mirror of
https://github.com/ansible-collections/community.general.git
synced 2024-09-14 20:13:21 +02:00
Fix FQCRs. (#64)
This commit is contained in:
parent
3c4e98cce2
commit
6ab9f071c6
11 changed files with 19 additions and 19 deletions
|
@ -3,4 +3,4 @@ docker-pipelining ansible_ssh_pipelining=true
|
||||||
docker-no-pipelining ansible_ssh_pipelining=false
|
docker-no-pipelining ansible_ssh_pipelining=false
|
||||||
[docker:vars]
|
[docker:vars]
|
||||||
ansible_host=ubuntu-latest
|
ansible_host=ubuntu-latest
|
||||||
ansible_connection=docker
|
ansible_connection=community.general.docker
|
||||||
|
|
|
@ -3,5 +3,5 @@ jail-pipelining ansible_ssh_pipelining=true
|
||||||
jail-no-pipelining ansible_ssh_pipelining=false
|
jail-no-pipelining ansible_ssh_pipelining=false
|
||||||
[jail:vars]
|
[jail:vars]
|
||||||
ansible_host=freebsd_10_2
|
ansible_host=freebsd_10_2
|
||||||
ansible_connection=jail
|
ansible_connection=community.general.jail
|
||||||
ansible_python_interpreter=/usr/local/bin/python
|
ansible_python_interpreter=/usr/local/bin/python
|
||||||
|
|
|
@ -3,4 +3,4 @@ libvirt_lxc-pipelining ansible_ssh_pipelining=true
|
||||||
libvirt_lxc-no-pipelining ansible_ssh_pipelining=false
|
libvirt_lxc-no-pipelining ansible_ssh_pipelining=false
|
||||||
[libvirt_lxc:vars]
|
[libvirt_lxc:vars]
|
||||||
ansible_host=lv-ubuntu-wily-amd64
|
ansible_host=lv-ubuntu-wily-amd64
|
||||||
ansible_connection=libvirt_lxc
|
ansible_connection=community.general.libvirt_lxc
|
||||||
|
|
|
@ -14,4 +14,4 @@ lxc-no-pipelining ansible_ssh_pipelining=false
|
||||||
# 6. stop container
|
# 6. stop container
|
||||||
# $ sudo lxc-stop -n centos-7-amd64
|
# $ sudo lxc-stop -n centos-7-amd64
|
||||||
ansible_host=centos-7-amd64
|
ansible_host=centos-7-amd64
|
||||||
ansible_connection=lxc
|
ansible_connection=community.general.lxc
|
||||||
|
|
|
@ -3,4 +3,4 @@ lxd-pipelining ansible_ssh_pipelining=true
|
||||||
lxd-no-pipelining ansible_ssh_pipelining=false
|
lxd-no-pipelining ansible_ssh_pipelining=false
|
||||||
[lxd:vars]
|
[lxd:vars]
|
||||||
ansible_host=centos-7-amd64
|
ansible_host=centos-7-amd64
|
||||||
ansible_connection=lxd
|
ansible_connection=community.general.lxd
|
||||||
|
|
|
@ -8,7 +8,7 @@
|
||||||
register: server_list
|
register: server_list
|
||||||
|
|
||||||
- name: Remove all servers created by this test run
|
- name: Remove all servers created by this test run
|
||||||
cloudscale_server:
|
community.general.cloudscale_server:
|
||||||
uuid: '{{ item.uuid }}'
|
uuid: '{{ item.uuid }}'
|
||||||
state: 'absent'
|
state: 'absent'
|
||||||
when: cloudscale_resource_prefix in item.name
|
when: cloudscale_resource_prefix in item.name
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
---
|
---
|
||||||
- name: Create server with public network only
|
- name: Create server with public network only
|
||||||
cloudscale_server:
|
community.general.cloudscale_server:
|
||||||
name: '{{ cloudscale_resource_prefix }}-inventory-public'
|
name: '{{ cloudscale_resource_prefix }}-inventory-public'
|
||||||
flavor: '{{ cloudscale_test_flavor }}'
|
flavor: '{{ cloudscale_test_flavor }}'
|
||||||
image: '{{ cloudscale_test_image }}'
|
image: '{{ cloudscale_test_image }}'
|
||||||
|
@ -10,7 +10,7 @@
|
||||||
register: server_public
|
register: server_public
|
||||||
|
|
||||||
- name: Create server with private network only
|
- name: Create server with private network only
|
||||||
cloudscale_server:
|
community.general.cloudscale_server:
|
||||||
name: '{{ cloudscale_resource_prefix }}-inventory-private'
|
name: '{{ cloudscale_resource_prefix }}-inventory-private'
|
||||||
flavor: '{{ cloudscale_test_flavor }}'
|
flavor: '{{ cloudscale_test_flavor }}'
|
||||||
image: '{{ cloudscale_alt_test_image }}'
|
image: '{{ cloudscale_alt_test_image }}'
|
||||||
|
@ -20,7 +20,7 @@
|
||||||
register: server_private
|
register: server_private
|
||||||
|
|
||||||
- name: Create server with public and private network
|
- name: Create server with public and private network
|
||||||
cloudscale_server:
|
community.general.cloudscale_server:
|
||||||
name: '{{ cloudscale_resource_prefix }}-inventory-public-private'
|
name: '{{ cloudscale_resource_prefix }}-inventory-public-private'
|
||||||
flavor: '{{ cloudscale_test_flavor }}'
|
flavor: '{{ cloudscale_test_flavor }}'
|
||||||
image: '{{ cloudscale_test_image }}'
|
image: '{{ cloudscale_test_image }}'
|
||||||
|
@ -49,7 +49,7 @@
|
||||||
with_sequence: count=2
|
with_sequence: count=2
|
||||||
|
|
||||||
- name: Create server with different prefix
|
- name: Create server with different prefix
|
||||||
cloudscale_server:
|
community.general.cloudscale_server:
|
||||||
name: 'other-prefix-{{ cloudscale_resource_prefix }}-inventory'
|
name: 'other-prefix-{{ cloudscale_resource_prefix }}-inventory'
|
||||||
flavor: '{{ cloudscale_test_flavor }}'
|
flavor: '{{ cloudscale_test_flavor }}'
|
||||||
image: '{{ cloudscale_test_image }}'
|
image: '{{ cloudscale_test_image }}'
|
||||||
|
@ -61,14 +61,14 @@
|
||||||
# it afterwards (which is possible). The resaon for this restriction is
|
# it afterwards (which is possible). The resaon for this restriction is
|
||||||
# that on creation a PTR entry for the server is created.
|
# that on creation a PTR entry for the server is created.
|
||||||
- name: Create server to be renamed with unsafe characters
|
- name: Create server to be renamed with unsafe characters
|
||||||
cloudscale_server:
|
community.general.cloudscale_server:
|
||||||
name: '{{ cloudscale_resource_prefix }}-unsafe-chars'
|
name: '{{ cloudscale_resource_prefix }}-unsafe-chars'
|
||||||
flavor: '{{ cloudscale_test_flavor }}'
|
flavor: '{{ cloudscale_test_flavor }}'
|
||||||
image: '{{ cloudscale_test_image }}'
|
image: '{{ cloudscale_test_image }}'
|
||||||
ssh_keys: '{{ cloudscale_test_ssh_key }}'
|
ssh_keys: '{{ cloudscale_test_ssh_key }}'
|
||||||
register: server_unsafe_chars
|
register: server_unsafe_chars
|
||||||
- name: Rename server to contain unsafe characters
|
- name: Rename server to contain unsafe characters
|
||||||
cloudscale_server:
|
community.general.cloudscale_server:
|
||||||
uuid: '{{ server_unsafe_chars.uuid }}'
|
uuid: '{{ server_unsafe_chars.uuid }}'
|
||||||
name: '{{ cloudscale_resource_prefix }}-snowmans-are-cool-☃!'
|
name: '{{ cloudscale_resource_prefix }}-snowmans-are-cool-☃!'
|
||||||
register: server_unsafe_chars
|
register: server_unsafe_chars
|
||||||
|
|
|
@ -10,6 +10,6 @@
|
||||||
name: setup_docker
|
name: setup_docker
|
||||||
|
|
||||||
- name: Create a Swarm cluster
|
- name: Create a Swarm cluster
|
||||||
docker_swarm:
|
community.general.docker_swarm:
|
||||||
state: present
|
state: present
|
||||||
advertise_addr: "{{ansible_default_ipv4.address | default('127.0.0.1')}}"
|
advertise_addr: "{{ansible_default_ipv4.address | default('127.0.0.1')}}"
|
||||||
|
|
|
@ -5,7 +5,7 @@
|
||||||
- name: 'Fetch secrets using "hashi_vault" lookup'
|
- name: 'Fetch secrets using "hashi_vault" lookup'
|
||||||
set_fact:
|
set_fact:
|
||||||
secret1: "{{ lookup('community.general.hashi_vault', conn_params ~ 'secret=' ~ vault_kv2_path ~ '/secret1 auth_method=approle secret_id=' ~ secret_id ~ ' role_id=' ~ role_id) }}"
|
secret1: "{{ lookup('community.general.hashi_vault', conn_params ~ 'secret=' ~ vault_kv2_path ~ '/secret1 auth_method=approle secret_id=' ~ secret_id ~ ' role_id=' ~ role_id) }}"
|
||||||
secret2: "{{ lookup('hashi_vault', conn_params ~ 'secret=' ~ vault_kv2_path ~ '/secret2 auth_method=approle secret_id=' ~ secret_id ~ ' role_id=' ~ role_id) }}"
|
secret2: "{{ lookup('community.general.hashi_vault', conn_params ~ 'secret=' ~ vault_kv2_path ~ '/secret2 auth_method=approle secret_id=' ~ secret_id ~ ' role_id=' ~ role_id) }}"
|
||||||
|
|
||||||
- name: 'Check secret values'
|
- name: 'Check secret values'
|
||||||
fail:
|
fail:
|
||||||
|
|
|
@ -1,14 +1,14 @@
|
||||||
- hosts: localhost
|
- hosts: localhost
|
||||||
tasks:
|
tasks:
|
||||||
- debug:
|
- debug:
|
||||||
msg: '{{ query(''lmdb_kv'', ''nl'', ''be'', ''lu'', db=''jp.mdb'') }}'
|
msg: '{{ query(''community.general.lmdb_kv'', ''nl'', ''be'', ''lu'', db=''jp.mdb'') }}'
|
||||||
- debug:
|
- debug:
|
||||||
var: item.1
|
var: item.1
|
||||||
loop: '{{ query(''community.general.lmdb_kv'', db=''jp.mdb'') }}'
|
loop: '{{ query(''community.general.lmdb_kv'', db=''jp.mdb'') }}'
|
||||||
- assert:
|
- assert:
|
||||||
that:
|
that:
|
||||||
- query('lmdb_kv', 'nl', 'be', 'lu', db='jp.mdb') == ['Netherlands', 'Belgium', 'Luxembourg']
|
- query('community.general.lmdb_kv', 'nl', 'be', 'lu', db='jp.mdb') == ['Netherlands', 'Belgium', 'Luxembourg']
|
||||||
- query('lmdb_kv', db='jp.mdb')|length == 5
|
- query('community.general.lmdb_kv', db='jp.mdb')|length == 5
|
||||||
- assert:
|
- assert:
|
||||||
that:
|
that:
|
||||||
- item.0 == 'nl'
|
- item.0 == 'nl'
|
||||||
|
|
|
@ -50,11 +50,11 @@
|
||||||
|
|
||||||
- name: Create a password with equal sign
|
- name: Create a password with equal sign
|
||||||
set_fact:
|
set_fact:
|
||||||
newpass: "{{ lookup('passwordstore', 'test-pass-equal userpass=SimpleSample= create=yes') }}"
|
newpass: "{{ lookup('community.general.passwordstore', 'test-pass-equal userpass=SimpleSample= create=yes') }}"
|
||||||
|
|
||||||
- name: Fetch a password with equal sign
|
- name: Fetch a password with equal sign
|
||||||
set_fact:
|
set_fact:
|
||||||
readpass: "{{ lookup('passwordstore', 'test-pass-equal') }}"
|
readpass: "{{ lookup('community.general.passwordstore', 'test-pass-equal') }}"
|
||||||
|
|
||||||
- name: Verify password
|
- name: Verify password
|
||||||
assert:
|
assert:
|
||||||
|
|
Loading…
Reference in a new issue