mirror of
https://github.com/ansible-collections/community.general.git
synced 2024-09-14 20:13:21 +02:00
107ae1a4f3
* improve vmss test * fix lint * fix lint * fix lint * fix test bug
392 lines
11 KiB
YAML
392 lines
11 KiB
YAML
- name: Prepare random number
|
|
set_fact:
|
|
rpfx: "{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}"
|
|
run_once: yes
|
|
|
|
- name: Create virtual network
|
|
azure_rm_virtualnetwork:
|
|
resource_group: "{{ resource_group }}"
|
|
name: testVnet
|
|
address_prefixes: "10.0.0.0/16"
|
|
|
|
- name: Add subnet
|
|
azure_rm_subnet:
|
|
resource_group: "{{ resource_group }}"
|
|
name: testSubnet
|
|
address_prefix: "10.0.1.0/24"
|
|
virtual_network: testVnet
|
|
|
|
- name: Create public IP address
|
|
azure_rm_publicipaddress:
|
|
resource_group: "{{ resource_group }}"
|
|
allocation_method: Static
|
|
name: testPublicIP
|
|
|
|
- name: Create load balancer
|
|
azure_rm_loadbalancer:
|
|
resource_group: "{{ resource_group }}"
|
|
name: testLB
|
|
public_ip_address_name: testPublicIP
|
|
|
|
- name: Create network security group within same resource group of VMSS.
|
|
azure_rm_securitygroup:
|
|
resource_group: "{{ resource_group }}"
|
|
name: testNetworkSecurityGroup
|
|
|
|
- name: Create network security group in different resource group of VMSS.
|
|
azure_rm_securitygroup:
|
|
resource_group: "{{ resource_group_secondary }}"
|
|
name: testNetworkSecurityGroup2
|
|
|
|
- name: Create VMSS (check mode)
|
|
azure_rm_virtualmachine_scaleset:
|
|
resource_group: "{{ resource_group }}"
|
|
name: testVMSS{{ rpfx }}
|
|
vm_size: Standard_DS1_v2
|
|
admin_username: testuser
|
|
ssh_password_enabled: true
|
|
admin_password: "Password1234!"
|
|
capacity: 2
|
|
virtual_network_name: testVnet
|
|
subnet_name: testSubnet
|
|
load_balancer: testLB
|
|
upgrade_policy: Manual
|
|
tier: Standard
|
|
managed_disk_type: Standard_LRS
|
|
os_disk_caching: ReadWrite
|
|
image:
|
|
offer: CoreOS
|
|
publisher: CoreOS
|
|
sku: Stable
|
|
version: latest
|
|
data_disks:
|
|
- lun: 0
|
|
disk_size_gb: 64
|
|
caching: ReadWrite
|
|
managed_disk_type: Standard_LRS
|
|
register: results
|
|
check_mode: yes
|
|
|
|
- name: Assert that VMSS can be created
|
|
assert:
|
|
that: results.changed
|
|
|
|
- name: Get VMSS to assert no VMSS is created in check mode
|
|
azure_rm_virtualmachine_scaleset_facts:
|
|
resource_group: "{{ resource_group }}"
|
|
name: testVMSS{{ rpfx }}
|
|
format: curated
|
|
register: output_scaleset
|
|
|
|
- name: Assert no VMSS created in check mode
|
|
assert:
|
|
that:
|
|
- output_scaleset.ansible_facts.azure_vmss | length == 0
|
|
|
|
- name: Create VMSS
|
|
azure_rm_virtualmachine_scaleset:
|
|
resource_group: "{{ resource_group }}"
|
|
name: testVMSS{{ rpfx }}
|
|
vm_size: Standard_DS1_v2
|
|
admin_username: testuser
|
|
ssh_password_enabled: true
|
|
admin_password: "Password1234!"
|
|
capacity: 2
|
|
virtual_network_name: testVnet
|
|
subnet_name: testSubnet
|
|
upgrade_policy: Manual
|
|
tier: Standard
|
|
managed_disk_type: Standard_LRS
|
|
os_disk_caching: ReadWrite
|
|
image:
|
|
offer: CoreOS
|
|
publisher: CoreOS
|
|
sku: Stable
|
|
version: latest
|
|
data_disks:
|
|
- lun: 0
|
|
disk_size_gb: 64
|
|
caching: ReadWrite
|
|
managed_disk_type: Standard_LRS
|
|
register: results
|
|
|
|
- name: Assert that VMSS was created
|
|
assert:
|
|
that: results.changed
|
|
|
|
- name: Create VMSS -- test upgrade_policy idempotence
|
|
azure_rm_virtualmachine_scaleset:
|
|
resource_group: "{{ resource_group }}"
|
|
name: testVMSS{{ rpfx }}
|
|
vm_size: Standard_DS1_v2
|
|
admin_username: testuser
|
|
ssh_password_enabled: true
|
|
admin_password: "Password1234!"
|
|
capacity: 2
|
|
virtual_network_name: testVnet
|
|
subnet_name: testSubnet
|
|
upgrade_policy: Automatic
|
|
tier: Standard
|
|
managed_disk_type: Standard_LRS
|
|
os_disk_caching: ReadWrite
|
|
image:
|
|
offer: CoreOS
|
|
publisher: CoreOS
|
|
sku: Stable
|
|
version: latest
|
|
data_disks:
|
|
- lun: 0
|
|
disk_size_gb: 64
|
|
caching: ReadWrite
|
|
managed_disk_type: Standard_LRS
|
|
check_mode: yes
|
|
register: results
|
|
|
|
- name: Assert that VMSS was created
|
|
assert:
|
|
that: results.changed
|
|
|
|
- name: Retrieve scaleset facts
|
|
azure_rm_virtualmachine_scaleset_facts:
|
|
resource_group: "{{ resource_group }}"
|
|
name: testVMSS{{ rpfx }}
|
|
format: curated
|
|
register: output_scaleset
|
|
|
|
- name: Get scaleset body
|
|
set_fact:
|
|
body: "{{ output_scaleset.vmss[0] }}"
|
|
|
|
- name: Try to update VMSS using output as input
|
|
azure_rm_virtualmachine_scaleset:
|
|
resource_group: "{{ body.resource_group }}"
|
|
name: "{{ body.name }}"
|
|
vm_size: "{{ body.vm_size }}"
|
|
admin_username: "{{ body.admin_username }}"
|
|
ssh_password_enabled: "{{ body.ssh_password_enabled }}"
|
|
admin_password: "Password1234!"
|
|
capacity: "{{ body.capacity }}"
|
|
virtual_network_name: "{{ body.virtual_network_name }}"
|
|
subnet_name: "{{ body.subnet_name }}"
|
|
upgrade_policy: "{{ body.upgrade_policy }}"
|
|
tier: "{{ body.tier }}"
|
|
managed_disk_type: "{{ body.managed_disk_type }}"
|
|
os_disk_caching: "{{ body.os_disk_caching }}"
|
|
image: "{{ body.image }}"
|
|
data_disks: "{{ body.data_disks }}"
|
|
register: results
|
|
|
|
- name: Assert that VMSS was updated
|
|
assert:
|
|
that: not results.changed
|
|
|
|
- name: Delete VMSS
|
|
azure_rm_virtualmachine_scaleset:
|
|
resource_group: "{{ resource_group }}"
|
|
name: testVMSS{{ rpfx }}1
|
|
state: absent
|
|
remove_on_absent: ['all']
|
|
vm_size: Standard_DS1_v2
|
|
capacity: 2
|
|
image:
|
|
offer: CoreOS
|
|
publisher: CoreOS
|
|
sku: Stable
|
|
version: latest
|
|
|
|
- name: Create VMSS with security group in same resource group, with accelerated networking(check mode).
|
|
azure_rm_virtualmachine_scaleset:
|
|
resource_group: "{{ resource_group }}"
|
|
name: testVMSS{{ rpfx }}2
|
|
vm_size: Standard_D3_v2
|
|
capacity: 1
|
|
virtual_network_name: testVnet
|
|
subnet_name: testSubnet
|
|
admin_username: testuser
|
|
ssh_password_enabled: true
|
|
admin_password: "Password1234!"
|
|
image:
|
|
offer: CoreOS
|
|
publisher: CoreOS
|
|
sku: Stable
|
|
version: latest
|
|
upgrade_policy: Manual
|
|
security_group: testNetworkSecurityGroup
|
|
enable_accelerated_networking: yes
|
|
register: results
|
|
check_mode: yes
|
|
|
|
- name: Assert that VMSS can be created
|
|
assert:
|
|
that: results.changed
|
|
|
|
- name: Create VMSS with security group in same resource group, with accelerated networking.
|
|
azure_rm_virtualmachine_scaleset:
|
|
resource_group: "{{ resource_group }}"
|
|
name: testVMSS{{ rpfx }}2
|
|
vm_size: Standard_D3_v2
|
|
capacity: 1
|
|
virtual_network_name: testVnet
|
|
subnet_name: testSubnet
|
|
admin_username: testuser
|
|
ssh_password_enabled: true
|
|
admin_password: "Password1234!"
|
|
image:
|
|
offer: CoreOS
|
|
publisher: CoreOS
|
|
sku: Stable
|
|
version: latest
|
|
upgrade_policy: Manual
|
|
security_group: testNetworkSecurityGroup
|
|
enable_accelerated_networking: yes
|
|
register: results
|
|
|
|
- name: Assert that VMSS ran
|
|
assert:
|
|
that:
|
|
- 'results.changed'
|
|
- 'results.ansible_facts.azure_vmss.properties.virtualMachineProfile.networkProfile.networkInterfaceConfigurations.0.properties.enableAcceleratedNetworking == true'
|
|
- 'results.ansible_facts.azure_vmss.properties.virtualMachineProfile.networkProfile.networkInterfaceConfigurations.0.properties.networkSecurityGroup != {}'
|
|
|
|
- name: update VMSS with security group in different resource group.
|
|
azure_rm_virtualmachine_scaleset:
|
|
resource_group: "{{ resource_group }}"
|
|
name: testVMSS{{ rpfx }}2
|
|
vm_size: Standard_DS1_v2
|
|
capacity: 1
|
|
virtual_network_name: testVnet
|
|
subnet_name: testSubnet
|
|
admin_username: testuser
|
|
ssh_password_enabled: true
|
|
admin_password: "Password1234!"
|
|
image:
|
|
offer: CoreOS
|
|
publisher: CoreOS
|
|
sku: Stable
|
|
version: latest
|
|
upgrade_policy: Manual
|
|
security_group:
|
|
name: testNetworkSecurityGroup2
|
|
resource_group: "{{ resource_group_secondary }}"
|
|
register: results
|
|
|
|
- name: Assert that security group is correct
|
|
assert:
|
|
that:
|
|
- 'results.changed'
|
|
- '"testNetworkSecurityGroup2" in results.ansible_facts.azure_vmss.properties.virtualMachineProfile.networkProfile.networkInterfaceConfigurations.0.properties.networkSecurityGroup.id'
|
|
|
|
- name: Delete VMSS
|
|
azure_rm_virtualmachine_scaleset:
|
|
resource_group: "{{ resource_group }}"
|
|
name: testVMSS{{ rpfx }}2
|
|
state: absent
|
|
remove_on_absent: ['all']
|
|
vm_size: Standard_DS1_v2
|
|
capacity: 1
|
|
image:
|
|
offer: CoreOS
|
|
publisher: CoreOS
|
|
sku: Stable
|
|
version: latest
|
|
|
|
- name: Fail when instance type is not supported to enable accelerated networking
|
|
azure_rm_virtualmachine_scaleset:
|
|
resource_group: "{{ resource_group }}"
|
|
name: testVMSS{{ rpfx }}4
|
|
vm_size: Standard_DS1_v2
|
|
virtual_network_name: testVnet
|
|
subnet_name: testSubnet
|
|
admin_username: testuser
|
|
ssh_password_enabled: true
|
|
admin_password: "Password1234!"
|
|
image:
|
|
offer: CoreOS
|
|
publisher: CoreOS
|
|
sku: Stable
|
|
version: latest
|
|
upgrade_policy: Manual
|
|
enable_accelerated_networking: yes
|
|
register: results
|
|
ignore_errors: yes
|
|
|
|
- name: Assert failure to show that accelerated networking is enabled only with supported instance types.
|
|
assert:
|
|
that:
|
|
- '"VMSizeIsNotPermittedToEnableAcceleratedNetworkingForVmss" in results.msg'
|
|
|
|
- name: Delete network security group
|
|
azure_rm_securitygroup:
|
|
resource_group: "{{ resource_group }}"
|
|
name: testNetworkSecurityGroup
|
|
state: absent
|
|
|
|
- name: Delete network security group
|
|
azure_rm_securitygroup:
|
|
resource_group: "{{ resource_group_secondary }}"
|
|
name: testNetworkSecurityGroup2
|
|
state: absent
|
|
|
|
- name: Delete load balancer
|
|
azure_rm_loadbalancer:
|
|
resource_group: "{{ resource_group }}"
|
|
name: testLB
|
|
state: absent
|
|
|
|
- name: Delete public IP address
|
|
azure_rm_publicipaddress:
|
|
resource_group: "{{ resource_group }}"
|
|
state: absent
|
|
name: testPublicIP
|
|
|
|
- name: Delete virtual network
|
|
azure_rm_virtualnetwork:
|
|
resource_group: "{{ resource_group }}"
|
|
name: testVnet
|
|
state: absent
|
|
address_prefixes: "10.0.0.0/16"
|
|
|
|
# TODO: Until we have a module to create/delete images this is the best tests
|
|
# I can do
|
|
- name: assert error thrown with invalid image dict
|
|
azure_rm_virtualmachine_scaleset:
|
|
resource_group: "{{ resource_group }}"
|
|
name: testvm002
|
|
state: present
|
|
vm_size: Standard_DS1_v2
|
|
image:
|
|
offer: UbuntuServer
|
|
register: fail_invalid_image_dict
|
|
failed_when: 'fail_invalid_image_dict.msg != "parameter error: expecting image to contain [publisher, offer, sku, version] or [name, resource_group]"'
|
|
|
|
- name: assert error thrown with invalid image type
|
|
azure_rm_virtualmachine_scaleset:
|
|
resource_group: "{{ resource_group }}"
|
|
name: testvm002
|
|
state: present
|
|
vm_size: Standard_DS1_v2
|
|
image:
|
|
- testing
|
|
register: fail_invalid_image_type
|
|
failed_when: 'fail_invalid_image_type.msg != "parameter error: expecting image to be a string or dict not list"'
|
|
|
|
- name: assert error finding missing custom image
|
|
azure_rm_virtualmachine_scaleset:
|
|
resource_group: "{{ resource_group }}"
|
|
name: testvm002
|
|
state: present
|
|
vm_size: Standard_DS1_v2
|
|
image: invalid-image
|
|
register: fail_missing_custom_image
|
|
failed_when: fail_missing_custom_image.msg != "Error could not find image with name invalid-image"
|
|
|
|
- name: assert error finding missing custom image (dict style)
|
|
azure_rm_virtualmachine_scaleset:
|
|
resource_group: "{{ resource_group }}"
|
|
name: testvm002
|
|
state: present
|
|
vm_size: Standard_DS1_v2
|
|
image:
|
|
name: invalid-image
|
|
register: fail_missing_custom_image_dict
|
|
failed_when: fail_missing_custom_image_dict.msg != "Error could not find image with name invalid-image"
|