mirror of https://github.com/ansible/ansible.git
hwc: Add security group module (#60187)
* Add security group module * Update hwc_vpc_security_group.pypull/61912/head
parent
034afd40a3
commit
7ed6a0037c
@ -0,0 +1,647 @@
|
||||
#!/usr/bin/python
|
||||
# -*- coding: utf-8 -*-
|
||||
#
|
||||
# Copyright (C) 2019 Huawei
|
||||
# GNU General Public License v3.0+ (see COPYING or
|
||||
# https://www.gnu.org/licenses/gpl-3.0.txt)
|
||||
|
||||
from __future__ import absolute_import, division, print_function
|
||||
__metaclass__ = type
|
||||
|
||||
###############################################################################
|
||||
# Documentation
|
||||
###############################################################################
|
||||
|
||||
ANSIBLE_METADATA = {'metadata_version': '1.1',
|
||||
'status': ["preview"],
|
||||
'supported_by': 'community'}
|
||||
|
||||
DOCUMENTATION = '''
|
||||
---
|
||||
module: hwc_vpc_security_group
|
||||
description:
|
||||
- vpc security group management.
|
||||
short_description: Creates a resource of Vpc/SecurityGroup in Huawei Cloud
|
||||
notes:
|
||||
- If I(id) option is provided, it takes precedence over I(name),
|
||||
I(enterprise_project_id) and I(vpc_id) for security group selection.
|
||||
- I(name), I(enterprise_project_id) and I(vpc_id) are used for security
|
||||
group selection. If more than one security group with this options exists,
|
||||
execution is aborted.
|
||||
- No parameter support updating. If one of option is changed, the module
|
||||
will create a new resource.
|
||||
version_added: '2.10'
|
||||
author: Huawei Inc. (@huaweicloud)
|
||||
requirements:
|
||||
- keystoneauth1 >= 3.6.0
|
||||
options:
|
||||
state:
|
||||
description:
|
||||
- Whether the given object should exist in Huawei Cloud.
|
||||
type: str
|
||||
choices: ['present', 'absent']
|
||||
default: 'present'
|
||||
name:
|
||||
description:
|
||||
- Specifies the security group name. The value is a string of 1 to
|
||||
64 characters that can contain letters, digits, underscores C(_),
|
||||
hyphens (-), and periods (.).
|
||||
type: str
|
||||
required: true
|
||||
enterprise_project_id:
|
||||
description:
|
||||
- Specifies the enterprise project ID. When creating a security
|
||||
group, associate the enterprise project ID with the security
|
||||
group.s
|
||||
type: str
|
||||
required: false
|
||||
default: 0
|
||||
vpc_id:
|
||||
description:
|
||||
- Specifies the resource ID of the VPC to which the security group
|
||||
belongs.
|
||||
type: str
|
||||
required: false
|
||||
extends_documentation_fragment: hwc
|
||||
'''
|
||||
|
||||
EXAMPLES = '''
|
||||
# create a security group
|
||||
- name: create a security group
|
||||
hwc_vpc_security_group:
|
||||
name: "ansible_network_security_group_test"
|
||||
'''
|
||||
|
||||
RETURN = '''
|
||||
name:
|
||||
description:
|
||||
- Specifies the security group name. The value is a string of 1 to
|
||||
64 characters that can contain letters, digits, underscores C(_),
|
||||
hyphens (-), and periods (.).
|
||||
type: str
|
||||
returned: success
|
||||
enterprise_project_id:
|
||||
description:
|
||||
- Specifies the enterprise project ID. When creating a security
|
||||
group, associate the enterprise project ID with the security
|
||||
group.
|
||||
type: str
|
||||
returned: success
|
||||
vpc_id:
|
||||
description:
|
||||
- Specifies the resource ID of the VPC to which the security group
|
||||
belongs.
|
||||
type: str
|
||||
returned: success
|
||||
rules:
|
||||
description:
|
||||
- Specifies the security group rule, which ensures that resources
|
||||
in the security group can communicate with one another.
|
||||
type: complex
|
||||
returned: success
|
||||
contains:
|
||||
description:
|
||||
description:
|
||||
- Provides supplementary information about the security
|
||||
group rule.
|
||||
type: str
|
||||
returned: success
|
||||
direction:
|
||||
description:
|
||||
- Specifies the direction of access control. The value can
|
||||
be egress or ingress.
|
||||
type: str
|
||||
returned: success
|
||||
ethertype:
|
||||
description:
|
||||
- Specifies the IP protocol version. The value can be IPv4
|
||||
or IPv6.
|
||||
type: str
|
||||
returned: success
|
||||
id:
|
||||
description:
|
||||
- Specifies the security group rule ID.
|
||||
type: str
|
||||
returned: success
|
||||
port_range_max:
|
||||
description:
|
||||
- Specifies the end port number. The value ranges from 1 to
|
||||
65535. If the protocol is not icmp, the value cannot be
|
||||
smaller than the port_range_min value. An empty value
|
||||
indicates all ports.
|
||||
type: int
|
||||
returned: success
|
||||
port_range_min:
|
||||
description:
|
||||
- Specifies the start port number. The value ranges from 1
|
||||
to 65535. The value cannot be greater than the
|
||||
port_range_max value. An empty value indicates all ports.
|
||||
type: int
|
||||
returned: success
|
||||
protocol:
|
||||
description:
|
||||
- Specifies the protocol type. The value can be icmp, tcp,
|
||||
udp, or others. If the parameter is left blank, the
|
||||
security group supports all protocols.
|
||||
type: str
|
||||
returned: success
|
||||
remote_address_group_id:
|
||||
description:
|
||||
- Specifies the ID of remote IP address group.
|
||||
type: str
|
||||
returned: success
|
||||
remote_group_id:
|
||||
description:
|
||||
- Specifies the ID of the peer security group.
|
||||
type: str
|
||||
returned: success
|
||||
remote_ip_prefix:
|
||||
description:
|
||||
- Specifies the remote IP address. If the access control
|
||||
direction is set to egress, the parameter specifies the
|
||||
source IP address. If the access control direction is set
|
||||
to ingress, the parameter specifies the destination IP
|
||||
address.
|
||||
type: str
|
||||
returned: success
|
||||
'''
|
||||
|
||||
from ansible.module_utils.hwc_utils import (
|
||||
Config, HwcClientException, HwcModule, are_different_dicts, build_path,
|
||||
get_region, is_empty_value, navigate_value)
|
||||
|
||||
|
||||
def build_module():
|
||||
return HwcModule(
|
||||
argument_spec=dict(
|
||||
state=dict(default='present', choices=['present', 'absent'],
|
||||
type='str'),
|
||||
name=dict(type='str', required=True),
|
||||
enterprise_project_id=dict(type='str'),
|
||||
vpc_id=dict(type='str')
|
||||
),
|
||||
supports_check_mode=True,
|
||||
)
|
||||
|
||||
|
||||
def main():
|
||||
"""Main function"""
|
||||
|
||||
module = build_module()
|
||||
config = Config(module, "vpc")
|
||||
|
||||
try:
|
||||
resource = None
|
||||
if module.params.get("id"):
|
||||
resource = read_resource(config)
|
||||
if module.params['state'] == 'present':
|
||||
check_resource_option(resource, module)
|
||||
else:
|
||||
v = search_resource(config)
|
||||
if len(v) > 1:
|
||||
raise Exception("Found more than one resource(%s)" % ", ".join([
|
||||
navigate_value(i, ["id"]) for i in v]))
|
||||
|
||||
if len(v) == 1:
|
||||
resource = update_properties(module, {"read": v[0]}, None)
|
||||
module.params['id'] = navigate_value(resource, ["id"])
|
||||
|
||||
result = {}
|
||||
changed = False
|
||||
if module.params['state'] == 'present':
|
||||
if resource is None:
|
||||
if not module.check_mode:
|
||||
resource = create(config)
|
||||
changed = True
|
||||
|
||||
result = resource
|
||||
else:
|
||||
if resource:
|
||||
if not module.check_mode:
|
||||
delete(config)
|
||||
changed = True
|
||||
|
||||
except Exception as ex:
|
||||
module.fail_json(msg=str(ex))
|
||||
|
||||
else:
|
||||
result['changed'] = changed
|
||||
module.exit_json(**result)
|
||||
|
||||
|
||||
def user_input_parameters(module):
|
||||
return {
|
||||
"enterprise_project_id": module.params.get("enterprise_project_id"),
|
||||
"name": module.params.get("name"),
|
||||
"vpc_id": module.params.get("vpc_id"),
|
||||
"id": module.params.get("id"),
|
||||
}
|
||||
|
||||
|
||||
def check_resource_option(resource, module):
|
||||
opts = user_input_parameters(module)
|
||||
|
||||
resource = {
|
||||
"enterprise_project_id": resource.get("enterprise_project_id"),
|
||||
"name": resource.get("name"),
|
||||
"vpc_id": resource.get("vpc_id"),
|
||||
"id": resource.get("id"),
|
||||
}
|
||||
|
||||
if are_different_dicts(resource, opts):
|
||||
raise Exception(
|
||||
"Cannot change option from (%s) to (%s) for an"
|
||||
" existing security group(%s)." % (resource, opts,
|
||||
module.params.get('id')))
|
||||
|
||||
|
||||
def create(config):
|
||||
module = config.module
|
||||
client = config.client(get_region(module), "vpc", "project")
|
||||
opts = user_input_parameters(module)
|
||||
|
||||
params = build_create_parameters(opts)
|
||||
r = send_create_request(module, params, client)
|
||||
module.params['id'] = navigate_value(r, ["security_group", "id"])
|
||||
|
||||
result = update_properties(module, {"read": fill_read_resp_body(r)}, None)
|
||||
return result
|
||||
|
||||
|
||||
def delete(config):
|
||||
module = config.module
|
||||
client = config.client(get_region(module), "vpc", "project")
|
||||
|
||||
send_delete_request(module, None, client)
|
||||
|
||||
|
||||
def read_resource(config, exclude_output=False):
|
||||
module = config.module
|
||||
client = config.client(get_region(module), "vpc", "project")
|
||||
|
||||
res = {}
|
||||
|
||||
r = send_read_request(module, client)
|
||||
res["read"] = fill_read_resp_body(r)
|
||||
|
||||
return update_properties(module, res, None, exclude_output)
|
||||
|
||||
|
||||
def _build_query_link(opts):
|
||||
query_params = []
|
||||
|
||||
v = navigate_value(opts, ["enterprise_project_id"])
|
||||
if v:
|
||||
query_params.append("enterprise_project_id=" + str(v))
|
||||
|
||||
v = navigate_value(opts, ["vpc_id"])
|
||||
if v:
|
||||
query_params.append("vpc_id=" + str(v))
|
||||
|
||||
query_link = "?marker={marker}&limit=10"
|
||||
if query_params:
|
||||
query_link += "&" + "&".join(query_params)
|
||||
|
||||
return query_link
|
||||
|
||||
|
||||
def search_resource(config):
|
||||
module = config.module
|
||||
client = config.client(get_region(module), "vpc", "project")
|
||||
opts = user_input_parameters(module)
|
||||
identity_obj = _build_identity_object(opts)
|
||||
query_link = _build_query_link(opts)
|
||||
link = "security-groups" + query_link
|
||||
|
||||
result = []
|
||||
p = {'marker': ''}
|
||||
while True:
|
||||
url = link.format(**p)
|
||||
r = send_list_request(module, client, url)
|
||||
if not r:
|
||||
break
|
||||
|
||||
for item in r:
|
||||
item = fill_list_resp_body(item)
|
||||
if not are_different_dicts(identity_obj, item):
|
||||
result.append(item)
|
||||
|
||||
if len(result) > 1:
|
||||
break
|
||||
|
||||
p['marker'] = r[-1].get('id')
|
||||
|
||||
return result
|
||||
|
||||
|
||||
def build_create_parameters(opts):
|
||||
params = dict()
|
||||
|
||||
v = navigate_value(opts, ["enterprise_project_id"], None)
|
||||
if not is_empty_value(v):
|
||||
params["enterprise_project_id"] = v
|
||||
|
||||
v = navigate_value(opts, ["name"], None)
|
||||
if not is_empty_value(v):
|
||||
params["name"] = v
|
||||
|
||||
v = navigate_value(opts, ["vpc_id"], None)
|
||||
if not is_empty_value(v):
|
||||
params["vpc_id"] = v
|
||||
|
||||
if not params:
|
||||
return params
|
||||
|
||||
params = {"security_group": params}
|
||||
|
||||
return params
|
||||
|
||||
|
||||
def send_create_request(module, params, client):
|
||||
url = "security-groups"
|
||||
try:
|
||||
r = client.post(url, params)
|
||||
except HwcClientException as ex:
|
||||
msg = ("module(hwc_vpc_security_group): error running "
|
||||
"api(create), error: %s" % str(ex))
|
||||
module.fail_json(msg=msg)
|
||||
|
||||
return r
|
||||
|
||||
|
||||
def send_delete_request(module, params, client):
|
||||
url = build_path(module, "security-groups/{id}")
|
||||
|
||||
try:
|
||||
r = client.delete(url, params)
|
||||
except HwcClientException as ex:
|
||||
msg = ("module(hwc_vpc_security_group): error running "
|
||||
"api(delete), error: %s" % str(ex))
|
||||
module.fail_json(msg=msg)
|
||||
|
||||
return r
|
||||
|
||||
|
||||
def send_read_request(module, client):
|
||||
url = build_path(module, "security-groups/{id}")
|
||||
|
||||
r = None
|
||||
try:
|
||||
r = client.get(url)
|
||||
except HwcClientException as ex:
|
||||
msg = ("module(hwc_vpc_security_group): error running "
|
||||
"api(read), error: %s" % str(ex))
|
||||
module.fail_json(msg=msg)
|
||||
|
||||
return navigate_value(r, ["security_group"], None)
|
||||
|
||||
|
||||
def fill_read_resp_body(body):
|
||||
result = dict()
|
||||
|
||||
result["enterprise_project_id"] = body.get("enterprise_project_id")
|
||||
|
||||
result["id"] = body.get("id")
|
||||
|
||||
result["name"] = body.get("name")
|
||||
|
||||
v = fill_read_resp_security_group_rules(body.get("security_group_rules"))
|
||||
result["security_group_rules"] = v
|
||||
|
||||
result["vpc_id"] = body.get("vpc_id")
|
||||
|
||||
return result
|
||||
|
||||
|
||||
def fill_read_resp_security_group_rules(value):
|
||||
if not value:
|
||||
return None
|
||||
|
||||
result = []
|
||||
for item in value:
|
||||
val = dict()
|
||||
|
||||
val["description"] = item.get("description")
|
||||
|
||||
val["direction"] = item.get("direction")
|
||||
|
||||
val["ethertype"] = item.get("ethertype")
|
||||
|
||||
val["id"] = item.get("id")
|
||||
|
||||
val["port_range_max"] = item.get("port_range_max")
|
||||
|
||||
val["port_range_min"] = item.get("port_range_min")
|
||||
|
||||
val["protocol"] = item.get("protocol")
|
||||
|
||||
val["remote_address_group_id"] = item.get("remote_address_group_id")
|
||||
|
||||
val["remote_group_id"] = item.get("remote_group_id")
|
||||
|
||||
val["remote_ip_prefix"] = item.get("remote_ip_prefix")
|
||||
|
||||
val["security_group_id"] = item.get("security_group_id")
|
||||
|
||||
result.append(val)
|
||||
|
||||
return result
|
||||
|
||||
|
||||
def update_properties(module, response, array_index, exclude_output=False):
|
||||
r = user_input_parameters(module)
|
||||
|
||||
v = navigate_value(response, ["read", "enterprise_project_id"],
|
||||
array_index)
|
||||
r["enterprise_project_id"] = v
|
||||
|
||||
v = navigate_value(response, ["read", "name"], array_index)
|
||||
r["name"] = v
|
||||
|
||||
if not exclude_output:
|
||||
v = r.get("rules")
|
||||
v = flatten_rules(response, array_index, v, exclude_output)
|
||||
r["rules"] = v
|
||||
|
||||
v = navigate_value(response, ["read", "vpc_id"], array_index)
|
||||
r["vpc_id"] = v
|
||||
|
||||
v = navigate_value(response, ["read", "id"], array_index)
|
||||
r["id"] = v
|
||||
|
||||
return r
|
||||
|
||||
|
||||
def flatten_rules(d, array_index, current_value, exclude_output):
|
||||
n = 0
|
||||
result = current_value
|
||||
has_init_value = True
|
||||
if result:
|
||||
n = len(result)
|
||||
else:
|
||||
has_init_value = False
|
||||
result = []
|
||||
v = navigate_value(d, ["read", "security_group_rules"],
|
||||
array_index)
|
||||
if not v:
|
||||
return current_value
|
||||
n = len(v)
|
||||
|
||||
new_array_index = dict()
|
||||
if array_index:
|
||||
new_array_index.update(array_index)
|
||||
|
||||
for i in range(n):
|
||||
new_array_index["read.security_group_rules"] = i
|
||||
|
||||
val = dict()
|
||||
if len(result) >= (i + 1) and result[i]:
|
||||
val = result[i]
|
||||
|
||||
if not exclude_output:
|
||||
v = navigate_value(d, ["read", "security_group_rules", "description"],
|
||||
new_array_index)
|
||||
val["description"] = v
|
||||
|
||||
if not exclude_output:
|
||||
v = navigate_value(d, ["read", "security_group_rules", "direction"],
|
||||
new_array_index)
|
||||
val["direction"] = v
|
||||
|
||||
if not exclude_output:
|
||||
v = navigate_value(d, ["read", "security_group_rules", "ethertype"],
|
||||
new_array_index)
|
||||
val["ethertype"] = v
|
||||
|
||||
if not exclude_output:
|
||||
v = navigate_value(d, ["read", "security_group_rules", "id"],
|
||||
new_array_index)
|
||||
val["id"] = v
|
||||
|
||||
if not exclude_output:
|
||||
v = navigate_value(d, ["read", "security_group_rules", "port_range_max"],
|
||||
new_array_index)
|
||||
val["port_range_max"] = v
|
||||
|
||||
if not exclude_output:
|
||||
v = navigate_value(d, ["read", "security_group_rules", "port_range_min"],
|
||||
new_array_index)
|
||||
val["port_range_min"] = v
|
||||
|
||||
if not exclude_output:
|
||||
v = navigate_value(d, ["read", "security_group_rules", "protocol"],
|
||||
new_array_index)
|
||||
val["protocol"] = v
|
||||
|
||||
if not exclude_output:
|
||||
v = navigate_value(d, ["read", "security_group_rules", "remote_address_group_id"],
|
||||
new_array_index)
|
||||
val["remote_address_group_id"] = v
|
||||
|
||||
if not exclude_output:
|
||||
v = navigate_value(d, ["read", "security_group_rules", "remote_group_id"],
|
||||
new_array_index)
|
||||
val["remote_group_id"] = v
|
||||
|
||||
if not exclude_output:
|
||||
v = navigate_value(d, ["read", "security_group_rules", "remote_ip_prefix"],
|
||||
new_array_index)
|
||||
val["remote_ip_prefix"] = v
|
||||
|
||||
if len(result) >= (i + 1):
|
||||
result[i] = val
|
||||
else:
|
||||
for v in val.values():
|
||||
if v is not None:
|
||||
result.append(val)
|
||||
break
|
||||
|
||||
return result if (has_init_value or result) else current_value
|
||||
|
||||
|
||||
def send_list_request(module, client, url):
|
||||
|
||||
r = None
|
||||
try:
|
||||
r = client.get(url)
|
||||
except HwcClientException as ex:
|
||||
msg = ("module(hwc_vpc_security_group): error running "
|
||||
"api(list), error: %s" % str(ex))
|
||||
module.fail_json(msg=msg)
|
||||
|
||||
return navigate_value(r, ["security_groups"], None)
|
||||
|
||||
|
||||
def _build_identity_object(all_opts):
|
||||
result = dict()
|
||||
|
||||
v = navigate_value(all_opts, ["enterprise_project_id"], None)
|
||||
result["enterprise_project_id"] = v
|
||||
|
||||
result["id"] = None
|
||||
|
||||
v = navigate_value(all_opts, ["name"], None)
|
||||
result["name"] = v
|
||||
|
||||
result["security_group_rules"] = None
|
||||
|
||||
v = navigate_value(all_opts, ["vpc_id"], None)
|
||||
result["vpc_id"] = v
|
||||
|
||||
return result
|
||||
|
||||
|
||||
def fill_list_resp_body(body):
|
||||
result = dict()
|
||||
|
||||
result["enterprise_project_id"] = body.get("enterprise_project_id")
|
||||
|
||||
result["id"] = body.get("id")
|
||||
|
||||
result["name"] = body.get("name")
|
||||
|
||||
v = fill_list_resp_security_group_rules(body.get("security_group_rules"))
|
||||
result["security_group_rules"] = v
|
||||
|
||||
result["vpc_id"] = body.get("vpc_id")
|
||||
|
||||
return result
|
||||
|
||||
|
||||
def fill_list_resp_security_group_rules(value):
|
||||
if not value:
|
||||
return None
|
||||
|
||||
result = []
|
||||
for item in value:
|
||||
val = dict()
|
||||
|
||||
val["description"] = item.get("description")
|
||||
|
||||
val["direction"] = item.get("direction")
|
||||
|
||||
val["ethertype"] = item.get("ethertype")
|
||||
|
||||
val["id"] = item.get("id")
|
||||
|
||||
val["port_range_max"] = item.get("port_range_max")
|
||||
|
||||
val["port_range_min"] = item.get("port_range_min")
|
||||
|
||||
val["protocol"] = item.get("protocol")
|
||||
|
||||
val["remote_address_group_id"] = item.get("remote_address_group_id")
|
||||
|
||||
val["remote_group_id"] = item.get("remote_group_id")
|
||||
|
||||
val["remote_ip_prefix"] = item.get("remote_ip_prefix")
|
||||
|
||||
val["security_group_id"] = item.get("security_group_id")
|
||||
|
||||
result.append(val)
|
||||
|
||||
return result
|
||||
|
||||
|
||||
if __name__ == '__main__':
|
||||
main()
|
@ -0,0 +1 @@
|
||||
unsupported
|
@ -0,0 +1,82 @@
|
||||
---
|
||||
# Pre-test setup
|
||||
- name: delete a security group
|
||||
hwc_vpc_security_group:
|
||||
name: "ansible_network_security_group_test"
|
||||
state: absent
|
||||
#----------------------------------------------------------
|
||||
- name: create a security group (check mode)
|
||||
hwc_vpc_security_group:
|
||||
name: "ansible_network_security_group_test"
|
||||
state: present
|
||||
check_mode: yes
|
||||
register: result
|
||||
- name: assert changed is true
|
||||
assert:
|
||||
that:
|
||||
- not result.id
|
||||
- result.changed
|
||||
#----------------------------------------------------------
|
||||
- name: create a security group
|
||||
hwc_vpc_security_group:
|
||||
name: "ansible_network_security_group_test"
|
||||
state: present
|
||||
register: result
|
||||
- name: assert changed is true
|
||||
assert:
|
||||
that:
|
||||
result is changed
|
||||
#----------------------------------------------------------
|
||||
- name: create a security group (idemponent)
|
||||
hwc_vpc_security_group:
|
||||
name: "ansible_network_security_group_test"
|
||||
state: present
|
||||
check_mode: yes
|
||||
register: idemponent
|
||||
- name: idemponent
|
||||
assert:
|
||||
that:
|
||||
- not result.changed
|
||||
# ----------------------------------------------------------------------------
|
||||
- name: create a security group that already exists
|
||||
hwc_vpc_security_group:
|
||||
name: "ansible_network_security_group_test"
|
||||
state: present
|
||||
register: result
|
||||
- name: assert changed is false
|
||||
assert:
|
||||
that:
|
||||
- result.failed == 0
|
||||
- result.changed == false
|
||||
#----------------------------------------------------------
|
||||
- name: delete a security group (check mode)
|
||||
hwc_vpc_security_group:
|
||||
name: "ansible_network_security_group_test"
|
||||
state: absent
|
||||
check_mode: yes
|
||||
register: result
|
||||
- name: assert changed is true
|
||||
assert:
|
||||
that:
|
||||
result is changed
|
||||
#----------------------------------------------------------
|
||||
- name: delete a security group
|
||||
hwc_vpc_security_group:
|
||||
name: "ansible_network_security_group_test"
|
||||
state: absent
|
||||
register: result
|
||||
- name: assert changed is true
|
||||
assert:
|
||||
that:
|
||||
result is changed
|
||||
# ----------------------------------------------------------------------------
|
||||
- name: delete a security group that does not exist
|
||||
hwc_vpc_security_group:
|
||||
name: "ansible_network_security_group_test"
|
||||
state: absent
|
||||
register: result
|
||||
- name: assert changed is false
|
||||
assert:
|
||||
that:
|
||||
- result.failed == 0
|
||||
- result.changed == false
|
Loading…
Reference in New Issue