Commit Graph

84 Commits

Author SHA1 Message Date
Ryan Petrello
4cbdeb0d30 don't allow private key passphrases for unencrypted private ssh keys
see: #5311
2017-02-15 12:27:27 -05:00
Matthew Jones
888ec25c3c Adding new privilege escalation methods from core 2016-12-15 16:22:21 -05:00
sundeep-co-in
d7b3b90f4d update strings 2016-10-25 16:12:41 +05:30
Chris Church
6ebe45b1bd Configure Tower in Tower:
* Add separate Django app for configuration: awx.conf.
* Migrate from existing main.TowerSettings model to conf.Setting.
* Add settings wrapper to allow get/set/del via django.conf.settings.
* Update existing references to tower_settings to use django.conf.settings.
* Add a settings registry to allow for each Django app to register configurable settings.
* Support setting validation and conversion using Django REST Framework fields.
* Add /api/v1/settings/ to display a list of setting categories.
* Add /api/v1/settings/<slug>/ to display all settings in a category as a single object.
* Allow PUT/PATCH to update setting singleton, DELETE to reset to defaults.
* Add "all" category to display all settings across categories.
* Add "changed" category to display only settings configured in the database.
* Support per-user settings via "user" category (/api/v1/settings/user/).
* Support defaults for user settings via "user-defaults" category (/api/v1/settings/user-defaults/).
* Update serializer metadata to support category, category_slug and placeholder on OPTIONS responses.
* Update serializer metadata to handle child fields of a list/dict.
* Hide raw data form in browsable API for OPTIONS and DELETE.
* Combine existing licensing code into single "TaskEnhancer" class.
* Move license helper functions from awx.api.license into awx.conf.license.
* Update /api/v1/config/ to read/verify/update license using TaskEnhancer and settings wrapper.
* Add support for caching settings accessed via settings wrapper.
* Invalidate cached settings when Setting model changes or is deleted.
* Preload all database settings into cache on first access via settings wrapper.
* Add support for read-only settings than can update their value depending on other settings.
* Use setting_changed signal whenever a setting changes.
* Register configurable authentication, jobs, system and ui settings.
* Register configurable LDAP, RADIUS and social auth settings.
* Add custom fields and validators for URL, LDAP, RADIUS and social auth settings.
* Rewrite existing validator for Credential ssh_private_key to support validating private keys, certs or combinations of both.
* Get all unit/functional tests working with above changes.
* Add "migrate_to_database_settings" command to determine settings to be migrated into the database and comment them out when set in Python settings files.
* Add support for migrating license key from file to database.
* Remove database-configuable settings from local_settings.py example files.
* Update setup role to no longer install files for database-configurable settings.

f 94ff6ee More settings work.
f af4c4e0 Even more db settings stuff.
f 96ea9c0 More settings, attempt at singleton serializer for settings.
f 937c760 More work on singleton/category views in API, add code to comment out settings in Python files, work on command to migrate settings to database.
f 425b0d3 Minor fixes for sprint demo.
f ea402a4 Add support for read-only settings, cleanup license engine, get license support working with DB settings.
f ec289e4 Rename migration, minor fixmes, update setup role.
f 603640b Rewrite key/cert validator, finish adding social auth fields, hook up signals for setting_changed, use None to imply a setting is not set.
f 67d1b5a Get functional/unit tests passing.
f 2919b62 Flake8 fixes.
f e62f421 Add redbaron to requirements, get file to database migration working (except for license).
f c564508 Add support for migrating license file.
f 982f767 Add support for regex in social map fields.
2016-09-26 22:14:47 -04:00
Akita Noek
30451f230b Fixed org auditor visibility of team credentials
And by fix, I mean prevent us from getting into the situation that was
causing the asymetric visiblity by brining us into alignment with the
original intention and spec for how credentials were supposed behave.

 #3081
2016-08-16 14:02:09 -04:00
Akita Noek
3d218d5fca Revert "Fix to ensure org auditors can see team credentials"
This reverts commit 5dcb0e57d80a3bb0553ca8194890a938257a6e93.

New clarification on what the actual desired behavior of this whole
system means this commit is trash, fixing in a much better way.
2016-08-11 11:00:02 -04:00
Akita Noek
d181aefddf Fix to ensure org auditors can see team credentials
#3081
2016-08-10 16:58:39 -04:00
Wayne Witzel III
87ffded774 renaming Credential.owner_role -> Credential.admin_role 2016-06-24 16:55:07 -04:00
Wayne Witzel III
b4148313a0 org auditor should be able to read credential 2016-06-21 16:07:11 -04:00
Wayne Witzel III
c7cf954476 ensure org auditor can see org credentials 2016-06-21 14:43:40 -04:00
Wayne Witzel III
3575b32eab Credential should have a unique org,kind,name 2016-06-21 11:35:30 -04:00
Matthew Jones
9b49ff15bd Mass rename foreman -> satellite6
For end-user facing elements. We still maintain foreman for some
underlying logic needed by the modules
2016-06-15 11:16:15 -04:00
Wayne Witzel III
5754b4bb2c adjusting Credential model and migrations 2016-06-10 13:23:32 -04:00
AlanCoding
f6b3da0c46 Make error message grammar more consistent 2016-05-18 13:39:06 -04:00
Wayne Witzel III
911c92707c update models to match new migrations 2016-05-13 11:59:14 -04:00
Akita Noek
280993a15d Dropped stored role name/description and other superflous fields
For name and description, we'll derive these from the role_field and
content type, which is much better for lots of reasons (eg changing text
the future). Also ditched the rest of the fields comming from the
standard common base model, we didn't use them and they cost several
indexes on the table.
2016-04-22 10:16:04 -04:00
Matthew Jones
fe360ca8e3 Updates to network credentials
Separating out the network credential used fields
2016-04-21 16:43:55 -04:00
Matthew Jones
da7a61354a Merge pull request #1635 from matburt/new_azure_inventory_and_credentials
Implement Azure RM creds and inventory
2016-04-21 14:38:13 -04:00
Matthew Jones
296f70ce17 Implement Azure RM creds and inventory
* Vendor ansible's azure_rm inventory script
* Add new inventory type
* Add new credential type
* Expand host instance_id column from varchar 100 to 1024 to accept the
  long instance ids returned by Azure
* Make the inventory_import azure match rename more explicit.
2016-04-21 13:51:30 -04:00
Wayne Witzel III
320d6377d0 add Red Hat for CloudForms and Satellite 6 2016-04-19 18:03:58 -04:00
Akita Noek
d5bc455677 admins can use credentials too 2016-04-15 16:27:24 -04:00
Akita Noek
1fa70106d8 Added read_role to credential 2016-04-15 16:26:59 -04:00
Wayne Witzel III
7098ef8da5 usage_role -> use_role 2016-04-15 11:01:08 -04:00
Akita Noek
8887db231b Progress on ripping out RolePermissions 2016-04-14 09:44:20 -04:00
Wayne Witzel III
e8b35533e4 added initial API support for Network credential 2016-04-11 10:14:02 -04:00
Wayne Witzel III
6635782ed8 add API support for CloudForms inventory (#1099) 2016-04-05 14:43:25 -04:00
Wayne Witzel III
051dfd4b0e add API support for Satellite 6 inventory (#1098) 2016-04-05 14:34:22 -04:00
Akita Noek
219c09728d Merge branch 'devel' of github.com:ansible/ansible-tower into rbac 2016-03-31 11:32:02 -04:00
AlanCoding
fa92b2e851 back out openstack_v3 options but retain v3 functionality 2016-03-30 16:20:20 -04:00
Akita Noek
5baa784ce2 Merge branch 'devel' of github.com:ansible/ansible-tower into merge-devel 2016-03-24 13:51:00 -04:00
Wayne Witzel III
a5deb66878 deprecate Credential.team/user 2016-03-23 15:23:12 -04:00
AlanCoding
f4b1de766d Adding OpenStack v3 cred type 2016-03-18 16:41:09 -04:00
AlanCoding
c807d5dcf3 Add keystone v3 support via new domain field on credential 2016-03-18 16:41:09 -04:00
Wayne Witzel III
6d249f38a7 Fix credential assertions and rename migration helpers 2016-03-17 15:41:46 -04:00
Akita Noek
defe4a4fd8 Made credentials accessible by system administrators and auditors 2016-03-15 16:51:44 -04:00
Akita Noek
db6117a56d Added role description fields
Completes #1096
2016-03-03 16:19:10 -05:00
Akita Noek
e2a428b9f5 Removed resource_field ImplicitRoleField
We just now assume that this field is always named 'resource'

 Completes functionality of #926, documentation next
2016-02-15 12:38:17 -05:00
Wayne Witzel III
8cf0ba0da7 convert Credential to django migration 2016-02-08 15:54:11 -05:00
Wayne Witzel III
7b3f3675f8 flake8 fixes 2016-02-05 09:18:52 -05:00
Wayne Witzel III
58a603bac1 added Credential.migrate_to_rbac and tests 2016-02-05 08:47:15 -05:00
Akita Noek
5b50ebb8da Added a ResourceMixin to be added to any model that is a "Resource"
Also added initial permissions checking and accessible object methods to
the mixin
2016-02-04 15:12:25 -05:00
Akita Noek
6dad0406b8 Initial implicit role / resource field additions into models
"Completes" #731 until we find out what I missed
2016-02-04 15:12:24 -05:00
Wayne Witzel III
58499175d6 Set the GCE_ZONE env variable to source_regions.
Fix when an empty key is provided and add tests for validate_ssh_private_key
2016-02-02 09:49:04 -05:00
Wayne Witzel III
71a1547c3a fixing ad_hoc imports
flake8 fixes

Fix and add awx/api/tests

added fact tests

added proper xml reports for jenkins

added jenkins requirements and adjusted Makefile target
2016-02-01 18:37:56 -05:00
Wayne Witzel III
3d4580611e added pytest to requirements_dev
reworking test strucutre

reworked pytest.ini, removed functional imports, updated req_dev

remove unneeded __init__ files

add testing checker to local_settings examples

adding testing packages to system Python for docker
2016-02-01 18:37:56 -05:00
Wayne Witzel III
5d6ea242c0 reorganzing tests folder
make tests a module

refacotring to local imports for tests

fixing test import of tasks

fixing test import of tasks

more testing fixups
2016-02-01 18:37:56 -05:00
Matthew Jones
34e028b8c7 Adding security token field to support ec2 sts
And any future credential that might want to use "security_token"
2015-09-30 13:39:36 -04:00
Chris Church
b647811456 Add support for detecting encrypted openssh format private keys. Fixes https://trello.com/c/ZeVOXN5U 2015-08-04 18:59:25 -04:00
John Mitchell
32d1c0e4db fixed copyright date 2015-06-11 16:10:23 -04:00
Matthew Jones
35fd2addc6 Remove runas from the list of become method choices since it's not
implemented in ansible yet (although it is listed in their help docs)
2015-06-01 09:48:16 -04:00