- version_added: null
- netconf: {}
- shell: {}
- strategy: {}
- vars: {}
-version: 1.1.3
diff --git a/ansible_collections/google/cloud/changelogs/changelog.yaml b/ansible_collections/google/cloud/changelogs/changelog.yaml
index 009454372..4d47e486b 100644
--- a/ansible_collections/google/cloud/changelogs/changelog.yaml
+++ b/ansible_collections/google/cloud/changelogs/changelog.yaml
@@ -46,3 +46,34 @@ releases:
fragments:
- gce-changelog.yaml
release_date: '2023-03-04'
+ 1.2.0:
+ changes:
+ bugfixes:
+ - Use default service account if `service_account_email` is unset.
+ minor_changes:
+ - Add DataPlane V2 Support.
+ - Add auth support for GCP access tokens (#574).
+ - Add support for ip_allocation_policy->stack_type.
+ release_date: '2023-07-07'
+ 1.3.0:
+ changes:
+ minor_changes:
+ - anisble-test - integration tests are now run against 2.14.0 and 2.15.0
+ - ansible - 2.14.0 is now the minimum version supported
+ - ansible-lint - fixed over a thousand reported errors
+ - ansible-lint - upgraded to 6.22
+ - ansible-test - add support for GCP application default credentials (https://github.com/ansible-collections/google.cloud/issues/359).
+ - gcp_serviceusage_service - added backoff when checking for operation completion.
+ - gcp_serviceusage_service - use alloyb API for the integration test as spanner
+ conflicts with other tests
+ - gcp_sql_ssl_cert - made sha1_fingerprint optional, which enables resource
+ creation
+ - gcp_storage_default_object_acl - removed non-existent fields; the resource
+ is not usable.
+ fragments:
+ - app-default-creds.yml
+ - gcp_serviceusage_service.yml
+ - gcp_sql_ssl_cert.yml
+ - gcp_storage_default_object_acl.yml
+ - upgrade-versions.yml
+ release_date: '2023-11-22'
diff --git a/ansible_collections/google/cloud/changelogs/config.yaml b/ansible_collections/google/cloud/changelogs/config.yaml
index 9f7513d99..0b868692f 100644
--- a/ansible_collections/google/cloud/changelogs/config.yaml
+++ b/ansible_collections/google/cloud/changelogs/config.yaml
@@ -1,3 +1,4 @@
+---
changelog_filename_template: ../CHANGELOG.rst
changelog_filename_version_depth: 0
changes_file: changelog.yaml
@@ -11,22 +12,22 @@ prelude_section_name: release_summary
prelude_section_title: Release Summary
sanitize_changelog: true
sections:
-- - major_changes
- - Major Changes
-- - minor_changes
- - Minor Changes
-- - breaking_changes
- - Breaking Changes / Porting Guide
-- - deprecated_features
- - Deprecated Features
-- - removed_features
- - Removed Features (previously deprecated)
-- - security_fixes
- - Security Fixes
-- - bugfixes
- - Bugfixes
-- - known_issues
- - Known Issues
+ - - major_changes
+ - Major Changes
+ - - minor_changes
+ - Minor Changes
+ - - breaking_changes
+ - Breaking Changes / Porting Guide
+ - - deprecated_features
+ - Deprecated Features
+ - - removed_features
+ - Removed Features (previously deprecated)
+ - - security_fixes
+ - Security Fixes
+ - - bugfixes
+ - Bugfixes
+ - - known_issues
+ - Known Issues
title: Google.Cloud
trivial_section_name: trivial
use_fqcn: true
diff --git a/ansible_collections/google/cloud/meta/runtime.yml b/ansible_collections/google/cloud/meta/runtime.yml
index d28681a4d..ef3467047 100644
--- a/ansible_collections/google/cloud/meta/runtime.yml
+++ b/ansible_collections/google/cloud/meta/runtime.yml
@@ -1,5 +1,5 @@
---
-requires_ansible: '>=2.9.10'
+requires_ansible: ">=2.14.0"
action_groups:
gcp:
diff --git a/ansible_collections/google/cloud/molecule/gcloud/converge.yml b/ansible_collections/google/cloud/molecule/gcloud/converge.yml
index 869474587..7382caebc 100644
--- a/ansible_collections/google/cloud/molecule/gcloud/converge.yml
+++ b/ansible_collections/google/cloud/molecule/gcloud/converge.yml
@@ -14,13 +14,13 @@
ansible.builtin.file:
path: /etc/systemd/system/containerd.service.d
state: directory
- mode: 0755
+ mode: "0755"
when: ansible_service_mgr == "systemd"
- name: Override file for containerd
ansible.builtin.copy:
src: files/override.conf
dest: /etc/systemd/system/containerd.service.d/override.conf
- mode: 0644
+ mode: "0644"
when: ansible_service_mgr == "systemd"
roles:
- role: google.cloud.gcloud
diff --git a/ansible_collections/google/cloud/molecule/gcloud/molecule.yml b/ansible_collections/google/cloud/molecule/gcloud/molecule.yml
index 7b7ab5473..707639af5 100644
--- a/ansible_collections/google/cloud/molecule/gcloud/molecule.yml
+++ b/ansible_collections/google/cloud/molecule/gcloud/molecule.yml
@@ -9,15 +9,15 @@ lint: |
ansible-lint
platforms:
- name: instance
- image: ubuntu:18.04
+ image: ubuntu:20.04
privileged: true
- ansible.builtin.command: "/lib/systemd/systemd"
+ ansible.builtin.command: /lib/systemd/systemd
volumes:
- /sys/fs/cgroup:/sys/fs/cgroup:ro
- name: instance
- image: debian:9
+ image: debian:10
privileged: true
- ansible.builtin.command: "/lib/systemd/systemd"
+ ansible.builtin.command: /lib/systemd/systemd
volumes:
- /sys/fs/cgroup:/sys/fs/cgroup:ro
provisioner:
diff --git a/ansible_collections/google/cloud/molecule/gcloud/verify.yml b/ansible_collections/google/cloud/molecule/gcloud/verify.yml
index 86afba4ff..6e148b149 100644
--- a/ansible_collections/google/cloud/molecule/gcloud/verify.yml
+++ b/ansible_collections/google/cloud/molecule/gcloud/verify.yml
@@ -4,6 +4,6 @@
- name: Verify
hosts: all
tasks:
- - name: Example assertion
- ansible.builtin.assert:
- that: true
+ - name: Example assertion
+ ansible.builtin.assert:
+ that: true
diff --git a/ansible_collections/google/cloud/molecule/gcsfuse/molecule.yml b/ansible_collections/google/cloud/molecule/gcsfuse/molecule.yml
index 7b7ab5473..707639af5 100644
--- a/ansible_collections/google/cloud/molecule/gcsfuse/molecule.yml
+++ b/ansible_collections/google/cloud/molecule/gcsfuse/molecule.yml
@@ -9,15 +9,15 @@ lint: |
ansible-lint
platforms:
- name: instance
- image: ubuntu:18.04
+ image: ubuntu:20.04
privileged: true
- ansible.builtin.command: "/lib/systemd/systemd"
+ ansible.builtin.command: /lib/systemd/systemd
volumes:
- /sys/fs/cgroup:/sys/fs/cgroup:ro
- name: instance
- image: debian:9
+ image: debian:10
privileged: true
- ansible.builtin.command: "/lib/systemd/systemd"
+ ansible.builtin.command: /lib/systemd/systemd
volumes:
- /sys/fs/cgroup:/sys/fs/cgroup:ro
provisioner:
diff --git a/ansible_collections/google/cloud/molecule/gcsfuse/verify.yml b/ansible_collections/google/cloud/molecule/gcsfuse/verify.yml
index 86afba4ff..6e148b149 100644
--- a/ansible_collections/google/cloud/molecule/gcsfuse/verify.yml
+++ b/ansible_collections/google/cloud/molecule/gcsfuse/verify.yml
@@ -4,6 +4,6 @@
- name: Verify
hosts: all
tasks:
- - name: Example assertion
- ansible.builtin.assert:
- that: true
+ - name: Example assertion
+ ansible.builtin.assert:
+ that: true
diff --git a/ansible_collections/google/cloud/plugins/doc_fragments/gcp.py b/ansible_collections/google/cloud/plugins/doc_fragments/gcp.py
index 5dfeb00e6..a2d521240 100644
--- a/ansible_collections/google/cloud/plugins/doc_fragments/gcp.py
+++ b/ansible_collections/google/cloud/plugins/doc_fragments/gcp.py
@@ -47,7 +47,7 @@ options:
type: str
notes:
- for authentication, you can set service_account_file using the
- c(gcp_service_account_file) env variable.
+ c(GCP_SERVICE_ACCOUNT_FILE) env variable.
- for authentication, you can set service_account_contents using the
c(GCP_SERVICE_ACCOUNT_CONTENTS) env variable.
- For authentication, you can set service_account_email using the
diff --git a/ansible_collections/google/cloud/plugins/filter/gcp_kms_filters.py b/ansible_collections/google/cloud/plugins/filter/gcp_kms_filters.py
index 9be0be0df..44ae8d0ac 100644
--- a/ansible_collections/google/cloud/plugins/filter/gcp_kms_filters.py
+++ b/ansible_collections/google/cloud/plugins/filter/gcp_kms_filters.py
@@ -39,6 +39,7 @@ class GcpKmsFilter():
'auth_kind': kwargs.get('auth_kind', None),
'service_account_file': kwargs.get('service_account_file', None),
'service_account_email': kwargs.get('service_account_email', None),
+ 'access_token': kwargs.get('access_token', None),
}
if not params['scopes']:
params['scopes'] = ['https://www.googleapis.com/auth/cloudkms']
diff --git a/ansible_collections/google/cloud/plugins/inventory/gcp_compute.py b/ansible_collections/google/cloud/plugins/inventory/gcp_compute.py
index d380acd96..f4743b292 100644
--- a/ansible_collections/google/cloud/plugins/inventory/gcp_compute.py
+++ b/ansible_collections/google/cloud/plugins/inventory/gcp_compute.py
@@ -39,7 +39,7 @@ DOCUMENTATION = """
description: >
A list of filter value pairs. Available filters are listed here
U(https://cloud.google.com/compute/docs/reference/rest/v1/instances/aggregatedList).
- Each additional filter in the list will act be added as an AND condition
+ Each additional filter in the list will be added as an AND condition
(filter1 and filter2)
type: list
hostnames:
@@ -57,7 +57,7 @@ DOCUMENTATION = """
description:
- The type of credential used.
required: True
- choices: ['application', 'serviceaccount', 'machineaccount']
+ choices: ['application', 'serviceaccount', 'machineaccount', 'accesstoken']
env:
- name: GCP_AUTH_KIND
scopes:
@@ -86,6 +86,11 @@ DOCUMENTATION = """
and the user does not wish to use the default email.
env:
- name: GCP_SERVICE_ACCOUNT_EMAIL
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ env:
+ - name: GCP_ACCESS_TOKEN
vars_prefix:
description: prefix to apply to host variables, does not include facts nor params
default: ''
@@ -232,7 +237,8 @@ class GcpInstance(object):
for order in self.hostname_ordering:
name = None
if order.startswith("labels."):
- name = self.json["labels"].get(order[7:])
+ if "labels" in self.json:
+ name = self.json["labels"].get(order[7:])
elif order == "public_ip":
name = self._get_publicip()
elif order == "private_ip":
@@ -558,6 +564,7 @@ class InventoryModule(BaseInventoryPlugin, Constructable, Cacheable):
"service_account_file": self.get_option("service_account_file"),
"service_account_contents": self.get_option("service_account_contents"),
"service_account_email": self.get_option("service_account_email"),
+ "access_token": self.get_option("access_token"),
}
self.fake_module = GcpMockModule(params)
diff --git a/ansible_collections/google/cloud/plugins/module_utils/gcp_utils.py b/ansible_collections/google/cloud/plugins/module_utils/gcp_utils.py
index 203000cc6..baf9a6c02 100644
--- a/ansible_collections/google/cloud/plugins/module_utils/gcp_utils.py
+++ b/ansible_collections/google/cloud/plugins/module_utils/gcp_utils.py
@@ -5,7 +5,6 @@ from __future__ import (absolute_import, division, print_function)
__metaclass__ = type
-import ast
import os
import json
@@ -18,15 +17,14 @@ except ImportError:
try:
import google.auth
import google.auth.compute_engine
- from google.oauth2 import service_account
+ from google.oauth2 import service_account, credentials as oauth2
from google.auth.transport.requests import AuthorizedSession
HAS_GOOGLE_LIBRARIES = True
except ImportError:
HAS_GOOGLE_LIBRARIES = False
from ansible.module_utils.basic import AnsibleModule, env_fallback
-from ansible.module_utils.six import string_types
-from ansible.module_utils._text import to_text, to_native
+from ansible.module_utils._text import to_text
def navigate_hash(source, path, default=None):
@@ -213,6 +211,11 @@ class GcpSession(object):
msg="Service Account File only works with Service Account-based authentication"
)
+ if self.module.params.get('access_token') is not None and self.module.params['auth_kind'] != 'accesstoken':
+ self.module.fail_json(
+ msg='Supplying access_token requires auth_kind set to accesstoken'
+ )
+
def _credentials(self):
cred_type = self.module.params['auth_kind']
@@ -246,8 +249,17 @@ class GcpSession(object):
return svc_acct_creds.with_scopes(self.module.params['scopes'])
if cred_type == 'machineaccount':
- return google.auth.compute_engine.Credentials(
- self.module.params['service_account_email'])
+ email = self.module.params['service_account_email']
+ email = email if email is not None else "default"
+ return google.auth.compute_engine.Credentials(email)
+
+ if cred_type == 'accesstoken':
+ access_token = self.module.params['access_token']
+ if access_token is None:
+ self.module.fail_json(
+ msg='An access token must be supplied when auth_kind is accesstoken'
+ )
+ return oauth2.Credentials(access_token, scopes=self.module.params['scopes'])
self.module.fail_json(msg="Credential type '%s' not implemented" % cred_type)
@@ -279,7 +291,7 @@ class GcpModule(AnsibleModule):
auth_kind=dict(
required=True,
fallback=(env_fallback, ['GCP_AUTH_KIND']),
- choices=['machineaccount', 'serviceaccount', 'application'],
+ choices=['machineaccount', 'serviceaccount', 'accesstoken', 'application'],
type='str'),
service_account_email=dict(
required=False,
@@ -294,6 +306,11 @@ class GcpModule(AnsibleModule):
fallback=(env_fallback, ['GCP_SERVICE_ACCOUNT_CONTENTS']),
no_log=True,
type='jsonarg'),
+ access_token=dict(
+ required=False,
+ fallback=(env_fallback, ['GCP_ACCESS_TOKEN']),
+ no_log=True,
+ type='str'),
scopes=dict(
required=False,
fallback=(env_fallback, ['GCP_SCOPES']),
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_appengine_firewall_rule.py b/ansible_collections/google/cloud/plugins/modules/gcp_appengine_firewall_rule.py
index 508189fe0..f0dbd61c6 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_appengine_firewall_rule.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_appengine_firewall_rule.py
@@ -87,6 +87,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -101,6 +102,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -121,6 +126,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -171,7 +178,7 @@ priority:
# Imports
################################################################################
-from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest, replace_resource_dict
+from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest
import json
################################################################################
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_appengine_firewall_rule_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_appengine_firewall_rule_info.py
index 639e16f85..7206b1570 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_appengine_firewall_rule_info.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_appengine_firewall_rule_info.py
@@ -52,6 +52,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -66,6 +67,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -84,6 +89,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -134,7 +141,7 @@ resources:
################################################################################
# Imports
################################################################################
-from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest
+from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule
import json
################################################################################
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_bigquery_dataset.py b/ansible_collections/google/cloud/plugins/modules/gcp_bigquery_dataset.py
index 85ad27681..efc365ae7 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_bigquery_dataset.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_bigquery_dataset.py
@@ -224,6 +224,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -238,6 +239,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -258,6 +263,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -472,7 +479,6 @@ from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import (
GcpModule,
GcpRequest,
remove_nones_from_dict,
- replace_resource_dict,
)
import json
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_bigquery_dataset_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_bigquery_dataset_info.py
index cc4852147..ca689a638 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_bigquery_dataset_info.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_bigquery_dataset_info.py
@@ -52,6 +52,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -66,6 +67,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -84,6 +89,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -295,7 +302,7 @@ resources:
################################################################################
# Imports
################################################################################
-from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest
+from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule
import json
################################################################################
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_bigquery_table.py b/ansible_collections/google/cloud/plugins/modules/gcp_bigquery_table.py
index d02d220cb..b0021e215 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_bigquery_table.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_bigquery_table.py
@@ -475,6 +475,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -489,6 +490,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -994,7 +999,6 @@ from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import (
GcpModule,
GcpRequest,
remove_nones_from_dict,
- replace_resource_dict,
)
import json
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_bigquery_table_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_bigquery_table_info.py
index 99b89acb1..a67af9590 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_bigquery_table_info.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_bigquery_table_info.py
@@ -57,6 +57,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -71,6 +72,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -89,6 +94,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -574,7 +581,7 @@ resources:
################################################################################
# Imports
################################################################################
-from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest
+from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule
import json
################################################################################
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_bigtable_instance.py b/ansible_collections/google/cloud/plugins/modules/gcp_bigtable_instance.py
index b70b00456..e219cb22b 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_bigtable_instance.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_bigtable_instance.py
@@ -117,6 +117,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -131,6 +132,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -235,7 +240,6 @@ from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import (
GcpModule,
GcpRequest,
remove_nones_from_dict,
- replace_resource_dict,
)
import json
import time
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_bigtable_instance_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_bigtable_instance_info.py
index deefad028..6c8f4160f 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_bigtable_instance_info.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_bigtable_instance_info.py
@@ -52,6 +52,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -66,6 +67,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -84,6 +89,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -172,7 +179,7 @@ resources:
################################################################################
# Imports
################################################################################
-from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest
+from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule
import json
################################################################################
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_cloudbuild_trigger.py b/ansible_collections/google/cloud/plugins/modules/gcp_cloudbuild_trigger.py
index da506a0f0..b252f86f7 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_cloudbuild_trigger.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_cloudbuild_trigger.py
@@ -727,6 +727,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -741,6 +742,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -761,6 +766,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -1482,7 +1489,6 @@ from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import (
GcpModule,
GcpRequest,
remove_nones_from_dict,
- replace_resource_dict,
)
import json
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_cloudbuild_trigger_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_cloudbuild_trigger_info.py
index 78c4990aa..c8a9202d0 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_cloudbuild_trigger_info.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_cloudbuild_trigger_info.py
@@ -52,6 +52,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -66,6 +67,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -84,6 +89,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -798,7 +805,7 @@ resources:
################################################################################
# Imports
################################################################################
-from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest
+from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule
import json
################################################################################
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_cloudfunctions_cloud_function.py b/ansible_collections/google/cloud/plugins/modules/gcp_cloudfunctions_cloud_function.py
index 0b3c38ce1..e09ed7be6 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_cloudfunctions_cloud_function.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_cloudfunctions_cloud_function.py
@@ -174,6 +174,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -188,6 +189,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -369,7 +374,6 @@ from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import (
GcpModule,
GcpRequest,
remove_nones_from_dict,
- replace_resource_dict,
)
import json
import re
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_cloudfunctions_cloud_function_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_cloudfunctions_cloud_function_info.py
index 36fc75308..075fd8634 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_cloudfunctions_cloud_function_info.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_cloudfunctions_cloud_function_info.py
@@ -57,6 +57,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -71,6 +72,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -89,6 +94,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -257,7 +264,7 @@ resources:
################################################################################
# Imports
################################################################################
-from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest
+from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule
import json
################################################################################
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_cloudscheduler_job.py b/ansible_collections/google/cloud/plugins/modules/gcp_cloudscheduler_job.py
index 40559ff4c..8a9305354 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_cloudscheduler_job.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_cloudscheduler_job.py
@@ -310,6 +310,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -324,6 +325,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -344,6 +349,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -627,7 +634,6 @@ from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import (
GcpModule,
GcpRequest,
remove_nones_from_dict,
- replace_resource_dict,
)
import json
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_cloudscheduler_job_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_cloudscheduler_job_info.py
index 4ab155ebb..29ba1236a 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_cloudscheduler_job_info.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_cloudscheduler_job_info.py
@@ -57,6 +57,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -71,6 +72,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -89,6 +94,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -363,7 +370,7 @@ resources:
################################################################################
# Imports
################################################################################
-from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest
+from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule
import json
################################################################################
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_cloudtasks_queue.py b/ansible_collections/google/cloud/plugins/modules/gcp_cloudtasks_queue.py
index b2858599b..f8b98f488 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_cloudtasks_queue.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_cloudtasks_queue.py
@@ -188,6 +188,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -202,6 +203,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -384,7 +389,6 @@ from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import (
GcpModule,
GcpRequest,
remove_nones_from_dict,
- replace_resource_dict,
)
import json
import re
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_cloudtasks_queue_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_cloudtasks_queue_info.py
index 95f306b40..631b10de3 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_cloudtasks_queue_info.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_cloudtasks_queue_info.py
@@ -57,6 +57,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -71,6 +72,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -89,6 +94,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -263,7 +270,7 @@ resources:
################################################################################
# Imports
################################################################################
-from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest
+from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule
import json
################################################################################
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_address.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_address.py
index 122db491f..55fd596bb 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_address.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_address.py
@@ -153,6 +153,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -167,6 +168,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -188,6 +193,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_address_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_address_info.py
index bbd8c2c80..247d89272 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_address_info.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_address_info.py
@@ -65,6 +65,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -79,6 +80,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -97,6 +102,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -219,7 +226,7 @@ resources:
################################################################################
# Imports
################################################################################
-from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest
+from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule
import json
################################################################################
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_autoscaler.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_autoscaler.py
index d3acc7846..267116f7f 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_autoscaler.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_autoscaler.py
@@ -260,6 +260,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -274,6 +275,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -294,6 +299,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_autoscaler_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_autoscaler_info.py
index f8df9f4d5..110c10da9 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_autoscaler_info.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_autoscaler_info.py
@@ -64,6 +64,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -78,6 +79,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -96,6 +101,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -304,7 +311,7 @@ resources:
################################################################################
# Imports
################################################################################
-from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest
+from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule
import json
################################################################################
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_backend_bucket.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_backend_bucket.py
index 5746a0bab..420b59346 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_backend_bucket.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_backend_bucket.py
@@ -174,6 +174,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -188,6 +189,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -208,6 +213,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -366,7 +373,6 @@ from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import (
GcpModule,
GcpRequest,
remove_nones_from_dict,
- replace_resource_dict,
)
import json
import time
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_backend_bucket_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_backend_bucket_info.py
index 31d098398..aaf40e327 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_backend_bucket_info.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_backend_bucket_info.py
@@ -59,6 +59,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -73,6 +74,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -91,6 +96,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -236,7 +243,7 @@ resources:
################################################################################
# Imports
################################################################################
-from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest
+from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule
import json
################################################################################
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_backend_service.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_backend_service.py
index a637a9e9b..b259848ff 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_backend_service.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_backend_service.py
@@ -702,6 +702,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -716,6 +717,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -736,6 +741,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -1410,7 +1417,6 @@ from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import (
GcpModule,
GcpRequest,
remove_nones_from_dict,
- replace_resource_dict,
)
import json
import time
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_backend_service_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_backend_service_info.py
index 415b28fd5..5e715778a 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_backend_service_info.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_backend_service_info.py
@@ -59,6 +59,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -73,6 +74,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -91,6 +96,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -746,7 +753,7 @@ resources:
################################################################################
# Imports
################################################################################
-from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest
+from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule
import json
################################################################################
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_disk.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_disk.py
index 0dd36e2a1..8409cac7b 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_disk.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_disk.py
@@ -238,6 +238,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -252,6 +253,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -272,6 +277,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_disk_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_disk_info.py
index 1abc5c4ca..8e3646825 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_disk_info.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_disk_info.py
@@ -64,6 +64,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -78,6 +79,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -96,6 +101,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -359,7 +366,7 @@ resources:
################################################################################
# Imports
################################################################################
-from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest
+from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule
import json
################################################################################
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_external_vpn_gateway.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_external_vpn_gateway.py
index 48471504e..e2d96b131 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_external_vpn_gateway.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_external_vpn_gateway.py
@@ -104,6 +104,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -118,6 +119,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -137,6 +142,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -212,7 +219,6 @@ from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import (
GcpModule,
GcpRequest,
remove_nones_from_dict,
- replace_resource_dict,
)
import json
import time
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_external_vpn_gateway_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_external_vpn_gateway_info.py
index cb4772660..6e2e0d0f4 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_external_vpn_gateway_info.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_external_vpn_gateway_info.py
@@ -59,6 +59,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -73,6 +74,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -91,6 +96,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -159,7 +166,7 @@ resources:
################################################################################
# Imports
################################################################################
-from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest
+from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule
import json
################################################################################
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_firewall.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_firewall.py
index 08f044492..cee64bc75 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_firewall.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_firewall.py
@@ -263,6 +263,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -277,6 +278,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -297,6 +302,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_firewall_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_firewall_info.py
index 6b90c57ea..dfc105ee1 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_firewall_info.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_firewall_info.py
@@ -59,6 +59,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -73,6 +74,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -91,6 +96,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -306,7 +313,7 @@ resources:
################################################################################
# Imports
################################################################################
-from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest
+from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule
import json
################################################################################
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_forwarding_rule.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_forwarding_rule.py
index f1c13cc8b..8141605ea 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_forwarding_rule.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_forwarding_rule.py
@@ -237,6 +237,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -251,6 +252,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -271,6 +276,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_forwarding_rule_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_forwarding_rule_info.py
index f13135d54..87dcb899d 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_forwarding_rule_info.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_forwarding_rule_info.py
@@ -65,6 +65,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -79,6 +80,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -97,6 +102,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -298,7 +305,7 @@ resources:
################################################################################
# Imports
################################################################################
-from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest
+from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule
import json
################################################################################
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_global_address.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_global_address.py
index d1f02bdff..22815350c 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_global_address.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_global_address.py
@@ -124,6 +124,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -138,6 +139,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -158,6 +163,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_global_address_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_global_address_info.py
index a6cc0b882..34aa1755b 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_global_address_info.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_global_address_info.py
@@ -59,6 +59,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -73,6 +74,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -91,6 +96,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -189,7 +196,7 @@ resources:
################################################################################
# Imports
################################################################################
-from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest
+from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule
import json
################################################################################
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_global_forwarding_rule.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_global_forwarding_rule.py
index a9bb647f6..158caab88 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_global_forwarding_rule.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_global_forwarding_rule.py
@@ -217,6 +217,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -231,6 +232,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_global_forwarding_rule_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_global_forwarding_rule_info.py
index 292489cbf..735d622ac 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_global_forwarding_rule_info.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_global_forwarding_rule_info.py
@@ -59,6 +59,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -73,6 +74,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -91,6 +96,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -273,7 +280,7 @@ resources:
################################################################################
# Imports
################################################################################
-from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest
+from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule
import json
################################################################################
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_health_check.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_health_check.py
index e48b07c64..ca4c6428f 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_health_check.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_health_check.py
@@ -472,6 +472,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -486,6 +487,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -506,6 +511,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -916,7 +923,6 @@ from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import (
GcpModule,
GcpRequest,
remove_nones_from_dict,
- replace_resource_dict,
)
import json
import time
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_health_check_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_health_check_info.py
index 3f323c7f5..b6876f25d 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_health_check_info.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_health_check_info.py
@@ -59,6 +59,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -73,6 +74,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -91,6 +96,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -511,7 +518,7 @@ resources:
################################################################################
# Imports
################################################################################
-from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest
+from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule
import json
################################################################################
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_http_health_check.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_http_health_check.py
index c5da8434f..ee1bae398 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_http_health_check.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_http_health_check.py
@@ -125,6 +125,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -139,6 +140,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -159,6 +164,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -255,7 +262,7 @@ unhealthyThreshold:
# Imports
################################################################################
-from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest, replace_resource_dict
+from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest
import json
import time
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_http_health_check_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_http_health_check_info.py
index 2c77d1282..547fdc9ac 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_http_health_check_info.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_http_health_check_info.py
@@ -59,6 +59,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -73,6 +74,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -91,6 +96,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -188,7 +195,7 @@ resources:
################################################################################
# Imports
################################################################################
-from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest
+from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule
import json
################################################################################
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_https_health_check.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_https_health_check.py
index 8a60ce15d..cd38bb192 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_https_health_check.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_https_health_check.py
@@ -122,6 +122,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -136,6 +137,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -156,6 +161,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -252,7 +259,7 @@ unhealthyThreshold:
# Imports
################################################################################
-from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest, replace_resource_dict
+from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest
import json
import time
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_https_health_check_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_https_health_check_info.py
index 0ff65140d..58af6d454 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_https_health_check_info.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_https_health_check_info.py
@@ -59,6 +59,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -73,6 +74,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -91,6 +96,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -188,7 +195,7 @@ resources:
################################################################################
# Imports
################################################################################
-from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest
+from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule
import json
################################################################################
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_image.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_image.py
index c7080564b..66d897a39 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_image.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_image.py
@@ -229,6 +229,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -243,6 +244,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -263,6 +268,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_image_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_image_info.py
index afd396270..2f1acd14d 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_image_info.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_image_info.py
@@ -59,6 +59,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -73,6 +74,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -91,6 +96,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -335,7 +342,7 @@ resources:
################################################################################
# Imports
################################################################################
-from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest
+from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule
import json
################################################################################
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_instance.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_instance.py
index 703ec4c2f..1d7f56e9f 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_instance.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_instance.py
@@ -522,6 +522,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -536,6 +537,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_instance_group.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_instance_group.py
index 419e78845..8f65b4b27 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_instance_group.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_instance_group.py
@@ -138,6 +138,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -152,6 +153,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_instance_group_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_instance_group_info.py
index 6a3ec0c3b..a8d304569 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_instance_group_info.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_instance_group_info.py
@@ -64,6 +64,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -78,6 +79,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -96,6 +101,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -197,7 +204,7 @@ resources:
################################################################################
# Imports
################################################################################
-from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest
+from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule
import json
################################################################################
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_instance_group_manager.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_instance_group_manager.py
index 6b6c05f16..776503d58 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_instance_group_manager.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_instance_group_manager.py
@@ -136,6 +136,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -150,6 +151,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_instance_group_manager_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_instance_group_manager_info.py
index 47ec986bb..16a6e5767 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_instance_group_manager_info.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_instance_group_manager_info.py
@@ -64,6 +64,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -78,6 +79,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -96,6 +101,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -272,7 +279,7 @@ resources:
################################################################################
# Imports
################################################################################
-from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest
+from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule
import json
################################################################################
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_instance_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_instance_info.py
index 45ff87553..e12b957a3 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_instance_info.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_instance_info.py
@@ -68,6 +68,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -82,6 +83,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -100,6 +105,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -601,7 +608,6 @@ from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import (
navigate_hash,
GcpSession,
GcpModule,
- GcpRequest,
)
import json
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_instance_template.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_instance_template.py
index 078569263..ce4a8eb46 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_instance_template.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_instance_template.py
@@ -485,6 +485,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -499,6 +500,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_instance_template_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_instance_template_info.py
index b08cdfaab..2d337cf1b 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_instance_template_info.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_instance_template_info.py
@@ -59,6 +59,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -73,6 +74,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -91,6 +96,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -544,7 +551,7 @@ resources:
################################################################################
# Imports
################################################################################
-from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest
+from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule
import json
################################################################################
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_interconnect_attachment.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_interconnect_attachment.py
index 7a2c8037c..5deac092b 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_interconnect_attachment.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_interconnect_attachment.py
@@ -194,6 +194,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -208,6 +209,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_interconnect_attachment_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_interconnect_attachment_info.py
index 933bdecb5..20b90bebe 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_interconnect_attachment_info.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_interconnect_attachment_info.py
@@ -64,6 +64,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -78,6 +79,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -96,6 +101,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -304,7 +311,7 @@ resources:
################################################################################
# Imports
################################################################################
-from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest
+from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule
import json
################################################################################
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_network.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_network.py
index acaf59dcc..e093195fa 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_network.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_network.py
@@ -108,6 +108,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -122,6 +123,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -142,6 +147,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -239,7 +246,6 @@ from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import (
GcpModule,
GcpRequest,
remove_nones_from_dict,
- replace_resource_dict,
)
import json
import time
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_network_endpoint_group.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_network_endpoint_group.py
index 9712c42d9..d6350de28 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_network_endpoint_group.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_network_endpoint_group.py
@@ -124,6 +124,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -138,6 +139,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -158,6 +163,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_network_endpoint_group_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_network_endpoint_group_info.py
index 8f9d1a8e8..b36afb099 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_network_endpoint_group_info.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_network_endpoint_group_info.py
@@ -64,6 +64,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -78,6 +79,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -96,6 +101,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -176,7 +183,7 @@ resources:
################################################################################
# Imports
################################################################################
-from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest
+from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule
import json
################################################################################
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_network_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_network_info.py
index f2b7c498f..7896facb7 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_network_info.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_network_info.py
@@ -59,6 +59,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -73,6 +74,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -91,6 +96,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -186,7 +193,7 @@ resources:
################################################################################
# Imports
################################################################################
-from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest
+from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule
import json
################################################################################
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_node_group.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_node_group.py
index e8bf72577..c42311079 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_node_group.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_node_group.py
@@ -141,6 +141,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -155,6 +156,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -175,6 +180,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_node_group_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_node_group_info.py
index 68f340994..6864c281c 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_node_group_info.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_node_group_info.py
@@ -64,6 +64,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -78,6 +79,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -96,6 +101,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -203,7 +210,7 @@ resources:
################################################################################
# Imports
################################################################################
-from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest
+from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule
import json
################################################################################
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_node_template.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_node_template.py
index 5db26eaea..5de307c26 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_node_template.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_node_template.py
@@ -135,6 +135,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -149,6 +150,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -169,6 +174,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -280,7 +287,6 @@ from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import (
GcpModule,
GcpRequest,
remove_nones_from_dict,
- replace_resource_dict,
)
import json
import re
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_node_template_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_node_template_info.py
index 6859ca83e..5219bc602 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_node_template_info.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_node_template_info.py
@@ -64,6 +64,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -78,6 +79,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -96,6 +101,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -204,7 +211,7 @@ resources:
################################################################################
# Imports
################################################################################
-from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest
+from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule
import json
################################################################################
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_autoscaler.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_autoscaler.py
index 06cadd33f..6d4cca956 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_autoscaler.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_autoscaler.py
@@ -237,6 +237,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -251,6 +252,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -271,6 +276,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -539,7 +546,6 @@ from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import (
GcpModule,
GcpRequest,
remove_nones_from_dict,
- replace_resource_dict,
)
import json
import time
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_autoscaler_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_autoscaler_info.py
index f53968e28..64114af2c 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_autoscaler_info.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_autoscaler_info.py
@@ -64,6 +64,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -78,6 +79,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -96,6 +101,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -304,7 +311,7 @@ resources:
################################################################################
# Imports
################################################################################
-from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest
+from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule
import json
################################################################################
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_backend_service.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_backend_service.py
index 0ad1bcc5c..557e92d26 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_backend_service.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_backend_service.py
@@ -718,6 +718,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -732,6 +733,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -752,6 +757,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_backend_service_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_backend_service_info.py
index 74bea5cb0..685f48ff0 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_backend_service_info.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_backend_service_info.py
@@ -64,6 +64,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -78,6 +79,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -96,6 +101,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -771,7 +778,7 @@ resources:
################################################################################
# Imports
################################################################################
-from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest
+from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule
import json
################################################################################
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_disk.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_disk.py
index 17d128562..673d925ae 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_disk.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_disk.py
@@ -176,6 +176,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -190,6 +191,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -210,6 +215,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -398,7 +405,6 @@ from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import (
GcpModule,
GcpRequest,
remove_nones_from_dict,
- replace_resource_dict,
)
import json
import re
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_disk_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_disk_info.py
index 648b4b874..6e70b4dac 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_disk_info.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_disk_info.py
@@ -64,6 +64,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -78,6 +79,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -96,6 +101,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -277,7 +284,7 @@ resources:
################################################################################
# Imports
################################################################################
-from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest
+from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule
import json
################################################################################
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_health_check.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_health_check.py
index 745f9a579..fcbad2136 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_health_check.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_health_check.py
@@ -472,6 +472,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -486,6 +487,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -506,6 +511,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -922,7 +929,6 @@ from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import (
GcpModule,
GcpRequest,
remove_nones_from_dict,
- replace_resource_dict,
)
import json
import re
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_health_check_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_health_check_info.py
index d9d427694..38b4a7caa 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_health_check_info.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_health_check_info.py
@@ -64,6 +64,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -78,6 +79,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -96,6 +101,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -522,7 +529,7 @@ resources:
################################################################################
# Imports
################################################################################
-from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest
+from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule
import json
################################################################################
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_instance_group_manager.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_instance_group_manager.py
index c2f77b8d5..267e7f17f 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_instance_group_manager.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_instance_group_manager.py
@@ -154,6 +154,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -168,6 +169,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_instance_group_manager_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_instance_group_manager_info.py
index b32014973..43816fd24 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_instance_group_manager_info.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_instance_group_manager_info.py
@@ -64,6 +64,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -78,6 +79,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -96,6 +101,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -285,7 +292,7 @@ resources:
################################################################################
# Imports
################################################################################
-from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest
+from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule
import json
################################################################################
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_target_http_proxy.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_target_http_proxy.py
index ec2709564..c409f586e 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_target_http_proxy.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_target_http_proxy.py
@@ -92,6 +92,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -106,6 +107,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -126,6 +131,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_target_http_proxy_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_target_http_proxy_info.py
index 3ef0366ad..f53beca57 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_target_http_proxy_info.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_target_http_proxy_info.py
@@ -64,6 +64,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -78,6 +79,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -96,6 +101,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -160,7 +167,7 @@ resources:
################################################################################
# Imports
################################################################################
-from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest
+from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule
import json
################################################################################
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_target_https_proxy.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_target_https_proxy.py
index 478563398..91dfd3cca 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_target_https_proxy.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_target_https_proxy.py
@@ -100,6 +100,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -114,6 +115,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -134,6 +139,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_target_https_proxy_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_target_https_proxy_info.py
index 0af28904c..fdb9f99ab 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_target_https_proxy_info.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_target_https_proxy_info.py
@@ -64,6 +64,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -78,6 +79,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -96,6 +101,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -167,7 +174,7 @@ resources:
################################################################################
# Imports
################################################################################
-from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest
+from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule
import json
################################################################################
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_url_map.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_url_map.py
index ac46b1ca8..1d8c9c315 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_url_map.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_url_map.py
@@ -1602,6 +1602,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -1616,6 +1617,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_url_map_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_url_map_info.py
index ae5f174ca..3b5cdb71c 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_url_map_info.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_region_url_map_info.py
@@ -64,6 +64,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -78,6 +79,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -96,6 +101,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -1588,7 +1595,7 @@ resources:
################################################################################
# Imports
################################################################################
-from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest
+from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule
import json
################################################################################
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_reservation.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_reservation.py
index 8c82f8417..c0a9dd029 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_reservation.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_reservation.py
@@ -162,6 +162,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -176,6 +177,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -196,6 +201,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -349,7 +356,6 @@ from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import (
GcpModule,
GcpRequest,
remove_nones_from_dict,
- replace_resource_dict,
)
import json
import time
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_reservation_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_reservation_info.py
index ee9ae46ba..ba42f85f5 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_reservation_info.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_reservation_info.py
@@ -64,6 +64,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -78,6 +79,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -96,6 +101,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -242,7 +249,7 @@ resources:
################################################################################
# Imports
################################################################################
-from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest
+from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule
import json
################################################################################
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_resource_policy.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_resource_policy.py
index 5a668ce09..756685f79 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_resource_policy.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_resource_policy.py
@@ -274,6 +274,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -288,6 +289,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -533,7 +538,6 @@ from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import (
GcpModule,
GcpRequest,
remove_nones_from_dict,
- replace_resource_dict,
)
import json
import time
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_resource_policy_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_resource_policy_info.py
index 1aeb54766..545a3bfef 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_resource_policy_info.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_resource_policy_info.py
@@ -64,6 +64,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -78,6 +79,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -96,6 +101,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -330,7 +337,7 @@ resources:
################################################################################
# Imports
################################################################################
-from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest
+from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule
import json
################################################################################
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_route.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_route.py
index 3da7d0fa6..12b8bec29 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_route.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_route.py
@@ -174,6 +174,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -188,6 +189,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -208,6 +213,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_route_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_route_info.py
index 034a3155e..86e9ab490 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_route_info.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_route_info.py
@@ -59,6 +59,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -73,6 +74,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -91,6 +96,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -201,7 +208,7 @@ resources:
################################################################################
# Imports
################################################################################
-from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest
+from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule
import json
################################################################################
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_router.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_router.py
index 77efcbc40..d64d212f5 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_router.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_router.py
@@ -141,6 +141,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -155,6 +156,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -175,6 +180,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_router_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_router_info.py
index 25e148dfa..d595d1991 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_router_info.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_router_info.py
@@ -64,6 +64,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -78,6 +79,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -96,6 +101,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -206,7 +213,7 @@ resources:
################################################################################
# Imports
################################################################################
-from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest
+from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule
import json
################################################################################
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_snapshot.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_snapshot.py
index 7f2a61695..5759fbfa0 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_snapshot.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_snapshot.py
@@ -157,6 +157,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -171,6 +172,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -191,6 +196,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_snapshot_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_snapshot_info.py
index e1d98952f..26963f3ce 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_snapshot_info.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_snapshot_info.py
@@ -59,6 +59,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -73,6 +74,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -91,6 +96,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -244,7 +251,7 @@ resources:
################################################################################
# Imports
################################################################################
-from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest
+from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule
import json
################################################################################
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_ssl_certificate.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_ssl_certificate.py
index 15ddabafc..d2f4680da 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_ssl_certificate.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_ssl_certificate.py
@@ -89,6 +89,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -103,6 +104,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -123,6 +128,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -208,7 +215,7 @@ privateKey:
# Imports
################################################################################
-from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest, replace_resource_dict
+from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest
import json
import time
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_ssl_certificate_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_ssl_certificate_info.py
index e030ce834..27b4ce260 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_ssl_certificate_info.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_ssl_certificate_info.py
@@ -59,6 +59,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -73,6 +74,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -91,6 +96,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -155,7 +162,7 @@ resources:
################################################################################
# Imports
################################################################################
-from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest
+from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule
import json
################################################################################
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_ssl_policy.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_ssl_policy.py
index 57cda0d2f..64a62fda6 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_ssl_policy.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_ssl_policy.py
@@ -99,6 +99,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -113,6 +114,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -133,6 +138,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -240,7 +247,6 @@ from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import (
GcpModule,
GcpRequest,
remove_nones_from_dict,
- replace_resource_dict,
)
import json
import time
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_ssl_policy_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_ssl_policy_info.py
index a194ebec7..04219c88e 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_ssl_policy_info.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_ssl_policy_info.py
@@ -59,6 +59,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -73,6 +74,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -91,6 +96,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -191,7 +198,7 @@ resources:
################################################################################
# Imports
################################################################################
-from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest
+from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule
import json
################################################################################
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_subnetwork.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_subnetwork.py
index 3fc743802..7642dc214 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_subnetwork.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_subnetwork.py
@@ -151,6 +151,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -165,6 +166,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -186,6 +191,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_subnetwork_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_subnetwork_info.py
index 428e35dc5..5b126f29e 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_subnetwork_info.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_subnetwork_info.py
@@ -64,6 +64,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -78,6 +79,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -96,6 +101,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -210,7 +217,7 @@ resources:
################################################################################
# Imports
################################################################################
-from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest
+from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule
import json
################################################################################
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_http_proxy.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_http_proxy.py
index 647a9c4ff..5e92ee6bb 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_http_proxy.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_http_proxy.py
@@ -93,6 +93,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -107,6 +108,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -127,6 +132,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_http_proxy_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_http_proxy_info.py
index 42fbfceba..6a78af427 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_http_proxy_info.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_http_proxy_info.py
@@ -59,6 +59,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -73,6 +74,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -91,6 +96,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -155,7 +162,7 @@ resources:
################################################################################
# Imports
################################################################################
-from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest
+from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule
import json
################################################################################
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_https_proxy.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_https_proxy.py
index fa15ab92a..c6927302e 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_https_proxy.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_https_proxy.py
@@ -121,6 +121,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -135,6 +136,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -155,6 +160,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_https_proxy_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_https_proxy_info.py
index 197237c11..b4186a9ee 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_https_proxy_info.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_https_proxy_info.py
@@ -59,6 +59,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -73,6 +74,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -91,6 +96,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -177,7 +184,7 @@ resources:
################################################################################
# Imports
################################################################################
-from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest
+from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule
import json
################################################################################
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_instance.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_instance.py
index e3fd58e68..686886dc0 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_instance.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_instance.py
@@ -104,6 +104,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -118,6 +119,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -138,6 +143,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_instance_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_instance_info.py
index 106f0ce43..791fb0a4b 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_instance_info.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_instance_info.py
@@ -64,6 +64,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -78,6 +79,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -96,6 +101,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -162,7 +169,7 @@ resources:
################################################################################
# Imports
################################################################################
-from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest
+from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule
import json
################################################################################
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_pool.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_pool.py
index b5643afa5..48118c120 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_pool.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_pool.py
@@ -146,6 +146,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -160,6 +161,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -180,6 +185,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_pool_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_pool_info.py
index f61965156..54345a1bb 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_pool_info.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_pool_info.py
@@ -64,6 +64,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -78,6 +79,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -96,6 +101,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -208,7 +215,7 @@ resources:
################################################################################
# Imports
################################################################################
-from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest
+from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule
import json
################################################################################
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_ssl_proxy.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_ssl_proxy.py
index 33bf10747..cd95c17fb 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_ssl_proxy.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_ssl_proxy.py
@@ -111,6 +111,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -125,6 +126,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -145,6 +150,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_ssl_proxy_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_ssl_proxy_info.py
index b6f17d8a8..e23e84170 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_ssl_proxy_info.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_ssl_proxy_info.py
@@ -59,6 +59,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -73,6 +74,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -91,6 +96,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -167,7 +174,7 @@ resources:
################################################################################
# Imports
################################################################################
-from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest
+from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule
import json
################################################################################
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_tcp_proxy.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_tcp_proxy.py
index 29793bb89..945cb9cf8 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_tcp_proxy.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_tcp_proxy.py
@@ -98,6 +98,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -112,6 +113,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -132,6 +137,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_tcp_proxy_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_tcp_proxy_info.py
index 785f1aed7..65cc7759e 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_tcp_proxy_info.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_tcp_proxy_info.py
@@ -59,6 +59,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -73,6 +74,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -91,6 +96,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -159,7 +166,7 @@ resources:
################################################################################
# Imports
################################################################################
-from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest
+from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule
import json
################################################################################
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_vpn_gateway.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_vpn_gateway.py
index 0c5e73309..e76bd4016 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_vpn_gateway.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_vpn_gateway.py
@@ -91,6 +91,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -105,6 +106,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -124,6 +129,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_vpn_gateway_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_vpn_gateway_info.py
index 24644af42..8d9763bb0 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_vpn_gateway_info.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_target_vpn_gateway_info.py
@@ -64,6 +64,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -78,6 +79,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -96,6 +101,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -170,7 +177,7 @@ resources:
################################################################################
# Imports
################################################################################
-from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest
+from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule
import json
################################################################################
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_url_map.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_url_map.py
index ed35cfc07..2856e596a 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_url_map.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_url_map.py
@@ -2547,6 +2547,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -2561,6 +2562,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -2580,6 +2585,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_url_map_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_url_map_info.py
index 0bbc26207..fa5431a11 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_url_map_info.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_url_map_info.py
@@ -59,6 +59,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -73,6 +74,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -91,6 +96,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -2471,7 +2478,7 @@ resources:
################################################################################
# Imports
################################################################################
-from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest
+from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule
import json
################################################################################
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_vpn_tunnel.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_vpn_tunnel.py
index 60705a64c..a59e469ae 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_vpn_tunnel.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_vpn_tunnel.py
@@ -178,6 +178,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -192,6 +193,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -213,6 +218,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_compute_vpn_tunnel_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_compute_vpn_tunnel_info.py
index e0ee1f9ed..7b3430aae 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_compute_vpn_tunnel_info.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_compute_vpn_tunnel_info.py
@@ -64,6 +64,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -78,6 +79,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -96,6 +101,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -231,7 +238,7 @@ resources:
################################################################################
# Imports
################################################################################
-from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest
+from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule
import json
################################################################################
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_container_cluster.py b/ansible_collections/google/cloud/plugins/modules/gcp_container_cluster.py
index 968dfb3ad..0a5d94934 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_container_cluster.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_container_cluster.py
@@ -552,6 +552,11 @@ options:
- Set to /netmask (e.g. /14) to have a range chosen with a specific netmask.
required: false
type: str
+ stack_type:
+ description:
+ - 'The IP stack type of the cluster, possible values: (STACK_TYPE_UNSPECIFIED, IPV4, IPV4_IPV6)'
+ required: false
+ type: str
initial_cluster_version:
description:
- The software version of the master endpoint and kubelets used in the cluster
@@ -628,6 +633,11 @@ options:
required: false
type: dict
suboptions:
+ datapath_provider:
+ description:
+ - The datapath provider selects the implementation of the Kubernetes networking model for service resolution and network policy enforcement.
+ required: false
+ type: str
enable_intra_node_visibility:
description:
- Whether Intra-node visibility is enabled for this cluster. This makes same
@@ -681,6 +691,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -695,6 +706,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -1252,6 +1267,11 @@ ipAllocationPolicy:
- Set to /netmask (e.g. /14) to have a range chosen with a specific netmask.
returned: success
type: str
+ stackType:
+ description:
+ - 'The IP stack type of the cluster, possible values: (STACK_TYPE_UNSPECIFIED, IPV4, IPV4_IPV6)'
+ type: str
+ returned: success
endpoint:
description:
- The IP address of this cluster's master endpoint.
@@ -1474,7 +1494,6 @@ from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import (
GcpModule,
GcpRequest,
remove_nones_from_dict,
- replace_resource_dict,
)
import json
import time
@@ -1559,6 +1578,7 @@ def main():
node_ipv4_cidr_block=dict(type='str'),
services_ipv4_cidr_block=dict(type='str'),
tpu_ipv4_cidr_block=dict(type='str'),
+ stack_type=dict(type='str'),
),
),
initial_cluster_version=dict(type='str'),
@@ -1572,7 +1592,14 @@ def main():
binary_authorization=dict(type='dict', options=dict(enabled=dict(type='bool'))),
release_channel=dict(type='dict', options=dict(channel=dict(type='str'))),
shielded_nodes=dict(type='dict', options=dict(enabled=dict(type='bool'))),
- network_config=dict(type='dict', options=dict(enable_intra_node_visibility=dict(type='bool'), default_snat_status=dict(type='bool'))),
+ network_config=dict(
+ type='dict',
+ options=dict(
+ enable_intra_node_visibility=dict(type='bool'),
+ default_snat_status=dict(type='bool'),
+ datapath_provider=dict(type='str'),
+ ),
+ ),
enable_kubernetes_alpha=dict(type='bool'),
location=dict(required=True, type='str', aliases=['zone']),
kubectl_path=dict(type='str'),
@@ -2248,6 +2275,7 @@ class ClusterIpallocationpolicy(object):
u'nodeIpv4CidrBlock': self.request.get('node_ipv4_cidr_block'),
u'servicesIpv4CidrBlock': self.request.get('services_ipv4_cidr_block'),
u'tpuIpv4CidrBlock': self.request.get('tpu_ipv4_cidr_block'),
+ u'stackType': self.request.get('stack_type'),
}
)
@@ -2421,14 +2449,18 @@ class ClusterNetworkconfig(object):
self.request = {}
def to_request(self):
- return remove_nones_from_dict(
- {u'enableIntraNodeVisibility': self.request.get('enable_intra_node_visibility'), u'defaultSnatStatus': self.request.get('default_snat_status')}
- )
+ return remove_nones_from_dict({
+ u'enableIntraNodeVisibility': self.request.get('enable_intra_node_visibility'),
+ u'defaultSnatStatus': self.request.get('default_snat_status'),
+ u'datapathProvider': self.request.get('datapath_provider'),
+ })
def from_response(self):
- return remove_nones_from_dict(
- {u'enableIntraNodeVisibility': self.request.get(u'enableIntraNodeVisibility'), u'defaultSnatStatus': self.request.get(u'defaultSnatStatus')}
- )
+ return remove_nones_from_dict({
+ u'enableIntraNodeVisibility': self.request.get(u'enableIntraNodeVisibility'),
+ u'defaultSnatStatus': self.request.get(u'defaultSnatStatus'),
+ u'datapathProvider': self.request.get('datapath_provider'),
+ })
if __name__ == '__main__':
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_container_cluster_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_container_cluster_info.py
index 77d57793f..0b90433c6 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_container_cluster_info.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_container_cluster_info.py
@@ -60,6 +60,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -74,6 +75,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -92,6 +97,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -843,7 +850,7 @@ resources:
################################################################################
# Imports
################################################################################
-from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest
+from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule
import json
################################################################################
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_container_node_pool.py b/ansible_collections/google/cloud/plugins/modules/gcp_container_node_pool.py
index 82091a681..174083763 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_container_node_pool.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_container_node_pool.py
@@ -358,6 +358,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -372,6 +373,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_container_node_pool_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_container_node_pool_info.py
index 03c7ccda3..e27412abb 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_container_node_pool_info.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_container_node_pool_info.py
@@ -70,6 +70,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -84,6 +85,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -102,6 +107,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -434,7 +441,7 @@ resources:
################################################################################
# Imports
################################################################################
-from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest, replace_resource_dict
+from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, replace_resource_dict
import json
################################################################################
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_dns_managed_zone.py b/ansible_collections/google/cloud/plugins/modules/gcp_dns_managed_zone.py
index 5f4558090..83c327a86 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_dns_managed_zone.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_dns_managed_zone.py
@@ -234,6 +234,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -248,6 +249,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -268,6 +273,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -476,7 +483,6 @@ from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import (
GcpModule,
GcpRequest,
remove_nones_from_dict,
- replace_resource_dict,
)
import json
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_dns_managed_zone_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_dns_managed_zone_info.py
index c0905abe8..333bfcee7 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_dns_managed_zone_info.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_dns_managed_zone_info.py
@@ -57,6 +57,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -71,6 +72,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -89,6 +94,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -292,7 +299,7 @@ resources:
################################################################################
# Imports
################################################################################
-from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest
+from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule
import json
################################################################################
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_dns_resource_record_set.py b/ansible_collections/google/cloud/plugins/modules/gcp_dns_resource_record_set.py
index cfa2058a9..c98220523 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_dns_resource_record_set.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_dns_resource_record_set.py
@@ -94,6 +94,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -108,6 +109,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_dns_resource_record_set_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_dns_resource_record_set_info.py
index 5fafd645f..622c31021 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_dns_resource_record_set_info.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_dns_resource_record_set_info.py
@@ -59,6 +59,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -73,6 +74,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -91,6 +96,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -144,7 +151,7 @@ resources:
################################################################################
# Imports
################################################################################
-from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest, replace_resource_dict
+from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, replace_resource_dict
import json
################################################################################
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_filestore_instance.py b/ansible_collections/google/cloud/plugins/modules/gcp_filestore_instance.py
index 7028ffeb4..7895f9c36 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_filestore_instance.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_filestore_instance.py
@@ -131,6 +131,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -145,6 +146,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -167,6 +172,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -287,7 +294,6 @@ from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import (
GcpModule,
GcpRequest,
remove_nones_from_dict,
- replace_resource_dict,
)
import json
import re
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_filestore_instance_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_filestore_instance_info.py
index 713fcc6f9..55ab27caf 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_filestore_instance_info.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_filestore_instance_info.py
@@ -57,6 +57,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -71,6 +72,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -89,6 +94,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -197,7 +204,7 @@ resources:
################################################################################
# Imports
################################################################################
-from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest
+from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule
import json
################################################################################
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_iam_role.py b/ansible_collections/google/cloud/plugins/modules/gcp_iam_role.py
index a87aa58f2..8af62c8e8 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_iam_role.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_iam_role.py
@@ -93,6 +93,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -107,6 +108,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -178,7 +183,6 @@ from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import (
GcpSession,
GcpModule,
GcpRequest,
- replace_resource_dict,
)
import json
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_iam_role_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_iam_role_info.py
index de791b251..35874cc2f 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_iam_role_info.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_iam_role_info.py
@@ -52,6 +52,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -66,6 +67,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -84,6 +89,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -140,7 +147,7 @@ resources:
################################################################################
# Imports
################################################################################
-from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest
+from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule
import json
################################################################################
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_iam_service_account.py b/ansible_collections/google/cloud/plugins/modules/gcp_iam_service_account.py
index fa930145a..d93db04b2 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_iam_service_account.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_iam_service_account.py
@@ -70,6 +70,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -84,6 +85,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -145,7 +150,7 @@ oauth2ClientId:
# Imports
################################################################################
-from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest, replace_resource_dict
+from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest
import json
################################################################################
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_iam_service_account_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_iam_service_account_info.py
index 5a0d94e13..b2017181f 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_iam_service_account_info.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_iam_service_account_info.py
@@ -52,6 +52,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -66,6 +67,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -84,6 +89,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -139,7 +146,7 @@ resources:
################################################################################
# Imports
################################################################################
-from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest
+from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule
import json
################################################################################
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_iam_service_account_key.py b/ansible_collections/google/cloud/plugins/modules/gcp_iam_service_account_key.py
index 633fd7492..a34718d71 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_iam_service_account_key.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_iam_service_account_key.py
@@ -71,8 +71,9 @@ options:
type: dict
path:
description:
- - The full name of the file that will hold the service account private key. The
- management of this file will depend on the value of sync_file parameter.
+ - The full name of the file that will hold the service account private key.
+ - If the file already exists, it will attempt to be read. Ensure the file does
+ not exist or is alreay a valid key.
- File path must be absolute.
required: false
type: path
@@ -89,6 +90,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -103,6 +105,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -187,8 +193,9 @@ serviceAccount:
type: dict
path:
description:
- - The full name of the file that will hold the service account private key. The
- management of this file will depend on the value of sync_file parameter.
+ - The full name of the file that will hold the service account private key.
+ - If the file already exists, it will attempt to be read. Ensure the file does
+ not exist or is alreay a valid key.
- File path must be absolute.
returned: success
type: str
@@ -198,12 +205,10 @@ path:
# Imports
################################################################################
-from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest, replace_resource_dict
+from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, replace_resource_dict
from ansible.module_utils._text import to_native
import json
import os
-import mimetypes
-import hashlib
import base64
################################################################################
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_kms_crypto_key.py b/ansible_collections/google/cloud/plugins/modules/gcp_kms_crypto_key.py
index bdd6fbc25..40bfae95e 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_kms_crypto_key.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_kms_crypto_key.py
@@ -118,6 +118,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -132,6 +133,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -152,6 +157,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -258,7 +265,6 @@ from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import (
GcpModule,
GcpRequest,
remove_nones_from_dict,
- replace_resource_dict,
)
import json
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_kms_crypto_key_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_kms_crypto_key_info.py
index 24e98a964..bc40b4846 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_kms_crypto_key_info.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_kms_crypto_key_info.py
@@ -58,6 +58,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -72,6 +73,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -90,6 +95,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -182,7 +189,7 @@ resources:
################################################################################
# Imports
################################################################################
-from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest
+from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule
import json
################################################################################
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_kms_key_ring.py b/ansible_collections/google/cloud/plugins/modules/gcp_kms_key_ring.py
index 23bab157d..7f70faacb 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_kms_key_ring.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_kms_key_ring.py
@@ -72,6 +72,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -86,6 +87,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -106,6 +111,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -147,7 +154,7 @@ location:
# Imports
################################################################################
-from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest, replace_resource_dict
+from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest
import json
################################################################################
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_kms_key_ring_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_kms_key_ring_info.py
index 01e8fadb0..39d3de925 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_kms_key_ring_info.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_kms_key_ring_info.py
@@ -59,6 +59,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -73,6 +74,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -91,6 +96,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -135,7 +142,7 @@ resources:
################################################################################
# Imports
################################################################################
-from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest
+from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule
import json
################################################################################
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_logging_metric.py b/ansible_collections/google/cloud/plugins/modules/gcp_logging_metric.py
index 5d4740ce8..f89732401 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_logging_metric.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_logging_metric.py
@@ -239,6 +239,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -253,6 +254,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -273,6 +278,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -494,7 +501,6 @@ from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import (
GcpModule,
GcpRequest,
remove_nones_from_dict,
- replace_resource_dict,
)
import json
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_logging_metric_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_logging_metric_info.py
index 482a84047..76c323c33 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_logging_metric_info.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_logging_metric_info.py
@@ -52,6 +52,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -66,6 +67,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -84,6 +89,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -286,7 +293,7 @@ resources:
################################################################################
# Imports
################################################################################
-from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest
+from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule
import json
################################################################################
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_mlengine_model.py b/ansible_collections/google/cloud/plugins/modules/gcp_mlengine_model.py
index d143c98b8..e3edaacec 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_mlengine_model.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_mlengine_model.py
@@ -107,6 +107,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -121,6 +122,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -141,6 +146,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -217,7 +224,6 @@ from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import (
GcpModule,
GcpRequest,
remove_nones_from_dict,
- replace_resource_dict,
)
import json
import time
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_mlengine_model_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_mlengine_model_info.py
index cdd233058..11f28aee5 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_mlengine_model_info.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_mlengine_model_info.py
@@ -52,6 +52,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -66,6 +67,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -84,6 +89,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -153,7 +160,7 @@ resources:
################################################################################
# Imports
################################################################################
-from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest
+from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule
import json
################################################################################
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_mlengine_version.py b/ansible_collections/google/cloud/plugins/modules/gcp_mlengine_version.py
index 5bb0620cc..e19fbe764 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_mlengine_version.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_mlengine_version.py
@@ -170,6 +170,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -184,6 +185,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_mlengine_version_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_mlengine_version_info.py
index da88e7b96..ecf928171 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_mlengine_version_info.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_mlengine_version_info.py
@@ -62,6 +62,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -76,6 +77,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -94,6 +99,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -244,7 +251,7 @@ resources:
################################################################################
# Imports
################################################################################
-from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest, replace_resource_dict
+from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, replace_resource_dict
import json
################################################################################
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_pubsub_subscription.py b/ansible_collections/google/cloud/plugins/modules/gcp_pubsub_subscription.py
index 08edb64f2..f39583bee 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_pubsub_subscription.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_pubsub_subscription.py
@@ -273,6 +273,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -287,6 +288,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -307,6 +312,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_pubsub_subscription_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_pubsub_subscription_info.py
index ee5cf64d1..b911131d7 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_pubsub_subscription_info.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_pubsub_subscription_info.py
@@ -52,6 +52,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -66,6 +67,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -84,6 +89,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -317,7 +324,7 @@ resources:
################################################################################
# Imports
################################################################################
-from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest
+from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule
import json
################################################################################
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_pubsub_topic.py b/ansible_collections/google/cloud/plugins/modules/gcp_pubsub_topic.py
index 673df4967..28fdb0810 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_pubsub_topic.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_pubsub_topic.py
@@ -117,6 +117,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -131,6 +132,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -151,6 +156,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -232,7 +239,6 @@ from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import (
GcpModule,
GcpRequest,
remove_nones_from_dict,
- replace_resource_dict,
)
import json
import re
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_pubsub_topic_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_pubsub_topic_info.py
index fa194013c..0dc6f4e0f 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_pubsub_topic_info.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_pubsub_topic_info.py
@@ -52,6 +52,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -66,6 +67,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -84,6 +89,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -164,7 +171,7 @@ resources:
################################################################################
# Imports
################################################################################
-from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest
+from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule
import json
################################################################################
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_redis_instance.py b/ansible_collections/google/cloud/plugins/modules/gcp_redis_instance.py
index fe817c23e..ac8724a0e 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_redis_instance.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_redis_instance.py
@@ -162,6 +162,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -176,6 +177,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -196,6 +201,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -401,7 +408,6 @@ from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import (
GcpModule,
GcpRequest,
remove_nones_from_dict,
- replace_resource_dict,
)
import json
import time
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_redis_instance_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_redis_instance_info.py
index 86b7d1ce4..33a9241ac 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_redis_instance_info.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_redis_instance_info.py
@@ -57,6 +57,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -71,6 +72,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -89,6 +94,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -275,7 +282,7 @@ resources:
################################################################################
# Imports
################################################################################
-from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest
+from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule
import json
################################################################################
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_resourcemanager_project.py b/ansible_collections/google/cloud/plugins/modules/gcp_resourcemanager_project.py
index 045ec6ee3..cd2d099fa 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_resourcemanager_project.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_resourcemanager_project.py
@@ -103,6 +103,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -117,6 +118,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -215,7 +220,6 @@ from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import (
GcpModule,
GcpRequest,
remove_nones_from_dict,
- replace_resource_dict,
)
import json
import time
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_resourcemanager_project_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_resourcemanager_project_info.py
index 1df386436..7d978299a 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_resourcemanager_project_info.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_resourcemanager_project_info.py
@@ -52,6 +52,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -66,6 +67,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -89,6 +94,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -172,7 +179,7 @@ resources:
################################################################################
# Imports
################################################################################
-from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest
+from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule
import json
################################################################################
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_runtimeconfig_config.py b/ansible_collections/google/cloud/plugins/modules/gcp_runtimeconfig_config.py
index cad3c57e7..6fe439eb7 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_runtimeconfig_config.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_runtimeconfig_config.py
@@ -71,6 +71,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -85,6 +86,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -126,7 +131,7 @@ name:
# Imports
################################################################################
-from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest, replace_resource_dict
+from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest
import json
import re
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_runtimeconfig_config_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_runtimeconfig_config_info.py
index c1aa11bb8..063c1cee9 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_runtimeconfig_config_info.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_runtimeconfig_config_info.py
@@ -52,6 +52,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -66,6 +67,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -84,6 +89,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -119,7 +126,7 @@ resources:
################################################################################
# Imports
################################################################################
-from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest
+from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule
import json
################################################################################
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_runtimeconfig_variable.py b/ansible_collections/google/cloud/plugins/modules/gcp_runtimeconfig_variable.py
index 6d8de2370..8da87320e 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_runtimeconfig_variable.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_runtimeconfig_variable.py
@@ -80,6 +80,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -94,6 +95,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -156,7 +161,7 @@ config:
# Imports
################################################################################
-from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest, replace_resource_dict
+from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest
import json
import re
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_runtimeconfig_variable_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_runtimeconfig_variable_info.py
index 7c882f64b..ec1adb922 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_runtimeconfig_variable_info.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_runtimeconfig_variable_info.py
@@ -57,6 +57,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -71,6 +72,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -89,6 +94,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -135,7 +142,7 @@ resources:
################################################################################
# Imports
################################################################################
-from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest
+from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule
import json
################################################################################
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_serviceusage_service.py b/ansible_collections/google/cloud/plugins/modules/gcp_serviceusage_service.py
index fff0d7309..221f7b6c7 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_serviceusage_service.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_serviceusage_service.py
@@ -71,6 +71,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -85,6 +86,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -104,6 +109,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -186,7 +193,6 @@ from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import (
GcpModule,
GcpRequest,
remove_nones_from_dict,
- replace_resource_dict,
)
import json
import re
@@ -375,9 +381,13 @@ def wait_for_operation(module, response):
def wait_for_completion(status, op_result, module):
op_id = navigate_hash(op_result, ['name'])
op_uri = async_op_url(module, {'op_id': op_id})
+ sleep_time = 1.0
while not status:
raise_if_errors(op_result, ['error'], module)
- time.sleep(1.0)
+ time.sleep(sleep_time)
+ sleep_time *= 2
+ if sleep_time > 10.0:
+ sleep_time = 10.0
op_result = fetch_resource(module, op_uri, False)
status = navigate_hash(op_result, ['done'])
return op_result
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_serviceusage_service_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_serviceusage_service_info.py
index 7c57233a1..1c49512ec 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_serviceusage_service_info.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_serviceusage_service_info.py
@@ -52,6 +52,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -66,6 +67,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -84,6 +89,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -162,7 +169,7 @@ resources:
################################################################################
# Imports
################################################################################
-from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest
+from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule
import json
################################################################################
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_sourcerepo_repository.py b/ansible_collections/google/cloud/plugins/modules/gcp_sourcerepo_repository.py
index 4e902c149..178cee86a 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_sourcerepo_repository.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_sourcerepo_repository.py
@@ -67,6 +67,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -81,6 +82,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -101,6 +106,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -141,7 +148,7 @@ size:
# Imports
################################################################################
-from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest, replace_resource_dict
+from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest
import json
import re
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_sourcerepo_repository_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_sourcerepo_repository_info.py
index a534ade7e..4a0d809b4 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_sourcerepo_repository_info.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_sourcerepo_repository_info.py
@@ -52,6 +52,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -66,6 +67,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -84,6 +89,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -126,7 +133,7 @@ resources:
################################################################################
# Imports
################################################################################
-from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest
+from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule
import json
################################################################################
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_spanner_database.py b/ansible_collections/google/cloud/plugins/modules/gcp_spanner_database.py
index 4d7356fb3..6c6bce90b 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_spanner_database.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_spanner_database.py
@@ -97,6 +97,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -111,6 +112,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -131,6 +136,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_spanner_database_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_spanner_database_info.py
index 2f11f1ce4..2f45553d3 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_spanner_database_info.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_spanner_database_info.py
@@ -62,6 +62,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -76,6 +77,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -94,6 +99,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -151,7 +158,7 @@ resources:
################################################################################
# Imports
################################################################################
-from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest, replace_resource_dict
+from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, replace_resource_dict
import json
################################################################################
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_spanner_instance.py b/ansible_collections/google/cloud/plugins/modules/gcp_spanner_instance.py
index 8458042a0..deb212ff8 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_spanner_instance.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_spanner_instance.py
@@ -100,6 +100,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -114,6 +115,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -134,6 +139,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -202,7 +209,7 @@ labels:
# Imports
################################################################################
-from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest, replace_resource_dict
+from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest
import json
import time
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_spanner_instance_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_spanner_instance_info.py
index 1fc5fce4f..90e25ddaa 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_spanner_instance_info.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_spanner_instance_info.py
@@ -52,6 +52,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -66,6 +67,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -84,6 +89,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -149,7 +156,7 @@ resources:
################################################################################
# Imports
################################################################################
-from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest
+from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule
import json
################################################################################
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_sql_database.py b/ansible_collections/google/cloud/plugins/modules/gcp_sql_database.py
index c43673daf..685ffee1d 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_sql_database.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_sql_database.py
@@ -87,6 +87,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -101,6 +102,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -176,7 +181,7 @@ instance:
# Imports
################################################################################
-from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest, replace_resource_dict
+from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest
import json
import time
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_sql_database_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_sql_database_info.py
index 4938076fd..dfc9bc9cb 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_sql_database_info.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_sql_database_info.py
@@ -57,6 +57,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -71,6 +72,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -89,6 +94,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -142,7 +149,7 @@ resources:
################################################################################
# Imports
################################################################################
-from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest
+from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule
import json
################################################################################
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_sql_instance.py b/ansible_collections/google/cloud/plugins/modules/gcp_sql_instance.py
index bb19ecf9e..9f18a2f67 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_sql_instance.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_sql_instance.py
@@ -370,6 +370,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -384,6 +385,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -809,7 +814,6 @@ from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import (
GcpModule,
GcpRequest,
remove_nones_from_dict,
- replace_resource_dict,
)
import json
import time
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_sql_instance_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_sql_instance_info.py
index 71d09d20e..afbc7c309 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_sql_instance_info.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_sql_instance_info.py
@@ -52,6 +52,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -66,6 +67,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -84,6 +89,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -503,7 +510,7 @@ resources:
################################################################################
# Imports
################################################################################
-from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest
+from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule
import json
################################################################################
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_sql_ssl_cert.py b/ansible_collections/google/cloud/plugins/modules/gcp_sql_ssl_cert.py
index 96e9cc1b9..02519b30d 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_sql_ssl_cert.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_sql_ssl_cert.py
@@ -88,7 +88,10 @@ options:
sha1_fingerprint:
description:
- The SHA-1 of the certificate.
- required: true
+ type: str
+ private_key:
+ description:
+ - The private key associated with the certificate.
type: str
project:
description:
@@ -103,6 +106,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -117,6 +121,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -193,6 +201,11 @@ sha1Fingerprint:
- The SHA-1 of the certificate.
returned: success
type: str
+privateKey:
+ description:
+ - The private key associated with the certificate.
+ returned: success
+ type: str
'''
################################################################################
@@ -220,7 +233,8 @@ def main():
create_time=dict(type='str'),
expiration_time=dict(type='str'),
instance=dict(required=True, type='dict'),
- sha1_fingerprint=dict(required=True, type='str'),
+ sha1_fingerprint=dict(type='str'),
+ private_key=dict(type='str'),
)
)
@@ -257,12 +271,11 @@ def main():
def create(module, link, kind):
auth = GcpSession(module, 'sql')
- return wait_for_operation(module, auth.post(link, resource_to_request(module)))
+ return wait_for_create_operation(module, auth.post(link, resource_to_request(module)))
def update(module, link, kind):
- auth = GcpSession(module, 'sql')
- return wait_for_operation(module, auth.put(link, resource_to_request(module)))
+ module.fail_json(msg="SQL certificates cannot be modified")
def delete(module, link, kind):
@@ -293,7 +306,8 @@ def fetch_resource(module, link, kind, allow_not_found=True):
def self_link(module):
- res = {'project': module.params['project'], 'instance': replace_resource_dict(module.params['instance'], 'name')}
+ res = {'project': module.params['project'], 'instance': replace_resource_dict(module.params['instance'], 'name'),
+ 'sha1_fingerprint': module.params['sha1_fingerprint']}
return "https://sqladmin.googleapis.com/sql/v1beta4/projects/{project}/instances/{instance}/sslCerts/{sha1_fingerprint}".format(**res)
@@ -362,6 +376,31 @@ def async_op_url(module, extra_data=None):
return url.format(**combined)
+# The create response includes the certificate, but it's not usable until
+# the operation completes. The create response is also the only place the
+# private key is available, so return the newly created resource directly.
+def wait_for_create_operation(module, response):
+ op_result = return_if_object(module, response, 'sql#operation')
+ if op_result is None:
+ return {}
+ status = navigate_hash(op_result, ['operation', 'status'])
+ wait_done = wait_for_create_completion(status, op_result, module)
+ res = navigate_hash(op_result, ['clientCert', 'certInfo'])
+ res.update({'privateKey': navigate_hash(op_result, ['clientCert', 'certPrivateKey'])})
+ return res
+
+
+def wait_for_create_completion(status, op_result, module):
+ op_id = navigate_hash(op_result, ['operation', 'name'])
+ op_uri = async_op_url(module, {'op_id': op_id})
+ while status != 'DONE':
+ raise_if_errors(op_result, ['error', 'errors'], module)
+ time.sleep(1.0)
+ op_result = fetch_resource(module, op_uri, 'sql#operation', False)
+ status = navigate_hash(op_result, ['status'])
+ return op_result
+
+
def wait_for_operation(module, response):
op_result = return_if_object(module, response, 'sql#operation')
if op_result is None:
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_sql_user.py b/ansible_collections/google/cloud/plugins/modules/gcp_sql_user.py
index d7e211a83..ca2cbf4f9 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_sql_user.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_sql_user.py
@@ -87,6 +87,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -101,6 +102,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_sql_user_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_sql_user_info.py
index dfb3e08b1..762a73567 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_sql_user_info.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_sql_user_info.py
@@ -62,6 +62,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -76,6 +77,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -94,6 +99,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -142,7 +149,7 @@ resources:
################################################################################
# Imports
################################################################################
-from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest, replace_resource_dict
+from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, replace_resource_dict
import json
################################################################################
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_storage_bucket.py b/ansible_collections/google/cloud/plugins/modules/gcp_storage_bucket.py
index f9bad465d..18645d956 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_storage_bucket.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_storage_bucket.py
@@ -414,6 +414,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -428,6 +429,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_storage_bucket_access_control.py b/ansible_collections/google/cloud/plugins/modules/gcp_storage_bucket_access_control.py
index c6d36a81d..b2b1ea791 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_storage_bucket_access_control.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_storage_bucket_access_control.py
@@ -95,6 +95,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -109,6 +110,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -129,6 +134,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_storage_default_object_acl.py b/ansible_collections/google/cloud/plugins/modules/gcp_storage_default_object_acl.py
index 8a3b538bf..5bfea2f74 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_storage_default_object_acl.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_storage_default_object_acl.py
@@ -60,11 +60,6 @@ options:
bucket:
description:
- The name of the bucket.
- - 'This field represents a link to a Bucket resource in GCP. It can be specified
- in two ways. First, you can place a dictionary with key ''name'' and value of
- your resource''s name Alternatively, you can add `register: name-of-resource`
- to a gcp_storage_bucket task and then set this bucket field to "{{ name-of-resource
- }}"'
required: true
type: dict
entity:
@@ -75,11 +70,6 @@ options:
* project-team-{{projectId}} * allUsers * allAuthenticatedUsers .'
required: true
type: str
- object:
- description:
- - The name of the object, if applied to an object.
- required: false
- type: str
role:
description:
- The access permission for the entity.
@@ -99,6 +89,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -113,6 +104,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -133,6 +128,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -188,21 +185,6 @@ entityId:
- The ID for the entity.
returned: success
type: str
-generation:
- description:
- - The content generation of the object, if applied to an object.
- returned: success
- type: int
-id:
- description:
- - The ID of the access-control entry.
- returned: success
- type: str
-object:
- description:
- - The name of the object, if applied to an object.
- returned: success
- type: str
projectTeam:
description:
- The project team associated with the entity.
@@ -264,10 +246,7 @@ def main():
state = module.params['state']
kind = 'storage#objectAccessControl'
- if module.params['id']:
- fetch = fetch_resource(module, self_link(module), kind)
- else:
- fetch = {}
+ fetch = fetch_resource(module, self_link(module), kind)
changed = False
if fetch:
@@ -386,9 +365,6 @@ def response_to_hash(module, response):
u'email': response.get(u'email'),
u'entity': response.get(u'entity'),
u'entityId': response.get(u'entityId'),
- u'generation': response.get(u'generation'),
- u'id': response.get(u'id'),
- u'object': response.get(u'object'),
u'projectTeam': DefaultObjectACLProjectteam(response.get(u'projectTeam', {}), module).from_response(),
u'role': response.get(u'role'),
}
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_storage_object.py b/ansible_collections/google/cloud/plugins/modules/gcp_storage_object.py
index 6d497bd64..1411d0ffc 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_storage_object.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_storage_object.py
@@ -69,6 +69,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -83,6 +84,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -146,17 +151,10 @@ storage_class:
################################################################################
from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import (
- navigate_hash,
GcpSession,
GcpModule,
- GcpRequest,
- replace_resource_dict,
)
-import json
import os
-import mimetypes
-import hashlib
-import base64
try:
import google.cloud
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_tpu_node.py b/ansible_collections/google/cloud/plugins/modules/gcp_tpu_node.py
index 8a7e11fb0..32d599e9c 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_tpu_node.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_tpu_node.py
@@ -130,6 +130,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -144,6 +145,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -164,6 +169,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -290,7 +297,6 @@ from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import (
GcpModule,
GcpRequest,
remove_nones_from_dict,
- replace_resource_dict,
)
import json
import time
diff --git a/ansible_collections/google/cloud/plugins/modules/gcp_tpu_node_info.py b/ansible_collections/google/cloud/plugins/modules/gcp_tpu_node_info.py
index cd27a67a0..a01d08af7 100644
--- a/ansible_collections/google/cloud/plugins/modules/gcp_tpu_node_info.py
+++ b/ansible_collections/google/cloud/plugins/modules/gcp_tpu_node_info.py
@@ -57,6 +57,7 @@ options:
- application
- machineaccount
- serviceaccount
+ - accesstoken
service_account_contents:
description:
- The contents of a Service Account JSON file, either in a dictionary or as a
@@ -71,6 +72,10 @@ options:
- An optional service account email address if machineaccount is selected and
the user does not wish to use the default email.
type: str
+ access_token:
+ description:
+ - An OAuth2 access token if credential type is accesstoken.
+ type: str
scopes:
description:
- Array of scopes to be used
@@ -89,6 +94,8 @@ notes:
env variable.
- For authentication, you can set service_account_email using the C(GCP_SERVICE_ACCOUNT_EMAIL)
env variable.
+- For authentication, you can set access_token using the C(GCP_ACCESS_TOKEN)
+ env variable.
- For authentication, you can set auth_kind using the C(GCP_AUTH_KIND) env variable.
- For authentication, you can set scopes using the C(GCP_SCOPES) env variable.
- Environment variables values will only be used if the playbook values are not set.
@@ -211,7 +218,7 @@ resources:
################################################################################
# Imports
################################################################################
-from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest
+from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule
import json
################################################################################
diff --git a/ansible_collections/google/cloud/roles/gcloud/tasks/archive/archive_install.yml b/ansible_collections/google/cloud/roles/gcloud/tasks/archive/archive_install.yml
index 8f6a52aeb..5f0623066 100644
--- a/ansible_collections/google/cloud/roles/gcloud/tasks/archive/archive_install.yml
+++ b/ansible_collections/google/cloud/roles/gcloud/tasks/archive/archive_install.yml
@@ -2,20 +2,20 @@
- name: Gcloud | Archive | Ensure temp path exists
ansible.builtin.file:
path: "{{ gcloud_archive_path }}"
- state: "directory"
+ state: directory
mode: "0755"
- name: Gcloud | Archive | Extract Cloud SDK archive
ansible.builtin.unarchive:
src: "{{ gcloud_archive_url }}"
dest: "{{ gcloud_archive_path }}"
- remote_src: yes
+ remote_src: true
creates: "{{ gcloud_library_path }}"
- name: Gcloud | Archive | Link binaries to /usr/bin (like package install)
ansible.builtin.file:
src: "{{ gcloud_library_path }}/bin/{{ item }}"
- dest: "/usr/bin/{{ item }}"
+ dest: /usr/bin/{{ item }}
state: link
loop:
- bq
diff --git a/ansible_collections/google/cloud/roles/gcloud/tasks/archive/command_completion.yml b/ansible_collections/google/cloud/roles/gcloud/tasks/archive/command_completion.yml
index d457c09d0..277210125 100644
--- a/ansible_collections/google/cloud/roles/gcloud/tasks/archive/command_completion.yml
+++ b/ansible_collections/google/cloud/roles/gcloud/tasks/archive/command_completion.yml
@@ -2,7 +2,7 @@
# task file to configure bash completion for gcloud
- name: Gcloud | Archive | Debian | Ensure bash completion is installed
ansible.builtin.apt:
- name: "bash-completion"
+ name: bash-completion
register: task_result
until: task_result is success
retries: 10
@@ -25,7 +25,7 @@
owner: root
group: root
state: directory
- mode: 0755
+ mode: "0755"
- name: Gcloud | Archive | Link binaries to /usr/bin (like package install)
ansible.builtin.file:
diff --git a/ansible_collections/google/cloud/roles/gcloud/tasks/archive/main.yml b/ansible_collections/google/cloud/roles/gcloud/tasks/archive/main.yml
index 989c89ba9..49eb87298 100644
--- a/ansible_collections/google/cloud/roles/gcloud/tasks/archive/main.yml
+++ b/ansible_collections/google/cloud/roles/gcloud/tasks/archive/main.yml
@@ -7,7 +7,7 @@
- name: Gcloud | Archive | Get gcloud_status
ansible.builtin.debug:
- var: "gcloud_status"
+ var: gcloud_status
- name: Gcloud | Archive | Set installed version if installation exists
when: gcloud_status.stat.exists
@@ -30,11 +30,10 @@
{{ gcloud_installed_version }} is already installed.
- name: Gcloud | Archive | Start installation
- when: gcloud_installed_version is undefined or
- gcloud_version is version(gcloud_installed_version, '>')
+ when: gcloud_installed_version is undefined or gcloud_version is version(gcloud_installed_version, '>')
ansible.builtin.include_tasks: archive_install.yml
-- name: Gcloud | Debian | Install the google-cloud-sdk additional components # noqa 301
+- name: Gcloud | Debian | Install the google-cloud-sdk additional components # noqa no-changed-when
ansible.builtin.command: gcloud components install {{ item }}
register: gcloud_install_comp_status
changed_when: "'All components are up to date.' not in gcloud_install_comp_status.stderr_lines"
diff --git a/ansible_collections/google/cloud/roles/gcloud/tasks/main.yml b/ansible_collections/google/cloud/roles/gcloud/tasks/main.yml
index bdbd347a2..c7b646d7e 100644
--- a/ansible_collections/google/cloud/roles/gcloud/tasks/main.yml
+++ b/ansible_collections/google/cloud/roles/gcloud/tasks/main.yml
@@ -1,15 +1,14 @@
---
-
- name: Gcloud | Load Distro and OS specific variables
ansible.builtin.include_vars: "{{ lookup('first_found', params) }}"
vars:
params:
files:
- - "os/{{ ansible_distribution | lower }}.yml"
- - "os/{{ ansible_os_family | lower }}.yml"
+ - os/{{ ansible_distribution | lower }}.yml
+ - os/{{ ansible_os_family | lower }}.yml
- main.yml
paths:
- - 'vars'
+ - vars
- name: Gcloud | Install the google-cloud-sdk from {{ gcloud_install_type }}
ansible.builtin.include_tasks: "{{ gcloud_install_type }}/main.yml"
diff --git a/ansible_collections/google/cloud/roles/gcloud/tasks/package/debian.yml b/ansible_collections/google/cloud/roles/gcloud/tasks/package/debian.yml
index 6b0bf707a..726c79ee6 100644
--- a/ansible_collections/google/cloud/roles/gcloud/tasks/package/debian.yml
+++ b/ansible_collections/google/cloud/roles/gcloud/tasks/package/debian.yml
@@ -7,13 +7,13 @@
- name: Gcloud | Debian | Add the gcloud repository
ansible.builtin.apt_repository:
- repo: "deb {{ gcloud_apt_url }} {{ gcloud_apt_repo }} main"
+ repo: deb {{ gcloud_apt_url }} {{ gcloud_apt_repo }} main
state: present
filename: google-cloud-sdk
- name: Gcloud | Debian | Install the google-cloud-sdk package
ansible.builtin.apt:
- name: "google-cloud-sdk"
+ name: google-cloud-sdk
update_cache: "yes"
register: task_result
until: task_result is success
@@ -22,7 +22,7 @@
- name: Gcloud | Debian | Install the google-cloud-sdk additional components
ansible.builtin.apt:
- name: "google-cloud-sdk-{{ item }}"
+ name: google-cloud-sdk-{{ item }}
update_cache: "yes"
register: task_result
until: task_result is success
diff --git a/ansible_collections/google/cloud/roles/gcloud/tasks/package/redhat.yml b/ansible_collections/google/cloud/roles/gcloud/tasks/package/redhat.yml
index 50cdac5a1..8917561a2 100644
--- a/ansible_collections/google/cloud/roles/gcloud/tasks/package/redhat.yml
+++ b/ansible_collections/google/cloud/roles/gcloud/tasks/package/redhat.yml
@@ -4,16 +4,16 @@
name: google-cloud-sdk
description: Google Cloud SDK
baseurl: https://packages.cloud.google.com/yum/repos/cloud-sdk-el7-x86_64
- enabled: yes
- gpgcheck: yes
- repo_gpgcheck: yes
+ enabled: true
+ gpgcheck: true
+ repo_gpgcheck: true
gpgkey:
- https://packages.cloud.google.com/yum/doc/yum-key.gpg
- https://packages.cloud.google.com/yum/doc/rpm-package-key.gpg
- name: Gcloud | RHEL | Install the google-cloud-sdk package
ansible.builtin.yum:
- name: "google-cloud-sdk"
+ name: google-cloud-sdk
update_cache: "yes"
register: task_result
until: task_result is success
@@ -22,7 +22,7 @@
- name: Gcloud | Debian | Install the google-cloud-sdk additional components
ansible.builtin.yum:
- name: "google-cloud-sdk-{{ item }}"
+ name: google-cloud-sdk-{{ item }}
update_cache: "yes"
register: task_result
until: task_result is success
diff --git a/ansible_collections/google/cloud/roles/gcp_http_lb/README.md b/ansible_collections/google/cloud/roles/gcp_http_lb/README.md
index 901de6e1a..89cbf69ae 100644
--- a/ansible_collections/google/cloud/roles/gcp_http_lb/README.md
+++ b/ansible_collections/google/cloud/roles/gcp_http_lb/README.md
@@ -14,8 +14,8 @@ Role Variables
```
gcp_http_lb_backend: the selflink for the backend that this load balancer will be supporting
- gcp_project: the name of your gcp project
- service_account_file: the path to your service account JSON file
+ gcp_http_lb_gcp_project: the name of your gcp project
+ gcp_http_lb_service_account_file: the path to your service account JSON file
```
Example Playbook
diff --git a/ansible_collections/google/cloud/roles/gcp_http_lb/defaults/main.yml b/ansible_collections/google/cloud/roles/gcp_http_lb/defaults/main.yml
index f705f01df..11f0870b2 100644
--- a/ansible_collections/google/cloud/roles/gcp_http_lb/defaults/main.yml
+++ b/ansible_collections/google/cloud/roles/gcp_http_lb/defaults/main.yml
@@ -2,13 +2,13 @@
# defaults file for gcp-http-lb
gcp_http_lb_state: present
gcp_http_lb_cdn: true
-gcp_http_lb_name_prefix: 'gcp'
+gcp_http_lb_name_prefix: gcp
# Name schemes for resources being created
-gcp_http_lb_globaladdress: "{{gcp_lb_name_prefix}}-globaladdress"
-gcp_http_lb_instancegroup: "{{gcp_lb_name_prefix}}-instancegroup"
-gcp_http_lb_healthcheck: "{{gcp_lb_name_prefix}}-healthcheck"
-gcp_http_lb_backendservice: "{{gcp_lb_name_prefix}}-backendservice"
-gcp_http_lb_urlmap: "{{gcp_lb_name_prefix}}-urlmap"
-gcp_http_lb_httpproxy: "{{gcp_lb_name_prefix}}-httpproxy"
-gcp_http_lb_forwardingrule: "{{gcp_lb_name_prefix}}-forwardingrule"
+gcp_http_lb_globaladdress: "{{ gcp_lb_name_prefix }}-globaladdress"
+gcp_http_lb_instancegroup: "{{ gcp_lb_name_prefix }}-instancegroup"
+gcp_http_lb_healthcheck: "{{ gcp_lb_name_prefix }}-healthcheck"
+gcp_http_lb_backendservice: "{{ gcp_lb_name_prefix }}-backendservice"
+gcp_http_lb_urlmap: "{{ gcp_lb_name_prefix }}-urlmap"
+gcp_http_lb_httpproxy: "{{ gcp_lb_name_prefix }}-httpproxy"
+gcp_http_lb_forwardingrule: "{{ gcp_lb_name_prefix }}-forwardingrule"
diff --git a/ansible_collections/google/cloud/roles/gcp_http_lb/meta/main.yml b/ansible_collections/google/cloud/roles/gcp_http_lb/meta/main.yml
index 9ee910409..98cccc5cf 100644
--- a/ansible_collections/google/cloud/roles/gcp_http_lb/meta/main.yml
+++ b/ansible_collections/google/cloud/roles/gcp_http_lb/meta/main.yml
@@ -1,3 +1,4 @@
+---
galaxy_info:
author: googlecloudplatform
description: Create a HTTP Load Balancer on GCP
@@ -16,7 +17,7 @@ galaxy_info:
# - CC-BY
license: GPLv3
- min_ansible_version: 2.7
+ min_ansible_version: "2.7"
# If this a Container Enabled role, provide the minimum Ansible Container version.
# min_ansible_container_version:
@@ -47,12 +48,12 @@ galaxy_info:
# - 99.99
galaxy_tags: []
- # List tags for your role here, one per line. A tag is a keyword that describes
- # and categorizes the role. Users find roles by searching for tags. Be sure to
- # remove the '[]' above, if you add tags to this list.
- #
- # NOTE: A tag is limited to a single word comprised of alphanumeric characters.
- # Maximum 20 tags per role.
+# List tags for your role here, one per line. A tag is a keyword that describes
+# and categorizes the role. Users find roles by searching for tags. Be sure to
+# remove the '[]' above, if you add tags to this list.
+#
+# NOTE: A tag is limited to a single word comprised of alphanumeric characters.
+# Maximum 20 tags per role.
dependencies: []
# List your role dependencies here, one per line. Be sure to remove the '[]' above,
diff --git a/ansible_collections/google/cloud/roles/gcp_http_lb/tasks/main.yml b/ansible_collections/google/cloud/roles/gcp_http_lb/tasks/main.yml
index 8ed8f4d36..67826df41 100644
--- a/ansible_collections/google/cloud/roles/gcp_http_lb/tasks/main.yml
+++ b/ansible_collections/google/cloud/roles/gcp_http_lb/tasks/main.yml
@@ -1,65 +1,65 @@
---
-- name: create a global address for the load balancer.
- gcp_compute_global_address:
- name: "{{ gcp_http_lb_globaladdress }}"
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- state: "{{ gcp_http_lb_state }}"
+- name: Create a global address for the load balancer.
+ google.cloud.gcp_compute_global_address:
+ name: "{{ gcp_http_lb_globaladdress }}"
+ project: "{{ gcp_http_lb_gcp_project }}"
+ auth_kind: "{{ gcp_http_lb_auth_kind }}"
+ service_account_file: "{{ gcp_http_lb_service_account_file }}"
+ state: "{{ gcp_http_lb_state }}"
register: globaladdress
-- name: create a http health check to verify lb working
- gcp_compute_http_health_check:
- name: "{{ gcp_http_lb_healthcheck }}"
- healthy_threshold: 10
- port: 80
- timeout_sec: 2
- unhealthy_threshold: 5
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- state: "{{ gcp_http_lb_state }}"
+- name: Create a http health check to verify lb working
+ google.cloud.gcp_compute_http_health_check:
+ name: "{{ gcp_http_lb_healthcheck }}"
+ healthy_threshold: 10
+ port: 80
+ timeout_sec: 2
+ unhealthy_threshold: 5
+ project: "{{ gcp_http_lb_gcp_project }}"
+ auth_kind: "{{ gcp_http_lb_auth_kind }}"
+ service_account_file: "{{ gcp_http_lb_service_account_file }}"
+ state: "{{ gcp_http_lb_state }}"
register: healthcheck
-- name: create a backend service
- gcp_compute_backend_service:
- name: "{{ gcp_http_lb_backendservice }}"
- backends:
+- name: Create a backend service
+ google.cloud.gcp_compute_backend_service:
+ name: "{{ gcp_http_lb_backendservice }}"
+ backends:
- group: "{{ gcp_http_lb_backend.selfLink }}"
- health_checks:
+ health_checks:
- "{{ healthcheck.selfLink }}"
- enable_cdn: "{{ gcp_http_lb_cdn }}"
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- state: "{{ gcp_http_lb_state }}"
+ enable_cdn: "{{ gcp_http_lb_cdn }}"
+ project: "{{ gcp_http_lb_gcp_project }}"
+ auth_kind: "{{ gcp_http_lb_auth_kind }}"
+ service_account_file: "{{ gcp_http_lb_service_account_file }}"
+ state: "{{ gcp_http_lb_state }}"
register: backendservice
-- name: create a url map
- gcp_compute_url_map:
- name: "{{ gcp_http_lb_urlmap }}"
- default_service: "{{ backendservice }}"
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- state: "{{ gcp_http_lb_state }}"
+- name: Create a url map
+ google.cloud.gcp_compute_url_map:
+ name: "{{ gcp_http_lb_urlmap }}"
+ default_service: "{{ backendservice }}"
+ project: "{{ gcp_http_lb_gcp_project }}"
+ auth_kind: "{{ gcp_http_lb_auth_kind }}"
+ service_account_file: "{{ gcp_http_lb_service_account_file }}"
+ state: "{{ gcp_http_lb_state }}"
register: urlmap
-- name: create a target http proxy
- gcp_compute_target_http_proxy:
- name: "{{ gcp_http_lb_httpproxy }}"
- url_map: "{{ urlmap }}"
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- state: "{{ gcp_http_lb_state }}"
+- name: Create a target http proxy
+ google.cloud.gcp_compute_target_http_proxy:
+ name: "{{ gcp_http_lb_httpproxy }}"
+ url_map: "{{ urlmap }}"
+ project: "{{ gcp_http_lb_gcp_project }}"
+ auth_kind: "{{ gcp_http_lb_auth_kind }}"
+ service_account_file: "{{ gcp_http_lb_service_account_file }}"
+ state: "{{ gcp_http_lb_state }}"
register: httpproxy
-- name: create a global forwarding rule
- gcp_compute_global_forwarding_rule:
- name: "{{ gcp_http_lb_forwardingrule }}"
- ip_address: "{{ globaladdress.address }}"
- load_balancing_scheme: "EXTERNAL"
- ip_protocol: TCP
- port_range: 80-80
- target: "{{ httpproxy.selfLink }}"
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- state: "{{ gcp_http_lb_state }}"
+- name: Create a global forwarding rule
+ google.cloud.gcp_compute_global_forwarding_rule:
+ name: "{{ gcp_http_lb_forwardingrule }}"
+ ip_address: "{{ globaladdress.address }}"
+ load_balancing_scheme: EXTERNAL
+ ip_protocol: TCP
+ port_range: 80-80
+ target: "{{ httpproxy.selfLink }}"
+ project: "{{ gcp_http_lb_gcp_project }}"
+ auth_kind: "{{ gcp_http_lb_auth_kind }}"
+ service_account_file: "{{ gcp_http_lb_service_account_file }}"
+ state: "{{ gcp_http_lb_state }}"
register: result
diff --git a/ansible_collections/google/cloud/roles/gcp_http_lb/tests/test.yml b/ansible_collections/google/cloud/roles/gcp_http_lb/tests/test.yml
index 341c7a4ed..6f659ef21 100644
--- a/ansible_collections/google/cloud/roles/gcp_http_lb/tests/test.yml
+++ b/ansible_collections/google/cloud/roles/gcp_http_lb/tests/test.yml
@@ -1,5 +1,6 @@
---
-- hosts: localhost
+- name: Test gcp_http_lb role
+ hosts: localhost
remote_user: root
roles:
- gcp_http_lb
diff --git a/ansible_collections/google/cloud/roles/gcp_http_lb/vars/main.yml b/ansible_collections/google/cloud/roles/gcp_http_lb/vars/main.yml
index ca9443f6f..f78469c95 100644
--- a/ansible_collections/google/cloud/roles/gcp_http_lb/vars/main.yml
+++ b/ansible_collections/google/cloud/roles/gcp_http_lb/vars/main.yml
@@ -1,12 +1,12 @@
---
# vars file for gcp-http-lb
-vars:
- # The backend this LB will be supporting. This will typically be a Instance Group:
- # example: projects/sample-project/zones/us-central1-c/instanceGroups/sample-instance-group
- gcp_http_lb_backend: your-backend
- # The name of your GCP project
- gcp_project: your-project
- # The kind of authentication you will use (serviceaccount is recommended)
- auth_kind: serviceaccount
- # The path to your service account file (if using the serviceaccount auth kind)
- service_account_file: path-to-service-account-file
+
+# The backend this LB will be supporting. This will typically be a Instance Group:
+# example: projects/sample-project/zones/us-central1-c/instanceGroups/sample-instance-group
+gcp_http_lb_backend: your-backend
+# The name of your GCP project
+gcp_http_lb_gcp_project: your-project
+# The kind of authentication you will use (serviceaccount is recommended)
+gcp_http_lb_auth_kind: serviceaccount
+# The path to your service account file (if using the serviceaccount auth kind)
+gcp_http_lb_service_account_file: path-to-service-account-file
diff --git a/ansible_collections/google/cloud/roles/gcsfuse/tasks/debian.yml b/ansible_collections/google/cloud/roles/gcsfuse/tasks/debian.yml
index 941f3bd42..be0847f49 100644
--- a/ansible_collections/google/cloud/roles/gcsfuse/tasks/debian.yml
+++ b/ansible_collections/google/cloud/roles/gcsfuse/tasks/debian.yml
@@ -1,7 +1,7 @@
---
- name: Gcsfuse | Ensure gpg is installed
ansible.builtin.apt:
- name: "gnupg"
+ name: gnupg
register: task_result
until: task_result is success
retries: 10
@@ -14,13 +14,13 @@
- name: Gcsfuse | Add the apt repository
ansible.builtin.apt_repository:
- repo: deb http://packages.cloud.google.com/apt gcsfuse-{{ ansible_distribution_release }} main
+ repo: deb https://packages.cloud.google.com/apt gcsfuse-{{ ansible_distribution_release }} main
state: present
filename: gcsfuse
- name: Gcsfuse | Install gcsfuse
ansible.builtin.apt:
- name: "gcsfuse"
+ name: gcsfuse
update_cache: "yes"
register: task_result
until: task_result is success
diff --git a/ansible_collections/google/cloud/scripts/bootstrap-project.sh b/ansible_collections/google/cloud/scripts/bootstrap-project.sh
index 8dd2b2d00..a28f42c79 100755
--- a/ansible_collections/google/cloud/scripts/bootstrap-project.sh
+++ b/ansible_collections/google/cloud/scripts/bootstrap-project.sh
@@ -40,12 +40,15 @@ for SERVICE in "${SERVICE_LIST[@]}"; do
gcloud services enable "$SERVICE" --project="$PROJECT_ID"
done
-for ROLE in "${REQUIRED_ROLE_LIST[@]}"; do
- echo "enabling role $ROLE..."
- gcloud projects add-iam-policy-binding "$PROJECT_ID" \
- --member="serviceAccount:$SERVICE_ACCOUNT_NAME" \
- --role="$ROLE"
-done
+if [ -n "$SERVICE_ACCOUNT_NAME" ]
+then
+ for ROLE in "${REQUIRED_ROLE_LIST[@]}"; do
+ echo "enabling role $ROLE..."
+ gcloud projects add-iam-policy-binding "$PROJECT_ID" \
+ --member="serviceAccount:$SERVICE_ACCOUNT_NAME" \
+ --role="$ROLE"
+ done
+fi
if ! gcloud app describe --project="$PROJECT_ID" > /dev/null; then
echo "creating appengine project..."
diff --git a/ansible_collections/google/cloud/scripts/cleanup-project.sh b/ansible_collections/google/cloud/scripts/cleanup-project.sh
index 4dd4ddb0a..b05a2f15f 100755
--- a/ansible_collections/google/cloud/scripts/cleanup-project.sh
+++ b/ansible_collections/google/cloud/scripts/cleanup-project.sh
@@ -40,8 +40,21 @@ cleanup_resource() {
extra_list_arg="$3"
extra_delete_arg="$4"
- for resource_id in $(gcloud "${resource_group}" "${resource}" list --project="${PROJECT_ID}" --format="csv[no-heading](name)" "${extra_list_arg}"); do
- gcloud "${resource_group}" "${resource}" delete "${resource_id}" --project="${PROJECT_ID}" -q "${extra_delete_arg}"
+ if [ -z "$extra_list_arg" ]
+ then
+ mapfile -t resources < <(gcloud "${resource_group}" "${resource}" list --project="${PROJECT_ID}" --format="csv[no-heading](name)")
+ else
+ mapfile -t resources < <(gcloud "${resource_group}" "${resource}" list --project="${PROJECT_ID}" --format="csv[no-heading](name)" "${extra_list_arg}")
+ fi
+
+ for resource_id in "${resources[@]}"
+ do
+ if [ -z "$extra_delete_arg" ]
+ then
+ gcloud "${resource_group}" "${resource}" delete "${resource_id}" --project="${PROJECT_ID}" -q
+ else
+ gcloud "${resource_group}" "${resource}" delete "${resource_id}" --project="${PROJECT_ID}" -q "${extra_delete_arg}"
+ fi
done
}
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_appengine_firewall_rule/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_appengine_firewall_rule/tasks/autogen.yml
index 4441d531c..a38d9a7f2 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_appengine_firewall_rule/tasks/autogen.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_appengine_firewall_rule/tasks/autogen.yml
@@ -13,98 +13,98 @@
#
# ----------------------------------------------------------------------------
# Pre-test setup
-- name: delete a firewall rule
+- name: Delete a firewall rule
google.cloud.gcp_appengine_firewall_rule:
priority: 1000
source_range: 10.0.0.0
action: ALLOW
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
#----------------------------------------------------------
-- name: create a firewall rule
+- name: Create a firewall rule
google.cloud.gcp_appengine_firewall_rule:
priority: 1000
source_range: 10.0.0.0
action: ALLOW
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that firewall_rule was created
+- name: Verify that firewall_rule was created
google.cloud.gcp_appengine_firewall_rule_info:
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/cloud-platform
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/cloud-platform
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | length >= 1
# ----------------------------------------------------------------------------
-- name: create a firewall rule that already exists
+- name: Create a firewall rule that already exists
google.cloud.gcp_appengine_firewall_rule:
priority: 1000
source_range: 10.0.0.0
action: ALLOW
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#----------------------------------------------------------
-- name: delete a firewall rule
+- name: Delete a firewall rule
google.cloud.gcp_appengine_firewall_rule:
priority: 1000
source_range: 10.0.0.0
action: ALLOW
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that firewall_rule was deleted
+- name: Verify that firewall_rule was deleted
google.cloud.gcp_appengine_firewall_rule_info:
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/cloud-platform
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/cloud-platform
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
# there is a default firewall rule that cannot be
# deleted, so the length should be 1.
- results['resources'] | length == 1
# ----------------------------------------------------------------------------
-- name: delete a firewall rule that does not exist
+- name: Delete a firewall rule that does not exist
google.cloud.gcp_appengine_firewall_rule:
priority: 1000
source_range: 10.0.0.0
action: ALLOW
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_appengine_firewall_rule/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_appengine_firewall_rule/tasks/main.yml
index 45d6e4917..fe47378c2 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_appengine_firewall_rule/tasks/main.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_appengine_firewall_rule/tasks/main.yml
@@ -1,2 +1,3 @@
---
-- include_tasks: autogen.yml
+- name: Generated tests
+ ansible.builtin.include_tasks: autogen.yml
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_bigquery_dataset/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_bigquery_dataset/tasks/autogen.yml
index 1f97074d9..71484a34d 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_bigquery_dataset/tasks/autogen.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_bigquery_dataset/tasks/autogen.yml
@@ -13,96 +13,96 @@
#
# ----------------------------------------------------------------------------
# Pre-test setup
-- name: delete a dataset
+- name: Delete a dataset
google.cloud.gcp_bigquery_dataset:
name: my_example_dataset
dataset_reference:
dataset_id: my_example_dataset
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
#----------------------------------------------------------
-- name: create a dataset
+- name: Create a dataset
google.cloud.gcp_bigquery_dataset:
name: my_example_dataset
dataset_reference:
dataset_id: my_example_dataset
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that dataset was created
+- name: Verify that dataset was created
google.cloud.gcp_bigquery_dataset_info:
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/bigquery
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/bigquery
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | map(attribute='datasetReference') | map(attribute='datasetId') | select("match", ".*my_example_dataset.*") | list | length == 1
# ----------------------------------------------------------------------------
-- name: create a dataset that already exists
+- name: Create a dataset that already exists
google.cloud.gcp_bigquery_dataset:
name: my_example_dataset
dataset_reference:
dataset_id: my_example_dataset
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#----------------------------------------------------------
-- name: delete a dataset
+- name: Delete a dataset
google.cloud.gcp_bigquery_dataset:
name: my_example_dataset
dataset_reference:
dataset_id: my_example_dataset
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that dataset was deleted
+- name: Verify that dataset was deleted
google.cloud.gcp_bigquery_dataset_info:
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/bigquery
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/bigquery
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | map(attribute='datasetReference') | map(attribute='datasetId') | select("match", ".*my_example_dataset.*") | list | length == 0
# ----------------------------------------------------------------------------
-- name: delete a dataset that does not exist
+- name: Delete a dataset that does not exist
google.cloud.gcp_bigquery_dataset:
name: my_example_dataset
dataset_reference:
dataset_id: my_example_dataset
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_bigquery_dataset/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_bigquery_dataset/tasks/main.yml
index 45d6e4917..fe47378c2 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_bigquery_dataset/tasks/main.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_bigquery_dataset/tasks/main.yml
@@ -1,2 +1,3 @@
---
-- include_tasks: autogen.yml
+- name: Generated tests
+ ansible.builtin.include_tasks: autogen.yml
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_bigquery_table/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_bigquery_table/tasks/autogen.yml
index b795dbe9e..1e42d655d 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_bigquery_table/tasks/autogen.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_bigquery_table/tasks/autogen.yml
@@ -13,17 +13,17 @@
#
# ----------------------------------------------------------------------------
# Pre-test setup
-- name: create a dataset
+- name: Create a dataset
google.cloud.gcp_bigquery_dataset:
name: example_dataset
dataset_reference:
dataset_id: example_dataset
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: dataset
-- name: delete a table
+- name: Delete a table
google.cloud.gcp_bigquery_table:
name: example_table
dataset: example_dataset
@@ -33,10 +33,10 @@
table_id: example_table
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
#----------------------------------------------------------
-- name: create a table
+- name: Create a table
google.cloud.gcp_bigquery_table:
name: example_table
dataset: example_dataset
@@ -46,28 +46,28 @@
table_id: example_table
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that table was created
+- name: Verify that table was created
google.cloud.gcp_bigquery_table_info:
- dataset: example_dataset
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/bigquery
+ dataset: example_dataset
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/bigquery
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | map(attribute='tableReference') | map(attribute='tableId') | select("match", ".*example_table.*") | list | length == 1
# ----------------------------------------------------------------------------
-- name: create a table that already exists
+- name: Create a table that already exists
google.cloud.gcp_bigquery_table:
name: example_table
dataset: example_dataset
@@ -77,15 +77,15 @@
table_id: example_table
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#----------------------------------------------------------
-- name: delete a table
+- name: Delete a table
google.cloud.gcp_bigquery_table:
name: example_table
dataset: example_dataset
@@ -95,28 +95,28 @@
table_id: example_table
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that table was deleted
+- name: Verify that table was deleted
google.cloud.gcp_bigquery_table_info:
- dataset: example_dataset
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/bigquery
+ dataset: example_dataset
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/bigquery
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | map(attribute='tableReference') | map(attribute='tableId') | select("match", ".*example_table.*") | list | length == 0
# ----------------------------------------------------------------------------
-- name: delete a table that does not exist
+- name: Delete a table that does not exist
google.cloud.gcp_bigquery_table:
name: example_table
dataset: example_dataset
@@ -126,24 +126,24 @@
table_id: example_table
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#---------------------------------------------------------
# Post-test teardown
# If errors happen, don't crash the playbook!
-- name: delete a dataset
+- name: Delete a dataset
google.cloud.gcp_bigquery_dataset:
name: example_dataset
dataset_reference:
dataset_id: example_dataset
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: dataset
ignore_errors: true
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_bigquery_table/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_bigquery_table/tasks/main.yml
index 45d6e4917..fe47378c2 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_bigquery_table/tasks/main.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_bigquery_table/tasks/main.yml
@@ -1,2 +1,3 @@
---
-- include_tasks: autogen.yml
+- name: Generated tests
+ ansible.builtin.include_tasks: autogen.yml
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_bigtable_instance/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_bigtable_instance/tasks/autogen.yml
index 23dccf596..7406950d1 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_bigtable_instance/tasks/autogen.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_bigtable_instance/tasks/autogen.yml
@@ -13,107 +13,107 @@
#
# ----------------------------------------------------------------------------
# Pre-test setup
-- name: delete a instance
+- name: Delete a instance
google.cloud.gcp_bigtable_instance:
name: my-instance
display_name: My Test Cluster
clusters:
- - name: mycluster
- location: projects/{{ gcp_project }}/locations/us-central1-a
- serve_nodes: 1
+ - name: mycluster
+ location: projects/{{ gcp_project }}/locations/us-central1-a
+ serve_nodes: 1
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
#----------------------------------------------------------
-- name: create a instance
+- name: Create a instance
google.cloud.gcp_bigtable_instance:
name: my-instance
display_name: My Test Cluster
clusters:
- - name: mycluster
- location: projects/{{ gcp_project }}/locations/us-central1-a
- serve_nodes: 1
+ - name: mycluster
+ location: projects/{{ gcp_project }}/locations/us-central1-a
+ serve_nodes: 1
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that instance was created
+- name: Verify that instance was created
google.cloud.gcp_bigtable_instance_info:
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | map(attribute='name') | select("match", ".*my-instance.*") | list | length == 1
# ----------------------------------------------------------------------------
-- name: create a instance that already exists
+- name: Create a instance that already exists
google.cloud.gcp_bigtable_instance:
name: my-instance
display_name: My Test Cluster
clusters:
- - name: mycluster
- location: projects/{{ gcp_project }}/locations/us-central1-a
- serve_nodes: 1
+ - name: mycluster
+ location: projects/{{ gcp_project }}/locations/us-central1-a
+ serve_nodes: 1
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#----------------------------------------------------------
-- name: delete a instance
+- name: Delete a instance
google.cloud.gcp_bigtable_instance:
name: my-instance
display_name: My Test Cluster
clusters:
- - name: mycluster
- location: projects/{{ gcp_project }}/locations/us-central1-a
- serve_nodes: 1
+ - name: mycluster
+ location: projects/{{ gcp_project }}/locations/us-central1-a
+ serve_nodes: 1
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that instance was deleted
+- name: Verify that instance was deleted
google.cloud.gcp_bigtable_instance_info:
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | map(attribute='name') | select("match", ".*my-instance.*") | list | length == 0
# ----------------------------------------------------------------------------
-- name: delete a instance that does not exist
+- name: Delete a instance that does not exist
google.cloud.gcp_bigtable_instance:
name: my-instance
display_name: My Test Cluster
clusters:
- - name: mycluster
- location: projects/{{ gcp_project }}/locations/us-central1-a
- serve_nodes: 1
+ - name: mycluster
+ location: projects/{{ gcp_project }}/locations/us-central1-a
+ serve_nodes: 1
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_bigtable_instance/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_bigtable_instance/tasks/main.yml
index 45d6e4917..fe47378c2 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_bigtable_instance/tasks/main.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_bigtable_instance/tasks/main.yml
@@ -1,2 +1,3 @@
---
-- include_tasks: autogen.yml
+- name: Generated tests
+ ansible.builtin.include_tasks: autogen.yml
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_cloudbuild_trigger/defaults/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_cloudbuild_trigger/defaults/main.yml
index aa87a2a8e..aa65c31f5 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_cloudbuild_trigger/defaults/main.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_cloudbuild_trigger/defaults/main.yml
@@ -1,3 +1,3 @@
---
# defaults file
-resource_name: '{{resource_prefix}}'
+resource_name: "{{ resource_prefix }}"
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_cloudfunctions_cloud_function/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_cloudfunctions_cloud_function/tasks/autogen.yml
index 530ac7098..da43b2154 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_cloudfunctions_cloud_function/tasks/autogen.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_cloudfunctions_cloud_function/tasks/autogen.yml
@@ -13,113 +13,113 @@
#
# ----------------------------------------------------------------------------
# Pre-test setup
-- name: delete a cloud function
+- name: Delete a cloud function
google.cloud.gcp_cloudfunctions_cloud_function:
name: "{{ resource_name }}"
location: us-central1
entry_point: helloGET
source_archive_url: gs://{{ gcp_project }}-ansible-testing/cloud-function.zip
- trigger_http: 'true'
+ trigger_http: "true"
project: "{{ gcp_project }}"
- runtime: "python310"
+ runtime: python310
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
#----------------------------------------------------------
-- name: create a cloud function
+- name: Create a cloud function
google.cloud.gcp_cloudfunctions_cloud_function:
name: "{{ resource_name }}"
location: us-central1
entry_point: helloGET
source_archive_url: gs://{{ gcp_project }}-ansible-testing/cloud-function.zip
- trigger_http: 'true'
+ trigger_http: "true"
project: "{{ gcp_project }}"
- runtime: "python310"
+ runtime: python310
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that cloud_function was created
+- name: Verify that cloud_function was created
google.cloud.gcp_cloudfunctions_cloud_function_info:
- location: us-central1
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/cloud-platform
+ location: us-central1
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/cloud-platform
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | map(attribute='name') | select("match", ".*{{ resource_name }}.*") | list | length == 1
# ----------------------------------------------------------------------------
-- name: create a cloud function that already exists
+- name: Create a cloud function that already exists
google.cloud.gcp_cloudfunctions_cloud_function:
name: "{{ resource_name }}"
location: us-central1
entry_point: helloGET
source_archive_url: gs://{{ gcp_project }}-ansible-testing/cloud-function.zip
- trigger_http: 'true'
+ trigger_http: "true"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
# runtime is not sent as it is optional for
# existing functions.
# runtime: "python310"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#----------------------------------------------------------
-- name: delete a cloud function
+- name: Delete a cloud function
google.cloud.gcp_cloudfunctions_cloud_function:
name: "{{ resource_name }}"
location: us-central1
entry_point: helloGET
source_archive_url: gs://{{ gcp_project }}-ansible-testing/cloud-function.zip
- trigger_http: 'true'
+ trigger_http: "true"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that cloud_function was deleted
+- name: Verify that cloud_function was deleted
google.cloud.gcp_cloudfunctions_cloud_function_info:
- location: us-central1
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/cloud-platform
+ location: us-central1
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/cloud-platform
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | map(attribute='name') | select("match", ".*{{ resource_name }}.*") | list | length == 0
# ----------------------------------------------------------------------------
-- name: delete a cloud function that does not exist
+- name: Delete a cloud function that does not exist
google.cloud.gcp_cloudfunctions_cloud_function:
name: "{{ resource_name }}"
location: us-central1
entry_point: helloGET
source_archive_url: gs://{{ gcp_project }}-ansible-testing/cloud-function.zip
- trigger_http: 'true'
+ trigger_http: "true"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_cloudfunctions_cloud_function/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_cloudfunctions_cloud_function/tasks/main.yml
index 45d6e4917..fe47378c2 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_cloudfunctions_cloud_function/tasks/main.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_cloudfunctions_cloud_function/tasks/main.yml
@@ -1,2 +1,3 @@
---
-- include_tasks: autogen.yml
+- name: Generated tests
+ ansible.builtin.include_tasks: autogen.yml
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_cloudscheduler_job/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_cloudscheduler_job/tasks/autogen.yml
index 3a1884c2d..917e323a0 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_cloudscheduler_job/tasks/autogen.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_cloudscheduler_job/tasks/autogen.yml
@@ -13,7 +13,7 @@
#
# ----------------------------------------------------------------------------
# Pre-test setup
-- name: delete a job
+- name: Delete a job
google.cloud.gcp_cloudscheduler_job:
name: job
region: us-central1
@@ -27,13 +27,13 @@
service: web
version: prod
instance: my-instance-001
- relative_uri: "/ping"
+ relative_uri: /ping
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
#----------------------------------------------------------
-- name: create a job
+- name: Create a job
google.cloud.gcp_cloudscheduler_job:
name: job
region: us-central1
@@ -47,31 +47,31 @@
service: web
version: prod
instance: my-instance-001
- relative_uri: "/ping"
+ relative_uri: /ping
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that job was created
+- name: Verify that job was created
google.cloud.gcp_cloudscheduler_job_info:
- region: us-central1
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/cloud-platform
+ region: us-central1
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/cloud-platform
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | map(attribute='name') | select("match", ".*job.*") | list | length == 1
# ----------------------------------------------------------------------------
-- name: create a job that already exists
+- name: Create a job that already exists
google.cloud.gcp_cloudscheduler_job:
name: job
region: us-central1
@@ -85,18 +85,18 @@
service: web
version: prod
instance: my-instance-001
- relative_uri: "/ping"
+ relative_uri: /ping
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#----------------------------------------------------------
-- name: delete a job
+- name: Delete a job
google.cloud.gcp_cloudscheduler_job:
name: job
region: us-central1
@@ -110,31 +110,31 @@
service: web
version: prod
instance: my-instance-001
- relative_uri: "/ping"
+ relative_uri: /ping
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that job was deleted
+- name: Verify that job was deleted
google.cloud.gcp_cloudscheduler_job_info:
- region: us-central1
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/cloud-platform
+ region: us-central1
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/cloud-platform
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | map(attribute='name') | select("match", ".*job.*") | list | length == 0
# ----------------------------------------------------------------------------
-- name: delete a job that does not exist
+- name: Delete a job that does not exist
google.cloud.gcp_cloudscheduler_job:
name: job
region: us-central1
@@ -148,13 +148,13 @@
service: web
version: prod
instance: my-instance-001
- relative_uri: "/ping"
+ relative_uri: /ping
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_cloudscheduler_job/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_cloudscheduler_job/tasks/main.yml
index 45d6e4917..fe47378c2 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_cloudscheduler_job/tasks/main.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_cloudscheduler_job/tasks/main.yml
@@ -1,2 +1,3 @@
---
-- include_tasks: autogen.yml
+- name: Generated tests
+ ansible.builtin.include_tasks: autogen.yml
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_cloudtasks_queue/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_cloudtasks_queue/tasks/autogen.yml
index c0f0e602c..6e1f70f22 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_cloudtasks_queue/tasks/autogen.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_cloudtasks_queue/tasks/autogen.yml
@@ -13,93 +13,93 @@
#
# ----------------------------------------------------------------------------
# Pre-test setup
-- name: delete a queue
+- name: Delete a queue
google.cloud.gcp_cloudtasks_queue:
name: "{{ resource_name }}"
location: us-central1
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
#----------------------------------------------------------
-- name: create a queue
+- name: Create a queue
google.cloud.gcp_cloudtasks_queue:
name: "{{ resource_name }}"
location: us-central1
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that queue was created
+- name: Verify that queue was created
google.cloud.gcp_cloudtasks_queue_info:
- location: us-central1
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/cloud-platform
+ location: us-central1
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/cloud-platform
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | map(attribute='name') | select("match", ".*{{ resource_name }}.*") | list | length == 1
# ----------------------------------------------------------------------------
-- name: create a queue that already exists
+- name: Create a queue that already exists
google.cloud.gcp_cloudtasks_queue:
name: "{{ resource_name }}"
location: us-central1
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#----------------------------------------------------------
-- name: delete a queue
+- name: Delete a queue
google.cloud.gcp_cloudtasks_queue:
name: "{{ resource_name }}"
location: us-central1
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that queue was deleted
+- name: Verify that queue was deleted
google.cloud.gcp_cloudtasks_queue_info:
- location: us-central1
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/cloud-platform
+ location: us-central1
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/cloud-platform
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | map(attribute='name') | select("match", ".*{{ resource_name }}.*") | list | length == 0
# ----------------------------------------------------------------------------
-- name: delete a queue that does not exist
+- name: Delete a queue that does not exist
google.cloud.gcp_cloudtasks_queue:
name: "{{ resource_name }}"
location: us-central1
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_cloudtasks_queue/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_cloudtasks_queue/tasks/main.yml
index 45d6e4917..fe47378c2 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_cloudtasks_queue/tasks/main.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_cloudtasks_queue/tasks/main.yml
@@ -1,2 +1,3 @@
---
-- include_tasks: autogen.yml
+- name: Generated tests
+ ansible.builtin.include_tasks: autogen.yml
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_address/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_address/tasks/autogen.yml
index 7a12e69e8..b4e9634dd 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_address/tasks/autogen.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_address/tasks/autogen.yml
@@ -13,97 +13,97 @@
#
# ----------------------------------------------------------------------------
# Pre-test setup
-- name: delete a address
+- name: Delete a address
google.cloud.gcp_compute_address:
name: test-address1
region: us-west1
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
#----------------------------------------------------------
-- name: create a address
+- name: Create a address
google.cloud.gcp_compute_address:
name: test-address1
region: us-west1
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that address was created
+- name: Verify that address was created
google.cloud.gcp_compute_address_info:
- filters:
- - name = test-address1
- region: us-west1
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/compute
+ filters:
+ - name = test-address1
+ region: us-west1
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | length == 1
# ----------------------------------------------------------------------------
-- name: create a address that already exists
+- name: Create a address that already exists
google.cloud.gcp_compute_address:
name: test-address1
region: us-west1
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#----------------------------------------------------------
-- name: delete a address
+- name: Delete a address
google.cloud.gcp_compute_address:
name: test-address1
region: us-west1
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that address was deleted
+- name: Verify that address was deleted
google.cloud.gcp_compute_address_info:
- filters:
- - name = test-address1
- region: us-west1
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/compute
+ filters:
+ - name = test-address1
+ region: us-west1
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | length == 0
# ----------------------------------------------------------------------------
-- name: delete a address that does not exist
+- name: Delete a address that does not exist
google.cloud.gcp_compute_address:
name: test-address1
region: us-west1
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_address/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_address/tasks/main.yml
index 45d6e4917..fe47378c2 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_address/tasks/main.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_address/tasks/main.yml
@@ -1,2 +1,3 @@
---
-- include_tasks: autogen.yml
+- name: Generated tests
+ ansible.builtin.include_tasks: autogen.yml
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_autoscaler/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_autoscaler/tasks/autogen.yml
index 5182fa982..4e1ad7687 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_autoscaler/tasks/autogen.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_autoscaler/tasks/autogen.yml
@@ -13,46 +13,46 @@
#
# ----------------------------------------------------------------------------
# Pre-test setup
-- name: create a network
+- name: Create a network
google.cloud.gcp_compute_network:
name: network-instancetemplate
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
auto_create_subnetworks: true
state: present
register: network
-- name: create a address
+- name: Create a address
google.cloud.gcp_compute_address:
name: address-instancetemplate
region: us-central1
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: address
-- name: create a instance template
+- name: Create a instance template
google.cloud.gcp_compute_instance_template:
name: "{{ resource_name }}"
properties:
disks:
- - auto_delete: 'true'
- boot: 'true'
- initialize_params:
- source_image: projects/ubuntu-os-cloud/global/images/family/ubuntu-minimal-2204-lts
+ - auto_delete: "true"
+ boot: "true"
+ initialize_params:
+ source_image: projects/ubuntu-os-cloud/global/images/family/ubuntu-minimal-2204-lts
machine_type: n1-standard-1
network_interfaces:
- - network: "{{ network }}"
- access_configs:
- - name: test-config
- type: ONE_TO_ONE_NAT
- nat_ip: "{{ address }}"
+ - network: "{{ network }}"
+ access_configs:
+ - name: test-config
+ type: ONE_TO_ONE_NAT
+ nat_ip: "{{ address }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: instancetemplate
-- name: create a instance group manager
+- name: Create a instance group manager
google.cloud.gcp_compute_instance_group_manager:
name: "{{ resource_name }}"
base_instance_name: test1-child
@@ -61,10 +61,10 @@
zone: us-central1-a
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: igm
-- name: delete a autoscaler
+- name: Delete a autoscaler
google.cloud.gcp_compute_autoscaler:
name: "{{ resource_name }}"
zone: us-central1-a
@@ -74,13 +74,13 @@
min_num_replicas: 1
cool_down_period_sec: 60
cpu_utilization:
- utilization_target: 0.5
+ utilization_target: !!float "0.5"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
#----------------------------------------------------------
-- name: create a autoscaler
+- name: Create a autoscaler
google.cloud.gcp_compute_autoscaler:
name: "{{ resource_name }}"
zone: us-central1-a
@@ -90,33 +90,33 @@
min_num_replicas: 1
cool_down_period_sec: 60
cpu_utilization:
- utilization_target: 0.5
+ utilization_target: !!float "0.5"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that autoscaler was created
+- name: Verify that autoscaler was created
google.cloud.gcp_compute_autoscaler_info:
- filters:
- - name = {{ resource_name }}
- zone: us-central1-a
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/compute
+ filters:
+ - name = {{ resource_name }}
+ zone: us-central1-a
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | length == 1
# ----------------------------------------------------------------------------
-- name: create a autoscaler that already exists
+- name: Create a autoscaler that already exists
google.cloud.gcp_compute_autoscaler:
name: "{{ resource_name }}"
zone: us-central1-a
@@ -126,18 +126,18 @@
min_num_replicas: 1
cool_down_period_sec: 60
cpu_utilization:
- utilization_target: 0.5
+ utilization_target: !!float "0.5"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#----------------------------------------------------------
-- name: delete a autoscaler
+- name: Delete a autoscaler
google.cloud.gcp_compute_autoscaler:
name: "{{ resource_name }}"
zone: us-central1-a
@@ -147,33 +147,33 @@
min_num_replicas: 1
cool_down_period_sec: 60
cpu_utilization:
- utilization_target: 0.5
+ utilization_target: !!float "0.5"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that autoscaler was deleted
+- name: Verify that autoscaler was deleted
google.cloud.gcp_compute_autoscaler_info:
- filters:
- - name = {{ resource_name }}
- zone: us-central1-a
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/compute
+ filters:
+ - name = {{ resource_name }}
+ zone: us-central1-a
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | length == 0
# ----------------------------------------------------------------------------
-- name: delete a autoscaler that does not exist
+- name: Delete a autoscaler that does not exist
google.cloud.gcp_compute_autoscaler:
name: "{{ resource_name }}"
zone: us-central1-a
@@ -183,20 +183,20 @@
min_num_replicas: 1
cool_down_period_sec: 60
cpu_utilization:
- utilization_target: 0.5
+ utilization_target: !!float "0.5"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#---------------------------------------------------------
# Post-test teardown
# If errors happen, don't crash the playbook!
-- name: delete a instance group manager
+- name: Delete a instance group manager
google.cloud.gcp_compute_instance_group_manager:
name: "{{ resource_name }}"
base_instance_name: test1-child
@@ -205,48 +205,48 @@
zone: us-central1-a
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: igm
ignore_errors: true
-- name: delete a instance template
+- name: Delete a instance template
google.cloud.gcp_compute_instance_template:
name: "{{ resource_name }}"
properties:
disks:
- - auto_delete: 'true'
- boot: 'true'
- initialize_params:
- source_image: projects/ubuntu-os-cloud/global/images/family/ubuntu-minimal-2204-lts
+ - auto_delete: "true"
+ boot: "true"
+ initialize_params:
+ source_image: projects/ubuntu-os-cloud/global/images/family/ubuntu-minimal-2204-lts
machine_type: n1-standard-1
network_interfaces:
- - network: "{{ network }}"
- access_configs:
- - name: test-config
- type: ONE_TO_ONE_NAT
- nat_ip: "{{ address }}"
+ - network: "{{ network }}"
+ access_configs:
+ - name: test-config
+ type: ONE_TO_ONE_NAT
+ nat_ip: "{{ address }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: instancetemplate
ignore_errors: true
-- name: delete a address
+- name: Delete a address
google.cloud.gcp_compute_address:
name: address-instancetemplate
region: us-central1
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: address
ignore_errors: true
-- name: delete a network
+- name: Delete a network
google.cloud.gcp_compute_network:
name: network-instancetemplate
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
auto_create_subnetworks: true
state: absent
register: network
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_autoscaler/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_autoscaler/tasks/main.yml
index 45d6e4917..fe47378c2 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_autoscaler/tasks/main.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_autoscaler/tasks/main.yml
@@ -1,2 +1,3 @@
---
-- include_tasks: autogen.yml
+- name: Generated tests
+ ansible.builtin.include_tasks: autogen.yml
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_backend_bucket/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_backend_bucket/tasks/autogen.yml
index 48f2ee1b3..c54b02276 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_backend_bucket/tasks/autogen.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_backend_bucket/tasks/autogen.yml
@@ -13,125 +13,125 @@
#
# ----------------------------------------------------------------------------
# Pre-test setup
-- name: create a bucket
+- name: Create a bucket
google.cloud.gcp_storage_bucket:
name: bucket-backendbucket
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: bucket
-- name: delete a backend bucket
+- name: Delete a backend bucket
google.cloud.gcp_compute_backend_bucket:
name: "{{ resource_name }}"
bucket_name: "{{ bucket.name }}"
description: A BackendBucket to connect LNB w/ Storage Bucket
- enable_cdn: 'true'
+ enable_cdn: "true"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
#----------------------------------------------------------
-- name: create a backend bucket
+- name: Create a backend bucket
google.cloud.gcp_compute_backend_bucket:
name: "{{ resource_name }}"
bucket_name: "{{ bucket.name }}"
description: A BackendBucket to connect LNB w/ Storage Bucket
- enable_cdn: 'true'
+ enable_cdn: "true"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that backend_bucket was created
+- name: Verify that backend_bucket was created
google.cloud.gcp_compute_backend_bucket_info:
- filters:
- - name = {{ resource_name }}
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/compute
+ filters:
+ - name = {{ resource_name }}
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | length == 1
# ----------------------------------------------------------------------------
-- name: create a backend bucket that already exists
+- name: Create a backend bucket that already exists
google.cloud.gcp_compute_backend_bucket:
name: "{{ resource_name }}"
bucket_name: "{{ bucket.name }}"
description: A BackendBucket to connect LNB w/ Storage Bucket
- enable_cdn: 'true'
+ enable_cdn: "true"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#----------------------------------------------------------
-- name: delete a backend bucket
+- name: Delete a backend bucket
google.cloud.gcp_compute_backend_bucket:
name: "{{ resource_name }}"
bucket_name: "{{ bucket.name }}"
description: A BackendBucket to connect LNB w/ Storage Bucket
- enable_cdn: 'true'
+ enable_cdn: "true"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that backend_bucket was deleted
+- name: Verify that backend_bucket was deleted
google.cloud.gcp_compute_backend_bucket_info:
- filters:
- - name = {{ resource_name }}
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/compute
+ filters:
+ - name = {{ resource_name }}
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | length == 0
# ----------------------------------------------------------------------------
-- name: delete a backend bucket that does not exist
+- name: Delete a backend bucket that does not exist
google.cloud.gcp_compute_backend_bucket:
name: "{{ resource_name }}"
bucket_name: "{{ bucket.name }}"
description: A BackendBucket to connect LNB w/ Storage Bucket
- enable_cdn: 'true'
+ enable_cdn: "true"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#---------------------------------------------------------
# Post-test teardown
# If errors happen, don't crash the playbook!
-- name: delete a bucket
+- name: Delete a bucket
google.cloud.gcp_storage_bucket:
name: bucket-backendbucket
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: bucket
ignore_errors: true
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_backend_bucket/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_backend_bucket/tasks/main.yml
index 45d6e4917..fe47378c2 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_backend_bucket/tasks/main.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_backend_bucket/tasks/main.yml
@@ -1,2 +1,3 @@
---
-- include_tasks: autogen.yml
+- name: Generated tests
+ ansible.builtin.include_tasks: autogen.yml
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_backend_service/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_backend_service/tasks/autogen.yml
index fbe4b69a3..011a5d4cf 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_backend_service/tasks/autogen.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_backend_service/tasks/autogen.yml
@@ -13,16 +13,16 @@
#
# ----------------------------------------------------------------------------
# Pre-test setup
-- name: create a instance group
+- name: Create a instance group
google.cloud.gcp_compute_instance_group:
name: instancegroup-backendservice
zone: us-central1-a
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: instancegroup
-- name: create a HTTP health check
+- name: Create a HTTP health check
google.cloud.gcp_compute_http_health_check:
name: httphealthcheck-backendservice
healthy_threshold: 10
@@ -31,125 +31,125 @@
unhealthy_threshold: 5
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: healthcheck
-- name: delete a backend service
+- name: Delete a backend service
google.cloud.gcp_compute_backend_service:
name: "{{ resource_name }}"
backends:
- - group: "{{ instancegroup.selfLink }}"
+ - group: "{{ instancegroup.selfLink }}"
health_checks:
- - "{{ healthcheck.selfLink }}"
- enable_cdn: 'true'
+ - "{{ healthcheck.selfLink }}"
+ enable_cdn: "true"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
#----------------------------------------------------------
-- name: create a backend service
+- name: Create a backend service
google.cloud.gcp_compute_backend_service:
name: "{{ resource_name }}"
backends:
- - group: "{{ instancegroup.selfLink }}"
+ - group: "{{ instancegroup.selfLink }}"
health_checks:
- - "{{ healthcheck.selfLink }}"
- enable_cdn: 'true'
+ - "{{ healthcheck.selfLink }}"
+ enable_cdn: "true"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that backend_service was created
+- name: Verify that backend_service was created
google.cloud.gcp_compute_backend_service_info:
- filters:
- - name = {{ resource_name }}
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/compute
+ filters:
+ - name = {{ resource_name }}
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | length == 1
# ----------------------------------------------------------------------------
-- name: create a backend service that already exists
+- name: Create a backend service that already exists
google.cloud.gcp_compute_backend_service:
name: "{{ resource_name }}"
backends:
- - group: "{{ instancegroup.selfLink }}"
+ - group: "{{ instancegroup.selfLink }}"
health_checks:
- - "{{ healthcheck.selfLink }}"
- enable_cdn: 'true'
+ - "{{ healthcheck.selfLink }}"
+ enable_cdn: "true"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#----------------------------------------------------------
-- name: delete a backend service
+- name: Delete a backend service
google.cloud.gcp_compute_backend_service:
name: "{{ resource_name }}"
backends:
- - group: "{{ instancegroup.selfLink }}"
+ - group: "{{ instancegroup.selfLink }}"
health_checks:
- - "{{ healthcheck.selfLink }}"
- enable_cdn: 'true'
+ - "{{ healthcheck.selfLink }}"
+ enable_cdn: "true"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that backend_service was deleted
+- name: Verify that backend_service was deleted
google.cloud.gcp_compute_backend_service_info:
- filters:
- - name = {{ resource_name }}
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/compute
+ filters:
+ - name = {{ resource_name }}
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | length == 0
# ----------------------------------------------------------------------------
-- name: delete a backend service that does not exist
+- name: Delete a backend service that does not exist
google.cloud.gcp_compute_backend_service:
name: "{{ resource_name }}"
backends:
- - group: "{{ instancegroup.selfLink }}"
+ - group: "{{ instancegroup.selfLink }}"
health_checks:
- - "{{ healthcheck.selfLink }}"
- enable_cdn: 'true'
+ - "{{ healthcheck.selfLink }}"
+ enable_cdn: "true"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#---------------------------------------------------------
# Post-test teardown
# If errors happen, don't crash the playbook!
-- name: delete a HTTP health check
+- name: Delete a HTTP health check
google.cloud.gcp_compute_http_health_check:
name: httphealthcheck-backendservice
healthy_threshold: 10
@@ -158,17 +158,17 @@
unhealthy_threshold: 5
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: healthcheck
ignore_errors: true
-- name: delete a instance group
+- name: Delete a instance group
google.cloud.gcp_compute_instance_group:
name: instancegroup-backendservice
zone: us-central1-a
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: instancegroup
ignore_errors: true
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_backend_service/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_backend_service/tasks/main.yml
index 45d6e4917..fe47378c2 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_backend_service/tasks/main.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_backend_service/tasks/main.yml
@@ -1,2 +1,3 @@
---
-- include_tasks: autogen.yml
+- name: Generated tests
+ ansible.builtin.include_tasks: autogen.yml
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_disk/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_disk/tasks/autogen.yml
index 5f81dd0d5..963797247 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_disk/tasks/autogen.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_disk/tasks/autogen.yml
@@ -13,7 +13,7 @@
#
# ----------------------------------------------------------------------------
# Pre-test setup
-- name: delete a disk
+- name: Delete a disk
google.cloud.gcp_compute_disk:
name: "{{ resource_name }}"
size_gb: 50
@@ -22,10 +22,10 @@
zone: us-central1-a
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
#----------------------------------------------------------
-- name: create a disk
+- name: Create a disk
google.cloud.gcp_compute_disk:
name: "{{ resource_name }}"
size_gb: 50
@@ -34,30 +34,30 @@
zone: us-central1-a
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that disk was created
+- name: Verify that disk was created
google.cloud.gcp_compute_disk_info:
- filters:
- - name = {{ resource_name }}
- zone: us-central1-a
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/compute
+ filters:
+ - name = {{ resource_name }}
+ zone: us-central1-a
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | length == 1
# ----------------------------------------------------------------------------
-- name: create a disk that already exists
+- name: Create a disk that already exists
google.cloud.gcp_compute_disk:
name: "{{ resource_name }}"
size_gb: 50
@@ -66,15 +66,15 @@
zone: us-central1-a
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#----------------------------------------------------------
-- name: delete a disk
+- name: Delete a disk
google.cloud.gcp_compute_disk:
name: "{{ resource_name }}"
size_gb: 50
@@ -83,30 +83,30 @@
zone: us-central1-a
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that disk was deleted
+- name: Verify that disk was deleted
google.cloud.gcp_compute_disk_info:
- filters:
- - name = {{ resource_name }}
- zone: us-central1-a
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/compute
+ filters:
+ - name = {{ resource_name }}
+ zone: us-central1-a
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | length == 0
# ----------------------------------------------------------------------------
-- name: delete a disk that does not exist
+- name: Delete a disk that does not exist
google.cloud.gcp_compute_disk:
name: "{{ resource_name }}"
size_gb: 50
@@ -115,10 +115,10 @@
zone: us-central1-a
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_disk/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_disk/tasks/main.yml
index 45d6e4917..fe47378c2 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_disk/tasks/main.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_disk/tasks/main.yml
@@ -1,2 +1,3 @@
---
-- include_tasks: autogen.yml
+- name: Generated tests
+ ansible.builtin.include_tasks: autogen.yml
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_external_vpn_gateway/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_external_vpn_gateway/tasks/autogen.yml
index a2cd62321..f6fd6da77 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_external_vpn_gateway/tasks/autogen.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_external_vpn_gateway/tasks/autogen.yml
@@ -13,115 +13,115 @@
#
# ----------------------------------------------------------------------------
# Pre-test setup
-- name: delete a external vpn gateway
+- name: Delete a external vpn gateway
google.cloud.gcp_compute_external_vpn_gateway:
name: "{{ resource_name }}"
redundancy_type: SINGLE_IP_INTERNALLY_REDUNDANT
description: An externaly managed VPN gateway
interfaces:
- - id: 0
- ip_address: 8.8.8.8
+ - id: 0
+ ip_address: 8.8.8.8
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
#----------------------------------------------------------
-- name: create a external vpn gateway
+- name: Create a external vpn gateway
google.cloud.gcp_compute_external_vpn_gateway:
name: "{{ resource_name }}"
redundancy_type: SINGLE_IP_INTERNALLY_REDUNDANT
description: An externalyl managed VPN gateway
interfaces:
- - id: 0
- ip_address: 8.8.8.8
+ - id: 0
+ ip_address: 8.8.8.8
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that external_vpn_gateway was created
+- name: Verify that external_vpn_gateway was created
google.cloud.gcp_compute_external_vpn_gateway_info:
- filters:
- - name = {{ resource_name }}
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/compute
+ filters:
+ - name = {{ resource_name }}
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | length == 1
# ----------------------------------------------------------------------------
-- name: create a external vpn gateway that already exists
+- name: Create a external vpn gateway that already exists
google.cloud.gcp_compute_external_vpn_gateway:
name: "{{ resource_name }}"
redundancy_type: SINGLE_IP_INTERNALLY_REDUNDANT
description: An externalyl managed VPN gateway
interfaces:
- - id: 0
- ip_address: 8.8.8.8
+ - id: 0
+ ip_address: 8.8.8.8
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#----------------------------------------------------------
-- name: delete a external vpn gateway
+- name: Delete a external vpn gateway
google.cloud.gcp_compute_external_vpn_gateway:
name: "{{ resource_name }}"
redundancy_type: SINGLE_IP_INTERNALLY_REDUNDANT
description: An externalyl managed VPN gateway
interfaces:
- - id: 0
- ip_address: 8.8.8.8
+ - id: 0
+ ip_address: 8.8.8.8
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that external_vpn_gateway was deleted
+- name: Verify that external_vpn_gateway was deleted
google.cloud.gcp_compute_external_vpn_gateway_info:
- filters:
- - name = {{ resource_name }}
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/compute
+ filters:
+ - name = {{ resource_name }}
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | length == 0
# ----------------------------------------------------------------------------
-- name: delete a external vpn gateway that does not exist
+- name: Delete a external vpn gateway that does not exist
google.cloud.gcp_compute_external_vpn_gateway:
name: "{{ resource_name }}"
redundancy_type: SINGLE_IP_INTERNALLY_REDUNDANT
description: An externalyl managed VPN gateway
interfaces:
- - id: 0
- ip_address: 8.8.8.8
+ - id: 0
+ ip_address: 8.8.8.8
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_external_vpn_gateway/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_external_vpn_gateway/tasks/main.yml
index 45d6e4917..fe47378c2 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_external_vpn_gateway/tasks/main.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_external_vpn_gateway/tasks/main.yml
@@ -1,2 +1,3 @@
---
-- include_tasks: autogen.yml
+- name: Generated tests
+ ansible.builtin.include_tasks: autogen.yml
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_firewall/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_firewall/tasks/autogen.yml
index 42d0f124e..bf51839d3 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_firewall/tasks/autogen.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_firewall/tasks/autogen.yml
@@ -13,135 +13,135 @@
#
# ----------------------------------------------------------------------------
# Pre-test setup
-- name: delete a firewall
+- name: Delete a firewall
google.cloud.gcp_compute_firewall:
name: "{{ resource_name }}"
allowed:
- - ip_protocol: tcp
- ports:
- - '22'
+ - ip_protocol: tcp
+ ports:
+ - "22"
target_tags:
- - test-ssh-server
- - staging-ssh-server
+ - test-ssh-server
+ - staging-ssh-server
source_tags:
- - test-ssh-clients
+ - test-ssh-clients
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
#----------------------------------------------------------
-- name: create a firewall
+- name: Create a firewall
google.cloud.gcp_compute_firewall:
name: "{{ resource_name }}"
allowed:
- - ip_protocol: tcp
- ports:
- - '22'
+ - ip_protocol: tcp
+ ports:
+ - "22"
target_tags:
- - test-ssh-server
- - staging-ssh-server
+ - test-ssh-server
+ - staging-ssh-server
source_tags:
- - test-ssh-clients
+ - test-ssh-clients
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that firewall was created
+- name: Verify that firewall was created
google.cloud.gcp_compute_firewall_info:
- filters:
- - name = {{ resource_name }}
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/compute
+ filters:
+ - name = {{ resource_name }}
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | length == 1
# ----------------------------------------------------------------------------
-- name: create a firewall that already exists
+- name: Create a firewall that already exists
google.cloud.gcp_compute_firewall:
name: "{{ resource_name }}"
allowed:
- - ip_protocol: tcp
- ports:
- - '22'
+ - ip_protocol: tcp
+ ports:
+ - "22"
target_tags:
- - test-ssh-server
- - staging-ssh-server
+ - test-ssh-server
+ - staging-ssh-server
source_tags:
- - test-ssh-clients
+ - test-ssh-clients
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#----------------------------------------------------------
-- name: delete a firewall
+- name: Delete a firewall
google.cloud.gcp_compute_firewall:
name: "{{ resource_name }}"
allowed:
- - ip_protocol: tcp
- ports:
- - '22'
+ - ip_protocol: tcp
+ ports:
+ - "22"
target_tags:
- - test-ssh-server
- - staging-ssh-server
+ - test-ssh-server
+ - staging-ssh-server
source_tags:
- - test-ssh-clients
+ - test-ssh-clients
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that firewall was deleted
+- name: Verify that firewall was deleted
google.cloud.gcp_compute_firewall_info:
- filters:
- - name = {{ resource_name }}
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/compute
+ filters:
+ - name = {{ resource_name }}
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | length == 0
# ----------------------------------------------------------------------------
-- name: delete a firewall that does not exist
+- name: Delete a firewall that does not exist
google.cloud.gcp_compute_firewall:
name: "{{ resource_name }}"
allowed:
- - ip_protocol: tcp
- ports:
- - '22'
+ - ip_protocol: tcp
+ ports:
+ - "22"
target_tags:
- - test-ssh-server
- - staging-ssh-server
+ - test-ssh-server
+ - staging-ssh-server
source_tags:
- - test-ssh-clients
+ - test-ssh-clients
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_firewall/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_firewall/tasks/main.yml
index 3cfb1cb12..b26677370 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_firewall/tasks/main.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_firewall/tasks/main.yml
@@ -1,3 +1,5 @@
---
-- include_tasks: update.yml
-- include_tasks: autogen.yml
+- name: Update test
+ ansible.builtin.include_tasks: update.yml
+- name: Generated tests
+ ansible.builtin.include_tasks: autogen.yml
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_firewall/tasks/update.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_firewall/tasks/update.yml
index 3ebbd21d0..3a2f73a9b 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_firewall/tasks/update.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_firewall/tasks/update.yml
@@ -26,154 +26,154 @@
#
# ----------------------------------------------------------------------------
# Pre-test setup
-- name: delete a firewall
+- name: Delete a firewall
google.cloud.gcp_compute_firewall:
name: "{{ resource_name }}"
allowed:
- - ip_protocol: tcp
- ports:
- - '22'
+ - ip_protocol: tcp
+ ports:
+ - "22"
target_tags:
- - test-ssh-server
- - staging-ssh-server
+ - test-ssh-server
+ - staging-ssh-server
source_tags:
- - test-ssh-clients
+ - test-ssh-clients
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
#----------------------------------------------------------
-- name: create a firewall
+- name: Create a firewall
google.cloud.gcp_compute_firewall:
name: "{{ resource_name }}"
allowed:
- - ip_protocol: tcp
- ports:
- - '22'
+ - ip_protocol: tcp
+ ports:
+ - "22"
target_tags:
- - test-ssh-server
- - staging-ssh-server
+ - test-ssh-server
+ - staging-ssh-server
source_tags:
- - test-ssh-clients
+ - test-ssh-clients
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that firewall was created
+- name: Verify that firewall was created
google.cloud.gcp_compute_firewall_info:
- filters:
- - name = {{ resource_name }}
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/compute
+ filters:
+ - name = {{ resource_name }}
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | length == 1
# ----------------------------------------------------------------------------
-- name: update the firewall
+- name: Update the firewall
google.cloud.gcp_compute_firewall:
name: "{{ resource_name }}"
allowed:
- - ip_protocol: tcp
- ports:
- - '55'
+ - ip_protocol: tcp
+ ports:
+ - "55"
target_tags:
- - test-ssh-server
- - staging-ssh-server
+ - test-ssh-server
+ - staging-ssh-server
source_tags:
- - test-ssh-clients
+ - test-ssh-clients
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
# ----------------------------------------------------------------------------
-- name: check firewall was updated.
+- name: Check firewall was updated.
google.cloud.gcp_compute_firewall_info:
- filters:
- - name = {{ resource_name }}
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/compute
+ filters:
+ - name = {{ resource_name }}
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | length == 1
-- name: verify that update succeeded
- assert:
+- name: Verify that update succeeded
+ ansible.builtin.assert:
that:
- results['resources'][0]['allowed'][0]['ports'][0] == '55'
#----------------------------------------------------------
-- name: delete a firewall
+- name: Delete a firewall
google.cloud.gcp_compute_firewall:
name: "{{ resource_name }}"
allowed:
- - ip_protocol: tcp
- ports:
- - '22'
+ - ip_protocol: tcp
+ ports:
+ - "22"
target_tags:
- - test-ssh-server
- - staging-ssh-server
+ - test-ssh-server
+ - staging-ssh-server
source_tags:
- - test-ssh-clients
+ - test-ssh-clients
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that firewall was deleted
+- name: Verify that firewall was deleted
google.cloud.gcp_compute_firewall_info:
- filters:
- - name = {{ resource_name }}
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/compute
+ filters:
+ - name = {{ resource_name }}
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | length == 0
# ----------------------------------------------------------------------------
-- name: delete a firewall that does not exist
+- name: Delete a firewall that does not exist
google.cloud.gcp_compute_firewall:
name: "{{ resource_name }}"
allowed:
- - ip_protocol: tcp
- ports:
- - '22'
+ - ip_protocol: tcp
+ ports:
+ - "22"
target_tags:
- - test-ssh-server
- - staging-ssh-server
+ - test-ssh-server
+ - staging-ssh-server
source_tags:
- - test-ssh-clients
+ - test-ssh-clients
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_forwarding_rule/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_forwarding_rule/tasks/autogen.yml
index 38c67df83..c26206fe7 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_forwarding_rule/tasks/autogen.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_forwarding_rule/tasks/autogen.yml
@@ -13,25 +13,25 @@
#
# ----------------------------------------------------------------------------
# Pre-test setup
-- name: create a address
+- name: Create a address
google.cloud.gcp_compute_address:
name: address-forwardingrule
region: us-west1
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: address
-- name: create a target pool
+- name: Create a target pool
google.cloud.gcp_compute_target_pool:
name: targetpool-forwardingrule
region: us-west1
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: targetpool
-- name: delete a forwarding rule
+- name: Delete a forwarding rule
google.cloud.gcp_compute_forwarding_rule:
name: "{{ resource_name }}"
region: us-west1
@@ -41,10 +41,10 @@
ip_address: "{{ address.address }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
#----------------------------------------------------------
-- name: create a forwarding rule
+- name: Create a forwarding rule
google.cloud.gcp_compute_forwarding_rule:
name: "{{ resource_name }}"
region: us-west1
@@ -54,30 +54,30 @@
ip_address: "{{ address.address }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that forwarding_rule was created
+- name: Verify that forwarding_rule was created
google.cloud.gcp_compute_forwarding_rule_info:
- filters:
- - name = {{ resource_name }}
- region: us-west1
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/compute
+ filters:
+ - name = {{ resource_name }}
+ region: us-west1
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | length == 1
# ----------------------------------------------------------------------------
-- name: create a forwarding rule that already exists
+- name: Create a forwarding rule that already exists
google.cloud.gcp_compute_forwarding_rule:
name: "{{ resource_name }}"
region: us-west1
@@ -87,15 +87,15 @@
ip_address: "{{ address.address }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#----------------------------------------------------------
-- name: delete a forwarding rule
+- name: Delete a forwarding rule
google.cloud.gcp_compute_forwarding_rule:
name: "{{ resource_name }}"
region: us-west1
@@ -105,30 +105,30 @@
ip_address: "{{ address.address }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that forwarding_rule was deleted
+- name: Verify that forwarding_rule was deleted
google.cloud.gcp_compute_forwarding_rule_info:
- filters:
- - name = {{ resource_name }}
- region: us-west1
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/compute
+ filters:
+ - name = {{ resource_name }}
+ region: us-west1
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | length == 0
# ----------------------------------------------------------------------------
-- name: delete a forwarding rule that does not exist
+- name: Delete a forwarding rule that does not exist
google.cloud.gcp_compute_forwarding_rule:
name: "{{ resource_name }}"
region: us-west1
@@ -138,33 +138,33 @@
ip_address: "{{ address.address }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#---------------------------------------------------------
# Post-test teardown
# If errors happen, don't crash the playbook!
-- name: delete a target pool
+- name: Delete a target pool
google.cloud.gcp_compute_target_pool:
name: targetpool-forwardingrule
region: us-west1
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: targetpool
ignore_errors: true
-- name: delete a address
+- name: Delete a address
google.cloud.gcp_compute_address:
name: address-forwardingrule
region: us-west1
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: address
ignore_errors: true
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_forwarding_rule/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_forwarding_rule/tasks/main.yml
index 45d6e4917..fe47378c2 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_forwarding_rule/tasks/main.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_forwarding_rule/tasks/main.yml
@@ -1,2 +1,3 @@
---
-- include_tasks: autogen.yml
+- name: Generated tests
+ ansible.builtin.include_tasks: autogen.yml
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_global_address/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_global_address/tasks/autogen.yml
index ac99653fe..3333e3f51 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_global_address/tasks/autogen.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_global_address/tasks/autogen.yml
@@ -13,90 +13,90 @@
#
# ----------------------------------------------------------------------------
# Pre-test setup
-- name: delete a global address
+- name: Delete a global address
google.cloud.gcp_compute_global_address:
name: "{{ resource_name }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
#----------------------------------------------------------
-- name: create a global address
+- name: Create a global address
google.cloud.gcp_compute_global_address:
name: "{{ resource_name }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that global_address was created
+- name: Verify that global_address was created
google.cloud.gcp_compute_global_address_info:
- filters:
- - name = {{ resource_name }}
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/compute
+ filters:
+ - name = {{ resource_name }}
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | length == 1
# ----------------------------------------------------------------------------
-- name: create a global address that already exists
+- name: Create a global address that already exists
google.cloud.gcp_compute_global_address:
name: "{{ resource_name }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#----------------------------------------------------------
-- name: delete a global address
+- name: Delete a global address
google.cloud.gcp_compute_global_address:
name: "{{ resource_name }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that global_address was deleted
+- name: Verify that global_address was deleted
google.cloud.gcp_compute_global_address_info:
- filters:
- - name = {{ resource_name }}
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/compute
+ filters:
+ - name = {{ resource_name }}
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | length == 0
# ----------------------------------------------------------------------------
-- name: delete a global address that does not exist
+- name: Delete a global address that does not exist
google.cloud.gcp_compute_global_address:
name: "{{ resource_name }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_global_address/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_global_address/tasks/main.yml
index 45d6e4917..fe47378c2 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_global_address/tasks/main.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_global_address/tasks/main.yml
@@ -1,2 +1,3 @@
---
-- include_tasks: autogen.yml
+- name: Generated tests
+ ansible.builtin.include_tasks: autogen.yml
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_global_forwarding_rule/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_global_forwarding_rule/tasks/autogen.yml
index 38d5d85da..93bab3afe 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_global_forwarding_rule/tasks/autogen.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_global_forwarding_rule/tasks/autogen.yml
@@ -13,24 +13,24 @@
#
# ----------------------------------------------------------------------------
# Pre-test setup
-- name: create a global address
+- name: Create a global address
google.cloud.gcp_compute_global_address:
name: globaladdress-globalforwardingrule
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: globaladdress
-- name: create a instance group
+- name: Create a instance group
google.cloud.gcp_compute_instance_group:
name: instancegroup-globalforwardingrule
zone: us-central1-a
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: instancegroup
-- name: create a HTTP health check
+- name: Create a HTTP health check
google.cloud.gcp_compute_http_health_check:
name: httphealthcheck-globalforwardingrule
healthy_threshold: 10
@@ -39,41 +39,41 @@
unhealthy_threshold: 5
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: healthcheck
-- name: create a backend service
+- name: Create a backend service
google.cloud.gcp_compute_backend_service:
name: backendservice-globalforwardingrule
backends:
- - group: "{{ instancegroup.selfLink }}"
+ - group: "{{ instancegroup.selfLink }}"
health_checks:
- - "{{ healthcheck.selfLink }}"
- enable_cdn: 'true'
+ - "{{ healthcheck.selfLink }}"
+ enable_cdn: "true"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: backendservice
-- name: create a URL map
+- name: Create a URL map
google.cloud.gcp_compute_url_map:
name: urlmap-globalforwardingrule
default_service: "{{ backendservice }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: urlmap
-- name: create a target HTTP proxy
+- name: Create a target HTTP proxy
google.cloud.gcp_compute_target_http_proxy:
name: targethttpproxy-globalforwardingrule
url_map: "{{ urlmap }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: httpproxy
-- name: delete a global forwarding rule
+- name: Delete a global forwarding rule
google.cloud.gcp_compute_global_forwarding_rule:
name: "{{ resource_name }}"
ip_address: "{{ globaladdress.address }}"
@@ -82,10 +82,10 @@
target: "{{ httpproxy.selfLink }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
#----------------------------------------------------------
-- name: create a global forwarding rule
+- name: Create a global forwarding rule
google.cloud.gcp_compute_global_forwarding_rule:
name: "{{ resource_name }}"
ip_address: "{{ globaladdress.address }}"
@@ -94,29 +94,29 @@
target: "{{ httpproxy.selfLink }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that global_forwarding_rule was created
+- name: Verify that global_forwarding_rule was created
google.cloud.gcp_compute_global_forwarding_rule_info:
- filters:
- - name = {{ resource_name }}
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/compute
+ filters:
+ - name = {{ resource_name }}
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | length == 1
# ----------------------------------------------------------------------------
-- name: create a global forwarding rule that already exists
+- name: Create a global forwarding rule that already exists
google.cloud.gcp_compute_global_forwarding_rule:
name: "{{ resource_name }}"
ip_address: "{{ globaladdress.address }}"
@@ -125,15 +125,15 @@
target: "{{ httpproxy.selfLink }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#----------------------------------------------------------
-- name: delete a global forwarding rule
+- name: Delete a global forwarding rule
google.cloud.gcp_compute_global_forwarding_rule:
name: "{{ resource_name }}"
ip_address: "{{ globaladdress.address }}"
@@ -142,29 +142,29 @@
target: "{{ httpproxy.selfLink }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that global_forwarding_rule was deleted
+- name: Verify that global_forwarding_rule was deleted
google.cloud.gcp_compute_global_forwarding_rule_info:
- filters:
- - name = {{ resource_name }}
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/compute
+ filters:
+ - name = {{ resource_name }}
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | length == 0
# ----------------------------------------------------------------------------
-- name: delete a global forwarding rule that does not exist
+- name: Delete a global forwarding rule that does not exist
google.cloud.gcp_compute_global_forwarding_rule:
name: "{{ resource_name }}"
ip_address: "{{ globaladdress.address }}"
@@ -173,51 +173,51 @@
target: "{{ httpproxy.selfLink }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#---------------------------------------------------------
# Post-test teardown
# If errors happen, don't crash the playbook!
-- name: delete a target HTTP proxy
+- name: Delete a target HTTP proxy
google.cloud.gcp_compute_target_http_proxy:
name: targethttpproxy-globalforwardingrule
url_map: "{{ urlmap }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: httpproxy
ignore_errors: true
-- name: delete a URL map
+- name: Delete a URL map
google.cloud.gcp_compute_url_map:
name: urlmap-globalforwardingrule
default_service: "{{ backendservice }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: urlmap
ignore_errors: true
-- name: delete a backend service
+- name: Delete a backend service
google.cloud.gcp_compute_backend_service:
name: backendservice-globalforwardingrule
backends:
- - group: "{{ instancegroup.selfLink }}"
+ - group: "{{ instancegroup.selfLink }}"
health_checks:
- - "{{ healthcheck.selfLink }}"
- enable_cdn: 'true'
+ - "{{ healthcheck.selfLink }}"
+ enable_cdn: "true"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: backendservice
ignore_errors: true
-- name: delete a HTTP health check
+- name: Delete a HTTP health check
google.cloud.gcp_compute_http_health_check:
name: httphealthcheck-globalforwardingrule
healthy_threshold: 10
@@ -226,26 +226,26 @@
unhealthy_threshold: 5
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: healthcheck
ignore_errors: true
-- name: delete a instance group
+- name: Delete a instance group
google.cloud.gcp_compute_instance_group:
name: instancegroup-globalforwardingrule
zone: us-central1-a
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: instancegroup
ignore_errors: true
-- name: delete a global address
+- name: Delete a global address
google.cloud.gcp_compute_global_address:
name: globaladdress-globalforwardingrule
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: globaladdress
ignore_errors: true
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_global_forwarding_rule/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_global_forwarding_rule/tasks/main.yml
index 45d6e4917..fe47378c2 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_global_forwarding_rule/tasks/main.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_global_forwarding_rule/tasks/main.yml
@@ -1,2 +1,3 @@
---
-- include_tasks: autogen.yml
+- name: Generated tests
+ ansible.builtin.include_tasks: autogen.yml
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_health_check/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_health_check/tasks/autogen.yml
index a2374c559..d529ec687 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_health_check/tasks/autogen.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_health_check/tasks/autogen.yml
@@ -13,7 +13,7 @@
#
# ----------------------------------------------------------------------------
# Pre-test setup
-- name: delete a health check
+- name: Delete a health check
google.cloud.gcp_compute_health_check:
name: "{{ resource_name }}"
type: TCP
@@ -26,10 +26,10 @@
unhealthy_threshold: 5
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
#----------------------------------------------------------
-- name: create a health check
+- name: Create a health check
google.cloud.gcp_compute_health_check:
name: "{{ resource_name }}"
type: TCP
@@ -42,29 +42,29 @@
unhealthy_threshold: 5
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that health_check was created
+- name: Verify that health_check was created
google.cloud.gcp_compute_health_check_info:
- filters:
- - name = {{ resource_name }}
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/compute
+ filters:
+ - name = {{ resource_name }}
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | length == 1
# ----------------------------------------------------------------------------
-- name: create a health check that already exists
+- name: Create a health check that already exists
google.cloud.gcp_compute_health_check:
name: "{{ resource_name }}"
type: TCP
@@ -77,15 +77,15 @@
unhealthy_threshold: 5
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#----------------------------------------------------------
-- name: delete a health check
+- name: Delete a health check
google.cloud.gcp_compute_health_check:
name: "{{ resource_name }}"
type: TCP
@@ -98,29 +98,29 @@
unhealthy_threshold: 5
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that health_check was deleted
+- name: Verify that health_check was deleted
google.cloud.gcp_compute_health_check_info:
- filters:
- - name = {{ resource_name }}
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/compute
+ filters:
+ - name = {{ resource_name }}
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | length == 0
# ----------------------------------------------------------------------------
-- name: delete a health check that does not exist
+- name: Delete a health check that does not exist
google.cloud.gcp_compute_health_check:
name: "{{ resource_name }}"
type: TCP
@@ -133,10 +133,10 @@
unhealthy_threshold: 5
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_health_check/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_health_check/tasks/main.yml
index 45d6e4917..fe47378c2 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_health_check/tasks/main.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_health_check/tasks/main.yml
@@ -1,2 +1,3 @@
---
-- include_tasks: autogen.yml
+- name: Generated tests
+ ansible.builtin.include_tasks: autogen.yml
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_http_health_check/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_http_health_check/tasks/autogen.yml
index cbf8123d1..1ff3b89da 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_http_health_check/tasks/autogen.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_http_health_check/tasks/autogen.yml
@@ -13,7 +13,7 @@
#
# ----------------------------------------------------------------------------
# Pre-test setup
-- name: delete a HTTP health check
+- name: Delete a HTTP health check
google.cloud.gcp_compute_http_health_check:
name: "{{ resource_name }}"
healthy_threshold: 10
@@ -22,10 +22,10 @@
unhealthy_threshold: 5
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
#----------------------------------------------------------
-- name: create a HTTP health check
+- name: Create a HTTP health check
google.cloud.gcp_compute_http_health_check:
name: "{{ resource_name }}"
healthy_threshold: 10
@@ -34,29 +34,29 @@
unhealthy_threshold: 5
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that http_health_check was created
+- name: Verify that http_health_check was created
google.cloud.gcp_compute_http_health_check_info:
- filters:
- - name = {{ resource_name }}
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/compute
+ filters:
+ - name = {{ resource_name }}
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | length == 1
# ----------------------------------------------------------------------------
-- name: create a HTTP health check that already exists
+- name: Create a HTTP health check that already exists
google.cloud.gcp_compute_http_health_check:
name: "{{ resource_name }}"
healthy_threshold: 10
@@ -65,15 +65,15 @@
unhealthy_threshold: 5
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#----------------------------------------------------------
-- name: delete a HTTP health check
+- name: Delete a HTTP health check
google.cloud.gcp_compute_http_health_check:
name: "{{ resource_name }}"
healthy_threshold: 10
@@ -82,29 +82,29 @@
unhealthy_threshold: 5
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that http_health_check was deleted
+- name: Verify that http_health_check was deleted
google.cloud.gcp_compute_http_health_check_info:
- filters:
- - name = {{ resource_name }}
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/compute
+ filters:
+ - name = {{ resource_name }}
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | length == 0
# ----------------------------------------------------------------------------
-- name: delete a HTTP health check that does not exist
+- name: Delete a HTTP health check that does not exist
google.cloud.gcp_compute_http_health_check:
name: "{{ resource_name }}"
healthy_threshold: 10
@@ -113,10 +113,10 @@
unhealthy_threshold: 5
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_http_health_check/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_http_health_check/tasks/main.yml
index 45d6e4917..fe47378c2 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_http_health_check/tasks/main.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_http_health_check/tasks/main.yml
@@ -1,2 +1,3 @@
---
-- include_tasks: autogen.yml
+- name: Generated tests
+ ansible.builtin.include_tasks: autogen.yml
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_https_health_check/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_https_health_check/tasks/autogen.yml
index b53fb1dc4..c79968c03 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_https_health_check/tasks/autogen.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_https_health_check/tasks/autogen.yml
@@ -13,7 +13,7 @@
#
# ----------------------------------------------------------------------------
# Pre-test setup
-- name: delete a HTTPS health check
+- name: Delete a HTTPS health check
google.cloud.gcp_compute_https_health_check:
name: "{{ resource_name }}"
healthy_threshold: 10
@@ -22,10 +22,10 @@
unhealthy_threshold: 5
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
#----------------------------------------------------------
-- name: create a HTTPS health check
+- name: Create a HTTPS health check
google.cloud.gcp_compute_https_health_check:
name: "{{ resource_name }}"
healthy_threshold: 10
@@ -34,29 +34,29 @@
unhealthy_threshold: 5
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that https_health_check was created
+- name: Verify that https_health_check was created
google.cloud.gcp_compute_https_health_check_info:
- filters:
- - name = {{ resource_name }}
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/compute
+ filters:
+ - name = {{ resource_name }}
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | length == 1
# ----------------------------------------------------------------------------
-- name: create a HTTPS health check that already exists
+- name: Create a HTTPS health check that already exists
google.cloud.gcp_compute_https_health_check:
name: "{{ resource_name }}"
healthy_threshold: 10
@@ -65,15 +65,15 @@
unhealthy_threshold: 5
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#----------------------------------------------------------
-- name: delete a HTTPS health check
+- name: Delete a HTTPS health check
google.cloud.gcp_compute_https_health_check:
name: "{{ resource_name }}"
healthy_threshold: 10
@@ -82,29 +82,29 @@
unhealthy_threshold: 5
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that https_health_check was deleted
+- name: Verify that https_health_check was deleted
google.cloud.gcp_compute_https_health_check_info:
- filters:
- - name = {{ resource_name }}
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/compute
+ filters:
+ - name = {{ resource_name }}
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | length == 0
# ----------------------------------------------------------------------------
-- name: delete a HTTPS health check that does not exist
+- name: Delete a HTTPS health check that does not exist
google.cloud.gcp_compute_https_health_check:
name: "{{ resource_name }}"
healthy_threshold: 10
@@ -113,10 +113,10 @@
unhealthy_threshold: 5
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_https_health_check/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_https_health_check/tasks/main.yml
index 45d6e4917..fe47378c2 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_https_health_check/tasks/main.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_https_health_check/tasks/main.yml
@@ -1,2 +1,3 @@
---
-- include_tasks: autogen.yml
+- name: Generated tests
+ ansible.builtin.include_tasks: autogen.yml
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_image/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_image/tasks/autogen.yml
index 40fa8704b..e44f01021 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_image/tasks/autogen.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_image/tasks/autogen.yml
@@ -13,117 +13,117 @@
#
# ----------------------------------------------------------------------------
# Pre-test setup
-- name: create a disk
+- name: Create a disk
google.cloud.gcp_compute_disk:
name: disk-image
zone: us-central1-a
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: disk
-- name: delete a image
+- name: Delete a image
google.cloud.gcp_compute_image:
name: "{{ resource_name }}"
source_disk: "{{ disk }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
#----------------------------------------------------------
-- name: create a image
+- name: Create a image
google.cloud.gcp_compute_image:
name: "{{ resource_name }}"
source_disk: "{{ disk }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that image was created
+- name: Verify that image was created
google.cloud.gcp_compute_image_info:
- filters:
- - name = {{ resource_name }}
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/compute
+ filters:
+ - name = {{ resource_name }}
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | length == 1
# ----------------------------------------------------------------------------
-- name: create a image that already exists
+- name: Create a image that already exists
google.cloud.gcp_compute_image:
name: "{{ resource_name }}"
source_disk: "{{ disk }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#----------------------------------------------------------
-- name: delete a image
+- name: Delete a image
google.cloud.gcp_compute_image:
name: "{{ resource_name }}"
source_disk: "{{ disk }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that image was deleted
+- name: Verify that image was deleted
google.cloud.gcp_compute_image_info:
- filters:
- - name = {{ resource_name }}
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/compute
+ filters:
+ - name = {{ resource_name }}
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | length == 0
# ----------------------------------------------------------------------------
-- name: delete a image that does not exist
+- name: Delete a image that does not exist
google.cloud.gcp_compute_image:
name: "{{ resource_name }}"
source_disk: "{{ disk }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#---------------------------------------------------------
# Post-test teardown
# If errors happen, don't crash the playbook!
-- name: delete a disk
+- name: Delete a disk
google.cloud.gcp_compute_disk:
name: disk-image
zone: us-central1-a
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: disk
ignore_errors: true
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_image/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_image/tasks/main.yml
index 45d6e4917..fe47378c2 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_image/tasks/main.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_image/tasks/main.yml
@@ -1,2 +1,3 @@
---
-- include_tasks: autogen.yml
+- name: Generated tests
+ ansible.builtin.include_tasks: autogen.yml
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_instance/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_instance/tasks/autogen.yml
index 5c19f7bfd..fbec1e16d 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_instance/tasks/autogen.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_instance/tasks/autogen.yml
@@ -13,7 +13,7 @@
#
# ----------------------------------------------------------------------------
# Pre-test setup
-- name: create a disk
+- name: Create a disk
google.cloud.gcp_compute_disk:
name: "{{ resource_prefix }}"
size_gb: 50
@@ -21,245 +21,245 @@
zone: us-central1-a
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: disk
-- name: create a network
+- name: Create a network
google.cloud.gcp_compute_network:
name: "{{ resource_prefix }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
auto_create_subnetworks: true
state: present
register: network
-- name: create a address
+- name: Create a address
google.cloud.gcp_compute_address:
name: address-instance
region: us-central1
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: address
-- name: delete a instance
+- name: Delete a instance
google.cloud.gcp_compute_instance:
name: "{{ resource_name }}"
machine_type: n1-standard-1
disks:
- - auto_delete: 'true'
- boot: 'true'
- source: "{{ disk }}"
- - auto_delete: 'true'
- interface: NVME
- type: SCRATCH
- initialize_params:
- disk_type: local-ssd
+ - auto_delete: "true"
+ boot: "true"
+ source: "{{ disk }}"
+ - auto_delete: "true"
+ interface: NVME
+ type: SCRATCH
+ initialize_params:
+ disk_type: local-ssd
metadata:
- cost-center: '12345'
+ cost-center: "12345"
labels:
environment: production
network_interfaces:
- - network: "{{ network }}"
- access_configs:
- - name: External NAT
- nat_ip: "{{ address }}"
- type: ONE_TO_ONE_NAT
+ - network: "{{ network }}"
+ access_configs:
+ - name: External NAT
+ nat_ip: "{{ address }}"
+ type: ONE_TO_ONE_NAT
zone: us-central1-a
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
#----------------------------------------------------------
-- name: create a instance
+- name: Create a instance
google.cloud.gcp_compute_instance:
name: "{{ resource_name }}"
machine_type: n1-standard-1
disks:
- - auto_delete: 'true'
- boot: 'true'
- source: "{{ disk }}"
- - auto_delete: 'true'
- interface: NVME
- type: SCRATCH
- initialize_params:
- disk_type: local-ssd
+ - auto_delete: "true"
+ boot: "true"
+ source: "{{ disk }}"
+ - auto_delete: "true"
+ interface: NVME
+ type: SCRATCH
+ initialize_params:
+ disk_type: local-ssd
metadata:
- cost-center: '12345'
+ cost-center: "12345"
labels:
environment: production
network_interfaces:
- - network: "{{ network }}"
- access_configs:
- - name: External NAT
- nat_ip: "{{ address }}"
- type: ONE_TO_ONE_NAT
+ - network: "{{ network }}"
+ access_configs:
+ - name: External NAT
+ nat_ip: "{{ address }}"
+ type: ONE_TO_ONE_NAT
zone: us-central1-a
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that instance was created
+- name: Verify that instance was created
google.cloud.gcp_compute_instance_info:
- filters:
- - name = {{ resource_name }}
- zone: us-central1-a
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/compute
+ filters:
+ - name = {{ resource_name }}
+ zone: us-central1-a
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | length == 1
# ----------------------------------------------------------------------------
-- name: create a instance that already exists
+- name: Create a instance that already exists
google.cloud.gcp_compute_instance:
name: "{{ resource_name }}"
machine_type: n1-standard-1
disks:
- - auto_delete: 'true'
- boot: 'true'
- source: "{{ disk }}"
- - auto_delete: 'true'
- interface: NVME
- type: SCRATCH
- initialize_params:
- disk_type: local-ssd
+ - auto_delete: "true"
+ boot: "true"
+ source: "{{ disk }}"
+ - auto_delete: "true"
+ interface: NVME
+ type: SCRATCH
+ initialize_params:
+ disk_type: local-ssd
metadata:
- cost-center: '12345'
+ cost-center: "12345"
labels:
environment: production
network_interfaces:
- - network: "{{ network }}"
- access_configs:
- - name: External NAT
- nat_ip: "{{ address }}"
- type: ONE_TO_ONE_NAT
+ - network: "{{ network }}"
+ access_configs:
+ - name: External NAT
+ nat_ip: "{{ address }}"
+ type: ONE_TO_ONE_NAT
zone: us-central1-a
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#----------------------------------------------------------
-- name: delete a instance
+- name: Delete a instance
google.cloud.gcp_compute_instance:
name: "{{ resource_name }}"
machine_type: n1-standard-1
disks:
- - auto_delete: 'true'
- boot: 'true'
- source: "{{ disk }}"
- - auto_delete: 'true'
- interface: NVME
- type: SCRATCH
- initialize_params:
- disk_type: local-ssd
+ - auto_delete: "true"
+ boot: "true"
+ source: "{{ disk }}"
+ - auto_delete: "true"
+ interface: NVME
+ type: SCRATCH
+ initialize_params:
+ disk_type: local-ssd
metadata:
- cost-center: '12345'
+ cost-center: "12345"
labels:
environment: production
network_interfaces:
- - network: "{{ network }}"
- access_configs:
- - name: External NAT
- nat_ip: "{{ address }}"
- type: ONE_TO_ONE_NAT
+ - network: "{{ network }}"
+ access_configs:
+ - name: External NAT
+ nat_ip: "{{ address }}"
+ type: ONE_TO_ONE_NAT
zone: us-central1-a
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that instance was deleted
+- name: Verify that instance was deleted
google.cloud.gcp_compute_instance_info:
- filters:
- - name = {{ resource_name }}
- zone: us-central1-a
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/compute
+ filters:
+ - name = {{ resource_name }}
+ zone: us-central1-a
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | length == 0
# ----------------------------------------------------------------------------
-- name: delete a instance that does not exist
+- name: Delete a instance that does not exist
google.cloud.gcp_compute_instance:
name: "{{ resource_name }}"
machine_type: n1-standard-1
disks:
- - auto_delete: 'true'
- boot: 'true'
- source: "{{ disk }}"
- - auto_delete: 'true'
- interface: NVME
- type: SCRATCH
- initialize_params:
- disk_type: local-ssd
+ - auto_delete: "true"
+ boot: "true"
+ source: "{{ disk }}"
+ - auto_delete: "true"
+ interface: NVME
+ type: SCRATCH
+ initialize_params:
+ disk_type: local-ssd
metadata:
- cost-center: '12345'
+ cost-center: "12345"
labels:
environment: production
network_interfaces:
- - network: "{{ network }}"
- access_configs:
- - name: External NAT
- nat_ip: "{{ address }}"
- type: ONE_TO_ONE_NAT
+ - network: "{{ network }}"
+ access_configs:
+ - name: External NAT
+ nat_ip: "{{ address }}"
+ type: ONE_TO_ONE_NAT
zone: us-central1-a
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#---------------------------------------------------------
# Post-test teardown
# If errors happen, don't crash the playbook!
-- name: delete a address
+- name: Delete a address
google.cloud.gcp_compute_address:
name: address-instance
region: us-central1
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: address
ignore_errors: true
-- name: delete a network
+- name: Delete a network
google.cloud.gcp_compute_network:
name: "{{ resource_prefix }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
auto_create_subnetworks: true
state: absent
register: network
ignore_errors: true
-- name: delete a disk
+- name: Delete a disk
google.cloud.gcp_compute_disk:
name: "{{ resource_prefix }}"
size_gb: 50
@@ -267,7 +267,7 @@
zone: us-central1-a
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: disk
ignore_errors: true
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_instance/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_instance/tasks/main.yml
index 45d6e4917..fe47378c2 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_instance/tasks/main.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_instance/tasks/main.yml
@@ -1,2 +1,3 @@
---
-- include_tasks: autogen.yml
+- name: Generated tests
+ ansible.builtin.include_tasks: autogen.yml
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_instance_group/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_instance_group/tasks/autogen.yml
index 30893e403..340c8ca0c 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_instance_group/tasks/autogen.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_instance_group/tasks/autogen.yml
@@ -13,138 +13,138 @@
#
# ----------------------------------------------------------------------------
# Pre-test setup
-- name: create a network
+- name: Create a network
google.cloud.gcp_compute_network:
name: network-instancegroup
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
auto_create_subnetworks: true
state: present
register: network
-- name: delete a instance group
+- name: Delete a instance group
google.cloud.gcp_compute_instance_group:
name: "{{ resource_name }}"
named_ports:
- - name: ansible
- port: 1234
+ - name: ansible
+ port: 1234
network: "{{ network }}"
zone: us-central1-a
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
#----------------------------------------------------------
-- name: create a instance group
+- name: Create a instance group
google.cloud.gcp_compute_instance_group:
name: "{{ resource_name }}"
named_ports:
- - name: ansible
- port: 1234
+ - name: ansible
+ port: 1234
network: "{{ network }}"
zone: us-central1-a
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that instance_group was created
+- name: Verify that instance_group was created
google.cloud.gcp_compute_instance_group_info:
- filters:
- - name = {{ resource_name }}
- zone: us-central1-a
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/compute
+ filters:
+ - name = {{ resource_name }}
+ zone: us-central1-a
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | length == 1
# ----------------------------------------------------------------------------
-- name: create a instance group that already exists
+- name: Create a instance group that already exists
google.cloud.gcp_compute_instance_group:
name: "{{ resource_name }}"
named_ports:
- - name: ansible
- port: 1234
+ - name: ansible
+ port: 1234
network: "{{ network }}"
zone: us-central1-a
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#----------------------------------------------------------
-- name: delete a instance group
+- name: Delete a instance group
google.cloud.gcp_compute_instance_group:
name: "{{ resource_name }}"
named_ports:
- - name: ansible
- port: 1234
+ - name: ansible
+ port: 1234
network: "{{ network }}"
zone: us-central1-a
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that instance_group was deleted
+- name: Verify that instance_group was deleted
google.cloud.gcp_compute_instance_group_info:
- filters:
- - name = {{ resource_name }}
- zone: us-central1-a
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/compute
+ filters:
+ - name = {{ resource_name }}
+ zone: us-central1-a
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | length == 0
# ----------------------------------------------------------------------------
-- name: delete a instance group that does not exist
+- name: Delete a instance group that does not exist
google.cloud.gcp_compute_instance_group:
name: "{{ resource_name }}"
named_ports:
- - name: ansible
- port: 1234
+ - name: ansible
+ port: 1234
network: "{{ network }}"
zone: us-central1-a
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#---------------------------------------------------------
# Post-test teardown
# If errors happen, don't crash the playbook!
-- name: delete a network
+- name: Delete a network
google.cloud.gcp_compute_network:
name: network-instancegroup
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
auto_create_subnetworks: true
state: absent
register: network
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_instance_group/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_instance_group/tasks/main.yml
index 45d6e4917..fe47378c2 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_instance_group/tasks/main.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_instance_group/tasks/main.yml
@@ -1,2 +1,3 @@
---
-- include_tasks: autogen.yml
+- name: Generated tests
+ ansible.builtin.include_tasks: autogen.yml
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_instance_group_manager/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_instance_group_manager/tasks/autogen.yml
index 8ce7668b5..a60441e21 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_instance_group_manager/tasks/autogen.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_instance_group_manager/tasks/autogen.yml
@@ -13,46 +13,46 @@
#
# ----------------------------------------------------------------------------
# Pre-test setup
-- name: create a network
+- name: Create a network
google.cloud.gcp_compute_network:
name: network-instancetemplate
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
auto_create_subnetworks: true
state: present
register: network
-- name: create a address
+- name: Create a address
google.cloud.gcp_compute_address:
name: address-instancetemplate
region: us-west1
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: address
-- name: create a instance template
+- name: Create a instance template
google.cloud.gcp_compute_instance_template:
name: "{{ resource_name }}"
properties:
disks:
- - auto_delete: 'true'
- boot: 'true'
- initialize_params:
- source_image: projects/ubuntu-os-cloud/global/images/family/ubuntu-minimal-2204-lts
+ - auto_delete: "true"
+ boot: "true"
+ initialize_params:
+ source_image: projects/ubuntu-os-cloud/global/images/family/ubuntu-minimal-2204-lts
machine_type: n1-standard-1
network_interfaces:
- - network: "{{ network }}"
- access_configs:
- - name: test-config
- type: ONE_TO_ONE_NAT
- nat_ip: "{{ address }}"
+ - network: "{{ network }}"
+ access_configs:
+ - name: test-config
+ type: ONE_TO_ONE_NAT
+ nat_ip: "{{ address }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: instancetemplate
-- name: delete a instance group manager
+- name: Delete a instance group manager
google.cloud.gcp_compute_instance_group_manager:
name: "{{ resource_name }}"
base_instance_name: test1-child
@@ -61,10 +61,10 @@
zone: us-west1-a
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
#----------------------------------------------------------
-- name: create a instance group manager
+- name: Create a instance group manager
google.cloud.gcp_compute_instance_group_manager:
name: "{{ resource_name }}"
base_instance_name: test1-child
@@ -73,30 +73,30 @@
zone: us-west1-a
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that instance_group_manager was created
+- name: Verify that instance_group_manager was created
google.cloud.gcp_compute_instance_group_manager_info:
- filters:
- - name = {{ resource_name }}
- zone: us-west1-a
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/compute
+ filters:
+ - name = {{ resource_name }}
+ zone: us-west1-a
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | length == 1
# ----------------------------------------------------------------------------
-- name: create a instance group manager that already exists
+- name: Create a instance group manager that already exists
google.cloud.gcp_compute_instance_group_manager:
name: "{{ resource_name }}"
base_instance_name: test1-child
@@ -105,15 +105,15 @@
zone: us-west1-a
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#----------------------------------------------------------
-- name: delete a instance group manager
+- name: Delete a instance group manager
google.cloud.gcp_compute_instance_group_manager:
name: "{{ resource_name }}"
base_instance_name: test1-child
@@ -122,30 +122,30 @@
zone: us-west1-a
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that instance_group_manager was deleted
+- name: Verify that instance_group_manager was deleted
google.cloud.gcp_compute_instance_group_manager_info:
- filters:
- - name = {{ resource_name }}
- zone: us-west1-a
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/compute
+ filters:
+ - name = {{ resource_name }}
+ zone: us-west1-a
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | length == 0
# ----------------------------------------------------------------------------
-- name: delete a instance group manager that does not exist
+- name: Delete a instance group manager that does not exist
google.cloud.gcp_compute_instance_group_manager:
name: "{{ resource_name }}"
base_instance_name: test1-child
@@ -154,54 +154,54 @@
zone: us-west1-a
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#---------------------------------------------------------
# Post-test teardown
# If errors happen, don't crash the playbook!
-- name: delete a instance template
+- name: Delete a instance template
google.cloud.gcp_compute_instance_template:
name: "{{ resource_name }}"
properties:
disks:
- - auto_delete: 'true'
- boot: 'true'
- initialize_params:
- source_image: projects/ubuntu-os-cloud/global/images/family/ubuntu-minimal-2204-lts
+ - auto_delete: "true"
+ boot: "true"
+ initialize_params:
+ source_image: projects/ubuntu-os-cloud/global/images/family/ubuntu-minimal-2204-lts
machine_type: n1-standard-1
network_interfaces:
- - network: "{{ network }}"
- access_configs:
- - name: test-config
- type: ONE_TO_ONE_NAT
- nat_ip: "{{ address }}"
+ - network: "{{ network }}"
+ access_configs:
+ - name: test-config
+ type: ONE_TO_ONE_NAT
+ nat_ip: "{{ address }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: instancetemplate
ignore_errors: true
-- name: delete a address
+- name: Delete a address
google.cloud.gcp_compute_address:
name: address-instancetemplate
region: us-west1
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: address
ignore_errors: true
-- name: delete a network
+- name: Delete a network
google.cloud.gcp_compute_network:
name: network-instancetemplate
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
auto_create_subnetworks: true
state: absent
register: network
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_instance_group_manager/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_instance_group_manager/tasks/main.yml
index 45d6e4917..fe47378c2 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_instance_group_manager/tasks/main.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_instance_group_manager/tasks/main.yml
@@ -1,2 +1,3 @@
---
-- include_tasks: autogen.yml
+- name: Generated tests
+ ansible.builtin.include_tasks: autogen.yml
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_instance_template/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_instance_template/tasks/autogen.yml
index 441a45597..72fb80983 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_instance_template/tasks/autogen.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_instance_template/tasks/autogen.yml
@@ -13,195 +13,195 @@
#
# ----------------------------------------------------------------------------
# Pre-test setup
-- name: create a network
+- name: Create a network
google.cloud.gcp_compute_network:
name: network-instancetemplate
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
auto_create_subnetworks: true
state: present
register: network
-- name: create a address
+- name: Create a address
google.cloud.gcp_compute_address:
name: address-instancetemplate
region: us-west1
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: address
-- name: delete a instance template
+- name: Delete a instance template
google.cloud.gcp_compute_instance_template:
name: "{{ resource_name }}"
properties:
disks:
- - auto_delete: 'true'
- boot: 'true'
- initialize_params:
- source_image: projects/ubuntu-os-cloud/global/images/family/ubuntu-minimal-2204-lts
+ - auto_delete: "true"
+ boot: "true"
+ initialize_params:
+ source_image: projects/ubuntu-os-cloud/global/images/family/ubuntu-minimal-2204-lts
machine_type: n1-standard-1
network_interfaces:
- - network: "{{ network }}"
- access_configs:
- - name: test-config
- type: ONE_TO_ONE_NAT
- nat_ip: "{{ address }}"
+ - network: "{{ network }}"
+ access_configs:
+ - name: test-config
+ type: ONE_TO_ONE_NAT
+ nat_ip: "{{ address }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
#----------------------------------------------------------
-- name: create a instance template
+- name: Create a instance template
google.cloud.gcp_compute_instance_template:
name: "{{ resource_name }}"
properties:
disks:
- - auto_delete: 'true'
- boot: 'true'
- initialize_params:
- source_image: projects/ubuntu-os-cloud/global/images/family/ubuntu-minimal-2204-lts
+ - auto_delete: "true"
+ boot: "true"
+ initialize_params:
+ source_image: projects/ubuntu-os-cloud/global/images/family/ubuntu-minimal-2204-lts
machine_type: n1-standard-1
network_interfaces:
- - network: "{{ network }}"
- access_configs:
- - name: test-config
- type: ONE_TO_ONE_NAT
- nat_ip: "{{ address }}"
+ - network: "{{ network }}"
+ access_configs:
+ - name: test-config
+ type: ONE_TO_ONE_NAT
+ nat_ip: "{{ address }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that instance_template was created
+- name: Verify that instance_template was created
google.cloud.gcp_compute_instance_template_info:
- filters:
- - name = {{ resource_name }}
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/compute
+ filters:
+ - name = {{ resource_name }}
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | length == 1
# ----------------------------------------------------------------------------
-- name: create a instance template that already exists
+- name: Create a instance template that already exists
google.cloud.gcp_compute_instance_template:
name: "{{ resource_name }}"
properties:
disks:
- - auto_delete: 'true'
- boot: 'true'
- initialize_params:
- source_image: projects/ubuntu-os-cloud/global/images/family/ubuntu-minimal-2204-lts
+ - auto_delete: "true"
+ boot: "true"
+ initialize_params:
+ source_image: projects/ubuntu-os-cloud/global/images/family/ubuntu-minimal-2204-lts
machine_type: n1-standard-1
network_interfaces:
- - network: "{{ network }}"
- access_configs:
- - name: test-config
- type: ONE_TO_ONE_NAT
- nat_ip: "{{ address }}"
+ - network: "{{ network }}"
+ access_configs:
+ - name: test-config
+ type: ONE_TO_ONE_NAT
+ nat_ip: "{{ address }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#----------------------------------------------------------
-- name: delete a instance template
+- name: Delete a instance template
google.cloud.gcp_compute_instance_template:
name: "{{ resource_name }}"
properties:
disks:
- - auto_delete: 'true'
- boot: 'true'
- initialize_params:
- source_image: projects/ubuntu-os-cloud/global/images/family/ubuntu-minimal-2204-lts
+ - auto_delete: "true"
+ boot: "true"
+ initialize_params:
+ source_image: projects/ubuntu-os-cloud/global/images/family/ubuntu-minimal-2204-lts
machine_type: n1-standard-1
network_interfaces:
- - network: "{{ network }}"
- access_configs:
- - name: test-config
- type: ONE_TO_ONE_NAT
- nat_ip: "{{ address }}"
+ - network: "{{ network }}"
+ access_configs:
+ - name: test-config
+ type: ONE_TO_ONE_NAT
+ nat_ip: "{{ address }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that instance_template was deleted
+- name: Verify that instance_template was deleted
google.cloud.gcp_compute_instance_template_info:
- filters:
- - name = {{ resource_name }}
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/compute
+ filters:
+ - name = {{ resource_name }}
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | length == 0
# ----------------------------------------------------------------------------
-- name: delete a instance template that does not exist
+- name: Delete a instance template that does not exist
google.cloud.gcp_compute_instance_template:
name: "{{ resource_name }}"
properties:
disks:
- - auto_delete: 'true'
- boot: 'true'
- initialize_params:
- source_image: projects/ubuntu-os-cloud/global/images/family/ubuntu-minimal-2204-lts
+ - auto_delete: "true"
+ boot: "true"
+ initialize_params:
+ source_image: projects/ubuntu-os-cloud/global/images/family/ubuntu-minimal-2204-lts
machine_type: n1-standard-1
network_interfaces:
- - network: "{{ network }}"
- access_configs:
- - name: test-config
- type: ONE_TO_ONE_NAT
- nat_ip: "{{ address }}"
+ - network: "{{ network }}"
+ access_configs:
+ - name: test-config
+ type: ONE_TO_ONE_NAT
+ nat_ip: "{{ address }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#---------------------------------------------------------
# Post-test teardown
# If errors happen, don't crash the playbook!
-- name: delete a address
+- name: Delete a address
google.cloud.gcp_compute_address:
name: address-instancetemplate
region: us-west1
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: address
ignore_errors: true
-- name: delete a network
+- name: Delete a network
google.cloud.gcp_compute_network:
name: network-instancetemplate
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
auto_create_subnetworks: true
state: absent
register: network
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_instance_template/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_instance_template/tasks/main.yml
index 45d6e4917..fe47378c2 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_instance_template/tasks/main.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_instance_template/tasks/main.yml
@@ -1,2 +1,3 @@
---
-- include_tasks: autogen.yml
+- name: Generated tests
+ ansible.builtin.include_tasks: autogen.yml
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_interconnect_attachment/defaults/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_interconnect_attachment/defaults/main.yml
index aa87a2a8e..aa65c31f5 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_interconnect_attachment/defaults/main.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_interconnect_attachment/defaults/main.yml
@@ -1,3 +1,3 @@
---
# defaults file
-resource_name: '{{resource_prefix}}'
+resource_name: "{{ resource_prefix }}"
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_managed_ssl_certificate/defaults/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_managed_ssl_certificate/defaults/main.yml
index aa87a2a8e..aa65c31f5 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_managed_ssl_certificate/defaults/main.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_managed_ssl_certificate/defaults/main.yml
@@ -1,3 +1,3 @@
---
# defaults file
-resource_name: '{{resource_prefix}}'
+resource_name: "{{ resource_prefix }}"
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_network/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_network/tasks/autogen.yml
index 74dae7892..b887e2b17 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_network/tasks/autogen.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_network/tasks/autogen.yml
@@ -13,95 +13,95 @@
#
# ----------------------------------------------------------------------------
# Pre-test setup
-- name: delete a network
+- name: Delete a network
google.cloud.gcp_compute_network:
name: "{{ resource_name }}"
- auto_create_subnetworks: 'true'
+ auto_create_subnetworks: "true"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
#----------------------------------------------------------
-- name: create a network
+- name: Create a network
google.cloud.gcp_compute_network:
name: "{{ resource_name }}"
- auto_create_subnetworks: 'true'
+ auto_create_subnetworks: "true"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that network was created
+- name: Verify that network was created
google.cloud.gcp_compute_network_info:
- filters:
- - name = {{ resource_name }}
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/compute
+ filters:
+ - name = {{ resource_name }}
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | length == 1
# ----------------------------------------------------------------------------
-- name: create a network that already exists
+- name: Create a network that already exists
google.cloud.gcp_compute_network:
name: "{{ resource_name }}"
- auto_create_subnetworks: 'true'
+ auto_create_subnetworks: "true"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#----------------------------------------------------------
-- name: delete a network
+- name: Delete a network
google.cloud.gcp_compute_network:
name: "{{ resource_name }}"
- auto_create_subnetworks: 'true'
+ auto_create_subnetworks: "true"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that network was deleted
+- name: Verify that network was deleted
google.cloud.gcp_compute_network_info:
- filters:
- - name = {{ resource_name }}
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/compute
+ filters:
+ - name = {{ resource_name }}
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | length == 0
# ----------------------------------------------------------------------------
-- name: delete a network that does not exist
+- name: Delete a network that does not exist
google.cloud.gcp_compute_network:
name: "{{ resource_name }}"
- auto_create_subnetworks: 'true'
+ auto_create_subnetworks: "true"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_network/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_network/tasks/main.yml
index 45d6e4917..fe47378c2 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_network/tasks/main.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_network/tasks/main.yml
@@ -1,2 +1,3 @@
---
-- include_tasks: autogen.yml
+- name: Generated tests
+ ansible.builtin.include_tasks: autogen.yml
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_network_endpoint_group/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_network_endpoint_group/tasks/autogen.yml
index 8bf90de79..81f46d271 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_network_endpoint_group/tasks/autogen.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_network_endpoint_group/tasks/autogen.yml
@@ -13,16 +13,16 @@
#
# ----------------------------------------------------------------------------
# Pre-test setup
-- name: create a network
+- name: Create a network
google.cloud.gcp_compute_network:
name: "{{ resource_name }}"
- auto_create_subnetworks: 'false'
+ auto_create_subnetworks: "false"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: network
-- name: create a subnetwork
+- name: Create a subnetwork
google.cloud.gcp_compute_subnetwork:
name: "{{ resource_name }}"
ip_cidr_range: 10.0.0.0/16
@@ -30,10 +30,10 @@
network: "{{ network }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: subnetwork
-- name: delete a network endpoint group
+- name: Delete a network endpoint group
google.cloud.gcp_compute_network_endpoint_group:
name: "{{ resource_name }}"
network: "{{ network }}"
@@ -42,10 +42,10 @@
zone: us-central1-a
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
#----------------------------------------------------------
-- name: create a network endpoint group
+- name: Create a network endpoint group
google.cloud.gcp_compute_network_endpoint_group:
name: "{{ resource_name }}"
network: "{{ network }}"
@@ -54,30 +54,30 @@
zone: us-central1-a
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that network_endpoint_group was created
+- name: Verify that network_endpoint_group was created
google.cloud.gcp_compute_network_endpoint_group_info:
- filters:
- - name = {{ resource_name }}
- zone: us-central1-a
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/compute
+ filters:
+ - name = {{ resource_name }}
+ zone: us-central1-a
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | length == 1
# ----------------------------------------------------------------------------
-- name: create a network endpoint group that already exists
+- name: Create a network endpoint group that already exists
google.cloud.gcp_compute_network_endpoint_group:
name: "{{ resource_name }}"
network: "{{ network }}"
@@ -86,15 +86,15 @@
zone: us-central1-a
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#----------------------------------------------------------
-- name: delete a network endpoint group
+- name: Delete a network endpoint group
google.cloud.gcp_compute_network_endpoint_group:
name: "{{ resource_name }}"
network: "{{ network }}"
@@ -103,30 +103,30 @@
zone: us-central1-a
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that network_endpoint_group was deleted
+- name: Verify that network_endpoint_group was deleted
google.cloud.gcp_compute_network_endpoint_group_info:
- filters:
- - name = {{ resource_name }}
- zone: us-central1-a
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/compute
+ filters:
+ - name = {{ resource_name }}
+ zone: us-central1-a
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | length == 0
# ----------------------------------------------------------------------------
-- name: delete a network endpoint group that does not exist
+- name: Delete a network endpoint group that does not exist
google.cloud.gcp_compute_network_endpoint_group:
name: "{{ resource_name }}"
network: "{{ network }}"
@@ -135,17 +135,17 @@
zone: us-central1-a
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#---------------------------------------------------------
# Post-test teardown
# If errors happen, don't crash the playbook!
-- name: delete a subnetwork
+- name: Delete a subnetwork
google.cloud.gcp_compute_subnetwork:
name: "{{ resource_name }}"
ip_cidr_range: 10.0.0.0/16
@@ -153,17 +153,17 @@
network: "{{ network }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: subnetwork
ignore_errors: true
-- name: delete a network
+- name: Delete a network
google.cloud.gcp_compute_network:
name: "{{ resource_name }}"
- auto_create_subnetworks: 'false'
+ auto_create_subnetworks: "false"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: network
ignore_errors: true
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_network_endpoint_group/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_network_endpoint_group/tasks/main.yml
index 45d6e4917..fe47378c2 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_network_endpoint_group/tasks/main.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_network_endpoint_group/tasks/main.yml
@@ -1,2 +1,3 @@
---
-- include_tasks: autogen.yml
+- name: Generated tests
+ ansible.builtin.include_tasks: autogen.yml
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_node_group/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_node_group/tasks/autogen.yml
index b5b07a2d8..25d46afa3 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_node_group/tasks/autogen.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_node_group/tasks/autogen.yml
@@ -13,17 +13,17 @@
#
# ----------------------------------------------------------------------------
# Pre-test setup
-- name: create a node template
+- name: Create a node template
google.cloud.gcp_compute_node_template:
name: "{{ resource_name }}"
region: us-central1
node_type: n1-node-96-624
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: node_template
-- name: delete a node group
+- name: Delete a node group
google.cloud.gcp_compute_node_group:
name: "{{ resource_name }}"
zone: us-central1-a
@@ -32,10 +32,10 @@
node_template: "{{ node_template }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
#----------------------------------------------------------
-- name: create a node group
+- name: Create a node group
google.cloud.gcp_compute_node_group:
name: "{{ resource_name }}"
zone: us-central1-a
@@ -44,30 +44,30 @@
node_template: "{{ node_template }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that node_group was created
+- name: Verify that node_group was created
google.cloud.gcp_compute_node_group_info:
- filters:
- - name = {{ resource_name }}
- zone: us-central1-a
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/compute
+ filters:
+ - name = {{ resource_name }}
+ zone: us-central1-a
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | length == 1
# ----------------------------------------------------------------------------
-- name: create a node group that already exists
+- name: Create a node group that already exists
google.cloud.gcp_compute_node_group:
name: "{{ resource_name }}"
zone: us-central1-a
@@ -76,15 +76,15 @@
node_template: "{{ node_template }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#----------------------------------------------------------
-- name: delete a node group
+- name: Delete a node group
google.cloud.gcp_compute_node_group:
name: "{{ resource_name }}"
zone: us-central1-a
@@ -93,30 +93,30 @@
node_template: "{{ node_template }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that node_group was deleted
+- name: Verify that node_group was deleted
google.cloud.gcp_compute_node_group_info:
- filters:
- - name = {{ resource_name }}
- zone: us-central1-a
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/compute
+ filters:
+ - name = {{ resource_name }}
+ zone: us-central1-a
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | length == 0
# ----------------------------------------------------------------------------
-- name: delete a node group that does not exist
+- name: Delete a node group that does not exist
google.cloud.gcp_compute_node_group:
name: "{{ resource_name }}"
zone: us-central1-a
@@ -125,24 +125,24 @@
node_template: "{{ node_template }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#---------------------------------------------------------
# Post-test teardown
# If errors happen, don't crash the playbook!
-- name: delete a node template
+- name: Delete a node template
google.cloud.gcp_compute_node_template:
name: "{{ resource_name }}"
region: us-central1
node_type: n1-node-96-624
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: node_template
ignore_errors: true
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_node_group/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_node_group/tasks/main.yml
index 45d6e4917..fe47378c2 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_node_group/tasks/main.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_node_group/tasks/main.yml
@@ -1,2 +1,3 @@
---
-- include_tasks: autogen.yml
+- name: Generated tests
+ ansible.builtin.include_tasks: autogen.yml
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_node_template/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_node_template/tasks/autogen.yml
index cacc40bc5..f21ce6366 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_node_template/tasks/autogen.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_node_template/tasks/autogen.yml
@@ -13,102 +13,102 @@
#
# ----------------------------------------------------------------------------
# Pre-test setup
-- name: delete a node template
+- name: Delete a node template
google.cloud.gcp_compute_node_template:
name: "{{ resource_name }}"
region: us-central1
node_type: n1-node-96-624
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
#----------------------------------------------------------
-- name: create a node template
+- name: Create a node template
google.cloud.gcp_compute_node_template:
name: "{{ resource_name }}"
region: us-central1
node_type: n1-node-96-624
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that node_template was created
+- name: Verify that node_template was created
google.cloud.gcp_compute_node_template_info:
- filters:
- - name = {{ resource_name }}
- region: us-central1
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/compute
+ filters:
+ - name = {{ resource_name }}
+ region: us-central1
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | length == 1
# ----------------------------------------------------------------------------
-- name: create a node template that already exists
+- name: Create a node template that already exists
google.cloud.gcp_compute_node_template:
name: "{{ resource_name }}"
region: us-central1
node_type: n1-node-96-624
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#----------------------------------------------------------
-- name: delete a node template
+- name: Delete a node template
google.cloud.gcp_compute_node_template:
name: "{{ resource_name }}"
region: us-central1
node_type: n1-node-96-624
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that node_template was deleted
+- name: Verify that node_template was deleted
google.cloud.gcp_compute_node_template_info:
- filters:
- - name = {{ resource_name }}
- region: us-central1
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/compute
+ filters:
+ - name = {{ resource_name }}
+ region: us-central1
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | length == 0
# ----------------------------------------------------------------------------
-- name: delete a node template that does not exist
+- name: Delete a node template that does not exist
google.cloud.gcp_compute_node_template:
name: "{{ resource_name }}"
region: us-central1
node_type: n1-node-96-624
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_node_template/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_node_template/tasks/main.yml
index 45d6e4917..fe47378c2 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_node_template/tasks/main.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_node_template/tasks/main.yml
@@ -1,2 +1,3 @@
---
-- include_tasks: autogen.yml
+- name: Generated tests
+ ansible.builtin.include_tasks: autogen.yml
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_autoscaler/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_autoscaler/tasks/autogen.yml
index ba64d6f03..5a986a9f8 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_autoscaler/tasks/autogen.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_autoscaler/tasks/autogen.yml
@@ -13,46 +13,46 @@
#
# ----------------------------------------------------------------------------
# Pre-test setup
-- name: create a network
+- name: Create a network
google.cloud.gcp_compute_network:
name: network-instancetemplate
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
auto_create_subnetworks: true
state: present
register: network
-- name: create a address
+- name: Create a address
google.cloud.gcp_compute_address:
name: address-instancetemplate
region: us-central1
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: address
-- name: create a instance template
+- name: Create a instance template
google.cloud.gcp_compute_instance_template:
name: "{{ resource_name }}"
properties:
disks:
- - auto_delete: 'true'
- boot: 'true'
- initialize_params:
- source_image: projects/ubuntu-os-cloud/global/images/family/ubuntu-minimal-2204-lts
+ - auto_delete: "true"
+ boot: "true"
+ initialize_params:
+ source_image: projects/ubuntu-os-cloud/global/images/family/ubuntu-minimal-2204-lts
machine_type: n1-standard-1
network_interfaces:
- - network: "{{ network }}"
- access_configs:
- - name: test-config
- type: ONE_TO_ONE_NAT
- nat_ip: "{{ address }}"
+ - network: "{{ network }}"
+ access_configs:
+ - name: test-config
+ type: ONE_TO_ONE_NAT
+ nat_ip: "{{ address }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: instancetemplate
-- name: create a region instance group manager
+- name: Create a region instance group manager
google.cloud.gcp_compute_region_instance_group_manager:
name: "{{ resource_name }}"
base_instance_name: test1-child
@@ -61,10 +61,10 @@
target_size: 3
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: igrm
-- name: delete a region autoscaler
+- name: Delete a region autoscaler
google.cloud.gcp_compute_region_autoscaler:
name: my-region-autoscaler
region: us-central1
@@ -73,14 +73,14 @@
max_num_replicas: 5
cool_down_period_sec: 60
cpu_utilization:
- utilization_target: 0.5
- target: "{{igrm.selfLink}}"
+ utilization_target: !!float "0.5"
+ target: "{{ igrm.selfLink }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
#----------------------------------------------------------
-- name: create a region autoscaler
+- name: Create a region autoscaler
google.cloud.gcp_compute_region_autoscaler:
name: my-region-autoscaler
region: us-central1
@@ -89,34 +89,34 @@
max_num_replicas: 5
cool_down_period_sec: 60
cpu_utilization:
- utilization_target: 0.5
- target: "{{igrm.selfLink}}"
+ utilization_target: !!float "0.5"
+ target: "{{ igrm.selfLink }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that region_autoscaler was created
+- name: Verify that region_autoscaler was created
google.cloud.gcp_compute_region_autoscaler_info:
- filters:
- - name = my-region-autoscaler
- region: us-central1
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/compute
+ filters:
+ - name = my-region-autoscaler
+ region: us-central1
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | length == 1
# ----------------------------------------------------------------------------
-- name: create a region autoscaler that already exists
+- name: Create a region autoscaler that already exists
google.cloud.gcp_compute_region_autoscaler:
name: my-region-autoscaler
region: us-central1
@@ -125,19 +125,19 @@
max_num_replicas: 5
cool_down_period_sec: 60
cpu_utilization:
- utilization_target: 0.5
- target: "{{igrm.selfLink}}"
+ utilization_target: !!float "0.5"
+ target: "{{ igrm.selfLink }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#----------------------------------------------------------
-- name: delete a region autoscaler
+- name: Delete a region autoscaler
google.cloud.gcp_compute_region_autoscaler:
name: my-region-autoscaler
region: us-central1
@@ -146,34 +146,34 @@
max_num_replicas: 5
cool_down_period_sec: 60
cpu_utilization:
- utilization_target: 0.5
- target: "{{igrm.selfLink}}"
+ utilization_target: !!float "0.5"
+ target: "{{ igrm.selfLink }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that region_autoscaler was deleted
+- name: Verify that region_autoscaler was deleted
google.cloud.gcp_compute_region_autoscaler_info:
- filters:
- - name = my-region-autoscaler
- region: us-central1
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/compute
+ filters:
+ - name = my-region-autoscaler
+ region: us-central1
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | length == 0
# ----------------------------------------------------------------------------
-- name: delete a region autoscaler that does not exist
+- name: Delete a region autoscaler that does not exist
google.cloud.gcp_compute_region_autoscaler:
name: my-region-autoscaler
region: us-central1
@@ -182,21 +182,21 @@
max_num_replicas: 5
cool_down_period_sec: 60
cpu_utilization:
- utilization_target: 0.5
- target: "{{igrm.selfLink}}"
+ utilization_target: !!float "0.5"
+ target: "{{ igrm.selfLink }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#---------------------------------------------------------
# Post-test teardown
# If errors happen, don't crash the playbook!
-- name: delete a region instance group manager
+- name: Delete a region instance group manager
google.cloud.gcp_compute_region_instance_group_manager:
name: "{{ resource_name }}"
base_instance_name: test1-child
@@ -205,48 +205,48 @@
target_size: 3
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: igrm
ignore_errors: true
-- name: delete a instance template
+- name: Delete a instance template
google.cloud.gcp_compute_instance_template:
name: "{{ resource_name }}"
properties:
disks:
- - auto_delete: 'true'
- boot: 'true'
- initialize_params:
- source_image: projects/ubuntu-os-cloud/global/images/family/ubuntu-minimal-2204-lts
+ - auto_delete: "true"
+ boot: "true"
+ initialize_params:
+ source_image: projects/ubuntu-os-cloud/global/images/family/ubuntu-minimal-2204-lts
machine_type: n1-standard-1
network_interfaces:
- - network: "{{ network }}"
- access_configs:
- - name: test-config
- type: ONE_TO_ONE_NAT
- nat_ip: "{{ address }}"
+ - network: "{{ network }}"
+ access_configs:
+ - name: test-config
+ type: ONE_TO_ONE_NAT
+ nat_ip: "{{ address }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: instancetemplate
ignore_errors: true
-- name: delete a address
+- name: Delete a address
google.cloud.gcp_compute_address:
name: address-instancetemplate
region: us-central1
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: address
ignore_errors: true
-- name: delete a network
+- name: Delete a network
google.cloud.gcp_compute_network:
name: network-instancetemplate
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
auto_create_subnetworks: true
state: absent
register: network
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_autoscaler/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_autoscaler/tasks/main.yml
index 45d6e4917..fe47378c2 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_autoscaler/tasks/main.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_autoscaler/tasks/main.yml
@@ -1,2 +1,3 @@
---
-- include_tasks: autogen.yml
+- name: Generated tests
+ ansible.builtin.include_tasks: autogen.yml
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_backend_service/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_backend_service/tasks/autogen.yml
index 6fdb3fa2b..beb644a7b 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_backend_service/tasks/autogen.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_backend_service/tasks/autogen.yml
@@ -13,7 +13,7 @@
#
# ----------------------------------------------------------------------------
# Pre-test setup
-- name: create a health check
+- name: Create a health check
google.cloud.gcp_compute_health_check:
name: "{{ resource_name }}"
type: TCP
@@ -23,132 +23,132 @@
timeout_sec: 1
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: healthcheck
-- name: delete a region backend service
+- name: Delete a region backend service
google.cloud.gcp_compute_region_backend_service:
name: "{{ resource_name }}"
region: us-central1
health_checks:
- - "{{ healthcheck.selfLink }}"
+ - "{{ healthcheck.selfLink }}"
connection_draining:
draining_timeout_sec: 10
session_affinity: CLIENT_IP
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
#----------------------------------------------------------
-- name: create a region backend service
+- name: Create a region backend service
google.cloud.gcp_compute_region_backend_service:
name: "{{ resource_name }}"
region: us-central1
health_checks:
- - "{{ healthcheck.selfLink }}"
+ - "{{ healthcheck.selfLink }}"
connection_draining:
draining_timeout_sec: 10
session_affinity: CLIENT_IP
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that region_backend_service was created
+- name: Verify that region_backend_service was created
google.cloud.gcp_compute_region_backend_service_info:
- filters:
- - name = {{ resource_name }}
- region: us-central1
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/compute
+ filters:
+ - name = {{ resource_name }}
+ region: us-central1
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | length == 1
# ----------------------------------------------------------------------------
-- name: create a region backend service that already exists
+- name: Create a region backend service that already exists
google.cloud.gcp_compute_region_backend_service:
name: "{{ resource_name }}"
region: us-central1
health_checks:
- - "{{ healthcheck.selfLink }}"
+ - "{{ healthcheck.selfLink }}"
connection_draining:
draining_timeout_sec: 10
session_affinity: CLIENT_IP
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#----------------------------------------------------------
-- name: delete a region backend service
+- name: Delete a region backend service
google.cloud.gcp_compute_region_backend_service:
name: "{{ resource_name }}"
region: us-central1
health_checks:
- - "{{ healthcheck.selfLink }}"
+ - "{{ healthcheck.selfLink }}"
connection_draining:
draining_timeout_sec: 10
session_affinity: CLIENT_IP
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that region_backend_service was deleted
+- name: Verify that region_backend_service was deleted
google.cloud.gcp_compute_region_backend_service_info:
- filters:
- - name = {{ resource_name }}
- region: us-central1
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/compute
+ filters:
+ - name = {{ resource_name }}
+ region: us-central1
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | length == 0
# ----------------------------------------------------------------------------
-- name: delete a region backend service that does not exist
+- name: Delete a region backend service that does not exist
google.cloud.gcp_compute_region_backend_service:
name: "{{ resource_name }}"
region: us-central1
health_checks:
- - "{{ healthcheck.selfLink }}"
+ - "{{ healthcheck.selfLink }}"
connection_draining:
draining_timeout_sec: 10
session_affinity: CLIENT_IP
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#---------------------------------------------------------
# Post-test teardown
# If errors happen, don't crash the playbook!
-- name: delete a health check
+- name: Delete a health check
google.cloud.gcp_compute_health_check:
name: "{{ resource_name }}"
type: TCP
@@ -158,7 +158,7 @@
timeout_sec: 1
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: healthcheck
ignore_errors: true
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_backend_service/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_backend_service/tasks/main.yml
index 45d6e4917..fe47378c2 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_backend_service/tasks/main.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_backend_service/tasks/main.yml
@@ -1,2 +1,3 @@
---
-- include_tasks: autogen.yml
+- name: Generated tests
+ ansible.builtin.include_tasks: autogen.yml
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_disk/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_disk/tasks/autogen.yml
index 7a2e2e2cd..1b04a50d8 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_disk/tasks/autogen.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_disk/tasks/autogen.yml
@@ -13,7 +13,7 @@
#
# ----------------------------------------------------------------------------
# Pre-test setup
-- name: delete a region disk
+- name: Delete a region disk
google.cloud.gcp_compute_region_disk:
name: "{{ resource_name }}"
size_gb: 500
@@ -21,14 +21,14 @@
raw_key: SGVsbG8gZnJvbSBHb29nbGUgQ2xvdWQgUGxhdGZvcm0=
region: us-central1
replica_zones:
- - https://www.googleapis.com/compute/v1/projects/{{ gcp_project }}/zones/us-central1-a
- - https://www.googleapis.com/compute/v1/projects/{{ gcp_project }}/zones/us-central1-b
+ - https://www.googleapis.com/compute/v1/projects/{{ gcp_project }}/zones/us-central1-a
+ - https://www.googleapis.com/compute/v1/projects/{{ gcp_project }}/zones/us-central1-b
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
#----------------------------------------------------------
-- name: create a region disk
+- name: Create a region disk
google.cloud.gcp_compute_region_disk:
name: "{{ resource_name }}"
size_gb: 500
@@ -36,34 +36,34 @@
raw_key: SGVsbG8gZnJvbSBHb29nbGUgQ2xvdWQgUGxhdGZvcm0=
region: us-central1
replica_zones:
- - https://www.googleapis.com/compute/v1/projects/{{ gcp_project }}/zones/us-central1-a
- - https://www.googleapis.com/compute/v1/projects/{{ gcp_project }}/zones/us-central1-b
+ - https://www.googleapis.com/compute/v1/projects/{{ gcp_project }}/zones/us-central1-a
+ - https://www.googleapis.com/compute/v1/projects/{{ gcp_project }}/zones/us-central1-b
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that region_disk was created
+- name: Verify that region_disk was created
google.cloud.gcp_compute_region_disk_info:
- filters:
- - name = {{ resource_name }}
- region: us-central1
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/compute
+ filters:
+ - name = {{ resource_name }}
+ region: us-central1
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | length == 1
# ----------------------------------------------------------------------------
-- name: create a region disk that already exists
+- name: Create a region disk that already exists
google.cloud.gcp_compute_region_disk:
name: "{{ resource_name }}"
size_gb: 500
@@ -71,19 +71,19 @@
raw_key: SGVsbG8gZnJvbSBHb29nbGUgQ2xvdWQgUGxhdGZvcm0=
region: us-central1
replica_zones:
- - https://www.googleapis.com/compute/v1/projects/{{ gcp_project }}/zones/us-central1-a
- - https://www.googleapis.com/compute/v1/projects/{{ gcp_project }}/zones/us-central1-b
+ - https://www.googleapis.com/compute/v1/projects/{{ gcp_project }}/zones/us-central1-a
+ - https://www.googleapis.com/compute/v1/projects/{{ gcp_project }}/zones/us-central1-b
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#----------------------------------------------------------
-- name: delete a region disk
+- name: Delete a region disk
google.cloud.gcp_compute_region_disk:
name: "{{ resource_name }}"
size_gb: 500
@@ -91,34 +91,34 @@
raw_key: SGVsbG8gZnJvbSBHb29nbGUgQ2xvdWQgUGxhdGZvcm0=
region: us-central1
replica_zones:
- - https://www.googleapis.com/compute/v1/projects/{{ gcp_project }}/zones/us-central1-a
- - https://www.googleapis.com/compute/v1/projects/{{ gcp_project }}/zones/us-central1-b
+ - https://www.googleapis.com/compute/v1/projects/{{ gcp_project }}/zones/us-central1-a
+ - https://www.googleapis.com/compute/v1/projects/{{ gcp_project }}/zones/us-central1-b
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that region_disk was deleted
+- name: Verify that region_disk was deleted
google.cloud.gcp_compute_region_disk_info:
- filters:
- - name = {{ resource_name }}
- region: us-central1
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/compute
+ filters:
+ - name = {{ resource_name }}
+ region: us-central1
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | length == 0
# ----------------------------------------------------------------------------
-- name: delete a region disk that does not exist
+- name: Delete a region disk that does not exist
google.cloud.gcp_compute_region_disk:
name: "{{ resource_name }}"
size_gb: 500
@@ -126,14 +126,14 @@
raw_key: SGVsbG8gZnJvbSBHb29nbGUgQ2xvdWQgUGxhdGZvcm0=
region: us-central1
replica_zones:
- - https://www.googleapis.com/compute/v1/projects/{{ gcp_project }}/zones/us-central1-a
- - https://www.googleapis.com/compute/v1/projects/{{ gcp_project }}/zones/us-central1-b
+ - https://www.googleapis.com/compute/v1/projects/{{ gcp_project }}/zones/us-central1-a
+ - https://www.googleapis.com/compute/v1/projects/{{ gcp_project }}/zones/us-central1-b
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_disk/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_disk/tasks/main.yml
index 45d6e4917..fe47378c2 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_disk/tasks/main.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_disk/tasks/main.yml
@@ -1,2 +1,3 @@
---
-- include_tasks: autogen.yml
+- name: Generated tests
+ ansible.builtin.include_tasks: autogen.yml
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_health_check/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_health_check/tasks/autogen.yml
index 498e018f9..badcfb842 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_health_check/tasks/autogen.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_health_check/tasks/autogen.yml
@@ -13,7 +13,7 @@
#
# ----------------------------------------------------------------------------
# Pre-test setup
-- name: delete a region health check
+- name: Delete a region health check
google.cloud.gcp_compute_region_health_check:
name: "{{ resource_name }}"
type: TCP
@@ -27,10 +27,10 @@
region: us-central1
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
#----------------------------------------------------------
-- name: create a region health check
+- name: Create a region health check
google.cloud.gcp_compute_region_health_check:
name: "{{ resource_name }}"
type: TCP
@@ -44,30 +44,30 @@
region: us-central1
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that region_health_check was created
+- name: Verify that region_health_check was created
google.cloud.gcp_compute_region_health_check_info:
- filters:
- - name = {{ resource_name }}
- region: us-central1
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/compute
+ filters:
+ - name = {{ resource_name }}
+ region: us-central1
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | length == 1
# ----------------------------------------------------------------------------
-- name: create a region health check that already exists
+- name: Create a region health check that already exists
google.cloud.gcp_compute_region_health_check:
name: "{{ resource_name }}"
type: TCP
@@ -81,15 +81,15 @@
region: us-central1
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#----------------------------------------------------------
-- name: delete a region health check
+- name: Delete a region health check
google.cloud.gcp_compute_region_health_check:
name: "{{ resource_name }}"
type: TCP
@@ -103,30 +103,30 @@
region: us-central1
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that region_health_check was deleted
+- name: Verify that region_health_check was deleted
google.cloud.gcp_compute_region_health_check_info:
- filters:
- - name = {{ resource_name }}
- region: us-central1
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/compute
+ filters:
+ - name = {{ resource_name }}
+ region: us-central1
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | length == 0
# ----------------------------------------------------------------------------
-- name: delete a region health check that does not exist
+- name: Delete a region health check that does not exist
google.cloud.gcp_compute_region_health_check:
name: "{{ resource_name }}"
type: TCP
@@ -140,10 +140,10 @@
region: us-central1
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_health_check/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_health_check/tasks/main.yml
index 45d6e4917..fe47378c2 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_health_check/tasks/main.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_health_check/tasks/main.yml
@@ -1,2 +1,3 @@
---
-- include_tasks: autogen.yml
+- name: Generated tests
+ ansible.builtin.include_tasks: autogen.yml
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_instance_group_manager/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_instance_group_manager/tasks/autogen.yml
index 8c7f188a2..e60646420 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_instance_group_manager/tasks/autogen.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_instance_group_manager/tasks/autogen.yml
@@ -13,46 +13,46 @@
#
# ----------------------------------------------------------------------------
# Pre-test setup
-- name: create a network
+- name: Create a network
google.cloud.gcp_compute_network:
name: network-instancetemplate
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
auto_create_subnetworks: true
state: present
register: network
-- name: create a address
+- name: Create a address
google.cloud.gcp_compute_address:
name: address-instancetemplate
region: us-central1
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: address
-- name: create a instance template
+- name: Create a instance template
google.cloud.gcp_compute_instance_template:
name: "{{ resource_name }}"
properties:
disks:
- - auto_delete: 'true'
- boot: 'true'
- initialize_params:
- source_image: projects/ubuntu-os-cloud/global/images/family/ubuntu-minimal-2204-lts
+ - auto_delete: "true"
+ boot: "true"
+ initialize_params:
+ source_image: projects/ubuntu-os-cloud/global/images/family/ubuntu-minimal-2204-lts
machine_type: n1-standard-1
network_interfaces:
- - network: "{{ network }}"
- access_configs:
- - name: test-config
- type: ONE_TO_ONE_NAT
- nat_ip: "{{ address }}"
+ - network: "{{ network }}"
+ access_configs:
+ - name: test-config
+ type: ONE_TO_ONE_NAT
+ nat_ip: "{{ address }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: instancetemplate
-- name: delete a region instance group manager
+- name: Delete a region instance group manager
google.cloud.gcp_compute_region_instance_group_manager:
name: "{{ resource_name }}"
base_instance_name: test1-child
@@ -61,10 +61,10 @@
target_size: 3
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
#----------------------------------------------------------
-- name: create a region instance group manager
+- name: Create a region instance group manager
google.cloud.gcp_compute_region_instance_group_manager:
name: "{{ resource_name }}"
base_instance_name: test1-child
@@ -73,30 +73,30 @@
target_size: 3
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that region_instance_group_manager was created
+- name: Verify that region_instance_group_manager was created
google.cloud.gcp_compute_region_instance_group_manager_info:
- filters:
- - name = {{ resource_name }}
- region: us-central1
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/compute
+ filters:
+ - name = {{ resource_name }}
+ region: us-central1
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | length == 1
# ----------------------------------------------------------------------------
-- name: create a region instance group manager that already exists
+- name: Create a region instance group manager that already exists
google.cloud.gcp_compute_region_instance_group_manager:
name: "{{ resource_name }}"
base_instance_name: test1-child
@@ -105,15 +105,15 @@
target_size: 3
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#----------------------------------------------------------
-- name: delete a region instance group manager
+- name: Delete a region instance group manager
google.cloud.gcp_compute_region_instance_group_manager:
name: "{{ resource_name }}"
base_instance_name: test1-child
@@ -122,30 +122,30 @@
target_size: 3
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that region_instance_group_manager was deleted
+- name: Verify that region_instance_group_manager was deleted
google.cloud.gcp_compute_region_instance_group_manager_info:
- filters:
- - name = {{ resource_name }}
- region: us-central1
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/compute
+ filters:
+ - name = {{ resource_name }}
+ region: us-central1
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | length == 0
# ----------------------------------------------------------------------------
-- name: delete a region instance group manager that does not exist
+- name: Delete a region instance group manager that does not exist
google.cloud.gcp_compute_region_instance_group_manager:
name: "{{ resource_name }}"
base_instance_name: test1-child
@@ -154,54 +154,54 @@
target_size: 3
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#---------------------------------------------------------
# Post-test teardown
# If errors happen, don't crash the playbook!
-- name: delete a instance template
+- name: Delete a instance template
google.cloud.gcp_compute_instance_template:
name: "{{ resource_name }}"
properties:
disks:
- - auto_delete: 'true'
- boot: 'true'
- initialize_params:
- source_image: projects/ubuntu-os-cloud/global/images/family/ubuntu-minimal-2204-lts
+ - auto_delete: "true"
+ boot: "true"
+ initialize_params:
+ source_image: projects/ubuntu-os-cloud/global/images/family/ubuntu-minimal-2204-lts
machine_type: n1-standard-1
network_interfaces:
- - network: "{{ network }}"
- access_configs:
- - name: test-config
- type: ONE_TO_ONE_NAT
- nat_ip: "{{ address }}"
+ - network: "{{ network }}"
+ access_configs:
+ - name: test-config
+ type: ONE_TO_ONE_NAT
+ nat_ip: "{{ address }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: instancetemplate
ignore_errors: true
-- name: delete a address
+- name: Delete a address
google.cloud.gcp_compute_address:
name: address-instancetemplate
region: us-central1
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: address
ignore_errors: true
-- name: delete a network
+- name: Delete a network
google.cloud.gcp_compute_network:
name: network-instancetemplate
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
auto_create_subnetworks: true
state: absent
register: network
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_instance_group_manager/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_instance_group_manager/tasks/main.yml
index 45d6e4917..fe47378c2 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_instance_group_manager/tasks/main.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_instance_group_manager/tasks/main.yml
@@ -1,2 +1,3 @@
---
-- include_tasks: autogen.yml
+- name: Generated tests
+ ansible.builtin.include_tasks: autogen.yml
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_target_http_proxy/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_target_http_proxy/tasks/autogen.yml
index 9dcd75387..9c1da53dc 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_target_http_proxy/tasks/autogen.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_target_http_proxy/tasks/autogen.yml
@@ -13,149 +13,149 @@
#
# ----------------------------------------------------------------------------
# Pre-test setup
-- name: create a backend service
+- name: Create a backend service
google.cloud.gcp_compute_region_backend_service:
name: backendservice-targethttpproxy
region: us-central1
- enable_cdn: 'true'
+ enable_cdn: "true"
protocol: HTTP
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- load_balancing_scheme: "EXTERNAL"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ load_balancing_scheme: EXTERNAL
state: present
register: backendservice
-- name: create a URL map
+- name: Create a URL map
google.cloud.gcp_compute_region_url_map:
name: urlmap-targethttpproxy
region: us-central1
default_service: "{{ backendservice }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: urlmap
-- name: delete a region target HTTP proxy
+- name: Delete a region target HTTP proxy
google.cloud.gcp_compute_region_target_http_proxy:
name: "{{ resource_name }}"
region: us-central1
url_map: "{{ urlmap }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
#----------------------------------------------------------
-- name: create a region target HTTP proxy
+- name: Create a region target HTTP proxy
google.cloud.gcp_compute_region_target_http_proxy:
name: "{{ resource_name }}"
region: us-central1
url_map: "{{ urlmap }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that region_target_http_proxy was created
+- name: Verify that region_target_http_proxy was created
google.cloud.gcp_compute_region_target_http_proxy_info:
- filters:
- - name = {{ resource_name }}
- region: us-central1
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/compute
+ filters:
+ - name = {{ resource_name }}
+ region: us-central1
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | length == 1
# ----------------------------------------------------------------------------
-- name: create a region target HTTP proxy that already exists
+- name: Create a region target HTTP proxy that already exists
google.cloud.gcp_compute_region_target_http_proxy:
name: "{{ resource_name }}"
region: us-central1
url_map: "{{ urlmap }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#----------------------------------------------------------
-- name: delete a region target HTTP proxy
+- name: Delete a region target HTTP proxy
google.cloud.gcp_compute_region_target_http_proxy:
name: "{{ resource_name }}"
region: us-central1
url_map: "{{ urlmap }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that region_target_http_proxy was deleted
+- name: Verify that region_target_http_proxy was deleted
google.cloud.gcp_compute_region_target_http_proxy_info:
- filters:
- - name = {{ resource_name }}
- region: us-central1
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/compute
+ filters:
+ - name = {{ resource_name }}
+ region: us-central1
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | length == 0
# ----------------------------------------------------------------------------
-- name: delete a region target HTTP proxy that does not exist
+- name: Delete a region target HTTP proxy that does not exist
google.cloud.gcp_compute_region_target_http_proxy:
name: "{{ resource_name }}"
region: us-central1
url_map: "{{ urlmap }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#---------------------------------------------------------
# Post-test teardown
# If errors happen, don't crash the playbook!
-- name: delete a URL map
+- name: Delete a URL map
google.cloud.gcp_compute_region_url_map:
name: urlmap-targethttpproxy
region: us-central1
default_service: "{{ backendservice }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
- ignore_errors: true
-- name: delete a backend service
+ ignore_errors: true # noqa: ignore-errors
+- name: Delete a backend service
google.cloud.gcp_compute_region_backend_service:
name: backendservice-targethttpproxy
region: us-central1
- enable_cdn: 'true'
+ enable_cdn: "true"
protocol: HTTP
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- load_balancing_scheme: "EXTERNAL"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ load_balancing_scheme: EXTERNAL
state: present
- ignore_errors: true \ No newline at end of file
+ ignore_errors: true # noqa: ignore-errors
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_target_http_proxy/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_target_http_proxy/tasks/main.yml
index 45d6e4917..fe47378c2 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_target_http_proxy/tasks/main.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_target_http_proxy/tasks/main.yml
@@ -1,2 +1,3 @@
---
-- include_tasks: autogen.yml
+- name: Generated tests
+ ansible.builtin.include_tasks: autogen.yml
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_target_https_proxy/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_target_https_proxy/tasks/autogen.yml
index 9b52b77eb..ac02c562a 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_target_https_proxy/tasks/autogen.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_target_https_proxy/tasks/autogen.yml
@@ -13,16 +13,16 @@
#
# ----------------------------------------------------------------------------
# Pre-test setup
-- name: create a instance group
+- name: Create a instance group
google.cloud.gcp_compute_instance_group:
name: instancegroup-targethttpsproxy
zone: us-central1-a
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: instancegroup
-- name: create a region health check
+- name: Create a region health check
google.cloud.gcp_compute_region_health_check:
name: "{{ resource_name }}"
type: HTTPS
@@ -32,33 +32,33 @@
region: us-central1
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: healthcheck
-- name: create a region backend service
+- name: Create a region backend service
google.cloud.gcp_compute_region_backend_service:
name: backendservice-targethttpsproxy
region: us-central1
backends:
- - group: "{{ instancegroup.selfLink }}"
+ - group: "{{ instancegroup.selfLink }}"
healthchecks:
- - "{{ healthcheck.selfLink }}"
+ - "{{ healthcheck.selfLink }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: backendservice
-- name: create a region URL map
+- name: Create a region URL map
google.cloud.gcp_compute_region_url_map:
name: urlmap-targethttpsproxy
region: us-central1
default_service: "{{ backendservice }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: urlmap
-- name: create a SSL certificate
+- name: Create a SSL certificate
google.cloud.gcp_compute_ssl_certificate:
name: sslcert-targethttpsproxy
description: A certificate for testing. Do not use this certificate in production
@@ -88,122 +88,122 @@
-----END EC PRIVATE KEY-----
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: sslcert
-- name: delete a region target HTTPS proxy
+- name: Delete a region target HTTPS proxy
google.cloud.gcp_compute_region_target_https_proxy:
name: "{{ resource_name }}"
region: us-central1
ssl_certificates:
- - "{{ sslcert }}"
+ - "{{ sslcert }}" # noqa: args[module]
url_map: "{{ urlmap }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
#----------------------------------------------------------
-- name: create a region target HTTPS proxy
+- name: Create a region target HTTPS proxy
google.cloud.gcp_compute_region_target_https_proxy:
name: "{{ resource_name }}"
region: us-central1
ssl_certificates:
- - "{{ sslcert }}"
+ - "{{ sslcert }}" # noqa: args[module]
url_map: "{{ urlmap }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that region_target_https_proxy was created
+- name: Verify that region_target_https_proxy was created
google.cloud.gcp_compute_region_target_https_proxy_info:
- filters:
- - name = {{ resource_name }}
- region: us-central1
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/compute
+ filters:
+ - name = {{ resource_name }}
+ region: us-central1
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | length == 1
# ----------------------------------------------------------------------------
-- name: create a region target HTTPS proxy that already exists
+- name: Create a region target HTTPS proxy that already exists
google.cloud.gcp_compute_region_target_https_proxy:
name: "{{ resource_name }}"
region: us-central1
ssl_certificates:
- - "{{ sslcert }}"
+ - "{{ sslcert }}" # noqa: args[module]
url_map: "{{ urlmap }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#----------------------------------------------------------
-- name: delete a region target HTTPS proxy
+- name: Delete a region target HTTPS proxy
google.cloud.gcp_compute_region_target_https_proxy:
name: "{{ resource_name }}"
region: us-central1
ssl_certificates:
- - "{{ sslcert }}"
+ - "{{ sslcert }}" # noqa: args[module]
url_map: "{{ urlmap }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that region_target_https_proxy was deleted
+- name: Verify that region_target_https_proxy was deleted
google.cloud.gcp_compute_region_target_https_proxy_info:
- filters:
- - name = {{ resource_name }}
- region: us-central1
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/compute
+ filters:
+ - name = {{ resource_name }}
+ region: us-central1
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | length == 0
# ----------------------------------------------------------------------------
-- name: delete a region target HTTPS proxy that does not exist
+- name: Delete a region target HTTPS proxy that does not exist
google.cloud.gcp_compute_region_target_https_proxy:
name: "{{ resource_name }}"
region: us-central1
ssl_certificates:
- - "{{ sslcert }}"
+ - "{{ sslcert }}" # noqa: args[module]
url_map: "{{ urlmap }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#---------------------------------------------------------
# Post-test teardown
# If errors happen, don't crash the playbook!
-- name: delete a SSL certificate
+- name: Delete a SSL certificate
google.cloud.gcp_compute_ssl_certificate:
name: sslcert-targethttpsproxy
description: A certificate for testing. Do not use this certificate in production
@@ -233,36 +233,36 @@
-----END EC PRIVATE KEY-----
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: sslcert
ignore_errors: true
-- name: delete a region URL map
+- name: Delete a region URL map
google.cloud.gcp_compute_region_url_map:
name: urlmap-targethttpsproxy
region: us-central1
default_service: "{{ backendservice }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: urlmap
ignore_errors: true
-- name: delete a region backend service
+- name: Delete a region backend service
google.cloud.gcp_compute_region_backend_service:
name: backendservice-targethttpsproxy
region: us-central1
backends:
- - group: "{{ instancegroup.selfLink }}"
+ - group: "{{ instancegroup.selfLink }}"
healthchecks:
- - "{{ healthcheck.selfLink }}"
+ - "{{ healthcheck.selfLink }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: backendservice
ignore_errors: true
-- name: delete a region health check
+- name: Delete a region health check
google.cloud.gcp_compute_region_health_check:
name: "{{ resource_name }}"
type: HTTPS
@@ -272,17 +272,17 @@
region: us-central1
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: healthcheck
ignore_errors: true
-- name: delete a instance group
+- name: Delete a instance group
google.cloud.gcp_compute_instance_group:
name: instancegroup-targethttpsproxy
zone: us-central1-a
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: instancegroup
ignore_errors: true
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_target_https_proxy/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_target_https_proxy/tasks/main.yml
index 45d6e4917..fe47378c2 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_target_https_proxy/tasks/main.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_target_https_proxy/tasks/main.yml
@@ -1,2 +1,3 @@
---
-- include_tasks: autogen.yml
+- name: Generated tests
+ ansible.builtin.include_tasks: autogen.yml
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_url_map/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_url_map/tasks/autogen.yml
index 75e998c88..1cbfae962 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_url_map/tasks/autogen.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_url_map/tasks/autogen.yml
@@ -13,128 +13,128 @@
#
# ----------------------------------------------------------------------------
# Pre-test setup
-- name: create a region backend service
+- name: Create a region backend service
google.cloud.gcp_compute_region_backend_service:
name: "{{ resource_name }}"
region: us-central1
protocol: HTTP
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- load_balancing_scheme: "EXTERNAL"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ load_balancing_scheme: EXTERNAL
state: present
register: backendservice
-- name: delete a region URL map
+- name: Delete a region URL map
google.cloud.gcp_compute_region_url_map:
name: "{{ resource_name }}"
region: us-central1
default_service: "{{ backendservice }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
#----------------------------------------------------------
-- name: create a region URL map
+- name: Create a region URL map
google.cloud.gcp_compute_region_url_map:
name: "{{ resource_name }}"
region: us-central1
default_service: "{{ backendservice }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that region_url_map was created
+- name: Verify that region_url_map was created
google.cloud.gcp_compute_region_url_map_info:
- filters:
- - name = {{ resource_name }}
- region: us-central1
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/compute
+ filters:
+ - name = {{ resource_name }}
+ region: us-central1
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | length == 1
# ----------------------------------------------------------------------------
-- name: create a region URL map that already exists
+- name: Create a region URL map that already exists
google.cloud.gcp_compute_region_url_map:
name: "{{ resource_name }}"
region: us-central1
default_service: "{{ backendservice }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#----------------------------------------------------------
-- name: delete a region URL map
+- name: Delete a region URL map
google.cloud.gcp_compute_region_url_map:
name: "{{ resource_name }}"
region: us-central1
default_service: "{{ backendservice }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that region_url_map was deleted
+- name: Verify that region_url_map was deleted
google.cloud.gcp_compute_region_url_map_info:
- filters:
- - name = {{ resource_name }}
- region: us-central1
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/compute
+ filters:
+ - name = {{ resource_name }}
+ region: us-central1
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | length == 0
# ----------------------------------------------------------------------------
-- name: delete a region URL map that does not exist
+- name: Delete a region URL map that does not exist
google.cloud.gcp_compute_region_url_map:
name: "{{ resource_name }}"
region: us-central1
default_service: "{{ backendservice }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#---------------------------------------------------------
# Post-test teardown
# If errors happen, don't crash the playbook!
-- name: delete a region backend service
+- name: Delete a region backend service
google.cloud.gcp_compute_region_backend_service:
name: "{{ resource_name }}"
region: us-central1
protocol: HTTP
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- load_balancing_scheme: "EXTERNAL"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ load_balancing_scheme: EXTERNAL
state: absent
register: backendservice
- ignore_errors: true \ No newline at end of file
+ ignore_errors: true
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_url_map/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_url_map/tasks/main.yml
index 45d6e4917..fe47378c2 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_url_map/tasks/main.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_region_url_map/tasks/main.yml
@@ -1,2 +1,3 @@
---
-- include_tasks: autogen.yml
+- name: Generated tests
+ ansible.builtin.include_tasks: autogen.yml
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_reservation/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_reservation/tasks/autogen.yml
index 8cf3a2558..7663bf5bc 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_reservation/tasks/autogen.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_reservation/tasks/autogen.yml
@@ -13,7 +13,7 @@
#
# ----------------------------------------------------------------------------
# Pre-test setup
-- name: delete a reservation
+- name: Delete a reservation
google.cloud.gcp_compute_reservation:
name: "{{ resource_name }}"
zone: us-central1-a
@@ -24,10 +24,10 @@
machine_type: n2-standard-2
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
#----------------------------------------------------------
-- name: create a reservation
+- name: Create a reservation
google.cloud.gcp_compute_reservation:
name: "{{ resource_name }}"
zone: us-central1-a
@@ -38,30 +38,30 @@
machine_type: n2-standard-2
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that reservation was created
+- name: Verify that reservation was created
google.cloud.gcp_compute_reservation_info:
- filters:
- - name = {{ resource_name }}
- zone: us-central1-a
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/compute
+ filters:
+ - name = {{ resource_name }}
+ zone: us-central1-a
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | length == 1
# ----------------------------------------------------------------------------
-- name: create a reservation that already exists
+- name: Create a reservation that already exists
google.cloud.gcp_compute_reservation:
name: "{{ resource_name }}"
zone: us-central1-a
@@ -72,15 +72,15 @@
machine_type: n2-standard-2
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#----------------------------------------------------------
-- name: delete a reservation
+- name: Delete a reservation
google.cloud.gcp_compute_reservation:
name: "{{ resource_name }}"
zone: us-central1-a
@@ -91,30 +91,30 @@
machine_type: n2-standard-2
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that reservation was deleted
+- name: Verify that reservation was deleted
google.cloud.gcp_compute_reservation_info:
- filters:
- - name = {{ resource_name }}
- zone: us-central1-a
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/compute
+ filters:
+ - name = {{ resource_name }}
+ zone: us-central1-a
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | length == 0
# ----------------------------------------------------------------------------
-- name: delete a reservation that does not exist
+- name: Delete a reservation that does not exist
google.cloud.gcp_compute_reservation:
name: "{{ resource_name }}"
zone: us-central1-a
@@ -125,10 +125,10 @@
machine_type: n2-standard-2
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_reservation/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_reservation/tasks/main.yml
index 45d6e4917..fe47378c2 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_reservation/tasks/main.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_reservation/tasks/main.yml
@@ -1,2 +1,3 @@
---
-- include_tasks: autogen.yml
+- name: Generated tests
+ ansible.builtin.include_tasks: autogen.yml
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_resource_policy/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_resource_policy/tasks/autogen.yml
index 0910e5bb0..86647db0a 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_resource_policy/tasks/autogen.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_resource_policy/tasks/autogen.yml
@@ -13,7 +13,7 @@
#
# ----------------------------------------------------------------------------
# Pre-test setup
-- name: delete a resource policy
+- name: Delete a resource policy
google.cloud.gcp_compute_resource_policy:
name: "{{ resource_name }}"
region: us-central1
@@ -21,13 +21,13 @@
schedule:
daily_schedule:
days_in_cycle: 1
- start_time: '04:00'
+ start_time: "04:00"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
#----------------------------------------------------------
-- name: create a resource policy
+- name: Create a resource policy
google.cloud.gcp_compute_resource_policy:
name: "{{ resource_name }}"
region: us-central1
@@ -35,33 +35,33 @@
schedule:
daily_schedule:
days_in_cycle: 1
- start_time: '04:00'
+ start_time: "04:00"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that resource_policy was created
+- name: Verify that resource_policy was created
google.cloud.gcp_compute_resource_policy_info:
- filters:
- - name = {{ resource_name }}
- region: us-central1
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/compute
+ filters:
+ - name = {{ resource_name }}
+ region: us-central1
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | length == 1
# ----------------------------------------------------------------------------
-- name: create a resource policy that already exists
+- name: Create a resource policy that already exists
google.cloud.gcp_compute_resource_policy:
name: "{{ resource_name }}"
region: us-central1
@@ -69,18 +69,18 @@
schedule:
daily_schedule:
days_in_cycle: 1
- start_time: '04:00'
+ start_time: "04:00"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#----------------------------------------------------------
-- name: delete a resource policy
+- name: Delete a resource policy
google.cloud.gcp_compute_resource_policy:
name: "{{ resource_name }}"
region: us-central1
@@ -88,33 +88,33 @@
schedule:
daily_schedule:
days_in_cycle: 1
- start_time: '04:00'
+ start_time: "04:00"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that resource_policy was deleted
+- name: Verify that resource_policy was deleted
google.cloud.gcp_compute_resource_policy_info:
- filters:
- - name = {{ resource_name }}
- region: us-central1
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/compute
+ filters:
+ - name = {{ resource_name }}
+ region: us-central1
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | length == 0
# ----------------------------------------------------------------------------
-- name: delete a resource policy that does not exist
+- name: Delete a resource policy that does not exist
google.cloud.gcp_compute_resource_policy:
name: "{{ resource_name }}"
region: us-central1
@@ -122,13 +122,13 @@
schedule:
daily_schedule:
days_in_cycle: 1
- start_time: '04:00'
+ start_time: "04:00"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_resource_policy/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_resource_policy/tasks/main.yml
index 45d6e4917..fe47378c2 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_resource_policy/tasks/main.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_resource_policy/tasks/main.yml
@@ -1,2 +1,3 @@
---
-- include_tasks: autogen.yml
+- name: Generated tests
+ ansible.builtin.include_tasks: autogen.yml
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_route/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_route/tasks/autogen.yml
index bc32b3751..347c503c4 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_route/tasks/autogen.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_route/tasks/autogen.yml
@@ -13,160 +13,160 @@
#
# ----------------------------------------------------------------------------
# Pre-test setup
-- name: create a network
+- name: Create a network
google.cloud.gcp_compute_network:
name: network-route
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
auto_create_subnetworks: true
state: present
register: network
-- name: delete a route
+- name: Delete a route
google.cloud.gcp_compute_route:
name: "{{ resource_name }}"
dest_range: 192.168.6.0/24
next_hop_gateway: global/gateways/default-internet-gateway
network: "{{ network }}"
tags:
- - backends
- - databases
+ - backends
+ - databases
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
#----------------------------------------------------------
-- name: create a route
+- name: Create a route
google.cloud.gcp_compute_route:
name: "{{ resource_name }}"
dest_range: 192.168.6.0/24
next_hop_gateway: global/gateways/default-internet-gateway
network: "{{ network }}"
tags:
- - backends
- - databases
+ - backends
+ - databases
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that route was created
+- name: Verify that route was created
google.cloud.gcp_compute_route_info:
- filters:
- - name = {{ resource_name }}
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/compute
+ filters:
+ - name = {{ resource_name }}
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | length == 1
# ----------------------------------------------------------------------------
-- name: create a route that already exists
+- name: Create a route that already exists
google.cloud.gcp_compute_route:
name: "{{ resource_name }}"
dest_range: 192.168.6.0/24
next_hop_gateway: global/gateways/default-internet-gateway
network: "{{ network }}"
tags:
- - backends
- - databases
+ - backends
+ - databases
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
# ---
-- name: update a route
+- name: Update a route
google.cloud.gcp_compute_route:
name: "{{ resource_name }}"
dest_range: 192.168.6.0/28
next_hop_gateway: global/gateways/default-internet-gateway
network: "{{ network }}"
tags:
- - backends
- - foobar
+ - backends
+ - foobar
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
#----------------------------------------------------------
-- name: delete a route
+- name: Delete a route
google.cloud.gcp_compute_route:
name: "{{ resource_name }}"
dest_range: 192.168.6.0/24
next_hop_gateway: global/gateways/default-internet-gateway
network: "{{ network }}"
tags:
- - backends
- - databases
+ - backends
+ - databases
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that route was deleted
+- name: Verify that route was deleted
google.cloud.gcp_compute_route_info:
- filters:
- - name = {{ resource_name }}
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/compute
+ filters:
+ - name = {{ resource_name }}
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | length == 0
# ----------------------------------------------------------------------------
-- name: delete a route that does not exist
+- name: Delete a route that does not exist
google.cloud.gcp_compute_route:
name: "{{ resource_name }}"
dest_range: 192.168.6.0/24
next_hop_gateway: global/gateways/default-internet-gateway
network: "{{ network }}"
tags:
- - backends
- - databases
+ - backends
+ - databases
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#---------------------------------------------------------
# Post-test teardown
# If errors happen, don't crash the playbook!
-- name: delete a network
+- name: Delete a network
google.cloud.gcp_compute_network:
name: network-route
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
auto_create_subnetworks: true
state: absent
register: network
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_route/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_route/tasks/main.yml
index 45d6e4917..fe47378c2 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_route/tasks/main.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_route/tasks/main.yml
@@ -1,2 +1,3 @@
---
-- include_tasks: autogen.yml
+- name: Generated tests
+ ansible.builtin.include_tasks: autogen.yml
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_router/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_router/tasks/autogen.yml
index 0be0d142e..07acc6937 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_router/tasks/autogen.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_router/tasks/autogen.yml
@@ -13,16 +13,16 @@
#
# ----------------------------------------------------------------------------
# Pre-test setup
-- name: create a network
+- name: Create a network
google.cloud.gcp_compute_network:
name: network-router
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
auto_create_subnetworks: true
state: present
register: network
-- name: delete a router
+- name: Delete a router
google.cloud.gcp_compute_router:
name: "{{ resource_name }}"
network: "{{ network }}"
@@ -30,17 +30,17 @@
asn: 64514
advertise_mode: CUSTOM
advertised_groups:
- - ALL_SUBNETS
+ - ALL_SUBNETS
advertised_ip_ranges:
- - range: 1.2.3.4
- - range: 6.7.0.0/16
+ - range: 1.2.3.4
+ - range: 6.7.0.0/16
region: us-central1
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
#----------------------------------------------------------
-- name: create a router
+- name: Create a router
google.cloud.gcp_compute_router:
name: "{{ resource_name }}"
network: "{{ network }}"
@@ -48,37 +48,37 @@
asn: 64514
advertise_mode: CUSTOM
advertised_groups:
- - ALL_SUBNETS
+ - ALL_SUBNETS
advertised_ip_ranges:
- - range: 1.2.3.4
- - range: 6.7.0.0/16
+ - range: 1.2.3.4
+ - range: 6.7.0.0/16
region: us-central1
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that router was created
+- name: Verify that router was created
google.cloud.gcp_compute_router_info:
- filters:
- - name = {{ resource_name }}
- region: us-central1
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/compute
+ filters:
+ - name = {{ resource_name }}
+ region: us-central1
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | length == 1
# ----------------------------------------------------------------------------
-- name: create a router that already exists
+- name: Create a router that already exists
google.cloud.gcp_compute_router:
name: "{{ resource_name }}"
network: "{{ network }}"
@@ -86,22 +86,22 @@
asn: 64514
advertise_mode: CUSTOM
advertised_groups:
- - ALL_SUBNETS
+ - ALL_SUBNETS
advertised_ip_ranges:
- - range: 1.2.3.4
- - range: 6.7.0.0/16
+ - range: 1.2.3.4
+ - range: 6.7.0.0/16
region: us-central1
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#----------------------------------------------------------
-- name: delete a router
+- name: Delete a router
google.cloud.gcp_compute_router:
name: "{{ resource_name }}"
network: "{{ network }}"
@@ -109,37 +109,37 @@
asn: 64514
advertise_mode: CUSTOM
advertised_groups:
- - ALL_SUBNETS
+ - ALL_SUBNETS
advertised_ip_ranges:
- - range: 1.2.3.4
- - range: 6.7.0.0/16
+ - range: 1.2.3.4
+ - range: 6.7.0.0/16
region: us-central1
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that router was deleted
+- name: Verify that router was deleted
google.cloud.gcp_compute_router_info:
- filters:
- - name = {{ resource_name }}
- region: us-central1
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/compute
+ filters:
+ - name = {{ resource_name }}
+ region: us-central1
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | length == 0
# ----------------------------------------------------------------------------
-- name: delete a router that does not exist
+- name: Delete a router that does not exist
google.cloud.gcp_compute_router:
name: "{{ resource_name }}"
network: "{{ network }}"
@@ -147,29 +147,29 @@
asn: 64514
advertise_mode: CUSTOM
advertised_groups:
- - ALL_SUBNETS
+ - ALL_SUBNETS
advertised_ip_ranges:
- - range: 1.2.3.4
- - range: 6.7.0.0/16
+ - range: 1.2.3.4
+ - range: 6.7.0.0/16
region: us-central1
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#---------------------------------------------------------
# Post-test teardown
# If errors happen, don't crash the playbook!
-- name: delete a network
+- name: Delete a network
google.cloud.gcp_compute_network:
name: network-router
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
auto_create_subnetworks: true
state: absent
register: network
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_router/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_router/tasks/main.yml
index 45d6e4917..fe47378c2 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_router/tasks/main.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_router/tasks/main.yml
@@ -1,2 +1,3 @@
---
-- include_tasks: autogen.yml
+- name: Generated tests
+ ansible.builtin.include_tasks: autogen.yml
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_snapshot/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_snapshot/tasks/autogen.yml
index 64b4cb2e7..435284e08 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_snapshot/tasks/autogen.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_snapshot/tasks/autogen.yml
@@ -13,16 +13,16 @@
#
# ----------------------------------------------------------------------------
# Pre-test setup
-- name: create a disk
+- name: Create a disk
google.cloud.gcp_compute_disk:
name: disk-snapshot
zone: us-central1-a
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: disk
-- name: delete a snapshot
+- name: Delete a snapshot
google.cloud.gcp_compute_snapshot:
name: "{{ resource_name }}"
source_disk: "{{ disk }}"
@@ -31,10 +31,10 @@
my_label: value
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
#----------------------------------------------------------
-- name: create a snapshot
+- name: Create a snapshot
google.cloud.gcp_compute_snapshot:
name: "{{ resource_name }}"
source_disk: "{{ disk }}"
@@ -43,29 +43,29 @@
my_label: value
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that snapshot was created
+- name: Verify that snapshot was created
google.cloud.gcp_compute_snapshot_info:
- filters:
- - name = {{ resource_name }}
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/compute
+ filters:
+ - name = {{ resource_name }}
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | length == 1
# ----------------------------------------------------------------------------
-- name: create a snapshot that already exists
+- name: Create a snapshot that already exists
google.cloud.gcp_compute_snapshot:
name: "{{ resource_name }}"
source_disk: "{{ disk }}"
@@ -74,15 +74,15 @@
my_label: value
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#----------------------------------------------------------
-- name: delete a snapshot
+- name: Delete a snapshot
google.cloud.gcp_compute_snapshot:
name: "{{ resource_name }}"
source_disk: "{{ disk }}"
@@ -91,29 +91,29 @@
my_label: value
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that snapshot was deleted
+- name: Verify that snapshot was deleted
google.cloud.gcp_compute_snapshot_info:
- filters:
- - name = {{ resource_name }}
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/compute
+ filters:
+ - name = {{ resource_name }}
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | length == 0
# ----------------------------------------------------------------------------
-- name: delete a snapshot that does not exist
+- name: Delete a snapshot that does not exist
google.cloud.gcp_compute_snapshot:
name: "{{ resource_name }}"
source_disk: "{{ disk }}"
@@ -122,23 +122,23 @@
my_label: value
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#---------------------------------------------------------
# Post-test teardown
# If errors happen, don't crash the playbook!
-- name: delete a disk
+- name: Delete a disk
google.cloud.gcp_compute_disk:
name: disk-snapshot
zone: us-central1-a
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: disk
ignore_errors: true
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_snapshot/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_snapshot/tasks/main.yml
index 45d6e4917..fe47378c2 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_snapshot/tasks/main.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_snapshot/tasks/main.yml
@@ -1,2 +1,3 @@
---
-- include_tasks: autogen.yml
+- name: Generated tests
+ ansible.builtin.include_tasks: autogen.yml
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_ssl_certificate/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_ssl_certificate/tasks/autogen.yml
index a8346cdeb..9d36683db 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_ssl_certificate/tasks/autogen.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_ssl_certificate/tasks/autogen.yml
@@ -13,7 +13,7 @@
#
# ----------------------------------------------------------------------------
# Pre-test setup
-- name: delete a SSL certificate
+- name: Delete a SSL certificate
google.cloud.gcp_compute_ssl_certificate:
name: "{{ resource_name }}"
description: A certificate for testing. Do not use this certificate in production
@@ -43,10 +43,10 @@
-----END EC PRIVATE KEY-----
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
#----------------------------------------------------------
-- name: create a SSL certificate
+- name: Create a SSL certificate
google.cloud.gcp_compute_ssl_certificate:
name: "{{ resource_name }}"
description: A certificate for testing. Do not use this certificate in production
@@ -76,29 +76,29 @@
-----END EC PRIVATE KEY-----
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that ssl_certificate was created
+- name: Verify that ssl_certificate was created
google.cloud.gcp_compute_ssl_certificate_info:
- filters:
- - name = {{ resource_name }}
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/compute
+ filters:
+ - name = {{ resource_name }}
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | length == 1
# ----------------------------------------------------------------------------
-- name: create a SSL certificate that already exists
+- name: Create a SSL certificate that already exists
google.cloud.gcp_compute_ssl_certificate:
name: "{{ resource_name }}"
description: A certificate for testing. Do not use this certificate in production
@@ -128,15 +128,15 @@
-----END EC PRIVATE KEY-----
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#----------------------------------------------------------
-- name: delete a SSL certificate
+- name: Delete a SSL certificate
google.cloud.gcp_compute_ssl_certificate:
name: "{{ resource_name }}"
description: A certificate for testing. Do not use this certificate in production
@@ -166,29 +166,29 @@
-----END EC PRIVATE KEY-----
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that ssl_certificate was deleted
+- name: Verify that ssl_certificate was deleted
google.cloud.gcp_compute_ssl_certificate_info:
- filters:
- - name = {{ resource_name }}
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/compute
+ filters:
+ - name = {{ resource_name }}
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | length == 0
# ----------------------------------------------------------------------------
-- name: delete a SSL certificate that does not exist
+- name: Delete a SSL certificate that does not exist
google.cloud.gcp_compute_ssl_certificate:
name: "{{ resource_name }}"
description: A certificate for testing. Do not use this certificate in production
@@ -218,10 +218,10 @@
-----END EC PRIVATE KEY-----
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_ssl_certificate/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_ssl_certificate/tasks/main.yml
index 45d6e4917..fe47378c2 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_ssl_certificate/tasks/main.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_ssl_certificate/tasks/main.yml
@@ -1,2 +1,3 @@
---
-- include_tasks: autogen.yml
+- name: Generated tests
+ ansible.builtin.include_tasks: autogen.yml
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_ssl_policy/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_ssl_policy/tasks/autogen.yml
index 22bc04d28..adbba9f34 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_ssl_policy/tasks/autogen.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_ssl_policy/tasks/autogen.yml
@@ -13,115 +13,115 @@
#
# ----------------------------------------------------------------------------
# Pre-test setup
-- name: delete a SSL policy
+- name: Delete a SSL policy
google.cloud.gcp_compute_ssl_policy:
name: "{{ resource_name }}"
profile: CUSTOM
min_tls_version: TLS_1_2
custom_features:
- - TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
- - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
+ - TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
+ - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
#----------------------------------------------------------
-- name: create a SSL policy
+- name: Create a SSL policy
google.cloud.gcp_compute_ssl_policy:
name: "{{ resource_name }}"
profile: CUSTOM
min_tls_version: TLS_1_2
custom_features:
- - TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
- - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
+ - TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
+ - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that ssl_policy was created
+- name: Verify that ssl_policy was created
google.cloud.gcp_compute_ssl_policy_info:
- filters:
- - name = {{ resource_name }}
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/compute
+ filters:
+ - name = {{ resource_name }}
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | length == 1
# ----------------------------------------------------------------------------
-- name: create a SSL policy that already exists
+- name: Create a SSL policy that already exists
google.cloud.gcp_compute_ssl_policy:
name: "{{ resource_name }}"
profile: CUSTOM
min_tls_version: TLS_1_2
custom_features:
- - TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
- - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
+ - TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
+ - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#----------------------------------------------------------
-- name: delete a SSL policy
+- name: Delete a SSL policy
google.cloud.gcp_compute_ssl_policy:
name: "{{ resource_name }}"
profile: CUSTOM
min_tls_version: TLS_1_2
custom_features:
- - TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
- - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
+ - TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
+ - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that ssl_policy was deleted
+- name: Verify that ssl_policy was deleted
google.cloud.gcp_compute_ssl_policy_info:
- filters:
- - name = {{ resource_name }}
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/compute
+ filters:
+ - name = {{ resource_name }}
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | length == 0
# ----------------------------------------------------------------------------
-- name: delete a SSL policy that does not exist
+- name: Delete a SSL policy that does not exist
google.cloud.gcp_compute_ssl_policy:
name: "{{ resource_name }}"
profile: CUSTOM
min_tls_version: TLS_1_2
custom_features:
- - TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
- - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
+ - TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
+ - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_ssl_policy/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_ssl_policy/tasks/main.yml
index 45d6e4917..fe47378c2 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_ssl_policy/tasks/main.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_ssl_policy/tasks/main.yml
@@ -1,2 +1,3 @@
---
-- include_tasks: autogen.yml
+- name: Generated tests
+ ansible.builtin.include_tasks: autogen.yml
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_subnetwork/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_subnetwork/tasks/autogen.yml
index 3ea133024..6849ccac7 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_subnetwork/tasks/autogen.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_subnetwork/tasks/autogen.yml
@@ -13,16 +13,16 @@
#
# ----------------------------------------------------------------------------
# Pre-test setup
-- name: create a network
+- name: Create a network
google.cloud.gcp_compute_network:
name: network-subnetwork
- auto_create_subnetworks: 'true'
+ auto_create_subnetworks: "true"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: network
-- name: delete a subnetwork
+- name: Delete a subnetwork
google.cloud.gcp_compute_subnetwork:
name: ansiblenet
region: us-west1
@@ -30,10 +30,10 @@
ip_cidr_range: 172.16.0.0/16
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
#----------------------------------------------------------
-- name: create a subnetwork
+- name: Create a subnetwork
google.cloud.gcp_compute_subnetwork:
name: ansiblenet
region: us-west1
@@ -41,30 +41,30 @@
ip_cidr_range: 172.16.0.0/16
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that subnetwork was created
+- name: Verify that subnetwork was created
google.cloud.gcp_compute_subnetwork_info:
- filters:
- - name = ansiblenet
- region: us-west1
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/compute
+ filters:
+ - name = ansiblenet
+ region: us-west1
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | length == 1
# ----------------------------------------------------------------------------
-- name: create a subnetwork that already exists
+- name: Create a subnetwork that already exists
google.cloud.gcp_compute_subnetwork:
name: ansiblenet
region: us-west1
@@ -72,15 +72,15 @@
ip_cidr_range: 172.16.0.0/16
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#----------------------------------------------------------
-- name: delete a subnetwork
+- name: Delete a subnetwork
google.cloud.gcp_compute_subnetwork:
name: ansiblenet
region: us-west1
@@ -88,30 +88,30 @@
ip_cidr_range: 172.16.0.0/16
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that subnetwork was deleted
+- name: Verify that subnetwork was deleted
google.cloud.gcp_compute_subnetwork_info:
- filters:
- - name = ansiblenet
- region: us-west1
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/compute
+ filters:
+ - name = ansiblenet
+ region: us-west1
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | length == 0
# ----------------------------------------------------------------------------
-- name: delete a subnetwork that does not exist
+- name: Delete a subnetwork that does not exist
google.cloud.gcp_compute_subnetwork:
name: ansiblenet
region: us-west1
@@ -119,23 +119,23 @@
ip_cidr_range: 172.16.0.0/16
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#---------------------------------------------------------
# Post-test teardown
# If errors happen, don't crash the playbook!
-- name: delete a network
+- name: Delete a network
google.cloud.gcp_compute_network:
name: network-subnetwork
- auto_create_subnetworks: 'true'
+ auto_create_subnetworks: "true"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: network
ignore_errors: true
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_subnetwork/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_subnetwork/tasks/main.yml
index 45d6e4917..fe47378c2 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_subnetwork/tasks/main.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_subnetwork/tasks/main.yml
@@ -1,2 +1,3 @@
---
-- include_tasks: autogen.yml
+- name: Generated tests
+ ansible.builtin.include_tasks: autogen.yml
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_http_proxy/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_http_proxy/tasks/autogen.yml
index 6e25237ce..1c48c9db7 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_http_proxy/tasks/autogen.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_http_proxy/tasks/autogen.yml
@@ -13,16 +13,16 @@
#
# ----------------------------------------------------------------------------
# Pre-test setup
-- name: create a instance group
+- name: Create a instance group
google.cloud.gcp_compute_instance_group:
name: instancegroup-targethttpproxy
zone: us-central1-a
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: instancegroup
-- name: create a HTTP health check
+- name: Create a HTTP health check
google.cloud.gcp_compute_http_health_check:
name: httphealthcheck-targethttpproxy
healthy_threshold: 10
@@ -31,151 +31,151 @@
unhealthy_threshold: 5
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: healthcheck
-- name: create a backend service
+- name: Create a backend service
google.cloud.gcp_compute_backend_service:
name: backendservice-targethttpproxy
backends:
- - group: "{{ instancegroup.selfLink }}"
+ - group: "{{ instancegroup.selfLink }}"
health_checks:
- - "{{ healthcheck.selfLink }}"
- enable_cdn: 'true'
+ - "{{ healthcheck.selfLink }}"
+ enable_cdn: "true"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: backendservice
-- name: create a URL map
+- name: Create a URL map
google.cloud.gcp_compute_url_map:
name: urlmap-targethttpproxy
default_service: "{{ backendservice }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: urlmap
-- name: delete a target HTTP proxy
+- name: Delete a target HTTP proxy
google.cloud.gcp_compute_target_http_proxy:
name: "{{ resource_name }}"
url_map: "{{ urlmap }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
#----------------------------------------------------------
-- name: create a target HTTP proxy
+- name: Create a target HTTP proxy
google.cloud.gcp_compute_target_http_proxy:
name: "{{ resource_name }}"
url_map: "{{ urlmap }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that target_http_proxy was created
+- name: Verify that target_http_proxy was created
google.cloud.gcp_compute_target_http_proxy_info:
- filters:
- - name = {{ resource_name }}
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/compute
+ filters:
+ - name = {{ resource_name }}
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | length == 1
# ----------------------------------------------------------------------------
-- name: create a target HTTP proxy that already exists
+- name: Create a target HTTP proxy that already exists
google.cloud.gcp_compute_target_http_proxy:
name: "{{ resource_name }}"
url_map: "{{ urlmap }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#----------------------------------------------------------
-- name: delete a target HTTP proxy
+- name: Delete a target HTTP proxy
google.cloud.gcp_compute_target_http_proxy:
name: "{{ resource_name }}"
url_map: "{{ urlmap }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that target_http_proxy was deleted
+- name: Verify that target_http_proxy was deleted
google.cloud.gcp_compute_target_http_proxy_info:
- filters:
- - name = {{ resource_name }}
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/compute
+ filters:
+ - name = {{ resource_name }}
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | length == 0
# ----------------------------------------------------------------------------
-- name: delete a target HTTP proxy that does not exist
+- name: Delete a target HTTP proxy that does not exist
google.cloud.gcp_compute_target_http_proxy:
name: "{{ resource_name }}"
url_map: "{{ urlmap }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#---------------------------------------------------------
# Post-test teardown
# If errors happen, don't crash the playbook!
-- name: delete a URL map
+- name: Delete a URL map
google.cloud.gcp_compute_url_map:
name: urlmap-targethttpproxy
default_service: "{{ backendservice }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: urlmap
ignore_errors: true
-- name: delete a backend service
+- name: Delete a backend service
google.cloud.gcp_compute_backend_service:
name: backendservice-targethttpproxy
backends:
- - group: "{{ instancegroup.selfLink }}"
+ - group: "{{ instancegroup.selfLink }}"
health_checks:
- - "{{ healthcheck.selfLink }}"
- enable_cdn: 'true'
+ - "{{ healthcheck.selfLink }}"
+ enable_cdn: "true"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: backendservice
ignore_errors: true
-- name: delete a HTTP health check
+- name: Delete a HTTP health check
google.cloud.gcp_compute_http_health_check:
name: httphealthcheck-targethttpproxy
healthy_threshold: 10
@@ -184,17 +184,17 @@
unhealthy_threshold: 5
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: healthcheck
ignore_errors: true
-- name: delete a instance group
+- name: Delete a instance group
google.cloud.gcp_compute_instance_group:
name: instancegroup-targethttpproxy
zone: us-central1-a
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: instancegroup
ignore_errors: true
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_http_proxy/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_http_proxy/tasks/main.yml
index 45d6e4917..fe47378c2 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_http_proxy/tasks/main.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_http_proxy/tasks/main.yml
@@ -1,2 +1,3 @@
---
-- include_tasks: autogen.yml
+- name: Generated tests
+ ansible.builtin.include_tasks: autogen.yml
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_https_proxy/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_https_proxy/tasks/autogen.yml
index 29b3ae0b0..5731d0870 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_https_proxy/tasks/autogen.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_https_proxy/tasks/autogen.yml
@@ -13,16 +13,16 @@
#
# ----------------------------------------------------------------------------
# Pre-test setup
-- name: create a instance group
+- name: Create a instance group
google.cloud.gcp_compute_instance_group:
name: instancegroup-targethttpsproxy
zone: us-central1-a
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: instancegroup
-- name: create a HTTP health check
+- name: Create a HTTP health check
google.cloud.gcp_compute_http_health_check:
name: httphealthcheck-targethttpsproxy
healthy_threshold: 10
@@ -31,32 +31,32 @@
unhealthy_threshold: 5
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: healthcheck
-- name: create a backend service
+- name: Create a backend service
google.cloud.gcp_compute_backend_service:
name: backendservice-targethttpsproxy
backends:
- - group: "{{ instancegroup.selfLink }}"
+ - group: "{{ instancegroup.selfLink }}"
health_checks:
- - "{{ healthcheck.selfLink }}"
- enable_cdn: 'true'
+ - "{{ healthcheck.selfLink }}"
+ enable_cdn: "true"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: backendservice
-- name: create a URL map
+- name: Create a URL map
google.cloud.gcp_compute_url_map:
name: urlmap-targethttpsproxy
default_service: "{{ backendservice }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: urlmap
-- name: create a SSL certificate
+- name: Create a SSL certificate
google.cloud.gcp_compute_ssl_certificate:
name: sslcert-targethttpsproxy
description: A certificate for testing. Do not use this certificate in production
@@ -86,115 +86,115 @@
-----END EC PRIVATE KEY-----
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: sslcert
-- name: delete a target HTTPS proxy
+- name: Delete a target HTTPS proxy
google.cloud.gcp_compute_target_https_proxy:
name: "{{ resource_name }}"
ssl_certificates:
- - "{{ sslcert }}"
+ - "{{ sslcert }}" # noqa: args[module]
url_map: "{{ urlmap }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
#----------------------------------------------------------
-- name: create a target HTTPS proxy
+- name: Create a target HTTPS proxy
google.cloud.gcp_compute_target_https_proxy:
name: "{{ resource_name }}"
ssl_certificates:
- - "{{ sslcert }}"
+ - "{{ sslcert }}" # noqa: args[module]
url_map: "{{ urlmap }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that target_https_proxy was created
+- name: Verify that target_https_proxy was created
google.cloud.gcp_compute_target_https_proxy_info:
- filters:
- - name = {{ resource_name }}
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/compute
+ filters:
+ - name = {{ resource_name }}
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | length == 1
# ----------------------------------------------------------------------------
-- name: create a target HTTPS proxy that already exists
+- name: Create a target HTTPS proxy that already exists
google.cloud.gcp_compute_target_https_proxy:
name: "{{ resource_name }}"
ssl_certificates:
- - "{{ sslcert }}"
+ - "{{ sslcert }}" # noqa: args[module]
url_map: "{{ urlmap }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#----------------------------------------------------------
-- name: delete a target HTTPS proxy
+- name: Delete a target HTTPS proxy
google.cloud.gcp_compute_target_https_proxy:
name: "{{ resource_name }}"
ssl_certificates:
- - "{{ sslcert }}"
+ - "{{ sslcert }}" # noqa: args[module]
url_map: "{{ urlmap }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that target_https_proxy was deleted
+- name: Verify that target_https_proxy was deleted
google.cloud.gcp_compute_target_https_proxy_info:
- filters:
- - name = {{ resource_name }}
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/compute
+ filters:
+ - name = {{ resource_name }}
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | length == 0
# ----------------------------------------------------------------------------
-- name: delete a target HTTPS proxy that does not exist
+- name: Delete a target HTTPS proxy that does not exist
google.cloud.gcp_compute_target_https_proxy:
name: "{{ resource_name }}"
ssl_certificates:
- - "{{ sslcert }}"
+ - "{{ sslcert }}" # noqa: args[module]
url_map: "{{ urlmap }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#---------------------------------------------------------
# Post-test teardown
# If errors happen, don't crash the playbook!
-- name: delete a SSL certificate
+- name: Delete a SSL certificate
google.cloud.gcp_compute_ssl_certificate:
name: sslcert-targethttpsproxy
description: A certificate for testing. Do not use this certificate in production
@@ -224,35 +224,35 @@
-----END EC PRIVATE KEY-----
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: sslcert
ignore_errors: true
-- name: delete a URL map
+- name: Delete a URL map
google.cloud.gcp_compute_url_map:
name: urlmap-targethttpsproxy
default_service: "{{ backendservice }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: urlmap
ignore_errors: true
-- name: delete a backend service
+- name: Delete a backend service
google.cloud.gcp_compute_backend_service:
name: backendservice-targethttpsproxy
backends:
- - group: "{{ instancegroup.selfLink }}"
+ - group: "{{ instancegroup.selfLink }}"
health_checks:
- - "{{ healthcheck.selfLink }}"
- enable_cdn: 'true'
+ - "{{ healthcheck.selfLink }}"
+ enable_cdn: "true"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: backendservice
ignore_errors: true
-- name: delete a HTTP health check
+- name: Delete a HTTP health check
google.cloud.gcp_compute_http_health_check:
name: httphealthcheck-targethttpsproxy
healthy_threshold: 10
@@ -261,17 +261,17 @@
unhealthy_threshold: 5
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: healthcheck
ignore_errors: true
-- name: delete a instance group
+- name: Delete a instance group
google.cloud.gcp_compute_instance_group:
name: instancegroup-targethttpsproxy
zone: us-central1-a
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: instancegroup
ignore_errors: true
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_https_proxy/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_https_proxy/tasks/main.yml
index 45d6e4917..fe47378c2 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_https_proxy/tasks/main.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_https_proxy/tasks/main.yml
@@ -1,2 +1,3 @@
---
-- include_tasks: autogen.yml
+- name: Generated tests
+ ansible.builtin.include_tasks: autogen.yml
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_instance/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_instance/tasks/autogen.yml
index 53418569e..74a01f61b 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_instance/tasks/autogen.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_instance/tasks/autogen.yml
@@ -13,162 +13,162 @@
#
# ----------------------------------------------------------------------------
# Pre-test setup
-- name: create a network
+- name: Create a network
google.cloud.gcp_compute_network:
name: network-instance
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
auto_create_subnetworks: true
state: present
register: network
-- name: create a instance
+- name: Create a instance
google.cloud.gcp_compute_instance:
name: "{{ resource_name }}"
machine_type: n1-standard-1
disks:
- - auto_delete: 'true'
- boot: 'true'
- initialize_params:
- source_image: projects/ubuntu-os-cloud/global/images/family/ubuntu-minimal-2204-lts
+ - auto_delete: "true"
+ boot: "true"
+ initialize_params:
+ source_image: projects/ubuntu-os-cloud/global/images/family/ubuntu-minimal-2204-lts
labels:
environment: production
network_interfaces:
- - network: "{{ network }}"
+ - network: "{{ network }}"
zone: us-central1-a
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: instance
-- name: delete a target instance
+- name: Delete a target instance
google.cloud.gcp_compute_target_instance:
name: target
instance: "{{ instance }}"
zone: us-central1-a
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
#----------------------------------------------------------
-- name: create a target instance
+- name: Create a target instance
google.cloud.gcp_compute_target_instance:
name: target
instance: "{{ instance }}"
zone: us-central1-a
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that target_instance was created
+- name: Verify that target_instance was created
google.cloud.gcp_compute_target_instance_info:
- filters:
- - name = target
- zone: us-central1-a
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/compute
+ filters:
+ - name = target
+ zone: us-central1-a
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | length == 1
# ----------------------------------------------------------------------------
-- name: create a target instance that already exists
+- name: Create a target instance that already exists
google.cloud.gcp_compute_target_instance:
name: target
instance: "{{ instance }}"
zone: us-central1-a
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#----------------------------------------------------------
-- name: delete a target instance
+- name: Delete a target instance
google.cloud.gcp_compute_target_instance:
name: target
instance: "{{ instance }}"
zone: us-central1-a
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that target_instance was deleted
+- name: Verify that target_instance was deleted
google.cloud.gcp_compute_target_instance_info:
- filters:
- - name = target
- zone: us-central1-a
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/compute
+ filters:
+ - name = target
+ zone: us-central1-a
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | length == 0
# ----------------------------------------------------------------------------
-- name: delete a target instance that does not exist
+- name: Delete a target instance that does not exist
google.cloud.gcp_compute_target_instance:
name: target
instance: "{{ instance }}"
zone: us-central1-a
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#---------------------------------------------------------
# Post-test teardown
# If errors happen, don't crash the playbook!
-- name: delete a instance
+- name: Delete a instance
google.cloud.gcp_compute_instance:
name: "{{ resource_name }}"
machine_type: n1-standard-1
disks:
- - auto_delete: 'true'
- boot: 'true'
- initialize_params:
- source_image: projects/ubuntu-os-cloud/global/images/family/ubuntu-minimal-2204-lts
+ - auto_delete: "true"
+ boot: "true"
+ initialize_params:
+ source_image: projects/ubuntu-os-cloud/global/images/family/ubuntu-minimal-2204-lts
labels:
environment: production
network_interfaces:
- - network: "{{ network }}"
+ - network: "{{ network }}"
zone: us-central1-a
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: instance
ignore_errors: true
-- name: delete a network
+- name: Delete a network
google.cloud.gcp_compute_network:
name: network-instance
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
auto_create_subnetworks: true
state: absent
register: network
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_instance/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_instance/tasks/main.yml
index 45d6e4917..fe47378c2 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_instance/tasks/main.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_instance/tasks/main.yml
@@ -1,2 +1,3 @@
---
-- include_tasks: autogen.yml
+- name: Generated tests
+ ansible.builtin.include_tasks: autogen.yml
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_pool/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_pool/tasks/autogen.yml
index 6fd609140..59a46d210 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_pool/tasks/autogen.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_pool/tasks/autogen.yml
@@ -13,97 +13,97 @@
#
# ----------------------------------------------------------------------------
# Pre-test setup
-- name: delete a target pool
+- name: Delete a target pool
google.cloud.gcp_compute_target_pool:
name: "{{ resource_name }}"
region: us-west1
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
#----------------------------------------------------------
-- name: create a target pool
+- name: Create a target pool
google.cloud.gcp_compute_target_pool:
name: "{{ resource_name }}"
region: us-west1
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that target_pool was created
+- name: Verify that target_pool was created
google.cloud.gcp_compute_target_pool_info:
- filters:
- - name = {{ resource_name }}
- region: us-west1
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/compute
+ filters:
+ - name = {{ resource_name }}
+ region: us-west1
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | length == 1
# ----------------------------------------------------------------------------
-- name: create a target pool that already exists
+- name: Create a target pool that already exists
google.cloud.gcp_compute_target_pool:
name: "{{ resource_name }}"
region: us-west1
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#----------------------------------------------------------
-- name: delete a target pool
+- name: Delete a target pool
google.cloud.gcp_compute_target_pool:
name: "{{ resource_name }}"
region: us-west1
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that target_pool was deleted
+- name: Verify that target_pool was deleted
google.cloud.gcp_compute_target_pool_info:
- filters:
- - name = {{ resource_name }}
- region: us-west1
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/compute
+ filters:
+ - name = {{ resource_name }}
+ region: us-west1
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | length == 0
# ----------------------------------------------------------------------------
-- name: delete a target pool that does not exist
+- name: Delete a target pool that does not exist
google.cloud.gcp_compute_target_pool:
name: "{{ resource_name }}"
region: us-west1
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_pool/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_pool/tasks/main.yml
index 45d6e4917..fe47378c2 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_pool/tasks/main.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_pool/tasks/main.yml
@@ -1,2 +1,3 @@
---
-- include_tasks: autogen.yml
+- name: Generated tests
+ ansible.builtin.include_tasks: autogen.yml
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_ssl_proxy/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_ssl_proxy/tasks/autogen.yml
index 056e1f5ea..6142ec918 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_ssl_proxy/tasks/autogen.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_ssl_proxy/tasks/autogen.yml
@@ -13,16 +13,16 @@
#
# ----------------------------------------------------------------------------
# Pre-test setup
-- name: create a instance group
+- name: Create a instance group
google.cloud.gcp_compute_instance_group:
name: instancegroup-targetsslproxy
zone: us-central1-a
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: instancegroup
-- name: create a health check
+- name: Create a health check
google.cloud.gcp_compute_health_check:
name: healthcheck-targetsslproxy
type: TCP
@@ -35,23 +35,23 @@
unhealthy_threshold: 5
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: healthcheck
-- name: create a backend service
+- name: Create a backend service
google.cloud.gcp_compute_backend_service:
name: backendservice-targetsslproxy
backends:
- - group: "{{ instancegroup.selfLink }}"
+ - group: "{{ instancegroup.selfLink }}"
health_checks:
- - "{{ healthcheck.selfLink }}"
+ - "{{ healthcheck.selfLink }}"
protocol: SSL
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: backendservice
-- name: create a SSL certificate
+- name: Create a SSL certificate
google.cloud.gcp_compute_ssl_certificate:
name: sslcert-targetsslproxy
description: A certificate for testing. Do not use this certificate in production
@@ -81,115 +81,115 @@
-----END EC PRIVATE KEY-----
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: sslcert
-- name: delete a target SSL proxy
+- name: Delete a target SSL proxy
google.cloud.gcp_compute_target_ssl_proxy:
name: "{{ resource_name }}"
ssl_certificates:
- - "{{ sslcert }}"
+ - "{{ sslcert }}"
service: "{{ backendservice }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
#----------------------------------------------------------
-- name: create a target SSL proxy
+- name: Create a target SSL proxy
google.cloud.gcp_compute_target_ssl_proxy:
name: "{{ resource_name }}"
ssl_certificates:
- - "{{ sslcert }}"
+ - "{{ sslcert }}"
service: "{{ backendservice }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that target_ssl_proxy was created
+- name: Verify that target_ssl_proxy was created
google.cloud.gcp_compute_target_ssl_proxy_info:
- filters:
- - name = {{ resource_name }}
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/compute
+ filters:
+ - name = {{ resource_name }}
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | length == 1
# ----------------------------------------------------------------------------
-- name: create a target SSL proxy that already exists
+- name: Create a target SSL proxy that already exists
google.cloud.gcp_compute_target_ssl_proxy:
name: "{{ resource_name }}"
ssl_certificates:
- - "{{ sslcert }}"
+ - "{{ sslcert }}"
service: "{{ backendservice }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#----------------------------------------------------------
-- name: delete a target SSL proxy
+- name: Delete a target SSL proxy
google.cloud.gcp_compute_target_ssl_proxy:
name: "{{ resource_name }}"
ssl_certificates:
- - "{{ sslcert }}"
+ - "{{ sslcert }}"
service: "{{ backendservice }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that target_ssl_proxy was deleted
+- name: Verify that target_ssl_proxy was deleted
google.cloud.gcp_compute_target_ssl_proxy_info:
- filters:
- - name = {{ resource_name }}
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/compute
+ filters:
+ - name = {{ resource_name }}
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | length == 0
# ----------------------------------------------------------------------------
-- name: delete a target SSL proxy that does not exist
+- name: Delete a target SSL proxy that does not exist
google.cloud.gcp_compute_target_ssl_proxy:
name: "{{ resource_name }}"
ssl_certificates:
- - "{{ sslcert }}"
+ - "{{ sslcert }}"
service: "{{ backendservice }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#---------------------------------------------------------
# Post-test teardown
# If errors happen, don't crash the playbook!
-- name: delete a SSL certificate
+- name: Delete a SSL certificate
google.cloud.gcp_compute_ssl_certificate:
name: sslcert-targetsslproxy
description: A certificate for testing. Do not use this certificate in production
@@ -219,25 +219,25 @@
-----END EC PRIVATE KEY-----
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: sslcert
ignore_errors: true
-- name: delete a backend service
+- name: Delete a backend service
google.cloud.gcp_compute_backend_service:
name: backendservice-targetsslproxy
backends:
- - group: "{{ instancegroup.selfLink }}"
+ - group: "{{ instancegroup.selfLink }}"
health_checks:
- - "{{ healthcheck.selfLink }}"
+ - "{{ healthcheck.selfLink }}"
protocol: SSL
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: backendservice
ignore_errors: true
-- name: delete a health check
+- name: Delete a health check
google.cloud.gcp_compute_health_check:
name: healthcheck-targetsslproxy
type: TCP
@@ -250,17 +250,17 @@
unhealthy_threshold: 5
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: healthcheck
ignore_errors: true
-- name: delete a instance group
+- name: Delete a instance group
google.cloud.gcp_compute_instance_group:
name: instancegroup-targetsslproxy
zone: us-central1-a
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: instancegroup
ignore_errors: true
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_ssl_proxy/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_ssl_proxy/tasks/main.yml
index 45d6e4917..fe47378c2 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_ssl_proxy/tasks/main.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_ssl_proxy/tasks/main.yml
@@ -1,2 +1,3 @@
---
-- include_tasks: autogen.yml
+- name: Generated tests
+ ansible.builtin.include_tasks: autogen.yml
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_tcp_proxy/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_tcp_proxy/tasks/autogen.yml
index 08a3ab467..82e3e5513 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_tcp_proxy/tasks/autogen.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_tcp_proxy/tasks/autogen.yml
@@ -13,16 +13,16 @@
#
# ----------------------------------------------------------------------------
# Pre-test setup
-- name: create a instance group
+- name: Create a instance group
google.cloud.gcp_compute_instance_group:
name: instancegroup-targettcpproxy
zone: us-central1-a
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: instancegroup
-- name: create a health check
+- name: Create a health check
google.cloud.gcp_compute_health_check:
name: healthcheck-targettcpproxy
type: TCP
@@ -35,137 +35,137 @@
unhealthy_threshold: 5
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: healthcheck
-- name: create a backend service
+- name: Create a backend service
google.cloud.gcp_compute_backend_service:
name: backendservice-targettcpproxy
backends:
- - group: "{{ instancegroup.selfLink }}"
+ - group: "{{ instancegroup.selfLink }}"
health_checks:
- - "{{ healthcheck.selfLink }}"
+ - "{{ healthcheck.selfLink }}"
protocol: TCP
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: backendservice
-- name: delete a target TCP proxy
+- name: Delete a target TCP proxy
google.cloud.gcp_compute_target_tcp_proxy:
name: "{{ resource_name }}"
proxy_header: PROXY_V1
service: "{{ backendservice }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
#----------------------------------------------------------
-- name: create a target TCP proxy
+- name: Create a target TCP proxy
google.cloud.gcp_compute_target_tcp_proxy:
name: "{{ resource_name }}"
proxy_header: PROXY_V1
service: "{{ backendservice }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that target_tcp_proxy was created
+- name: Verify that target_tcp_proxy was created
google.cloud.gcp_compute_target_tcp_proxy_info:
- filters:
- - name = {{ resource_name }}
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/compute
+ filters:
+ - name = {{ resource_name }}
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | length == 1
# ----------------------------------------------------------------------------
-- name: create a target TCP proxy that already exists
+- name: Create a target TCP proxy that already exists
google.cloud.gcp_compute_target_tcp_proxy:
name: "{{ resource_name }}"
proxy_header: PROXY_V1
service: "{{ backendservice }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#----------------------------------------------------------
-- name: delete a target TCP proxy
+- name: Delete a target TCP proxy
google.cloud.gcp_compute_target_tcp_proxy:
name: "{{ resource_name }}"
proxy_header: PROXY_V1
service: "{{ backendservice }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that target_tcp_proxy was deleted
+- name: Verify that target_tcp_proxy was deleted
google.cloud.gcp_compute_target_tcp_proxy_info:
- filters:
- - name = {{ resource_name }}
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/compute
+ filters:
+ - name = {{ resource_name }}
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | length == 0
# ----------------------------------------------------------------------------
-- name: delete a target TCP proxy that does not exist
+- name: Delete a target TCP proxy that does not exist
google.cloud.gcp_compute_target_tcp_proxy:
name: "{{ resource_name }}"
proxy_header: PROXY_V1
service: "{{ backendservice }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#---------------------------------------------------------
# Post-test teardown
# If errors happen, don't crash the playbook!
-- name: delete a backend service
+- name: Delete a backend service
google.cloud.gcp_compute_backend_service:
name: backendservice-targettcpproxy
backends:
- - group: "{{ instancegroup.selfLink }}"
+ - group: "{{ instancegroup.selfLink }}"
health_checks:
- - "{{ healthcheck.selfLink }}"
+ - "{{ healthcheck.selfLink }}"
protocol: TCP
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: backendservice
ignore_errors: true
-- name: delete a health check
+- name: Delete a health check
google.cloud.gcp_compute_health_check:
name: healthcheck-targettcpproxy
type: TCP
@@ -178,17 +178,17 @@
unhealthy_threshold: 5
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: healthcheck
ignore_errors: true
-- name: delete a instance group
+- name: Delete a instance group
google.cloud.gcp_compute_instance_group:
name: instancegroup-targettcpproxy
zone: us-central1-a
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: instancegroup
ignore_errors: true
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_tcp_proxy/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_tcp_proxy/tasks/main.yml
index 45d6e4917..fe47378c2 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_tcp_proxy/tasks/main.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_tcp_proxy/tasks/main.yml
@@ -1,2 +1,3 @@
---
-- include_tasks: autogen.yml
+- name: Generated tests
+ ansible.builtin.include_tasks: autogen.yml
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_vpn_gateway/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_vpn_gateway/tasks/autogen.yml
index 818f885bc..a14a14937 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_vpn_gateway/tasks/autogen.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_vpn_gateway/tasks/autogen.yml
@@ -13,143 +13,143 @@
#
# ----------------------------------------------------------------------------
# Pre-test setup
-- name: create a address
+- name: Create a address
google.cloud.gcp_compute_address:
name: address-vpngateway
region: us-west1
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: address
-- name: create a network
+- name: Create a network
google.cloud.gcp_compute_network:
name: network-vpngateway
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
auto_create_subnetworks: true
state: present
register: network
-- name: delete a target vpn gateway
+- name: Delete a target vpn gateway
google.cloud.gcp_compute_target_vpn_gateway:
name: "{{ resource_name }}"
region: us-west1
network: "{{ network }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
#----------------------------------------------------------
-- name: create a target vpn gateway
+- name: Create a target vpn gateway
google.cloud.gcp_compute_target_vpn_gateway:
name: "{{ resource_name }}"
region: us-west1
network: "{{ network }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that target_vpn_gateway was created
+- name: Verify that target_vpn_gateway was created
google.cloud.gcp_compute_target_vpn_gateway_info:
- filters:
- - name = {{ resource_name }}
- region: us-west1
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/compute
+ filters:
+ - name = {{ resource_name }}
+ region: us-west1
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | length == 1
# ----------------------------------------------------------------------------
-- name: create a target vpn gateway that already exists
+- name: Create a target vpn gateway that already exists
google.cloud.gcp_compute_target_vpn_gateway:
name: "{{ resource_name }}"
region: us-west1
network: "{{ network }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#----------------------------------------------------------
-- name: delete a target vpn gateway
+- name: Delete a target vpn gateway
google.cloud.gcp_compute_target_vpn_gateway:
name: "{{ resource_name }}"
region: us-west1
network: "{{ network }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that target_vpn_gateway was deleted
+- name: Verify that target_vpn_gateway was deleted
google.cloud.gcp_compute_target_vpn_gateway_info:
- filters:
- - name = {{ resource_name }}
- region: us-west1
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/compute
+ filters:
+ - name = {{ resource_name }}
+ region: us-west1
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | length == 0
# ----------------------------------------------------------------------------
-- name: delete a target vpn gateway that does not exist
+- name: Delete a target vpn gateway that does not exist
google.cloud.gcp_compute_target_vpn_gateway:
name: "{{ resource_name }}"
region: us-west1
network: "{{ network }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#---------------------------------------------------------
# Post-test teardown
# If errors happen, don't crash the playbook!
-- name: delete a network
+- name: Delete a network
google.cloud.gcp_compute_network:
name: network-vpngateway
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
auto_create_subnetworks: true
state: absent
register: network
ignore_errors: true
-- name: delete a address
+- name: Delete a address
google.cloud.gcp_compute_address:
name: address-vpngateway
region: us-west1
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: address
ignore_errors: true
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_vpn_gateway/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_vpn_gateway/tasks/main.yml
index 45d6e4917..fe47378c2 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_vpn_gateway/tasks/main.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_target_vpn_gateway/tasks/main.yml
@@ -1,2 +1,3 @@
---
-- include_tasks: autogen.yml
+- name: Generated tests
+ ansible.builtin.include_tasks: autogen.yml
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_url_map/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_url_map/tasks/autogen.yml
index 8993b9e18..ead14fef0 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_url_map/tasks/autogen.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_url_map/tasks/autogen.yml
@@ -13,16 +13,16 @@
#
# ----------------------------------------------------------------------------
# Pre-test setup
-- name: create a instance group
+- name: Create a instance group
google.cloud.gcp_compute_instance_group:
name: instancegroup-urlmap
zone: us-central1-a
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: instancegroup
-- name: create a HTTP health check
+- name: Create a HTTP health check
google.cloud.gcp_compute_http_health_check:
name: httphealthcheck-urlmap
healthy_threshold: 10
@@ -31,132 +31,132 @@
unhealthy_threshold: 5
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: healthcheck
-- name: create a backend service
+- name: Create a backend service
google.cloud.gcp_compute_backend_service:
name: backendservice-urlmap
backends:
- - group: "{{ instancegroup.selfLink }}"
+ - group: "{{ instancegroup.selfLink }}"
health_checks:
- - "{{ healthcheck.selfLink }}"
- enable_cdn: 'true'
+ - "{{ healthcheck.selfLink }}"
+ enable_cdn: "true"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: backendservice
-- name: delete a URL map
+- name: Delete a URL map
google.cloud.gcp_compute_url_map:
name: "{{ resource_name }}"
default_service: "{{ backendservice }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
#----------------------------------------------------------
-- name: create a URL map
+- name: Create a URL map
google.cloud.gcp_compute_url_map:
name: "{{ resource_name }}"
default_service: "{{ backendservice }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that url_map was created
+- name: Verify that url_map was created
google.cloud.gcp_compute_url_map_info:
- filters:
- - name = {{ resource_name }}
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/compute
+ filters:
+ - name = {{ resource_name }}
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | length == 1
# ----------------------------------------------------------------------------
-- name: create a URL map that already exists
+- name: Create a URL map that already exists
google.cloud.gcp_compute_url_map:
name: "{{ resource_name }}"
default_service: "{{ backendservice }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#----------------------------------------------------------
-- name: delete a URL map
+- name: Delete a URL map
google.cloud.gcp_compute_url_map:
name: "{{ resource_name }}"
default_service: "{{ backendservice }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that url_map was deleted
+- name: Verify that url_map was deleted
google.cloud.gcp_compute_url_map_info:
- filters:
- - name = {{ resource_name }}
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/compute
+ filters:
+ - name = {{ resource_name }}
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | length == 0
# ----------------------------------------------------------------------------
-- name: delete a URL map that does not exist
+- name: Delete a URL map that does not exist
google.cloud.gcp_compute_url_map:
name: "{{ resource_name }}"
default_service: "{{ backendservice }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#---------------------------------------------------------
# Post-test teardown
# If errors happen, don't crash the playbook!
-- name: delete a backend service
+- name: Delete a backend service
google.cloud.gcp_compute_backend_service:
name: backendservice-urlmap
backends:
- - group: "{{ instancegroup.selfLink }}"
+ - group: "{{ instancegroup.selfLink }}"
health_checks:
- - "{{ healthcheck.selfLink }}"
- enable_cdn: 'true'
+ - "{{ healthcheck.selfLink }}"
+ enable_cdn: "true"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: backendservice
ignore_errors: true
-- name: delete a HTTP health check
+- name: Delete a HTTP health check
google.cloud.gcp_compute_http_health_check:
name: httphealthcheck-urlmap
healthy_threshold: 10
@@ -165,17 +165,17 @@
unhealthy_threshold: 5
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: healthcheck
ignore_errors: true
-- name: delete a instance group
+- name: Delete a instance group
google.cloud.gcp_compute_instance_group:
name: instancegroup-urlmap
zone: us-central1-a
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: instancegroup
ignore_errors: true
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_url_map/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_url_map/tasks/main.yml
index 45d6e4917..fe47378c2 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_url_map/tasks/main.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_url_map/tasks/main.yml
@@ -1,2 +1,3 @@
---
-- include_tasks: autogen.yml
+- name: Generated tests
+ ansible.builtin.include_tasks: autogen.yml
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_vpn_tunnel/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_vpn_tunnel/tasks/autogen.yml
index 21c4c6933..79d4e0550 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_vpn_tunnel/tasks/autogen.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_vpn_tunnel/tasks/autogen.yml
@@ -13,34 +13,34 @@
#
# ----------------------------------------------------------------------------
# Pre-test setup
-- name: create a address
+- name: Create a address
google.cloud.gcp_compute_address:
name: address
region: us-central1
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: address
-- name: create a forward address
+- name: Create a forward address
google.cloud.gcp_compute_address:
name: address-forwardingrule
region: us-central1
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: address_forwardingrule
-- name: create a network
+- name: Create a network
google.cloud.gcp_compute_network:
name: network-vpn-tunnel
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
auto_create_subnetworks: true
state: present
register: network
-- name: create a disk
+- name: Create a disk
google.cloud.gcp_compute_disk:
name: "{{ resource_prefix }}"
size_gb: 50
@@ -48,39 +48,39 @@
zone: us-central1-a
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: disk
-- name: create a instance
+- name: Create a instance
google.cloud.gcp_compute_instance:
name: "{{ resource_name }}"
machine_type: n1-standard-1
disks:
- - auto_delete: 'true'
- boot: 'true'
- source: "{{ disk }}"
- - auto_delete: 'true'
- interface: NVME
- type: SCRATCH
- initialize_params:
- disk_type: local-ssd
+ - auto_delete: "true"
+ boot: "true"
+ source: "{{ disk }}"
+ - auto_delete: "true"
+ interface: NVME
+ type: SCRATCH
+ initialize_params:
+ disk_type: local-ssd
metadata:
- cost-center: '12345'
+ cost-center: "12345"
labels:
environment: production
network_interfaces:
- - network: "{{ network }}"
- access_configs:
- - name: External NAT
- nat_ip: "{{ address }}"
- type: ONE_TO_ONE_NAT
+ - network: "{{ network }}"
+ access_configs:
+ - name: External NAT
+ nat_ip: "{{ address }}"
+ type: ONE_TO_ONE_NAT
zone: us-central1-a
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: create a router
+- name: Create a router
google.cloud.gcp_compute_router:
name: router-vpn-tunnel
network: "{{ network }}"
@@ -88,27 +88,27 @@
asn: 64514
advertise_mode: CUSTOM
advertised_groups:
- - ALL_SUBNETS
+ - ALL_SUBNETS
advertised_ip_ranges:
- - range: 1.2.3.4
- - range: 6.7.0.0/16
+ - range: 1.2.3.4
+ - range: 6.7.0.0/16
region: us-central1
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: router
-- name: create a target vpn gateway
+- name: Create a target vpn gateway
google.cloud.gcp_compute_target_vpn_gateway:
name: gateway-vpn-tunnel
region: us-central1
network: "{{ network }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: gateway
-- name: create a forwarding rule
+- name: Create a forwarding rule
google.cloud.gcp_compute_forwarding_rule:
name: "{{ resource_name }}"
region: us-central1
@@ -117,10 +117,10 @@
ip_address: "{{ address_forwardingrule.address }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: create a UDP-500 forwarding rule
+- name: Create a UDP-500 forwarding rule
google.cloud.gcp_compute_forwarding_rule:
name: "{{ resource_name }}-udp"
region: us-central1
@@ -130,10 +130,10 @@
ip_address: "{{ address_forwardingrule.address }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: create a UDP-4500 forwarding rule
+- name: Create a UDP-4500 forwarding rule
google.cloud.gcp_compute_forwarding_rule:
name: "{{ resource_name }}-udp-4500"
region: us-central1
@@ -143,10 +143,10 @@
ip_address: "{{ address_forwardingrule.address }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: delete a vpn tunnel
+- name: Delete a vpn tunnel
google.cloud.gcp_compute_vpn_tunnel:
name: "{{ resource_name }}"
region: us-central1
@@ -155,11 +155,11 @@
shared_secret: super secret
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- peer_ip: "{{address.address}}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ peer_ip: "{{ address.address }}"
state: absent
#----------------------------------------------------------
-- name: create a vpn tunnel
+- name: Create a vpn tunnel
google.cloud.gcp_compute_vpn_tunnel:
name: "{{ resource_name }}"
region: us-central1
@@ -168,101 +168,101 @@
shared_secret: super secret
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- peer_ip: "{{address.address}}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ peer_ip: "{{ address.address }}"
state: present
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that vpn_tunnel was created
+- name: Verify that vpn_tunnel was created
google.cloud.gcp_compute_vpn_tunnel_info:
- filters:
- - name = {{ resource_name }}
- region: us-central1
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/compute
+ filters:
+ - name = {{ resource_name }}
+ region: us-central1
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | length == 1
# ----------------------------------------------------------------------------
-- name: create a vpn tunnel that already exists
+- name: Create a vpn tunnel that already exists
google.cloud.gcp_compute_vpn_tunnel:
name: "{{ resource_name }}"
region: us-central1
target_vpn_gateway: "{{ gateway }}"
router: "{{ router }}"
- peer_ip: "{{address.address}}"
+ peer_ip: "{{ address.address }}"
shared_secret: super secret
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#----------------------------------------------------------
-- name: delete a vpn tunnel
+- name: Delete a vpn tunnel
google.cloud.gcp_compute_vpn_tunnel:
name: "{{ resource_name }}"
region: us-central1
target_vpn_gateway: "{{ gateway }}"
router: "{{ router }}"
- peer_ip: "{{address.address}}"
+ peer_ip: "{{ address.address }}"
shared_secret: super secret
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that vpn_tunnel was deleted
+- name: Verify that vpn_tunnel was deleted
google.cloud.gcp_compute_vpn_tunnel_info:
- filters:
- - name = {{ resource_name }}
- region: us-central1
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/compute
+ filters:
+ - name = {{ resource_name }}
+ region: us-central1
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | length == 0
# ----------------------------------------------------------------------------
-- name: delete a vpn tunnel that does not exist
+- name: Delete a vpn tunnel that does not exist
google.cloud.gcp_compute_vpn_tunnel:
name: "{{ resource_name }}"
region: us-central1
target_vpn_gateway: "{{ gateway }}"
router: "{{ router }}"
- peer_ip: "{{address.address}}"
+ peer_ip: "{{ address.address }}"
shared_secret: super secret
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#---------------------------------------------------------
# Post-test teardown
-- name: delete a UDP-4500 forwarding rule
+- name: Delete a UDP-4500 forwarding rule
google.cloud.gcp_compute_forwarding_rule:
name: "{{ resource_name }}-udp-4500"
region: us-central1
@@ -272,11 +272,11 @@
ip_address: "{{ address.address }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
ignore_errors: true
register: result
-- name: delete a UDP forwarding rule
+- name: Delete a UDP forwarding rule
google.cloud.gcp_compute_forwarding_rule:
name: "{{ resource_name }}-udp"
region: us-central1
@@ -286,36 +286,36 @@
ip_address: "{{ address.address }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
ignore_errors: true
register: result
-- name: delete a forwarding rule
+- name: Delete a forwarding rule
google.cloud.gcp_compute_forwarding_rule:
name: "{{ resource_name }}"
region: us-central1
target: "{{ gateway.selfLink }}"
ip_protocol: ESP
- ip_address: "104.197.5.203"
+ ip_address: 104.197.5.203
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
ignore_errors: true
register: result
# If errors happen, don't crash the playbook!
-- name: delete a target vpn gateway
+- name: Delete a target vpn gateway
google.cloud.gcp_compute_target_vpn_gateway:
name: gateway-vpn-tunnel
region: us-central1
network: "{{ network }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: gateway
ignore_errors: true
-- name: delete a router
+- name: Delete a router
google.cloud.gcp_compute_router:
name: router-vpn-tunnel
network: "{{ network }}"
@@ -323,46 +323,46 @@
asn: 64514
advertise_mode: CUSTOM
advertised_groups:
- - ALL_SUBNETS
+ - ALL_SUBNETS
advertised_ip_ranges:
- - range: 1.2.3.4
- - range: 6.7.0.0/16
+ - range: 1.2.3.4
+ - range: 6.7.0.0/16
region: us-central1
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: router
ignore_errors: true
-- name: delete a instance
+- name: Delete a instance
google.cloud.gcp_compute_instance:
name: "{{ resource_name }}"
machine_type: n1-standard-1
disks:
- - auto_delete: 'true'
- boot: 'true'
- source: "{{ disk }}"
- - auto_delete: 'true'
- interface: NVME
- type: SCRATCH
- initialize_params:
- disk_type: local-ssd
+ - auto_delete: "true"
+ boot: "true"
+ source: "{{ disk }}"
+ - auto_delete: "true"
+ interface: NVME
+ type: SCRATCH
+ initialize_params:
+ disk_type: local-ssd
metadata:
- cost-center: '12345'
+ cost-center: "12345"
labels:
environment: production
network_interfaces:
- - network: "{{ network }}"
- access_configs:
- - name: External NAT
- nat_ip: "{{ address }}"
- type: ONE_TO_ONE_NAT
+ - network: "{{ network }}"
+ access_configs:
+ - name: External NAT
+ nat_ip: "{{ address }}"
+ type: ONE_TO_ONE_NAT
zone: us-central1-a
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
-- name: delete a disk
+- name: Delete a disk
google.cloud.gcp_compute_disk:
name: "{{ resource_prefix }}"
size_gb: 50
@@ -370,27 +370,27 @@
zone: us-central1-a
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: disk
ignore_errors: true
-- name: delete a network
+- name: Delete a network
google.cloud.gcp_compute_network:
name: network-vpn-tunnel
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
auto_create_subnetworks: true
state: absent
register: network
ignore_errors: true
-- name: delete a address
+- name: Delete a address
google.cloud.gcp_compute_address:
name: address
region: us-central1
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: address
- ignore_errors: true \ No newline at end of file
+ ignore_errors: true
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_vpn_tunnel/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_vpn_tunnel/tasks/main.yml
index 45d6e4917..fe47378c2 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_vpn_tunnel/tasks/main.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_compute_vpn_tunnel/tasks/main.yml
@@ -1,2 +1,3 @@
---
-- include_tasks: autogen.yml
+- name: Generated tests
+ ansible.builtin.include_tasks: autogen.yml
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_container_cluster/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_container_cluster/tasks/autogen.yml
index b8dedbe86..4a845eac0 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_container_cluster/tasks/autogen.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_container_cluster/tasks/autogen.yml
@@ -13,7 +13,7 @@
#
# ----------------------------------------------------------------------------
# Pre-test setup
-- name: delete a cluster
+- name: Delete a cluster
google.cloud.gcp_container_cluster:
name: my-cluster
initial_node_count: 2
@@ -22,11 +22,11 @@
disk_size_gb: 500
location: us-central1-a
project: "{{ gcp_project }}"
- auth_kind: "serviceaccount"
- service_account_file: "{{ gcp_cred_file }}"
+ auth_kind: serviceaccount
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
#----------------------------------------------------------
-- name: create a cluster
+- name: Create a cluster
google.cloud.gcp_container_cluster:
name: my-cluster
initial_node_count: 2
@@ -35,29 +35,29 @@
disk_size_gb: 500
location: us-central1-a
project: "{{ gcp_project }}"
- auth_kind: "serviceaccount"
- service_account_file: "{{ gcp_cred_file }}"
+ auth_kind: serviceaccount
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that cluster was created
+- name: Verify that cluster was created
google.cloud.gcp_container_cluster_info:
- location: us-central1-a
- project: "{{ gcp_project }}"
- auth_kind: "serviceaccount"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/cloud-platform
+ location: us-central1-a
+ project: "{{ gcp_project }}"
+ auth_kind: serviceaccount
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/cloud-platform
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- "'my-cluster' in \"{{ results['resources'] | map(attribute='name') | list }}\""
# ----------------------------------------------------------------------------
-- name: create a cluster that already exists
+- name: Create a cluster that already exists
google.cloud.gcp_container_cluster:
name: my-cluster
initial_node_count: 2
@@ -66,16 +66,16 @@
disk_size_gb: 500
location: us-central1-a
project: "{{ gcp_project }}"
- auth_kind: "serviceaccount"
- service_account_file: "{{ gcp_cred_file }}"
+ auth_kind: serviceaccount
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#----------------------------------------------------------
-- name: delete a cluster
+- name: Delete a cluster
google.cloud.gcp_container_cluster:
name: my-cluster
initial_node_count: 2
@@ -84,29 +84,29 @@
disk_size_gb: 500
location: us-central1-a
project: "{{ gcp_project }}"
- auth_kind: "serviceaccount"
- service_account_file: "{{ gcp_cred_file }}"
+ auth_kind: serviceaccount
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that cluster was deleted
+- name: Verify that cluster was deleted
google.cloud.gcp_container_cluster_info:
- location: us-central1-a
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/cloud-platform
+ location: us-central1-a
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/cloud-platform
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- "'my-cluster' not in \"{{ results['resources'] | map(attribute='name') | list }}\""
# ----------------------------------------------------------------------------
-- name: delete a cluster that does not exist
+- name: Delete a cluster that does not exist
google.cloud.gcp_container_cluster:
name: my-cluster
initial_node_count: 2
@@ -115,11 +115,11 @@
disk_size_gb: 500
location: us-central1-a
project: "{{ gcp_project }}"
- auth_kind: "serviceaccount"
- service_account_file: "{{ gcp_cred_file }}"
+ auth_kind: serviceaccount
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_container_cluster/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_container_cluster/tasks/main.yml
index 45d6e4917..fe47378c2 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_container_cluster/tasks/main.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_container_cluster/tasks/main.yml
@@ -1,2 +1,3 @@
---
-- include_tasks: autogen.yml
+- name: Generated tests
+ ansible.builtin.include_tasks: autogen.yml
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_container_node_pool/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_container_node_pool/tasks/autogen.yml
index e45251570..ae04f3049 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_container_node_pool/tasks/autogen.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_container_node_pool/tasks/autogen.yml
@@ -13,17 +13,17 @@
#
# ----------------------------------------------------------------------------
# Pre-test setup
-- name: create a cluster
+- name: Create a cluster
google.cloud.gcp_container_cluster:
name: cluster-nodepool
initial_node_count: 4
location: us-central1-a
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: cluster
-- name: delete a node pool
+- name: Delete a node pool
google.cloud.gcp_container_node_pool:
name: my-pool
initial_node_count: 4
@@ -31,10 +31,10 @@
location: us-central1-a
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
#----------------------------------------------------------
-- name: create a node pool
+- name: Create a node pool
google.cloud.gcp_container_node_pool:
name: my-pool
initial_node_count: 4
@@ -42,29 +42,29 @@
location: us-central1-a
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that node_pool was created
+- name: Verify that node_pool was created
google.cloud.gcp_container_node_pool_info:
- cluster: "{{ cluster }}"
- location: us-central1-a
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/cloud-platform
+ cluster: "{{ cluster }}"
+ location: us-central1-a
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/cloud-platform
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- "'my-pool' in \"{{ results['resources'] | map(attribute='name') | list }}\""
# ----------------------------------------------------------------------------
-- name: create a node pool that already exists
+- name: Create a node pool that already exists
google.cloud.gcp_container_node_pool:
name: my-pool
initial_node_count: 4
@@ -72,15 +72,15 @@
location: us-central1-a
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#----------------------------------------------------------
-- name: delete a node pool
+- name: Delete a node pool
google.cloud.gcp_container_node_pool:
name: my-pool
initial_node_count: 4
@@ -88,29 +88,29 @@
location: us-central1-a
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that node_pool was deleted
+- name: Verify that node_pool was deleted
google.cloud.gcp_container_node_pool_info:
- cluster: "{{ cluster }}"
- location: us-central1-a
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/cloud-platform
+ cluster: "{{ cluster }}"
+ location: us-central1-a
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/cloud-platform
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- "'my-pool' not in \"{{ results['resources'] | map(attribute='name') | list }}\""
# ----------------------------------------------------------------------------
-- name: delete a node pool that does not exist
+- name: Delete a node pool that does not exist
google.cloud.gcp_container_node_pool:
name: my-pool
initial_node_count: 4
@@ -118,24 +118,24 @@
location: us-central1-a
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#---------------------------------------------------------
# Post-test teardown
# If errors happen, don't crash the playbook!
-- name: delete a cluster
+- name: Delete a cluster
google.cloud.gcp_container_cluster:
name: cluster-nodepool
initial_node_count: 4
location: us-central1-a
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: cluster
ignore_errors: true
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_container_node_pool/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_container_node_pool/tasks/main.yml
index 45d6e4917..fe47378c2 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_container_node_pool/tasks/main.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_container_node_pool/tasks/main.yml
@@ -1,2 +1,3 @@
---
-- include_tasks: autogen.yml
+- name: Generated tests
+ ansible.builtin.include_tasks: autogen.yml
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_dns_managed_zone/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_dns_managed_zone/tasks/autogen.yml
index 9c73f7714..2e7b2bfbe 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_dns_managed_zone/tasks/autogen.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_dns_managed_zone/tasks/autogen.yml
@@ -13,98 +13,98 @@
#
# ----------------------------------------------------------------------------
# Pre-test setup
-- name: delete a managed zone
+- name: Delete a managed zone
google.cloud.gcp_dns_managed_zone:
name: "{{ resource_name }}"
dns_name: test.somewild2.example.com.
description: test zone
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
#----------------------------------------------------------
-- name: create a managed zone
+- name: Create a managed zone
google.cloud.gcp_dns_managed_zone:
name: "{{ resource_name }}"
dns_name: test.somewild2.example.com.
description: test zone
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that managed_zone was created
+- name: Verify that managed_zone was created
google.cloud.gcp_dns_managed_zone_info:
- dns_name: test.somewild2.example.com.
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/ndev.clouddns.readwrite
+ dns_name: test.somewild2.example.com.
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/ndev.clouddns.readwrite
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | length == 1
# ----------------------------------------------------------------------------
-- name: create a managed zone that already exists
+- name: Create a managed zone that already exists
google.cloud.gcp_dns_managed_zone:
name: "{{ resource_name }}"
dns_name: test.somewild2.example.com.
description: test zone
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#----------------------------------------------------------
-- name: delete a managed zone
+- name: Delete a managed zone
google.cloud.gcp_dns_managed_zone:
name: "{{ resource_name }}"
dns_name: test.somewild2.example.com.
description: test zone
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that managed_zone was deleted
+- name: Verify that managed_zone was deleted
google.cloud.gcp_dns_managed_zone_info:
- dns_name: test.somewild2.example.com.
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/ndev.clouddns.readwrite
+ dns_name: test.somewild2.example.com.
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/ndev.clouddns.readwrite
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | length == 0
# ----------------------------------------------------------------------------
-- name: delete a managed zone that does not exist
+- name: Delete a managed zone that does not exist
google.cloud.gcp_dns_managed_zone:
name: "{{ resource_name }}"
dns_name: test.somewild2.example.com.
description: test zone
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_dns_managed_zone/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_dns_managed_zone/tasks/main.yml
index 45d6e4917..fe47378c2 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_dns_managed_zone/tasks/main.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_dns_managed_zone/tasks/main.yml
@@ -1,2 +1,3 @@
---
-- include_tasks: autogen.yml
+- name: Generated tests
+ ansible.builtin.include_tasks: autogen.yml
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_dns_resource_record_set/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_dns_resource_record_set/tasks/autogen.yml
index a2b4d340e..67fe3e328 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_dns_resource_record_set/tasks/autogen.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_dns_resource_record_set/tasks/autogen.yml
@@ -13,142 +13,142 @@
#
# ----------------------------------------------------------------------------
# Pre-test setup
-- name: create a managed zone
+- name: Create a managed zone
google.cloud.gcp_dns_managed_zone:
name: managedzone-rrs
dns_name: testzone-4.com.
description: test zone
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: managed_zone
-- name: delete a resource record set
+- name: Delete a resource record set
google.cloud.gcp_dns_resource_record_set:
name: www.testzone-4.com.
managed_zone: "{{ managed_zone }}"
type: A
ttl: 600
target:
- - 10.1.2.3
- - 40.5.6.7
+ - 10.1.2.3
+ - 40.5.6.7
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
#----------------------------------------------------------
-- name: create a resource record set
+- name: Create a resource record set
google.cloud.gcp_dns_resource_record_set:
name: www.testzone-4.com.
managed_zone: "{{ managed_zone }}"
type: A
ttl: 600
target:
- - 10.1.2.3
- - 40.5.6.7
+ - 10.1.2.3
+ - 40.5.6.7
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that resource_record_set was created
+- name: Verify that resource_record_set was created
google.cloud.gcp_dns_resource_record_set_info:
- managed_zone: "{{ managed_zone }}"
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/ndev.clouddns.readwrite
+ managed_zone: "{{ managed_zone }}"
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/ndev.clouddns.readwrite
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- "'www.testzone-4.com.'in \"{{ results['resources'] | map(attribute='name') | list }}\""
# ----------------------------------------------------------------------------
-- name: create a resource record set that already exists
+- name: Create a resource record set that already exists
google.cloud.gcp_dns_resource_record_set:
name: www.testzone-4.com.
managed_zone: "{{ managed_zone }}"
type: A
ttl: 600
target:
- - 10.1.2.3
- - 40.5.6.7
+ - 10.1.2.3
+ - 40.5.6.7
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#----------------------------------------------------------
-- name: delete a resource record set
+- name: Delete a resource record set
google.cloud.gcp_dns_resource_record_set:
name: www.testzone-4.com.
managed_zone: "{{ managed_zone }}"
type: A
ttl: 600
target:
- - 10.1.2.3
- - 40.5.6.7
+ - 10.1.2.3
+ - 40.5.6.7
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that resource_record_set was deleted
+- name: Verify that resource_record_set was deleted
google.cloud.gcp_dns_resource_record_set_info:
- managed_zone: "{{ managed_zone }}"
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/ndev.clouddns.readwrite
+ managed_zone: "{{ managed_zone }}"
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/ndev.clouddns.readwrite
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- "'www.testzone-4.com.'not in \"{{ results['resources'] | map(attribute='name') | list }}\""
# ----------------------------------------------------------------------------
-- name: delete a resource record set that does not exist
+- name: Delete a resource record set that does not exist
google.cloud.gcp_dns_resource_record_set:
name: www.testzone-4.com.
managed_zone: "{{ managed_zone }}"
type: A
ttl: 600
target:
- - 10.1.2.3
- - 40.5.6.7
+ - 10.1.2.3
+ - 40.5.6.7
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#---------------------------------------------------------
# Post-test teardown
# If errors happen, don't crash the playbook!
-- name: delete a managed zone
+- name: Delete a managed zone
google.cloud.gcp_dns_managed_zone:
name: managedzone-rrs
dns_name: testzone-4.com.
description: test zone
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: managed_zone
ignore_errors: true
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_dns_resource_record_set/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_dns_resource_record_set/tasks/main.yml
index 45d6e4917..fe47378c2 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_dns_resource_record_set/tasks/main.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_dns_resource_record_set/tasks/main.yml
@@ -1,2 +1,3 @@
---
-- include_tasks: autogen.yml
+- name: Generated tests
+ ansible.builtin.include_tasks: autogen.yml
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_filestore_instance/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_filestore_instance/tasks/autogen.yml
index 9617679b3..20a7bde7c 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_filestore_instance/tasks/autogen.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_filestore_instance/tasks/autogen.yml
@@ -13,133 +13,133 @@
#
# ----------------------------------------------------------------------------
# Pre-test setup
-- name: delete a instance
+- name: Delete a instance
google.cloud.gcp_filestore_instance:
name: "{{ resource_name }}"
zone: us-central1-b
tier: PREMIUM
file_shares:
- - capacity_gb: 2660
- name: share1
+ - capacity_gb: 2660
+ name: share1
networks:
- - network: default
- modes:
- - MODE_IPV4
+ - network: default
+ modes:
+ - MODE_IPV4
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
#----------------------------------------------------------
-- name: create a instance
+- name: Create a instance
google.cloud.gcp_filestore_instance:
name: "{{ resource_name }}"
zone: us-central1-b
tier: PREMIUM
file_shares:
- - capacity_gb: 2660
- name: share1
+ - capacity_gb: 2660
+ name: share1
networks:
- - network: default
- modes:
- - MODE_IPV4
+ - network: default
+ modes:
+ - MODE_IPV4
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that instance was created
+- name: Verify that instance was created
google.cloud.gcp_filestore_instance_info:
- zone: us-central1-b
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/cloud-platform
+ zone: us-central1-b
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/cloud-platform
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | map(attribute='name') | select("match", ".*{{ resource_name }}.*") | list | length == 1
# ----------------------------------------------------------------------------
-- name: create a instance that already exists
+- name: Create a instance that already exists
google.cloud.gcp_filestore_instance:
name: "{{ resource_name }}"
zone: us-central1-b
tier: PREMIUM
file_shares:
- - capacity_gb: 2660
- name: share1
+ - capacity_gb: 2660
+ name: share1
networks:
- - network: default
- modes:
- - MODE_IPV4
+ - network: default
+ modes:
+ - MODE_IPV4
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#----------------------------------------------------------
-- name: delete a instance
+- name: Delete a instance
google.cloud.gcp_filestore_instance:
name: "{{ resource_name }}"
zone: us-central1-b
tier: PREMIUM
file_shares:
- - capacity_gb: 2660
- name: share1
+ - capacity_gb: 2660
+ name: share1
networks:
- - network: default
- modes:
- - MODE_IPV4
+ - network: default
+ modes:
+ - MODE_IPV4
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that instance was deleted
+- name: Verify that instance was deleted
google.cloud.gcp_filestore_instance_info:
- zone: us-central1-b
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/cloud-platform
+ zone: us-central1-b
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/cloud-platform
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | map(attribute='name') | select("match", ".*{{ resource_name }}.*") | list | length == 0
# ----------------------------------------------------------------------------
-- name: delete a instance that does not exist
+- name: Delete a instance that does not exist
google.cloud.gcp_filestore_instance:
name: "{{ resource_name }}"
zone: us-central1-b
tier: PREMIUM
file_shares:
- - capacity_gb: 2660
- name: share1
+ - capacity_gb: 2660
+ name: share1
networks:
- - network: default
- modes:
- - MODE_IPV4
+ - network: default
+ modes:
+ - MODE_IPV4
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_filestore_instance/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_filestore_instance/tasks/main.yml
index 45d6e4917..fe47378c2 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_filestore_instance/tasks/main.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_filestore_instance/tasks/main.yml
@@ -1,2 +1,3 @@
---
-- include_tasks: autogen.yml
+- name: Generated tests
+ ansible.builtin.include_tasks: autogen.yml
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_iam_role/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_iam_role/tasks/autogen.yml
index b78a3dff2..d4afe3579 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_iam_role/tasks/autogen.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_iam_role/tasks/autogen.yml
@@ -13,136 +13,136 @@
#
# ----------------------------------------------------------------------------
# Pre-test setup
-- name: delete a role
+- name: Delete a role
google.cloud.gcp_iam_role:
name: "{{ resource_prefix[0:30].replace('-', '_') }}"
title: My Custom Role
description: My custom role description
included_permissions:
- - iam.roles.list
- - iam.roles.create
- - iam.roles.delete
+ - iam.roles.list
+ - iam.roles.create
+ - iam.roles.delete
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
#----------------------------------------------------------
-- name: create a role
+- name: Create a role
google.cloud.gcp_iam_role:
name: "{{ resource_prefix[0:30].replace('-', '_') }}"
title: My Custom Role
description: My custom role description
included_permissions:
- - iam.roles.list
- - iam.roles.create
- - iam.roles.delete
+ - iam.roles.list
+ - iam.roles.create
+ - iam.roles.delete
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that role was created
+- name: Verify that role was created
google.cloud.gcp_iam_role_info:
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/iam
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/iam
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | map(attribute='name') | select("match", ".*{{ resource_prefix[0:30].replace('-', '_') }}.*") | list | length == 1
# ----------------------------------------------------------------------------
-- name: create a role that already exists
+- name: Create a role that already exists
google.cloud.gcp_iam_role:
name: "{{ resource_prefix[0:30].replace('-', '_') }}"
title: My Custom Role
description: My custom role description
included_permissions:
- - iam.roles.list
- - iam.roles.create
- - iam.roles.delete
+ - iam.roles.list
+ - iam.roles.create
+ - iam.roles.delete
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
# ----------------------------------------------------------------------------
-- name: modify an IAM role that already exists
+- name: Modify an IAM role that already exists
google.cloud.gcp_iam_role:
name: "{{ resource_prefix[0:30].replace('-', '_') }}"
title: My Custom Role
description: My custom role description
included_permissions:
- - storage.buckets.get
- - storage.buckets.list
- - storage.objects.get
- - storage.objects.list
+ - storage.buckets.get
+ - storage.buckets.list
+ - storage.objects.get
+ - storage.objects.list
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
#----------------------------------------------------------
-- name: delete a role
+- name: Delete a role
google.cloud.gcp_iam_role:
name: "{{ resource_prefix[0:30].replace('-', '_') }}"
title: My Custom Role
description: My custom role description
included_permissions:
- - iam.roles.list
- - iam.roles.create
- - iam.roles.delete
+ - iam.roles.list
+ - iam.roles.create
+ - iam.roles.delete
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that role was deleted
+- name: Verify that role was deleted
google.cloud.gcp_iam_role_info:
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/iam
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/iam
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | map(attribute='name') | select("match", ".*{{ resource_prefix[0:30].replace('-', '_') }}.*") | list | length == 0
# ----------------------------------------------------------------------------
-- name: delete a role that does not exist
+- name: Delete a role that does not exist
google.cloud.gcp_iam_role:
name: "{{ resource_prefix[0:30].replace('-', '_') }}"
title: My Custom Role
description: My custom role description
included_permissions:
- - iam.roles.list
- - iam.roles.create
- - iam.roles.delete
+ - iam.roles.list
+ - iam.roles.create
+ - iam.roles.delete
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_iam_role/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_iam_role/tasks/main.yml
index 45d6e4917..fe47378c2 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_iam_role/tasks/main.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_iam_role/tasks/main.yml
@@ -1,2 +1,3 @@
---
-- include_tasks: autogen.yml
+- name: Generated tests
+ ansible.builtin.include_tasks: autogen.yml
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_iam_service_account/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_iam_service_account/tasks/autogen.yml
index 367c9d8b9..9a4106dc8 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_iam_service_account/tasks/autogen.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_iam_service_account/tasks/autogen.yml
@@ -13,91 +13,93 @@
#
# ----------------------------------------------------------------------------
# Pre-test setup
-- name: delete a service account
+- name: Delete a service account
google.cloud.gcp_iam_service_account:
name: service-{{ resource_name.split("-")[-1] }}@{{ gcp_project }}.iam.gserviceaccount.com
display_name: My Ansible test key
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
#----------------------------------------------------------
-- name: create a service account
+- name: Create a service account
google.cloud.gcp_iam_service_account:
name: service-{{ resource_name.split("-")[-1] }}@{{ gcp_project }}.iam.gserviceaccount.com
display_name: My Ansible test key
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that service_account was created
+- name: Verify that service_account was created
google.cloud.gcp_iam_service_account_info:
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/iam
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/iam
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- - results['resources'] | map(attribute='name') | select("match", ".*service-{{ resource_name.split("-")[-1] }}@{{ gcp_project }}.iam.gserviceaccount.com.*") | list | length == 1
+ - results['resources'] | map(attribute='name') | select("match", ".*service-{{ resource_name.split("-")[-1] }}@{{ gcp_project }}.iam.gserviceaccount.com.*")
+ | list | length == 1
# ----------------------------------------------------------------------------
-- name: create a service account that already exists
+- name: Create a service account that already exists
google.cloud.gcp_iam_service_account:
name: service-{{ resource_name.split("-")[-1] }}@{{ gcp_project }}.iam.gserviceaccount.com
display_name: My Ansible test key
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#----------------------------------------------------------
-- name: delete a service account
+- name: Delete a service account
google.cloud.gcp_iam_service_account:
name: service-{{ resource_name.split("-")[-1] }}@{{ gcp_project }}.iam.gserviceaccount.com
display_name: My Ansible test key
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that service_account was deleted
+- name: Verify that service_account was deleted
google.cloud.gcp_iam_service_account_info:
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/iam
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/iam
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- - results['resources'] | map(attribute='name') | select("match", ".*service-{{ resource_name.split("-")[-1] }}@{{ gcp_project }}.iam.gserviceaccount.com.*") | list | length == 0
+ - results['resources'] | map(attribute='name') | select("match", ".*service-{{ resource_name.split("-")[-1] }}@{{ gcp_project }}.iam.gserviceaccount.com.*")
+ | list | length == 0
# ----------------------------------------------------------------------------
-- name: delete a service account that does not exist
+- name: Delete a service account that does not exist
google.cloud.gcp_iam_service_account:
name: service-{{ resource_name.split("-")[-1] }}@{{ gcp_project }}.iam.gserviceaccount.com
display_name: My Ansible test key
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_iam_service_account/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_iam_service_account/tasks/main.yml
index 45d6e4917..fe47378c2 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_iam_service_account/tasks/main.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_iam_service_account/tasks/main.yml
@@ -1,2 +1,3 @@
---
-- include_tasks: autogen.yml
+- name: Generated tests
+ ansible.builtin.include_tasks: autogen.yml
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_iam_service_account_key/defaults/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_iam_service_account_key/defaults/main.yml
index aa87a2a8e..aa65c31f5 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_iam_service_account_key/defaults/main.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_iam_service_account_key/defaults/main.yml
@@ -1,3 +1,3 @@
---
# defaults file
-resource_name: '{{resource_prefix}}'
+resource_name: "{{ resource_prefix }}"
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_kms_crypto_key/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_kms_crypto_key/tasks/autogen.yml
index ef2252c86..0e270778a 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_kms_crypto_key/tasks/autogen.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_kms_crypto_key/tasks/autogen.yml
@@ -13,61 +13,61 @@
---
# Pre-test setup
-- name: create a key ring
- gcp_kms_key_ring:
+- name: Create a key ring
+ google.cloud.gcp_kms_key_ring:
name: key-key-ring
location: us-central1
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: keyring
-- name: delete a crypto key
- gcp_kms_crypto_key:
+- name: Delete a crypto key
+ google.cloud.gcp_kms_crypto_key:
name: "{{ resource_name }}"
key_ring: projects/{{ gcp_project }}/locations/us-central1/keyRings/key-key-ring
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
#----------------------------------------------------------
-- name: create a crypto key
- gcp_kms_crypto_key:
+- name: Create a crypto key
+ google.cloud.gcp_kms_crypto_key:
name: "{{ resource_name }}"
key_ring: projects/{{ gcp_project }}/locations/us-central1/keyRings/key-key-ring
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that crypto_key was created
- gcp_kms_crypto_key_info:
- key_ring: "projects/{{ gcp_project }}/locations/us-central1/keyRings/key-key-ring"
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/cloudkms
+- name: Verify that crypto_key was created
+ google.cloud.gcp_kms_crypto_key_info:
+ key_ring: projects/{{ gcp_project }}/locations/us-central1/keyRings/key-key-ring
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/cloudkms
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | map(attribute='name') | select("match", ".*{{ resource_name }}.*") | list | length == 1
# ----------------------------------------------------------------------------
-- name: create a crypto key that already exists
- gcp_kms_crypto_key:
+- name: Create a crypto key that already exists
+ google.cloud.gcp_kms_crypto_key:
name: "{{ resource_name }}"
key_ring: projects/{{ gcp_project }}/locations/us-central1/keyRings/key-key-ring
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_kms_crypto_key/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_kms_crypto_key/tasks/main.yml
index 45d6e4917..fe47378c2 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_kms_crypto_key/tasks/main.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_kms_crypto_key/tasks/main.yml
@@ -1,2 +1,3 @@
---
-- include_tasks: autogen.yml
+- name: Generated tests
+ ansible.builtin.include_tasks: autogen.yml
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_kms_key_ring/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_kms_key_ring/tasks/autogen.yml
index 34999ab1b..b0af43c17 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_kms_key_ring/tasks/autogen.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_kms_key_ring/tasks/autogen.yml
@@ -1,3 +1,4 @@
+---
# Copyright 2019 Google Inc.
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
@@ -12,52 +13,52 @@
# limitations under the License.
# Pre-test setup
-- name: delete a key ring
- gcp_kms_key_ring:
+- name: Delete a key ring
+ google.cloud.gcp_kms_key_ring:
name: "{{ resource_name }}"
location: us-central1
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
#----------------------------------------------------------
-- name: create a key ring
- gcp_kms_key_ring:
+- name: Create a key ring
+ google.cloud.gcp_kms_key_ring:
name: "{{ resource_name }}"
location: us-central1
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that key_ring was created
- gcp_kms_key_ring_info:
- location: us-central1
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/cloudkms
+- name: Verify that key_ring was created
+ google.cloud.gcp_kms_key_ring_info:
+ location: us-central1
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/cloudkms
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | map(attribute='name') | select("match", ".*{{ resource_name }}.*") | list | length == 1
# ----------------------------------------------------------------------------
-- name: create a key ring that already exists
- gcp_kms_key_ring:
+- name: Create a key ring that already exists
+ google.cloud.gcp_kms_key_ring:
name: "{{ resource_name }}"
location: us-central1
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_kms_key_ring/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_kms_key_ring/tasks/main.yml
index 45d6e4917..fe47378c2 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_kms_key_ring/tasks/main.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_kms_key_ring/tasks/main.yml
@@ -1,2 +1,3 @@
---
-- include_tasks: autogen.yml
+- name: Generated tests
+ ansible.builtin.include_tasks: autogen.yml
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_logging_metric/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_logging_metric/tasks/autogen.yml
index bc4de15cc..90a77b05c 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_logging_metric/tasks/autogen.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_logging_metric/tasks/autogen.yml
@@ -13,18 +13,18 @@
#
# ----------------------------------------------------------------------------
# Pre-test setup
-- name: delete a metric
+- name: Delete a metric
google.cloud.gcp_logging_metric:
name: "{{ resource_name }}"
filter: resource.type=gae_app AND severity>=ERROR
metric_descriptor:
metric_kind: DELTA
value_type: DISTRIBUTION
- unit: '1'
+ unit: "1"
labels:
- - key: mass
- value_type: STRING
- description: amount of matter
+ - key: mass
+ value_type: STRING
+ description: amount of matter
value_extractor: EXTRACT(jsonPayload.request)
label_extractors:
mass: EXTRACT(jsonPayload.request)
@@ -35,21 +35,21 @@
offset: 1
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
#----------------------------------------------------------
-- name: create a metric
+- name: Create a metric
google.cloud.gcp_logging_metric:
name: "{{ resource_name }}"
filter: resource.type=gae_app AND severity>=ERROR
metric_descriptor:
metric_kind: DELTA
value_type: DISTRIBUTION
- unit: '1'
+ unit: "1"
labels:
- - key: mass
- value_type: STRING
- description: amount of matter
+ - key: mass
+ value_type: STRING
+ description: amount of matter
value_extractor: EXTRACT(jsonPayload.request)
label_extractors:
mass: EXTRACT(jsonPayload.request)
@@ -60,38 +60,38 @@
offset: 1
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that metric was created
+- name: Verify that metric was created
google.cloud.gcp_logging_metric_info:
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/cloud-platform
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/cloud-platform
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | map(attribute='name') | select("match", ".*{{ resource_name }}.*") | list | length == 1
# ----------------------------------------------------------------------------
-- name: create a metric that already exists
+- name: Create a metric that already exists
google.cloud.gcp_logging_metric:
name: "{{ resource_name }}"
filter: resource.type=gae_app AND severity>=ERROR
metric_descriptor:
metric_kind: DELTA
value_type: DISTRIBUTION
- unit: '1'
+ unit: "1"
labels:
- - key: mass
- value_type: STRING
- description: amount of matter
+ - key: mass
+ value_type: STRING
+ description: amount of matter
value_extractor: EXTRACT(jsonPayload.request)
label_extractors:
mass: EXTRACT(jsonPayload.request)
@@ -102,26 +102,26 @@
offset: 1
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#----------------------------------------------------------
-- name: delete a metric
+- name: Delete a metric
google.cloud.gcp_logging_metric:
name: "{{ resource_name }}"
filter: resource.type=gae_app AND severity>=ERROR
metric_descriptor:
metric_kind: DELTA
value_type: DISTRIBUTION
- unit: '1'
+ unit: "1"
labels:
- - key: mass
- value_type: STRING
- description: amount of matter
+ - key: mass
+ value_type: STRING
+ description: amount of matter
value_extractor: EXTRACT(jsonPayload.request)
label_extractors:
mass: EXTRACT(jsonPayload.request)
@@ -132,38 +132,38 @@
offset: 1
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that metric was deleted
+- name: Verify that metric was deleted
google.cloud.gcp_logging_metric_info:
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/cloud-platform
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/cloud-platform
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | map(attribute='name') | select("match", ".*{{ resource_name }}.*") | list | length == 0
# ----------------------------------------------------------------------------
-- name: delete a metric that does not exist
+- name: Delete a metric that does not exist
google.cloud.gcp_logging_metric:
name: "{{ resource_name }}"
filter: resource.type=gae_app AND severity>=ERROR
metric_descriptor:
metric_kind: DELTA
value_type: DISTRIBUTION
- unit: '1'
+ unit: "1"
labels:
- - key: mass
- value_type: STRING
- description: amount of matter
+ - key: mass
+ value_type: STRING
+ description: amount of matter
value_extractor: EXTRACT(jsonPayload.request)
label_extractors:
mass: EXTRACT(jsonPayload.request)
@@ -174,10 +174,10 @@
offset: 1
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_logging_metric/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_logging_metric/tasks/main.yml
index 45d6e4917..fe47378c2 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_logging_metric/tasks/main.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_logging_metric/tasks/main.yml
@@ -1,2 +1,3 @@
---
-- include_tasks: autogen.yml
+- name: Generated tests
+ ansible.builtin.include_tasks: autogen.yml
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_mlengine_model/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_mlengine_model/tasks/autogen.yml
index 8b15c3ddb..619a49c1c 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_mlengine_model/tasks/autogen.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_mlengine_model/tasks/autogen.yml
@@ -13,101 +13,101 @@
#
# ----------------------------------------------------------------------------
# Pre-test setup
-- name: delete a model
+- name: Delete a model
google.cloud.gcp_mlengine_model:
name: "{{ resource_name | replace('-', '_') }}"
description: My model
regions:
- - us-central1
+ - us-central1
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
#----------------------------------------------------------
-- name: create a model
+- name: Create a model
google.cloud.gcp_mlengine_model:
name: "{{ resource_name | replace('-', '_') }}"
description: My model
regions:
- - us-central1
+ - us-central1
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that model was created
+- name: Verify that model was created
google.cloud.gcp_mlengine_model_info:
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/cloud-platform
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/cloud-platform
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | map(attribute='name') | select("match", ".*{{ resource_name | replace('-', '_') }}.*") | list | length == 1
# ----------------------------------------------------------------------------
-- name: create a model that already exists
+- name: Create a model that already exists
google.cloud.gcp_mlengine_model:
name: "{{ resource_name | replace('-', '_') }}"
description: My model
regions:
- - us-central1
+ - us-central1
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#----------------------------------------------------------
-- name: delete a model
+- name: Delete a model
google.cloud.gcp_mlengine_model:
name: "{{ resource_name | replace('-', '_') }}"
description: My model
regions:
- - us-central1
+ - us-central1
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that model was deleted
+- name: Verify that model was deleted
google.cloud.gcp_mlengine_model_info:
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/cloud-platform
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/cloud-platform
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | map(attribute='name') | select("match", ".*{{ resource_name | replace('-', '_') }}.*") | list | length == 0
# ----------------------------------------------------------------------------
-- name: delete a model that does not exist
+- name: Delete a model that does not exist
google.cloud.gcp_mlengine_model:
name: "{{ resource_name | replace('-', '_') }}"
description: My model
regions:
- - us-central1
+ - us-central1
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_mlengine_model/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_mlengine_model/tasks/main.yml
index 45d6e4917..fe47378c2 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_mlengine_model/tasks/main.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_mlengine_model/tasks/main.yml
@@ -1,2 +1,3 @@
---
-- include_tasks: autogen.yml
+- name: Generated tests
+ ansible.builtin.include_tasks: autogen.yml
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_mlengine_version/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_mlengine_version/tasks/autogen.yml
index 2a9da56fc..d68bad0bc 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_mlengine_version/tasks/autogen.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_mlengine_version/tasks/autogen.yml
@@ -13,143 +13,143 @@
#
# ----------------------------------------------------------------------------
# Pre-test setup
-- name: create a model
+- name: Create a model
google.cloud.gcp_mlengine_model:
name: model_version
description: My model
regions:
- - us-central1
- online_prediction_logging: 'true'
- online_prediction_console_logging: 'true'
+ - us-central1
+ online_prediction_logging: "true"
+ online_prediction_console_logging: "true"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: model
-- name: delete a version
+- name: Delete a version
google.cloud.gcp_mlengine_version:
name: "{{ resource_name | replace('-', '_') }}"
model: "{{ model }}"
runtime_version: 1.13
python_version: 3.5
- is_default: 'true'
+ is_default: "true"
deployment_uri: gs://ansible-cloudml-bucket/
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
#----------------------------------------------------------
-- name: create a version
+- name: Create a version
google.cloud.gcp_mlengine_version:
name: "{{ resource_name | replace('-', '_') }}"
model: "{{ model }}"
runtime_version: 1.13
python_version: 3.5
- is_default: 'true'
+ is_default: "true"
deployment_uri: gs://ansible-cloudml-bucket/
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that version was created
+- name: Verify that version was created
google.cloud.gcp_mlengine_version_info:
- model: "{{ model }}"
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/cloud-platform
+ model: "{{ model }}"
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/cloud-platform
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | map(attribute='name') | select("match", ".*{{ resource_name | replace('-', '_') }}.*") | list | length == 1
# ----------------------------------------------------------------------------
-- name: create a version that already exists
+- name: Create a version that already exists
google.cloud.gcp_mlengine_version:
name: "{{ resource_name | replace('-', '_') }}"
model: "{{ model }}"
runtime_version: 1.13
python_version: 3.5
- is_default: 'true'
+ is_default: "true"
deployment_uri: gs://ansible-cloudml-bucket/
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#----------------------------------------------------------
-- name: delete a version
+- name: Delete a version
google.cloud.gcp_mlengine_version:
name: "{{ resource_name | replace('-', '_') }}"
model: "{{ model }}"
runtime_version: 1.13
python_version: 3.5
- is_default: 'true'
+ is_default: "true"
deployment_uri: gs://ansible-cloudml-bucket/
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that version was deleted
+- name: Verify that version was deleted
google.cloud.gcp_mlengine_version_info:
- model: "{{ model }}"
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/cloud-platform
+ model: "{{ model }}"
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/cloud-platform
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | map(attribute='name') | select("match", ".*{{ resource_name | replace('-', '_') }}.*") | list | length == 0
# ----------------------------------------------------------------------------
-- name: delete a version that does not exist
+- name: Delete a version that does not exist
google.cloud.gcp_mlengine_version:
name: "{{ resource_name | replace('-', '_') }}"
model: "{{ model }}"
runtime_version: 1.13
python_version: 3.5
- is_default: 'true'
+ is_default: "true"
deployment_uri: gs://ansible-cloudml-bucket/
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#---------------------------------------------------------
# Post-test teardown
# If errors happen, don't crash the playbook!
-- name: delete a model
+- name: Delete a model
google.cloud.gcp_mlengine_model:
name: model_version
description: My model
regions:
- - us-central1
- online_prediction_logging: 'true'
- online_prediction_console_logging: 'true'
+ - us-central1
+ online_prediction_logging: "true"
+ online_prediction_console_logging: "true"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: model
ignore_errors: true
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_mlengine_version/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_mlengine_version/tasks/main.yml
index 45d6e4917..fe47378c2 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_mlengine_version/tasks/main.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_mlengine_version/tasks/main.yml
@@ -1,2 +1,3 @@
---
-- include_tasks: autogen.yml
+- name: Generated tests
+ ansible.builtin.include_tasks: autogen.yml
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_pubsub_subscription/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_pubsub_subscription/tasks/autogen.yml
index be5852074..ca78eb436 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_pubsub_subscription/tasks/autogen.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_pubsub_subscription/tasks/autogen.yml
@@ -13,116 +13,116 @@
#
# ----------------------------------------------------------------------------
# Pre-test setup
-- name: create a topic
+- name: Create a topic
google.cloud.gcp_pubsub_topic:
name: topic-subscription
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: topic
-- name: delete a subscription
+- name: Delete a subscription
google.cloud.gcp_pubsub_subscription:
name: "{{ resource_name }}"
topic: "{{ topic }}"
ack_deadline_seconds: 300
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
#----------------------------------------------------------
-- name: create a subscription
+- name: Create a subscription
google.cloud.gcp_pubsub_subscription:
name: "{{ resource_name }}"
topic: "{{ topic }}"
ack_deadline_seconds: 300
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that subscription was created
+- name: Verify that subscription was created
google.cloud.gcp_pubsub_subscription_info:
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/pubsub
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/pubsub
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- - "\"{{resource_name}}\" in \"{{ results['resources'] | map(attribute='name') | list }}\""
+ - "\"{{ resource_name }}\" in \"{{ results['resources'] | map(attribute='name') | list }}\""
# ----------------------------------------------------------------------------
-- name: create a subscription that already exists
+- name: Create a subscription that already exists
google.cloud.gcp_pubsub_subscription:
name: "{{ resource_name }}"
topic: "{{ topic }}"
ack_deadline_seconds: 300
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#----------------------------------------------------------
-- name: delete a subscription
+- name: Delete a subscription
google.cloud.gcp_pubsub_subscription:
name: "{{ resource_name }}"
topic: "{{ topic }}"
ack_deadline_seconds: 300
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that subscription was deleted
+- name: Verify that subscription was deleted
google.cloud.gcp_pubsub_subscription_info:
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/pubsub
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/pubsub
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- - "\"{{resource_name}}\" not in \"{{ results['resources'] | map(attribute='name') | list }}\""
+ - "\"{{ resource_name }}\" not in \"{{ results['resources'] | map(attribute='name') | list }}\""
# ----------------------------------------------------------------------------
-- name: delete a subscription that does not exist
+- name: Delete a subscription that does not exist
google.cloud.gcp_pubsub_subscription:
name: "{{ resource_name }}"
topic: "{{ topic }}"
ack_deadline_seconds: 300
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#---------------------------------------------------------
# Post-test teardown
# If errors happen, don't crash the playbook!
-- name: delete a topic
+- name: Delete a topic
google.cloud.gcp_pubsub_topic:
name: topic-subscription
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: topic
ignore_errors: true
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_pubsub_subscription/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_pubsub_subscription/tasks/main.yml
index 45d6e4917..fe47378c2 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_pubsub_subscription/tasks/main.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_pubsub_subscription/tasks/main.yml
@@ -1,2 +1,3 @@
---
-- include_tasks: autogen.yml
+- name: Generated tests
+ ansible.builtin.include_tasks: autogen.yml
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_pubsub_topic/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_pubsub_topic/tasks/autogen.yml
index 5d811a1e0..0c0dbdc96 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_pubsub_topic/tasks/autogen.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_pubsub_topic/tasks/autogen.yml
@@ -13,86 +13,86 @@
#
# ----------------------------------------------------------------------------
# Pre-test setup
-- name: delete a topic
+- name: Delete a topic
google.cloud.gcp_pubsub_topic:
name: test-topic1
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
#----------------------------------------------------------
-- name: create a topic
+- name: Create a topic
google.cloud.gcp_pubsub_topic:
name: test-topic1
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that topic was created
+- name: Verify that topic was created
google.cloud.gcp_pubsub_topic_info:
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/pubsub
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/pubsub
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- "'test-topic1' in \"{{ results['resources'] | map(attribute='name') | list }}\""
# ----------------------------------------------------------------------------
-- name: create a topic that already exists
+- name: Create a topic that already exists
google.cloud.gcp_pubsub_topic:
name: test-topic1
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#----------------------------------------------------------
-- name: delete a topic
+- name: Delete a topic
google.cloud.gcp_pubsub_topic:
name: test-topic1
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that topic was deleted
+- name: Verify that topic was deleted
google.cloud.gcp_pubsub_topic_info:
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/pubsub
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/pubsub
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- "'test-topic1' not in \"{{ results['resources'] | map(attribute='name') | list }}\""
# ----------------------------------------------------------------------------
-- name: delete a topic that does not exist
+- name: Delete a topic that does not exist
google.cloud.gcp_pubsub_topic:
name: test-topic1
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_pubsub_topic/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_pubsub_topic/tasks/main.yml
index 45d6e4917..fe47378c2 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_pubsub_topic/tasks/main.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_pubsub_topic/tasks/main.yml
@@ -1,2 +1,3 @@
---
-- include_tasks: autogen.yml
+- name: Generated tests
+ ansible.builtin.include_tasks: autogen.yml
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_redis_instance/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_redis_instance/tasks/autogen.yml
index 99805586c..cea48d6b8 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_redis_instance/tasks/autogen.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_redis_instance/tasks/autogen.yml
@@ -13,16 +13,16 @@
#
# ----------------------------------------------------------------------------
# Pre-test setup
-- name: create a network
+- name: Create a network
google.cloud.gcp_compute_network:
name: network-instance
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
auto_create_subnetworks: true
state: present
register: network
-- name: delete a instance
+- name: Delete a instance
google.cloud.gcp_redis_instance:
name: instance37
tier: STANDARD_HA
@@ -37,10 +37,10 @@
other_key: other_val
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
#----------------------------------------------------------
-- name: create a instance
+- name: Create a instance
google.cloud.gcp_redis_instance:
name: instance37
tier: STANDARD_HA
@@ -55,28 +55,28 @@
other_key: other_val
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that instance was created
+- name: Verify that instance was created
google.cloud.gcp_redis_instance_info:
- region: us-central1
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/cloud-platform
+ region: us-central1
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/cloud-platform
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | map(attribute='name') | select("match", ".*instance37.*") | list | length == 1
# ----------------------------------------------------------------------------
-- name: create a instance that already exists
+- name: Create a instance that already exists
google.cloud.gcp_redis_instance:
name: instance37
tier: STANDARD_HA
@@ -91,15 +91,15 @@
other_key: other_val
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#----------------------------------------------------------
-- name: delete a instance
+- name: Delete a instance
google.cloud.gcp_redis_instance:
name: instance37
tier: STANDARD_HA
@@ -114,28 +114,28 @@
other_key: other_val
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that instance was deleted
+- name: Verify that instance was deleted
google.cloud.gcp_redis_instance_info:
- region: us-central1
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/cloud-platform
+ region: us-central1
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/cloud-platform
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | map(attribute='name') | select("match", ".*instance37.*") | list | length == 0
# ----------------------------------------------------------------------------
-- name: delete a instance that does not exist
+- name: Delete a instance that does not exist
google.cloud.gcp_redis_instance:
name: instance37
tier: STANDARD_HA
@@ -150,22 +150,22 @@
other_key: other_val
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#---------------------------------------------------------
# Post-test teardown
# If errors happen, don't crash the playbook!
-- name: delete a network
+- name: Delete a network
google.cloud.gcp_compute_network:
name: network-instance
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
auto_create_subnetworks: true
state: absent
register: network
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_redis_instance/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_redis_instance/tasks/main.yml
index 45d6e4917..fe47378c2 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_redis_instance/tasks/main.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_redis_instance/tasks/main.yml
@@ -1,2 +1,3 @@
---
-- include_tasks: autogen.yml
+- name: Generated tests
+ ansible.builtin.include_tasks: autogen.yml
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_resourcemanager_project/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_resourcemanager_project/tasks/autogen.yml
index 539b3ace3..5545d0edc 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_resourcemanager_project/tasks/autogen.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_resourcemanager_project/tasks/autogen.yml
@@ -13,111 +13,113 @@
#
# ----------------------------------------------------------------------------
# Pre-test setup
-- name: delete a project
+- name: Delete a project
google.cloud.gcp_resourcemanager_project:
name: "{{ resource_prefix[0:30] }}"
id: "{{ resource_prefix[0:30] }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
parent:
type: folder
id: "{{ gcp_folder_id }}"
state: absent
#----------------------------------------------------------
-- name: create a project
+- name: Create a project
google.cloud.gcp_resourcemanager_project:
name: "{{ resource_prefix[0:30] }}"
id: "{{ resource_prefix[0:30] }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
parent:
type: folder
id: "{{ gcp_folder_id }}"
state: present
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
- name: Pause for 2 minutes for project to appear
ansible.builtin.pause:
minutes: 2
-- name: verify that project was created
+- name: Verify that project was created
google.cloud.gcp_resourcemanager_project_info:
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- # choose 1000 projects so iterate past the deleted ones.
- page_size: 1000
- scopes:
- - https://www.googleapis.com/auth/cloud-platform
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ # choose 1000 projects so iterate past the deleted ones.
+ page_size: 1000
+ scopes:
+ - https://www.googleapis.com/auth/cloud-platform
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- - results['resources'] | selectattr("lifecycleState", "equalto", "ACTIVE") | map(attribute='name') | select("match", ".*{{ resource_prefix[0:30] }}.*") | list | length == 1
+ - results['resources'] | selectattr("lifecycleState", "equalto", "ACTIVE") | map(attribute='name') | select("match", ".*{{ resource_prefix[0:30] }}.*") | list
+ | length == 1
# ----------------------------------------------------------------------------
-- name: create a project that already exists
+- name: Create a project that already exists
google.cloud.gcp_resourcemanager_project:
name: "{{ resource_prefix[0:30] }}"
id: "{{ resource_prefix[0:30] }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
parent:
type: folder
id: "{{ gcp_folder_id }}"
state: present
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#----------------------------------------------------------
-- name: delete a project
+- name: Delete a project
google.cloud.gcp_resourcemanager_project:
name: "{{ resource_prefix[0:30] }}"
id: "{{ resource_prefix[0:30] }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
parent:
type: folder
id: "{{ gcp_folder_id }}"
state: absent
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
- name: Pause for 2 minutes for project to appear
ansible.builtin.pause:
minutes: 2
-- name: verify that project was deleted
+- name: Verify that project was deleted
google.cloud.gcp_resourcemanager_project_info:
- project: "{{ resource_prefix[0:30] }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- # choose 1000 projects so iterate past the deleted ones.
- page_size: 1000
- scopes:
- - https://www.googleapis.com/auth/cloud-platform
+ project: "{{ resource_prefix[0:30] }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ # choose 1000 projects so iterate past the deleted ones.
+ page_size: 1000
+ scopes:
+ - https://www.googleapis.com/auth/cloud-platform
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- - results['resources'] | selectattr("lifecycleState", "equalto", "DELETE_REQUESTED") | map(attribute='name') | select("match", ".*{{ resource_prefix[0:30] }}.*") | list | length == 1
+ - results['resources'] | selectattr("lifecycleState", "equalto", "DELETE_REQUESTED") | map(attribute='name') | select("match", ".*{{ resource_prefix[0:30] }}.*")
+ | list | length == 1
# ----------------------------------------------------------------------------
-- name: delete a project that does not exist
+- name: Delete a project that does not exist
google.cloud.gcp_resourcemanager_project:
name: "{{ resource_prefix[0:30] }}"
id: "{{ resource_prefix[0:30] }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
parent:
type: folder
id: "{{ gcp_folder_id }}"
state: absent
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_resourcemanager_project/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_resourcemanager_project/tasks/main.yml
index 45d6e4917..fe47378c2 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_resourcemanager_project/tasks/main.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_resourcemanager_project/tasks/main.yml
@@ -1,2 +1,3 @@
---
-- include_tasks: autogen.yml
+- name: Generated tests
+ ansible.builtin.include_tasks: autogen.yml
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_runtimeconfig_config/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_runtimeconfig_config/tasks/autogen.yml
index b14ef65bc..3eebf1be3 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_runtimeconfig_config/tasks/autogen.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_runtimeconfig_config/tasks/autogen.yml
@@ -13,91 +13,91 @@
#
# ----------------------------------------------------------------------------
# Pre-test setup
-- name: delete a config
+- name: Delete a config
google.cloud.gcp_runtimeconfig_config:
name: "{{ resource_name }}"
description: My config
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
#----------------------------------------------------------
-- name: create a config
+- name: Create a config
google.cloud.gcp_runtimeconfig_config:
name: "{{ resource_name }}"
description: My config
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that config was created
+- name: Verify that config was created
google.cloud.gcp_runtimeconfig_config_info:
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/cloudruntimeconfig
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/cloudruntimeconfig
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | map(attribute='name') | select("match", ".*{{ resource_name }}.*") | list | length == 1
# ----------------------------------------------------------------------------
-- name: create a config that already exists
+- name: Create a config that already exists
google.cloud.gcp_runtimeconfig_config:
name: "{{ resource_name }}"
description: My config
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#----------------------------------------------------------
-- name: delete a config
+- name: Delete a config
google.cloud.gcp_runtimeconfig_config:
name: "{{ resource_name }}"
description: My config
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that config was deleted
+- name: Verify that config was deleted
google.cloud.gcp_runtimeconfig_config_info:
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/cloudruntimeconfig
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/cloudruntimeconfig
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | map(attribute='name') | select("match", ".*{{ resource_name }}.*") | list | length == 0
# ----------------------------------------------------------------------------
-- name: delete a config that does not exist
+- name: Delete a config that does not exist
google.cloud.gcp_runtimeconfig_config:
name: "{{ resource_name }}"
description: My config
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_runtimeconfig_config/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_runtimeconfig_config/tasks/main.yml
index 45d6e4917..fe47378c2 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_runtimeconfig_config/tasks/main.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_runtimeconfig_config/tasks/main.yml
@@ -1,2 +1,3 @@
---
-- include_tasks: autogen.yml
+- name: Generated tests
+ ansible.builtin.include_tasks: autogen.yml
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_runtimeconfig_variable/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_runtimeconfig_variable/tasks/autogen.yml
index fcfefb37a..4a790dcee 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_runtimeconfig_variable/tasks/autogen.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_runtimeconfig_variable/tasks/autogen.yml
@@ -13,120 +13,120 @@
#
# ----------------------------------------------------------------------------
# Pre-test setup
-- name: create a config
+- name: Create a config
google.cloud.gcp_runtimeconfig_config:
name: my-config
description: My config
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: config
-- name: delete a variable
+- name: Delete a variable
google.cloud.gcp_runtimeconfig_variable:
name: prod-variables/hostname
config: my-config
text: example.com
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
#----------------------------------------------------------
-- name: create a variable
+- name: Create a variable
google.cloud.gcp_runtimeconfig_variable:
name: prod-variables/hostname
config: my-config
text: example.com
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that variable was created
+- name: Verify that variable was created
google.cloud.gcp_runtimeconfig_variable_info:
- config: my-config
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/cloudruntimeconfig
+ config: my-config
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/cloudruntimeconfig
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | map(attribute='name') | select("match", ".*prod-variables/hostname.*") | list | length == 1
# ----------------------------------------------------------------------------
-- name: create a variable that already exists
+- name: Create a variable that already exists
google.cloud.gcp_runtimeconfig_variable:
name: prod-variables/hostname
config: my-config
text: example.com
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#----------------------------------------------------------
-- name: delete a variable
+- name: Delete a variable
google.cloud.gcp_runtimeconfig_variable:
name: prod-variables/hostname
config: my-config
text: example.com
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that variable was deleted
+- name: Verify that variable was deleted
google.cloud.gcp_runtimeconfig_variable_info:
- config: my-config
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/cloudruntimeconfig
+ config: my-config
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/cloudruntimeconfig
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | map(attribute='name') | select("match", ".*prod-variables/hostname.*") | list | length == 0
# ----------------------------------------------------------------------------
-- name: delete a variable that does not exist
+- name: Delete a variable that does not exist
google.cloud.gcp_runtimeconfig_variable:
name: prod-variables/hostname
config: my-config
text: example.com
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#---------------------------------------------------------
# Post-test teardown
# If errors happen, don't crash the playbook!
-- name: delete a config
+- name: Delete a config
google.cloud.gcp_runtimeconfig_config:
name: my-config
description: My config
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: config
ignore_errors: true
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_runtimeconfig_variable/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_runtimeconfig_variable/tasks/main.yml
index 45d6e4917..fe47378c2 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_runtimeconfig_variable/tasks/main.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_runtimeconfig_variable/tasks/main.yml
@@ -1,2 +1,3 @@
---
-- include_tasks: autogen.yml
+- name: Generated tests
+ ansible.builtin.include_tasks: autogen.yml
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_serviceusage_service/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_serviceusage_service/tasks/autogen.yml
index 6db157360..666da8f6b 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_serviceusage_service/tasks/autogen.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_serviceusage_service/tasks/autogen.yml
@@ -13,62 +13,62 @@
#
# ----------------------------------------------------------------------------
# Pre-test setup
-- name: delete a service
+- name: Delete a service
google.cloud.gcp_serviceusage_service:
- name: spanner.googleapis.com
+ name: alloydb.googleapis.com
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
#----------------------------------------------------------
-- name: create a service
+- name: Create a service
google.cloud.gcp_serviceusage_service:
- name: spanner.googleapis.com
+ name: alloydb.googleapis.com
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that service was created
+- name: Verify that service was created
google.cloud.gcp_serviceusage_service_info:
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/cloud-platform
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/cloud-platform
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- - "'{{ (results['resources'] | selectattr('name', 'search', 'spanner.googleapis.com') | list | first).state }}' == 'ENABLED'"
+ - "'{{ (results['resources'] | selectattr('name', 'search', 'alloydb.googleapis.com') | list | first).state }}' == 'ENABLED'"
# ----------------------------------------------------------------------------
-- name: create a service that already exists
+- name: Create a service that already exists
google.cloud.gcp_serviceusage_service:
- name: spanner.googleapis.com
+ name: alloydb.googleapis.com
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#----------------------------------------------------------
-- name: delete a service
+- name: Delete a service
google.cloud.gcp_serviceusage_service:
- name: spanner.googleapis.com
+ name: alloydb.googleapis.com
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
# TODO(@toumorokoshi): investigate if the pause helps
@@ -76,28 +76,28 @@
# - name: Pause for 1 minute to keep from hitting quota limit
# ansible.builtin.pause:
# minutes: 1
-- name: verify that service was deleted
+- name: Verify that service was deleted
google.cloud.gcp_serviceusage_service_info:
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/cloud-platform
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/cloud-platform
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- - "'{{ (results['resources'] | selectattr('name', 'search', 'spanner.googleapis.com') | list | first).state }}' == 'DISABLED'"
+ - "'{{ (results['resources'] | selectattr('name', 'search', 'alloydb.googleapis.com') | list | first).state }}' == 'DISABLED'"
# ----------------------------------------------------------------------------
-- name: delete a service that does not exist
+- name: Delete a service that does not exist
google.cloud.gcp_serviceusage_service:
- name: spanner.googleapis.com
+ name: alloydb.googleapis.com
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_serviceusage_service/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_serviceusage_service/tasks/main.yml
index 45d6e4917..fe47378c2 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_serviceusage_service/tasks/main.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_serviceusage_service/tasks/main.yml
@@ -1,2 +1,3 @@
---
-- include_tasks: autogen.yml
+- name: Generated tests
+ ansible.builtin.include_tasks: autogen.yml
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_sourcerepo_repository/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_sourcerepo_repository/tasks/autogen.yml
index adeff088f..0bc805810 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_sourcerepo_repository/tasks/autogen.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_sourcerepo_repository/tasks/autogen.yml
@@ -13,86 +13,86 @@
#
# ----------------------------------------------------------------------------
# Pre-test setup
-- name: delete a repository
+- name: Delete a repository
google.cloud.gcp_sourcerepo_repository:
name: "{{ resource_name }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
#----------------------------------------------------------
-- name: create a repository
+- name: Create a repository
google.cloud.gcp_sourcerepo_repository:
name: "{{ resource_name }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that repository was created
+- name: Verify that repository was created
google.cloud.gcp_sourcerepo_repository_info:
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/cloud-platform
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/cloud-platform
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | map(attribute='name') | select("match", ".*{{ resource_name }}.*") | list | length == 1
# ----------------------------------------------------------------------------
-- name: create a repository that already exists
+- name: Create a repository that already exists
google.cloud.gcp_sourcerepo_repository:
name: "{{ resource_name }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#----------------------------------------------------------
-- name: delete a repository
+- name: Delete a repository
google.cloud.gcp_sourcerepo_repository:
name: "{{ resource_name }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that repository was deleted
+- name: Verify that repository was deleted
google.cloud.gcp_sourcerepo_repository_info:
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/cloud-platform
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/cloud-platform
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | map(attribute='name') | select("match", ".*{{ resource_name }}.*") | list | length == 0
# ----------------------------------------------------------------------------
-- name: delete a repository that does not exist
+- name: Delete a repository that does not exist
google.cloud.gcp_sourcerepo_repository:
name: "{{ resource_name }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_sourcerepo_repository/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_sourcerepo_repository/tasks/main.yml
index 45d6e4917..fe47378c2 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_sourcerepo_repository/tasks/main.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_sourcerepo_repository/tasks/main.yml
@@ -1,2 +1,3 @@
---
-- include_tasks: autogen.yml
+- name: Generated tests
+ ansible.builtin.include_tasks: autogen.yml
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_spanner_database/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_spanner_database/tasks/autogen.yml
index cf1b808cb..a3aa4cca2 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_spanner_database/tasks/autogen.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_spanner_database/tasks/autogen.yml
@@ -13,7 +13,7 @@
#
# ----------------------------------------------------------------------------
# Pre-test setup
-- name: create a instance
+- name: Create a instance
google.cloud.gcp_spanner_instance:
name: instance-database
display_name: My Spanner Instance
@@ -23,29 +23,29 @@
config: regional-us-central1
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: instance
-- name: delete a database
+- name: Delete a database
google.cloud.gcp_spanner_database:
name: webstore
instance: "{{ instance }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
#----------------------------------------------------------
-- name: create a database
+- name: Create a database
google.cloud.gcp_spanner_database:
name: webstore
instance: "{{ instance }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
# - name: verify that database was created
@@ -53,7 +53,7 @@
# instance: "{{ instance }}"
# project: "{{ gcp_project }}"
# auth_kind: "{{ gcp_cred_kind }}"
-# service_account_file: "{{ gcp_cred_file }}"
+# service_account_file: "{{ gcp_cred_file | default(omit) }}"
# scopes:
# - https://www.googleapis.com/auth/spanner.admin
# register: results
@@ -62,31 +62,31 @@
# that:
# - results['resources'] | map(attribute='name') | select("match", ".*webstore.*") | list | length == 1
# ----------------------------------------------------------------------------
-- name: create a database that already exists
+- name: Create a database that already exists
google.cloud.gcp_spanner_database:
name: webstore
instance: "{{ instance }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#----------------------------------------------------------
-- name: delete a database
+- name: Delete a database
google.cloud.gcp_spanner_database:
name: webstore
instance: "{{ instance }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
# commented out due to a flakey List endpoint
@@ -98,7 +98,7 @@
# instance: "{{ instance }}"
# project: "{{ gcp_project }}"
# auth_kind: "{{ gcp_cred_kind }}"
-# service_account_file: "{{ gcp_cred_file }}"
+# service_account_file: "{{ gcp_cred_file | default(omit) }}"
# scopes:
# - https://www.googleapis.com/auth/spanner.admin
# register: results
@@ -107,23 +107,23 @@
# that:
# - results['resources'] | map(attribute='name') | select("match", ".*webstore.*") | list | length == 0
# ----------------------------------------------------------------------------
-- name: delete a database that does not exist
+- name: Delete a database that does not exist
google.cloud.gcp_spanner_database:
name: webstore
instance: "{{ instance }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#---------------------------------------------------------
# Post-test teardown
# If errors happen, don't crash the playbook!
-- name: delete a instance
+- name: Delete a instance
google.cloud.gcp_spanner_instance:
name: instance-database
display_name: My Spanner Instance
@@ -133,7 +133,7 @@
config: regional-us-central1
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: instance
ignore_errors: true
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_spanner_database/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_spanner_database/tasks/main.yml
index 45d6e4917..fe47378c2 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_spanner_database/tasks/main.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_spanner_database/tasks/main.yml
@@ -1,2 +1,3 @@
---
-- include_tasks: autogen.yml
+- name: Generated tests
+ ansible.builtin.include_tasks: autogen.yml
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_spanner_instance/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_spanner_instance/tasks/autogen.yml
index fdf82dda2..daae5c896 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_spanner_instance/tasks/autogen.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_spanner_instance/tasks/autogen.yml
@@ -13,7 +13,7 @@
#
# ----------------------------------------------------------------------------
# Pre-test setup
-- name: delete a instance
+- name: Delete a instance
google.cloud.gcp_spanner_instance:
name: testinstance
display_name: My Spanner Instance
@@ -23,10 +23,10 @@
config: regional-us-central1
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
#----------------------------------------------------------
-- name: create a instance
+- name: Create a instance
google.cloud.gcp_spanner_instance:
name: testinstance
display_name: My Spanner Instance
@@ -36,27 +36,27 @@
config: regional-us-central1
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that instance was created
+- name: Verify that instance was created
google.cloud.gcp_spanner_instance_info:
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/spanner.admin
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/spanner.admin
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | map(attribute='name') | select("match", ".*testinstance.*") | list | length == 1
# ----------------------------------------------------------------------------
-- name: create a instance that already exists
+- name: Create a instance that already exists
google.cloud.gcp_spanner_instance:
name: testinstance
display_name: My Spanner Instance
@@ -66,15 +66,15 @@
config: regional-us-central1
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#----------------------------------------------------------
-- name: delete a instance
+- name: Delete a instance
google.cloud.gcp_spanner_instance:
name: testinstance
display_name: My Spanner Instance
@@ -84,27 +84,27 @@
config: regional-us-central1
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that instance was deleted
+- name: Verify that instance was deleted
google.cloud.gcp_spanner_instance_info:
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/spanner.admin
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/spanner.admin
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | map(attribute='name') | select("match", ".*testinstance.*") | list | length == 0
# ----------------------------------------------------------------------------
-- name: delete a instance that does not exist
+- name: Delete a instance that does not exist
google.cloud.gcp_spanner_instance:
name: testinstance
display_name: My Spanner Instance
@@ -114,10 +114,10 @@
config: regional-us-central1
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_spanner_instance/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_spanner_instance/tasks/main.yml
index 45d6e4917..fe47378c2 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_spanner_instance/tasks/main.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_spanner_instance/tasks/main.yml
@@ -1,2 +1,3 @@
---
-- include_tasks: autogen.yml
+- name: Generated tests
+ ansible.builtin.include_tasks: autogen.yml
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_sql_database/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_sql_database/tasks/autogen.yml
index 1661f839c..dd87faa83 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_sql_database/tasks/autogen.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_sql_database/tasks/autogen.yml
@@ -13,132 +13,132 @@
#
# ----------------------------------------------------------------------------
# Pre-test setup
-- name: create a instance
+- name: Create a instance
google.cloud.gcp_sql_instance:
- name: "{{resource_name}}-3"
+ name: "{{ resource_name }}-3"
settings:
ip_configuration:
authorized_networks:
- - name: google dns server
- value: 8.8.8.8/32
+ - name: google dns server
+ value: 8.8.8.8/32
tier: db-n1-standard-1
region: us-central1
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: instance
-- name: delete a database
+- name: Delete a database
google.cloud.gcp_sql_database:
name: "{{ resource_name }}"
- charset: utf8
+ charset: utf8mb4
instance: "{{ instance.name }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
#----------------------------------------------------------
-- name: create a database
+- name: Create a database
google.cloud.gcp_sql_database:
name: "{{ resource_name }}"
- charset: utf8
+ charset: utf8mb4
instance: "{{ instance.name }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that database was created
+- name: Verify that database was created
google.cloud.gcp_sql_database_info:
- instance: "{{ instance.name }}"
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/sqlservice.admin
+ instance: "{{ instance.name }}"
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/sqlservice.admin
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- - "\"{{resource_name}}\" in \"{{ results['resources'] | map(attribute='name') | list }}\""
+ - "\"{{ resource_name }}\" in \"{{ results['resources'] | map(attribute='name') | list }}\""
# ----------------------------------------------------------------------------
-- name: create a database that already exists
+- name: Create a database that already exists
google.cloud.gcp_sql_database:
name: "{{ resource_name }}"
- charset: utf8
+ charset: utf8mb4
instance: "{{ instance.name }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#----------------------------------------------------------
-- name: delete a database
+- name: Delete a database
google.cloud.gcp_sql_database:
name: "{{ resource_name }}"
- charset: utf8
+ charset: utf8mb4
instance: "{{ instance.name }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that database was deleted
+- name: Verify that database was deleted
google.cloud.gcp_sql_database_info:
- instance: "{{ instance.name }}"
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/sqlservice.admin
+ instance: "{{ instance.name }}"
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/sqlservice.admin
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- - "\"{{resource_name}}\" not in \"{{ results['resources'] | map(attribute='name') | list }}\""
+ - "\"{{ resource_name }}\" not in \"{{ results['resources'] | map(attribute='name') | list }}\""
# ----------------------------------------------------------------------------
-- name: delete a database that does not exist
+- name: Delete a database that does not exist
google.cloud.gcp_sql_database:
name: "{{ resource_name }}"
- charset: utf8
+ charset: utf8mb4
instance: "{{ instance.name }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#---------------------------------------------------------
# Post-test teardown
# If errors happen, don't crash the playbook!
-- name: delete a instance
+- name: Delete a instance
google.cloud.gcp_sql_instance:
- name: "{{resource_name}}-3"
+ name: "{{ resource_name }}-3"
settings:
ip_configuration:
authorized_networks:
- - name: google dns server
- value: 8.8.8.8/32
+ - name: google dns server
+ value: 8.8.8.8/32
tier: db-n1-standard-1
region: us-central1
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: instance
ignore_errors: true
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_sql_database/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_sql_database/tasks/main.yml
index 45d6e4917..fe47378c2 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_sql_database/tasks/main.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_sql_database/tasks/main.yml
@@ -1,2 +1,3 @@
---
-- include_tasks: autogen.yml
+- name: Generated tests
+ ansible.builtin.include_tasks: autogen.yml
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_sql_instance/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_sql_instance/tasks/autogen.yml
index cb1a4756d..c57de05a5 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_sql_instance/tasks/autogen.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_sql_instance/tasks/autogen.yml
@@ -13,121 +13,121 @@
#
# ----------------------------------------------------------------------------
# Pre-test setup
-- name: delete a instance
+- name: Delete a instance
google.cloud.gcp_sql_instance:
- name: "{{resource_name}}-2"
+ name: "{{ resource_name }}-2"
settings:
ip_configuration:
authorized_networks:
- - name: google dns server
- value: 8.8.8.8/32
+ - name: google dns server
+ value: 8.8.8.8/32
tier: db-n1-standard-1
region: us-central1
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
#----------------------------------------------------------
-- name: create a instance
+- name: Create a instance
google.cloud.gcp_sql_instance:
- name: "{{resource_name}}-2"
+ name: "{{ resource_name }}-2"
settings:
ip_configuration:
authorized_networks:
- - name: google dns server
- value: 8.8.8.8/32
+ - name: google dns server
+ value: 8.8.8.8/32
tier: db-n1-standard-1
region: us-central1
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that instance was created
+- name: Verify that instance was created
google.cloud.gcp_sql_instance_info:
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/sqlservice.admin
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/sqlservice.admin
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- - results['resources'] | map(attribute='name') | select("match", ".*{{resource_name}}-2.*") | list | length == 1
+ - results['resources'] | map(attribute='name') | select("match", ".*{{ resource_name }}-2.*") | list | length == 1
# ----------------------------------------------------------------------------
-- name: create a instance that already exists
+- name: Create a instance that already exists
google.cloud.gcp_sql_instance:
- name: "{{resource_name}}-2"
+ name: "{{ resource_name }}-2"
settings:
ip_configuration:
authorized_networks:
- - name: google dns server
- value: 8.8.8.8/32
+ - name: google dns server
+ value: 8.8.8.8/32
tier: db-n1-standard-1
region: us-central1
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#----------------------------------------------------------
-- name: delete a instance
+- name: Delete a instance
google.cloud.gcp_sql_instance:
- name: "{{resource_name}}-2"
+ name: "{{ resource_name }}-2"
settings:
ip_configuration:
authorized_networks:
- - name: google dns server
- value: 8.8.8.8/32
+ - name: google dns server
+ value: 8.8.8.8/32
tier: db-n1-standard-1
region: us-central1
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that instance was deleted
+- name: Verify that instance was deleted
google.cloud.gcp_sql_instance_info:
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/sqlservice.admin
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/sqlservice.admin
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- - results['resources'] | map(attribute='name') | select("match", ".*{{resource_name}}-2.*") | list | length == 0
+ - results['resources'] | map(attribute='name') | select("match", ".*{{ resource_name }}-2.*") | list | length == 0
# ----------------------------------------------------------------------------
-- name: delete a instance that does not exist
+- name: Delete a instance that does not exist
google.cloud.gcp_sql_instance:
- name: "{{resource_name}}-2"
+ name: "{{ resource_name }}-2"
settings:
ip_configuration:
authorized_networks:
- - name: google dns server
- value: 8.8.8.8/32
+ - name: google dns server
+ value: 8.8.8.8/32
tier: db-n1-standard-1
region: us-central1
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_sql_instance/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_sql_instance/tasks/main.yml
index 45d6e4917..fe47378c2 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_sql_instance/tasks/main.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_sql_instance/tasks/main.yml
@@ -1,2 +1,3 @@
---
-- include_tasks: autogen.yml
+- name: Generated tests
+ ansible.builtin.include_tasks: autogen.yml
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_sql_ssl_cert/aliases b/ansible_collections/google/cloud/tests/integration/targets/gcp_sql_ssl_cert/aliases
index 8189da3c4..0e4419e32 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_sql_ssl_cert/aliases
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_sql_ssl_cert/aliases
@@ -1,4 +1 @@
-cloud/gcp
-# unsupported as gcp_sql_ssl_cert_info resource
-# does not exist.
-unsupported
+cloud/gcp \ No newline at end of file
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_sql_ssl_cert/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_sql_ssl_cert/tasks/autogen.yml
index cc22adcd5..c24746dff 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_sql_ssl_cert/tasks/autogen.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_sql_ssl_cert/tasks/autogen.yml
@@ -13,75 +13,92 @@
#
# ----------------------------------------------------------------------------
# Pre-test setup
-- name: create a instance
+- name: Create a instance
google.cloud.gcp_sql_instance:
- name: "{{resource_name}}-2"
+ name: "{{ resource_name }}-2"
settings:
ip_configuration:
authorized_networks:
- - name: google dns server
- value: 8.8.8.8/32
+ - name: google dns server
+ value: 8.8.8.8/32
tier: db-n1-standard-1
region: us-central1
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: instance
-- name: delete a SSL cert
+- name: Delete a non-existent SSL cert
google.cloud.gcp_sql_ssl_cert:
- common_name: "{{resource_name}}"
- instance: "{{instance['name'}}"
+ common_name: "{{ resource_name }}"
+ instance:
+ name: "{{ instance['name'] }}"
+ sha1_fingerprint: "f572d396fae9206628714fb2ce00f72e94f2258f"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
#----------------------------------------------------------
-- name: create a SSL cert
+- name: Create an SSL cert
google.cloud.gcp_sql_ssl_cert:
- common_name: "{{resource_name}}"
- instance: "{{instance['name'}}"
+ common_name: "{{ resource_name }}"
+ instance:
+ name: "{{ instance['name'] }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- # SslCert is not altered, just verified.
- - result.changed == false
-- name: verify that ssl_cert was created
- google.cloud.gcp_sql_ssl_cert_info:
- filters:
- - name =
- instance: "{{instance['name'}}"
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/sqlservice.admin
- register: results
-- name: verify that command succeeded
- assert:
+ - result.changed == true
+- name: Peform a no-op update to verify the cert was created
+ google.cloud.gcp_sql_ssl_cert:
+ instance:
+ name: "{{ instance['name'] }}"
+ sha1_fingerprint: "{{ result['sha1Fingerprint'] }}"
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ state: present
+ register: updates
+- name: Verify that command succeeded
+ ansible.builtin.assert:
+ that:
+ - updates.changed == false
+#----------------------------------------------------------
+- name: Delete an SSL cert
+ google.cloud.gcp_sql_ssl_cert:
+ common_name: "{{ resource_name }}"
+ instance:
+ name: "{{ instance['name'] }}"
+ sha1_fingerprint: "{{ result['sha1Fingerprint'] }}"
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ state: absent
+ register: result
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- - results['resources'] | length == 1
+ - result.changed == true
#---------------------------------------------------------
# Post-test teardown
# If errors happen, don't crash the playbook!
-- name: delete a instance
+- name: Delete a instance
google.cloud.gcp_sql_instance:
- name: "{{resource_name}}-2"
+ name: "{{ resource_name }}-2"
settings:
ip_configuration:
authorized_networks:
- - name: google dns server
- value: 8.8.8.8/32
+ - name: google dns server
+ value: 8.8.8.8/32
tier: db-n1-standard-1
region: us-central1
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: instance
ignore_errors: true
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_sql_ssl_cert/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_sql_ssl_cert/tasks/main.yml
index 45d6e4917..fe47378c2 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_sql_ssl_cert/tasks/main.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_sql_ssl_cert/tasks/main.yml
@@ -1,2 +1,3 @@
---
-- include_tasks: autogen.yml
+- name: Generated tests
+ ansible.builtin.include_tasks: autogen.yml
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_sql_user/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_sql_user/tasks/autogen.yml
index c5aace2c7..20ddbea25 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_sql_user/tasks/autogen.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_sql_user/tasks/autogen.yml
@@ -13,22 +13,22 @@
#
# ----------------------------------------------------------------------------
# Pre-test setup
-- name: create a instance
+- name: Create a instance
google.cloud.gcp_sql_instance:
- name: "{{resource_name}}-1"
+ name: "{{ resource_name }}-1"
settings:
ip_configuration:
authorized_networks:
- - name: google dns server
- value: 8.8.8.8/32
+ - name: google dns server
+ value: 8.8.8.8/32
tier: db-n1-standard-1
region: us-central1
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: instance
-- name: delete a user
+- name: Delete a user
google.cloud.gcp_sql_user:
name: test-user
host: 10.1.2.3
@@ -36,10 +36,10 @@
instance: "{{ instance }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
#----------------------------------------------------------
-- name: create a user
+- name: Create a user
google.cloud.gcp_sql_user:
name: test-user
host: 10.1.2.3
@@ -47,28 +47,28 @@
instance: "{{ instance }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that user was created
+- name: Verify that user was created
google.cloud.gcp_sql_user_info:
- instance: "{{ instance }}"
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/sqlservice.admin
+ instance: "{{ instance }}"
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/sqlservice.admin
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- "'test-user' in \"{{ results['resources'] | map(attribute='name') | list }}\""
# ----------------------------------------------------------------------------
-- name: create a user that already exists
+- name: Create a user that already exists
google.cloud.gcp_sql_user:
name: test-user
host: 10.1.2.3
@@ -76,15 +76,15 @@
instance: "{{ instance }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#----------------------------------------------------------
-- name: delete a user
+- name: Delete a user
google.cloud.gcp_sql_user:
name: test-user
host: 10.1.2.3
@@ -92,28 +92,28 @@
instance: "{{ instance }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that user was deleted
+- name: Verify that user was deleted
google.cloud.gcp_sql_user_info:
- instance: "{{ instance }}"
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/sqlservice.admin
+ instance: "{{ instance }}"
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/sqlservice.admin
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- "'test-user' not in \"{{ results['resources'] | map(attribute='name') | list }}\""
# ----------------------------------------------------------------------------
-- name: delete a user that does not exist
+- name: Delete a user that does not exist
google.cloud.gcp_sql_user:
name: test-user
host: 10.1.2.3
@@ -121,29 +121,29 @@
instance: "{{ instance }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#---------------------------------------------------------
# Post-test teardown
# If errors happen, don't crash the playbook!
-- name: delete a instance
+- name: Delete a instance
google.cloud.gcp_sql_instance:
- name: "{{resource_name}}-1"
+ name: "{{ resource_name }}-1"
settings:
ip_configuration:
authorized_networks:
- - name: google dns server
- value: 8.8.8.8/32
+ - name: google dns server
+ value: 8.8.8.8/32
tier: db-n1-standard-1
region: us-central1
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: instance
ignore_errors: true
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_sql_user/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_sql_user/tasks/main.yml
index 45d6e4917..fe47378c2 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_sql_user/tasks/main.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_sql_user/tasks/main.yml
@@ -1,2 +1,3 @@
---
-- include_tasks: autogen.yml
+- name: Generated tests
+ ansible.builtin.include_tasks: autogen.yml
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_storage_bucket/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_storage_bucket/tasks/autogen.yml
index b6d83e4eb..f5ccacabe 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_storage_bucket/tasks/autogen.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_storage_bucket/tasks/autogen.yml
@@ -13,62 +13,62 @@
#
# ----------------------------------------------------------------------------
# Pre-test setup
-- name: delete a bucket
+- name: Delete a bucket
google.cloud.gcp_storage_bucket:
name: "{{ resource_name }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
#----------------------------------------------------------
-- name: create a bucket
+- name: Create a bucket
google.cloud.gcp_storage_bucket:
name: "{{ resource_name }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
# ----------------------------------------------------------------------------
-- name: create a bucket that already exists
+- name: Create a bucket that already exists
google.cloud.gcp_storage_bucket:
name: "{{ resource_name }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#----------------------------------------------------------
-- name: delete a bucket
+- name: Delete a bucket
google.cloud.gcp_storage_bucket:
name: "{{ resource_name }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
# ----------------------------------------------------------------------------
-- name: delete a bucket that does not exist
+- name: Delete a bucket that does not exist
google.cloud.gcp_storage_bucket:
name: "{{ resource_name }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_storage_bucket/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_storage_bucket/tasks/main.yml
index 45d6e4917..fe47378c2 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_storage_bucket/tasks/main.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_storage_bucket/tasks/main.yml
@@ -1,2 +1,3 @@
---
-- include_tasks: autogen.yml
+- name: Generated tests
+ ansible.builtin.include_tasks: autogen.yml
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_storage_bucket_access_control/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_storage_bucket_access_control/tasks/autogen.yml
index ebde9a323..762e0f6cd 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_storage_bucket_access_control/tasks/autogen.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_storage_bucket_access_control/tasks/autogen.yml
@@ -13,92 +13,92 @@
#
# ----------------------------------------------------------------------------
# Pre-test setup
-- name: create a bucket
+- name: Create a bucket
google.cloud.gcp_storage_bucket:
name: "{{ resource_name }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: bucket
-- name: delete a bucket access control
+- name: Delete a bucket access control
google.cloud.gcp_storage_bucket_access_control:
bucket: "{{ bucket }}"
entity: user-alexstephen@google.com
role: WRITER
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
#----------------------------------------------------------
-- name: create a bucket access control
+- name: Create a bucket access control
google.cloud.gcp_storage_bucket_access_control:
bucket: "{{ bucket }}"
entity: user-alexstephen@google.com
role: WRITER
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
# ----------------------------------------------------------------------------
-- name: create a bucket access control that already exists
+- name: Create a bucket access control that already exists
google.cloud.gcp_storage_bucket_access_control:
bucket: "{{ bucket }}"
entity: user-alexstephen@google.com
role: WRITER
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#----------------------------------------------------------
-- name: delete a bucket access control
+- name: Delete a bucket access control
google.cloud.gcp_storage_bucket_access_control:
bucket: "{{ bucket }}"
entity: user-alexstephen@google.com
role: WRITER
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
# ----------------------------------------------------------------------------
-- name: delete a bucket access control that does not exist
+- name: Delete a bucket access control that does not exist
google.cloud.gcp_storage_bucket_access_control:
bucket: "{{ bucket }}"
entity: user-alexstephen@google.com
role: WRITER
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#---------------------------------------------------------
# Post-test teardown
# If errors happen, don't crash the playbook!
-- name: delete a bucket
+- name: Delete a bucket
google.cloud.gcp_storage_bucket:
name: "{{ resource_name }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: bucket
ignore_errors: true
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_storage_bucket_access_control/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_storage_bucket_access_control/tasks/main.yml
index 45d6e4917..fe47378c2 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_storage_bucket_access_control/tasks/main.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_storage_bucket_access_control/tasks/main.yml
@@ -1,2 +1,3 @@
---
-- include_tasks: autogen.yml
+- name: Generated tests
+ ansible.builtin.include_tasks: autogen.yml
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_storage_default_object_acl/aliases b/ansible_collections/google/cloud/tests/integration/targets/gcp_storage_default_object_acl/aliases
index ff7eb2d4e..0e4419e32 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_storage_default_object_acl/aliases
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_storage_default_object_acl/aliases
@@ -1,2 +1 @@
-cloud/gcp
-unsupported \ No newline at end of file
+cloud/gcp \ No newline at end of file
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_storage_default_object_acl/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_storage_default_object_acl/tasks/autogen.yml
index 6f091e9b9..6f4368432 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_storage_default_object_acl/tasks/autogen.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_storage_default_object_acl/tasks/autogen.yml
@@ -13,87 +13,92 @@
#
# ----------------------------------------------------------------------------
# Pre-test setup
-- name: create a bucket
+- name: Create a bucket
google.cloud.gcp_storage_bucket:
name: "{{ resource_name }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: bucket
-- name: delete a default object acl
+- name: Delete a default object acl
google.cloud.gcp_storage_default_object_acl:
bucket: "{{ bucket }}"
- entity: OWNER:user-alexstephen@google.com
+ entity: user-alexstephen@google.com
+ role: READER
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
#----------------------------------------------------------
-- name: create a default object acl
+- name: Create a default object acl
google.cloud.gcp_storage_default_object_acl:
bucket: "{{ bucket }}"
- entity: OWNER:user-alexstephen@google.com
+ entity: user-alexstephen@google.com
+ role: READER
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
# ----------------------------------------------------------------------------
-- name: create a default object acl that already exists
+- name: Create a default object acl that already exists
google.cloud.gcp_storage_default_object_acl:
bucket: "{{ bucket }}"
- entity: OWNER:user-alexstephen@google.com
+ entity: user-alexstephen@google.com
+ role: READER
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#----------------------------------------------------------
-- name: delete a default object acl
+- name: Delete a default object acl
google.cloud.gcp_storage_default_object_acl:
bucket: "{{ bucket }}"
- entity: OWNER:user-alexstephen@google.com
+ entity: user-alexstephen@google.com
+ role: READER
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
# ----------------------------------------------------------------------------
-- name: delete a default object acl that does not exist
+- name: Delete a default object acl that does not exist
google.cloud.gcp_storage_default_object_acl:
bucket: "{{ bucket }}"
- entity: OWNER:user-alexstephen@google.com
+ entity: user-alexstephen@google.com
+ role: READER
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#---------------------------------------------------------
# Post-test teardown
# If errors happen, don't crash the playbook!
-- name: delete a bucket
+- name: Delete a bucket
google.cloud.gcp_storage_bucket:
name: "{{ resource_name }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: bucket
ignore_errors: true
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_storage_default_object_acl/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_storage_default_object_acl/tasks/main.yml
index 45d6e4917..fe47378c2 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_storage_default_object_acl/tasks/main.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_storage_default_object_acl/tasks/main.yml
@@ -1,2 +1,3 @@
---
-- include_tasks: autogen.yml
+- name: Generated tests
+ ansible.builtin.include_tasks: autogen.yml
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_storage_object/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_storage_object/tasks/main.yml
index 497d425a5..4d6d31f3e 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_storage_object/tasks/main.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_storage_object/tasks/main.yml
@@ -1,75 +1,76 @@
---
# Pre-test setup
-- name: create a temp file for uploading
- tempfile:
+- name: Create a temp file for uploading
+ ansible.builtin.tempfile:
state: file
register: upload_temp
-- name: create a temp file for downloading
- tempfile:
+- name: Create a temp file for downloading
+ ansible.builtin.tempfile:
state: file
register: download_temp
-- name: put content in the tempfile
- copy:
- content: "Ansible GCS test file"
+- name: Put content in the tempfile
+ ansible.builtin.copy:
+ content: Ansible GCS test file
dest: "{{ upload_temp.path }}"
-- name: create a bucket
+ mode: 0644
+- name: Create a bucket
google.cloud.gcp_storage_bucket:
name: "{{ resource_name }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: bucket
#----------------------------------------------------------
-- name: upload the object to gcs
+- name: Upload the object to gcs
google.cloud.gcp_storage_object:
- action: 'upload'
+ action: upload
bucket: "{{ bucket.name }}"
src: "{{ upload_temp.path }}"
- dest: "ansible/{{ resource_name }}"
+ dest: ansible/{{ resource_name }}
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
# ----------------------------------------------------------------------------
-- name: download the object to disk
+- name: Download the object to disk
google.cloud.gcp_storage_object:
- action: 'download'
+ action: download
bucket: "{{ bucket.name }}"
- src: "ansible/{{ resource_name }}"
+ src: ansible/{{ resource_name }}
dest: "{{ download_temp.path }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
# ----------------------------------------------------------------------------
-- name: delete the object
+- name: Delete the object
google.cloud.gcp_storage_object:
- action: 'delete'
+ action: delete
bucket: "{{ bucket.name }}"
- src: "ansible/{{ resource_name }}"
+ src: ansible/{{ resource_name }}
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
# ----------------------------------------------------------------------------
-- name: delete the bucket
+- name: Delete the bucket
google.cloud.gcp_storage_bucket:
name: "{{ resource_name }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: bucket
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_tpu_node/tasks/autogen.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_tpu_node/tasks/autogen.yml
index e44d63226..196aa6a9d 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_tpu_node/tasks/autogen.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_tpu_node/tasks/autogen.yml
@@ -13,108 +13,108 @@
#
# ----------------------------------------------------------------------------
# Pre-test setup
-- name: delete a node
+- name: Delete a node
google.cloud.gcp_tpu_node:
name: "{{ resource_name }}"
zone: us-central1-a
- accelerator_type: "v2-32"
- tensorflow_version: '2.10.0'
+ accelerator_type: v2-32
+ tensorflow_version: 2.10.0
cidr_block: 10.2.0.0/29
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
#----------------------------------------------------------
-- name: create a node
+- name: Create a node
google.cloud.gcp_tpu_node:
name: "{{ resource_name }}"
zone: us-central1-a
- accelerator_type: "v2-32"
- tensorflow_version: '2.10.0'
+ accelerator_type: v2-32
+ tensorflow_version: 2.10.0
cidr_block: 10.2.0.0/29
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that node was created
+- name: Verify that node was created
google.cloud.gcp_tpu_node_info:
- zone: us-central1-a
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/cloud-platform
+ zone: us-central1-a
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/cloud-platform
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | map(attribute='name') | select("match", ".*{{ resource_name }}.*") | list | length == 1
# ----------------------------------------------------------------------------
-- name: create a node that already exists
+- name: Create a node that already exists
google.cloud.gcp_tpu_node:
name: "{{ resource_name }}"
zone: us-central1-a
- accelerator_type: "v2-32"
- tensorflow_version: '2.10.0'
+ accelerator_type: v2-32
+ tensorflow_version: 2.10.0
cidr_block: 10.2.0.0/29
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: present
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
#----------------------------------------------------------
-- name: delete a node
+- name: Delete a node
google.cloud.gcp_tpu_node:
name: "{{ resource_name }}"
zone: us-central1-a
- accelerator_type: "v2-32"
- tensorflow_version: '2.10.0'
+ accelerator_type: v2-32
+ tensorflow_version: 2.10.0
cidr_block: 10.2.0.0/29
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is true
- assert:
+- name: Assert changed is true
+ ansible.builtin.assert:
that:
- result.changed == true
-- name: verify that node was deleted
+- name: Verify that node was deleted
google.cloud.gcp_tpu_node_info:
- zone: us-central1-a
- project: "{{ gcp_project }}"
- auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
- scopes:
- - https://www.googleapis.com/auth/cloud-platform
+ zone: us-central1-a
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
+ scopes:
+ - https://www.googleapis.com/auth/cloud-platform
register: results
-- name: verify that command succeeded
- assert:
+- name: Verify that command succeeded
+ ansible.builtin.assert:
that:
- results['resources'] | map(attribute='name') | select("match", ".*{{ resource_name }}.*") | list | length == 0
# ----------------------------------------------------------------------------
-- name: delete a node that does not exist
+- name: Delete a node that does not exist
google.cloud.gcp_tpu_node:
name: "{{ resource_name }}"
zone: us-central1-a
- accelerator_type: "v2-32"
- tensorflow_version: '2.10.0'
+ accelerator_type: v2-32
+ tensorflow_version: 2.10.0
cidr_block: 10.2.0.0/29
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
- service_account_file: "{{ gcp_cred_file }}"
+ service_account_file: "{{ gcp_cred_file | default(omit) }}"
state: absent
register: result
-- name: assert changed is false
- assert:
+- name: Assert changed is false
+ ansible.builtin.assert:
that:
- result.changed == false
diff --git a/ansible_collections/google/cloud/tests/integration/targets/gcp_tpu_node/tasks/main.yml b/ansible_collections/google/cloud/tests/integration/targets/gcp_tpu_node/tasks/main.yml
index 45d6e4917..fe47378c2 100644
--- a/ansible_collections/google/cloud/tests/integration/targets/gcp_tpu_node/tasks/main.yml
+++ b/ansible_collections/google/cloud/tests/integration/targets/gcp_tpu_node/tasks/main.yml
@@ -1,2 +1,3 @@
---
-- include_tasks: autogen.yml
+- name: Generated tests
+ ansible.builtin.include_tasks: autogen.yml