- Oct 04, 2021
-
-
Thomas Woerner authored
Fix module templates README and invalid parameter tests.
-
Rafael Guterres Jeffman authored
utils/build-galaxy-release: Fix doc_fragment prefix for galaxy
-
Rafael Guterres Jeffman authored
All modules should use the same description for IPA API connection variables. This change add description for ipaapi_context and ipaapi_ldap_cache variable to the module README templates.
-
Rafael Guterres Jeffman authored
Modify new module templates to use IPAAnsibleModule method `params_fail_used_invalid` to check for invalid parameter use for a given state/action.
-
Thomas Woerner authored
The items in extends_documentation_fragments of the modules need to have the proper galaxy prefix. The documentation fragment - ipamodule_base_docs needs to be changed to - ${collection_prefix}.ipamodule_base_docs
-
Thomas Woerner authored
Standardize algorithm to verify if invalid argument was used.
-
Thomas Woerner authored
Add support for ldap_cache and IPA API configuration.
-
- Oct 01, 2021
-
-
Rafael Guterres Jeffman authored
This patch adds documentation for ldap_cache variable to all modules.
-
Rafael Guterres Jeffman authored
This patch adds support for configuring IPA API connection use of LDAP cache. It adds a new variable 'ipaapi_ldap_cache' to the base module, and provides the variable documentation in its doc fragment.
-
Rafael Guterres Jeffman authored
This change adds a keyword parameter to api_connect() which can be used to configure IPA API connection, for example, controlling the use of LDAP cache, by passing 'ldap_cache' as an argument. Also, IPAAnsibleModule is modified to automatically filter all parameters of the module starting with 'ipaapi_' to be used as arguments to configure api_connect(). The argument name will have the same name as the module parameter with 'ipaapi_' stripped off.
-
Rafael Guterres Jeffman authored
Use the IPAAnsibleModule.params_fail_if_used method to validate arguments provided by user.
-
Rafael Guterres Jeffman authored
Use the IPAAnsibleModule.params_fail_if_used method to validate arguments provided by user.
-
Rafael Guterres Jeffman authored
Use the IPAAnsibleModule.params_fail_if_used method to validate arguments provided by user.
-
Rafael Guterres Jeffman authored
Use the IPAAnsibleModule.params_fail_if_used method to validate arguments provided by user.
-
Rafael Guterres Jeffman authored
Use the IPAAnsibleModule.params_fail_if_used method to validate arguments provided by user.
-
Rafael Guterres Jeffman authored
Use the IPAAnsibleModule.params_fail_if_used method to validate arguments provided by user.
-
Rafael Guterres Jeffman authored
Use the IPAAnsibleModule.params_fail_if_used method to validate arguments provided by user.
-
Rafael Guterres Jeffman authored
Use the IPAAnsibleModule.params_fail_if_used method to validate arguments provided by user.
-
Rafael Guterres Jeffman authored
Use the IPAAnsibleModule.params_fail_if_used method to validate arguments provided by user.
-
Rafael Guterres Jeffman authored
Use the IPAAnsibleModule.params_fail_if_used method to validate arguments provided by user.
-
Rafael Guterres Jeffman authored
Use the IPAAnsibleModule.params_fail_if_used method to validate arguments provided by user.
-
Rafael Guterres Jeffman authored
Use the IPAAnsibleModule.params_fail_if_used method to validate arguments provided by user.
-
Rafael Guterres Jeffman authored
Use the IPAAnsibleModule.params_fail_if_used method to validate arguments provided by user.
-
Rafael Guterres Jeffman authored
Use the IPAAnsibleModule.params_fail_if_used method to validate arguments provided by user.
-
Rafael Guterres Jeffman authored
Use the IPAAnsibleModule.params_fail_if_used method to validate arguments provided by user.
-
Rafael Guterres Jeffman authored
Use the IPAAnsibleModule.params_fail_if_used method to validate arguments provided by user.
-
Rafael Guterres Jeffman authored
Use the IPAAnsibleModule.params_fail_if_used method to validate arguments provided by user.
-
Rafael Guterres Jeffman authored
Use the IPAAnsibleModule.params_fail_if_used method to validate arguments provided by user.
-
Rafael Guterres Jeffman authored
Use the IPAAnsibleModule.params_fail_if_used method to validate arguments provided by user.
-
Rafael Guterres Jeffman authored
Use the IPAAnsibleModule.params_fail_if_used method to validate arguments provided by user.
-
Rafael Guterres Jeffman authored
Use the IPAAnsibleModule.params_fail_if_used method to validate arguments provided by user.
-
Rafael Guterres Jeffman authored
Use the IPAAnsibleModule.params_fail_if_used method to validate arguments provided by user.
-
Rafael Guterres Jeffman authored
Use the IPAAnsibleModule.params_fail_if_used method to validate arguments provided by user.
-
Rafael Guterres Jeffman authored
Use the IPAAnsibleModule.params_fail_if_used method to validate arguments provided by user.
-
Rafael Guterres Jeffman authored
Use the IPAAnsibleModule.params_fail_if_used method to validate arguments provided by user.
-
Rafael Guterres Jeffman authored
Almost all modules require an algorithm ta validade if the user provided arguments for the playbook are valid for the requested state and/or action. This patch provides a function that tests if any of a list of arguments were set, and fail with a standardized message, making all modules fail in the same way.
-
Thomas Woerner authored
Fix execution of client context tests.
-
Rafael Guterres Jeffman authored
When running the tests that can be executed either on server or client context, without defining 'ipa_context', the context is automatically identified. Currently, the tests in upstream CI run only on a server, and the context is identified as "server" context, and in order to run the test using a client context 'ipa_context' must be set to 'client'. This patch fixes all the client context tests by correctly setting ipa_context when running the client context tests in a server host.
-
- Sep 30, 2021
-
-
Rafael Guterres Jeffman authored
server: Express inability to deploy a server in example doc strings
-
Thomas Woerner authored
Make ansible-lint and yamllint use more strict rules.
-