Skip to content

Commit

Permalink
Cleanup after renamed plugins (#1940) (#1943)
Browse files Browse the repository at this point in the history
[PR #1940/c2fead07 backport][stable-6] Cleanup after renamed plugins

This is a backport of PR #1940 as merged into main (c2fead0).
SUMMARY
Prior to 5.0.0 we renamed various modules.  Cleanup the integration tests (and some docs).
ISSUE TYPE

Docs Pull Request

COMPONENT NAME
plugins/modules/acm_certificate.py
plugins/modules/acm_certificate_info.py
plugins/modules/autoscaling_policy.py
plugins/modules/codepipeline.py
plugins/modules/storagegateway_info.py
ADDITIONAL INFORMATION

Reviewed-by: Mark Chappell
  • Loading branch information
patchback[bot] authored Sep 12, 2023
1 parent 4a1eeb3 commit 68d106e
Show file tree
Hide file tree
Showing 95 changed files with 959 additions and 956 deletions.
2 changes: 2 additions & 0 deletions changelogs/fragments/20230908-alias-cleanup.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,2 @@
trivial:
- Update integration tests to reflect renamed plugins
12 changes: 6 additions & 6 deletions plugins/modules/acm_certificate.py
Original file line number Diff line number Diff line change
Expand Up @@ -167,14 +167,14 @@
EXAMPLES = r"""
- name: upload a self-signed certificate
community.aws.aws_acm:
community.aws.acm_certificate:
certificate: "{{ lookup('file', 'cert.pem' ) }}"
privateKey: "{{ lookup('file', 'key.pem' ) }}"
name_tag: my_cert # to be applied through an AWS tag as "Name":"my_cert"
region: ap-southeast-2 # AWS region
- name: create/update a certificate with a chain
community.aws.aws_acm:
community.aws.acm_certificate:
certificate: "{{ lookup('file', 'cert.pem' ) }}"
private_key: "{{ lookup('file', 'key.pem' ) }}"
name_tag: my_cert
Expand All @@ -188,25 +188,25 @@
var: cert_create.certificate.arn
- name: delete the cert we just created
community.aws.aws_acm:
community.aws.acm_certificate:
name_tag: my_cert
state: absent
region: ap-southeast-2
- name: delete a certificate with a particular ARN
community.aws.aws_acm:
community.aws.acm_certificate:
certificate_arn: "arn:aws:acm:ap-southeast-2:123456789012:certificate/01234567-abcd-abcd-abcd-012345678901"
state: absent
region: ap-southeast-2
- name: delete all certificates with a particular domain name
community.aws.aws_acm:
community.aws.acm_certificate:
domain_name: acm.ansible.com
state: absent
region: ap-southeast-2
- name: add tags to an existing certificate with a particular ARN
community.aws.aws_acm:
community.aws.acm_certificate:
certificate_arn: "arn:aws:acm:ap-southeast-2:123456789012:certificate/01234567-abcd-abcd-abcd-012345678901"
tags:
Name: my_certificate
Expand Down
10 changes: 5 additions & 5 deletions plugins/modules/acm_certificate_info.py
Original file line number Diff line number Diff line change
Expand Up @@ -48,27 +48,27 @@

EXAMPLES = r"""
- name: obtain all ACM certificates
community.aws.aws_acm_info:
community.aws.acm_certificate_info:
- name: obtain all information for a single ACM certificate
community.aws.aws_acm_info:
community.aws.acm_certificate_info:
domain_name: "*.example_com"
- name: obtain all certificates pending validation
community.aws.aws_acm_info:
community.aws.acm_certificate_info:
statuses:
- PENDING_VALIDATION
- name: obtain all certificates with tag Name=foo and myTag=bar
community.aws.aws_acm_info:
community.aws.acm_certificate_info:
tags:
Name: foo
myTag: bar
# The output is still a list of certificates, just one item long.
- name: obtain information about a certificate with a particular ARN
community.aws.aws_acm_info:
community.aws.acm_certificate_info:
certificate_arn: "arn:aws:acm:ap-southeast-2:123456789012:certificate/abcdeabc-abcd-1234-4321-abcdeabcde12"
"""
Expand Down
6 changes: 3 additions & 3 deletions plugins/modules/autoscaling_policy.py
Original file line number Diff line number Diff line change
Expand Up @@ -223,7 +223,7 @@
asg_name: "application-asg"
- name: create TargetTracking predefined policy
ec2_scaling_policy:
community.aws.autoscaling_policy:
name: "predefined-policy-1"
policy_type: TargetTrackingScaling
target_tracking_config:
Expand All @@ -234,7 +234,7 @@
register: result
- name: create TargetTracking predefined policy with resource_label
ec2_scaling_policy:
community.aws.autoscaling_policy:
name: "predefined-policy-1"
policy_type: TargetTrackingScaling
target_tracking_config:
Expand All @@ -246,7 +246,7 @@
register: result
- name: create TargetTrackingScaling custom policy
ec2_scaling_policy:
community.aws.autoscaling_policy:
name: "custom-policy-1"
policy_type: TargetTrackingScaling
target_tracking_config:
Expand Down
2 changes: 1 addition & 1 deletion plugins/modules/codepipeline.py
Original file line number Diff line number Diff line change
Expand Up @@ -81,7 +81,7 @@
# Note: These examples do not set authentication details, see the AWS Guide for details.
# Example for creating a pipeline for continuous deploy of Github code to an ECS cluster (container)
- community.aws.aws_codepipeline:
- community.aws.codepipeline:
name: my_deploy_pipeline
role_arn: arn:aws:iam::123456:role/AWS-CodePipeline-Service
artifact_store:
Expand Down
4 changes: 2 additions & 2 deletions plugins/modules/storagegateway_info.py
Original file line number Diff line number Diff line change
Expand Up @@ -165,10 +165,10 @@
# Note: These examples do not set authentication details, see the AWS Guide for details.
- name: "Get AWS storage gateway information"
community.aws.aws_sgw_info:
community.aws.storagegateway_info:
- name: "Get AWS storage gateway information for region eu-west-3"
community.aws.aws_sgw_info:
community.aws.storagegateway_info:
region: eu-west-3
"""

Expand Down
Loading

0 comments on commit 68d106e

Please sign in to comment.