Rename managed_by_tower to managed

This commit is contained in:
Christian M. Adams
2021-06-17 12:54:06 -04:00
committed by Shane McDonald
parent 6db4732bf3
commit 06b04007a0
53 changed files with 190 additions and 273 deletions

View File

@@ -1409,11 +1409,11 @@ class ProjectOptionsSerializer(BaseSerializer):
class ExecutionEnvironmentSerializer(BaseSerializer): class ExecutionEnvironmentSerializer(BaseSerializer):
show_capabilities = ['edit', 'delete', 'copy'] show_capabilities = ['edit', 'delete', 'copy']
managed_by_tower = serializers.ReadOnlyField() managed = serializers.ReadOnlyField()
class Meta: class Meta:
model = ExecutionEnvironment model = ExecutionEnvironment
fields = ('*', 'organization', 'image', 'managed_by_tower', 'credential', 'pull') fields = ('*', 'organization', 'image', 'managed', 'credential', 'pull')
def get_related(self, obj): def get_related(self, obj):
res = super(ExecutionEnvironmentSerializer, self).get_related(obj) res = super(ExecutionEnvironmentSerializer, self).get_related(obj)
@@ -2481,14 +2481,14 @@ class ResourceAccessListElementSerializer(UserSerializer):
class CredentialTypeSerializer(BaseSerializer): class CredentialTypeSerializer(BaseSerializer):
show_capabilities = ['edit', 'delete'] show_capabilities = ['edit', 'delete']
managed_by_tower = serializers.ReadOnlyField() managed = serializers.ReadOnlyField()
class Meta: class Meta:
model = CredentialType model = CredentialType
fields = ('*', 'kind', 'namespace', 'name', 'managed_by_tower', 'inputs', 'injectors') fields = ('*', 'kind', 'namespace', 'name', 'managed', 'inputs', 'injectors')
def validate(self, attrs): def validate(self, attrs):
if self.instance and self.instance.managed_by_tower: if self.instance and self.instance.managed:
raise PermissionDenied(detail=_("Modifications not allowed for managed credential types")) raise PermissionDenied(detail=_("Modifications not allowed for managed credential types"))
old_inputs = {} old_inputs = {}
@@ -2520,8 +2520,8 @@ class CredentialTypeSerializer(BaseSerializer):
def to_representation(self, data): def to_representation(self, data):
value = super(CredentialTypeSerializer, self).to_representation(data) value = super(CredentialTypeSerializer, self).to_representation(data)
# translate labels and help_text for credential fields "managed by Tower" # translate labels and help_text for credential fields "managed"
if value.get('managed_by_tower'): if value.get('managed'):
value['name'] = _(value['name']) value['name'] = _(value['name'])
for field in value.get('inputs', {}).get('fields', []): for field in value.get('inputs', {}).get('fields', []):
field['label'] = _(field['label']) field['label'] = _(field['label'])
@@ -2540,11 +2540,11 @@ class CredentialTypeSerializer(BaseSerializer):
class CredentialSerializer(BaseSerializer): class CredentialSerializer(BaseSerializer):
show_capabilities = ['edit', 'delete', 'copy', 'use'] show_capabilities = ['edit', 'delete', 'copy', 'use']
capabilities_prefetch = ['admin', 'use'] capabilities_prefetch = ['admin', 'use']
managed_by_tower = serializers.ReadOnlyField() managed = serializers.ReadOnlyField()
class Meta: class Meta:
model = Credential model = Credential
fields = ('*', 'organization', 'credential_type', 'managed_by_tower', 'inputs', 'kind', 'cloud', 'kubernetes') fields = ('*', 'organization', 'credential_type', 'managed', 'inputs', 'kind', 'cloud', 'kubernetes')
extra_kwargs = {'credential_type': {'label': _('Credential Type')}} extra_kwargs = {'credential_type': {'label': _('Credential Type')}}
def to_representation(self, data): def to_representation(self, data):
@@ -2611,7 +2611,7 @@ class CredentialSerializer(BaseSerializer):
return summary_dict return summary_dict
def validate(self, attrs): def validate(self, attrs):
if self.instance and self.instance.managed_by_tower: if self.instance and self.instance.managed:
raise PermissionDenied(detail=_("Modifications not allowed for managed credentials")) raise PermissionDenied(detail=_("Modifications not allowed for managed credentials"))
return super(CredentialSerializer, self).validate(attrs) return super(CredentialSerializer, self).validate(attrs)
@@ -4189,7 +4189,7 @@ class JobLaunchSerializer(BaseSerializer):
elif field_name == 'credentials': elif field_name == 'credentials':
for cred in obj.credentials.all(): for cred in obj.credentials.all():
cred_dict = dict(id=cred.id, name=cred.name, credential_type=cred.credential_type.pk, passwords_needed=cred.passwords_needed) cred_dict = dict(id=cred.id, name=cred.name, credential_type=cred.credential_type.pk, passwords_needed=cred.passwords_needed)
if cred.credential_type.managed_by_tower and 'vault_id' in cred.credential_type.defined_fields: if cred.credential_type.managed and 'vault_id' in cred.credential_type.defined_fields:
cred_dict['vault_id'] = cred.get_input('vault_id', default=None) cred_dict['vault_id'] = cred.get_input('vault_id', default=None)
defaults_dict.setdefault(field_name, []).append(cred_dict) defaults_dict.setdefault(field_name, []).append(cred_dict)
else: else:
@@ -4988,7 +4988,7 @@ class ActivityStreamSerializer(BaseSerializer):
('notification', ('id', 'status', 'notification_type', 'notification_template_id')), ('notification', ('id', 'status', 'notification_type', 'notification_template_id')),
('o_auth2_access_token', ('id', 'user_id', 'description', 'application_id', 'scope')), ('o_auth2_access_token', ('id', 'user_id', 'description', 'application_id', 'scope')),
('o_auth2_application', ('id', 'name', 'description')), ('o_auth2_application', ('id', 'name', 'description')),
('credential_type', ('id', 'name', 'description', 'kind', 'managed_by_tower')), ('credential_type', ('id', 'name', 'description', 'kind', 'managed')),
('ad_hoc_command', ('id', 'name', 'status', 'limit')), ('ad_hoc_command', ('id', 'name', 'status', 'limit')),
('workflow_approval', ('id', 'name', 'unified_job_id')), ('workflow_approval', ('id', 'name', 'unified_job_id')),
] ]

View File

@@ -708,7 +708,7 @@ class ExecutionEnvironmentDetail(RetrieveUpdateDestroyAPIView):
def update(self, request, *args, **kwargs): def update(self, request, *args, **kwargs):
instance = self.get_object() instance = self.get_object()
fields_to_check = ['name', 'description', 'organization', 'image', 'credential'] fields_to_check = ['name', 'description', 'organization', 'image', 'credential']
if instance.managed_by_tower and request.user.can_access(models.ExecutionEnvironment, 'change', instance): if instance.managed and request.user.can_access(models.ExecutionEnvironment, 'change', instance):
for field in fields_to_check: for field in fields_to_check:
left = getattr(instance, field, None) left = getattr(instance, field, None)
right = request.data.get(field, None) right = request.data.get(field, None)
@@ -1306,7 +1306,7 @@ class CredentialTypeDetail(RetrieveUpdateDestroyAPIView):
def destroy(self, request, *args, **kwargs): def destroy(self, request, *args, **kwargs):
instance = self.get_object() instance = self.get_object()
if instance.managed_by_tower: if instance.managed:
raise PermissionDenied(detail=_("Deletion not allowed for managed credential types")) raise PermissionDenied(detail=_("Deletion not allowed for managed credential types"))
if instance.credentials.exists(): if instance.credentials.exists():
raise PermissionDenied(detail=_("Credential types that are in use cannot be deleted")) raise PermissionDenied(detail=_("Credential types that are in use cannot be deleted"))
@@ -1421,7 +1421,7 @@ class CredentialDetail(RetrieveUpdateDestroyAPIView):
def destroy(self, request, *args, **kwargs): def destroy(self, request, *args, **kwargs):
instance = self.get_object() instance = self.get_object()
if instance.managed_by_tower: if instance.managed:
raise PermissionDenied(detail=_("Deletion not allowed for managed credentials")) raise PermissionDenied(detail=_("Deletion not allowed for managed credentials"))
return super(CredentialDetail, self).destroy(request, *args, **kwargs) return super(CredentialDetail, self).destroy(request, *args, **kwargs)

View File

@@ -1119,7 +1119,7 @@ class CredentialTypeAccess(BaseAccess):
I can create when: I can create when:
- I'm a superuser: - I'm a superuser:
I can change when: I can change when:
- I'm a superuser and the type is not "managed by Tower" - I'm a superuser and the type is not "managed"
""" """
model = CredentialType model = CredentialType
@@ -1205,7 +1205,7 @@ class CredentialAccess(BaseAccess):
def get_user_capabilities(self, obj, **kwargs): def get_user_capabilities(self, obj, **kwargs):
user_capabilities = super(CredentialAccess, self).get_user_capabilities(obj, **kwargs) user_capabilities = super(CredentialAccess, self).get_user_capabilities(obj, **kwargs)
user_capabilities['use'] = self.can_use(obj) user_capabilities['use'] = self.can_use(obj)
if getattr(obj, 'managed_by_tower', False) is True: if getattr(obj, 'managed', False) is True:
user_capabilities['edit'] = user_capabilities['delete'] = False user_capabilities['edit'] = user_capabilities['delete'] = False
return user_capabilities return user_capabilities
@@ -1368,7 +1368,7 @@ class ExecutionEnvironmentAccess(BaseAccess):
return self.check_related('organization', Organization, data, obj=obj, mandatory=True, role_field='execution_environment_admin_role') return self.check_related('organization', Organization, data, obj=obj, mandatory=True, role_field='execution_environment_admin_role')
def can_delete(self, obj): def can_delete(self, obj):
if obj.managed_by_tower: if obj.managed:
raise PermissionDenied raise PermissionDenied
return self.can_change(obj, None) return self.can_change(obj, None)

View File

@@ -175,12 +175,12 @@ def org_counts(since, **kwargs):
def cred_type_counts(since, **kwargs): def cred_type_counts(since, **kwargs):
counts = {} counts = {}
for cred_type in models.CredentialType.objects.annotate(num_credentials=Count('credentials', distinct=True)).values( for cred_type in models.CredentialType.objects.annotate(num_credentials=Count('credentials', distinct=True)).values(
'name', 'id', 'managed_by_tower', 'num_credentials' 'name', 'id', 'managed', 'num_credentials'
): ):
counts[cred_type['id']] = { counts[cred_type['id']] = {
'name': cred_type['name'], 'name': cred_type['name'],
'credential_count': cred_type['num_credentials'], 'credential_count': cred_type['num_credentials'],
'managed_by_tower': cred_type['managed_by_tower'], 'managed': cred_type['managed'],
} }
return counts return counts

View File

@@ -642,7 +642,7 @@ class CredentialInputField(JSONSchemaField):
# `ssh_key_unlock` requirements are very specific and can't be # `ssh_key_unlock` requirements are very specific and can't be
# represented without complicated JSON schema # represented without complicated JSON schema
if model_instance.credential_type.managed_by_tower is True and 'ssh_key_unlock' in defined_fields: if model_instance.credential_type.managed is True and 'ssh_key_unlock' in defined_fields:
# in order to properly test the necessity of `ssh_key_unlock`, we # in order to properly test the necessity of `ssh_key_unlock`, we
# need to know the real value of `ssh_key_data`; for a payload like: # need to know the real value of `ssh_key_data`; for a payload like:
@@ -711,7 +711,7 @@ class CredentialTypeInputField(JSONSchemaField):
} }
def validate(self, value, model_instance): def validate(self, value, model_instance):
if isinstance(value, dict) and 'dependencies' in value and not model_instance.managed_by_tower: if isinstance(value, dict) and 'dependencies' in value and not model_instance.managed:
raise django_exceptions.ValidationError( raise django_exceptions.ValidationError(
_("'dependencies' is not supported for custom credentials."), _("'dependencies' is not supported for custom credentials."),
code='invalid', code='invalid',

View File

@@ -44,7 +44,7 @@ class Command(BaseCommand):
public_galaxy_credential = Credential( public_galaxy_credential = Credential(
name='Ansible Galaxy', name='Ansible Galaxy',
managed_by_tower=True, managed=True,
credential_type=CredentialType.objects.get(kind='galaxy'), credential_type=CredentialType.objects.get(kind='galaxy'),
inputs={'url': 'https://galaxy.ansible.com/'}, inputs={'url': 'https://galaxy.ansible.com/'},
) )

View File

@@ -76,7 +76,7 @@ class Command(BaseCommand):
} }
registry_cred, cred_created = Credential.objects.get_or_create( registry_cred, cred_created = Credential.objects.get_or_create(
name="Default Execution Environment Registry Credential", name="Default Execution Environment Registry Credential",
managed_by_tower=True, managed=True,
credential_type=registry_cred_type[0], credential_type=registry_cred_type[0],
defaults={'inputs': inputs}, defaults={'inputs': inputs},
) )
@@ -114,7 +114,7 @@ class Command(BaseCommand):
# Create the control plane execution environment that is used for project updates and system jobs # Create the control plane execution environment that is used for project updates and system jobs
ee = settings.CONTROL_PLANE_EXECUTION_ENVIRONMENT ee = settings.CONTROL_PLANE_EXECUTION_ENVIRONMENT
_this_ee, cp_created = ExecutionEnvironment.objects.get_or_create( _this_ee, cp_created = ExecutionEnvironment.objects.get_or_create(
name="Control Plane Execution Environment", defaults={'image': ee, 'managed_by_tower': True, 'credential': registry_cred} name="Control Plane Execution Environment", defaults={'image': ee, 'managed': True, 'credential': registry_cred}
) )
if cp_created: if cp_created:
changed = True changed = True

View File

@@ -0,0 +1,28 @@
# Generated by Django 2.2.16 on 2021-06-17 18:32
from django.db import migrations
class Migration(migrations.Migration):
dependencies = [
('main', '0150_rename_inv_sources_inv_updates'),
]
operations = [
migrations.RenameField(
model_name='credential',
old_name='managed_by_tower',
new_name='managed',
),
migrations.RenameField(
model_name='credentialtype',
old_name='managed_by_tower',
new_name='managed',
),
migrations.RenameField(
model_name='executionenvironment',
old_name='managed_by_tower',
new_name='managed',
),
]

View File

@@ -34,10 +34,16 @@ def migrate_galaxy_settings(apps, schema_editor):
if public_galaxy_setting and public_galaxy_setting.value is False: if public_galaxy_setting and public_galaxy_setting.value is False:
# ...UNLESS this behavior was explicitly disabled via this setting # ...UNLESS this behavior was explicitly disabled via this setting
public_galaxy_enabled = False public_galaxy_enabled = False
try:
public_galaxy_credential = Credential( # Needed for old migrations
created=now(), modified=now(), name='Ansible Galaxy', managed_by_tower=True, credential_type=galaxy_type, inputs={'url': 'https://galaxy.ansible.com/'} public_galaxy_credential = Credential(
) created=now(), modified=now(), name='Ansible Galaxy', managed_by_tower=True, credential_type=galaxy_type, inputs={'url': 'https://galaxy.ansible.com/'}
)
except:
# This will make functionaly tests pass
public_galaxy_credential = Credential(
created=now(), modified=now(), name='Ansible Galaxy', managed=True, credential_type=galaxy_type, inputs={'url': 'https://galaxy.ansible.com/'}
)
public_galaxy_credential.save() public_galaxy_credential.save()
for org in Organization.objects.all(): for org in Organization.objects.all():

View File

@@ -92,7 +92,7 @@ class Credential(PasswordFieldsModel, CommonModelNameNotUnique, ResourceMixin):
on_delete=models.CASCADE, on_delete=models.CASCADE,
help_text=_('Specify the type of credential you want to create. Refer ' 'to the documentation for details on each type.'), help_text=_('Specify the type of credential you want to create. Refer ' 'to the documentation for details on each type.'),
) )
managed_by_tower = models.BooleanField(default=False, editable=False) managed = models.BooleanField(default=False, editable=False)
organization = models.ForeignKey( organization = models.ForeignKey(
'Organization', 'Organization',
null=True, null=True,
@@ -341,7 +341,7 @@ class CredentialType(CommonModelNameNotUnique):
) )
kind = models.CharField(max_length=32, choices=KIND_CHOICES) kind = models.CharField(max_length=32, choices=KIND_CHOICES)
managed_by_tower = models.BooleanField(default=False, editable=False) managed = models.BooleanField(default=False, editable=False)
namespace = models.CharField(max_length=1024, null=True, default=None, editable=False) namespace = models.CharField(max_length=1024, null=True, default=None, editable=False)
inputs = CredentialTypeInputField( inputs = CredentialTypeInputField(
blank=True, default=dict, help_text=_('Enter inputs using either JSON or YAML syntax. ' 'Refer to the documentation for example syntax.') blank=True, default=dict, help_text=_('Enter inputs using either JSON or YAML syntax. ' 'Refer to the documentation for example syntax.')
@@ -355,7 +355,7 @@ class CredentialType(CommonModelNameNotUnique):
@classmethod @classmethod
def from_db(cls, db, field_names, values): def from_db(cls, db, field_names, values):
instance = super(CredentialType, cls).from_db(db, field_names, values) instance = super(CredentialType, cls).from_db(db, field_names, values)
if instance.managed_by_tower and instance.namespace: if instance.managed and instance.namespace:
native = ManagedCredentialType.registry[instance.namespace] native = ManagedCredentialType.registry[instance.namespace]
instance.inputs = native.inputs instance.inputs = native.inputs
instance.injectors = native.injectors instance.injectors = native.injectors
@@ -439,7 +439,7 @@ class CredentialType(CommonModelNameNotUnique):
files) files)
""" """
if not self.injectors: if not self.injectors:
if self.managed_by_tower and credential.credential_type.namespace in dir(builtin_injectors): if self.managed and credential.credential_type.namespace in dir(builtin_injectors):
injected_env = {} injected_env = {}
getattr(builtin_injectors, credential.credential_type.namespace)(credential, injected_env, private_data_dir) getattr(builtin_injectors, credential.credential_type.namespace)(credential, injected_env, private_data_dir)
env.update(injected_env) env.update(injected_env)
@@ -561,7 +561,7 @@ class ManagedCredentialType(SimpleNamespace):
namespace=self.namespace, namespace=self.namespace,
kind=self.kind, kind=self.kind,
name=self.name, name=self.name,
managed_by_tower=True, managed=True,
inputs=self.inputs, inputs=self.inputs,
injectors=self.injectors, injectors=self.injectors,
) )
@@ -606,7 +606,7 @@ ManagedCredentialType(
namespace='scm', namespace='scm',
kind='scm', kind='scm',
name=ugettext_noop('Source Control'), name=ugettext_noop('Source Control'),
managed_by_tower=True, managed=True,
inputs={ inputs={
'fields': [ 'fields': [
{'id': 'username', 'label': ugettext_noop('Username'), 'type': 'string'}, {'id': 'username', 'label': ugettext_noop('Username'), 'type': 'string'},
@@ -621,7 +621,7 @@ ManagedCredentialType(
namespace='vault', namespace='vault',
kind='vault', kind='vault',
name=ugettext_noop('Vault'), name=ugettext_noop('Vault'),
managed_by_tower=True, managed=True,
inputs={ inputs={
'fields': [ 'fields': [
{'id': 'vault_password', 'label': ugettext_noop('Vault Password'), 'type': 'string', 'secret': True, 'ask_at_runtime': True}, {'id': 'vault_password', 'label': ugettext_noop('Vault Password'), 'type': 'string', 'secret': True, 'ask_at_runtime': True},
@@ -647,7 +647,7 @@ ManagedCredentialType(
namespace='net', namespace='net',
kind='net', kind='net',
name=ugettext_noop('Network'), name=ugettext_noop('Network'),
managed_by_tower=True, managed=True,
inputs={ inputs={
'fields': [ 'fields': [
{'id': 'username', 'label': ugettext_noop('Username'), 'type': 'string'}, {'id': 'username', 'label': ugettext_noop('Username'), 'type': 'string'},
@@ -687,7 +687,7 @@ ManagedCredentialType(
namespace='aws', namespace='aws',
kind='cloud', kind='cloud',
name=ugettext_noop('Amazon Web Services'), name=ugettext_noop('Amazon Web Services'),
managed_by_tower=True, managed=True,
inputs={ inputs={
'fields': [ 'fields': [
{'id': 'username', 'label': ugettext_noop('Access Key'), 'type': 'string'}, {'id': 'username', 'label': ugettext_noop('Access Key'), 'type': 'string'},
@@ -718,7 +718,7 @@ ManagedCredentialType(
namespace='openstack', namespace='openstack',
kind='cloud', kind='cloud',
name=ugettext_noop('OpenStack'), name=ugettext_noop('OpenStack'),
managed_by_tower=True, managed=True,
inputs={ inputs={
'fields': [ 'fields': [
{'id': 'username', 'label': ugettext_noop('Username'), 'type': 'string'}, {'id': 'username', 'label': ugettext_noop('Username'), 'type': 'string'},
@@ -776,7 +776,7 @@ ManagedCredentialType(
namespace='vmware', namespace='vmware',
kind='cloud', kind='cloud',
name=ugettext_noop('VMware vCenter'), name=ugettext_noop('VMware vCenter'),
managed_by_tower=True, managed=True,
inputs={ inputs={
'fields': [ 'fields': [
{ {
@@ -801,7 +801,7 @@ ManagedCredentialType(
namespace='satellite6', namespace='satellite6',
kind='cloud', kind='cloud',
name=ugettext_noop('Red Hat Satellite 6'), name=ugettext_noop('Red Hat Satellite 6'),
managed_by_tower=True, managed=True,
inputs={ inputs={
'fields': [ 'fields': [
{ {
@@ -826,7 +826,7 @@ ManagedCredentialType(
namespace='gce', namespace='gce',
kind='cloud', kind='cloud',
name=ugettext_noop('Google Compute Engine'), name=ugettext_noop('Google Compute Engine'),
managed_by_tower=True, managed=True,
inputs={ inputs={
'fields': [ 'fields': [
{ {
@@ -864,7 +864,7 @@ ManagedCredentialType(
namespace='azure_rm', namespace='azure_rm',
kind='cloud', kind='cloud',
name=ugettext_noop('Microsoft Azure Resource Manager'), name=ugettext_noop('Microsoft Azure Resource Manager'),
managed_by_tower=True, managed=True,
inputs={ inputs={
'fields': [ 'fields': [
{ {
@@ -903,7 +903,7 @@ ManagedCredentialType(
namespace='github_token', namespace='github_token',
kind='token', kind='token',
name=ugettext_noop('GitHub Personal Access Token'), name=ugettext_noop('GitHub Personal Access Token'),
managed_by_tower=True, managed=True,
inputs={ inputs={
'fields': [ 'fields': [
{ {
@@ -922,7 +922,7 @@ ManagedCredentialType(
namespace='gitlab_token', namespace='gitlab_token',
kind='token', kind='token',
name=ugettext_noop('GitLab Personal Access Token'), name=ugettext_noop('GitLab Personal Access Token'),
managed_by_tower=True, managed=True,
inputs={ inputs={
'fields': [ 'fields': [
{ {
@@ -941,7 +941,7 @@ ManagedCredentialType(
namespace='insights', namespace='insights',
kind='insights', kind='insights',
name=ugettext_noop('Insights'), name=ugettext_noop('Insights'),
managed_by_tower=True, managed=True,
inputs={ inputs={
'fields': [ 'fields': [
{'id': 'username', 'label': ugettext_noop('Username'), 'type': 'string'}, {'id': 'username', 'label': ugettext_noop('Username'), 'type': 'string'},
@@ -965,7 +965,7 @@ ManagedCredentialType(
namespace='rhv', namespace='rhv',
kind='cloud', kind='cloud',
name=ugettext_noop('Red Hat Virtualization'), name=ugettext_noop('Red Hat Virtualization'),
managed_by_tower=True, managed=True,
inputs={ inputs={
'fields': [ 'fields': [
{'id': 'host', 'label': ugettext_noop('Host (Authentication URL)'), 'type': 'string', 'help_text': ugettext_noop('The host to authenticate with.')}, {'id': 'host', 'label': ugettext_noop('Host (Authentication URL)'), 'type': 'string', 'help_text': ugettext_noop('The host to authenticate with.')},
@@ -1009,7 +1009,7 @@ ManagedCredentialType(
namespace='controller', namespace='controller',
kind='cloud', kind='cloud',
name=ugettext_noop('Red Hat Ansible Automation Platform'), name=ugettext_noop('Red Hat Ansible Automation Platform'),
managed_by_tower=True, managed=True,
inputs={ inputs={
'fields': [ 'fields': [
{ {

View File

@@ -34,7 +34,7 @@ class ExecutionEnvironment(CommonModel):
help_text=_("The full image location, including the container registry, image name, and version tag."), help_text=_("The full image location, including the container registry, image name, and version tag."),
validators=[validate_container_image_name], validators=[validate_container_image_name],
) )
managed_by_tower = models.BooleanField(default=False, editable=False) managed = models.BooleanField(default=False, editable=False)
credential = models.ForeignKey( credential = models.ForeignKey(
'Credential', 'Credential',
related_name='%(class)ss', related_name='%(class)ss',

View File

@@ -1368,7 +1368,7 @@ class PluginFileInjector(object):
return env return env
def _get_shared_env(self, inventory_update, private_data_dir, private_data_files): def _get_shared_env(self, inventory_update, private_data_dir, private_data_files):
"""By default, we will apply the standard managed_by_tower injectors""" """By default, we will apply the standard managed injectors"""
injected_env = {} injected_env = {}
credential = inventory_update.get_cloud_credential() credential = inventory_update.get_cloud_credential()
# some sources may have no credential, specifically ec2 # some sources may have no credential, specifically ec2
@@ -1387,7 +1387,7 @@ class PluginFileInjector(object):
args = [] args = []
credential.credential_type.inject_credential(credential, injected_env, safe_env, args, private_data_dir) credential.credential_type.inject_credential(credential, injected_env, safe_env, args, private_data_dir)
# NOTE: safe_env is handled externally to injector class by build_safe_env static method # NOTE: safe_env is handled externally to injector class by build_safe_env static method
# that means that managed_by_tower injectors must only inject detectable env keys # that means that managed injectors must only inject detectable env keys
# enforcement of this is accomplished by tests # enforcement of this is accomplished by tests
return injected_env return injected_env

View File

@@ -117,7 +117,7 @@ class Organization(CommonModel, NotificationFieldsModel, ResourceMixin, CustomVi
def create_default_galaxy_credential(self): def create_default_galaxy_credential(self):
from awx.main.models import Credential from awx.main.models import Credential
public_galaxy_credential = Credential.objects.filter(managed_by_tower=True, name='Ansible Galaxy').first() public_galaxy_credential = Credential.objects.filter(managed=True, name='Ansible Galaxy').first()
if public_galaxy_credential not in self.galaxy_credentials.all(): if public_galaxy_credential not in self.galaxy_credentials.all():
self.galaxy_credentials.add(public_galaxy_credential) self.galaxy_credentials.add(public_galaxy_credential)

View File

@@ -75,7 +75,7 @@ def test_update_as_unauthorized_xfail(patch, delete):
@pytest.mark.django_db @pytest.mark.django_db
def test_update_managed_by_tower_xfail(patch, delete, admin): def test_update_managed_xfail(patch, delete, admin):
ssh = CredentialType.defaults['ssh']() ssh = CredentialType.defaults['ssh']()
ssh.save() ssh.save()
url = reverse('api:credential_type_detail', kwargs={'pk': ssh.pk}) url = reverse('api:credential_type_detail', kwargs={'pk': ssh.pk})
@@ -161,19 +161,19 @@ def test_create_as_admin(get, post, admin):
assert response.data['results'][0]['name'] == 'Custom Credential Type' assert response.data['results'][0]['name'] == 'Custom Credential Type'
assert response.data['results'][0]['inputs'] == {} assert response.data['results'][0]['inputs'] == {}
assert response.data['results'][0]['injectors'] == {} assert response.data['results'][0]['injectors'] == {}
assert response.data['results'][0]['managed_by_tower'] is False assert response.data['results'][0]['managed'] is False
@pytest.mark.django_db @pytest.mark.django_db
def test_create_managed_by_tower_readonly(get, post, admin): def test_create_managed_readonly(get, post, admin):
response = post( response = post(
reverse('api:credential_type_list'), {'kind': 'cloud', 'name': 'Custom Credential Type', 'inputs': {}, 'injectors': {}, 'managed_by_tower': True}, admin reverse('api:credential_type_list'), {'kind': 'cloud', 'name': 'Custom Credential Type', 'inputs': {}, 'injectors': {}, 'managed': True}, admin
) )
assert response.status_code == 201 assert response.status_code == 201
response = get(reverse('api:credential_type_list'), admin) response = get(reverse('api:credential_type_list'), admin)
assert response.data['count'] == 1 assert response.data['count'] == 1
assert response.data['results'][0]['managed_by_tower'] is False assert response.data['results'][0]['managed'] is False
@pytest.mark.django_db @pytest.mark.django_db

View File

@@ -266,7 +266,7 @@ def credentialtype_external():
with mock.patch('awx.main.models.credential.CredentialType.plugin', new_callable=PropertyMock) as mock_plugin: with mock.patch('awx.main.models.credential.CredentialType.plugin', new_callable=PropertyMock) as mock_plugin:
mock_plugin.return_value = MockPlugin() mock_plugin.return_value = MockPlugin()
external_type = CredentialType(kind='external', managed_by_tower=True, name='External Service', inputs=external_type_inputs) external_type = CredentialType(kind='external', managed=True, name='External Service', inputs=external_type_inputs)
external_type.save() external_type.save()
yield external_type yield external_type
@@ -825,9 +825,9 @@ def slice_job_factory(slice_jt_factory):
@pytest.fixture @pytest.fixture
def control_plane_execution_environment(): def control_plane_execution_environment():
return ExecutionEnvironment.objects.create(name="Control Plane EE", managed_by_tower=True) return ExecutionEnvironment.objects.create(name="Control Plane EE", managed=True)
@pytest.fixture @pytest.fixture
def default_job_execution_environment(): def default_job_execution_environment():
return ExecutionEnvironment.objects.create(name="Default Job EE", managed_by_tower=False) return ExecutionEnvironment.objects.create(name="Default Job EE", managed=False)

View File

@@ -121,7 +121,7 @@ def somecloud_type():
return CredentialType.objects.create( return CredentialType.objects.create(
kind='cloud', kind='cloud',
name='SomeCloud', name='SomeCloud',
managed_by_tower=False, managed=False,
inputs={'fields': [{'id': 'api_token', 'label': 'API Token', 'type': 'string', 'secret': True}]}, inputs={'fields': [{'id': 'api_token', 'label': 'API Token', 'type': 'string', 'secret': True}]},
injectors={'env': {'MY_CLOUD_API_TOKEN': '{{api_token.foo()}}'}}, injectors={'env': {'MY_CLOUD_API_TOKEN': '{{api_token.foo()}}'}},
) )

View File

@@ -79,8 +79,8 @@ def test_default_cred_types():
'aws', 'aws',
'azure_kv', 'azure_kv',
'azure_rm', 'azure_rm',
'centrify_vault_kv',
'conjur', 'conjur',
'centrify_vault_kv',
'controller', 'controller',
'galaxy_api_token', 'galaxy_api_token',
'gce', 'gce',
@@ -103,14 +103,14 @@ def test_default_cred_types():
] ]
for type_ in CredentialType.defaults.values(): for type_ in CredentialType.defaults.values():
assert type_().managed_by_tower is True assert type_().managed is True
@pytest.mark.django_db @pytest.mark.django_db
def test_credential_creation(organization_factory): def test_credential_creation(organization_factory):
org = organization_factory('test').organization org = organization_factory('test').organization
type_ = CredentialType( type_ = CredentialType(
kind='cloud', name='SomeCloud', managed_by_tower=True, inputs={'fields': [{'id': 'username', 'label': 'Username for SomeCloud', 'type': 'string'}]} kind='cloud', name='SomeCloud', managed=True, inputs={'fields': [{'id': 'username', 'label': 'Username for SomeCloud', 'type': 'string'}]}
) )
type_.save() type_.save()
@@ -287,7 +287,7 @@ def test_credential_get_input(organization_factory):
type_ = CredentialType( type_ = CredentialType(
kind='vault', kind='vault',
name='somevault', name='somevault',
managed_by_tower=True, managed=True,
inputs={ inputs={
'fields': [ 'fields': [
{ {

View File

@@ -1,117 +0,0 @@
import importlib
from django.conf import settings
from django.contrib.contenttypes.models import ContentType
import pytest
from awx.main.models import Credential, Organization
from awx.conf.models import Setting
from awx.main.migrations import _galaxy as galaxy
class FakeApps(object):
def get_model(self, app, model):
if app == 'contenttypes':
return ContentType
return getattr(importlib.import_module(f'awx.{app}.models'), model)
apps = FakeApps()
@pytest.mark.django_db
def test_default_public_galaxy():
org = Organization.objects.create()
assert org.galaxy_credentials.count() == 0
galaxy.migrate_galaxy_settings(apps, None)
assert org.galaxy_credentials.count() == 1
creds = org.galaxy_credentials.all()
assert creds[0].name == 'Ansible Galaxy'
assert creds[0].inputs['url'] == 'https://galaxy.ansible.com/'
@pytest.mark.django_db
def test_public_galaxy_disabled():
Setting.objects.create(key='PUBLIC_GALAXY_ENABLED', value=False)
org = Organization.objects.create()
assert org.galaxy_credentials.count() == 0
galaxy.migrate_galaxy_settings(apps, None)
assert org.galaxy_credentials.count() == 0
@pytest.mark.django_db
def test_rh_automation_hub():
Setting.objects.create(key='PRIMARY_GALAXY_URL', value='https://cloud.redhat.com/api/automation-hub/')
Setting.objects.create(key='PRIMARY_GALAXY_TOKEN', value='secret123')
org = Organization.objects.create()
assert org.galaxy_credentials.count() == 0
galaxy.migrate_galaxy_settings(apps, None)
assert org.galaxy_credentials.count() == 2
assert org.galaxy_credentials.first().name == 'Ansible Automation Hub (https://cloud.redhat.com/api/automation-hub/)' # noqa
@pytest.mark.django_db
def test_multiple_galaxies():
for i in range(5):
Organization.objects.create(name=f'Org {i}')
Setting.objects.create(key='PRIMARY_GALAXY_URL', value='https://example.org/')
Setting.objects.create(key='PRIMARY_GALAXY_AUTH_URL', value='https://auth.example.org/')
Setting.objects.create(key='PRIMARY_GALAXY_USERNAME', value='user')
Setting.objects.create(key='PRIMARY_GALAXY_PASSWORD', value='pass')
Setting.objects.create(key='PRIMARY_GALAXY_TOKEN', value='secret123')
for org in Organization.objects.all():
assert org.galaxy_credentials.count() == 0
galaxy.migrate_galaxy_settings(apps, None)
for org in Organization.objects.all():
assert org.galaxy_credentials.count() == 2
creds = org.galaxy_credentials.all()
assert creds[0].name == 'Private Galaxy (https://example.org/)'
assert creds[0].inputs['url'] == 'https://example.org/'
assert creds[0].inputs['auth_url'] == 'https://auth.example.org/'
assert creds[0].inputs['token'].startswith('$encrypted$')
assert creds[0].get_input('token') == 'secret123'
assert creds[1].name == 'Ansible Galaxy'
assert creds[1].inputs['url'] == 'https://galaxy.ansible.com/'
public_galaxy_creds = Credential.objects.filter(name='Ansible Galaxy')
assert public_galaxy_creds.count() == 1
assert public_galaxy_creds.first().managed_by_tower is True
@pytest.mark.django_db
def test_fallback_galaxies():
org = Organization.objects.create()
assert org.galaxy_credentials.count() == 0
Setting.objects.create(key='PRIMARY_GALAXY_URL', value='https://example.org/')
Setting.objects.create(key='PRIMARY_GALAXY_AUTH_URL', value='https://auth.example.org/')
Setting.objects.create(key='PRIMARY_GALAXY_TOKEN', value='secret123')
try:
settings.FALLBACK_GALAXY_SERVERS = [
{
'id': 'abc123',
'url': 'https://some-other-galaxy.example.org/',
'auth_url': 'https://some-other-galaxy.sso.example.org/',
'username': 'user',
'password': 'pass',
'token': 'fallback123',
}
]
galaxy.migrate_galaxy_settings(apps, None)
finally:
settings.FALLBACK_GALAXY_SERVERS = []
assert org.galaxy_credentials.count() == 3
creds = org.galaxy_credentials.all()
assert creds[0].name == 'Private Galaxy (https://example.org/)'
assert creds[0].inputs['url'] == 'https://example.org/'
assert creds[1].name == 'Ansible Galaxy (https://some-other-galaxy.example.org/)'
assert creds[1].inputs['url'] == 'https://some-other-galaxy.example.org/'
assert creds[1].inputs['auth_url'] == 'https://some-other-galaxy.sso.example.org/'
assert creds[1].inputs['token'].startswith('$encrypted$')
assert creds[1].get_input('token') == 'fallback123'
assert creds[2].name == 'Ansible Galaxy'
assert creds[2].inputs['url'] == 'https://galaxy.ansible.com/'

View File

@@ -182,8 +182,8 @@ def create_reference_data(source_dir, env, content):
@pytest.mark.django_db @pytest.mark.django_db
@pytest.mark.parametrize('this_kind', CLOUD_PROVIDERS) @pytest.mark.parametrize('this_kind', CLOUD_PROVIDERS)
def test_inventory_update_injected_content(this_kind, inventory, fake_credential_factory): def test_inventory_update_injected_content(this_kind, inventory, fake_credential_factory):
ExecutionEnvironment.objects.create(name='Control Plane EE', managed_by_tower=True) ExecutionEnvironment.objects.create(name='Control Plane EE', managed=True)
ExecutionEnvironment.objects.create(name='Default Job EE', managed_by_tower=False) ExecutionEnvironment.objects.create(name='Default Job EE', managed=False)
injector = InventorySource.injectors[this_kind] injector = InventorySource.injectors[this_kind]
if injector.plugin_name is None: if injector.plugin_name is None:

View File

@@ -37,7 +37,7 @@ def test_cloudforms_inventory_removal(inventory):
name='Red Hat CloudForms', name='Red Hat CloudForms',
namespace='cloudforms', namespace='cloudforms',
kind='cloud', kind='cloud',
managed_by_tower=True, managed=True,
inputs={}, inputs={},
) )
CredentialType.defaults['cloudforms']().save() CredentialType.defaults['cloudforms']().save()

View File

@@ -12,7 +12,7 @@ from django.urls import URLResolver, URLPattern
@pytest.fixture() @pytest.fixture()
def execution_environment(): def execution_environment():
return ExecutionEnvironment(name="test-ee", description="test-ee", managed_by_tower=True) return ExecutionEnvironment(name="test-ee", description="test-ee", managed=True)
@pytest.fixture(autouse=True) @pytest.fixture(autouse=True)

View File

@@ -93,7 +93,7 @@ def test_custom_error_messages(schema, given, message):
], ],
) )
def test_cred_type_input_schema_validity(input_, valid): def test_cred_type_input_schema_validity(input_, valid):
type_ = CredentialType(kind='cloud', name='SomeCloud', managed_by_tower=True, inputs=input_) type_ = CredentialType(kind='cloud', name='SomeCloud', managed=True, inputs=input_)
field = CredentialType._meta.get_field('inputs') field = CredentialType._meta.get_field('inputs')
if valid is False: if valid is False:
with pytest.raises(ValidationError): with pytest.raises(ValidationError):
@@ -151,7 +151,7 @@ def test_cred_type_injectors_schema(injectors, valid):
type_ = CredentialType( type_ = CredentialType(
kind='cloud', kind='cloud',
name='SomeCloud', name='SomeCloud',
managed_by_tower=True, managed=True,
inputs={ inputs={
'fields': [ 'fields': [
{'id': 'username', 'type': 'string', 'label': '_'}, {'id': 'username', 'type': 'string', 'label': '_'},
@@ -190,7 +190,7 @@ def test_credential_creation_validation_failure(inputs):
type_ = CredentialType( type_ = CredentialType(
kind='cloud', kind='cloud',
name='SomeCloud', name='SomeCloud',
managed_by_tower=True, managed=True,
inputs={ inputs={
'fields': [{'id': 'username', 'label': 'Username for SomeCloud', 'type': 'string'}, {'id': 'flag', 'label': 'Some Boolean Flag', 'type': 'boolean'}] 'fields': [{'id': 'username', 'label': 'Username for SomeCloud', 'type': 'string'}, {'id': 'flag', 'label': 'Some Boolean Flag', 'type': 'boolean'}]
}, },

View File

@@ -588,8 +588,8 @@ class TestGenericRun:
@pytest.mark.django_db @pytest.mark.django_db
class TestAdhocRun(TestJobExecution): class TestAdhocRun(TestJobExecution):
def test_options_jinja_usage(self, adhoc_job, adhoc_update_model_wrapper): def test_options_jinja_usage(self, adhoc_job, adhoc_update_model_wrapper):
ExecutionEnvironment.objects.create(name='Control Plane EE', managed_by_tower=True) ExecutionEnvironment.objects.create(name='Control Plane EE', managed=True)
ExecutionEnvironment.objects.create(name='Default Job EE', managed_by_tower=False) ExecutionEnvironment.objects.create(name='Default Job EE', managed=False)
adhoc_job.module_args = '{{ ansible_ssh_pass }}' adhoc_job.module_args = '{{ ansible_ssh_pass }}'
adhoc_job.websocket_emit_status = mock.Mock() adhoc_job.websocket_emit_status = mock.Mock()
@@ -1095,7 +1095,7 @@ class TestJobCredentials(TestJobExecution):
some_cloud = CredentialType( some_cloud = CredentialType(
kind='cloud', kind='cloud',
name='SomeCloud', name='SomeCloud',
managed_by_tower=False, managed=False,
inputs={'fields': [{'id': 'api_token', 'label': 'API Token', 'type': 'string'}]}, inputs={'fields': [{'id': 'api_token', 'label': 'API Token', 'type': 'string'}]},
injectors={'env': {'MY_CLOUD_API_TOKEN': '{{api_token.foo()}}'}}, injectors={'env': {'MY_CLOUD_API_TOKEN': '{{api_token.foo()}}'}},
) )
@@ -1108,7 +1108,7 @@ class TestJobCredentials(TestJobExecution):
some_cloud = CredentialType( some_cloud = CredentialType(
kind='cloud', kind='cloud',
name='SomeCloud', name='SomeCloud',
managed_by_tower=False, managed=False,
inputs={'fields': [{'id': 'api_token', 'label': 'API Token', 'type': 'string'}]}, inputs={'fields': [{'id': 'api_token', 'label': 'API Token', 'type': 'string'}]},
injectors={'env': {'MY_CLOUD_API_TOKEN': '{{api_token}}'}}, injectors={'env': {'MY_CLOUD_API_TOKEN': '{{api_token}}'}},
) )
@@ -1123,7 +1123,7 @@ class TestJobCredentials(TestJobExecution):
some_cloud = CredentialType( some_cloud = CredentialType(
kind='cloud', kind='cloud',
name='SomeCloud', name='SomeCloud',
managed_by_tower=False, managed=False,
inputs={'fields': [{'id': 'turbo_button', 'label': 'Turbo Button', 'type': 'boolean'}]}, inputs={'fields': [{'id': 'turbo_button', 'label': 'Turbo Button', 'type': 'boolean'}]},
injectors={'env': {'TURBO_BUTTON': '{{turbo_button}}'}}, injectors={'env': {'TURBO_BUTTON': '{{turbo_button}}'}},
) )
@@ -1140,7 +1140,7 @@ class TestJobCredentials(TestJobExecution):
some_cloud = CredentialType( some_cloud = CredentialType(
kind='cloud', kind='cloud',
name='SomeCloud', name='SomeCloud',
managed_by_tower=False, managed=False,
inputs={'fields': [{'id': 'api_token', 'label': 'API Token', 'type': 'string'}]}, inputs={'fields': [{'id': 'api_token', 'label': 'API Token', 'type': 'string'}]},
injectors={'env': {'JOB_ID': 'reserved'}}, injectors={'env': {'JOB_ID': 'reserved'}},
) )
@@ -1155,7 +1155,7 @@ class TestJobCredentials(TestJobExecution):
some_cloud = CredentialType( some_cloud = CredentialType(
kind='cloud', kind='cloud',
name='SomeCloud', name='SomeCloud',
managed_by_tower=False, managed=False,
inputs={'fields': [{'id': 'password', 'label': 'Password', 'type': 'string', 'secret': True}]}, inputs={'fields': [{'id': 'password', 'label': 'Password', 'type': 'string', 'secret': True}]},
injectors={'env': {'MY_CLOUD_PRIVATE_VAR': '{{password}}'}}, injectors={'env': {'MY_CLOUD_PRIVATE_VAR': '{{password}}'}},
) )
@@ -1175,7 +1175,7 @@ class TestJobCredentials(TestJobExecution):
some_cloud = CredentialType( some_cloud = CredentialType(
kind='cloud', kind='cloud',
name='SomeCloud', name='SomeCloud',
managed_by_tower=False, managed=False,
inputs={'fields': [{'id': 'api_token', 'label': 'API Token', 'type': 'string'}]}, inputs={'fields': [{'id': 'api_token', 'label': 'API Token', 'type': 'string'}]},
injectors={'extra_vars': {'api_token': '{{api_token}}'}}, injectors={'extra_vars': {'api_token': '{{api_token}}'}},
) )
@@ -1194,7 +1194,7 @@ class TestJobCredentials(TestJobExecution):
some_cloud = CredentialType( some_cloud = CredentialType(
kind='cloud', kind='cloud',
name='SomeCloud', name='SomeCloud',
managed_by_tower=False, managed=False,
inputs={'fields': [{'id': 'turbo_button', 'label': 'Turbo Button', 'type': 'boolean'}]}, inputs={'fields': [{'id': 'turbo_button', 'label': 'Turbo Button', 'type': 'boolean'}]},
injectors={'extra_vars': {'turbo_button': '{{turbo_button}}'}}, injectors={'extra_vars': {'turbo_button': '{{turbo_button}}'}},
) )
@@ -1213,7 +1213,7 @@ class TestJobCredentials(TestJobExecution):
some_cloud = CredentialType( some_cloud = CredentialType(
kind='cloud', kind='cloud',
name='SomeCloud', name='SomeCloud',
managed_by_tower=False, managed=False,
inputs={'fields': [{'id': 'turbo_button', 'label': 'Turbo Button', 'type': 'boolean'}]}, inputs={'fields': [{'id': 'turbo_button', 'label': 'Turbo Button', 'type': 'boolean'}]},
injectors={'extra_vars': {'turbo_button': '{% if turbo_button %}FAST!{% else %}SLOW!{% endif %}'}}, injectors={'extra_vars': {'turbo_button': '{% if turbo_button %}FAST!{% else %}SLOW!{% endif %}'}},
) )
@@ -1234,7 +1234,7 @@ class TestJobCredentials(TestJobExecution):
some_cloud = CredentialType( some_cloud = CredentialType(
kind='cloud', kind='cloud',
name='SomeCloud', name='SomeCloud',
managed_by_tower=False, managed=False,
inputs={'fields': [{'id': 'password', 'label': 'Password', 'type': 'string', 'secret': True}]}, inputs={'fields': [{'id': 'password', 'label': 'Password', 'type': 'string', 'secret': True}]},
injectors={'extra_vars': {'password': '{{password}}'}}, injectors={'extra_vars': {'password': '{{password}}'}},
) )
@@ -1252,7 +1252,7 @@ class TestJobCredentials(TestJobExecution):
some_cloud = CredentialType( some_cloud = CredentialType(
kind='cloud', kind='cloud',
name='SomeCloud', name='SomeCloud',
managed_by_tower=False, managed=False,
inputs={'fields': [{'id': 'api_token', 'label': 'API Token', 'type': 'string'}]}, inputs={'fields': [{'id': 'api_token', 'label': 'API Token', 'type': 'string'}]},
injectors={'file': {'template': '[mycloud]\n{{api_token}}'}, 'env': {'MY_CLOUD_INI_FILE': '{{tower.filename}}'}}, injectors={'file': {'template': '[mycloud]\n{{api_token}}'}, 'env': {'MY_CLOUD_INI_FILE': '{{tower.filename}}'}},
) )
@@ -1269,7 +1269,7 @@ class TestJobCredentials(TestJobExecution):
some_cloud = CredentialType( some_cloud = CredentialType(
kind='cloud', kind='cloud',
name='SomeCloud', name='SomeCloud',
managed_by_tower=False, managed=False,
inputs={'fields': []}, inputs={'fields': []},
injectors={'file': {'template': value}, 'env': {'MY_CLOUD_INI_FILE': '{{tower.filename}}'}}, injectors={'file': {'template': value}, 'env': {'MY_CLOUD_INI_FILE': '{{tower.filename}}'}},
) )
@@ -1288,7 +1288,7 @@ class TestJobCredentials(TestJobExecution):
some_cloud = CredentialType( some_cloud = CredentialType(
kind='cloud', kind='cloud',
name='SomeCloud', name='SomeCloud',
managed_by_tower=False, managed=False,
inputs={'fields': [{'id': 'cert', 'label': 'Certificate', 'type': 'string'}, {'id': 'key', 'label': 'Key', 'type': 'string'}]}, inputs={'fields': [{'id': 'cert', 'label': 'Certificate', 'type': 'string'}, {'id': 'key', 'label': 'Key', 'type': 'string'}]},
injectors={ injectors={
'file': {'template.cert': '[mycert]\n{{cert}}', 'template.key': '[mykey]\n{{key}}'}, 'file': {'template.cert': '[mycert]\n{{cert}}', 'template.key': '[mykey]\n{{key}}'},
@@ -1921,7 +1921,7 @@ def test_aquire_lock_acquisition_fail_logged(fcntl_lockf, logging_getLogger, os_
def test_managed_injector_redaction(injector_cls): def test_managed_injector_redaction(injector_cls):
"""See awx.main.models.inventory.PluginFileInjector._get_shared_env """See awx.main.models.inventory.PluginFileInjector._get_shared_env
The ordering within awx.main.tasks.BaseTask and contract with build_env The ordering within awx.main.tasks.BaseTask and contract with build_env
requires that all managed_by_tower injectors are safely redacted by the requires that all managed injectors are safely redacted by the
static method build_safe_env without having to employ the safe namespace static method build_safe_env without having to employ the safe namespace
as in inject_credential as in inject_credential

View File

@@ -366,7 +366,7 @@ def get_allowed_fields(obj, serializer_mapping):
fields_excluded = ACTIVITY_STREAM_FIELD_EXCLUSIONS.get(model_name, []) fields_excluded = ACTIVITY_STREAM_FIELD_EXCLUSIONS.get(model_name, [])
# see definition of from_db for CredentialType # see definition of from_db for CredentialType
# injection logic of any managed types are incompatible with activity stream # injection logic of any managed types are incompatible with activity stream
if model_name == 'credentialtype' and obj.managed_by_tower and obj.namespace: if model_name == 'credentialtype' and obj.managed and obj.namespace:
fields_excluded.extend(['inputs', 'injectors']) fields_excluded.extend(['inputs', 'injectors'])
if fields_excluded: if fields_excluded:
allowed_fields = [f for f in allowed_fields if f not in fields_excluded] allowed_fields = [f for f in allowed_fields if f not in fields_excluded]

View File

@@ -7,18 +7,18 @@ from awx.main.models.execution_environments import ExecutionEnvironment
def get_control_plane_execution_environment(): def get_control_plane_execution_environment():
return ExecutionEnvironment.objects.filter(organization=None, managed_by_tower=True).first() return ExecutionEnvironment.objects.filter(organization=None, managed=True).first()
def get_default_execution_environment(): def get_default_execution_environment():
if settings.DEFAULT_EXECUTION_ENVIRONMENT is not None: if settings.DEFAULT_EXECUTION_ENVIRONMENT is not None:
return settings.DEFAULT_EXECUTION_ENVIRONMENT return settings.DEFAULT_EXECUTION_ENVIRONMENT
installed_default = ExecutionEnvironment.objects.filter( installed_default = ExecutionEnvironment.objects.filter(
image__in=[ee['image'] for ee in settings.GLOBAL_JOB_EXECUTION_ENVIRONMENTS], organization=None, managed_by_tower=False image__in=[ee['image'] for ee in settings.GLOBAL_JOB_EXECUTION_ENVIRONMENTS], organization=None, managed=False
).first() ).first()
if installed_default: if installed_default:
return installed_default return installed_default
return ExecutionEnvironment.objects.filter(organization=None, managed_by_tower=False).first() return ExecutionEnvironment.objects.filter(organization=None, managed=False).first()
def get_default_pod_spec(): def get_default_pod_spec():

View File

@@ -185,7 +185,7 @@ DEFAULT_EXECUTION_ENVIRONMENT = None
GLOBAL_JOB_EXECUTION_ENVIRONMENTS = [{'name': 'AWX EE 0.3.0', 'image': 'quay.io/ansible/awx-ee:0.3.0'}] GLOBAL_JOB_EXECUTION_ENVIRONMENTS = [{'name': 'AWX EE 0.3.0', 'image': 'quay.io/ansible/awx-ee:0.3.0'}]
# This setting controls which EE will be used for project updates. # This setting controls which EE will be used for project updates.
# The awx-manage register_default_execution_environments command reads this setting and registers the EE # The awx-manage register_default_execution_environments command reads this setting and registers the EE
# This image is distinguished from others by having "managed_by_tower" set to True and users have limited # This image is distinguished from others by having "managed" set to True and users have limited
# ability to modify it through the API. # ability to modify it through the API.
# If a registry credential is needed to pull the image, that can be provided to the awx-manage command # If a registry credential is needed to pull the image, that can be provided to the awx-manage command
CONTROL_PLANE_EXECUTION_ENVIRONMENT = 'quay.io/ansible/awx-ee:0.3.0' CONTROL_PLANE_EXECUTION_ENVIRONMENT = 'quay.io/ansible/awx-ee:0.3.0'

View File

@@ -13,7 +13,7 @@ from awx.main.models import User, Team, Organization, Credential, CredentialType
def galaxy_credential(): def galaxy_credential():
galaxy_type = CredentialType.objects.create(kind='galaxy') galaxy_type = CredentialType.objects.create(kind='galaxy')
cred = Credential( cred = Credential(
created=now(), modified=now(), name='Ansible Galaxy', managed_by_tower=True, credential_type=galaxy_type, inputs={'url': 'https://galaxy.ansible.com/'} created=now(), modified=now(), name='Ansible Galaxy', managed=True, credential_type=galaxy_type, inputs={'url': 'https://galaxy.ansible.com/'}
) )
cred.save() cred.save()

View File

@@ -38,7 +38,7 @@ const mockCredentialResults = {
description: '', description: '',
kind: 'ssh', kind: 'ssh',
namespace: 'ssh', namespace: 'ssh',
managed_by_tower: true, managed: true,
inputs: { inputs: {
fields: [ fields: [
{ {

View File

@@ -63,7 +63,7 @@ function CredentialDetail({ credential }) {
useCallback(async () => { useCallback(async () => {
const [ const [
{ {
data: { inputs: credentialTypeInputs, managed_by_tower }, data: { inputs: credentialTypeInputs, managed },
}, },
{ {
data: { results: loadedInputSources }, data: { results: loadedInputSources },
@@ -74,7 +74,7 @@ function CredentialDetail({ credential }) {
]); ]);
return { return {
fields: credentialTypeInputs.fields || [], fields: credentialTypeInputs.fields || [],
managedByTower: managed_by_tower, managedByTower: managed,
inputSources: loadedInputSources.reduce( inputSources: loadedInputSources.reduce(
(inputSourcesMap, inputSource) => { (inputSourcesMap, inputSource) => {
inputSourcesMap[inputSource.input_field_name] = inputSource; inputSourcesMap[inputSource.input_field_name] = inputSource;

View File

@@ -158,7 +158,7 @@ const mockCredentialResults = {
description: '', description: '',
kind: 'ssh', kind: 'ssh',
namespace: 'ssh', namespace: 'ssh',
managed_by_tower: true, managed: true,
inputs: { inputs: {
fields: [ fields: [
{ {
@@ -238,7 +238,7 @@ const mockCredentialResults = {
description: '', description: '',
kind: 'cloud', kind: 'cloud',
namespace: 'gce', namespace: 'gce',
managed_by_tower: true, managed: true,
inputs: { inputs: {
fields: [ fields: [
{ {

View File

@@ -47,7 +47,7 @@ const mockCredentialTypeDetail = {
description: '', description: '',
kind: 'external', kind: 'external',
namespace: 'conjur', namespace: 'conjur',
managed_by_tower: true, managed: true,
inputs: { inputs: {
fields: [ fields: [
{ id: 'url', label: 'Conjur URL', type: 'string', format: 'url' }, { id: 'url', label: 'Conjur URL', type: 'string', format: 'url' },

View File

@@ -19,7 +19,7 @@
"description": "", "description": "",
"kind": "cloud", "kind": "cloud",
"namespace": "aws", "namespace": "aws",
"managed_by_tower": true, "managed": true,
"inputs": { "inputs": {
"fields": [ "fields": [
{ {
@@ -65,7 +65,7 @@
"description": "", "description": "",
"kind": "cloud", "kind": "cloud",
"namespace": "tower", "namespace": "tower",
"managed_by_tower": true, "managed": true,
"inputs": { "inputs": {
"fields": [ "fields": [
{ {
@@ -130,7 +130,7 @@
"description": "", "description": "",
"kind": "cloud", "kind": "cloud",
"namespace": "gce", "namespace": "gce",
"managed_by_tower": true, "managed": true,
"inputs": { "inputs": {
"fields": [ "fields": [
{ {
@@ -179,7 +179,7 @@
"description": "", "description": "",
"kind": "cloud", "kind": "cloud",
"namespace": "azure_rm", "namespace": "azure_rm",
"managed_by_tower": true, "managed": true,
"inputs": { "inputs": {
"fields": [ "fields": [
{ {
@@ -246,7 +246,7 @@
"description": "", "description": "",
"kind": "cloud", "kind": "cloud",
"namespace": "openstack", "namespace": "openstack",
"managed_by_tower": true, "managed": true,
"inputs": { "inputs": {
"fields": [ "fields": [
{ {
@@ -318,7 +318,7 @@
"description": "", "description": "",
"kind": "cloud", "kind": "cloud",
"namespace": "satellite6", "namespace": "satellite6",
"managed_by_tower": true, "managed": true,
"inputs": { "inputs": {
"fields": [ "fields": [
{ {
@@ -363,7 +363,7 @@
"description": "", "description": "",
"kind": "cloud", "kind": "cloud",
"namespace": "rhv", "namespace": "rhv",
"managed_by_tower": true, "managed": true,
"inputs": { "inputs": {
"fields": [ "fields": [
{ {
@@ -424,7 +424,7 @@
"description": "", "description": "",
"kind": "cloud", "kind": "cloud",
"namespace": "vmware", "namespace": "vmware",
"managed_by_tower": true, "managed": true,
"inputs": { "inputs": {
"fields": [ "fields": [
{ {
@@ -469,7 +469,7 @@
"description": "", "description": "",
"kind": "external", "kind": "external",
"namespace": "aim", "namespace": "aim",
"managed_by_tower": true, "managed": true,
"inputs": { "inputs": {
"fields": [ "fields": [
{ {
@@ -550,7 +550,7 @@
"description": "", "description": "",
"kind": "external", "kind": "external",
"namespace": "conjur", "namespace": "conjur",
"managed_by_tower": true, "managed": true,
"inputs": { "inputs": {
"fields": [ "fields": [
{ {
@@ -620,7 +620,7 @@
"description": "", "description": "",
"kind": "external", "kind": "external",
"namespace": "hashivault_kv", "namespace": "hashivault_kv",
"managed_by_tower": true, "managed": true,
"inputs": { "inputs": {
"fields": [ "fields": [
{ {
@@ -723,7 +723,7 @@
"description": "", "description": "",
"kind": "external", "kind": "external",
"namespace": "hashivault_ssh", "namespace": "hashivault_ssh",
"managed_by_tower": true, "managed": true,
"inputs": { "inputs": {
"fields": [ "fields": [
{ {
@@ -819,7 +819,7 @@
"description": "", "description": "",
"kind": "external", "kind": "external",
"namespace": "azure_kv", "namespace": "azure_kv",
"managed_by_tower": true, "managed": true,
"inputs": { "inputs": {
"fields": [ "fields": [
{ {
@@ -895,7 +895,7 @@
"description": "", "description": "",
"kind": "insights", "kind": "insights",
"namespace": "insights", "namespace": "insights",
"managed_by_tower": true, "managed": true,
"inputs": { "inputs": {
"fields": [ "fields": [
{ {
@@ -939,7 +939,7 @@
"description": "", "description": "",
"kind": "kubernetes", "kind": "kubernetes",
"namespace": "kubernetes_bearer_token", "namespace": "kubernetes_bearer_token",
"managed_by_tower": true, "managed": true,
"inputs": { "inputs": {
"fields": [ "fields": [
{ {
@@ -992,7 +992,7 @@
"description": "", "description": "",
"kind": "net", "kind": "net",
"namespace": "net", "namespace": "net",
"managed_by_tower": true, "managed": true,
"inputs": { "inputs": {
"fields": [ "fields": [
{ {
@@ -1059,7 +1059,7 @@
"description": "", "description": "",
"kind": "scm", "kind": "scm",
"namespace": "scm", "namespace": "scm",
"managed_by_tower": true, "managed": true,
"inputs": { "inputs": {
"fields": [ "fields": [
{ {
@@ -1111,7 +1111,7 @@
"description": "", "description": "",
"kind": "ssh", "kind": "ssh",
"namespace": "ssh", "namespace": "ssh",
"managed_by_tower": true, "managed": true,
"inputs": { "inputs": {
"fields": [ "fields": [
{ {
@@ -1190,7 +1190,7 @@
"description": "", "description": "",
"kind": "token", "kind": "token",
"namespace": "github_token", "namespace": "github_token",
"managed_by_tower": true, "managed": true,
"inputs": { "inputs": {
"fields": [ "fields": [
{ {
@@ -1225,7 +1225,7 @@
"description": "", "description": "",
"kind": "token", "kind": "token",
"namespace": "gitlab_token", "namespace": "gitlab_token",
"managed_by_tower": true, "managed": true,
"inputs": { "inputs": {
"fields": [ "fields": [
{ {
@@ -1260,7 +1260,7 @@
"description": "", "description": "",
"kind": "vault", "kind": "vault",
"namespace": "vault", "namespace": "vault",
"managed_by_tower": true, "managed": true,
"inputs": { "inputs": {
"fields": [ "fields": [
{ {
@@ -1302,7 +1302,7 @@
"description": "", "description": "",
"kind": "galaxy", "kind": "galaxy",
"namespace": "galaxy_api_token", "namespace": "galaxy_api_token",
"managed_by_tower": true, "managed": true,
"inputs": { "inputs": {
"fields": [ "fields": [
{ {

View File

@@ -19,7 +19,7 @@
"description": "", "description": "",
"kind": "ssh", "kind": "ssh",
"namespace": "ssh", "namespace": "ssh",
"managed_by_tower": true, "managed": true,
"inputs": { "inputs": {
"fields": [ "fields": [
{ {

View File

@@ -78,7 +78,7 @@
"description": "Bar", "description": "Bar",
"organization": 1, "organization": 1,
"credential_type": 42, "credential_type": 42,
"managed_by_tower": false, "managed": false,
"inputs": { "inputs": {
"url": "https://localhost.com", "url": "https://localhost.com",
"auth_url": "" "auth_url": ""

View File

@@ -73,7 +73,7 @@
"description": "", "description": "",
"organization": null, "organization": null,
"credential_type": 16, "credential_type": 16,
"managed_by_tower": false, "managed": false,
"inputs": { "inputs": {
"host": "https://localhost", "host": "https://localhost",
"username": "", "username": "",

View File

@@ -23,7 +23,7 @@ import CredentialTypeListItem from './CredentialTypeListItem';
const QS_CONFIG = getQSConfig('credential-type', { const QS_CONFIG = getQSConfig('credential-type', {
page: 1, page: 1,
page_size: 20, page_size: 20,
managed_by_tower: false, managed: false,
}); });
function CredentialTypeList() { function CredentialTypeList() {

View File

@@ -34,7 +34,7 @@ const credentialType = {
description: 'Jenkins Credential', description: 'Jenkins Credential',
kind: 'cloud', kind: 'cloud',
namespace: null, namespace: null,
managed_by_tower: false, managed: false,
inputs: JSON.stringify({ inputs: JSON.stringify({
fields: [ fields: [
{ {

View File

@@ -33,7 +33,7 @@
"description": "Jenkins Credential", "description": "Jenkins Credential",
"kind": "cloud", "kind": "cloud",
"namespace": null, "namespace": null,
"managed_by_tower": false, "managed": false,
"inputs": { "inputs": {
"fields": [ "fields": [
{ {

View File

@@ -27,7 +27,7 @@ function ExecutionEnvironmentDetails({ executionEnvironment }) {
pull, pull,
organization, organization,
summary_fields, summary_fields,
managed_by_tower: managedByTower, managed: managedByTower,
} = executionEnvironment; } = executionEnvironment;
const { const {
@@ -64,7 +64,7 @@ function ExecutionEnvironmentDetails({ executionEnvironment }) {
dataCy="execution-environment-detail-description" dataCy="execution-environment-detail-description"
/> />
<Detail <Detail
label={t`Managed by Tower`} label={t`Managed`}
value={managedByTower ? t`True` : t`False`} value={managedByTower ? t`True` : t`False`}
dataCy="execution-environment-managed-by-tower" dataCy="execution-environment-managed-by-tower"
/> />

View File

@@ -53,7 +53,7 @@ const executionEnvironment = {
description: 'Foo', description: 'Foo',
organization: null, organization: null,
image: 'https://localhost:90/12345/ma', image: 'https://localhost:90/12345/ma',
managed_by_tower: false, managed: false,
credential: 4, credential: 4,
}; };
@@ -82,7 +82,7 @@ describe('<ExecutionEnvironmentDetails/>', () => {
wrapper.find('Detail[label="Credential"]').prop('value').props.children wrapper.find('Detail[label="Credential"]').prop('value').props.children
).toEqual(executionEnvironment.summary_fields.credential.name); ).toEqual(executionEnvironment.summary_fields.credential.name);
expect( expect(
wrapper.find('Detail[label="Managed by Tower"]').prop('value') wrapper.find('Detail[label="Managed"]').prop('value')
).toEqual('False'); ).toEqual('False');
const dates = wrapper.find('UserDateDetail'); const dates = wrapper.find('UserDateDetail');
expect(dates).toHaveLength(2); expect(dates).toHaveLength(2);
@@ -153,13 +153,13 @@ describe('<ExecutionEnvironmentDetails/>', () => {
expect(history.location.pathname).toBe('/execution_environments'); expect(history.location.pathname).toBe('/execution_environments');
}); });
test('should render action buttons to ee managed by tower', async () => { test('should render action buttons to managed ee', async () => {
await act(async () => { await act(async () => {
wrapper = mountWithContexts( wrapper = mountWithContexts(
<ExecutionEnvironmentDetails <ExecutionEnvironmentDetails
executionEnvironment={{ executionEnvironment={{
...executionEnvironment, ...executionEnvironment,
managed_by_tower: true, managed: true,
}} }}
/> />
); );
@@ -179,7 +179,7 @@ describe('<ExecutionEnvironmentDetails/>', () => {
wrapper.find('Detail[label="Credential"]').prop('value').props.children wrapper.find('Detail[label="Credential"]').prop('value').props.children
).toEqual(executionEnvironment.summary_fields.credential.name); ).toEqual(executionEnvironment.summary_fields.credential.name);
expect( expect(
wrapper.find('Detail[label="Managed by Tower"]').prop('value') wrapper.find('Detail[label="Managed"]').prop('value')
).toEqual('True'); ).toEqual('True');
const dates = wrapper.find('UserDateDetail'); const dates = wrapper.find('UserDateDetail');
expect(dates).toHaveLength(2); expect(dates).toHaveLength(2);

View File

@@ -23,7 +23,7 @@ describe('<ExecutionEnvironmentListItem/>', () => {
summary_fields: { summary_fields: {
user_capabilities: { edit: true, copy: true, delete: true }, user_capabilities: { edit: true, copy: true, delete: true },
}, },
managed_by_tower: false, managed: false,
}; };
test('should mount successfully', async () => { test('should mount successfully', async () => {
@@ -146,7 +146,7 @@ describe('<ExecutionEnvironmentListItem/>', () => {
expect(wrapper.find('CopyButton').length).toBe(0); expect(wrapper.find('CopyButton').length).toBe(0);
}); });
test('should not render the pencil action for ee managed by tower', async () => { test('should not render the pencil action for managed ee', async () => {
await act(async () => { await act(async () => {
wrapper = mountWithContexts( wrapper = mountWithContexts(
<table> <table>
@@ -155,7 +155,7 @@ describe('<ExecutionEnvironmentListItem/>', () => {
executionEnvironment={{ executionEnvironment={{
...executionEnvironment, ...executionEnvironment,
summary_fields: { user_capabilities: { edit: false } }, summary_fields: { user_capabilities: { edit: false } },
managed_by_tower: true, managed: true,
}} }}
detailUrl="execution_environments/1/details" detailUrl="execution_environments/1/details"
isSelected={false} isSelected={false}

View File

@@ -50,7 +50,7 @@ const executionEnvironment = {
description: 'A simple EE', description: 'A simple EE',
organization: 1, organization: 1,
image: 'https://registry.com/image/container', image: 'https://registry.com/image/container',
managed_by_tower: false, managed: false,
credential: 4, credential: 4,
}; };
@@ -84,7 +84,7 @@ const globallyAvailableEE = {
description: 'A simple EE', description: 'A simple EE',
organization: null, organization: null,
image: 'https://registry.com/image/container', image: 'https://registry.com/image/container',
managed_by_tower: false, managed: false,
credential: 4, credential: 4,
}; };

View File

@@ -23,7 +23,7 @@ function OrganizationAdd() {
data: { results }, data: { results },
} = await CredentialsAPI.read({ } = await CredentialsAPI.read({
credential_type__kind: 'galaxy', credential_type__kind: 'galaxy',
managed_by_tower: true, managed: true,
}); });
return results[0] || null; return results[0] || null;

View File

@@ -20,7 +20,7 @@ describe('<OrganizationAdd />', () => {
type: 'credential', type: 'credential',
name: 'Ansible Galaxy', name: 'Ansible Galaxy',
credential_type: 18, credential_type: 18,
managed_by_tower: true, managed: true,
kind: 'galaxy_api_token', kind: 'galaxy_api_token',
}, },
], ],

View File

@@ -24,7 +24,7 @@ const executionEnvironments = {
}, },
organization: 1, organization: 1,
image: 'https://localhost.com/image/disk', image: 'https://localhost.com/image/disk',
managed_by_tower: false, managed: false,
credential: null, credential: null,
}, },
{ {
@@ -36,7 +36,7 @@ const executionEnvironments = {
}, },
organization: 1, organization: 1,
image: 'test/image123', image: 'test/image123',
managed_by_tower: false, managed: false,
credential: null, credential: null,
}, },
{ {
@@ -48,7 +48,7 @@ const executionEnvironments = {
}, },
organization: 1, organization: 1,
image: 'test/test', image: 'test/test',
managed_by_tower: false, managed: false,
credential: null, credential: null,
}, },
], ],

View File

@@ -60,7 +60,7 @@ describe('<OrganizationForm />', () => {
type: 'credential', type: 'credential',
name: 'Ansible Galaxy', name: 'Ansible Galaxy',
credential_type: 18, credential_type: 18,
managed_by_tower: true, managed: true,
kind: 'galaxy_api_token', kind: 'galaxy_api_token',
}} }}
/>, />,

View File

@@ -107,7 +107,7 @@ def main():
# These will be passed into the create/updates # These will be passed into the create/updates
credential_type_params = { credential_type_params = {
'managed_by_tower': False, 'managed': False,
} }
if kind: if kind:
credential_type_params['kind'] = kind credential_type_params['kind'] = kind

View File

@@ -265,7 +265,7 @@ def silence_warning():
@pytest.fixture @pytest.fixture
def execution_environment(): def execution_environment():
return ExecutionEnvironment.objects.create(name="test-ee", description="test-ee", managed_by_tower=False) return ExecutionEnvironment.objects.create(name="test-ee", description="test-ee", managed=False)
@pytest.fixture(scope='session', autouse=True) @pytest.fixture(scope='session', autouse=True)

View File

@@ -82,8 +82,8 @@ class ApiV2(base.Base):
def _export(self, _page, post_fields): def _export(self, _page, post_fields):
# Drop any (credential_type) assets that are being managed by the instance. # Drop any (credential_type) assets that are being managed by the instance.
if _page.json.get('managed_by_tower'): if _page.json.get('managed'):
log.debug("%s is managed by Tower, skipping.", _page.endpoint) log.debug("%s is managed, skipping.", _page.endpoint)
return None return None
if post_fields is None: # Deprecated endpoint or insufficient permissions if post_fields is None: # Deprecated endpoint or insufficient permissions
log.error("Object export failed: %s", _page.endpoint) log.error("Object export failed: %s", _page.endpoint)

View File

@@ -102,7 +102,7 @@ config_kind_to_credential_type_name_map = {kind: name for name, kind in credenti
def kind_and_config_cred_from_credential_type(credential_type): def kind_and_config_cred_from_credential_type(credential_type):
kind = '' kind = ''
if not credential_type.managed_by_tower: if not credential_type.managed:
return kind, PseudoNamespace() return kind, PseudoNamespace()
try: try:
if credential_type.kind == 'net': if credential_type.kind == 'net':
@@ -144,7 +144,7 @@ class CredentialType(HasCreate, base.Base):
NATURAL_KEY = ('name', 'kind') NATURAL_KEY = ('name', 'kind')
def silent_delete(self): def silent_delete(self):
if not self.managed_by_tower: if not self.managed:
return super(CredentialType, self).silent_delete() return super(CredentialType, self).silent_delete()
def payload(self, kind='cloud', **kwargs): def payload(self, kind='cloud', **kwargs):
@@ -245,7 +245,7 @@ class Credential(HasCopy, HasCreate, base.Base):
inputs = config.credentials.cloud['openstack'] inputs = config.credentials.cloud['openstack']
else: else:
credential_type_name = config_kind_to_credential_type_name_map[kind] credential_type_name = config_kind_to_credential_type_name_map[kind]
credential_type = CredentialTypes(self.connection).get(managed_by_tower=True, name__icontains=credential_type_name).results.pop() credential_type = CredentialTypes(self.connection).get(managed=True, name__icontains=credential_type_name).results.pop()
credential_type, organization, user, team = filter_by_class((credential_type, CredentialType), (organization, Organization), (user, User), (team, Team)) credential_type, organization, user, team = filter_by_class((credential_type, CredentialType), (organization, Organization), (user, User), (team, Team))
if not any((user, team, organization)): if not any((user, team, organization)):

View File

@@ -20,7 +20,7 @@ class ExecutionEnvironment(HasCreate, HasCopy, base.Base):
dependencies = [Organization, Credential] dependencies = [Organization, Credential]
NATURAL_KEY = ('name',) NATURAL_KEY = ('name',)
# fields are name, image, organization, managed_by_tower, credential # fields are name, image, organization, managed, credential
def create(self, name='', image='quay.io/ansible/ansible-runner:devel', organization=Organization, credential=None, pull='', **kwargs): def create(self, name='', image='quay.io/ansible/ansible-runner:devel', organization=Organization, credential=None, pull='', **kwargs):
# we do not want to make a credential by default # we do not want to make a credential by default
payload = self.create_payload(name=name, image=image, organization=organization, credential=credential, pull=pull, **kwargs) payload = self.create_payload(name=name, image=image, organization=organization, credential=credential, pull=pull, **kwargs)

View File

@@ -16,10 +16,10 @@ def set_config_cred_to_desired(config, location):
class MockCredentialType(object): class MockCredentialType(object):
def __init__(self, name, kind, managed_by_tower=True): def __init__(self, name, kind, managed=True):
self.name = name self.name = name
self.kind = kind self.kind = kind
self.managed_by_tower = managed_by_tower self.managed = managed
@pytest.mark.parametrize( @pytest.mark.parametrize(

View File

@@ -14,6 +14,6 @@ The CLI entry point `ansible-inventory` was introduced in Ansible 2.4. Inventory
## Writing Your Own Inventory File ## Writing Your Own Inventory File
You can add an SCM inventory source that points to your own yaml file which specifies an inventory plugin. You can also apply a credential of a `managed_by_tower` type to that inventory source that matches the credential you are using. For example, you could have an inventory file for the `amazon.aws.aws_ec2` plugin and use the build-in `aws` credential type. You can add an SCM inventory source that points to your own yaml file which specifies an inventory plugin. You can also apply a credential of a `managed` type to that inventory source that matches the credential you are using. For example, you could have an inventory file for the `amazon.aws.aws_ec2` plugin and use the build-in `aws` credential type.
All built-in sources provide _secrets_ via environment variables. These can be re-used for SCM-based inventory, and your inventory file can be used to specify non-sensitive configuration details such as the `keyed_groups` (to provide) or `hostvars` (to construct). All built-in sources provide _secrets_ via environment variables. These can be re-used for SCM-based inventory, and your inventory file can be used to specify non-sensitive configuration details such as the `keyed_groups` (to provide) or `hostvars` (to construct).