Jeff Bradberry
6737bd4c19
Replace {} as field default values with the callable dict
2019-07-12 15:11:22 -04:00
Ryan Petrello
6da445f7c0
remove /api/v1 and deprecated credential fields
2019-06-06 12:23:00 -04:00
AlanCoding
f4c18843a3
Resolve default ordering warnings from tests
2019-05-20 10:58:36 -04:00
AlanCoding
8c2b3e9b84
Fix Django 2.0 deprecation warnings
2019-04-22 14:17:14 -04:00
Jake McDermott
165405ad3f
include externally sourced input fields for injection
2019-04-02 11:24:36 -04:00
Ryan Petrello
0768c6ac1d
store the public key for HashiVault signing in the plugin metadata
2019-04-02 11:21:47 -04:00
Ryan Petrello
011d7eb892
clean up access to various CredentialInputSource fields ( #3336 )
2019-04-02 11:21:21 -04:00
Jake McDermott
e9532dea8e
cache dynamic input fields
...
Query dynamic input fields once on attribute access and then cache it for future use.
2019-04-02 11:21:10 -04:00
Ryan Petrello
b911f8bf77
allow creation at /api/v2/credential_input_sources
2019-04-02 11:21:06 -04:00
Ryan Petrello
e727909a61
rename the CredentialInputSource related_names so they're plural
2019-04-02 11:21:02 -04:00
Ryan Petrello
13366c1e75
Encrypt machine.ssh_public_key_data (in case users paste in signed data)
2019-04-02 11:20:58 -04:00
Ryan Petrello
69368d874e
move path parameterization to the CredentialInputSource model
2019-04-02 11:20:36 -04:00
Jake McDermott
0ee223f799
add api for testing credential plugins
2019-04-02 11:20:33 -04:00
Ryan Petrello
7a43f00a5d
add support for HashiCorp signed SSH certificates
2019-04-02 11:20:29 -04:00
Ryan Petrello
0a87469225
give credential plugins an explicit namespace
2019-04-02 11:20:22 -04:00
Jake McDermott
d87144c4a7
add api for managing credential input sources
2019-04-02 11:19:56 -04:00
Jake McDermott
c209955400
add credential plugin system and minimal working hashivault
2019-04-02 11:19:26 -04:00
AlanCoding
b9d489c788
Use randomized file names for injector credential files
2019-03-26 10:29:38 -04:00
chris meyers
827ad0fa75
remove safe_args and add status_handler
...
* safe_args no longer makes sense. We have moved extra_vars to a file
and thus do not pass sensitive content on the cmdline
2019-03-18 14:21:47 -04:00
Ryan Petrello
b1a33869dc
convey OpenStack verify_ssl defaults in the CredentialType schema
2019-02-20 09:02:48 -05:00
Hideki Saito
9f04fbe4a4
Add verify_ssl to OpenStack credential type
...
To avoid verification failures when using a self-signed certificate file,
Added "Verify SSL" check box to the openstack credential type edit page.
Signed-off-by: Hideki Saito <saito@fgrep.org >
2019-02-19 12:53:13 -05:00
Ryan Petrello
43ca4526b1
define native CredentialType inputs/injectors in code, not in the DB
...
This has a few benefits:
1. It makes adding new fields to built-in CredentialTypes _much_
simpler. In the past, we've had to write a migration every time we
want to modify an existing type (changing a label/help text,
changing options like the recent become_method changes) or
when adding a new field entirely
2. It paves the way for third party credential plugins support, where
importable libraries will define their own source code-based schema
2019-02-19 10:22:26 -05:00
AlanCoding
fbf6315a8c
remove star imports in tasks and non-base models
2019-02-12 19:50:30 -05:00
Jeff Bradberry
6e1deed79e
Removed the special-case logic for maintaining the schema of the become_method field
...
related #2630
Signed-off-by: Jeff Bradberry <jeff.bradberry@gmail.com >
2019-01-29 14:06:26 -05:00
Jeff Bradberry
0ecd6542bf
Changed the become_method field into one that takes arbitrary input
...
related #2630
Signed-off-by: Jeff Bradberry <jeff.bradberry@gmail.com >
2019-01-28 16:53:54 -05:00
Ryan Petrello
daeeaf413a
clean up unnecessary usage of the six library (awx only supports py3)
2019-01-25 00:19:48 -05:00
Jake McDermott
a8728670e1
handle credential.inputs in decryption utils
2019-01-22 22:56:24 -05:00
Jake McDermott
a86e270905
add credential input access methods
2019-01-20 13:08:23 -05:00
Ryan Petrello
f223df303f
convert py2 -> py3
2019-01-15 14:09:01 -05:00
Bill Nottingham
479ad13630
Fix some more typos while here.
2018-12-18 16:23:17 -05:00
AlanCoding
40b5ce4b2e
link v1 pages to v2 credential type page
2018-12-06 15:41:26 -05:00
Ryan Petrello
7252883094
allow encrypted fields in custom credentials to be empty
2018-11-30 14:07:56 -05:00
Ryan Petrello
05156a5991
move from GEC_PEM_FILE_PATH to GCE_CREDENTIALS_FILE_PATH
2018-11-05 15:44:31 -05:00
AlanCoding
a4dfd96a8d
Validate ANSIBLE_ injectors on save and increase verbosity
2018-10-09 13:46:51 -04:00
AlanCoding
e897cbd237
fix unicode bug in launch error message
2018-07-13 15:50:50 -04:00
Ryan Petrello
0bcbccba33
enforce True or False for boolean credential injectors
...
see: https://github.com/ansible/tower/issues/2038
2018-06-14 12:34:54 -04:00
Ryan Petrello
e03c584b80
mark dynamic Credential Type labels and help_text for i18n
...
see: https://github.com/ansible/tower/issues/1960
related: https://github.com/ansible/ansible-tower/pull/6844
2018-05-25 15:08:11 -04:00
Ryan Petrello
1eb5e98743
Merge branch 'release_3.2.4' into release_3.3.0
2018-04-26 11:10:28 -04:00
Wayne Witzel III
07474d5b21
Extend become_method to model field validation as well
2018-04-23 10:33:59 -04:00
Wayne Witzel III
d6ac9b6e3d
Restore previous choices, clean up some minor things
2018-04-23 10:33:59 -04:00
Wayne Witzel III
8fa98d0d54
Add new credential become methods, inject instead of set in database
2018-04-23 10:33:59 -04:00
Ryan Petrello
b1028a2e0a
fix a bug preventing custom credential templates from including unicode
...
see: https://github.com/ansible/tower/issues/1266
2018-04-09 17:08:10 -04:00
Ryan Petrello
31a0eab880
add more custom credential type env blacklist items
...
see: https://github.com/ansible/tower/issues/1224
2018-04-03 15:44:44 -04:00
AlanCoding
9695031b27
prevent unicode errors in cred unique_hash
2018-04-03 13:34:21 -04:00
AlanCoding
9db0fdfc0b
sync tower verify_ssl parameter with tower-cli
...
Add new input for the tower type credential
elsewhere, tests are being added for verify_ssl in modules
tower-cli also updating to use the original tower.py var
2018-03-26 13:42:52 -04:00
Ryan Petrello
b9ab06734d
don't inject custom extra_vars for inventory updates
...
see: https://github.com/ansible/awx/issues/1366
2018-02-27 16:10:23 -05:00
Wayne Witzel III
2c71a27630
Merge pull request #1123 from wwitzel3/new-permissions
...
New RBAC Roles
2018-02-15 16:56:03 -05:00
Bill Nottingham
aa5bd9f5bf
Pass extra vars via file rather than via commandline, including custom creds.
...
The extra vars file created lives in the playbook private runtime
directory, and will be reaped along with the rest of the directory.
Adjust assorted unit tests as necessary.
2018-02-10 09:27:24 -05:00
Wayne Witzel III
109841c350
Add Credential Admin role
2018-02-10 02:52:25 +00:00
Jim Ladd
7aa1ae69b3
Add backwards compatibility for injecting single file
2018-01-28 20:50:44 -05:00