mirror of
https://github.com/ansible-collections/community.general.git
synced 2024-09-14 20:13:21 +02:00
[cloud] Update RDS parameter group for boto3 (#25345)
* Update RDS parameter group for boto3 * Update to boto3 * Update to latest ansible standards * Remove choices list for valid engines (See #19221 for context) * Allow tagging * Return some useful information, and document that information * Add tests for rds_param_group * Improve testing of rds_param_group * Add purge_tags option for rds_param_group * Fix remaining broken rds_param_group tests * Ensure the group name is lowercased. Fixes integration tests when run on OSX
This commit is contained in:
parent
f08c29924e
commit
63df0adc17
8 changed files with 595 additions and 159 deletions
1
.gitignore
vendored
1
.gitignore
vendored
|
@ -78,6 +78,7 @@ packaging/release/ansible_release
|
|||
/test/integration/inventory.remote
|
||||
/test/integration/inventory.networking
|
||||
/test/integration/inventory.winrm
|
||||
/test/integration/cloud-config-aws.yml
|
||||
# python 'rope' stuff
|
||||
.ropeproject
|
||||
# local 'ack' config files
|
||||
|
|
|
@ -46,6 +46,23 @@
|
|||
"arn:aws:rds:{{aws_region}}:{{aws_account}}:snapshot:rds-*",
|
||||
"arn:aws:rds:{{aws_region}}:{{aws_account}}:db:rds-*"
|
||||
]
|
||||
},
|
||||
{
|
||||
"Sid": "AllowRDSParameterGroupManagement",
|
||||
"Effect": "Allow",
|
||||
"Action": [
|
||||
"rds:DescribeDBParameterGroups",
|
||||
"rds:DescribeDBParameters",
|
||||
"rds:CreateDBParameterGroup",
|
||||
"rds:DeleteDBParameterGroup",
|
||||
"rds:ModifyDBParameterGroup",
|
||||
"rds:ListTagsForResource",
|
||||
"rds:AddTagsToResource",
|
||||
"rds:RemoveTagsFromResource"
|
||||
],
|
||||
"Resource": [
|
||||
"arn:aws:rds:{{aws_region}}:{{aws_account}}:pg:*"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
|
|
|
@ -32,26 +32,17 @@ options:
|
|||
- Specifies whether the group should be present or absent.
|
||||
required: true
|
||||
default: present
|
||||
aliases: []
|
||||
choices: [ 'present' , 'absent' ]
|
||||
name:
|
||||
description:
|
||||
- Database parameter group identifier.
|
||||
required: true
|
||||
default: null
|
||||
aliases: []
|
||||
description:
|
||||
description:
|
||||
- Database parameter group description. Only set when a new group is added.
|
||||
required: false
|
||||
default: null
|
||||
aliases: []
|
||||
engine:
|
||||
description:
|
||||
- The type of database for this group. Required for state=present.
|
||||
required: false
|
||||
default: null
|
||||
aliases: []
|
||||
choices:
|
||||
- 'aurora5.6'
|
||||
- 'mariadb10.0'
|
||||
|
@ -84,17 +75,23 @@ options:
|
|||
immediate:
|
||||
description:
|
||||
- Whether to apply the changes immediately, or after the next reboot of any associated instances.
|
||||
required: false
|
||||
default: null
|
||||
aliases: []
|
||||
aliases:
|
||||
- apply_immediately
|
||||
params:
|
||||
description:
|
||||
- Map of parameter names and values. Numeric values may be represented as K for kilo (1024), M for mega (1024^2), G for giga (1024^3),
|
||||
or T for tera (1024^4), and these values will be expanded into the appropriate number before being set in the parameter group.
|
||||
required: false
|
||||
default: null
|
||||
aliases: []
|
||||
author: "Scott Anderson (@tastychutney)"
|
||||
tags:
|
||||
description:
|
||||
- Dictionary of tags to attach to the parameter group
|
||||
version_added: "2.4"
|
||||
purge_tags:
|
||||
description:
|
||||
- Whether or not to remove tags that do not appear in the I(tags) list. Defaults to false.
|
||||
version_added: "2.4"
|
||||
author:
|
||||
- "Scott Anderson (@tastychutney)"
|
||||
- "Will Thames (@willthames)"
|
||||
extends_documentation_fragment:
|
||||
- aws
|
||||
- ec2
|
||||
|
@ -109,6 +106,9 @@ EXAMPLES = '''
|
|||
engine: 'mysql5.6'
|
||||
params:
|
||||
auto_increment_increment: "42K"
|
||||
tags:
|
||||
Environment: production
|
||||
Application: parrot
|
||||
|
||||
# Remove a parameter group
|
||||
- rds_param_group:
|
||||
|
@ -116,19 +116,48 @@ EXAMPLES = '''
|
|||
name: norwegian_blue
|
||||
'''
|
||||
|
||||
try:
|
||||
import boto.rds
|
||||
from boto.exception import BotoServerError
|
||||
HAS_BOTO = True
|
||||
except ImportError:
|
||||
HAS_BOTO = False
|
||||
RETURN = '''
|
||||
db_parameter_group_name:
|
||||
description: Name of DB parameter group
|
||||
type: string
|
||||
returned: when state is present
|
||||
db_parameter_group_family:
|
||||
description: DB parameter group family that this DB parameter group is compatible with.
|
||||
type: string
|
||||
returned: when state is present
|
||||
db_parameter_group_arn:
|
||||
description: ARN of the DB parameter group
|
||||
type: string
|
||||
returned: when state is present
|
||||
description:
|
||||
description: description of the DB parameter group
|
||||
type: string
|
||||
returned: when state is present
|
||||
errors:
|
||||
description: list of errors from attempting to modify parameters that are not modifiable
|
||||
type: list
|
||||
returned: when state is present
|
||||
tags:
|
||||
description: dictionary of tags
|
||||
type: dict
|
||||
returned: when state is present
|
||||
'''
|
||||
|
||||
from ansible.module_utils.basic import AnsibleModule
|
||||
from ansible.module_utils.ec2 import connect_to_aws, ec2_argument_spec, get_aws_connection_info
|
||||
from ansible.module_utils.ec2 import ec2_argument_spec, get_aws_connection_info, boto3_conn
|
||||
from ansible.module_utils.ec2 import camel_dict_to_snake_dict, HAS_BOTO3, compare_aws_tags
|
||||
from ansible.module_utils.ec2 import ansible_dict_to_boto3_tag_list, boto3_tag_list_to_ansible_dict
|
||||
from ansible.module_utils.parsing.convert_bool import BOOLEANS_TRUE
|
||||
from ansible.module_utils.six import string_types
|
||||
from ansible.module_utils._text import to_native
|
||||
|
||||
import traceback
|
||||
|
||||
try:
|
||||
import botocore
|
||||
except ImportError:
|
||||
pass # caught by imported HAS_BOTO3
|
||||
|
||||
|
||||
VALID_ENGINES = [
|
||||
'aurora5.6',
|
||||
|
@ -169,181 +198,215 @@ INT_MODIFIERS = {
|
|||
}
|
||||
|
||||
|
||||
# returns a tuple: (whether or not a parameter was changed, the remaining parameters that weren't found in this parameter group)
|
||||
|
||||
class NotModifiableError(Exception):
|
||||
def __init__(self, error_message, *args):
|
||||
super(NotModifiableError, self).__init__(error_message, *args)
|
||||
self.error_message = error_message
|
||||
|
||||
def __repr__(self):
|
||||
return 'NotModifiableError: %s' % self.error_message
|
||||
|
||||
def __str__(self):
|
||||
return 'NotModifiableError: %s' % self.error_message
|
||||
|
||||
|
||||
def set_parameter(param, value, immediate):
|
||||
def convert_parameter(param, value):
|
||||
"""
|
||||
Allows setting parameters with 10M = 10* 1024 * 1024 and so on.
|
||||
"""
|
||||
converted_value = value
|
||||
|
||||
if param.type == 'string':
|
||||
converted_value = str(value)
|
||||
|
||||
elif param.type == 'integer':
|
||||
if param['DataType'] == 'integer':
|
||||
if isinstance(value, string_types):
|
||||
try:
|
||||
for modifier in INT_MODIFIERS.keys():
|
||||
if value.endswith(modifier):
|
||||
converted_value = int(value[:-1]) * INT_MODIFIERS[modifier]
|
||||
converted_value = int(converted_value)
|
||||
except ValueError:
|
||||
# may be based on a variable (ie. {foo*3/4}) so
|
||||
# just pass it on through to boto
|
||||
converted_value = str(value)
|
||||
pass
|
||||
elif isinstance(value, bool):
|
||||
converted_value = 1 if value else 0
|
||||
else:
|
||||
converted_value = int(value)
|
||||
|
||||
elif param.type == 'boolean':
|
||||
elif param['DataType'] == 'boolean':
|
||||
if isinstance(value, string_types):
|
||||
converted_value = to_native(value) in BOOLEANS_TRUE
|
||||
# convert True/False to 1/0
|
||||
converted_value = 1 if converted_value else 0
|
||||
return str(converted_value)
|
||||
|
||||
|
||||
def update_parameters(module, connection):
|
||||
groupname = module.params['name']
|
||||
desired = module.params['params']
|
||||
apply_method = 'immediate' if module.params['immediate'] else 'pending-reboot'
|
||||
errors = []
|
||||
modify_list = []
|
||||
parameters_paginator = connection.get_paginator('describe_db_parameters')
|
||||
existing = parameters_paginator.paginate(DBParameterGroupName=groupname).build_full_result()['Parameters']
|
||||
lookup = dict((param['ParameterName'], param) for param in existing)
|
||||
for param_key, param_value in desired.items():
|
||||
if param_key not in lookup:
|
||||
errors.append("Parameter %s is not an available parameter for the %s engine" %
|
||||
(param_key, module.params.get('engine')))
|
||||
else:
|
||||
converted_value = bool(value)
|
||||
|
||||
param.value = converted_value
|
||||
param.apply(immediate)
|
||||
|
||||
def modify_group(group, params, immediate=False):
|
||||
""" Set all of the params in a group to the provided new params. Raises NotModifiableError if any of the
|
||||
params to be changed are read only.
|
||||
"""
|
||||
changed = {}
|
||||
|
||||
new_params = dict(params)
|
||||
|
||||
for key in new_params.keys():
|
||||
if key in group:
|
||||
param = group[key]
|
||||
new_value = new_params[key]
|
||||
converted_value = convert_parameter(lookup[param_key], param_value)
|
||||
# engine-default parameters do not have a ParameterValue, so we'll always override those.
|
||||
if converted_value != lookup[param_key].get('ParameterValue'):
|
||||
if lookup[param_key]['IsModifiable']:
|
||||
modify_list.append(dict(ParameterValue=converted_value, ParameterName=param_key, ApplyMethod=apply_method))
|
||||
else:
|
||||
errors.append("Parameter %s is not modifiable" % param_key)
|
||||
|
||||
# modify_db_parameters takes at most 20 parameters
|
||||
if modify_list:
|
||||
try:
|
||||
from itertools import izip_longest as zip_longest # python 2
|
||||
except ImportError:
|
||||
from itertools import zip_longest # python 3
|
||||
for modify_slice in zip_longest(*[iter(modify_list)] * 20, fillvalue=None):
|
||||
non_empty_slice = [item for item in modify_slice if item]
|
||||
try:
|
||||
old_value = param.value
|
||||
except ValueError:
|
||||
# some versions of boto have problems with retrieving
|
||||
# integer values from params that may have their value
|
||||
# based on a variable (ie. {foo*3/4}), so grab it in a
|
||||
# way that bypasses the property functions
|
||||
old_value = param._value
|
||||
connection.modify_db_parameter_group(DBParameterGroupName=groupname, Parameters=non_empty_slice)
|
||||
except botocore.exceptions.ClientError as e:
|
||||
module.fail_json(msg="Couldn't update parameters: %s" % str(e),
|
||||
exception=traceback.format_exc(),
|
||||
**camel_dict_to_snake_dict(e.response))
|
||||
return True, errors
|
||||
return False, errors
|
||||
|
||||
if old_value != new_value:
|
||||
if not param.is_modifiable:
|
||||
raise NotModifiableError('Parameter %s is not modifiable.' % key)
|
||||
|
||||
changed[key] = {'old': old_value, 'new': new_value}
|
||||
def update_tags(module, connection, group, tags):
|
||||
changed = False
|
||||
existing_tags = connection.list_tags_for_resource(ResourceName=group['DBParameterGroupArn'])['TagList']
|
||||
to_update, to_delete = compare_aws_tags(boto3_tag_list_to_ansible_dict(existing_tags),
|
||||
tags, module.params['purge_tags'])
|
||||
if to_update:
|
||||
try:
|
||||
connection.add_tags_to_resource(ResourceName=group['DBParameterGroupArn'],
|
||||
Tags=ansible_dict_to_boto3_tag_list(to_update))
|
||||
changed = True
|
||||
except botocore.exceptions.ClientError as e:
|
||||
module.fail_json(msg="Couldn't add tags to parameter group: %s" % str(e),
|
||||
exception=traceback.format_exc(),
|
||||
**camel_dict_to_snake_dict(e.response))
|
||||
except botocore.exceptions.ParamValidationError as e:
|
||||
# Usually a tag value has been passed as an int or bool, needs to be a string
|
||||
# The AWS exception message is reasonably ok for this purpose
|
||||
module.fail_json(msg="Couldn't add tags to parameter group: %s." % str(e),
|
||||
exception=traceback.format_exc())
|
||||
if to_delete:
|
||||
try:
|
||||
connection.remove_tags_from_resource(ResourceName=group['DBParameterGroupArn'],
|
||||
TagKeys=to_delete)
|
||||
changed = True
|
||||
except botocore.exceptions.ClientError as e:
|
||||
module.fail_json(msg="Couldn't remove tags from parameter group: %s" % str(e),
|
||||
exception=traceback.format_exc(),
|
||||
**camel_dict_to_snake_dict(e.response))
|
||||
return changed
|
||||
|
||||
set_parameter(param, new_value, immediate)
|
||||
|
||||
del new_params[key]
|
||||
def ensure_present(module, connection):
|
||||
groupname = module.params['name']
|
||||
tags = module.params.get('tags')
|
||||
changed = False
|
||||
errors = []
|
||||
try:
|
||||
response = connection.describe_db_parameter_groups(DBParameterGroupName=groupname)
|
||||
except botocore.exceptions.ClientError as e:
|
||||
if e.response['Error']['Code'] == 'DBParameterGroupNotFound':
|
||||
response = None
|
||||
else:
|
||||
module.fail_json(msg="Couldn't access parameter group information: %s" % str(e),
|
||||
exception=traceback.format_exc(),
|
||||
**camel_dict_to_snake_dict(e.response))
|
||||
if not response:
|
||||
params = dict(DBParameterGroupName=groupname,
|
||||
DBParameterGroupFamily=module.params['engine'],
|
||||
Description=module.params['description'])
|
||||
if tags:
|
||||
params['Tags'] = ansible_dict_to_boto3_tag_list(tags)
|
||||
try:
|
||||
response = connection.create_db_parameter_group(**params)
|
||||
changed = True
|
||||
except botocore.exceptions.ClientError as e:
|
||||
module.fail_json(msg="Couldn't create parameter group: %s" % str(e),
|
||||
exception=traceback.format_exc(),
|
||||
**camel_dict_to_snake_dict(e.response))
|
||||
else:
|
||||
group = response['DBParameterGroups'][0]
|
||||
if tags:
|
||||
changed = update_tags(module, connection, group, tags)
|
||||
|
||||
return changed, new_params
|
||||
if module.params.get('params'):
|
||||
params_changed, errors = update_parameters(module, connection)
|
||||
changed = changed or params_changed
|
||||
|
||||
try:
|
||||
response = connection.describe_db_parameter_groups(DBParameterGroupName=groupname)
|
||||
group = camel_dict_to_snake_dict(response['DBParameterGroups'][0])
|
||||
except botocore.exceptions.ClientError as e:
|
||||
module.fail_json(msg="Couldn't obtain parameter group information: %s" % str(e),
|
||||
exception=traceback.format_exc(),
|
||||
**camel_dict_to_snake_dict(e.response))
|
||||
try:
|
||||
tags = connection.list_tags_for_resource(ResourceName=group['db_parameter_group_arn'])['TagList']
|
||||
except botocore.exceptions.ClientError as e:
|
||||
module.fail_json(msg="Couldn't obtain parameter group tags: %s" % str(e),
|
||||
exception=traceback.format_exc(),
|
||||
**camel_dict_to_snake_dict(e.response))
|
||||
group['tags'] = boto3_tag_list_to_ansible_dict(tags)
|
||||
|
||||
module.exit_json(changed=changed, errors=errors, **group)
|
||||
|
||||
|
||||
def ensure_absent(module, connection):
|
||||
group = module.params['name']
|
||||
try:
|
||||
response = connection.describe_db_parameter_groups(DBParameterGroupName=group)
|
||||
except botocore.exceptions.ClientError as e:
|
||||
if e.response['Error']['Code'] == 'DBParameterGroupNotFound':
|
||||
module.exit_json(changed=False)
|
||||
else:
|
||||
module.fail_json(msg="Couldn't access parameter group information: %s" % str(e),
|
||||
exception=traceback.format_exc(),
|
||||
**camel_dict_to_snake_dict(e.response))
|
||||
try:
|
||||
response = connection.delete_db_parameter_group(DBParameterGroupName=group)
|
||||
module.exit_json(changed=True)
|
||||
except botocore.exceptions.ClientError as e:
|
||||
module.fail_json(msg="Couldn't delete parameter group: %s" % str(e),
|
||||
exception=traceback.format_exc(),
|
||||
**camel_dict_to_snake_dict(e.response))
|
||||
|
||||
|
||||
def main():
|
||||
argument_spec = ec2_argument_spec()
|
||||
argument_spec.update(dict(
|
||||
state = dict(required=True, choices=['present', 'absent']),
|
||||
name = dict(required=True),
|
||||
engine = dict(required=False, choices=VALID_ENGINES),
|
||||
description = dict(required=False),
|
||||
params = dict(required=False, aliases=['parameters'], type='dict'),
|
||||
immediate = dict(required=False, type='bool'),
|
||||
argument_spec.update(
|
||||
dict(
|
||||
state=dict(required=True, choices=['present', 'absent']),
|
||||
name=dict(required=True),
|
||||
engine=dict(),
|
||||
description=dict(),
|
||||
params=dict(aliases=['parameters'], type='dict'),
|
||||
immediate=dict(type='bool', aliases=['apply_immediately']),
|
||||
tags=dict(type='dict', default={}),
|
||||
purge_tags=dict(type='bool', default=False)
|
||||
)
|
||||
)
|
||||
)
|
||||
module = AnsibleModule(argument_spec=argument_spec)
|
||||
module = AnsibleModule(argument_spec=argument_spec,
|
||||
required_if=[['state', 'present', ['description', 'engine']]])
|
||||
|
||||
if not HAS_BOTO:
|
||||
module.fail_json(msg='boto required for this module')
|
||||
|
||||
state = module.params.get('state')
|
||||
group_name = module.params.get('name').lower()
|
||||
group_engine = module.params.get('engine')
|
||||
group_description = module.params.get('description')
|
||||
group_params = module.params.get('params') or {}
|
||||
immediate = module.params.get('immediate') or False
|
||||
|
||||
if state == 'present':
|
||||
for required in ['name', 'description', 'engine']:
|
||||
if not module.params.get(required):
|
||||
module.fail_json(msg = str("Parameter %s required for state='present'" % required))
|
||||
else:
|
||||
for not_allowed in ['description', 'engine', 'params']:
|
||||
if module.params.get(not_allowed):
|
||||
module.fail_json(msg = str("Parameter %s not allowed for state='absent'" % not_allowed))
|
||||
if not HAS_BOTO3:
|
||||
module.fail_json(msg='boto3 and botocore are required for this module')
|
||||
|
||||
# Retrieve any AWS settings from the environment.
|
||||
region, ec2_url, aws_connect_kwargs = get_aws_connection_info(module)
|
||||
region, ec2_url, aws_connect_kwargs = get_aws_connection_info(module, boto3=True)
|
||||
|
||||
if not region:
|
||||
module.fail_json(msg = str("Either region or AWS_REGION or EC2_REGION environment variable or boto config aws_region or ec2_region must be set."))
|
||||
module.fail_json(msg="Region must be present")
|
||||
|
||||
try:
|
||||
conn = connect_to_aws(boto.rds, region, **aws_connect_kwargs)
|
||||
except boto.exception.BotoServerError as e:
|
||||
module.fail_json(msg = e.error_message)
|
||||
conn = boto3_conn(module, conn_type='client', resource='rds', region=region, endpoint=ec2_url, **aws_connect_kwargs)
|
||||
except botocore.exceptions.NoCredentialsError as e:
|
||||
module.fail_json(msg="Couldn't connect to AWS: %s" % str(e))
|
||||
|
||||
group_was_added = False
|
||||
|
||||
try:
|
||||
changed = False
|
||||
|
||||
try:
|
||||
all_groups = conn.get_all_dbparameter_groups(group_name, max_records=100)
|
||||
exists = len(all_groups) > 0
|
||||
except BotoServerError as e:
|
||||
if e.error_code != 'DBParameterGroupNotFound':
|
||||
module.fail_json(msg = e.error_message)
|
||||
exists = False
|
||||
|
||||
if state == 'absent':
|
||||
if exists:
|
||||
conn.delete_parameter_group(group_name)
|
||||
changed = True
|
||||
else:
|
||||
changed = {}
|
||||
if not exists:
|
||||
new_group = conn.create_parameter_group(group_name, engine=group_engine, description=group_description)
|
||||
group_was_added = True
|
||||
|
||||
# If a "Marker" is present, this group has more attributes remaining to check. Get the next batch, but only
|
||||
# if there are parameters left to set.
|
||||
marker = None
|
||||
while len(group_params):
|
||||
next_group = conn.get_all_dbparameters(group_name, marker=marker)
|
||||
|
||||
changed_params, group_params = modify_group(next_group, group_params, immediate)
|
||||
changed.update(changed_params)
|
||||
|
||||
if hasattr(next_group, 'Marker'):
|
||||
marker = next_group.Marker
|
||||
else:
|
||||
break
|
||||
|
||||
except BotoServerError as e:
|
||||
module.fail_json(msg = e.error_message)
|
||||
|
||||
except NotModifiableError as e:
|
||||
msg = e.error_message
|
||||
if group_was_added:
|
||||
msg = '%s The group "%s" was added first.' % (msg, group_name)
|
||||
module.fail_json(msg=msg)
|
||||
|
||||
module.exit_json(changed=changed)
|
||||
state = module.params.get('state')
|
||||
if state == 'present':
|
||||
ensure_present(module, conn)
|
||||
if state == 'absent':
|
||||
ensure_absent(module, conn)
|
||||
|
||||
|
||||
if __name__ == '__main__':
|
||||
main()
|
||||
|
||||
|
|
2
test/integration/targets/rds_param_group/aliases
Normal file
2
test/integration/targets/rds_param_group/aliases
Normal file
|
@ -0,0 +1,2 @@
|
|||
cloud/aws
|
||||
posix/ci/cloud/aws
|
30
test/integration/targets/rds_param_group/defaults/main.yml
Normal file
30
test/integration/targets/rds_param_group/defaults/main.yml
Normal file
|
@ -0,0 +1,30 @@
|
|||
---
|
||||
rds_param_group:
|
||||
name: "{{ resource_prefix}}rds-param-group"
|
||||
description: "Test group for rds_param_group Ansible module"
|
||||
engine: postgres9.6
|
||||
|
||||
rds_long_param_list:
|
||||
application_name: Test
|
||||
logging_collector: on
|
||||
log_directory: /var/log/postgresql
|
||||
log_filename: postgresql.log.%Y-%m-%d-%H
|
||||
log_file_mode: 0600
|
||||
event_source: RDS
|
||||
log_min_messages: INFO
|
||||
log_min_duration_statement: 500
|
||||
log_rotation_age: 60
|
||||
debug_print_parse: on
|
||||
debug_print_rewritten: on
|
||||
debug_print_plan: on
|
||||
debug_pretty_print: on
|
||||
log_checkpoints: on
|
||||
log_connections: on
|
||||
log_disconnections: on
|
||||
log_duration: on
|
||||
log_error_verbosity: VERBOSE
|
||||
log_lock_waits: on
|
||||
log_temp_files: 10K
|
||||
log_timezone: UTC
|
||||
log_statement: 'all'
|
||||
log_replication_commands: on
|
3
test/integration/targets/rds_param_group/meta/main.yml
Normal file
3
test/integration/targets/rds_param_group/meta/main.yml
Normal file
|
@ -0,0 +1,3 @@
|
|||
dependencies:
|
||||
- prepare_tests
|
||||
- setup_ec2
|
321
test/integration/targets/rds_param_group/tasks/main.yml
Normal file
321
test/integration/targets/rds_param_group/tasks/main.yml
Normal file
|
@ -0,0 +1,321 @@
|
|||
---
|
||||
# A Note about ec2 environment variable name preference:
|
||||
# - EC2_URL -> AWS_URL
|
||||
# - EC2_ACCESS_KEY -> AWS_ACCESS_KEY_ID -> AWS_ACCESS_KEY
|
||||
# - EC2_SECRET_KEY -> AWS_SECRET_ACCESS_KEY -> AWX_SECRET_KEY
|
||||
# - EC2_REGION -> AWS_REGION
|
||||
#
|
||||
# TODO - name: test 'region' parameter
|
||||
# TODO - name: test 'state=absent' parameter for existing key
|
||||
# TODO - name: test 'state=absent' parameter for missing key
|
||||
# TODO - name: test 'validate_certs' parameter
|
||||
|
||||
# ============================================================
|
||||
# - include: ../../setup_ec2/tasks/common.yml module_name=rds_param_group
|
||||
|
||||
- block:
|
||||
|
||||
# ============================================================
|
||||
- name: test empty parameter group
|
||||
rds_param_group:
|
||||
name: "{{ rds_param_group.name }}"
|
||||
engine: "{{ rds_param_group.engine }}"
|
||||
description: "{{ rds_param_group.description }}"
|
||||
state: present
|
||||
region: "{{ ec2_region }}"
|
||||
ec2_access_key: '{{ aws_access_key }}'
|
||||
ec2_secret_key: '{{ aws_secret_key }}'
|
||||
security_token: '{{ security_token }}'
|
||||
register: result
|
||||
ignore_errors: true
|
||||
|
||||
- name: assert rds parameter group changed
|
||||
assert:
|
||||
that:
|
||||
- 'result.changed'
|
||||
- "'{{ result.db_parameter_group_name | lower }}' == '{{ rds_param_group.name | lower }}'"
|
||||
- 'result.tags == {}'
|
||||
|
||||
# ============================================================
|
||||
- name: test empty parameter group with no arguments changes nothing
|
||||
rds_param_group:
|
||||
name: "{{ rds_param_group.name }}"
|
||||
engine: "{{ rds_param_group.engine }}"
|
||||
description: "{{ rds_param_group.description }}"
|
||||
state: present
|
||||
region: "{{ ec2_region }}"
|
||||
ec2_access_key: '{{ aws_access_key }}'
|
||||
ec2_secret_key: '{{ aws_secret_key }}'
|
||||
security_token: '{{ security_token }}'
|
||||
register: result
|
||||
ignore_errors: true
|
||||
|
||||
- name: assert no change when running empty parameter group a second time
|
||||
assert:
|
||||
that:
|
||||
- 'not result.changed'
|
||||
|
||||
# ============================================================
|
||||
- name: test adding numeric tag
|
||||
rds_param_group:
|
||||
name: "{{ rds_param_group.name }}"
|
||||
engine: "{{ rds_param_group.engine }}"
|
||||
description: "{{ rds_param_group.description }}"
|
||||
state: present
|
||||
tags:
|
||||
Environment: test
|
||||
Test: 123
|
||||
region: "{{ ec2_region }}"
|
||||
ec2_access_key: '{{ aws_access_key }}'
|
||||
ec2_secret_key: '{{ aws_secret_key }}'
|
||||
security_token: '{{ security_token }}'
|
||||
register: result
|
||||
ignore_errors: true
|
||||
|
||||
- name: adding numeric tag just silently converts
|
||||
assert:
|
||||
that:
|
||||
- 'result.changed'
|
||||
- 'result.tags.Test == "123"'
|
||||
|
||||
# ============================================================
|
||||
- name: test tagging existing group
|
||||
rds_param_group:
|
||||
name: "{{ rds_param_group.name }}"
|
||||
engine: "{{ rds_param_group.engine }}"
|
||||
description: "{{ rds_param_group.description }}"
|
||||
state: present
|
||||
tags:
|
||||
Environment: test
|
||||
Test: "123"
|
||||
NewTag: "hello"
|
||||
region: "{{ ec2_region }}"
|
||||
ec2_access_key: '{{ aws_access_key }}'
|
||||
ec2_secret_key: '{{ aws_secret_key }}'
|
||||
security_token: '{{ security_token }}'
|
||||
register: result
|
||||
ignore_errors: true
|
||||
|
||||
- name: assert tagging existing group changes it and adds tags
|
||||
assert:
|
||||
that:
|
||||
- 'result.changed'
|
||||
- 'result.tags.NewTag == "hello"'
|
||||
|
||||
# ============================================================
|
||||
- name: test repeating tagging existing group
|
||||
rds_param_group:
|
||||
name: "{{ rds_param_group.name }}"
|
||||
engine: "{{ rds_param_group.engine }}"
|
||||
description: "{{ rds_param_group.description }}"
|
||||
state: present
|
||||
tags:
|
||||
Environment: test
|
||||
Test: "123"
|
||||
NewTag: "hello"
|
||||
region: "{{ ec2_region }}"
|
||||
ec2_access_key: '{{ aws_access_key }}'
|
||||
ec2_secret_key: '{{ aws_secret_key }}'
|
||||
security_token: '{{ security_token }}'
|
||||
register: result
|
||||
ignore_errors: true
|
||||
|
||||
- name: assert tagging existing group changes it and adds tags
|
||||
assert:
|
||||
that:
|
||||
- 'not result.changed'
|
||||
- 'result.tags.Test == "123"'
|
||||
|
||||
# ============================================================
|
||||
- name: test deleting tags from existing group
|
||||
rds_param_group:
|
||||
name: "{{ rds_param_group.name }}"
|
||||
engine: "{{ rds_param_group.engine }}"
|
||||
description: "{{ rds_param_group.description }}"
|
||||
state: present
|
||||
tags:
|
||||
Environment: test
|
||||
region: "{{ ec2_region }}"
|
||||
ec2_access_key: '{{ aws_access_key }}'
|
||||
ec2_secret_key: '{{ aws_secret_key }}'
|
||||
security_token: '{{ security_token }}'
|
||||
purge_tags: yes
|
||||
register: result
|
||||
ignore_errors: true
|
||||
|
||||
- name: assert removing tags from existing group changes it
|
||||
assert:
|
||||
that:
|
||||
- 'result.changed'
|
||||
- 'result.tags.Environment == "test"'
|
||||
- '"NewTag" not in result.tags'
|
||||
|
||||
# ============================================================
|
||||
- name: test state=absent with engine defined (expect changed=true)
|
||||
rds_param_group:
|
||||
name: "{{ rds_param_group.name }}"
|
||||
engine: "{{ rds_param_group.engine }}"
|
||||
state: absent
|
||||
region: "{{ ec2_region }}"
|
||||
ec2_access_key: '{{ aws_access_key }}'
|
||||
ec2_secret_key: '{{ aws_secret_key }}'
|
||||
security_token: '{{ security_token }}'
|
||||
register: result
|
||||
ignore_errors: true
|
||||
|
||||
- name: assert state=absent with engine defined (expect changed=true)
|
||||
assert:
|
||||
that:
|
||||
- 'result.changed'
|
||||
|
||||
# ============================================================
|
||||
- name: test creating group with parameters
|
||||
rds_param_group:
|
||||
name: "{{ rds_param_group.name }}"
|
||||
engine: "{{ rds_param_group.engine }}"
|
||||
description: "{{ rds_param_group.description }}"
|
||||
state: present
|
||||
params:
|
||||
log_directory: /var/log/postgresql
|
||||
log_statement: 'all'
|
||||
log_duration: on
|
||||
this_param_does_not_exist: oh_no
|
||||
tags:
|
||||
Environment: test
|
||||
Test: "123"
|
||||
region: "{{ ec2_region }}"
|
||||
ec2_access_key: '{{ aws_access_key }}'
|
||||
ec2_secret_key: '{{ aws_secret_key }}'
|
||||
security_token: '{{ security_token }}'
|
||||
register: result
|
||||
ignore_errors: true
|
||||
|
||||
- name: assert creating a new group with parameter changes it
|
||||
assert:
|
||||
that:
|
||||
- 'result.changed'
|
||||
- 'result.tags.Test == "123"'
|
||||
- 'result.errors|length == 2'
|
||||
|
||||
# ============================================================
|
||||
- name: test repeating group with parameters
|
||||
rds_param_group:
|
||||
name: "{{ rds_param_group.name }}"
|
||||
engine: "{{ rds_param_group.engine }}"
|
||||
description: "{{ rds_param_group.description }}"
|
||||
state: present
|
||||
params:
|
||||
log_directory: /var/log/postgresql
|
||||
log_statement: 'all'
|
||||
log_duration: on
|
||||
this_param_does_not_exist: oh_no
|
||||
tags:
|
||||
Environment: test
|
||||
Test: "123"
|
||||
region: "{{ ec2_region }}"
|
||||
ec2_access_key: '{{ aws_access_key }}'
|
||||
ec2_secret_key: '{{ aws_secret_key }}'
|
||||
security_token: '{{ security_token }}'
|
||||
register: result
|
||||
ignore_errors: true
|
||||
|
||||
- name: assert repeating group with parameters does not change it
|
||||
assert:
|
||||
that:
|
||||
- 'not result.changed'
|
||||
- 'result.tags.Test == "123"'
|
||||
- 'result.errors|length == 2'
|
||||
|
||||
# ============================================================
|
||||
- name: test state=absent with engine defined (expect changed=true)
|
||||
rds_param_group:
|
||||
name: "{{ rds_param_group.name }}"
|
||||
engine: "{{ rds_param_group.engine }}"
|
||||
state: absent
|
||||
region: "{{ ec2_region }}"
|
||||
ec2_access_key: '{{ aws_access_key }}'
|
||||
ec2_secret_key: '{{ aws_secret_key }}'
|
||||
security_token: '{{ security_token }}'
|
||||
register: result
|
||||
ignore_errors: true
|
||||
|
||||
- name: assert state=absent with engine defined (expect changed=true)
|
||||
assert:
|
||||
that:
|
||||
- 'result.changed'
|
||||
|
||||
# ============================================================
|
||||
- name: test repeating state=absent (expect changed=false)
|
||||
rds_param_group:
|
||||
name: "{{ rds_param_group.name }}"
|
||||
engine: "{{ rds_param_group.engine }}"
|
||||
state: absent
|
||||
region: "{{ ec2_region }}"
|
||||
ec2_access_key: '{{ aws_access_key }}'
|
||||
ec2_secret_key: '{{ aws_secret_key }}'
|
||||
security_token: '{{ security_token }}'
|
||||
register: result
|
||||
ignore_errors: true
|
||||
|
||||
- name: assert repeating state=absent (expect changed=false)
|
||||
assert:
|
||||
that:
|
||||
- 'not result.changed'
|
||||
|
||||
# ============================================================
|
||||
- name: test creating group with more than 20 parameters
|
||||
rds_param_group:
|
||||
name: "{{ rds_param_group.name }}"
|
||||
engine: "{{ rds_param_group.engine }}"
|
||||
description: "{{ rds_param_group.description }}"
|
||||
params: "{{ rds_long_param_list }}"
|
||||
state: present
|
||||
region: "{{ ec2_region }}"
|
||||
ec2_access_key: '{{ aws_access_key }}'
|
||||
ec2_secret_key: '{{ aws_secret_key }}'
|
||||
security_token: '{{ security_token }}'
|
||||
register: result
|
||||
ignore_errors: true
|
||||
|
||||
- name: assert creating a new group with lots of parameter changes it
|
||||
assert:
|
||||
that:
|
||||
- 'result.changed'
|
||||
|
||||
# ============================================================
|
||||
- name: test creating group with more than 20 parameters
|
||||
rds_param_group:
|
||||
name: "{{ rds_param_group.name }}"
|
||||
engine: "{{ rds_param_group.engine }}"
|
||||
description: "{{ rds_param_group.description }}"
|
||||
params: "{{ rds_long_param_list }}"
|
||||
region: "{{ ec2_region }}"
|
||||
state: present
|
||||
ec2_access_key: '{{ aws_access_key }}'
|
||||
ec2_secret_key: '{{ aws_secret_key }}'
|
||||
security_token: '{{ security_token }}'
|
||||
register: result
|
||||
ignore_errors: true
|
||||
|
||||
- name: assert repeating a group with lots of parameter does not change it
|
||||
assert:
|
||||
that:
|
||||
- 'not result.changed'
|
||||
|
||||
always:
|
||||
# ============================================================
|
||||
- name: test state=absent (expect changed=false)
|
||||
rds_param_group:
|
||||
name: "{{ rds_param_group.name }}"
|
||||
state: absent
|
||||
region: "{{ ec2_region }}"
|
||||
ec2_access_key: '{{ aws_access_key }}'
|
||||
ec2_secret_key: '{{ aws_secret_key }}'
|
||||
security_token: '{{ security_token }}'
|
||||
register: result
|
||||
ignore_errors: true
|
||||
|
||||
- name: assert state=absent (expect changed=false)
|
||||
assert:
|
||||
that:
|
||||
- 'result.changed'
|
|
@ -53,7 +53,6 @@ lib/ansible/modules/cloud/amazon/iam.py
|
|||
lib/ansible/modules/cloud/amazon/iam_policy.py
|
||||
lib/ansible/modules/cloud/amazon/lambda.py
|
||||
lib/ansible/modules/cloud/amazon/lambda_facts.py
|
||||
lib/ansible/modules/cloud/amazon/rds_param_group.py
|
||||
lib/ansible/modules/cloud/amazon/rds_subnet_group.py
|
||||
lib/ansible/modules/cloud/amazon/redshift.py
|
||||
lib/ansible/modules/cloud/amazon/route53_health_check.py
|
||||
|
|
Loading…
Reference in a new issue