Commit Graph

1564 Commits

Author SHA1 Message Date
AlanCoding
9e07b3f777 Tag jobs started via special cases with node & group 2017-06-22 16:24:12 -04:00
Chris Meyers
fee16fe391 Merge pull request #6588 from chrismeyersfsu/feature-fact_cache
initial tower fact cache implementation
2017-06-22 09:58:28 -04:00
Chris Meyers
d6082a976b retain support for insights system_id discovery 2017-06-22 09:49:45 -04:00
Alan Rominger
2beb4e8885 Merge pull request #6673 from AlanCoding/iso_cap_select
Select isolated node inside of queue based on capacity
2017-06-21 16:03:06 -04:00
Aaron Tan
6db945247d Merge pull request #6576 from jangsutsr/6568_update_named_url_delimiter
Update named URL delimiter
2017-06-21 15:56:02 -04:00
AlanCoding
d69b4e00ff select isolated node inside of queue based on capacity 2017-06-21 15:48:23 -04:00
Chris Meyers
6c67834694 beautify code 2017-06-21 13:45:28 -04:00
Chris Meyers
ec2e537f63 remove fache cache receiver 2017-06-21 13:45:27 -04:00
Chris Meyers
4c118159ed system_tracking logging for fact cache 2017-06-21 13:45:27 -04:00
Chris Meyers
12cdbcf8b5 adds per-host timeout 2017-06-21 13:45:27 -04:00
Chris Meyers
626e2d1c9b tower fact cache implementation
* Tower now injects facts into jobs via memcached for use by Ansible
playbooks. On the Ansible side, this is accomplished by the existing
mechanism, an Ansible Fact Cache Plugin + memcached. On the Tower side,
memcached is leveraged heavily.
2017-06-21 13:44:08 -04:00
AlanCoding
40287d8e78 multi-host isolated heartbeat w tower-isolated check
* use tower-expect command to determine job status when running
  the isolated heartbeat playbook
* grok JSON output of playbook to obtain result information
* run playbook against multiple isolated hosts at the same time
  (addresses scalability concerns)
2017-06-20 14:36:18 -04:00
AlanCoding
dd1a261bc3 setup playbook and heartbeat for isolated deployments
* Allow isolated_group_ use in setup playbook
* Tweaks to host/queue registration commands complementing setup
* Create isolated heartbeat task and check capacity
* Add content about isolated instances to acceptance docs
2017-06-19 12:13:36 -04:00
Ryan Petrello
6baf505797 Merge pull request #6612 from ryanpetrello/isolated_check_interval
more isolated task execution tweaking
2017-06-16 15:44:22 -04:00
Ryan Petrello
1ea03aa4c9 more isolated task execution tweaking
* set a more reasonable default `AWX_ISOLATED_CHECK_INTERVAL`
* make manual cancellation work for high values of
  `AWX_ISOLATED_CHECK_INTERVAL`
* remove the `/tmp/ansible_tower/jobs/` symlink directory

see: #6616
2017-06-16 15:37:07 -04:00
Ryan Petrello
3ebcf0c0e6 Merge pull request #6608 from ryanpetrello/devel
isolated ramparts: replace systemd unit with a `tower-expect` binary
2017-06-16 10:11:35 -04:00
Ryan Petrello
44e0c8621a isolated ramparts: replace systemd unit with a tower-expect binary
instead of launching isolated tasks via `systemctl`, treat
`awx.main.isolated.run` as an executable that knows how to daemonize

additionally, add `setup.py isolated_build` for isolated Tower source
distribution
2017-06-16 09:59:21 -04:00
Aaron Tan
b2639cf1ee Update named URL delimiter. 2017-06-16 09:40:27 -04:00
Aaron Tan
04ca05ac43 Merge pull request #6603 from jangsutsr/6602_add_value_validation_to_sublist_attach
Add value type validation to sublist (un)attach
2017-06-15 13:28:49 -04:00
Aaron Tan
bef009659d Add value type validation to sublist (un)attach 2017-06-15 12:24:15 -04:00
Wayne Witzel III
f9b412419c update encryption migration checks and tests 2017-06-15 12:06:18 -04:00
Aaron Tan
96d491fdce Regress trailing comma modification and enhance error message 2017-06-14 16:26:03 -04:00
Ryan Petrello
422950f45d Support for executing job and adhoc commands on isolated Tower nodes (#6524) 2017-06-14 11:47:30 -04:00
Ryan Petrello
12982d6ef6 Merge pull request #6541 from wwitzel3/issue-826
Re-Encrypt all of our existing encrypted fields.
2017-06-13 09:42:56 -04:00
Wayne Witzel III
af7762e417 Fix typo and update tests to catch other typos 2017-06-12 14:14:46 -04:00
Ryan Petrello
d4afa41acb key prompting of all credentials off of ask_credential_on_launch
see: #6371
2017-06-12 12:26:58 -04:00
Ryan Petrello
240d629128 fix a bug in ssh key unlock validation
see: #6553
2017-06-12 10:28:38 -04:00
Wayne Witzel III
73fe8dd469 reencrypt start_args for UnifiedJobs 2017-06-12 09:54:12 -04:00
Wayne Witzel III
8d96d08510 Add Re-Encryption migrations, helpers, and tests 2017-06-12 09:54:12 -04:00
Wayne Witzel III
b5d61c3c53 Relocate encryption helpers, update settings, tests, and imports 2017-06-12 09:54:12 -04:00
Ryan Petrello
28ad576c90 properly validate ssh_key_unlock for Net and SCM credentials
see: #6460
2017-06-09 10:43:04 -04:00
Ryan Petrello
ea0f4ce59d properly validate SSH key data for SCM, Net, GCE, and Azure Classic
see: #6384
2017-06-09 10:39:07 -04:00
Ryan Petrello
a04f666319 Merge pull request #6468 from ryanpetrello/fix-6464
add a boolean `authorize` field for the Network Credential Type
2017-06-09 09:47:39 -04:00
Ryan Petrello
685771ade3 Merge pull request #6469 from ryanpetrello/fix-6363
resolve a few CredentialType.inputs validation issues
2017-06-09 09:44:19 -04:00
Ryan Petrello
1f41e002a6 Merge pull request #6399 from ryanpetrello/fix-6390
fix a bug in POST /api/v1/credential detection of Vault payloads
2017-06-08 15:40:26 -04:00
Ryan Petrello
9bba3d9749 resolve a few CredentialType.inputs validation issues
see: #6363
2017-06-06 15:48:23 -04:00
Ryan Petrello
ad9fda9a06 add a boolean authorize field for the Network Credential Type
see: #6464
2017-06-06 11:13:10 -04:00
Ryan Petrello
a706440ff6 Merge pull request #6407 from ryanpetrello/fix-6385
improve a few permission-related errors for CredentialType update/delete
2017-06-05 15:20:26 -04:00
Ryan Petrello
2cb296d28b Merge pull request #6408 from ryanpetrello/fix-6406
clarify valid CredentialType field types
2017-06-02 10:04:04 -04:00
Ryan Petrello
af457ad8eb clarify valid CredentialType field types
almost all of our current credential values are strings, but under the
v1 Credential model, `authorize` is boolean

additionally, if a field is specified with no type, fall back to
`string` as a default (this is almost always what people creating custom
types will want)

see: #6406
2017-06-01 13:23:51 -04:00
Ryan Petrello
fd4b86349c fix a 500 error in /api/v1/credentials/ backwards compat
see: #6414
2017-06-01 11:26:18 -04:00
Ryan Petrello
71dda544ab fix a bug in /api/v1/credential detection of Vault payloads
see: #6390
2017-06-01 10:18:43 -04:00
Ryan Petrello
e0a629db58 improve error formatting for jsonschema failures on Credential.inputs
this provides error messages keyed by input fields, so that instead of
e.g.,

{
    'inputs': ['Invalid certificate or key: u'XYZ']
}

...you get:

{
    'inputs': {
        'ssh_key_data': ['Invalid certificate or key: u'XYZ']
    }
}

Includes /api/v1/ compatability for error message format.  Requests to
/api/v1/ will get:

{'ssh_key_data': ['Invalid certificate or key: u'XYZ']}
2017-06-01 09:48:42 -04:00
Ryan Petrello
98fa654be2 enforce dict for credential API input payloads
see: #6363
2017-06-01 09:19:21 -04:00
Ryan Petrello
16f4eb4532 Merge pull request #6403 from ryanpetrello/fix-6380
OpenStack CredentialType needs a `domain` input field
2017-05-31 17:36:51 -04:00
Aaron Tan
a993025e0d Merge pull request #6053 from jangsutsr/named_url
Named URL
2017-05-31 17:02:42 -04:00
Ryan Petrello
462b2c6696 improve a few permission-related errors for CredentialType update/delete
see: #6385
2017-05-31 15:48:34 -04:00
Ryan Petrello
23a1c94d38 OpenStack CredentialType needs a domain input field
see: #6380
2017-05-31 13:44:38 -04:00
Aaron Tan
f25391fe86 Implement named URL feature. 2017-05-31 12:09:54 -04:00
Chris Meyers
1a10205e0c Merge pull request #6300 from chrismeyersfsu/feature-insights_proxy
insights proxy
2017-05-26 14:17:04 -04:00