Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Conversation

pilou-
Copy link

@pilou- pilou- commented Dec 5, 2014

By default, sudo is used for nsenter commands. This behavior could be
disabled in Ansible configuration with:
[nsenter]
sudo = False

By default, sudo is used for nsenter commands. This behavior could be
disabled in Ansible configuration with:
[nsenter]
sudo = False
- use default value for 'shell' parameter
- use shlex.split
mscherer pushed a commit that referenced this pull request Dec 1, 2015
mscherer pushed a commit that referenced this pull request Feb 17, 2016
mscherer pushed a commit that referenced this pull request Mar 13, 2016
This implements solution #1 in the proposal ansible#14860.

It only shows the diff if the task induced a change, which means that if the changed_when control overrides the task, not diff will be produced.
See ansible#14860 for a rationale and the use-case.
mscherer pushed a commit that referenced this pull request Jun 3, 2016
mscherer pushed a commit that referenced this pull request Sep 1, 2016
Merge to latest upstream
mscherer pushed a commit that referenced this pull request Oct 16, 2016
mscherer pushed a commit that referenced this pull request Feb 18, 2017
* Add a vault 'encrypt_string' command.

The command will encrypt the string on the command
line and print out the yaml block that can be included
in a playbook.

To be prompted for a string to encrypt:
   
   ansible-vault encrypt_string --prompt

To specify a string on the command line:

   ansible-vault encrypt_string "some string to encrypt"

To read a string from stdin to encrypt:

   echo  "the plaintext to encrypt" | ansible-vault encrypt_string

If a --name or --stdin-name is provided, the output will include that name in yaml key value format: 

   $ ansible-vault encrypt_string "42" --name "the_answer"
    the_answer: !vault-encrypted |
          $ANSIBLE_VAULT;1.1;AES256
          <vault cipher text here>

plaintext provided via prompt, cli, and/or stdin can be mixed:

      $ ansible-vault encrypt_string "42" --name "the_answer" --prompt
      Vault password: 
      Variable name (enter for no name): some_variable
      String to encrypt: microfiber
      # The encrypted version of variable ("some_variable", the string #1 from the interactive prompt).
     some_variable: !vault-encrypted |
              $ANSIBLE_VAULT;1.1;AES256
              < vault cipher text here>
      # The encrypted version of variable ("the_answer", the string ansible#2 from the command line args).
      the_answer: !vault-encrypted |
             $ANSIBLE_VAULT;1.1;AES256
             < vault cipher text here>

Encryption successful
* add stdin and prompting to vault 'encrypt_string'
* add a --name to encrypt_string to optional specify a var name
* prompt for a var name to use with --prompt
* add a --stdin-name for the var name for value read from stdin
mscherer pushed a commit that referenced this pull request Nov 13, 2018
* Add Support of healthcheck in docker_container module

Fixes ansible#33622
Now container can be started with healthcheck enabled

Signed-off-by: Akshay Gaikwad <[email protected]>

* Extend docker_container healthcheck (#1)

* Allowing to disable healthcheck.

* Added test for healthcheck.

* Make sure correct types are used.

* Healthcheck needs to be explicitly disabled with test: ['NONE'].

* pep8 fixes

Signed-off-by: Akshay Gaikwad <[email protected]>

* Fix bug if healthcheck interval is 1 day or more

`timedelta` object has days too and seconds are up to one day.
Therefore use `total_seconds()` to convert time into seconds.

Signed-off-by: Akshay Gaikwad <[email protected]>

* Add test for healthcheck when healthcheck is not specified

This is to avoid the situation when healthcheck is not specified and
treat this as healthcheck is changed or removed.

Signed-off-by: Akshay Gaikwad <[email protected]>

* Convert string syntax for healthcheck test to CMD-SHELL

Also add another test case to check idempotency when healthcheck test
is specified as string

Signed-off-by: Akshay Gaikwad <[email protected]>

* Playbook fails if minimun docker version is not satisfy for healthcheck

This is to make more consistent with other non-supported options.

Signed-off-by: Akshay Gaikwad <[email protected]>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants