Skip to content

Commit c688d55

Browse files
committed
modified: playbooks/get_stats.yml
modified: roles/controller_ad_hoc_command/meta/argument_specs.yml modified: roles/controller_ad_hoc_command_cancel/meta/argument_specs.yml modified: roles/controller_applications/meta/argument_specs.yml modified: roles/controller_bulk_host_create/meta/argument_specs.yml modified: roles/controller_bulk_job_launch/meta/argument_specs.yml modified: roles/controller_credential_input_sources/meta/argument_specs.yml modified: roles/controller_credential_types/meta/argument_specs.yml modified: roles/controller_credentials/meta/argument_specs.yml modified: roles/controller_execution_environments/meta/argument_specs.yml modified: roles/controller_host_groups/meta/argument_specs.yml modified: roles/controller_hosts/meta/argument_specs.yml modified: roles/controller_instance_groups/meta/argument_specs.yml modified: roles/controller_instances/meta/argument_specs.yml modified: roles/controller_inventories/meta/argument_specs.yml modified: roles/controller_inventory_source_update/meta/argument_specs.yml modified: roles/controller_inventory_sources/meta/argument_specs.yml modified: roles/controller_job_launch/meta/argument_specs.yml modified: roles/controller_job_templates/meta/argument_specs.yml modified: roles/controller_jobs_cancel/meta/argument_specs.yml modified: roles/controller_labels/meta/argument_specs.yml modified: roles/controller_license/meta/argument_specs.yml modified: roles/controller_notification_templates/meta/argument_specs.yml modified: roles/controller_organizations/meta/argument_specs.yml modified: roles/controller_project_update/meta/argument_specs.yml modified: roles/controller_projects/meta/argument_specs.yml modified: roles/controller_roles/meta/argument_specs.yml modified: roles/controller_schedules/meta/argument_specs.yml modified: roles/controller_settings/meta/argument_specs.yml modified: roles/controller_teams/meta/argument_specs.yml modified: roles/controller_users/meta/argument_specs.yml modified: roles/controller_workflow_job_templates/meta/argument_specs.yml modified: roles/controller_workflow_launch/meta/argument_specs.yml modified: roles/dispatch/meta/argument_specs.yml modified: roles/eda_controller_tokens/meta/argument_specs.yml modified: roles/eda_credential_types/meta/argument_specs.yml modified: roles/eda_credentials/meta/argument_specs.yml modified: roles/eda_decision_environments/meta/argument_specs.yml modified: roles/eda_event_streams/meta/argument_specs.yml modified: roles/eda_projects/meta/argument_specs.yml modified: roles/eda_rulebook_activations/meta/argument_specs.yml modified: roles/eda_users/meta/argument_specs.yml modified: roles/gateway_applications/meta/argument_specs.yml modified: roles/gateway_authenticator_maps/meta/argument_specs.yml modified: roles/gateway_authenticators/meta/argument_specs.yml modified: roles/gateway_http_ports/meta/argument_specs.yml modified: roles/gateway_organizations/meta/argument_specs.yml modified: roles/gateway_role_user_assignments/meta/argument_specs.yml modified: roles/gateway_routes/meta/argument_specs.yml modified: roles/gateway_service_clusters/meta/argument_specs.yml modified: roles/gateway_service_keys/meta/argument_specs.yml modified: roles/gateway_service_nodes/meta/argument_specs.yml modified: roles/gateway_services/meta/argument_specs.yml modified: roles/gateway_settings/meta/argument_specs.yml modified: roles/gateway_teams/meta/argument_specs.yml modified: roles/gateway_users/meta/argument_specs.yml modified: roles/hub_collection/meta/argument_specs.yml modified: roles/hub_collection_remote/meta/argument_specs.yml modified: roles/hub_collection_repository/meta/argument_specs.yml modified: roles/hub_collection_repository_sync/meta/argument_specs.yml modified: roles/hub_ee_image/meta/argument_specs.yml modified: roles/hub_ee_registry/meta/argument_specs.yml modified: roles/hub_ee_registry_index/meta/argument_specs.yml modified: roles/hub_ee_registry_sync/meta/argument_specs.yml modified: roles/hub_ee_repository/meta/argument_specs.yml modified: roles/hub_ee_repository_sync/meta/argument_specs.yml modified: roles/hub_group/meta/argument_specs.yml modified: roles/hub_group_roles/meta/argument_specs.yml modified: roles/hub_namespace/meta/argument_specs.yml modified: roles/hub_publish/meta/argument_specs.yml modified: roles/hub_role/meta/argument_specs.yml modified: roles/hub_user/meta/argument_specs.yml
1 parent 36534ed commit c688d55

File tree

72 files changed

+216
-495
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

72 files changed

+216
-495
lines changed

playbooks/get_stats.yml

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -58,8 +58,7 @@
5858
- "{{ ansible_facts['date_time']['date'] | to_datetime('%Y-%m-%d') }}"
5959
- "{{ r_users['json']['results'][0]['last_login'] | regex_search('[0-9]{4}-[0-9]{2}-[0-9]{2}', '\\0') | first }}"
6060
- "{{ (r_users['json']['results'][0]['last_login'] | regex_search('[0-9]{4}-[0-9]{2}-[0-9]{2}', '\\0') | first) | to_datetime('%Y-%m-%d') }}"
61-
- "{{ (((r_users['json']['results'][0]['last_login'] | regex_search('[0-9]{4}-[0-9]{2}-[0-9]{2}', '\\0') | first) | to_datetime('%Y-%m-%d')) - (ansible_facts['date_time']['date']
62-
| to_datetime('%Y-%m-%d'))).days }}"
61+
- "{{ (((r_users['json']['results'][0]['last_login'] | regex_search('[0-9]{4}-[0-9]{2}-[0-9]{2}', '\\0') | first) | to_datetime('%Y-%m-%d')) - (ansible_facts['date_time']['date'] | to_datetime('%Y-%m-%d'))).days }}"
6362

6463
- name: Remove users who have never logged in (null)
6564
ansible.builtin.set_fact:
@@ -78,8 +77,7 @@
7877
ansible.builtin.set_fact:
7978
active_users: "{{ active_users + [item] }}"
8079
# when: (((item | regex_search('[0-9]{4}-[0-9]{2}-[0-9]{2}', '\\0') | first) | to_datetime('%Y-%m-%d')) - ('2023-03-30' | to_datetime('%Y-%m-%d'))).days <= 30
81-
when: ((((item | regex_search('[0-9]{4}-[0-9]{2}-[0-9]{2}', '\\0') | first) | to_datetime('%Y-%m-%d')) - (ansible_facts['date_time']['date'] | to_datetime('%Y-%m-%d'))).days)
82-
<= 30
80+
when: ((((item | regex_search('[0-9]{4}-[0-9]{2}-[0-9]{2}', '\\0') | first) | to_datetime('%Y-%m-%d')) - (ansible_facts['date_time']['date'] | to_datetime('%Y-%m-%d'))).days) <= 30
8381
loop: "{{ temp_user_list }}"
8482

8583
- name: Get subscription info

roles/controller_ad_hoc_command/meta/argument_specs.yml

Lines changed: 3 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -79,8 +79,7 @@ argument_specs:
7979
default: "{{ aap_configuration_secure_logging | default(false) }}"
8080
required: false
8181
type: bool
82-
description: Whether or not to include the sensitive ad_hoc_command role tasks in the log. Set this value to `true` if you will be providing your sensitive
83-
values from elsewhere.
82+
description: Whether or not to include the sensitive ad_hoc_command role tasks in the log. Set this value to `true` if you will be providing your sensitive values from elsewhere.
8483
aap_configuration_secure_logging:
8584
default: false
8685
required: false
@@ -111,13 +110,11 @@ argument_specs:
111110
aap_password:
112111
default: None
113112
required: false
114-
description: Platform Admin User's password on the Server. This should be stored in an Ansible Vault at vars/platform-secrets.yml or elsewhere and called
115-
from a parent playbook.
113+
description: Platform Admin User's password on the Server. This should be stored in an Ansible Vault at vars/platform-secrets.yml or elsewhere and called from a parent playbook.
116114
type: str
117115
aap_token:
118116
default: None
119117
required: false
120-
description: Controller Admin User's token on the Ansible Automation Platform Server. This should be stored in an Ansible Vault at or elsewhere and called
121-
from a parent playbook. Either username / password or oauthtoken need to be specified.
118+
description: Controller Admin User's token on the Ansible Automation Platform Server. This should be stored in an Ansible Vault at or elsewhere and called from a parent playbook. Either username / password or oauthtoken need to be specified.
122119
type: str
123120
...

roles/controller_ad_hoc_command_cancel/meta/argument_specs.yml

Lines changed: 3 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -33,8 +33,7 @@ argument_specs:
3333
default: "{{ aap_configuration_secure_logging | default(false) }}"
3434
required: false
3535
type: bool
36-
description: Whether or not to include the sensitive tasks from this role in the log. Set this value to `true` if you will be providing your sensitive values
37-
from elsewhere.
36+
description: Whether or not to include the sensitive tasks from this role in the log. Set this value to `true` if you will be providing your sensitive values from elsewhere.
3837
aap_configuration_secure_logging:
3938
default: false
4039
required: false
@@ -65,13 +64,11 @@ argument_specs:
6564
aap_password:
6665
default: None
6766
required: false
68-
description: Platform Admin User's password on the Server. This should be stored in an Ansible Vault at vars/platform-secrets.yml or elsewhere and called
69-
from a parent playbook.
67+
description: Platform Admin User's password on the Server. This should be stored in an Ansible Vault at vars/platform-secrets.yml or elsewhere and called from a parent playbook.
7068
type: str
7169
aap_token:
7270
default: None
7371
required: false
74-
description: Controller Admin User's token on the Ansible Automation Platform Server. This should be stored in an Ansible Vault at or elsewhere and called
75-
from a parent playbook. Either username / password or oauthtoken need to be specified.
72+
description: Controller Admin User's token on the Ansible Automation Platform Server. This should be stored in an Ansible Vault at or elsewhere and called from a parent playbook. Either username / password or oauthtoken need to be specified.
7673
type: str
7774
...

roles/controller_applications/meta/argument_specs.yml

Lines changed: 3 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -72,8 +72,7 @@ argument_specs:
7272
default: "{{ aap_configuration_secure_logging | default(false) }}"
7373
required: false
7474
type: bool
75-
description: Whether or not to include the sensitive tasks from this role in the log. Set this value to `true` if you will be providing your sensitive values
76-
from elsewhere.
75+
description: Whether or not to include the sensitive tasks from this role in the log. Set this value to `true` if you will be providing your sensitive values from elsewhere.
7776
aap_configuration_secure_logging:
7877
default: false
7978
required: false
@@ -104,13 +103,11 @@ argument_specs:
104103
aap_password:
105104
default: None
106105
required: false
107-
description: Platform Admin User's password on the Server. This should be stored in an Ansible Vault at vars/platform-secrets.yml or elsewhere and called
108-
from a parent playbook.
106+
description: Platform Admin User's password on the Server. This should be stored in an Ansible Vault at vars/platform-secrets.yml or elsewhere and called from a parent playbook.
109107
type: str
110108
aap_token:
111109
default: None
112110
required: false
113-
description: Controller Admin User's token on the Ansible Automation Platform Server. This should be stored in an Ansible Vault at or elsewhere and called
114-
from a parent playbook. Either username / password or oauthtoken need to be specified.
111+
description: Controller Admin User's token on the Ansible Automation Platform Server. This should be stored in an Ansible Vault at or elsewhere and called from a parent playbook. Either username / password or oauthtoken need to be specified.
115112
type: str
116113
...

roles/controller_bulk_host_create/meta/argument_specs.yml

Lines changed: 3 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -19,8 +19,7 @@ argument_specs:
1919
default: "{{ aap_configuration_secure_logging | default(false) }}"
2020
required: false
2121
type: bool
22-
description: Whether or not to include the sensitive ad_hoc_command role tasks in the log. Set this value to `true` if you will be providing your sensitive
23-
values from elsewhere.
22+
description: Whether or not to include the sensitive ad_hoc_command role tasks in the log. Set this value to `true` if you will be providing your sensitive values from elsewhere.
2423
aap_configuration_secure_logging:
2524
default: false
2625
required: false
@@ -46,13 +45,11 @@ argument_specs:
4645
aap_password:
4746
default: None
4847
required: false
49-
description: Controller Admin User's password on the Ansible Controller Server. This should be stored in an Ansible Vault at vars/controller-secrets.yml or
50-
elsewhere and called from a parent playbook. Either username / password or oauthtoken need to be specified.
48+
description: Controller Admin User's password on the Ansible Controller Server. This should be stored in an Ansible Vault at vars/controller-secrets.yml or elsewhere and called from a parent playbook. Either username / password or oauthtoken need to be specified.
5149
type: str
5250
controller_oauthtoken:
5351
default: None
5452
required: false
55-
description: Controller Admin User's token on the Ansible Controller Server. This should be stored in an Ansible Vault at or elsewhere and called from a parent
56-
playbook. Either username / password or oauthtoken need to be specified.
53+
description: Controller Admin User's token on the Ansible Controller Server. This should be stored in an Ansible Vault at or elsewhere and called from a parent playbook. Either username / password or oauthtoken need to be specified.
5754
type: str
5855
...

roles/controller_bulk_job_launch/meta/argument_specs.yml

Lines changed: 3 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -13,8 +13,7 @@ argument_specs:
1313
default: "{{ aap_configuration_secure_logging | default(false) }}"
1414
required: false
1515
type: bool
16-
description: Whether or not to include the sensitive ad_hoc_command role tasks in the log. Set this value to `true` if you will be providing your sensitive
17-
values from elsewhere.
16+
description: Whether or not to include the sensitive ad_hoc_command role tasks in the log. Set this value to `true` if you will be providing your sensitive values from elsewhere.
1817
aap_configuration_secure_logging:
1918
default: false
2019
required: false
@@ -45,13 +44,11 @@ argument_specs:
4544
aap_password:
4645
default: None
4746
required: false
48-
description: Platform Admin User's password on the Server. This should be stored in an Ansible Vault at vars/platform-secrets.yml or elsewhere and called
49-
from a parent playbook.
47+
description: Platform Admin User's password on the Server. This should be stored in an Ansible Vault at vars/platform-secrets.yml or elsewhere and called from a parent playbook.
5048
type: str
5149
aap_token:
5250
default: None
5351
required: false
54-
description: Controller Admin User's token on the Ansible Automation Platform Server. This should be stored in an Ansible Vault at or elsewhere and called
55-
from a parent playbook. Either username / password or oauthtoken need to be specified.
52+
description: Controller Admin User's token on the Ansible Automation Platform Server. This should be stored in an Ansible Vault at or elsewhere and called from a parent playbook. Either username / password or oauthtoken need to be specified.
5653
type: str
5754
...

roles/controller_credential_input_sources/meta/argument_specs.yml

Lines changed: 3 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -61,8 +61,7 @@ argument_specs:
6161
default: "{{ aap_configuration_secure_logging | default(false) }}"
6262
required: false
6363
type: bool
64-
description: Whether or not to include the sensitive tasks from this role in the log. Set this value to `true` if you will be providing your sensitive values
65-
from elsewhere.
64+
description: Whether or not to include the sensitive tasks from this role in the log. Set this value to `true` if you will be providing your sensitive values from elsewhere.
6665
aap_configuration_secure_logging:
6766
default: false
6867
required: false
@@ -93,13 +92,11 @@ argument_specs:
9392
aap_password:
9493
default: None
9594
required: false
96-
description: Platform Admin User's password on the Server. This should be stored in an Ansible Vault at vars/platform-secrets.yml or elsewhere and called
97-
from a parent playbook.
95+
description: Platform Admin User's password on the Server. This should be stored in an Ansible Vault at vars/platform-secrets.yml or elsewhere and called from a parent playbook.
9896
type: str
9997
aap_token:
10098
default: None
10199
required: false
102-
description: Controller Admin User's token on the Ansible Automation Platform Server. This should be stored in an Ansible Vault at or elsewhere and called
103-
from a parent playbook. Either username / password or oauthtoken need to be specified.
100+
description: Controller Admin User's token on the Ansible Automation Platform Server. This should be stored in an Ansible Vault at or elsewhere and called from a parent playbook. Either username / password or oauthtoken need to be specified.
104101
type: str
105102
...

roles/controller_credential_types/meta/argument_specs.yml

Lines changed: 3 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -69,8 +69,7 @@ argument_specs:
6969
default: "{{ aap_configuration_secure_logging | default(false) }}"
7070
required: false
7171
type: bool
72-
description: Whether or not to include the sensitive tasks from this role in the log. Set this value to `true` if you will be providing your sensitive values
73-
from elsewhere.
72+
description: Whether or not to include the sensitive tasks from this role in the log. Set this value to `true` if you will be providing your sensitive values from elsewhere.
7473
aap_configuration_secure_logging:
7574
default: false
7675
required: false
@@ -101,13 +100,11 @@ argument_specs:
101100
aap_password:
102101
default: None
103102
required: false
104-
description: Platform Admin User's password on the Server. This should be stored in an Ansible Vault at vars/platform-secrets.yml or elsewhere and called
105-
from a parent playbook.
103+
description: Platform Admin User's password on the Server. This should be stored in an Ansible Vault at vars/platform-secrets.yml or elsewhere and called from a parent playbook.
106104
type: str
107105
aap_token:
108106
default: None
109107
required: false
110-
description: Controller Admin User's token on the Ansible Automation Platform Server. This should be stored in an Ansible Vault at or elsewhere and called
111-
from a parent playbook. Either username / password or oauthtoken need to be specified.
108+
description: Controller Admin User's token on the Ansible Automation Platform Server. This should be stored in an Ansible Vault at or elsewhere and called from a parent playbook. Either username / password or oauthtoken need to be specified.
112109
type: str
113110
...

roles/controller_credentials/meta/argument_specs.yml

Lines changed: 3 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -82,8 +82,7 @@ argument_specs:
8282
default: "{{ aap_configuration_secure_logging | default(true) }}"
8383
required: false
8484
type: bool
85-
description: Whether or not to include the sensitive tasks from this role in the log. Set this value to `true` if you will be providing your sensitive values
86-
from elsewhere.
85+
description: Whether or not to include the sensitive tasks from this role in the log. Set this value to `true` if you will be providing your sensitive values from elsewhere.
8786
aap_configuration_secure_logging:
8887
default: true
8988
required: false
@@ -114,13 +113,11 @@ argument_specs:
114113
aap_password:
115114
default: None
116115
required: false
117-
description: Platform Admin User's password on the Server. This should be stored in an Ansible Vault at vars/platform-secrets.yml or elsewhere and called
118-
from a parent playbook.
116+
description: Platform Admin User's password on the Server. This should be stored in an Ansible Vault at vars/platform-secrets.yml or elsewhere and called from a parent playbook.
119117
type: str
120118
aap_token:
121119
default: None
122120
required: false
123-
description: Controller Admin User's token on the Ansible Automation Platform Server. This should be stored in an Ansible Vault at or elsewhere and called
124-
from a parent playbook. Either username / password or oauthtoken need to be specified.
121+
description: Controller Admin User's token on the Ansible Automation Platform Server. This should be stored in an Ansible Vault at or elsewhere and called from a parent playbook. Either username / password or oauthtoken need to be specified.
125122
type: str
126123
...

roles/controller_execution_environments/meta/argument_specs.yml

Lines changed: 3 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -70,8 +70,7 @@ argument_specs:
7070
default: "{{ aap_configuration_secure_logging | default(false) }}"
7171
required: false
7272
type: bool
73-
description: Whether or not to include the sensitive tasks from this role in the log. Set this value to `true` if you will be providing your sensitive values
74-
from elsewhere.
73+
description: Whether or not to include the sensitive tasks from this role in the log. Set this value to `true` if you will be providing your sensitive values from elsewhere.
7574
aap_configuration_secure_logging:
7675
default: false
7776
required: false
@@ -102,13 +101,11 @@ argument_specs:
102101
aap_password:
103102
default: None
104103
required: false
105-
description: Platform Admin User's password on the Server. This should be stored in an Ansible Vault at vars/platform-secrets.yml or elsewhere and called
106-
from a parent playbook.
104+
description: Platform Admin User's password on the Server. This should be stored in an Ansible Vault at vars/platform-secrets.yml or elsewhere and called from a parent playbook.
107105
type: str
108106
aap_token:
109107
default: None
110108
required: false
111-
description: Controller Admin User's token on the Ansible Automation Platform Server. This should be stored in an Ansible Vault at or elsewhere and called
112-
from a parent playbook. Either username / password or oauthtoken need to be specified.
109+
description: Controller Admin User's token on the Ansible Automation Platform Server. This should be stored in an Ansible Vault at or elsewhere and called from a parent playbook. Either username / password or oauthtoken need to be specified.
113110
type: str
114111
...

0 commit comments

Comments
 (0)