Commit graph

1217 commits

Author SHA1 Message Date
Greg DeKoenigsberg
06508a745a Adding author's github id 2015-05-13 14:11:14 -04:00
Greg DeKoenigsberg
241b6eb541 Adding author's github id 2015-05-13 14:10:55 -04:00
Greg DeKoenigsberg
219d261614 Update cs_instance.py 2015-05-13 14:10:36 -04:00
Greg DeKoenigsberg
5a064c5b9a Adding author's github id 2015-05-13 14:10:14 -04:00
Greg DeKoenigsberg
b82c1454f8 Adding author's github id 2015-05-13 14:09:51 -04:00
Greg DeKoenigsberg
17e755786e Adding author's github id 2015-05-13 14:09:05 -04:00
Greg DeKoenigsberg
997a0a11d0 Adding author's github id 2015-05-13 14:07:05 -04:00
Brian Coca
56f466c70d Merge pull request #328 from cloudnull/lxc-overlayfs-feature
Added overlayfs backend type to the lxc_container module
2015-05-13 14:01:23 -04:00
Brian Coca
bfb8868d8b Merge pull request #469 from sigmavirus24/lxc-bug-fix
Interpolate container name into error message
2015-05-13 14:00:37 -04:00
Toshio Kuratomi
e3373ffc46 Fix documentation 2015-05-13 08:14:44 -07:00
Brian Coca
aa86c5ff90 Merge pull request #431 from resmo/fix/cs_securitygroup_rule
cloudstack: fix cs_securitygroup_rule result output not always worked as expected
2015-05-13 09:44:08 -04:00
Brian Coca
d20d89948d Merge pull request #467 from resmo/feature/extend_cs_firewall
WIP: cloudstack: extend cs_firewall
2015-05-13 09:43:56 -04:00
Brian Coca
05ed2778d5 Merge pull request #459 from resmo/feature/cs_instance_account
cloudstack: cs_instance: add domain and account
2015-05-13 09:43:29 -04:00
Brian Coca
b13c9955a1 Merge pull request #468 from resmo/feature/extend_cs_vmshapshot
cloudstack: cs_vmshapshot: add account and domain
2015-05-13 09:43:16 -04:00
Brian Coca
e579da1fc7 Merge pull request #473 from resmo/feature/cs_sshkeypair_account_domain
cloudstack: cs_sshkeypair: add account and domain support
2015-05-13 09:42:56 -04:00
Rene Moser
24b2b29aba cloudstack: cs_firewall: add results 2015-05-12 23:56:12 +02:00
Rene Moser
0edf04dca2 cloudstack: cs_vmshapshot: add account and domain 2015-05-12 23:47:40 +02:00
Rene Moser
cc02c3227a cloudstack: new cs_portforward module 2015-05-12 23:46:45 +02:00
Rene Moser
c5514e0618 cloudstack: cs_instance: add domain and account 2015-05-12 23:45:56 +02:00
Rene Moser
5bc3ae040d cloudstack: cs_firewall: add account and domain 2015-05-12 23:45:00 +02:00
Rene Moser
8476fe1d72 cloudstack: add alias port in cs_firewall 2015-05-12 23:45:00 +02:00
Rene Moser
4c24c1cbfd cloudstack: cs_securitygroup_rule: minor cleanup, DRY 2015-05-12 23:43:48 +02:00
Rene Moser
5de249aaf9 cloudstack: cs_securitygroup_rule: fix result was not always what expected 2015-05-12 23:43:48 +02:00
Rene Moser
185cb8757d cloudstack: cs_securitygroup_rule: type -> sg_type 2015-05-12 23:43:48 +02:00
Rene Moser
95305f4ea9 cloudstack: cs_sshkeypair: add account and domain support 2015-05-12 23:43:08 +02:00
Brian Coca
e1c6757eae Merge pull request #477 from resmo/feature/cs_account
cloudstack: add new module cs_account
2015-05-11 15:26:30 -04:00
Toshio Kuratomi
a589a66710 Update module documentation if modules have a dep on python2.6+ 2015-05-11 10:09:56 -07:00
Rene Moser
92c6f64adf cloudstack: add new module cs_account 2015-05-11 17:49:39 +02:00
Ian Cordasco
deb11be684 Interpolate container name into error message
In the event failed to start, the container name was not being properly
interpolated into the error message.
2015-05-08 21:18:59 -05:00
Rick Mendes
ce1b3d257c house cleaning based on code review 2015-05-06 08:50:14 -07:00
Rene Moser
a52a4b33e7 cloudstack: new module cs_instancegroup 2015-05-06 14:53:56 +02:00
Rene Moser
8438ef995e cloudstack: fix missing doc fragment in cs_securitygroup_rule 2015-05-05 16:17:05 +02:00
Rene Moser
dfa9037091 cloudstack: fix missing doc fragments 2015-05-05 15:57:54 +02:00
Rene Moser
1e744a885a cloudstack: doc fixes 2015-05-05 15:32:06 +02:00
Rick Mendes
2007345c4b ec2_win_password module for windows ec2 instances 2015-05-04 14:38:43 -07:00
Toshio Kuratomi
28b0f3ce13 Fix documentation formatting 2015-05-04 13:24:21 -07:00
Brian Coca
70ea058563 Merge pull request #427 from resmo/fix/cs_vmsnapshot_missing_zone
cloudstack: fix missing zone param used in get_vm() in utils
2015-05-04 10:33:23 -04:00
Brian Coca
b50dd25343 Merge pull request #426 from resmo/feature/cs_instance
cloudstack: add new module cs_instance
2015-05-04 10:32:42 -04:00
Rene Moser
0b18bdc57f cloudstack: add new module cs_instance
Manages instances and virtual machines
2015-05-03 12:06:11 +02:00
Toshio Kuratomi
764a0e26b6 doc formatting 2015-04-28 11:12:34 -07:00
Rene Moser
b0fb6b08a9 cloudstack: fix misssing doc about vm param 2015-04-27 00:06:42 +02:00
Rene Moser
ef019e6163 cloudstack: fix missing zone param used in get_vm() in utils 2015-04-27 00:05:41 +02:00
Brian Coca
3148aafa17 moved new module to proper subdir
fixed doc issues
minor code adjustments
2015-04-22 10:18:34 -04:00
Brian Coca
038b76d1de Merge pull request #415 from jcpowermac/add_vmware_datacenter_module
New VMware Module to support adding a datacenter
2015-04-22 10:08:25 -04:00
Brian Coca
732f1060e8 Merge pull request #390 from resmo/feature/cs_vmsnapshot
cloudstack: add new module cs_vmsnapshot
2015-04-21 14:49:16 -04:00
Brian Coca
3073449996 Merge pull request #375 from resmo/feature/cloudstack_ag
cloudstack: add new module cs_affinitygroup
2015-04-21 14:37:21 -04:00
Brian Coca
02242f5fca Merge pull request #374 from resmo/feature/cloudstack_sg_rule
cloudstack: add new module cs_securitygroup_rule
2015-04-21 14:33:45 -04:00
Brian Coca
82bdf562d2 Merge pull request #361 from resmo/feature/cloudstack_sg
cloudstack: add new module cs_securitygroup
2015-04-21 14:20:13 -04:00
Joseph Callen
7458cdd722 New VMware Module to support adding a datacenter 2015-04-21 10:38:40 -04:00
Rene Moser
c899e2d9a7 cloudstack: add new module cs_vmsnapshot
This module depends on ansible.module_utils.cloudstack.
2015-04-12 23:11:23 +02:00
Rene Moser
39d30168a5 cloudstack: rename modules to more meaningful name schema 2015-04-12 12:59:03 +02:00
Rene Moser
b8056e8f6f cloudstack: add new module cs_securitygroup_rule
This module depends on ansible.module_utils.cloudstack.
2015-04-12 12:50:47 +02:00
Rene Moser
df23b4d17b cloudstack: add new module cs_securitygroup
This module depends on ansible.module_utils.cloudstack.
2015-04-12 12:48:01 +02:00
Rene Moser
e19b53532b cloudstack: add new module cs_affinitygroup
This module depends on ansible.module_utils.cloudstack.
2015-04-12 12:40:12 +02:00
Brian Coca
eb04e45311 fixed doc issues with cloudstack_fw 2015-03-31 09:39:27 -04:00
Brian Coca
ca5d02c3fd Merge pull request #341 from resmo/feature/cloudstack_sshkey
cloudstack: add new module cloudstack_sshkey
2015-03-31 08:53:15 -04:00
Brian Coca
5ef7011c97 Merge pull request #349 from resmo/feature/cloudstack_iso
cloudstack: add new module cloudstack_iso
2015-03-31 08:52:31 -04:00
Brian Coca
ba34dfd364 Merge pull request #348 from resmo/feature/cloudstack_fw
cloudstack: add new module cloudstack_fw
2015-03-31 08:51:33 -04:00
Rene Moser
392feaea63 cloudstack_sshkey: cleanup docs 2015-03-31 13:37:56 +02:00
Rene Moser
c03baa7ec6 cloudstack_ssh: replace ssh public key if fingerprints do not match 2015-03-31 13:37:51 +02:00
Rene Moser
a24d691419 cloudstack_ssh: update description 2015-03-31 13:37:44 +02:00
Rene Moser
bf32de8d8f cloudstack_ssh: register_ssh_key() set public_key as param 2015-03-31 13:37:39 +02:00
Rene Moser
82e25447ad cloudstack_ssh: fix missing projectid if state=absent 2015-03-31 13:37:34 +02:00
Rene Moser
60467738ed cloudstack: add new module cloudstack_sshkey
This module depends on ansible.module_utils.cloudstack.
2015-03-31 13:37:23 +02:00
Rene Moser
9f85ae16ae cloudstack: add new module cloudstack_iso 2015-03-31 13:33:57 +02:00
Rene Moser
58aab881c2 cloudstack: add new module cloudstack_fw 2015-03-31 12:12:19 +02:00
Brian Coca
c5f787e6df Merge pull request #357 from bcoca/lxc_container_home_fix
Lxc container home fix
2015-03-30 22:12:11 -04:00
Brian Coca
ee7fbcf418 minor fix to method of finding home as previous could 'overmatch' 2015-03-30 22:11:17 -04:00
Brian Coca
3151ff1227 Merge pull request #326 from cloudnull/lxc-opts-fix-issues325
Updated lxc_container module to fix option parsing
2015-03-30 22:10:48 -04:00
Brian Coca
231ed6208d removed requirements which was causing crash with dupe from shared doc fragments 2015-03-29 17:05:53 -04:00
Brian Coca
520f410257 moved cloudtrail to amazon subdir 2015-03-26 01:15:34 -04:00
tedder
61114cd08a Handful of changes after bcoca's code review:
* update expected inclusion version
* fix consistency on enabled/absent (now enabled/disabled)
* safely import boto per now style of single-exit and proper JSON
* use new `required_together` module style
2015-03-25 21:49:17 -07:00
tedder
06939a8651 add cloudtrail module
Cloudtrail is the AWS auditing configuration. It's fairly simple, but also very important to configuration management/devops/security to ensure it remains enabled. That's why I created it as a module.
2015-03-25 21:43:24 -07:00
Brian Coca
cf9a243cd7 added missing __init__.py 2015-03-25 17:28:37 -04:00
Kevin Carter
2f188600a8 Added overlayfs backend type to the lxc_container module
This commit adds the overlayfs type to the lxc_container module. In
Adding the overlayfs type the commit adds the ability to clone a
container. While cloning is not locked down to only the overlayfs
container backend it is of particular interest when using the overlayfs
backend as it provides for amazingly fast snapshots.

Changes to the resource types and documentation have been added on how
the new backend type can be used along with the clone operation.

This PR addresses a question asked on the original merged pull request
for overlayfs support which came from @fghaas on PR
"https://github.com/ansible/ansible-modules-extras/pull/123".

The overlayfs archive function is a first class function and will
allow for the containers to be backed-up using all methods which
brings support up to that of all other storage backends.
2015-03-23 19:31:03 -05:00
Kevin Carter
24cfcd2497 Updated lxc_container module to fix option parsing
The option parsing object within the module was performing a split
on an '=' sign and assuming that there would only ever be one '='
in a user provided option. Sadly, the assumption is incorrect and
the list comprehension that is building the options list needs to
be set to split on the first occurrence of an '=' sign in a given
option string. This commit adds the required change to make it
possible for options to contain additional '=' signs and be handled
correctly.
2015-03-18 23:33:33 -05:00
Brian Coca
bb886a595d updated lxc-containter docs to reflect new name 2015-02-27 09:19:51 -05:00
Maciej Delmanowski
528e1a644c Rename 'lxc-container' module to 'lxc_container'
This is done to keep the convention of naming modules with underscores
instead of hypens.
2015-02-27 13:00:49 +01:00
Brian Coca
648f381c0b Merge pull request #123 from cloudnull/devel
Added module to support managing LXC containers
2015-02-16 11:22:21 -05:00
Peter Tan
9b64cf6797 Do not check for the image before calling gce.ex_create_image() or gce.ex_delete_image(), instead catching the ResourceExistsError or ResourceNotFoundError respectively. 2015-01-30 00:47:47 -08:00
Peter Tan
5ab2dcf76a Address review comments from @sivel and @erjohnso 2015-01-28 11:19:06 -08:00
Peter Tan
d0382bda00 Add gce_img module for utilizing GCE image resources 2015-01-27 16:22:46 -08:00
Kevin Carter
99359fc4e2 Updated volume create methods for a more consistent process
The volume create methods were making an assumption on the unit
sizes being presented by the `vgdisplay` and the `lvdisplay`
commands. To correct the assumption the commands will now enforce
a unit size of "g" which will alway convert sives to gigabytes.
This was an issue brought up by @hughsaunders.
2014-12-02 08:18:00 -06:00
Kevin Carter
4446e4642e Added new module to support LXC containers
The new module will allow users to control LXC containers from ansible.
The module was built for use in LXC >= 1.0 or greater and implements most
of what can be done using the various lxc clients with regards to running
containers. This first module is geared only at managing lxc containers.

The module provides:
  build containers
  destroy containers
  archive containers
  info from a single container
  start / stop / restart containers
  run commands within containers
  add/modify lxc config for a container
  supports backends including LVM
2014-11-27 10:47:33 -06:00
Michael DeHaan
ad181b7aa9 Categorize some modules. 2014-11-05 16:11:23 -05:00
Sergei Antipov
078d863b07 Added missed importing 2014-10-20 17:50:24 +07:00
Michael DeHaan
110250d344 package files 2014-09-26 11:04:10 -04:00
Michael DeHaan
b1e789968b File extensions! 2014-09-26 10:40:16 -04:00
Michael DeHaan
50f105578a Restructuring. 2014-09-26 10:14:28 -04:00
Michael DeHaan
73123b69fa Move modules into subdirectory. 2014-09-26 09:23:50 -04:00
James Cammarata
61f6a70401 Skip null id route tables when adding/deleting them in ec2_vpc
Fixes #8552
2014-09-23 14:51:56 -05:00
Steven Ringo
bcb78335cf Expand description for ec2_facts module 2014-09-23 08:53:57 +10:00
Michael Scherer
7420a450a5 Fix indentation and bug #8895 2014-09-21 17:12:29 +02:00
James Cammarata
0d0576a97f Add note on ec2_lc regarding immutability of configs once created
Fixes #8927
2014-09-19 15:17:46 -05:00
James Cammarata
d5546d7a0a Merge pull request #9052 from EvanDotPro/docs/fix-rax-public-key-example
Update rax root pubkey example
2014-09-18 13:25:36 -05:00
Evan Coury
54a979ddd3 Update rax root pubkey example
The example was showing how to use the `files` option to pass in a local file as an authorized public key for root. While this works, it's a bit sloppy, given that there's a specific option, `key_name` which will use one of your public keys on your rackspace account and add it as an authorized key for root. In our case, one of our admins didn't notice the `key_name` option because they scrolled straight to the example and saw the `files` strategy.

I propose that the example still shows `files`, but not using a root public key as an example, and instead also demonstrate the `key_name` option so that it's clear from the example how to get the initial root public key deployed.
2014-09-17 18:06:59 -07:00
Sam Pierson
3f8e45f864 [#9048] convert Route53 TTL to integer before comparison
boto/Route53 are returning TTL as a string.
The route53 module is comparing it with an integer and therfore thinks the DNS entry has always changed.
2014-09-17 14:47:27 -07:00
James Cammarata
633f86d30a Allow filtering by availability zone for exact_count with ec2
Fixes #8863
2014-09-17 15:49:26 -05:00
James Cammarata
2fac1fd865 Ensure port in docker expose list is a string
Fixes #8731
2014-09-16 21:38:49 -05:00
James Cammarata
7b5c76e122 Merge pull request #9026 from tedder/patch-1
rearrange description/short_description
2014-09-16 14:04:45 -05:00