Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

New module: azure_rm_diskencryptionset #552

Merged
merged 12 commits into from
Oct 15, 2021

Conversation

ghost
Copy link

@ghost ghost commented May 29, 2021

SUMMARY

This module supports following operations for Disk Encryption set:

Create a new disk encryption set
Update an existing disk encryption set
Delete disk encryption set
Get details about specific disk encryption set
List all disk encryption sets by resource group or subscription

Fixes #81

ISSUE TYPE
  • New Module Pull Request
COMPONENT NAME

azure_rm_diskencryptionset
azure_rm_diskencryptionset_info

ADDITIONAL INFORMATION

@ghost
Copy link
Author

ghost commented May 29, 2021

Integration test results :

root@techcon65:~/ansible# ansible-test integration azure_rm_diskencryptionset --allow-destructive -vvv
RLIMIT_NOFILE: (1024, 1048576)
MAXFD: -1
>>> Container Database
{}
Run command: /usr/bin/python /root/ansible/test/lib/ansible_test/_data/yamlcheck.py
Working directory: /root/ansible
Program found: /usr/bin/python
HOME=/root
LC_ALL=en_US.UTF-8
PATH=/root/ansible/bin:/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/usr/games:/usr/local/games
Run command: /usr/bin/python /root/ansible/test/lib/ansible_test/_data/versions.py
Working directory: /root/ansible
Program found: /usr/bin/python
HOME=/root
LC_ALL=en_US.UTF-8
PATH=/root/ansible/bin:/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/usr/games:/usr/local/games
Run command: /usr/bin/python3 /root/ansible/test/lib/ansible_test/_data/versions.py
Working directory: /root/ansible
Program found: /usr/bin/python3
HOME=/root
LC_ALL=en_US.UTF-8
PATH=/root/ansible/bin:/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/usr/games:/usr/local/games
Run command: /usr/bin/python3.8 /root/ansible/test/lib/ansible_test/_data/versions.py
Working directory: /root/ansible
Program found: /usr/bin/python3.8
HOME=/root
LC_ALL=en_US.UTF-8
PATH=/root/ansible/bin:/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/usr/games:/usr/local/games
>>> Environment Description
{
    "known_hosts_hash": "b0709d04e0374eb987a2282fdbcbc8b6349e418038aa0c7972062d8eac2998c9",
    "pip_interpreters": {
        "": "#!/usr/bin/python3",
        "3": "#!/usr/bin/python3",
        "3.8": "#!/usr/bin/python3"
    },
    "pip_paths": {
        "": "/usr/local/bin/pip",
        "2": null,
        "2.6": null,
        "2.7": null,
        "3": "/usr/local/bin/pip3",
        "3.5": null,
        "3.6": null,
        "3.7": null,
        "3.8": "/usr/local/bin/pip3.8",
        "3.9": null
    },
    "program_versions": {
        "": [
            "3.8.2 (default, Jul 16 2020, 14:00:26)",
            "[GCC 9.3.0]",
            "pip 21.1.1 from /usr/local/lib/python3.8/dist-packages/pip-21.1.1-py3.8.egg/pip"
        ],
        "3": [
            "3.8.2 (default, Jul 16 2020, 14:00:26)",
            "[GCC 9.3.0]",
            "pip 21.1.1 from /usr/local/lib/python3.8/dist-packages/pip-21.1.1-py3.8.egg/pip"
        ],
        "3.8": [
            "3.8.2 (default, Jul 16 2020, 14:00:26)",
            "[GCC 9.3.0]",
            "pip 21.1.1 from /usr/local/lib/python3.8/dist-packages/pip-21.1.1-py3.8.egg/pip"
        ]
    },
    "python_paths": {
        "": "/usr/bin/python",
        "2": null,
        "2.6": null,
        "2.7": null,
        "3": "/usr/bin/python3",
        "3.5": null,
        "3.6": null,
        "3.7": null,
        "3.8": "/usr/bin/python3.8",
        "3.9": null
    },
    "warnings": []
}
Running azure_rm_diskencryptionset integration test role
Preparing temporary directory: /root/ansible/test/results/.tmp/integration/azure_rm_diskencryptionset-prp4lb5g-ÅÑŚÌβŁÈ
Copying test/integration/targets/azure_rm_diskencryptionset/ to /root/ansible/test/results/.tmp/integration/azure_rm_diskencryptionset-prp4lb5g-ÅÑŚÌβŁÈ/test/integration/targets/azure_rm_diskencryptionset/
Copying /root/ansible/test/integration/integration_config.yml to /root/ansible/test/results/.tmp/integration/azure_rm_diskencryptionset-prp4lb5g-ÅÑŚÌβŁÈ/test/integration/integration_config.yml
Copying /root/ansible/test/lib/ansible_test/_data/ansible.cfg to /root/ansible/test/results/.tmp/integration/azure_rm_diskencryptionset-prp4lb5g-ÅÑŚÌβŁÈ/test/integration/integration.cfg
Copying /root/ansible/test/lib/ansible_test/_data/inventory to /root/ansible/test/results/.tmp/integration/azure_rm_diskencryptionset-prp4lb5g-ÅÑŚÌβŁÈ/test/integration/inventory
>>> Playbook: azure_rm_diskencryptionset-z3zhum17.yml
[
    {
        "gather_facts": true,
        "hosts": "testhost",
        "roles": [
            "azure_rm_diskencryptionset"
        ],
        "vars": {
            "output_dir": "/root/ansible/test/results/.tmp/output_dir"
        },
        "vars_files": [
            "integration_config.yml"
        ]
    }
]
Injecting "/tmp/python-jq_ccfrw-ansible/python" as a execv wrapper for the "/usr/bin/python" interpreter.
Run command: ansible-playbook azure_rm_diskencryptionset-z3zhum17.yml -i inventory -vvv
Working directory: /root/ansible/test/results/.tmp/integration/azure_rm_diskencryptionset-prp4lb5g-ÅÑŚÌβŁÈ/test/integration
Program found: /root/ansible/test/lib/ansible_test/_data/injector/ansible-playbook
ANSIBLE_CACHE_PLUGINS=/root/ansible/test/support/integration/plugins/cache
ANSIBLE_CALLBACKS_ENABLED=junit
ANSIBLE_CONFIG=/root/ansible/test/results/.tmp/integration/azure_rm_diskencryptionset-prp4lb5g-ÅÑŚÌβŁÈ/test/integration/integration.cfg
ANSIBLE_CONTROLLER_PYTHON_WARNING=false
ANSIBLE_DEPRECATION_WARNINGS=false
ANSIBLE_DEVEL_WARNING=false
ANSIBLE_FILTER_PLUGINS=/root/ansible/test/support/integration/plugins/filter
ANSIBLE_FORCE_COLOR=true
ANSIBLE_FORCE_HANDLERS=true
ANSIBLE_HOST_KEY_CHECKING=false
ANSIBLE_HOST_PATTERN_MISMATCH=error
ANSIBLE_INVENTORY=/dev/null
ANSIBLE_INVENTORY_PLUGINS=/root/ansible/test/support/integration/plugins/inventory
ANSIBLE_LIBRARY=/root/ansible/test/support/integration/plugins/modules
ANSIBLE_LOOKUP_PLUGINS=/root/ansible/test/support/integration/plugins/lookup
ANSIBLE_MODULE_UTILS=/root/ansible/test/support/integration/plugins/module_utils
ANSIBLE_PLAYBOOK_DIR=/root/ansible/test/results/.tmp/integration/azure_rm_diskencryptionset-prp4lb5g-ÅÑŚÌβŁÈ/test/integration
ANSIBLE_PYTHON_INTERPRETER=/set/ansible_python_interpreter/in/inventory
ANSIBLE_PYTHON_MODULE_RLIMIT_NOFILE=1024
ANSIBLE_RETRY_FILES_ENABLED=false
ANSIBLE_ROLES_PATH=/root/ansible/test/results/.tmp/integration/azure_rm_diskencryptionset-prp4lb5g-ÅÑŚÌβŁÈ/test/integration/targets
ANSIBLE_TEST_CI=
ANSIBLE_TEST_COVERAGE=
ANSIBLE_TEST_PYTHON_INTERPRETER=/usr/bin/python
ANSIBLE_TEST_PYTHON_VERSION=3.8
ANSIBLE_WORKER_SHUTDOWN_POLL_COUNT=100
ANSIBLE_WORKER_SHUTDOWN_POLL_DELAY=0.1
HOME=/root
INVENTORY_PATH=/root/ansible/test/results/.tmp/integration/azure_rm_diskencryptionset-prp4lb5g-ÅÑŚÌβŁÈ/test/integration/inventory
JUNIT_OUTPUT_DIR=/root/ansible/test/results/junit
LC_ALL=en_US.UTF-8
OUTPUT_DIR=/root/ansible/test/results/.tmp/output_dir
PAGER=/bin/cat
PATH=/tmp/python-jq_ccfrw-ansible:/root/ansible/test/lib/ansible_test/_data/injector:/root/ansible/bin:/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/usr/games:/usr/local/games
PYTHONPATH=/root/ansible/lib
ansible-playbook [core 2.12.0.dev0]  (devel 9ba6cf9a72) last updated 2021/04/19 16:15:31 (GMT +550)
  config file = /root/ansible/test/results/.tmp/integration/azure_rm_diskencryptionset-prp4lb5g-ÅÑŚÌβŁÈ/test/integration/integration.cfg
  configured module search path = ['/root/ansible/test/support/integration/plugins/modules']
  ansible python module location = /root/ansible/lib/ansible
  ansible collection location = /root/.ansible/collections:/usr/share/ansible/collections
  executable location = /root/ansible/bin/ansible-playbook
  python version = 3.8.2 (default, Jul 16 2020, 14:00:26) [GCC 9.3.0]
  jinja version = 2.10.1
  libyaml = True
Using /root/ansible/test/results/.tmp/integration/azure_rm_diskencryptionset-prp4lb5g-ÅÑŚÌβŁÈ/test/integration/integration.cfg as config file
host_list declined parsing /root/ansible/test/results/.tmp/integration/azure_rm_diskencryptionset-prp4lb5g-ÅÑŚÌβŁÈ/test/integration/inventory as it did not pass its verify_file() method
script declined parsing /root/ansible/test/results/.tmp/integration/azure_rm_diskencryptionset-prp4lb5g-ÅÑŚÌβŁÈ/test/integration/inventory as it did not pass its verify_file() method
auto declined parsing /root/ansible/test/results/.tmp/integration/azure_rm_diskencryptionset-prp4lb5g-ÅÑŚÌβŁÈ/test/integration/inventory as it did not pass its verify_file() method
Parsed /root/ansible/test/results/.tmp/integration/azure_rm_diskencryptionset-prp4lb5g-ÅÑŚÌβŁÈ/test/integration/inventory inventory source with ini plugin
Read vars_file 'integration_config.yml'
redirecting (type: modules) ansible.builtin.azure_rm_keyvault to azure.azcollection.azure_rm_keyvault
redirecting (type: modules) ansible.builtin.azure_rm_keyvaultkey to azure.azcollection.azure_rm_keyvaultkey
redirecting (type: modules) ansible.builtin.azure_rm_keyvaultkey_info to azure.azcollection.azure_rm_keyvaultkey_info
redirecting (type: modules) ansible.builtin.azure_rm_keyvault to azure.azcollection.azure_rm_keyvault
Skipping callback 'default', as we already have a stdout callback.
[WARNING]: The `junit_xml` python module is not installed. Disabling the `junit` callback plugin.
Skipping callback 'minimal', as we already have a stdout callback.
Skipping callback 'oneline', as we already have a stdout callback.

PLAYBOOK: azure_rm_diskencryptionset-z3zhum17.yml *********************************************************************************************************************************************************
1 plays in azure_rm_diskencryptionset-z3zhum17.yml
Read vars_file 'integration_config.yml'
Read vars_file 'integration_config.yml'
Read vars_file 'integration_config.yml'

PLAY [testhost] *******************************************************************************************************************************************************************************************
Read vars_file 'integration_config.yml'

TASK [Gathering Facts] ************************************************************************************************************************************************************************************
<testhost> ESTABLISH LOCAL CONNECTION FOR USER: root
<testhost> EXEC /bin/sh -c 'echo ~root && sleep 0'
<testhost> EXEC /bin/sh -c '( umask 77 && mkdir -p "` echo /root/.ansible/tmp `"&& mkdir "` echo /root/.ansible/tmp/ansible-tmp-1622316042.9751287-10489-225907978748028 `" && echo ansible-tmp-1622316042.9751287-10489-225907978748028="` echo /root/.ansible/tmp/ansible-tmp-1622316042.9751287-10489-225907978748028 `" ) && sleep 0'
Using module file /root/ansible/lib/ansible/modules/setup.py
<testhost> PUT /root/.ansible/tmp/ansible-local-104840z52bkno/tmpuue3nbu0 TO /root/.ansible/tmp/ansible-tmp-1622316042.9751287-10489-225907978748028/AnsiballZ_setup.py
<testhost> EXEC /bin/sh -c 'chmod u+x /root/.ansible/tmp/ansible-tmp-1622316042.9751287-10489-225907978748028/ /root/.ansible/tmp/ansible-tmp-1622316042.9751287-10489-225907978748028/AnsiballZ_setup.py && sleep 0'
<testhost> EXEC /bin/sh -c '/usr/bin/python /root/.ansible/tmp/ansible-tmp-1622316042.9751287-10489-225907978748028/AnsiballZ_setup.py && sleep 0'
<testhost> EXEC /bin/sh -c 'rm -f -r /root/.ansible/tmp/ansible-tmp-1622316042.9751287-10489-225907978748028/ > /dev/null 2>&1 && sleep 0'
ok: [testhost]
Read vars_file 'integration_config.yml'
META: ran handlers
Read vars_file 'integration_config.yml'

TASK [azure_rm_diskencryptionset : Prepare random number] *************************************************************************************************************************************************
task path: /root/ansible/test/results/.tmp/integration/azure_rm_diskencryptionset-prp4lb5g-ÅÑŚÌβŁÈ/test/integration/targets/azure_rm_diskencryptionset/tasks/main.yml:19
ok: [testhost] => {
    "ansible_facts": {
        "rpfx": "c45a0c9128",
        "set_name": "desc45a0c9bf44019d01fd561",
        "tenant_id": "7268bab6-aabd-44f9-915f-6bf864e879c6"
    },
    "changed": false
}
Read vars_file 'integration_config.yml'

TASK [azure_rm_diskencryptionset : lookup service principal object id] ************************************************************************************************************************************
task path: /root/ansible/test/results/.tmp/integration/azure_rm_diskencryptionset-prp4lb5g-ÅÑŚÌβŁÈ/test/integration/targets/azure_rm_diskencryptionset/tasks/main.yml:26
ok: [testhost] => {
    "ansible_facts": {
        "object_id": "cbd8a5ee-9dd4-4dff-aaee-d975d674cc6a"
    },
    "changed": false
}
Read vars_file 'integration_config.yml'

TASK [azure_rm_diskencryptionset : create a key vault] ****************************************************************************************************************************************************
task path: /root/ansible/test/results/.tmp/integration/azure_rm_diskencryptionset-prp4lb5g-ÅÑŚÌβŁÈ/test/integration/targets/azure_rm_diskencryptionset/tasks/main.yml:34
<testhost> ESTABLISH LOCAL CONNECTION FOR USER: root
<testhost> EXEC /bin/sh -c 'echo ~root && sleep 0'
<testhost> EXEC /bin/sh -c '( umask 77 && mkdir -p "` echo /root/.ansible/tmp `"&& mkdir "` echo /root/.ansible/tmp/ansible-tmp-1622316046.555896-10557-36772452901685 `" && echo ansible-tmp-1622316046.555896-10557-36772452901685="` echo /root/.ansible/tmp/ansible-tmp-1622316046.555896-10557-36772452901685 `" ) && sleep 0'
redirecting (type: modules) ansible.builtin.azure_rm_keyvault to azure.azcollection.azure_rm_keyvault
Using module file /root/.ansible/collections/ansible_collections/azure/azcollection/plugins/modules/azure_rm_keyvault.py
<testhost> PUT /root/.ansible/tmp/ansible-local-104840z52bkno/tmpgbc6s_9r TO /root/.ansible/tmp/ansible-tmp-1622316046.555896-10557-36772452901685/AnsiballZ_azure_rm_keyvault.py
<testhost> EXEC /bin/sh -c 'chmod u+x /root/.ansible/tmp/ansible-tmp-1622316046.555896-10557-36772452901685/ /root/.ansible/tmp/ansible-tmp-1622316046.555896-10557-36772452901685/AnsiballZ_azure_rm_keyvault.py && sleep 0'
<testhost> EXEC /bin/sh -c '/usr/bin/python /root/.ansible/tmp/ansible-tmp-1622316046.555896-10557-36772452901685/AnsiballZ_azure_rm_keyvault.py && sleep 0'
<testhost> EXEC /bin/sh -c 'rm -f -r /root/.ansible/tmp/ansible-tmp-1622316046.555896-10557-36772452901685/ > /dev/null 2>&1 && sleep 0'
[WARNING]: Azure API profile latest does not define an entry for KeyVaultManagementClient
changed: [testhost] => {
    "changed": true,
    "id": "/subscriptions/7b1b46f1-e266-404e-96b4-8738a385c254/resourceGroups/MyAzureResourceGroup/providers/Microsoft.KeyVault/vaults/myvaultc45a0c9128",
    "invocation": {
        "module_args": {
            "access_policies": [
                {
                    "application_id": null,
                    "object_id": "cbd8a5ee-9dd4-4dff-aaee-d975d674cc6a",
                    "permissions": {
                        "certificates": null,
                        "keys": [
                            "VALUE_SPECIFIED_IN_NO_LOG_PARAMETER",
                            "VALUE_SPECIFIED_IN_NO_LOG_PARAMETER",
                            "VALUE_SPECIFIED_IN_NO_LOG_PARAMETER",
                            "VALUE_SPECIFIED_IN_NO_LOG_PARAMETER",
                            "VALUE_SPECIFIED_IN_NO_LOG_PARAMETER",
                            "VALUE_SPECIFIED_IN_NO_LOG_PARAMETER",
                            "VALUE_SPECIFIED_IN_NO_LOG_PARAMETER",
                            "VALUE_SPECIFIED_IN_NO_LOG_PARAMETER",
                            "VALUE_SPECIFIED_IN_NO_LOG_PARAMETER",
                            "VALUE_SPECIFIED_IN_NO_LOG_PARAMETER",
                            "VALUE_SPECIFIED_IN_NO_LOG_PARAMETER",
                            "VALUE_SPECIFIED_IN_NO_LOG_PARAMETER"
                        ],
                        "secrets": null,
                        "storage": null
                    },
                    "tenant_id": "7268bab6-aabd-44f9-915f-6bf864e879c6"
                }
            ],
            "ad_user": null,
            "adfs_authority_url": null,
            "api_profile": "latest",
            "append_tags": true,
            "auth_source": "auto",
            "cert_validation_mode": null,
            "client_id": null,
            "cloud_environment": "AzureCloud",
            "enable_soft_delete": true,
            "enabled_for_deployment": null,
            "enabled_for_disk_encryption": true,
            "enabled_for_template_deployment": null,
            "location": null,
            "password": null,
            "profile": null,
            "recover_mode": null,
            "resource_group": "MyAzureResourceGroup",
            "secret": null,
            "sku": {
                "name": "standard"
            },
            "state": "present",
            "subscription_id": null,
            "tags": null,
            "tenant": null,
            "vault_name": "myvaultc45a0c9128",
            "vault_tenant": "7268bab6-aabd-44f9-915f-6bf864e879c6"
        }
    }
}
Read vars_file 'integration_config.yml'

TASK [azure_rm_diskencryptionset : Create a key in key vault] *********************************************************************************************************************************************
task path: /root/ansible/test/results/.tmp/integration/azure_rm_diskencryptionset-prp4lb5g-ÅÑŚÌβŁÈ/test/integration/targets/azure_rm_diskencryptionset/tasks/main.yml:59
<testhost> ESTABLISH LOCAL CONNECTION FOR USER: root
<testhost> EXEC /bin/sh -c 'echo ~root && sleep 0'
<testhost> EXEC /bin/sh -c '( umask 77 && mkdir -p "` echo /root/.ansible/tmp `"&& mkdir "` echo /root/.ansible/tmp/ansible-tmp-1622316088.1431174-10585-92470546063903 `" && echo ansible-tmp-1622316088.1431174-10585-92470546063903="` echo /root/.ansible/tmp/ansible-tmp-1622316088.1431174-10585-92470546063903 `" ) && sleep 0'
redirecting (type: modules) ansible.builtin.azure_rm_keyvaultkey to azure.azcollection.azure_rm_keyvaultkey
Using module file /root/.ansible/collections/ansible_collections/azure/azcollection/plugins/modules/azure_rm_keyvaultkey.py
<testhost> PUT /root/.ansible/tmp/ansible-local-104840z52bkno/tmpjop3s6st TO /root/.ansible/tmp/ansible-tmp-1622316088.1431174-10585-92470546063903/AnsiballZ_azure_rm_keyvaultkey.py
<testhost> EXEC /bin/sh -c 'chmod u+x /root/.ansible/tmp/ansible-tmp-1622316088.1431174-10585-92470546063903/ /root/.ansible/tmp/ansible-tmp-1622316088.1431174-10585-92470546063903/AnsiballZ_azure_rm_keyvaultkey.py && sleep 0'
<testhost> EXEC /bin/sh -c '/usr/bin/python /root/.ansible/tmp/ansible-tmp-1622316088.1431174-10585-92470546063903/AnsiballZ_azure_rm_keyvaultkey.py && sleep 0'
<testhost> EXEC /bin/sh -c 'rm -f -r /root/.ansible/tmp/ansible-tmp-1622316088.1431174-10585-92470546063903/ > /dev/null 2>&1 && sleep 0'
changed: [testhost] => {
    "changed": true,
    "invocation": {
        "module_args": {
            "ad_user": null,
            "adfs_authority_url": null,
            "api_profile": "latest",
            "append_tags": true,
            "auth_source": "auto",
            "byok_file": null,
            "cert_validation_mode": null,
            "client_id": null,
            "cloud_environment": "AzureCloud",
            "key_name": "testkey",
            "keyvault_uri": "VALUE_SPECIFIED_IN_NO_LOG_PARAMETER",
            "password": null,
            "pem_file": null,
            "pem_password": null,
            "profile": null,
            "secret": null,
            "state": "present",
            "subscription_id": null,
            "tags": null,
            "tenant": null
        }
    },
    "state": {
        "key_id": "********/keys/testkey/8a9db981e8504bc794b8a013b149d336",
        "status": "Created"
    }
}
Read vars_file 'integration_config.yml'

TASK [azure_rm_diskencryptionset : Get latest version of key] *********************************************************************************************************************************************
task path: /root/ansible/test/results/.tmp/integration/azure_rm_diskencryptionset-prp4lb5g-ÅÑŚÌβŁÈ/test/integration/targets/azure_rm_diskencryptionset/tasks/main.yml:64
<testhost> ESTABLISH LOCAL CONNECTION FOR USER: root
<testhost> EXEC /bin/sh -c 'echo ~root && sleep 0'
<testhost> EXEC /bin/sh -c '( umask 77 && mkdir -p "` echo /root/.ansible/tmp `"&& mkdir "` echo /root/.ansible/tmp/ansible-tmp-1622316093.9068336-10612-263416428480634 `" && echo ansible-tmp-1622316093.9068336-10612-263416428480634="` echo /root/.ansible/tmp/ansible-tmp-1622316093.9068336-10612-263416428480634 `" ) && sleep 0'
redirecting (type: modules) ansible.builtin.azure_rm_keyvaultkey_info to azure.azcollection.azure_rm_keyvaultkey_info
Using module file /root/.ansible/collections/ansible_collections/azure/azcollection/plugins/modules/azure_rm_keyvaultkey_info.py
<testhost> PUT /root/.ansible/tmp/ansible-local-104840z52bkno/tmptkoe08rm TO /root/.ansible/tmp/ansible-tmp-1622316093.9068336-10612-263416428480634/AnsiballZ_azure_rm_keyvaultkey_info.py
<testhost> EXEC /bin/sh -c 'chmod u+x /root/.ansible/tmp/ansible-tmp-1622316093.9068336-10612-263416428480634/ /root/.ansible/tmp/ansible-tmp-1622316093.9068336-10612-263416428480634/AnsiballZ_azure_rm_keyvaultkey_info.py && sleep 0'
<testhost> EXEC /bin/sh -c '/usr/bin/python /root/.ansible/tmp/ansible-tmp-1622316093.9068336-10612-263416428480634/AnsiballZ_azure_rm_keyvaultkey_info.py && sleep 0'
<testhost> EXEC /bin/sh -c 'rm -f -r /root/.ansible/tmp/ansible-tmp-1622316093.9068336-10612-263416428480634/ > /dev/null 2>&1 && sleep 0'
ok: [testhost] => {
    "changed": false,
    "invocation": {
        "module_args": {
            "ad_user": null,
            "adfs_authority_url": null,
            "api_profile": "latest",
            "auth_source": "auto",
            "cert_validation_mode": null,
            "client_id": null,
            "cloud_environment": "AzureCloud",
            "name": "testkey",
            "password": null,
            "profile": null,
            "secret": null,
            "show_deleted_key": false,
            "subscription_id": null,
            "tags": null,
            "tenant": null,
            "vault_uri": "https://myvaultc45a0c9128.vault.azure.net",
            "version": "current"
        }
    },
    "keys": [
        {
            "attributes": {
                "created": "2021-05-29T19:21:33+00:00",
                "enabled": true,
                "expires": null,
                "not_before": null,
                "recovery_level": "Recoverable+Purgeable",
                "updated": "2021-05-29T19:21:33+00:00"
            },
            "key": {
                "crv": null,
                "e": "\u0001\u0000\u0001",
                "n": "�b\u0018���~0\r:=<Ȧ4\u001b�\f[o-�k�^\u001e�;{������\r\u000b�4C��ն�g�!Z�Et>�-��I�-\u001d\n�\u0006�w*�\u0007y\u001e���d (�؂����H\u000e��\u0015��;\u0002u��&\u0003�uxX�\u000fJ��\\�:$���<��4Է����G\u000e>\u001f;%N\u0017\u0002�d����t��<[\u001eΞ��e��ǿ���{�$�H�D�y <x1@k\u0006��rb\u0000�\u000f塴�ϒ���\u000be�ր�\u000b�ξ�]�k]7�\bf�:���)\u0005���K���TA\u0012�T׭�^��!$\f�ȓ���\t����-{�!",
                "x": null,
                "y": null
            },
            "kid": "https://myvaultc45a0c9128.vault.azure.net/keys/testkey/8a9db981e8504bc794b8a013b149d336",
            "managed": null,
            "permitted_operations": [
                "encrypt",
                "decrypt",
                "sign",
                "verify",
                "wrapKey",
                "unwrapKey"
            ],
            "tags": null,
            "type": "RSA",
            "version": "8a9db981e8504bc794b8a013b149d336"
        }
    ]
}
Read vars_file 'integration_config.yml'

TASK [azure_rm_diskencryptionset : set_fact] **************************************************************************************************************************************************************
task path: /root/ansible/test/results/.tmp/integration/azure_rm_diskencryptionset-prp4lb5g-ÅÑŚÌβŁÈ/test/integration/targets/azure_rm_diskencryptionset/tasks/main.yml:70
ok: [testhost] => {
    "ansible_facts": {
        "key_url": "https://myvaultc45a0c9128.vault.azure.net/keys/testkey/8a9db981e8504bc794b8a013b149d336"
    },
    "changed": false
}
Read vars_file 'integration_config.yml'

TASK [azure_rm_diskencryptionset : create disk encryption set] ********************************************************************************************************************************************
task path: /root/ansible/test/results/.tmp/integration/azure_rm_diskencryptionset-prp4lb5g-ÅÑŚÌβŁÈ/test/integration/targets/azure_rm_diskencryptionset/tasks/main.yml:73
<testhost> ESTABLISH LOCAL CONNECTION FOR USER: root
<testhost> EXEC /bin/sh -c 'echo ~root && sleep 0'
<testhost> EXEC /bin/sh -c '( umask 77 && mkdir -p "` echo /root/.ansible/tmp `"&& mkdir "` echo /root/.ansible/tmp/ansible-tmp-1622316097.8839796-10641-49016924275426 `" && echo ansible-tmp-1622316097.8839796-10641-49016924275426="` echo /root/.ansible/tmp/ansible-tmp-1622316097.8839796-10641-49016924275426 `" ) && sleep 0'
Using module file /root/ansible/lib/ansible/modules/azure_rm_diskencryptionset.py
<testhost> PUT /root/.ansible/tmp/ansible-local-104840z52bkno/tmpzmmgmzib TO /root/.ansible/tmp/ansible-tmp-1622316097.8839796-10641-49016924275426/AnsiballZ_azure_rm_diskencryptionset.py
<testhost> EXEC /bin/sh -c 'chmod u+x /root/.ansible/tmp/ansible-tmp-1622316097.8839796-10641-49016924275426/ /root/.ansible/tmp/ansible-tmp-1622316097.8839796-10641-49016924275426/AnsiballZ_azure_rm_diskencryptionset.py && sleep 0'
<testhost> EXEC /bin/sh -c '/usr/bin/python /root/.ansible/tmp/ansible-tmp-1622316097.8839796-10641-49016924275426/AnsiballZ_azure_rm_diskencryptionset.py && sleep 0'
<testhost> EXEC /bin/sh -c 'rm -f -r /root/.ansible/tmp/ansible-tmp-1622316097.8839796-10641-49016924275426/ > /dev/null 2>&1 && sleep 0'
changed: [testhost] => {
    "changed": true,
    "invocation": {
        "module_args": {
            "ad_user": null,
            "adfs_authority_url": null,
            "api_profile": "latest",
            "append_tags": true,
            "auth_source": "auto",
            "cert_validation_mode": null,
            "client_id": null,
            "cloud_environment": "AzureCloud",
            "key_url": "VALUE_SPECIFIED_IN_NO_LOG_PARAMETER",
            "location": null,
            "name": "desc45a0c9bf44019d01fd561",
            "password": null,
            "profile": null,
            "resource_group": "MyAzureResourceGroup",
            "secret": null,
            "source_vault": "myvaultc45a0c9128",
            "state": "present",
            "subscription_id": null,
            "tags": null,
            "tenant": null
        }
    },
    "state": {
        "active_key": {
            "key_url": "VALUE_SPECIFIED_IN_NO_LOG_PARAMETER",
            "source_vault": {
                "id": "/subscriptions/7b1b46f1-e266-404e-96b4-8738a385c254/resourceGroups/MyAzureResourceGroup/providers/Microsoft.KeyVault/vaults/myvaultc45a0c9128"
            }
        },
        "id": "/subscriptions/7b1b46f1-e266-404e-96b4-8738a385c254/resourceGroups/MyAzureResourceGroup/providers/Microsoft.Compute/diskEncryptionSets/desc45a0c9bf44019d01fd561",
        "identity": {
            "principal_id": "229fa342-bf08-4b87-83f6-54898c955075",
            "tenant_id": "7268bab6-aabd-44f9-915f-6bf864e879c6",
            "type": "SystemAssigned"
        },
        "location": "centralindia",
        "name": "desc45a0c9bf44019d01fd561",
        "provisioning_state": "Succeeded",
        "tags": null,
        "type": "Microsoft.Compute/diskEncryptionSets"
    }
}
Read vars_file 'integration_config.yml'

TASK [azure_rm_diskencryptionset : Assert that disk encryption set is created] ****************************************************************************************************************************
task path: /root/ansible/test/results/.tmp/integration/azure_rm_diskencryptionset-prp4lb5g-ÅÑŚÌβŁÈ/test/integration/targets/azure_rm_diskencryptionset/tasks/main.yml:82
ok: [testhost] => {
    "changed": false,
    "msg": "All assertions passed"
}
Read vars_file 'integration_config.yml'

TASK [azure_rm_diskencryptionset : create disk encryption set (Idempotent test)] **************************************************************************************************************************
task path: /root/ansible/test/results/.tmp/integration/azure_rm_diskencryptionset-prp4lb5g-ÅÑŚÌβŁÈ/test/integration/targets/azure_rm_diskencryptionset/tasks/main.yml:86
<testhost> ESTABLISH LOCAL CONNECTION FOR USER: root
<testhost> EXEC /bin/sh -c 'echo ~root && sleep 0'
<testhost> EXEC /bin/sh -c '( umask 77 && mkdir -p "` echo /root/.ansible/tmp `"&& mkdir "` echo /root/.ansible/tmp/ansible-tmp-1622316139.8179612-10672-100217195519353 `" && echo ansible-tmp-1622316139.8179612-10672-100217195519353="` echo /root/.ansible/tmp/ansible-tmp-1622316139.8179612-10672-100217195519353 `" ) && sleep 0'
Using module file /root/ansible/lib/ansible/modules/azure_rm_diskencryptionset.py
<testhost> PUT /root/.ansible/tmp/ansible-local-104840z52bkno/tmp3j0w_wjw TO /root/.ansible/tmp/ansible-tmp-1622316139.8179612-10672-100217195519353/AnsiballZ_azure_rm_diskencryptionset.py
<testhost> EXEC /bin/sh -c 'chmod u+x /root/.ansible/tmp/ansible-tmp-1622316139.8179612-10672-100217195519353/ /root/.ansible/tmp/ansible-tmp-1622316139.8179612-10672-100217195519353/AnsiballZ_azure_rm_diskencryptionset.py && sleep 0'
<testhost> EXEC /bin/sh -c '/usr/bin/python /root/.ansible/tmp/ansible-tmp-1622316139.8179612-10672-100217195519353/AnsiballZ_azure_rm_diskencryptionset.py && sleep 0'
<testhost> EXEC /bin/sh -c 'rm -f -r /root/.ansible/tmp/ansible-tmp-1622316139.8179612-10672-100217195519353/ > /dev/null 2>&1 && sleep 0'
ok: [testhost] => {
    "changed": false,
    "invocation": {
        "module_args": {
            "ad_user": null,
            "adfs_authority_url": null,
            "api_profile": "latest",
            "append_tags": true,
            "auth_source": "auto",
            "cert_validation_mode": null,
            "client_id": null,
            "cloud_environment": "AzureCloud",
            "key_url": "VALUE_SPECIFIED_IN_NO_LOG_PARAMETER",
            "location": null,
            "name": "desc45a0c9bf44019d01fd561",
            "password": null,
            "profile": null,
            "resource_group": "MyAzureResourceGroup",
            "secret": null,
            "source_vault": "myvaultc45a0c9128",
            "state": "present",
            "subscription_id": null,
            "tags": null,
            "tenant": null
        }
    },
    "state": {
        "active_key": {
            "key_url": "VALUE_SPECIFIED_IN_NO_LOG_PARAMETER",
            "source_vault": {
                "id": "/subscriptions/7b1b46f1-e266-404e-96b4-8738a385c254/resourceGroups/MyAzureResourceGroup/providers/Microsoft.KeyVault/vaults/myvaultc45a0c9128"
            }
        },
        "id": "/subscriptions/7b1b46f1-e266-404e-96b4-8738a385c254/resourceGroups/MyAzureResourceGroup/providers/Microsoft.Compute/diskEncryptionSets/desc45a0c9bf44019d01fd561",
        "identity": {
            "principal_id": "229fa342-bf08-4b87-83f6-54898c955075",
            "tenant_id": "7268bab6-aabd-44f9-915f-6bf864e879c6",
            "type": "SystemAssigned"
        },
        "location": "centralindia",
        "name": "desc45a0c9bf44019d01fd561",
        "provisioning_state": "Succeeded",
        "tags": {},
        "type": "Microsoft.Compute/diskEncryptionSets"
    }
}
Read vars_file 'integration_config.yml'

TASK [azure_rm_diskencryptionset : Assert that output is not changed] *************************************************************************************************************************************
task path: /root/ansible/test/results/.tmp/integration/azure_rm_diskencryptionset-prp4lb5g-ÅÑŚÌβŁÈ/test/integration/targets/azure_rm_diskencryptionset/tasks/main.yml:95
ok: [testhost] => {
    "changed": false,
    "msg": "All assertions passed"
}
Read vars_file 'integration_config.yml'

TASK [azure_rm_diskencryptionset : Update disk encryption set] ********************************************************************************************************************************************
task path: /root/ansible/test/results/.tmp/integration/azure_rm_diskencryptionset-prp4lb5g-ÅÑŚÌβŁÈ/test/integration/targets/azure_rm_diskencryptionset/tasks/main.yml:99
<testhost> ESTABLISH LOCAL CONNECTION FOR USER: root
<testhost> EXEC /bin/sh -c 'echo ~root && sleep 0'
<testhost> EXEC /bin/sh -c '( umask 77 && mkdir -p "` echo /root/.ansible/tmp `"&& mkdir "` echo /root/.ansible/tmp/ansible-tmp-1622316143.2061727-10701-46459575807262 `" && echo ansible-tmp-1622316143.2061727-10701-46459575807262="` echo /root/.ansible/tmp/ansible-tmp-1622316143.2061727-10701-46459575807262 `" ) && sleep 0'
Using module file /root/ansible/lib/ansible/modules/azure_rm_diskencryptionset.py
<testhost> PUT /root/.ansible/tmp/ansible-local-104840z52bkno/tmpdd36a33v TO /root/.ansible/tmp/ansible-tmp-1622316143.2061727-10701-46459575807262/AnsiballZ_azure_rm_diskencryptionset.py
<testhost> EXEC /bin/sh -c 'chmod u+x /root/.ansible/tmp/ansible-tmp-1622316143.2061727-10701-46459575807262/ /root/.ansible/tmp/ansible-tmp-1622316143.2061727-10701-46459575807262/AnsiballZ_azure_rm_diskencryptionset.py && sleep 0'
<testhost> EXEC /bin/sh -c '/usr/bin/python /root/.ansible/tmp/ansible-tmp-1622316143.2061727-10701-46459575807262/AnsiballZ_azure_rm_diskencryptionset.py && sleep 0'
<testhost> EXEC /bin/sh -c 'rm -f -r /root/.ansible/tmp/ansible-tmp-1622316143.2061727-10701-46459575807262/ > /dev/null 2>&1 && sleep 0'
changed: [testhost] => {
    "changed": true,
    "invocation": {
        "module_args": {
            "ad_user": null,
            "adfs_authority_url": null,
            "api_profile": "latest",
            "append_tags": true,
            "auth_source": "auto",
            "cert_validation_mode": null,
            "client_id": null,
            "cloud_environment": "AzureCloud",
            "key_url": "VALUE_SPECIFIED_IN_NO_LOG_PARAMETER",
            "location": null,
            "name": "desc45a0c9bf44019d01fd561",
            "password": null,
            "profile": null,
            "resource_group": "MyAzureResourceGroup",
            "secret": null,
            "source_vault": "myvaultc45a0c9128",
            "state": "present",
            "subscription_id": null,
            "tags": {
                "key1": "value1"
            },
            "tenant": null
        }
    },
    "state": {
        "active_key": {
            "key_url": "VALUE_SPECIFIED_IN_NO_LOG_PARAMETER",
            "source_vault": {
                "id": "/subscriptions/7b1b46f1-e266-404e-96b4-8738a385c254/resourceGroups/MyAzureResourceGroup/providers/Microsoft.KeyVault/vaults/myvaultc45a0c9128"
            }
        },
        "id": "/subscriptions/7b1b46f1-e266-404e-96b4-8738a385c254/resourceGroups/MyAzureResourceGroup/providers/Microsoft.Compute/diskEncryptionSets/desc45a0c9bf44019d01fd561",
        "identity": {
            "principal_id": "229fa342-bf08-4b87-83f6-54898c955075",
            "tenant_id": "7268bab6-aabd-44f9-915f-6bf864e879c6",
            "type": "SystemAssigned"
        },
        "location": "centralindia",
        "name": "desc45a0c9bf44019d01fd561",
        "provisioning_state": "Succeeded",
        "tags": {
            "key1": "value1"
        },
        "type": "Microsoft.Compute/diskEncryptionSets"
    }
}
Read vars_file 'integration_config.yml'

TASK [azure_rm_diskencryptionset : Assert that disk encryption set is updated] ****************************************************************************************************************************
task path: /root/ansible/test/results/.tmp/integration/azure_rm_diskencryptionset-prp4lb5g-ÅÑŚÌβŁÈ/test/integration/targets/azure_rm_diskencryptionset/tasks/main.yml:110
ok: [testhost] => {
    "changed": false,
    "msg": "All assertions passed"
}
Read vars_file 'integration_config.yml'

TASK [azure_rm_diskencryptionset : Get disk encryption set facts] *****************************************************************************************************************************************
task path: /root/ansible/test/results/.tmp/integration/azure_rm_diskencryptionset-prp4lb5g-ÅÑŚÌβŁÈ/test/integration/targets/azure_rm_diskencryptionset/tasks/main.yml:114
<testhost> ESTABLISH LOCAL CONNECTION FOR USER: root
<testhost> EXEC /bin/sh -c 'echo ~root && sleep 0'
<testhost> EXEC /bin/sh -c '( umask 77 && mkdir -p "` echo /root/.ansible/tmp `"&& mkdir "` echo /root/.ansible/tmp/ansible-tmp-1622316178.7934437-10731-51887008394304 `" && echo ansible-tmp-1622316178.7934437-10731-51887008394304="` echo /root/.ansible/tmp/ansible-tmp-1622316178.7934437-10731-51887008394304 `" ) && sleep 0'
Using module file /root/ansible/lib/ansible/modules/azure_rm_diskencryptionset_info.py
<testhost> PUT /root/.ansible/tmp/ansible-local-104840z52bkno/tmpqbw45222 TO /root/.ansible/tmp/ansible-tmp-1622316178.7934437-10731-51887008394304/AnsiballZ_azure_rm_diskencryptionset_info.py
<testhost> EXEC /bin/sh -c 'chmod u+x /root/.ansible/tmp/ansible-tmp-1622316178.7934437-10731-51887008394304/ /root/.ansible/tmp/ansible-tmp-1622316178.7934437-10731-51887008394304/AnsiballZ_azure_rm_diskencryptionset_info.py && sleep 0'
<testhost> EXEC /bin/sh -c '/usr/bin/python /root/.ansible/tmp/ansible-tmp-1622316178.7934437-10731-51887008394304/AnsiballZ_azure_rm_diskencryptionset_info.py && sleep 0'
<testhost> EXEC /bin/sh -c 'rm -f -r /root/.ansible/tmp/ansible-tmp-1622316178.7934437-10731-51887008394304/ > /dev/null 2>&1 && sleep 0'
ok: [testhost] => {
    "changed": false,
    "diskencryptionsets": [
        {
            "active_key": {
                "key_url": "https://myvaultc45a0c9128.vault.azure.net/keys/testkey/8a9db981e8504bc794b8a013b149d336",
                "source_vault": {
                    "id": "/subscriptions/7b1b46f1-e266-404e-96b4-8738a385c254/resourceGroups/MyAzureResourceGroup/providers/Microsoft.KeyVault/vaults/myvaultc45a0c9128"
                }
            },
            "id": "/subscriptions/7b1b46f1-e266-404e-96b4-8738a385c254/resourceGroups/MyAzureResourceGroup/providers/Microsoft.Compute/diskEncryptionSets/desc45a0c9bf44019d01fd561",
            "identity": {
                "principal_id": "229fa342-bf08-4b87-83f6-54898c955075",
                "tenant_id": "7268bab6-aabd-44f9-915f-6bf864e879c6",
                "type": "SystemAssigned"
            },
            "location": "centralindia",
            "name": "desc45a0c9bf44019d01fd561",
            "provisioning_state": "Succeeded",
            "tags": {
                "key1": "value1"
            },
            "type": "Microsoft.Compute/diskEncryptionSets"
        }
    ],
    "invocation": {
        "module_args": {
            "ad_user": null,
            "adfs_authority_url": null,
            "api_profile": "latest",
            "append_tags": true,
            "auth_source": "auto",
            "cert_validation_mode": null,
            "client_id": null,
            "cloud_environment": "AzureCloud",
            "name": "desc45a0c9bf44019d01fd561",
            "password": null,
            "profile": null,
            "resource_group": "MyAzureResourceGroup",
            "secret": null,
            "subscription_id": null,
            "tags": null,
            "tenant": null
        }
    }
}
Read vars_file 'integration_config.yml'

TASK [azure_rm_diskencryptionset : assert] ****************************************************************************************************************************************************************
task path: /root/ansible/test/results/.tmp/integration/azure_rm_diskencryptionset-prp4lb5g-ÅÑŚÌβŁÈ/test/integration/targets/azure_rm_diskencryptionset/tasks/main.yml:120
ok: [testhost] => {
    "changed": false,
    "msg": "All assertions passed"
}
Read vars_file 'integration_config.yml'

TASK [azure_rm_diskencryptionset : Delete disk encryption set] ********************************************************************************************************************************************
task path: /root/ansible/test/results/.tmp/integration/azure_rm_diskencryptionset-prp4lb5g-ÅÑŚÌβŁÈ/test/integration/targets/azure_rm_diskencryptionset/tasks/main.yml:129
<testhost> ESTABLISH LOCAL CONNECTION FOR USER: root
<testhost> EXEC /bin/sh -c 'echo ~root && sleep 0'
<testhost> EXEC /bin/sh -c '( umask 77 && mkdir -p "` echo /root/.ansible/tmp `"&& mkdir "` echo /root/.ansible/tmp/ansible-tmp-1622316184.0382943-10760-92713132852516 `" && echo ansible-tmp-1622316184.0382943-10760-92713132852516="` echo /root/.ansible/tmp/ansible-tmp-1622316184.0382943-10760-92713132852516 `" ) && sleep 0'
Using module file /root/ansible/lib/ansible/modules/azure_rm_diskencryptionset.py
<testhost> PUT /root/.ansible/tmp/ansible-local-104840z52bkno/tmp1wbmjt3v TO /root/.ansible/tmp/ansible-tmp-1622316184.0382943-10760-92713132852516/AnsiballZ_azure_rm_diskencryptionset.py
<testhost> EXEC /bin/sh -c 'chmod u+x /root/.ansible/tmp/ansible-tmp-1622316184.0382943-10760-92713132852516/ /root/.ansible/tmp/ansible-tmp-1622316184.0382943-10760-92713132852516/AnsiballZ_azure_rm_diskencryptionset.py && sleep 0'
<testhost> EXEC /bin/sh -c '/usr/bin/python /root/.ansible/tmp/ansible-tmp-1622316184.0382943-10760-92713132852516/AnsiballZ_azure_rm_diskencryptionset.py && sleep 0'
<testhost> EXEC /bin/sh -c 'rm -f -r /root/.ansible/tmp/ansible-tmp-1622316184.0382943-10760-92713132852516/ > /dev/null 2>&1 && sleep 0'
changed: [testhost] => {
    "changed": true,
    "invocation": {
        "module_args": {
            "ad_user": null,
            "adfs_authority_url": null,
            "api_profile": "latest",
            "append_tags": true,
            "auth_source": "auto",
            "cert_validation_mode": null,
            "client_id": null,
            "cloud_environment": "AzureCloud",
            "key_url": null,
            "location": null,
            "name": "desc45a0c9bf44019d01fd561",
            "password": null,
            "profile": null,
            "resource_group": "MyAzureResourceGroup",
            "secret": null,
            "source_vault": null,
            "state": "absent",
            "subscription_id": null,
            "tags": null,
            "tenant": null
        }
    },
    "state": "Deleted"
}
Read vars_file 'integration_config.yml'

TASK [azure_rm_diskencryptionset : Assert that disk encryption set is deleted] ****************************************************************************************************************************
task path: /root/ansible/test/results/.tmp/integration/azure_rm_diskencryptionset-prp4lb5g-ÅÑŚÌβŁÈ/test/integration/targets/azure_rm_diskencryptionset/tasks/main.yml:136
ok: [testhost] => {
    "changed": false,
    "msg": "All assertions passed"
}
Read vars_file 'integration_config.yml'

TASK [azure_rm_diskencryptionset : Delete disk encryption set (Idempotent test)] **************************************************************************************************************************
task path: /root/ansible/test/results/.tmp/integration/azure_rm_diskencryptionset-prp4lb5g-ÅÑŚÌβŁÈ/test/integration/targets/azure_rm_diskencryptionset/tasks/main.yml:140
<testhost> ESTABLISH LOCAL CONNECTION FOR USER: root
<testhost> EXEC /bin/sh -c 'echo ~root && sleep 0'
<testhost> EXEC /bin/sh -c '( umask 77 && mkdir -p "` echo /root/.ansible/tmp `"&& mkdir "` echo /root/.ansible/tmp/ansible-tmp-1622316220.3381774-10790-109106985365651 `" && echo ansible-tmp-1622316220.3381774-10790-109106985365651="` echo /root/.ansible/tmp/ansible-tmp-1622316220.3381774-10790-109106985365651 `" ) && sleep 0'
Using module file /root/ansible/lib/ansible/modules/azure_rm_diskencryptionset.py
<testhost> PUT /root/.ansible/tmp/ansible-local-104840z52bkno/tmpx6uwu27a TO /root/.ansible/tmp/ansible-tmp-1622316220.3381774-10790-109106985365651/AnsiballZ_azure_rm_diskencryptionset.py
<testhost> EXEC /bin/sh -c 'chmod u+x /root/.ansible/tmp/ansible-tmp-1622316220.3381774-10790-109106985365651/ /root/.ansible/tmp/ansible-tmp-1622316220.3381774-10790-109106985365651/AnsiballZ_azure_rm_diskencryptionset.py && sleep 0'
<testhost> EXEC /bin/sh -c '/usr/bin/python /root/.ansible/tmp/ansible-tmp-1622316220.3381774-10790-109106985365651/AnsiballZ_azure_rm_diskencryptionset.py && sleep 0'
<testhost> EXEC /bin/sh -c 'rm -f -r /root/.ansible/tmp/ansible-tmp-1622316220.3381774-10790-109106985365651/ > /dev/null 2>&1 && sleep 0'
ok: [testhost] => {
    "changed": false,
    "invocation": {
        "module_args": {
            "ad_user": null,
            "adfs_authority_url": null,
            "api_profile": "latest",
            "append_tags": true,
            "auth_source": "auto",
            "cert_validation_mode": null,
            "client_id": null,
            "cloud_environment": "AzureCloud",
            "key_url": null,
            "location": null,
            "name": "desc45a0c9bf44019d01fd561",
            "password": null,
            "profile": null,
            "resource_group": "MyAzureResourceGroup",
            "secret": null,
            "source_vault": null,
            "state": "absent",
            "subscription_id": null,
            "tags": null,
            "tenant": null
        }
    },
    "state": {}
}
Read vars_file 'integration_config.yml'

TASK [azure_rm_diskencryptionset : Asset that output is not changed] **************************************************************************************************************************************
task path: /root/ansible/test/results/.tmp/integration/azure_rm_diskencryptionset-prp4lb5g-ÅÑŚÌβŁÈ/test/integration/targets/azure_rm_diskencryptionset/tasks/main.yml:147
ok: [testhost] => {
    "changed": false,
    "msg": "All assertions passed"
}
Read vars_file 'integration_config.yml'

TASK [azure_rm_diskencryptionset : Delete the Key Vault] **************************************************************************************************************************************************
task path: /root/ansible/test/results/.tmp/integration/azure_rm_diskencryptionset-prp4lb5g-ÅÑŚÌβŁÈ/test/integration/targets/azure_rm_diskencryptionset/tasks/main.yml:151
<testhost> ESTABLISH LOCAL CONNECTION FOR USER: root
<testhost> EXEC /bin/sh -c 'echo ~root && sleep 0'
<testhost> EXEC /bin/sh -c '( umask 77 && mkdir -p "` echo /root/.ansible/tmp `"&& mkdir "` echo /root/.ansible/tmp/ansible-tmp-1622316225.502533-10819-152606202223899 `" && echo ansible-tmp-1622316225.502533-10819-152606202223899="` echo /root/.ansible/tmp/ansible-tmp-1622316225.502533-10819-152606202223899 `" ) && sleep 0'
redirecting (type: modules) ansible.builtin.azure_rm_keyvault to azure.azcollection.azure_rm_keyvault
Using module file /root/.ansible/collections/ansible_collections/azure/azcollection/plugins/modules/azure_rm_keyvault.py
<testhost> PUT /root/.ansible/tmp/ansible-local-104840z52bkno/tmp7z2mu1ac TO /root/.ansible/tmp/ansible-tmp-1622316225.502533-10819-152606202223899/AnsiballZ_azure_rm_keyvault.py
<testhost> EXEC /bin/sh -c 'chmod u+x /root/.ansible/tmp/ansible-tmp-1622316225.502533-10819-152606202223899/ /root/.ansible/tmp/ansible-tmp-1622316225.502533-10819-152606202223899/AnsiballZ_azure_rm_keyvault.py && sleep 0'
<testhost> EXEC /bin/sh -c '/usr/bin/python /root/.ansible/tmp/ansible-tmp-1622316225.502533-10819-152606202223899/AnsiballZ_azure_rm_keyvault.py && sleep 0'
<testhost> EXEC /bin/sh -c 'rm -f -r /root/.ansible/tmp/ansible-tmp-1622316225.502533-10819-152606202223899/ > /dev/null 2>&1 && sleep 0'
changed: [testhost] => {
    "changed": true,
    "invocation": {
        "module_args": {
            "access_policies": null,
            "ad_user": null,
            "adfs_authority_url": null,
            "api_profile": "latest",
            "append_tags": true,
            "auth_source": "auto",
            "cert_validation_mode": null,
            "client_id": null,
            "cloud_environment": "AzureCloud",
            "enable_soft_delete": true,
            "enabled_for_deployment": null,
            "enabled_for_disk_encryption": null,
            "enabled_for_template_deployment": null,
            "location": null,
            "password": null,
            "profile": null,
            "recover_mode": null,
            "resource_group": "MyAzureResourceGroup",
            "secret": null,
            "sku": null,
            "state": "absent",
            "subscription_id": null,
            "tags": null,
            "tenant": null,
            "vault_name": "myvaultc45a0c9128",
            "vault_tenant": null
        }
    }
}
Read vars_file 'integration_config.yml'
META: role_complete for testhost
Read vars_file 'integration_config.yml'
META: ran handlers
Read vars_file 'integration_config.yml'
META: ran handlers

PLAY RECAP ************************************************************************************************************************************************************************************************
testhost                   : ok=20   changed=6    unreachable=0    failed=0    skipped=0    rescued=0    ignored=0   

Run command: /usr/bin/python /root/ansible/test/lib/ansible_test/_data/versions.py
Working directory: /root/ansible
Program found: /usr/bin/python
HOME=/root
LC_ALL=en_US.UTF-8
PATH=/root/ansible/bin:/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/usr/games:/usr/local/games
Run command: /usr/bin/python3 /root/ansible/test/lib/ansible_test/_data/versions.py
Working directory: /root/ansible
Program found: /usr/bin/python3
HOME=/root
LC_ALL=en_US.UTF-8
PATH=/root/ansible/bin:/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/usr/games:/usr/local/games
Run command: /usr/bin/python3.8 /root/ansible/test/lib/ansible_test/_data/versions.py
Working directory: /root/ansible
Program found: /usr/bin/python3.8
HOME=/root
LC_ALL=en_US.UTF-8
PATH=/root/ansible/bin:/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/usr/games:/usr/local/games
Cleaning up temporary python directory: /tmp/python-jq_ccfrw-ansible

@Fred-sun Fred-sun added medium_priority Medium priority new_module_pr Add new modules ready_for_review The PR has been modified and can be reviewed and merged labels May 31, 2021
@Fred-sun

This comment has been minimized.

@Fred-sun Fred-sun added work in In trying to solve, or in working with contributors and removed ready_for_review The PR has been modified and can be reviewed and merged labels Jun 16, 2021
Copy link
Collaborator

@Fred-sun Fred-sun left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@techcon65 One last update requirement, Thank you very much!

plugins/modules/azure_rm_diskencryptionset.py Outdated Show resolved Hide resolved
plugins/modules/azure_rm_diskencryptionset_info.py Outdated Show resolved Hide resolved
@Fred-sun Fred-sun added ready_for_review The PR has been modified and can be reviewed and merged and removed work in In trying to solve, or in working with contributors labels Jun 17, 2021
@Fred-sun
Copy link
Collaborator

@techcon65 last change request!

techcon65 and others added 3 commits August 18, 2021 18:26
Co-authored-by: Fred-sun <37327967+Fred-sun@users.noreply.github.com>
Co-authored-by: Fred-sun <37327967+Fred-sun@users.noreply.github.com>
Co-authored-by: Fred-sun <37327967+Fred-sun@users.noreply.github.com>
@ghost
Copy link
Author

ghost commented Aug 18, 2021

@techcon65 last change request!

Thank you @Fred-sun !!

@ghost
Copy link
Author

ghost commented Aug 18, 2021

@Fred-sun Seems builds are failing, however I haven't made any changes apart from the suggested commits. Could you help check when you get time? Thank you very much!

@xuzhang3
Copy link
Collaborator

LGTM, ship it.

@xuzhang3 xuzhang3 merged commit f5f6854 into ansible-collections:dev Oct 15, 2021
nbr23 pushed a commit to nbr23/azure that referenced this pull request Oct 26, 2021
* New module: azure_rm_diskencryptionset

* upgraded version_added

* Update plugins/modules/azure_rm_diskencryptionset.py

Co-authored-by: Fred-sun <37327967+Fred-sun@users.noreply.github.com>

* Update plugins/modules/azure_rm_diskencryptionset_info.py

Co-authored-by: Fred-sun <37327967+Fred-sun@users.noreply.github.com>

* Update plugins/modules/azure_rm_diskencryptionset_info.py

Co-authored-by: Fred-sun <37327967+Fred-sun@users.noreply.github.com>

* updated version

Co-authored-by: Fred-sun <37327967+Fred-sun@users.noreply.github.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
medium_priority Medium priority new_module_pr Add new modules ready_for_review The PR has been modified and can be reviewed and merged
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Ansible support to create disk encryption set
3 participants