Skip to content

Commit

Permalink
Merge pull request #57 from eitrtechnologies/release-2-changes
Browse files Browse the repository at this point in the history
Release 2 changes
  • Loading branch information
nicholasmhughes authored May 5, 2020
2 parents ca1c35b + b04b823 commit e30556e
Show file tree
Hide file tree
Showing 89 changed files with 379 additions and 324 deletions.
68 changes: 68 additions & 0 deletions CHANGELOG.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,68 @@
# Changelog

All notable changes to this project will be documented in this file.

The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.0.0/),
and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0.html).

## [2.0.0] - 2020-05-04

### Added

- [#53](https://github.com/eitrtechnologies/idem-azurerm/pull/53) - Added virtual machine "cleanup"
functionality similar to that present in salt-cloud.
- [#47](https://github.com/eitrtechnologies/idem-azurerm/pull/47) - Added virtual machine creation
functionality to create feature parity with salt-cloud, plus more.
- [#35](https://github.com/eitrtechnologies/idem-azurerm/pull/35) - Added virtual machine extension execution
and state modules.
- [#33](https://github.com/eitrtechnologies/idem-azurerm/pull/33) - Added PostgreSQL replica and location-based
performance tier support.
- [#26](https://github.com/eitrtechnologies/idem-azurerm/pull/26) - Added PostgreSQL log files, virtual network
rules, and server security alert policies operations.
- [#25](https://github.com/eitrtechnologies/idem-azurerm/pull/25) - Added initial PostgreSQL support for basic
deployments.
- [#20](https://github.com/eitrtechnologies/idem-azurerm/pull/20) - Added execution and state modules for
deploying keys to Key Vaults.
- [#19](https://github.com/eitrtechnologies/idem-azurerm/pull/19) - Added Management Group execution and state
modules.
- [#13](https://github.com/eitrtechnologies/idem-azurerm/pull/13) - Added Log Analytics Workspace management
execution and state modules.
- [#10](https://github.com/eitrtechnologies/idem-azurerm/pull/10) - Added encrypted disk functionality to
virtual machines.
- [#9](https://github.com/eitrtechnologies/idem-azurerm/pull/9) - Added Redis execution and state modules for
management of the hosted service in Azure.
- [#7](https://github.com/eitrtechnologies/idem-azurerm/pull/7) - Added execution and state modules for Key
Vault management.
- [#6](https://github.com/eitrtechnologies/idem-azurerm/pull/6) - Added diagnostic setting and management lock
state modules.
- [#5](https://github.com/eitrtechnologies/idem-azurerm/pull/5) - Added storage execution and state modules for
storage account and storage container management.
- Added support for Azure Identity Provider credentials.

### Changed

- [#57](https://github.com/eitrtechnologies/idem-azurerm/pull/57) - Changed azurearm references and renamed to
idem-azurerm to match pip
- [#29](https://github.com/eitrtechnologies/idem-azurerm/pull/29) - Added function aliases for list functions,
changing the way they are referenced.

### Fixed

- [#42](https://github.com/eitrtechnologies/idem-azurerm/pull/42) - Fixed reference to salt modules for file
handling in Policy modules.
- [#27](https://github.com/eitrtechnologies/idem-azurerm/pull/27) - Allowed keyword arguments for absent states
in order to prevent throwing errors and more closely mirror the present states.

### Deprecated

### Removed

## [1.0.0] - 2019-11-14

### Added

- Initial release of execution and state modules from Salt along with some additional functionality ported from
salt-cloud for virtual machines.

[2.0.0]: https://github.com/eitrtechnologies/idem-azurerm/compare/v1.0.0...v2.0.0
[1.0.0]: https://github.com/eitrtechnologies/idem-azurerm/releases/tag/v1.0.0
File renamed without changes.
File renamed without changes.
File renamed without changes.
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@
.. versionadded:: 1.0.0
.. versionchanged:: VERSION
.. versionchanged:: 2.0.0
:maintainer: <[email protected]>
:maturity: new
Expand Down Expand Up @@ -117,7 +117,7 @@ async def create_or_update(
'''
.. versionadded:: 1.0.0
.. versionchanged:: VERSION
.. versionchanged:: 2.0.0
Create or update a virtual machine.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
'''
Azure Resource Manager (ARM) Compute Virtual Machine Extension Operations Execution Module
.. versionadded:: VERSION
.. versionadded:: 2.0.0
:maintainer: <[email protected]>
:maturity: new
Expand Down Expand Up @@ -66,7 +66,7 @@
async def create_or_update(hub, name, vm_name, resource_group, location, publisher, extension_type, version, settings,
**kwargs):
'''
.. versionadded:: VERSION
.. versionadded:: 2.0.0
The operation to create or update the extension.
Expand Down Expand Up @@ -132,7 +132,7 @@ async def create_or_update(hub, name, vm_name, resource_group, location, publish

async def delete(hub, name, vm_name, resource_group, **kwargs):
'''
.. versionadded:: VERSION
.. versionadded:: 2.0.0
The operation to delete the extension.
Expand Down Expand Up @@ -170,7 +170,7 @@ async def delete(hub, name, vm_name, resource_group, **kwargs):

async def get(hub, name, vm_name, resource_group, **kwargs):
'''
.. versionadded:: VERSION
.. versionadded:: 2.0.0
The operation to get the extension.
Expand Down Expand Up @@ -207,7 +207,7 @@ async def get(hub, name, vm_name, resource_group, **kwargs):

async def list_(hub, vm_name, resource_group, **kwargs):
'''
.. versionadded:: VERSION
.. versionadded:: 2.0.0
The operation to get all extensions of a Virtual Machine.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
'''
Azure Resource Manager (ARM) Compute Virtual Machine Extension Image Operations Execution Module
.. versionadded:: VERSION
.. versionadded:: 2.0.0
:maintainer: <[email protected]>
:maturity: new
Expand Down Expand Up @@ -63,7 +63,7 @@

async def get(hub, location, publisher, extension_type, version, **kwargs):
'''
.. versionadded:: VERSION
.. versionadded:: 2.0.0
Gets a virtual machine extension image.
Expand Down Expand Up @@ -104,7 +104,7 @@ async def get(hub, location, publisher, extension_type, version, **kwargs):

async def list_types(hub, location, publisher, **kwargs):
'''
.. versionadded:: VERSION
.. versionadded:: 2.0.0
Gets a list of virtual machine extension image types.
Expand Down Expand Up @@ -140,7 +140,7 @@ async def list_types(hub, location, publisher, **kwargs):

async def list_versions(hub, location, publisher, extension_type, **kwargs):
'''
.. versionadded:: VERSION
.. versionadded:: 2.0.0
Gets a list of virtual machine extension image versions.
Expand Down
File renamed without changes.
File renamed without changes.
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
'''
Azure Resource Manager (ARM) Key Execution Module
.. versionadded:: VERSION
.. versionadded:: 2.0.0
:maintainer: <[email protected]>
:maturity: new
Expand Down Expand Up @@ -72,7 +72,7 @@

async def get_key_client(hub, vault_url, **kwargs):
'''
.. versionadded:: VERSION
.. versionadded:: 2.0.0
Load the key client and return a KeyClient object.
Expand Down Expand Up @@ -128,7 +128,7 @@ def _key_properties_as_dict(key_properties):

async def backup_key(hub, name, vault_url, **kwargs):
'''
.. versionadded:: VERSION
.. versionadded:: 2.0.0
Back up a key in a protected form useable only by Azure Key Vault. Requires key/backup permission. This is intended
to allow copying a key from one vault to another. Both vaults must be owned by the same Azure subscription.
Expand Down Expand Up @@ -163,7 +163,7 @@ async def backup_key(hub, name, vault_url, **kwargs):

async def begin_delete_key(hub, name, vault_url, **kwargs):
'''
.. versionadded:: VERSION
.. versionadded:: 2.0.0
Delete all versions of a key and its cryptographic material. Requires keys/delete permission. When this method
returns Key Vault has begun deleting the key. Deletion may take several seconds in a vault with soft-delete
Expand Down Expand Up @@ -197,7 +197,7 @@ async def begin_delete_key(hub, name, vault_url, **kwargs):

async def begin_recover_deleted_key(hub, name, vault_url, **kwargs):
'''
.. versionadded:: VERSION
.. versionadded:: 2.0.0
Recover a deleted key to its latest version. Possible only in a vault with soft-delete enabled. Requires
keys/recover permission. When this method returns Key Vault has begun recovering the key. Recovery may take
Expand Down Expand Up @@ -233,7 +233,7 @@ async def begin_recover_deleted_key(hub, name, vault_url, **kwargs):
async def create_ec_key(hub, name, vault_url, key_ops=None, enabled=None, expires_on=None, not_before=None, tags=None,
**kwargs):
'''
.. versionadded:: VERSION
.. versionadded:: 2.0.0
Create a new elliptic curve key or, if name is already in use, create a new version of the key. Requires the
keys/create permission. Key properties can be specified as keyword arguments.
Expand Down Expand Up @@ -285,7 +285,7 @@ async def create_ec_key(hub, name, vault_url, key_ops=None, enabled=None, expire
async def create_key(hub, name, key_type, vault_url, key_ops=None, enabled=None, expires_on=None, not_before=None, tags=None,
**kwargs):
'''
.. versionadded:: VERSION
.. versionadded:: 2.0.0
Create a key or, if name is already in use, create a new version of the key. Requires keys/create permission.
Key properties can be specified as keyword arguments.
Expand Down Expand Up @@ -342,7 +342,7 @@ async def create_key(hub, name, key_type, vault_url, key_ops=None, enabled=None,

async def create_rsa_key(hub, name, vault_url, key_ops=None, enabled=None, expires_on=None, not_before=None, tags=None, **kwargs):
'''
.. versionadded:: VERSION
.. versionadded:: 2.0.0
Create a new RSA key or, if name is already in use, create a new version of the key. Requires the keys/create
permission. Key properties can be specified as keyword arguments.
Expand Down Expand Up @@ -393,7 +393,7 @@ async def create_rsa_key(hub, name, vault_url, key_ops=None, enabled=None, expir

async def get_deleted_key(hub, name, vault_url, **kwargs):
'''
.. versionadded:: VERSION
.. versionadded:: 2.0.0
Get a deleted key. Possible only in a vault with soft-delete enabled. Requires keys/get permission.
Expand Down Expand Up @@ -425,7 +425,7 @@ async def get_deleted_key(hub, name, vault_url, **kwargs):

async def get_key(hub, name, vault_url, version=None, **kwargs):
'''
.. versionadded:: VERSION
.. versionadded:: 2.0.0
Get a key's attributes and, if it's an asymmetric key, its public material. Requires keys/get permission.
Expand Down Expand Up @@ -461,7 +461,7 @@ async def get_key(hub, name, vault_url, version=None, **kwargs):

async def import_key(hub, name, vault_url, **kwargs):
'''
.. versionadded:: VERSION
.. versionadded:: 2.0.0
Import a key created externally. Requires keys/import permission. If name is already in use, the key will be
imported as a new version. Parameters used to build a JSONWebKey object will be passed to this module. More
Expand Down Expand Up @@ -547,7 +547,7 @@ async def import_key(hub, name, vault_url, **kwargs):

async def list_(hub, vault_url, **kwargs):
'''
.. versionadded:: VERSION
.. versionadded:: 2.0.0
List identifiers and properties of all keys in the vault. Requires keys/list permission.
Expand Down Expand Up @@ -576,7 +576,7 @@ async def list_(hub, vault_url, **kwargs):

async def list_properties_of_key_versions(hub, name, vault_url, **kwargs):
'''
.. versionadded:: VERSION
.. versionadded:: 2.0.0
List the identifiers and properties of a key's versions. Requires keys/list permission.
Expand Down Expand Up @@ -609,7 +609,7 @@ async def list_properties_of_key_versions(hub, name, vault_url, **kwargs):

async def list_deleted_keys(hub, vault_url, **kwargs):
'''
.. versionadded:: VERSION
.. versionadded:: 2.0.0
List all deleted keys, including the public part of each. Possible only in a vault with soft-delete enabled.
Requires keys/list permission.
Expand Down Expand Up @@ -639,7 +639,7 @@ async def list_deleted_keys(hub, vault_url, **kwargs):

async def purge_deleted_key(hub, name, vault_url, **kwargs):
'''
.. versionadded:: VERSION
.. versionadded:: 2.0.0
Permanently deletes a deleted key. Only possible in a vault with soft-delete enabled. Performs an irreversible
deletion of the specified key, without possibility for recovery. The operation is not available if the
Expand Down Expand Up @@ -674,7 +674,7 @@ async def purge_deleted_key(hub, name, vault_url, **kwargs):

async def restore_key_backup(hub, backup, vault_url, **kwargs):
'''
.. versionadded:: VERSION
.. versionadded:: 2.0.0
Restore a key backup to the vault. This imports all versions of the key, with its name, attributes, and access
control policies. If the key's name is already in use, restoring it will fail. Also, the target vault must be
Expand Down Expand Up @@ -709,7 +709,7 @@ async def restore_key_backup(hub, backup, vault_url, **kwargs):
async def update_key_properties(hub, name, vault_url, version=None, enabled=None, expires_on=None, not_before=None,
tags=None, **kwargs):
'''
.. versionadded:: VERSION
.. versionadded:: 2.0.0
Change a key's properties (not its cryptographic material). Requires keys/update permission. Key properties that
need to be updated can be specified as keyword arguments.
Expand Down
Loading

0 comments on commit e30556e

Please sign in to comment.