AlanCoding
9e07b3f777
Tag jobs started via special cases with node & group
2017-06-22 16:24:12 -04:00
Chris Meyers
fee16fe391
Merge pull request #6588 from chrismeyersfsu/feature-fact_cache
...
initial tower fact cache implementation
2017-06-22 09:58:28 -04:00
Chris Meyers
d6082a976b
retain support for insights system_id discovery
2017-06-22 09:49:45 -04:00
Alan Rominger
2beb4e8885
Merge pull request #6673 from AlanCoding/iso_cap_select
...
Select isolated node inside of queue based on capacity
2017-06-21 16:03:06 -04:00
Aaron Tan
6db945247d
Merge pull request #6576 from jangsutsr/6568_update_named_url_delimiter
...
Update named URL delimiter
2017-06-21 15:56:02 -04:00
AlanCoding
d69b4e00ff
select isolated node inside of queue based on capacity
2017-06-21 15:48:23 -04:00
Chris Meyers
6c67834694
beautify code
2017-06-21 13:45:28 -04:00
Chris Meyers
ec2e537f63
remove fache cache receiver
2017-06-21 13:45:27 -04:00
Chris Meyers
4c118159ed
system_tracking logging for fact cache
2017-06-21 13:45:27 -04:00
Chris Meyers
12cdbcf8b5
adds per-host timeout
2017-06-21 13:45:27 -04:00
Chris Meyers
626e2d1c9b
tower fact cache implementation
...
* Tower now injects facts into jobs via memcached for use by Ansible
playbooks. On the Ansible side, this is accomplished by the existing
mechanism, an Ansible Fact Cache Plugin + memcached. On the Tower side,
memcached is leveraged heavily.
2017-06-21 13:44:08 -04:00
AlanCoding
40287d8e78
multi-host isolated heartbeat w tower-isolated check
...
* use tower-expect command to determine job status when running
the isolated heartbeat playbook
* grok JSON output of playbook to obtain result information
* run playbook against multiple isolated hosts at the same time
(addresses scalability concerns)
2017-06-20 14:36:18 -04:00
AlanCoding
dd1a261bc3
setup playbook and heartbeat for isolated deployments
...
* Allow isolated_group_ use in setup playbook
* Tweaks to host/queue registration commands complementing setup
* Create isolated heartbeat task and check capacity
* Add content about isolated instances to acceptance docs
2017-06-19 12:13:36 -04:00
Ryan Petrello
6baf505797
Merge pull request #6612 from ryanpetrello/isolated_check_interval
...
more isolated task execution tweaking
2017-06-16 15:44:22 -04:00
Ryan Petrello
1ea03aa4c9
more isolated task execution tweaking
...
* set a more reasonable default `AWX_ISOLATED_CHECK_INTERVAL`
* make manual cancellation work for high values of
`AWX_ISOLATED_CHECK_INTERVAL`
* remove the `/tmp/ansible_tower/jobs/` symlink directory
see: #6616
2017-06-16 15:37:07 -04:00
Ryan Petrello
3ebcf0c0e6
Merge pull request #6608 from ryanpetrello/devel
...
isolated ramparts: replace systemd unit with a `tower-expect` binary
2017-06-16 10:11:35 -04:00
Ryan Petrello
44e0c8621a
isolated ramparts: replace systemd unit with a tower-expect binary
...
instead of launching isolated tasks via `systemctl`, treat
`awx.main.isolated.run` as an executable that knows how to daemonize
additionally, add `setup.py isolated_build` for isolated Tower source
distribution
2017-06-16 09:59:21 -04:00
Aaron Tan
b2639cf1ee
Update named URL delimiter.
2017-06-16 09:40:27 -04:00
Aaron Tan
04ca05ac43
Merge pull request #6603 from jangsutsr/6602_add_value_validation_to_sublist_attach
...
Add value type validation to sublist (un)attach
2017-06-15 13:28:49 -04:00
Aaron Tan
bef009659d
Add value type validation to sublist (un)attach
2017-06-15 12:24:15 -04:00
Wayne Witzel III
f9b412419c
update encryption migration checks and tests
2017-06-15 12:06:18 -04:00
Aaron Tan
96d491fdce
Regress trailing comma modification and enhance error message
2017-06-14 16:26:03 -04:00
Ryan Petrello
422950f45d
Support for executing job and adhoc commands on isolated Tower nodes ( #6524 )
2017-06-14 11:47:30 -04:00
Ryan Petrello
12982d6ef6
Merge pull request #6541 from wwitzel3/issue-826
...
Re-Encrypt all of our existing encrypted fields.
2017-06-13 09:42:56 -04:00
Wayne Witzel III
af7762e417
Fix typo and update tests to catch other typos
2017-06-12 14:14:46 -04:00
Ryan Petrello
d4afa41acb
key prompting of all credentials off of ask_credential_on_launch
...
see: #6371
2017-06-12 12:26:58 -04:00
Ryan Petrello
240d629128
fix a bug in ssh key unlock validation
...
see: #6553
2017-06-12 10:28:38 -04:00
Wayne Witzel III
73fe8dd469
reencrypt start_args for UnifiedJobs
2017-06-12 09:54:12 -04:00
Wayne Witzel III
8d96d08510
Add Re-Encryption migrations, helpers, and tests
2017-06-12 09:54:12 -04:00
Wayne Witzel III
b5d61c3c53
Relocate encryption helpers, update settings, tests, and imports
2017-06-12 09:54:12 -04:00
Ryan Petrello
28ad576c90
properly validate ssh_key_unlock for Net and SCM credentials
...
see: #6460
2017-06-09 10:43:04 -04:00
Ryan Petrello
ea0f4ce59d
properly validate SSH key data for SCM, Net, GCE, and Azure Classic
...
see: #6384
2017-06-09 10:39:07 -04:00
Ryan Petrello
a04f666319
Merge pull request #6468 from ryanpetrello/fix-6464
...
add a boolean `authorize` field for the Network Credential Type
2017-06-09 09:47:39 -04:00
Ryan Petrello
685771ade3
Merge pull request #6469 from ryanpetrello/fix-6363
...
resolve a few CredentialType.inputs validation issues
2017-06-09 09:44:19 -04:00
Ryan Petrello
1f41e002a6
Merge pull request #6399 from ryanpetrello/fix-6390
...
fix a bug in POST /api/v1/credential detection of Vault payloads
2017-06-08 15:40:26 -04:00
Ryan Petrello
9bba3d9749
resolve a few CredentialType.inputs validation issues
...
see: #6363
2017-06-06 15:48:23 -04:00
Ryan Petrello
ad9fda9a06
add a boolean authorize field for the Network Credential Type
...
see: #6464
2017-06-06 11:13:10 -04:00
Ryan Petrello
a706440ff6
Merge pull request #6407 from ryanpetrello/fix-6385
...
improve a few permission-related errors for CredentialType update/delete
2017-06-05 15:20:26 -04:00
Ryan Petrello
2cb296d28b
Merge pull request #6408 from ryanpetrello/fix-6406
...
clarify valid CredentialType field types
2017-06-02 10:04:04 -04:00
Ryan Petrello
af457ad8eb
clarify valid CredentialType field types
...
almost all of our current credential values are strings, but under the
v1 Credential model, `authorize` is boolean
additionally, if a field is specified with no type, fall back to
`string` as a default (this is almost always what people creating custom
types will want)
see: #6406
2017-06-01 13:23:51 -04:00
Ryan Petrello
fd4b86349c
fix a 500 error in /api/v1/credentials/ backwards compat
...
see: #6414
2017-06-01 11:26:18 -04:00
Ryan Petrello
71dda544ab
fix a bug in /api/v1/credential detection of Vault payloads
...
see: #6390
2017-06-01 10:18:43 -04:00
Ryan Petrello
e0a629db58
improve error formatting for jsonschema failures on Credential.inputs
...
this provides error messages keyed by input fields, so that instead of
e.g.,
{
'inputs': ['Invalid certificate or key: u'XYZ']
}
...you get:
{
'inputs': {
'ssh_key_data': ['Invalid certificate or key: u'XYZ']
}
}
Includes /api/v1/ compatability for error message format. Requests to
/api/v1/ will get:
{'ssh_key_data': ['Invalid certificate or key: u'XYZ']}
2017-06-01 09:48:42 -04:00
Ryan Petrello
98fa654be2
enforce dict for credential API input payloads
...
see: #6363
2017-06-01 09:19:21 -04:00
Ryan Petrello
16f4eb4532
Merge pull request #6403 from ryanpetrello/fix-6380
...
OpenStack CredentialType needs a `domain` input field
2017-05-31 17:36:51 -04:00
Aaron Tan
a993025e0d
Merge pull request #6053 from jangsutsr/named_url
...
Named URL
2017-05-31 17:02:42 -04:00
Ryan Petrello
462b2c6696
improve a few permission-related errors for CredentialType update/delete
...
see: #6385
2017-05-31 15:48:34 -04:00
Ryan Petrello
23a1c94d38
OpenStack CredentialType needs a domain input field
...
see: #6380
2017-05-31 13:44:38 -04:00
Aaron Tan
f25391fe86
Implement named URL feature.
2017-05-31 12:09:54 -04:00
Chris Meyers
1a10205e0c
Merge pull request #6300 from chrismeyersfsu/feature-insights_proxy
...
insights proxy
2017-05-26 14:17:04 -04:00