Commit graph

25374 commits

Author SHA1 Message Date
Juan Antonio Osorio
9f081ca04f identity: Add GSSAPI suport for FreeIPA authentication (#52031)
* identity: Add GSSAPI suport for FreeIPA authentication

This enables the usage of GSSAPI for authentication, instead of having
to pass the username and password as part of the playbook run.

If there is GSSAPI support, this makes the password optional, and will
be able to use the KRB5_CLIENT_KTNAME or the KRB5CCNAME environment
variables; which are standard when using kerberos authentication.

Note that this depends on the urllib_gssapi library, and will only
enable this if that library is available.

* identity: Add documentation for GSSAPI authentication for FreeIPA

This documentation describes how to use GSSAPI authentication with the
IPA identity modules.

* identity: Add changelog for GSSAPI support for IPA

This adds the changelog entry for the GSSAPI authentication feature for
the IPA identity module.
2019-02-13 15:38:13 +00:00
Chris Archibald
7d55dc1a38 Add ontap version to gather facts (#51181)
* changes to clusteR

* Revert "changes to clusteR"

This reverts commit 33ee1b71e4bc8435fb315762a871f8c4cb6c5f80.

* Add FlexGroup to Gather facts:

* fix call error
2019-02-13 15:33:38 +00:00
Chris Archibald
93237edcda New Module: na_ontap_qos_policy_group (#51392)
* changes to clusteR

* Revert "changes to clusteR"

This reverts commit 33ee1b71e4bc8435fb315762a871f8c4cb6c5f80.

* add new module na_ontap_qos_policy_group

* fix issues
2019-02-13 15:32:25 +00:00
Chris Archibald
311a076dae New Module: na_ontap_nvme_subsystem (#50887)
* changes to clusteR

* Revert "changes to clusteR"

This reverts commit 33ee1b71e4bc8435fb315762a871f8c4cb6c5f80.

* New module na_ontap_nvme_subsystem

* updates

* update author

* fix author
2019-02-13 14:36:48 +00:00
Alan Rominger
af9ff07c74 Send openstack inventory logs to stderr (#51827) 2019-02-13 13:36:37 +00:00
Abhijeet Kasurde
32fce43311
hashi_vault: fix multiple spaces in params (#51524)
Fixes param parsing in hashi_vault

Signed-off-by: Abhijeet Kasurde <akasurde@redhat.com>
2019-02-13 18:32:00 +05:30
Miguel Angel Muñoz González
196e82ec8a Fortinet's FortiOS User Tacacs+ (#52071) 2019-02-13 11:37:03 +00:00
Miguel Angel Muñoz González
edcf07500f Fortinet's FortiOS Firewall Schedule Group (#52072) 2019-02-13 11:36:52 +00:00
Miguel Angel Muñoz González
05381db474 Fortinet's FortiOS fortios firewall service group (#52090) 2019-02-13 11:36:35 +00:00
Miguel Angel Muñoz González
3718a6b79f Fortinet's FortiOS fortios firewall shaper per ip shaper (#52092) 2019-02-13 11:36:14 +00:00
Miguel Angel Muñoz González
a5ed17e462 Fortinet's FortiOS fortios firewall shaper traffic shaper (#52093) 2019-02-13 11:36:03 +00:00
Miguel Angel Muñoz González
ac25361de5 Fortinet's FortiOS firewall shaping policy (#52094) 2019-02-13 11:35:45 +00:00
Miguel Angel Muñoz González
6dc44b18e1 Fortinet's FortiOS firewall shaping profile (#52095) 2019-02-13 11:35:36 +00:00
Miguel Angel Muñoz González
62f15c26b4 Fortinet's FortiOS firewall sniffer (#52096) 2019-02-13 11:35:29 +00:00
Miguel Angel Muñoz González
b8ffc1a917 Fortinet's FortiOS firewall ssh host key (#52097) 2019-02-13 11:35:20 +00:00
Miguel Angel Muñoz González
31180fa10f Fortinet's FortiOS firewall ssh local ca (#52098) 2019-02-13 11:35:00 +00:00
Miguel Angel Muñoz González
c21e41f4b8 Fortinet's FortiOS firewall ssh local key (#52099) 2019-02-13 11:34:06 +00:00
Miguel Angel Muñoz González
097a7c9d81 Fortinet's FortiOS firewall ssh setting (#52102) 2019-02-13 11:33:35 +00:00
Miguel Angel Muñoz González
312f2e9d1f Fortinet's FortiOS firewall ssl server (#52104) 2019-02-13 11:33:18 +00:00
Miguel Angel Muñoz González
1640ad6cfc Fortinet's FortiOS firewall ssl setting (#52105) 2019-02-13 11:33:01 +00:00
Miguel Angel Muñoz González
6fd031c820 Fortinet's FortiOS firewall ssl ssh profile (#52106) 2019-02-13 11:32:49 +00:00
Miguel Angel Muñoz González
bc0c1bd501 Fortinet's FortiOS firewall ttl policy (#52107) 2019-02-13 11:32:17 +00:00
Miguel Angel Muñoz González
8413d62727 Fortinet's FortiOS firewall wildcard fqdn custom (#52108) 2019-02-13 11:31:58 +00:00
Miguel Angel Muñoz González
47d1ab4c3d Fortinet's FortiOS firewall wildcard fqdn group (#52110) 2019-02-13 11:31:33 +00:00
Miguel Angel Muñoz González
abcdedfdf0 Fortinet's FortiOS ftp proxy explicit (#52113) 2019-02-13 11:31:23 +00:00
Miguel Angel Muñoz González
a1e2d290fc Fortinet's FortiOS system settings (#52112) 2019-02-13 11:31:04 +00:00
Miguel Angel Muñoz González
951ace650b Fortinet's FortiOS icap profile (#52114) 2019-02-13 11:30:42 +00:00
Miguel Angel Muñoz González
b18e8259cd Fortinet's FortiOS icap server (#52115) 2019-02-13 11:30:06 +00:00
Miguel Angel Muñoz González
30ab7135f0 Fortinet's FortiOS ips custom (#52118) 2019-02-13 11:29:53 +00:00
Miguel Angel Muñoz González
7d3247d3a5 Fortinet's FortiOS ips decoder (#52119) 2019-02-13 11:29:26 +00:00
Miguel Angel Muñoz González
4a9014fca1 Fortinet's FortiOS ips global (#52120) 2019-02-13 11:29:05 +00:00
Miguel Angel Muñoz González
7babf66d93 Fortinet's FortiOS ips settings (#52122) 2019-02-13 11:28:51 +00:00
Miguel Angel Muñoz González
364eb6e4a0 Fortinet's FortiOS ips rule settings (#52123) 2019-02-13 11:28:31 +00:00
Pilou
51270be883 tower modules: check that 'verify_ssl' defined in ~/.tower_cli.cfg isn't ignored (#50687)
* Check that verify_ssl defined in tower_cli.cfg isn't ignored

* Avoid to override verify_ssl value defined in tower_cli.cfg

By default, tower-cli library enables SSL certificates check. But
verify_ssl false value defined in config files read by default by
tower-cli library (for example /etc/tower/tower_cli.cfg) was ignored
because overriden by the tower_verify_ssl parameter default value.

* fix a typo in comment
2019-02-13 10:26:43 +00:00
Ondra Machacek
797a5218fb kubevirt: Add new kubevirt_vm module (#50768)
This module is managing virtual machines using KubeVirt.

Signed-off-by: Ondra Machacek <omachace@redhat.com>
2019-02-13 10:17:01 +00:00
Ross Williams
6e409a91ba Correct usage of sorted() in mongodb_user (#46792)
* Correct usage of sorted() in mongodb_user

sorted() can't be called on a list of dicts
without supplying a key parameter. This is
explained really well in the Sorting HOWTO
https://docs.python.org/3.6/howto/sorting.html#key-functions

This commit fixes #46791

* Fix PEP8 issues
2019-02-13 10:28:35 +01:00
Dag Wieers
21d43e6d94 win_product_facts: Fix RETURN information (#52058) 2019-02-13 19:09:30 +10:00
Straff
d4a07f9573 Added support for user-specified log file in win_package (#51104)
* Added support for user-specified log file in win_package - feature (#38353)

* added integration tests for win_package log_path support feature (#38353), and applied review feedback

* win_package log_path support feature (#38353) - fixed typo in win-package.py documentation

* win_package log_path support feature (#38353) - improved an integration test and better doc in win-package.py
2019-02-13 19:08:07 +10:00
Amol Kahat
563725ba98 Fixed typo from adress to address (#52143)
Signed-off-by: Amol Kahat <akahat@redhat.com>
2019-02-13 13:57:13 +05:30
Jiri Tyr
f49469f7bf Updating update_url for jenkins_plugin (#52086) 2019-02-13 01:32:34 -05:00
Matt Clay
04112d47a7 Fix more incorrect uses of is operator. 2019-02-12 20:04:20 -08:00
Will Thames
46fbcf08bc
aws_kms enhancements (#31960)
* Allow creation and deletion of keys (deletion just schedules for
  deletion, recreating an old key is just cancelling its deletion)
* Allow grants to be set, thus enabling encryption contexts to be
  used with keys
* Allow tags to be added and modified
* Add testing for KMS module
* Tidy up aws_kms module to latest standards
2019-02-13 13:06:58 +10:00
Matt Clay
0a461380a3 Fix incorrect use of is for comparisons.
See https://bugs.python.org/issue34850 for details.
2019-02-12 16:33:13 -08:00
Matt Davis
cd7a144515
fix docker default remote_user (#52137)
Fix bogus default value in config- exposed by become plugins (#50911) actually using this value in more cases.
2019-02-12 16:29:27 -08:00
Wojciech Sciesinski
a431e802ed Add posibilities to run the integration tests for PowerShell < 5.0 (#50808)
* Add posibilities to run the integration tests for PowerShell < 5.0

* Update of tests - based at a review comments for #50612

* The correction of YAML structure
2019-02-12 15:51:03 -05:00
Wojciech Sciesinski
a7528cdd25 Update the NuGet package provider when needed (#50759)
* Update the NuGet package provider when needed

* Update NuGet provider conditionally
2019-02-12 12:22:22 -08:00
Andrew Gaffney
9c35f18dd6 Custom jinja Undefined class for handling nested undefined attributes (#51768)
This commit creates a custom Jinja2 Undefined class that returns
Undefined for any further accesses, rather than raising an exception
2019-02-12 15:04:00 -05:00
Abhijeet Kasurde
4e0e09d2de docs: update docs about pipelining (#51856)
Additional documentation about `keep_remote_files` and
`pipelining` configurations.

Signed-off-by: Abhijeet Kasurde <akasurde@redhat.com>
2019-02-12 12:49:00 -05:00
hansmi
76ab88c9f5 callbacks/slack: Explicitly set Content-Type header (#51824)
There are other chat systems with hook implementations more or less
compatible with Slack, such as Rocket.Chat. The latter requires the
Content-Type header to be set to "application/json" (the body is JSON).

Signed-off-by: Michael Hanselmann <public@hansmi.ch>
2019-02-12 12:47:33 -05:00
Keith Maxwell
7fbacf920d Remove misleading statement passwords must be same (#49798)
* Remove misleading statement passwords must be same

Since 2.4 Ansible has supported multiple vault passwords:
<https://docs.ansible.com/ansible/latest/user_guide/vault.html#multiple-vault-passwords>

Meaning lines like the following are misleading:

> The password used with vault currently must be the same for all files you wish
> to use together at the same time.

-- `docs/docsite/rst/user_guide/vault.rst`

To demonstrate this with Ansible 2.7, save the following as `example.yaml`:

```
- name: Display output from two vaults with different passwords
  hosts: localhost
  connection: local
  vars_files: [one.yaml, two.yaml]
  tasks:
    - name: View secret from one.yaml vault
      debug: { var: one }
    - name: View secret from two.yaml vault
      debug: { var: two }
```

Then run the three following commands choosing two different passwords:

```
$ echo 'one: 1' | ansible-vault encrypt --vault-id id1@prompt --output=one.yaml
$ echo 'two: 2' | ansible-vault encrypt --vault-id id2@prompt --output=two.yaml
$ ansible-playbook --vault-id id1@prompt --vault-id id2@prompt example.yaml
```

`ansible-vault` stores an ID in plain text in the vault file.

* Remove note about default in Ansible 2.1

As requested by gundalow in https://github.com/ansible/ansible/pull/49798
2019-02-12 10:47:01 -05:00