diff --git a/roles/applications/meta/argument_specs.yml b/roles/applications/meta/argument_specs.yml index 9e8b5dd5a..bc2524c7b 100644 --- a/roles/applications/meta/argument_specs.yml +++ b/roles/applications/meta/argument_specs.yml @@ -69,7 +69,7 @@ argument_specs: default: "{{ controller_configuration_secure_logging | default(false) }}" required: false type: bool - description: Whether or falset to include the sensitive tasks from this role in the log. Set this value to `true` if you will be providing your sensitive values from elsewhere. + description: Whether or not to include the sensitive tasks from this role in the log. Set this value to `true` if you will be providing your sensitive values from elsewhere. controller_configuration_secure_logging: default: false required: false @@ -90,7 +90,7 @@ argument_specs: controller_validate_certs: default: true required: false - description: Whether or falset to validate the Ansible Controller Server's SSL certificate. + description: Whether or not to validate the Ansible Controller Server's SSL certificate. type: str controller_username: default: None diff --git a/roles/credential_input_sources/meta/argument_specs.yml b/roles/credential_input_sources/meta/argument_specs.yml index f268102f5..ed3ec9e5e 100644 --- a/roles/credential_input_sources/meta/argument_specs.yml +++ b/roles/credential_input_sources/meta/argument_specs.yml @@ -58,7 +58,7 @@ argument_specs: default: "{{ controller_configuration_secure_logging | default(false) }}" required: false type: bool - description: Whether or falset to include the sensitive tasks from this role in the log. Set this value to `true` if you will be providing your sensitive values from elsewhere. + description: Whether or not to include the sensitive tasks from this role in the log. Set this value to `true` if you will be providing your sensitive values from elsewhere. controller_configuration_secure_logging: default: false required: false @@ -79,7 +79,7 @@ argument_specs: controller_validate_certs: default: true required: false - description: Whether or falset to validate the Ansible Controller Server's SSL certificate. + description: Whether or not to validate the Ansible Controller Server's SSL certificate. type: str controller_username: default: None diff --git a/roles/credential_types/meta/argument_specs.yml b/roles/credential_types/meta/argument_specs.yml index 72afa739d..01bb2400a 100644 --- a/roles/credential_types/meta/argument_specs.yml +++ b/roles/credential_types/meta/argument_specs.yml @@ -66,7 +66,7 @@ argument_specs: default: "{{ controller_configuration_secure_logging | default(false) }}" required: false type: bool - description: Whether or falset to include the sensitive tasks from this role in the log. Set this value to `true` if you will be providing your sensitive values from elsewhere. + description: Whether or not to include the sensitive tasks from this role in the log. Set this value to `true` if you will be providing your sensitive values from elsewhere. controller_configuration_secure_logging: default: false required: false @@ -87,7 +87,7 @@ argument_specs: controller_validate_certs: default: true required: false - description: Whether or falset to validate the Ansible Controller Server's SSL certificate. + description: Whether or not to validate the Ansible Controller Server's SSL certificate. type: str controller_username: default: None diff --git a/roles/credentials/meta/argument_specs.yml b/roles/credentials/meta/argument_specs.yml index 6ba3ba148..a9c171c14 100644 --- a/roles/credentials/meta/argument_specs.yml +++ b/roles/credentials/meta/argument_specs.yml @@ -79,7 +79,7 @@ argument_specs: default: "{{ controller_configuration_secure_logging | default(true) }}" required: false type: bool - description: Whether or falset to include the sensitive tasks from this role in the log. Set this value to `true` if you will be providing your sensitive values from elsewhere. + description: Whether or not to include the sensitive tasks from this role in the log. Set this value to `true` if you will be providing your sensitive values from elsewhere. controller_configuration_secure_logging: default: true required: false @@ -100,7 +100,7 @@ argument_specs: controller_validate_certs: default: true required: false - description: Whether or falset to validate the Ansible Controller Server's SSL certificate. + description: Whether or not to validate the Ansible Controller Server's SSL certificate. type: str controller_username: default: None diff --git a/roles/dispatch/meta/argument_specs.yml b/roles/dispatch/meta/argument_specs.yml new file mode 100644 index 000000000..ade0c93f7 --- /dev/null +++ b/roles/dispatch/meta/argument_specs.yml @@ -0,0 +1,99 @@ +--- +argument_specs: + main: + short_description: An Ansible Role to call other roles to create objects on Ansible Controller. + options: + controller_configuration_dispatcher_roles: + default: + - {role: settings, var: controller_settings, tags: settings} + - {role: organizations, var: controller_organizations, tags: organizations} + - {role: labels, var: controller_labels, tags: labels} + - {role: users, var: controller_user_accounts, tags: users} + - {role: teams, var: controller_teams, tags: teams} + - {role: credential_types, var: controller_credential_types, tags: credential_types} + - {role: credentials, var: controller_credentials, tags: credentials} + - {role: credential_input_sources, var: controller_credential_input_sources, tags: credential_input_sources} + - {role: notification_templates, var: controller_notifications, tags: notification_templates} + - {role: projects, var: controller_projects, tags: projects} + - {role: inventories, var: controller_inventories, tags: inventories} + - {role: inventory_sources, var: controller_inventory_sources, tags: inventory_sources} + - {role: inventory_source_update, var: controller_inventory_sources, tags: inventory_sources} + - {role: execution_environments, var: controller_execution_environments, tags: execution_environments} + - {role: applications, var: controller_applications, tags: applications} + - {role: instances, var: controller_instances, tags: instances} + - {role: instance_groups, var: controller_instance_groups, tags: instance_groups} + - {role: project_update, var: controller_projects, tags: projects} + - {role: hosts, var: controller_hosts, tags: hosts} + - {role: groups, var: controller_groups, tags: inventories} + - {role: job_templates, var: controller_templates, tags: job_templates} + - {role: workflow_job_templates, var: controller_workflows, tags: workflow_job_templates} + - {role: schedules, var: controller_schedules, tags: schedules} + - {role: roles, var: controller_roles, tags: roles} + required: false + description: List of roles, variables and tags to run through + type: list + elements: dict + options: + role: + required: true + description: Name of role from this collection to call + type: str + var: + required: true + description: Name of variable to be passed to the role + type: str + tags: + required: false + description: Tags to be applied to the role so tagging can be used to run only part of a playbook + + + # Async variables + controller_configuration_async_retries: + default: 30 + required: false + description: This variable sets number of retries across all roles as a default. + controller_configuration_async_delay: + default: 1 + required: false + description: This variable sets delay between retries across all roles as a default. + + + # No_log variables + controller_configuration_secure_logging: + default: false + required: false + type: bool + description: This variable enables secure logging across all roles as a default. + + # Generic across all roles + controller_state: + default: present + required: false + description: The state all objects will take unless overridden by object default + type: str + controller_hostname: + default: None + required: false + description: URL to the Ansible Controller Server. + type: str + controller_validate_certs: + default: true + required: false + description: Whether or not to validate the Ansible Controller Server's SSL certificate. + type: str + controller_username: + default: None + required: false + description: Admin User on the Ansible Controller Server. Either username / password or oauthtoken need to be specified. + type: str + controller_password: + default: None + required: false + description: Controller Admin User's password on the Ansible Controller Server. This should be stored in an Ansible Vault at vars/controller-secrets.yml or elsewhere and called from a parent playbook. Either username / password or oauthtoken need to be specified. + type: str + controller_oauthtoken: + default: None + required: false + description: Controller Admin User's token on the Ansible Controller Server. This should be stored in an Ansible Vault at or elsewhere and called from a parent playbook. Either username / password or oauthtoken need to be specified. + type: str +... diff --git a/roles/execution_environments/meta/argument_specs.yml b/roles/execution_environments/meta/argument_specs.yml index 8ba6b47a7..e8415a45f 100644 --- a/roles/execution_environments/meta/argument_specs.yml +++ b/roles/execution_environments/meta/argument_specs.yml @@ -67,7 +67,7 @@ argument_specs: default: "{{ controller_configuration_secure_logging | default(false) }}" required: false type: bool - description: Whether or falset to include the sensitive tasks from this role in the log. Set this value to `true` if you will be providing your sensitive values from elsewhere. + description: Whether or not to include the sensitive tasks from this role in the log. Set this value to `true` if you will be providing your sensitive values from elsewhere. controller_configuration_secure_logging: default: false required: false @@ -88,7 +88,7 @@ argument_specs: controller_validate_certs: default: true required: false - description: Whether or falset to validate the Ansible Controller Server's SSL certificate. + description: Whether or not to validate the Ansible Controller Server's SSL certificate. type: str controller_username: default: None diff --git a/roles/filetree_create/meta/argument_specs.yml b/roles/filetree_create/meta/argument_specs.yml new file mode 100644 index 000000000..f3d6ec748 --- /dev/null +++ b/roles/filetree_create/meta/argument_specs.yml @@ -0,0 +1,79 @@ +--- +argument_specs: + main: + short_description: An Ansible Role to create a local file tree of objects existing in Controller + options: + output_path: + default: "/tmp/filetree_output" + required: false + type: str + description: The path to the output directory where all the generated `yaml` files with the corresponding Objects as code will be written to. + input_tag: + default: + - all + required: false + type: list + elements: str + description: The tags which are applied to the 'sub-roles'. If 'all' is in the list (the default value) then all roles will be called. + query_controller_api_max_objects: + default: 10000 + required: false + type: int + description: Maximum number of objects to return from the list. If a list view returns more an max_objects an exception will be raised + + + # Async variables + controller_configuration_async_retries: + default: 30 + required: false + description: This variable sets number of retries across all roles as a default. + controller_configuration_async_delay: + default: 1 + required: false + description: This variable sets delay between retries across all roles as a default. + + + # No_log variables + controller_configuration_filetree_create_secure_logging: + default: "{{ controller_configuration_secure_logging | default(false) }}" + required: false + type: bool + description: Whether or not to include the sensitive tasks from this role in the log. Set this value to `true` if you will be providing your sensitive values from elsewhere. + controller_configuration_secure_logging: + default: false + required: false + type: bool + description: This variable enables secure logging across all roles as a default. + + # Generic across all roles + controller_state: + default: present + required: false + description: The state all objects will take unless overridden by object default + type: str + controller_hostname: + default: None + required: false + description: URL to the Ansible Controller Server. + type: str + controller_validate_certs: + default: true + required: false + description: Whether or not to validate the Ansible Controller Server's SSL certificate. + type: str + controller_username: + default: None + required: false + description: Admin User on the Ansible Controller Server. Either username / password or oauthtoken need to be specified. + type: str + controller_password: + default: None + required: false + description: Controller Admin User's password on the Ansible Controller Server. This should be stored in an Ansible Vault at vars/controller-secrets.yml or elsewhere and called from a parent playbook. Either username / password or oauthtoken need to be specified. + type: str + controller_oauthtoken: + default: None + required: false + description: Controller Admin User's token on the Ansible Controller Server. This should be stored in an Ansible Vault at or elsewhere and called from a parent playbook. Either username / password or oauthtoken need to be specified. + type: str +... diff --git a/roles/filetree_read/meta/argument_specs.yml b/roles/filetree_read/meta/argument_specs.yml new file mode 100644 index 000000000..bc3a17a0d --- /dev/null +++ b/roles/filetree_read/meta/argument_specs.yml @@ -0,0 +1,186 @@ +--- +argument_specs: + main: + short_description: An Ansible Role to read from a local file tree and create objects in Controller + options: + orgs: + type: str + default: Acme + required: true + description: This variable sets the organization where should be applied the configuration. + dir_orgs_vars: + type: str + default: orgs_vars + required: true + description: This variable sets the directory path where the variables will be store. + env: + type: str + default: dev + required: false + description: This variable sets the life-cycle environment to use. + controller_location: + type: str + default: '' + required: false + description: This variable sets object location. It is useful when the configuration need to be replicated in an active/passive sites architecture + filetree_controller_settings: + type: raw + default: "{{ dir_orgs_vars }}/{{ orgs }}/env/{{ env }}/controller_settings.d/" + required: false + description: Directory path to load controller object variables + filetree_controller_organizations: + type: raw + default: "{{ dir_orgs_vars }}/{{ orgs }}/env/common/controller_organizations.d/" + required: false + description: Directory path to load controller object variables + filetree_controller_labels: + type: raw + default: "{{ dir_orgs_vars }}/{{ orgs }}/env/common/controller_labels.d/" + required: false + description: Directory path to load controller object variables + filetree_controller_user_accounts: + type: raw + default: "{{ dir_orgs_vars }}/{{ orgs }}/env/{{ env }}/controller_users.d/" + required: false + description: Directory path to load controller object variables + filetree_controller_teams: + type: raw + default: "{{ dir_orgs_vars }}/{{ orgs }}/env/common/controller_teams.d/" + required: false + description: Directory path to load controller object variables + filetree_controller_credential_types: + type: raw + default: "{{ dir_orgs_vars }}/{{ orgs }}/env/common/controller_credential_types.d/" + required: false + description: Directory path to load controller object variables + filetree_controller_credentials: + type: raw + default: "{{ dir_orgs_vars }}/{{ orgs }}/env/{{ env }}/controller_credentials.d/" + required: false + description: Directory path to load controller object variables + filetree_controller_credential_input_sources: + type: raw + default: "{{ dir_orgs_vars }}/{{ orgs }}/env/common/controller_credential_input_sources.d/" + required: false + description: Directory path to load controller object variables + filetree_controller_notifications: + type: raw + default: "{{ dir_orgs_vars }}/{{ orgs }}/env/common/controller_notification_templates.d/" + required: false + description: Directory path to load controller object variables + filetree_controller_projects: + type: raw + default: "{{ dir_orgs_vars }}/{{ orgs }}/env/common/controller_projects.d/" + required: false + description: Directory path to load controller object variables + filetree_controller_execution_environments: + type: raw + default: "{{ dir_orgs_vars }}/{{ orgs }}/env/{{ env }}/controller_execution_environments.d/" + required: false + description: Directory path to load controller object variables + filetree_controller_applications: + type: raw + default: "{{ dir_orgs_vars }}/{{ orgs }}/env/common/controller_applications.d/" + required: false + description: Directory path to load controller object variables + filetree_controller_inventories: + type: raw + default: "{{ dir_orgs_vars }}/{{ orgs }}/env/common/controller_inventories.d/" + required: false + description: Directory path to load controller object variables + filetree_controller_inventory_sources: + type: raw + default: "{{ dir_orgs_vars }}/{{ orgs }}/env/{{ env }}/controller_inventory_sources.d/" + required: false + description: Directory path to load controller object variables + filetree_controller_instance_groups: + type: raw + default: "{{ dir_orgs_vars }}/{{ orgs }}/env/{{ env }}/controller_instance_groups.d/" + required: false + description: Directory path to load controller object variables + filetree_controller_hosts: + type: raw + default: "{{ dir_orgs_vars }}/{{ orgs }}/env/{{ env }}/controller_hosts.d/" + required: false + description: Directory path to load controller object variables + filetree_controller_groups: + type: raw + default: "{{ dir_orgs_vars }}/{{ orgs }}/env/common/controller_groups.d/" + required: false + description: Directory path to load controller object variables + filetree_controller_templates: + type: raw + default: "{{ dir_orgs_vars }}/{{ orgs }}/env/common/controller_job_templates.d/" + required: false + description: Directory path to load controller object variables + filetree_controller_workflow_job_templates: + type: raw + default: "{{ dir_orgs_vars }}/{{ orgs }}/env/common/controller_workflow_job_templates.d/" + required: false + description: Directory path to load controller object variables + filetree_controller_schedules: + type: raw + default: "{{ dir_orgs_vars }}/{{ orgs }}/env/common/controller_schedules.d/" + required: false + description: Directory path to load controller object variables + filetree_controller_roles: + type: raw + default: "{{ dir_orgs_vars }}/{{ orgs }}/env/common/controller_roles.d/" + required: false + description: Directory path to load controller object variables + + # Async variables + controller_configuration_async_retries: + default: 30 + required: false + description: This variable sets number of retries across all roles as a default. + controller_configuration_async_delay: + default: 1 + required: false + description: This variable sets delay between retries across all roles as a default. + + + # No_log variables + controller_configuration_filetree_create_secure_logging: + default: "{{ controller_configuration_secure_logging | default(false) }}" + required: false + type: bool + description: Whether or not to include the sensitive tasks from this role in the log. Set this value to `true` if you will be providing your sensitive values from elsewhere. + controller_configuration_secure_logging: + default: false + required: false + type: bool + description: This variable enables secure logging across all roles as a default. + + # Generic across all roles + controller_state: + default: present + required: false + description: The state all objects will take unless overridden by object default + type: str + controller_hostname: + default: None + required: false + description: URL to the Ansible Controller Server. + type: str + controller_validate_certs: + default: true + required: false + description: Whether or not to validate the Ansible Controller Server's SSL certificate. + type: str + controller_username: + default: None + required: false + description: Admin User on the Ansible Controller Server. Either username / password or oauthtoken need to be specified. + type: str + controller_password: + default: None + required: false + description: Controller Admin User's password on the Ansible Controller Server. This should be stored in an Ansible Vault at vars/controller-secrets.yml or elsewhere and called from a parent playbook. Either username / password or oauthtoken need to be specified. + type: str + controller_oauthtoken: + default: None + required: false + description: Controller Admin User's token on the Ansible Controller Server. This should be stored in an Ansible Vault at or elsewhere and called from a parent playbook. Either username / password or oauthtoken need to be specified. + type: str +... diff --git a/roles/groups/meta/argument_specs.yml b/roles/groups/meta/argument_specs.yml index 37a185fbd..8b0b2a0a9 100644 --- a/roles/groups/meta/argument_specs.yml +++ b/roles/groups/meta/argument_specs.yml @@ -78,7 +78,7 @@ argument_specs: default: "{{ controller_configuration_secure_logging | default(false) }}" required: false type: bool - description: Whether or falset to include the sensitive tasks from this role in the log. Set this value to `true` if you will be providing your sensitive values from elsewhere. + description: Whether or not to include the sensitive tasks from this role in the log. Set this value to `true` if you will be providing your sensitive values from elsewhere. controller_configuration_secure_logging: default: false required: false @@ -99,7 +99,7 @@ argument_specs: controller_validate_certs: default: true required: false - description: Whether or falset to validate the Ansible Controller Server's SSL certificate. + description: Whether or not to validate the Ansible Controller Server's SSL certificate. type: str controller_username: default: None diff --git a/roles/hosts/meta/argument_specs.yml b/roles/hosts/meta/argument_specs.yml index 2dcb0f6a4..234dba67d 100644 --- a/roles/hosts/meta/argument_specs.yml +++ b/roles/hosts/meta/argument_specs.yml @@ -63,7 +63,7 @@ argument_specs: default: "{{ controller_configuration_secure_logging | default(false) }}" required: false type: bool - description: Whether or falset to include the sensitive tasks from this role in the log. Set this value to `true` if you will be providing your sensitive values from elsewhere. + description: Whether or not to include the sensitive tasks from this role in the log. Set this value to `true` if you will be providing your sensitive values from elsewhere. controller_configuration_secure_logging: default: false required: false @@ -84,7 +84,7 @@ argument_specs: controller_validate_certs: default: true required: false - description: Whether or falset to validate the Ansible Controller Server's SSL certificate. + description: Whether or not to validate the Ansible Controller Server's SSL certificate. type: str controller_username: default: None diff --git a/roles/instance_groups/meta/argument_specs.yml b/roles/instance_groups/meta/argument_specs.yml index 062f1892e..a1a52dfc0 100644 --- a/roles/instance_groups/meta/argument_specs.yml +++ b/roles/instance_groups/meta/argument_specs.yml @@ -87,7 +87,7 @@ argument_specs: default: "{{ controller_configuration_secure_logging | default(false) }}" required: false type: bool - description: Whether or falset to include the sensitive tasks from this role in the log. Set this value to `true` if you will be providing your sensitive values from elsewhere. + description: Whether or not to include the sensitive tasks from this role in the log. Set this value to `true` if you will be providing your sensitive values from elsewhere. controller_configuration_secure_logging: default: false required: false @@ -108,7 +108,7 @@ argument_specs: controller_validate_certs: default: true required: false - description: Whether or falset to validate the Ansible Controller Server's SSL certificate. + description: Whether or not to validate the Ansible Controller Server's SSL certificate. type: str controller_username: default: None diff --git a/roles/instances/meta/argument_specs.yml b/roles/instances/meta/argument_specs.yml index 0eb4c528c..a68f53934 100644 --- a/roles/instances/meta/argument_specs.yml +++ b/roles/instances/meta/argument_specs.yml @@ -63,7 +63,7 @@ argument_specs: default: "{{ controller_configuration_secure_logging | default(false) }}" required: false type: bool - description: Whether or falset to include the sensitive tasks from this role in the log. Set this value to `true` if you will be providing your sensitive values from elsewhere. + description: Whether or not to include the sensitive tasks from this role in the log. Set this value to `true` if you will be providing your sensitive values from elsewhere. controller_configuration_secure_logging: default: false required: false @@ -84,7 +84,7 @@ argument_specs: controller_validate_certs: default: true required: false - description: Whether or falset to validate the Ansible Controller Server's SSL certificate. + description: Whether or not to validate the Ansible Controller Server's SSL certificate. type: str controller_username: default: None diff --git a/roles/inventories/meta/argument_specs.yml b/roles/inventories/meta/argument_specs.yml index 7cc68334e..72446a2e9 100644 --- a/roles/inventories/meta/argument_specs.yml +++ b/roles/inventories/meta/argument_specs.yml @@ -81,7 +81,7 @@ argument_specs: default: "{{ controller_configuration_secure_logging | default(false) }}" required: false type: bool - description: Whether or falset to include the sensitive tasks from this role in the log. Set this value to `true` if you will be providing your sensitive values from elsewhere. + description: Whether or not to include the sensitive tasks from this role in the log. Set this value to `true` if you will be providing your sensitive values from elsewhere. controller_configuration_secure_logging: default: false required: false @@ -102,7 +102,7 @@ argument_specs: controller_validate_certs: default: true required: false - description: Whether or falset to validate the Ansible Controller Server's SSL certificate. + description: Whether or not to validate the Ansible Controller Server's SSL certificate. type: str controller_username: default: None diff --git a/roles/inventory_source_update/meta/argument_specs.yml b/roles/inventory_source_update/meta/argument_specs.yml index dd3d155cf..dd07fada4 100644 --- a/roles/inventory_source_update/meta/argument_specs.yml +++ b/roles/inventory_source_update/meta/argument_specs.yml @@ -157,7 +157,7 @@ argument_specs: default: "{{ controller_configuration_secure_logging | default(false) }}" required: false type: bool - description: Whether or falset to include the sensitive tasks from this role in the log. Set this value to `true` if you will be providing your sensitive values from elsewhere. + description: Whether or not to include the sensitive tasks from this role in the log. Set this value to `true` if you will be providing your sensitive values from elsewhere. controller_configuration_secure_logging: default: false required: false @@ -178,7 +178,7 @@ argument_specs: controller_validate_certs: default: true required: false - description: Whether or falset to validate the Ansible Controller Server's SSL certificate. + description: Whether or not to validate the Ansible Controller Server's SSL certificate. type: str controller_username: default: None diff --git a/roles/inventory_sources/meta/argument_specs.yml b/roles/inventory_sources/meta/argument_specs.yml index 802bff920..8d584c5e7 100644 --- a/roles/inventory_sources/meta/argument_specs.yml +++ b/roles/inventory_sources/meta/argument_specs.yml @@ -157,7 +157,7 @@ argument_specs: default: "{{ controller_configuration_secure_logging | default(false) }}" required: false type: bool - description: Whether or falset to include the sensitive tasks from this role in the log. Set this value to `true` if you will be providing your sensitive values from elsewhere. + description: Whether or not to include the sensitive tasks from this role in the log. Set this value to `true` if you will be providing your sensitive values from elsewhere. controller_configuration_secure_logging: default: false required: false @@ -178,7 +178,7 @@ argument_specs: controller_validate_certs: default: true required: false - description: Whether or falset to validate the Ansible Controller Server's SSL certificate. + description: Whether or not to validate the Ansible Controller Server's SSL certificate. type: str controller_username: default: None diff --git a/roles/job_launch/meta/argument_specs.yml b/roles/job_launch/meta/argument_specs.yml index 895287998..182c528a5 100644 --- a/roles/job_launch/meta/argument_specs.yml +++ b/roles/job_launch/meta/argument_specs.yml @@ -106,7 +106,7 @@ argument_specs: default: "{{ controller_configuration_secure_logging | default(false) }}" required: false type: bool - description: Whether or falset to include the sensitive tasks from this role in the log. Set this value to `true` if you will be providing your sensitive values from elsewhere. + description: Whether or not to include the sensitive tasks from this role in the log. Set this value to `true` if you will be providing your sensitive values from elsewhere. controller_configuration_secure_logging: default: false required: false @@ -127,7 +127,7 @@ argument_specs: controller_validate_certs: default: true required: false - description: Whether or falset to validate the Ansible Controller Server's SSL certificate. + description: Whether or not to validate the Ansible Controller Server's SSL certificate. type: str controller_username: default: None diff --git a/roles/job_templates/meta/argument_specs.yml b/roles/job_templates/meta/argument_specs.yml index 45f658a24..d28f7b6fe 100644 --- a/roles/job_templates/meta/argument_specs.yml +++ b/roles/job_templates/meta/argument_specs.yml @@ -272,7 +272,7 @@ argument_specs: default: "{{ controller_configuration_secure_logging | default(false) }}" required: false type: bool - description: Whether or falset to include the sensitive tasks from this role in the log. Set this value to `true` if you will be providing your sensitive values from elsewhere. + description: Whether or not to include the sensitive tasks from this role in the log. Set this value to `true` if you will be providing your sensitive values from elsewhere. controller_configuration_secure_logging: default: false required: false @@ -293,7 +293,7 @@ argument_specs: controller_validate_certs: default: true required: false - description: Whether or falset to validate the Ansible Controller Server's SSL certificate. + description: Whether or not to validate the Ansible Controller Server's SSL certificate. type: str controller_username: default: None diff --git a/roles/labels/meta/argument_specs.yml b/roles/labels/meta/argument_specs.yml index b037b0d77..16b7033e3 100644 --- a/roles/labels/meta/argument_specs.yml +++ b/roles/labels/meta/argument_specs.yml @@ -50,7 +50,7 @@ argument_specs: default: "{{ controller_configuration_secure_logging | default(false) }}" required: false type: bool - description: Whether or falset to include the sensitive tasks from this role in the log. Set this value to `true` if you will be providing your sensitive values from elsewhere. + description: Whether or not to include the sensitive tasks from this role in the log. Set this value to `true` if you will be providing your sensitive values from elsewhere. controller_configuration_secure_logging: default: false required: false @@ -71,7 +71,7 @@ argument_specs: controller_validate_certs: default: true required: false - description: Whether or falset to validate the Ansible Controller Server's SSL certificate. + description: Whether or not to validate the Ansible Controller Server's SSL certificate. type: str controller_username: default: None diff --git a/roles/license/meta/argument_specs.yml b/roles/license/meta/argument_specs.yml index a4c23357e..f0851624b 100644 --- a/roles/license/meta/argument_specs.yml +++ b/roles/license/meta/argument_specs.yml @@ -52,7 +52,7 @@ argument_specs: default: "{{ controller_configuration_secure_logging | default(false) }}" required: false type: bool - description: Whether or falset to include the sensitive tasks from this role in the log. Set this value to `true` if you will be providing your sensitive values from elsewhere. + description: Whether or not to include the sensitive tasks from this role in the log. Set this value to `true` if you will be providing your sensitive values from elsewhere. controller_configuration_secure_logging: default: false required: false @@ -73,7 +73,7 @@ argument_specs: controller_validate_certs: default: true required: false - description: Whether or falset to validate the Ansible Controller Server's SSL certificate. + description: Whether or not to validate the Ansible Controller Server's SSL certificate. type: str controller_username: default: None diff --git a/roles/notification_templates/meta/argument_specs.yml b/roles/notification_templates/meta/argument_specs.yml index 51cfe66de..9950fc4db 100644 --- a/roles/notification_templates/meta/argument_specs.yml +++ b/roles/notification_templates/meta/argument_specs.yml @@ -70,7 +70,7 @@ argument_specs: default: "{{ controller_configuration_secure_logging | default(false) }}" required: false type: bool - description: Whether or falset to include the sensitive tasks from this role in the log. Set this value to `true` if you will be providing your sensitive values from elsewhere. + description: Whether or not to include the sensitive tasks from this role in the log. Set this value to `true` if you will be providing your sensitive values from elsewhere. controller_configuration_secure_logging: default: false required: false @@ -91,7 +91,7 @@ argument_specs: controller_validate_certs: default: true required: false - description: Whether or falset to validate the Ansible Controller Server's SSL certificate. + description: Whether or not to validate the Ansible Controller Server's SSL certificate. type: str controller_username: default: None diff --git a/roles/object_diff/meta/argument_specs.yml b/roles/object_diff/meta/argument_specs.yml new file mode 100644 index 000000000..6cdad4780 --- /dev/null +++ b/roles/object_diff/meta/argument_specs.yml @@ -0,0 +1,75 @@ +--- +argument_specs: + main: + short_description: An Ansible Role to read from a local file tree and create objects in Controller + options: + drop_user_external_accounts: + default: false + required: false + type: bool + description: When is true, all users will be taken to compare with SCM configuration as code + query_controller_api_max_objects: + default: 10000 + required: false + type: int + description: Sets the maximum number of objects to be returned from the API + protect_not_empty_orgs: + required: false + type: bool + description: When is true, orgs which are not empty, will not be removed + + # Async variables + controller_configuration_async_retries: + default: 30 + required: false + description: This variable sets number of retries across all roles as a default. + controller_configuration_async_delay: + default: 1 + required: false + description: This variable sets delay between retries across all roles as a default. + + + # No_log variables + controller_configuration_filetree_create_secure_logging: + default: "{{ controller_configuration_secure_logging | default(false) }}" + required: false + type: bool + description: Whether or not to include the sensitive tasks from this role in the log. Set this value to `true` if you will be providing your sensitive values from elsewhere. + controller_configuration_secure_logging: + default: false + required: false + type: bool + description: This variable enables secure logging across all roles as a default. + + # Generic across all roles + controller_state: + default: present + required: false + description: The state all objects will take unless overridden by object default + type: str + controller_hostname: + default: None + required: false + description: URL to the Ansible Controller Server. + type: str + controller_validate_certs: + default: true + required: false + description: Whether or not to validate the Ansible Controller Server's SSL certificate. + type: str + controller_username: + default: None + required: false + description: Admin User on the Ansible Controller Server. Either username / password or oauthtoken need to be specified. + type: str + controller_password: + default: None + required: false + description: Controller Admin User's password on the Ansible Controller Server. This should be stored in an Ansible Vault at vars/controller-secrets.yml or elsewhere and called from a parent playbook. Either username / password or oauthtoken need to be specified. + type: str + controller_oauthtoken: + default: None + required: false + description: Controller Admin User's token on the Ansible Controller Server. This should be stored in an Ansible Vault at or elsewhere and called from a parent playbook. Either username / password or oauthtoken need to be specified. + type: str +... diff --git a/roles/organizations/meta/argument_specs.yml b/roles/organizations/meta/argument_specs.yml index 8b610229b..c3e91de82 100644 --- a/roles/organizations/meta/argument_specs.yml +++ b/roles/organizations/meta/argument_specs.yml @@ -98,7 +98,7 @@ argument_specs: default: "{{ controller_configuration_secure_logging | default(false) }}" required: false type: bool - description: Whether or falset to include the sensitive tasks from this role in the log. Set this value to `true` if you will be providing your sensitive values from elsewhere. + description: Whether or not to include the sensitive tasks from this role in the log. Set this value to `true` if you will be providing your sensitive values from elsewhere. controller_configuration_secure_logging: default: false required: false @@ -119,7 +119,7 @@ argument_specs: controller_validate_certs: default: true required: false - description: Whether or falset to validate the Ansible Controller Server's SSL certificate. + description: Whether or not to validate the Ansible Controller Server's SSL certificate. type: str controller_username: default: None diff --git a/roles/project_update/meta/argument_specs.yml b/roles/project_update/meta/argument_specs.yml index d036234d6..cf2a6ad90 100644 --- a/roles/project_update/meta/argument_specs.yml +++ b/roles/project_update/meta/argument_specs.yml @@ -145,7 +145,7 @@ argument_specs: default: "{{ controller_configuration_secure_logging | default(false) }}" required: false type: bool - description: Whether or falset to include the sensitive tasks from this role in the log. Set this value to `true` if you will be providing your sensitive values from elsewhere. + description: Whether or not to include the sensitive tasks from this role in the log. Set this value to `true` if you will be providing your sensitive values from elsewhere. controller_configuration_secure_logging: default: false required: false @@ -166,7 +166,7 @@ argument_specs: controller_validate_certs: default: true required: false - description: Whether or falset to validate the Ansible Controller Server's SSL certificate. + description: Whether or not to validate the Ansible Controller Server's SSL certificate. type: str controller_username: default: None diff --git a/roles/projects/meta/argument_specs.yml b/roles/projects/meta/argument_specs.yml index fd94030d4..67ec7bec2 100644 --- a/roles/projects/meta/argument_specs.yml +++ b/roles/projects/meta/argument_specs.yml @@ -154,7 +154,7 @@ argument_specs: default: "{{ controller_configuration_secure_logging | default(false) }}" required: false type: bool - description: Whether or falset to include the sensitive tasks from this role in the log. Set this value to `true` if you will be providing your sensitive values from elsewhere. + description: Whether or not to include the sensitive tasks from this role in the log. Set this value to `true` if you will be providing your sensitive values from elsewhere. controller_configuration_secure_logging: default: false required: false @@ -175,7 +175,7 @@ argument_specs: controller_validate_certs: default: true required: false - description: Whether or falset to validate the Ansible Controller Server's SSL certificate. + description: Whether or not to validate the Ansible Controller Server's SSL certificate. type: str controller_username: default: None diff --git a/roles/roles/meta/argument_specs.yml b/roles/roles/meta/argument_specs.yml index df4209f5d..62edc84c6 100644 --- a/roles/roles/meta/argument_specs.yml +++ b/roles/roles/meta/argument_specs.yml @@ -117,7 +117,7 @@ argument_specs: default: "{{ controller_configuration_secure_logging | default(false) }}" required: false type: bool - description: Whether or falset to include the sensitive tasks from this role in the log. Set this value to `true` if you will be providing your sensitive values from elsewhere. + description: Whether or not to include the sensitive tasks from this role in the log. Set this value to `true` if you will be providing your sensitive values from elsewhere. controller_configuration_secure_logging: default: false required: false @@ -138,7 +138,7 @@ argument_specs: controller_validate_certs: default: true required: false - description: Whether or falset to validate the Ansible Controller Server's SSL certificate. + description: Whether or not to validate the Ansible Controller Server's SSL certificate. type: str controller_username: default: None diff --git a/roles/schedules/meta/argument_specs.yml b/roles/schedules/meta/argument_specs.yml index bfaa049b7..39131cb00 100644 --- a/roles/schedules/meta/argument_specs.yml +++ b/roles/schedules/meta/argument_specs.yml @@ -139,7 +139,7 @@ argument_specs: default: "{{ controller_configuration_secure_logging | default(false) }}" required: false type: bool - description: Whether or falset to include the sensitive tasks from this role in the log. Set this value to `true` if you will be providing your sensitive values from elsewhere. + description: Whether or not to include the sensitive tasks from this role in the log. Set this value to `true` if you will be providing your sensitive values from elsewhere. controller_configuration_secure_logging: default: false required: false @@ -160,7 +160,7 @@ argument_specs: controller_validate_certs: default: true required: false - description: Whether or falset to validate the Ansible Controller Server's SSL certificate. + description: Whether or not to validate the Ansible Controller Server's SSL certificate. type: str controller_username: default: None diff --git a/roles/settings/meta/argument_specs.yml b/roles/settings/meta/argument_specs.yml index 7435b956b..d0a7738af 100644 --- a/roles/settings/meta/argument_specs.yml +++ b/roles/settings/meta/argument_specs.yml @@ -45,7 +45,7 @@ argument_specs: default: "{{ controller_configuration_secure_logging | default(false) }}" required: false type: bool - description: Whether or falset to include the sensitive tasks from this role in the log. Set this value to `true` if you will be providing your sensitive values from elsewhere. + description: Whether or not to include the sensitive tasks from this role in the log. Set this value to `true` if you will be providing your sensitive values from elsewhere. controller_configuration_secure_logging: default: false required: false @@ -66,7 +66,7 @@ argument_specs: controller_validate_certs: default: true required: false - description: Whether or falset to validate the Ansible Controller Server's SSL certificate. + description: Whether or not to validate the Ansible Controller Server's SSL certificate. type: str controller_username: default: None diff --git a/roles/teams/meta/argument_specs.yml b/roles/teams/meta/argument_specs.yml index 514e6e0ea..8758eb7ce 100644 --- a/roles/teams/meta/argument_specs.yml +++ b/roles/teams/meta/argument_specs.yml @@ -54,7 +54,7 @@ argument_specs: default: "{{ controller_configuration_secure_logging | default(false) }}" required: false type: bool - description: Whether or falset to include the sensitive tasks from this role in the log. Set this value to `true` if you will be providing your sensitive values from elsewhere. + description: Whether or not to include the sensitive tasks from this role in the log. Set this value to `true` if you will be providing your sensitive values from elsewhere. controller_configuration_secure_logging: default: false required: false @@ -75,7 +75,7 @@ argument_specs: controller_validate_certs: default: true required: false - description: Whether or falset to validate the Ansible Controller Server's SSL certificate. + description: Whether or not to validate the Ansible Controller Server's SSL certificate. type: str controller_username: default: None diff --git a/roles/users/meta/argument_specs.yml b/roles/users/meta/argument_specs.yml index 21f35615a..8ca2d3cf5 100644 --- a/roles/users/meta/argument_specs.yml +++ b/roles/users/meta/argument_specs.yml @@ -83,7 +83,7 @@ argument_specs: default: "{{ controller_configuration_secure_logging | default(true) }}" required: false type: bool - description: Whether or falset to include the sensitive tasks from this role in the log. Set this value to `true` if you will be providing your sensitive values from elsewhere. + description: Whether or not to include the sensitive tasks from this role in the log. Set this value to `true` if you will be providing your sensitive values from elsewhere. controller_configuration_secure_logging: default: true required: false @@ -104,7 +104,7 @@ argument_specs: controller_validate_certs: default: true required: false - description: Whether or falset to validate the Ansible Controller Server's SSL certificate. + description: Whether or not to validate the Ansible Controller Server's SSL certificate. type: str controller_username: default: None diff --git a/roles/workflow_job_templates/meta/argument_specs.yml b/roles/workflow_job_templates/meta/argument_specs.yml index 9c3980d8f..f302d9ea6 100644 --- a/roles/workflow_job_templates/meta/argument_specs.yml +++ b/roles/workflow_job_templates/meta/argument_specs.yml @@ -300,7 +300,7 @@ argument_specs: default: "{{ controller_configuration_secure_logging | default(false) }}" required: false type: bool - description: Whether or falset to include the sensitive tasks from this role in the log. Set this value to `true` if you will be providing your sensitive values from elsewhere. + description: Whether or not to include the sensitive tasks from this role in the log. Set this value to `true` if you will be providing your sensitive values from elsewhere. controller_configuration_secure_logging: default: false required: false @@ -321,7 +321,7 @@ argument_specs: controller_validate_certs: default: true required: false - description: Whether or falset to validate the Ansible Controller Server's SSL certificate. + description: Whether or not to validate the Ansible Controller Server's SSL certificate. type: str controller_username: default: None diff --git a/roles/workflow_launch/meta/argument_specs.yml b/roles/workflow_launch/meta/argument_specs.yml index e0a164543..7c0444990 100644 --- a/roles/workflow_launch/meta/argument_specs.yml +++ b/roles/workflow_launch/meta/argument_specs.yml @@ -69,7 +69,7 @@ argument_specs: default: "{{ controller_configuration_secure_logging | default(false) }}" required: false type: bool - description: Whether or falset to include the sensitive tasks from this role in the log. Set this value to `true` if you will be providing your sensitive values from elsewhere. + description: Whether or not to include the sensitive tasks from this role in the log. Set this value to `true` if you will be providing your sensitive values from elsewhere. controller_configuration_secure_logging: default: false required: false @@ -90,7 +90,7 @@ argument_specs: controller_validate_certs: default: true required: false - description: Whether or falset to validate the Ansible Controller Server's SSL certificate. + description: Whether or not to validate the Ansible Controller Server's SSL certificate. type: str controller_username: default: None