mirror of https://github.com/ansible/ansible.git
adding app gateway module (#39940)
* adding app gateway module * improved application gateway * added register output * subnet_output * debugging * dumping params * fix dump * fixed mapping * fixed bug * fixed param problem * small fixes in code and added sample test * fixed syntax * fixing sanity stuff * sanity fixes * more sanity tests fixed * added azure_tags * tags * pruning app gateway * pruning app gateway * string -> str * removed type: str * trying to add idempotency * fixed syntax * fix sanity * fixed bugs * fixed error * disabled ssl policy check for a while * fixed dict comparison * fixed syntax * compare just http listeners & frontend ports * fix syntax * syntax * syntax * just compare sku * fix syntax * just http settings collections * fixing appgw module * make it green * fix items issue * compare all arrays * fixed sanity * adding snake_to_camel transformations * fix * another fix * snake to camel * additional snake to camel fixes * fixed public ip address conversion * version added is now 2.7 * changed alias * dict_merge * added ssl policy spec * fixed new sanity issue * renamed module * fixed ssl policy translation * added test for ssl & certificates * updated doc * fixed docs improved tests * fix * fixed testpull/44400/head
parent
5a020e7170
commit
1704c5932a
@ -0,0 +1,837 @@
|
||||
#!/usr/bin/python
|
||||
#
|
||||
# Copyright (c) 2017 Zim Kalinowski, <zikalino@microsoft.com>
|
||||
#
|
||||
# GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt)
|
||||
|
||||
from __future__ import absolute_import, division, print_function
|
||||
__metaclass__ = type
|
||||
|
||||
|
||||
ANSIBLE_METADATA = {'metadata_version': '1.1',
|
||||
'status': ['preview'],
|
||||
'supported_by': 'community'}
|
||||
|
||||
|
||||
DOCUMENTATION = '''
|
||||
---
|
||||
module: azure_rm_appgateway
|
||||
version_added: "2.7"
|
||||
short_description: Manage Application Gateway instance.
|
||||
description:
|
||||
- Create, update and delete instance of Application Gateway.
|
||||
|
||||
options:
|
||||
resource_group:
|
||||
description:
|
||||
- The name of the resource group.
|
||||
required: True
|
||||
name:
|
||||
description:
|
||||
- The name of the application gateway.
|
||||
required: True
|
||||
location:
|
||||
description:
|
||||
- Resource location. If not set, location from the resource group will be used as default.
|
||||
sku:
|
||||
description:
|
||||
- SKU of the application gateway resource.
|
||||
suboptions:
|
||||
name:
|
||||
description:
|
||||
- Name of an application gateway SKU.
|
||||
choices:
|
||||
- 'standard_small'
|
||||
- 'standard_medium'
|
||||
- 'standard_large'
|
||||
- 'waf_medium'
|
||||
- 'waf_large'
|
||||
tier:
|
||||
description:
|
||||
- Tier of an application gateway.
|
||||
choices:
|
||||
- 'standard'
|
||||
- 'waf'
|
||||
capacity:
|
||||
description:
|
||||
- Capacity (instance count) of an application gateway.
|
||||
ssl_policy:
|
||||
description:
|
||||
- SSL policy of the application gateway resource.
|
||||
suboptions:
|
||||
disabled_ssl_protocols:
|
||||
description:
|
||||
- List of SSL protocols to be disabled on application gateway.
|
||||
choices:
|
||||
- 'tls_v1_0'
|
||||
- 'tls_v1_1'
|
||||
- 'tls_v1_2'
|
||||
policy_type:
|
||||
description:
|
||||
- Type of SSL Policy.
|
||||
choices:
|
||||
- 'predefined'
|
||||
- 'custom'
|
||||
policy_name:
|
||||
description:
|
||||
- Name of Ssl C(predefined) policy.
|
||||
choices:
|
||||
- 'ssl_policy20150501'
|
||||
- 'ssl_policy20170401'
|
||||
- 'ssl_policy20170401_s'
|
||||
cipher_suites:
|
||||
description:
|
||||
- List of SSL cipher suites to be enabled in the specified order to application gateway.
|
||||
choices:
|
||||
- tls_ecdhe_rsa_with_aes_256_gcm_sha384
|
||||
- tls_ecdhe_rsa_with_aes_128_gcm_sha256
|
||||
- tls_ecdhe_rsa_with_aes_256_cbc_sha384
|
||||
- tls_ecdhe_rsa_with_aes_128_cbc_sha256
|
||||
- tls_ecdhe_rsa_with_aes_256_cbc_sha
|
||||
- tls_ecdhe_rsa_with_aes_128_cbc_sha
|
||||
- tls_dhe_rsa_with_aes_256_gcm_sha384
|
||||
- tls_dhe_rsa_with_aes_128_gcm_sha256
|
||||
- tls_dhe_rsa_with_aes_256_cbc_sha
|
||||
- tls_dhe_rsa_with_aes_128_cbc_sha
|
||||
- tls_rsa_with_aes_256_gcm_sha384
|
||||
- tls_rsa_with_aes_128_gcm_sha256
|
||||
- tls_rsa_with_aes_256_cbc_sha256
|
||||
- tls_rsa_with_aes_128_cbc_sha256
|
||||
- tls_rsa_with_aes_256_cbc_sha
|
||||
- tls_rsa_with_aes_128_cbc_sha
|
||||
- tls_ecdhe_ecdsa_with_aes_256_gcm_sha384
|
||||
- tls_ecdhe_ecdsa_with_aes_128_gcm_sha256
|
||||
- tls_ecdhe_ecdsa_with_aes_256_cbc_sha384
|
||||
- tls_ecdhe_ecdsa_with_aes_128_cbc_sha256
|
||||
- tls_ecdhe_ecdsa_with_aes_256_cbc_sha
|
||||
- tls_ecdhe_ecdsa_with_aes_128_cbc_sha
|
||||
- tls_dhe_dss_with_aes_256_cbc_sha256
|
||||
- tls_dhe_dss_with_aes_128_cbc_sha256
|
||||
- tls_dhe_dss_with_aes_256_cbc_sha
|
||||
- tls_dhe_dss_with_aes_128_cbc_sha
|
||||
- tls_rsa_with_3des_ede_cbc_sha
|
||||
- tls_dhe_dss_with_3des_ede_cbc_sha
|
||||
min_protocol_version:
|
||||
description:
|
||||
- Minimum version of Ssl protocol to be supported on application gateway.
|
||||
choices:
|
||||
- 'tls_v1_0'
|
||||
- 'tls_v1_1'
|
||||
- 'tls_v1_2'
|
||||
gateway_ip_configurations:
|
||||
description:
|
||||
- List of subnets used by the application gateway.
|
||||
suboptions:
|
||||
subnet:
|
||||
description:
|
||||
- Reference of the subnet resource. A subnet from where application gateway gets its private address.
|
||||
name:
|
||||
description:
|
||||
- Name of the resource that is unique within a resource group. This name can be used to access the resource.
|
||||
authentication_certificates:
|
||||
description:
|
||||
- Authentication certificates of the application gateway resource.
|
||||
suboptions:
|
||||
data:
|
||||
description:
|
||||
- Certificate public data - base64 encoded pfx
|
||||
name:
|
||||
description:
|
||||
- Name of the resource that is unique within a resource group. This name can be used to access the resource.
|
||||
ssl_certificates:
|
||||
description:
|
||||
- SSL certificates of the application gateway resource.
|
||||
suboptions:
|
||||
data:
|
||||
description:
|
||||
- Base-64 encoded pfx certificate.
|
||||
password:
|
||||
description:
|
||||
- Password for the pfx file specified in I(data).
|
||||
name:
|
||||
description:
|
||||
- Name of the resource that is unique within a resource group. This name can be used to access the resource.
|
||||
frontend_ip_configurations:
|
||||
description:
|
||||
- Frontend IP addresses of the application gateway resource.
|
||||
suboptions:
|
||||
private_ip_address:
|
||||
description:
|
||||
- PrivateIPAddress of the network interface IP Configuration.
|
||||
private_ip_allocation_method:
|
||||
description:
|
||||
- PrivateIP allocation method.
|
||||
choices:
|
||||
- 'static'
|
||||
- 'dynamic'
|
||||
subnet:
|
||||
description:
|
||||
- Reference of the subnet resource.
|
||||
public_ip_address:
|
||||
description:
|
||||
- Reference of the PublicIP resource.
|
||||
name:
|
||||
description:
|
||||
- Name of the resource that is unique within a resource group. This name can be used to access the resource.
|
||||
frontend_ports:
|
||||
description:
|
||||
- List of frontend ports of the application gateway resource.
|
||||
suboptions:
|
||||
port:
|
||||
description:
|
||||
- Frontend port
|
||||
name:
|
||||
description:
|
||||
- Name of the resource that is unique within a resource group. This name can be used to access the resource.
|
||||
backend_address_pools:
|
||||
description:
|
||||
- List of backend address pool of the application gateway resource.
|
||||
suboptions:
|
||||
backend_addresses:
|
||||
description:
|
||||
- List of backend addresses
|
||||
suboptions:
|
||||
fqdn:
|
||||
description:
|
||||
- Fully qualified domain name (FQDN).
|
||||
ip_address:
|
||||
description:
|
||||
- IP address
|
||||
name:
|
||||
description:
|
||||
- Resource that is unique within a resource group. This name can be used to access the resource.
|
||||
backend_http_settings_collection:
|
||||
description:
|
||||
- Backend http settings of the application gateway resource.
|
||||
suboptions:
|
||||
port:
|
||||
description:
|
||||
- Port
|
||||
protocol:
|
||||
description:
|
||||
- Protocol.
|
||||
choices:
|
||||
- 'http'
|
||||
- 'https'
|
||||
cookie_based_affinity:
|
||||
description:
|
||||
- Cookie based affinity.
|
||||
choices:
|
||||
- 'enabled'
|
||||
- 'disabled'
|
||||
request_timeout:
|
||||
description:
|
||||
- "Request timeout in seconds. Application Gateway will fail the request if response is not received within RequestTimeout. Acceptable va
|
||||
lues are from 1 second to 86400 seconds."
|
||||
authentication_certificates:
|
||||
description:
|
||||
- List of references to application gateway authentication certificates.
|
||||
suboptions:
|
||||
id:
|
||||
description:
|
||||
- Resource ID.
|
||||
host_name:
|
||||
description:
|
||||
- Host header to be sent to the backend servers.
|
||||
pick_host_name_from_backend_address:
|
||||
description:
|
||||
- Whether to pick host header should be picked from the host name of the backend server. Default value is false.
|
||||
affinity_cookie_name:
|
||||
description:
|
||||
- Cookie name to use for the affinity cookie.
|
||||
path:
|
||||
description:
|
||||
- Path which should be used as a prefix for all C(http) requests. Null means no path will be prefixed. Default value is null.
|
||||
name:
|
||||
description:
|
||||
- Name of the resource that is unique within a resource group. This name can be used to access the resource.
|
||||
http_listeners:
|
||||
description:
|
||||
- List of HTTP listeners of the application gateway resource.
|
||||
suboptions:
|
||||
frontend_ip_configuration:
|
||||
description:
|
||||
- Frontend IP configuration resource of an application gateway.
|
||||
frontend_port:
|
||||
description:
|
||||
- Frontend port resource of an application gateway.
|
||||
protocol:
|
||||
description:
|
||||
- Protocol.
|
||||
choices:
|
||||
- 'http'
|
||||
- 'https'
|
||||
host_name:
|
||||
description:
|
||||
- Host name of C(http) listener.
|
||||
ssl_certificate:
|
||||
description:
|
||||
- SSL certificate resource of an application gateway.
|
||||
require_server_name_indication:
|
||||
description:
|
||||
- Applicable only if I(protocol) is C(https). Enables SNI for multi-hosting.
|
||||
name:
|
||||
description:
|
||||
- Name of the resource that is unique within a resource group. This name can be used to access the resource.
|
||||
request_routing_rules:
|
||||
description:
|
||||
- List of request routing rules of the application gateway resource.
|
||||
suboptions:
|
||||
rule_type:
|
||||
description:
|
||||
- Rule I(type).
|
||||
choices:
|
||||
- 'basic'
|
||||
- 'path_based_routing'
|
||||
backend_address_pool:
|
||||
description:
|
||||
- Backend address pool resource of the application gateway.
|
||||
backend_http_settings:
|
||||
description:
|
||||
- Frontend port resource of the application gateway.
|
||||
http_listener:
|
||||
description:
|
||||
- Http listener resource of the application gateway.
|
||||
name:
|
||||
description:
|
||||
- Name of the resource that is unique within a resource group. This name can be used to access the resource.
|
||||
state:
|
||||
description:
|
||||
- Assert the state of the Public IP. Use 'present' to create or update a and
|
||||
'absent' to delete.
|
||||
default: present
|
||||
choices:
|
||||
- absent
|
||||
- present
|
||||
required: false
|
||||
|
||||
extends_documentation_fragment:
|
||||
- azure
|
||||
- azure_tags
|
||||
|
||||
author:
|
||||
- "Zim Kalinowski (@zikalino)"
|
||||
|
||||
'''
|
||||
|
||||
EXAMPLES = '''
|
||||
- name: Create instance of Application Gateway
|
||||
azure_rm_appgateway:
|
||||
resource_group: myresourcegroup
|
||||
name: myappgateway
|
||||
sku:
|
||||
name: standard_small
|
||||
tier: standard
|
||||
capacity: 2
|
||||
gateway_ip_configurations:
|
||||
- subnet:
|
||||
id: "{{ subnet_id }}"
|
||||
name: app_gateway_ip_config
|
||||
frontend_ip_configurations:
|
||||
- subnet:
|
||||
id: "{{ subnet_id }}"
|
||||
name: sample_gateway_frontend_ip_config
|
||||
frontend_ports:
|
||||
- port: 90
|
||||
name: ag_frontend_port
|
||||
backend_address_pools:
|
||||
- backend_addresses:
|
||||
- ip_address: 10.0.0.4
|
||||
name: test_backend_address_pool
|
||||
backend_http_settings_collection:
|
||||
- port: 80
|
||||
protocol: http
|
||||
cookie_based_affinity: enabled
|
||||
name: sample_appgateway_http_settings
|
||||
http_listeners:
|
||||
- frontend_ip_configuration: sample_gateway_frontend_ip_config
|
||||
frontend_port: ag_frontend_port
|
||||
name: sample_http_listener
|
||||
request_routing_rules:
|
||||
- rule_type: Basic
|
||||
backend_address_pool: test_backend_address_pool
|
||||
backend_http_settings: sample_appgateway_http_settings
|
||||
http_listener: sample_http_listener
|
||||
name: rule1
|
||||
'''
|
||||
|
||||
RETURN = '''
|
||||
id:
|
||||
description:
|
||||
- Resource ID.
|
||||
returned: always
|
||||
type: str
|
||||
sample: id
|
||||
'''
|
||||
|
||||
import time
|
||||
from ansible.module_utils.azure_rm_common import AzureRMModuleBase
|
||||
from copy import deepcopy
|
||||
from ansible.module_utils.network.common.utils import dict_merge
|
||||
from ansible.module_utils.common.dict_transformations import (
|
||||
camel_dict_to_snake_dict, snake_dict_to_camel_dict,
|
||||
_camel_to_snake, _snake_to_camel,
|
||||
)
|
||||
|
||||
try:
|
||||
from msrestazure.azure_exceptions import CloudError
|
||||
from msrestazure.azure_operation import AzureOperationPoller
|
||||
from azure.mgmt.network import NetworkManagementClient
|
||||
from msrest.serialization import Model
|
||||
except ImportError:
|
||||
# This is handled in azure_rm_common
|
||||
pass
|
||||
|
||||
|
||||
class Actions:
|
||||
NoAction, Create, Update, Delete = range(4)
|
||||
|
||||
|
||||
ssl_policy_spec = dict(
|
||||
disabled_ssl_protocols=dict(type='list'),
|
||||
policy_type=dict(type='str', choices=['predefined', 'custom']),
|
||||
policy_name=dict(type='str', choices=['ssl_policy20150501', 'ssl_policy20170401', 'ssl_policy20170401_s']),
|
||||
cipher_suites=dict(type='list'),
|
||||
min_protocol_version=dict(type='str', choices=['tls_v1_0', 'tls_v1_1', 'tls_v1_2'])
|
||||
)
|
||||
|
||||
|
||||
class AzureRMApplicationGateways(AzureRMModuleBase):
|
||||
"""Configuration class for an Azure RM Application Gateway resource"""
|
||||
|
||||
def __init__(self):
|
||||
self.module_arg_spec = dict(
|
||||
resource_group=dict(
|
||||
type='str',
|
||||
required=True
|
||||
),
|
||||
name=dict(
|
||||
type='str',
|
||||
required=True
|
||||
),
|
||||
location=dict(
|
||||
type='str'
|
||||
),
|
||||
sku=dict(
|
||||
type='dict'
|
||||
),
|
||||
ssl_policy=dict(
|
||||
type='dict',
|
||||
options=ssl_policy_spec
|
||||
),
|
||||
gateway_ip_configurations=dict(
|
||||
type='list'
|
||||
),
|
||||
authentication_certificates=dict(
|
||||
type='list'
|
||||
),
|
||||
ssl_certificates=dict(
|
||||
type='list'
|
||||
),
|
||||
frontend_ip_configurations=dict(
|
||||
type='list'
|
||||
),
|
||||
frontend_ports=dict(
|
||||
type='list'
|
||||
),
|
||||
backend_address_pools=dict(
|
||||
type='list'
|
||||
),
|
||||
backend_http_settings_collection=dict(
|
||||
type='list'
|
||||
),
|
||||
http_listeners=dict(
|
||||
type='list'
|
||||
),
|
||||
request_routing_rules=dict(
|
||||
type='list'
|
||||
),
|
||||
state=dict(
|
||||
type='str',
|
||||
default='present',
|
||||
choices=['present', 'absent']
|
||||
)
|
||||
)
|
||||
|
||||
self.resource_group = None
|
||||
self.name = None
|
||||
self.parameters = dict()
|
||||
|
||||
self.results = dict(changed=False)
|
||||
self.mgmt_client = None
|
||||
self.state = None
|
||||
self.to_do = Actions.NoAction
|
||||
|
||||
super(AzureRMApplicationGateways, self).__init__(derived_arg_spec=self.module_arg_spec,
|
||||
supports_check_mode=True,
|
||||
supports_tags=True)
|
||||
|
||||
def exec_module(self, **kwargs):
|
||||
"""Main module execution method"""
|
||||
|
||||
for key in list(self.module_arg_spec.keys()) + ['tags']:
|
||||
if hasattr(self, key):
|
||||
setattr(self, key, kwargs[key])
|
||||
elif kwargs[key] is not None:
|
||||
if key == "id":
|
||||
self.parameters["id"] = kwargs[key]
|
||||
elif key == "location":
|
||||
self.parameters["location"] = kwargs[key]
|
||||
elif key == "sku":
|
||||
ev = kwargs[key]
|
||||
if 'name' in ev:
|
||||
if ev['name'] == 'standard_small':
|
||||
ev['name'] = 'Standard_Small'
|
||||
elif ev['name'] == 'standard_medium':
|
||||
ev['name'] = 'Standard_Medium'
|
||||
elif ev['name'] == 'standard_large':
|
||||
ev['name'] = 'Standard_Large'
|
||||
elif ev['name'] == 'waf_medium':
|
||||
ev['name'] = 'WAF_Medium'
|
||||
elif ev['name'] == 'waf_large':
|
||||
ev['name'] = 'WAF_Large'
|
||||
if 'tier' in ev:
|
||||
if ev['tier'] == 'standard':
|
||||
ev['tier'] = 'Standard'
|
||||
elif ev['tier'] == 'waf':
|
||||
ev['tier'] = 'WAF'
|
||||
self.parameters["sku"] = ev
|
||||
elif key == "ssl_policy":
|
||||
ev = kwargs[key]
|
||||
if 'policy_type' in ev:
|
||||
ev['policy_type'] = _snake_to_camel(ev['policy_type'], True)
|
||||
if 'policy_name' in ev:
|
||||
if ev['policy_name'] == 'ssl_policy20150501':
|
||||
ev['policy_name'] = 'AppGwSslPolicy20150501'
|
||||
elif ev['policy_name'] == 'ssl_policy20170401':
|
||||
ev['policy_name'] = 'AppGwSslPolicy20170401'
|
||||
elif ev['policy_name'] == 'ssl_policy20170401_s':
|
||||
ev['policy_name'] = 'AppGwSslPolicy20170401S'
|
||||
if 'min_protocol_version' in ev:
|
||||
if ev['min_protocol_version'] == 'tls_v1_0':
|
||||
ev['min_protocol_version'] = 'TLSv1_0'
|
||||
elif ev['min_protocol_version'] == 'tls_v1_1':
|
||||
ev['min_protocol_version'] = 'TLSv1_1'
|
||||
elif ev['min_protocol_version'] == 'tls_v1_2':
|
||||
ev['min_protocol_version'] = 'TLSv1_2'
|
||||
if 'disabled_ssl_protocols' in ev:
|
||||
protocols = ev['disabled_ssl_protocols']
|
||||
if protocols is not None:
|
||||
for i in range(len(protocols)):
|
||||
if protocols[i] == 'tls_v1_0':
|
||||
protocols[i] = 'TLSv1_0'
|
||||
elif protocols[i] == 'tls_v1_1':
|
||||
protocols[i] = 'TLSv1_1'
|
||||
elif protocols[i] == 'tls_v1_2':
|
||||
protocols[i] = 'TLSv1_2'
|
||||
if 'cipher_suites' in ev:
|
||||
suites = ev['cipher_suites']
|
||||
if suites is not None:
|
||||
for i in range(len(suites)):
|
||||
suites[i] = suites[i].upper()
|
||||
elif key == "gateway_ip_configurations":
|
||||
self.parameters["gateway_ip_configurations"] = kwargs[key]
|
||||
elif key == "authentication_certificates":
|
||||
self.parameters["authentication_certificates"] = kwargs[key]
|
||||
elif key == "ssl_certificates":
|
||||
self.parameters["ssl_certificates"] = kwargs[key]
|
||||
elif key == "frontend_ip_configurations":
|
||||
ev = kwargs[key]
|
||||
for i in range(len(ev)):
|
||||
item = ev[i]
|
||||
if 'private_ip_allocation_method' in item:
|
||||
item['private_ip_allocation_method'] = _snake_to_camel(item['private_ip_allocation_method'], True)
|
||||
if 'public_ip_address' in item:
|
||||
id = public_ip_id(self.subscription_id,
|
||||
kwargs['resource_group'],
|
||||
item['public_ip_address'])
|
||||
item['public_ip_address'] = {'id': id}
|
||||
self.parameters["frontend_ip_configurations"] = ev
|
||||
elif key == "frontend_ports":
|
||||
self.parameters["frontend_ports"] = kwargs[key]
|
||||
elif key == "backend_address_pools":
|
||||
self.parameters["backend_address_pools"] = kwargs[key]
|
||||
elif key == "backend_http_settings_collection":
|
||||
ev = kwargs[key]
|
||||
for i in range(len(ev)):
|
||||
item = ev[i]
|
||||
if 'protocol' in item:
|
||||
item['protocol'] = _snake_to_camel(item['protocol'], True)
|
||||
if 'cookie_based_affinity' in item:
|
||||
item['cookie_based_affinity'] = _snake_to_camel(item['cookie_based_affinity'], True)
|
||||
self.parameters["backend_http_settings_collection"] = ev
|
||||
elif key == "http_listeners":
|
||||
ev = kwargs[key]
|
||||
for i in range(len(ev)):
|
||||
item = ev[i]
|
||||
if 'frontend_ip_configuration' in item:
|
||||
id = frontend_ip_configuration_id(self.subscription_id,
|
||||
kwargs['resource_group'],
|
||||
kwargs['name'],
|
||||
item['frontend_ip_configuration'])
|
||||
item['frontend_ip_configuration'] = {'id': id}
|
||||
|
||||
if 'frontend_port' in item:
|
||||
id = frontend_port_id(self.subscription_id,
|
||||
kwargs['resource_group'],
|
||||
kwargs['name'],
|
||||
item['frontend_port'])
|
||||
item['frontend_port'] = {'id': id}
|
||||
if 'protocol' in item:
|
||||
item['protocol'] = _snake_to_camel(item['protocol'], True)
|
||||
ev[i] = item
|
||||
self.parameters["http_listeners"] = ev
|
||||
elif key == "request_routing_rules":
|
||||
ev = kwargs[key]
|
||||
for i in range(len(ev)):
|
||||
item = ev[i]
|
||||
if 'backend_address_pool' in item:
|
||||
id = backend_address_pool_id(self.subscription_id,
|
||||
kwargs['resource_group'],
|
||||
kwargs['name'],
|
||||
item['backend_address_pool'])
|
||||
item['backend_address_pool'] = {'id': id}
|
||||
if 'backend_http_settings' in item:
|
||||
id = backend_http_settings_id(self.subscription_id,
|
||||
kwargs['resource_group'],
|
||||
kwargs['name'],
|
||||
item['backend_http_settings'])
|
||||
item['backend_http_settings'] = {'id': id}
|
||||
if 'http_listener' in item:
|
||||
id = http_listener_id(self.subscription_id,
|
||||
kwargs['resource_group'],
|
||||
kwargs['name'],
|
||||
item['http_listener'])
|
||||
item['http_listener'] = {'id': id}
|
||||
if 'protocol' in item:
|
||||
item['protocol'] = _snake_to_camel(item['protocol'], True)
|
||||
if 'rule_type' in ev:
|
||||
item['rule_type'] = _snake_to_camel(item['rule_type'], True)
|
||||
ev[i] = item
|
||||
self.parameters["request_routing_rules"] = ev
|
||||
elif key == "etag":
|
||||
self.parameters["etag"] = kwargs[key]
|
||||
|
||||
old_response = None
|
||||
response = None
|
||||
|
||||
self.mgmt_client = self.get_mgmt_svc_client(NetworkManagementClient,
|
||||
base_url=self._cloud_environment.endpoints.resource_manager)
|
||||
|
||||
resource_group = self.get_resource_group(self.resource_group)
|
||||
|
||||
if "location" not in self.parameters:
|
||||
self.parameters["location"] = resource_group.location
|
||||
|
||||
old_response = self.get_applicationgateway()
|
||||
|
||||
if not old_response:
|
||||
self.log("Application Gateway instance doesn't exist")
|
||||
if self.state == 'absent':
|
||||
self.log("Old instance didn't exist")
|
||||
else:
|
||||
self.to_do = Actions.Create
|
||||
else:
|
||||
self.log("Application Gateway instance already exists")
|
||||
if self.state == 'absent':
|
||||
self.to_do = Actions.Delete
|
||||
elif self.state == 'present':
|
||||
self.log("Need to check if Application Gateway instance has to be deleted or may be updated")
|
||||
self.to_do = Actions.Update
|
||||
|
||||
if (self.to_do == Actions.Update):
|
||||
if (self.parameters['location'] != old_response['location'] or
|
||||
self.parameters['sku']['name'] != old_response['sku']['name'] or
|
||||
self.parameters['sku']['tier'] != old_response['sku']['tier'] or
|
||||
self.parameters['sku']['capacity'] != old_response['sku']['capacity'] or
|
||||
not compare_arrays(old_response, self.parameters, 'authentication_certificates') or
|
||||
not compare_arrays(old_response, self.parameters, 'gateway_ip_configurations') or
|
||||
not compare_arrays(old_response, self.parameters, 'frontend_ip_configurations') or
|
||||
not compare_arrays(old_response, self.parameters, 'frontend_ports') or
|
||||
not compare_arrays(old_response, self.parameters, 'backend_address_pools') or
|
||||
not compare_arrays(old_response, self.parameters, 'backend_http_settings_collection') or
|
||||
not compare_arrays(old_response, self.parameters, 'request_routing_rules') or
|
||||
not compare_arrays(old_response, self.parameters, 'http_listeners')):
|
||||
|
||||
self.to_do = Actions.Update
|
||||
else:
|
||||
self.to_do = Actions.NoAction
|
||||
|
||||
if (self.to_do == Actions.Create) or (self.to_do == Actions.Update):
|
||||
self.log("Need to Create / Update the Application Gateway instance")
|
||||
|
||||
if self.check_mode:
|
||||
self.results['changed'] = True
|
||||
self.results["parameters"] = self.parameters
|
||||
return self.results
|
||||
|
||||
response = self.create_update_applicationgateway()
|
||||
|
||||
if not old_response:
|
||||
self.results['changed'] = True
|
||||
else:
|
||||
self.results['changed'] = old_response.__ne__(response)
|
||||
self.log("Creation / Update done")
|
||||
elif self.to_do == Actions.Delete:
|
||||
self.log("Application Gateway instance deleted")
|
||||
self.results['changed'] = True
|
||||
|
||||
if self.check_mode:
|
||||
return self.results
|
||||
|
||||
self.delete_applicationgateway()
|
||||
# make sure instance is actually deleted, for some Azure resources, instance is hanging around
|
||||
# for some time after deletion -- this should be really fixed in Azure
|
||||
while self.get_applicationgateway():
|
||||
time.sleep(20)
|
||||
else:
|
||||
self.log("Application Gateway instance unchanged")
|
||||
self.results['changed'] = False
|
||||
response = old_response
|
||||
|
||||
if response:
|
||||
self.results["id"] = response["id"]
|
||||
|
||||
return self.results
|
||||
|
||||
def create_update_applicationgateway(self):
|
||||
'''
|
||||
Creates or updates Application Gateway with the specified configuration.
|
||||
|
||||
:return: deserialized Application Gateway instance state dictionary
|
||||
'''
|
||||
self.log("Creating / Updating the Application Gateway instance {0}".format(self.name))
|
||||
|
||||
try:
|
||||
response = self.mgmt_client.application_gateways.create_or_update(resource_group_name=self.resource_group,
|
||||
application_gateway_name=self.name,
|
||||
parameters=self.parameters)
|
||||
if isinstance(response, AzureOperationPoller):
|
||||
response = self.get_poller_result(response)
|
||||
|
||||
except CloudError as exc:
|
||||
self.log('Error attempting to create the Application Gateway instance.')
|
||||
self.fail("Error creating the Application Gateway instance: {0}".format(str(exc)))
|
||||
return response.as_dict()
|
||||
|
||||
def delete_applicationgateway(self):
|
||||
'''
|
||||
Deletes specified Application Gateway instance in the specified subscription and resource group.
|
||||
|
||||
:return: True
|
||||
'''
|
||||
self.log("Deleting the Application Gateway instance {0}".format(self.name))
|
||||
try:
|
||||
response = self.mgmt_client.application_gateways.delete(resource_group_name=self.resource_group,
|
||||
application_gateway_name=self.name)
|
||||
except CloudError as e:
|
||||
self.log('Error attempting to delete the Application Gateway instance.')
|
||||
self.fail("Error deleting the Application Gateway instance: {0}".format(str(e)))
|
||||
|
||||
return True
|
||||
|
||||
def get_applicationgateway(self):
|
||||
'''
|
||||
Gets the properties of the specified Application Gateway.
|
||||
|
||||
:return: deserialized Application Gateway instance state dictionary
|
||||
'''
|
||||
self.log("Checking if the Application Gateway instance {0} is present".format(self.name))
|
||||
found = False
|
||||
try:
|
||||
response = self.mgmt_client.application_gateways.get(resource_group_name=self.resource_group,
|
||||
application_gateway_name=self.name)
|
||||
found = True
|
||||
self.log("Response : {0}".format(response))
|
||||
self.log("Application Gateway instance : {0} found".format(response.name))
|
||||
except CloudError as e:
|
||||
self.log('Did not find the Application Gateway instance.')
|
||||
if found is True:
|
||||
return response.as_dict()
|
||||
|
||||
return False
|
||||
|
||||
|
||||
def public_ip_id(subscription_id, resource_group_name, name):
|
||||
"""Generate the id for a frontend ip configuration"""
|
||||
return '/subscriptions/{0}/resourceGroups/{1}/providers/Microsoft.Network/publicIPAddresses/{2}'.format(
|
||||
subscription_id,
|
||||
resource_group_name,
|
||||
name
|
||||
)
|
||||
|
||||
|
||||
def frontend_ip_configuration_id(subscription_id, resource_group_name, appgateway_name, name):
|
||||
"""Generate the id for a frontend ip configuration"""
|
||||
return '/subscriptions/{0}/resourceGroups/{1}/providers/Microsoft.Network/applicationGateways/{2}/frontendIPConfigurations/{3}'.format(
|
||||
subscription_id,
|
||||
resource_group_name,
|
||||
appgateway_name,
|
||||
name
|
||||
)
|
||||
|
||||
|
||||
def frontend_port_id(subscription_id, resource_group_name, appgateway_name, name):
|
||||
"""Generate the id for a frontend port"""
|
||||
return '/subscriptions/{0}/resourceGroups/{1}/providers/Microsoft.Network/applicationGateways/{2}/frontendPorts/{3}'.format(
|
||||
subscription_id,
|
||||
resource_group_name,
|
||||
appgateway_name,
|
||||
name
|
||||
)
|
||||
|
||||
|
||||
def backend_address_pool_id(subscription_id, resource_group_name, appgateway_name, name):
|
||||
"""Generate the id for an address pool"""
|
||||
return '/subscriptions/{0}/resourceGroups/{1}/providers/Microsoft.Network/applicationGateways/{2}/backendAddressPools/{3}'.format(
|
||||
subscription_id,
|
||||
resource_group_name,
|
||||
appgateway_name,
|
||||
name
|
||||
)
|
||||
|
||||
|
||||
def backend_http_settings_id(subscription_id, resource_group_name, appgateway_name, name):
|
||||
"""Generate the id for a http settings"""
|
||||
return '/subscriptions/{0}/resourceGroups/{1}/providers/Microsoft.Network/applicationGateways/{2}/backendHttpSettingsCollection/{3}'.format(
|
||||
subscription_id,
|
||||
resource_group_name,
|
||||
appgateway_name,
|
||||
name
|
||||
)
|
||||
|
||||
|
||||
def http_listener_id(subscription_id, resource_group_name, appgateway_name, name):
|
||||
"""Generate the id for a http listener"""
|
||||
return '/subscriptions/{0}/resourceGroups/{1}/providers/Microsoft.Network/applicationGateways/{2}/httpListeners/{3}'.format(
|
||||
subscription_id,
|
||||
resource_group_name,
|
||||
appgateway_name,
|
||||
name
|
||||
)
|
||||
|
||||
|
||||
def compare_arrays(old_params, new_params, param_name):
|
||||
old = old_params.get(param_name) or []
|
||||
new = new_params.get(param_name) or []
|
||||
|
||||
oldd = {}
|
||||
for item in old:
|
||||
name = item['name']
|
||||
oldd[name] = item
|
||||
newd = {}
|
||||
for item in new:
|
||||
name = item['name']
|
||||
newd[name] = item
|
||||
|
||||
newd = dict_merge(oldd, newd)
|
||||
return newd == oldd
|
||||
|
||||
|
||||
def main():
|
||||
"""Main execution"""
|
||||
AzureRMApplicationGateways()
|
||||
|
||||
|
||||
if __name__ == '__main__':
|
||||
main()
|
@ -0,0 +1,3 @@
|
||||
cloud/azure
|
||||
destructive
|
||||
shippable/azure/group2
|
@ -0,0 +1,2 @@
|
||||
dependencies:
|
||||
- setup_azure
|
@ -0,0 +1,293 @@
|
||||
- name: Prepare random number
|
||||
set_fact:
|
||||
rpfx: "{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}"
|
||||
run_once: yes
|
||||
|
||||
- name: Create a virtual network
|
||||
azure_rm_virtualnetwork:
|
||||
name: vnet{{ rpfx }}
|
||||
resource_group: "{{ resource_group }}"
|
||||
address_prefixes_cidr:
|
||||
- 10.1.0.0/16
|
||||
- 172.100.0.0/16
|
||||
dns_servers:
|
||||
- 127.0.0.1
|
||||
- 127.0.0.2
|
||||
- name: Create a subnet
|
||||
azure_rm_subnet:
|
||||
name: subnet{{ rpfx }}
|
||||
virtual_network_name: vnet{{ rpfx }}
|
||||
resource_group: "{{ resource_group }}"
|
||||
address_prefix_cidr: 10.1.0.0/24
|
||||
register: subnet_output
|
||||
|
||||
- name: Create instance of Application Gateway -- check mode
|
||||
azure_rm_appgateway:
|
||||
resource_group: "{{ resource_group }}"
|
||||
name: "appgateway{{ rpfx }}"
|
||||
sku:
|
||||
name: standard_small
|
||||
tier: standard
|
||||
capacity: 2
|
||||
ssl_policy:
|
||||
policy_type: predefined
|
||||
policy_name: ssl_policy20150501
|
||||
disabled_ssl_protocols:
|
||||
- tls_v1_0
|
||||
cipher_suites:
|
||||
- tls_ecdhe_ecdsa_with_aes_256_gcm_sha384
|
||||
authentication_certificates:
|
||||
- name: cert1
|
||||
data: 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
|
||||
ssl_certificates:
|
||||
- name: cert2
|
||||
password: your-password
|
||||
data: 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
|
||||
gateway_ip_configurations:
|
||||
- subnet:
|
||||
id: "{{ subnet_output.state.id }}"
|
||||
name: app_gateway_ip_config
|
||||
frontend_ip_configurations:
|
||||
- subnet:
|
||||
id: "{{ subnet_output.state.id }}"
|
||||
name: sample_gateway_frontend_ip_config
|
||||
frontend_ports:
|
||||
- port: 90
|
||||
name: ag_frontend_port
|
||||
backend_address_pools:
|
||||
- backend_addresses:
|
||||
- ip_address: 10.0.0.4
|
||||
name: test_backend_address_pool
|
||||
backend_http_settings_collection:
|
||||
- port: 80
|
||||
protocol: http
|
||||
cookie_based_affinity: enabled
|
||||
name: sample_appgateway_http_settings
|
||||
http_listeners:
|
||||
- frontend_ip_configuration: sample_gateway_frontend_ip_config
|
||||
frontend_port: ag_frontend_port
|
||||
name: sample_http_listener
|
||||
request_routing_rules:
|
||||
- rule_type: basic
|
||||
backend_address_pool: test_backend_address_pool
|
||||
backend_http_settings: sample_appgateway_http_settings
|
||||
http_listener: sample_http_listener
|
||||
name: rule1
|
||||
check_mode: yes
|
||||
register: output
|
||||
- name: Assert the resource instance is well created
|
||||
assert:
|
||||
that:
|
||||
- output.changed
|
||||
|
||||
- name: dump
|
||||
debug:
|
||||
var: output
|
||||
|
||||
- name: Create instance of Application Gateway
|
||||
azure_rm_appgateway:
|
||||
resource_group: "{{ resource_group }}"
|
||||
name: "appgateway{{ rpfx }}"
|
||||
sku:
|
||||
name: standard_small
|
||||
tier: standard
|
||||
capacity: 2
|
||||
ssl_policy:
|
||||
policy_type: predefined
|
||||
policy_name: ssl_policy20150501
|
||||
disabled_ssl_protocols:
|
||||
- tls_v1_0
|
||||
cipher_suites:
|
||||
- tls_ecdhe_ecdsa_with_aes_256_gcm_sha384
|
||||
authentication_certificates:
|
||||
- name: cert1
|
||||
data: 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
|
||||
ssl_certificates:
|
||||
- name: cert2
|
||||
password: your-password
|
||||
data: MIIKsQIBAzCCCm0GCSqGSIb3DQEHAaCCCl4EggpaMIIKVjCCBg8GCSqGSIb3DQEHAaCCBgAEggX8MIIF+DCCBfQGCyqGSIb3DQEMCgECoIIE/jCCBPowHAYKKoZIhvcNAQwBAzAOBAj37r+wRsc6/gICB9AEggTY1V5HNscO+2bZb7JSMme1ljERe7DCiRE2cJsPKlwW2/NEiSqAUX7gXKK0ISr6Dto71rFdza0uPwbcQoPN1QwkJHSAkxWg4OcAx2kf7077tlHhf5rzxTn5V3wXM0Q3h6NsDjSqSHjYVISIiXItUzlDaBpMY/NUFNCTyJR5I91MWsljrJ/bQaAIo57HJR9nzjY5DaBA9P3bAhmX5LJRGsJWoCEaGeeVQ3Yn6yD06ordiJnf6dNxqQGN+o2x54gqfmw+RnoC2f8VAsTIfb3fwJPKdg2JiJIa6Ms2Sc8VR7VGmZt34qZwTPBrzeqJjtIMT41bBae46lmma8ypYwErqzOYSrHqXPXzaxlloYy81HYWAsJTWyBxTsVBcLom5m9ru79+SKG35xY1wSkzZmWMNFfVRFCJy/X+h2ErrGYjogCHYaIUmiosvUccwRUXGU083ul9iTcz/Dl79VBz63OFX/CnZMDTQ8ugbqpvW78pAnBU0r8MUubHciD1sJG2zmMlxCAzan6BLm9OMyhTNIbzYOjQQw99MQQys/ZeyNLqTFHTeGRfU2ewqgHjbH2PYCQfjipXSmdmsSsGxlLA9AOtwAk3QKJ77P03HRGOeXmy/I4iIHuIQuaQcjfprNR2fI36dftDo7U4gvRQHkiti+zNVqpi3/hIc2k7O8bCcMeSvfIlUvWIPUrUceZmpVPpLdcFcQbN9+1nZwiFYydOhrPnlp40rSO3RM08EmQUfRYt8fwRFcoWBX3b411vOqZVGeMfMtThMYI53R4Cmh5tUp93FslHNmIfnuewhHfIm+vtCicLcW6TaC2l4EqmNf0flK5m5nANotCfqj87MPsB83qPwol/91BTKaxuH2hKrZDgU1ibPE8NhzBinp2ANi0BHK3Sl0CsC2MPyZpFY+4MWvk/SI9ex4VsKYKmhubOFkhDLLBZH0UEmUdNTH4Gd76GsDnfI9arR2ctM9ecTPeu74hKiHlNZhc4U3TX20FBeqF5tZYnfCLRhvdiNM9AlwEKqqQEe0W7PrALcNVdjhJl0X9+0Br28E3RKZQRITWa10Vjmh0WcYrzEQ3/qEZYbqVpHMp+kdrHxB65v0zlGxjdwyKzafLzqYXmaHOyVlFnkayNaAkVVxOCzNrxB9HfhjvhjWafeMvA0p7O9CxTD2xPEhUaHQ5j7L8F0alfMYcg73SdGHAcY6AV8+eh0jqs3IF68cquXOl5Bm8uYKRjtgl9nY6hYc0lRDdtFHZo8ayNDr0cltNU7XZTaCKVNSDTRn92rTNJY0E3PD5HSKcRi58WJrIgEDGasyleRkRlGTY7512Qut0rg7m1Eyp6MK+sNmSSA7cR70pH7I1dwy4VrJMODdMH11y1QJF2EQWQdN00Js54tjVgTIO3btb5N7jhNYpRedv0a4UZ8TdDI4ZMCMf3SdP3xbQ06M1pFrS8WQzwp3KTk8vmnseJL84n0hC8KqWmGmTWHTa9dwmopeM6Xh/Jm1pkrgrloxqfSlscGEJE0plAnk1mLx29FxswfZ6a7pNKg7CydK4SiDkqM+pWukPbgKODqYPUvS0nk3RGGXvZSIzTbvm77tF+MqXOb6Rn+IflIk4yZsjIBQA0I/bQ78YDzXUVsrtAi9waRoCZs+L48NUy4zpKn25FMqkrziVn+TGB4jANBgkrBgEEAYI3EQIxADATBgkqhkiG9w0BCRUxBgQEAQAAADBdBgkqhkiG9w0BCRQxUB5OAHQAZQAtAGMANwBmADEAYwBhADYAMQAtADQAOAA1ADQALQA0ADgAZQBmAC0AYQAwADgANQAtAGQANABhADIAZgA1AGYAOAAyADcAZAAxMF0GCSsGAQQBgjcRATFQHk4ATQBpAGMAcgBvAHMAbwBmAHQAIABTAHQAcgBvAG4AZwAgAEMAcgB5AHAAdABvAGcAcgBhAHAAaABpAGMAIABQAHIAbwB2AGkAZABlAHIwggQ/BgkqhkiG9w0BBwagggQwMIIELAIBADCCBCUGCSqGSIb3DQEHATAcBgoqhkiG9w0BDAEDMA4ECFcAfrkm3ibUAgIH0ICCA/hlBog8GY9GCpucTwAxBGa0cOGQ29EK0xfrmY/Dv59IeJhRr47Mvl1XNk5PIInb64RsOVr00jrJAbfgLLKMBowcQLT7k6jGbGBdOzC57x9DNP0VuHsIIym0Z+SpJgEWBbtdBTGzgNw/YoXYxT4Rtka9ScSyCFjmmCzXz7bGLqC7yrGb7BzigQ9y4u4bg0pf75pERzN8rJM29Ob2IydkgARfpmbNKjdMCtD6dI7tafG2lQfUX6sgQY+Sy5HTz3ansN8X1yv2WQTu8Drxf2ce55v4WrFbPTTND94ubgDt7jvbCe1DuNP1DAYmQ5pbW0GGqF1x2csK5WWD7J8FD08VaQFM8y8pGIUeUkN4rYU3eTdTAQe+ec2hOr9QZn1Sb/p5u4KqIMn4MSCQ8EU0gXa2JETdUjXPr/5JFZTidJYagRyMIkYnwg9uusikctulaBsHMBKMYQ0Z19CEbcd2phdoxWTrtp7kwwjnu64zPgE6ALe9yJOT8AFEB6H1c16Z+aPGj9hbhkh6tcdGWUvzDYq08wjKjP3nA78StIisUmeZPfAXJUquPzRZr0pmcwYWfyP54TdC2BvPlLW/QXVV44IGxUdLuI6mz4p+O2+xKu9QMFwdcpij2ZK4uMrBLDo7ZoTQ4rBRnn471AMUKgeP0D5tbl8PygUU1RqHv34ok3fwx0WglzdMQJyt53PiPWW4lipwUtUfd0eD8CXoMccf8XJmugVUBCD1wQsyCW6RrR9RX8HXVBrm5O2HKfJcQYznl3qHqXb6ofvbOQ3S+v0ALN+sma8Tn6JceVTAOH+UuMdcu0FIDYnpmrvMecnJ2kbs1Y35mj4rSJyP5PGLg+ygb9VlBPwCCem/jHL+YivN38+0oWqfn2slyI4FNKX+5U8M6xpiEaq6McKwKZC1d51A4dUdMAkO2d1Z6rVjqhKeqE6HWD9A0cyPBFZpNQskUfNDW8qILLEfEjhBi+s1LkHzKDykCN/ReFfRiQS84DekoC59cymM8Hs1geMWCMFWfut4HTd7ItYaiJz5qpYVY4U/8myhyWnrktjLjQ6OkdM9bBDIpRHj95MYEC26NlWQZwjk+yynPTZf0w5p2Ok6Dq2shJFykuJ1VkelgvsPe8qMa55Wp11dpREIFzXouPXNP/vFpziZcl1OKTd7Dwa+ruQFRfsoZGzupsBOYxrmYqr6kOm5mzMW0HAlsWwl5mY2aSQMvXBE6k32xTkPIlIp763Ee4m6cmx4+SDcO5D+a9t05QY4JmssL+x3T9qsbXSXDPEsg0cfVvuQYy9AYkIFOes4G45IagRAvhQQj9bEh8kTvp8CFDDtIrbWjX50zreb51VcAcEkIOLyROtIdLem0zA7MB8wBwYFKw4DAhoEFC0i4I5iwNYQug0vTVS0JC/Qm+/NBBTsUM0D9QxIZYUi+qlDy14sOcEaUwICB9A=
|
||||
gateway_ip_configurations:
|
||||
- subnet:
|
||||
id: "{{ subnet_output.state.id }}"
|
||||
name: app_gateway_ip_config
|
||||
frontend_ip_configurations:
|
||||
- subnet:
|
||||
id: "{{ subnet_output.state.id }}"
|
||||
name: sample_gateway_frontend_ip_config
|
||||
frontend_ports:
|
||||
- port: 90
|
||||
name: ag_frontend_port
|
||||
backend_address_pools:
|
||||
- backend_addresses:
|
||||
- ip_address: 10.0.0.4
|
||||
name: test_backend_address_pool
|
||||
backend_http_settings_collection:
|
||||
- port: 80
|
||||
protocol: http
|
||||
cookie_based_affinity: enabled
|
||||
name: sample_appgateway_http_settings
|
||||
http_listeners:
|
||||
- frontend_ip_configuration: sample_gateway_frontend_ip_config
|
||||
frontend_port: ag_frontend_port
|
||||
name: sample_http_listener
|
||||
request_routing_rules:
|
||||
- rule_type: Basic
|
||||
backend_address_pool: test_backend_address_pool
|
||||
backend_http_settings: sample_appgateway_http_settings
|
||||
http_listener: sample_http_listener
|
||||
name: rule1
|
||||
register: output
|
||||
- name: Assert the resource instance is well created
|
||||
assert:
|
||||
that:
|
||||
- output.changed
|
||||
|
||||
- name: Try to update instance of Application Gateway - no change
|
||||
azure_rm_appgateway:
|
||||
resource_group: "{{ resource_group }}"
|
||||
name: "appgateway{{ rpfx }}"
|
||||
sku:
|
||||
name: standard_small
|
||||
tier: standard
|
||||
capacity: 2
|
||||
ssl_policy:
|
||||
policy_type: predefined
|
||||
policy_name: ssl_policy20150501
|
||||
disabled_ssl_protocols:
|
||||
- tls_v1_0
|
||||
cipher_suites:
|
||||
- tls_ecdhe_ecdsa_with_aes_256_gcm_sha384
|
||||
authentication_certificates:
|
||||
- name: cert1
|
||||
data: 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
|
||||
ssl_certificates:
|
||||
- name: cert2
|
||||
password: your-password
|
||||
data: MIIKsQIBAzCCCm0GCSqGSIb3DQEHAaCCCl4EggpaMIIKVjCCBg8GCSqGSIb3DQEHAaCCBgAEggX8MIIF+DCCBfQGCyqGSIb3DQEMCgECoIIE/jCCBPowHAYKKoZIhvcNAQwBAzAOBAj37r+wRsc6/gICB9AEggTY1V5HNscO+2bZb7JSMme1ljERe7DCiRE2cJsPKlwW2/NEiSqAUX7gXKK0ISr6Dto71rFdza0uPwbcQoPN1QwkJHSAkxWg4OcAx2kf7077tlHhf5rzxTn5V3wXM0Q3h6NsDjSqSHjYVISIiXItUzlDaBpMY/NUFNCTyJR5I91MWsljrJ/bQaAIo57HJR9nzjY5DaBA9P3bAhmX5LJRGsJWoCEaGeeVQ3Yn6yD06ordiJnf6dNxqQGN+o2x54gqfmw+RnoC2f8VAsTIfb3fwJPKdg2JiJIa6Ms2Sc8VR7VGmZt34qZwTPBrzeqJjtIMT41bBae46lmma8ypYwErqzOYSrHqXPXzaxlloYy81HYWAsJTWyBxTsVBcLom5m9ru79+SKG35xY1wSkzZmWMNFfVRFCJy/X+h2ErrGYjogCHYaIUmiosvUccwRUXGU083ul9iTcz/Dl79VBz63OFX/CnZMDTQ8ugbqpvW78pAnBU0r8MUubHciD1sJG2zmMlxCAzan6BLm9OMyhTNIbzYOjQQw99MQQys/ZeyNLqTFHTeGRfU2ewqgHjbH2PYCQfjipXSmdmsSsGxlLA9AOtwAk3QKJ77P03HRGOeXmy/I4iIHuIQuaQcjfprNR2fI36dftDo7U4gvRQHkiti+zNVqpi3/hIc2k7O8bCcMeSvfIlUvWIPUrUceZmpVPpLdcFcQbN9+1nZwiFYydOhrPnlp40rSO3RM08EmQUfRYt8fwRFcoWBX3b411vOqZVGeMfMtThMYI53R4Cmh5tUp93FslHNmIfnuewhHfIm+vtCicLcW6TaC2l4EqmNf0flK5m5nANotCfqj87MPsB83qPwol/91BTKaxuH2hKrZDgU1ibPE8NhzBinp2ANi0BHK3Sl0CsC2MPyZpFY+4MWvk/SI9ex4VsKYKmhubOFkhDLLBZH0UEmUdNTH4Gd76GsDnfI9arR2ctM9ecTPeu74hKiHlNZhc4U3TX20FBeqF5tZYnfCLRhvdiNM9AlwEKqqQEe0W7PrALcNVdjhJl0X9+0Br28E3RKZQRITWa10Vjmh0WcYrzEQ3/qEZYbqVpHMp+kdrHxB65v0zlGxjdwyKzafLzqYXmaHOyVlFnkayNaAkVVxOCzNrxB9HfhjvhjWafeMvA0p7O9CxTD2xPEhUaHQ5j7L8F0alfMYcg73SdGHAcY6AV8+eh0jqs3IF68cquXOl5Bm8uYKRjtgl9nY6hYc0lRDdtFHZo8ayNDr0cltNU7XZTaCKVNSDTRn92rTNJY0E3PD5HSKcRi58WJrIgEDGasyleRkRlGTY7512Qut0rg7m1Eyp6MK+sNmSSA7cR70pH7I1dwy4VrJMODdMH11y1QJF2EQWQdN00Js54tjVgTIO3btb5N7jhNYpRedv0a4UZ8TdDI4ZMCMf3SdP3xbQ06M1pFrS8WQzwp3KTk8vmnseJL84n0hC8KqWmGmTWHTa9dwmopeM6Xh/Jm1pkrgrloxqfSlscGEJE0plAnk1mLx29FxswfZ6a7pNKg7CydK4SiDkqM+pWukPbgKODqYPUvS0nk3RGGXvZSIzTbvm77tF+MqXOb6Rn+IflIk4yZsjIBQA0I/bQ78YDzXUVsrtAi9waRoCZs+L48NUy4zpKn25FMqkrziVn+TGB4jANBgkrBgEEAYI3EQIxADATBgkqhkiG9w0BCRUxBgQEAQAAADBdBgkqhkiG9w0BCRQxUB5OAHQAZQAtAGMANwBmADEAYwBhADYAMQAtADQAOAA1ADQALQA0ADgAZQBmAC0AYQAwADgANQAtAGQANABhADIAZgA1AGYAOAAyADcAZAAxMF0GCSsGAQQBgjcRATFQHk4ATQBpAGMAcgBvAHMAbwBmAHQAIABTAHQAcgBvAG4AZwAgAEMAcgB5AHAAdABvAGcAcgBhAHAAaABpAGMAIABQAHIAbwB2AGkAZABlAHIwggQ/BgkqhkiG9w0BBwagggQwMIIELAIBADCCBCUGCSqGSIb3DQEHATAcBgoqhkiG9w0BDAEDMA4ECFcAfrkm3ibUAgIH0ICCA/hlBog8GY9GCpucTwAxBGa0cOGQ29EK0xfrmY/Dv59IeJhRr47Mvl1XNk5PIInb64RsOVr00jrJAbfgLLKMBowcQLT7k6jGbGBdOzC57x9DNP0VuHsIIym0Z+SpJgEWBbtdBTGzgNw/YoXYxT4Rtka9ScSyCFjmmCzXz7bGLqC7yrGb7BzigQ9y4u4bg0pf75pERzN8rJM29Ob2IydkgARfpmbNKjdMCtD6dI7tafG2lQfUX6sgQY+Sy5HTz3ansN8X1yv2WQTu8Drxf2ce55v4WrFbPTTND94ubgDt7jvbCe1DuNP1DAYmQ5pbW0GGqF1x2csK5WWD7J8FD08VaQFM8y8pGIUeUkN4rYU3eTdTAQe+ec2hOr9QZn1Sb/p5u4KqIMn4MSCQ8EU0gXa2JETdUjXPr/5JFZTidJYagRyMIkYnwg9uusikctulaBsHMBKMYQ0Z19CEbcd2phdoxWTrtp7kwwjnu64zPgE6ALe9yJOT8AFEB6H1c16Z+aPGj9hbhkh6tcdGWUvzDYq08wjKjP3nA78StIisUmeZPfAXJUquPzRZr0pmcwYWfyP54TdC2BvPlLW/QXVV44IGxUdLuI6mz4p+O2+xKu9QMFwdcpij2ZK4uMrBLDo7ZoTQ4rBRnn471AMUKgeP0D5tbl8PygUU1RqHv34ok3fwx0WglzdMQJyt53PiPWW4lipwUtUfd0eD8CXoMccf8XJmugVUBCD1wQsyCW6RrR9RX8HXVBrm5O2HKfJcQYznl3qHqXb6ofvbOQ3S+v0ALN+sma8Tn6JceVTAOH+UuMdcu0FIDYnpmrvMecnJ2kbs1Y35mj4rSJyP5PGLg+ygb9VlBPwCCem/jHL+YivN38+0oWqfn2slyI4FNKX+5U8M6xpiEaq6McKwKZC1d51A4dUdMAkO2d1Z6rVjqhKeqE6HWD9A0cyPBFZpNQskUfNDW8qILLEfEjhBi+s1LkHzKDykCN/ReFfRiQS84DekoC59cymM8Hs1geMWCMFWfut4HTd7ItYaiJz5qpYVY4U/8myhyWnrktjLjQ6OkdM9bBDIpRHj95MYEC26NlWQZwjk+yynPTZf0w5p2Ok6Dq2shJFykuJ1VkelgvsPe8qMa55Wp11dpREIFzXouPXNP/vFpziZcl1OKTd7Dwa+ruQFRfsoZGzupsBOYxrmYqr6kOm5mzMW0HAlsWwl5mY2aSQMvXBE6k32xTkPIlIp763Ee4m6cmx4+SDcO5D+a9t05QY4JmssL+x3T9qsbXSXDPEsg0cfVvuQYy9AYkIFOes4G45IagRAvhQQj9bEh8kTvp8CFDDtIrbWjX50zreb51VcAcEkIOLyROtIdLem0zA7MB8wBwYFKw4DAhoEFC0i4I5iwNYQug0vTVS0JC/Qm+/NBBTsUM0D9QxIZYUi+qlDy14sOcEaUwICB9A=
|
||||
gateway_ip_configurations:
|
||||
- subnet:
|
||||
id: "{{ subnet_output.state.id }}"
|
||||
name: app_gateway_ip_config
|
||||
frontend_ip_configurations:
|
||||
- subnet:
|
||||
id: "{{ subnet_output.state.id }}"
|
||||
name: sample_gateway_frontend_ip_config
|
||||
frontend_ports:
|
||||
- port: 90
|
||||
name: ag_frontend_port
|
||||
backend_address_pools:
|
||||
- backend_addresses:
|
||||
- ip_address: 10.0.0.4
|
||||
name: test_backend_address_pool
|
||||
backend_http_settings_collection:
|
||||
- port: 80
|
||||
protocol: http
|
||||
cookie_based_affinity: enabled
|
||||
name: sample_appgateway_http_settings
|
||||
http_listeners:
|
||||
- frontend_ip_configuration: sample_gateway_frontend_ip_config
|
||||
frontend_port: ag_frontend_port
|
||||
name: sample_http_listener
|
||||
request_routing_rules:
|
||||
- rule_type: Basic
|
||||
backend_address_pool: test_backend_address_pool
|
||||
backend_http_settings: sample_appgateway_http_settings
|
||||
http_listener: sample_http_listener
|
||||
name: rule1
|
||||
register: output
|
||||
- name: Assert the resource instance is well created
|
||||
assert:
|
||||
that:
|
||||
- not output.changed
|
||||
|
||||
- name: Try to update instance of Application Gateway - single change
|
||||
azure_rm_appgateway:
|
||||
resource_group: "{{ resource_group }}"
|
||||
name: "appgateway{{ rpfx }}"
|
||||
sku:
|
||||
name: standard_small
|
||||
tier: standard
|
||||
capacity: 2
|
||||
ssl_policy:
|
||||
policy_type: predefined
|
||||
policy_name: ssl_policy20150501
|
||||
disabled_ssl_protocols:
|
||||
- tls_v1_0
|
||||
cipher_suites:
|
||||
- tls_ecdhe_ecdsa_with_aes_256_gcm_sha384
|
||||
authentication_certificates:
|
||||
- name: cert1
|
||||
data: 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
|
||||
ssl_certificates:
|
||||
- name: cert2
|
||||
password: your-password
|
||||
data: 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
|
||||
gateway_ip_configurations:
|
||||
- subnet:
|
||||
id: "{{ subnet_output.state.id }}"
|
||||
name: app_gateway_ip_config
|
||||
frontend_ip_configurations:
|
||||
- subnet:
|
||||
id: "{{ subnet_output.state.id }}"
|
||||
name: sample_gateway_frontend_ip_config
|
||||
frontend_ports:
|
||||
- port: 90
|
||||
name: ag_frontend_port
|
||||
backend_address_pools:
|
||||
- backend_addresses:
|
||||
- ip_address: 10.0.0.4
|
||||
name: test_backend_address_pool
|
||||
backend_http_settings_collection:
|
||||
- port: 81
|
||||
protocol: http
|
||||
cookie_based_affinity: enabled
|
||||
name: sample_appgateway_http_settings
|
||||
http_listeners:
|
||||
- frontend_ip_configuration: sample_gateway_frontend_ip_config
|
||||
frontend_port: ag_frontend_port
|
||||
name: sample_http_listener
|
||||
request_routing_rules:
|
||||
- rule_type: Basic
|
||||
backend_address_pool: test_backend_address_pool
|
||||
backend_http_settings: sample_appgateway_http_settings
|
||||
http_listener: sample_http_listener
|
||||
name: rule1
|
||||
register: output
|
||||
- name: Assert the resource instance is well created
|
||||
assert:
|
||||
that:
|
||||
- output.changed
|
||||
|
||||
- name: Delete instance of Application Gateway -- check mode
|
||||
azure_rm_appgateway:
|
||||
resource_group: "{{ resource_group }}"
|
||||
name: "appgateway{{ rpfx }}"
|
||||
state: absent
|
||||
check_mode: yes
|
||||
register: output
|
||||
- name: Assert the state has changed
|
||||
assert:
|
||||
that:
|
||||
- output.changed
|
||||
|
||||
- name: Delete instance of Application Gateway
|
||||
azure_rm_appgateway:
|
||||
resource_group: "{{ resource_group }}"
|
||||
name: "appgateway{{ rpfx }}"
|
||||
state: absent
|
||||
register: output
|
||||
- name: Assert the state has changed
|
||||
assert:
|
||||
that:
|
||||
- output.changed
|
||||
|
||||
- name: Delete unexisting instance of Application Gateway
|
||||
azure_rm_appgateway:
|
||||
resource_group: "{{ resource_group }}"
|
||||
name: "appgateway{{ rpfx }}"
|
||||
state: absent
|
||||
register: output
|
||||
- name: Assert the state has changed
|
||||
assert:
|
||||
that:
|
||||
- output.changed == false
|
Loading…
Reference in New Issue