Commit graph

25382 commits

Author SHA1 Message Date
Matt Clay
0a461380a3 Fix incorrect use of is for comparisons.
See https://bugs.python.org/issue34850 for details.
2019-02-12 16:33:13 -08:00
Matt Davis
cd7a144515
fix docker default remote_user (#52137)
Fix bogus default value in config- exposed by become plugins (#50911) actually using this value in more cases.
2019-02-12 16:29:27 -08:00
Wojciech Sciesinski
a431e802ed Add posibilities to run the integration tests for PowerShell < 5.0 (#50808)
* Add posibilities to run the integration tests for PowerShell < 5.0

* Update of tests - based at a review comments for #50612

* The correction of YAML structure
2019-02-12 15:51:03 -05:00
Wojciech Sciesinski
a7528cdd25 Update the NuGet package provider when needed (#50759)
* Update the NuGet package provider when needed

* Update NuGet provider conditionally
2019-02-12 12:22:22 -08:00
Andrew Gaffney
9c35f18dd6 Custom jinja Undefined class for handling nested undefined attributes (#51768)
This commit creates a custom Jinja2 Undefined class that returns
Undefined for any further accesses, rather than raising an exception
2019-02-12 15:04:00 -05:00
Abhijeet Kasurde
4e0e09d2de docs: update docs about pipelining (#51856)
Additional documentation about `keep_remote_files` and
`pipelining` configurations.

Signed-off-by: Abhijeet Kasurde <akasurde@redhat.com>
2019-02-12 12:49:00 -05:00
hansmi
76ab88c9f5 callbacks/slack: Explicitly set Content-Type header (#51824)
There are other chat systems with hook implementations more or less
compatible with Slack, such as Rocket.Chat. The latter requires the
Content-Type header to be set to "application/json" (the body is JSON).

Signed-off-by: Michael Hanselmann <public@hansmi.ch>
2019-02-12 12:47:33 -05:00
Keith Maxwell
7fbacf920d Remove misleading statement passwords must be same (#49798)
* Remove misleading statement passwords must be same

Since 2.4 Ansible has supported multiple vault passwords:
<https://docs.ansible.com/ansible/latest/user_guide/vault.html#multiple-vault-passwords>

Meaning lines like the following are misleading:

> The password used with vault currently must be the same for all files you wish
> to use together at the same time.

-- `docs/docsite/rst/user_guide/vault.rst`

To demonstrate this with Ansible 2.7, save the following as `example.yaml`:

```
- name: Display output from two vaults with different passwords
  hosts: localhost
  connection: local
  vars_files: [one.yaml, two.yaml]
  tasks:
    - name: View secret from one.yaml vault
      debug: { var: one }
    - name: View secret from two.yaml vault
      debug: { var: two }
```

Then run the three following commands choosing two different passwords:

```
$ echo 'one: 1' | ansible-vault encrypt --vault-id id1@prompt --output=one.yaml
$ echo 'two: 2' | ansible-vault encrypt --vault-id id2@prompt --output=two.yaml
$ ansible-playbook --vault-id id1@prompt --vault-id id2@prompt example.yaml
```

`ansible-vault` stores an ID in plain text in the vault file.

* Remove note about default in Ansible 2.1

As requested by gundalow in https://github.com/ansible/ansible/pull/49798
2019-02-12 10:47:01 -05:00
rajaspachipulusu17
0825cbad40 Pluribus Networks prefix list network module with Unit test cases (#52064) 2019-02-12 20:40:58 +05:30
Chris Archibald
ce092ed939 New Modules: na_ontap_unix_group (#51390)
* changes to clusteR

* Revert "changes to clusteR"

This reverts commit 33ee1b71e4bc8435fb315762a871f8c4cb6c5f80.

* add new module ontap_unix_groups
2019-02-12 15:06:28 +00:00
Feilong Wang
af710bd048 Add OpenStack Magnum cluster module (#44686) 2019-02-12 14:52:11 +00:00
getjack
d33ad416d7 - Initial commit (#51738)
- Fix sanity checks
  - Fixed documentation trailing whitespaces
2019-02-12 14:33:58 +00:00
getjack
d9ffc42eee Added Ansible UTM Info Module for network interface address entities. (#51733)
* - Initial commit
- Fix sanity checks
  - Fixed documentation trailing whitespaces

* - Changed author github contact as he has no account i'll (steamx) take responsibility
2019-02-12 14:33:28 +00:00
Miguel Angel Muñoz González
9d514c7451 Fortinet's FortiOS Webfilter Content (#51800)
* Fortinet's FortiOS firewall content module

* Update fortios_webfilter_content.py
2019-02-12 14:32:03 +00:00
Miguel Angel Muñoz González
8e3391e2c7 Fortinet's FortiOS antivirus profile (#51808) 2019-02-12 14:31:46 +00:00
Miguel Angel Muñoz González
2a6ea40b94 Fortinet's FortiOS antivirus settings (#51810) 2019-02-12 14:28:30 +00:00
Miguel Angel Muñoz González
875723e315 Fortinet's FortiOS Application Group (#51813) 2019-02-12 14:27:49 +00:00
Miguel Angel Muñoz González
d5df3c51fa Fortinet's FortiOS Application Name (#51815) 2019-02-12 14:27:28 +00:00
getjack
748c9acba7 - Initial commit (#51731)
- Fix sanity checks
  - Fixed documentation trailing whitespaces
2019-02-12 12:12:57 +00:00
getjack
71651a4eee - Initial commit (#51736)
- Fix sanity checks
  - Fixed documentation trailing whitespaces
2019-02-12 12:12:07 +00:00
Miguel Angel Muñoz González
fb9f2ca1cd Fortinet's FortiOS antivirus quarantine (#51809) 2019-02-12 12:11:38 +00:00
Miguel Angel Muñoz González
32b66ed6fe Fortinet's FortiOS Application Rule Settings (#51816) 2019-02-12 12:03:42 +00:00
Bojan Vitnik
64a6dcdd1d New module: xenserver_guest_facts - returns facts of XenServer VMs (#49426)
* Initial commit for xenserver_guest_facts module
* New module: xenserver_guest_facts. Returns facts of XenServer VMs. Module is fully documented.
* Added unit tests for the module
* Moved FakeXenAPI import to a dedicated fixture, other fixes
* Removed unused imports, minor fixes to unit test code
2019-02-12 16:56:49 +05:30
Abhijeet Kasurde
47e1bf1862
VMware: Tag management to VMware object (#46945)
Signed-off-by: Abhijeet Kasurde <akasurde@redhat.com>
2019-02-12 16:53:33 +05:30
Abhijeet Kasurde
fab815fc3b
VMware: Handle duplicate VM names in vmware_vm_facts (#45412)
This fix changes facts returned from vmware_vm_facts to list of dict from
dict of dict.

Signed-off-by: Abhijeet Kasurde <akasurde@redhat.com>
2019-02-12 16:31:42 +05:30
Yadnyawalkya Tale
6d4307377f Fixed positional argument in azure_vm_virtualmachine (#52067)
Signed-off-by: Yadnyawalkya Tale <yadnyawalkyatale@gmail.com>
2019-02-12 16:17:59 +05:30
Abhijeet Kasurde
5c992fcc3f
ansible-vault: handle utf-8 filename in vault (#50341)
Signed-off-by: Abhijeet Kasurde <akasurde@redhat.com>
2019-02-12 16:13:51 +05:30
Miguel Angel Muñoz González
6afa00eecd Fortinet's FortiOS Authentication Rule (#51817) 2019-02-12 09:27:59 +00:00
Miguel Angel Muñoz González
95fa911713 Fortinet's FortiOS Authentication Scheme (#51821) 2019-02-12 09:21:51 +00:00
Sayed Anisul Hoque
63148b0cc7 Fixes the comment in the example of the sysctl module(#51547) 2019-02-12 14:30:21 +05:30
Miguel Angel Muñoz González
97ed97b5c4 Fortinet's FortiOS Application Custom (#51812) 2019-02-12 08:59:04 +00:00
Miguel Angel Muñoz González
420cad6141 Fortinet's FortiOS Authentication Setting (#51823) 2019-02-12 08:58:34 +00:00
Miguel Angel Muñoz González
023ca40392 Fortinet's FortiOS DLP Filepattern (#51829) 2019-02-12 08:58:13 +00:00
Miguel Angel Muñoz González
452e863cc6 Fortinet's FortiOS DLP FingerPrint sensitivity (#51832) 2019-02-12 08:57:38 +00:00
Miguel Angel Muñoz González
4864c9dbae Fortinet's FortiOS DLP Sensor (#51833)
* Fortinet's FortiOS DLP Sensor

* Empty choices removed
2019-02-12 08:57:23 +00:00
Miguel Angel Muñoz González
f1da012d1c Fortinet's FortiOS DLP Settings (#51834) 2019-02-12 08:56:59 +00:00
Miguel Angel Muñoz González
58fcb02b2a Fortinet's FortiOS DLP Fingerprint Doc source (#51837) 2019-02-12 08:55:51 +00:00
Miguel Angel Muñoz González
3d2bd9d47d Fortinet's FortiOS Dnsfilter domain filter (#51867) 2019-02-12 08:51:52 +00:00
Miguel Angel Muñoz González
394449b8a9 Fortinet's FortiOS Dnsfilter profile (#51870) 2019-02-12 08:51:34 +00:00
Miguel Angel Muñoz González
c0bee726c0 Fortinet's FortiOS Endpoint Control Client (#51872) 2019-02-12 08:48:53 +00:00
Miguel Angel Muñoz González
fb1c3808ec Fortinet's FortiOS Endpoint Control Forticlient EMS (#51886) 2019-02-12 08:39:25 +00:00
Miguel Angel Muñoz González
4a975e1857 Fortinet's FortiOS Endpoint Control Forticlient Registration Sync (#51887) 2019-02-12 08:39:02 +00:00
Miguel Angel Muñoz González
955396f68f Fortinet's FortiOS Endpoint Control Profile (#51889)
* Fortinet's FortiOS Endpoint Control Profile

* Fix too long lines

* Fix trailing space
2019-02-12 08:37:32 +00:00
Miguel Angel Muñoz González
34cb1f7eef Fortinet's FortiOS Endpoint Control Settings (#51890) 2019-02-12 08:33:21 +00:00
rajaspachipulusu17
a003de239d Pluribus Networks old modules to be deprecated (#51686)
* Pluribus Networks old modules to be deprecated

* Dox fixes
2019-02-12 13:43:22 +05:30
rajaspachipulusu17
48edffac60 Pluribus Networks vrouter ospf6 module with UT (#51793)
* Pluribus networks vrouter ospf6 module with UT

* Changes in check cli method
2019-02-12 13:41:30 +05:30
Hannes Ljungberg
70d8f02db7 docker_swarm_service: Extend env and add env_files support (#51762)
* Extend env and add env_files support

* Python 2.6 compat

* Handle lists passed as string

* Add changelog fragment

* Use correct link formatting

Co-Authored-By: hannseman <hannes@5monkeys.se>

* Fix typo

Co-Authored-By: hannseman <hannes@5monkeys.se>

* Handle empty env and env_files values
2019-02-12 08:06:58 +00:00
Felix Fontein
09f78d2f6c ufw: allow to insert rules relative to first/last IPv4/IPv6 rules (#49796)
* Insert should have type int.

* Add insert_relative_to option.

* Add changelog.

* Add tests.

* Improve comment.
2019-02-12 08:05:14 +00:00
rajaspachipulusu17
2e3964b474 Pluribus Networks vrouter interface ip module with UT (#51792)
* Pluribus networks vrouter interface ip module with UT

* Indetentation fix

* Changes in check cli method
2019-02-12 13:33:34 +05:30
rajaspachipulusu17
76534b45b0 Pluribus networks vflow table profile module with UT (#51722) 2019-02-12 13:32:59 +05:30
Piotr Wojciechowski
42f20091dd docker_swarm_facts: New module to retrieve Docker Swarm information (#50622)
* docker_swarm_facts: PR cleanup after rebasing

* docker_swarm_facts: Adding the features similar to docker_host_facts

* docker_swarm_facts: Minor documentation and documentation updates

* docker_swarm_facts: Minor documentation and documentation adjustments to changes in #51700

* docker_swarm_facts: Using AnsibleDockerSwarmClient class method to fail module if not run on swarm manager
module_utils\docker\swarm.py: Adjustment of error message to me bore descriptive if module fails because it is not run on swarm manager node
2019-02-12 00:59:31 -05:00
Piotr Wojciechowski
ea72f7001c docker_node_facts: Query may cover single or multiple nodes (#51701)
* docker_node_facts: Query may contain single or multiple nodes, additional option to query about the docker manager itself
docker_node_facts: Code update to use the module_utils/docker_swarm.py AnsibleDockerSwarmClient class methods

* docker_node_facts: Minor documentation update and error handling

* docker_node_facts: Minor documentation and code updates

* docker_node_facts: Minor documentation adjustments
2019-02-12 00:58:07 -05:00
Jordan Borean
179cbb9891
win_dsc - return warning from DSC invocation (#51927) 2019-02-12 13:50:00 +10:00
rajaspachipulusu17
338ad565a7 Pluribus Networks vrouter bgp network module with UT (#51791) 2019-02-12 09:07:15 +05:30
Ari Stark
2f85d62989 Add state option to git_config module (#50578)
* Add state option to git_config module

State present/absent option works like --set/--unset option for 'git config'.

* Change git_config to avoid useless parameter passed to git command

When unsetting value, command was : git config --unset foo ''.
Now command is : git config --unset foo.

* Add some integration tests to git_config module

* Add missing aliases file

* Change set up method

Using git command seems to cause troubles on some OS : changing config
by changing '.gitconfig' file.

* Remove some distros from tests pool

Git is not installed or is out of date on these distros.

* Fix aliases to skip tests on centos6

* Refactor tests of the git_config module

* Add use case when state=absent and value is defined
2019-02-11 21:49:53 -05:00
Simon Dodsley
984777b3d0 Update FlashArray facts to get new information (#51550) 2019-02-11 18:34:22 -05:00
onigra
063cd5ea44 Add force parameter to gem module (#51366) 2019-02-11 17:13:16 -05:00
Will Thames
9babd16942 k8s handle absent resources when waiting (#51682)
* k8s wait - don't try to call to_dict on None

Need to ensure that the resource dict is correctly returned for absent
resources

* Cope with resources without a namespace

Some resources (e.g. ClusterRoleBinding) do not have a Namespace.
Handle the lack of a namespace key.
2019-02-11 21:43:42 +01:00
Dag Wieers
031a1a5cc2 vsphere_file: New module to manage files on datastores (#48180) 2019-02-11 21:26:12 +01:00
Rémy Léone
b125b67ed2 Add a description of the description attribute 2019-02-11 11:58:44 -08:00
Matt Martz
c55317a2bd
Update connection plugins to use correct, non-deprecated, methods (#52038)
* Update connection plugins to use correct, non-deprecated, methods

* Update tests to reflect calling become plugins
2019-02-11 13:44:54 -06:00
Matt Clay
d033884465 Fix scaleway_lb test failures. 2019-02-11 11:20:33 -08:00
Abhijeet Kasurde
a4e79584ec include_vars: elaborate description of dir option (#52022)
based on work of thecjharries

Additional behavior documentation of 'dir' option in include_vars.

Fixes: #31761
2019-02-11 13:25:51 -05:00
Matt Martz
445ff39f94
Become plugins (#50991)
* [WIP] become plugins

Move from hardcoded method to plugins for ease of use, expansion and overrides
  - load into connection as it is going to be the main consumer
  - play_context will also use to keep backwards compat API
  - ensure shell is used to construct commands when needed
  - migrate settings remove from base config in favor of plugin specific configs
  - cleanup ansible-doc
  - add become plugin docs
  - remove deprecated sudo/su code and keywords
  - adjust become options for cli
  - set plugin options from context
  - ensure config defs are avaialbe before instance
  - refactored getting the shell plugin, fixed tests
     - changed into regex as they were string matching, which does not work with random string generation
     - explicitly set flags for play context tests
 - moved plugin loading up front
 - now loads for basedir also
 - allow pyc/o for non m modules
 - fixes to tests and some plugins
 - migrate to play objects fro play_context
 - simiplify gathering
 -  added utf8 headers
 - moved option setting
 - add fail msg to dzdo
 - use tuple for multiple options on fail/missing
 - fix relative plugin paths
 - shift from play context to play
 - all tasks already inherit this from play directly
 - remove obsolete 'set play'
 - correct environment handling
 - add wrap_exe option to pfexec
 - fix runas to noop
 - fixed setting play context
 - added password configs
 - removed required false
 - remove from doc building till they are ready

future development:
  - deal with 'enable' and 'runas' which are not 'command wrappers' but 'state flags' and currently hardcoded in diff subsystems

* cleanup

  remove callers to removed func
  removed --sudo cli doc refs
  remove runas become_exe
  ensure keyerorr on plugin
  also fix backwards compat, missing method is attributeerror, not ansible error
  get remote_user consistently
  ignore missing system_tmpdirs on plugin load
  correct config precedence
  add deprecation
  fix networking imports
  backwards compat for plugins using BECOME_METHODS

* Port become_plugins to context.CLIARGS

This is a work in progress:
* Stop passing options around everywhere as we can use context.CLIARGS
  instead

* Refactor make_become_commands as asked for by alikins

* Typo in comment fix

* Stop loading values from the cli in more than one place

Both play and play_context were saving default values from the cli
arguments directly.  This changes things so that the default values are
loaded into the play and then play_context takes them from there.

* Rename BECOME_PLUGIN_PATH to DEFAULT_BECOME_PLUGIN_PATH

As alikins said, all other plugin paths are named
DEFAULT_plugintype_PLUGIN_PATH.  If we're going to rename these, that
should be done all at one time rather than piecemeal.

* One to throw away

This is a set of hacks to get setting FieldAttribute defaults to command
line args to work.  It's not fully done yet.

After talking it over with sivel and jimi-c this should be done by
fixing FieldAttributeBase and _get_parent_attribute() calls to do the
right thing when there is a non-None default.

What we want to be able to do ideally is something like this:

class Base(FieldAttributeBase):
    _check_mode = FieldAttribute([..] default=lambda: context.CLIARGS['check'])

class Play(Base):
    # lambda so that we have a chance to parse the command line args
    # before we get here.  In the future we might be able to restructure
    # this so that the cli parsing code runs before these classes are
    # defined.

class Task(Base):
    pass

And still have a playbook like this function:

---
- hosts:
  tasks:
  - command: whoami
    check_mode: True

(The check_mode test that is added as a separate commit in this PR will
let you test variations on this case).

There's a few separate reasons that the code doesn't let us do this or
a non-ugly workaround for this as written right now.  The fix that
jimi-c, sivel, and I talked about may let us do this or it may still
require a workaround (but less ugly) (having one class that has the
FieldAttributes with default values and one class that inherits from
that but just overrides the FieldAttributes which now have defaults)

* Revert "One to throw away"

This reverts commit 23aa883cbed11429ef1be2a2d0ed18f83a3b8064.

* Set FieldAttr defaults directly from CLIARGS

* Remove dead code

* Move timeout directly to PlayContext, it's never needed on Play

* just for backwards compat, add a static version of BECOME_METHODS to constants

* Make the become attr on the connection public, since it's used outside of the connection

* Logic fix

* Nuke connection testing if it supports specific become methods

* Remove unused vars

* Address rebase issues

* Fix path encoding issue

* Remove unused import

* Various cleanups

* Restore network_cli check in _low_level_execute_command

* type improvements for cliargs_deferred_get and swap shallowcopy to default to False

* minor cleanups

* Allow the su plugin to work, since it doesn't define a prompt the same way

* Fix up ksu become plugin

* Only set prompt if build_become_command was called

* Add helper to assist connection plugins in knowing they need to wait for a prompt

* Fix tests and code expectations

* Doc updates

* Various additional minor cleanups

* Make doas functional

* Don't change connection signature, load become plugin from TaskExecutor

* Remove unused imports

* Add comment about setting the become plugin on the playcontext

* Fix up tests for recent changes

* Support 'Password:' natively for the doas plugin

* Make default prompts raw

* wording cleanups. ci_complete

* Remove unrelated changes

* Address spelling mistake

* Restore removed test, and udpate to use new functionality

* Add changelog fragment

* Don't hard fail in set_attributes_from_cli on missing CLI keys

* Remove unrelated change to loader

* Remove internal deprecated FieldAttributes now

* Emit deprecation warnings now
2019-02-11 11:27:44 -06:00
Zim Kalinowski
c581fbd0be adding missing items in postgresql facts documentation (#51677)
* adding missing items in postgresql facts documentation

* removed trailing whitespace
2019-02-11 11:07:38 -05:00
Zim Kalinowski
beba2fdc65 adding missing items in the documentation of mysql server facts (#51676)
* adding missing items in the documentation of mysql server facts

* removed trailing whitespace
2019-02-11 11:06:32 -05:00
James Cassell
953058d025 standardize connection variable names (#51776)
* standardize user/password connection vars

* docs: use ansible_user and ansible_password

* docs: var precedence for connection vars

* docs: ansible_become_pass -> ansible_become_password etc
2019-02-11 10:43:10 -05:00
Akira Yokochi
51061f8a5f fix a little typo in ini inventory doc (#52025) 2019-02-11 15:34:01 +00:00
Rémy Léone
accbcdeccb Add a Scaleway load-balancer module (#51741) 2019-02-11 15:28:55 +00:00
getjack
9dbb551528 - Initial commit (#51729)
- Fix sanity checks
  - Fixed documentation trailing whitespaces
2019-02-11 15:12:10 +00:00
Matt Martz
3c85ac1788
Promote include_tasks/role and import_tasks/role to stableinterface (#51975) 2019-02-11 09:06:38 -06:00
Bill Dodd
e0538610bf Update GetBiosBootOrder to use standard spec resources (#51764)
* update GetBiosBootOrder to use standard spec resources

* handle case where BootOrder is present but BootOptions is missing
2019-02-11 14:50:10 +00:00
Fabian von Feilitzsch
e81b74d6c8 Properly parse boolean env values as boolean (#51836) 2019-02-11 14:49:00 +00:00
Felix Fontein
4d3d8dd60f ufw: check values for direction depending on situation (#50402)
* Check values of 'direction'.

* Add changelog.

* Update lib/ansible/modules/system/ufw.py

Co-Authored-By: felixfontein <felix@fontein.de>

* Update lib/ansible/modules/system/ufw.py
2019-02-11 14:47:35 +00:00
Felix Fontein
a279892fae ufw: allow gre and igmp protocols (#51166)
* ufw: allow gre and igmp protocols.

* Add changelog.
2019-02-11 14:46:38 +00:00
Miguel Angel Muñoz González
95557077b6 Fortinet's FortiOS Extender Controller Extender (#51891) 2019-02-11 14:39:11 +00:00
Miguel Angel Muñoz González
06b725619b Fortinet's FortiOS Firewall Auth (#51892) 2019-02-11 14:36:15 +00:00
Bill Dodd
3b20b186d7 remove non-standard GetManagerAttributes, SetManagerAttributes (#51898) 2019-02-11 14:33:15 +00:00
Miguel Angel Muñoz González
158ae76d65 Fortinet's FortiOS Firewall Central SNAT Map (#51929) 2019-02-11 14:28:54 +00:00
Miguel Angel Muñoz González
b14008abb9 Fortinet's FortiOS Firewall DNStranslation (#51930) 2019-02-11 14:28:20 +00:00
Miguel Angel Muñoz González
c7af56849f Fortinet's FortiOS Firewall DoSPolicy6 (#51931) 2019-02-11 14:27:49 +00:00
Miguel Angel Muñoz González
a40ceb448e Fortinet's FortiOS Firewall DoSPolicy (#51932) 2019-02-11 14:26:17 +00:00
Miguel Angel Muñoz González
de077e60f5 Fortinet's FortiOS Firewall Identity based Route (#51933) 2019-02-11 14:26:00 +00:00
Miguel Angel Muñoz González
e7f4447092 Fortinet's FortiOS Firewall Interface Policy6 (#51935) 2019-02-11 14:25:44 +00:00
Miguel Angel Muñoz González
6f12e0d54e Fortinet's FortiOS Firewall Interface Policy (#51936) 2019-02-11 14:20:35 +00:00
Miguel Angel Muñoz González
cb6c8a0d26 Fortinet's FortiOS Firewall Internet Service Custom (#51937) 2019-02-11 14:20:22 +00:00
Miguel Angel Muñoz González
e0867459c7 Fortinet's FortiOS Firewall Internet Service (#51943) 2019-02-11 14:19:16 +00:00
Miguel Angel Muñoz González
bbb1e9e335 Fortinet's FortiOS Firewall Internet Service Group (#51945) 2019-02-11 14:19:03 +00:00
Miguel Angel Muñoz González
29567c9fdc Fortinet's FortiOS Firewall IpMacBinding Setting (#51947) 2019-02-11 14:18:24 +00:00
Miguel Angel Muñoz González
4742a55f31 Fortinet's FortiOS Firewall IpMacBinding Table (#51948) 2019-02-11 14:16:13 +00:00
Miguel Angel Muñoz González
e2f03df2b2 Fortinet's FortiOS Firewall IP translation (#51950) 2019-02-11 14:14:50 +00:00
Miguel Angel Muñoz González
6667604a3f Fortinet's FortiOS Firewall IPv6 EH Filter (#51954) 2019-02-11 14:14:20 +00:00
Miguel Angel Muñoz González
ebacea2116 Fortinet's FortiOS Firewall Multicast Address (#51964) 2019-02-11 13:47:01 +00:00
Mariusz Mazur
34671a64b3 k8s_auth: new k8s module for handling auth (#50807)
* k8s*: add a reference to k8s_auth in all the modules' descriptions

* k8s_auth: new k8s module for handling auth

* k8s_auth: ignore E203

Can't use module_utils.urls, since that lacks user CA support, which is
a critical feature of what this module does.
2019-02-11 07:55:34 -05:00
Miguel Angel Muñoz González
2aa500c9a4 Fortinet's FortiOS Firewall Multicast Policy6 (#51966) 2019-02-11 12:27:03 +00:00
Jérôme BAROTIN
b99de25f32 Enable changed var with ufw check mode (#49948)
* Enable 'changed' var with ufw check mode

* Fix from comment of the PR + Unit Test

* Fix on ufw module after the second review

- delete rules change works in check mode
- simplify execute def & use it on every call process
- improved regexp
- rename vars defaults to current_default_values

* Add ignore error to execute() and use it in get_current_rules()

* Update after third code review (introduce change in changed status)

* Adjust tests and fix some problems (#1)

* 'active' also appears in 'inactive'.

* 'reject' is also a valid option here.

* For example for reloaded, changed will be set back to False here.

* Improve and adjust tests.

* Fix after merging integration test

* handle "disabled" on default routed

* Add /var/lib/ufw/.. rules files

* add unit test

* Fix pep8 formatting error

* Separate ipv6 and ipv4 rules process from checkmode

* fix non-ascii error on ci

* Some change after review

* Add unit test with sub network mask

* rename is_match function by is_starting

* add changelog fragment
2019-02-11 11:05:35 +00:00
Miguel Angel Muñoz González
708f0b07ba Fortinet's FortiOS Firewall LDB monitor (#51955) 2019-02-11 10:59:54 +00:00
Miguel Angel Muñoz González
5c04f7c256 Fortinet's FortiOS Firewall Local In Policy6 (#51957) 2019-02-11 10:59:30 +00:00
Miguel Angel Muñoz González
70e738cfec Fortinet's FortiOS Firewall Local In Policy (#51962) 2019-02-11 10:58:58 +00:00
Miguel Angel Muñoz González
c9cea22854 Fortinet's FortiOS Firewall Multicast Address6 (#51963) 2019-02-11 10:49:34 +00:00