Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

New module: azure_rm_ddosprotectionplan #493

Merged
merged 36 commits into from
Aug 6, 2021

Conversation

ikarldasan
Copy link
Contributor

SUMMARY

This module introduces a wide variety of configurations for creating a DDoS protection plan on Azure.
Create DDoS protection plan on Azure.
Update DDoS protection plan on Azure.
Delete DDoS protection plan on Azure.
Get DDoS protection plan on Azure.
List DDoS protection plan in Azure Resource Group.
List DDoS protection plan in Azure Subscription.

Fixes #492

ISSUE TYPE
  • New Module Pull Request
COMPONENT NAME

azure_rm_ddos_protection_plan

ADDITIONAL INFORMATION

This module allows user to create/update or delete the DDoS Protection Plan.
It also provides all the parameters given by: https://docs.microsoft.com/en-us/azure/ddos-protection/ddos-protection-overview

More information

azure_rm_ddos_protection_plan:
   name: ddos
   resource_group: testgroupans
   location: eastus2
   tags:
      a: c

@Fred-sun
Copy link
Collaborator

@ikarldasan Thank for your contribution! Please help to change the module name to azure_rm_ddosprotectionplan*, which is consistent with other modules, thank you!

Copy link
Collaborator

@Fred-sun Fred-sun left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@ikarldasan There is no content in " tests/integration/targets/azure_rm_ddos_protection_plan/aliases"! Please share the result of you execute "tests/integration/targets/azure_rm_ddos_protection_plan/tasks/main.yml"!

cloud/azure
shippable/azure/group10
destructive

- absent
- present
extends_documentation_fragment:
- azure.azcollection.azure
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
- azure.azcollection.azure
- azure.azcollection.azure
- azure.azcollection.azure_tags

default: present
choices:
- absent
- present
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Please add log_path and log_mode parameter to this module! Thank you very much!

    log_path:
        description:
            - parent argument.
        type: str
    log_mode:
        description:
            - parent argument.
        type: str

@Fred-sun Fred-sun added medium_priority Medium priority new_module_pr Add new modules work in In trying to solve, or in working with contributors labels Apr 19, 2021
@ikarldasan
Copy link
Contributor Author

@ikarldasan There is no content in " tests/integration/targets/azure_rm_ddos_protection_plan/aliases"! Please share the result of you execute "tests/integration/targets/azure_rm_ddos_protection_plan/tasks/main.yml"!

cloud/azure
shippable/azure/group10
destructive

@Fred-sun , have addressed the changes suggested.
But facing an issue running the integration tests.
Running this command and getting the following result.

ansible-test integration azure_rm_ddosprotectionplan --allow-destructive -e -vvv

RLIMIT_NOFILE: (1024, 1048576)
MAXFD: -1
Falling back to tests in "tests/integration/targets/" because "roles/test/" was not found.
WARNING: Excluding tests marked "cloud/azure" which require config (see "/home/karl/.local/lib/python3.8/site-packages/ansible_test/config/cloud-config-azure.ini.template"): azure_rm_ddosprotectionplan
WARNING: All targets skipped.

Can you please help understand what I may be missing.
Thank you!!

@ikarldasan
Copy link
Contributor Author

ikarldasan commented Apr 20, 2021

@Fred-sun here are the test results, run locally. Running the integration test as playbooks using ansible-playbook playbook -vvv. Thank you.

  • Create:
**Playbook**
---
    - hosts: localhost
      connection: local
      tasks:   
       - name: Create DDoS protection plan
         azure.azcollection.azure_rm_ddosprotectionplan:
           client_id: XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
           resource_group: rg
           secret: XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
           subscription_id: XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
           tenant: XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
           location: eastus2
           name: ddos
         register: results

**Result:**

changed: [localhost] => {
    "changed": true,
    "check_mode": false,
    "invocation": {
        "module_args": {
            "ad_user": null,
            "adfs_authority_url": null,
            "api_profile": "latest",
            "append_tags": true,
            "auth_source": null,
            "cert_validation_mode": null,
            "client_id": "VALUE_SPECIFIED_IN_NO_LOG_PARAMETER",
            "cloud_environment": "AzureCloud",
            "location": "eastus2",
            "log_mode": null,
            "log_path": null,
            "name": "ddos",
            "password": null,
            "profile": null,
            "resource_group": "rg",
            "secret": "VALUE_SPECIFIED_IN_NO_LOG_PARAMETER",
            "state": "present",
            "subscription_id": "XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX",
            "tags": null,
            "tenant": "VALUE_SPECIFIED_IN_NO_LOG_PARAMETER"
        }
    },
    "state": {
        "additional_properties": null,
        "etag": "W/\"\"",
        "id": "/subscriptions/XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX/resourceGroups/rg/providers/Microsoft.Network/ddosProtectionPlans/ddos",
        "location": "eastus2",
        "name": "ddos",
        "provisioning_state": "Succeeded",
        "resource_guid": null,
        "tags": null,
        "type": "Microsoft.Network/ddosProtectionPlans",
        "virtual_networks": null
    }
}
META: ran handlers
META: ran handlers

PLAY RECAP *************************************************************************************************************************************************************************************************
localhost                  : ok=2    changed=1    unreachable=0    failed=0    skipped=0    rescued=0    ignored=0   


  • Create (check mode):
**Playbook:**
---
    - hosts: localhost
      connection: local
      tasks:   
       - name: Create DDoS protection plan (check mode)
         azure.azcollection.azure_rm_ddosprotectionplan:
           client_id: XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
           resource_group: rg
           secret: XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
           subscription_id: XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
           tenant: XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
           location: eastus2
           name: ddos
         register: results
         check_mode: yes


**Result:**

ok: [localhost] => {
    "changed": false,
    "check_mode": true,
    "invocation": {
        "module_args": {
            "ad_user": null,
            "adfs_authority_url": null,
            "api_profile": "latest",
            "append_tags": true,
            "auth_source": null,
            "cert_validation_mode": null,
            "client_id": "VALUE_SPECIFIED_IN_NO_LOG_PARAMETER",
            "cloud_environment": "AzureCloud",
            "location": "eastus2",
            "log_mode": null,
            "log_path": null,
            "name": "ddos",
            "password": null,
            "profile": null,
            "resource_group": "rg",
            "secret": "VALUE_SPECIFIED_IN_NO_LOG_PARAMETER",
            "state": "present",
            "subscription_id": "XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX",
            "tags": null,
            "tenant": "VALUE_SPECIFIED_IN_NO_LOG_PARAMETER"
        }
    },
    "state": {
        "additional_properties": null,
        "etag": "W/\"\"",
        "id": "/subscriptions/XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX/resourceGroups/rg/providers/Microsoft.Network/ddosProtectionPlans/ddos",
        "location": "eastus2",
        "name": "ddos",
        "provisioning_state": "Succeeded",
        "resource_guid": null,
        "tags": {
            "a": "c"
        },
        "type": "Microsoft.Network/ddosProtectionPlans",
        "virtual_networks": null
    }
}
META: ran handlers
META: ran handlers

PLAY RECAP *************************************************************************************************************************************************************************************************
localhost                  : ok=2    changed=0    unreachable=0    failed=0    skipped=0    rescued=0    ignored=0   

  • Create (Idempotent):
**Playbook**

---
    - hosts: localhost
      connection: local
      tasks:   
       - name: Create DDoS protection plan(Idempotent)
         azure.azcollection.azure_rm_ddosprotectionplan:
           client_id: XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
           resource_group: rg
           secret: XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
           subscription_id: XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
           tenant: XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
           location: eastus2
           name: ddos
         register: results

**Result:**
ok: [localhost] => {
    "changed": false,
    "check_mode": false,
    "invocation": {
        "module_args": {
            "ad_user": null,
            "adfs_authority_url": null,
            "api_profile": "latest",
            "append_tags": true,
            "auth_source": null,
            "cert_validation_mode": null,
            "client_id": "VALUE_SPECIFIED_IN_NO_LOG_PARAMETER",
            "cloud_environment": "AzureCloud",
            "location": "eastus2",
            "log_mode": null,
            "log_path": null,
            "name": "ddos",
            "password": null,
            "profile": null,
            "resource_group": "rg",
            "secret": "VALUE_SPECIFIED_IN_NO_LOG_PARAMETER",
            "state": "present",
            "subscription_id": "XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX",
            "tags": null,
            "tenant": "VALUE_SPECIFIED_IN_NO_LOG_PARAMETER"
        }
    },
    "state": {
        "additional_properties": null,
        "etag": "W/\"\"",
        "id": "/subscriptions/XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX/resourceGroups/rg/providers/Microsoft.Network/ddosProtectionPlans/ddos",
        "location": "eastus2",
        "name": "ddos",
        "provisioning_state": "Succeeded",
        "resource_guid": null,
        "tags": {},
        "type": "Microsoft.Network/ddosProtectionPlans",
        "virtual_networks": null
    }
}
META: ran handlers
META: ran handlers

PLAY RECAP *************************************************************************************************************************************************************************************************
localhost                  : ok=2    changed=0    unreachable=0    failed=0    skipped=0    rescued=0    ignored=0   

  • Update:
**Playbook:**
---
    - hosts: localhost
      connection: local
      tasks:   
       - name: Updates DDoS protection plan 
         azure.azcollection.azure_rm_ddosprotectionplan:
           client_id: XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
           resource_group: rg
           secret: XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
           subscription_id: XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
           tenant: XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
           location: eastus2
           name: ddos
           tags:
            a: c
         register: results


**Result:**

changed: [localhost] => {
    "changed": true,
    "check_mode": false,
    "invocation": {
        "module_args": {
            "ad_user": null,
            "adfs_authority_url": null,
            "api_profile": "latest",
            "append_tags": true,
            "auth_source": null,
            "cert_validation_mode": null,
            "client_id": "VALUE_SPECIFIED_IN_NO_LOG_PARAMETER",
            "cloud_environment": "AzureCloud",
            "location": "eastus2",
            "log_mode": null,
            "log_path": null,
            "name": "ddos",
            "password": null,
            "profile": null,
            "resource_group": "rg",
            "secret": "VALUE_SPECIFIED_IN_NO_LOG_PARAMETER",
            "state": "present",
            "subscription_id": "XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX",
            "tags": {
                "a": "c"
            },
            "tenant": "VALUE_SPECIFIED_IN_NO_LOG_PARAMETER"
        }
    },
    "state": {
        "additional_properties": null,
        "etag": "W/\"\"",
        "id": "/subscriptions/XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX/resourceGroups/rg/providers/Microsoft.Network/ddosProtectionPlans/ddos",
        "location": "eastus2",
        "name": "ddos",
        "provisioning_state": "Succeeded",
        "resource_guid": null,
        "tags": {
            "a": "c"
        },
        "type": "Microsoft.Network/ddosProtectionPlans",
        "virtual_networks": null
    }
}
META: ran handlers
META: ran handlers

PLAY RECAP *************************************************************************************************************************************************************************************************
localhost                  : ok=2    changed=1    unreachable=0    failed=0    skipped=0    rescued=0    ignored=0   

  • Delete (Check_Mode):
**Playbook**
---
    - hosts: localhost
      connection: local
      tasks:
       - name: Delete DDoS Protection Plan (Check Mode)
         azure.azcollection.azure_rm_ddosprotectionplan:
           client_id: XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
           secret: XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
           subscription_id: XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
           tenant: XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
           resource_group: rg
           name:  ddos
           state: absent
           location: eastus2
         check_mode: yes


**Result:**
changed: [localhost] => {
    "changed": true,
    "check_mode": true,
    "invocation": {
        "module_args": {
            "ad_user": null,
            "adfs_authority_url": null,
            "api_profile": "latest",
            "append_tags": true,
            "auth_source": null,
            "cert_validation_mode": null,
            "client_id": "VALUE_SPECIFIED_IN_NO_LOG_PARAMETER",
            "cloud_environment": "AzureCloud",
            "location": "eastus2",
            "log_mode": null,
            "log_path": null,
            "name": "ddos",
            "password": null,
            "profile": null,
            "resource_group": "rg",
            "secret": "VALUE_SPECIFIED_IN_NO_LOG_PARAMETER",
            "state": "absent",
            "subscription_id": "XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX",
            "tags": null,
            "tenant": "VALUE_SPECIFIED_IN_NO_LOG_PARAMETER"
        }
    },
    "state": {
        "additional_properties": null,
        "etag": "W/\"\"",
        "id": "/subscriptions/XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX/resourceGroups/rg/providers/Microsoft.Network/ddosProtectionPlans/ddos",
        "location": "eastus2",
        "name": "ddos",
        "provisioning_state": "Succeeded",
        "resource_guid": null,
        "tags": null,
        "type": "Microsoft.Network/ddosProtectionPlans",
        "virtual_networks": null
    }
}
META: ran handlers
META: ran handlers

PLAY RECAP *************************************************************************************************************************************************************************************************
localhost                  : ok=2    changed=1    unreachable=0    failed=0    skipped=0    rescued=0    ignored=0  

  • Delete
**Playbook**
---
    - hosts: localhost
      connection: local
      tasks:
       - name: Delete DDoS Protection Plan
         azure.azcollection.azure_rm_ddosprotectionplan:
           client_id: XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
           secret: XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
           subscription_id: XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
           tenant: XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
           resource_group: rg
           name:  ddos
           state: absent
           location: eastus2

**Result:**
changed: [localhost] => {
    "changed": true,
    "check_mode": false,
    "invocation": {
        "module_args": {
            "ad_user": null,
            "adfs_authority_url": null,
            "api_profile": "latest",
            "append_tags": true,
            "auth_source": null,
            "cert_validation_mode": null,
            "client_id": "VALUE_SPECIFIED_IN_NO_LOG_PARAMETER",
            "cloud_environment": "AzureCloud",
            "location": "eastus2",
            "log_mode": null,
            "log_path": null,
            "name": "ddos",
            "password": null,
            "profile": null,
            "resource_group": "rg",
            "secret": "VALUE_SPECIFIED_IN_NO_LOG_PARAMETER",
            "state": "absent",
            "subscription_id": "XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX",
            "tags": null,
            "tenant": "VALUE_SPECIFIED_IN_NO_LOG_PARAMETER"
        }
    },
    "state": {
        "additional_properties": null,
        "etag": "W/\"\"",
        "id": "/subscriptions/XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX/resourceGroups/rg/providers/Microsoft.Network/ddosProtectionPlans/ddos",
        "location": "eastus2",
        "name": "ddos",
        "provisioning_state": "Succeeded",
        "resource_guid": null,
        "status": "Deleted",
        "tags": null,
        "type": "Microsoft.Network/ddosProtectionPlans",
        "virtual_networks": null
    }
}
META: ran handlers
META: ran handlers

PLAY RECAP *************************************************************************************************************************************************************************************************
localhost                  : ok=2    changed=1    unreachable=0    failed=0    skipped=0    rescued=0    ignored=0 

  • Get by name:
**Playbook**
---
    - hosts: localhost
      connection: local
      tasks:
       - name: Retrieve DDoS Protection Plan
         azure.azcollection.azure_rm_ddosprotectionplan_info:
           resource_group: rg
           client_id: XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
           resource_group: rg
           secret: XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
           subscription_id: XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
           tenant: XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
           name: ddos
         register: results

**Result:**
ok: [localhost] => {
    "changed": false,
    "ddosprotectionplan": [
        {
            "additional_properties": null,
            "etag": "W/\"\"",
            "id": "/subscriptions/XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX/resourceGroups/rg/providers/Microsoft.Network/ddosProtectionPlans/ddos",
            "location": "eastus2",
            "name": "ddos",
            "provisioning_state": "Succeeded",
            "resource_guid": null,
            "tags": {
                "a": "c"
            },
            "type": "Microsoft.Network/ddosProtectionPlans",
            "virtual_networks": null
        }
    ],
    "invocation": {
        "module_args": {
            "ad_user": null,
            "adfs_authority_url": null,
            "api_profile": "latest",
            "auth_source": null,
            "cert_validation_mode": null,
            "client_id": "VALUE_SPECIFIED_IN_NO_LOG_PARAMETER",
            "cloud_environment": "AzureCloud",
            "name": "ddos",
            "password": null,
            "profile": null,
            "resource_group": "rg",
            "secret": "VALUE_SPECIFIED_IN_NO_LOG_PARAMETER",
            "subscription_id": "XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX",
            "tenant": "VALUE_SPECIFIED_IN_NO_LOG_PARAMETER"
        }
    }
}
META: ran handlers
META: ran handlers

PLAY RECAP *************************************************************************************************************************************************************************************************
localhost                  : ok=2    changed=0    unreachable=0    failed=0    skipped=0    rescued=0    ignored=0   

  • Get by resource group:
**Playbook:**
---
    - hosts: localhost
      connection: local
      tasks:
       - name: Retrieve DDoS Protection Plan (By Resource Group)
         azure.azcollection.azure_rm_ddosprotectionplan_info:
           resource_group: rg
           client_id: XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
           resource_group: rg
           secret: XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
           subscription_id: XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
           tenant: XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
         register: results

**Result:**
ok: [localhost] => {
    "changed": false,
    "ddosprotectionplan": [
        {
            "additional_properties": null,
            "etag": "W/\"\"",
            "id": "/subscriptions/XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX/resourceGroups/rg/providers/Microsoft.Network/ddosProtectionPlans/ddos",
            "location": "eastus2",
            "name": "ddos",
            "provisioning_state": "Succeeded",
            "resource_guid": null,
            "tags": {
                "a": "c"
            },
            "type": "Microsoft.Network/ddosProtectionPlans",
            "virtual_networks": null
        }
    ],
    "invocation": {
        "module_args": {
            "ad_user": null,
            "adfs_authority_url": null,
            "api_profile": "latest",
            "auth_source": null,
            "cert_validation_mode": null,
            "client_id": "VALUE_SPECIFIED_IN_NO_LOG_PARAMETER",
            "cloud_environment": "AzureCloud",
            "name": null,
            "password": null,
            "profile": null,
            "resource_group": "rg",
            "secret": "VALUE_SPECIFIED_IN_NO_LOG_PARAMETER",
            "subscription_id": "XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX",
            "tenant": "VALUE_SPECIFIED_IN_NO_LOG_PARAMETER"
        }
    }
}
META: ran handlers
META: ran handlers

PLAY RECAP *************************************************************************************************************************************************************************************************
localhost                  : ok=2    changed=0    unreachable=0    failed=0    skipped=0    rescued=0    ignored=0   

  • Get by subscription:
**Playbook:**
---
    - hosts: localhost
      connection: local
      tasks:
       - name: Retrieve DDoS Protection Plan (By Subscription)
         azure.azcollection.azure_rm_ddosprotectionplan_info:
           client_id: XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
           secret: XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
           subscription_id: XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
           tenant: XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
         register: results

**Result:**
ok: [localhost] => {
    "changed": false,
    "ddosprotectionplan": [
        {
            "additional_properties": null,
            "etag": "W/\"\"",
            "id": "/subscriptions/XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX/resourceGroups/rg/providers/Microsoft.Network/ddosProtectionPlans/ddos",
            "location": "eastus2",
            "name": "ddos",
            "provisioning_state": "Succeeded",
            "resource_guid": null,
            "tags": {
                "a": "c"
            },
            "type": "Microsoft.Network/ddosProtectionPlans",
            "virtual_networks": null
        }
    ],
    "invocation": {
        "module_args": {
            "ad_user": null,
            "adfs_authority_url": null,
            "api_profile": "latest",
            "auth_source": null,
            "cert_validation_mode": null,
            "client_id": "VALUE_SPECIFIED_IN_NO_LOG_PARAMETER",
            "cloud_environment": "AzureCloud",
            "name": null,
            "password": null,
            "profile": null,
            "resource_group": null,
            "secret": "VALUE_SPECIFIED_IN_NO_LOG_PARAMETER",
            "subscription_id": "XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX",
            "tenant": "VALUE_SPECIFIED_IN_NO_LOG_PARAMETER"
        }
    }
}
META: ran handlers
META: ran handlers

PLAY RECAP *************************************************************************************************************************************************************************************************
localhost                  : ok=2    changed=0    unreachable=0    failed=0    skipped=0    rescued=0    ignored=0   




@Fred-sun
Copy link
Collaborator

@ikarldasan Please add following line to ignore2.11.txt, 2.9.txt, 2.10.txt and 2.12.txt. Thank you very much!

plugins/modules/azure_rm_ddosprotectionplan_info.py validate-modules:required_if-requirements-unknown
plugins/modules/azure_rm_ddosprotectionplan_info.py validate-modules:required_if-unknown-key

@haiyuazhang haiyuazhang changed the title New Module [DDoS Protection Plan] New module: azure_rm_ddosprotectionplan May 17, 2021
ikarldasan and others added 2 commits May 28, 2021 15:29
Co-authored-by: Fred-sun <37327967+Fred-sun@users.noreply.github.com>
ikarldasan and others added 6 commits May 28, 2021 15:31
Co-authored-by: Fred-sun <37327967+Fred-sun@users.noreply.github.com>
Co-authored-by: Fred-sun <37327967+Fred-sun@users.noreply.github.com>
…in.yml

Co-authored-by: Fred-sun <37327967+Fred-sun@users.noreply.github.com>
…in.yml

Co-authored-by: Fred-sun <37327967+Fred-sun@users.noreply.github.com>
@ikarldasan
Copy link
Contributor Author

@Fred-sun have addressed the changes suggested.
Thank you

@Fred-sun
Copy link
Collaborator

@ikarldasan Please help to delete all ignores on ignore2.11.txt, ignore2.9.txt, ignore2.10.txt and ignore2.12.txt that you add. It has been fixed by #540!

@Fred-sun Fred-sun added ready_for_review The PR has been modified and can be reviewed and merged and removed work in In trying to solve, or in working with contributors labels May 28, 2021
@Fred-sun Fred-sun added work in In trying to solve, or in working with contributors and removed ready_for_review The PR has been modified and can be reviewed and merged labels Jun 16, 2021
Copy link
Collaborator

@Fred-sun Fred-sun left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@ikarldasan One last update requirement, Thank you very much!

plugins/modules/azure_rm_ddosprotectionplan.py Outdated Show resolved Hide resolved
ikarldasan and others added 3 commits June 19, 2021 14:00
Co-authored-by: Fred-sun <37327967+Fred-sun@users.noreply.github.com>
Co-authored-by: Fred-sun <37327967+Fred-sun@users.noreply.github.com>
@ikarldasan
Copy link
Contributor Author

@ikarldasan One last update requirement, Thank you very much!

@Fred-sun Have updated the changes suggested. Thank you

@Fred-sun Fred-sun added ready_for_review The PR has been modified and can be reviewed and merged and removed work in In trying to solve, or in working with contributors labels Jun 21, 2021
@ikarldasan
Copy link
Contributor Author

@ikarldasan One last update requirement, Thank you very much!

@Fred-sun Do we need any more enhancements? Can we merge this? Thank you

@Fred-sun
Copy link
Collaborator

Fred-sun commented Aug 2, 2021

@ikarldasan One last update requirement, Thank you very much!

@Fred-sun Do we need any more enhancements? Can we merge this? Thank you

@ikarldasan I will move forward with the merger as soon as possible. Thank you very much!

@xuzhang3 xuzhang3 merged commit 069c6bb into ansible-collections:dev Aug 6, 2021
Fred-sun added a commit to Fred-sun/ansible_collections_azure that referenced this pull request Aug 11, 2021
* initial commit

* add ddos protection plan operations

* enhance create flow

* enhance operations

* enhance get and delete operations

* address sanity checks

* add integration tests

* add log parameters and aliases

* rename module for consistency

* update pr-pipeline for consistency

* fixing update account_enabled bug in azure_rm_aduser.py (ansible-collections#524)

* fixing ad related auth issue when using service pricinpal. (ansible-collections#525)

* change class name of azure_rm_aduser (ansible-collections#526)

* class are worngly named. fixed.

* fixing sanity errors.

* updating ignore text

* Update plugins/modules/azure_rm_ddosprotectionplan.py

Co-authored-by: Fred-sun <37327967+Fred-sun@users.noreply.github.com>

* Update plugins/modules/azure_rm_ddosprotectionplan.py

Co-authored-by: Fred-sun <37327967+Fred-sun@users.noreply.github.com>

* Update plugins/modules/azure_rm_ddosprotectionplan.py

Co-authored-by: Fred-sun <37327967+Fred-sun@users.noreply.github.com>

* Update tests/integration/targets/azure_rm_ddosprotectionplan/tasks/main.yml

Co-authored-by: Fred-sun <37327967+Fred-sun@users.noreply.github.com>

* Update tests/integration/targets/azure_rm_ddosprotectionplan/tasks/main.yml

Co-authored-by: Fred-sun <37327967+Fred-sun@users.noreply.github.com>

* Update main.yml

* delete ignores

* remove ignores

* Update plugins/modules/azure_rm_ddosprotectionplan.py

Co-authored-by: Fred-sun <37327967+Fred-sun@users.noreply.github.com>

* Update plugins/modules/azure_rm_ddosprotectionplan_info.py

Co-authored-by: Fred-sun <37327967+Fred-sun@users.noreply.github.com>

Co-authored-by: haiyuan_zhang <haiyuan.zhang1982@gmail.com>
Co-authored-by: Fred-sun <37327967+Fred-sun@users.noreply.github.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
medium_priority Medium priority new_module_pr Add new modules ready_for_review The PR has been modified and can be reviewed and merged
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Add support for DDoS Protection Plan
5 participants