- 15 Jun, 2013 1 commit
-
-
Migrated all examples: in DOCUMENTATION=''' string to standalone EXAMPLES=''' string Added deprecation warning to moduledev.rst and remove deprecated example from it Fixed up a few typos and uppercased some acronyms. add consistency to how EXAMPLES are formatted
Jan-Piet Mens committed
-
- 01 Jun, 2013 1 commit
-
-
Michael DeHaan committed
-
- 28 Apr, 2013 1 commit
-
-
Michael DeHaan committed
-
- 08 Apr, 2013 1 commit
-
-
This allows the password to contain single quotes and should make it safe to use randomly generated passwords (provided passwords can be represented in the connection encoding).
Bernhard Weitzhofer committed
-
- 01 Apr, 2013 1 commit
-
-
Change documentation of "state" param to refer to user (role) state instead of database state. Change 2 function docstrings to reflect the code
Bernhard Weitzhofer committed
-
- 27 Feb, 2013 1 commit
-
-
Michael DeHaan committed
-
- 24 Feb, 2013 1 commit
-
-
Rodney Quillo committed
-
- 20 Feb, 2013 1 commit
-
-
Rodney Quillo committed
-
- 19 Feb, 2013 2 commits
-
-
Lorin Hochstein committed
-
This change enables users to add and remove permissions to all roles, using the PUBLIC user. This is equivalent to using the PUBLIC keyword in GRANT and DENY postgres SQL commands. For example, see: <http://www.postgresql.org/docs/current/interactive/sql-grant.html> Fixes #1833
Lorin Hochstein committed
-
- 05 Jan, 2013 1 commit
-
-
Félix Sipma committed
-
- 04 Jan, 2013 1 commit
-
-
Félix Sipma committed
-
- 05 Dec, 2012 1 commit
-
-
Daniel Hokka Zakrisson committed
-
- 21 Nov, 2012 1 commit
-
-
Jan-Piet Mens committed
-
- 19 Nov, 2012 1 commit
-
-
Michael DeHaan committed
-
- 31 Oct, 2012 1 commit
-
-
Michael DeHaan committed
-
- 23 Oct, 2012 1 commit
-
-
- added terse syntax to modules.rst - added description of special variables to template module
Jan-Piet Mens committed
-
- 20 Oct, 2012 1 commit
-
-
Added 'script', a module that can push and insantly run a remote script. Replaces the need to copy+command. This is a bit of a rough draft, some error handling still needs to be added.
Michael DeHaan committed
-
- 15 Oct, 2012 1 commit
-
-
Pass role_attr_flags a list of comma separated role attributes when creating or updating a user.
Jeremiah Heller committed
-
- 30 Sep, 2012 1 commit
-
-
- .rst now supresses default if none is set (looks better in HTML) - .rst now handles empty options list - Fixed postgresql_user and mysql_user because YAML contained colons - docs for facter
Jan-Piet Mens committed
-
- 29 Sep, 2012 1 commit
-
-
Marco Vito Moscaritolo committed
-
- 07 Sep, 2012 1 commit
-
-
If I create a database from scratch and assign permissions by doing: - name: ensure database is created action: postgresql_db db=$dbname - name: ensure django user has access action: postgresql_user db=$dbname user=$dbuser priv=ALL password=$dbpassword Then it fails with the error: File "/tmp/ansible-1347048449.32-29998829936529/postgresql_user", line 565, in <module> main() File "/tmp/ansible-1347048449.32-29998829936529/postgresql_user", line 273, in main changed = grant_privileges(cursor, user, privs) or changed File "/tmp/ansible-1347048449.32-29998829936529/postgresql_user", line 174, in grant_privileges changed = grant_func(cursor, user, name, privilege)\ File "/tmp/ansible-1347048449.32-29998829936529/postgresql_user", line 132, in grant_database_privilege prev_priv = get_database_privileges(cursor, user, db) File "/tmp/ansible-1347048449.32-29998829936529/postgresql_user", line 118, in get_database_privileges r = re.search('%s=(C?T?c?)/[a-z]+\,?' % user, datacl) File "/usr/lib/python2.7/re.py", line 142, in search return _compile(pattern, flags).search(string) TypeError: expected string or buffer This fix fixes the problem by not executing the regex if the db query on pg_database returns None.
Lorin Hochstein committed
-
- 05 Sep, 2012 1 commit
-
-
Piotr Kweclich committed
-
- 22 Aug, 2012 4 commits
-
-
Pepe Barbe committed
-
Use a different method to query for current privileges at the table and database level. This method is more robust if newer privileges are added in future versions and also supports the ALL wildcard.
Pepe Barbe committed -
fail_on_user option can be used to ignore silently if the user cannot be removed because of remaining privilege dependencies to other objects in the database. By default it will fail, so that this new behavior won't surprise unsuspecting users.
Pepe Barbe committed -
The postgresql_user module has several drawbacks: * No granularity for privileges * PostgreSQL semantics force working on one database at time, at least for Tables. Which means that a single call can't remove all the privileges for a user, and a user can't be removed until all the privileges are removed, forcing a module failure with no way to work around the issue. Changes: * Added the ability to specify granular privileges for database and tables within the database * Report if user was removed, and add an option to disable failing if user is not removed.
Pepe Barbe committed
-
- 17 Aug, 2012 1 commit
-
-
Pepe Barbe committed
-
- 03 Aug, 2012 1 commit
-
-
Add encoding lines to python modules such that they can take unicode options if they are fed them, since the AnsibleModule stuff no longer base64 encodes for simplicity and speed reasons.
Michael DeHaan committed
-
- 01 Aug, 2012 1 commit
-
-
Michael DeHaan committed
-
- 29 Jul, 2012 1 commit
-
-
passwd -> password loginpass -> login_password loginuser -> login_user loginhost -> login_host Add an example playbook that shows how to use the modules.
Lorin Hochstein committed
-
- 26 Jul, 2012 1 commit
-
-
These modules are based on the mysql_db and mysql_user modules. Currently, the postgresql_user module can only grant all permissions on a database, fine-grained access has not been implemented yet.
Lorin Hochstein committed
-