You cannot select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
ansible/lib/ansible/modules/web_infrastructure/ansible_tower
James Cassell bc4ef99533 standardize TLS connection properties (#54315)
* openstack: standardize tls params

* tower: tower_verify_ssl->validate_certs

* docker: use standard tls config params

- cacert_path -> ca_cert
- cert_path -> client_cert
- key_path -> client_key
- tls_verify -> validate_certs

* k8s: standardize tls connection params

- verify_ssl -> validate_certs
- ssl_ca_cert -> ca_cert
- cert_file -> client_cert
- key_file -> client_key

* ingate: verify_ssl -> validate_certs

* manageiq: standardize tls params

- verify_ssl -> validate_certs
- ca_bundle_path -> ca_cert

* mysql: standardize tls params

- ssl_ca -> ca_cert
- ssl_cert -> client_cert
- ssl_key -> client_key

* nios: ssl_verify -> validate_certs

* postgresql: ssl_rootcert -> ca_cert

* rabbitmq: standardize tls params

- cacert -> ca_cert
- cert -> client_cert
- key -> client_key

* rackspace: verify_ssl -> validate_certs

* vca: verify_certs -> validate_certs

* kubevirt_cdi_upload: upload_host_verify_ssl -> upload_host_validate_certs

* lxd: standardize tls params

- key_file -> client_key
- cert_file -> client_cert

* get_certificate: ca_certs -> ca_cert

* get_certificate.py: clarify one or more certs in a file

Co-Authored-By: jamescassell <code@james.cassell.me>

* zabbix: tls_issuer -> ca_cert

* bigip_device_auth_ldap: standardize tls params

- ssl_check_peer -> validate_certs
- ssl_client_cert -> client_cert
- ssl_client_key -> client_key
- ssl_ca_cert -> ca_cert

* vdirect: vdirect_validate_certs -> validate_certs

* mqtt: standardize tls params

- ca_certs -> ca_cert
- certfile -> client_cert
- keyfile -> client_key

* pulp_repo: standardize tls params

remove `importer_ssl` prefix

* rhn_register: sslcacert -> ca_cert

* yum_repository: standardize tls params

The fix for yum_repository is not straightforward since this module is
only a thin wrapper for the underlying commands and config.  In this
case, we add the new values as aliases, keeping the old as primary,
only due to the internal structure of the module.

Aliases added:
- sslcacert -> ca_cert
- sslclientcert -> client_cert
- sslclientkey -> client_key
- sslverify -> validate_certs

* gitlab_hook: enable_ssl_verification -> hook_validate_certs

* Adjust arguments for docker_swarm inventory plugin.

* foreman callback: standardize tls params

- ssl_cert -> client_cert
- ssl_key -> client_key

* grafana_annotations: validate_grafana_certs -> validate_certs

* nrdp callback: validate_nrdp_certs -> validate_certs

* kubectl connection: standardize tls params

- kubectl_cert_file -> client_cert
- kubectl_key_file -> client_key
- kubectl_ssl_ca_cert -> ca_cert
- kubectl_verify_ssl -> validate_certs

* oc connection: standardize tls params

- oc_cert_file -> client_cert
- oc_key_file -> client_key
- oc_ssl_ca_cert -> ca_cert
- oc_verify_ssl -> validate_certs

* psrp connection: cert_trust_path -> ca_cert

TODO: cert_validation -> validate_certs (multi-valued vs bool)

* k8s inventory: standardize tls params

- cert_file -> client_cert
- key_file -> client_key
- ca_cert -> ca_cert
- verify_ssl -> validate_certs

* openshift inventory: standardize tls params

- cert_file -> client_cert
- key_file -> client_key
- ca_cert -> ca_cert
- verify_ssl -> validate_certs

* tower inventory: verify_ssl -> validate_certs

* hashi_vault lookup: cacert -> ca_cert

* k8s lookup: standardize tls params

- cert_file -> client_cert
- key_file -> client_key
- ca_cert -> ca_cert
- verify_ssl -> validate_certs

* laps_passord lookup: cacert_file -> ca_cert

* changelog for TLS parameter standardization
7 years ago
..
__init__.py Ansible Tower organization module (#20355) 9 years ago
tower_credential.py tower_credential: Add parameter vault_id (#53400) 7 years ago
tower_credential_type.py standardize TLS connection properties (#54315) 7 years ago
tower_group.py tower: Handle AuthError (#53377) 7 years ago
tower_host.py tower: Handle AuthError (#53377) 7 years ago
tower_inventory.py tower: Handle AuthError (#53377) 7 years ago
tower_inventory_source.py standardize TLS connection properties (#54315) 7 years ago
tower_job_cancel.py tower: Handle AuthError (#53377) 7 years ago
tower_job_launch.py tower: Handle AuthError (#53377) 7 years ago
tower_job_list.py tower: Handle AuthError (#53377) 7 years ago
tower_job_template.py tower: Handle AuthError (#53377) 7 years ago
tower_job_wait.py tower: Handle AuthError (#53377) 7 years ago
tower_label.py tower: Handle AuthError (#53377) 7 years ago
tower_notification.py tower: Handle AuthError (#53377) 7 years ago
tower_organization.py tower: Handle AuthError (#53377) 7 years ago
tower_project.py tower: Handle AuthError (#53377) 7 years ago
tower_receive.py tower: Handle AuthError (#53377) 7 years ago
tower_role.py tower: Handle AuthError (#53377) 7 years ago
tower_send.py tower: Handle AuthError (#53377) 7 years ago
tower_settings.py tower_settings: "get" isn't implemented, "value" parameter is required (#54028) 7 years ago
tower_team.py tower: Handle AuthError (#53377) 7 years ago
tower_user.py tower: Handle AuthError (#53377) 7 years ago
tower_workflow_launch.py tower: Handle AuthError (#53377) 7 years ago
tower_workflow_template.py tower: Handle AuthError (#53377) 7 years ago