|
|
|
- name: Prepare random number
|
|
|
|
set_fact:
|
|
|
|
rpfx: "{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}"
|
|
|
|
applicationsecuritygroup_name1: "asg{{ resource_group | hash('md5') | truncate(5, True, '') }}{{ 1000 | random }}"
|
|
|
|
applicationsecuritygroup_name2: "asg{{ resource_group | hash('md5') | truncate(5, True, '') }}{{ 1000 | random }}"
|
|
|
|
nic_name1: "nic1{{ resource_group | hash('md5') | truncate(5, True, '') }}{{ 1000 | random }}"
|
|
|
|
run_once: yes
|
|
|
|
|
|
|
|
- name: Create virtual network
|
|
|
|
azure_rm_virtualnetwork:
|
|
|
|
resource_group: "{{ resource_group_secondary }}"
|
|
|
|
name: "tn{{ rpfx }}"
|
|
|
|
address_prefixes: "10.10.0.0/16"
|
|
|
|
register: vn
|
|
|
|
|
|
|
|
- name: Add subnet
|
|
|
|
azure_rm_subnet:
|
|
|
|
resource_group: "{{ resource_group_secondary }}"
|
|
|
|
name: "tn{{ rpfx }}"
|
|
|
|
address_prefix: "10.10.0.0/24"
|
|
|
|
virtual_network: "tn{{ rpfx }}"
|
|
|
|
|
|
|
|
- name: create public ip
|
|
|
|
azure_rm_publicipaddress:
|
|
|
|
name: "pip{{ rpfx }}"
|
|
|
|
resource_group: '{{ resource_group }}'
|
|
|
|
|
|
|
|
- name: create load balancer with multiple parameters
|
|
|
|
azure_rm_loadbalancer:
|
|
|
|
resource_group: '{{ resource_group }}'
|
|
|
|
name: "lb{{ rpfx }}"
|
|
|
|
frontend_ip_configurations:
|
|
|
|
- name: frontendipconf0
|
|
|
|
public_ip_address: "pip{{ rpfx }}"
|
|
|
|
backend_address_pools:
|
|
|
|
- name: backendaddrpool0
|
|
|
|
- name: backendaddrpool1
|
|
|
|
probes:
|
|
|
|
- name: prob0
|
|
|
|
port: 80
|
|
|
|
inbound_nat_pools:
|
|
|
|
- name: inboundnatpool0
|
|
|
|
frontend_ip_configuration_name: frontendipconf0
|
|
|
|
protocol: Tcp
|
|
|
|
frontend_port_range_start: 80
|
|
|
|
frontend_port_range_end: 81
|
|
|
|
backend_port: 8080
|
|
|
|
load_balancing_rules:
|
|
|
|
- name: lbrbalancingrule0
|
|
|
|
frontend_ip_configuration: frontendipconf0
|
|
|
|
backend_address_pool: backendaddrpool0
|
|
|
|
frontend_port: 80
|
|
|
|
backend_port: 80
|
|
|
|
probe: prob0
|
|
|
|
register: lb
|
|
|
|
|
|
|
|
- name: Create most simple NIC with virtual_network id (check mode)
|
|
|
|
azure_rm_networkinterface:
|
|
|
|
resource_group: "{{ resource_group }}"
|
|
|
|
name: "tn{{ rpfx }}"
|
|
|
|
virtual_network: "{{ vn.state.id }}"
|
|
|
|
subnet: "tn{{ rpfx }}"
|
|
|
|
public_ip: False
|
|
|
|
create_with_security_group: False
|
|
|
|
register: output
|
|
|
|
check_mode: yes
|
|
|
|
|
|
|
|
- assert:
|
|
|
|
that:
|
|
|
|
- output.changed
|
|
|
|
|
|
|
|
- name: Create most simple NIC with virtual_network resource_group
|
|
|
|
azure_rm_networkinterface:
|
|
|
|
resource_group: "{{ resource_group }}"
|
|
|
|
name: "tn{{ rpfx }}"
|
|
|
|
virtual_network:
|
|
|
|
name: "tn{{ rpfx }}"
|
|
|
|
resource_group: "{{ resource_group_secondary }}"
|
|
|
|
subnet: "tn{{ rpfx }}"
|
|
|
|
public_ip: False
|
|
|
|
create_with_security_group: False
|
|
|
|
register: output
|
|
|
|
|
|
|
|
- assert:
|
|
|
|
that:
|
|
|
|
- output.changed
|
|
|
|
- output.state.id
|
|
|
|
|
|
|
|
- name: Get fact of the new created NIC
|
|
|
|
azure_rm_networkinterface_facts:
|
|
|
|
resource_group: "{{ resource_group }}"
|
|
|
|
name: "tn{{ rpfx }}"
|
|
|
|
register: facts
|
|
|
|
|
|
|
|
- assert:
|
|
|
|
that:
|
|
|
|
- "facts.networkinterfaces | length == 1"
|
|
|
|
- facts.networkinterfaces[0].id == output.state.id
|
|
|
|
- "facts.networkinterfaces[0].ip_configurations | length == 1"
|
|
|
|
- not facts.networkinterfaces[0].security_group
|
|
|
|
- not facts.networkinterfaces[0].ip_configurations[0].public_ip_address
|
|
|
|
- not facts.networkinterfaces[0].enable_ip_forwarding
|
|
|
|
- not facts.networkinterfaces[0].enable_accelerated_networking
|
|
|
|
|
|
|
|
- name: Create most simple NIC with ip configurations (idempotent)
|
|
|
|
azure_rm_networkinterface:
|
|
|
|
resource_group: "{{ facts.networkinterfaces[0].resource_group }}"
|
|
|
|
name: "{{ facts.networkinterfaces[0].name }}"
|
|
|
|
virtual_network: "{{ facts.networkinterfaces[0].virtual_network }}"
|
|
|
|
create_with_security_group: False
|
|
|
|
ip_configurations:
|
|
|
|
- name: "{{ facts.networkinterfaces[0].ip_configurations[0].name }}"
|
|
|
|
private_ip_address: "{{ facts.networkinterfaces[0].ip_configurations[0].private_ip_address }}"
|
|
|
|
private_ip_allocation_method: "{{ facts.networkinterfaces[0].ip_configurations[0].private_ip_allocation_method }}"
|
|
|
|
primary: "{{ facts.networkinterfaces[0].ip_configurations[0].primary }}"
|
|
|
|
subnet: "{{ facts.networkinterfaces[0].subnet }}"
|
|
|
|
register: output
|
|
|
|
|
|
|
|
- assert:
|
|
|
|
that:
|
|
|
|
- not output.changed
|
|
|
|
|
|
|
|
- name: Create most simple NIC (idempotent)
|
|
|
|
azure_rm_networkinterface:
|
|
|
|
resource_group: "{{ resource_group }}"
|
|
|
|
name: "tn{{ rpfx }}"
|
|
|
|
virtual_network: "{{ vn.state.id }}"
|
|
|
|
subnet: "tn{{ rpfx }}"
|
|
|
|
create_with_security_group: False
|
|
|
|
public_ip: False
|
|
|
|
register: output
|
|
|
|
|
|
|
|
- assert:
|
|
|
|
that:
|
|
|
|
- not output.changed
|
|
|
|
|
|
|
|
- name: Update security group (check mode)
|
|
|
|
azure_rm_networkinterface:
|
|
|
|
resource_group: "{{ resource_group }}"
|
|
|
|
name: "tn{{ rpfx }}"
|
|
|
|
virtual_network: "{{ vn.state.id }}"
|
|
|
|
subnet: "tn{{ rpfx }}"
|
|
|
|
public_ip: False
|
|
|
|
security_group: "tn{{ rpfx }}sg"
|
|
|
|
register: output
|
|
|
|
check_mode: yes
|
|
|
|
|
|
|
|
- assert:
|
|
|
|
that:
|
|
|
|
- output.changed
|
|
|
|
|
|
|
|
- name: Update public ip address (check mode)
|
|
|
|
azure_rm_networkinterface:
|
|
|
|
resource_group: "{{ resource_group }}"
|
|
|
|
name: "tn{{ rpfx }}"
|
|
|
|
virtual_network: "{{ vn.state.id }}"
|
|
|
|
subnet: "tn{{ rpfx }}"
|
|
|
|
public_ip_address_name: "tn{{ rpfx }}"
|
|
|
|
create_with_security_group: False
|
|
|
|
register: output
|
|
|
|
check_mode: yes
|
|
|
|
|
|
|
|
- assert:
|
|
|
|
that:
|
|
|
|
- output.changed
|
|
|
|
|
|
|
|
- name: Update accelerated networking (check mode)
|
|
|
|
azure_rm_networkinterface:
|
|
|
|
resource_group: "{{ resource_group }}"
|
|
|
|
name: "tn{{ rpfx }}"
|
|
|
|
virtual_network: "{{ vn.state.id }}"
|
|
|
|
subnet: "tn{{ rpfx }}"
|
|
|
|
enable_accelerated_networking: True
|
|
|
|
create_with_security_group: False
|
|
|
|
public_ip: False
|
|
|
|
register: output
|
|
|
|
check_mode: yes
|
|
|
|
|
|
|
|
- assert:
|
|
|
|
that:
|
|
|
|
- output.changed
|
|
|
|
|
|
|
|
- name: Update IP forwarding networking (check mode)
|
|
|
|
azure_rm_networkinterface:
|
|
|
|
resource_group: "{{ resource_group }}"
|
|
|
|
name: "tn{{ rpfx }}"
|
|
|
|
virtual_network: "{{ vn.state.id }}"
|
|
|
|
subnet: "tn{{ rpfx }}"
|
|
|
|
create_with_security_group: False
|
|
|
|
enable_ip_forwarding: True
|
|
|
|
public_ip: False
|
|
|
|
register: output
|
|
|
|
check_mode: yes
|
|
|
|
|
|
|
|
- assert:
|
|
|
|
that:
|
|
|
|
- output.changed
|
|
|
|
|
|
|
|
- name: Update dns server (check mode)
|
|
|
|
azure_rm_networkinterface:
|
|
|
|
resource_group: "{{ resource_group }}"
|
|
|
|
name: "tn{{ rpfx }}"
|
|
|
|
virtual_network: "{{ vn.state.id }}"
|
|
|
|
subnet: "tn{{ rpfx }}"
|
|
|
|
create_with_security_group: False
|
|
|
|
public_ip: False
|
|
|
|
dns_servers:
|
|
|
|
- 8.9.10.11
|
|
|
|
- 7.8.9.10
|
|
|
|
register: output
|
|
|
|
check_mode: yes
|
|
|
|
|
|
|
|
- assert:
|
|
|
|
that:
|
|
|
|
- output.changed
|
|
|
|
|
|
|
|
- name: Update NIC
|
|
|
|
azure_rm_networkinterface:
|
|
|
|
resource_group: "{{ resource_group }}"
|
|
|
|
name: "tn{{ rpfx }}"
|
|
|
|
virtual_network: "{{ vn.state.id }}"
|
|
|
|
subnet: "tn{{ rpfx }}"
|
|
|
|
enable_accelerated_networking: True
|
|
|
|
enable_ip_forwarding: True
|
|
|
|
security_group: "tn{{ rpfx }}sg"
|
|
|
|
dns_servers:
|
|
|
|
- 8.9.10.11
|
|
|
|
- 7.8.9.10
|
|
|
|
ip_configurations:
|
|
|
|
- name: "{{ facts.networkinterfaces[0].ip_configurations[0].name }}"
|
|
|
|
private_ip_address: "{{ facts.networkinterfaces[0].ip_configurations[0].private_ip_address }}"
|
|
|
|
private_ip_allocation_method: "{{ facts.networkinterfaces[0].ip_configurations[0].private_ip_allocation_method }}"
|
|
|
|
primary: "{{ facts.networkinterfaces[0].ip_configurations[0].primary }}"
|
|
|
|
- name: ipconfig1
|
|
|
|
public_ip_name: "tn{{ rpfx }}"
|
|
|
|
load_balancer_backend_address_pools:
|
|
|
|
- "{{ lb.state.backend_address_pools[0].id }}"
|
|
|
|
- name: backendaddrpool1
|
|
|
|
load_balancer: "lb{{ rpfx }}"
|
|
|
|
register: output
|
|
|
|
|
|
|
|
- assert:
|
|
|
|
that:
|
|
|
|
- output.changed
|
|
|
|
- output.state.dns_settings.dns_servers == ['8.9.10.11', '7.8.9.10']
|
|
|
|
- output.state.enable_ip_forwarding
|
|
|
|
- output.state.network_security_group.name == "tn{{ rpfx }}sg"
|
|
|
|
- output.state.enable_accelerated_networking
|
|
|
|
|
|
|
|
- name: Complicated NIC (idempontent)
|
|
|
|
azure_rm_networkinterface:
|
|
|
|
resource_group: "{{ resource_group }}"
|
|
|
|
name: "tn{{ rpfx }}"
|
|
|
|
virtual_network: "{{ vn.state.id }}"
|
|
|
|
subnet: "tn{{ rpfx }}"
|
|
|
|
enable_accelerated_networking: True
|
|
|
|
security_group: "tn{{ rpfx }}sg"
|
|
|
|
enable_ip_forwarding: True
|
|
|
|
dns_servers:
|
|
|
|
- 8.9.10.11
|
|
|
|
- 7.8.9.10
|
|
|
|
ip_configurations:
|
|
|
|
- name: "{{ facts.networkinterfaces[0].ip_configurations[0].name }}"
|
|
|
|
private_ip_address: "{{ facts.networkinterfaces[0].ip_configurations[0].private_ip_address }}"
|
|
|
|
private_ip_allocation_method: "{{ facts.networkinterfaces[0].ip_configurations[0].private_ip_allocation_method }}"
|
|
|
|
primary: "{{ facts.networkinterfaces[0].ip_configurations[0].primary }}"
|
|
|
|
- name: ipconfig1
|
|
|
|
public_ip_name: "tn{{ rpfx }}"
|
|
|
|
load_balancer_backend_address_pools:
|
|
|
|
- "{{ lb.state.backend_address_pools[0].id }}"
|
|
|
|
- name: backendaddrpool1
|
|
|
|
load_balancer: "lb{{ rpfx }}"
|
|
|
|
register: output
|
|
|
|
|
|
|
|
- assert:
|
|
|
|
that:
|
|
|
|
- not output.changed
|
|
|
|
|
|
|
|
- name: Get fact of the new created NIC
|
|
|
|
azure_rm_networkinterface_facts:
|
|
|
|
resource_group: "{{ resource_group }}"
|
|
|
|
name: "tn{{ rpfx }}"
|
|
|
|
register: facts
|
|
|
|
|
|
|
|
- assert:
|
|
|
|
that:
|
|
|
|
- "facts.networkinterfaces | length == 1"
|
|
|
|
- facts.networkinterfaces[0].id == output.state.id
|
|
|
|
- "facts.networkinterfaces[0].ip_configurations | length == 2"
|
|
|
|
- 'facts.networkinterfaces[0].security_group.endswith("tn{{ rpfx }}sg")'
|
|
|
|
- facts.networkinterfaces[0].enable_accelerated_networking
|
|
|
|
- facts.networkinterfaces[0].enable_ip_forwarding
|
|
|
|
|
|
|
|
- name: Remove one dns server and ip configuration
|
|
|
|
azure_rm_networkinterface:
|
|
|
|
resource_group: "{{ resource_group }}"
|
|
|
|
name: "tn{{ rpfx }}"
|
|
|
|
virtual_network: "{{ vn.state.id }}"
|
|
|
|
subnet: "tn{{ rpfx }}"
|
|
|
|
security_group: "tn{{ rpfx }}sg"
|
|
|
|
enable_accelerated_networking: True
|
|
|
|
enable_ip_forwarding: True
|
|
|
|
dns_servers:
|
|
|
|
- 8.9.10.11
|
|
|
|
ip_configurations:
|
|
|
|
- name: ipconfig1
|
|
|
|
public_ip_name: "tn{{ rpfx }}"
|
|
|
|
primary: True
|
|
|
|
load_balancer_backend_address_pools:
|
|
|
|
- "{{ lb.state.backend_address_pools[0].id }}"
|
|
|
|
- name: backendaddrpool1
|
|
|
|
load_balancer: "lb{{ rpfx }}"
|
|
|
|
register: output
|
|
|
|
|
|
|
|
- assert:
|
|
|
|
that:
|
|
|
|
- output.changed
|
|
|
|
- output.state.dns_settings.dns_servers == ['8.9.10.11']
|
|
|
|
- output.state.enable_ip_forwarding
|
|
|
|
- output.state.network_security_group.name == "tn{{ rpfx }}sg"
|
|
|
|
- "output.state.ip_configurations | length == 1"
|
|
|
|
- output.state.ip_configurations[0].public_ip_address.name == "tn{{ rpfx }}"
|
|
|
|
- output.state.enable_accelerated_networking
|
|
|
|
|
|
|
|
- name: Create application security group(check mode)
|
|
|
|
azure_rm_applicationsecuritygroup:
|
|
|
|
resource_group: "{{ resource_group }}"
|
|
|
|
name: "{{ applicationsecuritygroup_name1 }}"
|
|
|
|
tags:
|
|
|
|
testing: testing
|
|
|
|
check_mode: yes
|
|
|
|
register: output
|
|
|
|
|
|
|
|
- name: Assert check mode creation
|
|
|
|
assert:
|
|
|
|
that:
|
|
|
|
- output.changed
|
|
|
|
|
|
|
|
- name: Create Application security group
|
|
|
|
azure_rm_applicationsecuritygroup:
|
|
|
|
resource_group: "{{ resource_group }}"
|
|
|
|
name: "{{ applicationsecuritygroup_name1 }}"
|
|
|
|
tags:
|
|
|
|
testing: testing
|
|
|
|
register: output
|
|
|
|
|
|
|
|
- name: Assert application security group creation
|
|
|
|
assert:
|
|
|
|
that:
|
|
|
|
- output.changed
|
|
|
|
- output.id != ''
|
|
|
|
|
|
|
|
- name: Create application security group (idempotent)
|
|
|
|
azure_rm_applicationsecuritygroup:
|
|
|
|
resource_group: "{{ resource_group }}"
|
|
|
|
name: "{{ applicationsecuritygroup_name1 }}"
|
|
|
|
tags:
|
|
|
|
testing: testing
|
|
|
|
register: output
|
|
|
|
|
|
|
|
- name: Assert idempotent
|
|
|
|
assert:
|
|
|
|
that:
|
|
|
|
- not output.changed
|
|
|
|
|
|
|
|
- name: Update application security group
|
|
|
|
azure_rm_applicationsecuritygroup:
|
|
|
|
resource_group: "{{ resource_group }}"
|
|
|
|
name: "{{ applicationsecuritygroup_name1 }}"
|
|
|
|
tags:
|
|
|
|
testing: testing
|
|
|
|
foo: bar
|
|
|
|
register: output
|
|
|
|
|
|
|
|
- name: Assert update
|
|
|
|
assert:
|
|
|
|
that:
|
|
|
|
- output.changed
|
|
|
|
|
|
|
|
- name: Create Application security group in secondary resource group
|
|
|
|
azure_rm_applicationsecuritygroup:
|
|
|
|
resource_group: "{{ resource_group_secondary }}"
|
|
|
|
name: "{{ applicationsecuritygroup_name2 }}"
|
|
|
|
register: asg
|
|
|
|
|
|
|
|
- name: Create Nic with application security groups
|
|
|
|
azure_rm_networkinterface:
|
|
|
|
resource_group: "{{ resource_group }}"
|
|
|
|
name: "{{ nic_name1 }}"
|
|
|
|
virtual_network: "{{ vn.state.id }}"
|
|
|
|
subnet: "tn{{ rpfx }}"
|
|
|
|
create_with_security_group: True
|
|
|
|
public_ip: False
|
|
|
|
ip_configurations:
|
|
|
|
- name: ipconfig1
|
|
|
|
application_security_groups:
|
|
|
|
- "{{ applicationsecuritygroup_name1 }}"
|
|
|
|
- "{{ asg.id }}"
|
|
|
|
primary: True
|
|
|
|
register: output
|
|
|
|
|
|
|
|
- name: assert creation succeeded
|
|
|
|
assert:
|
|
|
|
that:
|
|
|
|
- output.changed
|
|
|
|
|
|
|
|
- name: Create Nic with application security groups (idempotent)
|
|
|
|
azure_rm_networkinterface:
|
|
|
|
resource_group: "{{ resource_group }}"
|
|
|
|
name: "{{ nic_name1 }}"
|
|
|
|
virtual_network: "{{ vn.state.id }}"
|
|
|
|
subnet: "tn{{ rpfx }}"
|
|
|
|
create_with_security_group: True
|
|
|
|
public_ip: False
|
|
|
|
ip_configurations:
|
|
|
|
- name: ipconfig1
|
|
|
|
application_security_groups:
|
|
|
|
- "{{ asg.id }}"
|
|
|
|
- "{{ applicationsecuritygroup_name1 }}"
|
|
|
|
primary: True
|
|
|
|
register: output
|
|
|
|
|
|
|
|
- name: assert idempotent
|
|
|
|
assert:
|
|
|
|
that:
|
|
|
|
- not output.changed
|
|
|
|
|
|
|
|
- name: Update Nic with application security groups
|
|
|
|
azure_rm_networkinterface:
|
|
|
|
resource_group: "{{ resource_group }}"
|
|
|
|
name: "{{ nic_name1 }}"
|
|
|
|
virtual_network: "{{ vn.state.id }}"
|
|
|
|
subnet: "tn{{ rpfx }}"
|
|
|
|
create_with_security_group: True
|
|
|
|
public_ip: False
|
|
|
|
ip_configurations:
|
|
|
|
- name: ipconfig1
|
|
|
|
application_security_groups:
|
|
|
|
- "{{ applicationsecuritygroup_name1 }}"
|
|
|
|
primary: True
|
|
|
|
register: output
|
|
|
|
|
|
|
|
- name: assert update succeeded
|
|
|
|
assert:
|
|
|
|
that:
|
|
|
|
- output.changed
|
|
|
|
|
|
|
|
- name: Get fact of the new created NIC
|
|
|
|
azure_rm_networkinterface_facts:
|
|
|
|
resource_group: "{{ resource_group }}"
|
|
|
|
name: "{{ nic_name1 }}"
|
|
|
|
register: facts
|
|
|
|
|
|
|
|
- assert:
|
|
|
|
that:
|
|
|
|
- "facts.networkinterfaces[0].ip_configurations[0].application_security_groups | length == 1"
|
|
|
|
|
|
|
|
- name: Delete the NIC (check mode)
|
|
|
|
azure_rm_networkinterface:
|
|
|
|
resource_group: "{{ resource_group }}"
|
|
|
|
name: "tn{{ rpfx }}"
|
|
|
|
state: absent
|
|
|
|
check_mode: yes
|
|
|
|
register: output
|
|
|
|
|
|
|
|
- assert:
|
|
|
|
that:
|
|
|
|
- output.changed
|
|
|
|
|
|
|
|
- name: Delete the NIC
|
|
|
|
azure_rm_networkinterface:
|
|
|
|
resource_group: "{{ resource_group }}"
|
|
|
|
name: "tn{{ rpfx }}"
|
|
|
|
state: absent
|
|
|
|
register: output
|
|
|
|
|
|
|
|
- assert:
|
|
|
|
that:
|
|
|
|
- output.changed
|
|
|
|
|
|
|
|
- name: Delete the NIC (idempotent)
|
|
|
|
azure_rm_networkinterface:
|
|
|
|
resource_group: "{{ resource_group }}"
|
|
|
|
name: "tn{{ rpfx }}"
|
|
|
|
state: absent
|
|
|
|
register: output
|
|
|
|
|
|
|
|
- assert:
|
|
|
|
that:
|
|
|
|
- not output.changed
|
|
|
|
|
|
|
|
- name: delete load balancer
|
|
|
|
azure_rm_loadbalancer:
|
|
|
|
resource_group: '{{ resource_group }}'
|
|
|
|
name: "lb{{ rpfx }}"
|
|
|
|
state: absent
|
|
|
|
|
|
|
|
- name: delete public ip
|
|
|
|
azure_rm_publicipaddress:
|
|
|
|
name: "pip{{ rpfx }}"
|
|
|
|
resource_group: '{{ resource_group }}'
|
|
|
|
state: absent
|
|
|
|
|
|
|
|
- name: Delete the NIC
|
|
|
|
azure_rm_networkinterface:
|
|
|
|
resource_group: "{{ resource_group }}"
|
|
|
|
name: "{{ nic_name1 }}"
|
|
|
|
state: absent
|
|
|
|
|
|
|
|
- name: Delete the application security group (check mode)
|
|
|
|
azure_rm_applicationsecuritygroup:
|
|
|
|
resource_group: "{{ resource_group }}"
|
|
|
|
name: "{{ applicationsecuritygroup_name1 }}"
|
|
|
|
state: absent
|
|
|
|
check_mode: yes
|
|
|
|
register: output
|
|
|
|
|
|
|
|
- name: Assert delete check mode
|
|
|
|
assert:
|
|
|
|
that:
|
|
|
|
- output.changed
|
|
|
|
|
|
|
|
- name: Delete the application security group
|
|
|
|
azure_rm_applicationsecuritygroup:
|
|
|
|
resource_group: "{{ resource_group }}"
|
|
|
|
name: "{{ applicationsecuritygroup_name1 }}"
|
|
|
|
state: absent
|
|
|
|
register: output
|
|
|
|
|
|
|
|
- name: Assert the deletion
|
|
|
|
assert:
|
|
|
|
that:
|
|
|
|
- output.changed
|
|
|
|
|
|
|
|
- name: Delete second application security group
|
|
|
|
azure_rm_applicationsecuritygroup:
|
|
|
|
resource_group: "{{ resource_group_secondary }}"
|
|
|
|
name: "{{ applicationsecuritygroup_name2 }}"
|
|
|
|
state: absent
|
|
|
|
register: output
|