Commit graph

25372 commits

Author SHA1 Message Date
Chris Archibald
93237edcda New Module: na_ontap_qos_policy_group (#51392)
* changes to clusteR

* Revert "changes to clusteR"

This reverts commit 33ee1b71e4bc8435fb315762a871f8c4cb6c5f80.

* add new module na_ontap_qos_policy_group

* fix issues
2019-02-13 15:32:25 +00:00
Chris Archibald
311a076dae New Module: na_ontap_nvme_subsystem (#50887)
* changes to clusteR

* Revert "changes to clusteR"

This reverts commit 33ee1b71e4bc8435fb315762a871f8c4cb6c5f80.

* New module na_ontap_nvme_subsystem

* updates

* update author

* fix author
2019-02-13 14:36:48 +00:00
Alan Rominger
af9ff07c74 Send openstack inventory logs to stderr (#51827) 2019-02-13 13:36:37 +00:00
Abhijeet Kasurde
32fce43311
hashi_vault: fix multiple spaces in params (#51524)
Fixes param parsing in hashi_vault

Signed-off-by: Abhijeet Kasurde <akasurde@redhat.com>
2019-02-13 18:32:00 +05:30
Miguel Angel Muñoz González
196e82ec8a Fortinet's FortiOS User Tacacs+ (#52071) 2019-02-13 11:37:03 +00:00
Miguel Angel Muñoz González
edcf07500f Fortinet's FortiOS Firewall Schedule Group (#52072) 2019-02-13 11:36:52 +00:00
Miguel Angel Muñoz González
05381db474 Fortinet's FortiOS fortios firewall service group (#52090) 2019-02-13 11:36:35 +00:00
Miguel Angel Muñoz González
3718a6b79f Fortinet's FortiOS fortios firewall shaper per ip shaper (#52092) 2019-02-13 11:36:14 +00:00
Miguel Angel Muñoz González
a5ed17e462 Fortinet's FortiOS fortios firewall shaper traffic shaper (#52093) 2019-02-13 11:36:03 +00:00
Miguel Angel Muñoz González
ac25361de5 Fortinet's FortiOS firewall shaping policy (#52094) 2019-02-13 11:35:45 +00:00
Miguel Angel Muñoz González
6dc44b18e1 Fortinet's FortiOS firewall shaping profile (#52095) 2019-02-13 11:35:36 +00:00
Miguel Angel Muñoz González
62f15c26b4 Fortinet's FortiOS firewall sniffer (#52096) 2019-02-13 11:35:29 +00:00
Miguel Angel Muñoz González
b8ffc1a917 Fortinet's FortiOS firewall ssh host key (#52097) 2019-02-13 11:35:20 +00:00
Miguel Angel Muñoz González
31180fa10f Fortinet's FortiOS firewall ssh local ca (#52098) 2019-02-13 11:35:00 +00:00
Miguel Angel Muñoz González
c21e41f4b8 Fortinet's FortiOS firewall ssh local key (#52099) 2019-02-13 11:34:06 +00:00
Miguel Angel Muñoz González
097a7c9d81 Fortinet's FortiOS firewall ssh setting (#52102) 2019-02-13 11:33:35 +00:00
Miguel Angel Muñoz González
312f2e9d1f Fortinet's FortiOS firewall ssl server (#52104) 2019-02-13 11:33:18 +00:00
Miguel Angel Muñoz González
1640ad6cfc Fortinet's FortiOS firewall ssl setting (#52105) 2019-02-13 11:33:01 +00:00
Miguel Angel Muñoz González
6fd031c820 Fortinet's FortiOS firewall ssl ssh profile (#52106) 2019-02-13 11:32:49 +00:00
Miguel Angel Muñoz González
bc0c1bd501 Fortinet's FortiOS firewall ttl policy (#52107) 2019-02-13 11:32:17 +00:00
Miguel Angel Muñoz González
8413d62727 Fortinet's FortiOS firewall wildcard fqdn custom (#52108) 2019-02-13 11:31:58 +00:00
Miguel Angel Muñoz González
47d1ab4c3d Fortinet's FortiOS firewall wildcard fqdn group (#52110) 2019-02-13 11:31:33 +00:00
Miguel Angel Muñoz González
abcdedfdf0 Fortinet's FortiOS ftp proxy explicit (#52113) 2019-02-13 11:31:23 +00:00
Miguel Angel Muñoz González
a1e2d290fc Fortinet's FortiOS system settings (#52112) 2019-02-13 11:31:04 +00:00
Miguel Angel Muñoz González
951ace650b Fortinet's FortiOS icap profile (#52114) 2019-02-13 11:30:42 +00:00
Miguel Angel Muñoz González
b18e8259cd Fortinet's FortiOS icap server (#52115) 2019-02-13 11:30:06 +00:00
Miguel Angel Muñoz González
30ab7135f0 Fortinet's FortiOS ips custom (#52118) 2019-02-13 11:29:53 +00:00
Miguel Angel Muñoz González
7d3247d3a5 Fortinet's FortiOS ips decoder (#52119) 2019-02-13 11:29:26 +00:00
Miguel Angel Muñoz González
4a9014fca1 Fortinet's FortiOS ips global (#52120) 2019-02-13 11:29:05 +00:00
Miguel Angel Muñoz González
7babf66d93 Fortinet's FortiOS ips settings (#52122) 2019-02-13 11:28:51 +00:00
Miguel Angel Muñoz González
364eb6e4a0 Fortinet's FortiOS ips rule settings (#52123) 2019-02-13 11:28:31 +00:00
Pilou
51270be883 tower modules: check that 'verify_ssl' defined in ~/.tower_cli.cfg isn't ignored (#50687)
* Check that verify_ssl defined in tower_cli.cfg isn't ignored

* Avoid to override verify_ssl value defined in tower_cli.cfg

By default, tower-cli library enables SSL certificates check. But
verify_ssl false value defined in config files read by default by
tower-cli library (for example /etc/tower/tower_cli.cfg) was ignored
because overriden by the tower_verify_ssl parameter default value.

* fix a typo in comment
2019-02-13 10:26:43 +00:00
Ondra Machacek
797a5218fb kubevirt: Add new kubevirt_vm module (#50768)
This module is managing virtual machines using KubeVirt.

Signed-off-by: Ondra Machacek <omachace@redhat.com>
2019-02-13 10:17:01 +00:00
Ross Williams
6e409a91ba Correct usage of sorted() in mongodb_user (#46792)
* Correct usage of sorted() in mongodb_user

sorted() can't be called on a list of dicts
without supplying a key parameter. This is
explained really well in the Sorting HOWTO
https://docs.python.org/3.6/howto/sorting.html#key-functions

This commit fixes #46791

* Fix PEP8 issues
2019-02-13 10:28:35 +01:00
Dag Wieers
21d43e6d94 win_product_facts: Fix RETURN information (#52058) 2019-02-13 19:09:30 +10:00
Straff
d4a07f9573 Added support for user-specified log file in win_package (#51104)
* Added support for user-specified log file in win_package - feature (#38353)

* added integration tests for win_package log_path support feature (#38353), and applied review feedback

* win_package log_path support feature (#38353) - fixed typo in win-package.py documentation

* win_package log_path support feature (#38353) - improved an integration test and better doc in win-package.py
2019-02-13 19:08:07 +10:00
Amol Kahat
563725ba98 Fixed typo from adress to address (#52143)
Signed-off-by: Amol Kahat <akahat@redhat.com>
2019-02-13 13:57:13 +05:30
Jiri Tyr
f49469f7bf Updating update_url for jenkins_plugin (#52086) 2019-02-13 01:32:34 -05:00
Matt Clay
04112d47a7 Fix more incorrect uses of is operator. 2019-02-12 20:04:20 -08:00
Will Thames
46fbcf08bc
aws_kms enhancements (#31960)
* Allow creation and deletion of keys (deletion just schedules for
  deletion, recreating an old key is just cancelling its deletion)
* Allow grants to be set, thus enabling encryption contexts to be
  used with keys
* Allow tags to be added and modified
* Add testing for KMS module
* Tidy up aws_kms module to latest standards
2019-02-13 13:06:58 +10:00
Matt Clay
0a461380a3 Fix incorrect use of is for comparisons.
See https://bugs.python.org/issue34850 for details.
2019-02-12 16:33:13 -08:00
Matt Davis
cd7a144515
fix docker default remote_user (#52137)
Fix bogus default value in config- exposed by become plugins (#50911) actually using this value in more cases.
2019-02-12 16:29:27 -08:00
Wojciech Sciesinski
a431e802ed Add posibilities to run the integration tests for PowerShell < 5.0 (#50808)
* Add posibilities to run the integration tests for PowerShell < 5.0

* Update of tests - based at a review comments for #50612

* The correction of YAML structure
2019-02-12 15:51:03 -05:00
Wojciech Sciesinski
a7528cdd25 Update the NuGet package provider when needed (#50759)
* Update the NuGet package provider when needed

* Update NuGet provider conditionally
2019-02-12 12:22:22 -08:00
Andrew Gaffney
9c35f18dd6 Custom jinja Undefined class for handling nested undefined attributes (#51768)
This commit creates a custom Jinja2 Undefined class that returns
Undefined for any further accesses, rather than raising an exception
2019-02-12 15:04:00 -05:00
Abhijeet Kasurde
4e0e09d2de docs: update docs about pipelining (#51856)
Additional documentation about `keep_remote_files` and
`pipelining` configurations.

Signed-off-by: Abhijeet Kasurde <akasurde@redhat.com>
2019-02-12 12:49:00 -05:00
hansmi
76ab88c9f5 callbacks/slack: Explicitly set Content-Type header (#51824)
There are other chat systems with hook implementations more or less
compatible with Slack, such as Rocket.Chat. The latter requires the
Content-Type header to be set to "application/json" (the body is JSON).

Signed-off-by: Michael Hanselmann <public@hansmi.ch>
2019-02-12 12:47:33 -05:00
Keith Maxwell
7fbacf920d Remove misleading statement passwords must be same (#49798)
* Remove misleading statement passwords must be same

Since 2.4 Ansible has supported multiple vault passwords:
<https://docs.ansible.com/ansible/latest/user_guide/vault.html#multiple-vault-passwords>

Meaning lines like the following are misleading:

> The password used with vault currently must be the same for all files you wish
> to use together at the same time.

-- `docs/docsite/rst/user_guide/vault.rst`

To demonstrate this with Ansible 2.7, save the following as `example.yaml`:

```
- name: Display output from two vaults with different passwords
  hosts: localhost
  connection: local
  vars_files: [one.yaml, two.yaml]
  tasks:
    - name: View secret from one.yaml vault
      debug: { var: one }
    - name: View secret from two.yaml vault
      debug: { var: two }
```

Then run the three following commands choosing two different passwords:

```
$ echo 'one: 1' | ansible-vault encrypt --vault-id id1@prompt --output=one.yaml
$ echo 'two: 2' | ansible-vault encrypt --vault-id id2@prompt --output=two.yaml
$ ansible-playbook --vault-id id1@prompt --vault-id id2@prompt example.yaml
```

`ansible-vault` stores an ID in plain text in the vault file.

* Remove note about default in Ansible 2.1

As requested by gundalow in https://github.com/ansible/ansible/pull/49798
2019-02-12 10:47:01 -05:00
rajaspachipulusu17
0825cbad40 Pluribus Networks prefix list network module with Unit test cases (#52064) 2019-02-12 20:40:58 +05:30
Chris Archibald
ce092ed939 New Modules: na_ontap_unix_group (#51390)
* changes to clusteR

* Revert "changes to clusteR"

This reverts commit 33ee1b71e4bc8435fb315762a871f8c4cb6c5f80.

* add new module ontap_unix_groups
2019-02-12 15:06:28 +00:00