1. 15 Jun, 2013 1 commit
  2. 01 Jun, 2013 1 commit
  3. 28 Apr, 2013 1 commit
  4. 08 Apr, 2013 1 commit
  5. 01 Apr, 2013 1 commit
  6. 27 Feb, 2013 1 commit
  7. 24 Feb, 2013 1 commit
  8. 20 Feb, 2013 1 commit
  9. 19 Feb, 2013 2 commits
  10. 05 Jan, 2013 1 commit
  11. 04 Jan, 2013 1 commit
  12. 05 Dec, 2012 1 commit
  13. 21 Nov, 2012 1 commit
  14. 19 Nov, 2012 1 commit
  15. 31 Oct, 2012 1 commit
  16. 23 Oct, 2012 1 commit
  17. 20 Oct, 2012 1 commit
  18. 15 Oct, 2012 1 commit
  19. 30 Sep, 2012 1 commit
  20. 29 Sep, 2012 1 commit
  21. 07 Sep, 2012 1 commit
    • Fix postgresql_user bug · b3b01bb7
      If I create a database from scratch and assign permissions by doing:
      
            - name: ensure database is created
              action: postgresql_db db=$dbname
      
            - name: ensure django user has access
              action: postgresql_user db=$dbname user=$dbuser priv=ALL password=$dbpassword
      
      Then it fails with the error:
      
        File "/tmp/ansible-1347048449.32-29998829936529/postgresql_user", line 565, in <module>
          main()
        File "/tmp/ansible-1347048449.32-29998829936529/postgresql_user", line 273, in main
          changed = grant_privileges(cursor, user, privs) or changed
        File "/tmp/ansible-1347048449.32-29998829936529/postgresql_user", line 174, in grant_privileges
          changed = grant_func(cursor, user, name, privilege)\
        File "/tmp/ansible-1347048449.32-29998829936529/postgresql_user", line 132, in grant_database_privilege
          prev_priv = get_database_privileges(cursor, user, db)
        File "/tmp/ansible-1347048449.32-29998829936529/postgresql_user", line 118, in get_database_privileges
          r = re.search('%s=(C?T?c?)/[a-z]+\,?' % user, datacl)
        File "/usr/lib/python2.7/re.py", line 142, in search
          return _compile(pattern, flags).search(string)
      TypeError: expected string or buffer
      
      This fix fixes the problem by not executing the regex if the
      db query on pg_database returns None.
      Lorin Hochstein committed
  22. 05 Sep, 2012 1 commit
  23. 22 Aug, 2012 4 commits
    • Typo · 6d473df3
      Pepe Barbe committed
    • Query for all active privileges instead · af5d67c4
      Use a different method to query for current 
      privileges at the table and database level. 
      This method is more robust if newer privileges 
      are added in future versions and also supports the 
      ALL wildcard.
      Pepe Barbe committed
    • Add fail_on_user option · 95169b75
      fail_on_user option can be used to ignore silently
      if the user cannot be removed because of remaining
      privilege dependencies to other objects in the 
      database. By default it will fail, so that this new 
      behavior won't surprise unsuspecting users.
      Pepe Barbe committed
    • Initial commit of change of semantics for module · 4e833cf5
      The postgresql_user module has several drawbacks:
      * No granularity for privileges
      * PostgreSQL semantics force working on one
        database at time, at least for Tables. Which
        means that a single call can't remove all the 
        privileges for a user, and a user can't be
        removed until all the privileges are removed, 
        forcing a module failure with no way to 
        work around the issue.
      
      Changes:
      * Added the ability to specify granular privileges
        for database and tables within the database
      * Report if user was removed, and add an option to 
        disable failing if user is not removed.
      Pepe Barbe committed
  24. 17 Aug, 2012 1 commit
  25. 03 Aug, 2012 1 commit
  26. 01 Aug, 2012 1 commit
  27. 29 Jul, 2012 1 commit
  28. 26 Jul, 2012 1 commit