Commit graph

259 commits

Author SHA1 Message Date
Lee Hardy
ee0412c8b4 Merge branch 'devel' into mysql_anon_user 2015-11-17 09:09:05 +00:00
Lee Hardy
2aeb188d81 - fix user_exists statement with host_all to use only username parameter 2015-11-04 16:37:18 +00:00
Brian Coca
d6c97bc880 Merge pull request #2381 from gregdek/devel
Module ownership changes
2015-11-02 19:00:21 -05:00
Brian Coca
fc957883c5 Merge pull request #2383 from wtanaka/devel
Update target parameter documentation
2015-11-02 18:59:52 -05:00
Brian Coca
89957eed53 document mysql collation can only be set during creation 2015-10-31 14:25:02 -04:00
wtanaka.com
2dd7ac7a45 Update target parameter documentation
xz support was only added recently (2015-05-15), so referring to it
unqualified in the online documentation is confusing.
2015-10-28 10:35:51 -10:00
Greg DeKoenigsberg
57dcf2c9dd @lorin stepping down as maintainer 2015-10-28 14:38:11 -04:00
Jonathan Mainguy
51db236aa7 Update doc to reflect password is required if adding a new user 2015-10-27 13:17:24 -04:00
Jonathan Mainguy
e101657722 Update error message to be more explicit 2015-10-27 13:03:51 -04:00
Lee Hardy
acdde856c5 - mysql: add user_anonymous parameter, which interacts with anonymous
users
- mysql; add host_all parameter, which forces iteration over all
  'user'@... matches
2015-10-22 14:27:47 +01:00
Sam Yaple
54804d25e3 Actually remove the section we are replacing 2015-08-19 08:52:05 +00:00
Sam Yaple
dddb5270c8 Refix bug 1226 after revert
This patch properly fixes bug 1226 without introducing a breaking
change to idempotency which was introduced in PR #1358

We can properly assign permissions to databases with a '.' in the name
of the database as well as assign priviliges to all databases as
specified with '*'
2015-08-19 04:23:03 +00:00
Sam Yaple
2c35cfce9a Revert "escapeds changes"
While this change doesn't break the creation, it does break
idempotency. This change will convert '*.*' to '`*`.*' which is
functionally the same, however when the user_mod() function looks up
the current privileges with privileges_get() it will read '*.*'

Since '*.*' != '`*`.*' it will go through the process of updating the
privleges always resulting in a 'changed' result.

This reverts commit db9ab9b262.
2015-08-03 10:49:37 +00:00
Sudheer Satyanarayana
f3a0f0f580 Update mysql_db.py
Mention package installation instructions for CentOS in notes.
2015-07-26 18:08:33 +05:30
Brian Coca
fa5a72f40e Merge pull request #570 from sysadmin75/mysql_user_parse_grant
Fix to revoke privileges for mysql user = ''
2015-07-23 08:52:54 -04:00
Brian Coca
769b81cae1 Merge pull request #1001 from ospii/devel
Validate variable, return only the found variable value instead of tuple
2015-07-23 08:52:22 -04:00
Guilherme Carlos
e13e369aae Fix login_user on mysql_user
`login_username` was provided but `login_user` is the correct option
2015-07-22 17:55:35 -03:00
Will Thames
47cb92f74f Ensure TEMP privilege gets removed when expanding ALL.
ALL gets expanded to the list of VALID_PRIVS which includes
TEMPORARY and TEMP
The code that replaced TEMP with TEMPORARY didn't work with the
expansion
2015-07-22 13:34:52 +10:00
Will Thames
2a0f6c1cb3 Correct handling of empty role_attr_flags
role_attr_flags is the empty string by default, not None.
2015-07-22 12:05:21 +10:00
Brian Coca
ab5b5e8819 corrected version added 2015-07-11 00:15:02 -04:00
Brian Coca
2b53b92dc2 Merge pull request #1539 from acaveroc/mysql_vars_port_definition
Mysql vars port definition
2015-07-11 00:14:02 -04:00
Matt Martz
5a254e6303 Replace tabbed indentation with spaces for mysql_db module 2015-07-01 09:39:18 -05:00
ToBeReplaced
5e82f7e11e Make ALL_IN_SCHEMA for tables affect views
ALL TABLES is considered to include views, so we must check for reltypes
'r' and 'v', not just 'r'. This bug was introduced due to using a
custom, backwards-compatible version of "ALL TABLES IN SCHEMA".
2015-06-27 11:41:01 -06:00
Bryan Fleming
3b4b065315 fixes #1120 - privileges using columns 2015-06-22 15:09:07 -05:00
acaveroc
e7876df99f Add version_added and type of parameter 2015-06-18 09:43:32 +02:00
acaveroc
7d2a5965bd Assorted minor bug fixes
- Modified data type for port definition from string to integer
- Modified login_host default value for compatibilize with port definition according with MySQL Documentation (https://dev.mysql.com/doc/refman/5.0/en/connecting.html)
2015-06-17 13:53:08 +02:00
acaveroc
5b84b0d136 Add port definition support for mysql_vars module 2015-06-17 10:37:47 +02:00
Sergei Antipov
5465fb8d4f mysql_user | Hide password 2015-06-16 10:08:06 +06:00
Greg DeKoenigsberg
2a5f0bde87 Proper author info for all remaining modules 2015-06-15 15:53:30 -04:00
Louis-Michel Couture
d60d493916 Update example to remove outdated information 2015-06-10 01:56:32 -04:00
Toshio Kuratomi
c700993dd5 Fix a problem introduced with #1101 and optimize privilege handling
* If a db user belonged to a role which had a privilege, the user would
  not have the privilege added as the role gave the appearance that the
  user already had it.  Fixed to always check the privileges specific to
  the user.
* Make fewer db queries to determine if privileges need to be changed
  and change them (was four for each privilege.  Now two for each object
  that has a set of privileges changed).
2015-06-01 15:59:26 -07:00
Toshio Kuratomi
8c10cc20ec Expand tildes and vars in the config file path 2015-06-01 15:24:15 -07:00
Will Thames
167e7c2b81 Perform privilege grants/revokes only when required
Use `has_table_privileges` and `has_database_privileges`
to test whether a user already has a privilege before
granting it, or whether a user doesn't have  a privilege
before revoking it.
2015-06-01 15:15:22 -07:00
Toshio Kuratomi
30fc6f03d6 Allow playbook specified login_user and login_password to override config file settings 2015-06-01 14:53:42 -07:00
Toshio Kuratomi
f8d8af17cd Use a list comprehension instead of map and lambda 2015-05-29 18:55:32 -07:00
Toshio Kuratomi
474b731bcc Merge pull request #1036 from shr3kst3r/strip_spaces
Strip spaces around MySQL privileges before comparing to valid privileges
2015-05-29 18:49:03 -07:00
Toshio Kuratomi
2b5e932cfb Fix for the new import code when password is empty 2015-05-27 20:28:19 -07:00
Brian Coca
7a6f532020 Merge pull request #1423 from ercpe/mysql_db-debugging
Improved output of mysql_db plugin
2015-05-26 18:59:00 -04:00
Jonathan Mainguy
db9ab9b262 escapeds changes
fixed merge conflict

remove uneeded regexs

arrays
2015-05-26 18:23:51 -04:00
Robin Miller
cda7a9be15 Replaced lambda functions with list comprehensions. 2015-05-26 12:56:08 -05:00
Robin Miller
74b7ce9dcf Only revoke actually granted permissions, not 'ALL'.
This prevents errors when the login_user does not have 'ALL'
permissions, and the 'priv' value contains fewer permissions than are
held by an existing user. This is particularly an issue when using an
Amazon Web Services RDS instance, as there is no (accessible) user with
'ALL' permissions on *.*.
2015-05-26 12:56:08 -05:00
Johann Schmitz
8892aa2bf4 Improved output of mysql_db plugin
Show error number and error description on connect error to ease debugging.
2015-05-26 16:13:40 +02:00
Toshio Kuratomi
d74187438f Merge pull request #1417 from fdupoux/mysql-db-use-python-pipelines
Decompress mysql dumps on the fly using python subprocess …
2015-05-25 18:15:54 -07:00
fdupoux
380b122d5a Refactoring to avoid duplication of code which manages the decompression of database dumps in various formats 2015-05-25 20:22:49 +01:00
fdupoux
f634c10636 Simplify code which prepares the decompression command 2015-05-25 20:10:12 +01:00
Toshio Kuratomi
32e609720a Refactor dump compression and use get_bin_path for finding the compressors 2015-05-25 09:22:08 -07:00
fdupoux
1e2ce363f7 Decompress mysql dumps on the fly using python subprocess during an import to simplify operation 2015-05-25 13:40:15 +01:00
Jonathan Mainguy
5a22f052b4 changes hostname to lowercase 2015-05-21 09:32:12 -04:00
Toshio Kuratomi
0c04a54f67 Merge pull request #1368 from ansible/postgresql-user-account-vs-role-fix
Fix a problem introduced with #1101 and optimize privilege handling
2015-05-19 14:17:35 -07:00
Toshio Kuratomi
c9b17136e4 Fix a problem introduced with #1101 and optimize privilege handling
* If a db user belonged to a role which had a privilege, the user would
  not have the privilege added as the role gave the appearance that the
  user already had it.  Fixed to always check the privileges specific to
  the user.
* Make fewer db queries to determine if privileges need to be changed
  and change them (was four for each privilege.  Now two for each object
  that has a set of privileges changed).
2015-05-19 12:57:06 -07:00