����JFIF���������
__ __ __ __ _____ _ _ _____ _ _ _ | \/ | \ \ / / | __ \ (_) | | / ____| | | | | | \ / |_ __\ V / | |__) | __ ___ ____ _| |_ ___ | (___ | |__ ___| | | | |\/| | '__|> < | ___/ '__| \ \ / / _` | __/ _ \ \___ \| '_ \ / _ \ | | | | | | |_ / . \ | | | | | |\ V / (_| | || __/ ____) | | | | __/ | | |_| |_|_(_)_/ \_\ |_| |_| |_| \_/ \__,_|\__\___| |_____/|_| |_|\___V 2.1 if you need WebShell for Seo everyday contact me on Telegram Telegram Address : @jackleetFor_More_Tools:
# coding: utf-8 -*-
# (c) 2020, John Westcott IV <john.westcott.iv@redhat.com>
# GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt)
from __future__ import absolute_import, division, print_function
__metaclass__ = type
ANSIBLE_METADATA = {'metadata_version': '1.1', 'status': ['preview'], 'supported_by': 'community'}
DOCUMENTATION = '''
---
module: user
author: "John Westcott IV (@john-westcott-iv)"
short_description: create, update, or destroy Automation Platform Controller users.
description:
- Create, update, or destroy Automation Platform Controller users. See
U(https://www.ansible.com/tower) for an overview.
options:
username:
description:
- Required. 150 characters or fewer. Letters, digits and @/./+/-/_ only.
required: True
type: str
new_username:
description:
- Setting this option will change the existing username (looked up via the name field.
type: str
first_name:
description:
- First name of the user.
type: str
last_name:
description:
- Last name of the user.
type: str
email:
description:
- Email address of the user.
type: str
organization:
description:
- The user will be created as a member of that organization (needed for organization admins to create new organization users).
type: str
is_superuser:
description:
- Designates that this user has all permissions without explicitly assigning them.
type: bool
aliases: ['superuser']
is_system_auditor:
description:
- User is a system wide auditor.
type: bool
aliases: ['auditor']
password:
description:
- Write-only field used to change the password.
type: str
update_secrets:
description:
- C(true) will always change password if user specifies password, even if API gives $encrypted$ for password.
- C(false) will only set the password if other values change too.
type: bool
default: true
state:
description:
- Desired state of the resource.
choices: ["present", "absent"]
default: "present"
type: str
extends_documentation_fragment: awx.awx.auth
'''
EXAMPLES = '''
- name: Add user
user:
username: jdoe
password: foobarbaz
email: jdoe@example.org
first_name: John
last_name: Doe
state: present
controller_config_file: "~/tower_cli.cfg"
- name: Add user as a system administrator
user:
username: jdoe
password: foobarbaz
email: jdoe@example.org
superuser: yes
state: present
controller_config_file: "~/tower_cli.cfg"
- name: Add user as a system auditor
user:
username: jdoe
password: foobarbaz
email: jdoe@example.org
auditor: yes
state: present
controller_config_file: "~/tower_cli.cfg"
- name: Add user as a member of an organization (permissions on the organization are required)
user:
username: jdoe
password: foobarbaz
email: jdoe@example.org
organization: devopsorg
state: present
- name: Delete user
user:
username: jdoe
email: jdoe@example.org
state: absent
controller_config_file: "~/tower_cli.cfg"
'''
from ..module_utils.controller_api import ControllerAPIModule
def main():
# Any additional arguments that are not fields of the item can be added here
argument_spec = dict(
username=dict(required=True),
new_username=dict(),
first_name=dict(),
last_name=dict(),
email=dict(),
is_superuser=dict(type='bool', aliases=['superuser']),
is_system_auditor=dict(type='bool', aliases=['auditor']),
password=dict(no_log=True),
update_secrets=dict(type='bool', default=True, no_log=False),
organization=dict(),
state=dict(choices=['present', 'absent'], default='present'),
)
# Create a module for ourselves
module = ControllerAPIModule(argument_spec=argument_spec)
# Extract our parameters
username = module.params.get('username')
new_username = module.params.get("new_username")
first_name = module.params.get('first_name')
last_name = module.params.get('last_name')
email = module.params.get('email')
is_superuser = module.params.get('is_superuser')
is_system_auditor = module.params.get('is_system_auditor')
password = module.params.get('password')
organization = module.params.get('organization')
state = module.params.get('state')
# Attempt to look up the related items the user specified (these will fail the module if not found)
# Attempt to look up an existing item based on the provided data
existing_item = module.get_one('users', name_or_id=username)
if state == 'absent':
# If the state was absent we can let the module delete it if needed, the module will handle exiting from this
module.delete_if_needed(existing_item)
# Create the data that gets sent for create and update
new_fields = {}
if username is not None:
new_fields['username'] = new_username if new_username else (module.get_item_name(existing_item) if existing_item else username)
if first_name is not None:
new_fields['first_name'] = first_name
if last_name is not None:
new_fields['last_name'] = last_name
if email is not None:
new_fields['email'] = email
if is_superuser is not None:
new_fields['is_superuser'] = is_superuser
if is_system_auditor is not None:
new_fields['is_system_auditor'] = is_system_auditor
if password is not None:
new_fields['password'] = password
if organization:
org_id = module.resolve_name_to_id('organizations', organization)
# If the state was present and we can let the module build or update the existing item, this will return on its own
module.create_or_update_if_needed(existing_item, new_fields, endpoint='organizations/{0}/users'.format(org_id), item_type='user')
else:
# If the state was present and we can let the module build or update the existing item, this will return on its own
module.create_or_update_if_needed(existing_item, new_fields, endpoint='users', item_type='user')
if __name__ == '__main__':
main()
| Name | Type | Size | Permission | Actions |
|---|---|---|---|---|
| __pycache__ | Folder | 0755 |
|
|
| __init__.py | File | 0 B | 0644 |
|
| ad_hoc_command.py | File | 5.44 KB | 0644 |
|
| ad_hoc_command_cancel.py | File | 3.85 KB | 0644 |
|
| ad_hoc_command_wait.py | File | 3.26 KB | 0644 |
|
| application.py | File | 5.11 KB | 0644 |
|
| bulk_host_create.py | File | 2.7 KB | 0644 |
|
| bulk_job_launch.py | File | 9.03 KB | 0644 |
|
| controller_meta.py | File | 1.88 KB | 0644 |
|
| credential.py | File | 10.86 KB | 0644 |
|
| credential_input_source.py | File | 4.06 KB | 0644 |
|
| credential_type.py | File | 4.48 KB | 0644 |
|
| execution_environment.py | File | 3.86 KB | 0644 |
|
| export.py | File | 5.6 KB | 0644 |
|
| group.py | File | 6 KB | 0644 |
|
| host.py | File | 3.73 KB | 0644 |
|
| import.py | File | 3.1 KB | 0644 |
|
| instance.py | File | 3.88 KB | 0644 |
|
| instance_group.py | File | 6.4 KB | 0644 |
|
| inventory.py | File | 6.51 KB | 0644 |
|
| inventory_source.py | File | 10.68 KB | 0644 |
|
| inventory_source_update.py | File | 4.45 KB | 0644 |
|
| job_cancel.py | File | 2.66 KB | 0644 |
|
| job_launch.py | File | 11.35 KB | 0644 |
|
| job_list.py | File | 3.54 KB | 0644 |
|
| job_template.py | File | 22.5 KB | 0644 |
|
| job_wait.py | File | 3.48 KB | 0644 |
|
| label.py | File | 2.97 KB | 0644 |
|
| license.py | File | 3.64 KB | 0644 |
|
| notification_template.py | File | 9.61 KB | 0644 |
|
| organization.py | File | 7.82 KB | 0644 |
|
| project.py | File | 14.71 KB | 0644 |
|
| project_update.py | File | 4.27 KB | 0644 |
|
| role.py | File | 11.26 KB | 0644 |
|
| schedule.py | File | 12.48 KB | 0644 |
|
| settings.py | File | 5.47 KB | 0644 |
|
| subscriptions.py | File | 3.12 KB | 0644 |
|
| team.py | File | 3.2 KB | 0644 |
|
| token.py | File | 6.76 KB | 0644 |
|
| user.py | File | 6.2 KB | 0644 |
|
| workflow_approval.py | File | 3.42 KB | 0644 |
|
| workflow_job_template.py | File | 38.14 KB | 0644 |
|
| workflow_job_template_node.py | File | 16.61 KB | 0644 |
|
| workflow_launch.py | File | 6.56 KB | 0644 |
|
| workflow_node_wait.py | File | 2.67 KB | 0644 |
|