[cloud] Update RDS parameter group for boto3 (#25345)

* Update RDS parameter group for boto3

* Update to boto3
* Update to latest ansible standards
* Remove choices list for valid engines (See #19221 for context)
* Allow tagging
* Return some useful information, and document that information

* Add tests for rds_param_group

* Improve testing of rds_param_group

* Add purge_tags option for rds_param_group

* Fix remaining broken rds_param_group tests

* Ensure the group name is lowercased. Fixes integration tests when run on OSX
This commit is contained in:
Will Thames 2017-08-28 11:52:22 -05:00 committed by Ryan Brown
parent f08c29924e
commit 63df0adc17
8 changed files with 595 additions and 159 deletions

1
.gitignore vendored
View file

@ -78,6 +78,7 @@ packaging/release/ansible_release
/test/integration/inventory.remote /test/integration/inventory.remote
/test/integration/inventory.networking /test/integration/inventory.networking
/test/integration/inventory.winrm /test/integration/inventory.winrm
/test/integration/cloud-config-aws.yml
# python 'rope' stuff # python 'rope' stuff
.ropeproject .ropeproject
# local 'ack' config files # local 'ack' config files

View file

@ -46,6 +46,23 @@
"arn:aws:rds:{{aws_region}}:{{aws_account}}:snapshot:rds-*", "arn:aws:rds:{{aws_region}}:{{aws_account}}:snapshot:rds-*",
"arn:aws:rds:{{aws_region}}:{{aws_account}}:db:rds-*" "arn:aws:rds:{{aws_region}}:{{aws_account}}:db:rds-*"
] ]
},
{
"Sid": "AllowRDSParameterGroupManagement",
"Effect": "Allow",
"Action": [
"rds:DescribeDBParameterGroups",
"rds:DescribeDBParameters",
"rds:CreateDBParameterGroup",
"rds:DeleteDBParameterGroup",
"rds:ModifyDBParameterGroup",
"rds:ListTagsForResource",
"rds:AddTagsToResource",
"rds:RemoveTagsFromResource"
],
"Resource": [
"arn:aws:rds:{{aws_region}}:{{aws_account}}:pg:*"
]
} }
] ]
} }

View file

@ -32,26 +32,17 @@ options:
- Specifies whether the group should be present or absent. - Specifies whether the group should be present or absent.
required: true required: true
default: present default: present
aliases: []
choices: [ 'present' , 'absent' ] choices: [ 'present' , 'absent' ]
name: name:
description: description:
- Database parameter group identifier. - Database parameter group identifier.
required: true required: true
default: null
aliases: []
description: description:
description: description:
- Database parameter group description. Only set when a new group is added. - Database parameter group description. Only set when a new group is added.
required: false
default: null
aliases: []
engine: engine:
description: description:
- The type of database for this group. Required for state=present. - The type of database for this group. Required for state=present.
required: false
default: null
aliases: []
choices: choices:
- 'aurora5.6' - 'aurora5.6'
- 'mariadb10.0' - 'mariadb10.0'
@ -84,17 +75,23 @@ options:
immediate: immediate:
description: description:
- Whether to apply the changes immediately, or after the next reboot of any associated instances. - Whether to apply the changes immediately, or after the next reboot of any associated instances.
required: false aliases:
default: null - apply_immediately
aliases: []
params: params:
description: description:
- Map of parameter names and values. Numeric values may be represented as K for kilo (1024), M for mega (1024^2), G for giga (1024^3), - Map of parameter names and values. Numeric values may be represented as K for kilo (1024), M for mega (1024^2), G for giga (1024^3),
or T for tera (1024^4), and these values will be expanded into the appropriate number before being set in the parameter group. or T for tera (1024^4), and these values will be expanded into the appropriate number before being set in the parameter group.
required: false tags:
default: null description:
aliases: [] - Dictionary of tags to attach to the parameter group
author: "Scott Anderson (@tastychutney)" version_added: "2.4"
purge_tags:
description:
- Whether or not to remove tags that do not appear in the I(tags) list. Defaults to false.
version_added: "2.4"
author:
- "Scott Anderson (@tastychutney)"
- "Will Thames (@willthames)"
extends_documentation_fragment: extends_documentation_fragment:
- aws - aws
- ec2 - ec2
@ -109,6 +106,9 @@ EXAMPLES = '''
engine: 'mysql5.6' engine: 'mysql5.6'
params: params:
auto_increment_increment: "42K" auto_increment_increment: "42K"
tags:
Environment: production
Application: parrot
# Remove a parameter group # Remove a parameter group
- rds_param_group: - rds_param_group:
@ -116,19 +116,48 @@ EXAMPLES = '''
name: norwegian_blue name: norwegian_blue
''' '''
try: RETURN = '''
import boto.rds db_parameter_group_name:
from boto.exception import BotoServerError description: Name of DB parameter group
HAS_BOTO = True type: string
except ImportError: returned: when state is present
HAS_BOTO = False db_parameter_group_family:
description: DB parameter group family that this DB parameter group is compatible with.
type: string
returned: when state is present
db_parameter_group_arn:
description: ARN of the DB parameter group
type: string
returned: when state is present
description:
description: description of the DB parameter group
type: string
returned: when state is present
errors:
description: list of errors from attempting to modify parameters that are not modifiable
type: list
returned: when state is present
tags:
description: dictionary of tags
type: dict
returned: when state is present
'''
from ansible.module_utils.basic import AnsibleModule from ansible.module_utils.basic import AnsibleModule
from ansible.module_utils.ec2 import connect_to_aws, ec2_argument_spec, get_aws_connection_info from ansible.module_utils.ec2 import ec2_argument_spec, get_aws_connection_info, boto3_conn
from ansible.module_utils.ec2 import camel_dict_to_snake_dict, HAS_BOTO3, compare_aws_tags
from ansible.module_utils.ec2 import ansible_dict_to_boto3_tag_list, boto3_tag_list_to_ansible_dict
from ansible.module_utils.parsing.convert_bool import BOOLEANS_TRUE from ansible.module_utils.parsing.convert_bool import BOOLEANS_TRUE
from ansible.module_utils.six import string_types from ansible.module_utils.six import string_types
from ansible.module_utils._text import to_native from ansible.module_utils._text import to_native
import traceback
try:
import botocore
except ImportError:
pass # caught by imported HAS_BOTO3
VALID_ENGINES = [ VALID_ENGINES = [
'aurora5.6', 'aurora5.6',
@ -169,181 +198,215 @@ INT_MODIFIERS = {
} }
# returns a tuple: (whether or not a parameter was changed, the remaining parameters that weren't found in this parameter group) def convert_parameter(param, value):
class NotModifiableError(Exception):
def __init__(self, error_message, *args):
super(NotModifiableError, self).__init__(error_message, *args)
self.error_message = error_message
def __repr__(self):
return 'NotModifiableError: %s' % self.error_message
def __str__(self):
return 'NotModifiableError: %s' % self.error_message
def set_parameter(param, value, immediate):
""" """
Allows setting parameters with 10M = 10* 1024 * 1024 and so on. Allows setting parameters with 10M = 10* 1024 * 1024 and so on.
""" """
converted_value = value converted_value = value
if param.type == 'string': if param['DataType'] == 'integer':
converted_value = str(value)
elif param.type == 'integer':
if isinstance(value, string_types): if isinstance(value, string_types):
try: try:
for modifier in INT_MODIFIERS.keys(): for modifier in INT_MODIFIERS.keys():
if value.endswith(modifier): if value.endswith(modifier):
converted_value = int(value[:-1]) * INT_MODIFIERS[modifier] converted_value = int(value[:-1]) * INT_MODIFIERS[modifier]
converted_value = int(converted_value)
except ValueError: except ValueError:
# may be based on a variable (ie. {foo*3/4}) so # may be based on a variable (ie. {foo*3/4}) so
# just pass it on through to boto # just pass it on through to boto
converted_value = str(value) pass
elif isinstance(value, bool): elif isinstance(value, bool):
converted_value = 1 if value else 0 converted_value = 1 if value else 0
else:
converted_value = int(value)
elif param.type == 'boolean': elif param['DataType'] == 'boolean':
if isinstance(value, string_types): if isinstance(value, string_types):
converted_value = to_native(value) in BOOLEANS_TRUE converted_value = to_native(value) in BOOLEANS_TRUE
# convert True/False to 1/0
converted_value = 1 if converted_value else 0
return str(converted_value)
def update_parameters(module, connection):
groupname = module.params['name']
desired = module.params['params']
apply_method = 'immediate' if module.params['immediate'] else 'pending-reboot'
errors = []
modify_list = []
parameters_paginator = connection.get_paginator('describe_db_parameters')
existing = parameters_paginator.paginate(DBParameterGroupName=groupname).build_full_result()['Parameters']
lookup = dict((param['ParameterName'], param) for param in existing)
for param_key, param_value in desired.items():
if param_key not in lookup:
errors.append("Parameter %s is not an available parameter for the %s engine" %
(param_key, module.params.get('engine')))
else: else:
converted_value = bool(value) converted_value = convert_parameter(lookup[param_key], param_value)
# engine-default parameters do not have a ParameterValue, so we'll always override those.
param.value = converted_value if converted_value != lookup[param_key].get('ParameterValue'):
param.apply(immediate) if lookup[param_key]['IsModifiable']:
modify_list.append(dict(ParameterValue=converted_value, ParameterName=param_key, ApplyMethod=apply_method))
def modify_group(group, params, immediate=False): else:
""" Set all of the params in a group to the provided new params. Raises NotModifiableError if any of the errors.append("Parameter %s is not modifiable" % param_key)
params to be changed are read only.
"""
changed = {}
new_params = dict(params)
for key in new_params.keys():
if key in group:
param = group[key]
new_value = new_params[key]
# modify_db_parameters takes at most 20 parameters
if modify_list:
try:
from itertools import izip_longest as zip_longest # python 2
except ImportError:
from itertools import zip_longest # python 3
for modify_slice in zip_longest(*[iter(modify_list)] * 20, fillvalue=None):
non_empty_slice = [item for item in modify_slice if item]
try: try:
old_value = param.value connection.modify_db_parameter_group(DBParameterGroupName=groupname, Parameters=non_empty_slice)
except ValueError: except botocore.exceptions.ClientError as e:
# some versions of boto have problems with retrieving module.fail_json(msg="Couldn't update parameters: %s" % str(e),
# integer values from params that may have their value exception=traceback.format_exc(),
# based on a variable (ie. {foo*3/4}), so grab it in a **camel_dict_to_snake_dict(e.response))
# way that bypasses the property functions return True, errors
old_value = param._value return False, errors
if old_value != new_value:
if not param.is_modifiable:
raise NotModifiableError('Parameter %s is not modifiable.' % key)
changed[key] = {'old': old_value, 'new': new_value} def update_tags(module, connection, group, tags):
changed = False
existing_tags = connection.list_tags_for_resource(ResourceName=group['DBParameterGroupArn'])['TagList']
to_update, to_delete = compare_aws_tags(boto3_tag_list_to_ansible_dict(existing_tags),
tags, module.params['purge_tags'])
if to_update:
try:
connection.add_tags_to_resource(ResourceName=group['DBParameterGroupArn'],
Tags=ansible_dict_to_boto3_tag_list(to_update))
changed = True
except botocore.exceptions.ClientError as e:
module.fail_json(msg="Couldn't add tags to parameter group: %s" % str(e),
exception=traceback.format_exc(),
**camel_dict_to_snake_dict(e.response))
except botocore.exceptions.ParamValidationError as e:
# Usually a tag value has been passed as an int or bool, needs to be a string
# The AWS exception message is reasonably ok for this purpose
module.fail_json(msg="Couldn't add tags to parameter group: %s." % str(e),
exception=traceback.format_exc())
if to_delete:
try:
connection.remove_tags_from_resource(ResourceName=group['DBParameterGroupArn'],
TagKeys=to_delete)
changed = True
except botocore.exceptions.ClientError as e:
module.fail_json(msg="Couldn't remove tags from parameter group: %s" % str(e),
exception=traceback.format_exc(),
**camel_dict_to_snake_dict(e.response))
return changed
set_parameter(param, new_value, immediate)
del new_params[key] def ensure_present(module, connection):
groupname = module.params['name']
tags = module.params.get('tags')
changed = False
errors = []
try:
response = connection.describe_db_parameter_groups(DBParameterGroupName=groupname)
except botocore.exceptions.ClientError as e:
if e.response['Error']['Code'] == 'DBParameterGroupNotFound':
response = None
else:
module.fail_json(msg="Couldn't access parameter group information: %s" % str(e),
exception=traceback.format_exc(),
**camel_dict_to_snake_dict(e.response))
if not response:
params = dict(DBParameterGroupName=groupname,
DBParameterGroupFamily=module.params['engine'],
Description=module.params['description'])
if tags:
params['Tags'] = ansible_dict_to_boto3_tag_list(tags)
try:
response = connection.create_db_parameter_group(**params)
changed = True
except botocore.exceptions.ClientError as e:
module.fail_json(msg="Couldn't create parameter group: %s" % str(e),
exception=traceback.format_exc(),
**camel_dict_to_snake_dict(e.response))
else:
group = response['DBParameterGroups'][0]
if tags:
changed = update_tags(module, connection, group, tags)
return changed, new_params if module.params.get('params'):
params_changed, errors = update_parameters(module, connection)
changed = changed or params_changed
try:
response = connection.describe_db_parameter_groups(DBParameterGroupName=groupname)
group = camel_dict_to_snake_dict(response['DBParameterGroups'][0])
except botocore.exceptions.ClientError as e:
module.fail_json(msg="Couldn't obtain parameter group information: %s" % str(e),
exception=traceback.format_exc(),
**camel_dict_to_snake_dict(e.response))
try:
tags = connection.list_tags_for_resource(ResourceName=group['db_parameter_group_arn'])['TagList']
except botocore.exceptions.ClientError as e:
module.fail_json(msg="Couldn't obtain parameter group tags: %s" % str(e),
exception=traceback.format_exc(),
**camel_dict_to_snake_dict(e.response))
group['tags'] = boto3_tag_list_to_ansible_dict(tags)
module.exit_json(changed=changed, errors=errors, **group)
def ensure_absent(module, connection):
group = module.params['name']
try:
response = connection.describe_db_parameter_groups(DBParameterGroupName=group)
except botocore.exceptions.ClientError as e:
if e.response['Error']['Code'] == 'DBParameterGroupNotFound':
module.exit_json(changed=False)
else:
module.fail_json(msg="Couldn't access parameter group information: %s" % str(e),
exception=traceback.format_exc(),
**camel_dict_to_snake_dict(e.response))
try:
response = connection.delete_db_parameter_group(DBParameterGroupName=group)
module.exit_json(changed=True)
except botocore.exceptions.ClientError as e:
module.fail_json(msg="Couldn't delete parameter group: %s" % str(e),
exception=traceback.format_exc(),
**camel_dict_to_snake_dict(e.response))
def main(): def main():
argument_spec = ec2_argument_spec() argument_spec = ec2_argument_spec()
argument_spec.update(dict( argument_spec.update(
state = dict(required=True, choices=['present', 'absent']), dict(
name = dict(required=True), state=dict(required=True, choices=['present', 'absent']),
engine = dict(required=False, choices=VALID_ENGINES), name=dict(required=True),
description = dict(required=False), engine=dict(),
params = dict(required=False, aliases=['parameters'], type='dict'), description=dict(),
immediate = dict(required=False, type='bool'), params=dict(aliases=['parameters'], type='dict'),
immediate=dict(type='bool', aliases=['apply_immediately']),
tags=dict(type='dict', default={}),
purge_tags=dict(type='bool', default=False)
)
) )
) module = AnsibleModule(argument_spec=argument_spec,
module = AnsibleModule(argument_spec=argument_spec) required_if=[['state', 'present', ['description', 'engine']]])
if not HAS_BOTO: if not HAS_BOTO3:
module.fail_json(msg='boto required for this module') module.fail_json(msg='boto3 and botocore are required for this module')
state = module.params.get('state')
group_name = module.params.get('name').lower()
group_engine = module.params.get('engine')
group_description = module.params.get('description')
group_params = module.params.get('params') or {}
immediate = module.params.get('immediate') or False
if state == 'present':
for required in ['name', 'description', 'engine']:
if not module.params.get(required):
module.fail_json(msg = str("Parameter %s required for state='present'" % required))
else:
for not_allowed in ['description', 'engine', 'params']:
if module.params.get(not_allowed):
module.fail_json(msg = str("Parameter %s not allowed for state='absent'" % not_allowed))
# Retrieve any AWS settings from the environment. # Retrieve any AWS settings from the environment.
region, ec2_url, aws_connect_kwargs = get_aws_connection_info(module) region, ec2_url, aws_connect_kwargs = get_aws_connection_info(module, boto3=True)
if not region: if not region:
module.fail_json(msg = str("Either region or AWS_REGION or EC2_REGION environment variable or boto config aws_region or ec2_region must be set.")) module.fail_json(msg="Region must be present")
try: try:
conn = connect_to_aws(boto.rds, region, **aws_connect_kwargs) conn = boto3_conn(module, conn_type='client', resource='rds', region=region, endpoint=ec2_url, **aws_connect_kwargs)
except boto.exception.BotoServerError as e: except botocore.exceptions.NoCredentialsError as e:
module.fail_json(msg = e.error_message) module.fail_json(msg="Couldn't connect to AWS: %s" % str(e))
group_was_added = False state = module.params.get('state')
if state == 'present':
try: ensure_present(module, conn)
changed = False if state == 'absent':
ensure_absent(module, conn)
try:
all_groups = conn.get_all_dbparameter_groups(group_name, max_records=100)
exists = len(all_groups) > 0
except BotoServerError as e:
if e.error_code != 'DBParameterGroupNotFound':
module.fail_json(msg = e.error_message)
exists = False
if state == 'absent':
if exists:
conn.delete_parameter_group(group_name)
changed = True
else:
changed = {}
if not exists:
new_group = conn.create_parameter_group(group_name, engine=group_engine, description=group_description)
group_was_added = True
# If a "Marker" is present, this group has more attributes remaining to check. Get the next batch, but only
# if there are parameters left to set.
marker = None
while len(group_params):
next_group = conn.get_all_dbparameters(group_name, marker=marker)
changed_params, group_params = modify_group(next_group, group_params, immediate)
changed.update(changed_params)
if hasattr(next_group, 'Marker'):
marker = next_group.Marker
else:
break
except BotoServerError as e:
module.fail_json(msg = e.error_message)
except NotModifiableError as e:
msg = e.error_message
if group_was_added:
msg = '%s The group "%s" was added first.' % (msg, group_name)
module.fail_json(msg=msg)
module.exit_json(changed=changed)
if __name__ == '__main__': if __name__ == '__main__':
main() main()

View file

@ -0,0 +1,2 @@
cloud/aws
posix/ci/cloud/aws

View file

@ -0,0 +1,30 @@
---
rds_param_group:
name: "{{ resource_prefix}}rds-param-group"
description: "Test group for rds_param_group Ansible module"
engine: postgres9.6
rds_long_param_list:
application_name: Test
logging_collector: on
log_directory: /var/log/postgresql
log_filename: postgresql.log.%Y-%m-%d-%H
log_file_mode: 0600
event_source: RDS
log_min_messages: INFO
log_min_duration_statement: 500
log_rotation_age: 60
debug_print_parse: on
debug_print_rewritten: on
debug_print_plan: on
debug_pretty_print: on
log_checkpoints: on
log_connections: on
log_disconnections: on
log_duration: on
log_error_verbosity: VERBOSE
log_lock_waits: on
log_temp_files: 10K
log_timezone: UTC
log_statement: 'all'
log_replication_commands: on

View file

@ -0,0 +1,3 @@
dependencies:
- prepare_tests
- setup_ec2

View file

@ -0,0 +1,321 @@
---
# A Note about ec2 environment variable name preference:
# - EC2_URL -> AWS_URL
# - EC2_ACCESS_KEY -> AWS_ACCESS_KEY_ID -> AWS_ACCESS_KEY
# - EC2_SECRET_KEY -> AWS_SECRET_ACCESS_KEY -> AWX_SECRET_KEY
# - EC2_REGION -> AWS_REGION
#
# TODO - name: test 'region' parameter
# TODO - name: test 'state=absent' parameter for existing key
# TODO - name: test 'state=absent' parameter for missing key
# TODO - name: test 'validate_certs' parameter
# ============================================================
# - include: ../../setup_ec2/tasks/common.yml module_name=rds_param_group
- block:
# ============================================================
- name: test empty parameter group
rds_param_group:
name: "{{ rds_param_group.name }}"
engine: "{{ rds_param_group.engine }}"
description: "{{ rds_param_group.description }}"
state: present
region: "{{ ec2_region }}"
ec2_access_key: '{{ aws_access_key }}'
ec2_secret_key: '{{ aws_secret_key }}'
security_token: '{{ security_token }}'
register: result
ignore_errors: true
- name: assert rds parameter group changed
assert:
that:
- 'result.changed'
- "'{{ result.db_parameter_group_name | lower }}' == '{{ rds_param_group.name | lower }}'"
- 'result.tags == {}'
# ============================================================
- name: test empty parameter group with no arguments changes nothing
rds_param_group:
name: "{{ rds_param_group.name }}"
engine: "{{ rds_param_group.engine }}"
description: "{{ rds_param_group.description }}"
state: present
region: "{{ ec2_region }}"
ec2_access_key: '{{ aws_access_key }}'
ec2_secret_key: '{{ aws_secret_key }}'
security_token: '{{ security_token }}'
register: result
ignore_errors: true
- name: assert no change when running empty parameter group a second time
assert:
that:
- 'not result.changed'
# ============================================================
- name: test adding numeric tag
rds_param_group:
name: "{{ rds_param_group.name }}"
engine: "{{ rds_param_group.engine }}"
description: "{{ rds_param_group.description }}"
state: present
tags:
Environment: test
Test: 123
region: "{{ ec2_region }}"
ec2_access_key: '{{ aws_access_key }}'
ec2_secret_key: '{{ aws_secret_key }}'
security_token: '{{ security_token }}'
register: result
ignore_errors: true
- name: adding numeric tag just silently converts
assert:
that:
- 'result.changed'
- 'result.tags.Test == "123"'
# ============================================================
- name: test tagging existing group
rds_param_group:
name: "{{ rds_param_group.name }}"
engine: "{{ rds_param_group.engine }}"
description: "{{ rds_param_group.description }}"
state: present
tags:
Environment: test
Test: "123"
NewTag: "hello"
region: "{{ ec2_region }}"
ec2_access_key: '{{ aws_access_key }}'
ec2_secret_key: '{{ aws_secret_key }}'
security_token: '{{ security_token }}'
register: result
ignore_errors: true
- name: assert tagging existing group changes it and adds tags
assert:
that:
- 'result.changed'
- 'result.tags.NewTag == "hello"'
# ============================================================
- name: test repeating tagging existing group
rds_param_group:
name: "{{ rds_param_group.name }}"
engine: "{{ rds_param_group.engine }}"
description: "{{ rds_param_group.description }}"
state: present
tags:
Environment: test
Test: "123"
NewTag: "hello"
region: "{{ ec2_region }}"
ec2_access_key: '{{ aws_access_key }}'
ec2_secret_key: '{{ aws_secret_key }}'
security_token: '{{ security_token }}'
register: result
ignore_errors: true
- name: assert tagging existing group changes it and adds tags
assert:
that:
- 'not result.changed'
- 'result.tags.Test == "123"'
# ============================================================
- name: test deleting tags from existing group
rds_param_group:
name: "{{ rds_param_group.name }}"
engine: "{{ rds_param_group.engine }}"
description: "{{ rds_param_group.description }}"
state: present
tags:
Environment: test
region: "{{ ec2_region }}"
ec2_access_key: '{{ aws_access_key }}'
ec2_secret_key: '{{ aws_secret_key }}'
security_token: '{{ security_token }}'
purge_tags: yes
register: result
ignore_errors: true
- name: assert removing tags from existing group changes it
assert:
that:
- 'result.changed'
- 'result.tags.Environment == "test"'
- '"NewTag" not in result.tags'
# ============================================================
- name: test state=absent with engine defined (expect changed=true)
rds_param_group:
name: "{{ rds_param_group.name }}"
engine: "{{ rds_param_group.engine }}"
state: absent
region: "{{ ec2_region }}"
ec2_access_key: '{{ aws_access_key }}'
ec2_secret_key: '{{ aws_secret_key }}'
security_token: '{{ security_token }}'
register: result
ignore_errors: true
- name: assert state=absent with engine defined (expect changed=true)
assert:
that:
- 'result.changed'
# ============================================================
- name: test creating group with parameters
rds_param_group:
name: "{{ rds_param_group.name }}"
engine: "{{ rds_param_group.engine }}"
description: "{{ rds_param_group.description }}"
state: present
params:
log_directory: /var/log/postgresql
log_statement: 'all'
log_duration: on
this_param_does_not_exist: oh_no
tags:
Environment: test
Test: "123"
region: "{{ ec2_region }}"
ec2_access_key: '{{ aws_access_key }}'
ec2_secret_key: '{{ aws_secret_key }}'
security_token: '{{ security_token }}'
register: result
ignore_errors: true
- name: assert creating a new group with parameter changes it
assert:
that:
- 'result.changed'
- 'result.tags.Test == "123"'
- 'result.errors|length == 2'
# ============================================================
- name: test repeating group with parameters
rds_param_group:
name: "{{ rds_param_group.name }}"
engine: "{{ rds_param_group.engine }}"
description: "{{ rds_param_group.description }}"
state: present
params:
log_directory: /var/log/postgresql
log_statement: 'all'
log_duration: on
this_param_does_not_exist: oh_no
tags:
Environment: test
Test: "123"
region: "{{ ec2_region }}"
ec2_access_key: '{{ aws_access_key }}'
ec2_secret_key: '{{ aws_secret_key }}'
security_token: '{{ security_token }}'
register: result
ignore_errors: true
- name: assert repeating group with parameters does not change it
assert:
that:
- 'not result.changed'
- 'result.tags.Test == "123"'
- 'result.errors|length == 2'
# ============================================================
- name: test state=absent with engine defined (expect changed=true)
rds_param_group:
name: "{{ rds_param_group.name }}"
engine: "{{ rds_param_group.engine }}"
state: absent
region: "{{ ec2_region }}"
ec2_access_key: '{{ aws_access_key }}'
ec2_secret_key: '{{ aws_secret_key }}'
security_token: '{{ security_token }}'
register: result
ignore_errors: true
- name: assert state=absent with engine defined (expect changed=true)
assert:
that:
- 'result.changed'
# ============================================================
- name: test repeating state=absent (expect changed=false)
rds_param_group:
name: "{{ rds_param_group.name }}"
engine: "{{ rds_param_group.engine }}"
state: absent
region: "{{ ec2_region }}"
ec2_access_key: '{{ aws_access_key }}'
ec2_secret_key: '{{ aws_secret_key }}'
security_token: '{{ security_token }}'
register: result
ignore_errors: true
- name: assert repeating state=absent (expect changed=false)
assert:
that:
- 'not result.changed'
# ============================================================
- name: test creating group with more than 20 parameters
rds_param_group:
name: "{{ rds_param_group.name }}"
engine: "{{ rds_param_group.engine }}"
description: "{{ rds_param_group.description }}"
params: "{{ rds_long_param_list }}"
state: present
region: "{{ ec2_region }}"
ec2_access_key: '{{ aws_access_key }}'
ec2_secret_key: '{{ aws_secret_key }}'
security_token: '{{ security_token }}'
register: result
ignore_errors: true
- name: assert creating a new group with lots of parameter changes it
assert:
that:
- 'result.changed'
# ============================================================
- name: test creating group with more than 20 parameters
rds_param_group:
name: "{{ rds_param_group.name }}"
engine: "{{ rds_param_group.engine }}"
description: "{{ rds_param_group.description }}"
params: "{{ rds_long_param_list }}"
region: "{{ ec2_region }}"
state: present
ec2_access_key: '{{ aws_access_key }}'
ec2_secret_key: '{{ aws_secret_key }}'
security_token: '{{ security_token }}'
register: result
ignore_errors: true
- name: assert repeating a group with lots of parameter does not change it
assert:
that:
- 'not result.changed'
always:
# ============================================================
- name: test state=absent (expect changed=false)
rds_param_group:
name: "{{ rds_param_group.name }}"
state: absent
region: "{{ ec2_region }}"
ec2_access_key: '{{ aws_access_key }}'
ec2_secret_key: '{{ aws_secret_key }}'
security_token: '{{ security_token }}'
register: result
ignore_errors: true
- name: assert state=absent (expect changed=false)
assert:
that:
- 'result.changed'

View file

@ -53,7 +53,6 @@ lib/ansible/modules/cloud/amazon/iam.py
lib/ansible/modules/cloud/amazon/iam_policy.py lib/ansible/modules/cloud/amazon/iam_policy.py
lib/ansible/modules/cloud/amazon/lambda.py lib/ansible/modules/cloud/amazon/lambda.py
lib/ansible/modules/cloud/amazon/lambda_facts.py lib/ansible/modules/cloud/amazon/lambda_facts.py
lib/ansible/modules/cloud/amazon/rds_param_group.py
lib/ansible/modules/cloud/amazon/rds_subnet_group.py lib/ansible/modules/cloud/amazon/rds_subnet_group.py
lib/ansible/modules/cloud/amazon/redshift.py lib/ansible/modules/cloud/amazon/redshift.py
lib/ansible/modules/cloud/amazon/route53_health_check.py lib/ansible/modules/cloud/amazon/route53_health_check.py