Commit Graph

26429 Commits (fda13deb0839451c541a38a3f0e5f4fc75cfcc80)
 

Author SHA1 Message Date
Dreamcat4 572b6669c4 fix: win-scheduled-task strict-mode fixes 8 years ago
Laurent Mazuel 8973ecae5b Add user-agent information for analytics 8 years ago
Andre Price 28b0a52245 Get failed deployments when create fails also 8 years ago
Laurent Mazuel 098a4c9ee4 Updated to use ServicePrincipalCredentials class and get rid of requests 8 years ago
Laurent Mazuel ee6fc470db Fixes after Travis feedback 8 years ago
Laurent Mazuel 771c40952b Py2.6 compatible + minor fixes 8 years ago
Laurent Mazuel 96ea53d1f2 Fix YAML documentation 8 years ago
Laurent Mazuel 5d5cac57ff Add update from @obsoleted 8 years ago
Laurent Mazuel 801c44df9e Azure plugin using Azure Python SDK 2.0.0rc1 8 years ago
David Justice a4cc8dfa2c add azure resource manager template deployment module 8 years ago
Rob 1d01d232a9 New module - ec2_snapshot_facts (#1088) 8 years ago
Adam Romanek faa3c54531 Fixed #237 - improved embedded JSON support handling (#1530) 8 years ago
Victor Costan e5742c3a47 amazon/GUIDELINES.md: Fix copy-paste typo (#2060) 8 years ago
jhawkesworth@users.noreply.github.com b08b1cf2f3 Documentation improvements 8 years ago
jhawkesworth@users.noreply.github.com aaa9541abd Further fixes to support binary data. Added boolean return values and return documentation. 8 years ago
jhawkesworth@users.noreply.github.com c2ca0a9e93 adding the ability to manage binary registry data 8 years ago
Robin Roth 5464b71561 Zypper repository rewrite (#1990)
* Remove support for ancient zypper versions

Even SLES11 has zypper 1.x.

* zypper_repository: don't silently ignore repo changes

So far when a repo URL changes this got silently ignored (leading to
incorrect package installations) due to this code:

    elif 'already exists. Please use another alias' in stderr:
        changed = False

Removing this reveals that we correctly detect that a repo definition
has changes (via repo_subset) but don't indicate this as change but as a
nonexistent repo. This makes us currenlty bail out silently in the above
statement.

To fix this distinguish between non existent and modified repos and
remove the repo first in case of modifications (since there is no force
option in zypper to overwrite it and 'zypper mr' uses different
arguments).

To do this we have to identify a repo by name, alias or url.

* Don't fail on empty values

This unbreaks deleting repositories

* refactor zypper_repository module

* add properties enabled and priority
* allow changing of one property and correctly report changed
* allow overwrite of multiple repositories by alias and URL
* cleanup of unused code and more structuring

* respect enabled option

* make zypper_repository conform to python2.4

* allow repo deletion only by alias

* check for non-existant url field and use alias instead

* remove empty notes and aliases

* add version_added for priority and overwrite_multiple

* add version requirement on zypper and distribution

* zypper 1.0 is enough and exists

* make suse versions note, not requirement

based on comment by @alxgu
8 years ago
Michael Scherer 3d21f7c5a4 Mark the token as sensitive, since it shouldn't be printed (#2043) 8 years ago
Jiri Tyr 48c20dd981 Describing the _none_ value of the proxy option (#2053) 8 years ago
Jay Jahns 09aa205209 Add Maintenance Mode support for VMware (#1754)
* add vmware maintenance mode support

* changed version number in documentation

* updated version_added to 2.0 since CI is failing

* changed version to 2.0 due to CI - error asking for 2.1

* added RETURN

* updated formatting of return values and added some to clarify actions taken
8 years ago
codehopper-uk e2e0f51739 Basic ability to set masquerade options from ansible, according to current code design/layout (mostly) (#2017)
* Support for masquerade settings

Ability to enable and disable masquerade settings from ansible via:
- firewalld: mapping=masquerade state=disabled permanent=true zone=dmz

Placeholder added (mapping) to support masquerade and port_forward
choices initially - port_forward not implemented yet.

* Permanent and Immediate zone handling differentiated

* Corrected naming abstraction for masquerading functionality

Removed mapping tag with port_forward choices - not applicable!

* Added version info for new masquerade option

Pull Request #2017 failing due to missing version info
8 years ago
Jordan Cohen e07cc7d9a2 idempotency fix (#2024) 8 years ago
Karim Boumedhel e57ef71ed3 Add cloudinit support to ovirt.py module 8 years ago
Michael Scherer 567bcf1341 Do not leak password by error for ovirt module (#1991) 8 years ago
Michael Scherer 5d2063aa38 Remove the +x from crypttab and cronvar (#2039)
While this change nothing, it is better to enforce consistency
8 years ago
Michael Scherer d79c427722 Set api_key as no_log, since that's likely something that should be kept private (#2038) 8 years ago
Fernando José Pando 94c5e16fe3 Add SQS queue policy attachment functionality (#1716)
* Add SQS queue policy attachment functionality

SQS queue has no attribute 'Policy' until one is attached, so this special
case must be handled uniquely

SQS queue Policy can now be passed in as json
8 years ago
Michael Scherer ad54180d17 Do not use a default value for -n parameter, fix #1400 (#1417) 8 years ago
Michael Scherer a7b843ca80 Use type=path for pem_file, since that's a file (#1934) 8 years ago
Evgeni Golov 3bbef8dc24 fix handling of config options that share the same prefix
container_config:
      - "lxc.network.ipv4.gateway=auto"
      - "lxc.network.ipv4=192.0.2.1"

might try to override lxc.network.ipv4.gateway in the second entry as both
start with "lxc.network.ipv4".
use a regular expression to find a line that contains (optional) whitespace
and an = after the key.

Signed-off-by: Evgeni Golov <evgeni@golov.de>
8 years ago
Evgeni Golov 317ca77193 strip whitespace from key and value before inserting it into the config
before the following would produce four entries:

    container_config:
      - "lxc.network.flags=up"
      - "lxc.network.flags =up"
      - "lxc.network.flags= up"
      - "lxc.network.flags = up"

let's strip the whitespace and insert only one "lxc.network.flags = up"
into the final config

Signed-off-by: Evgeni Golov <evgeni@golov.de>
8 years ago
Michael Scherer b4c3d32366 Mark conf_file as a path, for various user expansion 8 years ago
Christopher M. Fuhrman 310b7ce3d8 pkgin: Fix bad regexp which did not catch packages such as p5-SVN-Notify
The previous version of my regexp did not take into account packages
such as 'p5-Perl-Tidy' or 'p5-Test-Output', so use a greedy match up to
the last occurrance of '-' for matching the package.  This regex has
been extensively tested using all packages as provided by pkgsrc-2016Q1[1].

Footnotes:
[1]  http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/?only_with_tag=pkgsrc-2016Q1
8 years ago
Michael Scherer 7c19002f34 Fix arguments for pushover module
Since user_key and app_token are used for authentication, I
suspect both of them should be kept secret.

According to the API manual, https://pushover.net/api
priority go from -2 to 2, so the argument should be constrained.
8 years ago
Ricardo Carrillo Cruz eda5e2f571 Add os_project_facts module
This module gathers facts about OpenStack projects
8 years ago
Jasper Lievisse Adriaanse 0fb01e45fb Sprinkle some LANG/LC_* where command output is parsed (#2019) 8 years ago
Jasper Lievisse Adriaanse 8913f1a11d Tweak and extend the pkgin module
- make path to pkgin a global and stop passing it around; it's not going
  to change while ansible is running
- add support for several new options:
  * upgrade
  * full_upgrade
  * force
  * clean
- allow for update_cache to be run in the same task as upgrading/installing
  packages instead of needing a separate task for that
8 years ago
Jens Carl cf804fb0b8 Fix code example (#2018) 8 years ago
Werner Dijkerman 1bcc43ca4e New module for creating gitlab projects (#968) 8 years ago
Werner Dijkerman 37b7c1d0cd New module for creating gitlab groups (#967) 8 years ago
Werner Dijkerman 22c62debb5 New module for creating gitlab users (#966) 8 years ago
René Moser 5197654437 cloudstack, cs_firewall: fix network not found error in return results (#2006)
Only a small issue in results.

In case of type is ingress, we rely on ip address, but in results we also return the network.
Resolving the ip address works without zone params. If the ip address is not located in the default zone and zone param is not set,
the network won't be found because default zone was used for the network query listing.

However since network param is not used for type ingress we skip the return of the network in results.
8 years ago
René Moser d7e8dd22df cloudstack: cs_instance: fix template not found (#2005)
Let users decide which filter should be used to find the template.
8 years ago
Rene Moser b5e4edd9f9 cloudstack: cs_template: fix state=extracted
* url arg is optional but we enforced it
* url is in a required together, but args only relevant while registering
8 years ago
Rene Moser 1b99ae4ac1 cloudstack: fix doc, display_text not required 8 years ago
Rene Moser 871f586378 cloudstack: cs_template: fix cross_zones template removal 8 years ago
David Shrewsbury b928ffb5ac New OpenStack module os_port_facts (#1986) 8 years ago
Michael Scherer 1d1fba5476 Mark token as no_log, since that's used for auth (#2011) 8 years ago
Andrea Scarpino b4064a352e The enable parameter is a boolean, then convert to a boolean. (#1607)
At the moment, this only works when 'enable' is equals to 'yes' or 'no'.

While I'm on it, I also fixed a typo in the example and added a required
parameter.
8 years ago
Kamil Szczygieł 26fe35fd0c VMware datacenter module shouldn't hold pyvmomi context in Ansible module object (#1568)
* VMware datacenter module rewritten to don't hold pyvmomi context and objects in Ansible module object

fixed exceptions handling

added datacenter destroy result, moved checks

changed wrong value

wrong value again... need some sleep

* check_mode fixes

* state defaults to present, default changed to true

* module check fixes
8 years ago