Commit graph

42630 commits

Author SHA1 Message Date
Will Thames
46fbcf08bc
aws_kms enhancements (#31960)
* Allow creation and deletion of keys (deletion just schedules for
  deletion, recreating an old key is just cancelling its deletion)
* Allow grants to be set, thus enabling encryption contexts to be
  used with keys
* Allow tags to be added and modified
* Add testing for KMS module
* Tidy up aws_kms module to latest standards
2019-02-13 13:06:58 +10:00
Matt Clay
1f3a74c0c8
Improve import sanity test output handling. (#52136)
Handling of unexpected output for the following is improved:

- stdout
- stderr
- warnings
2019-02-12 17:32:57 -08:00
Matt Clay
0a461380a3 Fix incorrect use of is for comparisons.
See https://bugs.python.org/issue34850 for details.
2019-02-12 16:33:13 -08:00
Matt Davis
cd7a144515
fix docker default remote_user (#52137)
Fix bogus default value in config- exposed by become plugins (#50911) actually using this value in more cases.
2019-02-12 16:29:27 -08:00
Abhijeet Kasurde
1da5e21289 examples: fix Ansible API example (#51863)
Signed-off-by: Abhijeet Kasurde <akasurde@redhat.com>
2019-02-12 15:35:49 -06:00
Sayed Anisul Hoque
bf20c4126c Updated the ansible-galaxy docs (#52070)
* Updated the ansible-galaxy docs

<!--- Your description here -->

Updated the documentation that reflects the default branch that will be used for the `version` option in ansible-galaxy.

+label: docsite_pr

* Updated the documentation

As per the code (6d4307377f/lib/ansible/galaxy/role.py (L237))[ansible/galaxy/role.py] Defaults to the branch set as a default in the repository otherwise defaults to the master.

* Update docs/docsite/rst/reference_appendices/galaxy.rst

Co-Authored-By: anis016 <anis016@users.noreply.github.com>
2019-02-12 16:33:54 -05:00
Wojciech Sciesinski
a431e802ed Add posibilities to run the integration tests for PowerShell < 5.0 (#50808)
* Add posibilities to run the integration tests for PowerShell < 5.0

* Update of tests - based at a review comments for #50612

* The correction of YAML structure
2019-02-12 15:51:03 -05:00
Wojciech Sciesinski
a7528cdd25 Update the NuGet package provider when needed (#50759)
* Update the NuGet package provider when needed

* Update NuGet provider conditionally
2019-02-12 12:22:22 -08:00
Andrew Gaffney
9c35f18dd6 Custom jinja Undefined class for handling nested undefined attributes (#51768)
This commit creates a custom Jinja2 Undefined class that returns
Undefined for any further accesses, rather than raising an exception
2019-02-12 15:04:00 -05:00
Abhijeet Kasurde
4e0e09d2de docs: update docs about pipelining (#51856)
Additional documentation about `keep_remote_files` and
`pipelining` configurations.

Signed-off-by: Abhijeet Kasurde <akasurde@redhat.com>
2019-02-12 12:49:00 -05:00
hansmi
76ab88c9f5 callbacks/slack: Explicitly set Content-Type header (#51824)
There are other chat systems with hook implementations more or less
compatible with Slack, such as Rocket.Chat. The latter requires the
Content-Type header to be set to "application/json" (the body is JSON).

Signed-off-by: Michael Hanselmann <public@hansmi.ch>
2019-02-12 12:47:33 -05:00
Keith Maxwell
7fbacf920d Remove misleading statement passwords must be same (#49798)
* Remove misleading statement passwords must be same

Since 2.4 Ansible has supported multiple vault passwords:
<https://docs.ansible.com/ansible/latest/user_guide/vault.html#multiple-vault-passwords>

Meaning lines like the following are misleading:

> The password used with vault currently must be the same for all files you wish
> to use together at the same time.

-- `docs/docsite/rst/user_guide/vault.rst`

To demonstrate this with Ansible 2.7, save the following as `example.yaml`:

```
- name: Display output from two vaults with different passwords
  hosts: localhost
  connection: local
  vars_files: [one.yaml, two.yaml]
  tasks:
    - name: View secret from one.yaml vault
      debug: { var: one }
    - name: View secret from two.yaml vault
      debug: { var: two }
```

Then run the three following commands choosing two different passwords:

```
$ echo 'one: 1' | ansible-vault encrypt --vault-id id1@prompt --output=one.yaml
$ echo 'two: 2' | ansible-vault encrypt --vault-id id2@prompt --output=two.yaml
$ ansible-playbook --vault-id id1@prompt --vault-id id2@prompt example.yaml
```

`ansible-vault` stores an ID in plain text in the vault file.

* Remove note about default in Ansible 2.1

As requested by gundalow in https://github.com/ansible/ansible/pull/49798
2019-02-12 10:47:01 -05:00
Dag Wieers
2e1dd27703 Update $team_crypto (#52057) 2019-02-12 10:28:48 -05:00
rajaspachipulusu17
0825cbad40 Pluribus Networks prefix list network module with Unit test cases (#52064) 2019-02-12 20:40:58 +05:30
Chris Archibald
ce092ed939 New Modules: na_ontap_unix_group (#51390)
* changes to clusteR

* Revert "changes to clusteR"

This reverts commit 33ee1b71e4bc8435fb315762a871f8c4cb6c5f80.

* add new module ontap_unix_groups
2019-02-12 15:06:28 +00:00
Feilong Wang
af710bd048 Add OpenStack Magnum cluster module (#44686) 2019-02-12 14:52:11 +00:00
getjack
d33ad416d7 - Initial commit (#51738)
- Fix sanity checks
  - Fixed documentation trailing whitespaces
2019-02-12 14:33:58 +00:00
getjack
d9ffc42eee Added Ansible UTM Info Module for network interface address entities. (#51733)
* - Initial commit
- Fix sanity checks
  - Fixed documentation trailing whitespaces

* - Changed author github contact as he has no account i'll (steamx) take responsibility
2019-02-12 14:33:28 +00:00
Miguel Angel Muñoz González
9d514c7451 Fortinet's FortiOS Webfilter Content (#51800)
* Fortinet's FortiOS firewall content module

* Update fortios_webfilter_content.py
2019-02-12 14:32:03 +00:00
Miguel Angel Muñoz González
8e3391e2c7 Fortinet's FortiOS antivirus profile (#51808) 2019-02-12 14:31:46 +00:00
Dag Wieers
68d1706b10
Added more PostgreSQL team members 2019-02-12 15:31:00 +01:00
Miguel Angel Muñoz González
2a6ea40b94 Fortinet's FortiOS antivirus settings (#51810) 2019-02-12 14:28:30 +00:00
Miguel Angel Muñoz González
875723e315 Fortinet's FortiOS Application Group (#51813) 2019-02-12 14:27:49 +00:00
Miguel Angel Muñoz González
d5df3c51fa Fortinet's FortiOS Application Name (#51815) 2019-02-12 14:27:28 +00:00
Abhijeet Kasurde
a6ecbe7a4b
Check metadata.status presence (#50416)
Generate error if metadata.status is empty or missing.

Signed-off-by: Abhijeet Kasurde <akasurde@redhat.com>
2019-02-12 18:12:18 +05:30
getjack
748c9acba7 - Initial commit (#51731)
- Fix sanity checks
  - Fixed documentation trailing whitespaces
2019-02-12 12:12:57 +00:00
getjack
71651a4eee - Initial commit (#51736)
- Fix sanity checks
  - Fixed documentation trailing whitespaces
2019-02-12 12:12:07 +00:00
Miguel Angel Muñoz González
fb9f2ca1cd Fortinet's FortiOS antivirus quarantine (#51809) 2019-02-12 12:11:38 +00:00
Miguel Angel Muñoz González
32b66ed6fe Fortinet's FortiOS Application Rule Settings (#51816) 2019-02-12 12:03:42 +00:00
Bojan Vitnik
64a6dcdd1d New module: xenserver_guest_facts - returns facts of XenServer VMs (#49426)
* Initial commit for xenserver_guest_facts module
* New module: xenserver_guest_facts. Returns facts of XenServer VMs. Module is fully documented.
* Added unit tests for the module
* Moved FakeXenAPI import to a dedicated fixture, other fixes
* Removed unused imports, minor fixes to unit test code
2019-02-12 16:56:49 +05:30
Abhijeet Kasurde
47e1bf1862
VMware: Tag management to VMware object (#46945)
Signed-off-by: Abhijeet Kasurde <akasurde@redhat.com>
2019-02-12 16:53:33 +05:30
Abhijeet Kasurde
fab815fc3b
VMware: Handle duplicate VM names in vmware_vm_facts (#45412)
This fix changes facts returned from vmware_vm_facts to list of dict from
dict of dict.

Signed-off-by: Abhijeet Kasurde <akasurde@redhat.com>
2019-02-12 16:31:42 +05:30
Yadnyawalkya Tale
6d4307377f Fixed positional argument in azure_vm_virtualmachine (#52067)
Signed-off-by: Yadnyawalkya Tale <yadnyawalkyatale@gmail.com>
2019-02-12 16:17:59 +05:30
Abhijeet Kasurde
5c992fcc3f
ansible-vault: handle utf-8 filename in vault (#50341)
Signed-off-by: Abhijeet Kasurde <akasurde@redhat.com>
2019-02-12 16:13:51 +05:30
Miguel Angel Muñoz González
6afa00eecd Fortinet's FortiOS Authentication Rule (#51817) 2019-02-12 09:27:59 +00:00
Miguel Angel Muñoz González
95fa911713 Fortinet's FortiOS Authentication Scheme (#51821) 2019-02-12 09:21:51 +00:00
Sayed Anisul Hoque
63148b0cc7 Fixes the comment in the example of the sysctl module(#51547) 2019-02-12 14:30:21 +05:30
Miguel Angel Muñoz González
97ed97b5c4 Fortinet's FortiOS Application Custom (#51812) 2019-02-12 08:59:04 +00:00
Miguel Angel Muñoz González
420cad6141 Fortinet's FortiOS Authentication Setting (#51823) 2019-02-12 08:58:34 +00:00
Miguel Angel Muñoz González
023ca40392 Fortinet's FortiOS DLP Filepattern (#51829) 2019-02-12 08:58:13 +00:00
Miguel Angel Muñoz González
452e863cc6 Fortinet's FortiOS DLP FingerPrint sensitivity (#51832) 2019-02-12 08:57:38 +00:00
Miguel Angel Muñoz González
4864c9dbae Fortinet's FortiOS DLP Sensor (#51833)
* Fortinet's FortiOS DLP Sensor

* Empty choices removed
2019-02-12 08:57:23 +00:00
Miguel Angel Muñoz González
f1da012d1c Fortinet's FortiOS DLP Settings (#51834) 2019-02-12 08:56:59 +00:00
Miguel Angel Muñoz González
58fcb02b2a Fortinet's FortiOS DLP Fingerprint Doc source (#51837) 2019-02-12 08:55:51 +00:00
Miguel Angel Muñoz González
3d2bd9d47d Fortinet's FortiOS Dnsfilter domain filter (#51867) 2019-02-12 08:51:52 +00:00
Miguel Angel Muñoz González
394449b8a9 Fortinet's FortiOS Dnsfilter profile (#51870) 2019-02-12 08:51:34 +00:00
Miguel Angel Muñoz González
c0bee726c0 Fortinet's FortiOS Endpoint Control Client (#51872) 2019-02-12 08:48:53 +00:00
Miguel Angel Muñoz González
fb1c3808ec Fortinet's FortiOS Endpoint Control Forticlient EMS (#51886) 2019-02-12 08:39:25 +00:00
Miguel Angel Muñoz González
4a975e1857 Fortinet's FortiOS Endpoint Control Forticlient Registration Sync (#51887) 2019-02-12 08:39:02 +00:00
Miguel Angel Muñoz González
955396f68f Fortinet's FortiOS Endpoint Control Profile (#51889)
* Fortinet's FortiOS Endpoint Control Profile

* Fix too long lines

* Fix trailing space
2019-02-12 08:37:32 +00:00