Commit graph

13001 commits

Author SHA1 Message Date
Stefan Magnus Landrø
fb3e970bd3 Honouring verify_ssl when using username/password for authentication … 2016-12-08 11:34:08 -05:00
James Cammarata
c6e8b9a0b7 Fixing/cleaning up kubernetes submission
1) Removed kubectl functionality. We'll move that into a different
   module in the future. Also removed post/put/patch/delete options,
   as they are not Ansible best practice.
2) Expanded error handling in areas where tracebacks were most likely,
   based on bad data from users, etc.
3) Added an 'insecure' option and made the password param optional, to
   enable the use of the local insecure port.
4) Allowed the data (both inline and from the file) to support multiple
   items via a list. This is common in YAML files where mutliple docs
   are used to create/remove multiple resources in one shot.
5) General bug fixing.
2016-12-08 11:34:08 -05:00
Eric Johnson
a59cb5cae1 Adding kubernetes module 2016-12-08 11:34:08 -05:00
Michael Scherer
d1c6b6f3b8 Fix default url in airbrake_deployment doc (#2078) 2016-12-08 11:34:08 -05:00
Toshio Kuratomi
7b1704640e Make main() only run when invoked as a script (style cleanup) 2016-12-08 11:34:08 -05:00
Dreamcat4
314843b431 win-firewall-rule: temp disable strict-mode for the time being 2016-12-08 11:34:08 -05:00
Dreamcat4
820d5a7a3e fix: win-environment strict-mode fixes 2016-12-08 11:34:08 -05:00
Dreamcat4
572b6669c4 fix: win-scheduled-task strict-mode fixes 2016-12-08 11:34:08 -05:00
Laurent Mazuel
8973ecae5b Add user-agent information for analytics 2016-12-08 11:34:08 -05:00
Andre Price
28b0a52245 Get failed deployments when create fails also 2016-12-08 11:34:07 -05:00
Laurent Mazuel
098a4c9ee4 Updated to use ServicePrincipalCredentials class and get rid of requests 2016-12-08 11:34:07 -05:00
Laurent Mazuel
ee6fc470db Fixes after Travis feedback 2016-12-08 11:34:07 -05:00
Laurent Mazuel
771c40952b Py2.6 compatible + minor fixes 2016-12-08 11:34:07 -05:00
Laurent Mazuel
96ea53d1f2 Fix YAML documentation 2016-12-08 11:34:07 -05:00
Laurent Mazuel
5d5cac57ff Add update from @obsoleted 2016-12-08 11:34:07 -05:00
Laurent Mazuel
801c44df9e Azure plugin using Azure Python SDK 2.0.0rc1 2016-12-08 11:34:07 -05:00
David Justice
a4cc8dfa2c add azure resource manager template deployment module 2016-12-08 11:34:07 -05:00
Rob
1d01d232a9 New module - ec2_snapshot_facts (#1088) 2016-12-08 11:34:07 -05:00
Adam Romanek
faa3c54531 Fixed #237 - improved embedded JSON support handling (#1530) 2016-12-08 11:34:07 -05:00
Victor Costan
e5742c3a47 amazon/GUIDELINES.md: Fix copy-paste typo (#2060) 2016-12-08 11:34:07 -05:00
jhawkesworth@users.noreply.github.com
b08b1cf2f3 Documentation improvements 2016-12-08 11:34:07 -05:00
jhawkesworth@users.noreply.github.com
aaa9541abd Further fixes to support binary data. Added boolean return values and return documentation. 2016-12-08 11:34:07 -05:00
jhawkesworth@users.noreply.github.com
c2ca0a9e93 adding the ability to manage binary registry data 2016-12-08 11:34:07 -05:00
Robin Roth
5464b71561 Zypper repository rewrite (#1990)
* Remove support for ancient zypper versions

Even SLES11 has zypper 1.x.

* zypper_repository: don't silently ignore repo changes

So far when a repo URL changes this got silently ignored (leading to
incorrect package installations) due to this code:

    elif 'already exists. Please use another alias' in stderr:
        changed = False

Removing this reveals that we correctly detect that a repo definition
has changes (via repo_subset) but don't indicate this as change but as a
nonexistent repo. This makes us currenlty bail out silently in the above
statement.

To fix this distinguish between non existent and modified repos and
remove the repo first in case of modifications (since there is no force
option in zypper to overwrite it and 'zypper mr' uses different
arguments).

To do this we have to identify a repo by name, alias or url.

* Don't fail on empty values

This unbreaks deleting repositories

* refactor zypper_repository module

* add properties enabled and priority
* allow changing of one property and correctly report changed
* allow overwrite of multiple repositories by alias and URL
* cleanup of unused code and more structuring

* respect enabled option

* make zypper_repository conform to python2.4

* allow repo deletion only by alias

* check for non-existant url field and use alias instead

* remove empty notes and aliases

* add version_added for priority and overwrite_multiple

* add version requirement on zypper and distribution

* zypper 1.0 is enough and exists

* make suse versions note, not requirement

based on comment by @alxgu
2016-12-08 11:34:07 -05:00
Michael Scherer
3d21f7c5a4 Mark the token as sensitive, since it shouldn't be printed (#2043) 2016-12-08 11:34:07 -05:00
Jiri Tyr
48c20dd981 Describing the _none_ value of the proxy option (#2053) 2016-12-08 11:34:06 -05:00
Jay Jahns
09aa205209 Add Maintenance Mode support for VMware (#1754)
* add vmware maintenance mode support

* changed version number in documentation

* updated version_added to 2.0 since CI is failing

* changed version to 2.0 due to CI - error asking for 2.1

* added RETURN

* updated formatting of return values and added some to clarify actions taken
2016-12-08 11:34:06 -05:00
codehopper-uk
e2e0f51739 Basic ability to set masquerade options from ansible, according to current code design/layout (mostly) (#2017)
* Support for masquerade settings

Ability to enable and disable masquerade settings from ansible via:
- firewalld: mapping=masquerade state=disabled permanent=true zone=dmz

Placeholder added (mapping) to support masquerade and port_forward
choices initially - port_forward not implemented yet.

* Permanent and Immediate zone handling differentiated

* Corrected naming abstraction for masquerading functionality

Removed mapping tag with port_forward choices - not applicable!

* Added version info for new masquerade option

Pull Request #2017 failing due to missing version info
2016-12-08 11:34:06 -05:00
Jordan Cohen
e07cc7d9a2 idempotency fix (#2024) 2016-12-08 11:34:06 -05:00
Karim Boumedhel
e57ef71ed3 Add cloudinit support to ovirt.py module 2016-12-08 11:34:06 -05:00
Michael Scherer
567bcf1341 Do not leak password by error for ovirt module (#1991) 2016-12-08 11:34:06 -05:00
Michael Scherer
5d2063aa38 Remove the +x from crypttab and cronvar (#2039)
While this change nothing, it is better to enforce consistency
2016-12-08 11:34:06 -05:00
Michael Scherer
d79c427722 Set api_key as no_log, since that's likely something that should be kept private (#2038) 2016-12-08 11:34:06 -05:00
Fernando José Pando
94c5e16fe3 Add SQS queue policy attachment functionality (#1716)
* Add SQS queue policy attachment functionality

SQS queue has no attribute 'Policy' until one is attached, so this special
case must be handled uniquely

SQS queue Policy can now be passed in as json
2016-12-08 11:34:06 -05:00
Michael Scherer
ad54180d17 Do not use a default value for -n parameter, fix #1400 (#1417) 2016-12-08 11:34:06 -05:00
Michael Scherer
a7b843ca80 Use type=path for pem_file, since that's a file (#1934) 2016-12-08 11:34:06 -05:00
Evgeni Golov
3bbef8dc24 fix handling of config options that share the same prefix
container_config:
      - "lxc.network.ipv4.gateway=auto"
      - "lxc.network.ipv4=192.0.2.1"

might try to override lxc.network.ipv4.gateway in the second entry as both
start with "lxc.network.ipv4".
use a regular expression to find a line that contains (optional) whitespace
and an = after the key.

Signed-off-by: Evgeni Golov <evgeni@golov.de>
2016-12-08 11:34:06 -05:00
Evgeni Golov
317ca77193 strip whitespace from key and value before inserting it into the config
before the following would produce four entries:

    container_config:
      - "lxc.network.flags=up"
      - "lxc.network.flags =up"
      - "lxc.network.flags= up"
      - "lxc.network.flags = up"

let's strip the whitespace and insert only one "lxc.network.flags = up"
into the final config

Signed-off-by: Evgeni Golov <evgeni@golov.de>
2016-12-08 11:34:06 -05:00
Michael Scherer
b4c3d32366 Mark conf_file as a path, for various user expansion 2016-12-08 11:34:06 -05:00
Christopher M. Fuhrman
310b7ce3d8 pkgin: Fix bad regexp which did not catch packages such as p5-SVN-Notify
The previous version of my regexp did not take into account packages
such as 'p5-Perl-Tidy' or 'p5-Test-Output', so use a greedy match up to
the last occurrance of '-' for matching the package.  This regex has
been extensively tested using all packages as provided by pkgsrc-2016Q1[1].

Footnotes:
[1]  http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/?only_with_tag=pkgsrc-2016Q1
2016-12-08 11:34:06 -05:00
Michael Scherer
7c19002f34 Fix arguments for pushover module
Since user_key and app_token are used for authentication, I
suspect both of them should be kept secret.

According to the API manual, https://pushover.net/api
priority go from -2 to 2, so the argument should be constrained.
2016-12-08 11:34:06 -05:00
Ricardo Carrillo Cruz
eda5e2f571 Add os_project_facts module
This module gathers facts about OpenStack projects
2016-12-08 11:34:05 -05:00
Jasper Lievisse Adriaanse
0fb01e45fb Sprinkle some LANG/LC_* where command output is parsed (#2019) 2016-12-08 11:34:05 -05:00
Jasper Lievisse Adriaanse
8913f1a11d Tweak and extend the pkgin module
- make path to pkgin a global and stop passing it around; it's not going
  to change while ansible is running
- add support for several new options:
  * upgrade
  * full_upgrade
  * force
  * clean
- allow for update_cache to be run in the same task as upgrading/installing
  packages instead of needing a separate task for that
2016-12-08 11:34:05 -05:00
Jens Carl
cf804fb0b8 Fix code example (#2018) 2016-12-08 11:34:05 -05:00
Werner Dijkerman
1bcc43ca4e New module for creating gitlab projects (#968) 2016-12-08 11:34:05 -05:00
Werner Dijkerman
37b7c1d0cd New module for creating gitlab groups (#967) 2016-12-08 11:34:05 -05:00
Werner Dijkerman
22c62debb5 New module for creating gitlab users (#966) 2016-12-08 11:34:05 -05:00
René Moser
5197654437 cloudstack, cs_firewall: fix network not found error in return results (#2006)
Only a small issue in results.

In case of type is ingress, we rely on ip address, but in results we also return the network.
Resolving the ip address works without zone params. If the ip address is not located in the default zone and zone param is not set,
the network won't be found because default zone was used for the network query listing.

However since network param is not used for type ingress we skip the return of the network in results.
2016-12-08 11:34:05 -05:00
René Moser
d7e8dd22df cloudstack: cs_instance: fix template not found (#2005)
Let users decide which filter should be used to find the template.
2016-12-08 11:34:05 -05:00