Commit graph

26602 commits

Author SHA1 Message Date
Brian Coca
954d650e6a promoted to core, including fixes 2016-12-08 11:34:09 -05:00
James Cammarata
fa0c10017e Removing docker_login as it's now in core 2016-12-08 11:34:09 -05:00
René Moser
e47aee031b docs: fix make docs (#2107) 2016-12-08 11:34:09 -05:00
Tim Rupp
a13141413a Adds the __main__ conditional check (#2098)
As is done in other ansible modules, this adds the __main__ check
to the module so that the module code itself can be used as a library.
For instance, when testing the code.
2016-12-08 11:34:09 -05:00
Joshua Gilman
c0a677aa3a Change disk type to str to allow correct usage of rootfs for LXC (#2091) 2016-12-08 11:34:09 -05:00
Rene Moser
002ce4b352 consul: add docs, fix typos, minor style fix 2016-12-08 11:34:09 -05:00
Sun JianKang
f7b6523ff5 add service address when register service (#1299) 2016-12-08 11:34:09 -05:00
Ner'zhul
bb4751e791 Add mongodb parameter module (#1596)
* Add mongodb parameter module

This module permit to configure mongodb live parameters to tune the running engine
2016-12-08 11:34:09 -05:00
Adrià Galín Figueras
d802e00417 Fixed netif params when create lxc container (#2064) 2016-12-08 11:34:09 -05:00
Toshio Kuratomi
07e150779d Switch from deprecated ANSIBLE_VERSION to ansible.__version__ 2016-12-08 11:34:08 -05:00
Rene Moser
9e05fc35ea vmware_vm_shell: doc: add missing defaults 2016-12-08 11:34:08 -05:00
Ritesh Khadgaray
378707e1f7 vmware_vm_shell: speed up vm_name search (#1909) 2016-12-08 11:34:08 -05:00
Chris Lamb
c0787b12ce system/ufw.py: Add security warning re. removing ufw application prof…
It's not particularly obvious that removing an application will remove it
from ufw's own state, potentially leaving ports open on your box if you
upload your configuration.

Whilst this applies to a lot of things in Ansible, firewall rules might
cross some sort of line that justifies such a warning in his instance.

Signed-off-by: Chris Lamb <chris@chris-lamb.co.uk>
2016-12-08 11:34:08 -05:00
jhawkesworth@users.noreply.github.com
b94a614b7e fix problem where you couldn't compare empty strings in win_regedit following my previous change 2016-12-08 11:34:08 -05:00
Emil Bostijancic
3d24895606 Fixes maven_artifact - verify_md5 only called for SNAPSHOT
* fixed https://github.com/ansible/ansible-modules-extras/issues/2066

* fixes https://github.com/ansible/ansible-modules-extras/issues/2066
2016-12-08 11:34:08 -05:00
Michael Scherer
bcf4c6be49 Fix aibrake 2016-12-08 11:34:08 -05:00
Stefan Magnus Landrø
fb3e970bd3 Honouring verify_ssl when using username/password for authentication … 2016-12-08 11:34:08 -05:00
James Cammarata
c6e8b9a0b7 Fixing/cleaning up kubernetes submission
1) Removed kubectl functionality. We'll move that into a different
   module in the future. Also removed post/put/patch/delete options,
   as they are not Ansible best practice.
2) Expanded error handling in areas where tracebacks were most likely,
   based on bad data from users, etc.
3) Added an 'insecure' option and made the password param optional, to
   enable the use of the local insecure port.
4) Allowed the data (both inline and from the file) to support multiple
   items via a list. This is common in YAML files where mutliple docs
   are used to create/remove multiple resources in one shot.
5) General bug fixing.
2016-12-08 11:34:08 -05:00
Eric Johnson
a59cb5cae1 Adding kubernetes module 2016-12-08 11:34:08 -05:00
Michael Scherer
d1c6b6f3b8 Fix default url in airbrake_deployment doc (#2078) 2016-12-08 11:34:08 -05:00
Toshio Kuratomi
7b1704640e Make main() only run when invoked as a script (style cleanup) 2016-12-08 11:34:08 -05:00
Dreamcat4
314843b431 win-firewall-rule: temp disable strict-mode for the time being 2016-12-08 11:34:08 -05:00
Dreamcat4
820d5a7a3e fix: win-environment strict-mode fixes 2016-12-08 11:34:08 -05:00
Dreamcat4
572b6669c4 fix: win-scheduled-task strict-mode fixes 2016-12-08 11:34:08 -05:00
Laurent Mazuel
8973ecae5b Add user-agent information for analytics 2016-12-08 11:34:08 -05:00
Andre Price
28b0a52245 Get failed deployments when create fails also 2016-12-08 11:34:07 -05:00
Laurent Mazuel
098a4c9ee4 Updated to use ServicePrincipalCredentials class and get rid of requests 2016-12-08 11:34:07 -05:00
Laurent Mazuel
ee6fc470db Fixes after Travis feedback 2016-12-08 11:34:07 -05:00
Laurent Mazuel
771c40952b Py2.6 compatible + minor fixes 2016-12-08 11:34:07 -05:00
Laurent Mazuel
96ea53d1f2 Fix YAML documentation 2016-12-08 11:34:07 -05:00
Laurent Mazuel
5d5cac57ff Add update from @obsoleted 2016-12-08 11:34:07 -05:00
Laurent Mazuel
801c44df9e Azure plugin using Azure Python SDK 2.0.0rc1 2016-12-08 11:34:07 -05:00
David Justice
a4cc8dfa2c add azure resource manager template deployment module 2016-12-08 11:34:07 -05:00
Rob
1d01d232a9 New module - ec2_snapshot_facts (#1088) 2016-12-08 11:34:07 -05:00
Adam Romanek
faa3c54531 Fixed #237 - improved embedded JSON support handling (#1530) 2016-12-08 11:34:07 -05:00
Victor Costan
e5742c3a47 amazon/GUIDELINES.md: Fix copy-paste typo (#2060) 2016-12-08 11:34:07 -05:00
jhawkesworth@users.noreply.github.com
b08b1cf2f3 Documentation improvements 2016-12-08 11:34:07 -05:00
jhawkesworth@users.noreply.github.com
aaa9541abd Further fixes to support binary data. Added boolean return values and return documentation. 2016-12-08 11:34:07 -05:00
jhawkesworth@users.noreply.github.com
c2ca0a9e93 adding the ability to manage binary registry data 2016-12-08 11:34:07 -05:00
Robin Roth
5464b71561 Zypper repository rewrite (#1990)
* Remove support for ancient zypper versions

Even SLES11 has zypper 1.x.

* zypper_repository: don't silently ignore repo changes

So far when a repo URL changes this got silently ignored (leading to
incorrect package installations) due to this code:

    elif 'already exists. Please use another alias' in stderr:
        changed = False

Removing this reveals that we correctly detect that a repo definition
has changes (via repo_subset) but don't indicate this as change but as a
nonexistent repo. This makes us currenlty bail out silently in the above
statement.

To fix this distinguish between non existent and modified repos and
remove the repo first in case of modifications (since there is no force
option in zypper to overwrite it and 'zypper mr' uses different
arguments).

To do this we have to identify a repo by name, alias or url.

* Don't fail on empty values

This unbreaks deleting repositories

* refactor zypper_repository module

* add properties enabled and priority
* allow changing of one property and correctly report changed
* allow overwrite of multiple repositories by alias and URL
* cleanup of unused code and more structuring

* respect enabled option

* make zypper_repository conform to python2.4

* allow repo deletion only by alias

* check for non-existant url field and use alias instead

* remove empty notes and aliases

* add version_added for priority and overwrite_multiple

* add version requirement on zypper and distribution

* zypper 1.0 is enough and exists

* make suse versions note, not requirement

based on comment by @alxgu
2016-12-08 11:34:07 -05:00
Michael Scherer
3d21f7c5a4 Mark the token as sensitive, since it shouldn't be printed (#2043) 2016-12-08 11:34:07 -05:00
Jiri Tyr
48c20dd981 Describing the _none_ value of the proxy option (#2053) 2016-12-08 11:34:06 -05:00
Jay Jahns
09aa205209 Add Maintenance Mode support for VMware (#1754)
* add vmware maintenance mode support

* changed version number in documentation

* updated version_added to 2.0 since CI is failing

* changed version to 2.0 due to CI - error asking for 2.1

* added RETURN

* updated formatting of return values and added some to clarify actions taken
2016-12-08 11:34:06 -05:00
codehopper-uk
e2e0f51739 Basic ability to set masquerade options from ansible, according to current code design/layout (mostly) (#2017)
* Support for masquerade settings

Ability to enable and disable masquerade settings from ansible via:
- firewalld: mapping=masquerade state=disabled permanent=true zone=dmz

Placeholder added (mapping) to support masquerade and port_forward
choices initially - port_forward not implemented yet.

* Permanent and Immediate zone handling differentiated

* Corrected naming abstraction for masquerading functionality

Removed mapping tag with port_forward choices - not applicable!

* Added version info for new masquerade option

Pull Request #2017 failing due to missing version info
2016-12-08 11:34:06 -05:00
Jordan Cohen
e07cc7d9a2 idempotency fix (#2024) 2016-12-08 11:34:06 -05:00
Karim Boumedhel
e57ef71ed3 Add cloudinit support to ovirt.py module 2016-12-08 11:34:06 -05:00
Michael Scherer
567bcf1341 Do not leak password by error for ovirt module (#1991) 2016-12-08 11:34:06 -05:00
Michael Scherer
5d2063aa38 Remove the +x from crypttab and cronvar (#2039)
While this change nothing, it is better to enforce consistency
2016-12-08 11:34:06 -05:00
Michael Scherer
d79c427722 Set api_key as no_log, since that's likely something that should be kept private (#2038) 2016-12-08 11:34:06 -05:00
Fernando José Pando
94c5e16fe3 Add SQS queue policy attachment functionality (#1716)
* Add SQS queue policy attachment functionality

SQS queue has no attribute 'Policy' until one is attached, so this special
case must be handled uniquely

SQS queue Policy can now be passed in as json
2016-12-08 11:34:06 -05:00