Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -60,4 +60,3 @@ controller_credential_types:
extra_vars:
rest_password: "{% raw %}{ { rest_password }}{% endraw %}"
rest_username: "{% raw %}{ { rest_username }}{% endraw %}"
...
Original file line number Diff line number Diff line change
Expand Up @@ -53,4 +53,3 @@ controller_credentials:
# url: "https://cyberark.example.com"
# app_id: "My-App-ID"
# organization: Default
...
Original file line number Diff line number Diff line change
Expand Up @@ -17,4 +17,3 @@ controller_groups:
# - group1
# - group2
# - group3
...
Original file line number Diff line number Diff line change
Expand Up @@ -17,4 +17,3 @@ controller_groups:
# - group1
# - group2
# - group3
...
Original file line number Diff line number Diff line change
Expand Up @@ -10,4 +10,3 @@ controller_hosts:
variables:
# some_var: some_val
# ansible_connection: local
...
Original file line number Diff line number Diff line change
Expand Up @@ -5,4 +5,3 @@ controller_inventories:
organization: Cac-Demo-Org
description: Created by Ansible CaC
prevent_instance_group_fallback: false
...
Original file line number Diff line number Diff line change
Expand Up @@ -5,4 +5,3 @@ controller_inventories:
organization: Cac-Demo-Org
description: Created by Ansible CaC
prevent_instance_group_fallback: false
...
Original file line number Diff line number Diff line change
Expand Up @@ -14,4 +14,3 @@ controller_inventory_sources:
update_cache_timeout: 0
wait: true
# more options can be provided but for scm source we are using, we need only this much.
...
Original file line number Diff line number Diff line change
Expand Up @@ -4,8 +4,7 @@
# Find the ID of the job template and use the following URL:
# https://<controller_url>/api/v2/job_templates/<ID>/survey_spec/
controller_templates:

- name: 000-List-to-String
- name: "000-List-to-String"
description: Simple template
job_type: run
inventory: Cac-Demo-Inventory
Expand All @@ -16,7 +15,7 @@ controller_templates:
playbook: ansible-list-management/list-to-string.yml
verbosity: 0
extra_vars:
# target_hosts: localhost
# target_hosts: localhost
ask_inventory_on_launch: false
ask_execution_environment_on_launch: false
ask_forks_on_launch: false
Expand Down Expand Up @@ -53,7 +52,7 @@ controller_templates:
playbook: ansible-list-management/list-sorting.yml
verbosity: 0
extra_vars:
# target_hosts: localhost
# target_hosts: localhost
ask_inventory_on_launch: false
ask_execution_environment_on_launch: false
ask_forks_on_launch: false
Expand All @@ -64,7 +63,7 @@ controller_templates:
ask_limit_on_launch: false
prevent_instance_group_fallback: false

- name: 001-List-to-String-CaC
- name: "001-List-to-String-CaC"
description: Another Simple template
job_type: run
inventory: Cac-Demo-Inventory
Expand All @@ -75,7 +74,7 @@ controller_templates:
playbook: ansible-list-management/list-sorting.yml
verbosity: 0
extra_vars:
# target_hosts: localhost
# target_hosts: localhost
ask_inventory_on_launch: false
ask_execution_environment_on_launch: false
ask_forks_on_launch: false
Expand All @@ -101,7 +100,6 @@ controller_templates:
# choices: ''
# new_question: true


# - name: Custom-Module-Demo-CaC
# description:
# job_type: run
Expand All @@ -123,4 +121,3 @@ controller_templates:
# ask_timeout_on_launch: false
# ask_limit_on_launch: false
# prevent_instance_group_fallback: false
...
Original file line number Diff line number Diff line change
Expand Up @@ -5,14 +5,14 @@ controller_notifications:
organization: Cac-Demo-Org
notification_type: email
notification_configuration:
username: '' # this is required even if there's no username
username: "" # this is required even if there's no username
sender: tower0@example.com
recipients:
- admin@example.com
use_tls: false
host: smtp.example.com
use_ssl: false
password: '' # this is required even if there's no password
password: "" # this is required even if there's no password
port: 25
# - name: Email notification differential
# description: Send out emails for tower jobs
Expand All @@ -28,4 +28,3 @@ controller_notifications:
# use_ssl: false
# password: '' # this is required even if there's no password
# port: 25
...
Original file line number Diff line number Diff line change
Expand Up @@ -3,4 +3,3 @@ aap_organizations:
- name: Cac-Demo-Org
max_hosts: 0
description: Configuration as Code - Demo
...
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,6 @@
controller_configuration_projects_async_retries: 60
controller_configuration_projects_async_delay: 5
controller_projects:

- name: Ansible-Real-Life-Cac
scm_type: git
scm_url: https://github.com/iamgini/ansible-real-life
Expand All @@ -24,7 +23,7 @@ controller_projects:
# organization: Cac-Demo-Org
# wait: true
# update_project: true
# credential: GH-Dev
# credential: GH-Dev

- name: Network-Automation-CaC
scm_type: git
Expand All @@ -47,4 +46,3 @@ controller_projects:
wait: true
update_project: true
# credential: GH-Dev
...
Original file line number Diff line number Diff line change
Expand Up @@ -30,11 +30,11 @@ controller_roles_todo:
# - project: Test Project
# team: satlab-admin
# role: admin
- job_template: 000-List-to-String
- job_template: "000-List-to-String"
team: cac-team-101
role: execute

- job_template: 001-List-to-String-CaC
- job_template: "001-List-to-String-CaC"
team: cac-team-102
role: execute

Expand Down Expand Up @@ -88,4 +88,3 @@ controller_roles_todo:
role: execute

# admin, read, member, execute, adhoc, update, use, approval, auditor, project_admin, inventory_admin, credential_admin, workflow_admin, notification_admin, job_template_admin, execution_environment_admin, got: project_admin_role",
...
Original file line number Diff line number Diff line change
Expand Up @@ -2,8 +2,8 @@
controller_schedules:
- name: Demo-Schedule-CaC
description: A demonstration
unified_job_template: 001-List-to-String-CaC
rrule: "DTSTART:20191219T130551Z RRULE:FREQ=DAILY;INTERVAL=1;COUNT=1"
unified_job_template: "001-List-to-String-CaC"
rrule: DTSTART:20191219T130551Z RRULE:FREQ=DAILY;INTERVAL=1;COUNT=1
# execution_environment: My EE
# forks: 2
# limit: all
Expand All @@ -13,4 +13,3 @@ controller_schedules:
# - differential
# - differential2
# timeout: 165
...
Original file line number Diff line number Diff line change
Expand Up @@ -2,4 +2,3 @@
controller_settings:
- name: SCHEDULE_MAX_JOBS
value: "10"
...
Original file line number Diff line number Diff line change
@@ -1,14 +1,14 @@
---
controller_settings_individuale:
- name: AWX_TASK_ENV
value: {'GIT_SSL_NO_VERIFY': 'True'}
value: { GIT_SSL_NO_VERIFY: "True" }

################### LDAP ############################
- name: AUTH_LDAP_SERVER_URI
value: "ldap://192.168.57.137:389"
value: ldap://192.168.57.137:389

- name: AUTH_LDAP_BIND_DN
value: "CN=ansible_bind,CN=users,DC=example,DC=com"
value: CN=ansible_bind,CN=users,DC=example,DC=com

# - name: AUTH_LDAP_BIND_PASSWORD
# value: "yoursecretbindpassword"
Expand All @@ -20,7 +20,7 @@ controller_settings_individuale:
# value: "uid=%(user)s,ou=Users,dc=example,dc=com"

- name: AUTH_LDAP_GROUP_TYPE
value: "MemberDNGroupType"
value: MemberDNGroupType

- name: AUTH_LDAP_USER_SEARCH
value: "['DC=example,DC=com', 'SCOPE_SUBTREE', '(sAMAccountName=%(user)s)']"
Expand All @@ -31,49 +31,18 @@ controller_settings_individuale:
- name: AUTH_LDAP_USER_ATTR_MAP
value: '{"first_name": "givenName","last_name": "sn","email": "mail"}'


- name: AUTH_LDAP_ORGANIZATION_MAP
value: '{
"XYZCorp-CaC": {
"users": true,
"admins": "CN=ansible_admins,OU=AAP,DC=example,DC=com",
"remove_users": false,
"remove_admins": false
},
"Network-Ops": {
"users": true,
"admins": "CN=network_admins,OU=AAP,DC=example,DC=com",
"remove_users": false,
"remove_admins": false
}
}'
value: '{ "XYZCorp-CaC": { "users": true, "admins": "CN=ansible_admins,OU=AAP,DC=example,DC=com", "remove_users": false, "remove_admins": false }, "Network-Ops":
{ "users": true, "admins": "CN=network_admins,OU=AAP,DC=example,DC=com", "remove_users": false, "remove_admins": false } }'

# This maps all users to satellite-qe team and we need to add this team to all resources we create for them
# that way users can access the things that their team has permissions for

- name: AUTH_LDAP_TEAM_MAP
value: '{
"cac-admins": {
"users": "cn=ansible_admins,ou=AAP,dc=example,dc=com",
"remove": true,
"organization": "XYZCorp-CaC"
},
"cac-operators": {
"users": "cn=ansible_operators,ou=AAP,dc=example,dc=com",
"remove": true,
"organization": "XYZCorp-CaC"
},
"network-admins": {
"users": "cn=network_admins,ou=AAP,dc=example,dc=com",
"remove": true,
"organization": "Network-Ops"
},
"network-operators": {
"users": "cn=network_operators,ou=AAP,dc=example,dc=com",
"remove": true,
"organization": "Network-Ops"
}
}'
value: '{ "cac-admins": { "users": "cn=ansible_admins,ou=AAP,dc=example,dc=com", "remove": true, "organization": "XYZCorp-CaC" }, "cac-operators": { "users":
"cn=ansible_operators,ou=AAP,dc=example,dc=com", "remove": true, "organization": "XYZCorp-CaC" }, "network-admins": { "users": "cn=network_admins,ou=AAP,dc=example,dc=com",
"remove": true, "organization": "Network-Ops" }, "network-operators": { "users": "cn=network_operators,ou=AAP,dc=example,dc=com", "remove": true, "organization":
"Network-Ops" } }'
# - name: AUTH_LDAP_REQUIRE_GROUP
# value: "cn=satellite-qe,ou=adhoc,ou=managedGroups,dc=example,dc=com"
# # Next name helps fetch Email addr and name from LDAP and save it in tower user.
Expand Down Expand Up @@ -103,9 +72,6 @@ controller_settings_individuale:
# }
# }'




# - name: AUTH_LDAP_1_USER_SEARCH
# value: '[ "OU=AAP,DC=example,DC=com","SCOPE_SUBTREE", "(sAMAccountName=%(user)s) ]"'
# - name: AUTH_LDAP_1_SERVER_URI
Expand All @@ -129,18 +95,18 @@ controller_settings_individuale:

# Next name helps each sat-qe-infra group to become superuser in tower as soon as they login
# - name: AUTH_LDAP_1_USER_FLAGS_BY_GROUP
# value: "{u'is_superuser': ['cn=sat-qe-infra,ou=adhoc,ou=managedGroups,dc=example,dc=com']}"
# value: "{u'is_superuser': ['cn=sat-qe-infra,ou=adhoc,ou=managedGroups,dc=example,dc=com']}"
# This maps all users to satellite-qe org and makes sure they are not part of satlab-admin

# --- Logging ---
# --- Logging ---
- name: LOG_AGGREGATOR_HOST
value: "https://192.168.57.1:8088/services/collector/event"
value: https://192.168.57.1:8088/services/collector/event

- name: LOG_AGGREGATOR_PORT
value: null
value:

- name: LOG_AGGREGATOR_TYPE
value: "splunk"
value: splunk

- name: LOG_AGGREGATOR_USERNAME
value: ""
Expand All @@ -158,7 +124,7 @@ controller_settings_individuale:
value: false

- name: LOG_AGGREGATOR_PROTOCOL
value: "https"
value: https

- name: LOG_AGGREGATOR_TCP_TIMEOUT
value: "10"
Expand All @@ -167,9 +133,8 @@ controller_settings_individuale:
value: false

- name: LOG_AGGREGATOR_LEVEL
value: "DEBUG"
value: DEBUG
# DEBUG, WARNING, INFO

- name: API_400_ERROR_LOG_FORMAT
value: "status {status_code} received by user {user_name} attempting to access {url_path} from {remote_addr}"
...
value: status {status_code} received by user {user_name} attempting to access {url_path} from {remote_addr}
Original file line number Diff line number Diff line change
Expand Up @@ -9,4 +9,3 @@ aap_teams:
organization: XYZCorp-CaC
- name: cac-admins
organization: XYZCorp-CaC
...
Original file line number Diff line number Diff line change
Expand Up @@ -6,4 +6,3 @@ aap_teams:

- name: network-operators
organization: Network-Ops
...
Loading