Commit Graph

1605 Commits

Author SHA1 Message Date
Chris Meyers
626e2d1c9b tower fact cache implementation
* Tower now injects facts into jobs via memcached for use by Ansible
playbooks. On the Ansible side, this is accomplished by the existing
mechanism, an Ansible Fact Cache Plugin + memcached. On the Tower side,
memcached is leveraged heavily.
2017-06-21 13:44:08 -04:00
AlanCoding
40287d8e78 multi-host isolated heartbeat w tower-isolated check
* use tower-expect command to determine job status when running
  the isolated heartbeat playbook
* grok JSON output of playbook to obtain result information
* run playbook against multiple isolated hosts at the same time
  (addresses scalability concerns)
2017-06-20 14:36:18 -04:00
AlanCoding
dd1a261bc3 setup playbook and heartbeat for isolated deployments
* Allow isolated_group_ use in setup playbook
* Tweaks to host/queue registration commands complementing setup
* Create isolated heartbeat task and check capacity
* Add content about isolated instances to acceptance docs
2017-06-19 12:13:36 -04:00
Ryan Petrello
6baf505797 Merge pull request #6612 from ryanpetrello/isolated_check_interval
more isolated task execution tweaking
2017-06-16 15:44:22 -04:00
Ryan Petrello
1ea03aa4c9 more isolated task execution tweaking
* set a more reasonable default `AWX_ISOLATED_CHECK_INTERVAL`
* make manual cancellation work for high values of
  `AWX_ISOLATED_CHECK_INTERVAL`
* remove the `/tmp/ansible_tower/jobs/` symlink directory

see: #6616
2017-06-16 15:37:07 -04:00
Ryan Petrello
3ebcf0c0e6 Merge pull request #6608 from ryanpetrello/devel
isolated ramparts: replace systemd unit with a `tower-expect` binary
2017-06-16 10:11:35 -04:00
Ryan Petrello
44e0c8621a isolated ramparts: replace systemd unit with a tower-expect binary
instead of launching isolated tasks via `systemctl`, treat
`awx.main.isolated.run` as an executable that knows how to daemonize

additionally, add `setup.py isolated_build` for isolated Tower source
distribution
2017-06-16 09:59:21 -04:00
Aaron Tan
b2639cf1ee Update named URL delimiter. 2017-06-16 09:40:27 -04:00
Aaron Tan
04ca05ac43 Merge pull request #6603 from jangsutsr/6602_add_value_validation_to_sublist_attach
Add value type validation to sublist (un)attach
2017-06-15 13:28:49 -04:00
Aaron Tan
bef009659d Add value type validation to sublist (un)attach 2017-06-15 12:24:15 -04:00
Wayne Witzel III
f9b412419c update encryption migration checks and tests 2017-06-15 12:06:18 -04:00
Aaron Tan
0dae058bef Set priority rules for find_matching_hosts. 2017-06-15 11:45:44 -04:00
Aaron Tan
96d491fdce Regress trailing comma modification and enhance error message 2017-06-14 16:26:03 -04:00
Ryan Petrello
422950f45d Support for executing job and adhoc commands on isolated Tower nodes (#6524) 2017-06-14 11:47:30 -04:00
Ryan Petrello
12982d6ef6 Merge pull request #6541 from wwitzel3/issue-826
Re-Encrypt all of our existing encrypted fields.
2017-06-13 09:42:56 -04:00
Wayne Witzel III
af7762e417 Fix typo and update tests to catch other typos 2017-06-12 14:14:46 -04:00
Ryan Petrello
d4afa41acb key prompting of all credentials off of ask_credential_on_launch
see: #6371
2017-06-12 12:26:58 -04:00
Ryan Petrello
240d629128 fix a bug in ssh key unlock validation
see: #6553
2017-06-12 10:28:38 -04:00
Wayne Witzel III
73fe8dd469 reencrypt start_args for UnifiedJobs 2017-06-12 09:54:12 -04:00
Wayne Witzel III
8d96d08510 Add Re-Encryption migrations, helpers, and tests 2017-06-12 09:54:12 -04:00
Wayne Witzel III
b5d61c3c53 Relocate encryption helpers, update settings, tests, and imports 2017-06-12 09:54:12 -04:00
Ryan Petrello
28ad576c90 properly validate ssh_key_unlock for Net and SCM credentials
see: #6460
2017-06-09 10:43:04 -04:00
Ryan Petrello
ea0f4ce59d properly validate SSH key data for SCM, Net, GCE, and Azure Classic
see: #6384
2017-06-09 10:39:07 -04:00
Ryan Petrello
a04f666319 Merge pull request #6468 from ryanpetrello/fix-6464
add a boolean `authorize` field for the Network Credential Type
2017-06-09 09:47:39 -04:00
Ryan Petrello
685771ade3 Merge pull request #6469 from ryanpetrello/fix-6363
resolve a few CredentialType.inputs validation issues
2017-06-09 09:44:19 -04:00
Ryan Petrello
1f41e002a6 Merge pull request #6399 from ryanpetrello/fix-6390
fix a bug in POST /api/v1/credential detection of Vault payloads
2017-06-08 15:40:26 -04:00
Ryan Petrello
9bba3d9749 resolve a few CredentialType.inputs validation issues
see: #6363
2017-06-06 15:48:23 -04:00
Ryan Petrello
ad9fda9a06 add a boolean authorize field for the Network Credential Type
see: #6464
2017-06-06 11:13:10 -04:00
Ryan Petrello
a706440ff6 Merge pull request #6407 from ryanpetrello/fix-6385
improve a few permission-related errors for CredentialType update/delete
2017-06-05 15:20:26 -04:00
Ryan Petrello
2cb296d28b Merge pull request #6408 from ryanpetrello/fix-6406
clarify valid CredentialType field types
2017-06-02 10:04:04 -04:00
Ryan Petrello
af457ad8eb clarify valid CredentialType field types
almost all of our current credential values are strings, but under the
v1 Credential model, `authorize` is boolean

additionally, if a field is specified with no type, fall back to
`string` as a default (this is almost always what people creating custom
types will want)

see: #6406
2017-06-01 13:23:51 -04:00
Ryan Petrello
fd4b86349c fix a 500 error in /api/v1/credentials/ backwards compat
see: #6414
2017-06-01 11:26:18 -04:00
Ryan Petrello
71dda544ab fix a bug in /api/v1/credential detection of Vault payloads
see: #6390
2017-06-01 10:18:43 -04:00
Ryan Petrello
e0a629db58 improve error formatting for jsonschema failures on Credential.inputs
this provides error messages keyed by input fields, so that instead of
e.g.,

{
    'inputs': ['Invalid certificate or key: u'XYZ']
}

...you get:

{
    'inputs': {
        'ssh_key_data': ['Invalid certificate or key: u'XYZ']
    }
}

Includes /api/v1/ compatability for error message format.  Requests to
/api/v1/ will get:

{'ssh_key_data': ['Invalid certificate or key: u'XYZ']}
2017-06-01 09:48:42 -04:00
Ryan Petrello
98fa654be2 enforce dict for credential API input payloads
see: #6363
2017-06-01 09:19:21 -04:00
Ryan Petrello
16f4eb4532 Merge pull request #6403 from ryanpetrello/fix-6380
OpenStack CredentialType needs a `domain` input field
2017-05-31 17:36:51 -04:00
Aaron Tan
a993025e0d Merge pull request #6053 from jangsutsr/named_url
Named URL
2017-05-31 17:02:42 -04:00
Ryan Petrello
462b2c6696 improve a few permission-related errors for CredentialType update/delete
see: #6385
2017-05-31 15:48:34 -04:00
Ryan Petrello
23a1c94d38 OpenStack CredentialType needs a domain input field
see: #6380
2017-05-31 13:44:38 -04:00
Aaron Tan
f25391fe86 Implement named URL feature. 2017-05-31 12:09:54 -04:00
Chris Meyers
1a10205e0c Merge pull request #6300 from chrismeyersfsu/feature-insights_proxy
insights proxy
2017-05-26 14:17:04 -04:00
Chris Meyers
2f43f0fe2b flake8 2017-05-26 08:52:13 -04:00
Chris Meyers
7c0513d5ee migrate insights credentials
* A credential is considered an insights credential if a project of
scm_type 'insights' is associated.
* all non-insights Projects that point at an insights credential are
nulled
2017-05-26 08:50:53 -04:00
Chris Meyers
87eea59845 add per-inventory insights credential 2017-05-26 07:25:36 -04:00
Aaron Tan
b50820fa60 Merge pull request #6305 from jangsutsr/6272_prevent_nested_encrypted_field_leak_in_activity_stream
Prevent nested encrypted field leak in activity stream
2017-05-24 09:55:29 -04:00
Aaron Tan
7f1f68ee28 Prevent nested encrypted field leak in activity stream. 2017-05-23 14:05:55 -04:00
Chris Meyers
4461c8fe91 more robust insights error handling 2017-05-22 17:32:17 -04:00
Wayne Witzel III
356a2bc057 Use contains for search query in SmartFilter 2017-05-22 13:48:42 -04:00
Wayne Witzel III
631f82b574 Merge pull request #6304 from wwitzel3/issue-6193
Extend SmartFilter to expand search and related search fields
2017-05-19 18:22:04 -04:00
Wayne Witzel III
530df327ca Call filter from BoolOperand and catch LookupError 2017-05-19 16:49:25 -04:00