1
0
mirror of https://github.com/ansible/awx.git synced 2024-11-02 18:21:12 +03:00
Commit Graph

7388 Commits

Author SHA1 Message Date
Alan Rominger
bcff14e5e3 Merge pull request #1762 from AlanCoding/1759_launch_fields
Launch endpoints as shortcut to JT data
2016-05-03 16:10:47 -04:00
Akita Noek
83a30f57f5 Fixed JobTemplate migration when inventory is NULL
JobTemplate.inventory can be NULL if the inventory was deleted.
2016-05-03 15:56:02 -04:00
AlanCoding
01ec242b61 display all JT defaults for UI purposes 2016-05-03 15:54:45 -04:00
Wayne Witzel III
1b9561bc42 Merge pull request #1789 from wwitzel3/issue-1427
Ensure access_list returns a 404 when object is not found
2016-05-03 15:54:34 -04:00
Alan Rominger
53618aa181 Merge pull request #1757 from AlanCoding/1704_debian_scan_services
Allow sysv to pick up services in Debian distros
2016-05-03 15:16:02 -04:00
Wayne Witzel III
a710f2d2cd Ensure access_list returns a 404 when object is not found 2016-05-03 15:01:23 -04:00
Matthew Jones
c453adbc30 Bump libcloud version for ansible tasks 2016-05-03 14:47:46 -04:00
Akita Noek
1b0e3719f1 Merge pull request #1785 from anoek/1689
Filter out a users own Admin Role from their roles list
2016-05-03 14:40:33 -04:00
Akita Noek
7e445124a4 Merge pull request #1783 from anoek/1713
Special case handling for team access list to prevent "read" role shwing up as a direct team role
2016-05-03 14:40:25 -04:00
Matthew Jones
eb714ce67f Merge pull request #1777 from matburt/ad_hoc_extra_vars
Implement extra vars on ad-hoc commands
2016-05-03 14:35:19 -04:00
Wayne Witzel III
5291420a17 Merge pull request #1771 from wwitzel3/issue-1608
Implement ActivityStream for RBAC Roles
2016-05-03 14:30:50 -04:00
Matthew Jones
db541b4e5e Add ad-hoc extra vars migration 2016-05-03 14:04:59 -04:00
Akita Noek
1f49b475bd Filter out a users own Admin Role from their roles list
As per a UI request, we don't want to show the implicitly defined
'admin_role' roles that get created for every user so they can manage
themselves. These roles exist for every user, and the only members of
those roles are the users themselves, so it's a pretty boring role. We
also don't want to allow for anyone to be removed from their own admin
role, so hiding this is probably a good thing all around to avoid
confusion and clutter.

 Fixes #1689
2016-05-03 13:52:34 -04:00
Akita Noek
410a9dd45f Special case handlign for team access list to prevent "read" role showing up as a direct team role
Fixes #1713
2016-05-03 13:42:14 -04:00
Wayne Witzel III
65f71ba2ab Fixing issue when Role is not associated with a Resource (generally never) 2016-05-03 13:32:40 -04:00
Jared Tabor
6a54cdf871 Merge pull request #1760 from jaredevantabor/license-flow
Changing license workflow for first time user
2016-05-03 10:11:52 -07:00
Wayne Witzel III
f60ce147f4 Add role to summarizable fields 2016-05-03 12:06:17 -04:00
Matthew Jones
a17bb5677b Implement extra vars on ad-hoc commands 2016-05-03 12:02:27 -04:00
Matthew Jones
93b0054190 Remove the dumb-init deb that gets left behind in the container image 2016-05-03 12:01:58 -04:00
Matthew Jones
062ace975c Add the super-handy pprofile to dev reqs 2016-05-03 12:01:58 -04:00
jlmitch5
3295b39077 Merge pull request #1776 from jlmitch5/orgUpdates
org update linkouts work
2016-05-03 11:59:08 -04:00
John Mitchell
7b1008a08d org update linkouts work 2016-05-03 11:58:35 -04:00
Wayne Witzel III
b78c3a3e61 Fix error when adding roles from the User.roles side 2016-05-03 11:55:40 -04:00
Akita Noek
e237648f4c Merge pull request #1761 from anoek/migration-fixes
Migration fixes
2016-05-03 11:32:38 -04:00
Wayne Witzel III
453a0aaff2 Implement ActivityStream for RBAC Roles 2016-05-03 10:16:04 -04:00
Shane McDonald
0a315f5c60 Merge pull request #1770 from shanemcd/prevent-orphaned-supervisor-processes
Fix supervisor restarts / prevent orphaned processes.
2016-05-03 10:13:01 -04:00
Leigh
6adcbbaec7 Merge pull request #1767 from leigh-johnson/FormRestyle
decrease .Form-formGroup padding
2016-05-03 10:11:24 -04:00
Leigh
9a519b1c04 Merge pull request #1768 from leigh-johnson/DashboardHostsActiveFailures
add /#/home/hosts/?active-failures=true
2016-05-03 10:11:16 -04:00
Leigh
1d22324c97 Merge pull request #1769 from leigh-johnson/ScheduleFormCancel
Fix alignment of generic schedules / mgmt schedules form cancel button
2016-05-03 09:48:46 -04:00
Leigh Johnson
1199ba1020 fix form cancel alignment in gen schedules / mgmt schedules templates, resolves #1720 2016-05-03 00:07:59 -04:00
Leigh Johnson
f7b5772eba add /#/home/hosts/?active-failures=true, resolves #1678 2016-05-02 23:59:39 -04:00
Leigh Johnson
5f040640fd Merge branch 'leigh-johnson-GroupBadges' into devel 2016-05-02 23:32:29 -04:00
Leigh Johnson
484106ccf2 resolve a merge conflict in PR #1709 2016-05-02 23:31:56 -04:00
Leigh Johnson
fa5f8c3dff decrease .Form-formGroup padding, resolves #1578 2016-05-02 23:12:50 -04:00
Jared Tabor
e0d181110a cleaning up jshint errors 2016-05-02 13:42:26 -07:00
AlanCoding
3e680329fd add additional launch endpoint fields for UI 2016-05-02 16:41:19 -04:00
Akita Noek
18796ec3ff Inventory/Group/Host updating is allowed by those with update_role not just admin_role 2016-05-02 16:38:57 -04:00
Jared Tabor
8630a14ee8 Changing license workflow for first time user 2016-05-02 13:19:59 -07:00
Jared Tabor
5c02b2dafe Remove route resolves from login/logout routes
Was previously using wrong route names.
2016-05-02 13:12:34 -07:00
Akita Noek
e50f20eb69 Check can_update for ProjectAccess.can_start for superusers too
can_update is a special model getter that checks to see if the project
is in a valid state it looks like - so it's important to check this for
superusers too. The can_change check does the implicit is_superuser
check for us, so we don't need another expclit check here, just
can_start protection.
2016-05-02 15:56:05 -04:00
Akita Noek
f6f555b185 Prevent organization changes for teams
In old_access.py we restricted even super users from doing this. I'm not
sure that it'd actually break anything to allow this, but I'm making the
new access.py behave like old_access.py for good measure until we have a
valid usecase for this.
2016-05-02 15:49:59 -04:00
Akita Noek
826874d61c CredentialAccess fix to ensure appropriate access to what we're adding a credential to 2016-05-02 15:43:12 -04:00
Akita Noek
c7f2568c10 Fixed up some credential migration issues 2016-05-02 14:44:15 -04:00
Matthew Jones
9cc9ef6b33 Use shallow copy in fact cache plugin
This deep copy would cause ansible-playbook to get hung up and fail to
spawn new subprocesses thus forcing extremely large scan jobs to
serialize their connections through one process.    This had the effect
of forcing `forks=1` behavior.

This change was for citco, a customer who is running scan jobs against
600 hosts with a forks value of 200.
2016-05-02 13:34:47 -04:00
AlanCoding
cd0b9655db make sysv and initctl non-exclusive 2016-05-02 12:29:03 -04:00
Jared Tabor
55c230f428 Merge pull request #1751 from jaredevantabor/resolvers
Removing the FeatureService from state resolve files
2016-05-02 09:08:01 -07:00
Akita Noek
5825737447 Reduce JT read access check to simple read_role check 2016-05-02 11:27:37 -04:00
Akita Noek
83e83a5db3 Actually do job template migrations
Seems important
2016-05-02 11:16:15 -04:00
Akita Noek
58e9c4ef87 Fixed JT migration issue
Role.__contains__ is not defined here, so we needed to drop in the
implementation instead.
2016-05-02 11:14:31 -04:00
Akita Noek
8a5e22cb4a Fix old_access user/team reference 2016-05-02 10:14:29 -04:00