Commit Graph

996 Commits (939294391562585218e07fc7ae0eb9f1efe588ff)

Author SHA1 Message Date
Shinichi TAMURA cb94edd17f Added timezone module (#2414) 9 years ago
Brian Coca a28d7a00b8 added 'seen' type to debconf 9 years ago
Dag Wieers e49858b09e sefcontext: New module to manage SELinux file context mappings (semanage fcontext) (#2221)
New SELinux module sefcontext to set SELinux file context mappings

This module implements `semanage fcontext` in an idempotent way.
It supports check-mode and diff-mode.
9 years ago
Hrishikesh Barua a95a1a2e08 Fix for #2366 removed print statement (#2375) 9 years ago
Toshio Kuratomi d1174cc8b7 Only import get_exception once in locale_gen.py 9 years ago
Chris Weber 9e277aabb0 Fixed modules/system py files for 2.4 to 3.5 exceptions (#2367) 9 years ago
Elena Washington 3ca06bf1c8 iptables: option to configure Source NAT (#2292)
* Clean up trailing whitespace

* Add `--to-source` option to allow Source NAT (fix for #2291)
9 years ago
Brian Coca ecee427cbc added note about behaviour change in 2.2 9 years ago
Leo Antunes d54905ecee Allow multiple keys per host + minor improvements (#716)
* known_hosts: clarify key format in documentation

Add a small clarification to the documentation about the format of the
"key" parameter.
Should make #664 less of a issue for newcomers.

* known_hosts: normalize key entry to simplify input

Keys are normalized before comparing input with present keys. This
should make it easier to deal with some corner cases, such as having a
hashed entry for some host and trying to add it as non-hashed.

* known_hosts: allow multiple entries per host

In order to support multiple key types and allow the installed ssh
version to decide which is more secure, the module now only overwrites
an existing entry in known_hosts if the provided key is of the same
type.
Old keys of different types must be explicitly removed. Setting
state to "absent" and providing no key will remove all entries for the
host.
9 years ago
Brian Coca 29be1310e1 add missing author info 9 years ago
Michael Scherer c8864c3220 Use a python3 compatible notation for octal (#2238) 9 years ago
Daniel Vigueras 735c1b6219 Add insert support to iptables. (#1180)
Add insert support to iptables.
9 years ago
Adrian Likins 240afc0344 Merge pull request #2146 from ke3vin/interfacezone
Fix the interface handling code to allow immediate changes.  Also fixes switching an interface between zones.
9 years ago
Adrian Likins ae6b3ac71d Merge pull request #2225 from rusaksoft/iptables-add-icmp-type
Iptables add icmp type
9 years ago
Dag Wieers 7618fd8749 Fix check-mode incorrectly returning changed (#2220)
The lvol module has a different logic in check-mode for knowing when a change is induced. And this logic is *only* based on a size check. However during a normal run, it is the lvreduce or lvextend tool that decides when a change is performed (or when the requested and existing sizes differ). So while in check-mode the module reports a change, in real run-mode it does not in fact changes anything an reports ok.

One solution would be to implement the exact size-comparison logic that is implemented in lvextend and lvreduce, but we opted to use the `--test` option to each command to verify if a change is induced or not. In effect both check-mode and run-mode use the exact same logic and conclusion.
9 years ago
Pavel Samokha a0566037b4 iptables module - icmp-type better doc style 9 years ago
Pavel Samokha 7092118119 fix icmp-type 9 years ago
Pavel Samokha 747f6f6736 iptables module - add icmp_type 9 years ago
Yannig bbd53572af New lvol option: shrink. (#2135)
If shrink is set to false and size is lower than current lv size, dont try to shrink logical volume.
9 years ago
Michael Scherer 557d37d3f1 Use type='path' rather than str, so path is expanded correctly 9 years ago
Kevin Hildebrand 9f2bc2853d Fix the interface handling code to allow permanent and non-permanent operations.
Also avoid using add_interface because it breaks in cases where the interface is already bound to a different zone.
9 years ago
Brian Coca fbd00675f0 updated version added for pvs 9 years ago
Matt Davis 238af47a9d Merge pull request #2007 from p53/devel
Added pvs parameter to lvol module
9 years ago
Toshio Kuratomi 71d83b77bc Recategorize git_config and shift version to 2.1 9 years ago
Brian Coca 09a1015bd7 updated version added 9 years ago
Matthew d91baee7c9 Add git_config module (#1945)
* Add git_config module

This module can be used for reading and writing git configuration at all
three scopes (local, global and system). It supports --diff and --check
out of the box.

This module is based off of the following gist:
https://gist.github.com/mgedmin/b38c74e2d25cb4f47908
I tidied it up and added support for the following:
- Reading values on top of writing them
- Reading and writing values at any scope
The original author is credited in the documentation for the module.

* Respond to review feedback

- Improve documentation by adding choices for parameters, requirements
  for module, and add missing description for scope parameter.
- Fail gracefully when git is not installed (followed example of puppet
  module).
- Remove trailing whitespace.

* Change repo parameter to type 'path'

This ensures that all paths are automatically expanded appropriately.

* Set locale to C before running commands to ensure consistent error messages

This is important to ensure error message parsing occurs correctly.

* Adjust comment
9 years ago
René Moser 344dff4350 docs: fix make docs (#2107) 9 years ago
Chris Lamb 8d7d070201 system/ufw.py: Add security warning re. removing ufw application prof…
It's not particularly obvious that removing an application will remove it
from ufw's own state, potentially leaving ports open on your box if you
upload your configuration.

Whilst this applies to a lot of things in Ansible, firewall rules might
cross some sort of line that justifies such a warning in his instance.

Signed-off-by: Chris Lamb <chris@chris-lamb.co.uk>
9 years ago
p53 706cbf69ca Add pvs parameter to documentation
Add pvs parameter to documentation
9 years ago
codehopper-uk aa29a4fd9c Basic ability to set masquerade options from ansible, according to current code design/layout (mostly) (#2017)
* Support for masquerade settings

Ability to enable and disable masquerade settings from ansible via:
- firewalld: mapping=masquerade state=disabled permanent=true zone=dmz

Placeholder added (mapping) to support masquerade and port_forward
choices initially - port_forward not implemented yet.

* Permanent and Immediate zone handling differentiated

* Corrected naming abstraction for masquerading functionality

Removed mapping tag with port_forward choices - not applicable!

* Added version info for new masquerade option

Pull Request #2017 failing due to missing version info
9 years ago
Pavol Ipoth 14057da87c Removing, unwanted pull 9 years ago
Pavol Ipoth e3ca2c7aeb Adding new ansible module lvol_cache 9 years ago
Pavol Ipoth 2be58bf100 Merge branch 'devel' of https://github.com/ansible/ansible-modules-extras into devel 9 years ago
Michael Scherer ff74fc0072 Remove the +x from crypttab and cronvar (#2039)
While this change nothing, it is better to enforce consistency
9 years ago
Jasper Lievisse Adriaanse 2b8debbc2b Sprinkle some LANG/LC_* where command output is parsed (#2019) 9 years ago
Michael Scherer 2dbfdaa88b Remove dead code (#1303)
The review on https://github.com/ansible/ansible-modules-extras/pull/1303
show the problem was already fixed, so we just need to remove the
code.
9 years ago
Pavol Ipoth 7be55e188a Fixes #2008 Lvol module is not indempodent for cache lv's 9 years ago
Pavol Ipoth ac9a48ad1e Added pvs parameter to lvol module 9 years ago
kubilus1 773d402eac Unchecked index causes IndexError. 9 years ago
Monty Taylor 38c8fec277 Merge pull request #1149 from Jmainguy/puppet_stdout
Enable stdout and stderr on sucessful runs, making show_diff useable
9 years ago
René Moser fc79c8820e Merge pull request #1971 from insom/devel
Add `to_destination` parameter to iptables
9 years ago
Vlad Gusev f1175693f6 system/puppet: add --tags parameter (#1916)
* system/puppet: add --tags parameter

--tags [1] is used to apply a part of the node’s catalog.

In puppet:
puppet agent --tags update,monitoring

In ansible:
puppet: tags=update,monitoring

[1] https://docs.puppetlabs.com/puppet/latest/reference/lang_tags.html#restricting-catalog-runs

* Add example of tag usage.

* system/puppet: add list type for a tags dict.
9 years ago
Aaron Brady e2138c7e14 Add `to_destination` parameter 9 years ago
Chulki Lee f3c168594a osx_defaults: fix datetime
Fix #1742
9 years ago
René Moser daddc7caf4 Merge pull request #1478 from m0/firewalld_interface
Extends firewalld module with ability to add/remove interfaces to/from zones
9 years ago
David Hocky 031f98e86c fix dscp marking documentation in iptables module 9 years ago
René Moser 241dba1ee7 Merge pull request #1555 from LuckyGeck/devel
Added reject_with and uid_owner support to iptables module
9 years ago
Linus Unnebäck 7def4b01f5 make: move down ansible import 9 years ago
Linus Unnebäck b328feccb1 make: add empty return docs 9 years ago
Linus Unnebäck a0aef208b6 module: system/make 9 years ago