Compare commits

..

24 Commits

Author SHA1 Message Date
Thomas Woerner
408aa69ab0 tests/azure: Deactivate NTP in prepare-build
In CentOS 8 and also Fedora the configuration and start of chrony
fails with

  Fatal error : adjtimex(0x8001) failed : Operation not permitted

For more information: https://bugzilla.redhat.com/show_bug.cgi?id=1772053

NTP will not be needed before a separate namespace is used for clocks.
2021-05-03 13:28:25 +02:00
Thomas Woerner
f24390473b tests/azure: Set ANSIBLE_LIBRARY to fix unknown interpreter issue
The ANSIBLE_LIBRARY environment variable needs to be set.
2021-04-30 16:29:53 +02:00
Rafael Guterres Jeffman
b598470c2b Merge pull request #517 from xek/master
Use ansible_facts variable
2021-04-07 21:38:05 -03:00
Rafael Guterres Jeffman
2e5a826ddb Merge pull request #514 from FollowKenny/fix_ipabackup_var
change variable in get_ipabackup_dir.yml and update README.md
2021-04-07 13:03:52 -03:00
Ivan PANICO
0e7f4e2b1b change variable in get_ipabackup_dir.yml 2021-04-07 17:13:26 +02:00
Grzegorz Grasza
7a23531047 Use ansible_facts variable
Without this change the "Import variables specific to distribution"
tasks fail with "Could not find file on the Ansible Controller..."
on environments with inject facts disabled.

This changes the tests to run with ansible with
inject_facts_as_vars = false and fixes other roles and playbooks.
2021-03-19 13:55:44 +01:00
Varun Mylaraiah
3c666ccdaa Merge pull request #511 from t-woerner/ipaclient_otp_rmkeytab_error#7
ipaclient: Do not fail on rmkeytab error #7
2021-02-22 20:27:53 +05:30
Thomas Woerner
976cd1baa7 ipaclient: Do not fail on rmkeytab error #7
Due to commit f3f9672d527008dc741ac90aa465bac842eea08d (ipa-rmkeytab: Check
return value of krb5_kt_(start|end)_seq_get) in IPA 4.9.2 there is a new
error reported for ipa-rmkeytab in case of a non existing keytab file.
Using ipa-rmkeytab now results in the error #7 in this case.

The client role is using ipa-rmkeytab and needs to ignore error #7 also.

Fixes: #510 (ipa-client installation with OTP is failed with error code 7
             (keytab: /usr/sbin/ipa-rmkeytab returned 7))
2021-02-22 13:28:04 +01:00
Varun Mylaraiah
5bed0d627b Merge pull request #505 from rjeffman/fix_ipaselfservice_example_playbooks
example playbooks: ipaselfservice examples mentioned ipadelegation.
2021-02-04 17:06:23 +05:30
Varun Mylaraiah
630c378ab1 Merge pull request #504 from rjeffman/fix_ipapermission_example_playbooks
Fix ipapermission example playbooks
2021-02-04 17:03:59 +05:30
Rafael Guterres Jeffman
0447143047 example playbooks: ipaselfservice examples mentioned ipadelegation.
The example playbooks for ipaselfservice were using the wrong module,
ipadelegation. This patch changes the references from ipadelegation
to ipaselfservice on these example playbooks.

Also, the attributes were changed, so the same attributes are used
throughout the examples.
2021-02-04 08:30:37 -03:00
Rafael Guterres Jeffman
6e45d1ea06 example playbooks: use only one permission name.
By using only one permission name, examples are easier to follow.
2021-02-01 18:02:52 -03:00
Rafael Guterres Jeffman
be27a615d0 example playbooks: removed permission names from task names. 2021-02-01 18:02:33 -03:00
Rafael Guterres Jeffman
e2c6480fe0 example playbooks: Use default password in ipapermission examples.
Example playbooks for ipapermission didn't have default password set.
2021-02-01 17:58:03 -03:00
Rafael Guterres Jeffman
873b69107e example playbooks: Fix invalid variable in ipapermission playbooks.
ipapremission playbooks were using the invalid attribute `perm_right`.
The attribute was changed to `right`.
2021-02-01 17:55:32 -03:00
Rafael Guterres Jeffman
e2cb68de54 Merge pull request #495 from rjeffman/molecule_fix_image_build
Fix container build.
2021-01-26 19:18:27 -03:00
Rafael Guterres Jeffman
be1720e9ea Merge pull request #501 from enothen/500-Sudorule-fix-false-positive-changes
Fixed names of member objects of sudorule
2021-01-26 19:17:26 -03:00
Rafael Guterres Jeffman
90779ed7ab upstream CI: change name of base image for CentOS and Fedora.
Building containers for CentOS and Fedora were failing due to image
download failure. The container build process was fixed by changing
the base images.
2021-01-26 16:25:57 -03:00
Rafael Guterres Jeffman
141554bd3d upstream CI: Explicitly install Ansible.
Without explicit installation, Ansible was failing to run on
Azure pipelines. This change explicitly install the latest
Ansible version available through `pip`.
2021-01-26 16:25:49 -03:00
Rafael Guterres Jeffman
dff921039d upstream CI: update Azure vmImage to 'ubuntu-20.04'.
In the near future, Github will use Ubuntu 20.04, for workflows, and
this change will keep the upstream CI environment consistent between
Github and Azure.
2021-01-26 16:25:36 -03:00
Eric Nothen
2cc4c27fa3 ipasudorule: Fix names of member objects.
Fixed names of sudorule member objects, as they did not match the names provided by IdM.

From:			To:
member_host		memberhost_host
member_hostgroup	memberhost_hostgroup
member_user		memberuser_user
member_group		memberuser_group

Fixes: #500
2021-01-26 18:55:26 +01:00
Thomas Woerner
38b3e817ad Merge pull request #499 from rjeffman/utils_fix_covscan_findings_lint_check
Fix build-galaxy.sh execution and add running info.
2021-01-18 15:04:49 +01:00
Rafael Guterres Jeffman
a292645a01 Fix build-galaxy.sh execution and add running info.
This patch adds a missing argument to `read` and adds information
on which step is being executed.
2021-01-18 10:46:19 -03:00
Thomas Woerner
6ffc51a75f utils/build-galaxy-release.sh: Use proper variable for galaxify
A wrong variable was used inside of the while IFS read loops. This
prevented that the modules, playbooks, tasks, example playbooks and also
tests have been adapted for the galaxy release naming scheme.
2021-01-18 14:19:41 +01:00
63 changed files with 197 additions and 168 deletions

View File

@@ -3,7 +3,7 @@ driver:
name: docker name: docker
platforms: platforms:
- name: centos-8-build - name: centos-8-build
image: centos:8 image: "centos:centos8"
pre_build_image: true pre_build_image: true
hostname: ipaserver.test.local hostname: ipaserver.test.local
dns_servers: dns_servers:

View File

@@ -3,7 +3,7 @@ driver:
name: docker name: docker
platforms: platforms:
- name: fedora-latest-build - name: fedora-latest-build
image: fedora-latest image: "fedora:latest"
dockerfile: Dockerfile dockerfile: Dockerfile
hostname: ipaserver.test.local hostname: ipaserver.test.local
dns_servers: dns_servers:

View File

@@ -25,3 +25,4 @@
ipadm_password: SomeDMpassword ipadm_password: SomeDMpassword
ipaserver_domain: test.local ipaserver_domain: test.local
ipaserver_realm: TEST.LOCAL ipaserver_realm: TEST.LOCAL
ipaclient_no_ntp: yes

View File

@@ -4,8 +4,8 @@
become: true become: true
tasks: tasks:
- name: Ensure permission TestPerm1 is absent - name: Ensure permission is absent
ipapermission: ipapermission:
ipaadmin_password: SomeADMINpassword
name: TestPerm1 name: TestPerm1
state: absent state: absent

View File

@@ -4,11 +4,12 @@
become: true become: true
tasks: tasks:
- name: Ensure permission TestPerm2 is present with Read rights to employeenumber - name: Ensure permission is present with set of rights to attribute employeenumber
ipapermission: ipapermission:
name: TestPerm2 ipaadmin_password: SomeADMINpassword
name: TestPerm1
object_type: user object_type: user
perm_rights: right:
- read - read
- search - search
- compare - compare

View File

@@ -4,8 +4,9 @@
become: true become: true
tasks: tasks:
- name: Ensure privilege User Administrators privilege is absent on Permission TestPerm1 - name: Ensure permission privilege, "User Administrators", is absent
ipapermission: ipapermission:
ipaadmin_password: SomeADMINpassword
name: TestPerm1 name: TestPerm1
privilege: "User Administrators" privilege: "User Administrators"
action: member action: member

View File

@@ -4,8 +4,9 @@
become: true become: true
tasks: tasks:
- name: Ensure permission TestPerm1 is present with the User Administrators privilege present - name: Ensure permission is present with "User Administrators" privilege
ipapermission: ipapermission:
ipaadmin_password: SomeADMINpassword
name: TestPerm1 name: TestPerm1
privilege: "User Administrators" privilege: "User Administrators"
action: member action: member

View File

@@ -4,8 +4,9 @@
become: true become: true
tasks: tasks:
- name: Ensure permission TestPerm1 is present - name: Ensure permission is present
ipapermission: ipapermission:
ipaadmin_password: SomeADMINpassword
name: TestPerm1 name: TestPerm1
object_type: host object_type: host
perm_rights: all right: all

View File

@@ -4,8 +4,9 @@
become: true become: true
tasks: tasks:
- name: Ensure permission TestPerm1 is present - name: Ensure permission TestPerm1 is renamed to TestPermRenamed
ipapermission: ipapermission:
ipaadmin_password: SomeADMINpassword
name: TestPerm1 name: TestPerm1
rename: TestPermRenamed rename: TestPermRenamed
state: renamed state: renamed

View File

@@ -1,11 +1,11 @@
--- ---
- name: Delegation absent - name: Selfservice absent
hosts: ipaserver hosts: ipaserver
become: true become: true
tasks: tasks:
- name: Ensure delegation "basic manager attributes" is absent - name: Ensure selfservice "basic manager attributes" is absent
ipadelegation: ipaselfservice:
ipaadmin_password: SomeADMINpassword ipaadmin_password: SomeADMINpassword
name: "basic manager attributes" name: "basic manager attributes"
state: absent state: absent

View File

@@ -1,15 +1,15 @@
--- ---
- name: Delegation member absent - name: Selfservice member absent
hosts: ipaserver hosts: ipaserver
become: true become: true
tasks: tasks:
- name: Ensure delegation "basic manager attributes" member attributes employeenumber and employeetype are absent - name: Ensure selfservice "basic manager attributes" member attributes employeenumber and employeetype are absent
ipadelegation: ipaselfservice:
ipaadmin_password: SomeADMINpassword ipaadmin_password: SomeADMINpassword
name: "basic manager attributes" name: "basic manager attributes"
attribute: attribute:
- employeenumber - businesscategory
- employeetype - departmentnumber
action: member action: member
state: absent state: absent

View File

@@ -1,11 +1,11 @@
--- ---
- name: Delegation member present - name: Selfservice member present
hosts: ipaserver hosts: ipaserver
become: true become: true
tasks: tasks:
- name: Ensure delegation "basic manager attributes" member attribute departmentnumber is present - name: Ensure selfservice "basic manager attributes" member attribute departmentnumber is present
ipadelegation: ipaselfservice:
ipaadmin_password: SomeADMINpassword ipaadmin_password: SomeADMINpassword
name: "basic manager attributes" name: "basic manager attributes"
attribute: attribute:

View File

@@ -1,11 +1,11 @@
--- ---
- name: Delegation present - name: Selfservice present
hosts: ipaserver hosts: ipaserver
become: true become: true
tasks: tasks:
- name: Ensure delegation "basic manager attributes" is present - name: Ensure selfservice "basic manager attributes" is present
ipadelegation: ipaselfservice:
ipaadmin_password: SomeADMINpassword ipaadmin_password: SomeADMINpassword
name: "basic manager attributes" name: "basic manager attributes"
permission: read permission: read

View File

@@ -7,7 +7,7 @@
tasks: tasks:
- copy: - copy:
src: "{{ playbook_dir }}/password.txt" src: "{{ playbook_dir }}/password.txt"
dest: "{{ ansible_env.HOME }}/password.txt" dest: "{{ ansible_facts['env'].HOME }}/password.txt"
owner: "{{ ansible_user }}" owner: "{{ ansible_user }}"
group: "{{ ansible_user }}" group: "{{ ansible_user }}"
mode: 0600 mode: 0600
@@ -16,7 +16,7 @@
name: symvault name: symvault
username: admin username: admin
vault_type: symmetric vault_type: symmetric
vault_password_file: "{{ ansible_env.HOME }}/password.txt" vault_password_file: "{{ ansible_facts['env'].HOME }}/password.txt"
- file: - file:
path: "{{ ansible_env.HOME }}/password.txt" path: "{{ ansible_facts['env'].HOME }}/password.txt"
state: absent state: absent

View File

@@ -12,7 +12,7 @@
tasks: tasks:
- copy: - copy:
src: "{{ playbook_dir }}/public.pem" src: "{{ playbook_dir }}/public.pem"
dest: "{{ ansible_env.HOME }}/public.pem" dest: "{{ ansible_facts['env'].HOME }}/public.pem"
owner: "{{ ansible_user }}" owner: "{{ ansible_user }}"
group: "{{ ansible_user }}" group: "{{ ansible_user }}"
mode: 0600 mode: 0600
@@ -21,7 +21,7 @@
name: asymvault name: asymvault
username: admin username: admin
vault_type: asymmetric vault_type: asymmetric
vault_public_key_file: "{{ ansible_env.HOME }}/public.pem" vault_public_key_file: "{{ ansible_facts['env'].HOME }}/public.pem"
- file: - file:
path: "{{ ansible_env.HOME }}/public.pem" path: "{{ ansible_facts['env'].HOME }}/public.pem"
state: absent state: absent

View File

@@ -429,16 +429,16 @@ def main():
# Generate addition and removal lists # Generate addition and removal lists
host_add, host_del = gen_add_del_lists( host_add, host_del = gen_add_del_lists(
host, res_find.get('member_host', [])) host, res_find.get('memberhost_host', []))
hostgroup_add, hostgroup_del = gen_add_del_lists( hostgroup_add, hostgroup_del = gen_add_del_lists(
hostgroup, res_find.get('member_hostgroup', [])) hostgroup, res_find.get('memberhost_hostgroup', []))
user_add, user_del = gen_add_del_lists( user_add, user_del = gen_add_del_lists(
user, res_find.get('member_user', [])) user, res_find.get('memberuser_user', []))
group_add, group_del = gen_add_del_lists( group_add, group_del = gen_add_del_lists(
group, res_find.get('member_group', [])) group, res_find.get('memberuser_group', []))
allow_cmd_add, allow_cmd_del = gen_add_del_lists( allow_cmd_add, allow_cmd_del = gen_add_del_lists(
allow_sudocmd, allow_sudocmd,

View File

@@ -10,7 +10,7 @@
set_fact: set_fact:
ipabackup_controller_dir: ipabackup_controller_dir:
"{{ ipabackup_controller_path | default(lookup('env','PWD')) }}/{{ "{{ ipabackup_controller_path | default(lookup('env','PWD')) }}/{{
ipabackup_name_prefix | default(ansible_fqdn) }}_{{ ipabackup_name_prefix | default(ansible_facts['fqdn']) }}_{{
ipabackup_item }}/" ipabackup_item }}/"
- name: Stat backup on server - name: Stat backup on server

View File

@@ -1,6 +1,6 @@
--- ---
- name: Get IPA_BACKUP_DIR dir from ipaplatform - name: Get IPA_BACKUP_DIR dir from ipaplatform
command: "{{ ansible_playbook_python }}" command: "{{ ansible_python_interpreter | default('/usr/bin/python') }}"
args: args:
stdin: | stdin: |
from ipaplatform.paths import paths from ipaplatform.paths import paths

View File

@@ -6,9 +6,9 @@
- name: Import variables specific to distribution - name: Import variables specific to distribution
include_vars: "{{ item }}" include_vars: "{{ item }}"
with_first_found: with_first_found:
- "{{ role_path }}/vars/{{ ansible_distribution }}-{{ ansible_distribution_version }}.yml" - "{{ role_path }}/vars/{{ ansible_facts['distribution'] }}-{{ ansible_facts['distribution_version'] }}.yml"
- "{{ role_path }}/vars/{{ ansible_distribution }}-{{ ansible_distribution_major_version }}.yml" - "{{ role_path }}/vars/{{ ansible_facts['distribution'] }}-{{ ansible_facts['distribution_major_version'] }}.yml"
- "{{ role_path }}/vars/{{ ansible_distribution }}.yml" - "{{ role_path }}/vars/{{ ansible_facts['distribution'] }}.yml"
- "{{ role_path }}/vars/default.yml" - "{{ role_path }}/vars/default.yml"
### GET SERVICES FROM BACKUP ### GET SERVICES FROM BACKUP

View File

@@ -33,7 +33,7 @@
domain: "{{ ipaserver_domain | default(ipaclient_domain) | default(omit) }}" domain: "{{ ipaserver_domain | default(ipaclient_domain) | default(omit) }}"
servers: "{{ ipaclient_servers | default(omit) }}" servers: "{{ ipaclient_servers | default(omit) }}"
realm: "{{ ipaserver_realm | default(ipaclient_realm) | default(omit) }}" realm: "{{ ipaserver_realm | default(ipaclient_realm) | default(omit) }}"
hostname: "{{ ipaclient_hostname | default(ansible_fqdn) }}" hostname: "{{ ipaclient_hostname | default(ansible_facts['fqdn']) }}"
ntp_servers: "{{ ipaclient_ntp_servers | default(omit) }}" ntp_servers: "{{ ipaclient_ntp_servers | default(omit) }}"
ntp_pool: "{{ ipaclient_ntp_pool | default(omit) }}" ntp_pool: "{{ ipaclient_ntp_pool | default(omit) }}"
no_ntp: "{{ ipaclient_no_ntp }}" no_ntp: "{{ ipaclient_no_ntp }}"
@@ -181,8 +181,12 @@
# Do not fail on error codes 3 and 5: # Do not fail on error codes 3 and 5:
# 3 - Unable to open keytab # 3 - Unable to open keytab
# 5 - Principal name or realm not found in keytab # 5 - Principal name or realm not found in keytab
# 7 - Failed to set cursor, typically when errcode
# would be issued in past
failed_when: result_ipa_rmkeytab.rc != 0 and failed_when: result_ipa_rmkeytab.rc != 0 and
result_ipa_rmkeytab.rc != 3 and result_ipa_rmkeytab.rc != 5 result_ipa_rmkeytab.rc != 3 and
result_ipa_rmkeytab.rc != 5 and
result_ipa_rmkeytab.rc != 7
when: (ipaclient_use_otp | bool or ipaclient_force_join | bool) and not ipaclient_on_master | bool when: (ipaclient_use_otp | bool or ipaclient_force_join | bool) and not ipaclient_on_master | bool
- name: Install - Backup and set hostname - name: Install - Backup and set hostname

View File

@@ -4,9 +4,9 @@
- name: Import variables specific to distribution - name: Import variables specific to distribution
include_vars: "{{ item }}" include_vars: "{{ item }}"
with_first_found: with_first_found:
- "{{ role_path }}/vars/{{ ansible_distribution }}-{{ ansible_distribution_version }}.yml" - "{{ role_path }}/vars/{{ ansible_facts['distribution'] }}-{{ ansible_facts['distribution_version'] }}.yml"
- "{{ role_path }}/vars/{{ ansible_distribution }}-{{ ansible_distribution_major_version }}.yml" - "{{ role_path }}/vars/{{ ansible_facts['distribution'] }}-{{ ansible_facts['distribution_major_version'] }}.yml"
- "{{ role_path }}/vars/{{ ansible_distribution }}.yml" - "{{ role_path }}/vars/{{ ansible_facts['distribution'] }}.yml"
- "{{ role_path }}/vars/default.yml" - "{{ role_path }}/vars/default.yml"
- name: Install IPA client - name: Install IPA client

View File

@@ -72,7 +72,7 @@
default(omit) }}" default(omit) }}"
servers: "{{ ipareplica_servers | default(omit) }}" servers: "{{ ipareplica_servers | default(omit) }}"
realm: "{{ ipareplica_realm | default(ipaserver_realm) |default(omit) }}" realm: "{{ ipareplica_realm | default(ipaserver_realm) |default(omit) }}"
hostname: "{{ ipareplica_hostname | default(ansible_fqdn) }}" hostname: "{{ ipareplica_hostname | default(ansible_facts['fqdn']) }}"
ca_cert_files: "{{ ipareplica_ca_cert_files | default([]) }}" ca_cert_files: "{{ ipareplica_ca_cert_files | default([]) }}"
hidden_replica: "{{ ipareplica_hidden_replica }}" hidden_replica: "{{ ipareplica_hidden_replica }}"
skip_mem_check: "{{ not ipareplica_mem_check }}" skip_mem_check: "{{ not ipareplica_mem_check }}"

View File

@@ -4,9 +4,9 @@
- name: Import variables specific to distribution - name: Import variables specific to distribution
include_vars: "{{ item }}" include_vars: "{{ item }}"
with_first_found: with_first_found:
- "vars/{{ ansible_distribution }}-{{ ansible_distribution_version }}.yml" - "vars/{{ ansible_facts['distribution'] }}-{{ ansible_facts['distribution_version'] }}.yml"
- "vars/{{ ansible_distribution }}-{{ ansible_distribution_major_version }}.yml" - "vars/{{ ansible_facts['distribution'] }}-{{ ansible_facts['distribution_major_version'] }}.yml"
- "vars/{{ ansible_distribution }}.yml" - "vars/{{ ansible_facts['distribution'] }}.yml"
- "vars/default.yml" - "vars/default.yml"
- name: Install IPA replica - name: Install IPA replica

View File

@@ -25,7 +25,7 @@
# command: > # command: >
# /usr/sbin/ipa-replica-manage # /usr/sbin/ipa-replica-manage
# del # del
# {{ ipareplica_hostname | default(ansible_fqdn) }} # {{ ipareplica_hostname | default(ansible_facts['fqdn']) }}
# --force # --force
# --password={{ ipadm_password }} # --password={{ ipadm_password }}
# failed_when: False # failed_when: False

View File

@@ -65,7 +65,7 @@
master_password: "{{ ipaserver_master_password | default(omit) }}" master_password: "{{ ipaserver_master_password | default(omit) }}"
domain: "{{ ipaserver_domain | default(omit) }}" domain: "{{ ipaserver_domain | default(omit) }}"
realm: "{{ ipaserver_realm | default(omit) }}" realm: "{{ ipaserver_realm | default(omit) }}"
hostname: "{{ ipaserver_hostname | default(ansible_fqdn) }}" hostname: "{{ ipaserver_hostname | default(ansible_facts['fqdn']) }}"
ca_cert_files: "{{ ipaserver_ca_cert_files | default(omit) }}" ca_cert_files: "{{ ipaserver_ca_cert_files | default(omit) }}"
no_host_dns: "{{ ipaserver_no_host_dns }}" no_host_dns: "{{ ipaserver_no_host_dns }}"
pki_config_override: "{{ ipaserver_pki_config_override | default(omit) }}" pki_config_override: "{{ ipaserver_pki_config_override | default(omit) }}"

View File

@@ -4,9 +4,9 @@
- name: Import variables specific to distribution - name: Import variables specific to distribution
include_vars: "{{ item }}" include_vars: "{{ item }}"
with_first_found: with_first_found:
- "vars/{{ ansible_distribution }}-{{ ansible_distribution_version }}.yml" - "vars/{{ ansible_facts['distribution'] }}-{{ ansible_facts['distribution_version'] }}.yml"
- "vars/{{ ansible_distribution }}-{{ ansible_distribution_major_version }}.yml" - "vars/{{ ansible_facts['distribution'] }}-{{ ansible_facts['distribution_major_version'] }}.yml"
- "vars/{{ ansible_distribution }}.yml" - "vars/{{ ansible_facts['distribution'] }}.yml"
- "vars/default.yml" - "vars/default.yml"
- name: Install IPA server - name: Install IPA server

View File

@@ -3,3 +3,4 @@ roles_path = ../roles:~/.ansible/roles:/usr/share/ansible/roles:/etc/ansible/rol
library = ../plugins/modules:~/.ansible/plugins/modules:/usr/share/ansible/plugins/modules library = ../plugins/modules:~/.ansible/plugins/modules:/usr/share/ansible/plugins/modules
module_utils = ../plugins/module_utils:~/.ansible/plugins/module_utils:/usr/share/ansible/plugins/module_utils module_utils = ../plugins/module_utils:~/.ansible/plugins/module_utils:/usr/share/ansible/plugins/module_utils
host_key_checking = false host_key_checking = false
inject_facts_as_vars = false

View File

@@ -15,7 +15,7 @@ trigger:
- master - master
pool: pool:
vmImage: 'ubuntu-18.04' vmImage: 'ubuntu-20.04'
stages: stages:
- stage: Centos7 - stage: Centos7

View File

@@ -11,7 +11,7 @@ schedules:
trigger: none trigger: none
pool: pool:
vmImage: 'ubuntu-18.04' vmImage: 'ubuntu-20.04'
jobs: jobs:

View File

@@ -15,7 +15,7 @@ jobs:
inputs: inputs:
versionSpec: '3.6' versionSpec: '3.6'
- script: python -m pip install --upgrade pip setuptools wheel - script: python -m pip install --upgrade pip setuptools wheel ansible
displayName: Install tools displayName: Install tools
- script: pip install molecule[docker] - script: pip install molecule[docker]
@@ -23,6 +23,8 @@ jobs:
- script: molecule create -s ${{ parameters.build_scenario_name }} - script: molecule create -s ${{ parameters.build_scenario_name }}
displayName: Create test container displayName: Create test container
env:
ANSIBLE_LIBRARY: ./molecule
- script: | - script: |
docker stop ${{ parameters.build_scenario_name }} docker stop ${{ parameters.build_scenario_name }}

View File

@@ -44,6 +44,8 @@ jobs:
cp -a plugins/module_utils/* ~/.ansible/module_utils cp -a plugins/module_utils/* ~/.ansible/module_utils
molecule create -s ${{ parameters.scenario }} molecule create -s ${{ parameters.scenario }}
displayName: Setup test container displayName: Setup test container
env:
ANSIBLE_LIBRARY: ./molecule
- script: | - script: |
pytest \ pytest \

View File

@@ -36,6 +36,8 @@ jobs:
cp -a plugins/module_utils/* ~/.ansible/module_utils cp -a plugins/module_utils/* ~/.ansible/module_utils
molecule create -s ${{ parameters.scenario }} molecule create -s ${{ parameters.scenario }}
displayName: Setup test container displayName: Setup test container
env:
ANSIBLE_LIBRARY: ./molecule
- script: | - script: |
pytest \ pytest \

View File

@@ -2,9 +2,9 @@
# Set common vars and facts for test. # Set common vars and facts for test.
- name: Set IPv4 address prefix. - name: Set IPv4 address prefix.
set_fact: set_fact:
ipv4_prefix: "{{ ansible_default_ipv4.address.split('.')[:-1] | ipv4_prefix: "{{ ansible_facts['default_ipv4'].address.split('.')[:-1] |
join('.') }}" join('.') }}"
ipv4_reverse_sufix: "{{ ansible_default_ipv4.address.split('.')[:-1] | ipv4_reverse_sufix: "{{ ansible_facts['default_ipv4'].address.split('.')[:-1] |
reverse | reverse |
join('.') }}" join('.') }}"

View File

@@ -564,7 +564,7 @@
ipaadmin_password: SomeADMINpassword ipaadmin_password: SomeADMINpassword
name: iron01 name: iron01
zone_name: "{{ safezone }}" zone_name: "{{ safezone }}"
ip_address: "{{ ansible_default_ipv4.address }}" ip_address: "{{ ansible_facts['default_ipv4'].address }}"
register: result register: result
failed_when: not result.changed failed_when: not result.changed

View File

@@ -6,7 +6,7 @@
tasks: tasks:
- name: Get Domain from server name - name: Get Domain from server name
set_fact: set_fact:
ipaserver_domain: "{{ ansible_fqdn.split('.')[1:] | join ('.') }}" ipaserver_domain: "{{ ansible_facts['fqdn'].split('.')[1:] | join ('.') }}"
when: ipaserver_domain is not defined when: ipaserver_domain is not defined
# CLEANUP TEST ITEMS # CLEANUP TEST ITEMS

View File

@@ -6,7 +6,7 @@
tasks: tasks:
- name: Get Domain from server name - name: Get Domain from server name
set_fact: set_fact:
ipaserver_domain: "{{ ansible_fqdn.split('.')[1:] | join ('.') }}" ipaserver_domain: "{{ ansible_facts['fqdn'].split('.')[1:] | join ('.') }}"
when: ipaserver_domain is not defined when: ipaserver_domain is not defined
- name: Generate self-signed certificates. - name: Generate self-signed certificates.

View File

@@ -6,7 +6,7 @@
tasks: tasks:
- name: Get Domain from server name - name: Get Domain from server name
set_fact: set_fact:
ipaserver_domain: "{{ ansible_fqdn.split('.')[1:] | join ('.') }}" ipaserver_domain: "{{ ansible_facts['fqdn'].split('.')[1:] | join ('.') }}"
when: ipaserver_domain is not defined when: ipaserver_domain is not defined
- name: Host test absent - name: Host test absent

View File

@@ -6,7 +6,7 @@
tasks: tasks:
- name: Get Domain from server name - name: Get Domain from server name
set_fact: set_fact:
ipaserver_domain: "{{ ansible_fqdn.split('.')[1:] | join ('.') }}" ipaserver_domain: "{{ ansible_facts['fqdn'].split('.')[1:] | join ('.') }}"
when: ipaserver_domain is not defined when: ipaserver_domain is not defined
- name: Set host1_fqdn .. host6_fqdn - name: Set host1_fqdn .. host6_fqdn
@@ -33,7 +33,7 @@
- name: Get IPv4 address prefix from server node - name: Get IPv4 address prefix from server node
set_fact: set_fact:
ipv4_prefix: "{{ ansible_default_ipv4.address.split('.')[:-1] | ipv4_prefix: "{{ ansible_facts['default_ipv4'].address.split('.')[:-1] |
join('.') }}" join('.') }}"
- name: Host "{{ host1_fqdn }}" present - name: Host "{{ host1_fqdn }}" present

View File

@@ -6,12 +6,12 @@
tasks: tasks:
- name: Get Domain from server name - name: Get Domain from server name
set_fact: set_fact:
ipaserver_domain: "{{ ansible_fqdn.split('.')[1:] | join ('.') }}" ipaserver_domain: "{{ ansible_facts['fqdn'].split('.')[1:] | join ('.') }}"
when: ipaserver_domain is not defined when: ipaserver_domain is not defined
- name: Get Realm from server name - name: Get Realm from server name
set_fact: set_fact:
ipaserver_realm: "{{ ansible_fqdn.split('.')[1:] | join ('.') | upper }}" ipaserver_realm: "{{ ansible_facts['fqdn'].split('.')[1:] | join ('.') | upper }}"
when: ipaserver_realm is not defined when: ipaserver_realm is not defined
- name: Set host1_fqdn .. host3_fqdn - name: Set host1_fqdn .. host3_fqdn

View File

@@ -6,12 +6,12 @@
tasks: tasks:
- name: Get Domain from server name - name: Get Domain from server name
set_fact: set_fact:
ipaserver_domain: "{{ ansible_fqdn.split('.')[1:] | join ('.') }}" ipaserver_domain: "{{ ansible_facts['fqdn'].split('.')[1:] | join ('.') }}"
when: ipaserver_domain is not defined when: ipaserver_domain is not defined
- name: Get Realm from server name - name: Get Realm from server name
set_fact: set_fact:
ipaserver_realm: "{{ ansible_fqdn.split('.')[1:] | join ('.') | upper }}" ipaserver_realm: "{{ ansible_facts['fqdn'].split('.')[1:] | join ('.') | upper }}"
when: ipaserver_realm is not defined when: ipaserver_realm is not defined
- name: Set host1_fqdn .. host3_fqdn - name: Set host1_fqdn .. host3_fqdn

View File

@@ -6,7 +6,7 @@
tasks: tasks:
- name: Get Domain from server name - name: Get Domain from server name
set_fact: set_fact:
ipaserver_domain: "{{ ansible_fqdn.split('.')[1:] | join ('.') }}" ipaserver_domain: "{{ ansible_facts['fqdn'].split('.')[1:] | join ('.') }}"
when: ipaserver_domain is not defined when: ipaserver_domain is not defined
- name: Set host1_fqdn .. host6_fqdn - name: Set host1_fqdn .. host6_fqdn

View File

@@ -6,7 +6,7 @@
tasks: tasks:
- name: Get Domain from server name - name: Get Domain from server name
set_fact: set_fact:
ipaserver_domain: "{{ ansible_fqdn.split('.')[1:] | join ('.') }}" ipaserver_domain: "{{ ansible_facts['fqdn'].split('.')[1:] | join ('.') }}"
when: ipaserver_domain is not defined when: ipaserver_domain is not defined
- name: Set host1_fqdn .. host6_fqdn - name: Set host1_fqdn .. host6_fqdn
@@ -17,7 +17,7 @@
- name: Get IPv4 address prefix from server node - name: Get IPv4 address prefix from server node
set_fact: set_fact:
ipv4_prefix: "{{ ansible_default_ipv4.address.split('.')[:-1] | ipv4_prefix: "{{ ansible_facts['default_ipv4'].address.split('.')[:-1] |
join('.') }}" join('.') }}"
- name: Host absent - name: Host absent

View File

@@ -6,7 +6,7 @@
tasks: tasks:
- name: Get Domain from server name - name: Get Domain from server name
set_fact: set_fact:
ipaserver_domain: "{{ ansible_fqdn.split('.')[1:] | join ('.') }}" ipaserver_domain: "{{ ansible_facts['fqdn'].split('.')[1:] | join ('.') }}"
when: ipaserver_domain is not defined when: ipaserver_domain is not defined
- name: Set host1_fqdn .. host2_fqdn - name: Set host1_fqdn .. host2_fqdn
@@ -55,39 +55,39 @@
register: result register: result
failed_when: result.changed failed_when: result.changed
- name: Host "{{ host1_fqdn }}" managed by "{{ ansible_fqdn }}" - name: Host "{{ host1_fqdn }}" managed by "{{ ansible_facts['fqdn'] }}"
ipahost: ipahost:
ipaadmin_password: SomeADMINpassword ipaadmin_password: SomeADMINpassword
name: "{{ host1_fqdn }}" name: "{{ host1_fqdn }}"
managedby_host: "{{ ansible_fqdn }}" managedby_host: "{{ ansible_facts['fqdn'] }}"
action: member action: member
register: result register: result
failed_when: not result.changed failed_when: not result.changed
- name: Host "{{ host1_fqdn }}" managed by "{{ ansible_fqdn }}" again - name: Host "{{ host1_fqdn }}" managed by "{{ ansible_facts['fqdn'] }}" again
ipahost: ipahost:
ipaadmin_password: SomeADMINpassword ipaadmin_password: SomeADMINpassword
name: "{{ host1_fqdn }}" name: "{{ host1_fqdn }}"
managedby_host: "{{ ansible_fqdn }}" managedby_host: "{{ ansible_facts['fqdn'] }}"
action: member action: member
register: result register: result
failed_when: result.changed failed_when: result.changed
- name: Host "{{ host1_fqdn }}" not managed by "{{ ansible_fqdn }}" - name: Host "{{ host1_fqdn }}" not managed by "{{ ansible_facts['fqdn'] }}"
ipahost: ipahost:
ipaadmin_password: SomeADMINpassword ipaadmin_password: SomeADMINpassword
name: "{{ host1_fqdn }}" name: "{{ host1_fqdn }}"
managedby_host: "{{ ansible_fqdn }}" managedby_host: "{{ ansible_facts['fqdn'] }}"
action: member action: member
state: absent state: absent
register: result register: result
failed_when: not result.changed failed_when: not result.changed
- name: Host "{{ host1_fqdn }}" not managed by "{{ ansible_fqdn }}" again - name: Host "{{ host1_fqdn }}" not managed by "{{ ansible_facts['fqdn'] }}" again
ipahost: ipahost:
ipaadmin_password: SomeADMINpassword ipaadmin_password: SomeADMINpassword
name: "{{ host1_fqdn }}" name: "{{ host1_fqdn }}"
managedby_host: "{{ ansible_fqdn }}" managedby_host: "{{ ansible_facts['fqdn'] }}"
action: member action: member
state: absent state: absent
register: result register: result

View File

@@ -6,12 +6,12 @@
tasks: tasks:
- name: Get Domain from server name - name: Get Domain from server name
set_fact: set_fact:
ipaserver_domain: "{{ ansible_fqdn.split('.')[1:] | join ('.') }}" ipaserver_domain: "{{ ansible_facts['fqdn'].split('.')[1:] | join ('.') }}"
when: ipaserver_domain is not defined when: ipaserver_domain is not defined
- name: Get Realm from server name - name: Get Realm from server name
set_fact: set_fact:
ipaserver_realm: "{{ ansible_fqdn.split('.')[1:] | join ('.') | upper }}" ipaserver_realm: "{{ ansible_facts['fqdn'].split('.')[1:] | join ('.') | upper }}"
when: ipaserver_realm is not defined when: ipaserver_realm is not defined
- name: Set host1_fqdn - name: Set host1_fqdn

View File

@@ -6,7 +6,7 @@
tasks: tasks:
- name: Get Domain from server name - name: Get Domain from server name
set_fact: set_fact:
ipaserver_domain: "{{ ansible_fqdn.split('.')[1:] | join ('.') }}" ipaserver_domain: "{{ ansible_facts['fqdn'].split('.')[1:] | join ('.') }}"
when: ipaserver_domain is not defined when: ipaserver_domain is not defined
- name: Set host1_fqdn and host2_fqdn - name: Set host1_fqdn and host2_fqdn
@@ -77,11 +77,11 @@
debug: debug:
var: ipahost.host["{{host2_fqdn }}"].randompassword var: ipahost.host["{{host2_fqdn }}"].randompassword
- name: Enrolled host "{{ ansible_fqdn }}" fails to set random password with update_password always - name: Enrolled host "{{ ansible_facts['fqdn'] }}" fails to set random password with update_password always
ipahost: ipahost:
ipaadmin_password: SomeADMINpassword ipaadmin_password: SomeADMINpassword
hosts: hosts:
- name: "{{ ansible_fqdn }}" - name: "{{ ansible_facts['fqdn'] }}"
random: yes random: yes
update_password: always update_password: always
register: ipahost register: ipahost
@@ -89,7 +89,7 @@
- assert: - assert:
that: that:
- ipahost.host["{{ ansible_fqdn }}"].randompassword is - ipahost.host["{{ ansible_facts['fqdn'] }}"].randompassword is
not defined not defined
- "'Password cannot be set on enrolled host' in ipahost.msg" - "'Password cannot be set on enrolled host' in ipahost.msg"

View File

@@ -6,7 +6,7 @@
tasks: tasks:
- name: Get Domain from server name - name: Get Domain from server name
set_fact: set_fact:
ipaserver_domain: "{{ ansible_fqdn.split('.')[1:] | join ('.') }}" ipaserver_domain: "{{ ansible_facts['fqdn'].split('.')[1:] | join ('.') }}"
when: ipaserver_domain is not defined when: ipaserver_domain is not defined
- name: Set host1_fqdn - name: Set host1_fqdn
@@ -23,7 +23,7 @@
- name: Get IPv4 address prefix from server node - name: Get IPv4 address prefix from server node
set_fact: set_fact:
ipv4_prefix: "{{ ansible_default_ipv4.address.split('.')[:-1] | ipv4_prefix: "{{ ansible_facts['default_ipv4'].address.split('.')[:-1] |
join('.') }}" join('.') }}"
- name: Set zone prefixes. - name: Set zone prefixes.

View File

@@ -6,7 +6,7 @@
tasks: tasks:
- name: Get Domain from server name - name: Get Domain from server name
set_fact: set_fact:
ipaserver_domain: "{{ ansible_fqdn.split('.')[1:] | join ('.') }}" ipaserver_domain: "{{ ansible_facts['fqdn'].split('.')[1:] | join ('.') }}"
when: ipaserver_domain is not defined when: ipaserver_domain is not defined
- name: Set host1_fqdn .. host6_fqdn - name: Set host1_fqdn .. host6_fqdn

View File

@@ -6,7 +6,7 @@
tasks: tasks:
- name: Get Domain from server name - name: Get Domain from server name
set_fact: set_fact:
ipaserver_domain: "{{ ansible_fqdn.split('.')[1:] | join ('.') }}" ipaserver_domain: "{{ ansible_facts['fqdn'].split('.')[1:] | join ('.') }}"
when: ipaserver_domain is not defined when: ipaserver_domain is not defined
- name: Set host1_fqdn .. host5_fqdn - name: Set host1_fqdn .. host5_fqdn

View File

@@ -6,12 +6,12 @@
tasks: tasks:
- name: Get Domain from server name - name: Get Domain from server name
set_fact: set_fact:
ipaserver_domain: "{{ ansible_fqdn.split('.')[1:] | join ('.') }}" ipaserver_domain: "{{ ansible_facts['fqdn'].split('.')[1:] | join ('.') }}"
when: ipaserver_domain is not defined when: ipaserver_domain is not defined
- name: Get Realm from server name - name: Get Realm from server name
set_fact: set_fact:
ipaserver_realm: "{{ ansible_fqdn.split('.')[1:] | join ('.') | upper }}" ipaserver_realm: "{{ ansible_facts['fqdn'].split('.')[1:] | join ('.') | upper }}"
when: ipaserver_realm is not defined when: ipaserver_realm is not defined
- name: Set host1_fqdn .. host2_fqdn - name: Set host1_fqdn .. host2_fqdn

View File

@@ -7,7 +7,7 @@
tasks: tasks:
- name: Get Domain from server name - name: Get Domain from server name
set_fact: set_fact:
ipaserver_domain: "{{ ansible_fqdn.split('.')[1:] | join ('.') }}" ipaserver_domain: "{{ ansible_facts['fqdn'].split('.')[1:] | join ('.') }}"
when: ipaserver_domain is not defined when: ipaserver_domain is not defined
- name: Ensure host-group databases, mysql-server and oracle-server are absent - name: Ensure host-group databases, mysql-server and oracle-server are absent

View File

@@ -1,7 +1,7 @@
--- ---
- name: Get Domain from server name - name: Get Domain from server name
set_fact: set_fact:
ipaserver_domain: "{{ ansible_fqdn.split('.')[1:] | join ('.') }}" ipaserver_domain: "{{ ansible_facts['fqdn'].split('.')[1:] | join ('.') }}"
when: ipaserver_domain is not defined when: ipaserver_domain is not defined
- name: Set fact for realm name - name: Set fact for realm name

View File

@@ -29,12 +29,12 @@
# setup # setup
- name: Get Domain from server name - name: Get Domain from server name
set_fact: set_fact:
ipaserver_domain: "{{ ansible_fqdn.split('.')[1:] | join ('.') }}" ipaserver_domain: "{{ ansible_facts['fqdn'].split('.')[1:] | join ('.') }}"
when: ipaserver_domain is not defined when: ipaserver_domain is not defined
- name: Get IPv4 address prefix from server node - name: Get IPv4 address prefix from server node
set_fact: set_fact:
ipv4_prefix: "{{ ansible_default_ipv4.address.split('.')[:-1] | ipv4_prefix: "{{ ansible_facts['default_ipv4'].address.split('.')[:-1] |
join('.') }}" join('.') }}"
- name: Set test host FQDN - name: Set test host FQDN

View File

@@ -1,7 +1,7 @@
--- ---
- name: Get Domain from server name - name: Get Domain from server name
set_fact: set_fact:
test_domain: "{{ ansible_fqdn.split('.')[1:] | join('.') }}" test_domain: "{{ ansible_facts['fqdn'].split('.')[1:] | join('.') }}"
- name: Set host1, host2 and svc hosts fqdn - name: Set host1, host2 and svc hosts fqdn
set_fact: set_fact:
@@ -12,4 +12,4 @@
- name: Get IPv4 address prefix from server node - name: Get IPv4 address prefix from server node
set_fact: set_fact:
ipv4_prefix: "{{ ansible_default_ipv4.address.split('.')[:-1] | join('.') }}" ipv4_prefix: "{{ ansible_facts['default_ipv4'].address.split('.')[:-1] | join('.') }}"

View File

@@ -19,13 +19,13 @@
- name: Ensure service is absent - name: Ensure service is absent
ipaservice: ipaservice:
ipaadmin_password: SomeADMINpassword ipaadmin_password: SomeADMINpassword
name: "mysvc1/{{ ansible_fqdn }}" name: "mysvc1/{{ ansible_facts['fqdn'] }}"
state: absent state: absent
- name: Ensure service is present - name: Ensure service is present
ipaservice: ipaservice:
ipaadmin_password: SomeADMINpassword ipaadmin_password: SomeADMINpassword
name: "mysvc1/{{ ansible_fqdn }}" name: "mysvc1/{{ ansible_facts['fqdn'] }}"
certificate: certificate:
- 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 - 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
force: no force: no
@@ -33,51 +33,51 @@
failed_when: not result.changed failed_when: not result.changed
- name: Obtain keytab - name: Obtain keytab
shell: ipa-getkeytab -s "{{ ansible_fqdn }}" -p "mysvc1/{{ ansible_fqdn }}" -k mysvc1.keytab shell: ipa-getkeytab -s "{{ ansible_facts['fqdn'] }}" -p "mysvc1/{{ ansible_facts['fqdn'] }}" -k mysvc1.keytab
- name: Verify keytab - name: Verify keytab
shell: ipa service-find "mysvc1/{{ ansible_fqdn }}" shell: ipa service-find "mysvc1/{{ ansible_facts['fqdn'] }}"
register: result register: result
failed_when: result.failed or result.stdout | regex_search(" Keytab. true") failed_when: result.failed or result.stdout | regex_search(" Keytab. true")
- name: Ensure service is disabled - name: Ensure service is disabled
ipaservice: ipaservice:
ipaadmin_password: SomeADMINpassword ipaadmin_password: SomeADMINpassword
name: "mysvc1/{{ ansible_fqdn }}" name: "mysvc1/{{ ansible_facts['fqdn'] }}"
state: disabled state: disabled
register: result register: result
failed_when: not result.changed failed_when: not result.changed
- name: Verify keytab - name: Verify keytab
shell: ipa service-find "mysvc1/{{ ansible_fqdn }}" shell: ipa service-find "mysvc1/{{ ansible_facts['fqdn'] }}"
register: result register: result
failed_when: result.failed or result.stdout | regex_search(" Keytab. true") failed_when: result.failed or result.stdout | regex_search(" Keytab. true")
- name: Obtain keytab - name: Obtain keytab
shell: ipa-getkeytab -s "{{ ansible_fqdn }}" -p "mysvc1/{{ ansible_fqdn }}" -k mysvc1.keytab shell: ipa-getkeytab -s "{{ ansible_facts['fqdn'] }}" -p "mysvc1/{{ ansible_facts['fqdn'] }}" -k mysvc1.keytab
- name: Verify keytab - name: Verify keytab
shell: ipa service-find "mysvc1/{{ ansible_fqdn }}" shell: ipa service-find "mysvc1/{{ ansible_facts['fqdn'] }}"
register: result register: result
failed_when: result.failed or result.stdout | regex_search(" Keytab. true") failed_when: result.failed or result.stdout | regex_search(" Keytab. true")
- name: Ensure service is disabled - name: Ensure service is disabled
ipaservice: ipaservice:
ipaadmin_password: SomeADMINpassword ipaadmin_password: SomeADMINpassword
name: "mysvc1/{{ ansible_fqdn }}" name: "mysvc1/{{ ansible_facts['fqdn'] }}"
state: disabled state: disabled
register: result register: result
failed_when: not result.changed failed_when: not result.changed
- name: Verify keytab - name: Verify keytab
shell: ipa service-find "mysvc1/{{ ansible_fqdn }}" shell: ipa service-find "mysvc1/{{ ansible_facts['fqdn'] }}"
register: result register: result
failed_when: result.failed or result.stdout | regex_search(" Keytab. true") failed_when: result.failed or result.stdout | regex_search(" Keytab. true")
- name: Ensure service is disabled, with no keytab. - name: Ensure service is disabled, with no keytab.
ipaservice: ipaservice:
ipaadmin_password: SomeADMINpassword ipaadmin_password: SomeADMINpassword
name: "mysvc1/{{ ansible_fqdn }}" name: "mysvc1/{{ ansible_facts['fqdn'] }}"
state: disabled state: disabled
register: result register: result
failed_when: result.changed failed_when: result.changed
@@ -85,7 +85,7 @@
- name: Ensure service is absent - name: Ensure service is absent
ipaservice: ipaservice:
ipaadmin_password: SomeADMINpassword ipaadmin_password: SomeADMINpassword
name: "mysvc1/{{ ansible_fqdn }}" name: "mysvc1/{{ ansible_facts['fqdn'] }}"
- name: Destroy Kerberos tickets. - name: Destroy Kerberos tickets.
shell: kdestroy -A -q -c ${KRB5CCNAME} shell: kdestroy -A -q -c ${KRB5CCNAME}

View File

@@ -43,7 +43,7 @@
ipahostgroup: ipahostgroup:
ipaadmin_password: SomeADMINpassword ipaadmin_password: SomeADMINpassword
name: cluster name: cluster
host: "{{ ansible_fqdn }}" host: "{{ ansible_facts['fqdn'] }}"
- name: Ensure some sudocmds are available - name: Ensure some sudocmds are available
ipasudocmd: ipasudocmd:
@@ -500,20 +500,20 @@
register: result register: result
failed_when: result.changed failed_when: result.changed
- name: Ensure host "{{ ansible_fqdn }}" is present in sudorule. - name: Ensure host "{{ ansible_facts['fqdn'] }}" is present in sudorule.
ipasudorule: ipasudorule:
ipaadmin_password: SomeADMINpassword ipaadmin_password: SomeADMINpassword
name: testrule1 name: testrule1
host: "{{ ansible_fqdn }}" host: "{{ ansible_facts['fqdn'] }}"
action: member action: member
register: result register: result
failed_when: not result.changed failed_when: not result.changed
- name: Ensure host "{{ ansible_fqdn }}" is present in sudorule, again. - name: Ensure host "{{ ansible_facts['fqdn'] }}" is present in sudorule, again.
ipasudorule: ipasudorule:
ipaadmin_password: SomeADMINpassword ipaadmin_password: SomeADMINpassword
name: testrule1 name: testrule1
host: "{{ ansible_fqdn }}" host: "{{ ansible_facts['fqdn'] }}"
action: member action: member
register: result register: result
failed_when: result.changed failed_when: result.changed

View File

@@ -7,7 +7,7 @@
tasks: tasks:
- name: Get Domain from the server name - name: Get Domain from the server name
set_fact: set_fact:
ipaserver_domain: "{{ ansible_fqdn.split('.')[1:] | join ('.') }}" ipaserver_domain: "{{ ansible_facts['fqdn'].split('.')[1:] | join ('.') }}"
- name: Ensure sudorules are absent - name: Ensure sudorules are absent
ipasudorule: ipasudorule:

View File

@@ -40,7 +40,7 @@
- name: Remove files from target host. - name: Remove files from target host.
file: file:
path: "{{ ansible_env.HOME }}/{{ item }}" path: "{{ ansible_facts['env'].HOME }}/{{ item }}"
state: absent state: absent
with_items: with_items:
- A_private.pem - A_private.pem

View File

@@ -19,7 +19,7 @@
- name: Copy files to target host. - name: Copy files to target host.
copy: copy:
src: "{{ playbook_dir }}/{{ item }}" src: "{{ playbook_dir }}/{{ item }}"
dest: "{{ ansible_env.HOME }}/{{ item }}" dest: "{{ ansible_facts['env'].HOME }}/{{ item }}"
with_items: with_items:
- A_private.pem - A_private.pem
- A_public.pem - A_public.pem

View File

@@ -151,7 +151,7 @@
ipaadmin_password: SomeADMINpassword ipaadmin_password: SomeADMINpassword
name: "{{vault.name}}" name: "{{vault.name}}"
action: member action: member
services: "HTTP/{{ ansible_fqdn }}" services: "HTTP/{{ ansible_facts['fqdn'] }}"
register: result register: result
failed_when: not result.changed failed_when: not result.changed
@@ -160,7 +160,7 @@
ipaadmin_password: SomeADMINpassword ipaadmin_password: SomeADMINpassword
name: "{{vault.name}}" name: "{{vault.name}}"
action: member action: member
services: "HTTP/{{ ansible_fqdn }}" services: "HTTP/{{ ansible_facts['fqdn'] }}"
register: result register: result
failed_when: result.changed failed_when: result.changed
@@ -169,7 +169,7 @@
ipaadmin_password: SomeADMINpassword ipaadmin_password: SomeADMINpassword
name: "{{vault.name}}" name: "{{vault.name}}"
action: member action: member
services: "HTTP/{{ ansible_fqdn }}" services: "HTTP/{{ ansible_facts['fqdn'] }}"
state: absent state: absent
register: result register: result
failed_when: not result.changed failed_when: not result.changed
@@ -179,7 +179,7 @@
ipaadmin_password: SomeADMINpassword ipaadmin_password: SomeADMINpassword
name: "{{vault.name}}" name: "{{vault.name}}"
action: member action: member
services: "HTTP/{{ ansible_fqdn }}" services: "HTTP/{{ ansible_facts['fqdn'] }}"
state: absent state: absent
register: result register: result
failed_when: result.changed failed_when: result.changed
@@ -264,7 +264,7 @@
ipavault: ipavault:
ipaadmin_password: SomeADMINpassword ipaadmin_password: SomeADMINpassword
name: "{{vault.name}}" name: "{{vault.name}}"
ownerservices: "HTTP/{{ ansible_fqdn }}" ownerservices: "HTTP/{{ ansible_facts['fqdn'] }}"
action: member action: member
register: result register: result
failed_when: not result.changed failed_when: not result.changed
@@ -273,7 +273,7 @@
ipavault: ipavault:
ipaadmin_password: SomeADMINpassword ipaadmin_password: SomeADMINpassword
name: "{{vault.name}}" name: "{{vault.name}}"
ownerservices: "HTTP/{{ ansible_fqdn }}" ownerservices: "HTTP/{{ ansible_facts['fqdn'] }}"
action: member action: member
register: result register: result
failed_when: result.changed failed_when: result.changed
@@ -282,7 +282,7 @@
ipavault: ipavault:
ipaadmin_password: SomeADMINpassword ipaadmin_password: SomeADMINpassword
name: "{{vault.name}}" name: "{{vault.name}}"
ownerservices: "HTTP/{{ ansible_fqdn }}" ownerservices: "HTTP/{{ ansible_facts['fqdn'] }}"
state: absent state: absent
action: member action: member
register: result register: result
@@ -292,7 +292,7 @@
ipavault: ipavault:
ipaadmin_password: SomeADMINpassword ipaadmin_password: SomeADMINpassword
name: "{{vault.name}}" name: "{{vault.name}}"
ownerservices: "HTTP/{{ ansible_fqdn }}" ownerservices: "HTTP/{{ ansible_facts['fqdn'] }}"
state: absent state: absent
action: member action: member
register: result register: result

View File

@@ -68,7 +68,7 @@
ipaadmin_password: SomeADMINpassword ipaadmin_password: SomeADMINpassword
name: asymvault name: asymvault
vault_type: asymmetric vault_type: asymmetric
public_key_file: "{{ ansible_env.HOME }}/A_public.pem" public_key_file: "{{ ansible_facts['env'].HOME }}/A_public.pem"
private_key: "{{ lookup('file', 'B_private.b64') }}" private_key: "{{ lookup('file', 'B_private.b64') }}"
register: result register: result
failed_when: result.failed or not result.changed failed_when: result.failed or not result.changed
@@ -77,7 +77,7 @@
ipavault: ipavault:
ipaadmin_password: SomeADMINpassword ipaadmin_password: SomeADMINpassword
name: asymvault name: asymvault
private_key_file: "{{ ansible_env.HOME }}/A_private.pem" private_key_file: "{{ ansible_facts['env'].HOME }}/A_private.pem"
state: retrieved state: retrieved
register: result register: result
failed_when: result.failed or result.changed or result.vault.data != 'SomeValue' failed_when: result.failed or result.changed or result.vault.data != 'SomeValue'
@@ -87,8 +87,8 @@
ipaadmin_password: SomeADMINpassword ipaadmin_password: SomeADMINpassword
name: asymvault name: asymvault
vault_type: asymmetric vault_type: asymmetric
public_key_file: "{{ ansible_env.HOME }}/B_public.pem" public_key_file: "{{ ansible_facts['env'].HOME }}/B_public.pem"
private_key_file: "{{ ansible_env.HOME }}/A_private.pem" private_key_file: "{{ ansible_facts['env'].HOME }}/A_private.pem"
register: result register: result
failed_when: result.failed or not result.changed failed_when: result.failed or not result.changed
@@ -115,8 +115,8 @@
ipavault: ipavault:
ipaadmin_password: SomeADMINpassword ipaadmin_password: SomeADMINpassword
name: asymvault name: asymvault
public_key_file: "{{ ansible_env.HOME }}/B_public.pem" public_key_file: "{{ ansible_facts['env'].HOME }}/B_public.pem"
private_key_file: "{{ ansible_env.HOME }}/A_private.pem" private_key_file: "{{ ansible_facts['env'].HOME }}/A_private.pem"
register: result register: result
failed_when: result.failed or not result.changed failed_when: result.failed or not result.changed
@@ -154,11 +154,11 @@
register: result register: result
failed_when: result.vault.data != 'Hello World.' or result.changed failed_when: result.vault.data != 'Hello World.' or result.changed
- name: Retrieve data from asymmetric vault into file {{ ansible_env.HOME }}/data.txt. - name: Retrieve data from asymmetric vault into file {{ ansible_facts['env'].HOME }}/data.txt.
ipavault: ipavault:
ipaadmin_password: SomeADMINpassword ipaadmin_password: SomeADMINpassword
name: asymvault name: asymvault
out: "{{ ansible_env.HOME }}/data.txt" out: "{{ ansible_facts['env'].HOME }}/data.txt"
private_key: "{{ lookup('file', 'B_private.b64') }}" private_key: "{{ lookup('file', 'B_private.b64') }}"
state: retrieved state: retrieved
register: result register: result
@@ -166,7 +166,7 @@
- name: Verify retrieved data. - name: Verify retrieved data.
slurp: slurp:
src: "{{ ansible_env.HOME }}/data.txt" src: "{{ ansible_facts['env'].HOME }}/data.txt"
register: slurpfile register: slurpfile
failed_when: slurpfile['content'] | b64decode != 'Hello World.' failed_when: slurpfile['content'] | b64decode != 'Hello World.'
@@ -192,7 +192,7 @@
ipaadmin_password: SomeADMINpassword ipaadmin_password: SomeADMINpassword
name: asymvault name: asymvault
vault_type: asymmetric vault_type: asymmetric
in: "{{ ansible_env.HOME }}/in.txt" in: "{{ ansible_facts['env'].HOME }}/in.txt"
register: result register: result
failed_when: not result.changed failed_when: not result.changed
@@ -242,7 +242,7 @@
ipavault: ipavault:
ipaadmin_password: SomeADMINpassword ipaadmin_password: SomeADMINpassword
name: asymvault name: asymvault
public_key_file: "{{ ansible_env.HOME }}/B_public.pem" public_key_file: "{{ ansible_facts['env'].HOME }}/B_public.pem"
vault_type: asymmetric vault_type: asymmetric
register: result register: result
failed_when: not result.changed failed_when: not result.changed
@@ -251,7 +251,7 @@
ipavault: ipavault:
ipaadmin_password: SomeADMINpassword ipaadmin_password: SomeADMINpassword
name: asymvault name: asymvault
public_key_file: "{{ ansible_env.HOME }}/B_public.pem" public_key_file: "{{ ansible_facts['env'].HOME }}/B_public.pem"
vault_type: asymmetric vault_type: asymmetric
register: result register: result
failed_when: result.changed failed_when: result.changed
@@ -277,7 +277,7 @@
ipavault: ipavault:
ipaadmin_password: SomeADMINpassword ipaadmin_password: SomeADMINpassword
name: asymvault name: asymvault
private_key_file: "{{ ansible_env.HOME }}/B_private.pem" private_key_file: "{{ ansible_facts['env'].HOME }}/B_private.pem"
state: retrieved state: retrieved
register: result register: result
failed_when: result.vault.data != 'Hello World.' or result.changed failed_when: result.vault.data != 'Hello World.' or result.changed

View File

@@ -57,18 +57,18 @@
register: result register: result
failed_when: result.vault.data != 'Hello World.' or result.changed failed_when: result.vault.data != 'Hello World.' or result.changed
- name: Retrieve data from standard vault into file {{ ansible_env.HOME }}/data.txt. - name: Retrieve data from standard vault into file {{ ansible_facts['env'].HOME }}/data.txt.
ipavault: ipavault:
ipaadmin_password: SomeADMINpassword ipaadmin_password: SomeADMINpassword
name: stdvault name: stdvault
out: "{{ ansible_env.HOME }}/data.txt" out: "{{ ansible_facts['env'].HOME }}/data.txt"
state: retrieved state: retrieved
register: result register: result
failed_when: result.changed or result.failed or (result.vault.data | default(false)) failed_when: result.changed or result.failed or (result.vault.data | default(false))
- name: Verify retrieved data. - name: Verify retrieved data.
slurp: slurp:
src: "{{ ansible_env.HOME }}/data.txt" src: "{{ ansible_facts['env'].HOME }}/data.txt"
register: slurpfile register: slurpfile
failed_when: slurpfile['content'] | b64decode != 'Hello World.' failed_when: slurpfile['content'] | b64decode != 'Hello World.'
@@ -93,7 +93,7 @@
ipaadmin_password: SomeADMINpassword ipaadmin_password: SomeADMINpassword
name: stdvault name: stdvault
vault_type: standard vault_type: standard
in: "{{ ansible_env.HOME }}/in.txt" in: "{{ ansible_facts['env'].HOME }}/in.txt"
register: result register: result
failed_when: not result.changed failed_when: not result.changed

View File

@@ -63,19 +63,19 @@
register: result register: result
failed_when: result.changed or result.failed or result.vault.data != 'Hello World.' failed_when: result.changed or result.failed or result.vault.data != 'Hello World.'
- name: Retrieve data from symmetric vault into file {{ ansible_env.HOME }}/data.txt. - name: Retrieve data from symmetric vault into file {{ ansible_facts['env'].HOME }}/data.txt.
ipavault: ipavault:
ipaadmin_password: SomeADMINpassword ipaadmin_password: SomeADMINpassword
name: symvault name: symvault
password: SomeVAULTpassword password: SomeVAULTpassword
out: "{{ ansible_env.HOME }}/data.txt" out: "{{ ansible_facts['env'].HOME }}/data.txt"
state: retrieved state: retrieved
register: result register: result
failed_when: result.changed or result.failed or (result.vault.data | default(false)) failed_when: result.changed or result.failed or (result.vault.data | default(false))
- name: Verify retrieved data. - name: Verify retrieved data.
slurp: slurp:
src: "{{ ansible_env.HOME }}/data.txt" src: "{{ ansible_facts['env'].HOME }}/data.txt"
register: slurpfile register: slurpfile
failed_when: slurpfile['content'] | b64decode != 'Hello World.' failed_when: slurpfile['content'] | b64decode != 'Hello World.'
@@ -101,7 +101,7 @@
ipavault: ipavault:
ipaadmin_password: SomeADMINpassword ipaadmin_password: SomeADMINpassword
name: symvault name: symvault
in: "{{ ansible_env.HOME }}/in.txt" in: "{{ ansible_facts['env'].HOME }}/in.txt"
password: SomeVAULTpassword password: SomeVAULTpassword
register: result register: result
failed_when: result.failed or not result.changed failed_when: result.failed or not result.changed
@@ -154,7 +154,7 @@
ipaadmin_password: SomeADMINpassword ipaadmin_password: SomeADMINpassword
name: symvault name: symvault
username: user01 username: user01
password_file: "{{ ansible_env.HOME }}/password.txt" password_file: "{{ ansible_facts['env'].HOME }}/password.txt"
vault_type: symmetric vault_type: symmetric
register: result register: result
failed_when: result.failed or not result.changed failed_when: result.failed or not result.changed
@@ -164,7 +164,7 @@
ipaadmin_password: SomeADMINpassword ipaadmin_password: SomeADMINpassword
name: symvault name: symvault
username: user01 username: user01
password_file: "{{ ansible_env.HOME }}/password.txt" password_file: "{{ ansible_facts['env'].HOME }}/password.txt"
vault_type: symmetric vault_type: symmetric
register: result register: result
failed_when: result.failed or result.changed failed_when: result.failed or result.changed
@@ -191,7 +191,7 @@
ipavault: ipavault:
ipaadmin_password: SomeADMINpassword ipaadmin_password: SomeADMINpassword
name: symvault name: symvault
password_file: "{{ ansible_env.HOME }}/password.txt" password_file: "{{ ansible_facts['env'].HOME }}/password.txt"
state: retrieved state: retrieved
register: result register: result
failed_when: result.failed or result.changed or result.vault.data != 'Hello World.' failed_when: result.failed or result.changed or result.vault.data != 'Hello World.'
@@ -328,7 +328,7 @@
ipaadmin_password: SomeADMINpassword ipaadmin_password: SomeADMINpassword
name: symvault name: symvault
password: APasswordToChange password: APasswordToChange
new_password_file: "{{ ansible_env.HOME }}/password.txt" new_password_file: "{{ ansible_facts['env'].HOME }}/password.txt"
vault_type: symmetric vault_type: symmetric
register: result register: result
failed_when: not result.changed or result.failed failed_when: not result.changed or result.failed

View File

@@ -15,49 +15,61 @@ find . -name "*~" -exec rm {} \;
sed -i -e "s/ansible.module_utils.ansible_freeipa_module/ansible_collections.${collection_prefix}.plugins.module_utils.ansible_freeipa_module/" plugins/modules/*.py sed -i -e "s/ansible.module_utils.ansible_freeipa_module/ansible_collections.${collection_prefix}.plugins.module_utils.ansible_freeipa_module/" plugins/modules/*.py
(cd plugins/module_utils && { (cd plugins/module_utils && {
ln -s ../../roles/*/module_utils/*.py . ln -sf ../../roles/*/module_utils/*.py .
}) })
(cd plugins/modules && { (cd plugins/modules && {
sed -i -e "s/ansible.module_utils.ansible_ipa_/ansible_collections.${collection_prefix}.plugins.module_utils.ansible_ipa_/" ../../roles/*/library/*.py sed -i -e "s/ansible.module_utils.ansible_ipa_/ansible_collections.${collection_prefix}.plugins.module_utils.ansible_ipa_/" ../../roles/*/library/*.py
ln -s ../../roles/*/library/*.py . ln -sf ../../roles/*/library/*.py .
}) })
[ ! -x plugins/action_plugins ] && mkdir plugins/action_plugins [ ! -x plugins/action_plugins ] && mkdir plugins/action_plugins
(cd plugins/action_plugins && { (cd plugins/action_plugins && {
ln -s ../../roles/*/action_plugins/*.py . ln -sf ../../roles/*/action_plugins/*.py .
}) })
echo "Fixing examples in plugins/modules..."
find plugins/modules -name "*.py" -print0 | find plugins/modules -name "*.py" -print0 |
while IFS= read -d -r '' line; do while IFS= read -d '' -r line; do
python utils/galaxyfy-module-EXAMPLES.py "$x" \ python utils/galaxyfy-module-EXAMPLES.py "$line" \
"ipa" "$collection_prefix" "ipa" "$collection_prefix"
done done
echo -e "\033[AFixing examples in plugins/modules... \033[32;1mDONE\033[0m"
echo "Fixing examples in roles/*/library..."
find roles/*/library -name "*.py" -print0 | find roles/*/library -name "*.py" -print0 |
while IFS= read -d -r '' line; do while IFS= read -d '' -r line; do
python utils/galaxyfy-module-EXAMPLES.py "$x" \ python utils/galaxyfy-module-EXAMPLES.py "$line" \
"ipa" "$collection_prefix" "ipa" "$collection_prefix"
done done
echo -e "\033[AFixing examples in roles/*/library... \033[32;1mDONE\033[0m"
for x in roles/*/tasks/*.yml; do echo "Fixing playbooks in roles/*/tasks..."
python utils/galaxyfy-playbook.py "$x" "ipa" "$collection_prefix" for line in roles/*/tasks/*.yml; do
python utils/galaxyfy-playbook.py "$line" "ipa" "$collection_prefix"
done done
echo -e "\033[AFixing playbooks in roles/*tasks... \033[32;1mDONE\033[0m"
echo "Fixing playbooks in playbooks..."
find playbooks -name "*.yml" -print0 | find playbooks -name "*.yml" -print0 |
while IFS= read -d -r '' line; do while IFS= read -d '' -r line; do
python utils/galaxyfy-playbook.py "$x" "ipa" "$collection_prefix" python utils/galaxyfy-playbook.py "$line" "ipa" "$collection_prefix"
done done
echo -e "\033[AFixing playbooks in playbooks... \033[32;1mDONE\033[0m"
echo "Fixing README(s)..."
find . -name "README*.md" -print0 | find . -name "README*.md" -print0 |
while IFS= read -d -r '' line; do while IFS= read -d '' -r line; do
python utils/galaxyfy-README.py "$x" "ipa" "$collection_prefix" python utils/galaxyfy-README.py "$line" "ipa" "$collection_prefix"
done done
echo -e "\033[AFixing examples in plugins/modules... \033[32;1mDONE\033[0m"
echo "Fixing playbbooks in tests..."
find tests -name "*.yml" -print0 | find tests -name "*.yml" -print0 |
while IFS= read -d -r '' line; do while IFS= read -d '' -r line; do
python utils/galaxyfy-playbook.py "$x" "ipa" "$collection_prefix" python utils/galaxyfy-playbook.py "$line" "ipa" "$collection_prefix"
done done
echo -e "\033[AFixing playbooks in tests... \033[32;1mDONE\033[0m"
#git diff #git diff