Skip to content

Commit

Permalink
Cleanup after renamed plugins (ansible-collections#1940)
Browse files Browse the repository at this point in the history
Cleanup after renamed plugins

SUMMARY
Prior to 5.0.0 we renamed various modules.  Cleanup the integration tests (and some docs).
ISSUE TYPE

Docs Pull Request

COMPONENT NAME
plugins/modules/acm_certificate.py
plugins/modules/acm_certificate_info.py
plugins/modules/autoscaling_policy.py
plugins/modules/codepipeline.py
plugins/modules/storagegateway_info.py
ADDITIONAL INFORMATION

Reviewed-by: Alina Buzachis
  • Loading branch information
tremble authored Sep 12, 2023
1 parent 3a801c0 commit c2fead0
Show file tree
Hide file tree
Showing 95 changed files with 959 additions and 956 deletions.
2 changes: 2 additions & 0 deletions changelogs/fragments/20230908-alias-cleanup.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,2 @@
trivial:
- Update integration tests to reflect renamed plugins
12 changes: 6 additions & 6 deletions plugins/modules/acm_certificate.py
Original file line number Diff line number Diff line change
Expand Up @@ -167,14 +167,14 @@
EXAMPLES = r"""
- name: upload a self-signed certificate
community.aws.aws_acm:
community.aws.acm_certificate:
certificate: "{{ lookup('file', 'cert.pem' ) }}"
privateKey: "{{ lookup('file', 'key.pem' ) }}"
name_tag: my_cert # to be applied through an AWS tag as "Name":"my_cert"
region: ap-southeast-2 # AWS region
- name: create/update a certificate with a chain
community.aws.aws_acm:
community.aws.acm_certificate:
certificate: "{{ lookup('file', 'cert.pem' ) }}"
private_key: "{{ lookup('file', 'key.pem' ) }}"
name_tag: my_cert
Expand All @@ -188,25 +188,25 @@
var: cert_create.certificate.arn
- name: delete the cert we just created
community.aws.aws_acm:
community.aws.acm_certificate:
name_tag: my_cert
state: absent
region: ap-southeast-2
- name: delete a certificate with a particular ARN
community.aws.aws_acm:
community.aws.acm_certificate:
certificate_arn: "arn:aws:acm:ap-southeast-2:123456789012:certificate/01234567-abcd-abcd-abcd-012345678901"
state: absent
region: ap-southeast-2
- name: delete all certificates with a particular domain name
community.aws.aws_acm:
community.aws.acm_certificate:
domain_name: acm.ansible.com
state: absent
region: ap-southeast-2
- name: add tags to an existing certificate with a particular ARN
community.aws.aws_acm:
community.aws.acm_certificate:
certificate_arn: "arn:aws:acm:ap-southeast-2:123456789012:certificate/01234567-abcd-abcd-abcd-012345678901"
tags:
Name: my_certificate
Expand Down
10 changes: 5 additions & 5 deletions plugins/modules/acm_certificate_info.py
Original file line number Diff line number Diff line change
Expand Up @@ -48,27 +48,27 @@

EXAMPLES = r"""
- name: obtain all ACM certificates
community.aws.aws_acm_info:
community.aws.acm_certificate_info:
- name: obtain all information for a single ACM certificate
community.aws.aws_acm_info:
community.aws.acm_certificate_info:
domain_name: "*.example_com"
- name: obtain all certificates pending validation
community.aws.aws_acm_info:
community.aws.acm_certificate_info:
statuses:
- PENDING_VALIDATION
- name: obtain all certificates with tag Name=foo and myTag=bar
community.aws.aws_acm_info:
community.aws.acm_certificate_info:
tags:
Name: foo
myTag: bar
# The output is still a list of certificates, just one item long.
- name: obtain information about a certificate with a particular ARN
community.aws.aws_acm_info:
community.aws.acm_certificate_info:
certificate_arn: "arn:aws:acm:ap-southeast-2:123456789012:certificate/abcdeabc-abcd-1234-4321-abcdeabcde12"
"""
Expand Down
6 changes: 3 additions & 3 deletions plugins/modules/autoscaling_policy.py
Original file line number Diff line number Diff line change
Expand Up @@ -223,7 +223,7 @@
asg_name: "application-asg"
- name: create TargetTracking predefined policy
ec2_scaling_policy:
community.aws.autoscaling_policy:
name: "predefined-policy-1"
policy_type: TargetTrackingScaling
target_tracking_config:
Expand All @@ -234,7 +234,7 @@
register: result
- name: create TargetTracking predefined policy with resource_label
ec2_scaling_policy:
community.aws.autoscaling_policy:
name: "predefined-policy-1"
policy_type: TargetTrackingScaling
target_tracking_config:
Expand All @@ -246,7 +246,7 @@
register: result
- name: create TargetTrackingScaling custom policy
ec2_scaling_policy:
community.aws.autoscaling_policy:
name: "custom-policy-1"
policy_type: TargetTrackingScaling
target_tracking_config:
Expand Down
2 changes: 1 addition & 1 deletion plugins/modules/codepipeline.py
Original file line number Diff line number Diff line change
Expand Up @@ -81,7 +81,7 @@
# Note: These examples do not set authentication details, see the AWS Guide for details.
# Example for creating a pipeline for continuous deploy of Github code to an ECS cluster (container)
- community.aws.aws_codepipeline:
- community.aws.codepipeline:
name: my_deploy_pipeline
role_arn: arn:aws:iam::123456:role/AWS-CodePipeline-Service
artifact_store:
Expand Down
4 changes: 2 additions & 2 deletions plugins/modules/storagegateway_info.py
Original file line number Diff line number Diff line change
Expand Up @@ -165,10 +165,10 @@
# Note: These examples do not set authentication details, see the AWS Guide for details.
- name: "Get AWS storage gateway information"
community.aws.aws_sgw_info:
community.aws.storagegateway_info:
- name: "Get AWS storage gateway information for region eu-west-3"
community.aws.aws_sgw_info:
community.aws.storagegateway_info:
region: eu-west-3
"""

Expand Down
Loading

0 comments on commit c2fead0

Please sign in to comment.