1
0
Fork 0
mirror of https://github.com/ansible-collections/community.general.git synced 2024-09-14 20:13:21 +02:00
community.general/test/integration/targets/azure_rm_keyvault/tasks/main.yml

256 lines
5.9 KiB
YAML
Raw Normal View History

- name: Prepare random number
set_fact:
rpfx: "{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}"
tenant_id: "{{ azure_tenant }}"
run_once: yes
2018-09-05 11:48:27 +02:00
- name: lookup service principal object id
set_fact:
object_id: "{{ lookup('azure_service_principal_attribute',
azure_client_id=azure_client_id,
azure_secret=azure_secret,
azure_tenant=tenant_id) }}"
register: object_id
- name: Create instance of Key Vault -- check mode
azure_rm_keyvault:
resource_group: "{{ resource_group }}"
vault_name: "vault{{ rpfx }}"
enabled_for_deployment: yes
2018-09-05 11:48:27 +02:00
vault_tenant: "{{ tenant_id }}"
sku:
name: standard
family: A
access_policies:
2018-09-05 11:48:27 +02:00
- tenant_id: "{{ tenant_id }}"
object_id: "{{ object_id }}"
keys:
- get
- list
2018-09-05 11:48:27 +02:00
- update
- create
- import
- delete
- recover
- backup
- restore
secrets:
- get
- list
- set
- delete
- recover
- backup
- restore
check_mode: yes
register: output
- name: Assert the resource instance is well created
assert:
that:
- output.changed
- name: Create instance of Key Vault
azure_rm_keyvault:
resource_group: "{{ resource_group }}"
vault_name: "vault{{ rpfx }}"
enabled_for_deployment: yes
2018-09-05 11:48:27 +02:00
vault_tenant: "{{ tenant_id }}"
sku:
name: standard
family: A
access_policies:
2018-09-05 11:48:27 +02:00
- tenant_id: "{{ tenant_id }}"
object_id: "{{ object_id }}"
secrets:
- get
- list
2018-09-05 11:48:27 +02:00
- set
- delete
- recover
- backup
- restore
register: output
- name: Assert the resource instance is well created
assert:
that:
- output.changed
2018-09-05 11:48:27 +02:00
- name: Create instance of Key Vault again
azure_rm_keyvault:
resource_group: "{{ resource_group }}"
vault_name: "vault{{ rpfx }}"
enabled_for_deployment: yes
2018-09-05 11:48:27 +02:00
vault_tenant: "{{ tenant_id }}"
sku:
name: standard
family: A
access_policies:
2018-09-05 11:48:27 +02:00
- tenant_id: "{{ tenant_id }}"
object_id: "{{ object_id }}"
secrets:
- get
- list
2018-09-05 11:48:27 +02:00
- set
- delete
- recover
- backup
- restore
register: output
- name: Assert the state has not changed
assert:
that:
- output.changed == false
2018-09-05 10:21:15 +02:00
- name: Update existing Key Vault (add a rule and tags)
azure_rm_keyvault:
resource_group: "{{ resource_group }}"
vault_name: "vault{{ rpfx }}"
enabled_for_deployment: yes
2018-09-05 11:48:27 +02:00
vault_tenant: "{{ tenant_id }}"
sku:
name: standard
family: A
access_policies:
2018-09-05 11:48:27 +02:00
- tenant_id: "{{ tenant_id }}"
object_id: "{{ object_id }}"
keys:
- get
- list
2018-09-05 11:48:27 +02:00
- update
- create
- import
- delete
- recover
- backup
- restore
secrets:
- get
- list
2018-09-05 11:48:27 +02:00
- set
- delete
- recover
- backup
- restore
2018-09-05 10:21:15 +02:00
tags:
aaa: bbb
register: output
- name: Assert the state has changed
assert:
that:
- output.changed == true
2019-05-22 21:39:37 +02:00
- name: Get key vault facts
azure_rm_keyvault_info:
2018-09-05 10:21:15 +02:00
resource_group: "{{ resource_group }}"
2019-05-22 21:39:37 +02:00
name: "vault{{ rpfx }}"
register: facts
2018-09-05 10:21:15 +02:00
- name: Assert the facts are properly set
assert:
that:
2019-05-22 21:39:37 +02:00
- facts['keyvaults'] | length == 1
- facts['keyvaults'][0]['vault_uri'] != None
- facts['keyvaults'][0]['name'] != None
- facts['keyvaults'][0]['access_policies'] != None
- facts['keyvaults'][0]['sku'] != None
- facts['keyvaults'][0]['id'] != None
2018-09-05 11:48:27 +02:00
#
# azure_rm_keyvaultkey tests
#
2019-04-22 03:52:17 +02:00
- name: create a keyvault key
2018-09-05 11:48:27 +02:00
block:
- azure_rm_keyvaultkey:
keyvault_uri: https://vault{{ rpfx }}.vault.azure.net
key_name: testkey
tags:
testing: test
delete: on-exit
register: output
- assert:
that: output.changed
rescue:
- azure_rm_keyvaultkey:
keyvault_uri: https://vault{{ rpfx }}.vault.azure.net
state: absent
key_name: testkey
2019-04-22 03:52:17 +02:00
- name: delete a keyvault key
2018-09-05 11:48:27 +02:00
azure_rm_keyvaultkey:
keyvault_uri: https://vault{{ rpfx }}.vault.azure.net
state: absent
key_name: testkey
register: output
- assert:
that: output.changed
#
# azure_rm_keyvaultsecret tests
#
2019-04-22 03:52:17 +02:00
- name: create a keyvault secret
2018-09-05 11:48:27 +02:00
block:
- azure_rm_keyvaultsecret:
keyvault_uri: https://vault{{ rpfx }}.vault.azure.net
secret_name: testsecret
secret_value: 'mysecret'
tags:
testing: test
delete: on-exit
register: output
- assert:
that: output.changed
rescue:
- azure_rm_keyvaultsecret:
keyvault_uri: https://vault{{ rpfx }}.vault.azure.net
state: absent
secret_name: testsecret
2019-04-22 03:52:17 +02:00
- name: delete a keyvault secret
2018-09-05 11:48:27 +02:00
azure_rm_keyvaultsecret:
keyvault_uri: https://vault{{ rpfx }}.vault.azure.net
state: absent
secret_name: testsecret
register: output
- assert:
that: output.changed
#
# azure_rm_keyvault finalize & clean up
#
2018-09-05 10:21:15 +02:00
- name: Delete instance of Key Vault -- check mode
azure_rm_keyvault:
resource_group: "{{ resource_group }}"
vault_name: "vault{{ rpfx }}"
state: absent
check_mode: yes
register: output
- name: Assert the state has changed
assert:
that:
- output.changed
- name: Delete instance of Key Vault
azure_rm_keyvault:
resource_group: "{{ resource_group }}"
vault_name: "vault{{ rpfx }}"
state: absent
register: output
- name: Assert the state has changed
assert:
that:
- output.changed
- name: Delete unexisting instance of Key Vault
azure_rm_keyvault:
resource_group: "{{ resource_group }}"
vault_name: "vault{{ rpfx }}"
state: absent
register: output
- name: Assert the state has changed
assert:
that:
- output.changed == false