1
0
Fork 0
mirror of https://github.com/ansible-collections/community.general.git synced 2024-09-14 20:13:21 +02:00

Fix FQCRs. (#64)

This commit is contained in:
Felix Fontein 2020-03-29 13:02:28 +02:00 committed by GitHub
parent 3c4e98cce2
commit 6ab9f071c6
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23
11 changed files with 19 additions and 19 deletions

View file

@ -3,4 +3,4 @@ docker-pipelining ansible_ssh_pipelining=true
docker-no-pipelining ansible_ssh_pipelining=false
[docker:vars]
ansible_host=ubuntu-latest
ansible_connection=docker
ansible_connection=community.general.docker

View file

@ -3,5 +3,5 @@ jail-pipelining ansible_ssh_pipelining=true
jail-no-pipelining ansible_ssh_pipelining=false
[jail:vars]
ansible_host=freebsd_10_2
ansible_connection=jail
ansible_connection=community.general.jail
ansible_python_interpreter=/usr/local/bin/python

View file

@ -3,4 +3,4 @@ libvirt_lxc-pipelining ansible_ssh_pipelining=true
libvirt_lxc-no-pipelining ansible_ssh_pipelining=false
[libvirt_lxc:vars]
ansible_host=lv-ubuntu-wily-amd64
ansible_connection=libvirt_lxc
ansible_connection=community.general.libvirt_lxc

View file

@ -14,4 +14,4 @@ lxc-no-pipelining ansible_ssh_pipelining=false
# 6. stop container
# $ sudo lxc-stop -n centos-7-amd64
ansible_host=centos-7-amd64
ansible_connection=lxc
ansible_connection=community.general.lxc

View file

@ -3,4 +3,4 @@ lxd-pipelining ansible_ssh_pipelining=true
lxd-no-pipelining ansible_ssh_pipelining=false
[lxd:vars]
ansible_host=centos-7-amd64
ansible_connection=lxd
ansible_connection=community.general.lxd

View file

@ -8,7 +8,7 @@
register: server_list
- name: Remove all servers created by this test run
cloudscale_server:
community.general.cloudscale_server:
uuid: '{{ item.uuid }}'
state: 'absent'
when: cloudscale_resource_prefix in item.name

View file

@ -1,6 +1,6 @@
---
- name: Create server with public network only
cloudscale_server:
community.general.cloudscale_server:
name: '{{ cloudscale_resource_prefix }}-inventory-public'
flavor: '{{ cloudscale_test_flavor }}'
image: '{{ cloudscale_test_image }}'
@ -10,7 +10,7 @@
register: server_public
- name: Create server with private network only
cloudscale_server:
community.general.cloudscale_server:
name: '{{ cloudscale_resource_prefix }}-inventory-private'
flavor: '{{ cloudscale_test_flavor }}'
image: '{{ cloudscale_alt_test_image }}'
@ -20,7 +20,7 @@
register: server_private
- name: Create server with public and private network
cloudscale_server:
community.general.cloudscale_server:
name: '{{ cloudscale_resource_prefix }}-inventory-public-private'
flavor: '{{ cloudscale_test_flavor }}'
image: '{{ cloudscale_test_image }}'
@ -49,7 +49,7 @@
with_sequence: count=2
- name: Create server with different prefix
cloudscale_server:
community.general.cloudscale_server:
name: 'other-prefix-{{ cloudscale_resource_prefix }}-inventory'
flavor: '{{ cloudscale_test_flavor }}'
image: '{{ cloudscale_test_image }}'
@ -61,14 +61,14 @@
# it afterwards (which is possible). The resaon for this restriction is
# that on creation a PTR entry for the server is created.
- name: Create server to be renamed with unsafe characters
cloudscale_server:
community.general.cloudscale_server:
name: '{{ cloudscale_resource_prefix }}-unsafe-chars'
flavor: '{{ cloudscale_test_flavor }}'
image: '{{ cloudscale_test_image }}'
ssh_keys: '{{ cloudscale_test_ssh_key }}'
register: server_unsafe_chars
- name: Rename server to contain unsafe characters
cloudscale_server:
community.general.cloudscale_server:
uuid: '{{ server_unsafe_chars.uuid }}'
name: '{{ cloudscale_resource_prefix }}-snowmans-are-cool-☃!'
register: server_unsafe_chars

View file

@ -10,6 +10,6 @@
name: setup_docker
- name: Create a Swarm cluster
docker_swarm:
community.general.docker_swarm:
state: present
advertise_addr: "{{ansible_default_ipv4.address | default('127.0.0.1')}}"

View file

@ -5,7 +5,7 @@
- name: 'Fetch secrets using "hashi_vault" lookup'
set_fact:
secret1: "{{ lookup('community.general.hashi_vault', conn_params ~ 'secret=' ~ vault_kv2_path ~ '/secret1 auth_method=approle secret_id=' ~ secret_id ~ ' role_id=' ~ role_id) }}"
secret2: "{{ lookup('hashi_vault', conn_params ~ 'secret=' ~ vault_kv2_path ~ '/secret2 auth_method=approle secret_id=' ~ secret_id ~ ' role_id=' ~ role_id) }}"
secret2: "{{ lookup('community.general.hashi_vault', conn_params ~ 'secret=' ~ vault_kv2_path ~ '/secret2 auth_method=approle secret_id=' ~ secret_id ~ ' role_id=' ~ role_id) }}"
- name: 'Check secret values'
fail:

View file

@ -1,14 +1,14 @@
- hosts: localhost
tasks:
- debug:
msg: '{{ query(''lmdb_kv'', ''nl'', ''be'', ''lu'', db=''jp.mdb'') }}'
msg: '{{ query(''community.general.lmdb_kv'', ''nl'', ''be'', ''lu'', db=''jp.mdb'') }}'
- debug:
var: item.1
loop: '{{ query(''community.general.lmdb_kv'', db=''jp.mdb'') }}'
- assert:
that:
- query('lmdb_kv', 'nl', 'be', 'lu', db='jp.mdb') == ['Netherlands', 'Belgium', 'Luxembourg']
- query('lmdb_kv', db='jp.mdb')|length == 5
- query('community.general.lmdb_kv', 'nl', 'be', 'lu', db='jp.mdb') == ['Netherlands', 'Belgium', 'Luxembourg']
- query('community.general.lmdb_kv', db='jp.mdb')|length == 5
- assert:
that:
- item.0 == 'nl'

View file

@ -50,11 +50,11 @@
- name: Create a password with equal sign
set_fact:
newpass: "{{ lookup('passwordstore', 'test-pass-equal userpass=SimpleSample= create=yes') }}"
newpass: "{{ lookup('community.general.passwordstore', 'test-pass-equal userpass=SimpleSample= create=yes') }}"
- name: Fetch a password with equal sign
set_fact:
readpass: "{{ lookup('passwordstore', 'test-pass-equal') }}"
readpass: "{{ lookup('community.general.passwordstore', 'test-pass-equal') }}"
- name: Verify password
assert: