Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[PR #1940/c2fead07 backport][stable-6] Cleanup after renamed plugins #1943

Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 2 additions & 0 deletions changelogs/fragments/20230908-alias-cleanup.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,2 @@
trivial:
- Update integration tests to reflect renamed plugins
12 changes: 6 additions & 6 deletions plugins/modules/acm_certificate.py
Original file line number Diff line number Diff line change
Expand Up @@ -167,14 +167,14 @@
EXAMPLES = r"""

- name: upload a self-signed certificate
community.aws.aws_acm:
community.aws.acm_certificate:
certificate: "{{ lookup('file', 'cert.pem' ) }}"
privateKey: "{{ lookup('file', 'key.pem' ) }}"
name_tag: my_cert # to be applied through an AWS tag as "Name":"my_cert"
region: ap-southeast-2 # AWS region

- name: create/update a certificate with a chain
community.aws.aws_acm:
community.aws.acm_certificate:
certificate: "{{ lookup('file', 'cert.pem' ) }}"
private_key: "{{ lookup('file', 'key.pem' ) }}"
name_tag: my_cert
Expand All @@ -188,25 +188,25 @@
var: cert_create.certificate.arn

- name: delete the cert we just created
community.aws.aws_acm:
community.aws.acm_certificate:
name_tag: my_cert
state: absent
region: ap-southeast-2

- name: delete a certificate with a particular ARN
community.aws.aws_acm:
community.aws.acm_certificate:
certificate_arn: "arn:aws:acm:ap-southeast-2:123456789012:certificate/01234567-abcd-abcd-abcd-012345678901"
state: absent
region: ap-southeast-2

- name: delete all certificates with a particular domain name
community.aws.aws_acm:
community.aws.acm_certificate:
domain_name: acm.ansible.com
state: absent
region: ap-southeast-2

- name: add tags to an existing certificate with a particular ARN
community.aws.aws_acm:
community.aws.acm_certificate:
certificate_arn: "arn:aws:acm:ap-southeast-2:123456789012:certificate/01234567-abcd-abcd-abcd-012345678901"
tags:
Name: my_certificate
Expand Down
10 changes: 5 additions & 5 deletions plugins/modules/acm_certificate_info.py
Original file line number Diff line number Diff line change
Expand Up @@ -48,27 +48,27 @@

EXAMPLES = r"""
- name: obtain all ACM certificates
community.aws.aws_acm_info:
community.aws.acm_certificate_info:

- name: obtain all information for a single ACM certificate
community.aws.aws_acm_info:
community.aws.acm_certificate_info:
domain_name: "*.example_com"

- name: obtain all certificates pending validation
community.aws.aws_acm_info:
community.aws.acm_certificate_info:
statuses:
- PENDING_VALIDATION

- name: obtain all certificates with tag Name=foo and myTag=bar
community.aws.aws_acm_info:
community.aws.acm_certificate_info:
tags:
Name: foo
myTag: bar


# The output is still a list of certificates, just one item long.
- name: obtain information about a certificate with a particular ARN
community.aws.aws_acm_info:
community.aws.acm_certificate_info:
certificate_arn: "arn:aws:acm:ap-southeast-2:123456789012:certificate/abcdeabc-abcd-1234-4321-abcdeabcde12"

"""
Expand Down
6 changes: 3 additions & 3 deletions plugins/modules/autoscaling_policy.py
Original file line number Diff line number Diff line change
Expand Up @@ -223,7 +223,7 @@
asg_name: "application-asg"

- name: create TargetTracking predefined policy
ec2_scaling_policy:
community.aws.autoscaling_policy:
name: "predefined-policy-1"
policy_type: TargetTrackingScaling
target_tracking_config:
Expand All @@ -234,7 +234,7 @@
register: result

- name: create TargetTracking predefined policy with resource_label
ec2_scaling_policy:
community.aws.autoscaling_policy:
name: "predefined-policy-1"
policy_type: TargetTrackingScaling
target_tracking_config:
Expand All @@ -246,7 +246,7 @@
register: result

- name: create TargetTrackingScaling custom policy
ec2_scaling_policy:
community.aws.autoscaling_policy:
name: "custom-policy-1"
policy_type: TargetTrackingScaling
target_tracking_config:
Expand Down
2 changes: 1 addition & 1 deletion plugins/modules/codepipeline.py
Original file line number Diff line number Diff line change
Expand Up @@ -81,7 +81,7 @@
# Note: These examples do not set authentication details, see the AWS Guide for details.

# Example for creating a pipeline for continuous deploy of Github code to an ECS cluster (container)
- community.aws.aws_codepipeline:
- community.aws.codepipeline:
name: my_deploy_pipeline
role_arn: arn:aws:iam::123456:role/AWS-CodePipeline-Service
artifact_store:
Expand Down
4 changes: 2 additions & 2 deletions plugins/modules/storagegateway_info.py
Original file line number Diff line number Diff line change
Expand Up @@ -165,10 +165,10 @@
# Note: These examples do not set authentication details, see the AWS Guide for details.

- name: "Get AWS storage gateway information"
community.aws.aws_sgw_info:
community.aws.storagegateway_info:

- name: "Get AWS storage gateway information for region eu-west-3"
community.aws.aws_sgw_info:
community.aws.storagegateway_info:
region: eu-west-3
"""

Expand Down
Loading
Loading