1
0
Fork 0
mirror of https://github.com/ansible-collections/community.general.git synced 2024-09-14 20:13:21 +02:00
Commit graph

25607 commits

Author SHA1 Message Date
Abhijeet Kasurde
db03f88b63
distribution: Add support for Cumulus Linux (#52309)
* Refactored code
* Added support for Cumulus Linux 2.5.4
* Added support for Cumulus Linux 3.7.3
* Test added

Fixes: #29969

Signed-off-by: Abhijeet Kasurde <akasurde@redhat.com>
2019-02-15 22:30:51 +05:30
Dag Wieers
677c04c01d
Sanity fixes to parameter types (#52325) 2019-02-15 16:58:58 +01:00
Timo Runge
47190088b4 module_utils/mysql: Fixing unexpected keyword argument 'cursorclass' error after migratio… (#47809)
* Fixing unexpected keyword argument 'cursorclass' error after migration from MySQLdb to PyMySQL

* Adoptions for mysql.py as suggested by felixfontein.

* Adding changelog fragment.
2019-02-15 15:38:01 +00:00
David Soper
958653e282 Cisco Intersight module_utils and intersight_facts module (#51309)
* Cisco Intersight module_utils and intersight_facts module

* Add RETURN information and fix pylint, import, and pep8 issues.

* Review updates for specifying type of params/returns and not polluting ansible_facts.

* BSD one line license, validate_certs used, urls.fetch_urls replaces requests
2019-02-15 16:32:29 +01:00
Dag Wieers
c2fb581414 Fix various sonarcloud issues
This fixes various reported bugs through sonarcloud at:
https://sonarcloud.io/project/issues?id=Rodney-Reis_ansible&resolved=false&types=BUG
2019-02-15 07:19:04 -08:00
Dag Wieers
f9ab9b4d68 Assorted pylint fixes 2019-02-15 06:54:47 -08:00
Andrey Klychkov
8e0f95951d Module postgresql_idx: added ci tests, new params, returned values, code refactoring (#52230)
* postgresql_idx: ci tests, refactoring, return values

* postgresql_idx: ci tests, new params, return values

* postgresql_idx: ci tests, fix

* postgresql_idx: ci tests, fix

* postgresql_idx: ci tests, fix

* postgresql_idx: ci tests, fix

* postgresql_idx: ci tests, fix

* postgresql_idx: ci tests, fix

* postgresql_idx: ci tests, fix

* postgresql_idx: ci tests, fix

* postgresql_idx: ci tests, fix

* New module postgresql_table - fix tests

* New module postgresql_table - fix tests

* New module postgresql_table - fix tests

* New module postgresql_table - fix state choices order
2019-02-15 15:38:56 +01:00
Miguel Angel Muñoz González
b0606213dc Fortinet's FortiOS fortios_firewall_schedule_recurring (#52078) 2019-02-15 13:15:00 +00:00
Miguel Angel Muñoz González
db779e0fc8 Fortinet's FortiOS Firewall Schedule OneTime (#52076) 2019-02-15 13:14:32 +00:00
Miguel Angel Muñoz González
462155e7cf Fortinet's FortiOS log syslogd2 filter (#52259)
* Fortinet's FortiOS log syslogd2 filter

* Avoid null choices
2019-02-15 13:11:52 +00:00
Miguel Angel Muñoz González
f3ac33f6af Fortinet's FortiOS log setting (#52258) 2019-02-15 13:11:25 +00:00
Miguel Angel Muñoz González
7dc7d2cd56 Fortinet's FortiOS log null device setting (#52257) 2019-02-15 13:10:59 +00:00
Miguel Angel Muñoz González
e16f81e53e Fortinet's FortiOS log null device filter (#52256)
* Fortinet's FortiOS log null device filter

* Avoid null choices
2019-02-15 13:10:26 +00:00
Miguel Angel Muñoz González
66844328b7 Fortinet's FortiOS log memory global setting (#52251) 2019-02-15 13:09:47 +00:00
Miguel Angel Muñoz González
e4b70c0cdf Fortinet's FortiOS log memory setting (#52255) 2019-02-15 13:06:56 +00:00
Miguel Angel Muñoz González
ac6b5ab4d0 Fortinet's FortiOS log memory filter (#52250)
* Fortinet's FortiOS log memory filter

* Avoid null choices
2019-02-15 13:06:29 +00:00
Miguel Angel Muñoz González
3eba6363ff Fortinet's FortiOS log fortiguard override filter (#52168)
* Fortinet's FortiOS log fortiguard override filter

* Avoid null choices
2019-02-15 13:06:05 +00:00
Miguel Angel Muñoz González
8e6cf35a7e Fortinet's FortiOS system interface (#52247) 2019-02-15 13:03:44 +00:00
Miguel Angel Muñoz González
6592ac3421 Fortinet's FortiOS log fortiguard filter (#52167)
* Fortinet's FortiOS log fortiguard filter

* Avoid null choices
2019-02-15 13:03:10 +00:00
Miguel Angel Muñoz González
683a463580 Fortinet's FortiOS ips rule (#52121)
* Fortinet's FortiOS ips rule

* Avoid null choices

* Avoid null choices
2019-02-15 13:02:42 +00:00
Miguel Angel Muñoz González
98f122528f Fortinet's FortiOS log custom field (#52148) 2019-02-15 13:02:24 +00:00
Miguel Angel Muñoz González
49b21b64a0 Fortinet's FortiOS log disk filter (#52149)
* Fortinet's FortiOS log disk filter

* Avoid null choices
2019-02-15 13:02:03 +00:00
Miguel Angel Muñoz González
31da561d4a Fortinet's FortiOS log disk setting (#52150) 2019-02-15 12:41:01 +00:00
Miguel Angel Muñoz González
018db5e0c0 Fortinet's FortiOS log eventfilter (#52151) 2019-02-15 12:40:47 +00:00
Miguel Angel Muñoz González
769ddc44c3 Fortinet's FortiOS log fortianalyzer2 filter (#52157)
* Fortinet's FortiOS log fortianalyzer2 filter

* Avoid null choices
2019-02-15 12:40:26 +00:00
Miguel Angel Muñoz González
962741400b Fortinet's FortiOS log fortianalyzer filter (#52162)
* Fortinet's FortiOS log fortianalyzer filter

* Avoid null choices
2019-02-15 12:39:59 +00:00
Miguel Angel Muñoz González
405ce0bddf Fortinet's FortiOS log fortianalyzer override filter (#52163)
* Fortinet's FortiOS log fortianalyzer override filter

* Avoid null choices
2019-02-15 12:39:43 +00:00
Miguel Angel Muñoz González
5d6a18df99 Fortinet's FortiOS log syslogd2 setting (#52261) 2019-02-15 12:39:22 +00:00
Miguel Angel Muñoz González
dc81c9a5ee Fortinet's FortiOS log syslogd3 setting (#52264) 2019-02-15 12:39:01 +00:00
Miguel Angel Muñoz González
5065e0810d Fortinet's FortiOS log syslogd4 filter (#52265)
* Fortinet's FortiOS log syslogd4 filter

* Avoid null choices
2019-02-15 12:34:56 +00:00
Miguel Angel Muñoz González
46fbc6b329 Fortinet's FortiOS log syslogd4 setting (#52266) 2019-02-15 12:33:57 +00:00
Miguel Angel Muñoz González
d413e322a9 Fortinet's FortiOS log syslogd filter (#52267)
* Fortinet's FortiOS log syslogd filter

* Avoid null choices
2019-02-15 12:28:43 +00:00
Miguel Angel Muñoz González
505a9b25b3 Fortinet's FortiOS log syslogd override filter (#52268)
* Fortinet's FortiOS log syslogd override filter

* Avoid null choices
2019-02-15 12:26:22 +00:00
Miguel Angel Muñoz González
356978fbae Fortinet's FortiOS log syslogd override setting (#52269) 2019-02-15 12:25:33 +00:00
Miguel Angel Muñoz González
85ad67e245 Fortinet's FortiOS log syslogd setting (#52270) 2019-02-15 12:25:15 +00:00
Miguel Angel Muñoz González
747d96a8e2 Fortinet's FortiOS log threat weight (#52271) 2019-02-15 12:25:02 +00:00
Miguel Angel Muñoz González
256f492a19 Fortinet's FortiOS log webtrends setting (#52273) 2019-02-15 12:24:37 +00:00
Miguel Angel Muñoz González
73e82e8250 Fortinet's FortiOS report layout (#52294) 2019-02-15 12:23:09 +00:00
Miguel Angel Muñoz González
644545172f Fortinet's FortiOS report setting (#52295) 2019-02-15 12:22:54 +00:00
Miguel Angel Muñoz González
b0cd22cbb8 Fortinet's FortiOS report style (#52296) 2019-02-15 12:22:36 +00:00
Miguel Angel Muñoz González
25a9f88d74 Fortinet's FortiOS report theme (#52298) 2019-02-15 12:22:27 +00:00
Dag Wieers
25323155d2 doc_fragments: Clean up parameter types (cloud) (#52177)
* module_utils: Clean up parameter types (cloud)

This PR includes:

- Parameter types added
- Copyright format fixes
- Short license statement
- Description fixes (only for a few files, then I stopped :-))

* More cloud stuff

* Fix reported issue

* Fix quotes

* Use correct type

* Fix quotes

* Fix quotes

* Fix quotes

* Fix typo

* Fix boolean
2019-02-15 12:21:20 +00:00
Dag Wieers
203caf2570
Fix module issues (#52209) 2019-02-15 12:57:20 +01:00
Dag Wieers
cedd9d9926
crypto: Fix known issues in modules (#52302)
* crypto: Fix known issues in modules

This fixes a few issues reported by 'validate-modules'.

* Fix whitespace
2019-02-15 11:46:44 +01:00
Dag Wieers
9c1033422b doc_fragments: Clean up parameter types (network) (#52176)
* module_utils: Clean up parameter types

This PR includes:
- Parameter types added
- Copyright format fixes
- Short license statement
- Description fixes (only for a few files, then I stopped :-))

* More network stuff

* Fix typo

* Fix PEP8

* Fix booleans

* Fix typo
2019-02-15 09:52:48 +00:00
Zim Kalinowski
2f3960558d
Fix for PostgresSQL server update and storage_mb (#51653) 2019-02-15 17:46:52 +08:00
Zim Kalinowski
1f5cda37b3
Fix for MySQL server update and storage_mb (#51661) 2019-02-15 17:33:21 +08:00
japokorn
68d43130d0 New LUKS devices management module (#48991)
* New LUKS devices management module

- new module that uses cryptsetup (LUKS) functions for management
of encrypted devices
- unit tests included

* New LUKS devices management module

- modified interface by removing 'open' option and moving its functionality
into 'state' option
2019-02-15 09:25:14 +00:00
Zim Kalinowski
0c8c72a0bf
Fixing managed disk facts (#51781) 2019-02-15 17:07:30 +08:00
Dag Wieers
27dfdb6a6a doc_fragments: Clean up parameter types (database) (#52178)
* module_utils: Clean up parameter types (database)

This PR includes:

- Parameter types added
- Copyright format fixes
- Short license statement
- Description fixes (only for a few files, then I stopped :-))

* Fix validate-modules test ignores
2019-02-15 08:32:45 +00:00
Dag Wieers
fbca8a4615 doc_fragments: Clean up parameter types (storage) (#52179)
* module_utils: Clean up parameter types (storage)

This PR includes:

- Parameter types added
- Copyright format fixes
- Short license statement
- Description fixes (only for a few files, then I stopped :-))

* Fix quotes

* Fix rST issue
2019-02-15 08:31:12 +00:00
Jordan Borean
de118734e9
Ansible.Basic - add required_by to module spec (#51407)
* Ansible.Basic - add required_by to module spec

* fix typo in docs
2019-02-15 13:00:25 +10:00
Chris Archibald
994063bbf9 Add junction path to ontap_volume_clone (#51391)
* changes to clusteR

* Revert "changes to clusteR"

This reverts commit 33ee1b71e4bc8435fb315762a871f8c4cb6c5f80.

* add new option

* Fix issues
2019-02-14 21:12:50 -05:00
Dag Wieers
cd9471ef17 Introduce new 'required_by' argument_spec option (#28662)
* Introduce new "required_by' argument_spec option

This PR introduces a new **required_by** argument_spec option which allows you to say *"if parameter A is set, parameter B and C are required as well"*.

- The difference with **required_if** is that it can only add dependencies if a parameter is set to a specific value, not when it is just defined.
- The difference with **required_together** is that it has a commutative property, so: *"Parameter A and B are required together, if one of them has been defined"*.

As an example, we need this for the complex options that the xml module provides. One of the issues we often see is that users are not using the correct combination of options, and then are surprised that the module does not perform the requested action(s).

This would be solved by adding the correct dependencies, and mutual exclusives. For us this is important to get this shipped together with the new xml module in Ansible v2.4. (This is related to bugfix https://github.com/ansible/ansible/pull/28657)

```python
    module = AnsibleModule(
        argument_spec=dict(
            path=dict(type='path', aliases=['dest', 'file']),
            xmlstring=dict(type='str'),
            xpath=dict(type='str'),
            namespaces=dict(type='dict', default={}),
            state=dict(type='str', default='present', choices=['absent',
'present'], aliases=['ensure']),
            value=dict(type='raw'),
            attribute=dict(type='raw'),
            add_children=dict(type='list'),
            set_children=dict(type='list'),
            count=dict(type='bool', default=False),
            print_match=dict(type='bool', default=False),
            pretty_print=dict(type='bool', default=False),
            content=dict(type='str', choices=['attribute', 'text']),
            input_type=dict(type='str', default='yaml', choices=['xml',
'yaml']),
            backup=dict(type='bool', default=False),
        ),
        supports_check_mode=True,
        required_by=dict(
            add_children=['xpath'],
            attribute=['value', 'xpath'],
            content=['xpath'],
            set_children=['xpath'],
            value=['xpath'],
        ),
        required_if=[
            ['count', True, ['xpath']],
            ['print_match', True, ['xpath']],
        ],
        required_one_of=[
            ['path', 'xmlstring'],
            ['add_children', 'content', 'count', 'pretty_print', 'print_match', 'set_children', 'value'],
        ],
        mutually_exclusive=[
            ['add_children', 'content', 'count', 'print_match','set_children', 'value'],
            ['path', 'xmlstring'],
        ],
    )
```

* Rebase and fix conflict

* Add modules that use required_by functionality

* Update required_by schema

* Fix rebase issue
2019-02-15 10:57:45 +10:00
Emmanouil Kampitakis
1219aa811a Feature/alphanumeric password in passwordstore (#38121)
* Alphanumeric only password may be generated

* Bump the ansible version this will have been added to 2.8
2019-02-14 17:02:24 -05:00
Guillaume Martinez
f7328693f2 gitlab_runner: refresh deprecated documentation notes (#52221) 2019-02-14 05:04:55 -05:00
Matt Clay
3e778d3f8f Fix pycodestyle E117 issues. 2019-02-13 23:35:39 -08:00
Jordan Borean
7b8e814a10 Ansible.Basic: make module options case insensitive with dep warning (#51583)
* Ansible.Basic: make module options case insensitive with dep warning

* Add porting guide info
2019-02-13 21:55:43 -05:00
Yunge Zhu
bccf6d31bd add azure_applicationsecuritygroup module (#51214)
* add applicationsecurity group module

* fix lint
2019-02-13 19:34:44 -05:00
Matt Clay
1a4163cb88 Fix misuse of is not testing a string. 2019-02-13 15:10:01 -08:00
Adam Miller
ea0e2bf2b3 yum always return changes dict, not only in check mode (#51987)
Previously the yum module would provide a `changes` dict when
executed in check mode but omit it when not in check mode in favor
of the `results` data which is raw output from the yum command. This
pull request makes that output uniform.

Fixes #51724

Signed-off-by: Adam Miller <admiller@redhat.com>
2019-02-13 17:46:32 -05:00
René Moser
9e71ec71a3
cloudstack: ensure return api_timeout is int (#52191) 2019-02-13 23:11:22 +01:00
Felix Fontein
132d920113 Also return some information in case the docker daemon does not run, is not in swarm mode or not a swarm manager. (#52189) 2019-02-13 16:49:45 -05:00
Chris Archibald
6a06e9f485 New Module: na_ontap_nvme (#51182)
* changes to clusteR

* Revert "changes to clusteR"

This reverts commit 33ee1b71e4bc8435fb315762a871f8c4cb6c5f80.

* Add new module nvme
2019-02-13 20:36:58 +00:00
Miguel Angel Muñoz González
1b5575c669 Fortinet's FortiOS log fortianalyzer2 setting (#52159) 2019-02-13 20:15:37 +00:00
Miguel Angel Muñoz González
d875ca3e58 Fortinet's FortiOS log fortianalyzer override setting (#52164) 2019-02-13 20:12:20 +00:00
Miguel Angel Muñoz González
aac3ff364f Fortinet's FortiOS log fortianalyzer setting (#52165) 2019-02-13 20:11:03 +00:00
Miguel Angel Muñoz González
cd06cdf1dc Fortinet's FortiOS log fortianalyzer3 filter (#52160)
* Fortinet's FortiOS log fortianalyzer3 filter

* Avoid fields with empty choices

* Avoid fields with empty choices
2019-02-13 19:58:59 +00:00
Simon Westphahl
02e87b7d70 Raise AnsibleConnectionError on winrm connnection errors (#51744)
* Raise AnsibleConnectionError on winrm con errors

Currently all uncaught exceptions of the requests library that is used
in winrm will lead to an "Unexpected failure during module execution".

Instead of letting all exceptions bubble up we catch the connection
related errors (inkl. timeouts) and re-raise them as
AnsibleConnectionError so Ansible will mark the host as unreachable and
exit with the correct return code.

This is especially important for Zuul (https://zuul-ci.org) to
distinguish between failures and connection/host related errors.

* Update lib/ansible/plugins/connection/winrm.py

Co-Authored-By: westphahl <westphahl@gmail.com>

* Add changelog fragment
2019-02-13 14:55:55 -05:00
Miguel Angel Muñoz González
2de41ae8f4 Fortinet's FortiOS log fortianalyzer3 setting (#52161) 2019-02-13 19:55:31 +00:00
Miguel Angel Muñoz González
b51e3137a4 Fortinet's FortiOS log fortiguard override setting (#52169) 2019-02-13 19:54:41 +00:00
Miguel Angel Muñoz González
d643108d5c Fortinet's FortiOS log fortiguard setting (#52170) 2019-02-13 19:54:27 +00:00
Miguel Angel Muñoz González
402c41d97f Fortinet's FortiOS log gui display (#52171) 2019-02-13 19:54:19 +00:00
Matt Clay
3f387f225c Fix safe_eval on Python 3.8. 2019-02-13 11:54:03 -08:00
René Moser
02f51e865c cloudscale: combine docs in fragment (#52069)
* cloudscale: combine docs in fragment

* workaround false negative E305
2019-02-13 13:52:01 -06:00
Sandra McCann
6c17c55b51 move modules to community support (#52184) 2019-02-13 13:24:17 -06:00
おすし
c2a409a9e0 Fix: Yum module does not use proxy when username is not set #51548 (#51994)
* add test of yum with proxy

* Properly handle unauthenticated yum proxy config

Fixes #51548

* shell executable is bash
2019-02-13 14:10:47 -05:00
Felix Fontein
d7fd4d0550 docker_*: always use client.fail() over module.fail_json(), allow to always return data on failure (#51999)
* Always use client.fail() instead of module.fail_json().

* Allow to pass on results on module failure.

* Linting.
2019-02-13 14:10:23 -05:00
Sam Doran
ad386290b4
Update command/shell docs with note about modules for rebooting(#51499)
- Update integration test syntax
2019-02-13 13:54:36 -05:00
Kevin
c512471428 Add two more failure conditions to unarchive (#51914) 2019-02-13 13:40:26 -05:00
Matt Martz
cdb53ff1a4
Restore behavior for detecting only localhost, and no limit match. Fixes #52152 (#52172)
* Restore behavior for detecting only localhost, and no limit match. Fixes #52152

* Add test for non-matching limit
2019-02-13 11:52:30 -06:00
Jordan Borean
847d089d6b Re-add support for setting shell from play context (#52139)
* Re-add support for setting shell from play context

* Add integration tests

* Add more tests for shell override

* fix sanity issue
2019-02-13 11:49:13 -06:00
Matt Martz
b34d141eed
Disallow use of remote home directories containing .. in their path (CVE-2019-3828) (#52133)
* Disallow use of remote home directories containing .. in their path

* Add CVE to changelog
2019-02-13 10:38:28 -06:00
Juan Antonio Osorio
9f081ca04f identity: Add GSSAPI suport for FreeIPA authentication (#52031)
* identity: Add GSSAPI suport for FreeIPA authentication

This enables the usage of GSSAPI for authentication, instead of having
to pass the username and password as part of the playbook run.

If there is GSSAPI support, this makes the password optional, and will
be able to use the KRB5_CLIENT_KTNAME or the KRB5CCNAME environment
variables; which are standard when using kerberos authentication.

Note that this depends on the urllib_gssapi library, and will only
enable this if that library is available.

* identity: Add documentation for GSSAPI authentication for FreeIPA

This documentation describes how to use GSSAPI authentication with the
IPA identity modules.

* identity: Add changelog for GSSAPI support for IPA

This adds the changelog entry for the GSSAPI authentication feature for
the IPA identity module.
2019-02-13 15:38:13 +00:00
Chris Archibald
7d55dc1a38 Add ontap version to gather facts (#51181)
* changes to clusteR

* Revert "changes to clusteR"

This reverts commit 33ee1b71e4bc8435fb315762a871f8c4cb6c5f80.

* Add FlexGroup to Gather facts:

* fix call error
2019-02-13 15:33:38 +00:00
Chris Archibald
93237edcda New Module: na_ontap_qos_policy_group (#51392)
* changes to clusteR

* Revert "changes to clusteR"

This reverts commit 33ee1b71e4bc8435fb315762a871f8c4cb6c5f80.

* add new module na_ontap_qos_policy_group

* fix issues
2019-02-13 15:32:25 +00:00
Chris Archibald
311a076dae New Module: na_ontap_nvme_subsystem (#50887)
* changes to clusteR

* Revert "changes to clusteR"

This reverts commit 33ee1b71e4bc8435fb315762a871f8c4cb6c5f80.

* New module na_ontap_nvme_subsystem

* updates

* update author

* fix author
2019-02-13 14:36:48 +00:00
Alan Rominger
af9ff07c74 Send openstack inventory logs to stderr (#51827) 2019-02-13 13:36:37 +00:00
Abhijeet Kasurde
32fce43311
hashi_vault: fix multiple spaces in params (#51524)
Fixes param parsing in hashi_vault

Signed-off-by: Abhijeet Kasurde <akasurde@redhat.com>
2019-02-13 18:32:00 +05:30
Miguel Angel Muñoz González
196e82ec8a Fortinet's FortiOS User Tacacs+ (#52071) 2019-02-13 11:37:03 +00:00
Miguel Angel Muñoz González
edcf07500f Fortinet's FortiOS Firewall Schedule Group (#52072) 2019-02-13 11:36:52 +00:00
Miguel Angel Muñoz González
05381db474 Fortinet's FortiOS fortios firewall service group (#52090) 2019-02-13 11:36:35 +00:00
Miguel Angel Muñoz González
3718a6b79f Fortinet's FortiOS fortios firewall shaper per ip shaper (#52092) 2019-02-13 11:36:14 +00:00
Miguel Angel Muñoz González
a5ed17e462 Fortinet's FortiOS fortios firewall shaper traffic shaper (#52093) 2019-02-13 11:36:03 +00:00
Miguel Angel Muñoz González
ac25361de5 Fortinet's FortiOS firewall shaping policy (#52094) 2019-02-13 11:35:45 +00:00
Miguel Angel Muñoz González
6dc44b18e1 Fortinet's FortiOS firewall shaping profile (#52095) 2019-02-13 11:35:36 +00:00
Miguel Angel Muñoz González
62f15c26b4 Fortinet's FortiOS firewall sniffer (#52096) 2019-02-13 11:35:29 +00:00
Miguel Angel Muñoz González
b8ffc1a917 Fortinet's FortiOS firewall ssh host key (#52097) 2019-02-13 11:35:20 +00:00
Miguel Angel Muñoz González
31180fa10f Fortinet's FortiOS firewall ssh local ca (#52098) 2019-02-13 11:35:00 +00:00
Miguel Angel Muñoz González
c21e41f4b8 Fortinet's FortiOS firewall ssh local key (#52099) 2019-02-13 11:34:06 +00:00
Miguel Angel Muñoz González
097a7c9d81 Fortinet's FortiOS firewall ssh setting (#52102) 2019-02-13 11:33:35 +00:00
Miguel Angel Muñoz González
312f2e9d1f Fortinet's FortiOS firewall ssl server (#52104) 2019-02-13 11:33:18 +00:00
Miguel Angel Muñoz González
1640ad6cfc Fortinet's FortiOS firewall ssl setting (#52105) 2019-02-13 11:33:01 +00:00
Miguel Angel Muñoz González
6fd031c820 Fortinet's FortiOS firewall ssl ssh profile (#52106) 2019-02-13 11:32:49 +00:00
Miguel Angel Muñoz González
bc0c1bd501 Fortinet's FortiOS firewall ttl policy (#52107) 2019-02-13 11:32:17 +00:00
Miguel Angel Muñoz González
8413d62727 Fortinet's FortiOS firewall wildcard fqdn custom (#52108) 2019-02-13 11:31:58 +00:00
Miguel Angel Muñoz González
47d1ab4c3d Fortinet's FortiOS firewall wildcard fqdn group (#52110) 2019-02-13 11:31:33 +00:00
Miguel Angel Muñoz González
abcdedfdf0 Fortinet's FortiOS ftp proxy explicit (#52113) 2019-02-13 11:31:23 +00:00
Miguel Angel Muñoz González
a1e2d290fc Fortinet's FortiOS system settings (#52112) 2019-02-13 11:31:04 +00:00
Miguel Angel Muñoz González
951ace650b Fortinet's FortiOS icap profile (#52114) 2019-02-13 11:30:42 +00:00
Miguel Angel Muñoz González
b18e8259cd Fortinet's FortiOS icap server (#52115) 2019-02-13 11:30:06 +00:00
Miguel Angel Muñoz González
30ab7135f0 Fortinet's FortiOS ips custom (#52118) 2019-02-13 11:29:53 +00:00
Miguel Angel Muñoz González
7d3247d3a5 Fortinet's FortiOS ips decoder (#52119) 2019-02-13 11:29:26 +00:00
Miguel Angel Muñoz González
4a9014fca1 Fortinet's FortiOS ips global (#52120) 2019-02-13 11:29:05 +00:00
Miguel Angel Muñoz González
7babf66d93 Fortinet's FortiOS ips settings (#52122) 2019-02-13 11:28:51 +00:00
Miguel Angel Muñoz González
364eb6e4a0 Fortinet's FortiOS ips rule settings (#52123) 2019-02-13 11:28:31 +00:00
Pilou
51270be883 tower modules: check that 'verify_ssl' defined in ~/.tower_cli.cfg isn't ignored (#50687)
* Check that verify_ssl defined in tower_cli.cfg isn't ignored

* Avoid to override verify_ssl value defined in tower_cli.cfg

By default, tower-cli library enables SSL certificates check. But
verify_ssl false value defined in config files read by default by
tower-cli library (for example /etc/tower/tower_cli.cfg) was ignored
because overriden by the tower_verify_ssl parameter default value.

* fix a typo in comment
2019-02-13 10:26:43 +00:00
Ondra Machacek
797a5218fb kubevirt: Add new kubevirt_vm module (#50768)
This module is managing virtual machines using KubeVirt.

Signed-off-by: Ondra Machacek <omachace@redhat.com>
2019-02-13 10:17:01 +00:00
Ross Williams
6e409a91ba Correct usage of sorted() in mongodb_user (#46792)
* Correct usage of sorted() in mongodb_user

sorted() can't be called on a list of dicts
without supplying a key parameter. This is
explained really well in the Sorting HOWTO
https://docs.python.org/3.6/howto/sorting.html#key-functions

This commit fixes #46791

* Fix PEP8 issues
2019-02-13 10:28:35 +01:00
Dag Wieers
21d43e6d94 win_product_facts: Fix RETURN information (#52058) 2019-02-13 19:09:30 +10:00
Straff
d4a07f9573 Added support for user-specified log file in win_package (#51104)
* Added support for user-specified log file in win_package - feature (#38353)

* added integration tests for win_package log_path support feature (#38353), and applied review feedback

* win_package log_path support feature (#38353) - fixed typo in win-package.py documentation

* win_package log_path support feature (#38353) - improved an integration test and better doc in win-package.py
2019-02-13 19:08:07 +10:00
Amol Kahat
563725ba98 Fixed typo from adress to address (#52143)
Signed-off-by: Amol Kahat <akahat@redhat.com>
2019-02-13 13:57:13 +05:30
Jiri Tyr
f49469f7bf Updating update_url for jenkins_plugin (#52086) 2019-02-13 01:32:34 -05:00
Matt Clay
04112d47a7 Fix more incorrect uses of is operator. 2019-02-12 20:04:20 -08:00
Will Thames
46fbcf08bc
aws_kms enhancements (#31960)
* Allow creation and deletion of keys (deletion just schedules for
  deletion, recreating an old key is just cancelling its deletion)
* Allow grants to be set, thus enabling encryption contexts to be
  used with keys
* Allow tags to be added and modified
* Add testing for KMS module
* Tidy up aws_kms module to latest standards
2019-02-13 13:06:58 +10:00
Matt Clay
0a461380a3 Fix incorrect use of is for comparisons.
See https://bugs.python.org/issue34850 for details.
2019-02-12 16:33:13 -08:00
Matt Davis
cd7a144515
fix docker default remote_user (#52137)
Fix bogus default value in config- exposed by become plugins (#50911) actually using this value in more cases.
2019-02-12 16:29:27 -08:00
Wojciech Sciesinski
a431e802ed Add posibilities to run the integration tests for PowerShell < 5.0 (#50808)
* Add posibilities to run the integration tests for PowerShell < 5.0

* Update of tests - based at a review comments for #50612

* The correction of YAML structure
2019-02-12 15:51:03 -05:00
Wojciech Sciesinski
a7528cdd25 Update the NuGet package provider when needed (#50759)
* Update the NuGet package provider when needed

* Update NuGet provider conditionally
2019-02-12 12:22:22 -08:00
Andrew Gaffney
9c35f18dd6 Custom jinja Undefined class for handling nested undefined attributes (#51768)
This commit creates a custom Jinja2 Undefined class that returns
Undefined for any further accesses, rather than raising an exception
2019-02-12 15:04:00 -05:00
Abhijeet Kasurde
4e0e09d2de docs: update docs about pipelining (#51856)
Additional documentation about `keep_remote_files` and
`pipelining` configurations.

Signed-off-by: Abhijeet Kasurde <akasurde@redhat.com>
2019-02-12 12:49:00 -05:00
hansmi
76ab88c9f5 callbacks/slack: Explicitly set Content-Type header (#51824)
There are other chat systems with hook implementations more or less
compatible with Slack, such as Rocket.Chat. The latter requires the
Content-Type header to be set to "application/json" (the body is JSON).

Signed-off-by: Michael Hanselmann <public@hansmi.ch>
2019-02-12 12:47:33 -05:00
Keith Maxwell
7fbacf920d Remove misleading statement passwords must be same (#49798)
* Remove misleading statement passwords must be same

Since 2.4 Ansible has supported multiple vault passwords:
<https://docs.ansible.com/ansible/latest/user_guide/vault.html#multiple-vault-passwords>

Meaning lines like the following are misleading:

> The password used with vault currently must be the same for all files you wish
> to use together at the same time.

-- `docs/docsite/rst/user_guide/vault.rst`

To demonstrate this with Ansible 2.7, save the following as `example.yaml`:

```
- name: Display output from two vaults with different passwords
  hosts: localhost
  connection: local
  vars_files: [one.yaml, two.yaml]
  tasks:
    - name: View secret from one.yaml vault
      debug: { var: one }
    - name: View secret from two.yaml vault
      debug: { var: two }
```

Then run the three following commands choosing two different passwords:

```
$ echo 'one: 1' | ansible-vault encrypt --vault-id id1@prompt --output=one.yaml
$ echo 'two: 2' | ansible-vault encrypt --vault-id id2@prompt --output=two.yaml
$ ansible-playbook --vault-id id1@prompt --vault-id id2@prompt example.yaml
```

`ansible-vault` stores an ID in plain text in the vault file.

* Remove note about default in Ansible 2.1

As requested by gundalow in https://github.com/ansible/ansible/pull/49798
2019-02-12 10:47:01 -05:00
rajaspachipulusu17
0825cbad40 Pluribus Networks prefix list network module with Unit test cases (#52064) 2019-02-12 20:40:58 +05:30
Chris Archibald
ce092ed939 New Modules: na_ontap_unix_group (#51390)
* changes to clusteR

* Revert "changes to clusteR"

This reverts commit 33ee1b71e4bc8435fb315762a871f8c4cb6c5f80.

* add new module ontap_unix_groups
2019-02-12 15:06:28 +00:00
Feilong Wang
af710bd048 Add OpenStack Magnum cluster module (#44686) 2019-02-12 14:52:11 +00:00
getjack
d33ad416d7 - Initial commit (#51738)
- Fix sanity checks
  - Fixed documentation trailing whitespaces
2019-02-12 14:33:58 +00:00
getjack
d9ffc42eee Added Ansible UTM Info Module for network interface address entities. (#51733)
* - Initial commit
- Fix sanity checks
  - Fixed documentation trailing whitespaces

* - Changed author github contact as he has no account i'll (steamx) take responsibility
2019-02-12 14:33:28 +00:00
Miguel Angel Muñoz González
9d514c7451 Fortinet's FortiOS Webfilter Content (#51800)
* Fortinet's FortiOS firewall content module

* Update fortios_webfilter_content.py
2019-02-12 14:32:03 +00:00
Miguel Angel Muñoz González
8e3391e2c7 Fortinet's FortiOS antivirus profile (#51808) 2019-02-12 14:31:46 +00:00
Miguel Angel Muñoz González
2a6ea40b94 Fortinet's FortiOS antivirus settings (#51810) 2019-02-12 14:28:30 +00:00
Miguel Angel Muñoz González
875723e315 Fortinet's FortiOS Application Group (#51813) 2019-02-12 14:27:49 +00:00
Miguel Angel Muñoz González
d5df3c51fa Fortinet's FortiOS Application Name (#51815) 2019-02-12 14:27:28 +00:00
getjack
748c9acba7 - Initial commit (#51731)
- Fix sanity checks
  - Fixed documentation trailing whitespaces
2019-02-12 12:12:57 +00:00
getjack
71651a4eee - Initial commit (#51736)
- Fix sanity checks
  - Fixed documentation trailing whitespaces
2019-02-12 12:12:07 +00:00
Miguel Angel Muñoz González
fb9f2ca1cd Fortinet's FortiOS antivirus quarantine (#51809) 2019-02-12 12:11:38 +00:00
Miguel Angel Muñoz González
32b66ed6fe Fortinet's FortiOS Application Rule Settings (#51816) 2019-02-12 12:03:42 +00:00
Bojan Vitnik
64a6dcdd1d New module: xenserver_guest_facts - returns facts of XenServer VMs (#49426)
* Initial commit for xenserver_guest_facts module
* New module: xenserver_guest_facts. Returns facts of XenServer VMs. Module is fully documented.
* Added unit tests for the module
* Moved FakeXenAPI import to a dedicated fixture, other fixes
* Removed unused imports, minor fixes to unit test code
2019-02-12 16:56:49 +05:30
Abhijeet Kasurde
47e1bf1862
VMware: Tag management to VMware object (#46945)
Signed-off-by: Abhijeet Kasurde <akasurde@redhat.com>
2019-02-12 16:53:33 +05:30
Abhijeet Kasurde
fab815fc3b
VMware: Handle duplicate VM names in vmware_vm_facts (#45412)
This fix changes facts returned from vmware_vm_facts to list of dict from
dict of dict.

Signed-off-by: Abhijeet Kasurde <akasurde@redhat.com>
2019-02-12 16:31:42 +05:30
Yadnyawalkya Tale
6d4307377f Fixed positional argument in azure_vm_virtualmachine (#52067)
Signed-off-by: Yadnyawalkya Tale <yadnyawalkyatale@gmail.com>
2019-02-12 16:17:59 +05:30
Abhijeet Kasurde
5c992fcc3f
ansible-vault: handle utf-8 filename in vault (#50341)
Signed-off-by: Abhijeet Kasurde <akasurde@redhat.com>
2019-02-12 16:13:51 +05:30
Miguel Angel Muñoz González
6afa00eecd Fortinet's FortiOS Authentication Rule (#51817) 2019-02-12 09:27:59 +00:00
Miguel Angel Muñoz González
95fa911713 Fortinet's FortiOS Authentication Scheme (#51821) 2019-02-12 09:21:51 +00:00
Sayed Anisul Hoque
63148b0cc7 Fixes the comment in the example of the sysctl module(#51547) 2019-02-12 14:30:21 +05:30
Miguel Angel Muñoz González
97ed97b5c4 Fortinet's FortiOS Application Custom (#51812) 2019-02-12 08:59:04 +00:00
Miguel Angel Muñoz González
420cad6141 Fortinet's FortiOS Authentication Setting (#51823) 2019-02-12 08:58:34 +00:00
Miguel Angel Muñoz González
023ca40392 Fortinet's FortiOS DLP Filepattern (#51829) 2019-02-12 08:58:13 +00:00
Miguel Angel Muñoz González
452e863cc6 Fortinet's FortiOS DLP FingerPrint sensitivity (#51832) 2019-02-12 08:57:38 +00:00
Miguel Angel Muñoz González
4864c9dbae Fortinet's FortiOS DLP Sensor (#51833)
* Fortinet's FortiOS DLP Sensor

* Empty choices removed
2019-02-12 08:57:23 +00:00
Miguel Angel Muñoz González
f1da012d1c Fortinet's FortiOS DLP Settings (#51834) 2019-02-12 08:56:59 +00:00
Miguel Angel Muñoz González
58fcb02b2a Fortinet's FortiOS DLP Fingerprint Doc source (#51837) 2019-02-12 08:55:51 +00:00
Miguel Angel Muñoz González
3d2bd9d47d Fortinet's FortiOS Dnsfilter domain filter (#51867) 2019-02-12 08:51:52 +00:00
Miguel Angel Muñoz González
394449b8a9 Fortinet's FortiOS Dnsfilter profile (#51870) 2019-02-12 08:51:34 +00:00
Miguel Angel Muñoz González
c0bee726c0 Fortinet's FortiOS Endpoint Control Client (#51872) 2019-02-12 08:48:53 +00:00
Miguel Angel Muñoz González
fb1c3808ec Fortinet's FortiOS Endpoint Control Forticlient EMS (#51886) 2019-02-12 08:39:25 +00:00
Miguel Angel Muñoz González
4a975e1857 Fortinet's FortiOS Endpoint Control Forticlient Registration Sync (#51887) 2019-02-12 08:39:02 +00:00
Miguel Angel Muñoz González
955396f68f Fortinet's FortiOS Endpoint Control Profile (#51889)
* Fortinet's FortiOS Endpoint Control Profile

* Fix too long lines

* Fix trailing space
2019-02-12 08:37:32 +00:00
Miguel Angel Muñoz González
34cb1f7eef Fortinet's FortiOS Endpoint Control Settings (#51890) 2019-02-12 08:33:21 +00:00
rajaspachipulusu17
a003de239d Pluribus Networks old modules to be deprecated (#51686)
* Pluribus Networks old modules to be deprecated

* Dox fixes
2019-02-12 13:43:22 +05:30
rajaspachipulusu17
48edffac60 Pluribus Networks vrouter ospf6 module with UT (#51793)
* Pluribus networks vrouter ospf6 module with UT

* Changes in check cli method
2019-02-12 13:41:30 +05:30
Hannes Ljungberg
70d8f02db7 docker_swarm_service: Extend env and add env_files support (#51762)
* Extend env and add env_files support

* Python 2.6 compat

* Handle lists passed as string

* Add changelog fragment

* Use correct link formatting

Co-Authored-By: hannseman <hannes@5monkeys.se>

* Fix typo

Co-Authored-By: hannseman <hannes@5monkeys.se>

* Handle empty env and env_files values
2019-02-12 08:06:58 +00:00
Felix Fontein
09f78d2f6c ufw: allow to insert rules relative to first/last IPv4/IPv6 rules (#49796)
* Insert should have type int.

* Add insert_relative_to option.

* Add changelog.

* Add tests.

* Improve comment.
2019-02-12 08:05:14 +00:00
rajaspachipulusu17
2e3964b474 Pluribus Networks vrouter interface ip module with UT (#51792)
* Pluribus networks vrouter interface ip module with UT

* Indetentation fix

* Changes in check cli method
2019-02-12 13:33:34 +05:30
rajaspachipulusu17
76534b45b0 Pluribus networks vflow table profile module with UT (#51722) 2019-02-12 13:32:59 +05:30
Piotr Wojciechowski
42f20091dd docker_swarm_facts: New module to retrieve Docker Swarm information (#50622)
* docker_swarm_facts: PR cleanup after rebasing

* docker_swarm_facts: Adding the features similar to docker_host_facts

* docker_swarm_facts: Minor documentation and documentation updates

* docker_swarm_facts: Minor documentation and documentation adjustments to changes in #51700

* docker_swarm_facts: Using AnsibleDockerSwarmClient class method to fail module if not run on swarm manager
module_utils\docker\swarm.py: Adjustment of error message to me bore descriptive if module fails because it is not run on swarm manager node
2019-02-12 00:59:31 -05:00
Piotr Wojciechowski
ea72f7001c docker_node_facts: Query may cover single or multiple nodes (#51701)
* docker_node_facts: Query may contain single or multiple nodes, additional option to query about the docker manager itself
docker_node_facts: Code update to use the module_utils/docker_swarm.py AnsibleDockerSwarmClient class methods

* docker_node_facts: Minor documentation update and error handling

* docker_node_facts: Minor documentation and code updates

* docker_node_facts: Minor documentation adjustments
2019-02-12 00:58:07 -05:00
Jordan Borean
179cbb9891
win_dsc - return warning from DSC invocation (#51927) 2019-02-12 13:50:00 +10:00
rajaspachipulusu17
338ad565a7 Pluribus Networks vrouter bgp network module with UT (#51791) 2019-02-12 09:07:15 +05:30
Ari Stark
2f85d62989 Add state option to git_config module (#50578)
* Add state option to git_config module

State present/absent option works like --set/--unset option for 'git config'.

* Change git_config to avoid useless parameter passed to git command

When unsetting value, command was : git config --unset foo ''.
Now command is : git config --unset foo.

* Add some integration tests to git_config module

* Add missing aliases file

* Change set up method

Using git command seems to cause troubles on some OS : changing config
by changing '.gitconfig' file.

* Remove some distros from tests pool

Git is not installed or is out of date on these distros.

* Fix aliases to skip tests on centos6

* Refactor tests of the git_config module

* Add use case when state=absent and value is defined
2019-02-11 21:49:53 -05:00
Simon Dodsley
984777b3d0 Update FlashArray facts to get new information (#51550) 2019-02-11 18:34:22 -05:00
onigra
063cd5ea44 Add force parameter to gem module (#51366) 2019-02-11 17:13:16 -05:00
Will Thames
9babd16942 k8s handle absent resources when waiting (#51682)
* k8s wait - don't try to call to_dict on None

Need to ensure that the resource dict is correctly returned for absent
resources

* Cope with resources without a namespace

Some resources (e.g. ClusterRoleBinding) do not have a Namespace.
Handle the lack of a namespace key.
2019-02-11 21:43:42 +01:00
Dag Wieers
031a1a5cc2 vsphere_file: New module to manage files on datastores (#48180) 2019-02-11 21:26:12 +01:00
Rémy Léone
b125b67ed2 Add a description of the description attribute 2019-02-11 11:58:44 -08:00
Matt Martz
c55317a2bd
Update connection plugins to use correct, non-deprecated, methods (#52038)
* Update connection plugins to use correct, non-deprecated, methods

* Update tests to reflect calling become plugins
2019-02-11 13:44:54 -06:00
Matt Clay
d033884465 Fix scaleway_lb test failures. 2019-02-11 11:20:33 -08:00
Abhijeet Kasurde
a4e79584ec include_vars: elaborate description of dir option (#52022)
based on work of thecjharries

Additional behavior documentation of 'dir' option in include_vars.

Fixes: #31761
2019-02-11 13:25:51 -05:00
Matt Martz
445ff39f94
Become plugins (#50991)
* [WIP] become plugins

Move from hardcoded method to plugins for ease of use, expansion and overrides
  - load into connection as it is going to be the main consumer
  - play_context will also use to keep backwards compat API
  - ensure shell is used to construct commands when needed
  - migrate settings remove from base config in favor of plugin specific configs
  - cleanup ansible-doc
  - add become plugin docs
  - remove deprecated sudo/su code and keywords
  - adjust become options for cli
  - set plugin options from context
  - ensure config defs are avaialbe before instance
  - refactored getting the shell plugin, fixed tests
     - changed into regex as they were string matching, which does not work with random string generation
     - explicitly set flags for play context tests
 - moved plugin loading up front
 - now loads for basedir also
 - allow pyc/o for non m modules
 - fixes to tests and some plugins
 - migrate to play objects fro play_context
 - simiplify gathering
 -  added utf8 headers
 - moved option setting
 - add fail msg to dzdo
 - use tuple for multiple options on fail/missing
 - fix relative plugin paths
 - shift from play context to play
 - all tasks already inherit this from play directly
 - remove obsolete 'set play'
 - correct environment handling
 - add wrap_exe option to pfexec
 - fix runas to noop
 - fixed setting play context
 - added password configs
 - removed required false
 - remove from doc building till they are ready

future development:
  - deal with 'enable' and 'runas' which are not 'command wrappers' but 'state flags' and currently hardcoded in diff subsystems

* cleanup

  remove callers to removed func
  removed --sudo cli doc refs
  remove runas become_exe
  ensure keyerorr on plugin
  also fix backwards compat, missing method is attributeerror, not ansible error
  get remote_user consistently
  ignore missing system_tmpdirs on plugin load
  correct config precedence
  add deprecation
  fix networking imports
  backwards compat for plugins using BECOME_METHODS

* Port become_plugins to context.CLIARGS

This is a work in progress:
* Stop passing options around everywhere as we can use context.CLIARGS
  instead

* Refactor make_become_commands as asked for by alikins

* Typo in comment fix

* Stop loading values from the cli in more than one place

Both play and play_context were saving default values from the cli
arguments directly.  This changes things so that the default values are
loaded into the play and then play_context takes them from there.

* Rename BECOME_PLUGIN_PATH to DEFAULT_BECOME_PLUGIN_PATH

As alikins said, all other plugin paths are named
DEFAULT_plugintype_PLUGIN_PATH.  If we're going to rename these, that
should be done all at one time rather than piecemeal.

* One to throw away

This is a set of hacks to get setting FieldAttribute defaults to command
line args to work.  It's not fully done yet.

After talking it over with sivel and jimi-c this should be done by
fixing FieldAttributeBase and _get_parent_attribute() calls to do the
right thing when there is a non-None default.

What we want to be able to do ideally is something like this:

class Base(FieldAttributeBase):
    _check_mode = FieldAttribute([..] default=lambda: context.CLIARGS['check'])

class Play(Base):
    # lambda so that we have a chance to parse the command line args
    # before we get here.  In the future we might be able to restructure
    # this so that the cli parsing code runs before these classes are
    # defined.

class Task(Base):
    pass

And still have a playbook like this function:

---
- hosts:
  tasks:
  - command: whoami
    check_mode: True

(The check_mode test that is added as a separate commit in this PR will
let you test variations on this case).

There's a few separate reasons that the code doesn't let us do this or
a non-ugly workaround for this as written right now.  The fix that
jimi-c, sivel, and I talked about may let us do this or it may still
require a workaround (but less ugly) (having one class that has the
FieldAttributes with default values and one class that inherits from
that but just overrides the FieldAttributes which now have defaults)

* Revert "One to throw away"

This reverts commit 23aa883cbed11429ef1be2a2d0ed18f83a3b8064.

* Set FieldAttr defaults directly from CLIARGS

* Remove dead code

* Move timeout directly to PlayContext, it's never needed on Play

* just for backwards compat, add a static version of BECOME_METHODS to constants

* Make the become attr on the connection public, since it's used outside of the connection

* Logic fix

* Nuke connection testing if it supports specific become methods

* Remove unused vars

* Address rebase issues

* Fix path encoding issue

* Remove unused import

* Various cleanups

* Restore network_cli check in _low_level_execute_command

* type improvements for cliargs_deferred_get and swap shallowcopy to default to False

* minor cleanups

* Allow the su plugin to work, since it doesn't define a prompt the same way

* Fix up ksu become plugin

* Only set prompt if build_become_command was called

* Add helper to assist connection plugins in knowing they need to wait for a prompt

* Fix tests and code expectations

* Doc updates

* Various additional minor cleanups

* Make doas functional

* Don't change connection signature, load become plugin from TaskExecutor

* Remove unused imports

* Add comment about setting the become plugin on the playcontext

* Fix up tests for recent changes

* Support 'Password:' natively for the doas plugin

* Make default prompts raw

* wording cleanups. ci_complete

* Remove unrelated changes

* Address spelling mistake

* Restore removed test, and udpate to use new functionality

* Add changelog fragment

* Don't hard fail in set_attributes_from_cli on missing CLI keys

* Remove unrelated change to loader

* Remove internal deprecated FieldAttributes now

* Emit deprecation warnings now
2019-02-11 11:27:44 -06:00
Zim Kalinowski
c581fbd0be adding missing items in postgresql facts documentation (#51677)
* adding missing items in postgresql facts documentation

* removed trailing whitespace
2019-02-11 11:07:38 -05:00
Zim Kalinowski
beba2fdc65 adding missing items in the documentation of mysql server facts (#51676)
* adding missing items in the documentation of mysql server facts

* removed trailing whitespace
2019-02-11 11:06:32 -05:00
James Cassell
953058d025 standardize connection variable names (#51776)
* standardize user/password connection vars

* docs: use ansible_user and ansible_password

* docs: var precedence for connection vars

* docs: ansible_become_pass -> ansible_become_password etc
2019-02-11 10:43:10 -05:00
Akira Yokochi
51061f8a5f fix a little typo in ini inventory doc (#52025) 2019-02-11 15:34:01 +00:00
Rémy Léone
accbcdeccb Add a Scaleway load-balancer module (#51741) 2019-02-11 15:28:55 +00:00
getjack
9dbb551528 - Initial commit (#51729)
- Fix sanity checks
  - Fixed documentation trailing whitespaces
2019-02-11 15:12:10 +00:00
Matt Martz
3c85ac1788
Promote include_tasks/role and import_tasks/role to stableinterface (#51975) 2019-02-11 09:06:38 -06:00
Bill Dodd
e0538610bf Update GetBiosBootOrder to use standard spec resources (#51764)
* update GetBiosBootOrder to use standard spec resources

* handle case where BootOrder is present but BootOptions is missing
2019-02-11 14:50:10 +00:00
Fabian von Feilitzsch
e81b74d6c8 Properly parse boolean env values as boolean (#51836) 2019-02-11 14:49:00 +00:00
Felix Fontein
4d3d8dd60f ufw: check values for direction depending on situation (#50402)
* Check values of 'direction'.

* Add changelog.

* Update lib/ansible/modules/system/ufw.py

Co-Authored-By: felixfontein <felix@fontein.de>

* Update lib/ansible/modules/system/ufw.py
2019-02-11 14:47:35 +00:00
Felix Fontein
a279892fae ufw: allow gre and igmp protocols (#51166)
* ufw: allow gre and igmp protocols.

* Add changelog.
2019-02-11 14:46:38 +00:00