diff options
Diffstat (limited to 'ansible_collections/dellemc/openmanage')
216 files changed, 8333 insertions, 5357 deletions
diff --git a/ansible_collections/dellemc/openmanage/.github/CODEOWNERS b/ansible_collections/dellemc/openmanage/.github/CODEOWNERS index c19af9b2e..d131d6f34 100644 --- a/ansible_collections/dellemc/openmanage/.github/CODEOWNERS +++ b/ansible_collections/dellemc/openmanage/.github/CODEOWNERS @@ -7,6 +7,7 @@ # be requested for review when someone opens a pull request. # order is alphabetical for easier maintenance. # +# Abhishek Kumar Sinha (Abhishek.Sinha10@Dell.com) # Anirudh Kumar (Anirudh_Kumar1@Dell.com) # Anooja Vardhineni (Anooja_Vardhineni@Dellteam.com) # Chris Clonch (cacack) @@ -16,13 +17,16 @@ # Husniya Hameed (husniya-hameed) # Jagadeesh N V (jagadeeshnv) # Jaya Gupta (Jaya_Gupta@Dell.com) +# Kritika Bhateja (Kritika.Bhateja@Dell.com) +# Lovepreet Singh (Lovepreet.Singh1@dell.com) # Mario Lenz (mariolenz) # Rajeev Arakkal (rajeevarakkal) # Rajshekar P (rajshekarp87) # Sachin Apagundi (sachin-apa) # Sajna N Shetty (Sajna-Shetty) # Sachin Kumar (Sachin_Kumar12@Dell.com) +# Shivam Sharma (Shivam.Sharma3@Dell.com) # Vasanth Ds (Vasanth_Sathyanaraya@Dell.com) # for all files: -* @sachin-apa @jagadeeshnv @felixs88 +* @sachin-apa @felixs88 @ABHISHEK-SINHA10 @Kritika-Bhateja-03 @rajshekarp87 @ShivamSh3 @singh-lovepreet1 diff --git a/ansible_collections/dellemc/openmanage/CHANGELOG.rst b/ansible_collections/dellemc/openmanage/CHANGELOG.rst index 1620e6974..6a6f070c0 100644 --- a/ansible_collections/dellemc/openmanage/CHANGELOG.rst +++ b/ansible_collections/dellemc/openmanage/CHANGELOG.rst @@ -4,6 +4,49 @@ Dell OpenManage Ansible Modules Release Notes .. contents:: Topics +v9.3.0 +====== + +Release Summary +--------------- + +- The ``ome_session`` module is added to allow you to create and delete the sessions on OpenManage Enterprise and OpenManage Enterprise Modular. +- Added support to use session ID for authentication of iDRAC, OpenManage Enterprise and OpenManage Enterprise Modular modules. +- Added time_to_wait option in ``idrac_storage_volume`` module. +- Added support for Python 3.12. + +Major Changes +------------- + +- Added support to use session ID for authentication of iDRAC, OpenManage Enterprise and OpenManage Enterprise Modular. +- ome_session - This module allows you to create and delete the sessions on OpenManage Enterprise and OpenManage Enterprise Modular. + +Minor Changes +------------- + +- Added support for Python 3.12. +- Added time_to_wait option in ``idrac_storage_volume`` module. + +Bugfixes +-------- + +- Resolved the issue in ``idrac_certificates`` module where subject_alt_name parameter was only accepting first item in list. (https://github.com/dell/dellemc-openmanage-ansible-modules/issues/584) +- Resolved the issue in ``idrac_virtual_media`` module where the Authorization request header was included in the request. (https://github.com/dell/dellemc-openmanage-ansible-modules/issues/612) +- Resolved the issue in ``ome_application_certificate`` module related to a padding error in generated CSR file. (https://github.com/dell/dellemc-openmanage-ansible-modules/issues/370) + +Known Issues +------------ + +- idrac_diagnostics - Issue(285322) - This module doesn't support export of diagnostics file to HTTP and HTTPS share via SOCKS proxy. +- idrac_firmware - Issue(279282) - This module does not support firmware update using HTTP, HTTPS, and FTP shares with authentication on iDRAC8. +- idrac_storage_volume - Issue(290766) - The module will report success instead of showing failure for new virtual creation on the BOSS-N1 controller if a virtual disk is already present on the same controller. +- ome_diagnostics - Issue(279193) - Export of SupportAssist collection logs to the share location fails on OME version 4.0.0. +- ome_smart_fabric_uplink - Issue(186024) - The module supported by OpenManage Enterprise Modular, however it does not allow the creation of multiple uplinks of the same name. If an uplink is created using the same name as an existing uplink, then the existing uplink is modified. + +New Modules +----------- + +- dellemc.openmanage.ome_session - This module allows you to create and delete sessions on OpenManage Enterprise and OpenManage Enterprise Modular. v9.2.0 ====== @@ -494,7 +537,6 @@ Release Summary Gather facts from iDRAC and Deploy operating system is added. - Plugin OME inventory is enhanced to support the environment variables for the input parameters. - Known Issues ------------ diff --git a/ansible_collections/dellemc/openmanage/FILES.json b/ansible_collections/dellemc/openmanage/FILES.json index cd6b8725e..463de8c02 100644 --- a/ansible_collections/dellemc/openmanage/FILES.json +++ b/ansible_collections/dellemc/openmanage/FILES.json @@ -8,3352 +8,3268 @@ "format": 1 }, { - "name": ".ansible-lint", + "name": "LICENSE", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "b1faa2fe6cb8f8029a0aae03332dc309e5144309c0a7ae2df24c25727e6f70cf", + "chksum_sha256": "3972dc9744f6499f0f9b2dbf76696f2ae7ad8af9b23dde66d6af86c9dfb36986", "format": 1 }, { - "name": ".github", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "requirements.txt", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "6f0f045a08a6f73f1903309c1636aefca64bad5073cf5e1b3d092f0f4fc1806b", "format": 1 }, { - "name": ".github/CODEOWNERS", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "22c50cccda3a7ff5dcb7285a2bfebca1428e8b6b355f3f376072bffbb12f6c5b", + "name": "roles", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": ".github/ISSUE_TEMPLATE", + "name": "roles/idrac_server_powerstate", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": ".github/ISSUE_TEMPLATE/ask_a_question.md", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "e172d0ed215d9561ccf644c10a0f7fb5ea722a427ff13741f8634053d62a9338", + "name": "roles/idrac_server_powerstate/meta", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": ".github/ISSUE_TEMPLATE/bug_report.yml", + "name": "roles/idrac_server_powerstate/meta/argument_specs.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "56f4cdaffe4a97636427b91eb59acb67bc92f869451d137308428771d48e6aad", + "chksum_sha256": "689583bd8c529dfe982c3dcdf84e968eeee49eea7da2eac65ad34f74afc2dd3c", "format": 1 }, { - "name": ".github/ISSUE_TEMPLATE/config.yml", + "name": "roles/idrac_server_powerstate/meta/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "155b8ff8561f87047a5e2cebac1737edfbba156c21cc733fe636d84ca222d627", + "chksum_sha256": "f1119ecdb9b37bfa6f3860f8c767174cca920a521a95946f04a93f5c2ca4cd0e", "format": 1 }, { - "name": ".github/ISSUE_TEMPLATE/feature_request.md", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "e15deb214aa7cb6847890eb95491e027c021b7f1ec01c7fbda8dca021d1162a0", + "name": "roles/idrac_server_powerstate/vars", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": ".github/PULL_REQUEST_TEMPLATE.md", + "name": "roles/idrac_server_powerstate/vars/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "186d97efed69e2211f154847a8ac52f263fa54319620bf1dcea00b59f494a969", + "chksum_sha256": "f92fe5299b10e093b76f7527715368bf5d9a243323f74a69b3a74bc75b172886", "format": 1 }, { - "name": ".github/workflows", + "name": "roles/idrac_server_powerstate/molecule", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": ".github/workflows/ansible-test.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "d797937de9e579f1ecc980d7db21d2e3d36055f4212cad8103d4dba0d7d140cd", - "format": 1 - }, - { - "name": ".gitignore", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "3f8be16c6a53d1a7c659b0a9803866e10395d5fa466d557f8e8089e3a26cf0c3", + "name": "roles/idrac_server_powerstate/molecule/nmi", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "LICENSE", + "name": "roles/idrac_server_powerstate/molecule/nmi/molecule.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "3972dc9744f6499f0f9b2dbf76696f2ae7ad8af9b23dde66d6af86c9dfb36986", + "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "bindep.txt", + "name": "roles/idrac_server_powerstate/molecule/nmi/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "76c27d1138b5331a2bfb3b8b7e92c70cc39fd1fe793a48117b54ce2649cd7b1f", + "chksum_sha256": "c163e9d4d92dfc89ad31c68ee2172162ce2cf9f2c8c1a65f28d5f42437bbc90d", "format": 1 }, { - "name": "changelogs", + "name": "roles/idrac_server_powerstate/molecule/on", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "changelogs/.plugin-cache.yaml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "a52aa92b1346f5c730d603464c8f20375eaead759c3524f64cd876eea4f3ecc4", - "format": 1 - }, - { - "name": "changelogs/config.yaml", + "name": "roles/idrac_server_powerstate/molecule/on/molecule.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "c00012f627317aec0a7b0b4db3da8c43eb7eb63188eb3f7ee8c2319692aab2d7", + "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "changelogs/changelog.yaml", + "name": "roles/idrac_server_powerstate/molecule/on/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "743a69fffd94987fc63c58c728271c10cd363eff555161aef6d6a45d70300b3d", + "chksum_sha256": "d71c25f25f9e3ba08d70dd9f7dc33d304e69950e6245781aeb8ed71ac00d23d1", "format": 1 }, { - "name": "docs", + "name": "roles/idrac_server_powerstate/molecule/forcerestart", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "docs/ADDITIONAL_INFORMATION.md", + "name": "roles/idrac_server_powerstate/molecule/forcerestart/molecule.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "83c4a24d8d137a954c891ffcc1c75a8157d7957204a59797c5fd4a9dfd3326da", + "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "docs/BRANCHING.md", + "name": "roles/idrac_server_powerstate/molecule/forcerestart/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "347e9f1d9850cbb807f3ac5680a4db0145a90f6714ee23c2d9ea3618806c8609", + "chksum_sha256": "1fc6007dac86a8108d44f5d57cafbbedd7f31ec317258a090cdd20ca7338d5d7", "format": 1 }, { - "name": "docs/CODE_OF_CONDUCT.md", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "b115034e51a649fda55572de32880b12224311bc35517d0534de26223683230a", + "name": "roles/idrac_server_powerstate/molecule/gracefulrestart", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "docs/COMMITTER_GUIDE.md", + "name": "roles/idrac_server_powerstate/molecule/gracefulrestart/molecule.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "9faa99978e41d71c8f84fb1e764ab495075c57e81c8a26edcf0bd41bdedda326", + "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "docs/CONTRIBUTING.md", + "name": "roles/idrac_server_powerstate/molecule/gracefulrestart/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "ffe89c3652d21757f689570ac1a14eaa4dc6e35bc99793f48e6eef21d2b84d54", + "chksum_sha256": "495911d67e2d1421a451dc2ecc4d52705486791f8be17321134fd2d91fb4aa9b", "format": 1 }, { - "name": "docs/DEBUG.md", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "9b2ce4f68fc99226b34a0ebced6fd1919f514f0a33c877b377566b146972d4b6", + "name": "roles/idrac_server_powerstate/molecule/default", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "docs/DOCUMENTATION.md", + "name": "roles/idrac_server_powerstate/molecule/default/molecule.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "d79a78be68eeb1be24c29a4d65bb253a1c90f43eaefc661d402e3bab0b5b37f3", + "chksum_sha256": "f3f5fdbd0243581c13e09c4a9347c3197712b89de7ccf5c19bf040002a8e0967", "format": 1 }, { - "name": "docs/ISSUE_TRIAGE.md", + "name": "roles/idrac_server_powerstate/molecule/default/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "25dd3183365794c152fe138272727efcded3456422c5dc16c18f2b31a8f2ab16", + "chksum_sha256": "8790919530e9b792ac0a0bb5aa7f39756369e469fdcdead5ed849377be400f55", "format": 1 }, { - "name": "docs/MAINTAINERS.md", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "480717a42cbfbb59ee6afb30d1df16f4e6f586b1375a262ba2c87032811fb929", + "name": "roles/idrac_server_powerstate/molecule/forceoff", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "docs/SECURITY.md", + "name": "roles/idrac_server_powerstate/molecule/forceoff/molecule.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "b4bcf55efb2913e91247bcbc9e2944cd6bdca0c80a2f6314dbd62802b167f3c0", + "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "docs/SUPPORT.md", + "name": "roles/idrac_server_powerstate/molecule/forceoff/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "cd2fd536176f16d1722ee4fb035b8c8a7b92d77395a8fd6b74f56a9dc5cb3d86", + "chksum_sha256": "8d81e28400e1ecd4d4f63e3880ad12efcad626f1b482aea24e3781db13463872", "format": 1 }, { - "name": "docs/modules", + "name": "roles/idrac_server_powerstate/molecule/gracefulshutdown", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "docs/modules/dellemc_configure_idrac_eventing.rst", + "name": "roles/idrac_server_powerstate/molecule/gracefulshutdown/molecule.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "15a235619160acc869ef11202c81b3d702762fe22e7796a8f7dd2f09f8fe2036", + "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "docs/modules/dellemc_configure_idrac_services.rst", + "name": "roles/idrac_server_powerstate/molecule/gracefulshutdown/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "c5da2d61f8d536f4835cad6c0b11619759d47177e8121c5f52a605ae6698239d", + "chksum_sha256": "fb25fbf9767297093fc2c5fcb74c38fdae2de2870dd4a7f1d264e32ab3fd2f34", "format": 1 }, { - "name": "docs/modules/dellemc_idrac_lc_attributes.rst", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "0be40c9b7e8fe75321a78edeac8f5d8e38c425ea93b85a2da535de9e6615a851", + "name": "roles/idrac_server_powerstate/molecule/powercycle", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "docs/modules/dellemc_idrac_storage_volume.rst", + "name": "roles/idrac_server_powerstate/molecule/powercycle/molecule.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8c37ba05337b65851c5996643e77bf4c4e29165693f840e39c8b4e837c70ca1b", + "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "docs/modules/dellemc_system_lockdown_mode.rst", + "name": "roles/idrac_server_powerstate/molecule/powercycle/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "2868bb81a87c50614180c0615c9b3203ba6fdbca3401b447e6feee7f55e78ca4", + "chksum_sha256": "be3e16e9141db31d632e532d034f33ed6d72a9151f1c3194080d16b1ab4961f2", "format": 1 }, { - "name": "docs/modules/idrac_attributes.rst", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "595a9dd30f4ba4e0a770c5be1df3a46031bf16435b7b3c402d192d2fee03f9dd", + "name": "roles/idrac_server_powerstate/molecule/pushpowerbutton", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "docs/modules/idrac_bios.rst", + "name": "roles/idrac_server_powerstate/molecule/pushpowerbutton/molecule.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "f6f031a7525fb6bd815beb1b5046f439b8d77b0fc196ea5883ee750b625f9839", + "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "docs/modules/idrac_boot.rst", + "name": "roles/idrac_server_powerstate/molecule/pushpowerbutton/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "ecd08d41158980bb9feb767b6bb8c1ec198d18835d2f740be86ba0509810c864", + "chksum_sha256": "e4566f9dc07e3d658986932a9190fadcd98950e65e54829810aac38898b43e77", "format": 1 }, { - "name": "docs/modules/idrac_certificates.rst", + "name": "roles/idrac_server_powerstate/README.md", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "10f8fcb9881c004e3fb57910fc5abb181c4b64b10a6c517ad71fc9f5fcdf1989", + "chksum_sha256": "241acc485326568db77e4c7c6aa738605779ea7949337b58425a58cd2d26bfc5", "format": 1 }, { - "name": "docs/modules/idrac_firmware.rst", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "cdab71f3484273cc4cb5102504a66c4e192315bbbdae56f49f62a56a956e4330", + "name": "roles/idrac_server_powerstate/defaults", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "docs/modules/idrac_firmware_info.rst", + "name": "roles/idrac_server_powerstate/defaults/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "7721e7d37e42c9c633a151701459650ffea7ec5473fb60cab1baea0dabd5cbb3", + "chksum_sha256": "016ff520beef55bf26d90d19c4ff8187fcf861cc6697999b71d4c756e8cd1af4", "format": 1 }, { - "name": "docs/modules/idrac_license.rst", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "bf8bb22e1c12abed8dfe74e3eb68d33ff2f5dfadde8c3336e00272e6920078c7", + "name": "roles/idrac_server_powerstate/tasks", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "docs/modules/idrac_lifecycle_controller_job_status_info.rst", + "name": "roles/idrac_server_powerstate/tasks/init.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "acc28fe56cb9951a42e2a509ed99904697406a3040d4b40e87e5aa87b0a64ee8", + "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "docs/modules/idrac_lifecycle_controller_jobs.rst", + "name": "roles/idrac_server_powerstate/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "cb9ae6a91089f33685ff3774ee97ace1e4cff6eb393d9456666a35f19db3d142", + "chksum_sha256": "28a5dd2d4dd0c53d832afbc13fc43dd71180b4d8579e5e37d62073e2fa51ce07", "format": 1 }, { - "name": "docs/modules/idrac_lifecycle_controller_logs.rst", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "2da2f71d6dd23d5feed5e67935caf3de9fc1f37fbec3f390ce09c04a01be3082", + "name": "roles/idrac_server_powerstate/handlers", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "docs/modules/idrac_lifecycle_controller_status_info.rst", + "name": "roles/idrac_server_powerstate/handlers/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "68af30f4831b0eda2e449b16c60c11b93c542432bf1745ee3a77c320f61e56c4", + "chksum_sha256": "8fb9435cbde9641256ffb3cad4e82e8169969ecf0faebed24c6e1eca315a17c6", "format": 1 }, { - "name": "docs/modules/idrac_network.rst", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "0d0088371f009e142aec401b6e9233e200ac68c2d5986e2c2369e8eb8424a306", + "name": "roles/idrac_server_powerstate/tests", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "docs/modules/idrac_network_attributes.rst", + "name": "roles/idrac_server_powerstate/tests/inventory", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "fd8281ba848e85640dfb98c566358c8d258168c999098c457ecca0d1c045ad32", + "chksum_sha256": "e02233819b1a09844410549191813f7cc7ba360f21298578f4ba1727a27d87fc", "format": 1 }, { - "name": "docs/modules/idrac_os_deployment.rst", + "name": "roles/idrac_server_powerstate/tests/test.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "7b7ddf54fe21917b967f0ffd6bd81e05f799ce8ae356e150dd4c317a65b22d23", + "chksum_sha256": "a60392a56123662801eb3957572a4c57d858026c0c0222d8e7a3b2c04a24c5f1", "format": 1 }, { - "name": "docs/modules/idrac_redfish_storage_controller.rst", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "cd01363e3a17bbc7a0210fd2c7402ce4cc66ec6a0d786d9a0569daf9bfa877c3", + "name": "roles/idrac_user", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "docs/modules/idrac_session.rst", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "b76827433fbcff22ddf95bc5632868b72cf395f419840c4e12d5373142c0f72c", + "name": "roles/idrac_user/meta", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "docs/modules/idrac_server_config_profile.rst", + "name": "roles/idrac_user/meta/argument_specs.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "3163bc9948b760abb5c2eb6e5af336417c5a1fb2296f795d1c46db4676de674c", + "chksum_sha256": "be066c11750b38f72617e0d31f8c107f945bb65448118a94bdb923a80babb2c0", "format": 1 }, { - "name": "docs/modules/idrac_syslog.rst", + "name": "roles/idrac_user/meta/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "7230d44ecb0bb2901ff2e42191b6a4a59e471c258f0cd930ae98065bd2f61123", + "chksum_sha256": "36cbc64418daec070e7d63dcecf4ec4e7be341ef8a7661b9c5487e8903a48c2c", "format": 1 }, { - "name": "docs/modules/idrac_system_info.rst", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "c69ff9e0600ac8b497816051f7ff2c59e434b15cd89c8456a30065923900380a", + "name": "roles/idrac_user/vars", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "docs/modules/idrac_timezone_ntp.rst", + "name": "roles/idrac_user/vars/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e02646c6841f8212f8869ac5c125e9daf54038c78ef86388946023ab1479bfe9", + "chksum_sha256": "71a5ee7c5ff8f63dcdb4c815fd75a8694be391c701903e8297b8e3eecf83d12d", "format": 1 }, { - "name": "docs/modules/idrac_user.rst", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "9282d3b21e78c2282d625e7ef011ccbf10f988855c5bf0e58408a179135360e2", + "name": "roles/idrac_user/molecule", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "docs/modules/idrac_user_info.rst", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "dbfd54f283705a64cc6a84da5dbfba7673d8d12e0a1a49cfa01f8dbfd376958b", + "name": "roles/idrac_user/molecule/default", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "docs/modules/idrac_virtual_media.rst", + "name": "roles/idrac_user/molecule/default/molecule.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "b7a27e6acb73cf51ab56187d2d1f10810fb5c9721ec1faae4d3d003fd72244e4", + "chksum_sha256": "13fc1cf138058346df47e0863e038de0d6a3fe59cf9ce35d2af2d872f237444c", "format": 1 }, { - "name": "docs/modules/ome_active_directory.rst", + "name": "roles/idrac_user/molecule/default/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "550f341e2ef2ec6078ca235bde879963c7bf97185824f9b7d21e7034ff6177ee", + "chksum_sha256": "6b58bbd18e562ced8fbaccd5a23d479b69b4bec8659d246d62de5c135b291dcc", "format": 1 }, { - "name": "docs/modules/ome_alert_policies.rst", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "cc865e63694540cecbd0212211fdd061a39bef5eb1405087e5e091dba8955289", + "name": "roles/idrac_user/molecule/TC-152148", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "docs/modules/ome_alert_policies_actions_info.rst", + "name": "roles/idrac_user/molecule/TC-152148/prepare.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e4d6f52e980cb1836d1ca7c5352bf17c04acc5462fbd949bdd46b0f80b575509", + "chksum_sha256": "06c0f8c4fb2670cc81d9f1cfbd7d0664c88249ec23d5d0c35bc4177da0fd296c", "format": 1 }, { - "name": "docs/modules/ome_alert_policies_category_info.rst", + "name": "roles/idrac_user/molecule/TC-152148/molecule.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "d4b8d6a58969d476a4699531df99e0a2137437a65f8564b722e99618d7f74fc3", + "chksum_sha256": "58ffd7e1cf3dfebbc59c5e0ee4062434ecf4f0c76969a060fc207ea06905e906", "format": 1 }, { - "name": "docs/modules/ome_alert_policies_info.rst", + "name": "roles/idrac_user/molecule/TC-152148/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "a202372a436597ad619380b934da694ad1a1d175566ebfcfb03e177ae9a8d142", + "chksum_sha256": "38da55bda10bc1de8eb098d795abe2588f27159b217e6c3157c5396273916e02", "format": 1 }, { - "name": "docs/modules/ome_alert_policies_message_id_info.rst", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "428d10ae4bd13d877782495244086220166d69a939d99b112ac09c03bd787eaf", + "name": "roles/idrac_user/molecule/TC-152120", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "docs/modules/ome_application_alerts_smtp.rst", + "name": "roles/idrac_user/molecule/TC-152120/molecule.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "a00fbbcff1e1de06909d434ad763b6f1497e9acaf617041a9f5de38f0c44a21b", + "chksum_sha256": "58ffd7e1cf3dfebbc59c5e0ee4062434ecf4f0c76969a060fc207ea06905e906", "format": 1 }, { - "name": "docs/modules/ome_application_alerts_syslog.rst", + "name": "roles/idrac_user/molecule/TC-152120/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "18605643bc8d76ca3804e19686f96f0450abe023a0914e587be8434812d5c2e6", + "chksum_sha256": "600419dfff67b4f0e13aceef503059c3573db9322dc487db74440b6489e93177", "format": 1 }, { - "name": "docs/modules/ome_application_certificate.rst", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "788a9fd904afaa8824f07b0668d0b5d04acb05db3ad81c47fe3f671dc2405592", + "name": "roles/idrac_user/molecule/TC-152150", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "docs/modules/ome_device_local_access_configuration.rst", + "name": "roles/idrac_user/molecule/TC-152150/prepare.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "d1166a89877d55ff1b942027f2027cd5509c8270f62ba4f5f1824317789f90b8", + "chksum_sha256": "f5f0a568105643945bdd6b58bf10914d1a66c46130e7ee8f4ffa7b70f0c387c7", "format": 1 }, { - "name": "docs/modules/ome_application_network_address.rst", + "name": "roles/idrac_user/molecule/TC-152150/molecule.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "b9b03c1fa75d1bb56a672dd5b59d0736a33580f5e6c51f4d0707f1cb27812ce6", + "chksum_sha256": "58ffd7e1cf3dfebbc59c5e0ee4062434ecf4f0c76969a060fc207ea06905e906", "format": 1 }, { - "name": "docs/modules/ome_application_network_proxy.rst", + "name": "roles/idrac_user/molecule/TC-152150/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "b3ad1795dd6d386e0ec41d6a30af7f35d6abff67c25f84a938b22d5cb56de4d3", + "chksum_sha256": "6220849df8cee2230b06defb296fc7569be79bff4e9f2e53dfc4c0ff4f108708", "format": 1 }, { - "name": "docs/modules/ome_application_network_settings.rst", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "913d8eb24f87c9a6067713fa4de41b6b48f9961831feb38e5829370f84ce6998", + "name": "roles/idrac_user/molecule/TC-152146", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "docs/modules/ome_application_network_time.rst", + "name": "roles/idrac_user/molecule/TC-152146/molecule.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "5f774a1362558799886f5b90831219e7136a0286a335d9c3f2a9924c687b9a56", + "chksum_sha256": "58ffd7e1cf3dfebbc59c5e0ee4062434ecf4f0c76969a060fc207ea06905e906", "format": 1 }, { - "name": "docs/modules/ome_application_network_webserver.rst", + "name": "roles/idrac_user/molecule/TC-152146/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "d2fae7e588d022a7ecbc50be03fbf84eb38e41f49933bb1d5fdd1fc6a398a76a", + "chksum_sha256": "c4fbf2ba3ab40583ae88f9b5b63744498b858acb41a33bb75a882f0974b47b3d", "format": 1 }, { - "name": "docs/modules/ome_application_security_settings.rst", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "4ea4e898cab891699e9006122e6a8ba9a70d20c299da60742ff397a6916137f4", + "name": "roles/idrac_user/molecule/TC-152147", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "docs/modules/ome_chassis_slots.rst", + "name": "roles/idrac_user/molecule/TC-152147/molecule.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "7c4d578297728a799abe5ffd7dba313380895513a565107438a17a55ee431866", + "chksum_sha256": "13fc1cf138058346df47e0863e038de0d6a3fe59cf9ce35d2af2d872f237444c", "format": 1 }, { - "name": "docs/modules/ome_configuration_compliance_baseline.rst", + "name": "roles/idrac_user/molecule/TC-152147/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "7715d2c934990d7048614a5fcd3319e79bedcb9a0cbbc3632b2f56fff566dba1", + "chksum_sha256": "1096107ae7f0281cbc4f43477562d8c9709ceb968ee5058b5880afb035cfac59", "format": 1 }, { - "name": "docs/modules/ome_configuration_compliance_info.rst", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "3354f92e90c63162cd9e77c0d125a47e9c831b056ec44dfb2056a305e93a0891", + "name": "roles/idrac_user/molecule/resources", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "docs/modules/ome_device_group.rst", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "558d22aaf32ef3df83d9da91a3e6c0b4d3f07d2ceeedd5e3879156dcfe1a0d55", + "name": "roles/idrac_user/molecule/resources/idrac_user", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "docs/modules/ome_device_info.rst", + "name": "roles/idrac_user/molecule/resources/idrac_user/cleanup.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "053b25f1b3afd23790b7f8fdbfe965422848f7da3fd28a864e0b63e469daa386", + "chksum_sha256": "291fe02f4f127b148c6bc9a2325d06c7e6497f4c853152a7fc42f3c5ccf479e5", "format": 1 }, { - "name": "docs/modules/ome_devices.rst", + "name": "roles/idrac_user/molecule/resources/idrac_user/get_user_info.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "83328a82404890d15c1d5b6bdd0e8bfac5c9aca355fa3df468bdc744622fc439", + "chksum_sha256": "6e080f7169503086fc1e8fc4e4fa95e56a0dd39403fe183f086ad9770ded41e2", "format": 1 }, { - "name": "docs/modules/ome_device_location.rst", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "ef6e85e39bfc4de890bcf9168816ec761aaa2692b850f634e1286a329ccef81d", + "name": "roles/idrac_user/molecule/TC-152149", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "docs/modules/ome_device_mgmt_network.rst", + "name": "roles/idrac_user/molecule/TC-152149/prepare.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "1b887414a02438629a3acc83ecd225f6573293cf81aff71215c9e7a47b7a83fb", + "chksum_sha256": "6018b3098204f927d9412e33103fb6cc93847ba09cd25a01df104efe45037753", "format": 1 }, { - "name": "docs/modules/ome_device_network_services.rst", + "name": "roles/idrac_user/molecule/TC-152149/molecule.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "61099f10bb3e80e56332bacf60f4f6dda3be03a0d5bae8c9945de89b2ae98ef1", + "chksum_sha256": "58ffd7e1cf3dfebbc59c5e0ee4062434ecf4f0c76969a060fc207ea06905e906", "format": 1 }, { - "name": "docs/modules/ome_device_power_settings.rst", + "name": "roles/idrac_user/molecule/TC-152149/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "515913e4e4658681b8cc5cf7da7fd70112d64a74acacb1ed3539a10b0e3dc34e", + "chksum_sha256": "20d79a5f4a9dafe606d8b6cde2accf782af12b9f1781f5df0682b93fcdf16ddf", "format": 1 }, { - "name": "docs/modules/ome_device_quick_deploy.rst", + "name": "roles/idrac_user/README.md", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "87e3c3bc99c687465681a9ab0001ab2fae508969f750fb1cd3fc475db7fd8491", + "chksum_sha256": "369f4ae5faa868c85788d6df11bf9446ae9fb5ed5d3c9f2808ed9e84cbc06c1a", "format": 1 }, { - "name": "docs/modules/idrac_reset.rst", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "3fd35275a4b04236ac8166c50d34316ac0568d857e2a031478f31700458bb6c0", + "name": "roles/idrac_user/defaults", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "docs/modules/ome_diagnostics.rst", + "name": "roles/idrac_user/defaults/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "a6ac0f361b89eb6beb02b3288b1b11dbd263d6a2ef624cd1d564872a1df96433", + "chksum_sha256": "6ab3a9e6149fca242c0436f5630a97a2063f6232f42a9df4482b3977471d0be3", "format": 1 }, { - "name": "docs/modules/ome_discovery.rst", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "fb562eaadab71e87fedaf360f12cfb9b5676b43fdd5584fd61d53ec61c38280c", + "name": "roles/idrac_user/tasks", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "docs/modules/ome_domain_user_groups.rst", + "name": "roles/idrac_user/tasks/present.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e6f655e0ac9dfe1fafaf7ea9e9e9cdbebe2c2efa5c314852427376c3b1775f7e", + "chksum_sha256": "31094d92ad1e121dfb3f27d6dc0e8fdf471ee01b2168ba2cfbd66078dd0054c0", "format": 1 }, { - "name": "docs/modules/ome_firmware.rst", + "name": "roles/idrac_user/tasks/absent.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "ddee2a12586396c8678b11cc1ae1e1dfe2a04c87e43f4c31325d16ddd78d4423", + "chksum_sha256": "6fcebf5c4162fe906c18e2babb948835808726952abe198cc14caaaee1454546", "format": 1 }, { - "name": "docs/modules/ome_firmware_baseline.rst", + "name": "roles/idrac_user/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "a4d5b803ac5016911fd4bc3ad926861e93bc73eee282a40bea3dd2a55158c15d", + "chksum_sha256": "cdf0aed407cb791aaabd992919f0d1449b6199b9fe04fe1ccdee43c7e8a3ef67", "format": 1 }, { - "name": "docs/modules/ome_firmware_baseline_compliance_info.rst", + "name": "roles/idrac_user/tasks/get_user.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "0811710e22209c9e995c81a9d263cacf9639d33c3ea3f8c2d9bb0fe40e90f102", + "chksum_sha256": "7250bb2b6723ad29148ec605badbcc828f6656088ceaa7f4ad02b46dc4aa25dc", "format": 1 }, { - "name": "docs/modules/ome_firmware_baseline_info.rst", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "735740831ade31895dbfa49a19cddf12d2d82d3836fc35bfa6e295c34a4f4170", + "name": "roles/idrac_user/handlers", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "docs/modules/ome_firmware_catalog.rst", + "name": "roles/idrac_user/handlers/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "04484a34dec1e25ef3444e0258b612f71aab29bbbee70c07145740c00ac760fe", + "chksum_sha256": "00a6e4df8f9fe8c7b2be5ed666c8a779836b8bdd3a57736d81729e080d52d27b", "format": 1 }, { - "name": "docs/modules/ome_groups.rst", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "aaaf374a259564074eced1eefc734fd65c19803f8a4557262f78aefc30adcc41", + "name": "roles/idrac_user/tests", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "docs/modules/ome_identity_pool.rst", + "name": "roles/idrac_user/tests/inventory", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "6a0a40cc5aefcdd5d4683474015e5bfac0a7902b8fffd1cf79ad1f1f45f105b2", + "chksum_sha256": "e02233819b1a09844410549191813f7cc7ba360f21298578f4ba1727a27d87fc", "format": 1 }, { - "name": "docs/modules/ome_job_info.rst", + "name": "roles/idrac_user/tests/test.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "58c1431a6b58bf1e0c14fe1c461b71887456679aa307a47b9afa7530f024d3c8", + "chksum_sha256": "594b1a865eae9e2fc2a8f2f9daf0872a5c4a6b697af7167eadfb52df1d5009be", "format": 1 }, { - "name": "docs/modules/ome_network_port_breakout.rst", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "2dbfb63ba6660e46088091c3b606befd0a32b9ccacc1455861d973afea3c605c", + "name": "roles/idrac_job_queue", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "docs/modules/ome_network_vlan.rst", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "b586d89ff753eb1590f1b320739791d08b5fdb84f2cd641e91e56d9d275dded1", + "name": "roles/idrac_job_queue/templates", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "docs/modules/ome_network_vlan_info.rst", + "name": "roles/idrac_job_queue/templates/idrac_delete_job_queue_force.j2", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "051c30fcff66703db65f1affd6b5d0694b1624f201ba31fc360d75c66d175a9f", + "chksum_sha256": "b777b52ecc380bc79f8a903a8bd2fb8613e98ea665d41e01efa2532fc9f9ef5b", "format": 1 }, { - "name": "docs/modules/ome_powerstate.rst", + "name": "roles/idrac_job_queue/templates/idrac_delete_job_queue.j2", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "b1e7bd216d6245c298ff31b9e9f09ed3a86f925da0ccd4ffefcbd4435bb3331e", + "chksum_sha256": "f83008a98424af87bd8817bb29a82a175e175a8459146267c86e7cbd1895c31b", "format": 1 }, { - "name": "docs/modules/ome_profile.rst", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "8d4b6451dc04d7e0759759d53e112f0542e380b9ece9756ee59f95f9ee38d511", + "name": "roles/idrac_job_queue/meta", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "docs/modules/ome_profile_info.rst", + "name": "roles/idrac_job_queue/meta/argument_specs.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "f0f891ac994a3dc6f86b8a1cf20bd7f7dca9e59ffbc5a34cdd2980f668e27e36", + "chksum_sha256": "e63d726e475ad59773fa26fe3918bd6cb5b042b508834e49c8c344fbf4945ccd", "format": 1 }, { - "name": "docs/modules/ome_server_interface_profile_info.rst", + "name": "roles/idrac_job_queue/meta/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "a81231f6eb702cad2b4dadc9e328f09207493c95a3c4ddcc26d2bfac6b1a7cdb", + "chksum_sha256": "081550bbea995e8776778cb69f4f3003f5dc9ef2148439bb0ab441f28fd67949", "format": 1 }, { - "name": "docs/modules/ome_server_interface_profiles.rst", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "965b12325e46ccebc57a9e35846325c0abfc8cacc179c09b94c0f2ecd15942df", + "name": "roles/idrac_job_queue/vars", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "docs/modules/ome_smart_fabric.rst", + "name": "roles/idrac_job_queue/vars/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "d0647d3498526246714b4f6baeef18576f44a9cb422b5b4bae3febddc1025fcc", + "chksum_sha256": "12bd53e6ac521d02cf9d16a83ef864467aa1ca7398b0b20e15836de87c74f9cb", "format": 1 }, { - "name": "docs/modules/ome_smart_fabric_info.rst", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "e83b11d41e04c07eb26b4cc125a461fee36c5f88dd67224ce52f13eeab1e280e", + "name": "roles/idrac_job_queue/molecule", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "docs/modules/ome_smart_fabric_uplink.rst", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "9587cc3af635051d2bd261dbfbbefcb7e818fe00b24323cc4795b3dad314fe66", + "name": "roles/idrac_job_queue/molecule/default", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "docs/modules/ome_smart_fabric_uplink_info.rst", + "name": "roles/idrac_job_queue/molecule/default/molecule.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "dc8261cc3a57c431a71cafca0737970c2e56d41b56f3d686563506ed4fc9a9cf", + "chksum_sha256": "f6128fe631d272bed3adb4c98223a2b04d554093dc05a2c499eeb9e6d80c9ac7", "format": 1 }, { - "name": "docs/modules/ome_template.rst", + "name": "roles/idrac_job_queue/molecule/default/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8755b2b7ea80ec6d275153e325ab764ba585c9056a4fe3c4868ce55c55270ab4", + "chksum_sha256": "e0df09c4e425f51cef7082d2a84ab880b9c9b8ab3af909589cbd5234afbb5534", "format": 1 }, { - "name": "docs/modules/ome_template_identity_pool.rst", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "33e0114359d664f81f2dd3740f0cfc1d9a2647a16180993eafe2a2a3138c31dc", + "name": "roles/idrac_job_queue/molecule/delete_job", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "docs/modules/ome_template_info.rst", + "name": "roles/idrac_job_queue/molecule/delete_job/molecule.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "5f082648ad3106f0ff53750f2d0eb4fe802d55898d9229207883428428e4af47", + "chksum_sha256": "f6128fe631d272bed3adb4c98223a2b04d554093dc05a2c499eeb9e6d80c9ac7", "format": 1 }, { - "name": "docs/modules/ome_template_network_vlan.rst", + "name": "roles/idrac_job_queue/molecule/delete_job/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "2d3ac25a1114e76392bb80b3f515c88c5ea32681b2328d65c26e6090c9c048b4", + "chksum_sha256": "15a3cff421befeb73dc678bd03f4ff1ee685ccd48e25ba743b924735955d300c", "format": 1 }, { - "name": "docs/modules/ome_template_network_vlan_info.rst", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "7c2564dcba6d877a3f84518295f5b8819d22a4871b73773069e0490bf70c2c7c", + "name": "roles/idrac_job_queue/molecule/clear_job_queue", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "docs/modules/ome_user.rst", + "name": "roles/idrac_job_queue/molecule/clear_job_queue/molecule.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "0b3bc47a7e05896ce44fa54a0bc32aa9a7caf371fccbbb592883423775ca7864", + "chksum_sha256": "f6128fe631d272bed3adb4c98223a2b04d554093dc05a2c499eeb9e6d80c9ac7", "format": 1 }, { - "name": "docs/modules/ome_user_info.rst", + "name": "roles/idrac_job_queue/molecule/clear_job_queue/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "9d771343ae8d467df5ba57726a24cc02ed665fb3635c45acf89bc15cd761009b", + "chksum_sha256": "f040659df832a82b82f060fe657dcefd0e06f397600604b86b65ba6964e9e338", "format": 1 }, { - "name": "docs/modules/redfish_event_subscription.rst", + "name": "roles/idrac_job_queue/README.md", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "c5598c90fd6fc719915c94c66508e658504044cb929a7176af7812a6a581689b", + "chksum_sha256": "e3e961b7f75abd408cc8ab2d76fab6a3175b32ddca1f3e87c64b009ff8e53daf", "format": 1 }, { - "name": "docs/modules/redfish_firmware.rst", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "147b4be1cb5993f3419161982de26ae9a74a1d1e2dcccca3e6d470b002733f72", + "name": "roles/idrac_job_queue/defaults", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "docs/modules/redfish_firmware_rollback.rst", + "name": "roles/idrac_job_queue/defaults/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "948db5ad72847ed27ab771e8c879021d9e791a70e6296646fc773baf93f54ec2", + "chksum_sha256": "cf4f24cabcc7843106afbcf1ad295d130bc31c4b9431d8e149ef9611ec66f0e4", "format": 1 }, { - "name": "docs/modules/redfish_powerstate.rst", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "d4dbb35bf868492afe99c72b8efe328f4cc916b37169ceddc2f7b1fbb893b332", + "name": "roles/idrac_job_queue/tasks", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "docs/modules/redfish_storage_volume.rst", + "name": "roles/idrac_job_queue/tasks/get_idrac_firmware_version.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "f08222e870ac987aa36b3b1f57b848ad595e876eee376b98bb9450f9a723ab67", + "chksum_sha256": "a193b7f5af28f17972f0da7e52e5fc0ecd34f4b8ae6398bd1b04769a7cffa453", "format": 1 }, { - "name": "docs/modules/idrac_diagnostics.rst", + "name": "roles/idrac_job_queue/tasks/clear_jobs_with_wsman.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "dbabe7fd2ab37c6d7b1ced5ff8d6786bacd77162473c5064ddab94b060378c6b", + "chksum_sha256": "fc5e2cbcef3dffe45fbae0ccdb4310621cde5b940b81f9051ec1039126e894a0", "format": 1 }, { - "name": "docs/modules/idrac_storage_volume.rst", + "name": "roles/idrac_job_queue/tasks/delete_job_with_id.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "d9f99982eda9f2b90ce1ee0eb805a56bc6d97eaa6935efdefefd20584a181ef3", + "chksum_sha256": "5aec3e437d0a24ee7b8a41737abd2db6889a1c4a0c0543943212573d06a2fc83", "format": 1 }, { - "name": "docs/modules/ome_application_console_preferences.rst", + "name": "roles/idrac_job_queue/tasks/clear_jobs_with_api.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "b64935ad594dde5a7496c90891053dbc8b32e21a5d582532bee85dcaf3fea42e", + "chksum_sha256": "32e48bc5f0ceedcf0077e0ab7f6931e5dc1f4c34324aef0957ef440b44f69369", "format": 1 }, { - "name": "docs/ATTRIBUTION.md", + "name": "roles/idrac_job_queue/tasks/validate_input_data.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "0e55990cf8c6c469b4c35f0cf9ba6dd92d89f39d36e8d22f45a939a6edd06c20", + "chksum_sha256": "0c862aa3048f9061f02fff2a55ec1324b7b1c81b6175617d3e739eeda382d7ee", "format": 1 }, { - "name": "docs/EXECUTION_ENVIRONMENT.md", + "name": "roles/idrac_job_queue/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "c853f1c80c075bc775ec977562ae868177567256bef9d69543f6519cfd7b852a", + "chksum_sha256": "edba2b2d2854747abff9b2b993b2ac119117eaa60533c517b5d7586af869d784", "format": 1 }, { - "name": "docs/README.md", + "name": "roles/idrac_job_queue/handlers", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, + "format": 1 + }, + { + "name": "roles/idrac_job_queue/handlers/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "7e931cceff02aadb24f0f4afa56b4e1283505d82cbd41d1f535aabd3a58bf8c9", + "chksum_sha256": "2ae7c77fc2f339f8db094a30043ad551606c6bca9e5bdfbd9e34a79563f7334c", "format": 1 }, { - "name": "meta", + "name": "roles/idrac_job_queue/tests", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "meta/execution-environment.yml", + "name": "roles/idrac_job_queue/tests/inventory", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "565e8d831c58bf2a1f80168b5ee92f526fa5fe48b2ec71a9387371c0d50ca9a9", + "chksum_sha256": "e02233819b1a09844410549191813f7cc7ba360f21298578f4ba1727a27d87fc", "format": 1 }, { - "name": "meta/runtime.yml", + "name": "roles/idrac_job_queue/tests/test.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "dac8ac908fdd6b7bffe4a091c3f443b45716b1bc591e80cae03270731ef62598", + "chksum_sha256": "8898537e0e2c4d23b06938b4e5181cc005b3eedad5c6f3c848c78a8a93f7ad21", "format": 1 }, { - "name": "playbooks", + "name": "roles/idrac_attributes", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "playbooks/idrac", + "name": "roles/idrac_attributes/meta", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "playbooks/idrac/deprecated", + "name": "roles/idrac_attributes/meta/argument_specs.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "f061ffd4298bd768dcb142d03cbdc74c96c5b3e6db84ca86c663f04c4ed083bc", + "format": 1 + }, + { + "name": "roles/idrac_attributes/meta/main.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "0a7e4d3e398ea14415197ac551e718bfc71cce0229df4f4f61a35981096dc47e", + "format": 1 + }, + { + "name": "roles/idrac_attributes/vars", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "playbooks/idrac/deprecated/dellemc_configure_idrac_eventing.yml", + "name": "roles/idrac_attributes/vars/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "333f32a604a8273f9048d333fb835e9717dd561b4583360503885f3ef49cfa41", + "chksum_sha256": "e55a77ecab73769ee48b7cee96d383945f3b74732b244fae6e9b02e0aad3713f", "format": 1 }, { - "name": "playbooks/idrac/deprecated/dellemc_configure_idrac_services.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "82a62b3e894b89054dcc4d01e56614212501a76ed120d0b98c310bb609ef9836", + "name": "roles/idrac_attributes/molecule", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "playbooks/idrac/deprecated/dellemc_idrac_lc_attributes.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "965bcf06720fc6b878fed5cc6d77e64b4830027670406a0de451fb519277b842", + "name": "roles/idrac_attributes/molecule/default", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "playbooks/idrac/deprecated/dellemc_system_lockdown_mode.yml", + "name": "roles/idrac_attributes/molecule/default/molecule.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "d8ec2bdb41b68c6c16783cab302a56739474ba2db2a144340906d83d411d8549", + "chksum_sha256": "1c3ff5ada33af88f7d89035e74a24e9f7ebd0bd1ce9aea711a11e456babcedeb", "format": 1 }, { - "name": "playbooks/idrac/deprecated/idrac_network.yml", + "name": "roles/idrac_attributes/molecule/default/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "75b64d730751d3543b829f7baa60bfe506b5c36a068aad0f52db166c7c6b7f15", + "chksum_sha256": "90489136185f945470e64689324a856f15d9c0584887d89572ced2fda43d7888", "format": 1 }, { - "name": "playbooks/idrac/deprecated/idrac_timezone_ntp.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "7fbea4b5c1db843d6a0091e3b19d96062a724fa1059bbb23651692663386b13d", + "name": "roles/idrac_attributes/molecule/system_attr", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "playbooks/idrac/idrac_attributes.yml", + "name": "roles/idrac_attributes/molecule/system_attr/cleanup.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "335fab9fb27b80e9bb72c6b1b312dc5b344d2f1ae9b6614255f854bc5ca6b3a8", + "chksum_sha256": "2eaa72c7f6eb429b320d8c6340ed73e43509fb9b6396c73001e924be3f4b7183", "format": 1 }, { - "name": "playbooks/idrac/idrac_bios.yml", + "name": "roles/idrac_attributes/molecule/system_attr/molecule.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "2f4892fed0e96b2bd7532645fe590d2ae4456bc1de316b405dceb9ef2c10c8fa", + "chksum_sha256": "f52d711103d50a437830c6fbcd04fb4bab49a0f82f6d26d1c791c6e8488dd090", "format": 1 }, { - "name": "playbooks/idrac/idrac_boot.yml", + "name": "roles/idrac_attributes/molecule/system_attr/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "a3f384d9f351aca517327d735422ff3a7d7e48fd0a8370f9d41dd1da6dd1295b", + "chksum_sha256": "3eef0d294a285ae534ef217c2b07156e28ce8017c57ac02dd3b7d8c71db471bf", "format": 1 }, { - "name": "playbooks/idrac/idrac_boot_virtual_media_workflow.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "542c406f1a42e6130c8c4a75b97a2ea5fbb8f0c0cfeea41e724972855457e486", + "name": "roles/idrac_attributes/molecule/idrac_attr", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "playbooks/idrac/idrac_certificates.yml", + "name": "roles/idrac_attributes/molecule/idrac_attr/cleanup.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "304bead36bc953c79bdb064a6c3372945953d0b6d8addbdc4be45d0e59c51fcc", + "chksum_sha256": "2eaa72c7f6eb429b320d8c6340ed73e43509fb9b6396c73001e924be3f4b7183", "format": 1 }, { - "name": "playbooks/idrac/idrac_firmware.yml", + "name": "roles/idrac_attributes/molecule/idrac_attr/molecule.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "971813db1ea19f8f3e3b9d513f7f15ab2e8015c202323836cb43a3075d0d1b90", + "chksum_sha256": "f52d711103d50a437830c6fbcd04fb4bab49a0f82f6d26d1c791c6e8488dd090", "format": 1 }, { - "name": "playbooks/idrac/idrac_firmware_info.yml", + "name": "roles/idrac_attributes/molecule/idrac_attr/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "eaa3b675ac75e62eead40e8ccab34205de55128cbfdeddac97cff7c1ad7dbbec", + "chksum_sha256": "a7bdba9a94a875c15ec6f83690f3d06fe6c078a228c5c2fecd3c220b344f2cc1", "format": 1 }, { - "name": "playbooks/idrac/idrac_license.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "de01f4b83a795770f2b12c9c3d5fbadeb6f9351334083f5fc21bef71d29609b9", + "name": "roles/idrac_attributes/molecule/lifecycle_controller_attr", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "playbooks/idrac/idrac_lifecycle_controller_job_status_info.yml", + "name": "roles/idrac_attributes/molecule/lifecycle_controller_attr/cleanup.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "453984f1feb8ed3332755cd58dd3b3d13eacf365db73f0a4231e929c28913ec1", + "chksum_sha256": "2eaa72c7f6eb429b320d8c6340ed73e43509fb9b6396c73001e924be3f4b7183", "format": 1 }, { - "name": "playbooks/idrac/idrac_lifecycle_controller_jobs.yml", + "name": "roles/idrac_attributes/molecule/lifecycle_controller_attr/molecule.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "2a3912a6f0afe6778d57a2eed40df6183a3ed2838400a16cfdc2eaa4755ea14d", + "chksum_sha256": "f52d711103d50a437830c6fbcd04fb4bab49a0f82f6d26d1c791c6e8488dd090", "format": 1 }, { - "name": "playbooks/idrac/idrac_lifecycle_controller_logs.yml", + "name": "roles/idrac_attributes/molecule/lifecycle_controller_attr/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "65432bf367476a0dddc30fbfa2ad9bc77a5423daf5dad6518447fc1bea124cd2", + "chksum_sha256": "cf6b840896de4b786ee1a8c174e9c6330883bb9a29f5fad3116c88652328c937", "format": 1 }, { - "name": "playbooks/idrac/idrac_lifecycle_controller_status_info.yml", + "name": "roles/idrac_attributes/README.md", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "faff447c9a135cfba87c04161408d2f9491d42fe85da06223c821a30cd3c611f", + "chksum_sha256": "245dd1c52d38db33b91d948c3a4403bb0739cf172ffd4e63dbe444477c395902", "format": 1 }, { - "name": "playbooks/idrac/idrac_network_attributes.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "b7dd0ba1946e68eacb3df926df9a2f7d8fdc9f922ea4044b304de3945b0af77d", + "name": "roles/idrac_attributes/defaults", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "playbooks/idrac/idrac_os_deployment.yml", + "name": "roles/idrac_attributes/defaults/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "42fc0b056a6282757e5b0be577e896fc6b62ab4ce0ce4c673eec2f99012d12d6", + "chksum_sha256": "ccd23c69bb78d5c4da4314139c4f34ec24adb35d0bdfa16c096e2b5c20f9a8c5", "format": 1 }, { - "name": "playbooks/idrac/idrac_redfish_storage_controller.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "0f12fa63252f024245e3644b89527a023e718107110a8580cc332c8b57c19b22", + "name": "roles/idrac_attributes/tasks", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "playbooks/idrac/idrac_redfish_storage_controller_job_tracking.yml", + "name": "roles/idrac_attributes/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "a417f1624b45912c41ce6f116140e65bdd241cb60473269ee25efc428d5c2cc9", + "chksum_sha256": "0c2023b600b957bbafd3a31e5ec79d21662dffa1fc218927b65078b2b3de54a3", "format": 1 }, { - "name": "playbooks/idrac/idrac_reset_result_tracking.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "1065ba2ac114119031a719e466be0b1cf3d70a05590d7a021855502dc9877f08", + "name": "roles/idrac_attributes/handlers", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "playbooks/idrac/idrac_server_config_profile.yml", + "name": "roles/idrac_attributes/handlers/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "95fbf44d10f20da1cb0a866ec7578e2546e215e535c094b0b0270317eefa8bcb", + "chksum_sha256": "4efd533c8f0a3c63e2ad84713dbb875c27953ade61183e3b98526db8816bbf52", "format": 1 }, { - "name": "playbooks/idrac/idrac_syslog.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "be1eeae26000a909eb88c2f7ae2f45d5c492a0716cca5d56ce8f9e709aefaac9", + "name": "roles/idrac_attributes/tests", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "playbooks/idrac/idrac_system_info.yml", + "name": "roles/idrac_attributes/tests/inventory", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e385033356b74133e34ecdd3aa63f6ad1d134cc5857ad48bd847f4fc6766c350", + "chksum_sha256": "e02233819b1a09844410549191813f7cc7ba360f21298578f4ba1727a27d87fc", "format": 1 }, { - "name": "playbooks/idrac/idrac_user.yml", + "name": "roles/idrac_attributes/tests/test.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "d3aedae3410210ff0893afd6e160929f8e7581a5337928f5ee00f0b89a81a9f9", + "chksum_sha256": "50d768c3b61c1deb820db1bda56cf4a916b4232f9ed448da92035eca8e654b93", "format": 1 }, { - "name": "playbooks/idrac/idrac_user_info.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "5068eb579dea93aca8ef6edab4e4254bc341c00d2ef373cfdffb50a34a64c755", + "name": "roles/redfish_firmware", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "playbooks/idrac/idrac_virtual_media.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "466e5e23ac6ac17de823878df10bc89f90762170e96ca4682626b4ef95d028bc", + "name": "roles/redfish_firmware/meta", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "playbooks/idrac/idrac_diagnostics.yml", + "name": "roles/redfish_firmware/meta/argument_specs.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "f14fa78ada0d1c85ecd18419f0ec1940cbd387af3fd35e78da2e676228ed897e", + "chksum_sha256": "f8553c37be4eecc702220849c497ff5cb9dc0712567fc85d3cbed123c450f89f", "format": 1 }, { - "name": "playbooks/idrac/idrac_storage_volume.yml", + "name": "roles/redfish_firmware/meta/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "739c488df021adb4d9cf2f8843dd4314bdad00f4076e22c2e0580d2d8b08ba7d", + "chksum_sha256": "669ae8e69c647cf300677acbc0990147d93ded846aa44fd40c45664768c9d6c6", "format": 1 }, { - "name": "playbooks/idrac/idrac_reset.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "de8fe2c4ad4c761b39cd3f2f26a33de198d13764460cd4ae48ddc41e3055c129", + "name": "roles/redfish_firmware/vars", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "playbooks/idrac/idrac_session.yml", + "name": "roles/redfish_firmware/vars/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "b0440a47587c5d5ddb9912b53731727e93d0b889c12241594343f919d22f5bda", + "chksum_sha256": "95897ec515cd6dc828104d2b67e61b8842802aec9e73eac05462c52cd111f653", "format": 1 }, { - "name": "playbooks/ome", + "name": "roles/redfish_firmware/molecule", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "playbooks/ome/alert_policy", + "name": "roles/redfish_firmware/molecule/default", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "playbooks/ome/alert_policy/ome_alert_policies.yml", + "name": "roles/redfish_firmware/molecule/default/molecule.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "d0d6be7aa3a27a5adaa464911c691ec919d592384a57a651a23fd377f28df60d", + "chksum_sha256": "f2a39596d4b1e4313eca1a4958921f7d8c57b84115d3f81080704d742edf30b1", "format": 1 }, { - "name": "playbooks/ome/alert_policy/ome_alert_policies_actions_info.yml", + "name": "roles/redfish_firmware/molecule/default/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "d26bc85e086d2fe2560c3b15a0cef97d58380ffa4a670cd86d1521746250d55a", + "chksum_sha256": "12286deeca54ad309b8ad6898fbe72fecbcfd6c35885753b2e8a63de6d2666c1", "format": 1 }, { - "name": "playbooks/ome/alert_policy/ome_alert_policies_category_info.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "cdfb33544a84e3accabf9b330d92733266c8747b56a4a89d0fdfc14d531d9f75", + "name": "roles/redfish_firmware/molecule/negative", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "playbooks/ome/alert_policy/ome_alert_policies_info.yml", + "name": "roles/redfish_firmware/molecule/negative/molecule.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "4ed4df04af14ae90aec17feffb5fb5ce93617856f43b270072e0501328580397", + "chksum_sha256": "f2a39596d4b1e4313eca1a4958921f7d8c57b84115d3f81080704d742edf30b1", "format": 1 }, { - "name": "playbooks/ome/alert_policy/ome_alert_policies_message_id_info.yml", + "name": "roles/redfish_firmware/molecule/negative/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "b98604773e4979bb9807e2652fa6217e3ce2c7414597998a84be4592c9d078c4", + "chksum_sha256": "ca7ab87d800e87cded135f5d6b008e71d7784794dca7aed1c67e87db1cb3d1ad", "format": 1 }, { - "name": "playbooks/ome/application", + "name": "roles/redfish_firmware/molecule/resources", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "playbooks/ome/application/ome_application_alerts_smtp.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "d2eb95a8fcea5239a320840fc4b4ff2321d071a06638ae5d5860651e1b3a4587", - "format": 1 - }, - { - "name": "playbooks/ome/application/ome_application_alerts_syslog.yml", + "name": "roles/redfish_firmware/molecule/resources/cleanup.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "56af4d077ccfe2b4bdb46de7587fbfb03609ff7484108df4840b69d4118d0c2c", + "chksum_sha256": "e0599c04f5f5203a69b80ed580e6a03f0586e029a482936479beef09f03ef165", "format": 1 }, { - "name": "playbooks/ome/application/ome_application_certificate.yml", + "name": "roles/redfish_firmware/molecule/resources/prepare.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "451395c662a84f8d3a030be78a6c1cb7bc32dd5223c2f0c21c4ee6a6433e7d56", + "chksum_sha256": "70be84b8715d7ea5e18f87fbfd34763293a17ebfa3210f7bd4aa767e0b3ab8fc", "format": 1 }, { - "name": "playbooks/ome/application/ome_application_console_preferences.yml", + "name": "roles/redfish_firmware/README.md", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "d69507043f5d3ab6e177a969f319b3dcbf8edfb5678e58e348653c8f6b8556b2", + "chksum_sha256": "e5c84a2ed15c9a447689ca3a576997db0b740caf3318d6c53f5f4bd94ee8ad26", "format": 1 }, { - "name": "playbooks/ome/application/ome_application_network_address.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "2941e928032f4e93b02e7f56db09bb784702d1782e1e3c87c094a8b2e68bceef", + "name": "roles/redfish_firmware/defaults", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "playbooks/ome/application/ome_application_network_address_with_job_tracking.yml", + "name": "roles/redfish_firmware/defaults/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "3375ed92eb8f5143b01108debff662d6f83c98483fd340328315618aa4e801fd", + "chksum_sha256": "db1cab86f255f2f7829eb72d7f45c792a3c1560d5c23fc42076c70893f4dd784", "format": 1 }, { - "name": "playbooks/ome/application/ome_application_network_proxy.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "afbcdc3fd81f79fec948b8898ed212e48d494d521af66e2c3cfa91538ebfeaa7", + "name": "roles/redfish_firmware/tasks", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "playbooks/ome/application/ome_application_network_settings.yml", + "name": "roles/redfish_firmware/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "d61531249118fb36496a87f9bfc892ae34483d6997ff5cb09155f0269a7ae329", + "chksum_sha256": "5c256607b253027b52ff6b9ffa117ac4ee5adf9f6fd3a0adfe23251aedcade66", "format": 1 }, { - "name": "playbooks/ome/application/ome_application_network_time.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "5d54fa4f854c3871c631114f2bd1a70e33a6f6b87a593529ac4b7bc2a620bb48", + "name": "roles/redfish_firmware/handlers", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "playbooks/ome/application/ome_application_network_time_zone_info.yml", + "name": "roles/redfish_firmware/handlers/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "b66d01170f512a566b92b06b43aae3faa1755f0e453d3ef0110521b68e995889", + "chksum_sha256": "c039d1e5934a6dac58d3fa5dae336ebd5cf878c9649b6acbba4206f6ee0e3e0d", "format": 1 }, { - "name": "playbooks/ome/application/ome_application_network_webserver.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "2e2e19608508da9365570746e726a36e5a5403e16f0563c2de3e6d775b411216", + "name": "roles/redfish_firmware/tests", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "playbooks/ome/application/ome_application_network_webserver_port_changed_tracking.yml", + "name": "roles/redfish_firmware/tests/inventory", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "d060d4922337f1b9357e6196bc5dc2dae238f126c76481d65d46e00b3b1d3d79", + "chksum_sha256": "e02233819b1a09844410549191813f7cc7ba360f21298578f4ba1727a27d87fc", "format": 1 }, { - "name": "playbooks/ome/application/ome_application_security_settings.yml", + "name": "roles/redfish_firmware/tests/test.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e423185bb24ce6d7641db2cec93e76029728c4631a0b84c307da0a375a247526", + "chksum_sha256": "ec798a2b3ebd1096273bc1776f157f23a7b4a7e33d45669856dd185fb9f6b064", "format": 1 }, { - "name": "playbooks/ome/compliance", + "name": "roles/idrac_certificate", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "playbooks/ome/compliance/ome_configuration_compliance_baseline.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "fc3a2176d0d655f312c52f97bfbbbefe8fc5dd45e88b32301aaa56388a52076d", + "name": "roles/idrac_certificate/meta", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "playbooks/ome/compliance/ome_configuration_compliance_info.yml", + "name": "roles/idrac_certificate/meta/argument_specs.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e248d9baf3d9a443dd968b7dea92c70aba87d542b52a34d692daf7c3f595587e", + "chksum_sha256": "0bcfa9cc16612b7726b60e9091be9e85bff3ea73991cbde070e977c434eeb827", "format": 1 }, { - "name": "playbooks/ome/compliance/ome_configuration_compliance_baseline_workflow.yml", + "name": "roles/idrac_certificate/meta/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "bc42c37b1f2c9492b5b297c8245fc6836f4ae89dcdfebeaf958bce0847df6f73", + "chksum_sha256": "b2a5d6be0d2bb806d5549884a7ac88cd841662629e2b15a9a7ab67177250f7bf", "format": 1 }, { - "name": "playbooks/ome/firmware", + "name": "roles/idrac_certificate/vars", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "playbooks/ome/firmware/baseline", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "roles/idrac_certificate/vars/main.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "a35cfc80bcacd3b412a6505f8c5e599a8eee9487788a4dd7c8b69a6882b07c59", "format": 1 }, { - "name": "playbooks/ome/firmware/baseline/component_reports_filtering", + "name": "roles/idrac_certificate/molecule", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "playbooks/ome/firmware/baseline/component_reports_filtering/component_complaince_report_with_baseline.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "dbc8e4f4a6f5581fc0479f3fccef4984fb26ef93650a41fa0ff2efc04e741a09", + "name": "roles/idrac_certificate/molecule/CSC", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "playbooks/ome/firmware/baseline/component_reports_filtering/component_complaince_report_with_devices.yml", + "name": "roles/idrac_certificate/molecule/CSC/molecule.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "3d2d40aaca55f42d88a21c9556b08ddfb60ee692a2ff95c2674e33ecaed3a291", + "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "playbooks/ome/firmware/baseline/ome_firmware_baseline.yml", + "name": "roles/idrac_certificate/molecule/CSC/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "7b80747cd3904de0e8d86046cc233e411bc4083f44e2c6f6f8a875ade32dd4c6", + "chksum_sha256": "99431629f17cbe04456ef0f839377cb71a7ae2b7c541deba9a4b769bba4c06f4", "format": 1 }, { - "name": "playbooks/ome/firmware/baseline/ome_firmware_baseline_compliance_info.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "1fec86960e36907b5574822b9a60531ad5812bc465a5473cc57ccd3054f076de", + "name": "roles/idrac_certificate/molecule/generateCSR", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "playbooks/ome/firmware/baseline/ome_firmware_baseline_compliance_info_filters.yml", + "name": "roles/idrac_certificate/molecule/generateCSR/molecule.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "1ee87a539547297b73866e1d075f7c81fc3ad2147b443c6fbf3b2454367d6b47", + "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "playbooks/ome/firmware/baseline/ome_firmware_baseline_info.yml", + "name": "roles/idrac_certificate/molecule/generateCSR/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "3b297907849be26643ed73ca919c987c17057759b307c99eaa2176c8502d8294", + "chksum_sha256": "57033a2a72d8b711a5c6c2e46131a5b1b1ce8068b43a81f0a51dd44d022bfe36", "format": 1 }, { - "name": "playbooks/ome/firmware/catalog", + "name": "roles/idrac_certificate/molecule/default", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "playbooks/ome/firmware/catalog/ome_firmware_catalog.yml", + "name": "roles/idrac_certificate/molecule/default/molecule.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "d6919243b6c8339e13e6fba8d3b97d0205734da51d8b7858bbb450ebe017af45", + "chksum_sha256": "5920dd34fb2a64497c3b854bc9df7118c521bbfec7955a27494f53dfba5334c6", "format": 1 }, { - "name": "playbooks/ome/firmware/ome_firmware.yml", + "name": "roles/idrac_certificate/molecule/default/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "7d25058ce25ee9d8ebc654d51279c54cd41fba51abe357c0221d3f41606180a0", + "chksum_sha256": "ccae2acde670d513bc24ecadedee7051c324df0de0fcb98668f78d697dc5231d", "format": 1 }, { - "name": "playbooks/ome/firmware/ome_firmware_with_job_tracking.yml", + "name": "roles/idrac_certificate/molecule/__delete_directory.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "0a466f3d8237f5442bd13e312ca31d2a6482d63f0f7ca22f38c826422a1ddbca", + "chksum_sha256": "5acaf39dad31445f79924aadfd59f40857cce066a2bd4ef3dc1c3fd9ed2de0c7", "format": 1 }, { - "name": "playbooks/ome/inventory", + "name": "roles/idrac_certificate/molecule/__extract_firmware_version.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "d2c1e0fbf65e8b1c4ecd02182ada8dbbd320fd9828f0e50eea57450892e9c5c5", + "format": 1 + }, + { + "name": "roles/idrac_certificate/molecule/CustomCertificate", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "playbooks/ome/inventory/ome_inventory_all_groups.yml", + "name": "roles/idrac_certificate/molecule/CustomCertificate/molecule.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "ea301f8125ffc2fb7889cc791e0558f8f7e85b3516e3d6d6fcdd4b8d83557988", + "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "playbooks/ome/inventory/ome_inventory_by_group_with_host_vars.yml", + "name": "roles/idrac_certificate/molecule/CustomCertificate/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "6864ace739760c7c3d8bbf3efe1f34c77fa57b7562817febf7f8d0926b7a2f4c", + "chksum_sha256": "65da72677ef3b2e1c383087b86fda3d45434287ce1cf2ddb4968b0a2ff0bf7c7", "format": 1 }, { - "name": "playbooks/ome/inventory/ome_inventory_by_groups.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "72904dae71c2171978e02bef29d887e94c4f588177cffdac576c67df93ac3b97", + "name": "roles/idrac_certificate/molecule/reset", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "playbooks/ome/inventory/ome_inventory_groups_with_host_and_group_vars.yml", + "name": "roles/idrac_certificate/molecule/reset/molecule.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "a36a617cbe7d9292a04383d2bf0a5716fc645f69c1c7959eca82ceda5d541ab9", + "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "playbooks/ome/ome_active_directory.yml", + "name": "roles/idrac_certificate/molecule/reset/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "dd4d2026942aca6b2fad68425dbb9c6795ba3017fbffe2dd1fd14e9c72ee0d81", + "chksum_sha256": "5b646c45281197bec65800696292b5e6d62ba1aa36be2149c7de10b439ddba55", "format": 1 }, { - "name": "playbooks/ome/ome_chassis_slots.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "fb87fe3c86cd4506226de40728064dcba9b759220b566342da9c2f0b2e40331e", + "name": "roles/idrac_certificate/molecule/CA", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "playbooks/ome/ome_device_group.yml", + "name": "roles/idrac_certificate/molecule/CA/molecule.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "5669a05a743b069ef53e1dadcf80954feb963fe8fd56932676fb92ddda9ca35e", + "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "playbooks/ome/ome_device_info.yml", + "name": "roles/idrac_certificate/molecule/CA/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "ef61ae932b9e642e8db5552525670b6a9645a52fb39de9add50551fcd721190a", + "chksum_sha256": "5bf154879b4a34b326240ccb33a490a5f8bc7f228248db93c02baaaa0869d09e", "format": 1 }, { - "name": "playbooks/ome/ome_device_local_access_configuration.yml", + "name": "roles/idrac_certificate/molecule/__get_helper.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "cb3e4d71a9422a25d8bbe4cf2ca376df39d5a5f922de2cfb9facc8f5721c5a88", + "chksum_sha256": "d510c89d7a712cd198e199f8b885057154f906a27dc18f90734362ad192b783a", "format": 1 }, { - "name": "playbooks/ome/ome_device_location.yml", + "name": "roles/idrac_certificate/molecule/__get_ssl_key.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "497ed8e7f6b757cfbc60ccfcecaec04e742b47a6ed80861b58339f79f2f85adf", + "chksum_sha256": "7367f06df38c4c2fe8b9a280dfda2ac001eae5e3c8d7c62daec8856e9dd8d55e", "format": 1 }, { - "name": "playbooks/ome/ome_device_mgmt_network.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "89748790b471a573b3921ff6e0fff48422b97ec16fb2a1aeae568ccb3fcb013e", + "name": "roles/idrac_certificate/molecule/HTTPS", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "playbooks/ome/ome_device_network_services.yml", + "name": "roles/idrac_certificate/molecule/HTTPS/molecule.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "2fbe1308921f98e05468b4e40687fb1954e365d4c140d73bce5ae550874d95cd", + "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "playbooks/ome/ome_device_power_settings.yml", + "name": "roles/idrac_certificate/molecule/HTTPS/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "18029724ae0804c84143000e04c892cb042fdca99d8cb70eebe301bb964eb9ca", + "chksum_sha256": "f06ff94029cdaceaf9865f0299fc6013b0fea5193ddbd07d078f543eb146d27f", "format": 1 }, { - "name": "playbooks/ome/ome_device_quick_deploy.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "acb2a7a5c7e73052bced88fbe4ba9dcffab7505be19212d9a11bd7aed261a5e8", + "name": "roles/idrac_certificate/molecule/CTC", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "playbooks/ome/ome_devices.yml", + "name": "roles/idrac_certificate/molecule/CTC/molecule.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "c1331fd531251cd1d82f77bbff149fccae42ed7ad035cb01f3b61afbd76cb508", + "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "playbooks/ome/ome_diagnostics.yml", + "name": "roles/idrac_certificate/molecule/CTC/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "b67e463419986332c846988c6c8ba7a877e12fb42b4e15ac9354f1fffac788eb", + "chksum_sha256": "ecd35a2c8d4a1223c5a37a4e80a2f9a950f633357f2eb2655f6f20ca30198c5c", "format": 1 }, { - "name": "playbooks/ome/ome_discovery.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "d38b03a955441fecd26fcf8f01f75e65d7d459927ac58040d041299009fab7aa", + "name": "roles/idrac_certificate/molecule/SSLKEY", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "playbooks/ome/ome_domain_user_groups.yml", + "name": "roles/idrac_certificate/molecule/SSLKEY/molecule.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "1ec28a9e158a70907e3da5f2a56894028e75daad9e3393666ceb54d5baa96b37", + "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "playbooks/ome/ome_group_device_action.yml", + "name": "roles/idrac_certificate/molecule/SSLKEY/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e28a69eee5cc5383903d9c96e9c6b12a76cf76a8a92d7c9dae9457456bb774a4", + "chksum_sha256": "0f8fc730b66884b45530be3fdbdbed659d79387466637b2fb129573fbc74cbee", "format": 1 }, { - "name": "playbooks/ome/ome_groups.yml", + "name": "roles/idrac_certificate/README.md", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "c8af511d1623d2d4cf697b1e3480fede2228f9f0759bc73af8c88c72d20b6cd8", + "chksum_sha256": "8c9a1ba53346f348b656ce43ae836d01e341d173aa793536b7b83d39a478664b", "format": 1 }, { - "name": "playbooks/ome/ome_identity_pool.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "371d65813bfc3a77962caccfc53aa30ab4767402de617f35d2db5734803b29e2", + "name": "roles/idrac_certificate/defaults", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "playbooks/ome/ome_job_info.yml", + "name": "roles/idrac_certificate/defaults/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "7a159c605c87d21e18f581b789ec99a5ec0431f22d4cd223e20483708175b814", + "chksum_sha256": "6cf00eee21d159b121fb581e5c186c22803b7605acdd260c54e5d58969a94520", "format": 1 }, { - "name": "playbooks/ome/ome_network_port_breakout.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "39bd40122da135d913272454af6d830ba40307d59e66e487aa709a9d1272afec", + "name": "roles/idrac_certificate/tasks", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "playbooks/ome/ome_network_port_breakout_job_traking.yml", + "name": "roles/idrac_certificate/tasks/generate_csr.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "111f9977f82b1ca2241b5307535fe6833e70c115871c3e856e15c98f2f507eaa", + "chksum_sha256": "aef02f22f523b789c3a397b9f9b7c39c166e754b978f4920177bcbc53067e211", "format": 1 }, { - "name": "playbooks/ome/ome_network_vlan.yml", + "name": "roles/idrac_certificate/tasks/import.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "5fc6914c37f5a6b280047c45bc51dde5156fc7f17fcf6ea7b31b4fb52902e867", + "chksum_sha256": "1a6a2edb98266da8d17726347dc0b3a0c5c270dd44bc0dadeca28a493163b6cc", "format": 1 }, { - "name": "playbooks/ome/ome_network_vlan_info.yml", + "name": "roles/idrac_certificate/tasks/export.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "de7ce01fbf0f07f87edbbd56adbc85904b327ab25c3568904a85df7c1635c77c", + "chksum_sha256": "80cffca71ccf99a8cbbdcc7e4cad320663e0064ac47faf66b1a62ab2a751d177", "format": 1 }, { - "name": "playbooks/ome/ome_server_interface_profile_info.yml", + "name": "roles/idrac_certificate/tasks/reset.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "af58749f1aa4451723ccb7fde4f31313eea771ce6818b56df7b4d3450b432509", + "chksum_sha256": "82b70c0d2bb2c126a73c04c392513fbfa84f4626a6d5f2c855e45bb1bd5e0df7", "format": 1 }, { - "name": "playbooks/ome/ome_server_interface_profile_workflow.yml", + "name": "roles/idrac_certificate/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "88b5f582aba465eac8f1ab17c7e40865721921bb7864af0d07f83511879928af", + "chksum_sha256": "8500b36628049770984d5c5737419aa9e2e209cda3eae776b981ab8bb70885b5", "format": 1 }, { - "name": "playbooks/ome/ome_server_interface_profiles.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "d0e8826dc3911a89aa5733c42495dd1fa40690d391c65c5c4c48bea10716a56f", + "name": "roles/idrac_certificate/handlers", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "playbooks/ome/ome_smart_fabric.yml", + "name": "roles/idrac_certificate/handlers/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "03c70e63d7713fe24c11cfb6400669fbe422459b3695ccb6214f5ae5656e4f30", + "chksum_sha256": "66d821f9940918fd71847d8db4b05eb937a6de3f457ad7b9b6412762d51d1f41", "format": 1 }, { - "name": "playbooks/ome/ome_smart_fabric_info.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "ecaca37de3625197151d6684472b54c9b3bc712bc9c47d055beb8a1ecdc401e0", + "name": "roles/idrac_certificate/tests", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "playbooks/ome/ome_smart_fabric_uplink.yml", + "name": "roles/idrac_certificate/tests/inventory", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e9980c7e8d795f73469a974aa6a19c09f998081fe4c40163f9525b5db5596216", + "chksum_sha256": "d906aecb61d076a967d9ffe8821c7b04b063f72df9d9e35b33ef36b1c0d98f16", "format": 1 }, { - "name": "playbooks/ome/ome_smart_fabric_uplink_info.yml", + "name": "roles/idrac_certificate/tests/test.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "9fda088244750b408b164dcf07d55bbbdf3168b0eb27627c4f938afd0a8658fb", + "chksum_sha256": "05252420e22b201c04db4b4e79f650a9bbb561aea0caec3d3e253d825637f11d", "format": 1 }, { - "name": "playbooks/ome/ome_template_identity_pool.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "97ec21aeab7e209f22107f692b67ed54bc80e0d0205561d2a2b73d1f494e0fba", + "name": "roles/idrac_gather_facts", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "playbooks/ome/powerstate", + "name": "roles/idrac_gather_facts/meta", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "playbooks/ome/powerstate/ome_powerstate.yml", + "name": "roles/idrac_gather_facts/meta/argument_specs.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "ecddfa8e0d0c89d732131128cdb5b5eb2796f2bafc908751866dac67d8896c66", + "chksum_sha256": "75d820d28ed29f3ab34caf04022a9d5b3023f9179806d13cb88deb25bbf1d58c", "format": 1 }, { - "name": "playbooks/ome/powerstate/ome_powerstate_with_job_tracking.yml", + "name": "roles/idrac_gather_facts/meta/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "5e7ef89910b84426e2251e5e8900139b87e539f5edc8c2866664dc41be18a3ec", + "chksum_sha256": "3bf6b5dc34c2b73a1e1db79a12c608502254e34ec556ba2c261fe607fbfc6ad1", "format": 1 }, { - "name": "playbooks/ome/profile", + "name": "roles/idrac_gather_facts/vars", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "playbooks/ome/profile/ome_profile.yml", + "name": "roles/idrac_gather_facts/vars/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "6ceb1d703cab609a550730151e605a3e85f690e9459efa1c467fbd92e223cb30", + "chksum_sha256": "330b6e0ccfb1e2805e8fb61b43ecd5170d98d1fdffaadd905de5ffb2c4339d09", "format": 1 }, { - "name": "playbooks/ome/profile/ome_profile_assign_job_tracking.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "09dd5305a95e0c59fd985365a2f96c6f929603f973794bded1405b9316d9c6db", + "name": "roles/idrac_gather_facts/molecule", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "playbooks/ome/profile/ome_profile_info.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "ee5cb574348141c0f41436b8c267660f94a0df9bcf76b67fb7bc555b1b45b687", + "name": "roles/idrac_gather_facts/molecule/passensor", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "playbooks/ome/profile/ome_profile_migrate_job_tracking.yml", + "name": "roles/idrac_gather_facts/molecule/passensor/molecule.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "832510e01a20607c99b212a65d194fd6c87b0b6d135f395215c50bd4ef2e50d7", + "chksum_sha256": "f6128fe631d272bed3adb4c98223a2b04d554093dc05a2c499eeb9e6d80c9ac7", "format": 1 }, { - "name": "playbooks/ome/profile/ome_profile_unassign_job_tracking.yml", + "name": "roles/idrac_gather_facts/molecule/passensor/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "91cdfc259bfb71732f8ecc5b64fc69ae06d5053f886f9136aaf78b43d5c9539a", + "chksum_sha256": "a2e6fd5b9b1651a697658ee4571079476cf67112ff63dbd6663a086bb096ff53", "format": 1 }, { - "name": "playbooks/ome/template", + "name": "roles/idrac_gather_facts/molecule/hostnic", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "playbooks/ome/template/ome_template.yml", + "name": "roles/idrac_gather_facts/molecule/hostnic/molecule.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "3c90c9b41ff444b1bf174211b0ce260bd7bdd80c7a1a012c51314d03ade5400f", + "chksum_sha256": "f6128fe631d272bed3adb4c98223a2b04d554093dc05a2c499eeb9e6d80c9ac7", "format": 1 }, { - "name": "playbooks/ome/template/ome_template_create_modify_lcd_display.yml", + "name": "roles/idrac_gather_facts/molecule/hostnic/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "5abdf1b033e3f22ba9c5d532fccb5e960bd9f04c6fffa4fbae799207e754a877", + "chksum_sha256": "e75317b8512ae920138e3c7241d6b4582626d6e236b36128733b92f856543c53", "format": 1 }, { - "name": "playbooks/ome/template/ome_template_info.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "7606d5cfee0c932ccc67a090a8a58df3fb85d370de5a727df937d84b871f93e3", + "name": "roles/idrac_gather_facts/molecule/sensorsvoltage", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "playbooks/ome/template/ome_template_info_with_filter.yml", + "name": "roles/idrac_gather_facts/molecule/sensorsvoltage/molecule.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "9b38315b410882eb04f6a19bb0676ae5ddb146831b571572f5d15ff70d430fe2", + "chksum_sha256": "f6128fe631d272bed3adb4c98223a2b04d554093dc05a2c499eeb9e6d80c9ac7", "format": 1 }, { - "name": "playbooks/ome/template/ome_template_lcd_display_string_deploy.yml", + "name": "roles/idrac_gather_facts/molecule/sensorsvoltage/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "4c802f28d538ce55438af15f296e755c1a5f08872f5d55b582e0eb776446975f", + "chksum_sha256": "1dffcb2b8b2a5fb2b557d0961eaee2b1cbbd94f1f2aa26d998ad06fe6f314f0b", "format": 1 }, { - "name": "playbooks/ome/template/ome_template_network_vlan.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "d72b4eadc6cdf60f554394e325a86d8ffee38bb3e38ae3f38b0945e25864770d", + "name": "roles/idrac_gather_facts/molecule/enclosure", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "playbooks/ome/template/ome_template_network_vlan_info.yml", + "name": "roles/idrac_gather_facts/molecule/enclosure/molecule.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "bf7ebd240aced312384fd6700dcee5f4572c189b18878dd3f2ad1a600a41241c", + "chksum_sha256": "f6128fe631d272bed3adb4c98223a2b04d554093dc05a2c499eeb9e6d80c9ac7", "format": 1 }, { - "name": "playbooks/ome/template/ome_template_with_job_tracking.yml", + "name": "roles/idrac_gather_facts/molecule/enclosure/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "28cb65035fb452f9d1b688b11f2a9152f010e6502cdf980fdb1fa674da1c613a", + "chksum_sha256": "cf1906e1ced1cb774e276f108b46c8fcf7c47db2fd45f9abc75f98b15d5d6661", "format": 1 }, { - "name": "playbooks/ome/user", + "name": "roles/idrac_gather_facts/molecule/bios", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "playbooks/ome/user/ome_user.yml", + "name": "roles/idrac_gather_facts/molecule/bios/molecule.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "cab96264060d057d6bd286f21e5ba810a6c9747014fb5c6ef4fa12118adb88e1", + "chksum_sha256": "f6128fe631d272bed3adb4c98223a2b04d554093dc05a2c499eeb9e6d80c9ac7", "format": 1 }, { - "name": "playbooks/ome/user/ome_user_info.yml", + "name": "roles/idrac_gather_facts/molecule/bios/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "ed38db95276274d797ccc43cec2d8b50d53be9bd1e5e092c9ec6f030b7f5c6fc", + "chksum_sha256": "6aeb01343669a588a39fb5c079282e515ea89873d6e7bcc036e053f58092ae62", "format": 1 }, { - "name": "playbooks/redfish", + "name": "roles/idrac_gather_facts/molecule/license", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "playbooks/redfish/firmware", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "roles/idrac_gather_facts/molecule/license/molecule.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "f6128fe631d272bed3adb4c98223a2b04d554093dc05a2c499eeb9e6d80c9ac7", "format": 1 }, { - "name": "playbooks/redfish/firmware/redfish_firmware.yml", + "name": "roles/idrac_gather_facts/molecule/license/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e9831056b86afc4319cb850d6ed4a723e08ee7a5e2406e178d060bcc0c669796", + "chksum_sha256": "555ad87a256a73804d979ffca0fb14349aa5ce521c463fc7daa32d2a6d394a4d", "format": 1 }, { - "name": "playbooks/redfish/firmware/redfish_firmware_from_http_jobtracking.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "7e1785959ab3ca10bc07a64de60a1fa8faad059df4b1b7a68a493be98b18d0f0", + "name": "roles/idrac_gather_facts/molecule/enclosureemm", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "playbooks/redfish/firmware/redfish_firmware_from_local_jobtracking.yml", + "name": "roles/idrac_gather_facts/molecule/enclosureemm/molecule.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "da71c6817f0338f16b2efceec75919579ab4783695d256eb50050e50dd732ace", + "chksum_sha256": "f6128fe631d272bed3adb4c98223a2b04d554093dc05a2c499eeb9e6d80c9ac7", "format": 1 }, { - "name": "playbooks/redfish/firmware/redfish_firmware_rollback.yml", + "name": "roles/idrac_gather_facts/molecule/enclosureemm/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "67bedde1fa194d706233c12d6aeae0504214b2598a4f848373e31eddcdc571c0", + "chksum_sha256": "0283a9aae3c3d8ba622a804822089373823a9f1494266ed068d65766055922d1", "format": 1 }, { - "name": "playbooks/redfish/redfish_event_subscription.yml", + "name": "roles/idrac_gather_facts/molecule/physicaldisk", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, + "format": 1 + }, + { + "name": "roles/idrac_gather_facts/molecule/physicaldisk/molecule.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "f901dc08010a5c76bf0fbc8c8f1ba60c1eff5d075878469b3fe1197ad2dc4589", + "chksum_sha256": "f6128fe631d272bed3adb4c98223a2b04d554093dc05a2c499eeb9e6d80c9ac7", "format": 1 }, { - "name": "playbooks/redfish/redfish_powerstate.yml", + "name": "roles/idrac_gather_facts/molecule/physicaldisk/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "92461b5efd3384e8da363a9a091a18eb762680e516407b78ad55c1139d03c6e6", + "chksum_sha256": "7b5798bbd2b702d1564c81aa06945a02e73740939d596f4feb7c3e5a6de27f96", "format": 1 }, { - "name": "playbooks/redfish/storage", + "name": "roles/idrac_gather_facts/molecule/default", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "playbooks/redfish/storage/redfish_storage_volume.yml", + "name": "roles/idrac_gather_facts/molecule/default/molecule.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "071ebfb5602ec9046db2ed9209b8697ff9e9cbc66069236b875bbf65a59af625", + "chksum_sha256": "f6128fe631d272bed3adb4c98223a2b04d554093dc05a2c499eeb9e6d80c9ac7", "format": 1 }, { - "name": "playbooks/redfish/storage/redfish_storage_volume_create_job_tracking.yml", + "name": "roles/idrac_gather_facts/molecule/default/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "180a6c686410517af84f74f13ee71d1451ea7a736855e521355da7f7b7a36948", + "chksum_sha256": "cff3d242b9a5abe65abd87b232d6678b0952aea01ac388e894489e47577dfea3", "format": 1 }, { - "name": "playbooks/redfish/storage/redfish_storage_volume_delete_job_tracking.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "54dad57ad6a79cf3d1613917157698b84eadf3f10e456776ce23fd4a1a8c4e61", + "name": "roles/idrac_gather_facts/molecule/nic", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "playbooks/redfish/storage/redfish_storage_volume_initialize_job_tracking.yml", + "name": "roles/idrac_gather_facts/molecule/nic/molecule.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "2c4a6b9df13e5c02c6f74324453b3e2e93607f4fe6cc723a1a2d3337883ea21e", + "chksum_sha256": "f6128fe631d272bed3adb4c98223a2b04d554093dc05a2c499eeb9e6d80c9ac7", "format": 1 }, { - "name": "playbooks/redfish/storage/redfish_storage_volume_modify_job_tracking.yml", + "name": "roles/idrac_gather_facts/molecule/nic/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "96a4103655813d28c473885a73cdba3b48eafaf01521931f7761f89de461c91e", + "chksum_sha256": "88018366757580a7dd6c975481cf2098d8e6add7a9400aae149886c98cec2241", "format": 1 }, { - "name": "playbooks/roles", + "name": "roles/idrac_gather_facts/molecule/negative", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "playbooks/roles/README.md", + "name": "roles/idrac_gather_facts/molecule/negative/molecule.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "abd9f8c450fda2dfbff41f9ee2bbc613150d94e027e8a560e48d3ec14aad97fd", - "format": 1 - }, - { - "name": "playbooks/roles/idrac_attributes", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "chksum_sha256": "f6128fe631d272bed3adb4c98223a2b04d554093dc05a2c499eeb9e6d80c9ac7", "format": 1 }, { - "name": "playbooks/roles/idrac_attributes/idrac_attributes.yml", + "name": "roles/idrac_gather_facts/molecule/negative/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "b558f4d845b9f870ad3c89c34e3361c41acfcef9437f83bdcf342ce3e7c111d0", + "chksum_sha256": "abcc6362b778c7dd7c367130c0f52564cb65a37a314aa41817ae19252f020ff7", "format": 1 }, { - "name": "playbooks/roles/idrac_bios", + "name": "roles/idrac_gather_facts/molecule/secureboot", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "playbooks/roles/idrac_bios/idrac_bios.yml", + "name": "roles/idrac_gather_facts/molecule/secureboot/molecule.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "46eb1addcc8166ef1e320678c15b5c0bcb494e68166b3a4cea65341764af3832", - "format": 1 - }, - { - "name": "playbooks/roles/idrac_certificate", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "chksum_sha256": "f6128fe631d272bed3adb4c98223a2b04d554093dc05a2c499eeb9e6d80c9ac7", "format": 1 }, { - "name": "playbooks/roles/idrac_certificate/idrac_certificate.yml", + "name": "roles/idrac_gather_facts/molecule/secureboot/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "fc5d65aad27029c224cfbe3945b27725caac02a8bc20db57837283efbac05c85", + "chksum_sha256": "90a6628784d8f22ff412233df90b45f4ca670001c322ad02347933ebaac6a04c", "format": 1 }, { - "name": "playbooks/roles/idrac_export_server_config_profile", + "name": "roles/idrac_gather_facts/molecule/idrac", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "playbooks/roles/idrac_export_server_config_profile/idrac_export_server_config_profile.yml", + "name": "roles/idrac_gather_facts/molecule/idrac/molecule.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e5a5df7a2c70cdfc5b97c9a752dddf82b134ba6b5358ab6216097b097c72a533", - "format": 1 - }, - { - "name": "playbooks/roles/idrac_firmware", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "chksum_sha256": "f6128fe631d272bed3adb4c98223a2b04d554093dc05a2c499eeb9e6d80c9ac7", "format": 1 }, { - "name": "playbooks/roles/idrac_firmware/idrac_firmware.yml", + "name": "roles/idrac_gather_facts/molecule/idrac/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "ce0d0ab244e8a7831b43abafdcc2e610b3b4507ff0a8785000792d94769e71c0", + "chksum_sha256": "1793fd4df60558619a9c94aef7599243482429d81c8a28e776b91f850221b59a", "format": 1 }, { - "name": "playbooks/roles/idrac_gather_facts", + "name": "roles/idrac_gather_facts/molecule/powersupply", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "playbooks/roles/idrac_gather_facts/idrac_gather_facts.yml", + "name": "roles/idrac_gather_facts/molecule/powersupply/molecule.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "99a54fcb95b0805ac8ca5f2ce85541caf9dd9666ee3ae0cd1401c90a3a3dbcf8", - "format": 1 - }, - { - "name": "playbooks/roles/idrac_import_server_config_profile", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "chksum_sha256": "f6128fe631d272bed3adb4c98223a2b04d554093dc05a2c499eeb9e6d80c9ac7", "format": 1 }, { - "name": "playbooks/roles/idrac_import_server_config_profile/idrac_import_server_config_profile.yml", + "name": "roles/idrac_gather_facts/molecule/powersupply/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "ac1ed229206d33006e498e8c0ec6f46ea190dcbcb34698b3560ac7c45859e645", + "chksum_sha256": "878678ae878a6dee2d2ab99da3be52a80525d37b57daef898a1deb4e922ea000", "format": 1 }, { - "name": "playbooks/roles/idrac_job_queue", + "name": "roles/idrac_gather_facts/molecule/fan", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "playbooks/roles/idrac_job_queue/idrac_job_queue.yml", + "name": "roles/idrac_gather_facts/molecule/fan/molecule.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "a7495a4784f344f1557f1f65ea5c51f56b31d025e304f66ddbb9ebbaffb2991e", - "format": 1 - }, - { - "name": "playbooks/roles/idrac_os_deployment", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "chksum_sha256": "f6128fe631d272bed3adb4c98223a2b04d554093dc05a2c499eeb9e6d80c9ac7", "format": 1 }, { - "name": "playbooks/roles/idrac_os_deployment/idrac_os_deployment.yml", + "name": "roles/idrac_gather_facts/molecule/fan/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "484bf0716912aac6c405531874feb47643b82e5ae5bb4048e492adb7269328f1", + "chksum_sha256": "3847cf869806ef54d8df586fea8862e60cdcf70de9f90598cd1f3417be3b2aef", "format": 1 }, { - "name": "playbooks/roles/idrac_reset", + "name": "roles/idrac_gather_facts/molecule/backplane", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "playbooks/roles/idrac_reset/idrac_reset.yml", + "name": "roles/idrac_gather_facts/molecule/backplane/molecule.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "d7260501d8b6889b34b43524d75c1bf06a6457f44ea303b36aacb2190ff8fa4e", - "format": 1 - }, - { - "name": "playbooks/roles/idrac_server_powerstate", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "chksum_sha256": "f6128fe631d272bed3adb4c98223a2b04d554093dc05a2c499eeb9e6d80c9ac7", "format": 1 }, { - "name": "playbooks/roles/idrac_server_powerstate/idrac_server_powerstate.yml", + "name": "roles/idrac_gather_facts/molecule/backplane/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "2b27bab99e8b95ed92bddd14d59e53341a3cfa8b3828cfce59af8bed8328ac52", + "chksum_sha256": "6802c82e9c0138284ebfd5da6982b3ae8865a2f19ad9df2aef7ad552f07e149f", "format": 1 }, { - "name": "playbooks/roles/idrac_storage_controller", + "name": "roles/idrac_gather_facts/molecule/memory", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "playbooks/roles/idrac_storage_controller/idrac_storage_controller.yml", + "name": "roles/idrac_gather_facts/molecule/memory/molecule.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "0792768055d63117233dbbca23e2e7f434da81c3e77eaeb67554602d17ea7fd3", + "chksum_sha256": "f6128fe631d272bed3adb4c98223a2b04d554093dc05a2c499eeb9e6d80c9ac7", "format": 1 }, { - "name": "playbooks/roles/inventory", + "name": "roles/idrac_gather_facts/molecule/memory/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "f78483b3cf76c53e1539f5c47bcae79a21890faa859bc5f0cdea52cbeedc046e", + "chksum_sha256": "0a937be08af8078010259968d6dc6ef8836ed89caea61e997db31fec54b7f7b5", "format": 1 }, { - "name": "playbooks/roles/redfish_firmware", + "name": "roles/idrac_gather_facts/molecule/controller", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "playbooks/roles/redfish_firmware/redfish_firmware.yml", + "name": "roles/idrac_gather_facts/molecule/controller/molecule.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "3b40bf1bf5fa84bfd210377c89e4b4566076bac113347918c06dcca053c463a8", - "format": 1 - }, - { - "name": "playbooks/roles/redfish_storage_volume", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "chksum_sha256": "f6128fe631d272bed3adb4c98223a2b04d554093dc05a2c499eeb9e6d80c9ac7", "format": 1 }, { - "name": "playbooks/roles/redfish_storage_volume/redfish_storage_volume.yml", + "name": "roles/idrac_gather_facts/molecule/controller/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "7c8d35ac12005d8a06ca9fbb891edd16c926b4740b7f1a4743df7fcace3404da", + "chksum_sha256": "fd6e6417f014ec03b13867ac110beb0328e8d4e421d71e534002153a29e99b8a", "format": 1 }, { - "name": "playbooks/roles/vars_files", + "name": "roles/idrac_gather_facts/molecule/sensorsintrusion", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "playbooks/roles/vars_files/attributes.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "1e760a0cb6126d76b49613aac9e612f88ae7e27925160a52b2e0b255b5f47bb2", - "format": 1 - }, - { - "name": "playbooks/roles/vars_files/bios.yml", + "name": "roles/idrac_gather_facts/molecule/sensorsintrusion/molecule.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "5d5c75310a93c6d513c747db70e9bea927c1eb5dd6ef75ba5fa766d4c2baaf9e", + "chksum_sha256": "f6128fe631d272bed3adb4c98223a2b04d554093dc05a2c499eeb9e6d80c9ac7", "format": 1 }, { - "name": "playbooks/roles/vars_files/certificates.yml", + "name": "roles/idrac_gather_facts/molecule/sensorsintrusion/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "91099951ff4f500c14e95ce2a6950ddc012521daf34c1253221cd774e75647ed", + "chksum_sha256": "87970ed0a6773bd5ab9c8a78c1555ec0f61228282b314573c33bd30da7102a8d", "format": 1 }, { - "name": "playbooks/roles/vars_files/credentials.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "959f184f2bd6eec8a6302784bfc6518c10a712a496e92b6f20be4f5e166be41a", + "name": "roles/idrac_gather_facts/molecule/cpu", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "playbooks/roles/vars_files/export.yml", + "name": "roles/idrac_gather_facts/molecule/cpu/molecule.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "aa812c14b39721cf11488674c9a0a93b8ca8e94406f335f7722a58b20475a08d", + "chksum_sha256": "f6128fe631d272bed3adb4c98223a2b04d554093dc05a2c499eeb9e6d80c9ac7", "format": 1 }, { - "name": "playbooks/roles/vars_files/firmware.yml", + "name": "roles/idrac_gather_facts/molecule/cpu/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8ddbe55c1ad9eaa8f33cc617ed5ceeaaf99efd7d43bb5f33d60ea98fd966241c", + "chksum_sha256": "03f5f6bec9178116f17d4a1f7e49aa0607b3b34751e35ee4d86f26d4f9912383", "format": 1 }, { - "name": "playbooks/roles/vars_files/import.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "90d3589259f331152d96d8ae0c773ed3958c7ef24bb9604387bbfa040a20bb6e", + "name": "roles/idrac_gather_facts/molecule/systemmetrics", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "playbooks/roles/vars_files/osd.yml", + "name": "roles/idrac_gather_facts/molecule/systemmetrics/molecule.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "b1e6e58675cb4af4c9f800681df1be3ea613b4ee09aa6f8c5eb2e8f05f4b2df9", + "chksum_sha256": "f6128fe631d272bed3adb4c98223a2b04d554093dc05a2c499eeb9e6d80c9ac7", "format": 1 }, { - "name": "playbooks/roles/vars_files/reset.yml", + "name": "roles/idrac_gather_facts/molecule/systemmetrics/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "690bd2b370bbff4b2d9fc3e158f7a85276e343e12167d724d7a30ae7fd7ae7b5", + "chksum_sha256": "9e4fd431a9be18f2b24b56f737f3a5c934f8110f11e2aedb0f0152c03589746e", "format": 1 }, { - "name": "playbooks/roles/vars_files/storage.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "65e7a405ea04245a99ced19727310b2bdf295578fe6bc2869ee764eeb2c4235d", + "name": "roles/idrac_gather_facts/molecule/virtualdisk", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "playbooks/roles/vars_files/storage_controller.yml", + "name": "roles/idrac_gather_facts/molecule/virtualdisk/molecule.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "9ccc017e74bede8274235bc7358cfa6192c7c7430876016ddd07c827657f16e8", + "chksum_sha256": "f6128fe631d272bed3adb4c98223a2b04d554093dc05a2c499eeb9e6d80c9ac7", "format": 1 }, { - "name": "playbooks/roles/vars_files/user.yml", + "name": "roles/idrac_gather_facts/molecule/virtualdisk/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "4dbddb5c3dedb08b2a42e3b2131cb515bca4ae9d83ae4a28a17ff4919993b587", + "chksum_sha256": "d7f64f87068ebc765d1151c2994688505ddf9d29b5a49749565d813a7fd71da9", "format": 1 }, { - "name": "playbooks/roles/idrac_user", + "name": "roles/idrac_gather_facts/molecule/sensorsbattery", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "playbooks/roles/idrac_user/idrac_user.yml", + "name": "roles/idrac_gather_facts/molecule/sensorsbattery/molecule.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "44346ffd0acd7bc28a4b0760772385552686673dc6421947e1b6d2a916b6e5b2", + "chksum_sha256": "f6128fe631d272bed3adb4c98223a2b04d554093dc05a2c499eeb9e6d80c9ac7", "format": 1 }, { - "name": "plugins", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "roles/idrac_gather_facts/molecule/sensorsbattery/converge.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "678657b674bd8d79ae67af9a8ebca26b47e40fcaf6f958e66a15e1517b6b3cdb", "format": 1 }, { - "name": "plugins/doc_fragments", + "name": "roles/idrac_gather_facts/molecule/pciedevice", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "plugins/doc_fragments/__init__.py", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", - "format": 1 - }, - { - "name": "plugins/doc_fragments/idrac_auth_options.py", + "name": "roles/idrac_gather_facts/molecule/pciedevice/molecule.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "4559c52de6583c9d98de9aa9d7ba905a3d1ce3dcaf349e2b3ae8f841037af07a", + "chksum_sha256": "f6128fe631d272bed3adb4c98223a2b04d554093dc05a2c499eeb9e6d80c9ac7", "format": 1 }, { - "name": "plugins/doc_fragments/network_share_options.py", + "name": "roles/idrac_gather_facts/molecule/pciedevice/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "9aef12b8caa7df49c02dde445a8923c811228558bd61893c720ef185b2e7c182", + "chksum_sha256": "5c0c515a34feab6e6b68e051513ac03a3ac94d3cc8cba176aaed27996ad0287e", "format": 1 }, { - "name": "plugins/doc_fragments/ome_auth_options.py", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "add3bfb55a976a99dbcd7a2ef87cdc2547991eb4e52e9fd97e0d456341dbde8b", + "name": "roles/idrac_gather_facts/molecule/firmware", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "plugins/doc_fragments/omem_auth_options.py", + "name": "roles/idrac_gather_facts/molecule/firmware/molecule.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "ee12d1210af2e46053f3f0b1dc5156395c45aaa30303833b5a14a5c788a89062", + "chksum_sha256": "f6128fe631d272bed3adb4c98223a2b04d554093dc05a2c499eeb9e6d80c9ac7", "format": 1 }, { - "name": "plugins/doc_fragments/oment_auth_options.py", + "name": "roles/idrac_gather_facts/molecule/firmware/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "6b5cfb79f913eaa3a1515e9fc0ea060f2c5a27bc4face2fa3a0506fc866a516c", + "chksum_sha256": "b9077637b7c957f46e1351f3e3f4e16e925c81a62e3381dd24169a3f0a7b4079", "format": 1 }, { - "name": "plugins/doc_fragments/redfish_auth_options.py", + "name": "roles/idrac_gather_facts/README.md", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "437dc8e47ff125164d7a46c2ac329cd99bef1d30d6253ef13ff7cabcb28ffdf0", + "chksum_sha256": "babcf9ea882157e54c32df007487cbb8432e214d7c3d5ebbba6631241792cbc3", "format": 1 }, { - "name": "plugins/inventory", + "name": "roles/idrac_gather_facts/defaults", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "plugins/inventory/ome_inventory.py", + "name": "roles/idrac_gather_facts/defaults/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "cb2597106d2e3822ce9f74ae0551904f6f6ccd6cde597bd3ddccf96509bd1e3c", + "chksum_sha256": "0e9f5e643ff9212b823aab7dfeb2658e1b1743ee6e296fe7cec64b64c814dd1f", "format": 1 }, { - "name": "plugins/module_utils", + "name": "roles/idrac_gather_facts/tasks", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "plugins/module_utils/__init__.py", + "name": "roles/idrac_gather_facts/tasks/get_host_nic_info.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", + "chksum_sha256": "cbe6b638f4f6bf98263cc35f2ab8e9dc9c20d4f4781179ea84b25dc837940f49", "format": 1 }, { - "name": "plugins/module_utils/idrac_redfish.py", + "name": "roles/idrac_gather_facts/tasks/get_physical_info.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "f58eacbdb2501466181f9fd4e48bc1f9ffc599113e2f558c85a6b1a11d03a45c", + "chksum_sha256": "c08ebd517f4809864571641b9bbd54e720e54d3eb9f608b86c2de0e21d5e9154", "format": 1 }, { - "name": "plugins/module_utils/ome.py", + "name": "roles/idrac_gather_facts/tasks/get_pcie_device_info.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "a2b26551a3677c43e45b54a110bbd75fa9bba0108b2ffc5cbc71962d926160c2", + "chksum_sha256": "09ded655e39f0510b2432d9e26f24bbcc03d147dae5aef9a4c53ad85b2f8468b", "format": 1 }, { - "name": "plugins/module_utils/redfish.py", + "name": "roles/idrac_gather_facts/tasks/get_intrusion_info.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "edd7f7b228d441288a51ef80a2d760a3aa5b6458bb9830fe5c2148d16e1799e2", + "chksum_sha256": "bfa01c92ff7a53762840eac467d93619b0191e4fe771715be349eef092e96b64", "format": 1 }, { - "name": "plugins/module_utils/dellemc_idrac.py", + "name": "roles/idrac_gather_facts/tasks/get_fan_info.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e60a6661de248b2be11330274cecf6af56989f04388f210ed3a6cf28753b57ee", + "chksum_sha256": "9bb1df958e92876346cb1fffead2be0436ca155725be6326174f6be124812afb", "format": 1 }, { - "name": "plugins/module_utils/utils.py", + "name": "roles/idrac_gather_facts/tasks/get_metrics_info.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "f5b4aa1d4f6bcdf22373061d2dd5d1f873f6cf277c3caded38c75c69d97f6556", + "chksum_sha256": "a5bf5239cfc7ea06a7bb797c84272d5ca0f814a1ad8d0150299384670cbd2a8a", "format": 1 }, { - "name": "plugins/module_utils/session_utils.py", + "name": "roles/idrac_gather_facts/tasks/get_secure_boot_info.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "70a20d812a16708506bdd018e08bd378ed96d3906aa627b3f43c45c5ab1e6a55", + "chksum_sha256": "3cdb9d35aed51e1bb8f4626028b87fed75d52df4a29e933a096eb6e1e526b47a", "format": 1 }, { - "name": "plugins/modules", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "roles/idrac_gather_facts/tasks/get_enclosure_emm_info.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "39af5a227279476db905f227e7c4321756537f807b697dfd02fe16e5af40ec82", "format": 1 }, { - "name": "plugins/modules/__init__.py", + "name": "roles/idrac_gather_facts/tasks/get_battery_info.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", + "chksum_sha256": "148c547f8686797aba487fb562ac318ae933609914899419bc7b08c45f92f76d", "format": 1 }, { - "name": "plugins/modules/dellemc_configure_idrac_eventing.py", + "name": "roles/idrac_gather_facts/tasks/get_memory_info.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8972622a58eb34b314304c1891c770b0cfa0c35a766303f5d2fb4614f2bc9ca9", + "chksum_sha256": "0f1db24485b5870b7a722e07807e8e0df8bebdd162cbb67e12167cbb2b35a3a9", "format": 1 }, { - "name": "plugins/modules/dellemc_configure_idrac_services.py", + "name": "roles/idrac_gather_facts/tasks/get_virtual_disk_info.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "244953d637c27180cf67aec39005498a0abe58688d3a2b05b1655a6df81a8db9", + "chksum_sha256": "91690948737d7d0249d914032490bc42d6260226a1b8fd55922653a1b46b2a61", "format": 1 }, { - "name": "plugins/modules/dellemc_idrac_lc_attributes.py", + "name": "roles/idrac_gather_facts/tasks/get_system_info.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "79c874570d8c94e5373a26c30e4e1b64576a54a14f62f4499b674c7b2f99bb8d", + "chksum_sha256": "4e94f83a0bcae476b8005195648d8fd69b894b0f96d24fa3f837f021f46537d7", "format": 1 }, { - "name": "plugins/modules/redfish_storage_volume.py", + "name": "roles/idrac_gather_facts/tasks/get_firmware_info.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "0c385c1f8206967b4b3a955e4cbe107df5895ee36a7653b87b41c07ac152f634", + "chksum_sha256": "024fd4797f5075b0030f378f4b23696e23f193eee0ae3d286793028ac54f45f9", "format": 1 }, { - "name": "plugins/modules/dellemc_system_lockdown_mode.py", + "name": "roles/idrac_gather_facts/tasks/get_nic_info.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "fafecf1bd67f65c03480e16c097a0dab930c2bfaff25a4efda57f46a90f27b5c", + "chksum_sha256": "bfc885a21855a4c875dcd2d8d30decb7c970dedeb5c4912a549edf88e9fb9a99", "format": 1 }, { - "name": "plugins/modules/idrac_attributes.py", + "name": "roles/idrac_gather_facts/tasks/get_voltage_info.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "22cfae5ac4ac90520b412fb9377f72d891920470dffed5f722f0ac8b159b4f51", + "chksum_sha256": "baf9e3a82d2f19ccc21fa8721c09004ef99ab237f790d5f676bc533aaa523e0e", "format": 1 }, { - "name": "plugins/modules/idrac_bios.py", + "name": "roles/idrac_gather_facts/tasks/get_power_supply_info.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "314547ca6619f5e0e397f85dedf7f43e4c7b33bd9db81b8f361c5f05f6844968", + "chksum_sha256": "b768e6b3a6d27240d49d04a0f59493047f2052f2d9ba94ede986198682525f77", "format": 1 }, { - "name": "plugins/modules/idrac_boot.py", + "name": "roles/idrac_gather_facts/tasks/get_license_info.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "0052eaeedf12e24462e6564f2b767e26450b4f01f1c1a3d09bca324154a1682a", + "chksum_sha256": "61c857b5a12886ad7dde1dee0dec583d999cc435615dd4ffa211ea52e11cea56", "format": 1 }, { - "name": "plugins/modules/idrac_certificates.py", + "name": "roles/idrac_gather_facts/tasks/get_resource_id.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "49d033ed9292e6644411b0e252f792c4d7f767470cabbdb2983147e0fa238cd8", + "chksum_sha256": "71b9b902e3e06e3effa5e21acd8a6f8be1d0dbe49500ff72d7d8cb27def8555c", "format": 1 }, { - "name": "plugins/modules/idrac_firmware.py", + "name": "roles/idrac_gather_facts/tasks/get_attributes_info.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "7cabfda75d3c291689c0c2fee932be51f3021e862f692bcb25ed00a053a1e2c6", + "chksum_sha256": "8e4ddc302cfdb0520c6fa9e0a73708a3491412bea218571b184b94926c695030", "format": 1 }, { - "name": "plugins/modules/idrac_firmware_info.py", + "name": "roles/idrac_gather_facts/tasks/get_bios_info.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "a040502c70727b44937a478d5e33d78ecc90ad8c08873325b5217e80b3e69fab", + "chksum_sha256": "2d625b06d054c58b3434ee76881384abc724a66b58fe7ecf40fdf870c2e7b0b3", "format": 1 }, { - "name": "plugins/modules/idrac_license.py", + "name": "roles/idrac_gather_facts/tasks/get_backplane_info.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "66af69170bff339b9c17c072f987cb6dc74d454e5aa060498aac61ecce1a65de", + "chksum_sha256": "d1ee6473d831ef5fa2b080fbd7e6c545f65cd0b8ddd75af862f3fa314ccd8b71", "format": 1 }, { - "name": "plugins/modules/idrac_lifecycle_controller_job_status_info.py", + "name": "roles/idrac_gather_facts/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "0030947d9d1bc3f70ed13147d429fa4696627321dc9f75a467f00df10adb8402", + "chksum_sha256": "f082f14db62efdca0aa691bfe928fedb660df3fc98f6e32f367cb8dc068335c9", "format": 1 }, { - "name": "plugins/modules/idrac_lifecycle_controller_jobs.py", + "name": "roles/idrac_gather_facts/tasks/get_cpu_info.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8b57b0f86959fee2a4919d83ef943dd5856fd3b137842fb700478d07159b403f", + "chksum_sha256": "151ae93ca668eb1a8900addcfabe7ae999e670e821ad4ced7f06fc95735bd51a", "format": 1 }, { - "name": "plugins/modules/idrac_lifecycle_controller_logs.py", + "name": "roles/idrac_gather_facts/tasks/get_enclosure_info.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "b374487c9c0f19acad5da9f3fb8fe24fa98b672e2df72f92b9b5eaa2d43ed865", + "chksum_sha256": "deb7f669cdd9686dc3c1e2d129ce062ea6ac39582fb1c4d1ebadb9d33aaa0672", "format": 1 }, { - "name": "plugins/modules/idrac_lifecycle_controller_status_info.py", + "name": "roles/idrac_gather_facts/tasks/get_controller_info.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "158d02c1d50ef175e26c7ffa66831575034e077e233ddd992c39d594e004fa38", + "chksum_sha256": "9ef30c6af08535b3ec7ae2485bdd9d4aa79675e2b1bbb6b07be726ac7c36651c", "format": 1 }, { - "name": "plugins/modules/idrac_network.py", + "name": "roles/idrac_gather_facts/tasks/get_pas_sensor_info.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "4c1ea93a690a1400cba57600c7ffe9378813c502057a7d76f593ec2b126e5d85", + "chksum_sha256": "8e9d20d3c5dcfbd9ba045bdd03395fb421c1b6174f3b4bf17a442855b28b3b84", "format": 1 }, { - "name": "plugins/modules/idrac_network_attributes.py", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "670868f9e7533d5019975faf0e3cf3119187248c7e255eeebefdbe59c59b45a6", + "name": "roles/idrac_gather_facts/handlers", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "plugins/modules/idrac_os_deployment.py", + "name": "roles/idrac_gather_facts/handlers/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "fde92ac2396a616812df831e2c576a591bb0b1e0f38e86e8f99cff8f5c75df3d", + "chksum_sha256": "f872a794379898660d17bfd9e1ae91bb13f8725a1cf4b16b901d80919192caba", "format": 1 }, { - "name": "plugins/modules/idrac_redfish_storage_controller.py", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "187f4af6b3da0bd0350f782bbb930c30d6e5926b0c64495b7466f209bd37469d", + "name": "roles/idrac_gather_facts/tests", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "plugins/modules/idrac_session.py", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "70dedb6e3721bd47cdd4d1d8c058eb0db343c2217c6f5e742b40cea43939e40c", + "name": "roles/idrac_gather_facts/tests/asserts", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "plugins/modules/idrac_syslog.py", + "name": "roles/idrac_gather_facts/tests/asserts/mmetrics_assert.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8a79f5615815e37ffd0e0dd8544a2df2782ba792bb5e283df134c3403b8d4f8c", + "chksum_sha256": "2ed3d03bb619d4f8f1e6427e36644de8c77977f32a09ef8b233c0c4ff776ccf2", "format": 1 }, { - "name": "plugins/modules/idrac_system_info.py", + "name": "roles/idrac_gather_facts/tests/asserts/manager_assert.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "ba0422032d21f80ccf2e138499b8dd10821b58ea7e09a4d470446f7929cc5695", + "chksum_sha256": "60be5b10f57f9ec1bfaa913610ef448320b476d27cd33b122a7037ea31a95c21", "format": 1 }, { - "name": "plugins/modules/idrac_timezone_ntp.py", + "name": "roles/idrac_gather_facts/tests/asserts/hostnic_assert.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "540b6fec19d767e940128d79991a7517716052293091e1a98caca550de5d0d8a", + "chksum_sha256": "e84c587ac238b74f292b0382d465ee29ecfdb92a53099410bb0691878aa8990b", "format": 1 }, { - "name": "plugins/modules/idrac_user.py", + "name": "roles/idrac_gather_facts/tests/asserts/firmware_assert.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "6670badc421ded85d316b969b60a24b54c0f93dab90d388f62ac82b12f127ca1", + "chksum_sha256": "3dc966c3a3c7ec1c7dd3a3bfb2b4e3a97c10ae9f279c4a56d3ccab5313857afe", "format": 1 }, { - "name": "plugins/modules/idrac_user_info.py", + "name": "roles/idrac_gather_facts/tests/asserts/memory_assert.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "2e93386626a7c28ae94efea17aa6af84e7e59966a59e84136af01e19f6d84aa4", + "chksum_sha256": "6b16f28108610ba17f95350a75e72ee33ba0db357cc239e74a018e7aebc81057", "format": 1 }, { - "name": "plugins/modules/idrac_virtual_media.py", + "name": "roles/idrac_gather_facts/tests/asserts/license_assert.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "1616e52d126a4c25b6cb7a2a47939a6345e5ae673e975e8b89a9b1eb8c7a0c14", + "chksum_sha256": "4d3e30cd29d21fa947ac9f1b43c3f4d73c60c85187d0d9d01025faa1cd969792", "format": 1 }, { - "name": "plugins/modules/ome_active_directory.py", + "name": "roles/idrac_gather_facts/tests/asserts/tmetrics_assert.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "47a38b69a0862bf550972a674a37d877b2f70d82a27a1bf68ac5b54c2f0678bf", + "chksum_sha256": "a2c959692893fd1c864029693d3f818e5a65f7e339c7c0c672c7d35e2f418481", "format": 1 }, { - "name": "plugins/modules/ome_alert_policies.py", + "name": "roles/idrac_gather_facts/tests/asserts/system_assert.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "744da973ab0686c1f55b81676c86837a846276b5736b0dc364a927b9254f3f28", + "chksum_sha256": "78c885b55767b51ba6c4be7998d67e9f9599f9e7518ec683f9bb1b7bd3f337b2", "format": 1 }, { - "name": "plugins/modules/ome_alert_policies_actions_info.py", + "name": "roles/idrac_gather_facts/tests/asserts/cpu_assert.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "55e49caeb47cec5c51c53fb0b7cf50570eed92d6fc2fceae4b4e8eee2be6611d", + "chksum_sha256": "0e8af65eb0a9b3e627d4d8b0a352de3cb82218bae97998be2101290194825c25", "format": 1 }, { - "name": "plugins/modules/ome_alert_policies_category_info.py", + "name": "roles/idrac_gather_facts/tests/asserts/nic_assert.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "b83f7a82cb0fdf713db87623567512b70b3199ddf55b737bbc4ce7f6484b2de3", + "chksum_sha256": "bb3184e49419f93cf390a53562c01203db04037606af82aeab51783e21a5fbb1", "format": 1 }, { - "name": "plugins/modules/ome_alert_policies_info.py", + "name": "roles/idrac_gather_facts/tests/asserts/controller_assert.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "bd3cb7cf50c1d71743a3340912db5a58676728727d83c2a91a139dc1776de4db", + "chksum_sha256": "48bffad0e6952ab27d7721095ef84c4f13fdc6ab07ee859f36a380409ef6e594", "format": 1 }, { - "name": "plugins/modules/ome_alert_policies_message_id_info.py", + "name": "roles/idrac_gather_facts/tests/asserts/sensorsvoltage_assert.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "ff3bb7fa4f1edfb5025cb6ab0040dc8ee03f79cd20d00dbdd3a5951e5d5a28a1", + "chksum_sha256": "e26f5f551fe9d943743159b24c9a01c3c4c804543311330b12ff87ed2f0b7079", "format": 1 }, { - "name": "plugins/modules/ome_application_alerts_smtp.py", + "name": "roles/idrac_gather_facts/tests/asserts/secureboot_assert.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "de78ff29cce75aa6d57f5e84beed3ca0dd2e91a06ddff572bd9a2bae93aaed85", + "chksum_sha256": "e6876b8b8892d421dd0ddd59dcc1986d54361e6c376d8239f42d91a0db707fff", "format": 1 }, { - "name": "plugins/modules/ome_application_alerts_syslog.py", + "name": "roles/idrac_gather_facts/tests/asserts/fan_assert.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "01e7c7432aafaf16db12d49ac5276f15cf75d6f878c304ad4658ae8e3fc9abeb", + "chksum_sha256": "92924ad83dc9f5fe1b6801d09dced4bb70c1209ede2394ca0ced2d25c3c72eba", "format": 1 }, { - "name": "plugins/modules/ome_application_certificate.py", + "name": "roles/idrac_gather_facts/tests/asserts/pciedevice_assert.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "17abd0bae13c93b2d2100f3150f2dc3e865fd2e7f7c941727c13e553d0c886fe", + "chksum_sha256": "1f4bfc03967189c3fa4c2752b75174294075ad6a2649d4c7e0f6c82dc0b0bd55", "format": 1 }, { - "name": "plugins/modules/ome_device_local_access_configuration.py", + "name": "roles/idrac_gather_facts/tests/asserts/enclosure_assert.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "3d3d5e42de5fdb980d19d4f943d725b75145cc112ed42a2524209c65cd66148d", + "chksum_sha256": "763ba0a9850c0b62d5224e40cfa49bb970e86f3c49991117ba21254211d11c24", "format": 1 }, { - "name": "plugins/modules/ome_application_network_address.py", + "name": "roles/idrac_gather_facts/tests/asserts/virtualdisk_assert.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "c9844f1c4d958fee67122018e0e1b7d651ee52f747708e6c8f12f5c455e90242", + "chksum_sha256": "2e8bd9e08382df2ea34a9b9830b92086569ca4f16e453286cb92c1705f69aa7e", "format": 1 }, { - "name": "plugins/modules/ome_application_network_proxy.py", + "name": "roles/idrac_gather_facts/tests/asserts/enclosureemm_assert.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "1366d581d27bbd7ae40ea96506bc8d6a066adbc3222ff66974733b666f2633c5", + "chksum_sha256": "b409927ca4278e7eea565b40cd36ecc0e212901effc08ea13f8264e323224bf0", "format": 1 }, { - "name": "plugins/modules/ome_application_network_settings.py", + "name": "roles/idrac_gather_facts/tests/asserts/psmetrics_assert.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "9bbaaa51f9acf57b58fae95988ed0afde5172cb4610b8c81d3ad56288f0a5bf4", + "chksum_sha256": "5ade4267e18da8e945add979e001b40d832e77f7b3435cc3efd55f29bd4647b6", "format": 1 }, { - "name": "plugins/modules/ome_application_network_time.py", + "name": "roles/idrac_gather_facts/tests/asserts/lc_assert.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "7b8fbc8e986b8a44703a5901f6a596b24491313dffabe4c9368ef3f331dd1234", + "chksum_sha256": "170dcd03bdb5031bb82a24cc19cc70e1815865a2572e4f14b892221324ef95b5", "format": 1 }, { - "name": "plugins/modules/ome_application_network_webserver.py", + "name": "roles/idrac_gather_facts/tests/inventory", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "f16ad3c4fd7f81bf6dc43c2131bffb2989392efbd7cbabb0d145c0cb08598a82", + "chksum_sha256": "e02233819b1a09844410549191813f7cc7ba360f21298578f4ba1727a27d87fc", "format": 1 }, { - "name": "plugins/modules/ome_application_security_settings.py", + "name": "roles/idrac_gather_facts/tests/test.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "ce4ea923efc1aad0fc2b22d8bc4039ddbf6dbe4a34424d844b22bfd141fc128d", + "chksum_sha256": "71250fe59fab062631b04fe173573783fcd89b77e8f5ae2c042720d10cd2f266", "format": 1 }, { - "name": "plugins/modules/ome_chassis_slots.py", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "fe72d30c858c612064ba9118b3d7f1e97cdcb908c5e2005e74026f5707681e81", + "name": "roles/idrac_export_server_config_profile", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "plugins/modules/ome_configuration_compliance_baseline.py", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "6aafa9fc0f313c12a464ea9c69047b8e9026749bebc709d93319a71887ebf99b", + "name": "roles/idrac_export_server_config_profile/meta", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "plugins/modules/ome_configuration_compliance_info.py", + "name": "roles/idrac_export_server_config_profile/meta/argument_specs.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "4f291a981ee898107c4cef6dab34a8140f703f1cd36914665175566ede35cca2", + "chksum_sha256": "7df7a3c628dee71fa4ce697d0da28ea42f1eebf667853e84124e2971af446c42", "format": 1 }, { - "name": "plugins/modules/ome_device_group.py", + "name": "roles/idrac_export_server_config_profile/meta/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "1287863b5aea15224cd308bb4f327cfb0f2a198c4415c6d248d25db7ba11728e", + "chksum_sha256": "2a7dec7c1e8eb54a57fc78788b66c44e036b676ad62bd998114d7b87fd32e431", "format": 1 }, { - "name": "plugins/modules/ome_device_info.py", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "89d586c756522fa223e28b30ac9efa5f18d9dfd17ed6ac95a6478b6121e0529f", + "name": "roles/idrac_export_server_config_profile/vars", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "plugins/modules/ome_device_quick_deploy.py", + "name": "roles/idrac_export_server_config_profile/vars/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "65d68eb6d1902ba5c818a0eab913cea192c68d807fd455bd74303fbfe31e7757", + "chksum_sha256": "ac68a419593778d913a88752aa73cf05946ca0438db7f4584d6174b04c0c400a", "format": 1 }, { - "name": "plugins/modules/ome_device_location.py", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "3bf02a20d37644dcab75df8f862d01e26b309468b8b611e3bc4832411eb1a415", + "name": "roles/idrac_export_server_config_profile/molecule", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "plugins/modules/ome_device_mgmt_network.py", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "b56771c54c1de0cd75fae19fc36c0fe07d3511c815941acfb32836025f0a69be", + "name": "roles/idrac_export_server_config_profile/molecule/default", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "plugins/modules/ome_device_network_services.py", + "name": "roles/idrac_export_server_config_profile/molecule/default/cleanup.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "a49b72402fbc42fab67786768dff6975d5fe81eb0c0418e975ed8536552d8d63", + "chksum_sha256": "cd932a799fefa81f0aafeb32b788e887e555c076f2b5fedb3ea75e81eb7f707b", "format": 1 }, { - "name": "plugins/modules/ome_device_power_settings.py", + "name": "roles/idrac_export_server_config_profile/molecule/default/verify.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "cc6cabcd711d6117ff88bc5e58a8a24c721952671f47bfcf242ab12c9690c3d5", + "chksum_sha256": "6674f5a55b2b9311c78b61713e305a7b6419f02de40cabd4fdb337f234cd88fa", "format": 1 }, { - "name": "plugins/modules/ome_devices.py", + "name": "roles/idrac_export_server_config_profile/molecule/default/molecule.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "c94ff76fa306c5469bc5930c58f64b4e2423a76c835ed19cd315173e673601ee", + "chksum_sha256": "6c0d5bf979a0ad1541b496f173165b11f0ad14283391efde2c86ee35c477eb43", "format": 1 }, { - "name": "plugins/modules/idrac_reset.py", + "name": "roles/idrac_export_server_config_profile/molecule/default/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "0bb2201ed119d6e26aa583427820f4d9b440c4489ad354a8508ed3ae96edee30", + "chksum_sha256": "621eb2a293781a0408900a6df0884360a7ed673e610b0cbdfe67db3221f62b16", "format": 1 }, { - "name": "plugins/modules/ome_diagnostics.py", + "name": "roles/idrac_export_server_config_profile/README.md", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "f37335945247b3e94a4402fb36530d7505c1d3dbafa35553d17e444abc8ae5d7", + "chksum_sha256": "36902b75877782020af54e7c969630ae84f2ee9872c4ec4350a6ae79e06c930b", "format": 1 }, { - "name": "plugins/modules/ome_discovery.py", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "b8ca1eb7df50d781df18ecbdcb179bee2903a7e23fbbad9ac2b0044d60c251a1", + "name": "roles/idrac_export_server_config_profile/defaults", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "plugins/modules/ome_domain_user_groups.py", + "name": "roles/idrac_export_server_config_profile/defaults/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "c099a1fbe9767fff6644351cf7e728c2fd5413b20ed3a0428a61b2f02133d768", + "chksum_sha256": "35809f9a6cc33e2577870d883ad657e720b46ee3a2a0777f895d490ffa845ca1", "format": 1 }, { - "name": "plugins/modules/ome_firmware.py", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "d95825cb26dabcc64c1d153652c2466ef5eda18960cb9ee90270202d3d3c2f11", + "name": "roles/idrac_export_server_config_profile/tasks", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "plugins/modules/ome_firmware_baseline.py", + "name": "roles/idrac_export_server_config_profile/tasks/scp_export_local.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "af5f2e984223b1ffb9d78648bd8ab8c18b627d81b0dd0900f05a4f16989e451a", + "chksum_sha256": "3d2296ccd8268dbd87cd0dfb3f82bacd1b93cba1ebe898797ac01d681f30f1e5", "format": 1 }, { - "name": "plugins/modules/ome_firmware_baseline_compliance_info.py", + "name": "roles/idrac_export_server_config_profile/tasks/scp_export_nfs.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "a0d08bc596d09894a2d95b76871108de4c87b825115b9b237206981289a672ff", + "chksum_sha256": "ce2b8a6305affda2aaac530edf3e05695c8ed2ff994799fe4e84b77050a33617", "format": 1 }, { - "name": "plugins/modules/ome_firmware_baseline_info.py", + "name": "roles/idrac_export_server_config_profile/tasks/pre_req.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "b59977ca8d111c3d82f1315a4a5f1d9fdd77ffb18c6d00a049f60e8f77ed859d", + "chksum_sha256": "121b8bc546708066ec1bd268af42e70cb396f1d2a99450d89ecb3eebbacf3c29", "format": 1 }, { - "name": "plugins/modules/ome_firmware_catalog.py", + "name": "roles/idrac_export_server_config_profile/tasks/scp_export_cifs.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "f3e965fd3781e330c127f0b0c861a2f21b3dfb4b65d0900274c8c0ff7e9682f4", + "chksum_sha256": "ee2d348b52f7e2711260348db0ff8ad9e0f7c4eb4a391c1de53da94e1002a406", "format": 1 }, { - "name": "plugins/modules/ome_groups.py", + "name": "roles/idrac_export_server_config_profile/tasks/scp_export_https.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "2794ed60e06fc533af5b610c6bebbd71a932eeea6be4a446e429c7a07ee33d49", + "chksum_sha256": "3ef7408260c8297ac606633989ae2a26f24a15c493dfbdb7f38ae0c4e20abb84", "format": 1 }, { - "name": "plugins/modules/ome_identity_pool.py", + "name": "roles/idrac_export_server_config_profile/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "ce87d1090d90ff57b3d3a527bd2efe95776eb91c3e80640ae6428f4dbaab0835", + "chksum_sha256": "1558146a88520a40c77e451c4a7ab0f54fc2cf83de382bf80b3d608b9eae29a9", "format": 1 }, { - "name": "plugins/modules/ome_job_info.py", + "name": "roles/idrac_export_server_config_profile/tasks/scp_export_http.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "0e575ebfd1a2b6247abdd51e73efe2082f0f22e607f26104c43b6d77dd4ced21", + "chksum_sha256": "b8ec53a81eacd4b32bb0b7f5e209d85c386b001c541f581d51c17e38f7095836", "format": 1 }, { - "name": "plugins/modules/ome_network_port_breakout.py", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "aab67ab9d418614cf47102f6883afb629ab72b98be540c904e4e2432888789bf", + "name": "roles/idrac_export_server_config_profile/handlers", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "plugins/modules/ome_network_vlan.py", + "name": "roles/idrac_export_server_config_profile/handlers/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "9fe22c4fa7055e0b395315234e4f87e556c6495d13ea43437158f4ab91c3627c", + "chksum_sha256": "1bf8b1e4781f050ca3d526439f50cead1680b8fbebfe4ba140b8f05c648ccbf7", "format": 1 }, { - "name": "plugins/modules/ome_network_vlan_info.py", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "f41caea42efc7ab9a4ae7144182986992d37e7490dceccd1ec262c2369650096", + "name": "roles/idrac_export_server_config_profile/tests", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "plugins/modules/ome_powerstate.py", + "name": "roles/idrac_export_server_config_profile/tests/inventory", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "b15c98e5a0722cc06a6d060275cd527526536bb3a0fb4b1aad0d463676afaf75", + "chksum_sha256": "e02233819b1a09844410549191813f7cc7ba360f21298578f4ba1727a27d87fc", "format": 1 }, { - "name": "plugins/modules/ome_profile.py", + "name": "roles/idrac_export_server_config_profile/tests/test.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "1668387d3adaf9a68264089ef46e011601502512ffeb72aec08c4c0d91264c8e", + "chksum_sha256": "6d5634aec64528ab58532686cef5828500fbfcd3b729e0333e20b63365f4a080", "format": 1 }, { - "name": "plugins/modules/ome_profile_info.py", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "e95d312e668311e09b210ea9e21b0b63d46cb5b6cd1fa0e7e2f306ab507a489b", + "name": "roles/idrac_import_server_config_profile", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "plugins/modules/ome_server_interface_profile_info.py", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "7828e3370b2228cebd3f442916fe81c26a43fa4c5239c186c98f3df7d39455d7", + "name": "roles/idrac_import_server_config_profile/meta", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "plugins/modules/ome_server_interface_profiles.py", + "name": "roles/idrac_import_server_config_profile/meta/argument_specs.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "c27dedba93da5122c64cb09bbad215adf60f6ca640adafaf11cebafb93b853e5", + "chksum_sha256": "b1daf5cd34934f57365ef41dd1bdb8eadf73c96faee44442d8b607d3770921a6", "format": 1 }, { - "name": "plugins/modules/ome_smart_fabric.py", + "name": "roles/idrac_import_server_config_profile/meta/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "f55fad4eb0a37b26c225016ce0a62f14289987e8447f60a13d750e724ab3067e", + "chksum_sha256": "7a77ddd7746819905a9dd4511b45439de974b04c6628f8f89c5b89490bc9bcc7", "format": 1 }, { - "name": "plugins/modules/ome_smart_fabric_info.py", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "9aa3f9bfa28ec74952f45d6929b8941e467fc72d593d781d4b9dfd4b07573925", + "name": "roles/idrac_import_server_config_profile/vars", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "plugins/modules/ome_smart_fabric_uplink.py", + "name": "roles/idrac_import_server_config_profile/vars/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8b6ec3f94eb2c2926d269de9b35f4f693311a3261e9025b3a08ec665ac2be65b", + "chksum_sha256": "a072ea3135c9e0109ae66ae42d86a3947cd27c8f7fde4ea1d62bf14a75ff7b6a", "format": 1 }, { - "name": "plugins/modules/ome_smart_fabric_uplink_info.py", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "0fc404675b2d5f4800e7fe19053556cdaf9e62c415b6867a17a9fc696846655d", + "name": "roles/idrac_import_server_config_profile/molecule", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "plugins/modules/ome_template.py", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "e91802d2fd041c04f346ce43ab803596ec548cc29c63c403bf6cb9553903dc38", + "name": "roles/idrac_import_server_config_profile/molecule/http_share_with_showerror_certificate_warning", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "plugins/modules/ome_template_identity_pool.py", + "name": "roles/idrac_import_server_config_profile/molecule/http_share_with_showerror_certificate_warning/molecule.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "b15832e64fb39bba8d419fda96a0f0d893b7dd3c3f182a51816a5a09dfd9ef41", + "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "plugins/modules/ome_template_info.py", + "name": "roles/idrac_import_server_config_profile/molecule/http_share_with_showerror_certificate_warning/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "6b1a8cc5c499d76538aa4321ea545ecee0413733526c75cceeebe6e676ef5cc5", + "chksum_sha256": "c6440bd7d1c2e2fe63da11cf6345307f8d08d2ff2287a3007e3cb99eea47d7c4", "format": 1 }, { - "name": "plugins/modules/ome_template_network_vlan.py", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "dc39292571dca59e1370eff4f3fabaa5a7767029617a24a14b21477207b6408a", + "name": "roles/idrac_import_server_config_profile/molecule/import_multiple_target", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "plugins/modules/ome_template_network_vlan_info.py", + "name": "roles/idrac_import_server_config_profile/molecule/import_multiple_target/molecule.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "bd0ea6e5dbb418ace51af5af341b7a704b3cf0ff05163935f7ab1b4eac0a993e", + "chksum_sha256": "0d55af04f5706218c384613a4393a6e01ab1ccea2438a1b1cc6ea2b403272225", "format": 1 }, { - "name": "plugins/modules/ome_user.py", + "name": "roles/idrac_import_server_config_profile/molecule/import_multiple_target/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "7a91a7adb4966965349d38badd708bab4713dc69b7f4007d1393d08c6605902c", + "chksum_sha256": "e3fb9baf2fda4da08a609e07a9c56bca74569c01a0081e3630e9635295b31f0a", "format": 1 }, { - "name": "plugins/modules/ome_user_info.py", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "6609af8ddab5e1073d5041d40038cd70f8eed65f5d1d3285f77523b6a34126e9", + "name": "roles/idrac_import_server_config_profile/molecule/https_share_with_proxy_parameters", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "plugins/modules/redfish_event_subscription.py", + "name": "roles/idrac_import_server_config_profile/molecule/https_share_with_proxy_parameters/molecule.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "675a96365b20bf6bf8808916b467f6810e418271a4c914565c79f41155af8f49", + "chksum_sha256": "0d55af04f5706218c384613a4393a6e01ab1ccea2438a1b1cc6ea2b403272225", "format": 1 }, { - "name": "plugins/modules/redfish_firmware.py", + "name": "roles/idrac_import_server_config_profile/molecule/https_share_with_proxy_parameters/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "380f9d2772004466c6e4c8fc33481b52f0bb05a3dfc3635660f9d8e5b447182c", + "chksum_sha256": "2f555e872a266977d5f0acb356ed20321dcf984564e9471d2fdc29b841d5a120", "format": 1 }, { - "name": "plugins/modules/redfish_firmware_rollback.py", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "644c7c2972589c5aa58cd7a909119acc7b3d8a4650f8c9f726d6fedea3a9f1ef", + "name": "roles/idrac_import_server_config_profile/molecule/http_share_with_proxy_parameters", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "plugins/modules/redfish_powerstate.py", + "name": "roles/idrac_import_server_config_profile/molecule/http_share_with_proxy_parameters/molecule.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "c511e178a205942312cbb1523270a27bf4bb8506b999ad29e8c86a0d9e44b976", + "chksum_sha256": "0d55af04f5706218c384613a4393a6e01ab1ccea2438a1b1cc6ea2b403272225", "format": 1 }, { - "name": "plugins/modules/idrac_diagnostics.py", + "name": "roles/idrac_import_server_config_profile/molecule/http_share_with_proxy_parameters/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "cc28820b11d8e6622f429ef77484778b0b9fa9a5d6d4fe559a58fba978fe724f", + "chksum_sha256": "4a9673edc4a062a85a757483b1587a1ebea5ec8545b6ec20cdf861afab9b38e5", "format": 1 }, { - "name": "plugins/modules/dellemc_idrac_storage_volume.py", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "4e9530ae54ec5e0e70142ae0c6585cd78af2ce511f24dd829affb0ba719424b3", + "name": "roles/idrac_import_server_config_profile/molecule/default", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "plugins/modules/idrac_server_config_profile.py", + "name": "roles/idrac_import_server_config_profile/molecule/default/molecule.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "2158f3770b7aea8dfffc46bcea4a960857805a25df674e584c0c3c863dd1c04b", + "chksum_sha256": "f3f5fdbd0243581c13e09c4a9347c3197712b89de7ccf5c19bf040002a8e0967", "format": 1 }, { - "name": "plugins/modules/idrac_storage_volume.py", + "name": "roles/idrac_import_server_config_profile/molecule/default/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "b94ebb86f37b60cfcc1d06f924079bdb5502583c63b10dfc9b8eb6683fd02551", + "chksum_sha256": "2f2a440f3da11b5d518f74f7fe44fb76709607382cb11bd47fd424767eb8e7da", "format": 1 }, { - "name": "plugins/modules/ome_application_console_preferences.py", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "1eb0dd33e5b833a1688dee170db6e84abaebaea1b38f73908013fd2ca74817a8", + "name": "roles/idrac_import_server_config_profile/molecule/http_share", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "plugins/README.md", + "name": "roles/idrac_import_server_config_profile/molecule/http_share/molecule.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "bf8697057933ae95e9172b8fb6da9907557f5f086ed7e91da850a2fb573fcf9d", + "chksum_sha256": "0d55af04f5706218c384613a4393a6e01ab1ccea2438a1b1cc6ea2b403272225", "format": 1 }, { - "name": "requirements.yml", + "name": "roles/idrac_import_server_config_profile/molecule/http_share/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "32d916481c121c551a11659f3e0ba3b2e38c580ef5dea95cd1047560f3df514b", + "chksum_sha256": "05ee90c1a034c6a7c4f02120c05554526172311af76c5a61767cab3705b114c0", "format": 1 }, { - "name": "roles", + "name": "roles/idrac_import_server_config_profile/molecule/nfs_share", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/README.md", + "name": "roles/idrac_import_server_config_profile/molecule/nfs_share/molecule.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8091502909248e459a4b18ea05ca7bf36c1022419c31b23e4765684315129c22", - "format": 1 - }, - { - "name": "roles/idrac_attributes", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "chksum_sha256": "0d55af04f5706218c384613a4393a6e01ab1ccea2438a1b1cc6ea2b403272225", "format": 1 }, { - "name": "roles/idrac_attributes/README.md", + "name": "roles/idrac_import_server_config_profile/molecule/nfs_share/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "245dd1c52d38db33b91d948c3a4403bb0739cf172ffd4e63dbe444477c395902", + "chksum_sha256": "c825c7c600c1dccac10930371fb8da29b38df7dfee460ab885266bf6e3006bd1", "format": 1 }, { - "name": "roles/idrac_attributes/defaults", + "name": "roles/idrac_import_server_config_profile/molecule/resources", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_attributes/defaults/main.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "ccd23c69bb78d5c4da4314139c4f34ec24adb35d0bdfa16c096e2b5c20f9a8c5", - "format": 1 - }, - { - "name": "roles/idrac_attributes/handlers", + "name": "roles/idrac_import_server_config_profile/molecule/resources/tests", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_attributes/handlers/main.yml", + "name": "roles/idrac_import_server_config_profile/molecule/resources/tests/cleanup.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "4efd533c8f0a3c63e2ad84713dbb875c27953ade61183e3b98526db8816bbf52", + "chksum_sha256": "3985d5b2ca2f11661982e372f5c9e677144651dd2f7f167efd7e0e4b3d2c9231", "format": 1 }, { - "name": "roles/idrac_attributes/meta", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "roles/idrac_import_server_config_profile/molecule/resources/tests/prepare.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "b48f7002029c826a3402b360aaabe1a9301d34e249a49718aef9454d6dc9a557", "format": 1 }, { - "name": "roles/idrac_attributes/meta/argument_specs.yml", + "name": "roles/idrac_import_server_config_profile/molecule/resources/tests/raid_helper.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "f061ffd4298bd768dcb142d03cbdc74c96c5b3e6db84ca86c663f04c4ed083bc", + "chksum_sha256": "6706025009360630843898df27085681a613507370fb0bb91a2c40fd03a2e8c7", "format": 1 }, { - "name": "roles/idrac_attributes/meta/main.yml", + "name": "roles/idrac_import_server_config_profile/molecule/resources/tests/export.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "0a7e4d3e398ea14415197ac551e718bfc71cce0229df4f4f61a35981096dc47e", + "chksum_sha256": "8a4f3a78e9d259c668ae748e224e36007b91372281024e1f514ad6aaaae72606", "format": 1 }, { - "name": "roles/idrac_attributes/molecule", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "roles/idrac_import_server_config_profile/molecule/resources/tests/nic_helper.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "f247488b64a9ccaffe3f0240f0cf3a6e527b3ac952a786bcc715c436b397a00d", "format": 1 }, { - "name": "roles/idrac_attributes/molecule/default", + "name": "roles/idrac_import_server_config_profile/molecule/import_buffer_xml", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_attributes/molecule/default/converge.yml", + "name": "roles/idrac_import_server_config_profile/molecule/import_buffer_xml/prepare.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "c58427eeb90ebf651a050a72f1a592dcb67808c53b5460041c67a8b9db98d3e0", + "chksum_sha256": "49b649577157352b249d241cab5c9f05d2f14e72c6b886ef809b1ec006a6eb0b", "format": 1 }, { - "name": "roles/idrac_attributes/molecule/default/molecule.yml", + "name": "roles/idrac_import_server_config_profile/molecule/import_buffer_xml/molecule.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "1c3ff5ada33af88f7d89035e74a24e9f7ebd0bd1ce9aea711a11e456babcedeb", + "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "roles/idrac_attributes/molecule/idrac_attr", + "name": "roles/idrac_import_server_config_profile/molecule/import_buffer_xml/converge.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "57802a2bfa00428e20c2baf45add16b9cb643b46bb5d0c325190699432473e86", + "format": 1 + }, + { + "name": "roles/idrac_import_server_config_profile/molecule/import_buffer_json", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_attributes/molecule/idrac_attr/cleanup.yml", + "name": "roles/idrac_import_server_config_profile/molecule/import_buffer_json/prepare.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "2eaa72c7f6eb429b320d8c6340ed73e43509fb9b6396c73001e924be3f4b7183", + "chksum_sha256": "49b649577157352b249d241cab5c9f05d2f14e72c6b886ef809b1ec006a6eb0b", "format": 1 }, { - "name": "roles/idrac_attributes/molecule/idrac_attr/converge.yml", + "name": "roles/idrac_import_server_config_profile/molecule/import_buffer_json/molecule.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "a7bdba9a94a875c15ec6f83690f3d06fe6c078a228c5c2fecd3c220b344f2cc1", + "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "roles/idrac_attributes/molecule/idrac_attr/molecule.yml", + "name": "roles/idrac_import_server_config_profile/molecule/import_buffer_json/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "f52d711103d50a437830c6fbcd04fb4bab49a0f82f6d26d1c791c6e8488dd090", + "chksum_sha256": "7e73dc08b0b670f9047ad969ec153670bae08fb4baf7db258216251c4160c083", "format": 1 }, { - "name": "roles/idrac_attributes/molecule/lifecycle_controller_attr", + "name": "roles/idrac_import_server_config_profile/molecule/https_share", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_attributes/molecule/lifecycle_controller_attr/cleanup.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "2eaa72c7f6eb429b320d8c6340ed73e43509fb9b6396c73001e924be3f4b7183", - "format": 1 - }, - { - "name": "roles/idrac_attributes/molecule/lifecycle_controller_attr/converge.yml", + "name": "roles/idrac_import_server_config_profile/molecule/https_share/molecule.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "cf6b840896de4b786ee1a8c174e9c6330883bb9a29f5fad3116c88652328c937", + "chksum_sha256": "0d55af04f5706218c384613a4393a6e01ab1ccea2438a1b1cc6ea2b403272225", "format": 1 }, { - "name": "roles/idrac_attributes/molecule/lifecycle_controller_attr/molecule.yml", + "name": "roles/idrac_import_server_config_profile/molecule/https_share/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "f52d711103d50a437830c6fbcd04fb4bab49a0f82f6d26d1c791c6e8488dd090", + "chksum_sha256": "70c1949f3736465e786717cb6a2311c4dfcc92861212161f8957ca6c932e5d6c", "format": 1 }, { - "name": "roles/idrac_attributes/molecule/system_attr", + "name": "roles/idrac_import_server_config_profile/molecule/cifs_share", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_attributes/molecule/system_attr/cleanup.yml", + "name": "roles/idrac_import_server_config_profile/molecule/cifs_share/molecule.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "2eaa72c7f6eb429b320d8c6340ed73e43509fb9b6396c73001e924be3f4b7183", + "chksum_sha256": "0d55af04f5706218c384613a4393a6e01ab1ccea2438a1b1cc6ea2b403272225", "format": 1 }, { - "name": "roles/idrac_attributes/molecule/system_attr/converge.yml", + "name": "roles/idrac_import_server_config_profile/molecule/cifs_share/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "3eef0d294a285ae534ef217c2b07156e28ce8017c57ac02dd3b7d8c71db471bf", + "chksum_sha256": "2deadcf076f47e066b749446ece0948b1fc0be171ab883f67a32c64de9a9a7bd", "format": 1 }, { - "name": "roles/idrac_attributes/molecule/system_attr/molecule.yml", + "name": "roles/idrac_import_server_config_profile/README.md", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "f52d711103d50a437830c6fbcd04fb4bab49a0f82f6d26d1c791c6e8488dd090", + "chksum_sha256": "67521b0bf1ceb30e3ca348cd5f07d4c54aee0c56d7b3935c542fd920c11df288", "format": 1 }, { - "name": "roles/idrac_attributes/tasks", + "name": "roles/idrac_import_server_config_profile/defaults", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_attributes/tasks/main.yml", + "name": "roles/idrac_import_server_config_profile/defaults/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "0c2023b600b957bbafd3a31e5ec79d21662dffa1fc218927b65078b2b3de54a3", + "chksum_sha256": "d569d3374f9ba9960023d769bdc7245afb9f635656bfdb48ac1ad61d0279a53d", "format": 1 }, { - "name": "roles/idrac_attributes/tests", + "name": "roles/idrac_import_server_config_profile/tasks", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_attributes/tests/inventory", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "e02233819b1a09844410549191813f7cc7ba360f21298578f4ba1727a27d87fc", - "format": 1 - }, - { - "name": "roles/idrac_attributes/tests/test.yml", + "name": "roles/idrac_import_server_config_profile/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "50d768c3b61c1deb820db1bda56cf4a916b4232f9ed448da92035eca8e654b93", + "chksum_sha256": "8a329bb5b5a0c7ce2855fddb6eb3b16ab43524ad86e7f12defe55577933fb636", "format": 1 }, { - "name": "roles/idrac_attributes/vars", + "name": "roles/idrac_import_server_config_profile/handlers", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_attributes/vars/main.yml", + "name": "roles/idrac_import_server_config_profile/handlers/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e55a77ecab73769ee48b7cee96d383945f3b74732b244fae6e9b02e0aad3713f", + "chksum_sha256": "c31a046bb009c7b68dd25c11a096f2b08aad4e49903648580a05dfbec4da9d2f", "format": 1 }, { - "name": "roles/idrac_bios", + "name": "roles/idrac_import_server_config_profile/tests", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_bios/README.md", + "name": "roles/idrac_import_server_config_profile/tests/inventory", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "f6c25e672dc7aff51b545c0b96e4660ec49c095f46b7de93843c22e37a2da95e", - "format": 1 - }, - { - "name": "roles/idrac_bios/defaults", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "chksum_sha256": "e02233819b1a09844410549191813f7cc7ba360f21298578f4ba1727a27d87fc", "format": 1 }, { - "name": "roles/idrac_bios/defaults/main.yml", + "name": "roles/idrac_import_server_config_profile/tests/test.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "568c7c8e3c076cbb645325bfe8fbac4651420942e7b58902f3001b4472f12cb2", + "chksum_sha256": "4acfc541204ebf3d6c37f48c79e48f8f273d016aa7a2f6af7fef715905245eba", "format": 1 }, { - "name": "roles/idrac_bios/handlers", + "name": "roles/idrac_bios", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_bios/handlers/main.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "aa8e7c5541c5df8b0c7580807b182ff8d7e5d5cca42e3bbbf3c1aff1ab9cd6b7", - "format": 1 - }, - { "name": "roles/idrac_bios/meta", "ftype": "dir", "chksum_type": null, @@ -3375,87 +3291,108 @@ "format": 1 }, { - "name": "roles/idrac_bios/molecule", + "name": "roles/idrac_bios/vars", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_bios/molecule/__get_data.yml", + "name": "roles/idrac_bios/vars/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "28a6d3f13871bd19937f4b4d446f9262917979e0a6ccf754b2acd47ed40b3e19", + "chksum_sha256": "0f5bc4cf4b6dd8b6d33de490d471c654413d7a5dbe292d025a58e779e14020cf", "format": 1 }, { - "name": "roles/idrac_bios/molecule/clear_pending_attributes", + "name": "roles/idrac_bios/molecule", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_bios/molecule/clear_pending_attributes/converge.yml", + "name": "roles/idrac_bios/molecule/update_attributes_with_maintenance_window", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, + "format": 1 + }, + { + "name": "roles/idrac_bios/molecule/update_attributes_with_maintenance_window/molecule.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "833e9d4a796e3d6e80f7ef1091590baf9263cfe66623e468326bb99c12a9c7f9", + "chksum_sha256": "dae48a016bbbe31b14341b09c78f16078af041ad7d83f232072bbf07f960fab9", "format": 1 }, { - "name": "roles/idrac_bios/molecule/clear_pending_attributes/molecule.yml", + "name": "roles/idrac_bios/molecule/update_attributes_with_maintenance_window/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "f52d711103d50a437830c6fbcd04fb4bab49a0f82f6d26d1c791c6e8488dd090", + "chksum_sha256": "8884874fc4b2a0445cf1e5cea84a17ece3dbf7e3455dc17691d8f52c91e418d1", "format": 1 }, { - "name": "roles/idrac_bios/molecule/clear_pending_attributes/prepare.yml", + "name": "roles/idrac_bios/molecule/update_attributes_immediate_with_jobwait", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, + "format": 1 + }, + { + "name": "roles/idrac_bios/molecule/update_attributes_immediate_with_jobwait/molecule.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "0916dfb0e05312c73d1f5e8a7cfc822cfbc0a16e9ce0a837df4110347690994a", + "format": 1 + }, + { + "name": "roles/idrac_bios/molecule/update_attributes_immediate_with_jobwait/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "789337cedb7a0e5f33484b00e7a4c9cbe40cb133841e1656f18cff08f042d7af", + "chksum_sha256": "416f65beecc2e8e53ad7abf57e03a7f089401dbbd0f4eb16789de510950706c9", "format": 1 }, { - "name": "roles/idrac_bios/molecule/default", + "name": "roles/idrac_bios/molecule/update_attributes_on_reset_with_maintenance_window", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_bios/molecule/default/converge.yml", + "name": "roles/idrac_bios/molecule/update_attributes_on_reset_with_maintenance_window/molecule.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "4780273b956a4ca22a04c2c52fe1342f40dec5d42ad58389353f061e0f2cc0d9", + "chksum_sha256": "dae48a016bbbe31b14341b09c78f16078af041ad7d83f232072bbf07f960fab9", "format": 1 }, { - "name": "roles/idrac_bios/molecule/default/molecule.yml", + "name": "roles/idrac_bios/molecule/update_attributes_on_reset_with_maintenance_window/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "1c3ff5ada33af88f7d89035e74a24e9f7ebd0bd1ce9aea711a11e456babcedeb", + "chksum_sha256": "3f53e8d4b80c2dac745f033695febdb4f0c2dd222b7b8ec447164ffb3b44f210", "format": 1 }, { - "name": "roles/idrac_bios/molecule/negative_scenarios_with_maintenance_window", + "name": "roles/idrac_bios/molecule/default", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_bios/molecule/negative_scenarios_with_maintenance_window/molecule.yml", + "name": "roles/idrac_bios/molecule/default/molecule.yml", "ftype": "file", "chksum_type": "sha256", "chksum_sha256": "1c3ff5ada33af88f7d89035e74a24e9f7ebd0bd1ce9aea711a11e456babcedeb", "format": 1 }, { - "name": "roles/idrac_bios/molecule/negative_scenarios_with_maintenance_window/converge.yml", + "name": "roles/idrac_bios/molecule/default/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "b9d44e3bf2e9c3dd4a24b59e4b33228d23fca8428f4060d6ace4a7e884fe469e", + "chksum_sha256": "4780273b956a4ca22a04c2c52fe1342f40dec5d42ad58389353f061e0f2cc0d9", "format": 1 }, { @@ -3466,6 +3403,13 @@ "format": 1 }, { + "name": "roles/idrac_bios/molecule/reset_bios/molecule.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "de8583bbc3924432cfe625f9899beb6ad7848058e61d1ecabd745ec810ee5498", + "format": 1 + }, + { "name": "roles/idrac_bios/molecule/reset_bios/converge.yml", "ftype": "file", "chksum_type": "sha256", @@ -3473,10 +3417,10 @@ "format": 1 }, { - "name": "roles/idrac_bios/molecule/reset_bios/molecule.yml", + "name": "roles/idrac_bios/molecule/__get_data.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "de8583bbc3924432cfe625f9899beb6ad7848058e61d1ecabd745ec810ee5498", + "chksum_sha256": "28a6d3f13871bd19937f4b4d446f9262917979e0a6ccf754b2acd47ed40b3e19", "format": 1 }, { @@ -3487,157 +3431,178 @@ "format": 1 }, { - "name": "roles/idrac_bios/molecule/reset_bios_with_reset_type_as_force_restart/converge.yml", + "name": "roles/idrac_bios/molecule/reset_bios_with_reset_type_as_force_restart/molecule.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "39dea23cd0f22d83a336b801858f334e655c683729059bab6526419e3c023f66", + "chksum_sha256": "de8583bbc3924432cfe625f9899beb6ad7848058e61d1ecabd745ec810ee5498", "format": 1 }, { - "name": "roles/idrac_bios/molecule/reset_bios_with_reset_type_as_force_restart/molecule.yml", + "name": "roles/idrac_bios/molecule/reset_bios_with_reset_type_as_force_restart/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "de8583bbc3924432cfe625f9899beb6ad7848058e61d1ecabd745ec810ee5498", + "chksum_sha256": "39dea23cd0f22d83a336b801858f334e655c683729059bab6526419e3c023f66", "format": 1 }, { - "name": "roles/idrac_bios/molecule/resources", + "name": "roles/idrac_bios/molecule/update_attributes_on_reset", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_bios/molecule/resources/cleanup.yml", + "name": "roles/idrac_bios/molecule/update_attributes_on_reset/molecule.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "9fa5332de56ac39992c0dfabb7ca55ba96d75b8856879b1d7feaa53b6c06c63c", + "chksum_sha256": "dae48a016bbbe31b14341b09c78f16078af041ad7d83f232072bbf07f960fab9", "format": 1 }, { - "name": "roles/idrac_bios/molecule/resources/prepare.yml", + "name": "roles/idrac_bios/molecule/update_attributes_on_reset/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "f1c3c3706f74819eef75c5a6f7fc7a3c8adb78b0ec008d4ef41e382b779b19ef", + "chksum_sha256": "223982198fa78ae74e7e1cbbaa1fad058036fc89c58918ccf42009d51ca54d56", "format": 1 }, { - "name": "roles/idrac_bios/molecule/update_attributes_immediate", + "name": "roles/idrac_bios/molecule/resources", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_bios/molecule/update_attributes_immediate/converge.yml", + "name": "roles/idrac_bios/molecule/resources/cleanup.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "c3a6e4124abf9d96581688f23ba05ed99f6e6d49a67dc43e0e2f3477e12f39f4", + "chksum_sha256": "9fa5332de56ac39992c0dfabb7ca55ba96d75b8856879b1d7feaa53b6c06c63c", "format": 1 }, { - "name": "roles/idrac_bios/molecule/update_attributes_immediate/molecule.yml", + "name": "roles/idrac_bios/molecule/resources/prepare.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "0916dfb0e05312c73d1f5e8a7cfc822cfbc0a16e9ce0a837df4110347690994a", + "chksum_sha256": "f1c3c3706f74819eef75c5a6f7fc7a3c8adb78b0ec008d4ef41e382b779b19ef", "format": 1 }, { - "name": "roles/idrac_bios/molecule/update_attributes_immediate_with_jobwait", + "name": "roles/idrac_bios/molecule/clear_pending_attributes", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_bios/molecule/update_attributes_immediate_with_jobwait/converge.yml", + "name": "roles/idrac_bios/molecule/clear_pending_attributes/prepare.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "416f65beecc2e8e53ad7abf57e03a7f089401dbbd0f4eb16789de510950706c9", + "chksum_sha256": "f55f93da3bad79fbdc7b2d5fb5b53ad33442e439ff5f3d6b3d742a610fe0d903", "format": 1 }, { - "name": "roles/idrac_bios/molecule/update_attributes_immediate_with_jobwait/molecule.yml", + "name": "roles/idrac_bios/molecule/clear_pending_attributes/molecule.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "0916dfb0e05312c73d1f5e8a7cfc822cfbc0a16e9ce0a837df4110347690994a", + "chksum_sha256": "f52d711103d50a437830c6fbcd04fb4bab49a0f82f6d26d1c791c6e8488dd090", "format": 1 }, { - "name": "roles/idrac_bios/molecule/update_attributes_on_reset", + "name": "roles/idrac_bios/molecule/clear_pending_attributes/converge.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "833e9d4a796e3d6e80f7ef1091590baf9263cfe66623e468326bb99c12a9c7f9", + "format": 1 + }, + { + "name": "roles/idrac_bios/molecule/update_attributes_immediate", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_bios/molecule/update_attributes_on_reset/converge.yml", + "name": "roles/idrac_bios/molecule/update_attributes_immediate/molecule.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "223982198fa78ae74e7e1cbbaa1fad058036fc89c58918ccf42009d51ca54d56", + "chksum_sha256": "0916dfb0e05312c73d1f5e8a7cfc822cfbc0a16e9ce0a837df4110347690994a", "format": 1 }, { - "name": "roles/idrac_bios/molecule/update_attributes_on_reset/molecule.yml", + "name": "roles/idrac_bios/molecule/update_attributes_immediate/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "dae48a016bbbe31b14341b09c78f16078af041ad7d83f232072bbf07f960fab9", + "chksum_sha256": "c3a6e4124abf9d96581688f23ba05ed99f6e6d49a67dc43e0e2f3477e12f39f4", "format": 1 }, { - "name": "roles/idrac_bios/molecule/update_attributes_on_reset_with_maintenance_window", + "name": "roles/idrac_bios/molecule/negative_scenarios_with_maintenance_window", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_bios/molecule/update_attributes_on_reset_with_maintenance_window/converge.yml", + "name": "roles/idrac_bios/molecule/negative_scenarios_with_maintenance_window/molecule.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "3f53e8d4b80c2dac745f033695febdb4f0c2dd222b7b8ec447164ffb3b44f210", + "chksum_sha256": "1c3ff5ada33af88f7d89035e74a24e9f7ebd0bd1ce9aea711a11e456babcedeb", "format": 1 }, { - "name": "roles/idrac_bios/molecule/update_attributes_on_reset_with_maintenance_window/molecule.yml", + "name": "roles/idrac_bios/molecule/negative_scenarios_with_maintenance_window/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "dae48a016bbbe31b14341b09c78f16078af041ad7d83f232072bbf07f960fab9", + "chksum_sha256": "b9d44e3bf2e9c3dd4a24b59e4b33228d23fca8428f4060d6ace4a7e884fe469e", "format": 1 }, { - "name": "roles/idrac_bios/molecule/update_attributes_with_maintenance_window", + "name": "roles/idrac_bios/README.md", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "f6c25e672dc7aff51b545c0b96e4660ec49c095f46b7de93843c22e37a2da95e", + "format": 1 + }, + { + "name": "roles/idrac_bios/defaults", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_bios/molecule/update_attributes_with_maintenance_window/converge.yml", + "name": "roles/idrac_bios/defaults/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8884874fc4b2a0445cf1e5cea84a17ece3dbf7e3455dc17691d8f52c91e418d1", + "chksum_sha256": "568c7c8e3c076cbb645325bfe8fbac4651420942e7b58902f3001b4472f12cb2", "format": 1 }, { - "name": "roles/idrac_bios/molecule/update_attributes_with_maintenance_window/molecule.yml", + "name": "roles/idrac_bios/tasks", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, + "format": 1 + }, + { + "name": "roles/idrac_bios/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "dae48a016bbbe31b14341b09c78f16078af041ad7d83f232072bbf07f960fab9", + "chksum_sha256": "b45790ebf23ed966d7e99a7ba15314ed882cd366284db9f773386e96687f71e3", "format": 1 }, { - "name": "roles/idrac_bios/tasks", + "name": "roles/idrac_bios/handlers", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_bios/tasks/main.yml", + "name": "roles/idrac_bios/handlers/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "b45790ebf23ed966d7e99a7ba15314ed882cd366284db9f773386e96687f71e3", + "chksum_sha256": "aa8e7c5541c5df8b0c7580807b182ff8d7e5d5cca42e3bbbf3c1aff1ab9cd6b7", "format": 1 }, { @@ -3662,4693 +3627,4742 @@ "format": 1 }, { - "name": "roles/idrac_bios/vars", + "name": "roles/idrac_reset", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_bios/vars/main.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "0f5bc4cf4b6dd8b6d33de490d471c654413d7a5dbe292d025a58e779e14020cf", - "format": 1 - }, - { - "name": "roles/idrac_boot", + "name": "roles/idrac_reset/templates", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_boot/README.md", + "name": "roles/idrac_reset/templates/idrac_lifecycle_controller_status.j2", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "92a0c9cdb08215dd0131c2f5e91d125e2c58a1e9771093c40bf71097f035559a", + "chksum_sha256": "cacc1f259dc7dbef66e2f715f138d3a75ffd5852ad56a2fa4e0f17358f30b4ab", "format": 1 }, { - "name": "roles/idrac_boot/defaults", + "name": "roles/idrac_reset/meta", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_boot/defaults/main.yml", + "name": "roles/idrac_reset/meta/argument_specs.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "fbc348c1aaf27aaa035a1b34a9e496b64dc515388e9a543689c28dc50a597bb2", - "format": 1 - }, - { - "name": "roles/idrac_boot/handlers", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "chksum_sha256": "6af174177901d928f439e83c69caad0fccc601a710ac5b434af7bf5240f70418", "format": 1 }, { - "name": "roles/idrac_boot/handlers/main.yml", + "name": "roles/idrac_reset/meta/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "867b8c424c2b712712af162203358ba5061e926389d7ad4d8a3ee40a0d5b3920", + "chksum_sha256": "0195a66c4e4ac7e78a39c4a8fa223ee0b2d049a09c398eab91080868422c8049", "format": 1 }, { - "name": "roles/idrac_boot/meta", + "name": "roles/idrac_reset/vars", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_boot/meta/argument_specs.yml", + "name": "roles/idrac_reset/vars/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "86cced715db95d2ee43d4cf20d223992c4f5aaf08f8c38b60267fde2f11572e5", + "chksum_sha256": "9e4a4575c14328832a6976cc4aed6b19c07dbfe5997a10ae733b99e50702fa0e", "format": 1 }, { - "name": "roles/idrac_boot/meta/main.yml", + "name": "roles/idrac_reset/README.md", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e247f0476f74edd90842e7e2507e0efc3f21427f80e411e0d740c74292c55c6f", + "chksum_sha256": "00e77ec0ddaa418973cd9cad99137bcef33738171102464f50d3f49f5cf2b3f4", "format": 1 }, { - "name": "roles/idrac_boot/molecule", + "name": "roles/idrac_reset/defaults", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_boot/molecule/boot_options_using_boot_option_reference_enabled_true", + "name": "roles/idrac_reset/defaults/main.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "9cd98c8b578501e6b24cec9c004bc5963e0f479ca4435aabc58ddfa7e63033a0", + "format": 1 + }, + { + "name": "roles/idrac_reset/tasks", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_boot/molecule/boot_options_using_boot_option_reference_enabled_true/molecule.yml", + "name": "roles/idrac_reset/tasks/lcstatus_check.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "f52d711103d50a437830c6fbcd04fb4bab49a0f82f6d26d1c791c6e8488dd090", + "chksum_sha256": "377ab984113ad5d61f3164c7578677c42d727d35eb35c79f61275b794bdb970e", "format": 1 }, { - "name": "roles/idrac_boot/molecule/boot_options_using_boot_option_reference_enabled_true/converge.yml", + "name": "roles/idrac_reset/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "ab30d143cf010145f94f14c05cab91120f717be0cffadc9f348daffa7ac0e8ff", + "chksum_sha256": "17feb74dd2b4bbec2b65ad4044f5af9e8f9660c66a9594cce342a79e178c1225", "format": 1 }, { - "name": "roles/idrac_boot/molecule/boot_options_using_display_name_enabled_false", + "name": "roles/idrac_reset/handlers", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_boot/molecule/boot_options_using_display_name_enabled_false/molecule.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "f52d711103d50a437830c6fbcd04fb4bab49a0f82f6d26d1c791c6e8488dd090", - "format": 1 - }, - { - "name": "roles/idrac_boot/molecule/boot_options_using_display_name_enabled_false/converge.yml", + "name": "roles/idrac_reset/handlers/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "105480778b833d51453b2b22e7ac419eb3865b523bd5f979789e66feaa46c4db", + "chksum_sha256": "0ec20499ab70254c4498ed1783b01bff5fdde39aca5f81f9c7e3f979ba8b384a", "format": 1 }, { - "name": "roles/idrac_boot/molecule/boot_order_using_legacy_mode_force_restart", + "name": "roles/idrac_reset/tests", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_boot/molecule/boot_order_using_legacy_mode_force_restart/molecule.yml", + "name": "roles/idrac_reset/tests/inventory", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "f52d711103d50a437830c6fbcd04fb4bab49a0f82f6d26d1c791c6e8488dd090", + "chksum_sha256": "e02233819b1a09844410549191813f7cc7ba360f21298578f4ba1727a27d87fc", "format": 1 }, { - "name": "roles/idrac_boot/molecule/boot_order_using_legacy_mode_force_restart/converge.yml", + "name": "roles/idrac_reset/tests/test.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "808af97a5a234940ab3c38a93c54f4a164b7cb52ee47107137cc4555b53e9a1d", + "chksum_sha256": "43fa08ab4acc6414c37f0fd53406310d4aa81f970d122feeb5604b40251317d5", "format": 1 }, { - "name": "roles/idrac_boot/molecule/boot_order_using_uefi_mode_graceful_restart", + "name": "roles/idrac_os_deployment", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_boot/molecule/boot_order_using_uefi_mode_graceful_restart/molecule.yml", + "name": "roles/idrac_os_deployment/templates", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, + "format": 1 + }, + { + "name": "roles/idrac_os_deployment/templates/RHEL_8.j2", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "f52d711103d50a437830c6fbcd04fb4bab49a0f82f6d26d1c791c6e8488dd090", + "chksum_sha256": "c1b54a6b4b5d2ccfeca7376a758389d0de0d5cb2c489189f2690616909b0e6ab", "format": 1 }, { - "name": "roles/idrac_boot/molecule/boot_order_using_uefi_mode_graceful_restart/converge.yml", + "name": "roles/idrac_os_deployment/templates/RHEL_9.j2", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "9fb0c40a0d88c86aa9056a949b626eadceadaf9379731fd83045b2cb1c12aa14", + "chksum_sha256": "54d4812cce2199771afaaeedf6fc8d813152f824097195dfb76284bbdebfadb4", "format": 1 }, { - "name": "roles/idrac_boot/molecule/boot_source_override_enabled_as_continuous_reset_type_none", + "name": "roles/idrac_os_deployment/templates/ESXI_8.j2", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "998e80a725d3e21a3b68e6368decadd5c66196afdc74dc9947ff2282dcec144f", + "format": 1 + }, + { + "name": "roles/idrac_os_deployment/meta", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_boot/molecule/boot_source_override_enabled_as_continuous_reset_type_none/converge.yml", + "name": "roles/idrac_os_deployment/meta/argument_specs.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "038690fb11c33de166dc94bf35d151639978151731963af7ec44234ced12eb06", + "chksum_sha256": "9e69ff8ddd86e522acf91f9ca4efd9099947ecb857dd1138e8c7aef4793d816a", "format": 1 }, { - "name": "roles/idrac_boot/molecule/boot_source_override_enabled_as_continuous_reset_type_none/molecule.yml", + "name": "roles/idrac_os_deployment/meta/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "de8583bbc3924432cfe625f9899beb6ad7848058e61d1ecabd745ec810ee5498", + "chksum_sha256": "db297ffe635bcee661eaee0844312d69cc364d67cc427bab545865674401c9b9", "format": 1 }, { - "name": "roles/idrac_boot/molecule/boot_source_override_enabled_as_disabled_reset_type_none", + "name": "roles/idrac_os_deployment/vars", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_boot/molecule/boot_source_override_enabled_as_disabled_reset_type_none/converge.yml", + "name": "roles/idrac_os_deployment/vars/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "a1eb678af41caaa30a1a302cbf75849714d9e0e804ae64c8145ff3a8f6518660", + "chksum_sha256": "a6d9f6ecca54f00e015debd5807eecd29aee9c3118d6a710768074c6eb625b9b", "format": 1 }, { - "name": "roles/idrac_boot/molecule/boot_source_override_enabled_as_disabled_reset_type_none/molecule.yml", + "name": "roles/idrac_os_deployment/README.md", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "f52d711103d50a437830c6fbcd04fb4bab49a0f82f6d26d1c791c6e8488dd090", + "chksum_sha256": "e800016c9724604f5c12210c94b830bbc27bd4996205fcd74a31768f754b0a1f", "format": 1 }, { - "name": "roles/idrac_boot/molecule/boot_source_override_enabled_as_once_reset_type_none", + "name": "roles/idrac_os_deployment/defaults", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_boot/molecule/boot_source_override_enabled_as_once_reset_type_none/molecule.yml", + "name": "roles/idrac_os_deployment/defaults/main", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, + "format": 1 + }, + { + "name": "roles/idrac_os_deployment/defaults/main/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "f52d711103d50a437830c6fbcd04fb4bab49a0f82f6d26d1c791c6e8488dd090", + "chksum_sha256": "759f139407f609b8655150fe9df73e69025bbaadc01b6c69e07729867539d583", "format": 1 }, { - "name": "roles/idrac_boot/molecule/boot_source_override_enabled_as_once_reset_type_none/converge.yml", + "name": "roles/idrac_os_deployment/defaults/main/rhel.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "272d65772e3c0602b288c8afc69a647482a57d9572e0d971aa9c9a35f5944b79", + "chksum_sha256": "e2a5308265f0edf9cdb641063bbf2c2e877a9693154b04cf3a4b9a784f3934c0", "format": 1 }, { - "name": "roles/idrac_boot/molecule/boot_source_override_mode_legacy_job_wait_false", + "name": "roles/idrac_os_deployment/defaults/main/esxi.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "5393035ed221c2ced358b9d585fd1881817a8b31b0dd030ba32e81ecd8a7f4df", + "format": 1 + }, + { + "name": "roles/idrac_os_deployment/tasks", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_boot/molecule/boot_source_override_mode_legacy_job_wait_false/molecule.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "f52d711103d50a437830c6fbcd04fb4bab49a0f82f6d26d1c791c6e8488dd090", + "name": "roles/idrac_os_deployment/tasks/tracking", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_boot/molecule/boot_source_override_mode_legacy_job_wait_false/converge.yml", + "name": "roles/idrac_os_deployment/tasks/tracking/track_for_os_deployment.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "78a4eaa877f5633e31f590a372723c137736dd11b9a113d36e198435755eb54c", + "chksum_sha256": "df751495e4839501919602cebe8c24677e11d191394353b13e5b6448af44459e", "format": 1 }, { - "name": "roles/idrac_boot/molecule/boot_source_override_mode_uefi_with_resource_id", + "name": "roles/idrac_os_deployment/tasks/clean_up", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_boot/molecule/boot_source_override_mode_uefi_with_resource_id/molecule.yml", + "name": "roles/idrac_os_deployment/tasks/clean_up/clean_up_working_directory.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "f52d711103d50a437830c6fbcd04fb4bab49a0f82f6d26d1c791c6e8488dd090", + "chksum_sha256": "6cb3708d332825d39b859aecd1df938ef1b3bc63b92213c1195432e7ffa9d0aa", "format": 1 }, { - "name": "roles/idrac_boot/molecule/boot_source_override_mode_uefi_with_resource_id/converge.yml", + "name": "roles/idrac_os_deployment/tasks/clean_up/clean_up_destinations.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "b2b06a3776dfd89429ebc65b6e626e1caa9c3bb2c3210c208add9cad25e7b169", + "chksum_sha256": "d9a4258e490a7d6f72372a85f128243594c709f26020b61761ff2064d6837d46", "format": 1 }, { - "name": "roles/idrac_boot/molecule/default", + "name": "roles/idrac_os_deployment/tasks/rhel", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_boot/molecule/default/converge.yml", + "name": "roles/idrac_os_deployment/tasks/rhel/compile_iso.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "2ef1e42f64b6b1036298447aa4188460ae395dc4af25ab0d0b139d15fbe47df4", + "chksum_sha256": "8d4b130336f4349cd1c3bd96c1f52f1fcd81615bcead7e9fa39d46883ebf41f6", "format": 1 }, { - "name": "roles/idrac_boot/molecule/default/molecule.yml", + "name": "roles/idrac_os_deployment/tasks/idrac", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, + "format": 1 + }, + { + "name": "roles/idrac_os_deployment/tasks/idrac/attach_iso_to_virtual_media.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "c7c031cbadc0f08f5dfacd846de58729e2900c340492871c191e4ac6b504ddc9", + "chksum_sha256": "2d7ed30e4c808fc88df7f59a669b8bb1b561bf002c332b3a8296c73e19d6c660", "format": 1 }, { - "name": "roles/idrac_boot/tasks", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "roles/idrac_os_deployment/tasks/idrac/set_boot_mode_and_restart.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "f0502bbe2d8e5411fda7e5e87820654f14f2641a500eeab7c8a5a5636892cce2", "format": 1 }, { - "name": "roles/idrac_boot/tasks/main.yml", + "name": "roles/idrac_os_deployment/tasks/idrac/clean_up_virtual_media_slot.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "15e5c2cab8d295c1d6957b2fef3bdbc2222f003b023a0aba83dadb606f11bd03", + "chksum_sha256": "f03831c4aa6b588e969bccdce38b75d49969eae2f5543b8ba9e94510cb18eb29", "format": 1 }, { - "name": "roles/idrac_boot/tests", + "name": "roles/idrac_os_deployment/tasks/iso", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_boot/tests/inventory", + "name": "roles/idrac_os_deployment/tasks/iso/extract_iso.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e02233819b1a09844410549191813f7cc7ba360f21298578f4ba1727a27d87fc", + "chksum_sha256": "09edb456108a3a29a94573ac4568446c5b401930b1f7bf8b051502fd2d064a7b", "format": 1 }, { - "name": "roles/idrac_boot/tests/test.yml", + "name": "roles/idrac_os_deployment/tasks/iso/generate_kickstart_file.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "365ea1cad2e4ffb62f1a086752e377bc9a3fa010685b7c15211be1dec90813c4", + "chksum_sha256": "aa2a8cd54823f99a1f61b0453048b228e440bdf1c4e274b0f0ae7635990d083e", "format": 1 }, { - "name": "roles/idrac_boot/vars", + "name": "roles/idrac_os_deployment/tasks/esxi", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_boot/vars/main.yml", + "name": "roles/idrac_os_deployment/tasks/esxi/compile_iso.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "50ca20875f667975a478f6fd4cf78866cdfbfc89891bbceede99a1150aa258ff", + "chksum_sha256": "ea92a3796b8d00ba6e0e65146d6089201a6bd4f6fdfb01467279414ac69fd024", "format": 1 }, { - "name": "roles/idrac_certificate", + "name": "roles/idrac_os_deployment/tasks/main.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "7414db3ca8e33e14b34126b64b5eddefc24d27ac2e3d3d0b9a33284acba29c16", + "format": 1 + }, + { + "name": "roles/idrac_os_deployment/tasks/common", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_certificate/README.md", + "name": "roles/idrac_os_deployment/tasks/common/download_or_copy_source_files.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8c9a1ba53346f348b656ce43ae836d01e341d173aa793536b7b83d39a478664b", + "chksum_sha256": "ec7e75367105039f8833bb8bcacf522f137bd7456162c99987aa0a8ddb2761de", "format": 1 }, { - "name": "roles/idrac_certificate/defaults", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "roles/idrac_os_deployment/tasks/common/copy_iso_to_destination.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "163156845f185684a862eb1ba7f0023119f51798898d9bb79209a8f15ea80b20", "format": 1 }, { - "name": "roles/idrac_certificate/defaults/main.yml", + "name": "roles/idrac_os_deployment/tasks/common/create_working_directory_path.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "6cf00eee21d159b121fb581e5c186c22803b7605acdd260c54e5d58969a94520", + "chksum_sha256": "e5d3c043120b0788f2a4a4e5f8dcd26adc600065c47c423f92eeca3907c21d4a", "format": 1 }, { - "name": "roles/idrac_certificate/handlers", + "name": "roles/idrac_os_deployment/tasks/common/validate_inputs.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "4e70fbc15dd06a835d5cbf840d4bd93f8c1f1d0d4214f6555e68cbbd4c2256e1", + "format": 1 + }, + { + "name": "roles/idrac_os_deployment/handlers", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_certificate/handlers/main.yml", + "name": "roles/idrac_os_deployment/handlers/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "66d821f9940918fd71847d8db4b05eb937a6de3f457ad7b9b6412762d51d1f41", + "chksum_sha256": "82cb53c7b2545e1a7883e32efdebbc34bd69bbad9ccbeabd190c3028f7f05777", "format": 1 }, { - "name": "roles/idrac_certificate/meta", + "name": "roles/idrac_os_deployment/tests", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_certificate/meta/argument_specs.yml", + "name": "roles/idrac_os_deployment/tests/inventory", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "0bcfa9cc16612b7726b60e9091be9e85bff3ea73991cbde070e977c434eeb827", + "chksum_sha256": "0647d824fd28557a0b72bcdc079671c07571c1ee008efd92728e1291b7ca3eac", "format": 1 }, { - "name": "roles/idrac_certificate/meta/main.yml", + "name": "roles/idrac_os_deployment/tests/test.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "b2a5d6be0d2bb806d5549884a7ac88cd841662629e2b15a9a7ab67177250f7bf", + "chksum_sha256": "f9d3fffd8a4834828c2dab606405d1fe11f12c5e4b14142c99221f689597c857", "format": 1 }, { - "name": "roles/idrac_certificate/molecule", + "name": "roles/README.md", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "8091502909248e459a4b18ea05ca7bf36c1022419c31b23e4765684315129c22", + "format": 1 + }, + { + "name": "roles/idrac_firmware", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_certificate/molecule/CA", + "name": "roles/idrac_firmware/meta", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_certificate/molecule/CA/molecule.yml", + "name": "roles/idrac_firmware/meta/argument_specs.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", + "chksum_sha256": "7f0cf3892bdc532a0bd6dd0bc448f090139919f4fc9e1500bafe47d2fcda9aca", "format": 1 }, { - "name": "roles/idrac_certificate/molecule/CA/converge.yml", + "name": "roles/idrac_firmware/meta/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "5bf154879b4a34b326240ccb33a490a5f8bc7f228248db93c02baaaa0869d09e", + "chksum_sha256": "c8afa3f929d14d3f681ce7379d32b9ac1f64d820d03d79b272a083deb6676017", "format": 1 }, { - "name": "roles/idrac_certificate/molecule/CSC", + "name": "roles/idrac_firmware/vars", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_certificate/molecule/CSC/molecule.yml", + "name": "roles/idrac_firmware/vars/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", + "chksum_sha256": "76a25139790ece31962351e91c95883e5233a87e63d93e6c044dbf5a0c0604ae", "format": 1 }, { - "name": "roles/idrac_certificate/molecule/CSC/converge.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "99431629f17cbe04456ef0f839377cb71a7ae2b7c541deba9a4b769bba4c06f4", + "name": "roles/idrac_firmware/molecule", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_certificate/molecule/CTC", + "name": "roles/idrac_firmware/molecule/default", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_certificate/molecule/CTC/molecule.yml", + "name": "roles/idrac_firmware/molecule/default/molecule.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", + "chksum_sha256": "f6128fe631d272bed3adb4c98223a2b04d554093dc05a2c499eeb9e6d80c9ac7", "format": 1 }, { - "name": "roles/idrac_certificate/molecule/CTC/converge.yml", + "name": "roles/idrac_firmware/molecule/default/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "ecd35a2c8d4a1223c5a37a4e80a2f9a950f633357f2eb2655f6f20ca30198c5c", + "chksum_sha256": "b8f562b0f8963d6fb1653344be6a0391d63b54ed70b7f23e3086a030fc14463b", "format": 1 }, { - "name": "roles/idrac_certificate/molecule/CustomCertificate", + "name": "roles/idrac_firmware/molecule/http_share", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_certificate/molecule/CustomCertificate/molecule.yml", + "name": "roles/idrac_firmware/molecule/http_share/molecule.yml", "ftype": "file", "chksum_type": "sha256", "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "roles/idrac_certificate/molecule/CustomCertificate/converge.yml", + "name": "roles/idrac_firmware/molecule/http_share/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "65da72677ef3b2e1c383087b86fda3d45434287ce1cf2ddb4968b0a2ff0bf7c7", + "chksum_sha256": "e78dce79455ba2ae773abf7ef878883286686923dbd95b7f157ac006200ca670", "format": 1 }, { - "name": "roles/idrac_certificate/molecule/HTTPS", + "name": "roles/idrac_firmware/molecule/nfs_share", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_certificate/molecule/HTTPS/molecule.yml", + "name": "roles/idrac_firmware/molecule/nfs_share/molecule.yml", "ftype": "file", "chksum_type": "sha256", "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "roles/idrac_certificate/molecule/HTTPS/converge.yml", + "name": "roles/idrac_firmware/molecule/nfs_share/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "f06ff94029cdaceaf9865f0299fc6013b0fea5193ddbd07d078f543eb146d27f", + "chksum_sha256": "31631bf50bdb9a5b035dcaa97b4c1cba71139e886468ee04666191f8418a65ec", "format": 1 }, { - "name": "roles/idrac_certificate/molecule/SSLKEY", + "name": "roles/idrac_firmware/molecule/httpsproxy_share", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_certificate/molecule/SSLKEY/molecule.yml", + "name": "roles/idrac_firmware/molecule/httpsproxy_share/molecule.yml", "ftype": "file", "chksum_type": "sha256", "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "roles/idrac_certificate/molecule/SSLKEY/converge.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "0f8fc730b66884b45530be3fdbdbed659d79387466637b2fb129573fbc74cbee", - "format": 1 - }, - { - "name": "roles/idrac_certificate/molecule/__delete_directory.yml", + "name": "roles/idrac_firmware/molecule/httpsproxy_share/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "5acaf39dad31445f79924aadfd59f40857cce066a2bd4ef3dc1c3fd9ed2de0c7", + "chksum_sha256": "d362f33905add12d47dd5b02d798d55eb29ada085cda85e8cd37ba04f97cde87", "format": 1 }, { - "name": "roles/idrac_certificate/molecule/__extract_firmware_version.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "d2c1e0fbf65e8b1c4ecd02182ada8dbbd320fd9828f0e50eea57450892e9c5c5", + "name": "roles/idrac_firmware/molecule/negative_scenarios", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_certificate/molecule/__get_helper.yml", + "name": "roles/idrac_firmware/molecule/negative_scenarios/molecule.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "d510c89d7a712cd198e199f8b885057154f906a27dc18f90734362ad192b783a", + "chksum_sha256": "f6128fe631d272bed3adb4c98223a2b04d554093dc05a2c499eeb9e6d80c9ac7", "format": 1 }, { - "name": "roles/idrac_certificate/molecule/__get_ssl_key.yml", + "name": "roles/idrac_firmware/molecule/negative_scenarios/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "7367f06df38c4c2fe8b9a280dfda2ac001eae5e3c8d7c62daec8856e9dd8d55e", + "chksum_sha256": "c65a450270cb2725ea0c0d77439695d6fdf0721f6711d35265baab3f8aacbf9e", "format": 1 }, { - "name": "roles/idrac_certificate/molecule/default", + "name": "roles/idrac_firmware/molecule/ftp_share", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_certificate/molecule/default/molecule.yml", + "name": "roles/idrac_firmware/molecule/ftp_share/molecule.yml", "ftype": "file", "chksum_type": "sha256", "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "roles/idrac_certificate/molecule/default/converge.yml", + "name": "roles/idrac_firmware/molecule/ftp_share/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "3b8b6811b2776890e59fdddbf667a5d2f8e25207cb478cf865c5c97140ac586a", + "chksum_sha256": "a031dc6f65a6c3a7b75af9a1cff7206ccbd32d061c2738fd180aee6d86368a4e", "format": 1 }, { - "name": "roles/idrac_certificate/molecule/generateCSR", + "name": "roles/idrac_firmware/molecule/https_share", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_certificate/molecule/generateCSR/molecule.yml", + "name": "roles/idrac_firmware/molecule/https_share/molecule.yml", "ftype": "file", "chksum_type": "sha256", "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "roles/idrac_certificate/molecule/generateCSR/converge.yml", + "name": "roles/idrac_firmware/molecule/https_share/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "57033a2a72d8b711a5c6c2e46131a5b1b1ce8068b43a81f0a51dd44d022bfe36", + "chksum_sha256": "23232705312d495854c47436c1481e826373b541e19ec964ed6ad07a9fdd9208", "format": 1 }, { - "name": "roles/idrac_certificate/molecule/reset", + "name": "roles/idrac_firmware/molecule/cifs_share", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_certificate/molecule/reset/molecule.yml", + "name": "roles/idrac_firmware/molecule/cifs_share/molecule.yml", "ftype": "file", "chksum_type": "sha256", "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "roles/idrac_certificate/molecule/reset/converge.yml", + "name": "roles/idrac_firmware/molecule/cifs_share/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "5b646c45281197bec65800696292b5e6d62ba1aa36be2149c7de10b439ddba55", + "chksum_sha256": "e9cba7b8006136cf795ca98cca97e649fb9965988a7c5b4669c6fa77919693b9", "format": 1 }, { - "name": "roles/idrac_certificate/tasks", + "name": "roles/idrac_firmware/README.md", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "2aa85fe4ddb50b123a7922cbdc78e9b8b479816d298a5f77b462c00c4f0a2d0d", + "format": 1 + }, + { + "name": "roles/idrac_firmware/defaults", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_certificate/tasks/export.yml", + "name": "roles/idrac_firmware/defaults/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "80cffca71ccf99a8cbbdcc7e4cad320663e0064ac47faf66b1a62ab2a751d177", + "chksum_sha256": "7d35d5e950afdd8a3f36385d957aef5f2348add525025b7b6e786070e4d1f2a9", "format": 1 }, { - "name": "roles/idrac_certificate/tasks/generate_csr.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "aef02f22f523b789c3a397b9f9b7c39c166e754b978f4920177bcbc53067e211", + "name": "roles/idrac_firmware/tasks", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_certificate/tasks/import.yml", + "name": "roles/idrac_firmware/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "1a6a2edb98266da8d17726347dc0b3a0c5c270dd44bc0dadeca28a493163b6cc", + "chksum_sha256": "9878250caee484ccd585db63e5c38597e606587c475e3e993431329b1d14440d", "format": 1 }, { - "name": "roles/idrac_certificate/tasks/main.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "8500b36628049770984d5c5737419aa9e2e209cda3eae776b981ab8bb70885b5", + "name": "roles/idrac_firmware/handlers", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_certificate/tasks/reset.yml", + "name": "roles/idrac_firmware/handlers/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "82b70c0d2bb2c126a73c04c392513fbfa84f4626a6d5f2c855e45bb1bd5e0df7", + "chksum_sha256": "dc76fe5e14c723905484243dd4f75b8158ae7ad1c7c85f21c275ad1f3aafe886", "format": 1 }, { - "name": "roles/idrac_certificate/tests", + "name": "roles/idrac_firmware/tests", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_certificate/tests/inventory", + "name": "roles/idrac_firmware/tests/inventory", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "d906aecb61d076a967d9ffe8821c7b04b063f72df9d9e35b33ef36b1c0d98f16", + "chksum_sha256": "e02233819b1a09844410549191813f7cc7ba360f21298578f4ba1727a27d87fc", "format": 1 }, { - "name": "roles/idrac_certificate/tests/test.yml", + "name": "roles/idrac_firmware/tests/test.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "05252420e22b201c04db4b4e79f650a9bbb561aea0caec3d3e253d825637f11d", + "chksum_sha256": "892ec6c42a76c0f6ba5fc628f5455f78700271bffabdbafde5eed32df1699d92", "format": 1 }, { - "name": "roles/idrac_certificate/vars", + "name": "roles/idrac_storage_controller", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_certificate/vars/main.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "a35cfc80bcacd3b412a6505f8c5e599a8eee9487788a4dd7c8b69a6882b07c59", - "format": 1 - }, - { - "name": "roles/idrac_export_server_config_profile", + "name": "roles/idrac_storage_controller/meta", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_export_server_config_profile/README.md", + "name": "roles/idrac_storage_controller/meta/argument_specs.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "36902b75877782020af54e7c969630ae84f2ee9872c4ec4350a6ae79e06c930b", + "chksum_sha256": "57c999b43cebe8874baf8ce6a3fbe7a603c69bc0101577c73d7eb1d8720fa066", "format": 1 }, { - "name": "roles/idrac_export_server_config_profile/defaults", + "name": "roles/idrac_storage_controller/meta/main.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "3eda64bf454dd351cebf7063807750d690c44072601bae3af6144460a5323e6b", + "format": 1 + }, + { + "name": "roles/idrac_storage_controller/vars", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_export_server_config_profile/defaults/main.yml", + "name": "roles/idrac_storage_controller/vars/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "35809f9a6cc33e2577870d883ad657e720b46ee3a2a0777f895d490ffa845ca1", + "chksum_sha256": "981bc0f2d638983323e5081845acf0ac97ddf1cd5e603cf517051f69661a9cec", "format": 1 }, { - "name": "roles/idrac_export_server_config_profile/handlers", + "name": "roles/idrac_storage_controller/README.md", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "64f1956a2b0638551ece563c4f072e2c27553b76e4f381c22316d9e18d47d6b7", + "format": 1 + }, + { + "name": "roles/idrac_storage_controller/defaults", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_export_server_config_profile/handlers/main.yml", + "name": "roles/idrac_storage_controller/defaults/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "1bf8b1e4781f050ca3d526439f50cead1680b8fbebfe4ba140b8f05c648ccbf7", + "chksum_sha256": "15213c1a91c203930ede7c03d11efa362d86d0f94e6822268e714e8e7a98b14d", "format": 1 }, { - "name": "roles/idrac_export_server_config_profile/meta", + "name": "roles/idrac_storage_controller/tasks", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_export_server_config_profile/meta/argument_specs.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "7df7a3c628dee71fa4ce697d0da28ea42f1eebf667853e84124e2971af446c42", - "format": 1 - }, - { - "name": "roles/idrac_export_server_config_profile/meta/main.yml", + "name": "roles/idrac_storage_controller/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "2a7dec7c1e8eb54a57fc78788b66c44e036b676ad62bd998114d7b87fd32e431", + "chksum_sha256": "ea1e319497a59c9d00d925cec6f1bcaf7c672b1b3e6d9a671c95a1c9e89c9f77", "format": 1 }, { - "name": "roles/idrac_export_server_config_profile/molecule", + "name": "roles/idrac_storage_controller/handlers", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_export_server_config_profile/molecule/default", + "name": "roles/idrac_storage_controller/handlers/main.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "527bd186562deac98b997410a770da9d22afee10005f965d699859e2a4df5ce0", + "format": 1 + }, + { + "name": "roles/idrac_storage_controller/tests", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_export_server_config_profile/molecule/default/molecule.yml", + "name": "roles/idrac_storage_controller/tests/inventory", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "6c0d5bf979a0ad1541b496f173165b11f0ad14283391efde2c86ee35c477eb43", + "chksum_sha256": "e02233819b1a09844410549191813f7cc7ba360f21298578f4ba1727a27d87fc", "format": 1 }, { - "name": "roles/idrac_export_server_config_profile/molecule/default/cleanup.yml", + "name": "roles/idrac_storage_controller/tests/test.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "cd932a799fefa81f0aafeb32b788e887e555c076f2b5fedb3ea75e81eb7f707b", + "chksum_sha256": "6992dd1f8393638377d59efa1ddbd6e728bffc188f6997d3b5c98208ce710853", "format": 1 }, { - "name": "roles/idrac_export_server_config_profile/molecule/default/converge.yml", + "name": "roles/molecule.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "621eb2a293781a0408900a6df0884360a7ed673e610b0cbdfe67db3221f62b16", + "chksum_sha256": "a681a11158030f89670466b71c1cc02663571a4b551b2e3a7924ad23096e48cd", "format": 1 }, { - "name": "roles/idrac_export_server_config_profile/molecule/default/verify.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "6674f5a55b2b9311c78b61713e305a7b6419f02de40cabd4fdb337f234cd88fa", + "name": "roles/redfish_storage_volume", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_export_server_config_profile/tasks", + "name": "roles/redfish_storage_volume/meta", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_export_server_config_profile/tasks/main.yml", + "name": "roles/redfish_storage_volume/meta/argument_specs.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "1558146a88520a40c77e451c4a7ab0f54fc2cf83de382bf80b3d608b9eae29a9", + "chksum_sha256": "8098e64b110bba2ed1aaf28aa39abc87c5085f84149271719bb97376d1181aa3", "format": 1 }, { - "name": "roles/idrac_export_server_config_profile/tasks/pre_req.yml", + "name": "roles/redfish_storage_volume/meta/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "121b8bc546708066ec1bd268af42e70cb396f1d2a99450d89ecb3eebbacf3c29", + "chksum_sha256": "310a9f23099629e5643b4dfdfa22af40cd4f78f3037fe1a5f6915c322e12feb0", "format": 1 }, { - "name": "roles/idrac_export_server_config_profile/tasks/scp_export_cifs.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "ee2d348b52f7e2711260348db0ff8ad9e0f7c4eb4a391c1de53da94e1002a406", + "name": "roles/redfish_storage_volume/vars", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_export_server_config_profile/tasks/scp_export_http.yml", + "name": "roles/redfish_storage_volume/vars/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "b8ec53a81eacd4b32bb0b7f5e209d85c386b001c541f581d51c17e38f7095836", + "chksum_sha256": "5d396acd98a3478d4a32965b818a75ebfddf7cc5725e8a0fac6093830ef34ad9", "format": 1 }, { - "name": "roles/idrac_export_server_config_profile/tasks/scp_export_https.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "3ef7408260c8297ac606633989ae2a26f24a15c493dfbdb7f38ae0c4e20abb84", + "name": "roles/redfish_storage_volume/molecule", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_export_server_config_profile/tasks/scp_export_local.yml", + "name": "roles/redfish_storage_volume/molecule/apply_time_immediate", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, + "format": 1 + }, + { + "name": "roles/redfish_storage_volume/molecule/apply_time_immediate/molecule.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "3d2296ccd8268dbd87cd0dfb3f82bacd1b93cba1ebe898797ac01d681f30f1e5", + "chksum_sha256": "f52d711103d50a437830c6fbcd04fb4bab49a0f82f6d26d1c791c6e8488dd090", "format": 1 }, { - "name": "roles/idrac_export_server_config_profile/tasks/scp_export_nfs.yml", + "name": "roles/redfish_storage_volume/molecule/apply_time_immediate/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "ce2b8a6305affda2aaac530edf3e05695c8ed2ff994799fe4e84b77050a33617", + "chksum_sha256": "defd2475ab056ad28cf76397ae6f42ac3f7440c041546b6ecf0c488517fbd2d4", "format": 1 }, { - "name": "roles/idrac_export_server_config_profile/tests", + "name": "roles/redfish_storage_volume/molecule/RAID60", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_export_server_config_profile/tests/inventory", + "name": "roles/redfish_storage_volume/molecule/RAID60/molecule.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e02233819b1a09844410549191813f7cc7ba360f21298578f4ba1727a27d87fc", + "chksum_sha256": "f52d711103d50a437830c6fbcd04fb4bab49a0f82f6d26d1c791c6e8488dd090", "format": 1 }, { - "name": "roles/idrac_export_server_config_profile/tests/test.yml", + "name": "roles/redfish_storage_volume/molecule/RAID60/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "6d5634aec64528ab58532686cef5828500fbfcd3b729e0333e20b63365f4a080", + "chksum_sha256": "d33d97618ffcc391d674d3345e4701a2ce217eaf2676694346cc76ad008da05e", "format": 1 }, { - "name": "roles/idrac_export_server_config_profile/vars", + "name": "roles/redfish_storage_volume/molecule/RAID1", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_export_server_config_profile/vars/main.yml", + "name": "roles/redfish_storage_volume/molecule/RAID1/molecule.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "ac68a419593778d913a88752aa73cf05946ca0438db7f4584d6174b04c0c400a", - "format": 1 - }, - { - "name": "roles/idrac_firmware", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "roles/idrac_firmware/README.md", + "name": "roles/redfish_storage_volume/molecule/RAID1/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "2aa85fe4ddb50b123a7922cbdc78e9b8b479816d298a5f77b462c00c4f0a2d0d", + "chksum_sha256": "bf3b39d9fc6450c880a0e5ab61e904844fb9c1e1b112d72be49da7401eef7ba9", "format": 1 }, { - "name": "roles/idrac_firmware/defaults", + "name": "roles/redfish_storage_volume/molecule/RAID0", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_firmware/defaults/main.yml", + "name": "roles/redfish_storage_volume/molecule/RAID0/molecule.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "7d35d5e950afdd8a3f36385d957aef5f2348add525025b7b6e786070e4d1f2a9", + "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "roles/idrac_firmware/handlers", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "roles/redfish_storage_volume/molecule/RAID0/converge.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "79d8cf155feafc68b8d2d03b79c6a04b5c66e9e5f9e87741ac71c57f54a1c089", "format": 1 }, { - "name": "roles/idrac_firmware/handlers/main.yml", + "name": "roles/redfish_storage_volume/molecule/__extract_storage.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "dc76fe5e14c723905484243dd4f75b8158ae7ad1c7c85f21c275ad1f3aafe886", + "chksum_sha256": "971c811200c00ba90bf9bd999d45ec7750ba63d9f5e2d75c3929ae89f82b9f72", "format": 1 }, { - "name": "roles/idrac_firmware/meta", + "name": "roles/redfish_storage_volume/molecule/default", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_firmware/meta/argument_specs.yml", + "name": "roles/redfish_storage_volume/molecule/default/molecule.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "7f0cf3892bdc532a0bd6dd0bc448f090139919f4fc9e1500bafe47d2fcda9aca", + "chksum_sha256": "37fbd5cff4f3f926cee6902730801fa0b2b9058379389c6180f7a1224eaaf09c", "format": 1 }, { - "name": "roles/idrac_firmware/meta/main.yml", + "name": "roles/redfish_storage_volume/molecule/default/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "c8afa3f929d14d3f681ce7379d32b9ac1f64d820d03d79b272a083deb6676017", + "chksum_sha256": "5d047f2576796d6cd610997fdf03d7febf5095f3695627deeb87f663150f84b4", "format": 1 }, { - "name": "roles/idrac_firmware/molecule", + "name": "roles/redfish_storage_volume/molecule/RAID10", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_firmware/molecule/cifs_share", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "roles/redfish_storage_volume/molecule/RAID10/molecule.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "roles/idrac_firmware/molecule/cifs_share/molecule.yml", + "name": "roles/redfish_storage_volume/molecule/RAID10/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", + "chksum_sha256": "c443aef978e1312010f754d04cb5c6da231557f5a044f4aa77e6832ae9526908", "format": 1 }, { - "name": "roles/idrac_firmware/molecule/cifs_share/converge.yml", + "name": "roles/redfish_storage_volume/molecule/__lc_status.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e9cba7b8006136cf795ca98cca97e649fb9965988a7c5b4669c6fa77919693b9", + "chksum_sha256": "602b7c37a4a50ca9f143caa2479ff5c737e7592d1c802f8f6ffadbc7579077b1", "format": 1 }, { - "name": "roles/idrac_firmware/molecule/default", + "name": "roles/redfish_storage_volume/molecule/apply_time_default", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_firmware/molecule/default/molecule.yml", + "name": "roles/redfish_storage_volume/molecule/apply_time_default/molecule.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "f6128fe631d272bed3adb4c98223a2b04d554093dc05a2c499eeb9e6d80c9ac7", + "chksum_sha256": "f52d711103d50a437830c6fbcd04fb4bab49a0f82f6d26d1c791c6e8488dd090", "format": 1 }, { - "name": "roles/idrac_firmware/molecule/default/converge.yml", + "name": "roles/redfish_storage_volume/molecule/apply_time_default/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "b8f562b0f8963d6fb1653344be6a0391d63b54ed70b7f23e3086a030fc14463b", + "chksum_sha256": "65331bfaa443cd7ff715e673d30abb2be2e3acad8ff0c0161cc002b4df3ef030", "format": 1 }, { - "name": "roles/idrac_firmware/molecule/ftp_share", + "name": "roles/redfish_storage_volume/molecule/apply_time_onreset_reboot_server_true_force_reboot_true", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_firmware/molecule/ftp_share/molecule.yml", + "name": "roles/redfish_storage_volume/molecule/apply_time_onreset_reboot_server_true_force_reboot_true/molecule.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", + "chksum_sha256": "f52d711103d50a437830c6fbcd04fb4bab49a0f82f6d26d1c791c6e8488dd090", "format": 1 }, { - "name": "roles/idrac_firmware/molecule/ftp_share/converge.yml", + "name": "roles/redfish_storage_volume/molecule/apply_time_onreset_reboot_server_true_force_reboot_true/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "a031dc6f65a6c3a7b75af9a1cff7206ccbd32d061c2738fd180aee6d86368a4e", + "chksum_sha256": "ec06873a01c77fa0cfe3d4e85c647f5c41ee33675b9b254a7cc697451a8c2a87", "format": 1 }, { - "name": "roles/idrac_firmware/molecule/http_share", + "name": "roles/redfish_storage_volume/molecule/apply_time_onreset_reboot_server_true", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_firmware/molecule/http_share/molecule.yml", + "name": "roles/redfish_storage_volume/molecule/apply_time_onreset_reboot_server_true/molecule.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", + "chksum_sha256": "f52d711103d50a437830c6fbcd04fb4bab49a0f82f6d26d1c791c6e8488dd090", "format": 1 }, { - "name": "roles/idrac_firmware/molecule/http_share/converge.yml", + "name": "roles/redfish_storage_volume/molecule/apply_time_onreset_reboot_server_true/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e78dce79455ba2ae773abf7ef878883286686923dbd95b7f157ac006200ca670", + "chksum_sha256": "0a14046372f6e7f33908931a7edeb09e73dc4ec5bde6e1778b61fe23054a2735", "format": 1 }, { - "name": "roles/idrac_firmware/molecule/https_share", + "name": "roles/redfish_storage_volume/molecule/__job_track.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "4ac8080105eab85b5b077ac94669ff8fc03600675b5d86258ee27ca26e6ceebd", + "format": 1 + }, + { + "name": "roles/redfish_storage_volume/molecule/initialization", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_firmware/molecule/https_share/molecule.yml", + "name": "roles/redfish_storage_volume/molecule/initialization/molecule.yml", "ftype": "file", "chksum_type": "sha256", "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "roles/idrac_firmware/molecule/https_share/converge.yml", + "name": "roles/redfish_storage_volume/molecule/initialization/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "23232705312d495854c47436c1481e826373b541e19ec964ed6ad07a9fdd9208", - "format": 1 - }, - { - "name": "roles/idrac_firmware/molecule/httpsproxy_share", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "chksum_sha256": "d2204316b3f71e879600ede864aaa0e5b53ac0b5cc5422b4766a6e789a0d9dfd", "format": 1 }, { - "name": "roles/idrac_firmware/molecule/httpsproxy_share/molecule.yml", + "name": "roles/redfish_storage_volume/molecule/__get_helper.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", + "chksum_sha256": "2107089195728fc04d99dd63d9f0d8f61b2d7e519f5127627921ef7ee4139df2", "format": 1 }, { - "name": "roles/idrac_firmware/molecule/httpsproxy_share/converge.yml", + "name": "roles/redfish_storage_volume/molecule/__delete_virtual_drive.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "d362f33905add12d47dd5b02d798d55eb29ada085cda85e8cd37ba04f97cde87", + "chksum_sha256": "8d167fa3a1ec0e778272338f9d77af0bb416be6789875be061dcab8375103df6", "format": 1 }, { - "name": "roles/idrac_firmware/molecule/negative_scenarios", + "name": "roles/redfish_storage_volume/molecule/RAID5", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_firmware/molecule/negative_scenarios/molecule.yml", + "name": "roles/redfish_storage_volume/molecule/RAID5/molecule.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "f6128fe631d272bed3adb4c98223a2b04d554093dc05a2c499eeb9e6d80c9ac7", + "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "roles/idrac_firmware/molecule/negative_scenarios/converge.yml", + "name": "roles/redfish_storage_volume/molecule/RAID5/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "c65a450270cb2725ea0c0d77439695d6fdf0721f6711d35265baab3f8aacbf9e", + "chksum_sha256": "2aa8df2c045cd181b56ee21f6bc7c7f3460797cf3d989de75fafd7025f741ca5", "format": 1 }, { - "name": "roles/idrac_firmware/molecule/nfs_share", + "name": "roles/redfish_storage_volume/molecule/RAID6", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_firmware/molecule/nfs_share/molecule.yml", + "name": "roles/redfish_storage_volume/molecule/RAID6/molecule.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", + "chksum_sha256": "f52d711103d50a437830c6fbcd04fb4bab49a0f82f6d26d1c791c6e8488dd090", "format": 1 }, { - "name": "roles/idrac_firmware/molecule/nfs_share/converge.yml", + "name": "roles/redfish_storage_volume/molecule/RAID6/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "31631bf50bdb9a5b035dcaa97b4c1cba71139e886468ee04666191f8418a65ec", + "chksum_sha256": "fd8a43244b35a395e735e9f9662d01d52a0c2b626e3f11b044c0e2f4d599ecf1", "format": 1 }, { - "name": "roles/idrac_firmware/tasks", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "roles/redfish_storage_volume/molecule/__create_virtual_drive.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "5ff523743f2c992be084d96d3e0bebf811c50fd09bad3e9b3bdf346c093a3914", "format": 1 }, { - "name": "roles/idrac_firmware/tasks/main.yml", + "name": "roles/redfish_storage_volume/molecule/__idrac_reset.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "9878250caee484ccd585db63e5c38597e606587c475e3e993431329b1d14440d", + "chksum_sha256": "5c004e1ee7b85b34bde8daf3ce4b82d794013745abff33fd2c27801dbf89bf4a", "format": 1 }, { - "name": "roles/idrac_firmware/tests", + "name": "roles/redfish_storage_volume/molecule/RAID50", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_firmware/tests/inventory", + "name": "roles/redfish_storage_volume/molecule/RAID50/molecule.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e02233819b1a09844410549191813f7cc7ba360f21298578f4ba1727a27d87fc", + "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "roles/idrac_firmware/tests/test.yml", + "name": "roles/redfish_storage_volume/molecule/RAID50/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "892ec6c42a76c0f6ba5fc628f5455f78700271bffabdbafde5eed32df1699d92", - "format": 1 - }, - { - "name": "roles/idrac_firmware/vars", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "chksum_sha256": "86b09f71d7e2238b359eb8ec3be7860f5f531dd8cba020281d8760b6101e8c24", "format": 1 }, { - "name": "roles/idrac_firmware/vars/main.yml", + "name": "roles/redfish_storage_volume/README.md", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "76a25139790ece31962351e91c95883e5233a87e63d93e6c044dbf5a0c0604ae", + "chksum_sha256": "efb82c5ab08b6d604fa2dfa92911904119f33b20799fca3cccbc0ed9aa9633a8", "format": 1 }, { - "name": "roles/idrac_gather_facts", + "name": "roles/redfish_storage_volume/defaults", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_gather_facts/README.md", + "name": "roles/redfish_storage_volume/defaults/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "babcf9ea882157e54c32df007487cbb8432e214d7c3d5ebbba6631241792cbc3", + "chksum_sha256": "0a5a221d2fa9a6fc8985007dca4b7b46ea33c4fee921a405ff021bb576740473", "format": 1 }, { - "name": "roles/idrac_gather_facts/defaults", + "name": "roles/redfish_storage_volume/tasks", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_gather_facts/defaults/main.yml", + "name": "roles/redfish_storage_volume/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "0e9f5e643ff9212b823aab7dfeb2658e1b1743ee6e296fe7cec64b64c814dd1f", + "chksum_sha256": "d504045131a1a6e693af5e3be831c677039d54c70765cb14bb5ab1de3d8eb054", "format": 1 }, { - "name": "roles/idrac_gather_facts/handlers", + "name": "roles/redfish_storage_volume/handlers", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_gather_facts/handlers/main.yml", + "name": "roles/redfish_storage_volume/handlers/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "f872a794379898660d17bfd9e1ae91bb13f8725a1cf4b16b901d80919192caba", + "chksum_sha256": "6877ee1583a2e33f3b3baf52a4a633c1f0bddea5bafda3e91241952bb5f2f19f", "format": 1 }, { - "name": "roles/idrac_gather_facts/meta", + "name": "roles/redfish_storage_volume/tests", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_gather_facts/meta/argument_specs.yml", + "name": "roles/redfish_storage_volume/tests/inventory", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "75d820d28ed29f3ab34caf04022a9d5b3023f9179806d13cb88deb25bbf1d58c", + "chksum_sha256": "e02233819b1a09844410549191813f7cc7ba360f21298578f4ba1727a27d87fc", "format": 1 }, { - "name": "roles/idrac_gather_facts/meta/main.yml", + "name": "roles/redfish_storage_volume/tests/test.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "3bf6b5dc34c2b73a1e1db79a12c608502254e34ec556ba2c261fe607fbfc6ad1", + "chksum_sha256": "c4aa87d44c3b522744c37ca811b31c1648dfde1bf2e75a231499f5d8210396fd", "format": 1 }, { - "name": "roles/idrac_gather_facts/molecule", + "name": "roles/idrac_boot", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_gather_facts/molecule/backplane", + "name": "roles/idrac_boot/meta", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_gather_facts/molecule/backplane/molecule.yml", + "name": "roles/idrac_boot/meta/argument_specs.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "f6128fe631d272bed3adb4c98223a2b04d554093dc05a2c499eeb9e6d80c9ac7", + "chksum_sha256": "86cced715db95d2ee43d4cf20d223992c4f5aaf08f8c38b60267fde2f11572e5", "format": 1 }, { - "name": "roles/idrac_gather_facts/molecule/backplane/converge.yml", + "name": "roles/idrac_boot/meta/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "2a1a0a21993f25c4bc9b53a65c20dfbc128821bbf5868dad00326fae00ff82e1", + "chksum_sha256": "e247f0476f74edd90842e7e2507e0efc3f21427f80e411e0d740c74292c55c6f", "format": 1 }, { - "name": "roles/idrac_gather_facts/molecule/bios", + "name": "roles/idrac_boot/vars", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_gather_facts/molecule/bios/molecule.yml", + "name": "roles/idrac_boot/vars/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "f6128fe631d272bed3adb4c98223a2b04d554093dc05a2c499eeb9e6d80c9ac7", + "chksum_sha256": "50ca20875f667975a478f6fd4cf78866cdfbfc89891bbceede99a1150aa258ff", "format": 1 }, { - "name": "roles/idrac_gather_facts/molecule/bios/converge.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "6aeb01343669a588a39fb5c079282e515ea89873d6e7bcc036e053f58092ae62", + "name": "roles/idrac_boot/molecule", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_gather_facts/molecule/controller", + "name": "roles/idrac_boot/molecule/boot_source_override_enabled_as_once_reset_type_none", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_gather_facts/molecule/controller/molecule.yml", + "name": "roles/idrac_boot/molecule/boot_source_override_enabled_as_once_reset_type_none/molecule.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "f6128fe631d272bed3adb4c98223a2b04d554093dc05a2c499eeb9e6d80c9ac7", + "chksum_sha256": "f52d711103d50a437830c6fbcd04fb4bab49a0f82f6d26d1c791c6e8488dd090", "format": 1 }, { - "name": "roles/idrac_gather_facts/molecule/controller/converge.yml", + "name": "roles/idrac_boot/molecule/boot_source_override_enabled_as_once_reset_type_none/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "fd6e6417f014ec03b13867ac110beb0328e8d4e421d71e534002153a29e99b8a", + "chksum_sha256": "ccd9a6bdb969d79c36b61f0339e702d5b5032b020546c995b312fd34bb6e5741", "format": 1 }, { - "name": "roles/idrac_gather_facts/molecule/cpu", + "name": "roles/idrac_boot/molecule/boot_order_using_legacy_mode_force_restart", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_gather_facts/molecule/cpu/converge.yml", + "name": "roles/idrac_boot/molecule/boot_order_using_legacy_mode_force_restart/molecule.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "03f5f6bec9178116f17d4a1f7e49aa0607b3b34751e35ee4d86f26d4f9912383", + "chksum_sha256": "f52d711103d50a437830c6fbcd04fb4bab49a0f82f6d26d1c791c6e8488dd090", "format": 1 }, { - "name": "roles/idrac_gather_facts/molecule/cpu/molecule.yml", + "name": "roles/idrac_boot/molecule/boot_order_using_legacy_mode_force_restart/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "f6128fe631d272bed3adb4c98223a2b04d554093dc05a2c499eeb9e6d80c9ac7", + "chksum_sha256": "808af97a5a234940ab3c38a93c54f4a164b7cb52ee47107137cc4555b53e9a1d", "format": 1 }, { - "name": "roles/idrac_gather_facts/molecule/default", + "name": "roles/idrac_boot/molecule/boot_options_using_boot_option_reference_enabled_true", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_gather_facts/molecule/default/molecule.yml", + "name": "roles/idrac_boot/molecule/boot_options_using_boot_option_reference_enabled_true/molecule.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "f6128fe631d272bed3adb4c98223a2b04d554093dc05a2c499eeb9e6d80c9ac7", + "chksum_sha256": "f52d711103d50a437830c6fbcd04fb4bab49a0f82f6d26d1c791c6e8488dd090", "format": 1 }, { - "name": "roles/idrac_gather_facts/molecule/default/converge.yml", + "name": "roles/idrac_boot/molecule/boot_options_using_boot_option_reference_enabled_true/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "cff3d242b9a5abe65abd87b232d6678b0952aea01ac388e894489e47577dfea3", + "chksum_sha256": "ab30d143cf010145f94f14c05cab91120f717be0cffadc9f348daffa7ac0e8ff", "format": 1 }, { - "name": "roles/idrac_gather_facts/molecule/enclosure", + "name": "roles/idrac_boot/molecule/boot_source_override_enabled_as_continuous_reset_type_none", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_gather_facts/molecule/enclosure/molecule.yml", + "name": "roles/idrac_boot/molecule/boot_source_override_enabled_as_continuous_reset_type_none/molecule.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "f6128fe631d272bed3adb4c98223a2b04d554093dc05a2c499eeb9e6d80c9ac7", + "chksum_sha256": "de8583bbc3924432cfe625f9899beb6ad7848058e61d1ecabd745ec810ee5498", "format": 1 }, { - "name": "roles/idrac_gather_facts/molecule/enclosure/converge.yml", + "name": "roles/idrac_boot/molecule/boot_source_override_enabled_as_continuous_reset_type_none/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "cf1906e1ced1cb774e276f108b46c8fcf7c47db2fd45f9abc75f98b15d5d6661", + "chksum_sha256": "d93c24cf33c66d6e9b3135506a51df0a298e756eca52d0dd6be9049841ba49ed", "format": 1 }, { - "name": "roles/idrac_gather_facts/molecule/enclosureemm", + "name": "roles/idrac_boot/molecule/boot_options_using_display_name_enabled_false", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_gather_facts/molecule/enclosureemm/molecule.yml", + "name": "roles/idrac_boot/molecule/boot_options_using_display_name_enabled_false/molecule.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "f6128fe631d272bed3adb4c98223a2b04d554093dc05a2c499eeb9e6d80c9ac7", + "chksum_sha256": "f52d711103d50a437830c6fbcd04fb4bab49a0f82f6d26d1c791c6e8488dd090", "format": 1 }, { - "name": "roles/idrac_gather_facts/molecule/enclosureemm/converge.yml", + "name": "roles/idrac_boot/molecule/boot_options_using_display_name_enabled_false/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "0283a9aae3c3d8ba622a804822089373823a9f1494266ed068d65766055922d1", + "chksum_sha256": "105480778b833d51453b2b22e7ac419eb3865b523bd5f979789e66feaa46c4db", "format": 1 }, { - "name": "roles/idrac_gather_facts/molecule/fan", + "name": "roles/idrac_boot/molecule/default", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_gather_facts/molecule/fan/molecule.yml", + "name": "roles/idrac_boot/molecule/default/molecule.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "f6128fe631d272bed3adb4c98223a2b04d554093dc05a2c499eeb9e6d80c9ac7", + "chksum_sha256": "c7c031cbadc0f08f5dfacd846de58729e2900c340492871c191e4ac6b504ddc9", "format": 1 }, { - "name": "roles/idrac_gather_facts/molecule/fan/converge.yml", + "name": "roles/idrac_boot/molecule/default/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "3847cf869806ef54d8df586fea8862e60cdcf70de9f90598cd1f3417be3b2aef", + "chksum_sha256": "2ef1e42f64b6b1036298447aa4188460ae395dc4af25ab0d0b139d15fbe47df4", "format": 1 }, { - "name": "roles/idrac_gather_facts/molecule/firmware", + "name": "roles/idrac_boot/molecule/boot_order_using_uefi_mode_graceful_restart", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_gather_facts/molecule/firmware/molecule.yml", + "name": "roles/idrac_boot/molecule/boot_order_using_uefi_mode_graceful_restart/molecule.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "f6128fe631d272bed3adb4c98223a2b04d554093dc05a2c499eeb9e6d80c9ac7", + "chksum_sha256": "f52d711103d50a437830c6fbcd04fb4bab49a0f82f6d26d1c791c6e8488dd090", "format": 1 }, { - "name": "roles/idrac_gather_facts/molecule/firmware/converge.yml", + "name": "roles/idrac_boot/molecule/boot_order_using_uefi_mode_graceful_restart/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "b9077637b7c957f46e1351f3e3f4e16e925c81a62e3381dd24169a3f0a7b4079", + "chksum_sha256": "9fb0c40a0d88c86aa9056a949b626eadceadaf9379731fd83045b2cb1c12aa14", "format": 1 }, { - "name": "roles/idrac_gather_facts/molecule/hostnic", + "name": "roles/idrac_boot/molecule/boot_source_override_mode_uefi_with_resource_id", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_gather_facts/molecule/hostnic/molecule.yml", + "name": "roles/idrac_boot/molecule/boot_source_override_mode_uefi_with_resource_id/molecule.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "f6128fe631d272bed3adb4c98223a2b04d554093dc05a2c499eeb9e6d80c9ac7", + "chksum_sha256": "f52d711103d50a437830c6fbcd04fb4bab49a0f82f6d26d1c791c6e8488dd090", "format": 1 }, { - "name": "roles/idrac_gather_facts/molecule/hostnic/converge.yml", + "name": "roles/idrac_boot/molecule/boot_source_override_mode_uefi_with_resource_id/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e75317b8512ae920138e3c7241d6b4582626d6e236b36128733b92f856543c53", + "chksum_sha256": "b2b06a3776dfd89429ebc65b6e626e1caa9c3bb2c3210c208add9cad25e7b169", "format": 1 }, { - "name": "roles/idrac_gather_facts/molecule/idrac", + "name": "roles/idrac_boot/molecule/boot_source_override_mode_legacy_job_wait_false", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_gather_facts/molecule/idrac/molecule.yml", + "name": "roles/idrac_boot/molecule/boot_source_override_mode_legacy_job_wait_false/molecule.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "f6128fe631d272bed3adb4c98223a2b04d554093dc05a2c499eeb9e6d80c9ac7", + "chksum_sha256": "f52d711103d50a437830c6fbcd04fb4bab49a0f82f6d26d1c791c6e8488dd090", "format": 1 }, { - "name": "roles/idrac_gather_facts/molecule/idrac/converge.yml", + "name": "roles/idrac_boot/molecule/boot_source_override_mode_legacy_job_wait_false/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "1793fd4df60558619a9c94aef7599243482429d81c8a28e776b91f850221b59a", + "chksum_sha256": "fc69b86c7931abdfc30fa69d8263ee624da0f82e3bd622fabee4ed427cdfad12", "format": 1 }, { - "name": "roles/idrac_gather_facts/molecule/license", + "name": "roles/idrac_boot/molecule/boot_source_override_enabled_as_disabled_reset_type_none", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_gather_facts/molecule/license/molecule.yml", + "name": "roles/idrac_boot/molecule/boot_source_override_enabled_as_disabled_reset_type_none/molecule.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "f6128fe631d272bed3adb4c98223a2b04d554093dc05a2c499eeb9e6d80c9ac7", + "chksum_sha256": "f52d711103d50a437830c6fbcd04fb4bab49a0f82f6d26d1c791c6e8488dd090", "format": 1 }, { - "name": "roles/idrac_gather_facts/molecule/license/converge.yml", + "name": "roles/idrac_boot/molecule/boot_source_override_enabled_as_disabled_reset_type_none/converge.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "555ad87a256a73804d979ffca0fb14349aa5ce521c463fc7daa32d2a6d394a4d", + "chksum_sha256": "aafef16f967f4d86b1630a197754ef56b4c23f6bfdb6bac4df181aa1b9c694ed", "format": 1 }, { - "name": "roles/idrac_gather_facts/molecule/memory", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "roles/idrac_boot/README.md", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "92a0c9cdb08215dd0131c2f5e91d125e2c58a1e9771093c40bf71097f035559a", "format": 1 }, { - "name": "roles/idrac_gather_facts/molecule/memory/molecule.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "f6128fe631d272bed3adb4c98223a2b04d554093dc05a2c499eeb9e6d80c9ac7", + "name": "roles/idrac_boot/defaults", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_gather_facts/molecule/memory/converge.yml", + "name": "roles/idrac_boot/defaults/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "0a937be08af8078010259968d6dc6ef8836ed89caea61e997db31fec54b7f7b5", + "chksum_sha256": "fbc348c1aaf27aaa035a1b34a9e496b64dc515388e9a543689c28dc50a597bb2", "format": 1 }, { - "name": "roles/idrac_gather_facts/molecule/negative", + "name": "roles/idrac_boot/tasks", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_gather_facts/molecule/negative/molecule.yml", + "name": "roles/idrac_boot/tasks/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "f6128fe631d272bed3adb4c98223a2b04d554093dc05a2c499eeb9e6d80c9ac7", + "chksum_sha256": "15e5c2cab8d295c1d6957b2fef3bdbc2222f003b023a0aba83dadb606f11bd03", "format": 1 }, { - "name": "roles/idrac_gather_facts/molecule/negative/converge.yml", + "name": "roles/idrac_boot/handlers", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, + "format": 1 + }, + { + "name": "roles/idrac_boot/handlers/main.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "abcc6362b778c7dd7c367130c0f52564cb65a37a314aa41817ae19252f020ff7", + "chksum_sha256": "867b8c424c2b712712af162203358ba5061e926389d7ad4d8a3ee40a0d5b3920", "format": 1 }, { - "name": "roles/idrac_gather_facts/molecule/nic", + "name": "roles/idrac_boot/tests", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_gather_facts/molecule/nic/molecule.yml", + "name": "roles/idrac_boot/tests/inventory", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "f6128fe631d272bed3adb4c98223a2b04d554093dc05a2c499eeb9e6d80c9ac7", + "chksum_sha256": "e02233819b1a09844410549191813f7cc7ba360f21298578f4ba1727a27d87fc", "format": 1 }, { - "name": "roles/idrac_gather_facts/molecule/nic/converge.yml", + "name": "roles/idrac_boot/tests/test.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "88018366757580a7dd6c975481cf2098d8e6add7a9400aae149886c98cec2241", + "chksum_sha256": "365ea1cad2e4ffb62f1a086752e377bc9a3fa010685b7c15211be1dec90813c4", "format": 1 }, { - "name": "roles/idrac_gather_facts/molecule/passensor", + "name": "bindep.txt", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "76c27d1138b5331a2bfb3b8b7e92c70cc39fd1fe793a48117b54ce2649cd7b1f", + "format": 1 + }, + { + "name": "meta", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_gather_facts/molecule/passensor/molecule.yml", + "name": "meta/execution-environment.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "f6128fe631d272bed3adb4c98223a2b04d554093dc05a2c499eeb9e6d80c9ac7", + "chksum_sha256": "565e8d831c58bf2a1f80168b5ee92f526fa5fe48b2ec71a9387371c0d50ca9a9", "format": 1 }, { - "name": "roles/idrac_gather_facts/molecule/passensor/converge.yml", + "name": "meta/runtime.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "85eac7dc208c39b391e4f286622829eb99c1f1331cd575f808b374512aed978e", + "chksum_sha256": "dac8ac908fdd6b7bffe4a091c3f443b45716b1bc591e80cae03270731ef62598", "format": 1 }, { - "name": "roles/idrac_gather_facts/molecule/pciedevice", + "name": ".ansible-lint", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "b1faa2fe6cb8f8029a0aae03332dc309e5144309c0a7ae2df24c25727e6f70cf", + "format": 1 + }, + { + "name": ".github", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_gather_facts/molecule/pciedevice/molecule.yml", + "name": ".github/workflows", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, + "format": 1 + }, + { + "name": ".github/workflows/ansible-test.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "f6128fe631d272bed3adb4c98223a2b04d554093dc05a2c499eeb9e6d80c9ac7", + "chksum_sha256": "d797937de9e579f1ecc980d7db21d2e3d36055f4212cad8103d4dba0d7d140cd", "format": 1 }, { - "name": "roles/idrac_gather_facts/molecule/pciedevice/converge.yml", + "name": ".github/PULL_REQUEST_TEMPLATE.md", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "5c0c515a34feab6e6b68e051513ac03a3ac94d3cc8cba176aaed27996ad0287e", + "chksum_sha256": "186d97efed69e2211f154847a8ac52f263fa54319620bf1dcea00b59f494a969", "format": 1 }, { - "name": "roles/idrac_gather_facts/molecule/physicaldisk", + "name": ".github/ISSUE_TEMPLATE", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_gather_facts/molecule/physicaldisk/molecule.yml", + "name": ".github/ISSUE_TEMPLATE/bug_report.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "f6128fe631d272bed3adb4c98223a2b04d554093dc05a2c499eeb9e6d80c9ac7", + "chksum_sha256": "56f4cdaffe4a97636427b91eb59acb67bc92f869451d137308428771d48e6aad", "format": 1 }, { - "name": "roles/idrac_gather_facts/molecule/physicaldisk/converge.yml", + "name": ".github/ISSUE_TEMPLATE/ask_a_question.md", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "f842fce3a08c9578c56eb1bea950a9f2aef3952b50bb7ebcc55992f0ff089004", - "format": 1 - }, - { - "name": "roles/idrac_gather_facts/molecule/powersupply", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "chksum_sha256": "e172d0ed215d9561ccf644c10a0f7fb5ea722a427ff13741f8634053d62a9338", "format": 1 }, { - "name": "roles/idrac_gather_facts/molecule/powersupply/molecule.yml", + "name": ".github/ISSUE_TEMPLATE/config.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "f6128fe631d272bed3adb4c98223a2b04d554093dc05a2c499eeb9e6d80c9ac7", + "chksum_sha256": "155b8ff8561f87047a5e2cebac1737edfbba156c21cc733fe636d84ca222d627", "format": 1 }, { - "name": "roles/idrac_gather_facts/molecule/powersupply/converge.yml", + "name": ".github/ISSUE_TEMPLATE/feature_request.md", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "b887541028b49abb21f65fbdcf0505d0d9e06681956366b31119264422c2b155", + "chksum_sha256": "e15deb214aa7cb6847890eb95491e027c021b7f1ec01c7fbda8dca021d1162a0", "format": 1 }, { - "name": "roles/idrac_gather_facts/molecule/secureboot", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": ".github/CODEOWNERS", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "a9904179b2b13e66820070b147f7de5623efaecb1e9d0b68c47a5abb28b7fe02", "format": 1 }, { - "name": "roles/idrac_gather_facts/molecule/secureboot/molecule.yml", + "name": ".ansible-lint-ignore", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "f6128fe631d272bed3adb4c98223a2b04d554093dc05a2c499eeb9e6d80c9ac7", + "chksum_sha256": "9259c9753c32d36dfca9f4c9858b16b12e03ab2cd5eeece7f53ee9ad7bb2b2aa", "format": 1 }, { - "name": "roles/idrac_gather_facts/molecule/secureboot/converge.yml", + "name": "CHANGELOG.rst", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "90a6628784d8f22ff412233df90b45f4ca670001c322ad02347933ebaac6a04c", + "chksum_sha256": "316651748c6045de666490a0b9c4d05d50afaeb02129263d9f3a0729314b5f3b", "format": 1 }, { - "name": "roles/idrac_gather_facts/molecule/sensorsbattery", + "name": "changelogs", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_gather_facts/molecule/sensorsbattery/molecule.yml", + "name": "changelogs/.plugin-cache.yaml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "f6128fe631d272bed3adb4c98223a2b04d554093dc05a2c499eeb9e6d80c9ac7", + "chksum_sha256": "a52aa92b1346f5c730d603464c8f20375eaead759c3524f64cd876eea4f3ecc4", "format": 1 }, { - "name": "roles/idrac_gather_facts/molecule/sensorsbattery/converge.yml", + "name": "changelogs/config.yaml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "678657b674bd8d79ae67af9a8ebca26b47e40fcaf6f958e66a15e1517b6b3cdb", + "chksum_sha256": "c00012f627317aec0a7b0b4db3da8c43eb7eb63188eb3f7ee8c2319692aab2d7", "format": 1 }, { - "name": "roles/idrac_gather_facts/molecule/sensorsintrusion", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "changelogs/changelog.yaml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "080988706ff47cba87e24719247d11d510a12127f99266711c33b0258c90d107", "format": 1 }, { - "name": "roles/idrac_gather_facts/molecule/sensorsintrusion/molecule.yml", + "name": ".gitignore", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "f6128fe631d272bed3adb4c98223a2b04d554093dc05a2c499eeb9e6d80c9ac7", + "chksum_sha256": "3f8be16c6a53d1a7c659b0a9803866e10395d5fa466d557f8e8089e3a26cf0c3", "format": 1 }, { - "name": "roles/idrac_gather_facts/molecule/sensorsintrusion/converge.yml", + "name": "README.md", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "87970ed0a6773bd5ab9c8a78c1555ec0f61228282b314573c33bd30da7102a8d", + "chksum_sha256": "a308267b76306e4836ea65de6f0bd853b75b036e1e9822cb365ac9b2bd0d58cb", "format": 1 }, { - "name": "roles/idrac_gather_facts/molecule/sensorsvoltage", + "name": "plugins", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_gather_facts/molecule/sensorsvoltage/molecule.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "f6128fe631d272bed3adb4c98223a2b04d554093dc05a2c499eeb9e6d80c9ac7", + "name": "plugins/module_utils", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_gather_facts/molecule/sensorsvoltage/converge.yml", + "name": "plugins/module_utils/idrac_redfish.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "1dffcb2b8b2a5fb2b557d0961eaee2b1cbbd94f1f2aa26d998ad06fe6f314f0b", + "chksum_sha256": "8da0c32e39942e6ae943277542fc4395cca78c17958cde82d509876a44e5af12", "format": 1 }, { - "name": "roles/idrac_gather_facts/molecule/systemmetrics", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "plugins/module_utils/dellemc_idrac.py", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "e60a6661de248b2be11330274cecf6af56989f04388f210ed3a6cf28753b57ee", "format": 1 }, { - "name": "roles/idrac_gather_facts/molecule/systemmetrics/molecule.yml", + "name": "plugins/module_utils/redfish.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "f6128fe631d272bed3adb4c98223a2b04d554093dc05a2c499eeb9e6d80c9ac7", + "chksum_sha256": "989e518c95b741c49045727dc7ac92dc5440e08d7a7cc9c9de7b83481e651dd5", "format": 1 }, { - "name": "roles/idrac_gather_facts/molecule/systemmetrics/converge.yml", + "name": "plugins/module_utils/session_utils.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "54d9f77025d049c9b6572899b5bccc51968e0183e840768d2e3f3c0521aa7ce2", + "chksum_sha256": "ae5f22fc431069c53aa88137d6d8c613ab8c22112fc31cf3b4ad0662db497ea3", "format": 1 }, { - "name": "roles/idrac_gather_facts/molecule/virtualdisk", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "plugins/module_utils/__init__.py", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "roles/idrac_gather_facts/molecule/virtualdisk/molecule.yml", + "name": "plugins/module_utils/ome.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "f6128fe631d272bed3adb4c98223a2b04d554093dc05a2c499eeb9e6d80c9ac7", + "chksum_sha256": "e78a8b5e1560c08d8e7655f567bf2c53817ff01f0f621419153a0cbd083e050f", "format": 1 }, { - "name": "roles/idrac_gather_facts/molecule/virtualdisk/converge.yml", + "name": "plugins/module_utils/utils.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "d7f64f87068ebc765d1151c2994688505ddf9d29b5a49749565d813a7fd71da9", + "chksum_sha256": "f5b4aa1d4f6bcdf22373061d2dd5d1f873f6cf277c3caded38c75c69d97f6556", "format": 1 }, { - "name": "roles/idrac_gather_facts/tasks", + "name": "plugins/doc_fragments", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_gather_facts/tasks/get_attributes_info.yml", + "name": "plugins/doc_fragments/idrac_x_auth_options.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8e4ddc302cfdb0520c6fa9e0a73708a3491412bea218571b184b94926c695030", + "chksum_sha256": "e9882f55285d0809089b6b5ed37332873dcd57ef87b3ae1c85d4fecbb7dfb6db", "format": 1 }, { - "name": "roles/idrac_gather_facts/tasks/get_backplane_info.yml", + "name": "plugins/doc_fragments/ome_auth_options.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "d1ee6473d831ef5fa2b080fbd7e6c545f65cd0b8ddd75af862f3fa314ccd8b71", + "chksum_sha256": "d16534ca24a8d7324d239d9478df3ea42223f583eb1d1d591d62a44ce8246eed", "format": 1 }, { - "name": "roles/idrac_gather_facts/tasks/get_battery_info.yml", + "name": "plugins/doc_fragments/omem_auth_options.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "148c547f8686797aba487fb562ac318ae933609914899419bc7b08c45f92f76d", + "chksum_sha256": "ff858349aeccc4f1794127890f51291fb7f7664a4812598a0f4b6f9580d674e0", "format": 1 }, { - "name": "roles/idrac_gather_facts/tasks/get_bios_info.yml", + "name": "plugins/doc_fragments/redfish_auth_options.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "2d625b06d054c58b3434ee76881384abc724a66b58fe7ecf40fdf870c2e7b0b3", + "chksum_sha256": "7a5bc959218fa69373726a7a322b82e566ee3ec74d915ce133f810b6cb2935b1", "format": 1 }, { - "name": "roles/idrac_gather_facts/tasks/get_controller_info.yml", + "name": "plugins/doc_fragments/idrac_auth_options.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "9ef30c6af08535b3ec7ae2485bdd9d4aa79675e2b1bbb6b07be726ac7c36651c", + "chksum_sha256": "09f31bebb6c31d2b5551642f672527679065b89ca380e82cf43866cb14f5bdb7", "format": 1 }, { - "name": "roles/idrac_gather_facts/tasks/get_cpu_info.yml", + "name": "plugins/doc_fragments/__init__.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "151ae93ca668eb1a8900addcfabe7ae999e670e821ad4ced7f06fc95735bd51a", + "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "roles/idrac_gather_facts/tasks/get_enclosure_emm_info.yml", + "name": "plugins/doc_fragments/network_share_options.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "39af5a227279476db905f227e7c4321756537f807b697dfd02fe16e5af40ec82", + "chksum_sha256": "9aef12b8caa7df49c02dde445a8923c811228558bd61893c720ef185b2e7c182", "format": 1 }, { - "name": "roles/idrac_gather_facts/tasks/get_enclosure_info.yml", + "name": "plugins/doc_fragments/oment_auth_options.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "deb7f669cdd9686dc3c1e2d129ce062ea6ac39582fb1c4d1ebadb9d33aaa0672", + "chksum_sha256": "8bd8699fdcc71eebfb96c08e07c5c39705ab5145afec7f084528bf8ce48cc5c9", "format": 1 }, { - "name": "roles/idrac_gather_facts/tasks/get_fan_info.yml", + "name": "plugins/README.md", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "9bb1df958e92876346cb1fffead2be0436ca155725be6326174f6be124812afb", + "chksum_sha256": "bf8697057933ae95e9172b8fb6da9907557f5f086ed7e91da850a2fb573fcf9d", "format": 1 }, { - "name": "roles/idrac_gather_facts/tasks/get_firmware_info.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "024fd4797f5075b0030f378f4b23696e23f193eee0ae3d286793028ac54f45f9", + "name": "plugins/inventory", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_gather_facts/tasks/get_host_nic_info.yml", + "name": "plugins/inventory/ome_inventory.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "cbe6b638f4f6bf98263cc35f2ab8e9dc9c20d4f4781179ea84b25dc837940f49", + "chksum_sha256": "cb2597106d2e3822ce9f74ae0551904f6f6ccd6cde597bd3ddccf96509bd1e3c", "format": 1 }, { - "name": "roles/idrac_gather_facts/tasks/get_intrusion_info.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "bfa01c92ff7a53762840eac467d93619b0191e4fe771715be349eef092e96b64", + "name": "plugins/modules", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_gather_facts/tasks/get_license_info.yml", + "name": "plugins/modules/idrac_user.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "61c857b5a12886ad7dde1dee0dec583d999cc435615dd4ffa211ea52e11cea56", + "chksum_sha256": "cd9d20cd8d7240570fd5441b944b8fafbb49125e6dd0da0d7a54f118dde25605", "format": 1 }, { - "name": "roles/idrac_gather_facts/tasks/get_memory_info.yml", + "name": "plugins/modules/ome_device_location.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "0f1db24485b5870b7a722e07807e8e0df8bebdd162cbb67e12167cbb2b35a3a9", + "chksum_sha256": "fabe70ccd78905c1059c2a44aa3a5f5705ffcf26055fe3c78d07aa7ba472462a", "format": 1 }, { - "name": "roles/idrac_gather_facts/tasks/get_metrics_info.yml", + "name": "plugins/modules/idrac_session.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "a5bf5239cfc7ea06a7bb797c84272d5ca0f814a1ad8d0150299384670cbd2a8a", + "chksum_sha256": "a899a46fe702c2bd147f8572071ac8b95c4dc6ea3fe87eb92d87f44bedb580b0", "format": 1 }, { - "name": "roles/idrac_gather_facts/tasks/get_nic_info.yml", + "name": "plugins/modules/idrac_license.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "bfc885a21855a4c875dcd2d8d30decb7c970dedeb5c4912a549edf88e9fb9a99", + "chksum_sha256": "3525e7237c2cf1c5c80396e01e0db5286ef82e8f16d96eec0855482a28f250fd", "format": 1 }, { - "name": "roles/idrac_gather_facts/tasks/get_pas_sensor_info.yml", + "name": "plugins/modules/ome_alert_policies.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8e9d20d3c5dcfbd9ba045bdd03395fb421c1b6174f3b4bf17a442855b28b3b84", + "chksum_sha256": "a66dce2ed3c4bc8c74d70af2061ebbb49f74a6f0dac89601f00a2be2e553eafe", "format": 1 }, { - "name": "roles/idrac_gather_facts/tasks/get_pcie_device_info.yml", + "name": "plugins/modules/ome_template_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "09ded655e39f0510b2432d9e26f24bbcc03d147dae5aef9a4c53ad85b2f8468b", + "chksum_sha256": "903d530c5c3b8fbc8df9fefea5edc1a8cc1d7db06a217ec1d786d6e9b7e7c891", "format": 1 }, { - "name": "roles/idrac_gather_facts/tasks/get_physical_info.yml", + "name": "plugins/modules/ome_template_network_vlan_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "c08ebd517f4809864571641b9bbd54e720e54d3eb9f608b86c2de0e21d5e9154", + "chksum_sha256": "0981694020ae6e29639c6aae494ab18a6584de43d01b7d06737352fe75be1407", "format": 1 }, { - "name": "roles/idrac_gather_facts/tasks/get_power_supply_info.yml", + "name": "plugins/modules/redfish_event_subscription.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "b768e6b3a6d27240d49d04a0f59493047f2052f2d9ba94ede986198682525f77", + "chksum_sha256": "08b2849adce995c599089ba4e11b4e50a42846a47d418391f79e9a0b084757e1", "format": 1 }, { - "name": "roles/idrac_gather_facts/tasks/get_resource_id.yml", + "name": "plugins/modules/dellemc_configure_idrac_eventing.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "71b9b902e3e06e3effa5e21acd8a6f8be1d0dbe49500ff72d7d8cb27def8555c", + "chksum_sha256": "8972622a58eb34b314304c1891c770b0cfa0c35a766303f5d2fb4614f2bc9ca9", "format": 1 }, { - "name": "roles/idrac_gather_facts/tasks/get_secure_boot_info.yml", + "name": "plugins/modules/ome_firmware_baseline.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "3cdb9d35aed51e1bb8f4626028b87fed75d52df4a29e933a096eb6e1e526b47a", + "chksum_sha256": "db3dff4b11a58099af5de57b103d8989183b3dc53e650cb35e0db801c0486e81", "format": 1 }, { - "name": "roles/idrac_gather_facts/tasks/get_system_info.yml", + "name": "plugins/modules/idrac_firmware.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "4e94f83a0bcae476b8005195648d8fd69b894b0f96d24fa3f837f021f46537d7", + "chksum_sha256": "7cabfda75d3c291689c0c2fee932be51f3021e862f692bcb25ed00a053a1e2c6", "format": 1 }, { - "name": "roles/idrac_gather_facts/tasks/get_virtual_disk_info.yml", + "name": "plugins/modules/ome_user.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "91690948737d7d0249d914032490bc42d6260226a1b8fd55922653a1b46b2a61", + "chksum_sha256": "bfc07fd709855ef17af210715f8d2bf8a1e9f7c06a9558547d572d7332a91307", "format": 1 }, { - "name": "roles/idrac_gather_facts/tasks/get_voltage_info.yml", + "name": "plugins/modules/idrac_attributes.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "baf9e3a82d2f19ccc21fa8721c09004ef99ab237f790d5f676bc533aaa523e0e", + "chksum_sha256": "6e96008e016bfda9fc804bbb3e23287d2027a2608a780627ce1c57e46031db5c", "format": 1 }, { - "name": "roles/idrac_gather_facts/tasks/main.yml", + "name": "plugins/modules/ome_application_certificate.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "f082f14db62efdca0aa691bfe928fedb660df3fc98f6e32f367cb8dc068335c9", + "chksum_sha256": "0ac42af776d7288acebfea2e88044a37caeff29b4d99840e5c7c9e55fccaf5ce", "format": 1 }, { - "name": "roles/idrac_gather_facts/tests", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "plugins/modules/dellemc_idrac_storage_volume.py", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "4e9530ae54ec5e0e70142ae0c6585cd78af2ce511f24dd829affb0ba719424b3", "format": 1 }, { - "name": "roles/idrac_gather_facts/tests/asserts", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "plugins/modules/idrac_lifecycle_controller_job_status_info.py", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "0030947d9d1bc3f70ed13147d429fa4696627321dc9f75a467f00df10adb8402", "format": 1 }, { - "name": "roles/idrac_gather_facts/tests/asserts/controller_assert.yml", + "name": "plugins/modules/idrac_network.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "48bffad0e6952ab27d7721095ef84c4f13fdc6ab07ee859f36a380409ef6e594", + "chksum_sha256": "4c1ea93a690a1400cba57600c7ffe9378813c502057a7d76f593ec2b126e5d85", "format": 1 }, { - "name": "roles/idrac_gather_facts/tests/asserts/cpu_assert.yml", + "name": "plugins/modules/ome_template_identity_pool.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "0e8af65eb0a9b3e627d4d8b0a352de3cb82218bae97998be2101290194825c25", + "chksum_sha256": "984fc429fcdd64a329f1589f29f621db7c3d21508a2079bb3b75b817c0269fec", "format": 1 }, { - "name": "roles/idrac_gather_facts/tests/asserts/enclosure_assert.yml", + "name": "plugins/modules/idrac_system_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "763ba0a9850c0b62d5224e40cfa49bb970e86f3c49991117ba21254211d11c24", + "chksum_sha256": "ba0422032d21f80ccf2e138499b8dd10821b58ea7e09a4d470446f7929cc5695", "format": 1 }, { - "name": "roles/idrac_gather_facts/tests/asserts/enclosureemm_assert.yml", + "name": "plugins/modules/ome_alert_policies_actions_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "b409927ca4278e7eea565b40cd36ecc0e212901effc08ea13f8264e323224bf0", + "chksum_sha256": "cdb5a8e28858301ad0652c5e99115ba303fd9a4a470f12fa5fc7179359350ada", "format": 1 }, { - "name": "roles/idrac_gather_facts/tests/asserts/fan_assert.yml", + "name": "plugins/modules/redfish_storage_volume.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "92924ad83dc9f5fe1b6801d09dced4bb70c1209ede2394ca0ced2d25c3c72eba", + "chksum_sha256": "e00729a66bdf4bd718f003564319e6a3ee9770d88c5c5396c5d708a4097653bf", "format": 1 }, { - "name": "roles/idrac_gather_facts/tests/asserts/firmware_assert.yml", + "name": "plugins/modules/ome_firmware.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "3dc966c3a3c7ec1c7dd3a3bfb2b4e3a97c10ae9f279c4a56d3ccab5313857afe", + "chksum_sha256": "77b1055a4806445a3e18188e0d9afa8316259bd900e67404dc8e41c9b809e4b2", "format": 1 }, { - "name": "roles/idrac_gather_facts/tests/asserts/hostnic_assert.yml", + "name": "plugins/modules/ome_application_console_preferences.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e84c587ac238b74f292b0382d465ee29ecfdb92a53099410bb0691878aa8990b", + "chksum_sha256": "6455bc7bbda3c9a4d75ff8a99202fe5a133431cace49bbfc40b031a4babde7f9", "format": 1 }, { - "name": "roles/idrac_gather_facts/tests/asserts/lc_assert.yml", + "name": "plugins/modules/idrac_server_config_profile.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "170dcd03bdb5031bb82a24cc19cc70e1815865a2572e4f14b892221324ef95b5", + "chksum_sha256": "86406d06c9edf0cd03923ac68641c70669469fac2452137499817ef32b92252f", "format": 1 }, { - "name": "roles/idrac_gather_facts/tests/asserts/license_assert.yml", + "name": "plugins/modules/ome_alert_policies_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "4d3e30cd29d21fa947ac9f1b43c3f4d73c60c85187d0d9d01025faa1cd969792", + "chksum_sha256": "515db8633f523ccacb1fd5182d2cad629ed9862f0c967518883001d84b7a84c6", "format": 1 }, { - "name": "roles/idrac_gather_facts/tests/asserts/manager_assert.yml", + "name": "plugins/modules/idrac_user_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "60be5b10f57f9ec1bfaa913610ef448320b476d27cd33b122a7037ea31a95c21", + "chksum_sha256": "3b2f2c92c4a6ff9c21456fe512349546af2da8c1a46013e147d16c280cd1821b", "format": 1 }, { - "name": "roles/idrac_gather_facts/tests/asserts/memory_assert.yml", + "name": "plugins/modules/idrac_diagnostics.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "6b16f28108610ba17f95350a75e72ee33ba0db357cc239e74a018e7aebc81057", + "chksum_sha256": "2afe54778e0b96a26936ae0221f9ec92e0c324ddfa25ee484b0264a565b9ca11", "format": 1 }, { - "name": "roles/idrac_gather_facts/tests/asserts/mmetrics_assert.yml", + "name": "plugins/modules/idrac_os_deployment.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "28c0563664fa0a63bc2654edf6bb78c89208920d7414fc9bf2c9eb7408835cf0", + "chksum_sha256": "fde92ac2396a616812df831e2c576a591bb0b1e0f38e86e8f99cff8f5c75df3d", "format": 1 }, { - "name": "roles/idrac_gather_facts/tests/asserts/nic_assert.yml", + "name": "plugins/modules/ome_device_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "bb3184e49419f93cf390a53562c01203db04037606af82aeab51783e21a5fbb1", + "chksum_sha256": "5a9d906f53b99ba6449684729cea638bda648b536476e9f2095a918b9f4fbfeb", "format": 1 }, { - "name": "roles/idrac_gather_facts/tests/asserts/passensor_assert.yml", + "name": "plugins/modules/idrac_storage_volume.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "2796df243ae251d9a6d0358aabd93e12fbc56aaff0208243fc71be0e20bb4182", + "chksum_sha256": "877573fda46c5e009e86b371fb09f9a111b48b2bd0c3a4646111ce854d0b4f28", "format": 1 }, { - "name": "roles/idrac_gather_facts/tests/asserts/pciedevice_assert.yml", + "name": "plugins/modules/ome_profile.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "1f4bfc03967189c3fa4c2752b75174294075ad6a2649d4c7e0f6c82dc0b0bd55", + "chksum_sha256": "fc8c762332517a5f607b0ebc8ef6f3ef07ad5cfc77f9023878cf8dac1e647664", "format": 1 }, { - "name": "roles/idrac_gather_facts/tests/asserts/powersupply_assert.yml", + "name": "plugins/modules/ome_server_interface_profiles.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "d0c8c6212e46587f25b7366001ec10fbd5a9884b53339505815abdee19164c78", + "chksum_sha256": "413f27c5e233980f9f7225a9ee56ac386bcff74507f9afdf40bfe02a7235ed48", "format": 1 }, { - "name": "roles/idrac_gather_facts/tests/asserts/psmetrics_assert.yml", + "name": "plugins/modules/ome_firmware_baseline_compliance_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "5ade4267e18da8e945add979e001b40d832e77f7b3435cc3efd55f29bd4647b6", + "chksum_sha256": "db5f4acfe40ae4ab2df5ba9de0c1900a1994c4ee679600efddc310ee1047b3fb", "format": 1 }, { - "name": "roles/idrac_gather_facts/tests/asserts/secureboot_assert.yml", + "name": "plugins/modules/ome_device_network_services.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e6876b8b8892d421dd0ddd59dcc1986d54361e6c376d8239f42d91a0db707fff", + "chksum_sha256": "83b91b59c6953bc76ed3c98cfce20963c59278e1e440eaa6674dbe1e55b7dd4d", "format": 1 }, { - "name": "roles/idrac_gather_facts/tests/asserts/sensorsvoltage_assert.yml", + "name": "plugins/modules/idrac_firmware_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e26f5f551fe9d943743159b24c9a01c3c4c804543311330b12ff87ed2f0b7079", + "chksum_sha256": "a040502c70727b44937a478d5e33d78ecc90ad8c08873325b5217e80b3e69fab", "format": 1 }, { - "name": "roles/idrac_gather_facts/tests/asserts/system_assert.yml", + "name": "plugins/modules/idrac_lifecycle_controller_logs.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "78c885b55767b51ba6c4be7998d67e9f9599f9e7518ec683f9bb1b7bd3f337b2", + "chksum_sha256": "b374487c9c0f19acad5da9f3fb8fe24fa98b672e2df72f92b9b5eaa2d43ed865", "format": 1 }, { - "name": "roles/idrac_gather_facts/tests/asserts/tmetrics_assert.yml", + "name": "plugins/modules/ome_devices.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "7cd404817eae0e42ab4a29329d93ecf2226b7084464c1613dcd85464b83ddd4e", + "chksum_sha256": "d835188d595160323aa61ae1e2a2d58b49e85db7d26de7d7a2654392cc06fb32", "format": 1 }, { - "name": "roles/idrac_gather_facts/tests/asserts/virtualdisk_assert.yml", + "name": "plugins/modules/idrac_network_attributes.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "2e8bd9e08382df2ea34a9b9830b92086569ca4f16e453286cb92c1705f69aa7e", + "chksum_sha256": "59cc76b19a3f933d43bcf6fcfeb1fdfd7e4012182a2e25a8bd89724762c48e89", "format": 1 }, { - "name": "roles/idrac_gather_facts/tests/inventory", + "name": "plugins/modules/ome_template.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e02233819b1a09844410549191813f7cc7ba360f21298578f4ba1727a27d87fc", + "chksum_sha256": "c3029139c4f6c9a31134f9ef617bb9cf6f9da6c5114c79d32747a42cc1221e93", "format": 1 }, { - "name": "roles/idrac_gather_facts/tests/test.yml", + "name": "plugins/modules/ome_active_directory.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "71250fe59fab062631b04fe173573783fcd89b77e8f5ae2c042720d10cd2f266", + "chksum_sha256": "86178a7cabd672f2d53f9407faed0a06b8a91ae698870fdb033b8649c258b460", "format": 1 }, { - "name": "roles/idrac_gather_facts/vars", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "plugins/modules/idrac_syslog.py", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "8a79f5615815e37ffd0e0dd8544a2df2782ba792bb5e283df134c3403b8d4f8c", "format": 1 }, { - "name": "roles/idrac_gather_facts/vars/main.yml", + "name": "plugins/modules/ome_network_vlan_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "330b6e0ccfb1e2805e8fb61b43ecd5170d98d1fdffaadd905de5ffb2c4339d09", + "chksum_sha256": "026ecd2bd7f6cf17fa96599fc95b188fa8b867dd47e1de03276ac37f596a1426", "format": 1 }, { - "name": "roles/idrac_import_server_config_profile", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "plugins/modules/ome_configuration_compliance_info.py", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "1b1ed854d7a4570a185369dc8b9d8f1485c8c4aa6a79289da6e654934087279a", "format": 1 }, { - "name": "roles/idrac_import_server_config_profile/README.md", + "name": "plugins/modules/redfish_firmware_rollback.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "67521b0bf1ceb30e3ca348cd5f07d4c54aee0c56d7b3935c542fd920c11df288", + "chksum_sha256": "e8ab7816a03db36b4c8b7929daeff49fe37bff9bccaad1436b79d49d5f5bfe58", "format": 1 }, { - "name": "roles/idrac_import_server_config_profile/defaults", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "plugins/modules/ome_configuration_compliance_baseline.py", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "1f994c2f1c0ffeb9c9eca96a8291b3cb2fa1bafd54a5ee36c6ccc2222ba0ebe0", "format": 1 }, { - "name": "roles/idrac_import_server_config_profile/defaults/main.yml", + "name": "plugins/modules/ome_application_security_settings.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "d569d3374f9ba9960023d769bdc7245afb9f635656bfdb48ac1ad61d0279a53d", + "chksum_sha256": "fcc5d6a663ee2f69579f10293417070805a9730c6bc5fa45f298d256fac210c6", "format": 1 }, { - "name": "roles/idrac_import_server_config_profile/handlers", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "plugins/modules/ome_smart_fabric_info.py", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "31f3b247e21bd57be875f645ba0a3c05410e5a382a40c323fb7eda9eae7e82fb", "format": 1 }, { - "name": "roles/idrac_import_server_config_profile/handlers/main.yml", + "name": "plugins/modules/idrac_lifecycle_controller_jobs.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "c31a046bb009c7b68dd25c11a096f2b08aad4e49903648580a05dfbec4da9d2f", + "chksum_sha256": "8b57b0f86959fee2a4919d83ef943dd5856fd3b137842fb700478d07159b403f", "format": 1 }, { - "name": "roles/idrac_import_server_config_profile/meta", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "plugins/modules/redfish_powerstate.py", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "be425ea056cbebe68fc6cb28f13535147c4c776bc133dbb94e45df525a2c5357", "format": 1 }, { - "name": "roles/idrac_import_server_config_profile/meta/argument_specs.yml", + "name": "plugins/modules/ome_network_vlan.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "b1daf5cd34934f57365ef41dd1bdb8eadf73c96faee44442d8b607d3770921a6", + "chksum_sha256": "0dee87e880e9d493f08a698de3eea053271579d3b288956c334ec908c66490eb", "format": 1 }, { - "name": "roles/idrac_import_server_config_profile/meta/main.yml", + "name": "plugins/modules/ome_user_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "7a77ddd7746819905a9dd4511b45439de974b04c6628f8f89c5b89490bc9bcc7", + "chksum_sha256": "3d4a7a6a62d34ddc9be106675f3da29c96c2c76e27301f5faa85113be3e9986b", "format": 1 }, { - "name": "roles/idrac_import_server_config_profile/molecule", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "plugins/modules/idrac_lifecycle_controller_status_info.py", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "158d02c1d50ef175e26c7ffa66831575034e077e233ddd992c39d594e004fa38", "format": 1 }, { - "name": "roles/idrac_import_server_config_profile/molecule/cifs_share", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "plugins/modules/ome_application_network_address.py", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "11e8b445e0071012a7b2132caba06415b25e9b81259cbcbeee9ed4975f8268cf", "format": 1 }, { - "name": "roles/idrac_import_server_config_profile/molecule/cifs_share/molecule.yml", + "name": "plugins/modules/ome_alert_policies_message_id_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "0d55af04f5706218c384613a4393a6e01ab1ccea2438a1b1cc6ea2b403272225", + "chksum_sha256": "2cf9d3fa3e158437de239eea9cb136b07449ff0e6841e9eb2bce6e0fb83bb263", "format": 1 }, { - "name": "roles/idrac_import_server_config_profile/molecule/cifs_share/converge.yml", + "name": "plugins/modules/ome_powerstate.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "2deadcf076f47e066b749446ece0948b1fc0be171ab883f67a32c64de9a9a7bd", + "chksum_sha256": "efa7f838ef4c600fe74d1060a4fb58d621c71b3a2c1112d0788cc771087dc5de", "format": 1 }, { - "name": "roles/idrac_import_server_config_profile/molecule/default", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "plugins/modules/idrac_timezone_ntp.py", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "540b6fec19d767e940128d79991a7517716052293091e1a98caca550de5d0d8a", "format": 1 }, { - "name": "roles/idrac_import_server_config_profile/molecule/default/molecule.yml", + "name": "plugins/modules/idrac_reset.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "f3f5fdbd0243581c13e09c4a9347c3197712b89de7ccf5c19bf040002a8e0967", + "chksum_sha256": "e4421c071a7cfc7dec17eae265fa717a35c10f6b818a091dcf32f839e9e90e8f", "format": 1 }, { - "name": "roles/idrac_import_server_config_profile/molecule/default/converge.yml", + "name": "plugins/modules/ome_smart_fabric_uplink_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "2f2a440f3da11b5d518f74f7fe44fb76709607382cb11bd47fd424767eb8e7da", + "chksum_sha256": "bd524cb73b25626201e68c3d48b32116eacd935d05de27a5d8ec959862acc7da", "format": 1 }, { - "name": "roles/idrac_import_server_config_profile/molecule/http_share", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "plugins/modules/ome_discovery.py", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "b4aece5f3d5201dc25862e443aa169dcfdf6c70618b48d631fd345e420693ccc", "format": 1 }, { - "name": "roles/idrac_import_server_config_profile/molecule/http_share/molecule.yml", + "name": "plugins/modules/ome_application_network_webserver.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "0d55af04f5706218c384613a4393a6e01ab1ccea2438a1b1cc6ea2b403272225", + "chksum_sha256": "a6bb503e6708f2a551196d9dd14958da526365857e91543b18444119c4f1ffc8", "format": 1 }, { - "name": "roles/idrac_import_server_config_profile/molecule/http_share/converge.yml", + "name": "plugins/modules/ome_chassis_slots.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "05ee90c1a034c6a7c4f02120c05554526172311af76c5a61767cab3705b114c0", + "chksum_sha256": "ea0c912d561821887d1a42279234a35659d8fbb43789ca2dbff6fa3601338c7a", "format": 1 }, { - "name": "roles/idrac_import_server_config_profile/molecule/http_share_with_proxy_parameters", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "plugins/modules/idrac_virtual_media.py", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "d1078caa3ff3f2fcff08357dd06b9f64d1050efe2cf6145115e33a5fd02065cc", "format": 1 }, { - "name": "roles/idrac_import_server_config_profile/molecule/http_share_with_proxy_parameters/molecule.yml", + "name": "plugins/modules/ome_server_interface_profile_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "0d55af04f5706218c384613a4393a6e01ab1ccea2438a1b1cc6ea2b403272225", + "chksum_sha256": "a0bef2c7aadb96532d48b22e533218209b0a6c2e68a61a41799f3e1f1d2a32a9", "format": 1 }, { - "name": "roles/idrac_import_server_config_profile/molecule/http_share_with_proxy_parameters/converge.yml", + "name": "plugins/modules/ome_application_alerts_smtp.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "4a9673edc4a062a85a757483b1587a1ebea5ec8545b6ec20cdf861afab9b38e5", + "chksum_sha256": "c9e288755e7b359671d4651125a77a649c829540bc7faa58dd2424c1932c8fa0", "format": 1 }, { - "name": "roles/idrac_import_server_config_profile/molecule/http_share_with_showerror_certificate_warning", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "plugins/modules/ome_firmware_baseline_info.py", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "6146b516cd0a758fa8113ee196fca5233ea279b7934eed092ae4b1767801825d", "format": 1 }, { - "name": "roles/idrac_import_server_config_profile/molecule/http_share_with_showerror_certificate_warning/molecule.yml", + "name": "plugins/modules/dellemc_idrac_lc_attributes.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", + "chksum_sha256": "79c874570d8c94e5373a26c30e4e1b64576a54a14f62f4499b674c7b2f99bb8d", "format": 1 }, { - "name": "roles/idrac_import_server_config_profile/molecule/http_share_with_showerror_certificate_warning/converge.yml", + "name": "plugins/modules/ome_smart_fabric.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "c6440bd7d1c2e2fe63da11cf6345307f8d08d2ff2287a3007e3cb99eea47d7c4", + "chksum_sha256": "978a641f8c545ff7c675985cc01fb2ce755eba9d1de6a33b26ae44db93a105c8", "format": 1 }, { - "name": "roles/idrac_import_server_config_profile/molecule/https_share", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "plugins/modules/ome_device_group.py", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "eb9e953ebb5e83d77c066c64167e6ca55e5c3801ebc2cf8446c9ec7ba3375c91", "format": 1 }, { - "name": "roles/idrac_import_server_config_profile/molecule/https_share/molecule.yml", + "name": "plugins/modules/ome_device_quick_deploy.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "0d55af04f5706218c384613a4393a6e01ab1ccea2438a1b1cc6ea2b403272225", + "chksum_sha256": "bdad7f9ca49947777ea54855b4a878190711a40e954462bab66c53c468d1d8ac", "format": 1 }, { - "name": "roles/idrac_import_server_config_profile/molecule/https_share/converge.yml", + "name": "plugins/modules/ome_application_network_settings.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "70c1949f3736465e786717cb6a2311c4dfcc92861212161f8957ca6c932e5d6c", + "chksum_sha256": "2f476f2600e706c5ccea4ffb37ef1c6cd5eeed491f2983422c6a4abd5d0aab75", "format": 1 }, { - "name": "roles/idrac_import_server_config_profile/molecule/https_share_with_proxy_parameters", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "plugins/modules/ome_application_network_time.py", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "672aeec4d5f1013efd76e8499104cd0cccfcc0287537550f794054a483b76007", "format": 1 }, { - "name": "roles/idrac_import_server_config_profile/molecule/https_share_with_proxy_parameters/molecule.yml", + "name": "plugins/modules/ome_application_network_proxy.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "0d55af04f5706218c384613a4393a6e01ab1ccea2438a1b1cc6ea2b403272225", + "chksum_sha256": "14671aeae28183b563fc43e7ae3740172f69b7a55d304b393c47601b2f68a18c", "format": 1 }, { - "name": "roles/idrac_import_server_config_profile/molecule/https_share_with_proxy_parameters/converge.yml", + "name": "plugins/modules/ome_device_mgmt_network.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "2f555e872a266977d5f0acb356ed20321dcf984564e9471d2fdc29b841d5a120", + "chksum_sha256": "14aa9b8f1645c7231b723b4836b13c24899d59fcf826198672aff0a93f638f95", "format": 1 }, { - "name": "roles/idrac_import_server_config_profile/molecule/import_buffer_json", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "plugins/modules/ome_network_port_breakout.py", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "6c73b4ce57b32f2afe6537b5eee8456263a2c0a226b3d6418d1c7df26fef8e0a", "format": 1 }, { - "name": "roles/idrac_import_server_config_profile/molecule/import_buffer_json/molecule.yml", + "name": "plugins/modules/ome_domain_user_groups.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", + "chksum_sha256": "72aed38354e90870ae0fcc2e6695fa3a36b8caf0bd2195ca3bce19be9d8b46aa", "format": 1 }, { - "name": "roles/idrac_import_server_config_profile/molecule/import_buffer_json/prepare.yml", + "name": "plugins/modules/redfish_firmware.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "49b649577157352b249d241cab5c9f05d2f14e72c6b886ef809b1ec006a6eb0b", + "chksum_sha256": "6349cdbda830d1cec8dc00c488a85d8b44b35333bb6ee23f411ac755c8761956", "format": 1 }, { - "name": "roles/idrac_import_server_config_profile/molecule/import_buffer_json/converge.yml", + "name": "plugins/modules/ome_device_power_settings.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "7e73dc08b0b670f9047ad969ec153670bae08fb4baf7db258216251c4160c083", + "chksum_sha256": "aa48c7a06f1d8a0e3d73b7d7b708dc3e8a91a95ff0cebb5ceab7faf7c81cb847", "format": 1 }, { - "name": "roles/idrac_import_server_config_profile/molecule/import_buffer_xml", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "plugins/modules/ome_identity_pool.py", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "6e160cdaf6357d914322f860688cbfc78bacade3e6abbd53725b4acaa716d8b4", "format": 1 }, { - "name": "roles/idrac_import_server_config_profile/molecule/import_buffer_xml/molecule.yml", + "name": "plugins/modules/idrac_boot.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", + "chksum_sha256": "0d25592dedc580847e8eaea5ae2d9ce73909234ef212dc97881077a587642147", "format": 1 }, { - "name": "roles/idrac_import_server_config_profile/molecule/import_buffer_xml/prepare.yml", + "name": "plugins/modules/dellemc_system_lockdown_mode.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "49b649577157352b249d241cab5c9f05d2f14e72c6b886ef809b1ec006a6eb0b", + "chksum_sha256": "fafecf1bd67f65c03480e16c097a0dab930c2bfaff25a4efda57f46a90f27b5c", "format": 1 }, { - "name": "roles/idrac_import_server_config_profile/molecule/import_buffer_xml/converge.yml", + "name": "plugins/modules/ome_smart_fabric_uplink.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "57802a2bfa00428e20c2baf45add16b9cb643b46bb5d0c325190699432473e86", + "chksum_sha256": "3a955bec818da06c3a19e8a9eb2c0da5618f1740535a831a28db41b1bc839410", "format": 1 }, { - "name": "roles/idrac_import_server_config_profile/molecule/import_multiple_target", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "plugins/modules/idrac_bios.py", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "314547ca6619f5e0e397f85dedf7f43e4c7b33bd9db81b8f361c5f05f6844968", "format": 1 }, { - "name": "roles/idrac_import_server_config_profile/molecule/import_multiple_target/molecule.yml", + "name": "plugins/modules/ome_session.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "0d55af04f5706218c384613a4393a6e01ab1ccea2438a1b1cc6ea2b403272225", + "chksum_sha256": "2534bef038d21213010240f0493f380550e4bfd307066f0a4eb567e51d0cd998", "format": 1 }, { - "name": "roles/idrac_import_server_config_profile/molecule/import_multiple_target/converge.yml", + "name": "plugins/modules/ome_device_local_access_configuration.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e3fb9baf2fda4da08a609e07a9c56bca74569c01a0081e3630e9635295b31f0a", + "chksum_sha256": "8bd1dcade5df034272f51fe091061d0032aa559833ba2b58503b1290c625f9c1", "format": 1 }, { - "name": "roles/idrac_import_server_config_profile/molecule/nfs_share", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "plugins/modules/idrac_certificates.py", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "d30ac54367b5df7f43157a407de8b3ebc2a729b2643b1504585f6675780fbe09", "format": 1 }, { - "name": "roles/idrac_import_server_config_profile/molecule/nfs_share/molecule.yml", + "name": "plugins/modules/ome_alert_policies_category_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "0d55af04f5706218c384613a4393a6e01ab1ccea2438a1b1cc6ea2b403272225", + "chksum_sha256": "eebfc28d1cc523796a2357e3d5b03c21fe4a9f30ab40f504241ae7c640c67b0d", "format": 1 }, { - "name": "roles/idrac_import_server_config_profile/molecule/nfs_share/converge.yml", + "name": "plugins/modules/ome_firmware_catalog.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "c825c7c600c1dccac10930371fb8da29b38df7dfee460ab885266bf6e3006bd1", + "chksum_sha256": "1c439cf8efb07f813cbc64b1de0113ddbcfce19293d68133a537e68d5f7df856", "format": 1 }, { - "name": "roles/idrac_import_server_config_profile/molecule/resources", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "plugins/modules/ome_application_alerts_syslog.py", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "2c21624c78bc8dd29d77504c1f96964d9748c971815ea7ab1a04c93fe2035f36", "format": 1 }, { - "name": "roles/idrac_import_server_config_profile/molecule/resources/tests", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "plugins/modules/ome_profile_info.py", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "4e281235b6a83ff06114a92ce302dabb6e455fb84d2fbf6c262d6d6363f5c355", "format": 1 }, { - "name": "roles/idrac_import_server_config_profile/molecule/resources/tests/nic_helper.yml", + "name": "plugins/modules/ome_diagnostics.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "f247488b64a9ccaffe3f0240f0cf3a6e527b3ac952a786bcc715c436b397a00d", + "chksum_sha256": "7763f1443e013bc330d4cf66280fae08d1c5beee21b664f0ce03a9f2195a2ace", "format": 1 }, { - "name": "roles/idrac_import_server_config_profile/molecule/resources/tests/raid_helper.yml", + "name": "plugins/modules/ome_groups.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "6706025009360630843898df27085681a613507370fb0bb91a2c40fd03a2e8c7", + "chksum_sha256": "3faaf1de9dd04f8c0757e60c81c608ad5c7f7fd7f615c1d5b92302973a1ad503", "format": 1 }, { - "name": "roles/idrac_import_server_config_profile/molecule/resources/tests/cleanup.yml", + "name": "plugins/modules/dellemc_configure_idrac_services.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "3985d5b2ca2f11661982e372f5c9e677144651dd2f7f167efd7e0e4b3d2c9231", + "chksum_sha256": "244953d637c27180cf67aec39005498a0abe58688d3a2b05b1655a6df81a8db9", "format": 1 }, { - "name": "roles/idrac_import_server_config_profile/molecule/resources/tests/export.yml", + "name": "plugins/modules/idrac_redfish_storage_controller.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8a4f3a78e9d259c668ae748e224e36007b91372281024e1f514ad6aaaae72606", + "chksum_sha256": "fd937628d1466bb8588f017b9f6a90e8bf1d7a3376942c0e15e3b84f72c67432", "format": 1 }, { - "name": "roles/idrac_import_server_config_profile/molecule/resources/tests/prepare.yml", + "name": "plugins/modules/__init__.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "b48f7002029c826a3402b360aaabe1a9301d34e249a49718aef9454d6dc9a557", + "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "roles/idrac_import_server_config_profile/tasks", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "plugins/modules/ome_job_info.py", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "307aa1d9a37868e417542a78e29a2128b98199bc3f041929e7e8edcdd5a7d8a6", "format": 1 }, { - "name": "roles/idrac_import_server_config_profile/tasks/main.yml", + "name": "plugins/modules/ome_template_network_vlan.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8a329bb5b5a0c7ce2855fddb6eb3b16ab43524ad86e7f12defe55577933fb636", + "chksum_sha256": "de15c6f3694b636ec1413057f165328ed3f0f4712f8063e98f1029872b0f9ff7", "format": 1 }, { - "name": "roles/idrac_import_server_config_profile/tests", + "name": "docs", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_import_server_config_profile/tests/inventory", + "name": "docs/COMMITTER_GUIDE.md", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e02233819b1a09844410549191813f7cc7ba360f21298578f4ba1727a27d87fc", + "chksum_sha256": "9faa99978e41d71c8f84fb1e764ab495075c57e81c8a26edcf0bd41bdedda326", "format": 1 }, { - "name": "roles/idrac_import_server_config_profile/tests/test.yml", + "name": "docs/BRANCHING.md", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "4acfc541204ebf3d6c37f48c79e48f8f273d016aa7a2f6af7fef715905245eba", + "chksum_sha256": "347e9f1d9850cbb807f3ac5680a4db0145a90f6714ee23c2d9ea3618806c8609", "format": 1 }, { - "name": "roles/idrac_import_server_config_profile/vars", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "docs/CODE_OF_CONDUCT.md", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "b115034e51a649fda55572de32880b12224311bc35517d0534de26223683230a", "format": 1 }, { - "name": "roles/idrac_import_server_config_profile/vars/main.yml", + "name": "docs/SECURITY.md", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "a072ea3135c9e0109ae66ae42d86a3947cd27c8f7fde4ea1d62bf14a75ff7b6a", + "chksum_sha256": "b4bcf55efb2913e91247bcbc9e2944cd6bdca0c80a2f6314dbd62802b167f3c0", "format": 1 }, { - "name": "roles/idrac_job_queue", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "docs/ATTRIBUTION.md", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "0e55990cf8c6c469b4c35f0cf9ba6dd92d89f39d36e8d22f45a939a6edd06c20", "format": 1 }, { - "name": "roles/idrac_job_queue/README.md", + "name": "docs/ADDITIONAL_INFORMATION.md", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e3e961b7f75abd408cc8ab2d76fab6a3175b32ddca1f3e87c64b009ff8e53daf", + "chksum_sha256": "83c4a24d8d137a954c891ffcc1c75a8157d7957204a59797c5fd4a9dfd3326da", "format": 1 }, { - "name": "roles/idrac_job_queue/defaults", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "docs/SUPPORT.md", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "cd2fd536176f16d1722ee4fb035b8c8a7b92d77395a8fd6b74f56a9dc5cb3d86", "format": 1 }, { - "name": "roles/idrac_job_queue/defaults/main.yml", + "name": "docs/DOCUMENTATION.md", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "cf4f24cabcc7843106afbcf1ad295d130bc31c4b9431d8e149ef9611ec66f0e4", + "chksum_sha256": "d79a78be68eeb1be24c29a4d65bb253a1c90f43eaefc661d402e3bab0b5b37f3", "format": 1 }, { - "name": "roles/idrac_job_queue/handlers", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "docs/MAINTAINERS.md", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "480717a42cbfbb59ee6afb30d1df16f4e6f586b1375a262ba2c87032811fb929", "format": 1 }, { - "name": "roles/idrac_job_queue/handlers/main.yml", + "name": "docs/CONTRIBUTING.md", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "2ae7c77fc2f339f8db094a30043ad551606c6bca9e5bdfbd9e34a79563f7334c", + "chksum_sha256": "ffe89c3652d21757f689570ac1a14eaa4dc6e35bc99793f48e6eef21d2b84d54", "format": 1 }, { - "name": "roles/idrac_job_queue/meta", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "docs/EXECUTION_ENVIRONMENT.md", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "c853f1c80c075bc775ec977562ae868177567256bef9d69543f6519cfd7b852a", "format": 1 }, { - "name": "roles/idrac_job_queue/meta/argument_specs.yml", + "name": "docs/README.md", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e63d726e475ad59773fa26fe3918bd6cb5b042b508834e49c8c344fbf4945ccd", + "chksum_sha256": "7e931cceff02aadb24f0f4afa56b4e1283505d82cbd41d1f535aabd3a58bf8c9", "format": 1 }, { - "name": "roles/idrac_job_queue/meta/main.yml", + "name": "docs/ISSUE_TRIAGE.md", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "081550bbea995e8776778cb69f4f3003f5dc9ef2148439bb0ab441f28fd67949", + "chksum_sha256": "25dd3183365794c152fe138272727efcded3456422c5dc16c18f2b31a8f2ab16", "format": 1 }, { - "name": "roles/idrac_job_queue/molecule", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "docs/DEBUG.md", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "9b2ce4f68fc99226b34a0ebced6fd1919f514f0a33c877b377566b146972d4b6", "format": 1 }, { - "name": "roles/idrac_job_queue/molecule/clear_job_queue", + "name": "docs/modules", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_job_queue/molecule/clear_job_queue/molecule.yml", + "name": "docs/modules/ome_alert_policies_message_id_info.rst", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "f6128fe631d272bed3adb4c98223a2b04d554093dc05a2c499eeb9e6d80c9ac7", + "chksum_sha256": "f8d66036646c2cfffd36018236fc6ec18f879d90bd3622d142bb867b952b35e8", "format": 1 }, { - "name": "roles/idrac_job_queue/molecule/clear_job_queue/converge.yml", + "name": "docs/modules/ome_configuration_compliance_info.rst", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "f040659df832a82b82f060fe657dcefd0e06f397600604b86b65ba6964e9e338", + "chksum_sha256": "848d7c9d9e61c5c8c97c35a9733e03334148653d0aca06a0c22fe6e794a2fc10", "format": 1 }, { - "name": "roles/idrac_job_queue/molecule/default", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "docs/modules/redfish_powerstate.rst", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "9e3f38feb33e73aa3be84121fbd8746e69d5d0437efd179b6720a12318841428", "format": 1 }, { - "name": "roles/idrac_job_queue/molecule/default/molecule.yml", + "name": "docs/modules/ome_application_network_proxy.rst", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "f6128fe631d272bed3adb4c98223a2b04d554093dc05a2c499eeb9e6d80c9ac7", + "chksum_sha256": "c23edd851d595fe884ac6bd6f9a470d2e9729b9b61f5fbe8f6f6615bda6bf394", "format": 1 }, { - "name": "roles/idrac_job_queue/molecule/default/converge.yml", + "name": "docs/modules/idrac_network.rst", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "0424782236b3a6a800a4a192f73f528f65b87c135f3a53203547d640e6cde330", + "chksum_sha256": "37cc7f880f97091f5e0c7e89d640122bd626a46f7581800355c4af98b12d9cb4", "format": 1 }, { - "name": "roles/idrac_job_queue/molecule/delete_job", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "docs/modules/ome_template.rst", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "d940fbcd82901b91da31f2af54dc997ed744d66fb339798d5df36eddc43f90f3", "format": 1 }, { - "name": "roles/idrac_job_queue/molecule/delete_job/molecule.yml", + "name": "docs/modules/ome_discovery.rst", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "f6128fe631d272bed3adb4c98223a2b04d554093dc05a2c499eeb9e6d80c9ac7", + "chksum_sha256": "456b287079a08bb118e95154e247110f5b85c0716428b5762014a23af904df6e", "format": 1 }, { - "name": "roles/idrac_job_queue/molecule/delete_job/converge.yml", + "name": "docs/modules/ome_network_port_breakout.rst", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "f17ecfe1a83f4d34185ba19886855028b67ea7665f4a24b712ad741ee6d1e0fc", + "chksum_sha256": "fbb030907564880d8e31d25eacfa0ed90eda9265f3acde489863a77e51fbb497", "format": 1 }, { - "name": "roles/idrac_job_queue/tasks", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "docs/modules/ome_configuration_compliance_baseline.rst", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "071d48887ac78876fe56f6df99d6bf9d8e00793943600ee8bacb4bda35020f1b", "format": 1 }, { - "name": "roles/idrac_job_queue/tasks/clear_jobs_with_api.yml", + "name": "docs/modules/idrac_session.rst", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "32e48bc5f0ceedcf0077e0ab7f6931e5dc1f4c34324aef0957ef440b44f69369", + "chksum_sha256": "daf45ea7d1c992590d3d54de993d95a5549bec0f5f09baae86f05e8af73f23f3", "format": 1 }, { - "name": "roles/idrac_job_queue/tasks/clear_jobs_with_wsman.yml", + "name": "docs/modules/idrac_bios.rst", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "fc5e2cbcef3dffe45fbae0ccdb4310621cde5b940b81f9051ec1039126e894a0", + "chksum_sha256": "876e2511b34de5e945314102ae16688b32161821e05e0dc2eb8b9a7611337bc3", "format": 1 }, { - "name": "roles/idrac_job_queue/tasks/delete_job_with_id.yml", + "name": "docs/modules/ome_profile_info.rst", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "5aec3e437d0a24ee7b8a41737abd2db6889a1c4a0c0543943212573d06a2fc83", + "chksum_sha256": "0c329fec5f6e78bf10236c018391c92792e6bee7dbbe8245a37c6c4f62c31c6c", "format": 1 }, { - "name": "roles/idrac_job_queue/tasks/get_idrac_firmware_version.yml", + "name": "docs/modules/ome_network_vlan.rst", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "a193b7f5af28f17972f0da7e52e5fc0ecd34f4b8ae6398bd1b04769a7cffa453", + "chksum_sha256": "a1988d55e769b2dc54585dccfae8329bdf0258b0b11e88004ff038784f844b76", "format": 1 }, { - "name": "roles/idrac_job_queue/tasks/main.yml", + "name": "docs/modules/ome_chassis_slots.rst", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "edba2b2d2854747abff9b2b993b2ac119117eaa60533c517b5d7586af869d784", + "chksum_sha256": "adc0e0e23bcd34fdab97a05ef1a57422e7ea982593101791a1f49207000d9b09", "format": 1 }, { - "name": "roles/idrac_job_queue/tasks/validate_input_data.yml", + "name": "docs/modules/idrac_attributes.rst", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "0c862aa3048f9061f02fff2a55ec1324b7b1c81b6175617d3e739eeda382d7ee", + "chksum_sha256": "0f5add96d08322ab923f657ff2b569bef8974fd286e2d0cd562c177b493c1af8", "format": 1 }, { - "name": "roles/idrac_job_queue/templates", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "docs/modules/dellemc_configure_idrac_services.rst", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "c5da2d61f8d536f4835cad6c0b11619759d47177e8121c5f52a605ae6698239d", "format": 1 }, { - "name": "roles/idrac_job_queue/templates/idrac_delete_job_queue.j2", + "name": "docs/modules/dellemc_idrac_storage_volume.rst", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "f83008a98424af87bd8817bb29a82a175e175a8459146267c86e7cbd1895c31b", + "chksum_sha256": "8c37ba05337b65851c5996643e77bf4c4e29165693f840e39c8b4e837c70ca1b", "format": 1 }, { - "name": "roles/idrac_job_queue/templates/idrac_delete_job_queue_force.j2", + "name": "docs/modules/ome_application_network_time.rst", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "b777b52ecc380bc79f8a903a8bd2fb8613e98ea665d41e01efa2532fc9f9ef5b", + "chksum_sha256": "9df4886749f7d4afe394f0fc587421dd9c54ba98eb1ddd3a262dd04170c7b188", "format": 1 }, { - "name": "roles/idrac_job_queue/tests", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "docs/modules/idrac_user_info.rst", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "1bbd394ae4cb4461fdc7104b64eeecd4014457b646439b0616d77de7b64a07d4", "format": 1 }, { - "name": "roles/idrac_job_queue/tests/inventory", + "name": "docs/modules/ome_server_interface_profiles.rst", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e02233819b1a09844410549191813f7cc7ba360f21298578f4ba1727a27d87fc", + "chksum_sha256": "28933d624342c6800cfa7664b74c0f967d0efe97371b52cef884ed426462d2e0", "format": 1 }, { - "name": "roles/idrac_job_queue/tests/test.yml", + "name": "docs/modules/redfish_firmware_rollback.rst", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8898537e0e2c4d23b06938b4e5181cc005b3eedad5c6f3c848c78a8a93f7ad21", + "chksum_sha256": "a4c57e3744ea281d1162044f12956e2c73a86c014a555dfadfc55ff88f1cb754", "format": 1 }, { - "name": "roles/idrac_job_queue/vars", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "docs/modules/ome_firmware_baseline.rst", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "6721b19fe4192107c6cefcaabb6592fae9045980e6560ce432d215b87edd131d", "format": 1 }, { - "name": "roles/idrac_job_queue/vars/main.yml", + "name": "docs/modules/ome_firmware_baseline_compliance_info.rst", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "12bd53e6ac521d02cf9d16a83ef864467aa1ca7398b0b20e15836de87c74f9cb", + "chksum_sha256": "20c12253eb1fee5aab877300d5e93d70548061bb0fcec984d8c67a4061248879", "format": 1 }, { - "name": "roles/idrac_os_deployment", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "docs/modules/ome_smart_fabric.rst", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "047eed044d7abd2a4f0afa9f194608325799603c0e79db850199316dacf52c93", "format": 1 }, { - "name": "roles/idrac_os_deployment/README.md", + "name": "docs/modules/ome_diagnostics.rst", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e800016c9724604f5c12210c94b830bbc27bd4996205fcd74a31768f754b0a1f", + "chksum_sha256": "4ee631e78019ef817608cdf0bdef6d1ad186663fc5dcb665838e42e6fae044dc", "format": 1 }, { - "name": "roles/idrac_os_deployment/defaults", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "docs/modules/idrac_firmware.rst", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "030134a6b0cd3023cbfba3e91dc5db447e5be1009ba2e4c540b1cb8e7f247181", "format": 1 }, { - "name": "roles/idrac_os_deployment/defaults/main", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "docs/modules/ome_network_vlan_info.rst", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "5a9a3d0470553733c5b9871a7d8242e0273cf63f41653f6cda7b46dee9b42580", "format": 1 }, { - "name": "roles/idrac_os_deployment/defaults/main/esxi.yml", + "name": "docs/modules/ome_device_local_access_configuration.rst", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "5393035ed221c2ced358b9d585fd1881817a8b31b0dd030ba32e81ecd8a7f4df", + "chksum_sha256": "5e0a535a51887b24547dc3f0a143a8fdc526fe8aa6439d43ea5705b6e13fc45a", "format": 1 }, { - "name": "roles/idrac_os_deployment/defaults/main/main.yml", + "name": "docs/modules/ome_alert_policies_category_info.rst", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "759f139407f609b8655150fe9df73e69025bbaadc01b6c69e07729867539d583", + "chksum_sha256": "9bd6d149cd343cf5350acb9ca1fd72866442cfd1fbafea6e12abf8d3e579be8e", "format": 1 }, { - "name": "roles/idrac_os_deployment/defaults/main/rhel.yml", + "name": "docs/modules/idrac_lifecycle_controller_jobs.rst", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e2a5308265f0edf9cdb641063bbf2c2e877a9693154b04cf3a4b9a784f3934c0", + "chksum_sha256": "df32077f463558a26fb05faf7c5d614763dc81ceeaf36e9c1425446a686840bf", "format": 1 }, { - "name": "roles/idrac_os_deployment/handlers", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "docs/modules/ome_user_info.rst", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "c5c8daa9a295d1d7eed88142829b1f5bd374c93bc917b88d07ca894dcd5b9ee6", "format": 1 }, { - "name": "roles/idrac_os_deployment/handlers/main.yml", + "name": "docs/modules/ome_device_network_services.rst", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "82cb53c7b2545e1a7883e32efdebbc34bd69bbad9ccbeabd190c3028f7f05777", + "chksum_sha256": "ebe843a8d5c20d24b72e63e1ef8095a185d4cf11f6af7c09d35669a68d2a2a58", "format": 1 }, { - "name": "roles/idrac_os_deployment/meta", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "docs/modules/ome_smart_fabric_uplink.rst", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "bae22448e52f0d31385c31b0764ed3fd0fee20dd6aee2def06651c666685e21d", "format": 1 }, { - "name": "roles/idrac_os_deployment/meta/argument_specs.yml", + "name": "docs/modules/ome_template_network_vlan_info.rst", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "9e69ff8ddd86e522acf91f9ca4efd9099947ecb857dd1138e8c7aef4793d816a", + "chksum_sha256": "5005543155f59599f813a2a1bd67a97ab14a749024d979e0a2bc9da0ab1666e9", "format": 1 }, { - "name": "roles/idrac_os_deployment/meta/main.yml", + "name": "docs/modules/ome_active_directory.rst", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "db297ffe635bcee661eaee0844312d69cc364d67cc427bab545865674401c9b9", + "chksum_sha256": "4ce5a6dacde5757e14c22347eec7d7ae32768318424b42f5f73971053482b55d", "format": 1 }, { - "name": "roles/idrac_os_deployment/tasks", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "docs/modules/idrac_server_config_profile.rst", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "eeb3208bc71ad29f0dfd425a0c30c791310b7072094ae290ccb68335164e5818", "format": 1 }, { - "name": "roles/idrac_os_deployment/tasks/clean_up", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "docs/modules/ome_device_power_settings.rst", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "6e03448b0741bb436788f1b56d7f6796c22b2754081689f4a09e82f415796977", "format": 1 }, { - "name": "roles/idrac_os_deployment/tasks/clean_up/clean_up_destinations.yml", + "name": "docs/modules/idrac_lifecycle_controller_logs.rst", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "d9a4258e490a7d6f72372a85f128243594c709f26020b61761ff2064d6837d46", + "chksum_sha256": "9d4d6cb107ccb5031d4d2fcbcd08f80456b0587745b4990e752cbccb638ed689", "format": 1 }, { - "name": "roles/idrac_os_deployment/tasks/clean_up/clean_up_working_directory.yml", + "name": "docs/modules/ome_device_group.rst", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "6cb3708d332825d39b859aecd1df938ef1b3bc63b92213c1195432e7ffa9d0aa", + "chksum_sha256": "347f004bbb1f406f6458be14294f11cb78424e68b8f4ec8cd82657cc78669480", "format": 1 }, { - "name": "roles/idrac_os_deployment/tasks/common", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "docs/modules/redfish_storage_volume.rst", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "0ce0a96661c3276e70d93afd3e0bc61646db6d17541a044eecd969d0954b6321", "format": 1 }, { - "name": "roles/idrac_os_deployment/tasks/common/copy_iso_to_destination.yml", + "name": "docs/modules/ome_application_network_webserver.rst", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "163156845f185684a862eb1ba7f0023119f51798898d9bb79209a8f15ea80b20", + "chksum_sha256": "d7db8c65b7938549a1c0a6b81c556245c7bcf106b133148ea9e744042735aed7", "format": 1 }, { - "name": "roles/idrac_os_deployment/tasks/common/create_working_directory_path.yml", + "name": "docs/modules/ome_groups.rst", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e5d3c043120b0788f2a4a4e5f8dcd26adc600065c47c423f92eeca3907c21d4a", + "chksum_sha256": "49f25cd54bb29daf2e4bf821e70eae9a36a9bd0bad650d84183a635c36173e19", "format": 1 }, { - "name": "roles/idrac_os_deployment/tasks/common/download_or_copy_source_files.yml", + "name": "docs/modules/idrac_lifecycle_controller_job_status_info.rst", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "ec7e75367105039f8833bb8bcacf522f137bd7456162c99987aa0a8ddb2761de", + "chksum_sha256": "c32793f384d344b0713ede1ebf841cbbc928c837244123e09e6388874109c45a", "format": 1 }, { - "name": "roles/idrac_os_deployment/tasks/common/validate_inputs.yml", + "name": "docs/modules/ome_firmware_baseline_info.rst", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "4e70fbc15dd06a835d5cbf840d4bd93f8c1f1d0d4214f6555e68cbbd4c2256e1", + "chksum_sha256": "c086a7474a9e0f49073027326df33a8e9993739489dfc4bc3643043e94bdecf0", "format": 1 }, { - "name": "roles/idrac_os_deployment/tasks/esxi", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "docs/modules/ome_firmware.rst", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "072801f3145a2152fe1d16705142146b17a96cb8691ad13a34ed5998fbeb1cd7", "format": 1 }, { - "name": "roles/idrac_os_deployment/tasks/esxi/compile_iso.yml", + "name": "docs/modules/idrac_boot.rst", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "ea92a3796b8d00ba6e0e65146d6089201a6bd4f6fdfb01467279414ac69fd024", + "chksum_sha256": "90795661dc6d6ea275a2d7230d9f5dfbb8ed33d851b7121daf912969eaa69e65", "format": 1 }, { - "name": "roles/idrac_os_deployment/tasks/idrac", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "docs/modules/ome_domain_user_groups.rst", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "76c7947459bbb9638ed412c611ab594ee192862d15baf99490c56ee0f46584e8", "format": 1 }, { - "name": "roles/idrac_os_deployment/tasks/idrac/attach_iso_to_virtual_media.yml", + "name": "docs/modules/ome_powerstate.rst", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "2d7ed30e4c808fc88df7f59a669b8bb1b561bf002c332b3a8296c73e19d6c660", + "chksum_sha256": "0e3ca639cc60095bd21f564dadc75aeec6f465b92493ba80d59043993ac4752b", "format": 1 }, { - "name": "roles/idrac_os_deployment/tasks/idrac/clean_up_virtual_media_slot.yml", + "name": "docs/modules/idrac_os_deployment.rst", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "f03831c4aa6b588e969bccdce38b75d49969eae2f5543b8ba9e94510cb18eb29", + "chksum_sha256": "689e1bb13ae21d66693214fd75c59b8c67fc22532ddd2175961d2e48f165c1c5", "format": 1 }, { - "name": "roles/idrac_os_deployment/tasks/idrac/set_boot_mode_and_restart.yml", + "name": "docs/modules/ome_job_info.rst", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "f0502bbe2d8e5411fda7e5e87820654f14f2641a500eeab7c8a5a5636892cce2", + "chksum_sha256": "8f73985a066380ccf1cbe407f336ca1a3e0663c213ce6a9766d6f98e1350330f", "format": 1 }, { - "name": "roles/idrac_os_deployment/tasks/iso", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "docs/modules/idrac_lifecycle_controller_status_info.rst", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "05e28f1bdbc85a6955d8d4a9167e4ea77c7b8304dceb5dfc7bc0b6407b2451e3", "format": 1 }, { - "name": "roles/idrac_os_deployment/tasks/iso/extract_iso.yml", + "name": "docs/modules/idrac_firmware_info.rst", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "09edb456108a3a29a94573ac4568446c5b401930b1f7bf8b051502fd2d064a7b", + "chksum_sha256": "aa2c5aa0262ea0a4cffb710871fc51c50af268d729018eab32126a1a5e434cef", "format": 1 }, { - "name": "roles/idrac_os_deployment/tasks/iso/generate_kickstart_file.yml", + "name": "docs/modules/ome_application_alerts_syslog.rst", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "aa2a8cd54823f99a1f61b0453048b228e440bdf1c4e274b0f0ae7635990d083e", + "chksum_sha256": "403735d99edf39433b21366ba7340e2ac14ccb6cf5dc995773f949386ef88f44", "format": 1 }, { - "name": "roles/idrac_os_deployment/tasks/main.yml", + "name": "docs/modules/ome_device_info.rst", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "7414db3ca8e33e14b34126b64b5eddefc24d27ac2e3d3d0b9a33284acba29c16", + "chksum_sha256": "418d5ed4d1f124744c5d2fb90d3bb857b53ce3d466f3f3f60177213321616712", "format": 1 }, { - "name": "roles/idrac_os_deployment/tasks/rhel", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "docs/modules/ome_device_location.rst", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "f2423423b018612ea934fb545ebcb28cfef6fe96d0734cb4f9230839902cb9b1", "format": 1 }, { - "name": "roles/idrac_os_deployment/tasks/rhel/compile_iso.yml", + "name": "docs/modules/ome_devices.rst", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8d4b130336f4349cd1c3bd96c1f52f1fcd81615bcead7e9fa39d46883ebf41f6", + "chksum_sha256": "fcc2e9b7350ec5db29e644f44fe46637d15244826551b89a23183b8265ad5559", "format": 1 }, { - "name": "roles/idrac_os_deployment/tasks/tracking", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "docs/modules/ome_template_identity_pool.rst", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "b12712f00923d44af672c624132d113dac1e9b78c0eaa7c1140a1cf1bd031fa7", "format": 1 }, { - "name": "roles/idrac_os_deployment/tasks/tracking/track_for_os_deployment.yml", + "name": "docs/modules/ome_application_security_settings.rst", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "df751495e4839501919602cebe8c24677e11d191394353b13e5b6448af44459e", + "chksum_sha256": "4a3b9f5c516af482d286247e659da9dca38c7568ac497b45fc470312565ffc2e", "format": 1 }, { - "name": "roles/idrac_os_deployment/templates", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "docs/modules/ome_application_network_address.rst", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "9e53ca365382a3ad3d31bc47588bc10c0f0b53e8b87903e5d7105c926cf0c5ea", "format": 1 }, { - "name": "roles/idrac_os_deployment/templates/ESXI_8.j2", + "name": "docs/modules/ome_alert_policies.rst", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "998e80a725d3e21a3b68e6368decadd5c66196afdc74dc9947ff2282dcec144f", + "chksum_sha256": "e4be3fa0c0a9ebbf9582fddb91a35e631c15c978e557e3f4d64ddd2380a94fd7", "format": 1 }, { - "name": "roles/idrac_os_deployment/templates/RHEL_8.j2", + "name": "docs/modules/ome_application_console_preferences.rst", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "c1b54a6b4b5d2ccfeca7376a758389d0de0d5cb2c489189f2690616909b0e6ab", + "chksum_sha256": "0946954fea93136cd7d3107e45fafdaa42435b45ed325017d6df712dc11f5f79", "format": 1 }, { - "name": "roles/idrac_os_deployment/templates/RHEL_9.j2", + "name": "docs/modules/idrac_user.rst", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "54d4812cce2199771afaaeedf6fc8d813152f824097195dfb76284bbdebfadb4", + "chksum_sha256": "ff53c38d06a284c0cbea9cc4d0169eff46d744868cad3191165dc6692f04a3b5", "format": 1 }, { - "name": "roles/idrac_os_deployment/tests", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "docs/modules/ome_device_mgmt_network.rst", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "5b1ea044e5dc5e43f519d5e63061c80e348eb71c2bfd71e8cfa99bead301f5b5", "format": 1 }, { - "name": "roles/idrac_os_deployment/tests/inventory", + "name": "docs/modules/idrac_diagnostics.rst", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "0647d824fd28557a0b72bcdc079671c07571c1ee008efd92728e1291b7ca3eac", + "chksum_sha256": "bc6e3f9926798690930f371007c66576061d0d6acf8186f494f58812ca10aa51", "format": 1 }, { - "name": "roles/idrac_os_deployment/tests/test.yml", + "name": "docs/modules/ome_smart_fabric_info.rst", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "f9d3fffd8a4834828c2dab606405d1fe11f12c5e4b14142c99221f689597c857", + "chksum_sha256": "f090dc150e8e80d3819dc35cee1b5b37748d3527fb8a001cbfbc8bf83f25bda9", "format": 1 }, { - "name": "roles/idrac_os_deployment/vars", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "docs/modules/ome_firmware_catalog.rst", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "061d78e77b60d446fbcf94b76105df0b8af72ed2cef85522d207fbd3afe39091", "format": 1 }, { - "name": "roles/idrac_os_deployment/vars/main.yml", + "name": "docs/modules/redfish_firmware.rst", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "a6d9f6ecca54f00e015debd5807eecd29aee9c3118d6a710768074c6eb625b9b", + "chksum_sha256": "47f46d78fb9b6bc6c5255d679440fce23af9c8717cc1d6192e44882a94ccc3db", "format": 1 }, { - "name": "roles/idrac_reset", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "docs/modules/ome_application_network_settings.rst", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "890dacb57ef47d75e4b10aea918d26e69474a5604fbd159ce2c18b89eebe7b76", "format": 1 }, { - "name": "roles/idrac_reset/README.md", + "name": "docs/modules/ome_template_info.rst", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "00e77ec0ddaa418973cd9cad99137bcef33738171102464f50d3f49f5cf2b3f4", + "chksum_sha256": "a3028bb6f9c65f7c3e5314ef121653291a00b7f8d29c847309952facd67c8b68", "format": 1 }, { - "name": "roles/idrac_reset/defaults", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "docs/modules/idrac_virtual_media.rst", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "db0471c8a0ea1b732918b78a036b531d59db90eaa7cfbc0fc66664f0f20a0f97", "format": 1 }, { - "name": "roles/idrac_reset/defaults/main.yml", + "name": "docs/modules/idrac_syslog.rst", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "9cd98c8b578501e6b24cec9c004bc5963e0f479ca4435aabc58ddfa7e63033a0", + "chksum_sha256": "687900acee641629277d0638e553dc60dc429aaf13ad2d0ea72b0e6117800fc1", "format": 1 }, { - "name": "roles/idrac_reset/handlers", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "docs/modules/dellemc_configure_idrac_eventing.rst", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "15a235619160acc869ef11202c81b3d702762fe22e7796a8f7dd2f09f8fe2036", "format": 1 }, { - "name": "roles/idrac_reset/handlers/main.yml", + "name": "docs/modules/ome_profile.rst", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "0ec20499ab70254c4498ed1783b01bff5fdde39aca5f81f9c7e3f979ba8b384a", + "chksum_sha256": "60493fff0865e3f6c4dad14362a9d309f3382f876b9abccad987b0f12e2b17f4", "format": 1 }, { - "name": "roles/idrac_reset/meta", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "docs/modules/ome_identity_pool.rst", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "65a6256b4338dfa694afdf2e4ed3fe517cac466e22b936b60e98f868e1b271de", "format": 1 }, { - "name": "roles/idrac_reset/meta/argument_specs.yml", + "name": "docs/modules/idrac_license.rst", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "6af174177901d928f439e83c69caad0fccc601a710ac5b434af7bf5240f70418", + "chksum_sha256": "f730b26296ef7a95f41c36a32ef71764ed48a7cef6dbb9dad1e5fce3371afe9b", "format": 1 }, { - "name": "roles/idrac_reset/meta/main.yml", + "name": "docs/modules/idrac_storage_volume.rst", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "0195a66c4e4ac7e78a39c4a8fa223ee0b2d049a09c398eab91080868422c8049", + "chksum_sha256": "480a539da1885ef09b84152bd29a3606257306d96660ecbc4e04fafd73505994", "format": 1 }, { - "name": "roles/idrac_reset/tasks", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "docs/modules/ome_smart_fabric_uplink_info.rst", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "dd352d0bbad655ee40d19f3c5d5d78fd4a5adedca123d8e58cd6d4a429c6bcd9", "format": 1 }, { - "name": "roles/idrac_reset/tasks/lcstatus_check.yml", + "name": "docs/modules/idrac_system_info.rst", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "377ab984113ad5d61f3164c7578677c42d727d35eb35c79f61275b794bdb970e", + "chksum_sha256": "b330714479ce873966c6c3a6285f859f653aa2c05d7e97f26a192b19b4861c65", "format": 1 }, { - "name": "roles/idrac_reset/tasks/main.yml", + "name": "docs/modules/ome_session.rst", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "17feb74dd2b4bbec2b65ad4044f5af9e8f9660c66a9594cce342a79e178c1225", + "chksum_sha256": "95a2659b9930891280bf478d7d257f5b1e96c612b5734e5a56f9c123a7d37034", "format": 1 }, { - "name": "roles/idrac_reset/templates", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "docs/modules/dellemc_system_lockdown_mode.rst", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "2868bb81a87c50614180c0615c9b3203ba6fdbca3401b447e6feee7f55e78ca4", "format": 1 }, { - "name": "roles/idrac_reset/templates/idrac_lifecycle_controller_status.j2", + "name": "docs/modules/ome_alert_policies_actions_info.rst", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "cacc1f259dc7dbef66e2f715f138d3a75ffd5852ad56a2fa4e0f17358f30b4ab", + "chksum_sha256": "edff59a28ced2f64b9e9e450dc04350c2fe1e3fa787d545b949629ed327a18dd", "format": 1 }, { - "name": "roles/idrac_reset/tests", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "docs/modules/idrac_reset.rst", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "f513a60d623f8deb39294534d1d8f47e4c5d68a0864ef618832f7533e3de14c2", "format": 1 }, { - "name": "roles/idrac_reset/tests/inventory", + "name": "docs/modules/ome_alert_policies_info.rst", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e02233819b1a09844410549191813f7cc7ba360f21298578f4ba1727a27d87fc", + "chksum_sha256": "1e9df83b5853255bf511e51a123d385d2b9338fa7eb2593691711f84c1b3120c", "format": 1 }, { - "name": "roles/idrac_reset/tests/test.yml", + "name": "docs/modules/ome_template_network_vlan.rst", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "43fa08ab4acc6414c37f0fd53406310d4aa81f970d122feeb5604b40251317d5", + "chksum_sha256": "a5246aecab609ef52c03d9aa586c891780eadce33bd691a7694127430d474bc0", "format": 1 }, { - "name": "roles/idrac_reset/vars", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "docs/modules/idrac_redfish_storage_controller.rst", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "21b934146055a3488b07061723c4a700136f42c745e33832f81ea58c99f1463a", "format": 1 }, { - "name": "roles/idrac_reset/vars/main.yml", + "name": "docs/modules/redfish_event_subscription.rst", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "9e4a4575c14328832a6976cc4aed6b19c07dbfe5997a10ae733b99e50702fa0e", + "chksum_sha256": "52d39d898363e14508228f97aab3489ddca05e938e722c7d8938876074d6ddeb", "format": 1 }, { - "name": "roles/idrac_server_powerstate", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "docs/modules/ome_user.rst", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "54acdf02a55c4ae9fb98e9474939c7fd296c45a0fecee45ccbd87afdbd64052f", "format": 1 }, { - "name": "roles/idrac_server_powerstate/README.md", + "name": "docs/modules/ome_server_interface_profile_info.rst", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "241acc485326568db77e4c7c6aa738605779ea7949337b58425a58cd2d26bfc5", + "chksum_sha256": "20f24755213bbc6ac0b215d258b71c5a5d43a003b791aaf6908fdf7cfa326e2c", "format": 1 }, { - "name": "roles/idrac_server_powerstate/defaults", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "docs/modules/dellemc_idrac_lc_attributes.rst", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "0be40c9b7e8fe75321a78edeac8f5d8e38c425ea93b85a2da535de9e6615a851", "format": 1 }, { - "name": "roles/idrac_server_powerstate/defaults/main.yml", + "name": "docs/modules/ome_application_alerts_smtp.rst", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "016ff520beef55bf26d90d19c4ff8187fcf861cc6697999b71d4c756e8cd1af4", + "chksum_sha256": "9a0eb93827023a6fe75d0f8b6aa89511ff7b132d7f236973c2e367bc9845061f", "format": 1 }, { - "name": "roles/idrac_server_powerstate/handlers", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "docs/modules/idrac_network_attributes.rst", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "c1d139c1ac7ffc1da524ac4087f0972a6545327e254611fef00fb2e5853eba73", "format": 1 }, { - "name": "roles/idrac_server_powerstate/handlers/main.yml", + "name": "docs/modules/idrac_certificates.rst", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8fb9435cbde9641256ffb3cad4e82e8169969ecf0faebed24c6e1eca315a17c6", + "chksum_sha256": "059c080471428b321ff474a8e804f69794cfdff2c2608f858df4ea97e6c10a86", "format": 1 }, { - "name": "roles/idrac_server_powerstate/meta", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "docs/modules/ome_device_quick_deploy.rst", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "a1bf2906d12158918026bcf4feebd4aed8207491e68f38febec3a6ba5d7926eb", "format": 1 }, { - "name": "roles/idrac_server_powerstate/meta/argument_specs.yml", + "name": "docs/modules/idrac_timezone_ntp.rst", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "689583bd8c529dfe982c3dcdf84e968eeee49eea7da2eac65ad34f74afc2dd3c", + "chksum_sha256": "b0e50c42077beb1d71809c3a59bd51b77e68e0545dd195a2bd112e0c39cc12f5", "format": 1 }, { - "name": "roles/idrac_server_powerstate/meta/main.yml", + "name": "docs/modules/ome_application_certificate.rst", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "f1119ecdb9b37bfa6f3860f8c767174cca920a521a95946f04a93f5c2ca4cd0e", + "chksum_sha256": "4dc78e6882651932dff408bc22298f8255b772bfc3213d13188ac3d7710230e1", "format": 1 }, { - "name": "roles/idrac_server_powerstate/molecule", + "name": "playbooks", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_server_powerstate/molecule/default", + "name": "playbooks/roles", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_server_powerstate/molecule/default/converge.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "8790919530e9b792ac0a0bb5aa7f39756369e469fdcdead5ed849377be400f55", + "name": "playbooks/roles/idrac_server_powerstate", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_server_powerstate/molecule/default/molecule.yml", + "name": "playbooks/roles/idrac_server_powerstate/idrac_server_powerstate.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "f3f5fdbd0243581c13e09c4a9347c3197712b89de7ccf5c19bf040002a8e0967", + "chksum_sha256": "2b27bab99e8b95ed92bddd14d59e53341a3cfa8b3828cfce59af8bed8328ac52", "format": 1 }, { - "name": "roles/idrac_server_powerstate/molecule/forceoff", + "name": "playbooks/roles/idrac_user", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_server_powerstate/molecule/forceoff/converge.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "8d81e28400e1ecd4d4f63e3880ad12efcad626f1b482aea24e3781db13463872", - "format": 1 - }, - { - "name": "roles/idrac_server_powerstate/molecule/forceoff/molecule.yml", + "name": "playbooks/roles/idrac_user/idrac_user.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", + "chksum_sha256": "44346ffd0acd7bc28a4b0760772385552686673dc6421947e1b6d2a916b6e5b2", "format": 1 }, { - "name": "roles/idrac_server_powerstate/molecule/forcerestart", + "name": "playbooks/roles/idrac_job_queue", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_server_powerstate/molecule/forcerestart/converge.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "1fc6007dac86a8108d44f5d57cafbbedd7f31ec317258a090cdd20ca7338d5d7", - "format": 1 - }, - { - "name": "roles/idrac_server_powerstate/molecule/forcerestart/molecule.yml", + "name": "playbooks/roles/idrac_job_queue/idrac_job_queue.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", + "chksum_sha256": "a7495a4784f344f1557f1f65ea5c51f56b31d025e304f66ddbb9ebbaffb2991e", "format": 1 }, { - "name": "roles/idrac_server_powerstate/molecule/gracefulrestart", + "name": "playbooks/roles/idrac_attributes", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_server_powerstate/molecule/gracefulrestart/converge.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "495911d67e2d1421a451dc2ecc4d52705486791f8be17321134fd2d91fb4aa9b", - "format": 1 - }, - { - "name": "roles/idrac_server_powerstate/molecule/gracefulrestart/molecule.yml", + "name": "playbooks/roles/idrac_attributes/idrac_attributes.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", + "chksum_sha256": "b558f4d845b9f870ad3c89c34e3361c41acfcef9437f83bdcf342ce3e7c111d0", "format": 1 }, { - "name": "roles/idrac_server_powerstate/molecule/gracefulshutdown", + "name": "playbooks/roles/redfish_firmware", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_server_powerstate/molecule/gracefulshutdown/converge.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "fb25fbf9767297093fc2c5fcb74c38fdae2de2870dd4a7f1d264e32ab3fd2f34", - "format": 1 - }, - { - "name": "roles/idrac_server_powerstate/molecule/gracefulshutdown/molecule.yml", + "name": "playbooks/roles/redfish_firmware/redfish_firmware.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", + "chksum_sha256": "3b40bf1bf5fa84bfd210377c89e4b4566076bac113347918c06dcca053c463a8", "format": 1 }, { - "name": "roles/idrac_server_powerstate/molecule/nmi", + "name": "playbooks/roles/idrac_certificate", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_server_powerstate/molecule/nmi/converge.yml", + "name": "playbooks/roles/idrac_certificate/idrac_certificate.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "c163e9d4d92dfc89ad31c68ee2172162ce2cf9f2c8c1a65f28d5f42437bbc90d", + "chksum_sha256": "fc5d65aad27029c224cfbe3945b27725caac02a8bc20db57837283efbac05c85", "format": 1 }, { - "name": "roles/idrac_server_powerstate/molecule/nmi/molecule.yml", + "name": "playbooks/roles/idrac_gather_facts", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, + "format": 1 + }, + { + "name": "playbooks/roles/idrac_gather_facts/idrac_gather_facts.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", + "chksum_sha256": "99a54fcb95b0805ac8ca5f2ce85541caf9dd9666ee3ae0cd1401c90a3a3dbcf8", "format": 1 }, { - "name": "roles/idrac_server_powerstate/molecule/on", + "name": "playbooks/roles/vars_files", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_server_powerstate/molecule/on/converge.yml", + "name": "playbooks/roles/vars_files/certificates.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "d71c25f25f9e3ba08d70dd9f7dc33d304e69950e6245781aeb8ed71ac00d23d1", + "chksum_sha256": "91099951ff4f500c14e95ce2a6950ddc012521daf34c1253221cd774e75647ed", "format": 1 }, { - "name": "roles/idrac_server_powerstate/molecule/on/molecule.yml", + "name": "playbooks/roles/vars_files/attributes.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", - "format": 1 - }, - { - "name": "roles/idrac_server_powerstate/molecule/powercycle", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "chksum_sha256": "1e760a0cb6126d76b49613aac9e612f88ae7e27925160a52b2e0b255b5f47bb2", "format": 1 }, { - "name": "roles/idrac_server_powerstate/molecule/powercycle/converge.yml", + "name": "playbooks/roles/vars_files/storage.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "be3e16e9141db31d632e532d034f33ed6d72a9151f1c3194080d16b1ab4961f2", + "chksum_sha256": "65e7a405ea04245a99ced19727310b2bdf295578fe6bc2869ee764eeb2c4235d", "format": 1 }, { - "name": "roles/idrac_server_powerstate/molecule/powercycle/molecule.yml", + "name": "playbooks/roles/vars_files/storage_controller.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", - "format": 1 - }, - { - "name": "roles/idrac_server_powerstate/molecule/pushpowerbutton", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "chksum_sha256": "9ccc017e74bede8274235bc7358cfa6192c7c7430876016ddd07c827657f16e8", "format": 1 }, { - "name": "roles/idrac_server_powerstate/molecule/pushpowerbutton/converge.yml", + "name": "playbooks/roles/vars_files/import.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e4566f9dc07e3d658986932a9190fadcd98950e65e54829810aac38898b43e77", + "chksum_sha256": "90d3589259f331152d96d8ae0c773ed3958c7ef24bb9604387bbfa040a20bb6e", "format": 1 }, { - "name": "roles/idrac_server_powerstate/molecule/pushpowerbutton/molecule.yml", + "name": "playbooks/roles/vars_files/export.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", + "chksum_sha256": "aa812c14b39721cf11488674c9a0a93b8ca8e94406f335f7722a58b20475a08d", "format": 1 }, { - "name": "roles/idrac_server_powerstate/tasks", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "playbooks/roles/vars_files/firmware.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "8ddbe55c1ad9eaa8f33cc617ed5ceeaaf99efd7d43bb5f33d60ea98fd966241c", "format": 1 }, { - "name": "roles/idrac_server_powerstate/tasks/init.yml", + "name": "playbooks/roles/vars_files/bios.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", + "chksum_sha256": "5d5c75310a93c6d513c747db70e9bea927c1eb5dd6ef75ba5fa766d4c2baaf9e", "format": 1 }, { - "name": "roles/idrac_server_powerstate/tasks/main.yml", + "name": "playbooks/roles/vars_files/osd.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "28a5dd2d4dd0c53d832afbc13fc43dd71180b4d8579e5e37d62073e2fa51ce07", + "chksum_sha256": "b1e6e58675cb4af4c9f800681df1be3ea613b4ee09aa6f8c5eb2e8f05f4b2df9", "format": 1 }, { - "name": "roles/idrac_server_powerstate/tests", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "playbooks/roles/vars_files/user.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "4dbddb5c3dedb08b2a42e3b2131cb515bca4ae9d83ae4a28a17ff4919993b587", "format": 1 }, { - "name": "roles/idrac_server_powerstate/tests/inventory", + "name": "playbooks/roles/vars_files/credentials.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e02233819b1a09844410549191813f7cc7ba360f21298578f4ba1727a27d87fc", + "chksum_sha256": "959f184f2bd6eec8a6302784bfc6518c10a712a496e92b6f20be4f5e166be41a", "format": 1 }, { - "name": "roles/idrac_server_powerstate/tests/test.yml", + "name": "playbooks/roles/vars_files/reset.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "a60392a56123662801eb3957572a4c57d858026c0c0222d8e7a3b2c04a24c5f1", + "chksum_sha256": "690bd2b370bbff4b2d9fc3e158f7a85276e343e12167d724d7a30ae7fd7ae7b5", "format": 1 }, { - "name": "roles/idrac_server_powerstate/vars", + "name": "playbooks/roles/idrac_export_server_config_profile", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_server_powerstate/vars/main.yml", + "name": "playbooks/roles/idrac_export_server_config_profile/idrac_export_server_config_profile.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "f92fe5299b10e093b76f7527715368bf5d9a243323f74a69b3a74bc75b172886", + "chksum_sha256": "e5a5df7a2c70cdfc5b97c9a752dddf82b134ba6b5358ab6216097b097c72a533", "format": 1 }, { - "name": "roles/idrac_storage_controller", + "name": "playbooks/roles/idrac_import_server_config_profile", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_storage_controller/README.md", + "name": "playbooks/roles/idrac_import_server_config_profile/idrac_import_server_config_profile.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "64f1956a2b0638551ece563c4f072e2c27553b76e4f381c22316d9e18d47d6b7", + "chksum_sha256": "ac1ed229206d33006e498e8c0ec6f46ea190dcbcb34698b3560ac7c45859e645", "format": 1 }, { - "name": "roles/idrac_storage_controller/defaults", + "name": "playbooks/roles/idrac_bios", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_storage_controller/defaults/main.yml", + "name": "playbooks/roles/idrac_bios/idrac_bios.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "15213c1a91c203930ede7c03d11efa362d86d0f94e6822268e714e8e7a98b14d", + "chksum_sha256": "46eb1addcc8166ef1e320678c15b5c0bcb494e68166b3a4cea65341764af3832", "format": 1 }, { - "name": "roles/idrac_storage_controller/handlers", + "name": "playbooks/roles/idrac_reset", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_storage_controller/handlers/main.yml", + "name": "playbooks/roles/idrac_reset/idrac_reset.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "527bd186562deac98b997410a770da9d22afee10005f965d699859e2a4df5ce0", + "chksum_sha256": "d7260501d8b6889b34b43524d75c1bf06a6457f44ea303b36aacb2190ff8fa4e", "format": 1 }, { - "name": "roles/idrac_storage_controller/meta", + "name": "playbooks/roles/idrac_os_deployment", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_storage_controller/meta/argument_specs.yml", + "name": "playbooks/roles/idrac_os_deployment/idrac_os_deployment.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "57c999b43cebe8874baf8ce6a3fbe7a603c69bc0101577c73d7eb1d8720fa066", + "chksum_sha256": "484bf0716912aac6c405531874feb47643b82e5ae5bb4048e492adb7269328f1", "format": 1 }, { - "name": "roles/idrac_storage_controller/meta/main.yml", + "name": "playbooks/roles/README.md", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "3eda64bf454dd351cebf7063807750d690c44072601bae3af6144460a5323e6b", + "chksum_sha256": "abd9f8c450fda2dfbff41f9ee2bbc613150d94e027e8a560e48d3ec14aad97fd", "format": 1 }, { - "name": "roles/idrac_storage_controller/tasks", + "name": "playbooks/roles/idrac_firmware", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_storage_controller/tasks/main.yml", + "name": "playbooks/roles/idrac_firmware/idrac_firmware.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "ea1e319497a59c9d00d925cec6f1bcaf7c672b1b3e6d9a671c95a1c9e89c9f77", + "chksum_sha256": "ce0d0ab244e8a7831b43abafdcc2e610b3b4507ff0a8785000792d94769e71c0", "format": 1 }, { - "name": "roles/idrac_storage_controller/tests", + "name": "playbooks/roles/idrac_storage_controller", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_storage_controller/tests/inventory", + "name": "playbooks/roles/idrac_storage_controller/idrac_storage_controller.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e02233819b1a09844410549191813f7cc7ba360f21298578f4ba1727a27d87fc", + "chksum_sha256": "0792768055d63117233dbbca23e2e7f434da81c3e77eaeb67554602d17ea7fd3", "format": 1 }, { - "name": "roles/idrac_storage_controller/tests/test.yml", + "name": "playbooks/roles/inventory", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "6992dd1f8393638377d59efa1ddbd6e728bffc188f6997d3b5c98208ce710853", + "chksum_sha256": "f78483b3cf76c53e1539f5c47bcae79a21890faa859bc5f0cdea52cbeedc046e", "format": 1 }, { - "name": "roles/idrac_storage_controller/vars", + "name": "playbooks/roles/redfish_storage_volume", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_storage_controller/vars/main.yml", + "name": "playbooks/roles/redfish_storage_volume/redfish_storage_volume.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "981bc0f2d638983323e5081845acf0ac97ddf1cd5e603cf517051f69661a9cec", + "chksum_sha256": "7c8d35ac12005d8a06ca9fbb891edd16c926b4740b7f1a4743df7fcace3404da", "format": 1 }, { - "name": "roles/molecule.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "a681a11158030f89670466b71c1cc02663571a4b551b2e3a7924ad23096e48cd", + "name": "playbooks/redfish", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { - "name": "roles/redfish_firmware", + "name": "playbooks/redfish/storage", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/redfish_firmware/README.md", + "name": "playbooks/redfish/storage/redfish_storage_volume_delete_job_tracking.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e5c84a2ed15c9a447689ca3a576997db0b740caf3318d6c53f5f4bd94ee8ad26", - "format": 1 - }, - { - "name": "roles/redfish_firmware/defaults", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "chksum_sha256": "54dad57ad6a79cf3d1613917157698b84eadf3f10e456776ce23fd4a1a8c4e61", "format": 1 }, { - "name": "roles/redfish_firmware/defaults/main.yml", + "name": "playbooks/redfish/storage/redfish_storage_volume_modify_job_tracking.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "db1cab86f255f2f7829eb72d7f45c792a3c1560d5c23fc42076c70893f4dd784", + "chksum_sha256": "96a4103655813d28c473885a73cdba3b48eafaf01521931f7761f89de461c91e", "format": 1 }, { - "name": "roles/redfish_firmware/handlers", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "playbooks/redfish/storage/redfish_storage_volume_create_job_tracking.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "180a6c686410517af84f74f13ee71d1451ea7a736855e521355da7f7b7a36948", "format": 1 }, { - "name": "roles/redfish_firmware/handlers/main.yml", + "name": "playbooks/redfish/storage/redfish_storage_volume_initialize_job_tracking.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "c039d1e5934a6dac58d3fa5dae336ebd5cf878c9649b6acbba4206f6ee0e3e0d", + "chksum_sha256": "2c4a6b9df13e5c02c6f74324453b3e2e93607f4fe6cc723a1a2d3337883ea21e", "format": 1 }, { - "name": "roles/redfish_firmware/meta", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "playbooks/redfish/storage/redfish_storage_volume.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "071ebfb5602ec9046db2ed9209b8697ff9e9cbc66069236b875bbf65a59af625", "format": 1 }, { - "name": "roles/redfish_firmware/meta/argument_specs.yml", + "name": "playbooks/redfish/redfish_event_subscription.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "f8553c37be4eecc702220849c497ff5cb9dc0712567fc85d3cbed123c450f89f", + "chksum_sha256": "f901dc08010a5c76bf0fbc8c8f1ba60c1eff5d075878469b3fe1197ad2dc4589", "format": 1 }, { - "name": "roles/redfish_firmware/meta/main.yml", + "name": "playbooks/redfish/redfish_powerstate.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "669ae8e69c647cf300677acbc0990147d93ded846aa44fd40c45664768c9d6c6", + "chksum_sha256": "92461b5efd3384e8da363a9a091a18eb762680e516407b78ad55c1139d03c6e6", "format": 1 }, { - "name": "roles/redfish_firmware/molecule", + "name": "playbooks/redfish/firmware", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/redfish_firmware/molecule/default", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "playbooks/redfish/firmware/redfish_firmware.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "e9831056b86afc4319cb850d6ed4a723e08ee7a5e2406e178d060bcc0c669796", "format": 1 }, { - "name": "roles/redfish_firmware/molecule/default/converge.yml", + "name": "playbooks/redfish/firmware/redfish_firmware_rollback.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "12286deeca54ad309b8ad6898fbe72fecbcfd6c35885753b2e8a63de6d2666c1", + "chksum_sha256": "67bedde1fa194d706233c12d6aeae0504214b2598a4f848373e31eddcdc571c0", "format": 1 }, { - "name": "roles/redfish_firmware/molecule/default/molecule.yml", + "name": "playbooks/redfish/firmware/redfish_firmware_from_local_jobtracking.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "f2a39596d4b1e4313eca1a4958921f7d8c57b84115d3f81080704d742edf30b1", + "chksum_sha256": "da71c6817f0338f16b2efceec75919579ab4783695d256eb50050e50dd732ace", "format": 1 }, { - "name": "roles/redfish_firmware/molecule/negative", + "name": "playbooks/redfish/firmware/redfish_firmware_from_http_jobtracking.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "7e1785959ab3ca10bc07a64de60a1fa8faad059df4b1b7a68a493be98b18d0f0", + "format": 1 + }, + { + "name": "playbooks/idrac", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/redfish_firmware/molecule/negative/converge.yml", + "name": "playbooks/idrac/idrac_reset_result_tracking.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "ca7ab87d800e87cded135f5d6b008e71d7784794dca7aed1c67e87db1cb3d1ad", + "chksum_sha256": "1065ba2ac114119031a719e466be0b1cf3d70a05590d7a021855502dc9877f08", "format": 1 }, { - "name": "roles/redfish_firmware/molecule/negative/molecule.yml", + "name": "playbooks/idrac/idrac_lifecycle_controller_logs.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "f2a39596d4b1e4313eca1a4958921f7d8c57b84115d3f81080704d742edf30b1", + "chksum_sha256": "65432bf367476a0dddc30fbfa2ad9bc77a5423daf5dad6518447fc1bea124cd2", "format": 1 }, { - "name": "roles/redfish_firmware/molecule/resources", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "playbooks/idrac/idrac_user.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "d3aedae3410210ff0893afd6e160929f8e7581a5337928f5ee00f0b89a81a9f9", "format": 1 }, { - "name": "roles/redfish_firmware/molecule/resources/cleanup.yml", + "name": "playbooks/idrac/idrac_os_deployment.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e0599c04f5f5203a69b80ed580e6a03f0586e029a482936479beef09f03ef165", + "chksum_sha256": "42fc0b056a6282757e5b0be577e896fc6b62ab4ce0ce4c673eec2f99012d12d6", "format": 1 }, { - "name": "roles/redfish_firmware/molecule/resources/prepare.yml", + "name": "playbooks/idrac/idrac_boot_virtual_media_workflow.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "70be84b8715d7ea5e18f87fbfd34763293a17ebfa3210f7bd4aa767e0b3ab8fc", + "chksum_sha256": "542c406f1a42e6130c8c4a75b97a2ea5fbb8f0c0cfeea41e724972855457e486", "format": 1 }, { - "name": "roles/redfish_firmware/tasks", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "playbooks/idrac/idrac_network_attributes.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "b7dd0ba1946e68eacb3df926df9a2f7d8fdc9f922ea4044b304de3945b0af77d", "format": 1 }, { - "name": "roles/redfish_firmware/tasks/main.yml", + "name": "playbooks/idrac/idrac_session.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "5c256607b253027b52ff6b9ffa117ac4ee5adf9f6fd3a0adfe23251aedcade66", + "chksum_sha256": "b0440a47587c5d5ddb9912b53731727e93d0b889c12241594343f919d22f5bda", "format": 1 }, { - "name": "roles/redfish_firmware/tests", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "playbooks/idrac/idrac_reset.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "de8fe2c4ad4c761b39cd3f2f26a33de198d13764460cd4ae48ddc41e3055c129", "format": 1 }, { - "name": "roles/redfish_firmware/tests/inventory", + "name": "playbooks/idrac/idrac_virtual_media.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e02233819b1a09844410549191813f7cc7ba360f21298578f4ba1727a27d87fc", + "chksum_sha256": "466e5e23ac6ac17de823878df10bc89f90762170e96ca4682626b4ef95d028bc", "format": 1 }, { - "name": "roles/redfish_firmware/tests/test.yml", + "name": "playbooks/idrac/idrac_diagnostics.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "ec798a2b3ebd1096273bc1776f157f23a7b4a7e33d45669856dd185fb9f6b064", + "chksum_sha256": "f14fa78ada0d1c85ecd18419f0ec1940cbd387af3fd35e78da2e676228ed897e", "format": 1 }, { - "name": "roles/redfish_firmware/vars", + "name": "playbooks/idrac/deprecated", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/redfish_firmware/vars/main.yml", + "name": "playbooks/idrac/deprecated/dellemc_configure_idrac_services.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "95897ec515cd6dc828104d2b67e61b8842802aec9e73eac05462c52cd111f653", + "chksum_sha256": "82a62b3e894b89054dcc4d01e56614212501a76ed120d0b98c310bb609ef9836", "format": 1 }, { - "name": "roles/redfish_storage_volume", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "playbooks/idrac/deprecated/idrac_network.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "75b64d730751d3543b829f7baa60bfe506b5c36a068aad0f52db166c7c6b7f15", "format": 1 }, { - "name": "roles/redfish_storage_volume/README.md", + "name": "playbooks/idrac/deprecated/dellemc_idrac_lc_attributes.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "efb82c5ab08b6d604fa2dfa92911904119f33b20799fca3cccbc0ed9aa9633a8", + "chksum_sha256": "965bcf06720fc6b878fed5cc6d77e64b4830027670406a0de451fb519277b842", "format": 1 }, { - "name": "roles/redfish_storage_volume/defaults", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "playbooks/idrac/deprecated/dellemc_configure_idrac_eventing.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "333f32a604a8273f9048d333fb835e9717dd561b4583360503885f3ef49cfa41", "format": 1 }, { - "name": "roles/redfish_storage_volume/defaults/main.yml", + "name": "playbooks/idrac/deprecated/dellemc_system_lockdown_mode.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "0a5a221d2fa9a6fc8985007dca4b7b46ea33c4fee921a405ff021bb576740473", + "chksum_sha256": "d8ec2bdb41b68c6c16783cab302a56739474ba2db2a144340906d83d411d8549", "format": 1 }, { - "name": "roles/redfish_storage_volume/handlers", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "playbooks/idrac/deprecated/idrac_timezone_ntp.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "7fbea4b5c1db843d6a0091e3b19d96062a724fa1059bbb23651692663386b13d", "format": 1 }, { - "name": "roles/redfish_storage_volume/handlers/main.yml", + "name": "playbooks/idrac/idrac_lifecycle_controller_status_info.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "6877ee1583a2e33f3b3baf52a4a633c1f0bddea5bafda3e91241952bb5f2f19f", + "chksum_sha256": "faff447c9a135cfba87c04161408d2f9491d42fe85da06223c821a30cd3c611f", "format": 1 }, { - "name": "roles/redfish_storage_volume/meta", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "playbooks/idrac/idrac_certificates.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "304bead36bc953c79bdb064a6c3372945953d0b6d8addbdc4be45d0e59c51fcc", "format": 1 }, { - "name": "roles/redfish_storage_volume/meta/argument_specs.yml", + "name": "playbooks/idrac/idrac_storage_volume.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8098e64b110bba2ed1aaf28aa39abc87c5085f84149271719bb97376d1181aa3", + "chksum_sha256": "739c488df021adb4d9cf2f8843dd4314bdad00f4076e22c2e0580d2d8b08ba7d", "format": 1 }, { - "name": "roles/redfish_storage_volume/meta/main.yml", + "name": "playbooks/idrac/idrac_firmware_info.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "310a9f23099629e5643b4dfdfa22af40cd4f78f3037fe1a5f6915c322e12feb0", + "chksum_sha256": "eaa3b675ac75e62eead40e8ccab34205de55128cbfdeddac97cff7c1ad7dbbec", "format": 1 }, { - "name": "roles/redfish_storage_volume/molecule", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "playbooks/idrac/idrac_server_config_profile.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "95fbf44d10f20da1cb0a866ec7578e2546e215e535c094b0b0270317eefa8bcb", "format": 1 }, { - "name": "roles/redfish_storage_volume/molecule/RAID0", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "playbooks/idrac/idrac_lifecycle_controller_job_status_info.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "453984f1feb8ed3332755cd58dd3b3d13eacf365db73f0a4231e929c28913ec1", "format": 1 }, { - "name": "roles/redfish_storage_volume/molecule/RAID0/converge.yml", + "name": "playbooks/idrac/idrac_system_info.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "79d8cf155feafc68b8d2d03b79c6a04b5c66e9e5f9e87741ac71c57f54a1c089", + "chksum_sha256": "e385033356b74133e34ecdd3aa63f6ad1d134cc5857ad48bd847f4fc6766c350", "format": 1 }, { - "name": "roles/redfish_storage_volume/molecule/RAID0/molecule.yml", + "name": "playbooks/idrac/idrac_bios.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", + "chksum_sha256": "2f4892fed0e96b2bd7532645fe590d2ae4456bc1de316b405dceb9ef2c10c8fa", "format": 1 }, { - "name": "roles/redfish_storage_volume/molecule/RAID1", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "playbooks/idrac/idrac_boot.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "a3f384d9f351aca517327d735422ff3a7d7e48fd0a8370f9d41dd1da6dd1295b", "format": 1 }, { - "name": "roles/redfish_storage_volume/molecule/RAID1/converge.yml", + "name": "playbooks/idrac/idrac_syslog.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "bf3b39d9fc6450c880a0e5ab61e904844fb9c1e1b112d72be49da7401eef7ba9", + "chksum_sha256": "be1eeae26000a909eb88c2f7ae2f45d5c492a0716cca5d56ce8f9e709aefaac9", "format": 1 }, { - "name": "roles/redfish_storage_volume/molecule/RAID1/molecule.yml", + "name": "playbooks/idrac/idrac_redfish_storage_controller_job_tracking.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", + "chksum_sha256": "a417f1624b45912c41ce6f116140e65bdd241cb60473269ee25efc428d5c2cc9", "format": 1 }, { - "name": "roles/redfish_storage_volume/molecule/RAID10", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "playbooks/idrac/idrac_redfish_storage_controller.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "0f12fa63252f024245e3644b89527a023e718107110a8580cc332c8b57c19b22", "format": 1 }, { - "name": "roles/redfish_storage_volume/molecule/RAID10/converge.yml", + "name": "playbooks/idrac/idrac_attributes.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "c443aef978e1312010f754d04cb5c6da231557f5a044f4aa77e6832ae9526908", + "chksum_sha256": "335fab9fb27b80e9bb72c6b1b312dc5b344d2f1ae9b6614255f854bc5ca6b3a8", "format": 1 }, { - "name": "roles/redfish_storage_volume/molecule/RAID10/molecule.yml", + "name": "playbooks/idrac/idrac_license.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", + "chksum_sha256": "de01f4b83a795770f2b12c9c3d5fbadeb6f9351334083f5fc21bef71d29609b9", "format": 1 }, { - "name": "roles/redfish_storage_volume/molecule/RAID5", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "playbooks/idrac/idrac_user_info.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "5068eb579dea93aca8ef6edab4e4254bc341c00d2ef373cfdffb50a34a64c755", "format": 1 }, { - "name": "roles/redfish_storage_volume/molecule/RAID5/converge.yml", + "name": "playbooks/idrac/idrac_lifecycle_controller_jobs.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "2aa8df2c045cd181b56ee21f6bc7c7f3460797cf3d989de75fafd7025f741ca5", + "chksum_sha256": "2a3912a6f0afe6778d57a2eed40df6183a3ed2838400a16cfdc2eaa4755ea14d", "format": 1 }, { - "name": "roles/redfish_storage_volume/molecule/RAID5/molecule.yml", + "name": "playbooks/idrac/idrac_firmware.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", + "chksum_sha256": "971813db1ea19f8f3e3b9d513f7f15ab2e8015c202323836cb43a3075d0d1b90", "format": 1 }, { - "name": "roles/redfish_storage_volume/molecule/RAID50", + "name": "playbooks/ome", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/redfish_storage_volume/molecule/RAID50/converge.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "86b09f71d7e2238b359eb8ec3be7860f5f531dd8cba020281d8760b6101e8c24", - "format": 1 - }, - { - "name": "roles/redfish_storage_volume/molecule/RAID50/molecule.yml", + "name": "playbooks/ome/ome_device_info.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", + "chksum_sha256": "ef61ae932b9e642e8db5552525670b6a9645a52fb39de9add50551fcd721190a", "format": 1 }, { - "name": "roles/redfish_storage_volume/molecule/RAID6", + "name": "playbooks/ome/profile", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/redfish_storage_volume/molecule/RAID6/converge.yml", + "name": "playbooks/ome/profile/ome_profile_info.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "fd8a43244b35a395e735e9f9662d01d52a0c2b626e3f11b044c0e2f4d599ecf1", + "chksum_sha256": "ee5cb574348141c0f41436b8c267660f94a0df9bcf76b67fb7bc555b1b45b687", "format": 1 }, { - "name": "roles/redfish_storage_volume/molecule/RAID6/molecule.yml", + "name": "playbooks/ome/profile/ome_profile_unassign_job_tracking.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "f52d711103d50a437830c6fbcd04fb4bab49a0f82f6d26d1c791c6e8488dd090", + "chksum_sha256": "91cdfc259bfb71732f8ecc5b64fc69ae06d5053f886f9136aaf78b43d5c9539a", "format": 1 }, { - "name": "roles/redfish_storage_volume/molecule/RAID60", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "playbooks/ome/profile/ome_profile_migrate_job_tracking.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "832510e01a20607c99b212a65d194fd6c87b0b6d135f395215c50bd4ef2e50d7", "format": 1 }, { - "name": "roles/redfish_storage_volume/molecule/RAID60/converge.yml", + "name": "playbooks/ome/profile/ome_profile_assign_job_tracking.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "d33d97618ffcc391d674d3345e4701a2ce217eaf2676694346cc76ad008da05e", + "chksum_sha256": "09dd5305a95e0c59fd985365a2f96c6f929603f973794bded1405b9316d9c6db", "format": 1 }, { - "name": "roles/redfish_storage_volume/molecule/RAID60/molecule.yml", + "name": "playbooks/ome/profile/ome_profile.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "f52d711103d50a437830c6fbcd04fb4bab49a0f82f6d26d1c791c6e8488dd090", + "chksum_sha256": "6ceb1d703cab609a550730151e605a3e85f690e9459efa1c467fbd92e223cb30", "format": 1 }, { - "name": "roles/redfish_storage_volume/molecule/__delete_virtual_drive.yml", + "name": "playbooks/ome/ome_device_mgmt_network.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8d167fa3a1ec0e778272338f9d77af0bb416be6789875be061dcab8375103df6", + "chksum_sha256": "89748790b471a573b3921ff6e0fff48422b97ec16fb2a1aeae568ccb3fcb013e", "format": 1 }, { - "name": "roles/redfish_storage_volume/molecule/__extract_storage.yml", + "name": "playbooks/ome/ome_device_group.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "971c811200c00ba90bf9bd999d45ec7750ba63d9f5e2d75c3929ae89f82b9f72", + "chksum_sha256": "5669a05a743b069ef53e1dadcf80954feb963fe8fd56932676fb92ddda9ca35e", "format": 1 }, { - "name": "roles/redfish_storage_volume/molecule/__get_helper.yml", + "name": "playbooks/ome/ome_device_location.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "2107089195728fc04d99dd63d9f0d8f61b2d7e519f5127627921ef7ee4139df2", + "chksum_sha256": "497ed8e7f6b757cfbc60ccfcecaec04e742b47a6ed80861b58339f79f2f85adf", "format": 1 }, { - "name": "roles/redfish_storage_volume/molecule/__idrac_reset.yml", + "name": "playbooks/ome/alert_policy", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, + "format": 1 + }, + { + "name": "playbooks/ome/alert_policy/ome_alert_policies.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "5c004e1ee7b85b34bde8daf3ce4b82d794013745abff33fd2c27801dbf89bf4a", + "chksum_sha256": "d0d6be7aa3a27a5adaa464911c691ec919d592384a57a651a23fd377f28df60d", "format": 1 }, { - "name": "roles/redfish_storage_volume/molecule/__lc_status.yml", + "name": "playbooks/ome/alert_policy/ome_alert_policies_category_info.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "602b7c37a4a50ca9f143caa2479ff5c737e7592d1c802f8f6ffadbc7579077b1", + "chksum_sha256": "cdfb33544a84e3accabf9b330d92733266c8747b56a4a89d0fdfc14d531d9f75", "format": 1 }, { - "name": "roles/redfish_storage_volume/molecule/apply_time_default", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "playbooks/ome/alert_policy/ome_alert_policies_message_id_info.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "b98604773e4979bb9807e2652fa6217e3ce2c7414597998a84be4592c9d078c4", "format": 1 }, { - "name": "roles/redfish_storage_volume/molecule/apply_time_default/converge.yml", + "name": "playbooks/ome/alert_policy/ome_alert_policies_actions_info.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "65331bfaa443cd7ff715e673d30abb2be2e3acad8ff0c0161cc002b4df3ef030", + "chksum_sha256": "d26bc85e086d2fe2560c3b15a0cef97d58380ffa4a670cd86d1521746250d55a", "format": 1 }, { - "name": "roles/redfish_storage_volume/molecule/apply_time_default/molecule.yml", + "name": "playbooks/ome/alert_policy/ome_alert_policies_info.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "f52d711103d50a437830c6fbcd04fb4bab49a0f82f6d26d1c791c6e8488dd090", + "chksum_sha256": "4ed4df04af14ae90aec17feffb5fb5ce93617856f43b270072e0501328580397", "format": 1 }, { - "name": "roles/redfish_storage_volume/molecule/apply_time_immediate", + "name": "playbooks/ome/user", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/redfish_storage_volume/molecule/apply_time_immediate/converge.yml", + "name": "playbooks/ome/user/ome_user_info.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "defd2475ab056ad28cf76397ae6f42ac3f7440c041546b6ecf0c488517fbd2d4", + "chksum_sha256": "ed38db95276274d797ccc43cec2d8b50d53be9bd1e5e092c9ec6f030b7f5c6fc", "format": 1 }, { - "name": "roles/redfish_storage_volume/molecule/apply_time_immediate/molecule.yml", + "name": "playbooks/ome/user/ome_user.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "f52d711103d50a437830c6fbcd04fb4bab49a0f82f6d26d1c791c6e8488dd090", + "chksum_sha256": "cab96264060d057d6bd286f21e5ba810a6c9747014fb5c6ef4fa12118adb88e1", "format": 1 }, { - "name": "roles/redfish_storage_volume/molecule/apply_time_onreset_reboot_server_true", + "name": "playbooks/ome/ome_session.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "69cd94bccd08b319a360e5f0fd22ce388e1d4dc8f7b4d285fb1e3d2cbee87b6e", + "format": 1 + }, + { + "name": "playbooks/ome/ome_discovery.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "d38b03a955441fecd26fcf8f01f75e65d7d459927ac58040d041299009fab7aa", + "format": 1 + }, + { + "name": "playbooks/ome/application", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/redfish_storage_volume/molecule/apply_time_onreset_reboot_server_true/converge.yml", + "name": "playbooks/ome/application/ome_application_network_address.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "0a14046372f6e7f33908931a7edeb09e73dc4ec5bde6e1778b61fe23054a2735", + "chksum_sha256": "2941e928032f4e93b02e7f56db09bb784702d1782e1e3c87c094a8b2e68bceef", "format": 1 }, { - "name": "roles/redfish_storage_volume/molecule/apply_time_onreset_reboot_server_true/molecule.yml", + "name": "playbooks/ome/application/ome_application_network_time.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "f52d711103d50a437830c6fbcd04fb4bab49a0f82f6d26d1c791c6e8488dd090", + "chksum_sha256": "5d54fa4f854c3871c631114f2bd1a70e33a6f6b87a593529ac4b7bc2a620bb48", "format": 1 }, { - "name": "roles/redfish_storage_volume/molecule/apply_time_onreset_reboot_server_true_force_reboot_true", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "playbooks/ome/application/ome_application_certificate.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "451395c662a84f8d3a030be78a6c1cb7bc32dd5223c2f0c21c4ee6a6433e7d56", "format": 1 }, { - "name": "roles/redfish_storage_volume/molecule/apply_time_onreset_reboot_server_true_force_reboot_true/converge.yml", + "name": "playbooks/ome/application/ome_application_network_proxy.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "ec06873a01c77fa0cfe3d4e85c647f5c41ee33675b9b254a7cc697451a8c2a87", + "chksum_sha256": "afbcdc3fd81f79fec948b8898ed212e48d494d521af66e2c3cfa91538ebfeaa7", "format": 1 }, { - "name": "roles/redfish_storage_volume/molecule/apply_time_onreset_reboot_server_true_force_reboot_true/molecule.yml", + "name": "playbooks/ome/application/ome_application_console_preferences.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "f52d711103d50a437830c6fbcd04fb4bab49a0f82f6d26d1c791c6e8488dd090", + "chksum_sha256": "d69507043f5d3ab6e177a969f319b3dcbf8edfb5678e58e348653c8f6b8556b2", "format": 1 }, { - "name": "roles/redfish_storage_volume/molecule/default", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "playbooks/ome/application/ome_application_alerts_smtp.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "d2eb95a8fcea5239a320840fc4b4ff2321d071a06638ae5d5860651e1b3a4587", "format": 1 }, { - "name": "roles/redfish_storage_volume/molecule/default/molecule.yml", + "name": "playbooks/ome/application/ome_application_network_settings.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", + "chksum_sha256": "d61531249118fb36496a87f9bfc892ae34483d6997ff5cb09155f0269a7ae329", "format": 1 }, { - "name": "roles/redfish_storage_volume/molecule/default/converge.yml", + "name": "playbooks/ome/application/ome_application_network_address_with_job_tracking.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "171f69d2607d6cf5d8088b2e7a9231406cbf90c2bf74d40e8997aced0f0f08ce", + "chksum_sha256": "3375ed92eb8f5143b01108debff662d6f83c98483fd340328315618aa4e801fd", "format": 1 }, { - "name": "roles/redfish_storage_volume/molecule/initialization", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "playbooks/ome/application/ome_application_network_time_zone_info.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "b66d01170f512a566b92b06b43aae3faa1755f0e453d3ef0110521b68e995889", "format": 1 }, { - "name": "roles/redfish_storage_volume/molecule/initialization/molecule.yml", + "name": "playbooks/ome/application/ome_application_network_webserver_port_changed_tracking.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", + "chksum_sha256": "d060d4922337f1b9357e6196bc5dc2dae238f126c76481d65d46e00b3b1d3d79", "format": 1 }, { - "name": "roles/redfish_storage_volume/molecule/initialization/converge.yml", + "name": "playbooks/ome/application/ome_application_network_webserver.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "d2204316b3f71e879600ede864aaa0e5b53ac0b5cc5422b4766a6e789a0d9dfd", + "chksum_sha256": "2e2e19608508da9365570746e726a36e5a5403e16f0563c2de3e6d775b411216", "format": 1 }, { - "name": "roles/redfish_storage_volume/molecule/__create_virtual_drive.yml", + "name": "playbooks/ome/application/ome_application_security_settings.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "5ff523743f2c992be084d96d3e0bebf811c50fd09bad3e9b3bdf346c093a3914", + "chksum_sha256": "e423185bb24ce6d7641db2cec93e76029728c4631a0b84c307da0a375a247526", "format": 1 }, { - "name": "roles/redfish_storage_volume/molecule/__job_track.yml", + "name": "playbooks/ome/application/ome_application_alerts_syslog.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "4ac8080105eab85b5b077ac94669ff8fc03600675b5d86258ee27ca26e6ceebd", + "chksum_sha256": "56af4d077ccfe2b4bdb46de7587fbfb03609ff7484108df4840b69d4118d0c2c", "format": 1 }, { - "name": "roles/redfish_storage_volume/tasks", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "playbooks/ome/ome_chassis_slots.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "fb87fe3c86cd4506226de40728064dcba9b759220b566342da9c2f0b2e40331e", "format": 1 }, { - "name": "roles/redfish_storage_volume/tasks/main.yml", + "name": "playbooks/ome/ome_smart_fabric.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "d504045131a1a6e693af5e3be831c677039d54c70765cb14bb5ab1de3d8eb054", + "chksum_sha256": "03c70e63d7713fe24c11cfb6400669fbe422459b3695ccb6214f5ae5656e4f30", "format": 1 }, { - "name": "roles/redfish_storage_volume/tests", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "playbooks/ome/ome_device_local_access_configuration.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "cb3e4d71a9422a25d8bbe4cf2ca376df39d5a5f922de2cfb9facc8f5721c5a88", "format": 1 }, { - "name": "roles/redfish_storage_volume/tests/inventory", + "name": "playbooks/ome/ome_template_identity_pool.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e02233819b1a09844410549191813f7cc7ba360f21298578f4ba1727a27d87fc", + "chksum_sha256": "97ec21aeab7e209f22107f692b67ed54bc80e0d0205561d2a2b73d1f494e0fba", "format": 1 }, { - "name": "roles/redfish_storage_volume/tests/test.yml", + "name": "playbooks/ome/ome_domain_user_groups.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "c4aa87d44c3b522744c37ca811b31c1648dfde1bf2e75a231499f5d8210396fd", + "chksum_sha256": "1ec28a9e158a70907e3da5f2a56894028e75daad9e3393666ceb54d5baa96b37", "format": 1 }, { - "name": "roles/redfish_storage_volume/vars", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "playbooks/ome/ome_group_device_action.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "e28a69eee5cc5383903d9c96e9c6b12a76cf76a8a92d7c9dae9457456bb774a4", "format": 1 }, { - "name": "roles/redfish_storage_volume/vars/main.yml", + "name": "playbooks/ome/ome_device_network_services.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "5d396acd98a3478d4a32965b818a75ebfddf7cc5725e8a0fac6093830ef34ad9", + "chksum_sha256": "2fbe1308921f98e05468b4e40687fb1954e365d4c140d73bce5ae550874d95cd", "format": 1 }, { - "name": "roles/idrac_user", + "name": "playbooks/ome/powerstate", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_user/README.md", + "name": "playbooks/ome/powerstate/ome_powerstate.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "369f4ae5faa868c85788d6df11bf9446ae9fb5ed5d3c9f2808ed9e84cbc06c1a", + "chksum_sha256": "ecddfa8e0d0c89d732131128cdb5b5eb2796f2bafc908751866dac67d8896c66", "format": 1 }, { - "name": "roles/idrac_user/defaults", + "name": "playbooks/ome/powerstate/ome_powerstate_with_job_tracking.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "5e7ef89910b84426e2251e5e8900139b87e539f5edc8c2866664dc41be18a3ec", + "format": 1 + }, + { + "name": "playbooks/ome/template", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_user/defaults/main.yml", + "name": "playbooks/ome/template/ome_template_info_with_filter.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "6ab3a9e6149fca242c0436f5630a97a2063f6232f42a9df4482b3977471d0be3", + "chksum_sha256": "9b38315b410882eb04f6a19bb0676ae5ddb146831b571572f5d15ff70d430fe2", "format": 1 }, { - "name": "roles/idrac_user/handlers", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "playbooks/ome/template/ome_template_network_vlan_info.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "bf7ebd240aced312384fd6700dcee5f4572c189b18878dd3f2ad1a600a41241c", "format": 1 }, { - "name": "roles/idrac_user/handlers/main.yml", + "name": "playbooks/ome/template/ome_template_info.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "00a6e4df8f9fe8c7b2be5ed666c8a779836b8bdd3a57736d81729e080d52d27b", + "chksum_sha256": "7606d5cfee0c932ccc67a090a8a58df3fb85d370de5a727df937d84b871f93e3", "format": 1 }, { - "name": "roles/idrac_user/meta", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "playbooks/ome/template/ome_template_with_job_tracking.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "28cb65035fb452f9d1b688b11f2a9152f010e6502cdf980fdb1fa674da1c613a", "format": 1 }, { - "name": "roles/idrac_user/meta/argument_specs.yml", + "name": "playbooks/ome/template/ome_template_lcd_display_string_deploy.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "be066c11750b38f72617e0d31f8c107f945bb65448118a94bdb923a80babb2c0", + "chksum_sha256": "4c802f28d538ce55438af15f296e755c1a5f08872f5d55b582e0eb776446975f", "format": 1 }, { - "name": "roles/idrac_user/meta/main.yml", + "name": "playbooks/ome/template/ome_template.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "36cbc64418daec070e7d63dcecf4ec4e7be341ef8a7661b9c5487e8903a48c2c", + "chksum_sha256": "3c90c9b41ff444b1bf174211b0ce260bd7bdd80c7a1a012c51314d03ade5400f", "format": 1 }, { - "name": "roles/idrac_user/molecule", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "playbooks/ome/template/ome_template_create_modify_lcd_display.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "5abdf1b033e3f22ba9c5d532fccb5e960bd9f04c6fffa4fbae799207e754a877", "format": 1 }, { - "name": "roles/idrac_user/molecule/TC-152120", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "playbooks/ome/template/ome_template_network_vlan.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "d72b4eadc6cdf60f554394e325a86d8ffee38bb3e38ae3f38b0945e25864770d", "format": 1 }, { - "name": "roles/idrac_user/molecule/TC-152120/converge.yml", + "name": "playbooks/ome/ome_network_vlan_info.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "600419dfff67b4f0e13aceef503059c3573db9322dc487db74440b6489e93177", + "chksum_sha256": "de7ce01fbf0f07f87edbbd56adbc85904b327ab25c3568904a85df7c1635c77c", "format": 1 }, { - "name": "roles/idrac_user/molecule/TC-152120/molecule.yml", + "name": "playbooks/ome/ome_network_port_breakout.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "58ffd7e1cf3dfebbc59c5e0ee4062434ecf4f0c76969a060fc207ea06905e906", + "chksum_sha256": "39bd40122da135d913272454af6d830ba40307d59e66e487aa709a9d1272afec", "format": 1 }, { - "name": "roles/idrac_user/molecule/TC-152146", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "playbooks/ome/ome_identity_pool.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "371d65813bfc3a77962caccfc53aa30ab4767402de617f35d2db5734803b29e2", "format": 1 }, { - "name": "roles/idrac_user/molecule/TC-152146/converge.yml", + "name": "playbooks/ome/ome_device_quick_deploy.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "c4fbf2ba3ab40583ae88f9b5b63744498b858acb41a33bb75a882f0974b47b3d", + "chksum_sha256": "acb2a7a5c7e73052bced88fbe4ba9dcffab7505be19212d9a11bd7aed261a5e8", "format": 1 }, { - "name": "roles/idrac_user/molecule/TC-152146/molecule.yml", + "name": "playbooks/ome/ome_server_interface_profile_info.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "58ffd7e1cf3dfebbc59c5e0ee4062434ecf4f0c76969a060fc207ea06905e906", + "chksum_sha256": "af58749f1aa4451723ccb7fde4f31313eea771ce6818b56df7b4d3450b432509", "format": 1 }, { - "name": "roles/idrac_user/molecule/TC-152147", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "playbooks/ome/ome_device_power_settings.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "18029724ae0804c84143000e04c892cb042fdca99d8cb70eebe301bb964eb9ca", "format": 1 }, { - "name": "roles/idrac_user/molecule/TC-152147/converge.yml", + "name": "playbooks/ome/ome_active_directory.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "1096107ae7f0281cbc4f43477562d8c9709ceb968ee5058b5880afb035cfac59", + "chksum_sha256": "dd4d2026942aca6b2fad68425dbb9c6795ba3017fbffe2dd1fd14e9c72ee0d81", "format": 1 }, { - "name": "roles/idrac_user/molecule/TC-152147/molecule.yml", + "name": "playbooks/ome/ome_network_vlan.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "13fc1cf138058346df47e0863e038de0d6a3fe59cf9ce35d2af2d872f237444c", + "chksum_sha256": "5fc6914c37f5a6b280047c45bc51dde5156fc7f17fcf6ea7b31b4fb52902e867", "format": 1 }, { - "name": "roles/idrac_user/molecule/TC-152148", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "playbooks/ome/ome_devices.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "c1331fd531251cd1d82f77bbff149fccae42ed7ad035cb01f3b61afbd76cb508", "format": 1 }, { - "name": "roles/idrac_user/molecule/TC-152148/converge.yml", + "name": "playbooks/ome/ome_smart_fabric_uplink.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "38da55bda10bc1de8eb098d795abe2588f27159b217e6c3157c5396273916e02", + "chksum_sha256": "e9980c7e8d795f73469a974aa6a19c09f998081fe4c40163f9525b5db5596216", "format": 1 }, { - "name": "roles/idrac_user/molecule/TC-152148/molecule.yml", + "name": "playbooks/ome/ome_server_interface_profile_workflow.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "58ffd7e1cf3dfebbc59c5e0ee4062434ecf4f0c76969a060fc207ea06905e906", + "chksum_sha256": "88b5f582aba465eac8f1ab17c7e40865721921bb7864af0d07f83511879928af", "format": 1 }, { - "name": "roles/idrac_user/molecule/TC-152148/prepare.yml", + "name": "playbooks/ome/ome_server_interface_profiles.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "06c0f8c4fb2670cc81d9f1cfbd7d0664c88249ec23d5d0c35bc4177da0fd296c", + "chksum_sha256": "d0e8826dc3911a89aa5733c42495dd1fa40690d391c65c5c4c48bea10716a56f", "format": 1 }, { - "name": "roles/idrac_user/molecule/TC-152149", + "name": "playbooks/ome/compliance", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_user/molecule/TC-152149/converge.yml", + "name": "playbooks/ome/compliance/ome_configuration_compliance_baseline.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "20d79a5f4a9dafe606d8b6cde2accf782af12b9f1781f5df0682b93fcdf16ddf", + "chksum_sha256": "fc3a2176d0d655f312c52f97bfbbbefe8fc5dd45e88b32301aaa56388a52076d", "format": 1 }, { - "name": "roles/idrac_user/molecule/TC-152149/molecule.yml", + "name": "playbooks/ome/compliance/ome_configuration_compliance_info.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "58ffd7e1cf3dfebbc59c5e0ee4062434ecf4f0c76969a060fc207ea06905e906", + "chksum_sha256": "e248d9baf3d9a443dd968b7dea92c70aba87d542b52a34d692daf7c3f595587e", "format": 1 }, { - "name": "roles/idrac_user/molecule/TC-152149/prepare.yml", + "name": "playbooks/ome/compliance/ome_configuration_compliance_baseline_workflow.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "6018b3098204f927d9412e33103fb6cc93847ba09cd25a01df104efe45037753", + "chksum_sha256": "bc42c37b1f2c9492b5b297c8245fc6836f4ae89dcdfebeaf958bce0847df6f73", "format": 1 }, { - "name": "roles/idrac_user/molecule/TC-152150", + "name": "playbooks/ome/ome_diagnostics.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "b67e463419986332c846988c6c8ba7a877e12fb42b4e15ac9354f1fffac788eb", + "format": 1 + }, + { + "name": "playbooks/ome/ome_groups.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "c8af511d1623d2d4cf697b1e3480fede2228f9f0759bc73af8c88c72d20b6cd8", + "format": 1 + }, + { + "name": "playbooks/ome/inventory", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_user/molecule/TC-152150/converge.yml", + "name": "playbooks/ome/inventory/ome_inventory_by_groups.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "6220849df8cee2230b06defb296fc7569be79bff4e9f2e53dfc4c0ff4f108708", + "chksum_sha256": "72904dae71c2171978e02bef29d887e94c4f588177cffdac576c67df93ac3b97", "format": 1 }, { - "name": "roles/idrac_user/molecule/TC-152150/molecule.yml", + "name": "playbooks/ome/inventory/ome_inventory_all_groups.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "58ffd7e1cf3dfebbc59c5e0ee4062434ecf4f0c76969a060fc207ea06905e906", + "chksum_sha256": "ea301f8125ffc2fb7889cc791e0558f8f7e85b3516e3d6d6fcdd4b8d83557988", "format": 1 }, { - "name": "roles/idrac_user/molecule/TC-152150/prepare.yml", + "name": "playbooks/ome/inventory/ome_inventory_by_group_with_host_vars.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "f5f0a568105643945bdd6b58bf10914d1a66c46130e7ee8f4ffa7b70f0c387c7", + "chksum_sha256": "6864ace739760c7c3d8bbf3efe1f34c77fa57b7562817febf7f8d0926b7a2f4c", "format": 1 }, { - "name": "roles/idrac_user/molecule/default", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "playbooks/ome/inventory/ome_inventory_groups_with_host_and_group_vars.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "a36a617cbe7d9292a04383d2bf0a5716fc645f69c1c7959eca82ceda5d541ab9", "format": 1 }, { - "name": "roles/idrac_user/molecule/default/converge.yml", + "name": "playbooks/ome/ome_network_port_breakout_job_traking.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "6b58bbd18e562ced8fbaccd5a23d479b69b4bec8659d246d62de5c135b291dcc", + "chksum_sha256": "111f9977f82b1ca2241b5307535fe6833e70c115871c3e856e15c98f2f507eaa", "format": 1 }, { - "name": "roles/idrac_user/molecule/default/molecule.yml", + "name": "playbooks/ome/ome_smart_fabric_uplink_info.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "13fc1cf138058346df47e0863e038de0d6a3fe59cf9ce35d2af2d872f237444c", + "chksum_sha256": "9fda088244750b408b164dcf07d55bbbdf3168b0eb27627c4f938afd0a8658fb", "format": 1 }, { - "name": "roles/idrac_user/molecule/resources", + "name": "playbooks/ome/firmware", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_user/molecule/resources/idrac_user", + "name": "playbooks/ome/firmware/catalog", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_user/molecule/resources/idrac_user/cleanup.yml", + "name": "playbooks/ome/firmware/catalog/ome_firmware_catalog.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "291fe02f4f127b148c6bc9a2325d06c7e6497f4c853152a7fc42f3c5ccf479e5", + "chksum_sha256": "d6919243b6c8339e13e6fba8d3b97d0205734da51d8b7858bbb450ebe017af45", "format": 1 }, { - "name": "roles/idrac_user/molecule/resources/idrac_user/get_user_info.yml", + "name": "playbooks/ome/firmware/ome_firmware.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "6e080f7169503086fc1e8fc4e4fa95e56a0dd39403fe183f086ad9770ded41e2", + "chksum_sha256": "7d25058ce25ee9d8ebc654d51279c54cd41fba51abe357c0221d3f41606180a0", "format": 1 }, { - "name": "roles/idrac_user/tasks", + "name": "playbooks/ome/firmware/baseline", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_user/tasks/absent.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "6fcebf5c4162fe906c18e2babb948835808726952abe198cc14caaaee1454546", - "format": 1 - }, - { - "name": "roles/idrac_user/tasks/get_user.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "7250bb2b6723ad29148ec605badbcc828f6656088ceaa7f4ad02b46dc4aa25dc", - "format": 1 - }, - { - "name": "roles/idrac_user/tasks/main.yml", + "name": "playbooks/ome/firmware/baseline/ome_firmware_baseline_info.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "cdf0aed407cb791aaabd992919f0d1449b6199b9fe04fe1ccdee43c7e8a3ef67", + "chksum_sha256": "3b297907849be26643ed73ca919c987c17057759b307c99eaa2176c8502d8294", "format": 1 }, { - "name": "roles/idrac_user/tasks/present.yml", + "name": "playbooks/ome/firmware/baseline/ome_firmware_baseline_compliance_info_filters.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "31094d92ad1e121dfb3f27d6dc0e8fdf471ee01b2168ba2cfbd66078dd0054c0", + "chksum_sha256": "1ee87a539547297b73866e1d075f7c81fc3ad2147b443c6fbf3b2454367d6b47", "format": 1 }, { - "name": "roles/idrac_user/tests", + "name": "playbooks/ome/firmware/baseline/component_reports_filtering", "ftype": "dir", "chksum_type": null, "chksum_sha256": null, "format": 1 }, { - "name": "roles/idrac_user/tests/inventory", + "name": "playbooks/ome/firmware/baseline/component_reports_filtering/component_complaince_report_with_baseline.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e02233819b1a09844410549191813f7cc7ba360f21298578f4ba1727a27d87fc", + "chksum_sha256": "dbc8e4f4a6f5581fc0479f3fccef4984fb26ef93650a41fa0ff2efc04e741a09", "format": 1 }, { - "name": "roles/idrac_user/tests/test.yml", + "name": "playbooks/ome/firmware/baseline/component_reports_filtering/component_complaince_report_with_devices.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "594b1a865eae9e2fc2a8f2f9daf0872a5c4a6b697af7167eadfb52df1d5009be", + "chksum_sha256": "3d2d40aaca55f42d88a21c9556b08ddfb60ee692a2ff95c2674e33ecaed3a291", "format": 1 }, { - "name": "roles/idrac_user/vars", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "playbooks/ome/firmware/baseline/ome_firmware_baseline_compliance_info.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "1fec86960e36907b5574822b9a60531ad5812bc465a5473cc57ccd3054f076de", "format": 1 }, { - "name": "roles/idrac_user/vars/main.yml", + "name": "playbooks/ome/firmware/baseline/ome_firmware_baseline.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "71a5ee7c5ff8f63dcdb4c815fd75a8694be391c701903e8297b8e3eecf83d12d", + "chksum_sha256": "7b80747cd3904de0e8d86046cc233e411bc4083f44e2c6f6f8a875ade32dd4c6", "format": 1 }, { - "name": "tests", - "ftype": "dir", - "chksum_type": null, - "chksum_sha256": null, + "name": "playbooks/ome/firmware/ome_firmware_with_job_tracking.yml", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "0a466f3d8237f5442bd13e312ca31d2a6482d63f0f7ca22f38c826422a1ddbca", "format": 1 }, { - "name": "tests/.gitignore", + "name": "playbooks/ome/ome_job_info.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "67b0f799f12726b149fd9677334c10b059e231bf2fa7150d55e9b4d5fd242062", + "chksum_sha256": "7a159c605c87d21e18f581b789ec99a5ec0431f22d4cd223e20483708175b814", "format": 1 }, { - "name": "tests/README.md", + "name": "playbooks/ome/ome_smart_fabric_info.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "5e37abcd3cbb5e2200f5702471e8a808aa759c9bf012137d4391f605700af12b", + "chksum_sha256": "ecaca37de3625197151d6684472b54c9b3bc712bc9c47d055beb8a1ecdc401e0", "format": 1 }, { - "name": "tests/__init__.py", + "name": "requirements.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", + "chksum_sha256": "32d916481c121c551a11659f3e0ba3b2e38c580ef5dea95cd1047560f3df514b", "format": 1 }, { - "name": "tests/config.yml", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "5b21de52fbe6ce3aa2369ef41e5ee7fc7e2204d20d6232f2d29fe58886899f10", + "name": "tests", + "ftype": "dir", + "chksum_type": null, + "chksum_sha256": null, "format": 1 }, { @@ -8359,10 +8373,10 @@ "format": 1 }, { - "name": "tests/unit/__init__.py", + "name": "tests/unit/requirements.txt", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", + "chksum_sha256": "5ec603ab1d2b3071743853324fd0db34d886f78f1543c1fa700ad1c904a6fd25", "format": 1 }, { @@ -8373,13 +8387,6 @@ "format": 1 }, { - "name": "tests/unit/plugins/__init__.py", - "ftype": "file", - "chksum_type": "sha256", - "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", - "format": 1 - }, - { "name": "tests/unit/plugins/module_utils", "ftype": "dir", "chksum_type": null, @@ -8387,38 +8394,38 @@ "format": 1 }, { - "name": "tests/unit/plugins/module_utils/__init__.py", + "name": "tests/unit/plugins/module_utils/test_ome.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", + "chksum_sha256": "abdff09b79463b5bab943ab1eed8fe083290c62d5cd3f37e344cc72735687f6b", "format": 1 }, { - "name": "tests/unit/plugins/module_utils/test_idrac_redfish.py", + "name": "tests/unit/plugins/module_utils/test_session_utils.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "789188c5bb56dbf5925ed648e6024de2c575580961f9ea94b48817d7edb98901", + "chksum_sha256": "b8279ca95da6d91825fc327a48c0a90cef7e714c15d9cac0a98f75dd823191ec", "format": 1 }, { - "name": "tests/unit/plugins/module_utils/test_ome.py", + "name": "tests/unit/plugins/module_utils/test_redfish.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "abdff09b79463b5bab943ab1eed8fe083290c62d5cd3f37e344cc72735687f6b", + "chksum_sha256": "ea6f698bd5328030a3260bf0bdd354a268e67e3b1f2ad8a51a9eed59ad36218e", "format": 1 }, { - "name": "tests/unit/plugins/module_utils/test_redfish.py", + "name": "tests/unit/plugins/module_utils/test_idrac_redfish.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "ea6f698bd5328030a3260bf0bdd354a268e67e3b1f2ad8a51a9eed59ad36218e", + "chksum_sha256": "789188c5bb56dbf5925ed648e6024de2c575580961f9ea94b48817d7edb98901", "format": 1 }, { - "name": "tests/unit/plugins/module_utils/test_session_utils.py", + "name": "tests/unit/plugins/module_utils/__init__.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "b8279ca95da6d91825fc327a48c0a90cef7e714c15d9cac0a98f75dd823191ec", + "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { @@ -8429,339 +8436,346 @@ "format": 1 }, { - "name": "tests/unit/plugins/modules/__init__.py", + "name": "tests/unit/plugins/modules/test_ome_server_interface_profiles.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", + "chksum_sha256": "0f48cb24a32aabf756cb9576ba969840c1575574a63a44a705d8778776b342ff", "format": 1 }, { - "name": "tests/unit/plugins/modules/common.py", + "name": "tests/unit/plugins/modules/test_idrac_os_deployment.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "2f706a3caa873b5e81b6f4a3076628f2383e570cda58814a4e2d874e22989cc1", + "chksum_sha256": "4e13dd9169319f1f6b659c372203b2537d9702a0da6f52c1278b618f7eec9d2e", "format": 1 }, { - "name": "tests/unit/plugins/modules/conftest.py", + "name": "tests/unit/plugins/modules/test_idrac_system_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "1d50a8a54e1c284f2db79461ec1b50a7555f1b2dfd71aa1d99ffa1c0271c6977", + "chksum_sha256": "c2dd4206fb7a8fd1b9fd0075e62ec831f85d4678370a3cf39485df2bd27fd53e", "format": 1 }, { - "name": "tests/unit/plugins/modules/test_dellemc_configure_idrac_eventing.py", + "name": "tests/unit/plugins/modules/test_ome_user_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "51b5435f256be611f442d7e14924493b476e7e965150d8f001e2080255e1ca45", + "chksum_sha256": "d953dab52deacad582e4bf060b3c2e6d82d490b2e0f872f2cbec4c7eac95df81", "format": 1 }, { - "name": "tests/unit/plugins/modules/test_dellemc_configure_idrac_services.py", + "name": "tests/unit/plugins/modules/test_ome_application_certificate.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e8b05f177533512dc258068adbc93270d8fc076de433893f64457a782c37df7b", + "chksum_sha256": "2b221a80551c727c27c22e7bfebdf3968b4d5b322814e330fd3923c9558ad491", "format": 1 }, { - "name": "tests/unit/plugins/modules/test_dellemc_idrac_lc_attributes.py", + "name": "tests/unit/plugins/modules/test_idrac_timezone_ntp.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "3aa7c78efc385f8f23769186e578cfea349e4918a7039391b2dad85ad866e9c4", + "chksum_sha256": "8b4464785500ba413275080c10cbc08884ae3a1219ced7b374ae1d4f1125bb76", "format": 1 }, { - "name": "tests/unit/plugins/modules/test_dellemc_idrac_storage_volume.py", + "name": "tests/unit/plugins/modules/test_idrac_firmware.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "7172c977250e7d810c1b37c93ac2c9d9e27c778f350c5be3f323305a9ef82d8a", + "chksum_sha256": "ba3a0726790706f990aa56f1a75091fb47622d722d0fd58e6ac635d6e167ff54", "format": 1 }, { - "name": "tests/unit/plugins/modules/test_dellemc_system_lockdown_mode.py", + "name": "tests/unit/plugins/modules/test_idrac_user_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "9cc17795c8921e9b46e4b8f5ceeb4b48cedeb7f1c9d0f674841c49fb98096cc7", + "chksum_sha256": "04bf9afbb2aea8e129c1592329ff3701c13ed332487432674d7b86a989488334", "format": 1 }, { - "name": "tests/unit/plugins/modules/test_idrac_attributes.py", + "name": "tests/unit/plugins/modules/test_ome_firmware_baseline_compliance_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "443eea5340887b4af7d7a796e34d3ed99c07394a8fb9ac0af804757fb790f897", + "chksum_sha256": "e387e2956c280621c1d898b18785bcf281ed4f00c181aeb334697c492108d2bc", "format": 1 }, { - "name": "tests/unit/plugins/modules/test_idrac_bios.py", + "name": "tests/unit/plugins/modules/test_dellemc_configure_idrac_eventing.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "56961e8894b7997b6bafec9e21398a444cbafe2073f2263752a82d55f794a61d", + "chksum_sha256": "51b5435f256be611f442d7e14924493b476e7e965150d8f001e2080255e1ca45", "format": 1 }, { - "name": "tests/unit/plugins/modules/test_idrac_boot.py", + "name": "tests/unit/plugins/modules/test_ome_device_group.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "f4066f490341d728623ed7b407319e3b467f9960aeb6f4d82ce441cfdcb0dd6c", + "chksum_sha256": "fe679abfeb71c0791e644ac6d501639c229c1ea6c64ae06ce0058d0930079490", "format": 1 }, { - "name": "tests/unit/plugins/modules/test_idrac_certificates.py", + "name": "tests/unit/plugins/modules/test_dellemc_system_lockdown_mode.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "69ddcc325468f32296935a5aba441ebd2ad2983f9b898cd8475c3e49ac545831", + "chksum_sha256": "9cc17795c8921e9b46e4b8f5ceeb4b48cedeb7f1c9d0f674841c49fb98096cc7", "format": 1 }, { - "name": "tests/unit/plugins/modules/test_idrac_firmware.py", + "name": "tests/unit/plugins/modules/test_ome_device_network_services.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "ba3a0726790706f990aa56f1a75091fb47622d722d0fd58e6ac635d6e167ff54", + "chksum_sha256": "01b4ac372b95cbdea27248e39999953945a4a668be10194887f924668ee5808b", "format": 1 }, { - "name": "tests/unit/plugins/modules/test_idrac_firmware_info.py", + "name": "tests/unit/plugins/modules/test_ome_devices.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "5d60aee695e2ea2a27d566dff581483cf66c27cdcc1601fdd7fc3f325d2cefca", + "chksum_sha256": "2db61429200f99069795d059690c4fdac00d946bad828827b8f8d6a686ea3da8", "format": 1 }, { - "name": "tests/unit/plugins/modules/test_idrac_license.py", + "name": "tests/unit/plugins/modules/test_idrac_redfish_storage_controller.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "7efe5b4fdf172a307c837bdcd8cf55e5b911cd17feb5db80509207ff0d813923", + "chksum_sha256": "df154e600f856210e4847b458fff5d98def22d85724bae5e85ecb02f347fbe49", "format": 1 }, { - "name": "tests/unit/plugins/modules/test_idrac_lifecycle_controller_job_status_info.py", + "name": "tests/unit/plugins/modules/test_ome_active_directory.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "c18b501718e37c52efe369dcbd0779cc522d919107ed2828bb9b3396ecf1b49d", + "chksum_sha256": "3f031be7fd8a4448bd473d19b67b8c12ac1f5978b7a12fb5814b7604e3c71af0", "format": 1 }, { - "name": "tests/unit/plugins/modules/test_idrac_lifecycle_controller_jobs.py", + "name": "tests/unit/plugins/modules/test_ome_application_network_time.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "860c64f7be6696f28329e37411e69d02dd3c8ebb85f06dc41a7ef8bcfd231b97", + "chksum_sha256": "42985f90c0f14499d6455b3be358b826d90e443bed4aef6948dca564befe2366", "format": 1 }, { - "name": "tests/unit/plugins/modules/test_idrac_lifecycle_controller_logs.py", + "name": "tests/unit/plugins/modules/test_ome_application_alerts_smtp.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "be3d0c6ae7c2127c97172c75dbe50d2739d7a14f07eae6b6b1d566ddddb15dae", + "chksum_sha256": "a0f68b19dd63014f99f993b5049322aa10c962f37abc8b01f0c1edc056e14dc2", "format": 1 }, { - "name": "tests/unit/plugins/modules/test_idrac_lifecycle_controller_status_info.py", + "name": "tests/unit/plugins/modules/test_ome_job_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "45e4e9c2e94584738e18f1be859172e06bb9ff3b66b89d857529b77cfab01a57", + "chksum_sha256": "528679c836f439cfadd6dede9b9cb7790b32329e8ddb834dff7acee88827f529", "format": 1 }, { - "name": "tests/unit/plugins/modules/test_idrac_network.py", + "name": "tests/unit/plugins/modules/test_idrac_server_config_profile.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "bff1e11af44e955de3e2b3f93de22efe39676b27e587083531fa3ad55504ccee", + "chksum_sha256": "e014b78fdccacfb78721b7f2955cedeb4581e2dd12e75f38751ca3855e6bd9b1", "format": 1 }, { - "name": "tests/unit/plugins/modules/test_idrac_network_attributes.py", + "name": "tests/unit/plugins/modules/test_ome_groups.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "10c2a11793c47a4b49723d09f7e370875bc0bc3eb9e01ed5c02a2e06683752bb", + "chksum_sha256": "dafbbc8ff84e5d7195c1dfa0c4aac877cfc84524318fb9b93daee52ace901fa1", "format": 1 }, { - "name": "tests/unit/plugins/modules/test_idrac_os_deployment.py", + "name": "tests/unit/plugins/modules/test_idrac_network.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "4e13dd9169319f1f6b659c372203b2537d9702a0da6f52c1278b618f7eec9d2e", + "chksum_sha256": "bff1e11af44e955de3e2b3f93de22efe39676b27e587083531fa3ad55504ccee", "format": 1 }, { - "name": "tests/unit/plugins/modules/test_idrac_redfish_storage_controller.py", + "name": "tests/unit/plugins/modules/test_ome_firmware_baseline_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "df154e600f856210e4847b458fff5d98def22d85724bae5e85ecb02f347fbe49", + "chksum_sha256": "2b2b8d194c62941b6912236c9e0f6781c9c2940f9c19f81f56ee0b9350115642", "format": 1 }, { - "name": "tests/unit/plugins/modules/test_idrac_reset.py", + "name": "tests/unit/plugins/modules/test_redfish_storage_volume.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "0760350d332018dc32da2f005b39f7ae94983a2061df43084332ba6c78369eb6", + "chksum_sha256": "8673a7d654d7eebe6b54ace65b26922d3c23c8f35563cb27ebb8b15cd68899a2", "format": 1 }, { - "name": "tests/unit/plugins/modules/test_idrac_server_config_profile.py", + "name": "tests/unit/plugins/modules/test_ome_application_security_settings.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e014b78fdccacfb78721b7f2955cedeb4581e2dd12e75f38751ca3855e6bd9b1", + "chksum_sha256": "e7bf2f655672078476cc228eb5fb457beaebf1f955b34e5d624eb3ed1b0c346f", "format": 1 }, { - "name": "tests/unit/plugins/modules/test_idrac_syslog.py", + "name": "tests/unit/plugins/modules/test_ome_configuration_compliance_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "bf10fcb460fa9bc23a992d7bdfd5b2dfeb9b6ee83a918f257c5ae470c434f5d4", + "chksum_sha256": "2bac6fc0e5be8cd2c4841f6ee758233db54442c8eb00fb4ada5ee4a044160447", "format": 1 }, { - "name": "tests/unit/plugins/modules/test_idrac_system_info.py", + "name": "tests/unit/plugins/modules/test_dellemc_idrac_lc_attributes.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "c2dd4206fb7a8fd1b9fd0075e62ec831f85d4678370a3cf39485df2bd27fd53e", + "chksum_sha256": "3aa7c78efc385f8f23769186e578cfea349e4918a7039391b2dad85ad866e9c4", "format": 1 }, { - "name": "tests/unit/plugins/modules/test_idrac_timezone_ntp.py", + "name": "tests/unit/plugins/modules/test_ome_server_interface_profile_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8b4464785500ba413275080c10cbc08884ae3a1219ced7b374ae1d4f1125bb76", + "chksum_sha256": "33e27297dbf2ba70e8a54ac1dfaf6967cd25e3c5d0fa67992661561bddc3d13e", "format": 1 }, { - "name": "tests/unit/plugins/modules/test_idrac_user.py", + "name": "tests/unit/plugins/modules/test_ome_application_console_preferences.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "4284c52644fd69a018da7f858f8eae06c9d3f680517d748519820cda2780a5da", + "chksum_sha256": "23a93ab54d65b2e1d87c70f0ffedea617f124daad04b292a91d487d5cf8d25f8", "format": 1 }, { - "name": "tests/unit/plugins/modules/test_idrac_user_info.py", + "name": "tests/unit/plugins/modules/test_ome_smart_fabric_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "04bf9afbb2aea8e129c1592329ff3701c13ed332487432674d7b86a989488334", + "chksum_sha256": "f91e9b2df7be4c4127d990c3a63f0e2c02c201deb40fb9a3627b14cc9a05e9f1", "format": 1 }, { - "name": "tests/unit/plugins/modules/test_idrac_virtual_media.py", + "name": "tests/unit/plugins/modules/test_ome_template_network_vlan_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "c40d6af3e3701c4578b48ecdcd4d07848ae5399b0624295f636539ee862360f5", + "chksum_sha256": "53f47c4f82c035207a38e1c6989461f33f39faaf7e8949aba963dd37a1cedaeb", "format": 1 }, { - "name": "tests/unit/plugins/modules/test_ome_active_directory.py", + "name": "tests/unit/plugins/modules/test_ome_smart_fabric_uplink.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "3f031be7fd8a4448bd473d19b67b8c12ac1f5978b7a12fb5814b7604e3c71af0", + "chksum_sha256": "738841207e64e35da9d00cfc93fbf21efb040fbd0fbabb10ba4f08d469a2f98a", "format": 1 }, { - "name": "tests/unit/plugins/modules/test_ome_alert_policies.py", + "name": "tests/unit/plugins/modules/test_ome_template.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "bafaade223c90287303f473dfd824732bc557b3fd757522ea3be72e276f77881", + "chksum_sha256": "435c50720b4e475953395e40d1e728a5167da0efc799a2bd49d9dbc199b7c391", "format": 1 }, { - "name": "tests/unit/plugins/modules/test_ome_alert_policies_actions_info.py", + "name": "tests/unit/plugins/modules/test_dellemc_idrac_storage_volume.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "44a90dc50b1678910dc345a2b88d1692a63a00a0d575ecc7ce9f235c9f19949b", + "chksum_sha256": "7172c977250e7d810c1b37c93ac2c9d9e27c778f350c5be3f323305a9ef82d8a", "format": 1 }, { - "name": "tests/unit/plugins/modules/test_ome_alert_policies_category_info.py", + "name": "tests/unit/plugins/modules/test_ome_session.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "40124ea4b56fdc618ac554ed78b05746fa9f83e0e075cabddd639e193ace14ae", + "chksum_sha256": "510a5f61683a6a5ebf8d7cc52326a325fe18d7206dc175db65bd96d58cbee2fe", "format": 1 }, { - "name": "tests/unit/plugins/modules/test_ome_alert_policies_info.py", + "name": "tests/unit/plugins/modules/test_idrac_attributes.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "eef7bb09da512ee64a1528dc8e639db7bbef21aa2835e20e8cca8144c6dfc967", + "chksum_sha256": "443eea5340887b4af7d7a796e34d3ed99c07394a8fb9ac0af804757fb790f897", "format": 1 }, { - "name": "tests/unit/plugins/modules/test_ome_alert_policies_message_id_info.py", + "name": "tests/unit/plugins/modules/test_ome_smart_fabric.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "cac02856eaad4cb77781ab7c481660e7e4efa2bc72ef8530d68c62fa4e7012d7", + "chksum_sha256": "050f3d3f67a9f3da7dd18e92cb31548bc26ede439bfbf27d2413a6da02cc4c9d", "format": 1 }, { - "name": "tests/unit/plugins/modules/test_ome_application_alerts_smtp.py", + "name": "tests/unit/plugins/modules/test_idrac_diagnostics.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "a0f68b19dd63014f99f993b5049322aa10c962f37abc8b01f0c1edc056e14dc2", + "chksum_sha256": "fc3660e232516c0e1e625ddacefbb2b17b78969d065e76f99cd97aa944eda43d", "format": 1 }, { - "name": "tests/unit/plugins/modules/test_ome_application_alerts_syslog.py", + "name": "tests/unit/plugins/modules/test_idrac_firmware_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "1562c23b20553b15252713cd5443dd6f7ffcea445f0f0841885121af22385c06", + "chksum_sha256": "5d60aee695e2ea2a27d566dff581483cf66c27cdcc1601fdd7fc3f325d2cefca", "format": 1 }, { - "name": "tests/unit/plugins/modules/test_ome_application_certificate.py", + "name": "tests/unit/plugins/modules/test_ome_alert_policies.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "4cf9865aade153e9f8263120ed885fb3d56a07f810396649be3c8fe26d6e2e3a", + "chksum_sha256": "bafaade223c90287303f473dfd824732bc557b3fd757522ea3be72e276f77881", "format": 1 }, { - "name": "tests/unit/plugins/modules/test_ome_application_console_preferences.py", + "name": "tests/unit/plugins/modules/test_redfish_firmware_rollback.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "23a93ab54d65b2e1d87c70f0ffedea617f124daad04b292a91d487d5cf8d25f8", + "chksum_sha256": "b74f2f92f2785380b6a40972f3fe64936d8111ec990b61498d198b2bfccf6f68", "format": 1 }, { - "name": "tests/unit/plugins/modules/test_ome_application_network_address.py", + "name": "tests/unit/plugins/modules/test_ome_discovery.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "ba7257a64dfa1324277c9c8159f0a9e246162e2ef68c0a07b8dff4213c518bac", + "chksum_sha256": "d8d8270271f1f92ab4b4efe84f40de6e1c03fd6d434f75ccbed76699e3bd63f4", "format": 1 }, { - "name": "tests/unit/plugins/modules/test_ome_application_network_proxy.py", + "name": "tests/unit/plugins/modules/test_ome_alert_policies_message_id_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "523422cb1cdbc42857be9f768b501b95274c93fa4bf5b1ccba5514cc3501bd90", + "chksum_sha256": "cac02856eaad4cb77781ab7c481660e7e4efa2bc72ef8530d68c62fa4e7012d7", "format": 1 }, { - "name": "tests/unit/plugins/modules/test_ome_application_network_settings.py", + "name": "tests/unit/plugins/modules/test_dellemc_configure_idrac_services.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "b8ae4cb9602e2cf66fcbc81e803fcc423875deb008eeb3cfe9965ac44a5dfa1a", + "chksum_sha256": "e8b05f177533512dc258068adbc93270d8fc076de433893f64457a782c37df7b", "format": 1 }, { - "name": "tests/unit/plugins/modules/test_ome_application_network_time.py", + "name": "tests/unit/plugins/modules/test_idrac_reset.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "42985f90c0f14499d6455b3be358b826d90e443bed4aef6948dca564befe2366", + "chksum_sha256": "e0eda341160f4409f879446bcd4b8313a623f8c9d000438e3ec0c9d11729af62", "format": 1 }, { - "name": "tests/unit/plugins/modules/test_ome_application_network_webserver.py", + "name": "tests/unit/plugins/modules/test_ome_device_location.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "c5dc8fbbc99361e13eb3a4617f6e260c55044b69c53c552b7e0921580e608de6", + "chksum_sha256": "cbd189a7cd877069342d9d55a3abedde08cc7c8982aa3d1387f256baf69c5ade", "format": 1 }, { - "name": "tests/unit/plugins/modules/test_ome_application_security_settings.py", + "name": "tests/unit/plugins/modules/test_ome_profile_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e7bf2f655672078476cc228eb5fb457beaebf1f955b34e5d624eb3ed1b0c346f", + "chksum_sha256": "4aea850eca33936d709e5fc967578b5ccc077388f94cc2ae7541dfaf1342ef5d", "format": 1 }, { - "name": "tests/unit/plugins/modules/test_ome_chassis_slots.py", + "name": "tests/unit/plugins/modules/test_idrac_network_attributes.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e4668f13509305834df305adef43400dfb621032bc29580ad15b52bead4b3083", + "chksum_sha256": "10c2a11793c47a4b49723d09f7e370875bc0bc3eb9e01ed5c02a2e06683752bb", + "format": 1 + }, + { + "name": "tests/unit/plugins/modules/test_ome_identity_pool.py", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "df5bb7d2ab7b18151f47ee0cd2a4304de9e6d11517015148b0d58c405f0b868f", "format": 1 }, { @@ -8772,38 +8786,38 @@ "format": 1 }, { - "name": "tests/unit/plugins/modules/test_ome_configuration_compliance_info.py", + "name": "tests/unit/plugins/modules/test_ome_application_alerts_syslog.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "2bac6fc0e5be8cd2c4841f6ee758233db54442c8eb00fb4ada5ee4a044160447", + "chksum_sha256": "1562c23b20553b15252713cd5443dd6f7ffcea445f0f0841885121af22385c06", "format": 1 }, { - "name": "tests/unit/plugins/modules/test_ome_device_group.py", + "name": "tests/unit/plugins/modules/test_idrac_lifecycle_controller_status_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "fe679abfeb71c0791e644ac6d501639c229c1ea6c64ae06ce0058d0930079490", + "chksum_sha256": "45e4e9c2e94584738e18f1be859172e06bb9ff3b66b89d857529b77cfab01a57", "format": 1 }, { - "name": "tests/unit/plugins/modules/test_ome_device_info.py", + "name": "tests/unit/plugins/modules/test_idrac_syslog.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "f3427f3a4be484d1349156864ae1476badd4c88ad84a901ac5afd832df2fa724", + "chksum_sha256": "bf10fcb460fa9bc23a992d7bdfd5b2dfeb9b6ee83a918f257c5ae470c434f5d4", "format": 1 }, { - "name": "tests/unit/plugins/modules/test_ome_device_local_access_configuration.py", + "name": "tests/unit/plugins/modules/test_idrac_license.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "f83c9a95759be04419109a20d5a49512a7fab40c5d655aa3057d0a0e44bad861", + "chksum_sha256": "95bdde1ac82063491da54968ac56f56d9be5f7364f7c7b06635573e428814b16", "format": 1 }, { - "name": "tests/unit/plugins/modules/test_ome_device_location.py", + "name": "tests/unit/plugins/modules/test_ome_domain_user_groups.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "cbd189a7cd877069342d9d55a3abedde08cc7c8982aa3d1387f256baf69c5ade", + "chksum_sha256": "502d0f2033c22d39a971906066eb5e2533a915d5079d0ba4a42347a2da76eb22", "format": 1 }, { @@ -8814,339 +8828,346 @@ "format": 1 }, { - "name": "tests/unit/plugins/modules/test_ome_device_network_services.py", + "name": "tests/unit/plugins/modules/test_idrac_lifecycle_controller_jobs.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "01b4ac372b95cbdea27248e39999953945a4a668be10194887f924668ee5808b", + "chksum_sha256": "860c64f7be6696f28329e37411e69d02dd3c8ebb85f06dc41a7ef8bcfd231b97", "format": 1 }, { - "name": "tests/unit/plugins/modules/test_ome_device_power_settings.py", + "name": "tests/unit/plugins/modules/test_ome_alert_policies_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "5c305977b799fc5acacb5a13a1bb1b724b874c15c47a51402921b4b9edda6a4c", + "chksum_sha256": "eef7bb09da512ee64a1528dc8e639db7bbef21aa2835e20e8cca8144c6dfc967", "format": 1 }, { - "name": "tests/unit/plugins/modules/test_ome_device_quick_deploy.py", + "name": "tests/unit/plugins/modules/test_ome_alert_policies_category_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "9635a328e7d8b444de75b441e3fd8f15c7bbb407ea4b8f4ee7c970215596b695", + "chksum_sha256": "40124ea4b56fdc618ac554ed78b05746fa9f83e0e075cabddd639e193ace14ae", "format": 1 }, { - "name": "tests/unit/plugins/modules/test_ome_devices.py", + "name": "tests/unit/plugins/modules/test_idrac_lifecycle_controller_logs.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "2db61429200f99069795d059690c4fdac00d946bad828827b8f8d6a686ea3da8", + "chksum_sha256": "be3d0c6ae7c2127c97172c75dbe50d2739d7a14f07eae6b6b1d566ddddb15dae", "format": 1 }, { - "name": "tests/unit/plugins/modules/test_ome_diagnostics.py", + "name": "tests/unit/plugins/modules/test_ome_application_network_webserver.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "3fb5b4940be19ce98ef0a2d8290019b5f06093a5230a4f8e9b46eef8cc13a1bb", + "chksum_sha256": "c5dc8fbbc99361e13eb3a4617f6e260c55044b69c53c552b7e0921580e608de6", "format": 1 }, { - "name": "tests/unit/plugins/modules/test_ome_discovery.py", + "name": "tests/unit/plugins/modules/test_ome_firmware_catalog.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "d8d8270271f1f92ab4b4efe84f40de6e1c03fd6d434f75ccbed76699e3bd63f4", + "chksum_sha256": "3b16df578978033fd82dcd342f3e3286b807a480dc76723f5698dc1b5eb2b61d", "format": 1 }, { - "name": "tests/unit/plugins/modules/test_ome_domain_user_groups.py", + "name": "tests/unit/plugins/modules/test_idrac_virtual_media.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "502d0f2033c22d39a971906066eb5e2533a915d5079d0ba4a42347a2da76eb22", + "chksum_sha256": "c40d6af3e3701c4578b48ecdcd4d07848ae5399b0624295f636539ee862360f5", "format": 1 }, { - "name": "tests/unit/plugins/modules/test_ome_firmware.py", + "name": "tests/unit/plugins/modules/test_ome_chassis_slots.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "2a88df0a8140232d3e9aeeba3686515d430d1626d96b518d5f7fcb28eb8d61e1", + "chksum_sha256": "e4668f13509305834df305adef43400dfb621032bc29580ad15b52bead4b3083", "format": 1 }, { - "name": "tests/unit/plugins/modules/test_ome_firmware_baseline.py", + "name": "tests/unit/plugins/modules/test_ome_alert_policies_actions_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "10f367578ed301729cfa4190a45191545ed5796d902248f34590c4481fdcd5eb", + "chksum_sha256": "44a90dc50b1678910dc345a2b88d1692a63a00a0d575ecc7ce9f235c9f19949b", "format": 1 }, { - "name": "tests/unit/plugins/modules/test_ome_firmware_baseline_compliance_info.py", + "name": "tests/unit/plugins/modules/test_idrac_boot.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e387e2956c280621c1d898b18785bcf281ed4f00c181aeb334697c492108d2bc", + "chksum_sha256": "2246110a56d5cb49d91190e4e86ed3dcb43faa6c99c14fa5054fd64dda35bba8", "format": 1 }, { - "name": "tests/unit/plugins/modules/test_ome_firmware_baseline_info.py", + "name": "tests/unit/plugins/modules/test_ome_application_network_address.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "2b2b8d194c62941b6912236c9e0f6781c9c2940f9c19f81f56ee0b9350115642", + "chksum_sha256": "ba7257a64dfa1324277c9c8159f0a9e246162e2ef68c0a07b8dff4213c518bac", "format": 1 }, { - "name": "tests/unit/plugins/modules/test_ome_firmware_catalog.py", + "name": "tests/unit/plugins/modules/test_ome_application_network_proxy.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "3b16df578978033fd82dcd342f3e3286b807a480dc76723f5698dc1b5eb2b61d", + "chksum_sha256": "523422cb1cdbc42857be9f768b501b95274c93fa4bf5b1ccba5514cc3501bd90", "format": 1 }, { - "name": "tests/unit/plugins/modules/test_ome_groups.py", + "name": "tests/unit/plugins/modules/test_ome_device_quick_deploy.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "dafbbc8ff84e5d7195c1dfa0c4aac877cfc84524318fb9b93daee52ace901fa1", + "chksum_sha256": "9635a328e7d8b444de75b441e3fd8f15c7bbb407ea4b8f4ee7c970215596b695", "format": 1 }, { - "name": "tests/unit/plugins/modules/test_ome_identity_pool.py", + "name": "tests/unit/plugins/modules/test_redfish_event_subscription.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "df5bb7d2ab7b18151f47ee0cd2a4304de9e6d11517015148b0d58c405f0b868f", + "chksum_sha256": "8b63ef2ac94d46a42ad2ff543ac70afde793e5caf967bc940566fa6ee6c289a2", "format": 1 }, { - "name": "tests/unit/plugins/modules/test_ome_job_info.py", + "name": "tests/unit/plugins/modules/test_ome_firmware_baseline.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "528679c836f439cfadd6dede9b9cb7790b32329e8ddb834dff7acee88827f529", + "chksum_sha256": "10f367578ed301729cfa4190a45191545ed5796d902248f34590c4481fdcd5eb", "format": 1 }, { - "name": "tests/unit/plugins/modules/test_ome_network_port_breakout.py", + "name": "tests/unit/plugins/modules/test_idrac_certificates.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "98c509977de9377cc6fb865530149d1a58f3230edf111cea2da5fe0a8da6fc20", + "chksum_sha256": "f59d4a38f670810dfa34815fa07562da89e2f5833b7f52b15216a621b069a064", "format": 1 }, { - "name": "tests/unit/plugins/modules/test_ome_network_vlan.py", + "name": "tests/unit/plugins/modules/test_ome_firmware.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "d764453f483885c2265e3de93cd2750af9248d6c90e3e27a82b8e67b2a03a2cf", + "chksum_sha256": "2a88df0a8140232d3e9aeeba3686515d430d1626d96b518d5f7fcb28eb8d61e1", "format": 1 }, { - "name": "tests/unit/plugins/modules/test_ome_network_vlan_info.py", + "name": "tests/unit/plugins/modules/test_idrac_lifecycle_controller_job_status_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "e2b407402c38936eff8f9f2e20e33ca7e356f664c51d8aa6984d27dd84302f5a", + "chksum_sha256": "c18b501718e37c52efe369dcbd0779cc522d919107ed2828bb9b3396ecf1b49d", "format": 1 }, { - "name": "tests/unit/plugins/modules/test_ome_powerstate.py", + "name": "tests/unit/plugins/modules/test_idrac_session.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "3b5979e60e2a0d99df0b1a598cb28763134e0e19bbae5ebbf2b48762d4a3f860", + "chksum_sha256": "34236d7174336a6e3105105579812e20cb1128fe96aec567e30814df86af4ac3", "format": 1 }, { - "name": "tests/unit/plugins/modules/test_ome_profile.py", + "name": "tests/unit/plugins/modules/test_ome_device_local_access_configuration.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "1ef49f3f85e0a585ae05ee9fb61322533d1863cd8853a477bb26d3f81874c7b5", + "chksum_sha256": "f83c9a95759be04419109a20d5a49512a7fab40c5d655aa3057d0a0e44bad861", "format": 1 }, { - "name": "tests/unit/plugins/modules/test_ome_profile_info.py", + "name": "tests/unit/plugins/modules/common.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "4aea850eca33936d709e5fc967578b5ccc077388f94cc2ae7541dfaf1342ef5d", + "chksum_sha256": "2f706a3caa873b5e81b6f4a3076628f2383e570cda58814a4e2d874e22989cc1", "format": 1 }, { - "name": "tests/unit/plugins/modules/test_ome_server_interface_profile_info.py", + "name": "tests/unit/plugins/modules/test_ome_network_vlan.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "33e27297dbf2ba70e8a54ac1dfaf6967cd25e3c5d0fa67992661561bddc3d13e", + "chksum_sha256": "d764453f483885c2265e3de93cd2750af9248d6c90e3e27a82b8e67b2a03a2cf", "format": 1 }, { - "name": "tests/unit/plugins/modules/test_ome_server_interface_profiles.py", + "name": "tests/unit/plugins/modules/test_idrac_storage_volume.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "0f48cb24a32aabf756cb9576ba969840c1575574a63a44a705d8778776b342ff", + "chksum_sha256": "6dc99be4366d1e9d363f5af96a2dbc2110ba8389029399b063814f6ff341fc6a", "format": 1 }, { - "name": "tests/unit/plugins/modules/test_ome_smart_fabric.py", + "name": "tests/unit/plugins/modules/test_idrac_bios.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "050f3d3f67a9f3da7dd18e92cb31548bc26ede439bfbf27d2413a6da02cc4c9d", + "chksum_sha256": "56961e8894b7997b6bafec9e21398a444cbafe2073f2263752a82d55f794a61d", "format": 1 }, { - "name": "tests/unit/plugins/modules/test_ome_smart_fabric_info.py", + "name": "tests/unit/plugins/modules/test_ome_template_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "f91e9b2df7be4c4127d990c3a63f0e2c02c201deb40fb9a3627b14cc9a05e9f1", + "chksum_sha256": "35eb0483714d6a253d32010fdcd4421c5006dd565bd4c4f5bad984ad25f7b941", "format": 1 }, { - "name": "tests/unit/plugins/modules/test_ome_smart_fabric_uplink.py", + "name": "tests/unit/plugins/modules/test_ome_device_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "738841207e64e35da9d00cfc93fbf21efb040fbd0fbabb10ba4f08d469a2f98a", + "chksum_sha256": "f3427f3a4be484d1349156864ae1476badd4c88ad84a901ac5afd832df2fa724", "format": 1 }, { - "name": "tests/unit/plugins/modules/test_ome_smart_fabric_uplink_info.py", + "name": "tests/unit/plugins/modules/test_redfish_powerstate.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "be29eacdaab10d28070c5c410b3de63e6427c76dbed8f9690837847a31124cd8", + "chksum_sha256": "711d5df101c83c29218d70c8952a3cf185658e3de1ac4f9a737e9ba082d9bdf4", "format": 1 }, { - "name": "tests/unit/plugins/modules/test_ome_template.py", + "name": "tests/unit/plugins/modules/test_ome_template_identity_pool.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "435c50720b4e475953395e40d1e728a5167da0efc799a2bd49d9dbc199b7c391", + "chksum_sha256": "650fc4c361e3a0d79f6a794ad3e43efac1a102a9b49ea75a1d3ae9dbd2b3cb3b", "format": 1 }, { - "name": "tests/unit/plugins/modules/test_ome_template_identity_pool.py", + "name": "tests/unit/plugins/modules/test_ome_device_power_settings.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "650fc4c361e3a0d79f6a794ad3e43efac1a102a9b49ea75a1d3ae9dbd2b3cb3b", + "chksum_sha256": "5c305977b799fc5acacb5a13a1bb1b724b874c15c47a51402921b4b9edda6a4c", "format": 1 }, { - "name": "tests/unit/plugins/modules/test_ome_template_info.py", + "name": "tests/unit/plugins/modules/test_ome_user.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "35eb0483714d6a253d32010fdcd4421c5006dd565bd4c4f5bad984ad25f7b941", + "chksum_sha256": "72117dcb003f648d2b2e0d58612903eb64e2dc1c120eaef5f3571331a79e0f3f", "format": 1 }, { - "name": "tests/unit/plugins/modules/test_ome_template_network_vlan.py", + "name": "tests/unit/plugins/modules/test_ome_profile.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "23b09e9db14b8c7c758d72b118178c18c96418478b5e276a35d69ae06d4d2553", + "chksum_sha256": "1ef49f3f85e0a585ae05ee9fb61322533d1863cd8853a477bb26d3f81874c7b5", "format": 1 }, { - "name": "tests/unit/plugins/modules/test_ome_template_network_vlan_info.py", + "name": "tests/unit/plugins/modules/test_redfish_firmware.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "53f47c4f82c035207a38e1c6989461f33f39faaf7e8949aba963dd37a1cedaeb", + "chksum_sha256": "2661f131bdea868cfe15bf380f4bd2e465c15c95533f12f82f680d6fa6d67691", "format": 1 }, { - "name": "tests/unit/plugins/modules/test_ome_user.py", + "name": "tests/unit/plugins/modules/test_ome_diagnostics.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "72117dcb003f648d2b2e0d58612903eb64e2dc1c120eaef5f3571331a79e0f3f", + "chksum_sha256": "3fb5b4940be19ce98ef0a2d8290019b5f06093a5230a4f8e9b46eef8cc13a1bb", "format": 1 }, { - "name": "tests/unit/plugins/modules/test_ome_user_info.py", + "name": "tests/unit/plugins/modules/test_ome_powerstate.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "d953dab52deacad582e4bf060b3c2e6d82d490b2e0f872f2cbec4c7eac95df81", + "chksum_sha256": "3b5979e60e2a0d99df0b1a598cb28763134e0e19bbae5ebbf2b48762d4a3f860", "format": 1 }, { - "name": "tests/unit/plugins/modules/test_redfish_event_subscription.py", + "name": "tests/unit/plugins/modules/test_ome_network_vlan_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8b63ef2ac94d46a42ad2ff543ac70afde793e5caf967bc940566fa6ee6c289a2", + "chksum_sha256": "e2b407402c38936eff8f9f2e20e33ca7e356f664c51d8aa6984d27dd84302f5a", "format": 1 }, { - "name": "tests/unit/plugins/modules/test_redfish_firmware.py", + "name": "tests/unit/plugins/modules/test_idrac_user.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "2661f131bdea868cfe15bf380f4bd2e465c15c95533f12f82f680d6fa6d67691", + "chksum_sha256": "4284c52644fd69a018da7f858f8eae06c9d3f680517d748519820cda2780a5da", "format": 1 }, { - "name": "tests/unit/plugins/modules/test_redfish_firmware_rollback.py", + "name": "tests/unit/plugins/modules/__init__.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "b74f2f92f2785380b6a40972f3fe64936d8111ec990b61498d198b2bfccf6f68", + "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "tests/unit/plugins/modules/test_redfish_powerstate.py", + "name": "tests/unit/plugins/modules/test_ome_smart_fabric_uplink_info.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "711d5df101c83c29218d70c8952a3cf185658e3de1ac4f9a737e9ba082d9bdf4", + "chksum_sha256": "be29eacdaab10d28070c5c410b3de63e6427c76dbed8f9690837847a31124cd8", "format": 1 }, { - "name": "tests/unit/plugins/modules/utils.py", + "name": "tests/unit/plugins/modules/test_ome_template_network_vlan.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "6dd69e26e1abab9e11a3c0d8e6212b37d8619036e394b351ccc99e480976da28", + "chksum_sha256": "23b09e9db14b8c7c758d72b118178c18c96418478b5e276a35d69ae06d4d2553", "format": 1 }, { - "name": "tests/unit/plugins/modules/test_idrac_diagnostics.py", + "name": "tests/unit/plugins/modules/test_ome_application_network_settings.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8dc7291aa625412b4b452c5e7931cb7a62e1f41e2f32fa84679242398fcd5d50", + "chksum_sha256": "b8ae4cb9602e2cf66fcbc81e803fcc423875deb008eeb3cfe9965ac44a5dfa1a", "format": 1 }, { - "name": "tests/unit/plugins/modules/test_idrac_storage_volume.py", + "name": "tests/unit/plugins/modules/test_ome_network_port_breakout.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "bd47447b5e83792a73cab14880da8ba3dc5300f1d3e5b2e46f199d5de323826b", + "chksum_sha256": "98c509977de9377cc6fb865530149d1a58f3230edf111cea2da5fe0a8da6fc20", "format": 1 }, { - "name": "tests/unit/plugins/modules/test_redfish_storage_volume.py", + "name": "tests/unit/plugins/modules/conftest.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "8673a7d654d7eebe6b54ace65b26922d3c23c8f35563cb27ebb8b15cd68899a2", + "chksum_sha256": "1d50a8a54e1c284f2db79461ec1b50a7555f1b2dfd71aa1d99ffa1c0271c6977", "format": 1 }, { - "name": "tests/unit/plugins/modules/test_idrac_session.py", + "name": "tests/unit/plugins/modules/utils.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "b2417f4e5552f889987522e92e20aa0d2bf0d042022d157b71745df9549e4a16", + "chksum_sha256": "6dd69e26e1abab9e11a3c0d8e6212b37d8619036e394b351ccc99e480976da28", "format": 1 }, { - "name": "tests/unit/requirements.txt", + "name": "tests/unit/plugins/__init__.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "5ec603ab1d2b3071743853324fd0db34d886f78f1543c1fa700ad1c904a6fd25", + "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": ".ansible-lint-ignore", + "name": "tests/unit/__init__.py", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "9259c9753c32d36dfca9f4c9858b16b12e03ab2cd5eeece7f53ee9ad7bb2b2aa", + "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 }, { - "name": "requirements.txt", + "name": "tests/.gitignore", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "6f0f045a08a6f73f1903309c1636aefca64bad5073cf5e1b3d092f0f4fc1806b", + "chksum_sha256": "67b0f799f12726b149fd9677334c10b059e231bf2fa7150d55e9b4d5fd242062", "format": 1 }, { - "name": "CHANGELOG.rst", + "name": "tests/README.md", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "c9d74f37191657712d94c31aa6fdddebc11c869e8c6c77817fd005b71bce07dd", + "chksum_sha256": "0f8f02e27b21fcc1c8ef2a5d315a0f671b31cebb4dd515701db329db5c76fc2e", "format": 1 }, { - "name": "README.md", + "name": "tests/config.yml", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "b4a32d700abcd8da5d5122d404d99655a440ea072d77a6c84b5cc02382f4887b", + "chksum_sha256": "5b21de52fbe6ce3aa2369ef41e5ee7fc7e2204d20d6232f2d29fe58886899f10", + "format": 1 + }, + { + "name": "tests/__init__.py", + "ftype": "file", + "chksum_type": "sha256", + "chksum_sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", "format": 1 } ], diff --git a/ansible_collections/dellemc/openmanage/MANIFEST.json b/ansible_collections/dellemc/openmanage/MANIFEST.json index f1bda6107..ef0fd32ef 100644 --- a/ansible_collections/dellemc/openmanage/MANIFEST.json +++ b/ansible_collections/dellemc/openmanage/MANIFEST.json @@ -2,7 +2,7 @@ "collection_info": { "namespace": "dellemc", "name": "openmanage", - "version": "9.2.0", + "version": "9.3.0", "authors": [ "Jagadeesh N V <Jagadeesh.N.V@Dell.com>", "Felix Stephen <Felix.S@Dell.com>", @@ -46,7 +46,7 @@ "name": "FILES.json", "ftype": "file", "chksum_type": "sha256", - "chksum_sha256": "3c38b92a827649678ff0be97765d225e8df0902c89362e974b355d0a24549830", + "chksum_sha256": "361945caf4fa9f87213384a2b146bdabe0cdc1eb05f1c50843dd8f62f4911265", "format": 1 }, "format": 1 diff --git a/ansible_collections/dellemc/openmanage/README.md b/ansible_collections/dellemc/openmanage/README.md index 5223d3612..817c2db90 100644 --- a/ansible_collections/dellemc/openmanage/README.md +++ b/ansible_collections/dellemc/openmanage/README.md @@ -27,31 +27,73 @@ OpenManage Ansible Modules simplifies and automates provisioning, deployment, an ## Supported Platforms * iDRAC8 based Dell PowerEdge Servers with firmware versions 2.85.85.85 and above. * iDRAC9 based Dell PowerEdge Servers with firmware versions 6.10.80.00 and above. - * Dell OpenManage Enterprise versions 4.0.0 and 4.0.1. + * Dell OpenManage Enterprise versions 3.10 and 4.1. * Dell OpenManage Enterprise Modular versions 2.10.10 and above. -## Prerequisites - * [Ansible Core >= 2.16.4 and 2.15.9](https://github.com/ansible/ansible) +## Requirements + * [Ansible Core >= 2.16.6 and 2.15.11](https://github.com/ansible/ansible) * Python >= 3.9.6 * To run the iDRAC modules, install OpenManage Python Software Development Kit (OMSDK) using either ```pip install omsdk --upgrade``` or ```pip install -r requirements.txt```. OMSDK can also be installed from [Dell OpenManage Python SDK](https://github.com/dell/omsdk) * Operating System - * Red Hat Enterprise Linux (RHEL) 9.3 and 8.9 + * Red Hat Enterprise Linux (RHEL) 9.4 and 8.9 * SUSE Linux Enterprise Server (SLES) 15 SP5 and 15 SP4 - * Ubuntu 22.04.4 and 22.04.3 + * Ubuntu 24.04 and 22.04.4 ## Installation -* From [galaxy](https://galaxy.ansible.com/dellemc/openmanage): -```ansible-galaxy collection install dellemc.openmanage``` +* From [Galaxy](https://galaxy.ansible.com/dellemc/openmanage) or [Automation Hub](https://console.redhat.com/ansible/automation-hub/repo/published/dellemc/openmanage): +Install the latest Ansible collection from the Ansible Galaxy or Automation hub + ``` + ansible-galaxy collection install dellemc.openmanage + ``` - - For offline installation on the Ansible control machine, download the required tar archive version of the collection from [Dell OpenManage collection](https://galaxy.ansible.com/dellemc/openmanage) and run the command given below: - ```ansible-galaxy collection install dellemc-openmanage-<version>.tar.gz``` +* From [GitHub](https://github.com/dell/dellemc-openmanage-ansible-modules/tree/collections): +Install the Ansible collection from the GitHub repository using the latest commit with the branch name 'collections' + ``` + ansible-galaxy collection install git+https://github.com/dell/dellemc-openmanage-ansible-modules.git,collections + ``` -* From [github](https://github.com/dell/dellemc-openmanage-ansible-modules/tree/collections): -Install the collection from the github repository using the latest commit on the branch 'collections' -```ansible-galaxy collection install git+https://github.com/dell/dellemc-openmanage-ansible-modules.git,collections``` +* To Upgrade: +Update the `dellemc.openmanage` collection to the latest version available on [Galaxy](https://galaxy.ansible.com/dellemc/openmanage) and [Automation Hub](https://console.redhat.com/ansible/automation-hub/repo/published/dellemc/openmanage) + ``` + ansible-galaxy collection install dellemc.openmanage --upgrade + ``` -## About +* To specific version: +Install a specifc version of the collection from the [Galaxy](https://galaxy.ansible.com/dellemc/openmanage) and [Automation Hub](https://console.redhat.com/ansible/automation-hub/repo/published/dellemc/openmanage) + ``` + ansible-galaxy collection install dellemc.openmanage:==<version> + ``` + +* Offline Installation: +For offline installation on the Ansible control machine, download the required tar archive version of the collection from [Dell OpenManage collection](https://galaxy.ansible.com/dellemc/openmanage) and run the command given below: + ``` + ansible-galaxy collection install dellemc-openmanage-<version>.tar.gz + ``` + +For more details, see [Using Ansible collections](https://docs.ansible.com/ansible/devel/user_guide/collections_using.html) + +## Use Cases +For more information about how to use the collection, refer to [OME modules](https://github.com/dell/dellemc-openmanage-ansible-modules/tree/collections/playbooks/ome), [iDRAC modules](https://github.com/dell/dellemc-openmanage-ansible-modules/tree/collections/playbooks/idrac), [Redfish modules](https://github.com/dell/dellemc-openmanage-ansible-modules/tree/collections/playbooks/redfish) and [roles](https://github.com/dell/dellemc-openmanage-ansible-modules/tree/collections/playbooks/roles). + +## Testing + +For more information about Unit testing, see [Unit testing](https://github.com/dell/dellemc-openmanage-ansible-modules/blob/collections/tests/README.md). + +For more information about Integration testing, see [Intergation testing](https://github.com/dell/dellemc-openmanage-ansible-modules/blob/collections/tests/integrations/README.md). + +## Support + +For support, see [SUPPORT.md](https://github.com/dell/dellemc-openmanage-ansible-modules/blob/collections/docs/SUPPORT.md). + +## Release Notes + +For release notes, see [CHANGELOG.rst](https://github.com/dell/dellemc-openmanage-ansible-modules/blob/collections/CHANGELOG.rst). + +## Related Information +Refer the [Table of Contents](https://github.com/dell/dellemc-openmanage-ansible-modules/blob/collections/README.md#table-of-contents) for any other information on the Dell OpenManage Ansible Modules documentations. + +## License Information Dell OpenManage Ansible Modules is 100% open source and community-driven. All components are available under [GPL-3.0-only](https://www.gnu.org/licenses/gpl-3.0.html) on GitHub. diff --git a/ansible_collections/dellemc/openmanage/changelogs/changelog.yaml b/ansible_collections/dellemc/openmanage/changelogs/changelog.yaml index 391fa597d..f027a4bba 100644 --- a/ansible_collections/dellemc/openmanage/changelogs/changelog.yaml +++ b/ansible_collections/dellemc/openmanage/changelogs/changelog.yaml @@ -1834,3 +1834,58 @@ releases: name: idrac_session namespace: '' release_date: '2024-04-30' + 9.3.0: + changes: + release_summary: '- The ``ome_session`` module is added to allow you to + create and delete the sessions on OpenManage Enterprise and + OpenManage Enterprise Modular. + + - Added support to use session ID for authentication of iDRAC, + OpenManage Enterprise and OpenManage Enterprise Modular modules. + + - Added time_to_wait option in ``idrac_storage_volume`` module. + + - Added support for Python 3.12.' + major_changes: + - ome_session - This module allows you to create and delete the + sessions on OpenManage Enterprise and OpenManage Enterprise Modular. + - Added support to use session ID for authentication of iDRAC, + OpenManage Enterprise and OpenManage Enterprise Modular. + minor_changes: + - Added time_to_wait option in ``idrac_storage_volume`` module. + - Added support for Python 3.12. + bugfixes: + - Resolved the issue in ``idrac_virtual_media`` module where the + Authorization request header was included in the request. + (https://github.com/dell/dellemc-openmanage-ansible-modules/issues/612) + - Resolved the issue in ``idrac_certificates`` module where + subject_alt_name parameter was only accepting first item in list. + (https://github.com/dell/dellemc-openmanage-ansible-modules/issues/584) + - Resolved the issue in ``ome_application_certificate`` module related + to a padding error in generated CSR file. + (https://github.com/dell/dellemc-openmanage-ansible-modules/issues/370) + known_issues: + - idrac_storage_volume - Issue(290766) - The module will report success + instead of showing failure for new virtual creation on the BOSS-N1 + controller if a virtual disk is already present on the same + controller. + - idrac_diagnostics - Issue(285322) - This module doesn't support + export of diagnostics file to HTTP and HTTPS share via SOCKS + proxy. + - idrac_firmware - Issue(279282) - This module does not support + firmware update using HTTP, HTTPS, and FTP shares with + authentication on iDRAC8. + - ome_diagnostics - Issue(279193) - Export of SupportAssist + collection logs to the share location fails on OME version 4.0.0. + - ome_smart_fabric_uplink - Issue(186024) - The module supported by + OpenManage Enterprise Modular, however it does not allow the + creation of multiple uplinks of the same name. If an uplink is + created using the same name as an existing uplink, then the existing + uplink is modified. + modules: + - description: + This module allows you to create and delete sessions on OpenManage + Enterprise and OpenManage Enterprise Modular. + name: ome_session + namespace: '' + release_date: '2024-05-31' diff --git a/ansible_collections/dellemc/openmanage/docs/modules/idrac_attributes.rst b/ansible_collections/dellemc/openmanage/docs/modules/idrac_attributes.rst index 13ffa9fa3..c6ded6257 100644 --- a/ansible_collections/dellemc/openmanage/docs/modules/idrac_attributes.rst +++ b/ansible_collections/dellemc/openmanage/docs/modules/idrac_attributes.rst @@ -20,7 +20,7 @@ Requirements ------------ The below requirements are needed on the host that executes this module. -- python >= 3.8.6 +- python \>= 3.9.6 @@ -28,21 +28,21 @@ Parameters ---------- idrac_attributes (optional, dict, None) - Dictionary of iDRAC attributes and value. The attributes should be part of the Integrated Dell Remote Access Controller Attribute Registry. To view the list of attributes in Attribute Registry for iDRAC9 and above, see, https://*idrac_ip*/redfish/v1/Managers/iDRAC.Embedded.1/Oem/Dell/DellAttributes/iDRAC.Embedded.1 and https://*idrac_ip*/redfish/v1/Registries/ManagerAttributeRegistry. + Dictionary of iDRAC attributes and value. The attributes should be part of the Integrated Dell Remote Access Controller Attribute Registry. To view the list of attributes in Attribute Registry for iDRAC9 and above, see, \ https://I(idrac_ip\ /redfish/v1/Managers/iDRAC.Embedded.1/Oem/Dell/DellAttributes/iDRAC.Embedded.1) and \ https://I(idrac_ip\ /redfish/v1/Registries/ManagerAttributeRegistry). - For iDRAC8 based servers, derive the manager attribute name from Server Configuration Profile. If the manager attribute name in Server Configuration Profile is <GroupName>.<Instance>#<AttributeName> (for Example, 'SNMP.1#AgentCommunity') then the equivalent attribute name for Redfish is <GroupName>.<Instance>.<AttributeName> (for Example, 'SNMP.1.AgentCommunity'). + For iDRAC8 based servers, derive the manager attribute name from Server Configuration Profile. If the manager attribute name in Server Configuration Profile is \<GroupName\>.\<Instance\>#\<AttributeName\> (for Example, 'SNMP.1#AgentCommunity') then the equivalent attribute name for Redfish is \<GroupName\>.\<Instance\>.\<AttributeName\> (for Example, 'SNMP.1.AgentCommunity'). system_attributes (optional, dict, None) - Dictionary of System attributes and value. The attributes should be part of the Integrated Dell Remote Access Controller Attribute Registry. To view the list of attributes in Attribute Registry for iDRAC9 and above, see, https://*idrac_ip*/redfish/v1/Managers/iDRAC.Embedded.1/Oem/Dell/DellAttributes/System.Embedded.1 and https://*idrac_ip*/redfish/v1/Registries/ManagerAttributeRegistry. + Dictionary of System attributes and value. The attributes should be part of the Integrated Dell Remote Access Controller Attribute Registry. To view the list of attributes in Attribute Registry for iDRAC9 and above, see, \ https://I(idrac_ip\ /redfish/v1/Managers/iDRAC.Embedded.1/Oem/Dell/DellAttributes/System.Embedded.1) and \ https://I(idrac_ip\ /redfish/v1/Registries/ManagerAttributeRegistry). - For iDRAC8 based servers, derive the manager attribute name from Server Configuration Profile. If the manager attribute name in Server Configuration Profile is <GroupName>.<Instance>#<AttributeName> (for Example, 'ThermalSettings.1#ThermalProfile') then the equivalent attribute name for Redfish is <GroupName>.<Instance>.<AttributeName> (for Example, 'ThermalSettings.1.ThermalProfile'). + For iDRAC8 based servers, derive the manager attribute name from Server Configuration Profile. If the manager attribute name in Server Configuration Profile is \<GroupName\>.\<Instance\>#\<AttributeName\> (for Example, 'ThermalSettings.1#ThermalProfile') then the equivalent attribute name for Redfish is \<GroupName\>.\<Instance\>.\<AttributeName\> (for Example, 'ThermalSettings.1.ThermalProfile'). lifecycle_controller_attributes (optional, dict, None) - Dictionary of Lifecycle Controller attributes and value. The attributes should be part of the Integrated Dell Remote Access Controller Attribute Registry.To view the list of attributes in Attribute Registry for iDRAC9 and above, see, https://*idrac_ip*/redfish/v1/Managers/iDRAC.Embedded.1/Oem/Dell/DellAttributes/LifecycleController.Embedded.1 and https://*idrac_ip*/redfish/v1/Registries/ManagerAttributeRegistry. + Dictionary of Lifecycle Controller attributes and value. The attributes should be part of the Integrated Dell Remote Access Controller Attribute Registry.To view the list of attributes in Attribute Registry for iDRAC9 and above, see, \ https://I(idrac_ip\ /redfish/v1/Managers/iDRAC.Embedded.1/Oem/Dell/DellAttributes/LifecycleController.Embedded.1) and \ https://I(idrac_ip\ /redfish/v1/Registries/ManagerAttributeRegistry). - For iDRAC8 based servers, derive the manager attribute name from Server Configuration Profile. If the manager attribute name in Server Configuration Profile is <GroupName>.<Instance>#<AttributeName> (for Example, 'LCAttributes.1#AutoUpdate') then the equivalent attribute name for Redfish is <GroupName>.<Instance>.<AttributeName> (for Example, 'LCAttributes.1.AutoUpdate'). + For iDRAC8 based servers, derive the manager attribute name from Server Configuration Profile. If the manager attribute name in Server Configuration Profile is \<GroupName\>.\<Instance\>#\<AttributeName\> (for Example, 'LCAttributes.1#AutoUpdate') then the equivalent attribute name for Redfish is \<GroupName\>.\<Instance\>.\<AttributeName\> (for Example, 'LCAttributes.1.AutoUpdate'). resource_id (optional, str, None) @@ -53,24 +53,40 @@ Parameters iDRAC IP Address. - idrac_user (True, str, None) + idrac_user (False, str, None) iDRAC username. + If the username is not provided, then the environment variable \ :envvar:`IDRAC\_USERNAME`\ is used. - idrac_password (True, str, None) + Example: export IDRAC\_USERNAME=username + + + idrac_password (False, str, None) iDRAC user password. + If the password is not provided, then the environment variable \ :envvar:`IDRAC\_PASSWORD`\ is used. + + Example: export IDRAC\_PASSWORD=password + + + x_auth_token (False, str, None) + Authentication token. + + If the x\_auth\_token is not provided, then the environment variable \ :envvar:`IDRAC\_X\_AUTH\_TOKEN`\ is used. + + Example: export IDRAC\_X\_AUTH\_TOKEN=x\_auth\_token + idrac_port (optional, int, 443) iDRAC port. validate_certs (optional, bool, True) - If ``false``, the SSL certificates will not be validated. + If \ :literal:`false`\ , the SSL certificates will not be validated. - Configure ``false`` only on personally controlled sites where self-signed certificates are used. + Configure \ :literal:`false`\ only on personally controlled sites where self-signed certificates are used. - Prior to collection version ``5.0.0``, the *validate_certs* is ``false`` by default. + Prior to collection version \ :literal:`5.0.0`\ , the \ :emphasis:`validate\_certs`\ is \ :literal:`false`\ by default. ca_path (optional, path, None) @@ -89,7 +105,7 @@ Notes .. note:: - Run this module from a system that has direct access to Dell iDRAC. - - This module supports ``check_mode``. + - This module supports \ :literal:`check\_mode`\ . - For iDRAC8 based servers, the value provided for the attributes are not be validated. Ensure appropriate values are passed. diff --git a/ansible_collections/dellemc/openmanage/docs/modules/idrac_bios.rst b/ansible_collections/dellemc/openmanage/docs/modules/idrac_bios.rst index 569b36553..588e397aa 100644 --- a/ansible_collections/dellemc/openmanage/docs/modules/idrac_bios.rst +++ b/ansible_collections/dellemc/openmanage/docs/modules/idrac_bios.rst @@ -22,8 +22,8 @@ Requirements ------------ The below requirements are needed on the host that executes this module. -- omsdk >= 1.2.490 -- python >= 3.9.6 +- omsdk \>= 1.2.490 +- python \>= 3.9.6 @@ -47,31 +47,31 @@ Parameters apply_time (optional, str, Immediate) - Apply time of the *attributes*. + Apply time of the \ :emphasis:`attributes`\ . - This is applicable only to *attributes*. + This is applicable only to \ :emphasis:`attributes`\ . - ``Immediate`` Allows the user to immediately reboot the host and apply the changes. *job_wait* is applicable. + \ :literal:`Immediate`\ Allows the user to immediately reboot the host and apply the changes. \ :emphasis:`job\_wait`\ is applicable. - ``OnReset`` Allows the user to apply the changes on the next reboot of the host server. + \ :literal:`OnReset`\ Allows the user to apply the changes on the next reboot of the host server. - ``AtMaintenanceWindowStart`` Allows the user to apply at the start of a maintenance window as specified in *maintenance_window*. A reboot job will be scheduled. + \ :literal:`AtMaintenanceWindowStart`\ Allows the user to apply at the start of a maintenance window as specified in \ :emphasis:`maintenance\_window`\ . A reboot job will be scheduled. - ``InMaintenanceWindowOnReset`` Allows to apply after a manual reset but within the maintenance window as specified in *maintenance_window*. + \ :literal:`InMaintenanceWindowOnReset`\ Allows to apply after a manual reset but within the maintenance window as specified in \ :emphasis:`maintenance\_window`\ . maintenance_window (optional, dict, None) Option to schedule the maintenance window. - This is required when *apply_time* is ``AtMaintenanceWindowStart`` or ``InMaintenanceWindowOnReset``. + This is required when \ :emphasis:`apply\_time`\ is \ :literal:`AtMaintenanceWindowStart`\ or \ :literal:`InMaintenanceWindowOnReset`\ . start_time (True, str, None) The start time for the maintenance window to be scheduled. - The format is YYYY-MM-DDThh:mm:ss<offset> + The format is YYYY-MM-DDThh:mm:ss\<offset\> - <offset> is the time offset from UTC that the current timezone set in iDRAC in the format: +05:30 for IST. + \<offset\> is the time offset from UTC that the current timezone set in iDRAC in the format: +05:30 for IST. duration (True, int, None) @@ -80,33 +80,33 @@ Parameters attributes (optional, dict, None) - Dictionary of BIOS attributes and value pair. Attributes should be part of the Redfish Dell BIOS Attribute Registry. Use https://*idrac_ip*/redfish/v1/Systems/System.Embedded.1/Bios to view the Redfish URI. + Dictionary of BIOS attributes and value pair. Attributes should be part of the Redfish Dell BIOS Attribute Registry. Use \ https://I(idrac_ip\ /redfish/v1/Systems/System.Embedded.1/Bios) to view the Redfish URI. - This is mutually exclusive with *boot_sources*, *clear_pending*, and *reset_bios*. + This is mutually exclusive with \ :emphasis:`boot\_sources`\ , \ :emphasis:`clear\_pending`\ , and \ :emphasis:`reset\_bios`\ . boot_sources (optional, list, None) (deprecated)List of boot devices to set the boot sources settings. - *boot_sources* is mutually exclusive with *attributes*, *clear_pending*, and *reset_bios*. + \ :emphasis:`boot\_sources`\ is mutually exclusive with \ :emphasis:`attributes`\ , \ :emphasis:`clear\_pending`\ , and \ :emphasis:`reset\_bios`\ . - *job_wait* is not applicable. The module waits till the completion of this task. + \ :emphasis:`job\_wait`\ is not applicable. The module waits till the completion of this task. - This feature is deprecated, please use :ref:`dellemc.openmanage.idrac_boot <dellemc.openmanage.idrac_boot_module>` for configuring boot sources. + This feature is deprecated, please use \ :ref:`dellemc.openmanage.idrac\_boot <ansible_collections.dellemc.openmanage.idrac_boot_module>`\ for configuring boot sources. clear_pending (optional, bool, None) Allows the user to clear all pending BIOS attributes changes. - ``true`` will discard any pending changes to bios attributes or remove job if in scheduled state. + \ :literal:`true`\ will discard any pending changes to bios attributes or remove job if in scheduled state. This operation will not create any job. - ``false`` will not perform any operation. + \ :literal:`false`\ will not perform any operation. - This is mutually exclusive with *boot_sources*, *attributes*, and *reset_bios*. + This is mutually exclusive with \ :emphasis:`boot\_sources`\ , \ :emphasis:`attributes`\ , and \ :emphasis:`reset\_bios`\ . - ``Note`` Any BIOS job scheduled due to boot sources configuration will not be cleared. + \ :literal:`Note`\ Any BIOS job scheduled due to boot sources configuration will not be cleared. reset_bios (optional, bool, None) @@ -116,31 +116,31 @@ Parameters This operation will not create any job. - ``false`` will not perform any operation. + \ :literal:`false`\ will not perform any operation. - This is mutually exclusive with *boot_sources*, *attributes*, and *clear_pending*. + This is mutually exclusive with \ :emphasis:`boot\_sources`\ , \ :emphasis:`attributes`\ , and \ :emphasis:`clear\_pending`\ . - When ``true``, this action will always report as changes found to be applicable. + When \ :literal:`true`\ , this action will always report as changes found to be applicable. reset_type (optional, str, graceful_restart) - ``force_restart`` Forcefully reboot the host system. + \ :literal:`force\_restart`\ Forcefully reboot the host system. - ``graceful_restart`` Gracefully reboot the host system. + \ :literal:`graceful\_restart`\ Gracefully reboot the host system. - This is applicable for *reset_bios*, and *attributes* when *apply_time* is ``Immediate``. + This is applicable for \ :emphasis:`reset\_bios`\ , and \ :emphasis:`attributes`\ when \ :emphasis:`apply\_time`\ is \ :literal:`Immediate`\ . job_wait (optional, bool, True) Provides the option to wait for job completion. - This is applicable for *attributes* when *apply_time* is ``Immediate``. + This is applicable for \ :emphasis:`attributes`\ when \ :emphasis:`apply\_time`\ is \ :literal:`Immediate`\ . job_wait_timeout (optional, int, 1200) - The maximum wait time of *job_wait* in seconds. The job is tracked only for this duration. + The maximum wait time of \ :emphasis:`job\_wait`\ in seconds. The job is tracked only for this duration. - This option is applicable when *job_wait* is ``true``. + This option is applicable when \ :emphasis:`job\_wait`\ is \ :literal:`true`\ . idrac_ip (True, str, None) @@ -150,21 +150,29 @@ Parameters idrac_user (True, str, None) iDRAC username. + If the username is not provided, then the environment variable \ :envvar:`IDRAC\_USERNAME`\ is used. + + Example: export IDRAC\_USERNAME=username + idrac_password (True, str, None) iDRAC user password. + If the password is not provided, then the environment variable \ :envvar:`IDRAC\_PASSWORD`\ is used. + + Example: export IDRAC\_PASSWORD=password + idrac_port (optional, int, 443) iDRAC port. validate_certs (optional, bool, True) - If ``false``, the SSL certificates will not be validated. + If \ :literal:`false`\ , the SSL certificates will not be validated. - Configure ``false`` only on personally controlled sites where self-signed certificates are used. + Configure \ :literal:`false`\ only on personally controlled sites where self-signed certificates are used. - Prior to collection version ``5.0.0``, the *validate_certs* is ``false`` by default. + Prior to collection version \ :literal:`5.0.0`\ , the \ :emphasis:`validate\_certs`\ is \ :literal:`false`\ by default. ca_path (optional, path, None) @@ -182,11 +190,11 @@ Notes ----- .. note:: - - omsdk is required to be installed only for *boot_sources* operation. - - This module requires 'Administrator' privilege for *idrac_user*. + - omsdk is required to be installed only for \ :emphasis:`boot\_sources`\ operation. + - This module requires 'Administrator' privilege for \ :emphasis:`idrac\_user`\ . - Run this module from a system that has direct access to Dell iDRAC. - - This module supports both IPv4 and IPv6 address for *idrac_ip*. - - This module supports ``check_mode``. + - This module supports both IPv4 and IPv6 address for \ :emphasis:`idrac\_ip`\ . + - This module supports \ :literal:`check\_mode`\ . @@ -312,7 +320,7 @@ status_msg (success, str, Successfully cleared pending BIOS attributes.) msg (success, dict, {'CompletionTime': '2020-04-20T18:50:20', 'Description': 'Job Instance', 'EndTime': None, 'Id': 'JID_873888162305', 'JobState': 'Completed', 'JobType': 'ImportConfiguration', 'Message': 'Successfully imported and applied Server Configuration Profile.', 'MessageArgs': [], 'MessageId': 'SYS053', 'Name': 'Import Configuration', 'PercentComplete': 100, 'StartTime': 'TIME_NOW', 'Status': 'Success', 'TargetSettingsURI': None, 'retval': True}) - Status of the job for *boot_sources* or status of the action performed on bios. + Status of the job for \ :emphasis:`boot\_sources`\ or status of the action performed on bios. invalid_attributes (on invalid attributes or values., dict, {'PxeDev1VlanId': 'Not a valid integer.', 'AcPwrRcvryUserDelay': 'Integer out of valid range.', 'BootSeqRetry': 'Invalid value for Enumeration.', 'Proc1Brand': 'Read only Attribute cannot be modified.', 'AssetTag': 'Attribute does not exist.'}) diff --git a/ansible_collections/dellemc/openmanage/docs/modules/idrac_boot.rst b/ansible_collections/dellemc/openmanage/docs/modules/idrac_boot.rst index 980423ee2..121c0bdab 100644 --- a/ansible_collections/dellemc/openmanage/docs/modules/idrac_boot.rst +++ b/ansible_collections/dellemc/openmanage/docs/modules/idrac_boot.rst @@ -20,7 +20,7 @@ Requirements ------------ The below requirements are needed on the host that executes this module. -- python >= 3.8.6 +- python \>= 3.9.6 @@ -30,19 +30,19 @@ Parameters boot_options (optional, list, None) Options to enable or disable the boot devices. - This is mutually exclusive with *boot_order*, *boot_source_override_mode*, *boot_source_override_enabled* *boot_source_override_target*, and *uefi_target_boot_source_override*. + This is mutually exclusive with \ :emphasis:`boot\_order`\ , \ :emphasis:`boot\_source\_override\_mode`\ , \ :emphasis:`boot\_source\_override\_enabled`\ \ :emphasis:`boot\_source\_override\_target`\ , and \ :emphasis:`uefi\_target\_boot\_source\_override`\ . boot_option_reference (optional, str, None) FQDD of the boot device. - This is mutually exclusive with *display_name*. + This is mutually exclusive with \ :emphasis:`display\_name`\ . display_name (optional, str, None) Display name of the boot source device. - This is mutually exclusive with *boot_option_reference*. + This is mutually exclusive with \ :emphasis:`boot\_option\_reference`\ . enabled (True, bool, None) @@ -53,85 +53,85 @@ Parameters boot_order (optional, list, None) This option allows to set the boot devices in the required boot order sequences. - This is mutually exclusive with *boot_options*. + This is mutually exclusive with \ :emphasis:`boot\_options`\ . boot_source_override_mode (optional, str, None) - The BIOS boot mode (either Legacy or UEFI) to be used when *boot_source_override_target* boot source is booted from. + The BIOS boot mode (either Legacy or UEFI) to be used when \ :emphasis:`boot\_source\_override\_target`\ boot source is booted from. - ``legacy`` The system boot in non-UEF*Legacy* boot mode to the *boot_source_override_target*. + \ :literal:`legacy`\ The system boot in non-UEFI(Legacy) boot mode to the \ :emphasis:`boot\_source\_override\_target`\ . - ``uefi`` The system boot in UEFI boot mode to the *boot_source_override_target*. + \ :literal:`uefi`\ The system boot in UEFI boot mode to the \ :emphasis:`boot\_source\_override\_target`\ . - This is mutually exclusive with *boot_options*. + This is mutually exclusive with \ :emphasis:`boot\_options`\ . boot_source_override_enabled (optional, str, None) The state of the Boot Source Override feature. - ``disabled`` The system boots normally. + \ :literal:`disabled`\ The system boots normally. - ``once`` The system boots (one time) to the *boot_source_override_target*. + \ :literal:`once`\ The system boots (one time) to the \ :emphasis:`boot\_source\_override\_target`\ . - ``continuous`` The system boots to the target specified in the *boot_source_override_target* until this property is set to Disabled. + \ :literal:`continuous`\ The system boots to the target specified in the \ :emphasis:`boot\_source\_override\_target`\ until this property is set to Disabled. - The state is set to ``once`` for the one-time boot override and ``continuous`` for the remain-active-until—canceled override. If the state is set ``once`` or ``continuous``, the value is reset to ``disabled`` after the *boot_source_override_target* actions have completed successfully. + The state is set to \ :literal:`once`\ for the one-time boot override and \ :literal:`continuous`\ for the remain-active-until—canceled override. If the state is set \ :literal:`once`\ or \ :literal:`continuous`\ , the value is reset to \ :literal:`disabled`\ after the \ :emphasis:`boot\_source\_override\_target`\ actions have completed successfully. Changes to this options do not alter the BIOS persistent boot order configuration. - This is mutually exclusive with *boot_options*. + This is mutually exclusive with \ :emphasis:`boot\_options`\ . boot_source_override_target (optional, str, None) The boot source override target device to use during the next boot instead of the normal boot device. - ``pxe`` performs PXE boot from the primary NIC. + \ :literal:`pxe`\ performs PXE boot from the primary NIC. - ``floppy``, ``cd``, ``hdd``, ``sd_card`` performs boot from their devices respectively. + \ :literal:`floppy`\ , \ :literal:`cd`\ , \ :literal:`hdd`\ , \ :literal:`sd\_card`\ performs boot from their devices respectively. - ``bios_setup`` performs boot into the native BIOS setup. + \ :literal:`bios\_setup`\ performs boot into the native BIOS setup. - ``utilities`` performs boot from the local utilities. + \ :literal:`utilities`\ performs boot from the local utilities. - ``uefi_target`` performs boot from the UEFI device path found in *uefi_target_boot_source_override*. + \ :literal:`uefi\_target`\ performs boot from the UEFI device path found in \ :emphasis:`uefi\_target\_boot\_source\_override`\ . - If the *boot_source_override_target* is set to a value other than ``none`` then the *boot_source_override_enabled* is automatically set to ``once``. + If the \ :emphasis:`boot\_source\_override\_target`\ is set to a value other than \ :literal:`none`\ then the \ :emphasis:`boot\_source\_override\_enabled`\ is automatically set to \ :literal:`once`\ . Changes to this options do not alter the BIOS persistent boot order configuration. - This is mutually exclusive with *boot_options*. + This is mutually exclusive with \ :emphasis:`boot\_options`\ . uefi_target_boot_source_override (optional, str, None) - The UEFI device path of the device from which to boot when *boot_source_override_target* is ``uefi_target``. + The UEFI device path of the device from which to boot when \ :emphasis:`boot\_source\_override\_target`\ is \ :literal:`uefi\_target`\ . - *boot_source_override_enabled* cannot be set to c(continuous) if *boot_source_override_target* set to ``uefi_target`` because this settings is defined in UEFI as a one-time-boot setting. + \ :emphasis:`boot\_source\_override\_enabled`\ cannot be set to c(continuous) if \ :emphasis:`boot\_source\_override\_target`\ set to \ :literal:`uefi\_target`\ because this settings is defined in UEFI as a one-time-boot setting. Changes to this options do not alter the BIOS persistent boot order configuration. - This is required if *boot_source_override_target* is ``uefi_target``. + This is required if \ :emphasis:`boot\_source\_override\_target`\ is \ :literal:`uefi\_target`\ . - This is mutually exclusive with *boot_options*. + This is mutually exclusive with \ :emphasis:`boot\_options`\ . reset_type (optional, str, graceful_restart) - ``none`` Host system is not rebooted and *job_wait* is not applicable. + \ :literal:`none`\ Host system is not rebooted and \ :emphasis:`job\_wait`\ is not applicable. - ``force_restart`` Forcefully reboot the Host system. + \ :literal:`force\_restart`\ Forcefully reboot the Host system. - ``graceful_restart`` Gracefully reboot the Host system. + \ :literal:`graceful\_restart`\ Gracefully reboot the Host system. job_wait (optional, bool, True) Provides the option to wait for job completion. - This is applicable when *reset_type* is ``force_reset`` or ``graceful_reset``. + This is applicable when \ :emphasis:`reset\_type`\ is \ :literal:`force\_reset`\ or \ :literal:`graceful\_reset`\ . job_wait_timeout (optional, int, 900) - The maximum wait time of *job_wait* in seconds. The job is tracked only for this duration. + The maximum wait time of \ :emphasis:`job\_wait`\ in seconds. The job is tracked only for this duration. - This option is applicable when *job_wait* is ``true``. + This option is applicable when \ :emphasis:`job\_wait`\ is \ :literal:`true`\ . resource_id (optional, str, None) @@ -142,24 +142,40 @@ Parameters iDRAC IP Address. - idrac_user (True, str, None) + idrac_user (False, str, None) iDRAC username. + If the username is not provided, then the environment variable \ :envvar:`IDRAC\_USERNAME`\ is used. - idrac_password (True, str, None) + Example: export IDRAC\_USERNAME=username + + + idrac_password (False, str, None) iDRAC user password. + If the password is not provided, then the environment variable \ :envvar:`IDRAC\_PASSWORD`\ is used. + + Example: export IDRAC\_PASSWORD=password + + + x_auth_token (False, str, None) + Authentication token. + + If the x\_auth\_token is not provided, then the environment variable \ :envvar:`IDRAC\_X\_AUTH\_TOKEN`\ is used. + + Example: export IDRAC\_X\_AUTH\_TOKEN=x\_auth\_token + idrac_port (optional, int, 443) iDRAC port. validate_certs (optional, bool, True) - If ``false``, the SSL certificates will not be validated. + If \ :literal:`false`\ , the SSL certificates will not be validated. - Configure ``false`` only on personally controlled sites where self-signed certificates are used. + Configure \ :literal:`false`\ only on personally controlled sites where self-signed certificates are used. - Prior to collection version ``5.0.0``, the *validate_certs* is ``false`` by default. + Prior to collection version \ :literal:`5.0.0`\ , the \ :emphasis:`validate\_certs`\ is \ :literal:`false`\ by default. ca_path (optional, path, None) @@ -178,7 +194,7 @@ Notes .. note:: - Run this module from a system that has direct access to Dell iDRAC. - - This module supports ``check_mode``. + - This module supports \ :literal:`check\_mode`\ . diff --git a/ansible_collections/dellemc/openmanage/docs/modules/idrac_certificates.rst b/ansible_collections/dellemc/openmanage/docs/modules/idrac_certificates.rst index 747f15381..202b5a1a6 100644 --- a/ansible_collections/dellemc/openmanage/docs/modules/idrac_certificates.rst +++ b/ansible_collections/dellemc/openmanage/docs/modules/idrac_certificates.rst @@ -20,7 +20,7 @@ Requirements ------------ The below requirements are needed on the host that executes this module. -- python \>= 3.8.6 +- python \>= 3.9.6 @@ -126,13 +126,29 @@ Parameters iDRAC IP Address. - idrac_user (True, str, None) + idrac_user (False, str, None) iDRAC username. + If the username is not provided, then the environment variable \ :envvar:`IDRAC\_USERNAME`\ is used. - idrac_password (True, str, None) + Example: export IDRAC\_USERNAME=username + + + idrac_password (False, str, None) iDRAC user password. + If the password is not provided, then the environment variable \ :envvar:`IDRAC\_PASSWORD`\ is used. + + Example: export IDRAC\_PASSWORD=password + + + x_auth_token (False, str, None) + Authentication token. + + If the x\_auth\_token is not provided, then the environment variable \ :envvar:`IDRAC\_X\_AUTH\_TOKEN`\ is used. + + Example: export IDRAC\_X\_AUTH\_TOKEN=x\_auth\_token + idrac_port (optional, int, 443) iDRAC port. diff --git a/ansible_collections/dellemc/openmanage/docs/modules/idrac_diagnostics.rst b/ansible_collections/dellemc/openmanage/docs/modules/idrac_diagnostics.rst index 1a29769e0..ba5831ab7 100644 --- a/ansible_collections/dellemc/openmanage/docs/modules/idrac_diagnostics.rst +++ b/ansible_collections/dellemc/openmanage/docs/modules/idrac_diagnostics.rst @@ -214,13 +214,29 @@ Parameters iDRAC IP Address. - idrac_user (True, str, None) + idrac_user (False, str, None) iDRAC username. + If the username is not provided, then the environment variable \ :envvar:`IDRAC\_USERNAME`\ is used. - idrac_password (True, str, None) + Example: export IDRAC\_USERNAME=username + + + idrac_password (False, str, None) iDRAC user password. + If the password is not provided, then the environment variable \ :envvar:`IDRAC\_PASSWORD`\ is used. + + Example: export IDRAC\_PASSWORD=password + + + x_auth_token (False, str, None) + Authentication token. + + If the x\_auth\_token is not provided, then the environment variable \ :envvar:`IDRAC\_X\_AUTH\_TOKEN`\ is used. + + Example: export IDRAC\_X\_AUTH\_TOKEN=x\_auth\_token + idrac_port (optional, int, 443) iDRAC port. diff --git a/ansible_collections/dellemc/openmanage/docs/modules/idrac_firmware.rst b/ansible_collections/dellemc/openmanage/docs/modules/idrac_firmware.rst index 1cbb31095..7475b06b1 100644 --- a/ansible_collections/dellemc/openmanage/docs/modules/idrac_firmware.rst +++ b/ansible_collections/dellemc/openmanage/docs/modules/idrac_firmware.rst @@ -26,8 +26,8 @@ Requirements ------------ The below requirements are needed on the host that executes this module. -- omsdk >= 1.2.503 -- python >= 3.9.6 +- omsdk \>= 1.2.503 +- python \>= 3.9.6 @@ -39,7 +39,7 @@ Parameters share_user (optional, str, None) - Network share user in the format 'user@domain' or 'domain\\user' if user is part of a domain else 'user'. This option is mandatory for CIFS Network Share. + Network share user in the format 'user@domain' or 'domain\\\\user' if user is part of a domain else 'user'. This option is mandatory for CIFS Network Share. share_password (optional, str, None) @@ -57,25 +57,25 @@ Parameters catalog_file_name (optional, str, Catalog.xml) - Catalog file name relative to the *share_name*. + Catalog file name relative to the \ :emphasis:`share\_name`\ . ignore_cert_warning (optional, bool, True) - Specifies if certificate warnings are ignored when HTTPS share is used. If ``true`` option is set, then the certificate warnings are ignored. + Specifies if certificate warnings are ignored when HTTPS share is used. If \ :literal:`true`\ option is set, then the certificate warnings are ignored. apply_update (optional, bool, True) - If *apply_update* is set to ``true``, then the packages are applied. + If \ :emphasis:`apply\_update`\ is set to \ :literal:`true`\ , then the packages are applied. - If *apply_update* is set to ``false``, no updates are applied, and a catalog report of packages is generated and returned. + If \ :emphasis:`apply\_update`\ is set to \ :literal:`false`\ , no updates are applied, and a catalog report of packages is generated and returned. reboot (optional, bool, False) Provides the option to apply the update packages immediately or in the next reboot. - If *reboot* is set to ``true``, then the packages are applied immediately. + If \ :emphasis:`reboot`\ is set to \ :literal:`true`\ , then the packages are applied immediately. - If *reboot* is set to ``false``, then the packages are staged and applied in the next reboot. + If \ :emphasis:`reboot`\ is set to \ :literal:`false`\ , then the packages are staged and applied in the next reboot. Packages that do not require a reboot are applied immediately irrespective of I (reboot). @@ -83,15 +83,15 @@ Parameters proxy_support (optional, str, Off) Specifies if a proxy should be used. - Proxy parameters are applicable on ``HTTP``, ``HTTPS``, and ``FTP`` share type of repositories. + Proxy parameters are applicable on \ :literal:`HTTP`\ , \ :literal:`HTTPS`\ , and \ :literal:`FTP`\ share type of repositories. - ``ParametersProxy``, sets the proxy parameters for the current firmware operation. + \ :literal:`ParametersProxy`\ , sets the proxy parameters for the current firmware operation. - ``DefaultProxy``, iDRAC uses the proxy values set by default. + \ :literal:`DefaultProxy`\ , iDRAC uses the proxy values set by default. - Default Proxy can be set in the Lifecycle Controller attributes using :ref:`dellemc.openmanage.idrac_attributes <dellemc.openmanage.idrac_attributes_module>`. + Default Proxy can be set in the Lifecycle Controller attributes using \ :ref:`dellemc.openmanage.idrac\_attributes <ansible_collections.dellemc.openmanage.idrac_attributes_module>`\ . - ``Off``, will not use the proxy. + \ :literal:`Off`\ , will not use the proxy. For iDRAC8 based servers, use proxy server with basic authentication. @@ -101,21 +101,21 @@ Parameters proxy_server (optional, str, None) The IP address of the proxy server. - This IP will not be validated. The download job will be created even for invalid *proxy_server*. Please check the results of the job for error details. + This IP will not be validated. The download job will be created even for invalid \ :emphasis:`proxy\_server`\ . Please check the results of the job for error details. - This is required when *proxy_support* is ``ParametersProxy``. + This is required when \ :emphasis:`proxy\_support`\ is \ :literal:`ParametersProxy`\ . proxy_port (optional, int, None) The Port for the proxy server. - This is required when *proxy_support* is ``ParametersProxy``. + This is required when \ :emphasis:`proxy\_support`\ is \ :literal:`ParametersProxy`\ . proxy_type (optional, str, None) The proxy type of the proxy server. - This is required when *proxy_support* is ``ParametersProxy``. + This is required when \ :emphasis:`proxy\_support`\ is \ :literal:`ParametersProxy`\ . Note: SOCKS4 proxy does not support IPv6 address. @@ -135,21 +135,29 @@ Parameters idrac_user (True, str, None) iDRAC username. + If the username is not provided, then the environment variable \ :envvar:`IDRAC\_USERNAME`\ is used. + + Example: export IDRAC\_USERNAME=username + idrac_password (True, str, None) iDRAC user password. + If the password is not provided, then the environment variable \ :envvar:`IDRAC\_PASSWORD`\ is used. + + Example: export IDRAC\_PASSWORD=password + idrac_port (optional, int, 443) iDRAC port. validate_certs (optional, bool, True) - If ``false``, the SSL certificates will not be validated. + If \ :literal:`false`\ , the SSL certificates will not be validated. - Configure ``false`` only on personally controlled sites where self-signed certificates are used. + Configure \ :literal:`false`\ only on personally controlled sites where self-signed certificates are used. - Prior to collection version ``5.0.0``, the *validate_certs* is ``false`` by default. + Prior to collection version \ :literal:`5.0.0`\ , the \ :emphasis:`validate\_certs`\ is \ :literal:`false`\ by default. ca_path (optional, path, None) @@ -170,8 +178,8 @@ Notes - Run this module from a system that has direct access to Dell iDRAC. - Module will report success based on the iDRAC firmware update parent job status if there are no individual component jobs present. - For server with iDRAC firmware 5.00.00.00 and later, if the repository contains unsupported packages, then the module will return success with a proper message. - - This module supports both IPv4 and IPv6 address for *idrac_ip* and *share_name*. - - This module supports ``check_mode``. + - This module supports both IPv4 and IPv6 address for \ :emphasis:`idrac\_ip`\ and \ :emphasis:`share\_name`\ . + - This module supports \ :literal:`check\_mode`\ . diff --git a/ansible_collections/dellemc/openmanage/docs/modules/idrac_firmware_info.rst b/ansible_collections/dellemc/openmanage/docs/modules/idrac_firmware_info.rst index 04c46a32e..9b33926a7 100644 --- a/ansible_collections/dellemc/openmanage/docs/modules/idrac_firmware_info.rst +++ b/ansible_collections/dellemc/openmanage/docs/modules/idrac_firmware_info.rst @@ -20,8 +20,8 @@ Requirements ------------ The below requirements are needed on the host that executes this module. -- omsdk >= 1.2.488 -- python >= 3.9.6 +- omsdk \>= 1.2.488 +- python \>= 3.9.6 @@ -35,21 +35,29 @@ Parameters idrac_user (True, str, None) iDRAC username. + If the username is not provided, then the environment variable \ :envvar:`IDRAC\_USERNAME`\ is used. + + Example: export IDRAC\_USERNAME=username + idrac_password (True, str, None) iDRAC user password. + If the password is not provided, then the environment variable \ :envvar:`IDRAC\_PASSWORD`\ is used. + + Example: export IDRAC\_PASSWORD=password + idrac_port (optional, int, 443) iDRAC port. validate_certs (optional, bool, True) - If ``false``, the SSL certificates will not be validated. + If \ :literal:`false`\ , the SSL certificates will not be validated. - Configure ``false`` only on personally controlled sites where self-signed certificates are used. + Configure \ :literal:`false`\ only on personally controlled sites where self-signed certificates are used. - Prior to collection version ``5.0.0``, the *validate_certs* is ``false`` by default. + Prior to collection version \ :literal:`5.0.0`\ , the \ :emphasis:`validate\_certs`\ is \ :literal:`false`\ by default. ca_path (optional, path, None) @@ -68,8 +76,8 @@ Notes .. note:: - Run this module from a system that has direct access to Dell iDRAC. - - This module supports both IPv4 and IPv6 address for *idrac_ip*. - - This module supports ``check_mode``. + - This module supports both IPv4 and IPv6 address for \ :emphasis:`idrac\_ip`\ . + - This module supports \ :literal:`check\_mode`\ . diff --git a/ansible_collections/dellemc/openmanage/docs/modules/idrac_license.rst b/ansible_collections/dellemc/openmanage/docs/modules/idrac_license.rst index d4441a3ab..6dd16768c 100644 --- a/ansible_collections/dellemc/openmanage/docs/modules/idrac_license.rst +++ b/ansible_collections/dellemc/openmanage/docs/modules/idrac_license.rst @@ -180,13 +180,29 @@ Parameters iDRAC IP Address. - idrac_user (True, str, None) + idrac_user (False, str, None) iDRAC username. + If the username is not provided, then the environment variable \ :envvar:`IDRAC\_USERNAME`\ is used. - idrac_password (True, str, None) + Example: export IDRAC\_USERNAME=username + + + idrac_password (False, str, None) iDRAC user password. + If the password is not provided, then the environment variable \ :envvar:`IDRAC\_PASSWORD`\ is used. + + Example: export IDRAC\_PASSWORD=password + + + x_auth_token (False, str, None) + Authentication token. + + If the x\_auth\_token is not provided, then the environment variable \ :envvar:`IDRAC\_X\_AUTH\_TOKEN`\ is used. + + Example: export IDRAC\_X\_AUTH\_TOKEN=x\_auth\_token + idrac_port (optional, int, 443) iDRAC port. diff --git a/ansible_collections/dellemc/openmanage/docs/modules/idrac_lifecycle_controller_job_status_info.rst b/ansible_collections/dellemc/openmanage/docs/modules/idrac_lifecycle_controller_job_status_info.rst index 8cf0e133b..e2e437822 100644 --- a/ansible_collections/dellemc/openmanage/docs/modules/idrac_lifecycle_controller_job_status_info.rst +++ b/ansible_collections/dellemc/openmanage/docs/modules/idrac_lifecycle_controller_job_status_info.rst @@ -20,8 +20,8 @@ Requirements ------------ The below requirements are needed on the host that executes this module. -- omsdk >= 1.2.488 -- python >= 3.9.6 +- omsdk \>= 1.2.488 +- python \>= 3.9.6 @@ -29,7 +29,7 @@ Parameters ---------- job_id (True, str, None) - JOB ID in the format "JID_123456789012". + JOB ID in the format "JID\_123456789012". idrac_ip (True, str, None) @@ -39,21 +39,29 @@ Parameters idrac_user (True, str, None) iDRAC username. + If the username is not provided, then the environment variable \ :envvar:`IDRAC\_USERNAME`\ is used. + + Example: export IDRAC\_USERNAME=username + idrac_password (True, str, None) iDRAC user password. + If the password is not provided, then the environment variable \ :envvar:`IDRAC\_PASSWORD`\ is used. + + Example: export IDRAC\_PASSWORD=password + idrac_port (optional, int, 443) iDRAC port. validate_certs (optional, bool, True) - If ``false``, the SSL certificates will not be validated. + If \ :literal:`false`\ , the SSL certificates will not be validated. - Configure ``false`` only on personally controlled sites where self-signed certificates are used. + Configure \ :literal:`false`\ only on personally controlled sites where self-signed certificates are used. - Prior to collection version ``5.0.0``, the *validate_certs* is ``false`` by default. + Prior to collection version \ :literal:`5.0.0`\ , the \ :emphasis:`validate\_certs`\ is \ :literal:`false`\ by default. ca_path (optional, path, None) @@ -72,8 +80,8 @@ Notes .. note:: - Run this module from a system that has direct access to Dell iDRAC. - - This module supports both IPv4 and IPv6 address for *idrac_ip*. - - This module supports ``check_mode``. + - This module supports both IPv4 and IPv6 address for \ :emphasis:`idrac\_ip`\ . + - This module supports \ :literal:`check\_mode`\ . diff --git a/ansible_collections/dellemc/openmanage/docs/modules/idrac_lifecycle_controller_jobs.rst b/ansible_collections/dellemc/openmanage/docs/modules/idrac_lifecycle_controller_jobs.rst index 385894eb6..e89af22ae 100644 --- a/ansible_collections/dellemc/openmanage/docs/modules/idrac_lifecycle_controller_jobs.rst +++ b/ansible_collections/dellemc/openmanage/docs/modules/idrac_lifecycle_controller_jobs.rst @@ -20,8 +20,8 @@ Requirements ------------ The below requirements are needed on the host that executes this module. -- omsdk >= 1.2.488 -- python >= 3.9.6 +- omsdk \>= 1.2.488 +- python \>= 3.9.6 @@ -41,21 +41,29 @@ Parameters idrac_user (True, str, None) iDRAC username. + If the username is not provided, then the environment variable \ :envvar:`IDRAC\_USERNAME`\ is used. + + Example: export IDRAC\_USERNAME=username + idrac_password (True, str, None) iDRAC user password. + If the password is not provided, then the environment variable \ :envvar:`IDRAC\_PASSWORD`\ is used. + + Example: export IDRAC\_PASSWORD=password + idrac_port (optional, int, 443) iDRAC port. validate_certs (optional, bool, True) - If ``false``, the SSL certificates will not be validated. + If \ :literal:`false`\ , the SSL certificates will not be validated. - Configure ``false`` only on personally controlled sites where self-signed certificates are used. + Configure \ :literal:`false`\ only on personally controlled sites where self-signed certificates are used. - Prior to collection version ``5.0.0``, the *validate_certs* is ``false`` by default. + Prior to collection version \ :literal:`5.0.0`\ , the \ :emphasis:`validate\_certs`\ is \ :literal:`false`\ by default. ca_path (optional, path, None) @@ -74,8 +82,8 @@ Notes .. note:: - Run this module from a system that has direct access to Dell iDRAC. - - This module supports both IPv4 and IPv6 address for *idrac_ip*. - - This module does not support ``check_mode``. + - This module supports both IPv4 and IPv6 address for \ :emphasis:`idrac\_ip`\ . + - This module does not support \ :literal:`check\_mode`\ . diff --git a/ansible_collections/dellemc/openmanage/docs/modules/idrac_lifecycle_controller_logs.rst b/ansible_collections/dellemc/openmanage/docs/modules/idrac_lifecycle_controller_logs.rst index 1b414e76e..e369d95ef 100644 --- a/ansible_collections/dellemc/openmanage/docs/modules/idrac_lifecycle_controller_logs.rst +++ b/ansible_collections/dellemc/openmanage/docs/modules/idrac_lifecycle_controller_logs.rst @@ -20,8 +20,8 @@ Requirements ------------ The below requirements are needed on the host that executes this module. -- omsdk >= 1.2.488 -- python >= 3.9.6 +- omsdk \>= 1.2.488 +- python \>= 3.9.6 @@ -35,7 +35,7 @@ Parameters share_user (optional, str, None) - Network share user in the format 'user@domain' or 'domain\user' if user is part of a domain else 'user'. This option is mandatory for CIFS Network Share. + Network share user in the format 'user@domain' or 'domain\\user' if user is part of a domain else 'user'. This option is mandatory for CIFS Network Share. share_password (optional, str, None) @@ -53,21 +53,29 @@ Parameters idrac_user (True, str, None) iDRAC username. + If the username is not provided, then the environment variable \ :envvar:`IDRAC\_USERNAME`\ is used. + + Example: export IDRAC\_USERNAME=username + idrac_password (True, str, None) iDRAC user password. + If the password is not provided, then the environment variable \ :envvar:`IDRAC\_PASSWORD`\ is used. + + Example: export IDRAC\_PASSWORD=password + idrac_port (optional, int, 443) iDRAC port. validate_certs (optional, bool, True) - If ``false``, the SSL certificates will not be validated. + If \ :literal:`false`\ , the SSL certificates will not be validated. - Configure ``false`` only on personally controlled sites where self-signed certificates are used. + Configure \ :literal:`false`\ only on personally controlled sites where self-signed certificates are used. - Prior to collection version ``5.0.0``, the *validate_certs* is ``false`` by default. + Prior to collection version \ :literal:`5.0.0`\ , the \ :emphasis:`validate\_certs`\ is \ :literal:`false`\ by default. ca_path (optional, path, None) @@ -85,11 +93,11 @@ Notes ----- .. note:: - - This module requires 'Administrator' privilege for *idrac_user*. + - This module requires 'Administrator' privilege for \ :emphasis:`idrac\_user`\ . - Exporting data to a local share is supported only on iDRAC9-based PowerEdge Servers and later. - Run this module from a system that has direct access to Dell iDRAC. - - This module supports both IPv4 and IPv6 address for *idrac_ip*. - - This module does not support ``check_mode``. + - This module supports both IPv4 and IPv6 address for \ :emphasis:`idrac\_ip`\ . + - This module does not support \ :literal:`check\_mode`\ . diff --git a/ansible_collections/dellemc/openmanage/docs/modules/idrac_lifecycle_controller_status_info.rst b/ansible_collections/dellemc/openmanage/docs/modules/idrac_lifecycle_controller_status_info.rst index 07ffe9446..63bc664ff 100644 --- a/ansible_collections/dellemc/openmanage/docs/modules/idrac_lifecycle_controller_status_info.rst +++ b/ansible_collections/dellemc/openmanage/docs/modules/idrac_lifecycle_controller_status_info.rst @@ -20,8 +20,8 @@ Requirements ------------ The below requirements are needed on the host that executes this module. -- omsdk >= 1.2.488 -- python >= 3.9.6 +- omsdk \>= 1.2.488 +- python \>= 3.9.6 @@ -35,21 +35,29 @@ Parameters idrac_user (True, str, None) iDRAC username. + If the username is not provided, then the environment variable \ :envvar:`IDRAC\_USERNAME`\ is used. + + Example: export IDRAC\_USERNAME=username + idrac_password (True, str, None) iDRAC user password. + If the password is not provided, then the environment variable \ :envvar:`IDRAC\_PASSWORD`\ is used. + + Example: export IDRAC\_PASSWORD=password + idrac_port (optional, int, 443) iDRAC port. validate_certs (optional, bool, True) - If ``false``, the SSL certificates will not be validated. + If \ :literal:`false`\ , the SSL certificates will not be validated. - Configure ``false`` only on personally controlled sites where self-signed certificates are used. + Configure \ :literal:`false`\ only on personally controlled sites where self-signed certificates are used. - Prior to collection version ``5.0.0``, the *validate_certs* is ``false`` by default. + Prior to collection version \ :literal:`5.0.0`\ , the \ :emphasis:`validate\_certs`\ is \ :literal:`false`\ by default. ca_path (optional, path, None) @@ -68,8 +76,8 @@ Notes .. note:: - Run this module from a system that has direct access to Dell iDRAC. - - This module supports both IPv4 and IPv6 address for *idrac_ip*. - - This module supports ``check_mode``. + - This module supports both IPv4 and IPv6 address for \ :emphasis:`idrac\_ip`\ . + - This module supports \ :literal:`check\_mode`\ . diff --git a/ansible_collections/dellemc/openmanage/docs/modules/idrac_network.rst b/ansible_collections/dellemc/openmanage/docs/modules/idrac_network.rst index c7bb593ae..3c631862b 100644 --- a/ansible_collections/dellemc/openmanage/docs/modules/idrac_network.rst +++ b/ansible_collections/dellemc/openmanage/docs/modules/idrac_network.rst @@ -20,8 +20,8 @@ Requirements ------------ The below requirements are needed on the host that executes this module. -- omsdk >= 1.2.488 -- python >= 3.9.6 +- omsdk \>= 1.2.488 +- python \>= 3.9.6 @@ -35,7 +35,7 @@ Parameters share_user (optional, str, None) - (deprecated)Network share user name. Use the format 'user@domain' or 'domain\user' if user is part of a domain. This option is mandatory for CIFS share. + (deprecated)Network share user name. Use the format 'user@domain' or 'domain\\user' if user is part of a domain. This option is mandatory for CIFS share. This option is deprecated and will be removed in the later version. @@ -151,21 +151,29 @@ Parameters idrac_user (True, str, None) iDRAC username. + If the username is not provided, then the environment variable \ :envvar:`IDRAC\_USERNAME`\ is used. + + Example: export IDRAC\_USERNAME=username + idrac_password (True, str, None) iDRAC user password. + If the password is not provided, then the environment variable \ :envvar:`IDRAC\_PASSWORD`\ is used. + + Example: export IDRAC\_PASSWORD=password + idrac_port (optional, int, 443) iDRAC port. validate_certs (optional, bool, True) - If ``false``, the SSL certificates will not be validated. + If \ :literal:`false`\ , the SSL certificates will not be validated. - Configure ``false`` only on personally controlled sites where self-signed certificates are used. + Configure \ :literal:`false`\ only on personally controlled sites where self-signed certificates are used. - Prior to collection version ``5.0.0``, the *validate_certs* is ``false`` by default. + Prior to collection version \ :literal:`5.0.0`\ , the \ :emphasis:`validate\_certs`\ is \ :literal:`false`\ by default. ca_path (optional, path, None) @@ -183,10 +191,10 @@ Notes ----- .. note:: - - This module requires 'Administrator' privilege for *idrac_user*. + - This module requires 'Administrator' privilege for \ :emphasis:`idrac\_user`\ . - Run this module from a system that has direct access to Dell iDRAC. - - This module supports both IPv4 and IPv6 address for *idrac_ip*. - - This module supports ``check_mode``. + - This module supports both IPv4 and IPv6 address for \ :emphasis:`idrac\_ip`\ . + - This module supports \ :literal:`check\_mode`\ . diff --git a/ansible_collections/dellemc/openmanage/docs/modules/idrac_network_attributes.rst b/ansible_collections/dellemc/openmanage/docs/modules/idrac_network_attributes.rst index fa0e89cae..df9fb1be0 100644 --- a/ansible_collections/dellemc/openmanage/docs/modules/idrac_network_attributes.rst +++ b/ansible_collections/dellemc/openmanage/docs/modules/idrac_network_attributes.rst @@ -20,7 +20,7 @@ Requirements ------------ The below requirements are needed on the host that executes this module. -- python >= 3.9.6 +- python \>= 3.9.6 @@ -40,17 +40,17 @@ Parameters network_attributes (optional, dict, None) - Dictionary of network attributes and value. To view the list of attributes and its structure, see the below API https://*idrac_ip*/redfish/v1/Systems/System.Embedded.1/NetworkAdapters/<network_id>/NetworkDeviceFunctions/ <network_port_id>/Settings and https://<idrac_ip>/redfish/v1/Schemas/NetworkDeviceFunction.v1_8_0.json. + Dictionary of network attributes and value. To view the list of attributes and its structure, see the below API \ https://I(idrac_ip\ /redfish/v1/Systems/System.Embedded.1/NetworkAdapters/\<network\_adapter\_id\>/NetworkDeviceFunctions/ \<network\_device\_function\_id\>/Settings) and \ https://%3Cidrac_ip%3E/redfish/v1/Schemas/NetworkDeviceFunction.v1_8_0.json\ . - *network_attributes* is mutually exclusive with *oem_network_attributes*. + \ :emphasis:`network\_attributes`\ is mutually exclusive with \ :emphasis:`oem\_network\_attributes`\ . oem_network_attributes (optional, dict, None) - The attributes must be part of the Integrated Dell Remote Access Controller Attribute Registry. To view the list of attributes in Attribute Registry for iDRAC9 and newer versions. For more information, see, https://*idrac_ip*/redfish/v1/Chassis/System.Embedded.1/NetworkAdapters/<network_id>/NetworkDeviceFunctions/ <network_port_id>/Oem/Dell/DellNetworkAttributes/<network_port_id> and https://*idrac_ip*/redfish/v1/Registries/NetworkAttributesRegistry_<network_port_id>/ NetworkAttributesRegistry_network_port_id.json. + The attributes must be part of the Integrated Dell Remote Access Controller Attribute Registry. To view the list of attributes in Attribute Registry for iDRAC9 and newer versions. For more information, see, \ https://I(idrac_ip\ /redfish/v1/Chassis/System.Embedded.1/NetworkAdapters/\<network\_adapter\_id\>/NetworkDeviceFunctions/ \<network\_device\_function\_id\>/Oem/Dell/DellNetworkAttributes/\<network\_device\_function\_id\>) and \ https://I(idrac_ip\ /redfish/v1/Registries/NetworkAttributesRegistry\_\<network\_device\_function\_id\>/ NetworkAttributesRegistry\_network\_port\_id.json). For iDRAC8 based servers, derive the network attribute name from Server Configuration Profile. - *oem_network_attributes* is mutually exclusive with *network_attributes*. + \ :emphasis:`oem\_network\_attributes`\ is mutually exclusive with \ :emphasis:`network\_attributes`\ . resource_id (optional, str, None) @@ -62,43 +62,43 @@ Parameters clear_pending (optional, bool, False) This parameter allows you to clear all the pending OEM network attributes changes. - ``false`` does not perform any operation. + \ :literal:`false`\ does not perform any operation. - ``true`` discards any pending changes to network attributes, or if a job is in scheduled state, removes the job. + \ :literal:`true`\ discards any pending changes to network attributes, or if a job is in scheduled state, removes the job. - *apply_time* value will be ignored and will not have any impact for *clear_pending* operation. + \ :emphasis:`apply\_time`\ value will be ignored and will not have any impact for \ :emphasis:`clear\_pending`\ operation. This operation is not supported for iDRAC8. apply_time (True, str, None) - Apply time of the *network_attributes* and *oem_network_attributes*. + Apply time of the \ :emphasis:`network\_attributes`\ and \ :emphasis:`oem\_network\_attributes`\ . - This is applicable only to *network_attributes* and *oem_network_attributes*. + This is applicable only to \ :emphasis:`network\_attributes`\ and \ :emphasis:`oem\_network\_attributes`\ . - ``Immediate`` allows the user to immediately reboot the host and apply the changes. *job_wait* is applicable. This is applicable for *oem_network_attributes* and *job_wait*. + \ :literal:`Immediate`\ allows the user to immediately reboot the host and apply the changes. \ :emphasis:`job\_wait`\ is applicable. This is applicable for \ :emphasis:`oem\_network\_attributes`\ and \ :emphasis:`job\_wait`\ . - ``OnReset`` allows the user to apply the changes on the next reboot of the host server. + \ :literal:`OnReset`\ allows the user to apply the changes on the next reboot of the host server. - ``AtMaintenanceWindowStart`` allows the user to apply at the start of a maintenance window as specified in *maintenance_window*. A reboot job is scheduled. + \ :literal:`AtMaintenanceWindowStart`\ allows the user to apply at the start of a maintenance window as specified in \ :emphasis:`maintenance\_window`\ . A reboot job is scheduled. - ``InMaintenanceWindowOnReset`` allows to apply after a manual reset but within the maintenance window as specified in *maintenance_window*. + \ :literal:`InMaintenanceWindowOnReset`\ allows to apply after a manual reset but within the maintenance window as specified in \ :emphasis:`maintenance\_window`\ . - This is not applicable for iDRAC8 and value will be ignored and will not have any impact for configuring *oem_network_attributes*. + This is not applicable for iDRAC8 and value will be ignored and will not have any impact for configuring \ :emphasis:`oem\_network\_attributes`\ . maintenance_window (optional, dict, None) This option allows you to schedule the maintenance window. - This is required when *apply_time* is ``AtMaintenanceWindowStart`` or ``InMaintenanceWindowOnReset``. + This is required when \ :emphasis:`apply\_time`\ is \ :literal:`AtMaintenanceWindowStart`\ or \ :literal:`InMaintenanceWindowOnReset`\ . start_time (True, str, None) The start time for the maintenance window to be scheduled. - The format is YYYY-MM-DDThh:mm:ss<offset> + The format is YYYY-MM-DDThh:mm:ss\<offset\> - <offset> is the time offset from UTC that the current timezone set in iDRAC in the format: +05:30 for IST. + \<offset\> is the time offset from UTC that the current timezone set in iDRAC in the format: +05:30 for IST. duration (True, int, None) @@ -109,37 +109,53 @@ Parameters job_wait (optional, bool, True) Provides the option to wait for job completion. - This is applicable when *apply_time* is ``Immediate`` for *oem_network_attributes*. + This is applicable when \ :emphasis:`apply\_time`\ is \ :literal:`Immediate`\ for \ :emphasis:`oem\_network\_attributes`\ . job_wait_timeout (optional, int, 1200) - The maximum wait time of *job_wait* in seconds. The job is tracked only for this duration. + The maximum wait time of \ :emphasis:`job\_wait`\ in seconds. The job is tracked only for this duration. - This option is applicable when *job_wait* is ``true``. + This option is applicable when \ :emphasis:`job\_wait`\ is \ :literal:`true`\ . idrac_ip (True, str, None) iDRAC IP Address. - idrac_user (True, str, None) + idrac_user (False, str, None) iDRAC username. + If the username is not provided, then the environment variable \ :envvar:`IDRAC\_USERNAME`\ is used. - idrac_password (True, str, None) + Example: export IDRAC\_USERNAME=username + + + idrac_password (False, str, None) iDRAC user password. + If the password is not provided, then the environment variable \ :envvar:`IDRAC\_PASSWORD`\ is used. + + Example: export IDRAC\_PASSWORD=password + + + x_auth_token (False, str, None) + Authentication token. + + If the x\_auth\_token is not provided, then the environment variable \ :envvar:`IDRAC\_X\_AUTH\_TOKEN`\ is used. + + Example: export IDRAC\_X\_AUTH\_TOKEN=x\_auth\_token + idrac_port (optional, int, 443) iDRAC port. validate_certs (optional, bool, True) - If ``false``, the SSL certificates will not be validated. + If \ :literal:`false`\ , the SSL certificates will not be validated. - Configure ``false`` only on personally controlled sites where self-signed certificates are used. + Configure \ :literal:`false`\ only on personally controlled sites where self-signed certificates are used. - Prior to collection version ``5.0.0``, the *validate_certs* is ``false`` by default. + Prior to collection version \ :literal:`5.0.0`\ , the \ :emphasis:`validate\_certs`\ is \ :literal:`false`\ by default. ca_path (optional, path, None) @@ -159,7 +175,7 @@ Notes .. note:: - Run this module from a system that has direct access to Dell iDRAC. - This module supports both IPv4 and IPv6 address. - - This module supports ``check_mode``. + - This module supports \ :literal:`check\_mode`\ . @@ -176,8 +192,8 @@ Examples idrac_ip: "192.168.0.1" idrac_user: "user_name" idrac_password: "user_password" - network_id: "NIC.Integrated.1" - network_port_id: "NIC.Integrated.1-1-1" + network_adapter_id: "NIC.Integrated.1" + network_device_function_id: "NIC.Integrated.1-1-1" apply_time: "Immediate" oem_network_attributes: BannerMessageTimeout: "4" @@ -187,8 +203,8 @@ Examples idrac_ip: "192.168.0.1" idrac_user: "user_name" idrac_password: "user_password" - network_id: NIC.Integrated.1 - network_port_id: "NIC.Integrated.1-1-1" + network_adapter_id: NIC.Integrated.1 + network_device_function_id: "NIC.Integrated.1-1-1" oem_network_attributes: BannerMessageTimeout: "4" apply_time: OnReset @@ -198,8 +214,8 @@ Examples idrac_ip: "192.168.0.1" idrac_user: "user_name" idrac_password: "user_password" - network_id: NIC.Integrated.1 - network_port_id: "NIC.Integrated.1-1-1" + network_adapter_id: NIC.Integrated.1 + network_device_function_id: "NIC.Integrated.1-1-1" oem_network_attributes: BannerMessageTimeout: "4" apply_time: AtMaintenanceWindowStart @@ -212,8 +228,8 @@ Examples idrac_ip: "192.168.0.1" idrac_user: "user_name" idrac_password: "user_password" - network_id: NIC.Integrated.1 - network_port_id: "NIC.Integrated.1-1-1" + network_adapter_id: NIC.Integrated.1 + network_device_function_id: "NIC.Integrated.1-1-1" apply_time: "Immediate" clear_pending: true @@ -222,8 +238,8 @@ Examples idrac_ip: "192.168.0.1" idrac_user: "user_name" idrac_password: "user_password" - network_id: NIC.Integrated.1 - network_port_id: "NIC.Integrated.1-1-1" + network_adapter_id: NIC.Integrated.1 + network_device_function_id: "NIC.Integrated.1-1-1" apply_time: "Immediate" clear_pending: true oem_network_attributes: @@ -234,8 +250,8 @@ Examples idrac_ip: "192.168.0.1" idrac_user: "user_name" idrac_password: "user_password" - network_id: NIC.Integrated.1 - network_port_id: "NIC.Integrated.1-1-1" + network_adapter_id: NIC.Integrated.1 + network_device_function_id: "NIC.Integrated.1-1-1" apply_time: "Immediate" oem_network_attributes: LnkSpeed: "10MbpsHalf" @@ -249,8 +265,8 @@ Examples idrac_ip: "192.168.0.1" idrac_user: "user_name" idrac_password: "user_password" - network_id: NIC.Integrated.1 - network_port_id: "NIC.Integrated.1-1-1" + network_adapter_id: NIC.Integrated.1 + network_device_function_id: "NIC.Integrated.1-1-1" apply_time: OnReset network_attributes: Ethernet: @@ -262,8 +278,8 @@ Examples idrac_ip: "192.168.0.1" idrac_user: "user_name" idrac_password: "user_password" - network_id: NIC.Integrated.1 - network_port_id: "NIC.Integrated.1-1-1" + network_adapter_id: NIC.Integrated.1 + network_device_function_id: "NIC.Integrated.1-1-1" network_attributes: Ethernet: VLAN: @@ -275,8 +291,8 @@ Examples idrac_ip: "192.168.0.1" idrac_user: "user_name" idrac_password: "user_password" - network_id: NIC.Integrated.1 - network_port_id: "NIC.Integrated.1-1-1" + network_adapter_id: NIC.Integrated.1 + network_device_function_id: "NIC.Integrated.1-1-1" network_attributes: iSCSIBoot: InitiatorIPAddress: 1.0.0.1 @@ -290,8 +306,8 @@ Examples idrac_ip: "192.168.0.1" idrac_user: "user_name" idrac_password: "user_password" - network_id: NIC.Integrated.1 - network_port_id: "NIC.Integrated.1-1-1" + network_adapter_id: NIC.Integrated.1 + network_device_function_id: "NIC.Integrated.1-1-1" network_attributes: Ethernet: VLAN: diff --git a/ansible_collections/dellemc/openmanage/docs/modules/idrac_os_deployment.rst b/ansible_collections/dellemc/openmanage/docs/modules/idrac_os_deployment.rst index c5b526a87..5a7f2ced8 100644 --- a/ansible_collections/dellemc/openmanage/docs/modules/idrac_os_deployment.rst +++ b/ansible_collections/dellemc/openmanage/docs/modules/idrac_os_deployment.rst @@ -20,8 +20,8 @@ Requirements ------------ The below requirements are needed on the host that executes this module. -- omsdk >= 1.2.488 -- python >= 3.9.6 +- omsdk \>= 1.2.488 +- python \>= 3.9.6 @@ -33,7 +33,7 @@ Parameters share_user (optional, str, None) - Network share user in the format 'user@domain' or 'domain\\user' if user is part of a domain else 'user'. This option is mandatory for CIFS Network Share. + Network share user in the format 'user@domain' or 'domain\\\\user' if user is part of a domain else 'user'. This option is mandatory for CIFS Network Share. share_password (optional, str, None) @@ -55,21 +55,29 @@ Parameters idrac_user (True, str, None) iDRAC username. + If the username is not provided, then the environment variable \ :envvar:`IDRAC\_USERNAME`\ is used. + + Example: export IDRAC\_USERNAME=username + idrac_password (True, str, None) iDRAC user password. + If the password is not provided, then the environment variable \ :envvar:`IDRAC\_PASSWORD`\ is used. + + Example: export IDRAC\_PASSWORD=password + idrac_port (optional, int, 443) iDRAC port. validate_certs (optional, bool, True) - If ``false``, the SSL certificates will not be validated. + If \ :literal:`false`\ , the SSL certificates will not be validated. - Configure ``false`` only on personally controlled sites where self-signed certificates are used. + Configure \ :literal:`false`\ only on personally controlled sites where self-signed certificates are used. - Prior to collection version ``5.0.0``, the *validate_certs* is ``false`` by default. + Prior to collection version \ :literal:`5.0.0`\ , the \ :emphasis:`validate\_certs`\ is \ :literal:`false`\ by default. ca_path (optional, path, None) @@ -88,8 +96,8 @@ Notes .. note:: - Run this module from a system that has direct access to Dell iDRAC. - - This module supports both IPv4 and IPv6 address for *idrac_ip*. - - This module does not support ``check_mode``. + - This module supports both IPv4 and IPv6 address for \ :emphasis:`idrac\_ip`\ . + - This module does not support \ :literal:`check\_mode`\ . diff --git a/ansible_collections/dellemc/openmanage/docs/modules/idrac_redfish_storage_controller.rst b/ansible_collections/dellemc/openmanage/docs/modules/idrac_redfish_storage_controller.rst index c3592acc6..e7d372417 100644 --- a/ansible_collections/dellemc/openmanage/docs/modules/idrac_redfish_storage_controller.rst +++ b/ansible_collections/dellemc/openmanage/docs/modules/idrac_redfish_storage_controller.rst @@ -20,7 +20,7 @@ Requirements ------------ The below requirements are needed on the host that executes this module. -- python >= 3.9.6 +- python \>= 3.9.6 @@ -30,55 +30,55 @@ Parameters command (optional, str, None) These actions may require a system reset, depending on the capabilities of the controller. - ``ResetConfig`` - Deletes all the virtual disks and unassigns all hot spares on physical disks. *controller_id* is required for this operation. + \ :literal:`ResetConfig`\ - Deletes all the virtual disks and unassigns all hot spares on physical disks. \ :emphasis:`controller\_id`\ is required for this operation. - ``AssignSpare`` - Assigns a physical disk as a dedicated or global hot spare for a virtual disk. *target* is required for this operation. + \ :literal:`AssignSpare`\ - Assigns a physical disk as a dedicated or global hot spare for a virtual disk. \ :emphasis:`target`\ is required for this operation. - ``SetControllerKey`` - Sets the key on controllers, which is used to encrypt the drives in Local Key Management(LKM). *controller_id*, *key*, and *key_id* are required for this operation. + \ :literal:`SetControllerKey`\ - Sets the key on controllers, which is used to encrypt the drives in Local Key Management(LKM). \ :emphasis:`controller\_id`\ , \ :emphasis:`key`\ , and \ :emphasis:`key\_id`\ are required for this operation. - ``RemoveControllerKey`` - Deletes the encryption key on the controller. *controller_id* is required for this operation. + \ :literal:`RemoveControllerKey`\ - Deletes the encryption key on the controller. \ :emphasis:`controller\_id`\ is required for this operation. - ``ReKey`` - Resets the key on the controller and it always reports as changes found when check mode is enabled. *controller_id*, *old_key*, *key_id*, and *key* is required for this operation. + \ :literal:`ReKey`\ - Resets the key on the controller and it always reports as changes found when check mode is enabled. \ :emphasis:`controller\_id`\ , \ :emphasis:`old\_key`\ , \ :emphasis:`key\_id`\ , and \ :emphasis:`key`\ is required for this operation. - ``UnassignSpare`` - To unassign the Global or Dedicated hot spare. *target* is required for this operation. + \ :literal:`UnassignSpare`\ - To unassign the Global or Dedicated hot spare. \ :emphasis:`target`\ is required for this operation. - ``EnableControllerEncryption`` - To enable Local Key Management (LKM) or Secure Enterprise Key Manager (SEKM) on controllers that support encryption of the drives. *controller_id*, *key*, and *key_id* are required for this operation. + \ :literal:`EnableControllerEncryption`\ - To enable Local Key Management (LKM) or Secure Enterprise Key Manager (SEKM) on controllers that support encryption of the drives. \ :emphasis:`controller\_id`\ , \ :emphasis:`key`\ , and \ :emphasis:`key\_id`\ are required for this operation. - ``BlinkTarget`` - Blinks the target virtual drive or physical disk and it always reports as changes found when check mode is enabled. *target* or *volume_id* is required for this operation. + \ :literal:`BlinkTarget`\ - Blinks the target virtual drive or physical disk and it always reports as changes found when check mode is enabled. \ :emphasis:`target`\ or \ :emphasis:`volume\_id`\ is required for this operation. - ``UnBlinkTarget`` - Unblink the target virtual drive or physical disk and and it always reports as changes found when check mode is enabled. *target* or *volume_id* is required for this operation. + \ :literal:`UnBlinkTarget`\ - Unblink the target virtual drive or physical disk and and it always reports as changes found when check mode is enabled. \ :emphasis:`target`\ or \ :emphasis:`volume\_id`\ is required for this operation. - ``ConvertToRAID`` - Converts the disk form non-Raid to Raid. *target* is required for this operation. + \ :literal:`ConvertToRAID`\ - Converts the disk form non-Raid to Raid. \ :emphasis:`target`\ is required for this operation. - ``ConvertToNonRAID`` - Converts the disk form Raid to non-Raid. *target* is required for this operation. + \ :literal:`ConvertToNonRAID`\ - Converts the disk form Raid to non-Raid. \ :emphasis:`target`\ is required for this operation. - ``ChangePDStateToOnline`` - To set the disk status to online. *target* is required for this operation. + \ :literal:`ChangePDStateToOnline`\ - To set the disk status to online. \ :emphasis:`target`\ is required for this operation. - ``ChangePDStateToOffline`` - To set the disk status to offline. *target* is required for this operation. + \ :literal:`ChangePDStateToOffline`\ - To set the disk status to offline. \ :emphasis:`target`\ is required for this operation. - ``LockVirtualDisk`` - To encrypt the virtual disk. *volume_id* is required for this operation. + \ :literal:`LockVirtualDisk`\ - To encrypt the virtual disk. \ :emphasis:`volume\_id`\ is required for this operation. - ``OnlineCapacityExpansion`` - To expand the size of virtual disk. *volume_id*, and *target* or *size* is required for this operation. + \ :literal:`OnlineCapacityExpansion`\ - To expand the size of virtual disk. \ :emphasis:`volume\_id`\ , and \ :emphasis:`target`\ or \ :emphasis:`size`\ is required for this operation. target (optional, list, None) Fully Qualified Device Descriptor (FQDD) of the target physical drive. - This is mandatory when *command* is ``AssignSpare``, ``UnassisgnSpare``, ``ChangePDStateToOnline``, ``ChangePDStateToOffline``, ``ConvertToRAID``, or ``ConvertToNonRAID``. + This is mandatory when \ :emphasis:`command`\ is \ :literal:`AssignSpare`\ , \ :literal:`UnassisgnSpare`\ , \ :literal:`ChangePDStateToOnline`\ , \ :literal:`ChangePDStateToOffline`\ , \ :literal:`ConvertToRAID`\ , or \ :literal:`ConvertToNonRAID`\ . - If *volume_id* is not specified or empty, this physical drive will be assigned as a global hot spare when *command* is ``AssignSpare``. + If \ :emphasis:`volume\_id`\ is not specified or empty, this physical drive will be assigned as a global hot spare when \ :emphasis:`command`\ is \ :literal:`AssignSpare`\ . - When *command* is ``OnlineCapacityExpansion``, then *target* is mutually exclusive with *size*. + When \ :emphasis:`command`\ is \ :literal:`OnlineCapacityExpansion`\ , then \ :emphasis:`target`\ is mutually exclusive with \ :emphasis:`size`\ . - Notes: Global or Dedicated hot spare can be assigned only once for a physical disk, Re-assign cannot be done when *command* is ``AssignSpare``. + Notes: Global or Dedicated hot spare can be assigned only once for a physical disk, Re-assign cannot be done when \ :emphasis:`command`\ is \ :literal:`AssignSpare`\ . volume_id (optional, list, None) Fully Qualified Device Descriptor (FQDD) of the volume. - Applicable if *command* is ``AssignSpare``, ``BlinkTarget``, ``UnBlinkTarget`` or ``LockVirtualDisk``. + Applicable if \ :emphasis:`command`\ is \ :literal:`AssignSpare`\ , \ :literal:`BlinkTarget`\ , \ :literal:`UnBlinkTarget`\ or \ :literal:`LockVirtualDisk`\ . - *volume_id* or *target* is required when the *command* is ``BlinkTarget`` or ``UnBlinkTarget``, if both are specified *target* is considered. + \ :emphasis:`volume\_id`\ or \ :emphasis:`target`\ is required when the \ :emphasis:`command`\ is \ :literal:`BlinkTarget`\ or \ :literal:`UnBlinkTarget`\ , if both are specified \ :emphasis:`target`\ is considered. To know the number of volumes to which a hot spare can be assigned, refer iDRAC Redfish API documentation. @@ -86,15 +86,15 @@ Parameters controller_id (optional, str, None) Fully Qualified Device Descriptor (FQDD) of the storage controller. For example-'RAID.Slot.1-1'. - This option is mandatory when *command* is ``ResetConfig``, ``SetControllerKey``, ``RemoveControllerKey``, ``ReKey``, or ``EnableControllerEncryption``. + This option is mandatory when \ :emphasis:`command`\ is \ :literal:`ResetConfig`\ , \ :literal:`SetControllerKey`\ , \ :literal:`RemoveControllerKey`\ , \ :literal:`ReKey`\ , or \ :literal:`EnableControllerEncryption`\ . - This option is mandatory for *attributes*. + This option is mandatory for \ :emphasis:`attributes`\ . key (optional, str, None) A new security key passphrase that the encryption-capable controller uses to create the encryption key. The controller uses the encryption key to lock or unlock access to the Self-Encrypting Drive (SED). Only one encryption key can be created for each controller. - This is mandatory when *command* is ``SetControllerKey``, ``ReKey``, or ``EnableControllerEncryption`` and when *mode* is ``LKM``. + This is mandatory when \ :emphasis:`command`\ is \ :literal:`SetControllerKey`\ , \ :literal:`ReKey`\ , or \ :literal:`EnableControllerEncryption`\ and when \ :emphasis:`mode`\ is \ :literal:`LKM`\ . The length of the key can be a maximum of 32 characters in length, where the expanded form of the special character is counted as a single character. @@ -104,35 +104,35 @@ Parameters key_id (optional, str, None) This is a user supplied text label associated with the passphrase. - This is mandatory when *command* is ``SetControllerKey``, ``ReKey``, or ``EnableControllerEncryption`` and when *mode* is ``LKM``. + This is mandatory when \ :emphasis:`command`\ is \ :literal:`SetControllerKey`\ , \ :literal:`ReKey`\ , or \ :literal:`EnableControllerEncryption`\ and when \ :emphasis:`mode`\ is \ :literal:`LKM`\ . - The length of *key_id* can be a maximum of 32 characters in length and should not have any spaces. + The length of \ :emphasis:`key\_id`\ can be a maximum of 32 characters in length and should not have any spaces. old_key (optional, str, None) Security key passphrase used by the encryption-capable controller. - This option is mandatory when *command* is ``ReKey`` and *mode* is ``LKM``. + This option is mandatory when \ :emphasis:`command`\ is \ :literal:`ReKey`\ and \ :emphasis:`mode`\ is \ :literal:`LKM`\ . mode (optional, str, LKM) Encryption mode of the encryption capable controller. - This option is applicable only when *command* is ``ReKey`` or ``EnableControllerEncryption``. + This option is applicable only when \ :emphasis:`command`\ is \ :literal:`ReKey`\ or \ :literal:`EnableControllerEncryption`\ . - ``SEKM`` requires secure enterprise key manager license on the iDRAC. + \ :literal:`SEKM`\ requires secure enterprise key manager license on the iDRAC. - ``LKM`` to choose mode as local key mode. + \ :literal:`LKM`\ to choose mode as local key mode. size (optional, int, None) Capacity of the virtual disk to be expanded in MB. - Check mode and Idempotency is not supported for *size*. + Check mode and Idempotency is not supported for \ :emphasis:`size`\ . Minimum Online Capacity Expansion size must be greater than 100 MB of the current size. - When *command* is ``OnlineCapacityExpansion``, then *size* is mutually exclusive with *target*. + When \ :emphasis:`command`\ is \ :literal:`OnlineCapacityExpansion`\ , then \ :emphasis:`size`\ is mutually exclusive with \ :emphasis:`target`\ . attributes (optional, dict, None) @@ -140,41 +140,41 @@ Parameters This feature is only supported for iDRAC9 with firmware version 6.00.00.00 and above - *controller_id* is required for this operation. + \ :emphasis:`controller\_id`\ is required for this operation. - *apply_time* and *maintenance_window* is applicable for *attributes*. + \ :emphasis:`apply\_time`\ and \ :emphasis:`maintenance\_window`\ is applicable for \ :emphasis:`attributes`\ . - *attributes* is mutually exclusive with *command*. + \ :emphasis:`attributes`\ is mutually exclusive with \ :emphasis:`command`\ . - Use https://*idrac_ip*/redfish/v1/Schemas/DellOemStorageController.json to view the attributes. + Use \ https://I(idrac_ip\ /redfish/v1/Schemas/DellOemStorageController.json) to view the attributes. apply_time (optional, str, Immediate) - Apply time of the *attributes*. + Apply time of the \ :emphasis:`attributes`\ . - This is applicable only to *attributes*. + This is applicable only to \ :emphasis:`attributes`\ . - ``Immediate`` Allows the user to immediately reboot the host and apply the changes. *job_wait* is applicable. + \ :literal:`Immediate`\ Allows the user to immediately reboot the host and apply the changes. \ :emphasis:`job\_wait`\ is applicable. - ``OnReset`` Allows the user to apply the changes on the next reboot of the host server. + \ :literal:`OnReset`\ Allows the user to apply the changes on the next reboot of the host server. - ``AtMaintenanceWindowStart`` Allows the user to apply at the start of a maintenance window as specified in *maintenance_window*. + \ :literal:`AtMaintenanceWindowStart`\ Allows the user to apply at the start of a maintenance window as specified in \ :emphasis:`maintenance\_window`\ . - ``InMaintenanceWindowOnReset`` Allows to apply after a manual reset but within the maintenance window as specified in *maintenance_window*. + \ :literal:`InMaintenanceWindowOnReset`\ Allows to apply after a manual reset but within the maintenance window as specified in \ :emphasis:`maintenance\_window`\ . maintenance_window (optional, dict, None) Option to schedule the maintenance window. - This is required when *apply_time* is ``AtMaintenanceWindowStart`` or ``InMaintenanceWindowOnReset``. + This is required when \ :emphasis:`apply\_time`\ is \ :literal:`AtMaintenanceWindowStart`\ or \ :literal:`InMaintenanceWindowOnReset`\ . start_time (True, str, None) The start time for the maintenance window to be scheduled. - The format is YYYY-MM-DDThh:mm:ss<offset> + The format is YYYY-MM-DDThh:mm:ss\<offset\> - <offset> is the time offset from UTC that the current timezone set in iDRAC in the format: +05:30 for IST. + \<offset\> is the time offset from UTC that the current timezone set in iDRAC in the format: +05:30 for IST. duration (optional, int, 900) @@ -185,33 +185,49 @@ Parameters job_wait (optional, bool, False) Provides the option if the module has to wait for the job to be completed. - This is applicable for *attributes* when *apply_time* is ``Immediate``. + This is applicable for \ :emphasis:`attributes`\ when \ :emphasis:`apply\_time`\ is \ :literal:`Immediate`\ . job_wait_timeout (optional, int, 120) The maximum wait time of job completion in seconds before the job tracking is stopped. - This option is applicable when *job_wait* is ``true``. + This option is applicable when \ :emphasis:`job\_wait`\ is \ :literal:`true`\ . baseuri (True, str, None) - IP address of the target out-of-band controller. For example- <ipaddress>:<port>. + IP address of the target out-of-band controller. For example- \<ipaddress\>:\<port\>. - username (True, str, None) + username (False, str, None) Username of the target out-of-band controller. + If the username is not provided, then the environment variable \ :envvar:`IDRAC\_USERNAME`\ is used. - password (True, str, None) + Example: export IDRAC\_USERNAME=username + + + password (False, str, None) Password of the target out-of-band controller. + If the password is not provided, then the environment variable \ :envvar:`IDRAC\_PASSWORD`\ is used. + + Example: export IDRAC\_PASSWORD=password + + + x_auth_token (False, str, None) + Authentication token. + + If the x\_auth\_token is not provided, then the environment variable \ :envvar:`IDRAC\_X\_AUTH\_TOKEN`\ is used. + + Example: export IDRAC\_X\_AUTH\_TOKEN=x\_auth\_token + validate_certs (optional, bool, True) - If ``false``, the SSL certificates will not be validated. + If \ :literal:`false`\ , the SSL certificates will not be validated. - Configure ``false`` only on personally controlled sites where self-signed certificates are used. + Configure \ :literal:`false`\ only on personally controlled sites where self-signed certificates are used. - Prior to collection version ``5.0.0``, the *validate_certs* is ``false`` by default. + Prior to collection version \ :literal:`5.0.0`\ , the \ :emphasis:`validate\_certs`\ is \ :literal:`false`\ by default. ca_path (optional, path, None) @@ -231,8 +247,8 @@ Notes .. note:: - Run this module from a system that has direct access to Dell iDRAC. - This module is supported on iDRAC9. - - This module always reports as changes found when *command* is ``ReKey``, ``BlinkTarget``, and ``UnBlinkTarget``. - - This module supports ``check_mode``. + - This module always reports as changes found when \ :emphasis:`command`\ is \ :literal:`ReKey`\ , \ :literal:`BlinkTarget`\ , and \ :literal:`UnBlinkTarget`\ . + - This module supports \ :literal:`check\_mode`\ . diff --git a/ansible_collections/dellemc/openmanage/docs/modules/idrac_reset.rst b/ansible_collections/dellemc/openmanage/docs/modules/idrac_reset.rst index 85ec3ca3c..57aed7dd1 100644 --- a/ansible_collections/dellemc/openmanage/docs/modules/idrac_reset.rst +++ b/ansible_collections/dellemc/openmanage/docs/modules/idrac_reset.rst @@ -62,7 +62,7 @@ Parameters job_wait_timeout (optional, int, 600) Time in seconds to wait for job completion. - This is applicable when \ :emphasis:`job\_wait`\ is \ :literal:`true`\ . + This is applicable when \ :emphasis:`wait\_for\_idrac`\ is \ :literal:`true`\ . force_reset (optional, bool, False) @@ -75,22 +75,30 @@ Parameters iDRAC IP Address. - idrac_user (True, str, None) + idrac_user (False, str, None) iDRAC username. - If the username is not provided, then the environment variable \ :literal:`IDRAC\_USERNAME`\ is used. + If the username is not provided, then the environment variable \ :envvar:`IDRAC\_USERNAME`\ is used. Example: export IDRAC\_USERNAME=username - idrac_password (True, str, None) + idrac_password (False, str, None) iDRAC user password. - If the password is not provided, then the environment variable \ :literal:`IDRAC\_PASSWORD`\ is used. + If the password is not provided, then the environment variable \ :envvar:`IDRAC\_PASSWORD`\ is used. Example: export IDRAC\_PASSWORD=password + x_auth_token (False, str, None) + Authentication token. + + If the x\_auth\_token is not provided, then the environment variable \ :envvar:`IDRAC\_X\_AUTH\_TOKEN`\ is used. + + Example: export IDRAC\_X\_AUTH\_TOKEN=x\_auth\_token + + idrac_port (optional, int, 443) iDRAC port. diff --git a/ansible_collections/dellemc/openmanage/docs/modules/idrac_server_config_profile.rst b/ansible_collections/dellemc/openmanage/docs/modules/idrac_server_config_profile.rst index 4de82dd84..97e744a56 100644 --- a/ansible_collections/dellemc/openmanage/docs/modules/idrac_server_config_profile.rst +++ b/ansible_collections/dellemc/openmanage/docs/modules/idrac_server_config_profile.rst @@ -20,7 +20,7 @@ Requirements ------------ The below requirements are needed on the host that executes this module. -- python >= 3.9.14 +- python \>= 3.9.14 @@ -28,11 +28,11 @@ Parameters ---------- command (optional, str, export) - If ``import``, the module performs SCP import operation. + If \ :literal:`import`\ , the module performs SCP import operation. - If ``export``, the module performs SCP export operation. + If \ :literal:`export`\ , the module performs SCP export operation. - If ``preview``, the module performs SCP preview operation. + If \ :literal:`preview`\ , the module performs SCP preview operation. job_wait (True, bool, None) @@ -44,11 +44,11 @@ Parameters CIFS, NFS, HTTP, and HTTPS network share types are supported. - *share_name* is mutually exclusive with *import_buffer*. + \ :emphasis:`share\_name`\ is mutually exclusive with \ :emphasis:`import\_buffer`\ . share_user (optional, str, None) - Network share user in the format 'user@domain' or 'domain\\user' if user is part of a domain else 'user'. This option is mandatory for CIFS Network Share. + Network share user in the format 'user@domain' or 'domain\\\\user' if user is part of a domain else 'user'. This option is mandatory for CIFS Network Share. share_password (optional, str, None) @@ -58,167 +58,183 @@ Parameters scp_file (optional, str, None) Name of the server configuration profile (SCP) file. - This option is mandatory if *command* is ``import``. + This option is mandatory if \ :emphasis:`command`\ is \ :literal:`import`\ . - The default format <idrac_ip>_YYmmdd_HHMMSS_scp is used if this option is not specified for ``import``. + The default format \<idrac\_ip\>\_YYmmdd\_HHMMSS\_scp is used if this option is not specified for \ :literal:`import`\ . - *export_format* is used if the valid extension file is not provided for ``import``. + \ :emphasis:`export\_format`\ is used if the valid extension file is not provided for \ :literal:`import`\ . scp_components (optional, list, ALL) - If ``ALL``, this option exports or imports all components configurations from the SCP file. + If \ :literal:`ALL`\ , this option exports or imports all components configurations from the SCP file. - If ``IDRAC``, this option exports or imports iDRAC configuration from the SCP file. + If \ :literal:`IDRAC`\ , this option exports or imports iDRAC configuration from the SCP file. - If ``BIOS``, this option exports or imports BIOS configuration from the SCP file. + If \ :literal:`BIOS`\ , this option exports or imports BIOS configuration from the SCP file. - If ``NIC``, this option exports or imports NIC configuration from the SCP file. + If \ :literal:`NIC`\ , this option exports or imports NIC configuration from the SCP file. - If ``RAID``, this option exports or imports RAID configuration from the SCP file. + If \ :literal:`RAID`\ , this option exports or imports RAID configuration from the SCP file. - If ``FC``, this option exports or imports FiberChannel configurations from the SCP file. + If \ :literal:`FC`\ , this option exports or imports FiberChannel configurations from the SCP file. - If ``InfiniBand``, this option exports or imports InfiniBand configuration from the SCP file. + If \ :literal:`InfiniBand`\ , this option exports or imports InfiniBand configuration from the SCP file. - If ``SupportAssist``, this option exports or imports SupportAssist configuration from the SCP file. + If \ :literal:`SupportAssist`\ , this option exports or imports SupportAssist configuration from the SCP file. - If ``EventFilters``, this option exports or imports EventFilters configuration from the SCP file. + If \ :literal:`EventFilters`\ , this option exports or imports EventFilters configuration from the SCP file. - If ``System``, this option exports or imports System configuration from the SCP file. + If \ :literal:`System`\ , this option exports or imports System configuration from the SCP file. - If ``LifecycleController``, this option exports or imports SupportAssist configuration from the SCP file. + If \ :literal:`LifecycleController`\ , this option exports or imports SupportAssist configuration from the SCP file. - If ``AHCI``, this option exports or imports EventFilters configuration from the SCP file. + If \ :literal:`AHCI`\ , this option exports or imports EventFilters configuration from the SCP file. - If ``PCIeSSD``, this option exports or imports PCIeSSD configuration from the SCP file. + If \ :literal:`PCIeSSD`\ , this option exports or imports PCIeSSD configuration from the SCP file. - When *command* is ``export`` or ``import`` *target* with multiple components is supported only on iDRAC9 with firmware 6.10.00.00 and above. + When \ :emphasis:`command`\ is \ :literal:`export`\ or \ :literal:`import`\ \ :emphasis:`target`\ with multiple components is supported only on iDRAC9 with firmware 6.10.00.00 and above. shutdown_type (optional, str, Graceful) - This option is applicable for ``import`` command. + This option is applicable for \ :literal:`import`\ command. - If ``Graceful``, the job gracefully shuts down the operating system and turns off the server. + If \ :literal:`Graceful`\ , the job gracefully shuts down the operating system and turns off the server. - If ``Forced``, it forcefully shuts down the server. + If \ :literal:`Forced`\ , it forcefully shuts down the server. - If ``NoReboot``, the job that applies the SCP will pause until you manually reboot the server. + If \ :literal:`NoReboot`\ , the job that applies the SCP will pause until you manually reboot the server. end_host_power_state (optional, str, On) - This option is applicable for ``import`` command. + This option is applicable for \ :literal:`import`\ command. - If ``On``, End host power state is on. + If \ :literal:`On`\ , End host power state is on. - If ``Off``, End host power state is off. + If \ :literal:`Off`\ , End host power state is off. export_format (optional, str, XML) - Specify the output file format. This option is applicable for ``export`` command. + Specify the output file format. This option is applicable for \ :literal:`export`\ command. export_use (optional, str, Default) Specify the type of Server Configuration Profile (SCP) to be exported. - This option is applicable when *command* is ``export``. + This option is applicable when \ :emphasis:`command`\ is \ :literal:`export`\ . - ``Default`` Creates a non-destructive snapshot of the configuration. + \ :literal:`Default`\ Creates a non-destructive snapshot of the configuration. - ``Replace`` Replaces a server with another or restores the servers settings to a known baseline. + \ :literal:`Replace`\ Replaces a server with another or restores the servers settings to a known baseline. - ``Clone`` Clones settings from one server to another server with the identical hardware setup. All settings except I/O identity are updated (e.g. will reset RAID). The settings in this export will be destructive when uploaded to another system. + \ :literal:`Clone`\ Clones settings from one server to another server with the identical hardware setup. All settings except I/O identity are updated (e.g. will reset RAID). The settings in this export will be destructive when uploaded to another system. ignore_certificate_warning (optional, str, ignore) - If ``ignore``, it ignores the certificate warnings. + If \ :literal:`ignore`\ , it ignores the certificate warnings. - If ``showerror``, it shows the certificate warnings. + If \ :literal:`showerror`\ , it shows the certificate warnings. - *ignore_certificate_warning* is considered only when *share_name* is of type HTTPS and is supported only on iDRAC9. + \ :emphasis:`ignore\_certificate\_warning`\ is considered only when \ :emphasis:`share\_name`\ is of type HTTPS and is supported only on iDRAC9. include_in_export (optional, str, default) - This option is applicable when *command* is ``export``. + This option is applicable when \ :emphasis:`command`\ is \ :literal:`export`\ . - If ``default``, it exports the default Server Configuration Profile. + If \ :literal:`default`\ , it exports the default Server Configuration Profile. - If ``readonly``, it exports the SCP with readonly attributes. + If \ :literal:`readonly`\ , it exports the SCP with readonly attributes. - If ``passwordhashvalues``, it exports the SCP with password hash values. + If \ :literal:`passwordhashvalues`\ , it exports the SCP with password hash values. - If ``customtelemetry``, exports the SCP with custom telemetry attributes supported only in the iDRAC9. + If \ :literal:`customtelemetry`\ , exports the SCP with custom telemetry attributes supported only in the iDRAC9. import_buffer (optional, str, None) Used to import the buffer input of xml or json into the iDRAC. - This option is applicable when *command* is ``import`` and ``preview``. + This option is applicable when \ :emphasis:`command`\ is \ :literal:`import`\ and \ :literal:`preview`\ . - *import_buffer* is mutually exclusive with *share_name*. + \ :emphasis:`import\_buffer`\ is mutually exclusive with \ :emphasis:`share\_name`\ . proxy_support (optional, bool, False) Proxy to be enabled or disabled. - *proxy_support* is considered only when *share_name* is of type HTTP or HTTPS and is supported only on iDRAC9. + \ :emphasis:`proxy\_support`\ is considered only when \ :emphasis:`share\_name`\ is of type HTTP or HTTPS and is supported only on iDRAC9. proxy_type (optional, str, http) - ``http`` to select HTTP type proxy. + \ :literal:`http`\ to select HTTP type proxy. - ``socks4`` to select SOCKS4 type proxy. + \ :literal:`socks4`\ to select SOCKS4 type proxy. - *proxy_type* is considered only when *share_name* is of type HTTP or HTTPS and is supported only on iDRAC9. + \ :emphasis:`proxy\_type`\ is considered only when \ :emphasis:`share\_name`\ is of type HTTP or HTTPS and is supported only on iDRAC9. proxy_server (optional, str, None) - *proxy_server* is required when *share_name* is of type HTTPS or HTTP and *proxy_support* is ``true``. + \ :emphasis:`proxy\_server`\ is required when \ :emphasis:`share\_name`\ is of type HTTPS or HTTP and \ :emphasis:`proxy\_support`\ is \ :literal:`true`\ . - *proxy_server* is considered only when *share_name* is of type HTTP or HTTPS and is supported only on iDRAC9. + \ :emphasis:`proxy\_server`\ is considered only when \ :emphasis:`share\_name`\ is of type HTTP or HTTPS and is supported only on iDRAC9. proxy_port (optional, str, 80) Proxy port to authenticate. - *proxy_port* is required when *share_name* is of type HTTPS or HTTP and *proxy_support* is ``true``. + \ :emphasis:`proxy\_port`\ is required when \ :emphasis:`share\_name`\ is of type HTTPS or HTTP and \ :emphasis:`proxy\_support`\ is \ :literal:`true`\ . - *proxy_port* is considered only when *share_name* is of type HTTP or HTTPS and is supported only on iDRAC9. + \ :emphasis:`proxy\_port`\ is considered only when \ :emphasis:`share\_name`\ is of type HTTP or HTTPS and is supported only on iDRAC9. proxy_username (optional, str, None) Proxy username to authenticate. - *proxy_username* is considered only when *share_name* is of type HTTP or HTTPS and is supported only on iDRAC9. + \ :emphasis:`proxy\_username`\ is considered only when \ :emphasis:`share\_name`\ is of type HTTP or HTTPS and is supported only on iDRAC9. proxy_password (optional, str, None) Proxy password to authenticate. - *proxy_password* is considered only when *share_name* is of type HTTP or HTTPS and is supported only on iDRAC9. + \ :emphasis:`proxy\_password`\ is considered only when \ :emphasis:`share\_name`\ is of type HTTP or HTTPS and is supported only on iDRAC9. idrac_ip (True, str, None) iDRAC IP Address. - idrac_user (True, str, None) + idrac_user (False, str, None) iDRAC username. + If the username is not provided, then the environment variable \ :envvar:`IDRAC\_USERNAME`\ is used. - idrac_password (True, str, None) + Example: export IDRAC\_USERNAME=username + + + idrac_password (False, str, None) iDRAC user password. + If the password is not provided, then the environment variable \ :envvar:`IDRAC\_PASSWORD`\ is used. + + Example: export IDRAC\_PASSWORD=password + + + x_auth_token (False, str, None) + Authentication token. + + If the x\_auth\_token is not provided, then the environment variable \ :envvar:`IDRAC\_X\_AUTH\_TOKEN`\ is used. + + Example: export IDRAC\_X\_AUTH\_TOKEN=x\_auth\_token + idrac_port (optional, int, 443) iDRAC port. validate_certs (optional, bool, True) - If ``false``, the SSL certificates will not be validated. + If \ :literal:`false`\ , the SSL certificates will not be validated. - Configure ``false`` only on personally controlled sites where self-signed certificates are used. + Configure \ :literal:`false`\ only on personally controlled sites where self-signed certificates are used. - Prior to collection version ``5.0.0``, the *validate_certs* is ``false`` by default. + Prior to collection version \ :literal:`5.0.0`\ , the \ :emphasis:`validate\_certs`\ is \ :literal:`false`\ by default. ca_path (optional, path, None) @@ -236,11 +252,11 @@ Notes ----- .. note:: - - This module requires 'Administrator' privilege for *idrac_user*. + - This module requires 'Administrator' privilege for \ :emphasis:`idrac\_user`\ . - Run this module from a system that has direct access to Dell iDRAC. - - This module supports ``check_mode``. + - This module supports \ :literal:`check\_mode`\ . - To import Server Configuration Profile (SCP) on the iDRAC8-based servers, the servers must have iDRAC Enterprise license or later. - - For ``import`` operation, ``check_mode`` is supported only when *target* is ``ALL``. + - For \ :literal:`import`\ operation, \ :literal:`check\_mode`\ is supported only when \ :emphasis:`target`\ is \ :literal:`ALL`\ . - This module supports IPv4 and IPv6 addresses. diff --git a/ansible_collections/dellemc/openmanage/docs/modules/idrac_session.rst b/ansible_collections/dellemc/openmanage/docs/modules/idrac_session.rst index d8f980043..30b612fb3 100644 --- a/ansible_collections/dellemc/openmanage/docs/modules/idrac_session.rst +++ b/ansible_collections/dellemc/openmanage/docs/modules/idrac_session.rst @@ -32,13 +32,13 @@ Parameters username (optional, str, None) - Username of the iDRAC. + Username of the iDRAC. If the username is not provided, then the environment variable \ :envvar:`IDRAC\_USERNAME`\ is used. \ :emphasis:`username`\ is required when \ :emphasis:`state`\ is \ :literal:`present`\ . password (optional, str, None) - Password of the iDRAC. + Password of the iDRAC. If the password is not provided, then the environment variable \ :envvar:`IDRAC\_PASSWORD`\ is used. \ :emphasis:`password`\ is required when \ :emphasis:`state`\ is \ :literal:`present`\ . @@ -71,10 +71,10 @@ Parameters Module will always report changes found to be applied when \ :emphasis:`state`\ is \ :literal:`present`\ . - auth_token (optional, str, None) + x_auth_token (optional, str, None) Authentication token. - \ :emphasis:`auth\_token`\ is required when \ :emphasis:`state`\ is \ :literal:`absent`\ . + \ :emphasis:`x\_auth\_token`\ is required when \ :emphasis:`state`\ is \ :literal:`absent`\ . session_id (optional, int, None) @@ -110,14 +110,47 @@ Examples hostname: 198.162.0.1 username: username password: password + ca_path: "/path/to/ca_cert.pem" state: present - name: Delete a session dellemc.openmanage.idrac_session: hostname: 198.162.0.1 + ca_path: "/path/to/ca_cert.pem" state: absent - auth_token: aed4aa802b748d2f3b31deec00a6b28a - session_is: 2 + x_auth_token: aed4aa802b748d2f3b31deec00a6b28a + session_id: 2 + + - name: Create a session and execute other modules + block: + - name: Create a session + dellemc.openmanage.idrac_session: + hostname: 198.162.0.1 + username: username + password: password + ca_path: "/path/to/ca_cert.pem" + state: present + register: authData + + - name: Call idrac_firmware_info module + dellemc.openmanage.idrac_firmware_info: + idrac_ip: 198.162.0.1 + ca_path: "/path/to/ca_cert.pem" + x_auth_token: "{{ authData.x_auth_token }}" + + - name: Call idrac_user_info module + dellemc.openmanage.idrac_user_info: + idrac_ip: 198.162.0.1 + ca_path: "/path/to/ca_cert.pem" + x_auth_token: "{{ authData.x_auth_token }}" + always: + - name: Destroy a session + dellemc.openmanage.idrac_session: + hostname: 198.162.0.1 + ca_path: "/path/to/ca_cert.pem" + state: absent + x_auth_token: "{{ authData.x_auth_token }}" + session_id: "{{ authData.session_data.Id }}" @@ -154,4 +187,5 @@ Authors ~~~~~~~ - Rajshekar P(@rajshekarp87) +- Kritika Bhateja (@Kritika-Bhateja-03) diff --git a/ansible_collections/dellemc/openmanage/docs/modules/idrac_storage_volume.rst b/ansible_collections/dellemc/openmanage/docs/modules/idrac_storage_volume.rst index 5cfefc036..99fb14257 100644 --- a/ansible_collections/dellemc/openmanage/docs/modules/idrac_storage_volume.rst +++ b/ansible_collections/dellemc/openmanage/docs/modules/idrac_storage_volume.rst @@ -125,26 +125,40 @@ Parameters This option is applicable when \ :emphasis:`job\_wait`\ is \ :literal:`true`\ . + time_to_wait (optional, int, 300) + The maximum wait time before shutdown in seconds for the Server Configuration Profile (SCP) import operation. + + This option is applicable when \ :emphasis:`state`\ is \ :literal:`create`\ or \ :literal:`delete`\ . + + idrac_ip (True, str, None) iDRAC IP Address. - idrac_user (True, str, None) + idrac_user (False, str, None) iDRAC username. - If the username is not provided, then the environment variable \ :literal:`IDRAC\_USERNAME`\ is used. + If the username is not provided, then the environment variable \ :envvar:`IDRAC\_USERNAME`\ is used. Example: export IDRAC\_USERNAME=username - idrac_password (True, str, None) + idrac_password (False, str, None) iDRAC user password. - If the password is not provided, then the environment variable \ :literal:`IDRAC\_PASSWORD`\ is used. + If the password is not provided, then the environment variable \ :envvar:`IDRAC\_PASSWORD`\ is used. Example: export IDRAC\_PASSWORD=password + x_auth_token (False, str, None) + Authentication token. + + If the x\_auth\_token is not provided, then the environment variable \ :envvar:`IDRAC\_X\_AUTH\_TOKEN`\ is used. + + Example: export IDRAC\_X\_AUTH\_TOKEN=x\_auth\_token + + idrac_port (optional, int, 443) iDRAC port. diff --git a/ansible_collections/dellemc/openmanage/docs/modules/idrac_syslog.rst b/ansible_collections/dellemc/openmanage/docs/modules/idrac_syslog.rst index 24a3ac09e..a67f38f76 100644 --- a/ansible_collections/dellemc/openmanage/docs/modules/idrac_syslog.rst +++ b/ansible_collections/dellemc/openmanage/docs/modules/idrac_syslog.rst @@ -20,8 +20,8 @@ Requirements ------------ The below requirements are needed on the host that executes this module. -- omsdk >= 1.2.488 -- python >= 3.9.6 +- omsdk \>= 1.2.488 +- python \>= 3.9.6 @@ -39,21 +39,29 @@ Parameters idrac_user (True, str, None) iDRAC username. + If the username is not provided, then the environment variable \ :envvar:`IDRAC\_USERNAME`\ is used. + + Example: export IDRAC\_USERNAME=username + idrac_password (True, str, None) iDRAC user password. + If the password is not provided, then the environment variable \ :envvar:`IDRAC\_PASSWORD`\ is used. + + Example: export IDRAC\_PASSWORD=password + idrac_port (optional, int, 443) iDRAC port. validate_certs (optional, bool, True) - If ``false``, the SSL certificates will not be validated. + If \ :literal:`false`\ , the SSL certificates will not be validated. - Configure ``false`` only on personally controlled sites where self-signed certificates are used. + Configure \ :literal:`false`\ only on personally controlled sites where self-signed certificates are used. - Prior to collection version ``5.0.0``, the *validate_certs* is ``false`` by default. + Prior to collection version \ :literal:`5.0.0`\ , the \ :emphasis:`validate\_certs`\ is \ :literal:`false`\ by default. ca_path (optional, path, None) @@ -69,7 +77,7 @@ Parameters share_user (optional, str, None) - Network share user name. Use the format 'user@domain' or 'domain\\user' if user is part of a domain. This option is mandatory for CIFS share. + Network share user name. Use the format 'user@domain' or 'domain\\\\user' if user is part of a domain. This option is mandatory for CIFS share. share_password (optional, str, None) @@ -87,10 +95,10 @@ Notes ----- .. note:: - - This module requires 'Administrator' privilege for *idrac_user*. + - This module requires 'Administrator' privilege for \ :emphasis:`idrac\_user`\ . - Run this module from a system that has direct access to Dell iDRAC. - - This module supports both IPv4 and IPv6 address for *idrac_ip*. - - This module supports ``check_mode``. + - This module supports both IPv4 and IPv6 address for \ :emphasis:`idrac\_ip`\ . + - This module supports \ :literal:`check\_mode`\ . diff --git a/ansible_collections/dellemc/openmanage/docs/modules/idrac_system_info.rst b/ansible_collections/dellemc/openmanage/docs/modules/idrac_system_info.rst index 4c2d4fa8e..246431131 100644 --- a/ansible_collections/dellemc/openmanage/docs/modules/idrac_system_info.rst +++ b/ansible_collections/dellemc/openmanage/docs/modules/idrac_system_info.rst @@ -20,8 +20,8 @@ Requirements ------------ The below requirements are needed on the host that executes this module. -- omsdk >= 1.2.488 -- python >= 3.9.6 +- omsdk \>= 1.2.488 +- python \>= 3.9.6 @@ -35,21 +35,29 @@ Parameters idrac_user (True, str, None) iDRAC username. + If the username is not provided, then the environment variable \ :envvar:`IDRAC\_USERNAME`\ is used. + + Example: export IDRAC\_USERNAME=username + idrac_password (True, str, None) iDRAC user password. + If the password is not provided, then the environment variable \ :envvar:`IDRAC\_PASSWORD`\ is used. + + Example: export IDRAC\_PASSWORD=password + idrac_port (optional, int, 443) iDRAC port. validate_certs (optional, bool, True) - If ``false``, the SSL certificates will not be validated. + If \ :literal:`false`\ , the SSL certificates will not be validated. - Configure ``false`` only on personally controlled sites where self-signed certificates are used. + Configure \ :literal:`false`\ only on personally controlled sites where self-signed certificates are used. - Prior to collection version ``5.0.0``, the *validate_certs* is ``false`` by default. + Prior to collection version \ :literal:`5.0.0`\ , the \ :emphasis:`validate\_certs`\ is \ :literal:`false`\ by default. ca_path (optional, path, None) @@ -68,8 +76,8 @@ Notes .. note:: - Run this module from a system that has direct access to Dell iDRAC. - - This module supports both IPv4 and IPv6 address for *idrac_ip*. - - This module supports ``check_mode``. + - This module supports both IPv4 and IPv6 address for \ :emphasis:`idrac\_ip`\ . + - This module supports \ :literal:`check\_mode`\ . diff --git a/ansible_collections/dellemc/openmanage/docs/modules/idrac_timezone_ntp.rst b/ansible_collections/dellemc/openmanage/docs/modules/idrac_timezone_ntp.rst index 10d7447f4..9872cbdf2 100644 --- a/ansible_collections/dellemc/openmanage/docs/modules/idrac_timezone_ntp.rst +++ b/ansible_collections/dellemc/openmanage/docs/modules/idrac_timezone_ntp.rst @@ -20,8 +20,8 @@ Requirements ------------ The below requirements are needed on the host that executes this module. -- omsdk >= 1.2.488 -- python >= 3.9.6 +- omsdk \>= 1.2.488 +- python \>= 3.9.6 @@ -55,7 +55,7 @@ Parameters share_user (optional, str, None) - (deprecated)Network share user name. Use the format 'user@domain' or 'domain\user' if user is part of a domain. This option is mandatory for CIFS share. + (deprecated)Network share user name. Use the format 'user@domain' or 'domain\\user' if user is part of a domain. This option is mandatory for CIFS share. This option is deprecated and will be removed in the later version. @@ -79,21 +79,29 @@ Parameters idrac_user (True, str, None) iDRAC username. + If the username is not provided, then the environment variable \ :envvar:`IDRAC\_USERNAME`\ is used. + + Example: export IDRAC\_USERNAME=username + idrac_password (True, str, None) iDRAC user password. + If the password is not provided, then the environment variable \ :envvar:`IDRAC\_PASSWORD`\ is used. + + Example: export IDRAC\_PASSWORD=password + idrac_port (optional, int, 443) iDRAC port. validate_certs (optional, bool, True) - If ``false``, the SSL certificates will not be validated. + If \ :literal:`false`\ , the SSL certificates will not be validated. - Configure ``false`` only on personally controlled sites where self-signed certificates are used. + Configure \ :literal:`false`\ only on personally controlled sites where self-signed certificates are used. - Prior to collection version ``5.0.0``, the *validate_certs* is ``false`` by default. + Prior to collection version \ :literal:`5.0.0`\ , the \ :emphasis:`validate\_certs`\ is \ :literal:`false`\ by default. ca_path (optional, path, None) @@ -111,10 +119,10 @@ Notes ----- .. note:: - - This module requires 'Administrator' privilege for *idrac_user*. + - This module requires 'Administrator' privilege for \ :emphasis:`idrac\_user`\ . - Run this module from a system that has direct access to Dell iDRAC. - - This module supports both IPv4 and IPv6 address for *idrac_ip*. - - This module supports ``check_mode``. + - This module supports both IPv4 and IPv6 address for \ :emphasis:`idrac\_ip`\ . + - This module supports \ :literal:`check\_mode`\ . diff --git a/ansible_collections/dellemc/openmanage/docs/modules/idrac_user.rst b/ansible_collections/dellemc/openmanage/docs/modules/idrac_user.rst index 9d92e0d0e..19778f88a 100644 --- a/ansible_collections/dellemc/openmanage/docs/modules/idrac_user.rst +++ b/ansible_collections/dellemc/openmanage/docs/modules/idrac_user.rst @@ -26,7 +26,7 @@ Requirements ------------ The below requirements are needed on the host that executes this module. -- python >= 3.8.6 +- python \>= 3.9.6 @@ -34,37 +34,37 @@ Parameters ---------- state (optional, str, present) - Select ``present`` to create or modify a user account. + Select \ :literal:`present`\ to create or modify a user account. - Select ``absent`` to remove a user account. + Select \ :literal:`absent`\ to remove a user account. user_name (True, str, None) - Provide the *user_name* of the account to be created, deleted or modified. + Provide the \ :emphasis:`user\_name`\ of the account to be created, deleted or modified. user_password (optional, str, None) Provide the password for the user account. The password can be changed when the user account is modified. - To ensure security, the *user_password* must be at least eight characters long and must contain lowercase and upper-case characters, numbers, and special characters. + To ensure security, the \ :emphasis:`user\_password`\ must be at least eight characters long and must contain lowercase and upper-case characters, numbers, and special characters. new_user_name (optional, str, None) - Provide the *user_name* for the account to be modified. + Provide the \ :emphasis:`user\_name`\ for the account to be modified. privilege (optional, str, None) Following are the role-based privileges. - A user with ``Administrator`` privilege can log in to iDRAC, and then configure iDRAC, configure users, clear logs, control and configure system, access virtual console, access virtual media, test alerts, and execute debug commands. + A user with \ :literal:`Administrator`\ privilege can log in to iDRAC, and then configure iDRAC, configure users, clear logs, control and configure system, access virtual console, access virtual media, test alerts, and execute debug commands. - A user with ``Operator`` privilege can log in to iDRAC, and then configure iDRAC, control and configure system, access virtual console, access virtual media, and execute debug commands. + A user with \ :literal:`Operator`\ privilege can log in to iDRAC, and then configure iDRAC, control and configure system, access virtual console, access virtual media, and execute debug commands. - A user with ``ReadOnly`` privilege can only log in to iDRAC. + A user with \ :literal:`ReadOnly`\ privilege can only log in to iDRAC. - A user with ``None``, no privileges assigned. + A user with \ :literal:`None`\ , no privileges assigned. - Will be ignored, if custom_privilege parameter is provided. + Will be ignored, if custom\_privilege parameter is provided. custom_privilege (optional, int, None) @@ -96,45 +96,61 @@ Parameters authentication_protocol (optional, str, None) This option allows to configure one of the following authentication protocol types to authenticate the iDRAC user. - Secure Hash Algorithm ``SHA``. + Secure Hash Algorithm \ :literal:`SHA`\ . - Message Digest 5 ``MD5``. + Message Digest 5 \ :literal:`MD5`\ . - An authentication protocol is not configured if ``None`` is selected. + An authentication protocol is not configured if \ :literal:`None`\ is selected. privacy_protocol (optional, str, None) This option allows to configure one of the following privacy encryption protocols for the iDRAC user. - Data Encryption Standard ``DES``. + Data Encryption Standard \ :literal:`DES`\ . - Advanced Encryption Standard ``AES``. + Advanced Encryption Standard \ :literal:`AES`\ . - A privacy protocol is not configured if ``None`` is selected. + A privacy protocol is not configured if \ :literal:`None`\ is selected. idrac_ip (True, str, None) iDRAC IP Address. - idrac_user (True, str, None) + idrac_user (False, str, None) iDRAC username. + If the username is not provided, then the environment variable \ :envvar:`IDRAC\_USERNAME`\ is used. - idrac_password (True, str, None) + Example: export IDRAC\_USERNAME=username + + + idrac_password (False, str, None) iDRAC user password. + If the password is not provided, then the environment variable \ :envvar:`IDRAC\_PASSWORD`\ is used. + + Example: export IDRAC\_PASSWORD=password + + + x_auth_token (False, str, None) + Authentication token. + + If the x\_auth\_token is not provided, then the environment variable \ :envvar:`IDRAC\_X\_AUTH\_TOKEN`\ is used. + + Example: export IDRAC\_X\_AUTH\_TOKEN=x\_auth\_token + idrac_port (optional, int, 443) iDRAC port. validate_certs (optional, bool, True) - If ``false``, the SSL certificates will not be validated. + If \ :literal:`false`\ , the SSL certificates will not be validated. - Configure ``false`` only on personally controlled sites where self-signed certificates are used. + Configure \ :literal:`false`\ only on personally controlled sites where self-signed certificates are used. - Prior to collection version ``5.0.0``, the *validate_certs* is ``false`` by default. + Prior to collection version \ :literal:`5.0.0`\ , the \ :emphasis:`validate\_certs`\ is \ :literal:`false`\ by default. ca_path (optional, path, None) @@ -153,7 +169,7 @@ Notes .. note:: - Run this module from a system that has direct access to Dell iDRAC. - - This module supports ``check_mode``. + - This module supports \ :literal:`check\_mode`\ . diff --git a/ansible_collections/dellemc/openmanage/docs/modules/idrac_user_info.rst b/ansible_collections/dellemc/openmanage/docs/modules/idrac_user_info.rst index 85e84ff65..3389f9c7f 100644 --- a/ansible_collections/dellemc/openmanage/docs/modules/idrac_user_info.rst +++ b/ansible_collections/dellemc/openmanage/docs/modules/idrac_user_info.rst @@ -20,7 +20,7 @@ Requirements ------------ The below requirements are needed on the host that executes this module. -- python >= 3.8.6 +- python \>= 3.9.6 @@ -30,37 +30,53 @@ Parameters user_id (optional, int, None) Sequential user id numbers that supports from 1 to 16. - *user_id* is mutually exclusive with *username* + \ :emphasis:`user\_id`\ is mutually exclusive with \ :emphasis:`username`\ username (optional, str, None) Username of the account that is created in iDRAC local users. - *username* is mutually exclusive with *user_id* + \ :emphasis:`username`\ is mutually exclusive with \ :emphasis:`user\_id`\ idrac_ip (True, str, None) iDRAC IP Address. - idrac_user (True, str, None) + idrac_user (False, str, None) iDRAC username. + If the username is not provided, then the environment variable \ :envvar:`IDRAC\_USERNAME`\ is used. - idrac_password (True, str, None) + Example: export IDRAC\_USERNAME=username + + + idrac_password (False, str, None) iDRAC user password. + If the password is not provided, then the environment variable \ :envvar:`IDRAC\_PASSWORD`\ is used. + + Example: export IDRAC\_PASSWORD=password + + + x_auth_token (False, str, None) + Authentication token. + + If the x\_auth\_token is not provided, then the environment variable \ :envvar:`IDRAC\_X\_AUTH\_TOKEN`\ is used. + + Example: export IDRAC\_X\_AUTH\_TOKEN=x\_auth\_token + idrac_port (optional, int, 443) iDRAC port. validate_certs (optional, bool, True) - If ``false``, the SSL certificates will not be validated. + If \ :literal:`false`\ , the SSL certificates will not be validated. - Configure ``false`` only on personally controlled sites where self-signed certificates are used. + Configure \ :literal:`false`\ only on personally controlled sites where self-signed certificates are used. - Prior to collection version ``5.0.0``, the *validate_certs* is ``false`` by default. + Prior to collection version \ :literal:`5.0.0`\ , the \ :emphasis:`validate\_certs`\ is \ :literal:`false`\ by default. ca_path (optional, path, None) @@ -79,7 +95,7 @@ Notes .. note:: - Run this module on a system that has direct access to Dell iDRAC. - - This module supports ``check_mode``. + - This module supports \ :literal:`check\_mode`\ . diff --git a/ansible_collections/dellemc/openmanage/docs/modules/idrac_virtual_media.rst b/ansible_collections/dellemc/openmanage/docs/modules/idrac_virtual_media.rst index 479ba05bb..a47695bd9 100644 --- a/ansible_collections/dellemc/openmanage/docs/modules/idrac_virtual_media.rst +++ b/ansible_collections/dellemc/openmanage/docs/modules/idrac_virtual_media.rst @@ -20,7 +20,7 @@ Requirements ------------ The below requirements are needed on the host that executes this module. -- python >= 3.8.6 +- python \>= 3.9.6 @@ -32,9 +32,9 @@ Parameters insert (True, bool, None) - ``true`` connects the remote image file. + \ :literal:`true`\ connects the remote image file. - ``false`` ejects the remote image file if connected. + \ :literal:`false`\ ejects the remote image file if connected. image (optional, path, None) @@ -42,9 +42,9 @@ Parameters The file name with .img extension is redirected as a virtual floppy and a file name with .iso extension is redirected as a virtual CDROM. - This option is required when *insert* is ``true``. + This option is required when \ :emphasis:`insert`\ is \ :literal:`true`\ . - The following are the examples of the share location: CIFS share: //192.168.0.1/file_path/image_name.iso, NFS share: 192.168.0.2:/file_path/image_name.img, HTTP share: http://192.168.0.3/file_path/image_name.iso, HTTPS share: https://192.168.0.4/file_path/image_name.img + The following are the examples of the share location: CIFS share: //192.168.0.1/file\_path/image\_name.iso, NFS share: 192.168.0.2:/file\_path/image\_name.img, HTTP share: http://192.168.0.3/file\_path/image\_name.iso, HTTPS share: https://192.168.0.4/file\_path/image\_name.img CIFS share is not supported by iDRAC8. @@ -52,7 +52,7 @@ Parameters index (optional, int, None) - Index of the Remote File Share. For example, to specify the Remote File Share 1, the value of *index* should be 1. If *index* is not specified, the order of *virtual_media* list will be considered. + Index of the Remote File Share. For example, to specify the Remote File Share 1, the value of \ :emphasis:`index`\ should be 1. If \ :emphasis:`index`\ is not specified, the order of \ :emphasis:`virtual\_media`\ list will be considered. domain (optional, str, None) @@ -66,16 +66,16 @@ Parameters password (optional, str, None) Network share password. This option is applicable for CIFS and HTTPS share. - This module always reports as the changes found when *password* is provided. + This module always reports as the changes found when \ :emphasis:`password`\ is provided. media_type (optional, str, None) - Type of the image file. This is applicable when *insert* is ``true``. + Type of the image file. This is applicable when \ :emphasis:`insert`\ is \ :literal:`true`\ . force (optional, bool, False) - ``true`` ejects the image file if already connected and inserts the file provided in *image*. This is applicable when *insert* is ``true``. + \ :literal:`true`\ ejects the image file if already connected and inserts the file provided in \ :emphasis:`image`\ . This is applicable when \ :emphasis:`insert`\ is \ :literal:`true`\ . resource_id (optional, str, None) @@ -86,24 +86,40 @@ Parameters iDRAC IP Address. - idrac_user (True, str, None) + idrac_user (False, str, None) iDRAC username. + If the username is not provided, then the environment variable \ :envvar:`IDRAC\_USERNAME`\ is used. - idrac_password (True, str, None) + Example: export IDRAC\_USERNAME=username + + + idrac_password (False, str, None) iDRAC user password. + If the password is not provided, then the environment variable \ :envvar:`IDRAC\_PASSWORD`\ is used. + + Example: export IDRAC\_PASSWORD=password + + + x_auth_token (False, str, None) + Authentication token. + + If the x\_auth\_token is not provided, then the environment variable \ :envvar:`IDRAC\_X\_AUTH\_TOKEN`\ is used. + + Example: export IDRAC\_X\_AUTH\_TOKEN=x\_auth\_token + idrac_port (optional, int, 443) iDRAC port. validate_certs (optional, bool, True) - If ``false``, the SSL certificates will not be validated. + If \ :literal:`false`\ , the SSL certificates will not be validated. - Configure ``false`` only on personally controlled sites where self-signed certificates are used. + Configure \ :literal:`false`\ only on personally controlled sites where self-signed certificates are used. - Prior to collection version ``5.0.0``, the *validate_certs* is ``false`` by default. + Prior to collection version \ :literal:`5.0.0`\ , the \ :emphasis:`validate\_certs`\ is \ :literal:`false`\ by default. ca_path (optional, path, None) @@ -122,7 +138,7 @@ Notes .. note:: - Run this module from a system that has direct access to Dell iDRAC. - - This module supports ``check_mode``. + - This module supports \ :literal:`check\_mode`\ . diff --git a/ansible_collections/dellemc/openmanage/docs/modules/ome_active_directory.rst b/ansible_collections/dellemc/openmanage/docs/modules/ome_active_directory.rst index 19092497d..31a655394 100644 --- a/ansible_collections/dellemc/openmanage/docs/modules/ome_active_directory.rst +++ b/ansible_collections/dellemc/openmanage/docs/modules/ome_active_directory.rst @@ -20,7 +20,7 @@ Requirements ------------ The below requirements are needed on the host that executes this module. -- python >= 3.8.6 +- python \>= 3.9.6 @@ -30,9 +30,9 @@ Parameters domain_server (optional, list, None) Enter the domain name or FQDN or IP address of the domain controller. - If *domain_controller_lookup* is ``DNS``, enter the domain name to query DNS for the domain controllers. + If \ :emphasis:`domain\_controller\_lookup`\ is \ :literal:`DNS`\ , enter the domain name to query DNS for the domain controllers. - If *domain_controller_lookup* is ``MANUAL``, enter the FQDN or the IP address of the domain controller. The maximum number of Active Directory servers that can be added is three. + If \ :emphasis:`domain\_controller\_lookup`\ is \ :literal:`MANUAL`\ , enter the FQDN or the IP address of the domain controller. The maximum number of Active Directory servers that can be added is three. domain_controller_lookup (optional, str, DNS) @@ -46,11 +46,11 @@ Parameters For the Domain Controller Access, enter 636 as the port number. - ``NOTE``, Only LDAPS ports are supported. + \ :literal:`NOTE`\ , Only LDAPS ports are supported. group_domain (optional, str, None) - Provide the group domain in the format ``example.com`` or ``ou=org, dc=example, dc=com``. + Provide the group domain in the format \ :literal:`example.com`\ or \ :literal:`ou=org, dc=example, dc=com`\ . id (optional, int, None) @@ -58,7 +58,7 @@ Parameters This is applicable for modification and deletion. - This is mutually exclusive with *name*. + This is mutually exclusive with \ :emphasis:`name`\ . name (optional, str, None) @@ -66,7 +66,7 @@ Parameters This is applicable for creation and deletion. - This is mutually exclusive with *name*. + This is mutually exclusive with \ :emphasis:`name`\ . network_timeout (optional, int, 120) @@ -82,9 +82,9 @@ Parameters state (optional, str, present) - ``present`` allows to create or modify an Active Directory service. + \ :literal:`present`\ allows to create or modify an Active Directory service. - ``absent`` allows to delete a Active Directory service. + \ :literal:`absent`\ allows to delete a Active Directory service. test_connection (optional, bool, False) @@ -94,25 +94,25 @@ Parameters If test fails, module will error out. - If ``true``, *domain_username* and *domain_password* has to be provided. + If \ :literal:`true`\ , \ :emphasis:`domain\_username`\ and \ :emphasis:`domain\_password`\ has to be provided. domain_password (optional, str, None) Provide the domain password. - This is applicable when *test_connection* is ``true``. + This is applicable when \ :emphasis:`test\_connection`\ is \ :literal:`true`\ . domain_username (optional, str, None) - Provide the domain username either in the UPN (username@domain) or NetBIOS (domain\\username) format. + Provide the domain username either in the UPN (username@domain) or NetBIOS (domain\\\\username) format. - This is applicable when *test_connection* is ``true``. + This is applicable when \ :emphasis:`test\_connection`\ is \ :literal:`true`\ . validate_certificate (optional, bool, False) Enables validation of SSL certificate of the domain controller. - The module will always report change when this is ``true``. + The module will always report change when this is \ :literal:`true`\ . certificate_file (optional, path, None) @@ -120,31 +120,47 @@ Parameters The certificate should be a Root CA Certificate encoded in Base64 format. - This is applicable when *validate_certificate* is ``true``. + This is applicable when \ :emphasis:`validate\_certificate`\ is \ :literal:`true`\ . hostname (True, str, None) OpenManage Enterprise or OpenManage Enterprise Modular IP address or hostname. - username (True, str, None) + username (False, str, None) OpenManage Enterprise or OpenManage Enterprise Modular username. + If the username is not provided, then the environment variable \ :envvar:`OME\_USERNAME`\ is used. - password (True, str, None) + Example: export OME\_USERNAME=username + + + password (False, str, None) OpenManage Enterprise or OpenManage Enterprise Modular password. + If the password is not provided, then the environment variable \ :envvar:`OME\_PASSWORD`\ is used. + + Example: export OME\_PASSWORD=password + + + x_auth_token (False, str, None) + Authentication token. + + If the x\_auth\_token is not provided, then the environment variable \ :envvar:`OME\_X\_AUTH\_TOKEN`\ is used. + + Example: export OME\_X\_AUTH\_TOKEN=x\_auth\_token + port (optional, int, 443) OpenManage Enterprise or OpenManage Enterprise Modular HTTPS port. validate_certs (optional, bool, True) - If ``false``, the SSL certificates will not be validated. + If \ :literal:`false`\ , the SSL certificates will not be validated. - Configure ``false`` only on personally controlled sites where self-signed certificates are used. + Configure \ :literal:`false`\ only on personally controlled sites where self-signed certificates are used. - Prior to collection version ``5.0.0``, the *validate_certs* is ``false`` by default. + Prior to collection version \ :literal:`5.0.0`\ , the \ :emphasis:`validate\_certs`\ is \ :literal:`false`\ by default. ca_path (optional, path, None) @@ -162,9 +178,9 @@ Notes ----- .. note:: - - The module will always report change when *validate_certificate* is ``true``. + - The module will always report change when \ :emphasis:`validate\_certificate`\ is \ :literal:`true`\ . - Run this module from a system that has direct access to OpenManage Enterprise. - - This module supports ``check_mode``. + - This module supports \ :literal:`check\_mode`\ . diff --git a/ansible_collections/dellemc/openmanage/docs/modules/ome_alert_policies.rst b/ansible_collections/dellemc/openmanage/docs/modules/ome_alert_policies.rst index 0c14c7d9d..39c8c8791 100644 --- a/ansible_collections/dellemc/openmanage/docs/modules/ome_alert_policies.rst +++ b/ansible_collections/dellemc/openmanage/docs/modules/ome_alert_policies.rst @@ -266,24 +266,40 @@ Parameters OpenManage Enterprise or OpenManage Enterprise Modular IP address or hostname. - username (True, str, None) + username (False, str, None) OpenManage Enterprise or OpenManage Enterprise Modular username. + If the username is not provided, then the environment variable \ :envvar:`OME\_USERNAME`\ is used. - password (True, str, None) + Example: export OME\_USERNAME=username + + + password (False, str, None) OpenManage Enterprise or OpenManage Enterprise Modular password. + If the password is not provided, then the environment variable \ :envvar:`OME\_PASSWORD`\ is used. + + Example: export OME\_PASSWORD=password + + + x_auth_token (False, str, None) + Authentication token. + + If the x\_auth\_token is not provided, then the environment variable \ :envvar:`OME\_X\_AUTH\_TOKEN`\ is used. + + Example: export OME\_X\_AUTH\_TOKEN=x\_auth\_token + port (optional, int, 443) OpenManage Enterprise or OpenManage Enterprise Modular HTTPS port. validate_certs (optional, bool, True) - If \ :literal:`False`\ , the SSL certificates will not be validated. + If \ :literal:`false`\ , the SSL certificates will not be validated. - Configure \ :literal:`False`\ only on personally controlled sites where self-signed certificates are used. + Configure \ :literal:`false`\ only on personally controlled sites where self-signed certificates are used. - Prior to collection version \ :literal:`5.0.0`\ , the \ :emphasis:`validate\_certs`\ is \ :literal:`False`\ by default. + Prior to collection version \ :literal:`5.0.0`\ , the \ :emphasis:`validate\_certs`\ is \ :literal:`false`\ by default. ca_path (optional, path, None) diff --git a/ansible_collections/dellemc/openmanage/docs/modules/ome_alert_policies_actions_info.rst b/ansible_collections/dellemc/openmanage/docs/modules/ome_alert_policies_actions_info.rst index a8138a0e6..635d7a50e 100644 --- a/ansible_collections/dellemc/openmanage/docs/modules/ome_alert_policies_actions_info.rst +++ b/ansible_collections/dellemc/openmanage/docs/modules/ome_alert_policies_actions_info.rst @@ -20,7 +20,7 @@ Requirements ------------ The below requirements are needed on the host that executes this module. -- python >= 3.9.6 +- python \>= 3.9.6 @@ -31,24 +31,40 @@ Parameters OpenManage Enterprise or OpenManage Enterprise Modular IP address or hostname. - username (True, str, None) + username (False, str, None) OpenManage Enterprise or OpenManage Enterprise Modular username. + If the username is not provided, then the environment variable \ :envvar:`OME\_USERNAME`\ is used. - password (True, str, None) + Example: export OME\_USERNAME=username + + + password (False, str, None) OpenManage Enterprise or OpenManage Enterprise Modular password. + If the password is not provided, then the environment variable \ :envvar:`OME\_PASSWORD`\ is used. + + Example: export OME\_PASSWORD=password + + + x_auth_token (False, str, None) + Authentication token. + + If the x\_auth\_token is not provided, then the environment variable \ :envvar:`OME\_X\_AUTH\_TOKEN`\ is used. + + Example: export OME\_X\_AUTH\_TOKEN=x\_auth\_token + port (optional, int, 443) OpenManage Enterprise or OpenManage Enterprise Modular HTTPS port. validate_certs (optional, bool, True) - If ``false``, the SSL certificates will not be validated. + If \ :literal:`false`\ , the SSL certificates will not be validated. - Configure ``false`` only on personally controlled sites where self-signed certificates are used. + Configure \ :literal:`false`\ only on personally controlled sites where self-signed certificates are used. - Prior to collection version ``5.0.0``, the *validate_certs* is ``false`` by default. + Prior to collection version \ :literal:`5.0.0`\ , the \ :emphasis:`validate\_certs`\ is \ :literal:`false`\ by default. ca_path (optional, path, None) @@ -68,7 +84,7 @@ Notes .. note:: - Run this module from a system that has direct access to Dell OpenManage Enterprise or OpenManage Enterprise Modular. - This module supports both IPv4 and IPv6 addresses. - - This module supports ``check_mode``. + - This module supports \ :literal:`check\_mode`\ . diff --git a/ansible_collections/dellemc/openmanage/docs/modules/ome_alert_policies_category_info.rst b/ansible_collections/dellemc/openmanage/docs/modules/ome_alert_policies_category_info.rst index 20edbe90b..d8098a363 100644 --- a/ansible_collections/dellemc/openmanage/docs/modules/ome_alert_policies_category_info.rst +++ b/ansible_collections/dellemc/openmanage/docs/modules/ome_alert_policies_category_info.rst @@ -20,7 +20,7 @@ Requirements ------------ The below requirements are needed on the host that executes this module. -- python >= 3.9.6 +- python \>= 3.9.6 @@ -31,24 +31,40 @@ Parameters OpenManage Enterprise or OpenManage Enterprise Modular IP address or hostname. - username (True, str, None) + username (False, str, None) OpenManage Enterprise or OpenManage Enterprise Modular username. + If the username is not provided, then the environment variable \ :envvar:`OME\_USERNAME`\ is used. - password (True, str, None) + Example: export OME\_USERNAME=username + + + password (False, str, None) OpenManage Enterprise or OpenManage Enterprise Modular password. + If the password is not provided, then the environment variable \ :envvar:`OME\_PASSWORD`\ is used. + + Example: export OME\_PASSWORD=password + + + x_auth_token (False, str, None) + Authentication token. + + If the x\_auth\_token is not provided, then the environment variable \ :envvar:`OME\_X\_AUTH\_TOKEN`\ is used. + + Example: export OME\_X\_AUTH\_TOKEN=x\_auth\_token + port (optional, int, 443) OpenManage Enterprise or OpenManage Enterprise Modular HTTPS port. validate_certs (optional, bool, True) - If ``false``, the SSL certificates will not be validated. + If \ :literal:`false`\ , the SSL certificates will not be validated. - Configure ``false`` only on personally controlled sites where self-signed certificates are used. + Configure \ :literal:`false`\ only on personally controlled sites where self-signed certificates are used. - Prior to collection version ``5.0.0``, the *validate_certs* is ``false`` by default. + Prior to collection version \ :literal:`5.0.0`\ , the \ :emphasis:`validate\_certs`\ is \ :literal:`false`\ by default. ca_path (optional, path, None) @@ -68,7 +84,7 @@ Notes .. note:: - Run this module from a system that has direct access to Dell OpenManage Enterprise or OpenManage Enterprise Modular. - This module supports IPv4 and IPv6 addresses. - - This module supports ``check_mode``. + - This module supports \ :literal:`check\_mode`\ . diff --git a/ansible_collections/dellemc/openmanage/docs/modules/ome_alert_policies_info.rst b/ansible_collections/dellemc/openmanage/docs/modules/ome_alert_policies_info.rst index 8dbe503d8..c038bb06f 100644 --- a/ansible_collections/dellemc/openmanage/docs/modules/ome_alert_policies_info.rst +++ b/ansible_collections/dellemc/openmanage/docs/modules/ome_alert_policies_info.rst @@ -24,7 +24,7 @@ Requirements ------------ The below requirements are needed on the host that executes this module. -- python >= 3.9.6 +- python \>= 3.9.6 @@ -39,24 +39,40 @@ Parameters OpenManage Enterprise or OpenManage Enterprise Modular IP address or hostname. - username (True, str, None) + username (False, str, None) OpenManage Enterprise or OpenManage Enterprise Modular username. + If the username is not provided, then the environment variable \ :envvar:`OME\_USERNAME`\ is used. - password (True, str, None) + Example: export OME\_USERNAME=username + + + password (False, str, None) OpenManage Enterprise or OpenManage Enterprise Modular password. + If the password is not provided, then the environment variable \ :envvar:`OME\_PASSWORD`\ is used. + + Example: export OME\_PASSWORD=password + + + x_auth_token (False, str, None) + Authentication token. + + If the x\_auth\_token is not provided, then the environment variable \ :envvar:`OME\_X\_AUTH\_TOKEN`\ is used. + + Example: export OME\_X\_AUTH\_TOKEN=x\_auth\_token + port (optional, int, 443) OpenManage Enterprise or OpenManage Enterprise Modular HTTPS port. validate_certs (optional, bool, True) - If ``false``, the SSL certificates will not be validated. + If \ :literal:`false`\ , the SSL certificates will not be validated. - Configure ``false`` only on personally controlled sites where self-signed certificates are used. + Configure \ :literal:`false`\ only on personally controlled sites where self-signed certificates are used. - Prior to collection version ``5.0.0``, the *validate_certs* is ``false`` by default. + Prior to collection version \ :literal:`5.0.0`\ , the \ :emphasis:`validate\_certs`\ is \ :literal:`false`\ by default. ca_path (optional, path, None) @@ -76,7 +92,7 @@ Notes .. note:: - Run this module from a system that has direct access to Dell OpenManage Enterprise or OpenManage Enterprise Modular. - This module supports both IPv4 and IPv6 addresses. - - This module supports ``check_mode``. + - This module supports \ :literal:`check\_mode`\ . diff --git a/ansible_collections/dellemc/openmanage/docs/modules/ome_alert_policies_message_id_info.rst b/ansible_collections/dellemc/openmanage/docs/modules/ome_alert_policies_message_id_info.rst index 1be11ecbb..768c4b1b4 100644 --- a/ansible_collections/dellemc/openmanage/docs/modules/ome_alert_policies_message_id_info.rst +++ b/ansible_collections/dellemc/openmanage/docs/modules/ome_alert_policies_message_id_info.rst @@ -20,7 +20,7 @@ Requirements ------------ The below requirements are needed on the host that executes this module. -- python >= 3.9.6 +- python \>= 3.9.6 @@ -31,24 +31,40 @@ Parameters OpenManage Enterprise or OpenManage Enterprise Modular IP address or hostname. - username (True, str, None) + username (False, str, None) OpenManage Enterprise or OpenManage Enterprise Modular username. + If the username is not provided, then the environment variable \ :envvar:`OME\_USERNAME`\ is used. - password (True, str, None) + Example: export OME\_USERNAME=username + + + password (False, str, None) OpenManage Enterprise or OpenManage Enterprise Modular password. + If the password is not provided, then the environment variable \ :envvar:`OME\_PASSWORD`\ is used. + + Example: export OME\_PASSWORD=password + + + x_auth_token (False, str, None) + Authentication token. + + If the x\_auth\_token is not provided, then the environment variable \ :envvar:`OME\_X\_AUTH\_TOKEN`\ is used. + + Example: export OME\_X\_AUTH\_TOKEN=x\_auth\_token + port (optional, int, 443) OpenManage Enterprise or OpenManage Enterprise Modular HTTPS port. validate_certs (optional, bool, True) - If ``false``, the SSL certificates will not be validated. + If \ :literal:`false`\ , the SSL certificates will not be validated. - Configure ``false`` only on personally controlled sites where self-signed certificates are used. + Configure \ :literal:`false`\ only on personally controlled sites where self-signed certificates are used. - Prior to collection version ``5.0.0``, the *validate_certs* is ``false`` by default. + Prior to collection version \ :literal:`5.0.0`\ , the \ :emphasis:`validate\_certs`\ is \ :literal:`false`\ by default. ca_path (optional, path, None) @@ -67,7 +83,7 @@ Notes .. note:: - Run this module from a system that has direct access to Dell OpenManage Enterprise or OpenManage Enterprise Modular. - - This module supports ``check_mode``. + - This module supports \ :literal:`check\_mode`\ . - This module supports IPv4 and IPv6 addresses. diff --git a/ansible_collections/dellemc/openmanage/docs/modules/ome_application_alerts_smtp.rst b/ansible_collections/dellemc/openmanage/docs/modules/ome_application_alerts_smtp.rst index ce2b05be0..08e92b320 100644 --- a/ansible_collections/dellemc/openmanage/docs/modules/ome_application_alerts_smtp.rst +++ b/ansible_collections/dellemc/openmanage/docs/modules/ome_application_alerts_smtp.rst @@ -20,7 +20,7 @@ Requirements ------------ The below requirements are needed on the host that executes this module. -- python >= 3.8.6 +- python \>= 3.9.6 @@ -42,9 +42,9 @@ Parameters enable_authentication (True, bool, None) Enable or disable authentication to access the SMTP server. - The *credentials* are mandatory if *enable_authentication* is ``true``. + The \ :emphasis:`credentials`\ are mandatory if \ :emphasis:`enable\_authentication`\ is \ :literal:`true`\ . - The module will always report change when this is ``true``. + The module will always report change when this is \ :literal:`true`\ . credentials (optional, dict, None) @@ -64,24 +64,40 @@ Parameters OpenManage Enterprise or OpenManage Enterprise Modular IP address or hostname. - username (True, str, None) + username (False, str, None) OpenManage Enterprise or OpenManage Enterprise Modular username. + If the username is not provided, then the environment variable \ :envvar:`OME\_USERNAME`\ is used. - password (True, str, None) + Example: export OME\_USERNAME=username + + + password (False, str, None) OpenManage Enterprise or OpenManage Enterprise Modular password. + If the password is not provided, then the environment variable \ :envvar:`OME\_PASSWORD`\ is used. + + Example: export OME\_PASSWORD=password + + + x_auth_token (False, str, None) + Authentication token. + + If the x\_auth\_token is not provided, then the environment variable \ :envvar:`OME\_X\_AUTH\_TOKEN`\ is used. + + Example: export OME\_X\_AUTH\_TOKEN=x\_auth\_token + port (optional, int, 443) OpenManage Enterprise or OpenManage Enterprise Modular HTTPS port. validate_certs (optional, bool, True) - If ``false``, the SSL certificates will not be validated. + If \ :literal:`false`\ , the SSL certificates will not be validated. - Configure ``false`` only on personally controlled sites where self-signed certificates are used. + Configure \ :literal:`false`\ only on personally controlled sites where self-signed certificates are used. - Prior to collection version ``5.0.0``, the *validate_certs* is ``false`` by default. + Prior to collection version \ :literal:`5.0.0`\ , the \ :emphasis:`validate\_certs`\ is \ :literal:`false`\ by default. ca_path (optional, path, None) @@ -99,9 +115,9 @@ Notes ----- .. note:: - - The module will always report change when *enable_authentication* is ``true``. + - The module will always report change when \ :emphasis:`enable\_authentication`\ is \ :literal:`true`\ . - Run this module from a system that has direct access to Dell OpenManage Enterprise or OpenManage Enterprise Modular. - - This module support ``check_mode``. + - This module support \ :literal:`check\_mode`\ . diff --git a/ansible_collections/dellemc/openmanage/docs/modules/ome_application_alerts_syslog.rst b/ansible_collections/dellemc/openmanage/docs/modules/ome_application_alerts_syslog.rst index 7fddd6e13..cbaa2606b 100644 --- a/ansible_collections/dellemc/openmanage/docs/modules/ome_application_alerts_syslog.rst +++ b/ansible_collections/dellemc/openmanage/docs/modules/ome_application_alerts_syslog.rst @@ -20,7 +20,7 @@ Requirements ------------ The below requirements are needed on the host that executes this module. -- python >= 3.8.6 +- python \>= 3.9.6 @@ -42,7 +42,7 @@ Parameters destination_address (optional, str, None) The IP address, FQDN or hostname of the syslog server. - This is required if *enabled* is ``true``. + This is required if \ :emphasis:`enabled`\ is \ :literal:`true`\ . port_number (optional, int, None) @@ -54,24 +54,40 @@ Parameters OpenManage Enterprise or OpenManage Enterprise Modular IP address or hostname. - username (True, str, None) + username (False, str, None) OpenManage Enterprise or OpenManage Enterprise Modular username. + If the username is not provided, then the environment variable \ :envvar:`OME\_USERNAME`\ is used. - password (True, str, None) + Example: export OME\_USERNAME=username + + + password (False, str, None) OpenManage Enterprise or OpenManage Enterprise Modular password. + If the password is not provided, then the environment variable \ :envvar:`OME\_PASSWORD`\ is used. + + Example: export OME\_PASSWORD=password + + + x_auth_token (False, str, None) + Authentication token. + + If the x\_auth\_token is not provided, then the environment variable \ :envvar:`OME\_X\_AUTH\_TOKEN`\ is used. + + Example: export OME\_X\_AUTH\_TOKEN=x\_auth\_token + port (optional, int, 443) OpenManage Enterprise or OpenManage Enterprise Modular HTTPS port. validate_certs (optional, bool, True) - If ``false``, the SSL certificates will not be validated. + If \ :literal:`false`\ , the SSL certificates will not be validated. - Configure ``false`` only on personally controlled sites where self-signed certificates are used. + Configure \ :literal:`false`\ only on personally controlled sites where self-signed certificates are used. - Prior to collection version ``5.0.0``, the *validate_certs* is ``false`` by default. + Prior to collection version \ :literal:`5.0.0`\ , the \ :emphasis:`validate\_certs`\ is \ :literal:`false`\ by default. ca_path (optional, path, None) @@ -90,7 +106,7 @@ Notes .. note:: - Run this module from a system that has direct access to Dell OpenManage Enterprise or Dell OpenManage Enterprise Modular. - - This module supports ``check_mode``. + - This module supports \ :literal:`check\_mode`\ . diff --git a/ansible_collections/dellemc/openmanage/docs/modules/ome_application_certificate.rst b/ansible_collections/dellemc/openmanage/docs/modules/ome_application_certificate.rst index d3c8a2a0d..8a917ef37 100644 --- a/ansible_collections/dellemc/openmanage/docs/modules/ome_application_certificate.rst +++ b/ansible_collections/dellemc/openmanage/docs/modules/ome_application_certificate.rst @@ -20,7 +20,7 @@ Requirements ------------ The below requirements are needed on the host that executes this module. -- python >= 3.9.6 +- python \>= 3.9.6 @@ -28,35 +28,35 @@ Parameters ---------- command (optional, str, generate_csr) - ``generate_csr`` allows the generation of a CSR and ``upload`` uploads the certificate. + \ :literal:`generate\_csr`\ allows the generation of a CSR and \ :literal:`upload`\ uploads the certificate. distinguished_name (optional, str, None) - Name of the certificate issuer. This option is applicable for ``generate_csr``. + Name of the certificate issuer. This option is applicable for \ :literal:`generate\_csr`\ . department_name (optional, str, None) - Name of the department that issued the certificate. This option is applicable for ``generate_csr``. + Name of the department that issued the certificate. This option is applicable for \ :literal:`generate\_csr`\ . business_name (optional, str, None) - Name of the business that issued the certificate. This option is applicable for ``generate_csr``. + Name of the business that issued the certificate. This option is applicable for \ :literal:`generate\_csr`\ . locality (optional, str, None) - Local address of the issuer of the certificate. This option is applicable for ``generate_csr``. + Local address of the issuer of the certificate. This option is applicable for \ :literal:`generate\_csr`\ . country_state (optional, str, None) - State in which the issuer resides. This option is applicable for ``generate_csr``. + State in which the issuer resides. This option is applicable for \ :literal:`generate\_csr`\ . country (optional, str, None) - Country in which the issuer resides. This option is applicable for ``generate_csr``. + Country in which the issuer resides. This option is applicable for \ :literal:`generate\_csr`\ . email (optional, str, None) - Email associated with the issuer. This option is applicable for ``generate_csr``. + Email associated with the issuer. This option is applicable for \ :literal:`generate\_csr`\ . subject_alternative_names (optional, str, None) @@ -66,31 +66,47 @@ Parameters upload_file (optional, str, None) - Local path of the certificate file to be uploaded. This option is applicable for ``upload``. Once the certificate is uploaded, OpenManage Enterprise cannot be accessed for a few seconds. + Local path of the certificate file to be uploaded. This option is applicable for \ :literal:`upload`\ . Once the certificate is uploaded, OpenManage Enterprise cannot be accessed for a few seconds. hostname (True, str, None) OpenManage Enterprise or OpenManage Enterprise Modular IP address or hostname. - username (True, str, None) + username (False, str, None) OpenManage Enterprise or OpenManage Enterprise Modular username. + If the username is not provided, then the environment variable \ :envvar:`OME\_USERNAME`\ is used. - password (True, str, None) + Example: export OME\_USERNAME=username + + + password (False, str, None) OpenManage Enterprise or OpenManage Enterprise Modular password. + If the password is not provided, then the environment variable \ :envvar:`OME\_PASSWORD`\ is used. + + Example: export OME\_PASSWORD=password + + + x_auth_token (False, str, None) + Authentication token. + + If the x\_auth\_token is not provided, then the environment variable \ :envvar:`OME\_X\_AUTH\_TOKEN`\ is used. + + Example: export OME\_X\_AUTH\_TOKEN=x\_auth\_token + port (optional, int, 443) OpenManage Enterprise or OpenManage Enterprise Modular HTTPS port. validate_certs (optional, bool, True) - If ``false``, the SSL certificates will not be validated. + If \ :literal:`false`\ , the SSL certificates will not be validated. - Configure ``false`` only on personally controlled sites where self-signed certificates are used. + Configure \ :literal:`false`\ only on personally controlled sites where self-signed certificates are used. - Prior to collection version ``5.0.0``, the *validate_certs* is ``false`` by default. + Prior to collection version \ :literal:`5.0.0`\ , the \ :emphasis:`validate\_certs`\ is \ :literal:`false`\ by default. ca_path (optional, path, None) @@ -109,7 +125,7 @@ Notes .. note:: - If a certificate is uploaded, which is identical to an already existing certificate, it is accepted by the module. - - This module does not support ``check_mode``. + - This module does not support \ :literal:`check\_mode`\ . diff --git a/ansible_collections/dellemc/openmanage/docs/modules/ome_application_console_preferences.rst b/ansible_collections/dellemc/openmanage/docs/modules/ome_application_console_preferences.rst index 45292acd0..f91984942 100644 --- a/ansible_collections/dellemc/openmanage/docs/modules/ome_application_console_preferences.rst +++ b/ansible_collections/dellemc/openmanage/docs/modules/ome_application_console_preferences.rst @@ -153,13 +153,29 @@ Parameters OpenManage Enterprise or OpenManage Enterprise Modular IP address or hostname. - username (True, str, None) + username (False, str, None) OpenManage Enterprise or OpenManage Enterprise Modular username. + If the username is not provided, then the environment variable \ :envvar:`OME\_USERNAME`\ is used. - password (True, str, None) + Example: export OME\_USERNAME=username + + + password (False, str, None) OpenManage Enterprise or OpenManage Enterprise Modular password. + If the password is not provided, then the environment variable \ :envvar:`OME\_PASSWORD`\ is used. + + Example: export OME\_PASSWORD=password + + + x_auth_token (False, str, None) + Authentication token. + + If the x\_auth\_token is not provided, then the environment variable \ :envvar:`OME\_X\_AUTH\_TOKEN`\ is used. + + Example: export OME\_X\_AUTH\_TOKEN=x\_auth\_token + port (optional, int, 443) OpenManage Enterprise or OpenManage Enterprise Modular HTTPS port. diff --git a/ansible_collections/dellemc/openmanage/docs/modules/ome_application_network_address.rst b/ansible_collections/dellemc/openmanage/docs/modules/ome_application_network_address.rst index c5931f2c6..6305c4caf 100644 --- a/ansible_collections/dellemc/openmanage/docs/modules/ome_application_network_address.rst +++ b/ansible_collections/dellemc/openmanage/docs/modules/ome_application_network_address.rst @@ -20,7 +20,7 @@ Requirements ------------ The below requirements are needed on the host that executes this module. -- python >= 3.8.6 +- python \>= 3.9.6 @@ -40,7 +40,7 @@ Parameters ipv4_configuration (optional, dict, None) IPv4 network configuration. - *Warning* Ensure that you have an alternate interface to access OpenManage Enterprise as these options can change the current IPv4 address for *hostname*. + \ :emphasis:`Warning`\ Ensure that you have an alternate interface to access OpenManage Enterprise as these options can change the current IPv4 address for \ :emphasis:`hostname`\ . enable (True, bool, None) @@ -50,50 +50,50 @@ Parameters enable_dhcp (optional, bool, None) Enable or disable the automatic request to get an IPv4 address from the IPv4 Dynamic Host Configuration Protocol (DHCP) server - If *enable_dhcp* option is true, OpenManage Enterprise retrieves the IP configuration—IPv4 address, subnet mask, and gateway from a DHCP server on the existing network. + If \ :emphasis:`enable\_dhcp`\ option is true, OpenManage Enterprise retrieves the IP configuration—IPv4 address, subnet mask, and gateway from a DHCP server on the existing network. static_ip_address (optional, str, None) Static IPv4 address - This option is applicable when *enable_dhcp* is false. + This option is applicable when \ :emphasis:`enable\_dhcp`\ is false. static_subnet_mask (optional, str, None) Static IPv4 subnet mask address - This option is applicable when *enable_dhcp* is false. + This option is applicable when \ :emphasis:`enable\_dhcp`\ is false. static_gateway (optional, str, None) Static IPv4 gateway address - This option is applicable when *enable_dhcp* is false. + This option is applicable when \ :emphasis:`enable\_dhcp`\ is false. use_dhcp_for_dns_server_names (optional, bool, None) This option allows to automatically request and obtain a DNS server IPv4 address from the DHCP server. - This option is applicable when *enable_dhcp* is true. + This option is applicable when \ :emphasis:`enable\_dhcp`\ is true. static_preferred_dns_server (optional, str, None) Static IPv4 DNS preferred server - This option is applicable when *use_dhcp_for_dns_server_names* is false. + This option is applicable when \ :emphasis:`use\_dhcp\_for\_dns\_server\_names`\ is false. static_alternate_dns_server (optional, str, None) Static IPv4 DNS alternate server - This option is applicable when *use_dhcp_for_dns_server_names* is false. + This option is applicable when \ :emphasis:`use\_dhcp\_for\_dns\_server\_names`\ is false. ipv6_configuration (optional, dict, None) IPv6 network configuration. - *Warning* Ensure that you have an alternate interface to access OpenManage Enterprise as these options can change the current IPv6 address for *hostname*. + \ :emphasis:`Warning`\ Ensure that you have an alternate interface to access OpenManage Enterprise as these options can change the current IPv6 address for \ :emphasis:`hostname`\ . enable (True, bool, None) @@ -103,43 +103,43 @@ Parameters enable_auto_configuration (optional, bool, None) Enable or disable the automatic request to get an IPv6 address from the IPv6 DHCP server or router advertisements(RA) - If *enable_auto_configuration* is true, OME retrieves IP configuration-IPv6 address, prefix, and gateway, from a DHCPv6 server on the existing network + If \ :emphasis:`enable\_auto\_configuration`\ is true, OME retrieves IP configuration-IPv6 address, prefix, and gateway, from a DHCPv6 server on the existing network static_ip_address (optional, str, None) Static IPv6 address - This option is applicable when *enable_auto_configuration* is false. + This option is applicable when \ :emphasis:`enable\_auto\_configuration`\ is false. static_prefix_length (optional, int, None) Static IPv6 prefix length - This option is applicable when *enable_auto_configuration* is false. + This option is applicable when \ :emphasis:`enable\_auto\_configuration`\ is false. static_gateway (optional, str, None) Static IPv6 gateway address - This option is applicable when *enable_auto_configuration* is false. + This option is applicable when \ :emphasis:`enable\_auto\_configuration`\ is false. use_dhcp_for_dns_server_names (optional, bool, None) This option allows to automatically request and obtain a DNS server IPv6 address from the DHCP server. - This option is applicable when *enable_auto_configuration* is true + This option is applicable when \ :emphasis:`enable\_auto\_configuration`\ is true static_preferred_dns_server (optional, str, None) Static IPv6 DNS preferred server - This option is applicable when *use_dhcp_for_dns_server_names* is false. + This option is applicable when \ :emphasis:`use\_dhcp\_for\_dns\_server\_names`\ is false. static_alternate_dns_server (optional, str, None) Static IPv6 DNS alternate server - This option is applicable when *use_dhcp_for_dns_server_names* is false. + This option is applicable when \ :emphasis:`use\_dhcp\_for\_dns\_server\_names`\ is false. @@ -152,15 +152,15 @@ Parameters enable_vlan (True, bool, None) Enable or disable vLAN for management. - The vLAN configuration cannot be updated if the *register_with_dns* field under *dns_configuration* is true. + The vLAN configuration cannot be updated if the \ :emphasis:`register\_with\_dns`\ field under \ :emphasis:`dns\_configuration`\ is true. - *WARNING* Ensure that the network cable is plugged to the correct port after the vLAN configuration changes have been made. If not, the configuration change may not be effective. + \ :emphasis:`WARNING`\ Ensure that the network cable is plugged to the correct port after the vLAN configuration changes have been made. If not, the configuration change may not be effective. vlan_id (optional, int, None) vLAN ID. - This option is applicable when *enable_vlan* is true. + This option is applicable when \ :emphasis:`enable\_vlan`\ is true. @@ -169,25 +169,25 @@ Parameters register_with_dns (optional, bool, None) - Register/Unregister *dns_name* on the DNS Server. + Register/Unregister \ :emphasis:`dns\_name`\ on the DNS Server. This option cannot be updated if vLAN configuration changes. use_dhcp_for_dns_domain_name (optional, bool, None) - Get the *dns_domain_name* using a DHCP server. + Get the \ :emphasis:`dns\_domain\_name`\ using a DHCP server. dns_name (optional, str, None) - DNS name for *hostname* + DNS name for \ :emphasis:`hostname`\ - This is applicable when *register_with_dns* is true. + This is applicable when \ :emphasis:`register\_with\_dns`\ is true. dns_domain_name (optional, str, None) Static DNS domain name - This is applicable when *use_dhcp_for_dns_domain_name* is false. + This is applicable when \ :emphasis:`use\_dhcp\_for\_dns\_domain\_name`\ is false. @@ -201,24 +201,40 @@ Parameters OpenManage Enterprise or OpenManage Enterprise Modular IP address or hostname. - username (True, str, None) + username (False, str, None) OpenManage Enterprise or OpenManage Enterprise Modular username. + If the username is not provided, then the environment variable \ :envvar:`OME\_USERNAME`\ is used. - password (True, str, None) + Example: export OME\_USERNAME=username + + + password (False, str, None) OpenManage Enterprise or OpenManage Enterprise Modular password. + If the password is not provided, then the environment variable \ :envvar:`OME\_PASSWORD`\ is used. + + Example: export OME\_PASSWORD=password + + + x_auth_token (False, str, None) + Authentication token. + + If the x\_auth\_token is not provided, then the environment variable \ :envvar:`OME\_X\_AUTH\_TOKEN`\ is used. + + Example: export OME\_X\_AUTH\_TOKEN=x\_auth\_token + port (optional, int, 443) OpenManage Enterprise or OpenManage Enterprise Modular HTTPS port. validate_certs (optional, bool, True) - If ``false``, the SSL certificates will not be validated. + If \ :literal:`false`\ , the SSL certificates will not be validated. - Configure ``false`` only on personally controlled sites where self-signed certificates are used. + Configure \ :literal:`false`\ only on personally controlled sites where self-signed certificates are used. - Prior to collection version ``5.0.0``, the *validate_certs* is ``false`` by default. + Prior to collection version \ :literal:`5.0.0`\ , the \ :emphasis:`validate\_certs`\ is \ :literal:`false`\ by default. ca_path (optional, path, None) @@ -238,7 +254,7 @@ Notes .. note:: - The configuration changes can only be applied to one interface at a time. - The system management consoles might be unreachable for some time after the configuration changes are applied. - - This module supports ``check_mode``. + - This module supports \ :literal:`check\_mode`\ . @@ -370,7 +386,7 @@ network_configuration (on success, dict, {'Delay': 0, 'DnsConfiguration': {'DnsD job_info (on success, dict, {'Builtin': False, 'CreatedBy': 'system', 'Editable': True, 'EndTime': None, 'Id': 14902, 'JobDescription': 'Generic OME runtime task', 'JobName': 'OMERealtime_Task', 'JobStatus': {'Id': 2080, 'Name': 'New'}, 'JobType': {'Id': 207, 'Internal': True, 'Name': 'OMERealtime_Task'}, 'LastRun': None, 'LastRunStatus': {'Id': 2080, 'Name': 'New'}, 'NextRun': None, 'Params': [{'JobId': 14902, 'Key': 'Nmcli_Update', 'Value': '{"interfaceName":"eth0","profileName":"eth0","enableNIC":true, "ipv4Configuration":{"enable":true,"enableDHCP":true,"staticIPAddress":"", "staticSubnetMask":"","staticGateway":"","useDHCPForDNSServerNames":true, "staticPreferredDNSServer":"","staticAlternateDNSServer":""}, "ipv6Configuration":{"enable":false,"enableAutoConfiguration":true,"staticIPAddress":"", "staticPrefixLength":0,"staticGateway":"","useDHCPForDNSServerNames":false, "staticPreferredDNSServer":"","staticAlternateDNSServer":""}, "managementVLAN":{"enableVLAN":false,"id":0},"dnsConfiguration":{"registerWithDNS":false, "dnsName":"","useDHCPForDNSDomainName":false,"dnsDomainName":"","fqdndomainName":"", "ipv4CurrentPreferredDNSServer":"","ipv4CurrentAlternateDNSServer":"", "ipv6CurrentPreferredDNSServer":"","ipv6CurrentAlternateDNSServer":""}, "currentSettings":{"ipv4Address":[],"ipv4Gateway":"","ipv4Dns":[],"ipv4Domain":"", "ipv6Address":[],"ipv6LinkLocalAddress":"","ipv6Gateway":"","ipv6Dns":[], "ipv6Domain":""},"delay":0,"primaryInterface":true,"modifiedConfigs":{}}'}], 'Schedule': 'startnow', 'StartTime': None, 'State': 'Enabled', 'Targets': [], 'UpdatedBy': None, 'Visible': True}) - Details of the job to update in case OME version is >= 3.3. + Details of the job to update in case OME version is \>= 3.3. error_info (on HTTP error, dict, {'error': {'@Message.ExtendedInfo': [{'Message': 'Unable to update the address configuration because a dependent field is missing for Use DHCP for DNS Domain Name, Enable DHCP for ipv4 or Enable Autoconfig for ipv6 settings for valid configuration .', 'MessageArgs': ['Use DHCP for DNS Domain Name, Enable DHCP for ipv4 or Enable Autoconfig for ipv6 settings for valid configuration'], 'MessageId': 'CAPP1304', 'RelatedProperties': [], 'Resolution': 'Make sure that all dependent fields contain valid content and retry the operation.', 'Severity': 'Critical'}], 'code': 'Base.1.0.GeneralError', 'message': 'A general error has occurred. See ExtendedInfo for more information.'}}) diff --git a/ansible_collections/dellemc/openmanage/docs/modules/ome_application_network_proxy.rst b/ansible_collections/dellemc/openmanage/docs/modules/ome_application_network_proxy.rst index ed48d90f6..8bd375b97 100644 --- a/ansible_collections/dellemc/openmanage/docs/modules/ome_application_network_proxy.rst +++ b/ansible_collections/dellemc/openmanage/docs/modules/ome_application_network_proxy.rst @@ -20,7 +20,7 @@ Requirements ------------ The below requirements are needed on the host that executes this module. -- python >= 3.8.6 +- python \>= 3.9.6 @@ -30,63 +30,79 @@ Parameters enable_proxy (True, bool, None) Enables or disables the HTTP proxy configuration. - If *enable proxy* is false, then the HTTP proxy configuration is set to its default value. + If \ :emphasis:`enable proxy`\ is false, then the HTTP proxy configuration is set to its default value. ip_address (optional, str, None) Proxy server address. - This option is mandatory when *enable_proxy* is true. + This option is mandatory when \ :emphasis:`enable\_proxy`\ is true. proxy_port (optional, int, None) Proxy server's port number. - This option is mandatory when *enable_proxy* is true. + This option is mandatory when \ :emphasis:`enable\_proxy`\ is true. enable_authentication (optional, bool, None) Enable or disable proxy authentication. - If *enable_authentication* is true, *proxy_username* and *proxy_password* must be provided. + If \ :emphasis:`enable\_authentication`\ is true, \ :emphasis:`proxy\_username`\ and \ :emphasis:`proxy\_password`\ must be provided. - If *enable_authentication* is false, the proxy username and password are set to its default values. + If \ :emphasis:`enable\_authentication`\ is false, the proxy username and password are set to its default values. proxy_username (optional, str, None) Proxy server username. - This option is mandatory when *enable_authentication* is true. + This option is mandatory when \ :emphasis:`enable\_authentication`\ is true. proxy_password (optional, str, None) Proxy server password. - This option is mandatory when *enable_authentication* is true. + This option is mandatory when \ :emphasis:`enable\_authentication`\ is true. hostname (True, str, None) OpenManage Enterprise or OpenManage Enterprise Modular IP address or hostname. - username (True, str, None) + username (False, str, None) OpenManage Enterprise or OpenManage Enterprise Modular username. + If the username is not provided, then the environment variable \ :envvar:`OME\_USERNAME`\ is used. - password (True, str, None) + Example: export OME\_USERNAME=username + + + password (False, str, None) OpenManage Enterprise or OpenManage Enterprise Modular password. + If the password is not provided, then the environment variable \ :envvar:`OME\_PASSWORD`\ is used. + + Example: export OME\_PASSWORD=password + + + x_auth_token (False, str, None) + Authentication token. + + If the x\_auth\_token is not provided, then the environment variable \ :envvar:`OME\_X\_AUTH\_TOKEN`\ is used. + + Example: export OME\_X\_AUTH\_TOKEN=x\_auth\_token + port (optional, int, 443) OpenManage Enterprise or OpenManage Enterprise Modular HTTPS port. validate_certs (optional, bool, True) - If ``false``, the SSL certificates will not be validated. + If \ :literal:`false`\ , the SSL certificates will not be validated. - Configure ``false`` only on personally controlled sites where self-signed certificates are used. + Configure \ :literal:`false`\ only on personally controlled sites where self-signed certificates are used. - Prior to collection version ``5.0.0``, the *validate_certs* is ``false`` by default. + Prior to collection version \ :literal:`5.0.0`\ , the \ :emphasis:`validate\_certs`\ is \ :literal:`false`\ by default. ca_path (optional, path, None) @@ -105,7 +121,7 @@ Notes .. note:: - Run this module from a system that has direct access to Dell OpenManage Enterprise. - - This module does not support ``check_mode``. + - This module does not support \ :literal:`check\_mode`\ . diff --git a/ansible_collections/dellemc/openmanage/docs/modules/ome_application_network_settings.rst b/ansible_collections/dellemc/openmanage/docs/modules/ome_application_network_settings.rst index 1cc02239c..c98dc08e9 100644 --- a/ansible_collections/dellemc/openmanage/docs/modules/ome_application_network_settings.rst +++ b/ansible_collections/dellemc/openmanage/docs/modules/ome_application_network_settings.rst @@ -20,7 +20,7 @@ Requirements ------------ The below requirements are needed on the host that executes this module. -- python >= 3.8.6 +- python \>= 3.9.6 @@ -38,15 +38,15 @@ Parameters universal_timeout (optional, float, None) Duration of inactivity in minutes after which all sessions end. - This is applicable when *enable_universal_timeout* is ``true``. + This is applicable when \ :emphasis:`enable\_universal\_timeout`\ is \ :literal:`true`\ . - This is mutually exclusive with *api_timeout*, *gui_timeout*, *ssh_timeout* and *serial_timeout*. + This is mutually exclusive with \ :emphasis:`api\_timeout`\ , \ :emphasis:`gui\_timeout`\ , \ :emphasis:`ssh\_timeout`\ and \ :emphasis:`serial\_timeout`\ . api_timeout (optional, float, None) Duration of inactivity in minutes after which the API session ends. - This is mutually exclusive with *universal_timeout*. + This is mutually exclusive with \ :emphasis:`universal\_timeout`\ . api_sessions (optional, int, None) @@ -56,7 +56,7 @@ Parameters gui_timeout (optional, float, None) Duration of inactivity in minutes after which the web interface of Graphical User Interface (GUI) session ends. - This is mutually exclusive with *universal_timeout*. + This is mutually exclusive with \ :emphasis:`universal\_timeout`\ . gui_sessions (optional, int, None) @@ -68,7 +68,7 @@ Parameters This is applicable only for OpenManage Enterprise Modular. - This is mutually exclusive with *universal_timeout*. + This is mutually exclusive with \ :emphasis:`universal\_timeout`\ . ssh_sessions (optional, int, None) @@ -82,7 +82,7 @@ Parameters This is applicable only for OpenManage Enterprise Modular. - This is mutually exclusive with *universal_timeout*. + This is mutually exclusive with \ :emphasis:`universal\_timeout`\ . serial_sessions (optional, int, None) @@ -96,24 +96,40 @@ Parameters OpenManage Enterprise or OpenManage Enterprise Modular IP address or hostname. - username (True, str, None) + username (False, str, None) OpenManage Enterprise or OpenManage Enterprise Modular username. + If the username is not provided, then the environment variable \ :envvar:`OME\_USERNAME`\ is used. - password (True, str, None) + Example: export OME\_USERNAME=username + + + password (False, str, None) OpenManage Enterprise or OpenManage Enterprise Modular password. + If the password is not provided, then the environment variable \ :envvar:`OME\_PASSWORD`\ is used. + + Example: export OME\_PASSWORD=password + + + x_auth_token (False, str, None) + Authentication token. + + If the x\_auth\_token is not provided, then the environment variable \ :envvar:`OME\_X\_AUTH\_TOKEN`\ is used. + + Example: export OME\_X\_AUTH\_TOKEN=x\_auth\_token + port (optional, int, 443) OpenManage Enterprise or OpenManage Enterprise Modular HTTPS port. validate_certs (optional, bool, True) - If ``false``, the SSL certificates will not be validated. + If \ :literal:`false`\ , the SSL certificates will not be validated. - Configure ``false`` only on personally controlled sites where self-signed certificates are used. + Configure \ :literal:`false`\ only on personally controlled sites where self-signed certificates are used. - Prior to collection version ``5.0.0``, the *validate_certs* is ``false`` by default. + Prior to collection version \ :literal:`5.0.0`\ , the \ :emphasis:`validate\_certs`\ is \ :literal:`false`\ by default. ca_path (optional, path, None) @@ -133,7 +149,7 @@ Notes .. note:: - Run this module from a system that has direct access to Dell OpenManage Enterprise or OpenManage Enterprise Modular. - To configure other network settings such as network address, web server, and so on, refer to the respective OpenManage Enterprise application network setting modules. - - This module supports ``check_mode``. + - This module supports \ :literal:`check\_mode`\ . diff --git a/ansible_collections/dellemc/openmanage/docs/modules/ome_application_network_time.rst b/ansible_collections/dellemc/openmanage/docs/modules/ome_application_network_time.rst index e0f939646..b37675ffc 100644 --- a/ansible_collections/dellemc/openmanage/docs/modules/ome_application_network_time.rst +++ b/ansible_collections/dellemc/openmanage/docs/modules/ome_application_network_time.rst @@ -20,7 +20,7 @@ Requirements ------------ The below requirements are needed on the host that executes this module. -- python >= 3.8.6 +- python \>= 3.9.6 @@ -30,13 +30,13 @@ Parameters enable_ntp (True, bool, None) Enables or disables Network Time Protocol(NTP). - If *enable_ntp* is false, then the NTP addresses reset to their default values. + If \ :emphasis:`enable\_ntp`\ is false, then the NTP addresses reset to their default values. system_time (optional, str, None) Time in the current system. - This option is only applicable when *enable_ntp* is false. + This option is only applicable when \ :emphasis:`enable\_ntp`\ is false. This option must be provided in following format 'yyyy-mm-dd hh:mm:ss'. @@ -50,43 +50,59 @@ Parameters primary_ntp_address (optional, str, None) The primary NTP address. - This option is applicable when *enable_ntp* is true. + This option is applicable when \ :emphasis:`enable\_ntp`\ is true. secondary_ntp_address1 (optional, str, None) The first secondary NTP address. - This option is applicable when *enable_ntp* is true. + This option is applicable when \ :emphasis:`enable\_ntp`\ is true. secondary_ntp_address2 (optional, str, None) The second secondary NTP address. - This option is applicable when *enable_ntp* is true. + This option is applicable when \ :emphasis:`enable\_ntp`\ is true. hostname (True, str, None) OpenManage Enterprise or OpenManage Enterprise Modular IP address or hostname. - username (True, str, None) + username (False, str, None) OpenManage Enterprise or OpenManage Enterprise Modular username. + If the username is not provided, then the environment variable \ :envvar:`OME\_USERNAME`\ is used. - password (True, str, None) + Example: export OME\_USERNAME=username + + + password (False, str, None) OpenManage Enterprise or OpenManage Enterprise Modular password. + If the password is not provided, then the environment variable \ :envvar:`OME\_PASSWORD`\ is used. + + Example: export OME\_PASSWORD=password + + + x_auth_token (False, str, None) + Authentication token. + + If the x\_auth\_token is not provided, then the environment variable \ :envvar:`OME\_X\_AUTH\_TOKEN`\ is used. + + Example: export OME\_X\_AUTH\_TOKEN=x\_auth\_token + port (optional, int, 443) OpenManage Enterprise or OpenManage Enterprise Modular HTTPS port. validate_certs (optional, bool, True) - If ``false``, the SSL certificates will not be validated. + If \ :literal:`false`\ , the SSL certificates will not be validated. - Configure ``false`` only on personally controlled sites where self-signed certificates are used. + Configure \ :literal:`false`\ only on personally controlled sites where self-signed certificates are used. - Prior to collection version ``5.0.0``, the *validate_certs* is ``false`` by default. + Prior to collection version \ :literal:`5.0.0`\ , the \ :emphasis:`validate\_certs`\ is \ :literal:`false`\ by default. ca_path (optional, path, None) @@ -105,7 +121,7 @@ Notes .. note:: - Run this module from a system that has direct access to Dell OpenManage Enterprise. - - This module supports ``check_mode``. + - This module supports \ :literal:`check\_mode`\ . diff --git a/ansible_collections/dellemc/openmanage/docs/modules/ome_application_network_webserver.rst b/ansible_collections/dellemc/openmanage/docs/modules/ome_application_network_webserver.rst index 64adb1bf5..0cf55561d 100644 --- a/ansible_collections/dellemc/openmanage/docs/modules/ome_application_network_webserver.rst +++ b/ansible_collections/dellemc/openmanage/docs/modules/ome_application_network_webserver.rst @@ -20,7 +20,7 @@ Requirements ------------ The below requirements are needed on the host that executes this module. -- python >= 3.8.6 +- python \>= 3.9.6 @@ -30,7 +30,7 @@ Parameters webserver_port (optional, int, None) Port number used by OpenManage Enterprise to establish a secure server connection. - *WARNING* A change in port number results in a loss of connectivity in the current session for more than a minute. + \ :emphasis:`WARNING`\ A change in port number results in a loss of connectivity in the current session for more than a minute. webserver_timeout (optional, int, None) @@ -43,24 +43,40 @@ Parameters OpenManage Enterprise or OpenManage Enterprise Modular IP address or hostname. - username (True, str, None) + username (False, str, None) OpenManage Enterprise or OpenManage Enterprise Modular username. + If the username is not provided, then the environment variable \ :envvar:`OME\_USERNAME`\ is used. - password (True, str, None) + Example: export OME\_USERNAME=username + + + password (False, str, None) OpenManage Enterprise or OpenManage Enterprise Modular password. + If the password is not provided, then the environment variable \ :envvar:`OME\_PASSWORD`\ is used. + + Example: export OME\_PASSWORD=password + + + x_auth_token (False, str, None) + Authentication token. + + If the x\_auth\_token is not provided, then the environment variable \ :envvar:`OME\_X\_AUTH\_TOKEN`\ is used. + + Example: export OME\_X\_AUTH\_TOKEN=x\_auth\_token + port (optional, int, 443) OpenManage Enterprise or OpenManage Enterprise Modular HTTPS port. validate_certs (optional, bool, True) - If ``false``, the SSL certificates will not be validated. + If \ :literal:`false`\ , the SSL certificates will not be validated. - Configure ``false`` only on personally controlled sites where self-signed certificates are used. + Configure \ :literal:`false`\ only on personally controlled sites where self-signed certificates are used. - Prior to collection version ``5.0.0``, the *validate_certs* is ``false`` by default. + Prior to collection version \ :literal:`5.0.0`\ , the \ :emphasis:`validate\_certs`\ is \ :literal:`false`\ by default. ca_path (optional, path, None) @@ -79,7 +95,7 @@ Notes .. note:: - Run this module from a system that has direct access to Dell OpenManage Enterprise. - - This module supports ``check_mode``. + - This module supports \ :literal:`check\_mode`\ . diff --git a/ansible_collections/dellemc/openmanage/docs/modules/ome_application_security_settings.rst b/ansible_collections/dellemc/openmanage/docs/modules/ome_application_security_settings.rst index f7ca82d94..8bdc2865f 100644 --- a/ansible_collections/dellemc/openmanage/docs/modules/ome_application_security_settings.rst +++ b/ansible_collections/dellemc/openmanage/docs/modules/ome_application_security_settings.rst @@ -20,7 +20,7 @@ Requirements ------------ The below requirements are needed on the host that executes this module. -- python >= 3.8.6 +- python \>= 3.9.6 @@ -30,9 +30,9 @@ Parameters restrict_allowed_ip_range (optional, dict, None) Restrict to allow inbound connections only from the specified IP address range. - This is mutually exclusive with *fips_mode_enable*. + This is mutually exclusive with \ :emphasis:`fips\_mode\_enable`\ . - ``NOTE`` When *restrict_allowed_ip_range* is configured on the appliance, any inbound connection to the appliance, such as alert reception, firmware update, and network identities are blocked from the devices that are outside the specified IP address range. However, any outbound connection from the appliance will work on all devices. + \ :literal:`NOTE`\ When \ :emphasis:`restrict\_allowed\_ip\_range`\ is configured on the appliance, any inbound connection to the appliance, such as alert reception, firmware update, and network identities are blocked from the devices that are outside the specified IP address range. However, any outbound connection from the appliance will work on all devices. enable_ip_range (True, bool, None) @@ -47,7 +47,7 @@ Parameters login_lockout_policy (optional, dict, None) Locks the application after multiple unsuccessful login attempts. - This is mutually exclusive with *fips_mode_enable*. + This is mutually exclusive with \ :emphasis:`fips\_mode\_enable`\ . by_user_name (optional, bool, None) @@ -76,9 +76,9 @@ Parameters job_wait_timeout (optional, int, 120) - The maximum wait time of *job_wait* in seconds. The job is tracked only for this duration. + The maximum wait time of \ :emphasis:`job\_wait`\ in seconds. The job is tracked only for this duration. - This option is applicable when *job_wait* is ``true``. + This option is applicable when \ :emphasis:`job\_wait`\ is \ :literal:`true`\ . fips_mode_enable (optional, bool, None) @@ -86,37 +86,53 @@ Parameters This is applicable only for OpenManage Enterprise Modular only - This is mutually exclusive with *restrict_allowed_ip_range* and *login_lockout_policy*. + This is mutually exclusive with \ :emphasis:`restrict\_allowed\_ip\_range`\ and \ :emphasis:`login\_lockout\_policy`\ . - ``WARNING`` Enabling or Disabling this option resets your chassis to default settings. This may cause change in IP settings and loss of network connectivity. + \ :literal:`WARNING`\ Enabling or Disabling this option resets your chassis to default settings. This may cause change in IP settings and loss of network connectivity. - ``WARNING`` The FIPS mode cannot be enabled on a lead chassis in a multi-chassis management configuration. To toggle enable FIPS on a lead chassis, delete the chassis group, enable FIPS and recreate the group. + \ :literal:`WARNING`\ The FIPS mode cannot be enabled on a lead chassis in a multi-chassis management configuration. To toggle enable FIPS on a lead chassis, delete the chassis group, enable FIPS and recreate the group. - ``WARNING`` For a Standalone or member chassis, enabling the FIPS mode deletes any fabrics created. This may cause loss of network connectivity and data paths to the compute sleds. + \ :literal:`WARNING`\ For a Standalone or member chassis, enabling the FIPS mode deletes any fabrics created. This may cause loss of network connectivity and data paths to the compute sleds. hostname (True, str, None) OpenManage Enterprise or OpenManage Enterprise Modular IP address or hostname. - username (True, str, None) + username (False, str, None) OpenManage Enterprise or OpenManage Enterprise Modular username. + If the username is not provided, then the environment variable \ :envvar:`OME\_USERNAME`\ is used. - password (True, str, None) + Example: export OME\_USERNAME=username + + + password (False, str, None) OpenManage Enterprise or OpenManage Enterprise Modular password. + If the password is not provided, then the environment variable \ :envvar:`OME\_PASSWORD`\ is used. + + Example: export OME\_PASSWORD=password + + + x_auth_token (False, str, None) + Authentication token. + + If the x\_auth\_token is not provided, then the environment variable \ :envvar:`OME\_X\_AUTH\_TOKEN`\ is used. + + Example: export OME\_X\_AUTH\_TOKEN=x\_auth\_token + port (optional, int, 443) OpenManage Enterprise or OpenManage Enterprise Modular HTTPS port. validate_certs (optional, bool, True) - If ``false``, the SSL certificates will not be validated. + If \ :literal:`false`\ , the SSL certificates will not be validated. - Configure ``false`` only on personally controlled sites where self-signed certificates are used. + Configure \ :literal:`false`\ only on personally controlled sites where self-signed certificates are used. - Prior to collection version ``5.0.0``, the *validate_certs* is ``false`` by default. + Prior to collection version \ :literal:`5.0.0`\ , the \ :emphasis:`validate\_certs`\ is \ :literal:`false`\ by default. ca_path (optional, path, None) @@ -135,7 +151,7 @@ Notes .. note:: - Run this module from a system that has direct access to Dell OpenManage Enterprise or OpenManage Enterprise Modular. - - This module supports ``check_mode``. + - This module supports \ :literal:`check\_mode`\ . diff --git a/ansible_collections/dellemc/openmanage/docs/modules/ome_chassis_slots.rst b/ansible_collections/dellemc/openmanage/docs/modules/ome_chassis_slots.rst index bc05c9616..58f492d9a 100644 --- a/ansible_collections/dellemc/openmanage/docs/modules/ome_chassis_slots.rst +++ b/ansible_collections/dellemc/openmanage/docs/modules/ome_chassis_slots.rst @@ -20,7 +20,7 @@ Requirements ------------ The below requirements are needed on the host that executes this module. -- python >= 3.8.6 +- python \>= 3.9.6 @@ -30,19 +30,19 @@ Parameters device_options (optional, list, None) The ID or service tag of the sled in the slot and the new name for the slot. - *device_options* is mutually exclusive with *slot_options*. + \ :emphasis:`device\_options`\ is mutually exclusive with \ :emphasis:`slot\_options`\ . device_id (optional, int, None) Device ID of the sled in the slot. - This is mutually exclusive with *device_service_tag*. + This is mutually exclusive with \ :emphasis:`device\_service\_tag`\ . device_service_tag (optional, str, None) Service tag of the sled in the slot. - This is mutually exclusive with *device_id*. + This is mutually exclusive with \ :emphasis:`device\_id`\ . slot_name (True, str, None) @@ -53,7 +53,7 @@ Parameters slot_options (optional, list, None) The service tag of the chassis, slot number of the slot to be renamed, and the new name for the slot. - *slot_options* is mutually exclusive with *device_options*. + \ :emphasis:`slot\_options`\ is mutually exclusive with \ :emphasis:`device\_options`\ . chassis_service_tag (True, str, None) @@ -78,24 +78,40 @@ Parameters OpenManage Enterprise Modular IP address or hostname. - username (True, str, None) + username (False, str, None) OpenManage Enterprise Modular username. + If the username is not provided, then the environment variable \ :envvar:`OME\_USERNAME`\ is used. - password (True, str, None) + Example: export OME\_USERNAME=username + + + password (False, str, None) OpenManage Enterprise Modular password. + If the password is not provided, then the environment variable \ :envvar:`OME\_PASSWORD`\ is used. + + Example: export OME\_PASSWORD=password + + + x_auth_token (False, str, None) + Authentication token. + + If the x\_auth\_token is not provided, then the environment variable \ :envvar:`OME\_X\_AUTH\_TOKEN`\ is used. + + Example: export OME\_X\_AUTH\_TOKEN=x\_auth\_token + port (optional, int, 443) OpenManage Enterprise Modular HTTPS port. validate_certs (optional, bool, True) - If ``false``, the SSL certificates will not be validated. + If \ :literal:`false`\ , the SSL certificates will not be validated. - Configure ``false`` only on personally controlled sites where self-signed certificates are used. + Configure \ :literal:`false`\ only on personally controlled sites where self-signed certificates are used. - Prior to collection version ``5.0.0``, the *validate_certs* is ``false`` by default. + Prior to collection version \ :literal:`5.0.0`\ , the \ :emphasis:`validate\_certs`\ is \ :literal:`false`\ by default. ca_path (optional, path, None) @@ -115,7 +131,7 @@ Notes .. note:: - This module initiates the refresh inventory task. It may take a minute for new names to be reflected. If the task exceeds 300 seconds to refresh, the task times out. - Run this module from a system that has direct access to Dell OpenManage Enterprise Modular. - - This module supports ``check_mode``. + - This module supports \ :literal:`check\_mode`\ . @@ -195,17 +211,17 @@ msg (always, str, Successfully renamed the slot(s).) slot_info (if at least one slot renamed, list, [{'ChassisId': 10053, 'ChassisServiceTag': 'ABCD123', 'DeviceName': '', 'DeviceType': 1000, 'JobId': 15746, 'SlotId': '10072', 'SlotName': 'slot_op2', 'SlotNumber': '6', 'SlotType': 2000}, {'ChassisId': 10053, 'ChassisName': 'MX-ABCD123', 'ChassisServiceTag': 'ABCD123', 'DeviceType': '3000', 'JobId': 15747, 'SlotId': '10070', 'SlotName': 'slot_op2', 'SlotNumber': '4', 'SlotType': '2000'}, {'ChassisId': '10053', 'ChassisName': 'MX-PQRS123', 'ChassisServiceTag': 'PQRS123', 'DeviceId': '10054', 'DeviceServiceTag': 'XYZ5678', 'DeviceType': '1000', 'JobId': 15761, 'SlotId': '10067', 'SlotName': 'a1', 'SlotNumber': '1', 'SlotType': '2000'}]) Information of the slots that are renamed successfully. - The ``DeviceServiceTag`` and ``DeviceId`` options are available only if *device_options* is used. + The \ :literal:`DeviceServiceTag`\ and \ :literal:`DeviceId`\ options are available only if \ :emphasis:`device\_options`\ is used. - ``NOTE`` Only the slots which were renamed are listed. + \ :literal:`NOTE`\ Only the slots which were renamed are listed. rename_failed_slots (if at least one slot renaming fails, list, [{'ChassisId': '12345', 'ChassisName': 'MX-ABCD123', 'ChassisServiceTag': 'ABCD123', 'DeviceType': '4000', 'JobId': 1234, 'JobStatus': 'Aborted', 'SlotId': '10061', 'SlotName': 'c2', 'SlotNumber': '1', 'SlotType': '4000'}, {'ChassisId': '10053', 'ChassisName': 'MX-PQRS123', 'ChassisServiceTag': 'PQRS123', 'DeviceType': '1000', 'JobId': 0, 'JobStatus': 'HTTP Error 400: Bad Request', 'SlotId': '10069', 'SlotName': 'b2', 'SlotNumber': '3', 'SlotType': '2000'}]) Information of the valid slots that are not renamed. - ``JobStatus`` is shown if rename job fails. + \ :literal:`JobStatus`\ is shown if rename job fails. - ``NOTE`` Only slots which were not renamed are listed. + \ :literal:`NOTE`\ Only slots which were not renamed are listed. error_info (on HTTP error, dict, {'error': {'code': 'Base.1.0.GeneralError', 'message': 'A general error has occurred. See ExtendedInfo for more information.', '@Message.ExtendedInfo': [{'MessageId': 'CGEN1014', 'RelatedProperties': [], 'Message': 'Unable to complete the operation because an invalid value is entered for the property Invalid json type: STRING for Edm.Int64 property: Id .', 'MessageArgs': ['Invalid json type: STRING for Edm.Int64 property: Id'], 'Severity': 'Critical', 'Resolution': "Enter a valid value for the property and retry the operation. For more information about valid values, see the OpenManage Enterprise-Modular User's Guide available on the support site."}]}}) diff --git a/ansible_collections/dellemc/openmanage/docs/modules/ome_configuration_compliance_baseline.rst b/ansible_collections/dellemc/openmanage/docs/modules/ome_configuration_compliance_baseline.rst index 4b1ba6c0f..13327ccfa 100644 --- a/ansible_collections/dellemc/openmanage/docs/modules/ome_configuration_compliance_baseline.rst +++ b/ansible_collections/dellemc/openmanage/docs/modules/ome_configuration_compliance_baseline.rst @@ -20,7 +20,7 @@ Requirements ------------ The below requirements are needed on the host that executes this module. -- python >= 3.8.6 +- python \>= 3.9.6 @@ -28,31 +28,31 @@ Parameters ---------- command (optional, str, create) - ``create`` creates a configuration baseline from an existing compliance template.``create`` supports ``check_mode`` or idempotency checking for only *names*. + \ :literal:`create`\ creates a configuration baseline from an existing compliance template.\ :literal:`create`\ supports \ :literal:`check\_mode`\ or idempotency checking for only \ :emphasis:`names`\ . - ``modify`` modifies an existing baseline.Only *names*, *description*, *device_ids*, *device_service_tags*, and *device_group_names* can be modified + \ :literal:`modify`\ modifies an existing baseline.Only \ :emphasis:`names`\ , \ :emphasis:`description`\ , \ :emphasis:`device\_ids`\ , \ :emphasis:`device\_service\_tags`\ , and \ :emphasis:`device\_group\_names`\ can be modified - *WARNING* When a baseline is modified, the provided *device_ids*, *device_group_names*, and *device_service_tags* replaces the devices previously present in the baseline. + \ :emphasis:`WARNING`\ When a baseline is modified, the provided \ :emphasis:`device\_ids`\ , \ :emphasis:`device\_group\_names`\ , and \ :emphasis:`device\_service\_tags`\ replaces the devices previously present in the baseline. - ``delete`` deletes the list of configuration compliance baselines based on the baseline name. Invalid baseline names are ignored. + \ :literal:`delete`\ deletes the list of configuration compliance baselines based on the baseline name. Invalid baseline names are ignored. - ``remediate`` remediates devices that are non-compliant with the baseline by changing the attributes of devices to match with the associated baseline attributes. + \ :literal:`remediate`\ remediates devices that are non-compliant with the baseline by changing the attributes of devices to match with the associated baseline attributes. - ``remediate`` is performed on all the non-compliant devices if either *device_ids*, or *device_service_tags* is not provided. + \ :literal:`remediate`\ is performed on all the non-compliant devices if either \ :emphasis:`device\_ids`\ , or \ :emphasis:`device\_service\_tags`\ is not provided. names (True, list, None) Name(s) of the configuration compliance baseline. - This option is applicable when *command* is ``create``, ``modify``, or ``delete``. + This option is applicable when \ :emphasis:`command`\ is \ :literal:`create`\ , \ :literal:`modify`\ , or \ :literal:`delete`\ . - Provide the list of configuration compliance baselines names that are supported when *command* is ``delete``. + Provide the list of configuration compliance baselines names that are supported when \ :emphasis:`command`\ is \ :literal:`delete`\ . new_name (optional, str, None) New name of the compliance baseline to be modified. - This option is applicable when *command* is ``modify``. + This option is applicable when \ :emphasis:`command`\ is \ :literal:`modify`\ . template_name (optional, str, None) @@ -60,73 +60,89 @@ Parameters Name of the deployment template to be used for creating a compliance baseline. - This option is applicable when *command* is ``create`` and is mutually exclusive with *template_id*. + This option is applicable when \ :emphasis:`command`\ is \ :literal:`create`\ and is mutually exclusive with \ :emphasis:`template\_id`\ . template_id (optional, int, None) ID of the deployment template to be used for creating a compliance baseline. - This option is applicable when *command* is ``create`` and is mutually exclusive with *template_name*. + This option is applicable when \ :emphasis:`command`\ is \ :literal:`create`\ and is mutually exclusive with \ :emphasis:`template\_name`\ . device_ids (optional, list, None) IDs of the target devices. - This option is applicable when *command* is ``create``, ``modify``, or ``remediate``, and is mutually exclusive with *device_service_tag* and *device_group_names*. + This option is applicable when \ :emphasis:`command`\ is \ :literal:`create`\ , \ :literal:`modify`\ , or \ :literal:`remediate`\ , and is mutually exclusive with \ :emphasis:`device\_service\_tag`\ and \ :emphasis:`device\_group\_names`\ . device_service_tags (optional, list, None) Service tag of the target device. - This option is applicable when *command* is ``create``, ``modify``, or ``remediate`` and is mutually exclusive with *device_ids* and *device_group_names*. + This option is applicable when \ :emphasis:`command`\ is \ :literal:`create`\ , \ :literal:`modify`\ , or \ :literal:`remediate`\ and is mutually exclusive with \ :emphasis:`device\_ids`\ and \ :emphasis:`device\_group\_names`\ . device_group_names (optional, list, None) Name of the target device group. - This option is applicable when *command* is ``create``, or ``modify`` and is mutually exclusive with *device_ids* and *device_service_tag*. + This option is applicable when \ :emphasis:`command`\ is \ :literal:`create`\ , or \ :literal:`modify`\ and is mutually exclusive with \ :emphasis:`device\_ids`\ and \ :emphasis:`device\_service\_tag`\ . description (optional, str, None) Description of the compliance baseline. - This option is applicable when *command* is ``create``, or ``modify``. + This option is applicable when \ :emphasis:`command`\ is \ :literal:`create`\ , or \ :literal:`modify`\ . job_wait (optional, bool, True) Provides the option to wait for job completion. - This option is applicable when *command* is ``create``, ``modify``, or ``remediate``. + This option is applicable when \ :emphasis:`command`\ is \ :literal:`create`\ , \ :literal:`modify`\ , or \ :literal:`remediate`\ . job_wait_timeout (optional, int, 10800) - The maximum wait time of *job_wait* in seconds.The job will only be tracked for this duration. + The maximum wait time of \ :emphasis:`job\_wait`\ in seconds.The job will only be tracked for this duration. - This option is applicable when *job_wait* is ``true``. + This option is applicable when \ :emphasis:`job\_wait`\ is \ :literal:`true`\ . hostname (True, str, None) OpenManage Enterprise IP address or hostname. - username (True, str, None) + username (False, str, None) OpenManage Enterprise username. + If the username is not provided, then the environment variable \ :envvar:`OME\_USERNAME`\ is used. - password (True, str, None) + Example: export OME\_USERNAME=username + + + password (False, str, None) OpenManage Enterprise password. + If the password is not provided, then the environment variable \ :envvar:`OME\_PASSWORD`\ is used. + + Example: export OME\_PASSWORD=password + + + x_auth_token (False, str, None) + Authentication token. + + If the x\_auth\_token is not provided, then the environment variable \ :envvar:`OME\_X\_AUTH\_TOKEN`\ is used. + + Example: export OME\_X\_AUTH\_TOKEN=x\_auth\_token + port (optional, int, 443) OpenManage Enterprise HTTPS port. validate_certs (optional, bool, True) - If ``false``, the SSL certificates will not be validated. + If \ :literal:`false`\ , the SSL certificates will not be validated. - Configure ``false`` only on personally controlled sites where self-signed certificates are used. + Configure \ :literal:`false`\ only on personally controlled sites where self-signed certificates are used. - Prior to collection version ``5.0.0``, the *validate_certs* is ``false`` by default. + Prior to collection version \ :literal:`5.0.0`\ , the \ :emphasis:`validate\_certs`\ is \ :literal:`false`\ by default. ca_path (optional, path, None) @@ -144,7 +160,7 @@ Notes ----- .. note:: - - This module supports ``check_mode``. + - This module supports \ :literal:`check\_mode`\ . - Ensure that the devices have the required licenses to perform the baseline compliance operations. @@ -273,7 +289,7 @@ compliance_status (when I(command) is C(create) or C(modify), dict, {'Id': 13, ' job_id (when I(command) is C(remediate), int, 14123) - Task ID created when *command* is ``remediate``. + Task ID created when \ :emphasis:`command`\ is \ :literal:`remediate`\ . error_info (on HTTP error, dict, {'error': {'code': 'Base.1.0.GeneralError', 'message': 'A general error has occurred. See ExtendedInfo for more information.', '@Message.ExtendedInfo': [{'MessageId': 'GEN1234', 'RelatedProperties': [], 'Message': 'Unable to process the request because an error occurred.', 'MessageArgs': [], 'Severity': 'Critical', 'Resolution': 'Retry the operation. If the issue persists, contact your system administrator.'}]}}) diff --git a/ansible_collections/dellemc/openmanage/docs/modules/ome_configuration_compliance_info.rst b/ansible_collections/dellemc/openmanage/docs/modules/ome_configuration_compliance_info.rst index a04e3404d..77f85faf9 100644 --- a/ansible_collections/dellemc/openmanage/docs/modules/ome_configuration_compliance_info.rst +++ b/ansible_collections/dellemc/openmanage/docs/modules/ome_configuration_compliance_info.rst @@ -20,7 +20,7 @@ Requirements ------------ The below requirements are needed on the host that executes this module. -- python >= 3.8.6 +- python \>= 3.9.6 @@ -34,37 +34,53 @@ Parameters device_id (False, int, None) - The ID of the target device which is associated with the *baseline*. + The ID of the target device which is associated with the \ :emphasis:`baseline`\ . device_service_tag (False, str, None) - The device service tag of the target device associated with the *baseline*. + The device service tag of the target device associated with the \ :emphasis:`baseline`\ . - *device_service_tag* is mutually exclusive with *device_id*. + \ :emphasis:`device\_service\_tag`\ is mutually exclusive with \ :emphasis:`device\_id`\ . hostname (True, str, None) OpenManage Enterprise IP address or hostname. - username (True, str, None) + username (False, str, None) OpenManage Enterprise username. + If the username is not provided, then the environment variable \ :envvar:`OME\_USERNAME`\ is used. - password (True, str, None) + Example: export OME\_USERNAME=username + + + password (False, str, None) OpenManage Enterprise password. + If the password is not provided, then the environment variable \ :envvar:`OME\_PASSWORD`\ is used. + + Example: export OME\_PASSWORD=password + + + x_auth_token (False, str, None) + Authentication token. + + If the x\_auth\_token is not provided, then the environment variable \ :envvar:`OME\_X\_AUTH\_TOKEN`\ is used. + + Example: export OME\_X\_AUTH\_TOKEN=x\_auth\_token + port (optional, int, 443) OpenManage Enterprise HTTPS port. validate_certs (optional, bool, True) - If ``false``, the SSL certificates will not be validated. + If \ :literal:`false`\ , the SSL certificates will not be validated. - Configure ``false`` only on personally controlled sites where self-signed certificates are used. + Configure \ :literal:`false`\ only on personally controlled sites where self-signed certificates are used. - Prior to collection version ``5.0.0``, the *validate_certs* is ``false`` by default. + Prior to collection version \ :literal:`5.0.0`\ , the \ :emphasis:`validate\_certs`\ is \ :literal:`false`\ by default. ca_path (optional, path, None) @@ -83,7 +99,7 @@ Notes .. note:: - Run this module from a system that has direct access to Dell OpenManage Enterprise. - - This module supports ``check_mode``. + - This module supports \ :literal:`check\_mode`\ . diff --git a/ansible_collections/dellemc/openmanage/docs/modules/ome_device_group.rst b/ansible_collections/dellemc/openmanage/docs/modules/ome_device_group.rst index c111d5f2f..42f6de3a5 100644 --- a/ansible_collections/dellemc/openmanage/docs/modules/ome_device_group.rst +++ b/ansible_collections/dellemc/openmanage/docs/modules/ome_device_group.rst @@ -20,8 +20,8 @@ Requirements ------------ The below requirements are needed on the host that executes this module. -- python >= 3.8.6 -- netaddr >= 0.7.19 +- python \>= 3.9.6 +- netaddr \>= 0.7.19 @@ -29,39 +29,39 @@ Parameters ---------- state (optional, str, present) - ``present`` allows to add the device(s) to a static device group. + \ :literal:`present`\ allows to add the device(s) to a static device group. - ``absent`` allows to remove the device(s) from a static device group. + \ :literal:`absent`\ allows to remove the device(s) from a static device group. name (optional, str, None) Name of the static group. - *name* is mutually exclusive with *group_id*. + \ :emphasis:`name`\ is mutually exclusive with \ :emphasis:`group\_id`\ . group_id (optional, int, None) ID of the static device. - *group_id* is mutually exclusive with *name*. + \ :emphasis:`group\_id`\ is mutually exclusive with \ :emphasis:`name`\ . device_ids (optional, list, None) List of ID(s) of the device(s) to be added or removed from the device group. - *device_ids* is mutually exclusive with *device_service_tags* and *ip_addresses*. + \ :emphasis:`device\_ids`\ is mutually exclusive with \ :emphasis:`device\_service\_tags`\ and \ :emphasis:`ip\_addresses`\ . device_service_tags (optional, list, None) List of service tag(s) of the device(s) to be added or removed from the device group. - *device_service_tags* is mutually exclusive with *device_ids* and *ip_addresses*. + \ :emphasis:`device\_service\_tags`\ is mutually exclusive with \ :emphasis:`device\_ids`\ and \ :emphasis:`ip\_addresses`\ . ip_addresses (optional, list, None) List of IPs of the device(s) to be added or removed from the device group. - *ip_addresses* is mutually exclusive with *device_ids* and *device_service_tags*. + \ :emphasis:`ip\_addresses`\ is mutually exclusive with \ :emphasis:`device\_ids`\ and \ :emphasis:`device\_service\_tags`\ . Supported IP address range formats: @@ -77,35 +77,51 @@ Parameters - fe80::ffff:ffff:ffff:1111-fe80::ffff:ffff:ffff:ffff - ``NOTE`` Hostname is not supported. + \ :literal:`NOTE`\ Hostname is not supported. - ``NOTE`` *ip_addresses* requires python's netaddr packages to work on IP Addresses. + \ :literal:`NOTE`\ \ :emphasis:`ip\_addresses`\ requires python's netaddr packages to work on IP Addresses. - ``NOTE`` This module reports success even if one of the IP addresses provided in the *ip_addresses* list is available in OpenManage Enterprise.The module reports failure only if none of the IP addresses provided in the list are available in OpenManage Enterprise. + \ :literal:`NOTE`\ This module reports success even if one of the IP addresses provided in the \ :emphasis:`ip\_addresses`\ list is available in OpenManage Enterprise.The module reports failure only if none of the IP addresses provided in the list are available in OpenManage Enterprise. hostname (True, str, None) OpenManage Enterprise IP address or hostname. - username (True, str, None) + username (False, str, None) OpenManage Enterprise username. + If the username is not provided, then the environment variable \ :envvar:`OME\_USERNAME`\ is used. - password (True, str, None) + Example: export OME\_USERNAME=username + + + password (False, str, None) OpenManage Enterprise password. + If the password is not provided, then the environment variable \ :envvar:`OME\_PASSWORD`\ is used. + + Example: export OME\_PASSWORD=password + + + x_auth_token (False, str, None) + Authentication token. + + If the x\_auth\_token is not provided, then the environment variable \ :envvar:`OME\_X\_AUTH\_TOKEN`\ is used. + + Example: export OME\_X\_AUTH\_TOKEN=x\_auth\_token + port (optional, int, 443) OpenManage Enterprise HTTPS port. validate_certs (optional, bool, True) - If ``false``, the SSL certificates will not be validated. + If \ :literal:`false`\ , the SSL certificates will not be validated. - Configure ``false`` only on personally controlled sites where self-signed certificates are used. + Configure \ :literal:`false`\ only on personally controlled sites where self-signed certificates are used. - Prior to collection version ``5.0.0``, the *validate_certs* is ``false`` by default. + Prior to collection version \ :literal:`5.0.0`\ , the \ :emphasis:`validate\_certs`\ is \ :literal:`false`\ by default. ca_path (optional, path, None) @@ -124,7 +140,7 @@ Notes .. note:: - Run this module from a system that has direct access to Dell OpenManage Enterprise. - - This module supports ``check_mode``. + - This module supports \ :literal:`check\_mode`\ . diff --git a/ansible_collections/dellemc/openmanage/docs/modules/ome_device_info.rst b/ansible_collections/dellemc/openmanage/docs/modules/ome_device_info.rst index 747bc2adc..8b4731b58 100644 --- a/ansible_collections/dellemc/openmanage/docs/modules/ome_device_info.rst +++ b/ansible_collections/dellemc/openmanage/docs/modules/ome_device_info.rst @@ -20,7 +20,7 @@ Requirements ------------ The below requirements are needed on the host that executes this module. -- python >= 3.8.6 +- python \>= 3.9.6 @@ -28,31 +28,31 @@ Parameters ---------- fact_subset (optional, str, basic_inventory) - ``basic_inventory`` returns the list of the devices. + \ :literal:`basic\_inventory`\ returns the list of the devices. - ``detailed_inventory`` returns the inventory details of specified devices. + \ :literal:`detailed\_inventory`\ returns the inventory details of specified devices. - ``subsystem_health`` returns the health status of specified devices. + \ :literal:`subsystem\_health`\ returns the health status of specified devices. system_query_options (optional, dict, None) - *system_query_options* applicable for the choices of the fact_subset. Either *device_id* or *device_service_tag* is mandatory for ``detailed_inventory`` and ``subsystem_health`` or both can be applicable. + \ :emphasis:`system\_query\_options`\ applicable for the choices of the fact\_subset. Either \ :emphasis:`device\_id`\ or \ :emphasis:`device\_service\_tag`\ is mandatory for \ :literal:`detailed\_inventory`\ and \ :literal:`subsystem\_health`\ or both can be applicable. device_id (optional, list, None) - A list of unique identifier is applicable for ``detailed_inventory`` and ``subsystem_health``. + A list of unique identifier is applicable for \ :literal:`detailed\_inventory`\ and \ :literal:`subsystem\_health`\ . device_service_tag (optional, list, None) - A list of service tags are applicable for ``detailed_inventory`` and ``subsystem_health``. + A list of service tags are applicable for \ :literal:`detailed\_inventory`\ and \ :literal:`subsystem\_health`\ . inventory_type (optional, str, None) - For ``detailed_inventory``, it returns details of the specified inventory type. + For \ :literal:`detailed\_inventory`\ , it returns details of the specified inventory type. filter (optional, str, None) - For ``basic_inventory``, it filters the collection of devices. *filter* query format should be aligned with OData standards. + For \ :literal:`basic\_inventory`\ , it filters the collection of devices. \ :emphasis:`filter`\ query format should be aligned with OData standards. @@ -60,24 +60,40 @@ Parameters OpenManage Enterprise or OpenManage Enterprise Modular IP address or hostname. - username (True, str, None) + username (False, str, None) OpenManage Enterprise or OpenManage Enterprise Modular username. + If the username is not provided, then the environment variable \ :envvar:`OME\_USERNAME`\ is used. - password (True, str, None) + Example: export OME\_USERNAME=username + + + password (False, str, None) OpenManage Enterprise or OpenManage Enterprise Modular password. + If the password is not provided, then the environment variable \ :envvar:`OME\_PASSWORD`\ is used. + + Example: export OME\_PASSWORD=password + + + x_auth_token (False, str, None) + Authentication token. + + If the x\_auth\_token is not provided, then the environment variable \ :envvar:`OME\_X\_AUTH\_TOKEN`\ is used. + + Example: export OME\_X\_AUTH\_TOKEN=x\_auth\_token + port (optional, int, 443) OpenManage Enterprise or OpenManage Enterprise Modular HTTPS port. validate_certs (optional, bool, True) - If ``false``, the SSL certificates will not be validated. + If \ :literal:`false`\ , the SSL certificates will not be validated. - Configure ``false`` only on personally controlled sites where self-signed certificates are used. + Configure \ :literal:`false`\ only on personally controlled sites where self-signed certificates are used. - Prior to collection version ``5.0.0``, the *validate_certs* is ``false`` by default. + Prior to collection version \ :literal:`5.0.0`\ , the \ :emphasis:`validate\_certs`\ is \ :literal:`false`\ by default. ca_path (optional, path, None) @@ -96,7 +112,7 @@ Notes .. note:: - Run this module from a system that has direct access to Dell OpenManage Enterprise. - - This module supports ``check_mode``. + - This module supports \ :literal:`check\_mode`\ . diff --git a/ansible_collections/dellemc/openmanage/docs/modules/ome_device_local_access_configuration.rst b/ansible_collections/dellemc/openmanage/docs/modules/ome_device_local_access_configuration.rst index 1deafefb0..644eeadbb 100644 --- a/ansible_collections/dellemc/openmanage/docs/modules/ome_device_local_access_configuration.rst +++ b/ansible_collections/dellemc/openmanage/docs/modules/ome_device_local_access_configuration.rst @@ -166,13 +166,29 @@ Parameters OpenManage Enterprise Modular IP address or hostname. - username (True, str, None) + username (False, str, None) OpenManage Enterprise Modular username. + If the username is not provided, then the environment variable \ :envvar:`OME\_USERNAME`\ is used. - password (True, str, None) + Example: export OME\_USERNAME=username + + + password (False, str, None) OpenManage Enterprise Modular password. + If the password is not provided, then the environment variable \ :envvar:`OME\_PASSWORD`\ is used. + + Example: export OME\_PASSWORD=password + + + x_auth_token (False, str, None) + Authentication token. + + If the x\_auth\_token is not provided, then the environment variable \ :envvar:`OME\_X\_AUTH\_TOKEN`\ is used. + + Example: export OME\_X\_AUTH\_TOKEN=x\_auth\_token + port (optional, int, 443) OpenManage Enterprise Modular HTTPS port. diff --git a/ansible_collections/dellemc/openmanage/docs/modules/ome_device_location.rst b/ansible_collections/dellemc/openmanage/docs/modules/ome_device_location.rst index de96c2c7e..55afe2429 100644 --- a/ansible_collections/dellemc/openmanage/docs/modules/ome_device_location.rst +++ b/ansible_collections/dellemc/openmanage/docs/modules/ome_device_location.rst @@ -20,7 +20,7 @@ Requirements ------------ The below requirements are needed on the host that executes this module. -- python >= 3.8.6 +- python \>= 3.9.6 @@ -30,17 +30,17 @@ Parameters device_id (optional, int, None) The ID of the chassis for which the settings need to be updated. - If the device ID is not specified, this module updates the location settings for the *hostname*. + If the device ID is not specified, this module updates the location settings for the \ :emphasis:`hostname`\ . - *device_id* is mutually exclusive with *device_service_tag*. + \ :emphasis:`device\_id`\ is mutually exclusive with \ :emphasis:`device\_service\_tag`\ . device_service_tag (optional, str, None) The service tag of the chassis for which the settings need to be updated. - If the device service tag is not specified, this module updates the location settings for the *hostname*. + If the device service tag is not specified, this module updates the location settings for the \ :emphasis:`hostname`\ . - *device_service_tag* is mutually exclusive with *device_id*. + \ :emphasis:`device\_service\_tag`\ is mutually exclusive with \ :emphasis:`device\_id`\ . data_center (optional, str, None) @@ -71,24 +71,40 @@ Parameters OpenManage Enterprise Modular IP address or hostname. - username (True, str, None) + username (False, str, None) OpenManage Enterprise Modular username. + If the username is not provided, then the environment variable \ :envvar:`OME\_USERNAME`\ is used. - password (True, str, None) + Example: export OME\_USERNAME=username + + + password (False, str, None) OpenManage Enterprise Modular password. + If the password is not provided, then the environment variable \ :envvar:`OME\_PASSWORD`\ is used. + + Example: export OME\_PASSWORD=password + + + x_auth_token (False, str, None) + Authentication token. + + If the x\_auth\_token is not provided, then the environment variable \ :envvar:`OME\_X\_AUTH\_TOKEN`\ is used. + + Example: export OME\_X\_AUTH\_TOKEN=x\_auth\_token + port (optional, int, 443) OpenManage Enterprise Modular HTTPS port. validate_certs (optional, bool, True) - If ``false``, the SSL certificates will not be validated. + If \ :literal:`false`\ , the SSL certificates will not be validated. - Configure ``false`` only on personally controlled sites where self-signed certificates are used. + Configure \ :literal:`false`\ only on personally controlled sites where self-signed certificates are used. - Prior to collection version ``5.0.0``, the *validate_certs* is ``false`` by default. + Prior to collection version \ :literal:`5.0.0`\ , the \ :emphasis:`validate\_certs`\ is \ :literal:`false`\ by default. ca_path (optional, path, None) @@ -107,7 +123,7 @@ Notes .. note:: - Run this module from a system that has direct access to Dell OpenManage Enterprise Modular. - - This module supports ``check_mode``. + - This module supports \ :literal:`check\_mode`\ . diff --git a/ansible_collections/dellemc/openmanage/docs/modules/ome_device_mgmt_network.rst b/ansible_collections/dellemc/openmanage/docs/modules/ome_device_mgmt_network.rst index 3939b6e38..a378ab21c 100644 --- a/ansible_collections/dellemc/openmanage/docs/modules/ome_device_mgmt_network.rst +++ b/ansible_collections/dellemc/openmanage/docs/modules/ome_device_mgmt_network.rst @@ -20,7 +20,7 @@ Requirements ------------ The below requirements are needed on the host that executes this module. -- python >= 3.8.6 +- python \>= 3.9.6 @@ -30,13 +30,13 @@ Parameters device_service_tag (optional, str, None) Service tag of the device. - This option is mutually exclusive with *device_id*. + This option is mutually exclusive with \ :emphasis:`device\_id`\ . device_id (optional, int, None) ID of the device. - This option is mutually exclusive with *device_service_tag*. + This option is mutually exclusive with \ :emphasis:`device\_service\_tag`\ . enable_nic (optional, bool, True) @@ -54,7 +54,7 @@ Parameters ipv4_configuration (optional, dict, None) IPv4 network configuration. - ``WARNING`` Ensure that you have an alternate interface to access OpenManage Enterprise Modular because these options can change the current IPv4 address for *hostname*. + \ :literal:`WARNING`\ Ensure that you have an alternate interface to access OpenManage Enterprise Modular because these options can change the current IPv4 address for \ :emphasis:`hostname`\ . enable_ipv4 (True, bool, None) @@ -64,52 +64,52 @@ Parameters enable_dhcp (optional, bool, None) Enable or disable the automatic request to obtain an IPv4 address from the IPv4 Dynamic Host Configuration Protocol (DHCP) server. - ``NOTE`` If this option is ``true``, the values provided for *static_ip_address*, *static_subnet_mask*, and *static_gateway* are not applied for these fields. However, the module may report changes. + \ :literal:`NOTE`\ If this option is \ :literal:`true`\ , the values provided for \ :emphasis:`static\_ip\_address`\ , \ :emphasis:`static\_subnet\_mask`\ , and \ :emphasis:`static\_gateway`\ are not applied for these fields. However, the module may report changes. static_ip_address (optional, str, None) Static IPv4 address - This option is applicable when *enable_dhcp* is false. + This option is applicable when \ :emphasis:`enable\_dhcp`\ is false. static_subnet_mask (optional, str, None) Static IPv4 subnet mask address - This option is applicable when *enable_dhcp* is false. + This option is applicable when \ :emphasis:`enable\_dhcp`\ is false. static_gateway (optional, str, None) Static IPv4 gateway address - This option is applicable when *enable_dhcp* is false. + This option is applicable when \ :emphasis:`enable\_dhcp`\ is false. use_dhcp_to_obtain_dns_server_address (optional, bool, None) This option allows to automatically request and obtain IPv4 address for the DNS Server from the DHCP server. - This option is applicable when *enable_dhcp* is true. + This option is applicable when \ :emphasis:`enable\_dhcp`\ is true. - ``NOTE`` If this option is ``true``, the values provided for *static_preferred_dns_server* and *static_alternate_dns_server* are not applied for these fields. However, the module may report changes. + \ :literal:`NOTE`\ If this option is \ :literal:`true`\ , the values provided for \ :emphasis:`static\_preferred\_dns\_server`\ and \ :emphasis:`static\_alternate\_dns\_server`\ are not applied for these fields. However, the module may report changes. static_preferred_dns_server (optional, str, None) Static IPv4 DNS preferred server - This option is applicable when *use_dhcp_for_dns_server_names* is false. + This option is applicable when \ :emphasis:`use\_dhcp\_for\_dns\_server\_names`\ is false. static_alternate_dns_server (optional, str, None) Static IPv4 DNS alternate server - This option is applicable when *use_dhcp_for_dns_server_names* is false. + This option is applicable when \ :emphasis:`use\_dhcp\_for\_dns\_server\_names`\ is false. ipv6_configuration (optional, dict, None) IPv6 network configuration. - ``WARNING`` Ensure that you have an alternate interface to access OpenManage Enterprise Modular because these options can change the current IPv6 address for *hostname*. + \ :literal:`WARNING`\ Ensure that you have an alternate interface to access OpenManage Enterprise Modular because these options can change the current IPv6 address for \ :emphasis:`hostname`\ . enable_ipv6 (True, bool, None) @@ -119,47 +119,47 @@ Parameters enable_auto_configuration (optional, bool, None) Enable or disable the automatic request to obtain an IPv6 address from the IPv6 DHCP server or router advertisements(RA) - If *enable_auto_configuration* is ``true``, OpenManage Enterprise Modular retrieves IP configuration (IPv6 address, prefix, and gateway address) from a DHCPv6 server on the existing network. + If \ :emphasis:`enable\_auto\_configuration`\ is \ :literal:`true`\ , OpenManage Enterprise Modular retrieves IP configuration (IPv6 address, prefix, and gateway address) from a DHCPv6 server on the existing network. - ``NOTE`` If this option is ``true``, the values provided for *static_ip_address*, *static_prefix_length*, and *static_gateway* are not applied for these fields. However, the module may report changes. + \ :literal:`NOTE`\ If this option is \ :literal:`true`\ , the values provided for \ :emphasis:`static\_ip\_address`\ , \ :emphasis:`static\_prefix\_length`\ , and \ :emphasis:`static\_gateway`\ are not applied for these fields. However, the module may report changes. static_ip_address (optional, str, None) Static IPv6 address - This option is applicable when *enable_auto_configuration* is false. + This option is applicable when \ :emphasis:`enable\_auto\_configuration`\ is false. static_prefix_length (optional, int, None) Static IPv6 prefix length - This option is applicable when *enable_auto_configuration* is false. + This option is applicable when \ :emphasis:`enable\_auto\_configuration`\ is false. static_gateway (optional, str, None) Static IPv6 gateway address - This option is applicable when *enable_auto_configuration* is false. + This option is applicable when \ :emphasis:`enable\_auto\_configuration`\ is false. use_dhcpv6_to_obtain_dns_server_address (optional, bool, None) This option allows to automatically request and obtain a IPv6 address for the DNS server from the DHCP server. - This option is applicable when *enable_auto_configuration* is true + This option is applicable when \ :emphasis:`enable\_auto\_configuration`\ is true - ``NOTE`` If this option is ``true``, the values provided for *static_preferred_dns_server* and *static_alternate_dns_server* are not applied for these fields. However, the module may report changes. + \ :literal:`NOTE`\ If this option is \ :literal:`true`\ , the values provided for \ :emphasis:`static\_preferred\_dns\_server`\ and \ :emphasis:`static\_alternate\_dns\_server`\ are not applied for these fields. However, the module may report changes. static_preferred_dns_server (optional, str, None) Static IPv6 DNS preferred server - This option is applicable when *use_dhcp_for_dns_server_names* is false. + This option is applicable when \ :emphasis:`use\_dhcp\_for\_dns\_server\_names`\ is false. static_alternate_dns_server (optional, str, None) Static IPv6 DNS alternate server - This option is applicable when *use_dhcp_for_dns_server_names* is false. + This option is applicable when \ :emphasis:`use\_dhcp\_for\_dns\_server\_names`\ is false. @@ -170,9 +170,9 @@ Parameters enable_vlan (True, bool, None) Enable or disable VLAN for management. - The VLAN configuration cannot be updated if the *register_with_dns* field under *dns_configuration* is true. + The VLAN configuration cannot be updated if the \ :emphasis:`register\_with\_dns`\ field under \ :emphasis:`dns\_configuration`\ is true. - ``WARNING`` Ensure that the network cable is connected to the correct port after the VLAN configuration is changed. If not, the VLAN configuration changes may not be applied. + \ :literal:`WARNING`\ Ensure that the network cable is connected to the correct port after the VLAN configuration is changed. If not, the VLAN configuration changes may not be applied. vlan_id (optional, int, None) @@ -180,7 +180,7 @@ Parameters The valid VLAN IDs are: 1 to 4000, and 4021 to 4094. - This option is applicable when *enable_vlan* is true. + This option is applicable when \ :emphasis:`enable\_vlan`\ is true. @@ -189,33 +189,33 @@ Parameters register_with_dns (optional, bool, None) - Register/Unregister *dns_name* on the DNS Server. + Register/Unregister \ :emphasis:`dns\_name`\ on the DNS Server. - ``WARNING`` This option cannot be updated if VLAN configuration changes. + \ :literal:`WARNING`\ This option cannot be updated if VLAN configuration changes. use_dhcp_for_dns_domain_name (optional, bool, None) - Get the *dns_domain_name* using a DHCP server. + Get the \ :emphasis:`dns\_domain\_name`\ using a DHCP server. dns_name (optional, str, None) - DNS name for *hostname* + DNS name for \ :emphasis:`hostname`\ - This is applicable when *register_with_dns* is true. + This is applicable when \ :emphasis:`register\_with\_dns`\ is true. dns_domain_name (optional, str, None) Static DNS domain name - This is applicable when *use_dhcp_for_dns_domain_name* is false. + This is applicable when \ :emphasis:`use\_dhcp\_for\_dns\_domain\_name`\ is false. auto_negotiation (optional, bool, None) Enables or disables the auto negation of the network speed. - ``NOTE``: Setting *auto_negotiation* to false and choosing a network port speed may result in the chassis loosing link to the top of rack network switch, or to the neighboring chassis in case of MCM mode. It is recommended that the *auto_negotiation* is set to ``true`` for most use cases. + \ :literal:`NOTE`\ : Setting \ :emphasis:`auto\_negotiation`\ to false and choosing a network port speed may result in the chassis loosing link to the top of rack network switch, or to the neighboring chassis in case of MCM mode. It is recommended that the \ :emphasis:`auto\_negotiation`\ is set to \ :literal:`true`\ for most use cases. - This is applicable when *use_dhcp_for_dns_domain_name* is false. + This is applicable when \ :emphasis:`use\_dhcp\_for\_dns\_domain\_name`\ is false. This is applicable only for Chassis. @@ -223,11 +223,11 @@ Parameters network_speed (optional, str, None) The speed of the network port. - This is applicable when *auto_negotiation* is false. + This is applicable when \ :emphasis:`auto\_negotiation`\ is false. - ``10_MB`` to select network speed of 10 MB. + \ :literal:`10\_MB`\ to select network speed of 10 MB. - ``100_MB`` to select network speed of 100 MB. + \ :literal:`100\_MB`\ to select network speed of 100 MB. This is applicable only for Chassis. @@ -256,24 +256,40 @@ Parameters OpenManage Enterprise Modular IP address or hostname. - username (True, str, None) + username (False, str, None) OpenManage Enterprise Modular username. + If the username is not provided, then the environment variable \ :envvar:`OME\_USERNAME`\ is used. - password (True, str, None) + Example: export OME\_USERNAME=username + + + password (False, str, None) OpenManage Enterprise Modular password. + If the password is not provided, then the environment variable \ :envvar:`OME\_PASSWORD`\ is used. + + Example: export OME\_PASSWORD=password + + + x_auth_token (False, str, None) + Authentication token. + + If the x\_auth\_token is not provided, then the environment variable \ :envvar:`OME\_X\_AUTH\_TOKEN`\ is used. + + Example: export OME\_X\_AUTH\_TOKEN=x\_auth\_token + port (optional, int, 443) OpenManage Enterprise Modular HTTPS port. validate_certs (optional, bool, True) - If ``false``, the SSL certificates will not be validated. + If \ :literal:`false`\ , the SSL certificates will not be validated. - Configure ``false`` only on personally controlled sites where self-signed certificates are used. + Configure \ :literal:`false`\ only on personally controlled sites where self-signed certificates are used. - Prior to collection version ``5.0.0``, the *validate_certs* is ``false`` by default. + Prior to collection version \ :literal:`5.0.0`\ , the \ :emphasis:`validate\_certs`\ is \ :literal:`false`\ by default. ca_path (optional, path, None) @@ -292,7 +308,7 @@ Notes .. note:: - Run this module from a system that has direct access to Dell OpenManage Enterprise Modular. - - This module supports ``check_mode``. + - This module supports \ :literal:`check\_mode`\ . diff --git a/ansible_collections/dellemc/openmanage/docs/modules/ome_device_network_services.rst b/ansible_collections/dellemc/openmanage/docs/modules/ome_device_network_services.rst index f4f84f340..94b518843 100644 --- a/ansible_collections/dellemc/openmanage/docs/modules/ome_device_network_services.rst +++ b/ansible_collections/dellemc/openmanage/docs/modules/ome_device_network_services.rst @@ -20,7 +20,7 @@ Requirements ------------ The below requirements are needed on the host that executes this module. -- python >= 3.8.6 +- python \>= 3.9.6 @@ -30,17 +30,17 @@ Parameters device_id (optional, int, None) The ID of the chassis for which the settings need to be updated. - If the device ID is not specified, this module updates the network services settings for the *hostname*. + If the device ID is not specified, this module updates the network services settings for the \ :emphasis:`hostname`\ . - *device_id* is mutually exclusive with *device_service_tag*. + \ :emphasis:`device\_id`\ is mutually exclusive with \ :emphasis:`device\_service\_tag`\ . device_service_tag (optional, str, None) The service tag of the chassis for which the setting needs to be updated. - If the device service tag is not specified, this module updates the network services settings for the *hostname*. + If the device service tag is not specified, this module updates the network services settings for the \ :emphasis:`hostname`\ . - *device_service_tag* is mutually exclusive with *device_id*. + \ :emphasis:`device\_service\_tag`\ is mutually exclusive with \ :emphasis:`device\_id`\ . snmp_settings (optional, dict, None) @@ -58,7 +58,7 @@ Parameters community_name (optional, str, None) The SNMP community string. - Required when *enabled* is ``true``. + Required when \ :emphasis:`enabled`\ is \ :literal:`true`\ . @@ -100,24 +100,40 @@ Parameters OpenManage Enterprise Modular IP address or hostname. - username (True, str, None) + username (False, str, None) OpenManage Enterprise Modular username. + If the username is not provided, then the environment variable \ :envvar:`OME\_USERNAME`\ is used. - password (True, str, None) + Example: export OME\_USERNAME=username + + + password (False, str, None) OpenManage Enterprise Modular password. + If the password is not provided, then the environment variable \ :envvar:`OME\_PASSWORD`\ is used. + + Example: export OME\_PASSWORD=password + + + x_auth_token (False, str, None) + Authentication token. + + If the x\_auth\_token is not provided, then the environment variable \ :envvar:`OME\_X\_AUTH\_TOKEN`\ is used. + + Example: export OME\_X\_AUTH\_TOKEN=x\_auth\_token + port (optional, int, 443) OpenManage Enterprise Modular HTTPS port. validate_certs (optional, bool, True) - If ``false``, the SSL certificates will not be validated. + If \ :literal:`false`\ , the SSL certificates will not be validated. - Configure ``false`` only on personally controlled sites where self-signed certificates are used. + Configure \ :literal:`false`\ only on personally controlled sites where self-signed certificates are used. - Prior to collection version ``5.0.0``, the *validate_certs* is ``false`` by default. + Prior to collection version \ :literal:`5.0.0`\ , the \ :emphasis:`validate\_certs`\ is \ :literal:`false`\ by default. ca_path (optional, path, None) @@ -136,7 +152,7 @@ Notes .. note:: - Run this module from a system that has direct access to Dell OpenManage Enterprise Modular. - - This module supports ``check_mode``. + - This module supports \ :literal:`check\_mode`\ . diff --git a/ansible_collections/dellemc/openmanage/docs/modules/ome_device_power_settings.rst b/ansible_collections/dellemc/openmanage/docs/modules/ome_device_power_settings.rst index 11ff3c2c4..542792937 100644 --- a/ansible_collections/dellemc/openmanage/docs/modules/ome_device_power_settings.rst +++ b/ansible_collections/dellemc/openmanage/docs/modules/ome_device_power_settings.rst @@ -20,7 +20,7 @@ Requirements ------------ The below requirements are needed on the host that executes this module. -- python >= 3.8.6 +- python \>= 3.9.6 @@ -30,17 +30,17 @@ Parameters device_id (optional, int, None) The ID of the chassis for which the settings need to be updated. - If the device ID is not specified, this module updates the power settings for the *hostname*. + If the device ID is not specified, this module updates the power settings for the \ :emphasis:`hostname`\ . - *device_id* is mutually exclusive with *device_service_tag*. + \ :emphasis:`device\_id`\ is mutually exclusive with \ :emphasis:`device\_service\_tag`\ . device_service_tag (optional, str, None) The service tag of the chassis for which the setting needs to be updated. - If the device service tag is not specified, this module updates the power settings for the *hostname*. + If the device service tag is not specified, this module updates the power settings for the \ :emphasis:`hostname`\ . - *device_service_tag* is mutually exclusive with *device_id*. + \ :emphasis:`device\_service\_tag`\ is mutually exclusive with \ :emphasis:`device\_id`\ . power_configuration (optional, dict, None) @@ -54,7 +54,7 @@ Parameters power_cap (optional, int, None) The maximum power consumption limit of the device. Specify the consumption limit in Watts. - This is required if *enable_power_cap* is set to true. + This is required if \ :emphasis:`enable\_power\_cap`\ is set to true. @@ -65,11 +65,11 @@ Parameters redundancy_policy (optional, str, NO_REDUNDANCY) The choices to configure the redundancy policy. - ``NO_REDUNDANCY`` no redundancy policy is used. + \ :literal:`NO\_REDUNDANCY`\ no redundancy policy is used. - ``GRID_REDUNDANCY`` to distributes power by dividing the PSUs into two grids. + \ :literal:`GRID\_REDUNDANCY`\ to distributes power by dividing the PSUs into two grids. - ``PSU_REDUNDANCY`` to distribute power between all the PSUs. + \ :literal:`PSU\_REDUNDANCY`\ to distribute power between all the PSUs. @@ -84,9 +84,9 @@ Parameters primary_grid (optional, str, GRID_1) The choices for PSU grid. - ``GRID_1`` Hot Spare on Grid 1. + \ :literal:`GRID\_1`\ Hot Spare on Grid 1. - ``GRID_2`` Hot Spare on Grid 2. + \ :literal:`GRID\_2`\ Hot Spare on Grid 2. @@ -94,24 +94,40 @@ Parameters OpenManage Enterprise Modular IP address or hostname. - username (True, str, None) + username (False, str, None) OpenManage Enterprise Modular username. + If the username is not provided, then the environment variable \ :envvar:`OME\_USERNAME`\ is used. - password (True, str, None) + Example: export OME\_USERNAME=username + + + password (False, str, None) OpenManage Enterprise Modular password. + If the password is not provided, then the environment variable \ :envvar:`OME\_PASSWORD`\ is used. + + Example: export OME\_PASSWORD=password + + + x_auth_token (False, str, None) + Authentication token. + + If the x\_auth\_token is not provided, then the environment variable \ :envvar:`OME\_X\_AUTH\_TOKEN`\ is used. + + Example: export OME\_X\_AUTH\_TOKEN=x\_auth\_token + port (optional, int, 443) OpenManage Enterprise Modular HTTPS port. validate_certs (optional, bool, True) - If ``false``, the SSL certificates will not be validated. + If \ :literal:`false`\ , the SSL certificates will not be validated. - Configure ``false`` only on personally controlled sites where self-signed certificates are used. + Configure \ :literal:`false`\ only on personally controlled sites where self-signed certificates are used. - Prior to collection version ``5.0.0``, the *validate_certs* is ``false`` by default. + Prior to collection version \ :literal:`5.0.0`\ , the \ :emphasis:`validate\_certs`\ is \ :literal:`false`\ by default. ca_path (optional, path, None) @@ -130,7 +146,7 @@ Notes .. note:: - Run this module from a system that has direct access to Dell OpenManage Enterprise Modular. - - This module supports ``check_mode``. + - This module supports \ :literal:`check\_mode`\ . diff --git a/ansible_collections/dellemc/openmanage/docs/modules/ome_device_quick_deploy.rst b/ansible_collections/dellemc/openmanage/docs/modules/ome_device_quick_deploy.rst index 6d1e1adf3..399a98956 100644 --- a/ansible_collections/dellemc/openmanage/docs/modules/ome_device_quick_deploy.rst +++ b/ansible_collections/dellemc/openmanage/docs/modules/ome_device_quick_deploy.rst @@ -149,22 +149,30 @@ Parameters OpenManage Enterprise Modular IP address or hostname. - username (True, str, None) + username (False, str, None) OpenManage Enterprise Modular username. - If the username is not provided, then the environment variable \ :literal:`OME\_USERNAME`\ is used. + If the username is not provided, then the environment variable \ :envvar:`OME\_USERNAME`\ is used. Example: export OME\_USERNAME=username - password (True, str, None) + password (False, str, None) OpenManage Enterprise Modular password. - If the password is not provided, then the environment variable \ :literal:`OME\_PASSWORD`\ is used. + If the password is not provided, then the environment variable \ :envvar:`OME\_PASSWORD`\ is used. Example: export OME\_PASSWORD=password + x_auth_token (False, str, None) + Authentication token. + + If the x\_auth\_token is not provided, then the environment variable \ :envvar:`OME\_X\_AUTH\_TOKEN`\ is used. + + Example: export OME\_X\_AUTH\_TOKEN=x\_auth\_token + + port (optional, int, 443) OpenManage Enterprise Modular HTTPS port. diff --git a/ansible_collections/dellemc/openmanage/docs/modules/ome_devices.rst b/ansible_collections/dellemc/openmanage/docs/modules/ome_devices.rst index b1d56a045..ad4715d33 100644 --- a/ansible_collections/dellemc/openmanage/docs/modules/ome_devices.rst +++ b/ansible_collections/dellemc/openmanage/docs/modules/ome_devices.rst @@ -85,13 +85,29 @@ Parameters OpenManage Enterprise IP address or hostname. - username (True, str, None) + username (False, str, None) OpenManage Enterprise username. + If the username is not provided, then the environment variable \ :envvar:`OME\_USERNAME`\ is used. - password (True, str, None) + Example: export OME\_USERNAME=username + + + password (False, str, None) OpenManage Enterprise password. + If the password is not provided, then the environment variable \ :envvar:`OME\_PASSWORD`\ is used. + + Example: export OME\_PASSWORD=password + + + x_auth_token (False, str, None) + Authentication token. + + If the x\_auth\_token is not provided, then the environment variable \ :envvar:`OME\_X\_AUTH\_TOKEN`\ is used. + + Example: export OME\_X\_AUTH\_TOKEN=x\_auth\_token + port (optional, int, 443) OpenManage Enterprise HTTPS port. diff --git a/ansible_collections/dellemc/openmanage/docs/modules/ome_diagnostics.rst b/ansible_collections/dellemc/openmanage/docs/modules/ome_diagnostics.rst index 3469c4f4a..05315e43c 100644 --- a/ansible_collections/dellemc/openmanage/docs/modules/ome_diagnostics.rst +++ b/ansible_collections/dellemc/openmanage/docs/modules/ome_diagnostics.rst @@ -20,7 +20,7 @@ Requirements ------------ The below requirements are needed on the host that executes this module. -- python >= 3.8.6 +- python \>= 3.9.6 @@ -30,43 +30,43 @@ Parameters device_ids (optional, list, None) List of target device IDs. - This is applicable for ``support_assist_collection`` and ``supportassist_collection`` logs. + This is applicable for \ :literal:`support\_assist\_collection`\ and \ :literal:`supportassist\_collection`\ logs. - This option is mutually exclusive with *device_service_tags* and *device_group_name*. + This option is mutually exclusive with \ :emphasis:`device\_service\_tags`\ and \ :emphasis:`device\_group\_name`\ . device_service_tags (optional, list, None) List of target identifier. - This is applicable for ``support_assist_collection`` and ``supportassist_collection`` logs. + This is applicable for \ :literal:`support\_assist\_collection`\ and \ :literal:`supportassist\_collection`\ logs. - This option is mutually exclusive with *device_ids* and *device_group_name*. + This option is mutually exclusive with \ :emphasis:`device\_ids`\ and \ :emphasis:`device\_group\_name`\ . device_group_name (optional, str, None) - Name of the device group to export ``support_assist_collection`` or ``supportassist_collection`` logs of all devices within the group. + Name of the device group to export \ :literal:`support\_assist\_collection`\ or \ :literal:`supportassist\_collection`\ logs of all devices within the group. - This is applicable for ``support_assist_collection`` and ``supportassist_collection`` logs. + This is applicable for \ :literal:`support\_assist\_collection`\ and \ :literal:`supportassist\_collection`\ logs. This option is not applicable for OpenManage Enterprise Modular. - This option is mutually exclusive with *device_ids* and *device_service_tags*. + This option is mutually exclusive with \ :emphasis:`device\_ids`\ and \ :emphasis:`device\_service\_tags`\ . log_type (optional, str, support_assist_collection) - ``application`` is applicable for OpenManage Enterprise Modular to export the application log bundle. + \ :literal:`application`\ is applicable for OpenManage Enterprise Modular to export the application log bundle. - ``support_assist_collection`` and ``supportassist_collection`` is applicable for one or more devices to export SupportAssist logs. + \ :literal:`support\_assist\_collection`\ and \ :literal:`supportassist\_collection`\ is applicable for one or more devices to export SupportAssist logs. - ``support_assist_collection`` and ``supportassist_collection`` supports both OpenManage Enterprise and OpenManage Enterprise Modular. + \ :literal:`support\_assist\_collection`\ and \ :literal:`supportassist\_collection`\ supports both OpenManage Enterprise and OpenManage Enterprise Modular. - ``support_assist_collection`` and ``supportassist_collection`` does not support export of ``OS_LOGS`` from OpenManage Enterprise. If tried to export, the tasks will complete with errors, and the module fails. + \ :literal:`support\_assist\_collection`\ and \ :literal:`supportassist\_collection`\ does not support export of \ :literal:`OS\_LOGS`\ from OpenManage Enterprise. If tried to export, the tasks will complete with errors, and the module fails. mask_sensitive_info (optional, bool, False) Select this option to mask the personal identification information such as IPAddress, DNS, alert destination, email, gateway, inet6, MacAddress, netmask etc. - This option is applicable for ``application`` of *log_type*. + This option is applicable for \ :literal:`application`\ of \ :emphasis:`log\_type`\ . log_selectors (optional, list, None) @@ -74,13 +74,13 @@ Parameters If the log types are not specified, only the hardware logs are exported. - ``OS_LOGS`` to collect OS Logs. + \ :literal:`OS\_LOGS`\ to collect OS Logs. - ``RAID_LOGS`` to collect RAID controller logs. + \ :literal:`RAID\_LOGS`\ to collect RAID controller logs. - ``DEBUG_LOGS`` to collect Debug logs. + \ :literal:`DEBUG\_LOGS`\ to collect Debug logs. - This option is applicable only for ``support_assist_collection`` and ``supportassist_collection`` of *log_type*. + This option is applicable only for \ :literal:`support\_assist\_collection`\ and \ :literal:`supportassist\_collection`\ of \ :emphasis:`log\_type`\ . share_address (True, str, None) @@ -90,7 +90,7 @@ Parameters share_name (True, str, None) Network share path. - Filename is auto generated and should not be provided as part of *share_name*. + Filename is auto generated and should not be provided as part of \ :emphasis:`share\_name`\ . share_type (True, str, None) @@ -100,67 +100,83 @@ Parameters share_user (optional, str, None) Network share username. - This option is applicable for ``CIFS`` of *share_type*. + This option is applicable for \ :literal:`CIFS`\ of \ :emphasis:`share\_type`\ . share_password (optional, str, None) Network share password - This option is applicable for ``CIFS`` of *share_type*. + This option is applicable for \ :literal:`CIFS`\ of \ :emphasis:`share\_type`\ . share_domain (optional, str, None) Network share domain name. - This option is applicable for ``CIFS`` if *share_type*. + This option is applicable for \ :literal:`CIFS`\ if \ :emphasis:`share\_type`\ . job_wait (optional, bool, True) Whether to wait for the Job completion or not. - The maximum wait time is *job_wait_timeout*. + The maximum wait time is \ :emphasis:`job\_wait\_timeout`\ . job_wait_timeout (optional, int, 60) - The maximum wait time of *job_wait* in minutes. + The maximum wait time of \ :emphasis:`job\_wait`\ in minutes. - This option is applicable *job_wait* is true. + This option is applicable \ :emphasis:`job\_wait`\ is true. test_connection (optional, bool, False) Test the availability of the network share location. - *job_wait* and *job_wait_timeout* options are not applicable for *test_connection*. + \ :emphasis:`job\_wait`\ and \ :emphasis:`job\_wait\_timeout`\ options are not applicable for \ :emphasis:`test\_connection`\ . lead_chassis_only (optional, bool, False) Extract the logs from Lead chassis only. - *lead_chassis_only* is only applicable when *log_type* is ``application`` on OpenManage Enterprise Modular. + \ :emphasis:`lead\_chassis\_only`\ is only applicable when \ :emphasis:`log\_type`\ is \ :literal:`application`\ on OpenManage Enterprise Modular. hostname (True, str, None) OpenManage Enterprise or OpenManage Enterprise Modular IP address or hostname. - username (True, str, None) + username (False, str, None) OpenManage Enterprise or OpenManage Enterprise Modular username. + If the username is not provided, then the environment variable \ :envvar:`OME\_USERNAME`\ is used. - password (True, str, None) + Example: export OME\_USERNAME=username + + + password (False, str, None) OpenManage Enterprise or OpenManage Enterprise Modular password. + If the password is not provided, then the environment variable \ :envvar:`OME\_PASSWORD`\ is used. + + Example: export OME\_PASSWORD=password + + + x_auth_token (False, str, None) + Authentication token. + + If the x\_auth\_token is not provided, then the environment variable \ :envvar:`OME\_X\_AUTH\_TOKEN`\ is used. + + Example: export OME\_X\_AUTH\_TOKEN=x\_auth\_token + port (optional, int, 443) OpenManage Enterprise or OpenManage Enterprise Modular HTTPS port. validate_certs (optional, bool, True) - If ``false``, the SSL certificates will not be validated. + If \ :literal:`false`\ , the SSL certificates will not be validated. - Configure ``false`` only on personally controlled sites where self-signed certificates are used. + Configure \ :literal:`false`\ only on personally controlled sites where self-signed certificates are used. - Prior to collection version ``5.0.0``, the *validate_certs* is ``false`` by default. + Prior to collection version \ :literal:`5.0.0`\ , the \ :emphasis:`validate\_certs`\ is \ :literal:`false`\ by default. ca_path (optional, path, None) @@ -180,7 +196,7 @@ Notes .. note:: - Run this module from a system that has direct access to OpenManage Enterprise. - This module performs the test connection and device validations. It does not create a job for copying the logs in check mode and always reports as changes found. - - This module supports ``check_mode``. + - This module supports \ :literal:`check\_mode`\ . diff --git a/ansible_collections/dellemc/openmanage/docs/modules/ome_discovery.rst b/ansible_collections/dellemc/openmanage/docs/modules/ome_discovery.rst index e290629b1..b02860a94 100644 --- a/ansible_collections/dellemc/openmanage/docs/modules/ome_discovery.rst +++ b/ansible_collections/dellemc/openmanage/docs/modules/ome_discovery.rst @@ -20,7 +20,7 @@ Requirements ------------ The below requirements are needed on the host that executes this module. -- python >= 3.8.6 +- python \>= 3.9.6 @@ -28,27 +28,27 @@ Parameters ---------- state (optional, str, present) - ``present`` creates a discovery job or modifies an existing discovery job. + \ :literal:`present`\ creates a discovery job or modifies an existing discovery job. - *discovery_job_name* is mandatory for the creation of a new discovery job. + \ :emphasis:`discovery\_job\_name`\ is mandatory for the creation of a new discovery job. - If multiple discoveries of the same *discovery_job_name* exist, then the new discovery job will not be created. + If multiple discoveries of the same \ :emphasis:`discovery\_job\_name`\ exist, then the new discovery job will not be created. - ``absent`` deletes an existing discovery job(s) with the specified *discovery_job_name*. + \ :literal:`absent`\ deletes an existing discovery job(s) with the specified \ :emphasis:`discovery\_job\_name`\ . discovery_job_name (optional, str, None) Name of the discovery configuration job. - It is mutually exclusive with *discovery_id*. + It is mutually exclusive with \ :emphasis:`discovery\_id`\ . discovery_id (optional, int, None) ID of the discovery configuration group. - This value is DiscoveryConfigGroupId in the return values under discovery_status. + This value is DiscoveryConfigGroupId in the return values under discovery\_status. - It is mutually exclusive with *discovery_job_name*. + It is mutually exclusive with \ :emphasis:`discovery\_job\_name`\ . new_name (optional, str, None) @@ -58,7 +58,7 @@ Parameters schedule (optional, str, RunNow) Provides the option to schedule the discovery job. - If ``RunLater`` is selected, then *cron* must be specified. + If \ :literal:`RunLater`\ is selected, then \ :emphasis:`cron`\ must be specified. cron (optional, str, None) @@ -82,33 +82,33 @@ Parameters job_wait (optional, bool, True) Provides the option to wait for job completion. - This option is applicable when *state* is ``present``. + This option is applicable when \ :emphasis:`state`\ is \ :literal:`present`\ . job_wait_timeout (optional, int, 10800) - The maximum wait time of *job_wait* in seconds. The job is tracked only for this duration. + The maximum wait time of \ :emphasis:`job\_wait`\ in seconds. The job is tracked only for this duration. - This option is applicable when *job_wait* is ``true``. + This option is applicable when \ :emphasis:`job\_wait`\ is \ :literal:`true`\ . ignore_partial_failure (optional, bool, False) Provides the option to ignore partial failures. Partial failures occur when there is a combination of both discovered and undiscovered IPs. - If ``false``, then the partial failure is not ignored, and the module will error out. + If \ :literal:`false`\ , then the partial failure is not ignored, and the module will error out. - If ``true``, then the partial failure is ignored. + If \ :literal:`true`\ , then the partial failure is ignored. - This option is only applicable if *job_wait* is ``true``. + This option is only applicable if \ :emphasis:`job\_wait`\ is \ :literal:`true`\ . discovery_config_targets (optional, list, None) Provide the list of discovery targets. - Each discovery target is a set of *network_address_detail*, *device_types*, and one or more protocol credentials. + Each discovery target is a set of \ :emphasis:`network\_address\_detail`\ , \ :emphasis:`device\_types`\ , and one or more protocol credentials. - This is mandatory when *state* is ``present``. + This is mandatory when \ :emphasis:`state`\ is \ :literal:`present`\ . - ``WARNING`` Modification of this field is not supported, this field is overwritten every time. Ensure to provide all the required details for this field. + \ :literal:`WARNING`\ Modification of this field is not supported, this field is overwritten every time. Ensure to provide all the required details for this field. network_address_detail (True, list, None) @@ -134,15 +134,15 @@ Parameters Sample Invalid IP Range Formats - 192.35.0.* + 192.35.0.\* 192.36.0.0-255 192.35.0.0/255.255.255.0 - ``NOTE`` The range size for the number of IP addresses is limited to 16,385 (0x4001). + \ :literal:`NOTE`\ The range size for the number of IP addresses is limited to 16,385 (0x4001). - ``NOTE`` Both IPv6 and IPv6 CIDR formats are supported. + \ :literal:`NOTE`\ Both IPv6 and IPv6 CIDR formats are supported. device_types (True, list, None) @@ -154,13 +154,13 @@ Parameters Supported protocols for each device type are: - SERVER - *wsman*, *redfish*, *snmp*, *ipmi*, *ssh*, and *vmware*. + SERVER - \ :emphasis:`wsman`\ , \ :emphasis:`redfish`\ , \ :emphasis:`snmp`\ , \ :emphasis:`ipmi`\ , \ :emphasis:`ssh`\ , and \ :emphasis:`vmware`\ . - CHASSIS - *wsman*, and *redfish*. + CHASSIS - \ :emphasis:`wsman`\ , and \ :emphasis:`redfish`\ . - NETWORK SWITCH - *snmp*. + NETWORK SWITCH - \ :emphasis:`snmp`\ . - STORAGE - *storage*, and *snmp*. + STORAGE - \ :emphasis:`storage`\ , and \ :emphasis:`snmp`\ . wsman (optional, dict, None) @@ -411,24 +411,40 @@ Parameters OpenManage Enterprise IP address or hostname. - username (True, str, None) + username (False, str, None) OpenManage Enterprise username. + If the username is not provided, then the environment variable \ :envvar:`OME\_USERNAME`\ is used. - password (True, str, None) + Example: export OME\_USERNAME=username + + + password (False, str, None) OpenManage Enterprise password. + If the password is not provided, then the environment variable \ :envvar:`OME\_PASSWORD`\ is used. + + Example: export OME\_PASSWORD=password + + + x_auth_token (False, str, None) + Authentication token. + + If the x\_auth\_token is not provided, then the environment variable \ :envvar:`OME\_X\_AUTH\_TOKEN`\ is used. + + Example: export OME\_X\_AUTH\_TOKEN=x\_auth\_token + port (optional, int, 443) OpenManage Enterprise HTTPS port. validate_certs (optional, bool, True) - If ``false``, the SSL certificates will not be validated. + If \ :literal:`false`\ , the SSL certificates will not be validated. - Configure ``false`` only on personally controlled sites where self-signed certificates are used. + Configure \ :literal:`false`\ only on personally controlled sites where self-signed certificates are used. - Prior to collection version ``5.0.0``, the *validate_certs* is ``false`` by default. + Prior to collection version \ :literal:`5.0.0`\ , the \ :emphasis:`validate\_certs`\ is \ :literal:`false`\ by default. ca_path (optional, path, None) @@ -447,8 +463,8 @@ Notes .. note:: - Run this module from a system that has direct access to Dell OpenManage Enterprise. - - This module does not support ``check_mode``. - - If *state* is ``present``, then Idempotency is not supported. + - This module does not support \ :literal:`check\_mode`\ . + - If \ :emphasis:`state`\ is \ :literal:`present`\ , then Idempotency is not supported. @@ -636,7 +652,7 @@ msg (always, str, Successfully deleted 1 discovery job(s).) discovery_status (when I(state) is C(present), dict, {'Completed': ['192.168.24.17', '192.168.24.20', '192.168.24.22'], 'Failed': ['192.168.24.15', '192.168.24.16', '192.168.24.18', '192.168.24.19', '192.168.24.21', 'host123'], 'DiscoveredDevicesByType': [{'Count': 3, 'DeviceType': 'SERVER'}], 'DiscoveryConfigDiscoveredDeviceCount': 3, 'DiscoveryConfigEmailRecipient': 'myemail@dell.com', 'DiscoveryConfigExpectedDeviceCount': 9, 'DiscoveryConfigGroupId': 125, 'JobDescription': 'D1', 'JobEnabled': True, 'JobEndTime': '2021-01-01 06:27:29.99', 'JobId': 12666, 'JobName': 'D1', 'JobNextRun': None, 'JobProgress': '100', 'JobSchedule': 'startnow', 'JobStartTime': '2021-01-01 06:24:10.071', 'JobStatusId': 2090, 'LastUpdateTime': '2021-01-01 06:27:30.001', 'UpdatedBy': 'admin'}) Details of the discovery job created or modified. - If *job_wait* is true, Completed and Failed IPs are also listed. + If \ :emphasis:`job\_wait`\ is true, Completed and Failed IPs are also listed. discovery_ids (when discoveries with duplicate name exist for I(state) is C(present), list, [1234, 5678]) diff --git a/ansible_collections/dellemc/openmanage/docs/modules/ome_domain_user_groups.rst b/ansible_collections/dellemc/openmanage/docs/modules/ome_domain_user_groups.rst index a9d971a78..5beafe144 100644 --- a/ansible_collections/dellemc/openmanage/docs/modules/ome_domain_user_groups.rst +++ b/ansible_collections/dellemc/openmanage/docs/modules/ome_domain_user_groups.rst @@ -20,7 +20,7 @@ Requirements ------------ The below requirements are needed on the host that executes this module. -- python >= 3.9.6 +- python \>= 3.9.6 @@ -28,9 +28,9 @@ Parameters ---------- state (optional, str, present) - ``present`` imports or modifies the Active Directory/LDAP user group. + \ :literal:`present`\ imports or modifies the Active Directory/LDAP user group. - ``absent`` deletes an existing Active Directory/LDAP user group. + \ :literal:`absent`\ deletes an existing Active Directory/LDAP user group. group_name (True, str, None) @@ -38,7 +38,7 @@ Parameters Examples for user group name: Administrator or Account Operators or Access Control Assistance Operator. - *group_name* value is case insensitive. + \ :emphasis:`group\_name`\ value is case insensitive. role (optional, str, None) @@ -48,13 +48,13 @@ Parameters OpenManage Enterprise Roles: ADMINISTRATOR, DEVICE MANAGER, VIEWER. - *role* value is case insensitive. + \ :emphasis:`role`\ value is case insensitive. directory_name (optional, str, None) The directory name set while adding the Active Directory/LDAP. - *directory_name* is mutually exclusive with *directory_id*. + \ :emphasis:`directory\_name`\ is mutually exclusive with \ :emphasis:`directory\_id`\ . directory_type (optional, str, AD) @@ -64,13 +64,13 @@ Parameters directory_id (optional, int, None) The ID of the Active Directory/LDAP. - *directory_id* is mutually exclusive with *directory_name*. + \ :emphasis:`directory\_id`\ is mutually exclusive with \ :emphasis:`directory\_name`\ . domain_username (optional, str, None) Active Directory/LDAP domain username. - Example: username@domain or domain\username. + Example: username@domain or domain\\username. domain_password (optional, str, None) @@ -81,24 +81,40 @@ Parameters OpenManage Enterprise or OpenManage Enterprise Modular IP address or hostname. - username (True, str, None) + username (False, str, None) OpenManage Enterprise or OpenManage Enterprise Modular username. + If the username is not provided, then the environment variable \ :envvar:`OME\_USERNAME`\ is used. - password (True, str, None) + Example: export OME\_USERNAME=username + + + password (False, str, None) OpenManage Enterprise or OpenManage Enterprise Modular password. + If the password is not provided, then the environment variable \ :envvar:`OME\_PASSWORD`\ is used. + + Example: export OME\_PASSWORD=password + + + x_auth_token (False, str, None) + Authentication token. + + If the x\_auth\_token is not provided, then the environment variable \ :envvar:`OME\_X\_AUTH\_TOKEN`\ is used. + + Example: export OME\_X\_AUTH\_TOKEN=x\_auth\_token + port (optional, int, 443) OpenManage Enterprise or OpenManage Enterprise Modular HTTPS port. validate_certs (optional, bool, True) - If ``false``, the SSL certificates will not be validated. + If \ :literal:`false`\ , the SSL certificates will not be validated. - Configure ``false`` only on personally controlled sites where self-signed certificates are used. + Configure \ :literal:`false`\ only on personally controlled sites where self-signed certificates are used. - Prior to collection version ``5.0.0``, the *validate_certs* is ``false`` by default. + Prior to collection version \ :literal:`5.0.0`\ , the \ :emphasis:`validate\_certs`\ is \ :literal:`false`\ by default. ca_path (optional, path, None) @@ -116,7 +132,7 @@ Notes ----- .. note:: - - This module supports ``check_mode`` and idempotency. + - This module supports \ :literal:`check\_mode`\ and idempotency. - Run this module from a system that has direct access to OpenManage Enterprise or OpenManage Enterprise Modular. @@ -194,7 +210,7 @@ msg (always, str, Successfully imported the Active Directory/LDAP user group.) domain_user_status (When I(state) is C(present)., dict, {'Description': None, 'DirectoryServiceId': 16097, 'Enabled': True, 'Id': '16617', 'IsBuiltin': False, 'IsVisible': True, 'Locked': False, 'Name': 'Account Operators', 'ObjectGuid': 'a491859c-031e-42a3-ae5e-0ab148ecf1d6', 'ObjectSid': None, 'Oem': None, 'Password': None, 'PlainTextPassword': None, 'RoleId': '16', 'UserName': 'Account Operators', 'UserTypeId': 2}) - Details of the domain user operation, when *state* is ``present``. + Details of the domain user operation, when \ :emphasis:`state`\ is \ :literal:`present`\ . error_info (on HTTP error, dict, {'error': {'code': 'Base.1.0.GeneralError', 'message': 'A general error has occurred. See ExtendedInfo for more information.', '@Message.ExtendedInfo': [{'MessageId': 'GEN1234', 'RelatedProperties': [], 'Message': 'Unable to process the request because an error occurred.', 'MessageArgs': [], 'Severity': 'Critical', 'Resolution': 'Retry the operation. If the issue persists, contact your system administrator.'}]}}) diff --git a/ansible_collections/dellemc/openmanage/docs/modules/ome_firmware.rst b/ansible_collections/dellemc/openmanage/docs/modules/ome_firmware.rst index f9870d4f9..2168ebe93 100644 --- a/ansible_collections/dellemc/openmanage/docs/modules/ome_firmware.rst +++ b/ansible_collections/dellemc/openmanage/docs/modules/ome_firmware.rst @@ -20,7 +20,7 @@ Requirements ------------ The below requirements are needed on the host that executes this module. -- python >= 3.9.6 +- python \>= 3.9.6 @@ -30,35 +30,35 @@ Parameters device_service_tag (optional, list, None) List of service tags of the targeted devices. - Either *device_id* or *device_service_tag* can be used individually or together. + Either \ :emphasis:`device\_id`\ or \ :emphasis:`device\_service\_tag`\ can be used individually or together. - This option is mutually exclusive with *device_group_names* and *devices*. + This option is mutually exclusive with \ :emphasis:`device\_group\_names`\ and \ :emphasis:`devices`\ . device_id (optional, list, None) List of ids of the targeted device. - Either *device_id* or *device_service_tag* can be used individually or together. + Either \ :emphasis:`device\_id`\ or \ :emphasis:`device\_service\_tag`\ can be used individually or together. - This option is mutually exclusive with *device_group_names* and *devices*. + This option is mutually exclusive with \ :emphasis:`device\_group\_names`\ and \ :emphasis:`devices`\ . device_group_names (optional, list, None) Enter the name of the device group that contains the devices on which firmware needs to be updated. - This option is mutually exclusive with *device_id* and *device_service_tag*. + This option is mutually exclusive with \ :emphasis:`device\_id`\ and \ :emphasis:`device\_service\_tag`\ . dup_file (optional, path, None) The path of the Dell Update Package (DUP) file that contains the firmware or drivers required to update the target system device or individual device components. - This is mutually exclusive with *baseline_name*, *components*, and *devices*. + This is mutually exclusive with \ :emphasis:`baseline\_name`\ , \ :emphasis:`components`\ , and \ :emphasis:`devices`\ . baseline_name (optional, str, None) Enter the baseline name to update the firmware of all devices or list of devices that are not complaint. - This option is mutually exclusive with *dup_file* and *device_group_names*. + This option is mutually exclusive with \ :emphasis:`dup\_file`\ and \ :emphasis:`device\_group\_names`\ . components (optional, list, []) @@ -68,25 +68,25 @@ Parameters This option is case sensitive. - This is applicable to *device_service_tag*, *device_id*, and *baseline_name*. + This is applicable to \ :emphasis:`device\_service\_tag`\ , \ :emphasis:`device\_id`\ , and \ :emphasis:`baseline\_name`\ . devices (optional, list, None) This option allows to select components on each device for firmware update. - This option is mutually exclusive with *dup_file*, *device_group_names*, *device_id*, and *device_service_tag*. + This option is mutually exclusive with \ :emphasis:`dup\_file`\ , \ :emphasis:`device\_group\_names`\ , \ :emphasis:`device\_id`\ , and \ :emphasis:`device\_service\_tag`\ . id (optional, int, None) The id of the target device to be updated. - This option is mutually exclusive with *service_tag*. + This option is mutually exclusive with \ :emphasis:`service\_tag`\ . service_tag (optional, str, None) The service tag of the target device to be updated. - This option is mutually exclusive with *id*. + This option is mutually exclusive with \ :emphasis:`id`\ . components (optional, list, []) @@ -97,45 +97,61 @@ Parameters schedule (optional, str, RebootNow) Select the schedule for the firmware update. - if ``StageForNextReboot`` is chosen, the firmware will be staged and updated during the next reboot of the target device. + if \ :literal:`StageForNextReboot`\ is chosen, the firmware will be staged and updated during the next reboot of the target device. - if ``RebootNow`` will apply the firmware updates immediately. + if \ :literal:`RebootNow`\ will apply the firmware updates immediately. reboot_type (optional, str, GracefulRebootForce) This option provides the choices to reboot the server immediately after the firmware update. - This is applicable when *schedule* is ``RebootNow``. + This is applicable when \ :emphasis:`schedule`\ is \ :literal:`RebootNow`\ . - ``GracefulRebootForce`` performs a graceful reboot with forced shutdown. + \ :literal:`GracefulRebootForce`\ performs a graceful reboot with forced shutdown. - ``GracefulReboot`` performs a graceful reboot without forced shutdown. + \ :literal:`GracefulReboot`\ performs a graceful reboot without forced shutdown. - ``PowerCycle`` performs a power cycle for a hard reset on the device. + \ :literal:`PowerCycle`\ performs a power cycle for a hard reset on the device. hostname (True, str, None) OpenManage Enterprise or OpenManage Enterprise Modular IP address or hostname. - username (True, str, None) + username (False, str, None) OpenManage Enterprise or OpenManage Enterprise Modular username. + If the username is not provided, then the environment variable \ :envvar:`OME\_USERNAME`\ is used. - password (True, str, None) + Example: export OME\_USERNAME=username + + + password (False, str, None) OpenManage Enterprise or OpenManage Enterprise Modular password. + If the password is not provided, then the environment variable \ :envvar:`OME\_PASSWORD`\ is used. + + Example: export OME\_PASSWORD=password + + + x_auth_token (False, str, None) + Authentication token. + + If the x\_auth\_token is not provided, then the environment variable \ :envvar:`OME\_X\_AUTH\_TOKEN`\ is used. + + Example: export OME\_X\_AUTH\_TOKEN=x\_auth\_token + port (optional, int, 443) OpenManage Enterprise or OpenManage Enterprise Modular HTTPS port. validate_certs (optional, bool, True) - If ``false``, the SSL certificates will not be validated. + If \ :literal:`false`\ , the SSL certificates will not be validated. - Configure ``false`` only on personally controlled sites where self-signed certificates are used. + Configure \ :literal:`false`\ only on personally controlled sites where self-signed certificates are used. - Prior to collection version ``5.0.0``, the *validate_certs* is ``false`` by default. + Prior to collection version \ :literal:`5.0.0`\ , the \ :emphasis:`validate\_certs`\ is \ :literal:`false`\ by default. ca_path (optional, path, None) @@ -154,7 +170,7 @@ Notes .. note:: - Run this module from a system that has direct access to Dell OpenManage Enterprise. - - This module supports ``check_mode``. + - This module supports \ :literal:`check\_mode`\ . diff --git a/ansible_collections/dellemc/openmanage/docs/modules/ome_firmware_baseline.rst b/ansible_collections/dellemc/openmanage/docs/modules/ome_firmware_baseline.rst index 971551b21..4552b2fc4 100644 --- a/ansible_collections/dellemc/openmanage/docs/modules/ome_firmware_baseline.rst +++ b/ansible_collections/dellemc/openmanage/docs/modules/ome_firmware_baseline.rst @@ -20,7 +20,7 @@ Requirements ------------ The below requirements are needed on the host that executes this module. -- python >= 3.8.6 +- python \>= 3.9.6 @@ -28,21 +28,21 @@ Parameters ---------- state (optional, str, present) - ``present`` creates or modifies a baseline. + \ :literal:`present`\ creates or modifies a baseline. - ``absent`` deletes an existing baseline. + \ :literal:`absent`\ deletes an existing baseline. baseline_name (optional, str, None) Name of the the baseline. - This option is mutually exclusive with *baseline_id*. + This option is mutually exclusive with \ :emphasis:`baseline\_id`\ . baseline_id (optional, int, None) ID of the existing baseline. - This option is mutually exclusive with *baseline_name*. + This option is mutually exclusive with \ :emphasis:`baseline\_name`\ . new_baseline_name (optional, str, None) @@ -60,43 +60,43 @@ Parameters downgrade_enabled (optional, bool, None) Indicates whether firmware downgrade is allowed for the devices in the baseline. - This value will be set to ``true`` by default, if not provided during baseline creation. + This value will be set to \ :literal:`true`\ by default, if not provided during baseline creation. is_64_bit (optional, bool, None) Indicates if the repository contains 64-bit DUPs. - This value will be set to ``true`` by default, if not provided during baseline creation. + This value will be set to \ :literal:`true`\ by default, if not provided during baseline creation. device_ids (optional, list, None) List of device IDs. - This option is mutually exclusive with *device_service_tags* and *device_group_names*. + This option is mutually exclusive with \ :emphasis:`device\_service\_tags`\ and \ :emphasis:`device\_group\_names`\ . device_service_tags (optional, list, None) List of device service tags. - This option is mutually exclusive with *device_ids* and *device_group_names*. + This option is mutually exclusive with \ :emphasis:`device\_ids`\ and \ :emphasis:`device\_group\_names`\ . device_group_names (optional, list, None) List of group names. - This option is mutually exclusive with *device_ids* and *device_service_tags*. + This option is mutually exclusive with \ :emphasis:`device\_ids`\ and \ :emphasis:`device\_service\_tags`\ . job_wait (optional, bool, True) Provides the option to wait for job completion. - This option is applicable when *state* is ``present``. + This option is applicable when \ :emphasis:`state`\ is \ :literal:`present`\ . job_wait_timeout (optional, int, 600) - The maximum wait time of *job_wait* in seconds. The job is tracked only for this duration. + The maximum wait time of \ :emphasis:`job\_wait`\ in seconds. The job is tracked only for this duration. - This option is applicable when *job_wait* is ``true``. + This option is applicable when \ :emphasis:`job\_wait`\ is \ :literal:`true`\ . filter_no_reboot_required (optional, bool, None) @@ -107,24 +107,40 @@ Parameters OpenManage Enterprise or OpenManage Enterprise Modular IP address or hostname. - username (True, str, None) + username (False, str, None) OpenManage Enterprise or OpenManage Enterprise Modular username. + If the username is not provided, then the environment variable \ :envvar:`OME\_USERNAME`\ is used. - password (True, str, None) + Example: export OME\_USERNAME=username + + + password (False, str, None) OpenManage Enterprise or OpenManage Enterprise Modular password. + If the password is not provided, then the environment variable \ :envvar:`OME\_PASSWORD`\ is used. + + Example: export OME\_PASSWORD=password + + + x_auth_token (False, str, None) + Authentication token. + + If the x\_auth\_token is not provided, then the environment variable \ :envvar:`OME\_X\_AUTH\_TOKEN`\ is used. + + Example: export OME\_X\_AUTH\_TOKEN=x\_auth\_token + port (optional, int, 443) OpenManage Enterprise or OpenManage Enterprise Modular HTTPS port. validate_certs (optional, bool, True) - If ``false``, the SSL certificates will not be validated. + If \ :literal:`false`\ , the SSL certificates will not be validated. - Configure ``false`` only on personally controlled sites where self-signed certificates are used. + Configure \ :literal:`false`\ only on personally controlled sites where self-signed certificates are used. - Prior to collection version ``5.0.0``, the *validate_certs* is ``false`` by default. + Prior to collection version \ :literal:`5.0.0`\ , the \ :emphasis:`validate\_certs`\ is \ :literal:`false`\ by default. ca_path (optional, path, None) @@ -143,8 +159,8 @@ Notes .. note:: - Run this module from a system that has direct access to Dell OpenManage Enterprise or OpenManage Enterprise Modular. - - *device_group_names* option is not applicable for OpenManage Enterprise Modular. - - This module supports ``check_mode``. + - \ :emphasis:`device\_group\_names`\ option is not applicable for OpenManage Enterprise Modular. + - This module supports \ :literal:`check\_mode`\ . diff --git a/ansible_collections/dellemc/openmanage/docs/modules/ome_firmware_baseline_compliance_info.rst b/ansible_collections/dellemc/openmanage/docs/modules/ome_firmware_baseline_compliance_info.rst index a1c5ca246..dcbcd3a58 100644 --- a/ansible_collections/dellemc/openmanage/docs/modules/ome_firmware_baseline_compliance_info.rst +++ b/ansible_collections/dellemc/openmanage/docs/modules/ome_firmware_baseline_compliance_info.rst @@ -20,7 +20,7 @@ Requirements ------------ The below requirements are needed on the host that executes this module. -- python >= 3.8.6 +- python \>= 3.9.6 @@ -32,15 +32,15 @@ Parameters This option is mandatory for generating baseline based device compliance report. - *baseline_name* is mutually exclusive with *device_ids*, *device_service_tags* and *device_group_names*. + \ :emphasis:`baseline\_name`\ is mutually exclusive with \ :emphasis:`device\_ids`\ , \ :emphasis:`device\_service\_tags`\ and \ :emphasis:`device\_group\_names`\ . device_ids (optional, list, None) A list of unique identifier for device based compliance report. - Either *device_ids*, *device_service_tags* or *device_group_names* is required to generate device based compliance report. + Either \ :emphasis:`device\_ids`\ , \ :emphasis:`device\_service\_tags`\ or \ :emphasis:`device\_group\_names`\ is required to generate device based compliance report. - *device_ids* is mutually exclusive with *device_service_tags*, *device_group_names* and *baseline_name*. + \ :emphasis:`device\_ids`\ is mutually exclusive with \ :emphasis:`device\_service\_tags`\ , \ :emphasis:`device\_group\_names`\ and \ :emphasis:`baseline\_name`\ . Devices without reports are ignored. @@ -48,9 +48,9 @@ Parameters device_service_tags (optional, list, None) A list of service tags for device based compliance report. - Either *device_ids*, *device_service_tags* or *device_group_names* is required to generate device based compliance report. + Either \ :emphasis:`device\_ids`\ , \ :emphasis:`device\_service\_tags`\ or \ :emphasis:`device\_group\_names`\ is required to generate device based compliance report. - *device_service_tags* is mutually exclusive with *device_ids*, *device_group_names* and *baseline_name*. + \ :emphasis:`device\_service\_tags`\ is mutually exclusive with \ :emphasis:`device\_ids`\ , \ :emphasis:`device\_group\_names`\ and \ :emphasis:`baseline\_name`\ . Devices without reports are ignored. @@ -58,9 +58,9 @@ Parameters device_group_names (optional, list, None) A list of group names for device based compliance report. - Either *device_ids*, *device_service_tags* or *device_group_names* is required to generate device based compliance report. + Either \ :emphasis:`device\_ids`\ , \ :emphasis:`device\_service\_tags`\ or \ :emphasis:`device\_group\_names`\ is required to generate device based compliance report. - *device_group_names* is mutually exclusive with *device_ids*, *device_service_tags* and *baseline_name*. + \ :emphasis:`device\_group\_names`\ is mutually exclusive with \ :emphasis:`device\_ids`\ , \ :emphasis:`device\_service\_tags`\ and \ :emphasis:`baseline\_name`\ . Devices without reports are ignored. @@ -69,24 +69,40 @@ Parameters OpenManage Enterprise or OpenManage Enterprise Modular IP address or hostname. - username (True, str, None) + username (False, str, None) OpenManage Enterprise or OpenManage Enterprise Modular username. + If the username is not provided, then the environment variable \ :envvar:`OME\_USERNAME`\ is used. - password (True, str, None) + Example: export OME\_USERNAME=username + + + password (False, str, None) OpenManage Enterprise or OpenManage Enterprise Modular password. + If the password is not provided, then the environment variable \ :envvar:`OME\_PASSWORD`\ is used. + + Example: export OME\_PASSWORD=password + + + x_auth_token (False, str, None) + Authentication token. + + If the x\_auth\_token is not provided, then the environment variable \ :envvar:`OME\_X\_AUTH\_TOKEN`\ is used. + + Example: export OME\_X\_AUTH\_TOKEN=x\_auth\_token + port (optional, int, 443) OpenManage Enterprise or OpenManage Enterprise Modular HTTPS port. validate_certs (optional, bool, True) - If ``false``, the SSL certificates will not be validated. + If \ :literal:`false`\ , the SSL certificates will not be validated. - Configure ``false`` only on personally controlled sites where self-signed certificates are used. + Configure \ :literal:`false`\ only on personally controlled sites where self-signed certificates are used. - Prior to collection version ``5.0.0``, the *validate_certs* is ``false`` by default. + Prior to collection version \ :literal:`5.0.0`\ , the \ :emphasis:`validate\_certs`\ is \ :literal:`false`\ by default. ca_path (optional, path, None) @@ -105,7 +121,7 @@ Notes .. note:: - Run this module from a system that has direct access to Dell OpenManage Enterprise. - - This module supports ``check_mode``. + - This module supports \ :literal:`check\_mode`\ . diff --git a/ansible_collections/dellemc/openmanage/docs/modules/ome_firmware_baseline_info.rst b/ansible_collections/dellemc/openmanage/docs/modules/ome_firmware_baseline_info.rst index 49ba4cd8f..ee60b1488 100644 --- a/ansible_collections/dellemc/openmanage/docs/modules/ome_firmware_baseline_info.rst +++ b/ansible_collections/dellemc/openmanage/docs/modules/ome_firmware_baseline_info.rst @@ -20,7 +20,7 @@ Requirements ------------ The below requirements are needed on the host that executes this module. -- python >= 3.8.6 +- python \>= 3.9.6 @@ -28,31 +28,47 @@ Parameters ---------- baseline_name (optional, str, None) - Name of the baseline.If *baseline_name* is not provided, all the available firmware baselines are returned. + Name of the baseline.If \ :emphasis:`baseline\_name`\ is not provided, all the available firmware baselines are returned. hostname (True, str, None) OpenManage Enterprise or OpenManage Enterprise Modular IP address or hostname. - username (True, str, None) + username (False, str, None) OpenManage Enterprise or OpenManage Enterprise Modular username. + If the username is not provided, then the environment variable \ :envvar:`OME\_USERNAME`\ is used. - password (True, str, None) + Example: export OME\_USERNAME=username + + + password (False, str, None) OpenManage Enterprise or OpenManage Enterprise Modular password. + If the password is not provided, then the environment variable \ :envvar:`OME\_PASSWORD`\ is used. + + Example: export OME\_PASSWORD=password + + + x_auth_token (False, str, None) + Authentication token. + + If the x\_auth\_token is not provided, then the environment variable \ :envvar:`OME\_X\_AUTH\_TOKEN`\ is used. + + Example: export OME\_X\_AUTH\_TOKEN=x\_auth\_token + port (optional, int, 443) OpenManage Enterprise or OpenManage Enterprise Modular HTTPS port. validate_certs (optional, bool, True) - If ``false``, the SSL certificates will not be validated. + If \ :literal:`false`\ , the SSL certificates will not be validated. - Configure ``false`` only on personally controlled sites where self-signed certificates are used. + Configure \ :literal:`false`\ only on personally controlled sites where self-signed certificates are used. - Prior to collection version ``5.0.0``, the *validate_certs* is ``false`` by default. + Prior to collection version \ :literal:`5.0.0`\ , the \ :emphasis:`validate\_certs`\ is \ :literal:`false`\ by default. ca_path (optional, path, None) @@ -71,7 +87,7 @@ Notes .. note:: - Run this module from a system that has direct access to Dell OpenManage Enterprise. - - This module supports ``check_mode``. + - This module supports \ :literal:`check\_mode`\ . diff --git a/ansible_collections/dellemc/openmanage/docs/modules/ome_firmware_catalog.rst b/ansible_collections/dellemc/openmanage/docs/modules/ome_firmware_catalog.rst index 2813e66a6..b5a4d5073 100644 --- a/ansible_collections/dellemc/openmanage/docs/modules/ome_firmware_catalog.rst +++ b/ansible_collections/dellemc/openmanage/docs/modules/ome_firmware_catalog.rst @@ -20,7 +20,7 @@ Requirements ------------ The below requirements are needed on the host that executes this module. -- python >= 3.8.6 +- python \>= 3.9.6 @@ -28,17 +28,17 @@ Parameters ---------- state (optional, str, present) - ``present`` creates or modifies a catalog. + \ :literal:`present`\ creates or modifies a catalog. - ``absent`` deletes an existing catalog. + \ :literal:`absent`\ deletes an existing catalog. catalog_name (optional, list, None) Name of the firmware catalog to be created. - This option is mutually exclusive with *catalog_id*. + This option is mutually exclusive with \ :emphasis:`catalog\_id`\ . - Provide the list of firmware catalog names that are supported when *state* is ``absent``. + Provide the list of firmware catalog names that are supported when \ :emphasis:`state`\ is \ :literal:`absent`\ . new_catalog_name (optional, str, None) @@ -48,9 +48,9 @@ Parameters catalog_id (optional, list, None) ID of the catalog. - This option is mutually exclusive with *catalog_name*. + This option is mutually exclusive with \ :emphasis:`catalog\_name`\ . - Provide the list of firmware catalog IDs that are supported when *state* is ``absent``. + Provide the list of firmware catalog IDs that are supported when \ :emphasis:`state`\ is \ :literal:`absent`\ . catalog_description (optional, str, None) @@ -60,87 +60,103 @@ Parameters source (optional, str, None) The IP address of the system where the firmware catalog is stored on the local network. - By default, this option is set to downloads.dell.com when *repository_type* is ``DELL_ONLINE``. + By default, this option is set to downloads.dell.com when \ :emphasis:`repository\_type`\ is \ :literal:`DELL\_ONLINE`\ . source_path (optional, str, None) Specify the complete path of the catalog file location without the file name. - This is option ignored when *repository_type* is ``DELL_ONLINE``. + This is option ignored when \ :emphasis:`repository\_type`\ is \ :literal:`DELL\_ONLINE`\ . file_name (optional, str, None) - Catalog file name associated with the *source_path*. + Catalog file name associated with the \ :emphasis:`source\_path`\ . - This option is ignored when *repository_type* is ``DELL_ONLINE``. + This option is ignored when \ :emphasis:`repository\_type`\ is \ :literal:`DELL\_ONLINE`\ . repository_type (optional, str, None) - Type of repository. The supported types are NFS, CIFS, HTTP, HTTPS,and DELL_ONLINE. + Type of repository. The supported types are NFS, CIFS, HTTP, HTTPS,and DELL\_ONLINE. repository_username (optional, str, None) User name of the repository where the catalog is stored. - This option is mandatory when *repository_type* is CIFS. + This option is mandatory when \ :emphasis:`repository\_type`\ is CIFS. - This option is ignored when *repository_type* is ``DELL_ONLINE``. + This option is ignored when \ :emphasis:`repository\_type`\ is \ :literal:`DELL\_ONLINE`\ . repository_password (optional, str, None) Password to access the repository. - This option is mandatory when *repository_type* is CIFS. + This option is mandatory when \ :emphasis:`repository\_type`\ is CIFS. - This option is ignored when *repository_type* is ``DELL_ONLINE``. + This option is ignored when \ :emphasis:`repository\_type`\ is \ :literal:`DELL\_ONLINE`\ . - ``NOTE`` The module always reports the changed status, when this is provided. + \ :literal:`NOTE`\ The module always reports the changed status, when this is provided. repository_domain (optional, str, None) Domain name of the repository. - This option is ignored when *repository_type* is ``DELL_ONLINE``. + This option is ignored when \ :emphasis:`repository\_type`\ is \ :literal:`DELL\_ONLINE`\ . check_certificate (optional, bool, False) - The certificate warnings are ignored when *repository_type* is HTTPS. If ``true``. If not, certificate warnings are not ignored. + The certificate warnings are ignored when \ :emphasis:`repository\_type`\ is HTTPS. If \ :literal:`true`\ . If not, certificate warnings are not ignored. job_wait (optional, bool, True) Provides the option to wait for job completion. - This option is applicable when *state* is ``present``. + This option is applicable when \ :emphasis:`state`\ is \ :literal:`present`\ . job_wait_timeout (optional, int, 600) - The maximum wait time of *job_wait* in seconds. The job is tracked only for this duration. + The maximum wait time of \ :emphasis:`job\_wait`\ in seconds. The job is tracked only for this duration. - This option is applicable when *job_wait* is ``true``. + This option is applicable when \ :emphasis:`job\_wait`\ is \ :literal:`true`\ . hostname (True, str, None) OpenManage Enterprise or OpenManage Enterprise Modular IP address or hostname. - username (True, str, None) + username (False, str, None) OpenManage Enterprise or OpenManage Enterprise Modular username. + If the username is not provided, then the environment variable \ :envvar:`OME\_USERNAME`\ is used. - password (True, str, None) + Example: export OME\_USERNAME=username + + + password (False, str, None) OpenManage Enterprise or OpenManage Enterprise Modular password. + If the password is not provided, then the environment variable \ :envvar:`OME\_PASSWORD`\ is used. + + Example: export OME\_PASSWORD=password + + + x_auth_token (False, str, None) + Authentication token. + + If the x\_auth\_token is not provided, then the environment variable \ :envvar:`OME\_X\_AUTH\_TOKEN`\ is used. + + Example: export OME\_X\_AUTH\_TOKEN=x\_auth\_token + port (optional, int, 443) OpenManage Enterprise or OpenManage Enterprise Modular HTTPS port. validate_certs (optional, bool, True) - If ``false``, the SSL certificates will not be validated. + If \ :literal:`false`\ , the SSL certificates will not be validated. - Configure ``false`` only on personally controlled sites where self-signed certificates are used. + Configure \ :literal:`false`\ only on personally controlled sites where self-signed certificates are used. - Prior to collection version ``5.0.0``, the *validate_certs* is ``false`` by default. + Prior to collection version \ :literal:`5.0.0`\ , the \ :emphasis:`validate\_certs`\ is \ :literal:`false`\ by default. ca_path (optional, path, None) @@ -158,10 +174,10 @@ Notes ----- .. note:: - - If *repository_password* is provided, then the module always reports the changed status. + - If \ :emphasis:`repository\_password`\ is provided, then the module always reports the changed status. - Run this module from a system that has direct access to Dell OpenManage Enterprise or OpenManage Enterprise Modular. - This module supports IPv4 and IPv6 addresses. - - This module supports ``check_mode``. + - This module supports \ :literal:`check\_mode`\ . @@ -294,7 +310,7 @@ msg (always, str, Successfully triggered the job to create a catalog with Task I Overall status of the firmware catalog operation. -catalog_status (When I(state) is C(present), dict, {'AssociatedBaselines': [], 'BaseLocation': None, 'BundlesCount': 0, 'Filename': 'catalog.gz', 'Id': 0, 'LastUpdated': None, 'ManifestIdentifier': None, 'ManifestVersion': None, 'NextUpdate': None, 'PredecessorIdentifier': None, 'ReleaseDate': None, 'ReleaseIdentifier': None, 'Repository': {'CheckCertificate': True, 'Description': 'HTTPS Desc', 'DomainName': None, 'Id': None, 'Name': 'catalog4', 'Password': None, 'RepositoryType': 'HTTPS', 'Source': 'company.com', 'Username': None}, 'Schedule': None, 'SourcePath': 'catalog', 'Status': None, 'TaskId': 10094}) +catalog_status (When I(state) is C(present), dict, {'AssociatedBaselines': [], 'BaseLocation': None, 'BundlesCount': 0, 'Filename': 'catalog.gz', 'Id': 12, 'LastUpdated': None, 'ManifestIdentifier': None, 'ManifestVersion': None, 'NextUpdate': None, 'PredecessorIdentifier': None, 'ReleaseDate': None, 'ReleaseIdentifier': None, 'Repository': {'CheckCertificate': True, 'Description': 'HTTPS Desc', 'DomainName': None, 'Id': None, 'Name': 'catalog4', 'Password': None, 'RepositoryType': 'HTTPS', 'Source': 'company.com', 'Username': None}, 'Schedule': None, 'SourcePath': 'catalog', 'Status': None, 'TaskId': 10094}) Details of the catalog operation. diff --git a/ansible_collections/dellemc/openmanage/docs/modules/ome_groups.rst b/ansible_collections/dellemc/openmanage/docs/modules/ome_groups.rst index 4322d460c..5671d3b8c 100644 --- a/ansible_collections/dellemc/openmanage/docs/modules/ome_groups.rst +++ b/ansible_collections/dellemc/openmanage/docs/modules/ome_groups.rst @@ -20,7 +20,7 @@ Requirements ------------ The below requirements are needed on the host that executes this module. -- python >= 3.8.6 +- python \>= 3.9.6 @@ -28,83 +28,99 @@ Parameters ---------- state (optional, str, present) - ``present`` allows to create or modify a device group. + \ :literal:`present`\ allows to create or modify a device group. - ``absent`` allows to delete a device group. + \ :literal:`absent`\ allows to delete a device group. name (optional, list, None) Name of the device group to be created, modified, or deleted. - If *state* is absent, multiple names can be provided. + If \ :emphasis:`state`\ is absent, multiple names can be provided. This option is case insensitive. - This option is mutually exclusive with *group_id*. + This option is mutually exclusive with \ :emphasis:`group\_id`\ . group_id (optional, list, None) ID of the device group to be created, modified, or deleted. - If *state* is absent, multiple IDs can be provided. + If \ :emphasis:`state`\ is absent, multiple IDs can be provided. - This option is mutually exclusive with *name*. + This option is mutually exclusive with \ :emphasis:`name`\ . new_name (optional, str, None) New name for the existing device group. - This is applicable only when *state* is ``present``. + This is applicable only when \ :emphasis:`state`\ is \ :literal:`present`\ . description (optional, str, None) Description for the device group. - This is applicable only when *state* is ``present``. + This is applicable only when \ :emphasis:`state`\ is \ :literal:`present`\ . parent_group_name (optional, str, Static Groups) Name of the parent device group under which the device group to be created or modified. - This is applicable only when *state* is ``present``. + This is applicable only when \ :emphasis:`state`\ is \ :literal:`present`\ . - ``NOTE`` If device group with such a name does not exist, device group with *parent_group_name* is created. + \ :literal:`NOTE`\ If device group with such a name does not exist, device group with \ :emphasis:`parent\_group\_name`\ is created. This option is case insensitive. - This option is mutually exclusive with *parent_group_id*. + This option is mutually exclusive with \ :emphasis:`parent\_group\_id`\ . parent_group_id (optional, int, None) ID of the parent device group under which the device group to be created or modified. - This is applicable only when *state* is ``present``. + This is applicable only when \ :emphasis:`state`\ is \ :literal:`present`\ . - This option is mutually exclusive with *parent_group_name*. + This option is mutually exclusive with \ :emphasis:`parent\_group\_name`\ . hostname (True, str, None) OpenManage Enterprise IP address or hostname. - username (True, str, None) + username (False, str, None) OpenManage Enterprise username. + If the username is not provided, then the environment variable \ :envvar:`OME\_USERNAME`\ is used. - password (True, str, None) + Example: export OME\_USERNAME=username + + + password (False, str, None) OpenManage Enterprise password. + If the password is not provided, then the environment variable \ :envvar:`OME\_PASSWORD`\ is used. + + Example: export OME\_PASSWORD=password + + + x_auth_token (False, str, None) + Authentication token. + + If the x\_auth\_token is not provided, then the environment variable \ :envvar:`OME\_X\_AUTH\_TOKEN`\ is used. + + Example: export OME\_X\_AUTH\_TOKEN=x\_auth\_token + port (optional, int, 443) OpenManage Enterprise HTTPS port. validate_certs (optional, bool, True) - If ``false``, the SSL certificates will not be validated. + If \ :literal:`false`\ , the SSL certificates will not be validated. - Configure ``false`` only on personally controlled sites where self-signed certificates are used. + Configure \ :literal:`false`\ only on personally controlled sites where self-signed certificates are used. - Prior to collection version ``5.0.0``, the *validate_certs* is ``false`` by default. + Prior to collection version \ :literal:`5.0.0`\ , the \ :emphasis:`validate\_certs`\ is \ :literal:`false`\ by default. ca_path (optional, path, None) @@ -123,10 +139,10 @@ Notes .. note:: - This module manages only static device groups on Dell OpenManage Enterprise. - - If a device group with the name *parent_group_name* does not exist, a new device group with the same name is created. + - If a device group with the name \ :emphasis:`parent\_group\_name`\ does not exist, a new device group with the same name is created. - Make sure the entered parent group is not the descendant of the provided group. - Run this module from a system that has direct access to Dell OpenManage Enterprise. - - This module supports ``check_mode``. + - This module supports \ :literal:`check\_mode`\ . diff --git a/ansible_collections/dellemc/openmanage/docs/modules/ome_identity_pool.rst b/ansible_collections/dellemc/openmanage/docs/modules/ome_identity_pool.rst index 4df20d14f..a2a966962 100644 --- a/ansible_collections/dellemc/openmanage/docs/modules/ome_identity_pool.rst +++ b/ansible_collections/dellemc/openmanage/docs/modules/ome_identity_pool.rst @@ -20,7 +20,7 @@ Requirements ------------ The below requirements are needed on the host that executes this module. -- python >= 3.8.6 +- python \>= 3.9.6 @@ -28,15 +28,15 @@ Parameters ---------- state (optional, str, present) - ``present`` modifies an existing identity pool. If the provided I (pool_name) does not exist, it creates an identity pool. - ``absent`` deletes an existing identity pool. + \ :literal:`present`\ modifies an existing identity pool. If the provided I (pool\_name) does not exist, it creates an identity pool. - \ :literal:`absent`\ deletes an existing identity pool. pool_name (True, str, None) - This option is mandatory for *state* when creating, modifying and deleting an identity pool. + This option is mandatory for \ :emphasis:`state`\ when creating, modifying and deleting an identity pool. new_pool_name (optional, str, None) - After creating an identity pool, *pool_name* can be changed to *new_pool_name*. + After creating an identity pool, \ :emphasis:`pool\_name`\ can be changed to \ :emphasis:`new\_pool\_name`\ . This option is ignored when creating an identity pool. @@ -48,7 +48,7 @@ Parameters ethernet_settings (optional, dict, None) Applicable for creating and modifying an identity pool using Ethernet settings. - *starting_mac_address* and *identity_count* are required to create an identity pool. + \ :emphasis:`starting\_mac\_address`\ and \ :emphasis:`identity\_count`\ are required to create an identity pool. starting_mac_address (optional, str, None) @@ -63,7 +63,7 @@ Parameters fcoe_settings (optional, dict, None) Applicable for creating and modifying an identity pool using FCoE settings. - *starting_mac_address* and *identity_count* are required to create an identity pool. + \ :emphasis:`starting\_mac\_address`\ and \ :emphasis:`identity\_count`\ are required to create an identity pool. starting_mac_address (optional, str, None) @@ -78,7 +78,7 @@ Parameters iscsi_settings (optional, dict, None) Applicable for creating and modifying an identity pool using ISCSI settings. - *starting_mac_address*, *identity_count*, *iqn_prefix*, *ip_range* and *subnet_mask* are required to create an identity pool. + \ :emphasis:`starting\_mac\_address`\ , \ :emphasis:`identity\_count`\ , \ :emphasis:`iqn\_prefix`\ , \ :emphasis:`ip\_range`\ and \ :emphasis:`subnet\_mask`\ are required to create an identity pool. starting_mac_address (optional, str, None) @@ -107,7 +107,7 @@ Parameters subnet_mask (optional, str, None) - Subnet mask for *ip_range*. + Subnet mask for \ :emphasis:`ip\_range`\ . gateway (optional, str, None) @@ -131,15 +131,15 @@ Parameters The value 0x2001 is beginning to the starting address for the generation of a WWPN, and 0x2000 for a WWNN. - *starting_address* and *identity_count* are required to create an identity pool. + \ :emphasis:`starting\_address`\ and \ :emphasis:`identity\_count`\ are required to create an identity pool. starting_address (optional, str, None) - Starting MAC Address of FC setting.*starting_address* is required to option to create FC settings. + Starting MAC Address of FC setting.\ :emphasis:`starting\_address`\ is required to option to create FC settings. identity_count (optional, int, None) - Number of MAC addresses.*identity_count* is required to option to create FC settings. + Number of MAC addresses.\ :emphasis:`identity\_count`\ is required to option to create FC settings. @@ -147,24 +147,40 @@ Parameters OpenManage Enterprise or OpenManage Enterprise Modular IP address or hostname. - username (True, str, None) + username (False, str, None) OpenManage Enterprise or OpenManage Enterprise Modular username. + If the username is not provided, then the environment variable \ :envvar:`OME\_USERNAME`\ is used. - password (True, str, None) + Example: export OME\_USERNAME=username + + + password (False, str, None) OpenManage Enterprise or OpenManage Enterprise Modular password. + If the password is not provided, then the environment variable \ :envvar:`OME\_PASSWORD`\ is used. + + Example: export OME\_PASSWORD=password + + + x_auth_token (False, str, None) + Authentication token. + + If the x\_auth\_token is not provided, then the environment variable \ :envvar:`OME\_X\_AUTH\_TOKEN`\ is used. + + Example: export OME\_X\_AUTH\_TOKEN=x\_auth\_token + port (optional, int, 443) OpenManage Enterprise or OpenManage Enterprise Modular HTTPS port. validate_certs (optional, bool, True) - If ``false``, the SSL certificates will not be validated. + If \ :literal:`false`\ , the SSL certificates will not be validated. - Configure ``false`` only on personally controlled sites where self-signed certificates are used. + Configure \ :literal:`false`\ only on personally controlled sites where self-signed certificates are used. - Prior to collection version ``5.0.0``, the *validate_certs* is ``false`` by default. + Prior to collection version \ :literal:`5.0.0`\ , the \ :emphasis:`validate\_certs`\ is \ :literal:`false`\ by default. ca_path (optional, path, None) @@ -183,7 +199,7 @@ Notes .. note:: - Run this module from a system that has direct access to Dell OpenManage Enterprise. - - This module supports ``check_mode``. + - This module supports \ :literal:`check\_mode`\ . @@ -291,7 +307,7 @@ msg (always, str, Successfully created an identity pool.) pool_status (success, dict, {'Id': 29, 'IsSuccessful': True, 'Issues': []}) - Details of the user operation, when *state* is ``present``. + Details of the user operation, when \ :emphasis:`state`\ is \ :literal:`present`\ . error_info (on HTTP error, dict, {'error': {'@Message.ExtendedInfo': [{'Message': 'Unable to process the request because an error occurred: Ethernet-MAC Range overlap found (in this Identity Pool or in a different one) .', 'MessageArgs': ['Ethernet-MAC Range overlap found (in this Identity Pool or in a different one)"'], 'MessageId': 'CGEN6001', 'RelatedProperties': [], 'Resolution': 'Retry the operation. If the issue persists, contact your system administrator.', 'Severity': 'Critical'}], 'code': 'Base.1.0.GeneralError', 'message': 'A general error has occurred. See ExtendedInfo for more information.'}}) diff --git a/ansible_collections/dellemc/openmanage/docs/modules/ome_job_info.rst b/ansible_collections/dellemc/openmanage/docs/modules/ome_job_info.rst index 5c998cf44..902d399ce 100644 --- a/ansible_collections/dellemc/openmanage/docs/modules/ome_job_info.rst +++ b/ansible_collections/dellemc/openmanage/docs/modules/ome_job_info.rst @@ -20,7 +20,7 @@ Requirements ------------ The below requirements are needed on the host that executes this module. -- python >= 3.8.6 +- python \>= 3.9.6 @@ -51,35 +51,51 @@ Parameters fetch_execution_history (optional, bool, False) Fetches the execution history of the job. - *fetch_execution_history* is only applicable when valid *job_id* is given. + \ :emphasis:`fetch\_execution\_history`\ is only applicable when valid \ :emphasis:`job\_id`\ is given. - When ``true``, fetches all the execution history details. + When \ :literal:`true`\ , fetches all the execution history details. - When ``false``, fetches only the job info and last execution details. + When \ :literal:`false`\ , fetches only the job info and last execution details. hostname (True, str, None) OpenManage Enterprise or OpenManage Enterprise Modular IP address or hostname. - username (True, str, None) + username (False, str, None) OpenManage Enterprise or OpenManage Enterprise Modular username. + If the username is not provided, then the environment variable \ :envvar:`OME\_USERNAME`\ is used. - password (True, str, None) + Example: export OME\_USERNAME=username + + + password (False, str, None) OpenManage Enterprise or OpenManage Enterprise Modular password. + If the password is not provided, then the environment variable \ :envvar:`OME\_PASSWORD`\ is used. + + Example: export OME\_PASSWORD=password + + + x_auth_token (False, str, None) + Authentication token. + + If the x\_auth\_token is not provided, then the environment variable \ :envvar:`OME\_X\_AUTH\_TOKEN`\ is used. + + Example: export OME\_X\_AUTH\_TOKEN=x\_auth\_token + port (optional, int, 443) OpenManage Enterprise or OpenManage Enterprise Modular HTTPS port. validate_certs (optional, bool, True) - If ``false``, the SSL certificates will not be validated. + If \ :literal:`false`\ , the SSL certificates will not be validated. - Configure ``false`` only on personally controlled sites where self-signed certificates are used. + Configure \ :literal:`false`\ only on personally controlled sites where self-signed certificates are used. - Prior to collection version ``5.0.0``, the *validate_certs* is ``false`` by default. + Prior to collection version \ :literal:`5.0.0`\ , the \ :emphasis:`validate\_certs`\ is \ :literal:`false`\ by default. ca_path (optional, path, None) @@ -98,7 +114,7 @@ Notes .. note:: - Run this module from a system that has direct access to Dell OpenManage Enterprise. - - This module supports ``check_mode``. + - This module supports \ :literal:`check\_mode`\ . diff --git a/ansible_collections/dellemc/openmanage/docs/modules/ome_network_port_breakout.rst b/ansible_collections/dellemc/openmanage/docs/modules/ome_network_port_breakout.rst index 839554682..0adee41b9 100644 --- a/ansible_collections/dellemc/openmanage/docs/modules/ome_network_port_breakout.rst +++ b/ansible_collections/dellemc/openmanage/docs/modules/ome_network_port_breakout.rst @@ -22,7 +22,7 @@ Requirements ------------ The below requirements are needed on the host that executes this module. -- python >= 3.8.6 +- python \>= 3.9.6 @@ -43,24 +43,40 @@ Parameters OpenManage Enterprise Modular IP address or hostname. - username (True, str, None) + username (False, str, None) OpenManage Enterprise Modular username. + If the username is not provided, then the environment variable \ :envvar:`OME\_USERNAME`\ is used. - password (True, str, None) + Example: export OME\_USERNAME=username + + + password (False, str, None) OpenManage Enterprise Modular password. + If the password is not provided, then the environment variable \ :envvar:`OME\_PASSWORD`\ is used. + + Example: export OME\_PASSWORD=password + + + x_auth_token (False, str, None) + Authentication token. + + If the x\_auth\_token is not provided, then the environment variable \ :envvar:`OME\_X\_AUTH\_TOKEN`\ is used. + + Example: export OME\_X\_AUTH\_TOKEN=x\_auth\_token + port (optional, int, 443) OpenManage Enterprise Modular HTTPS port. validate_certs (optional, bool, True) - If ``false``, the SSL certificates will not be validated. + If \ :literal:`false`\ , the SSL certificates will not be validated. - Configure ``false`` only on personally controlled sites where self-signed certificates are used. + Configure \ :literal:`false`\ only on personally controlled sites where self-signed certificates are used. - Prior to collection version ``5.0.0``, the *validate_certs* is ``false`` by default. + Prior to collection version \ :literal:`5.0.0`\ , the \ :emphasis:`validate\_certs`\ is \ :literal:`false`\ by default. ca_path (optional, path, None) @@ -79,7 +95,7 @@ Notes .. note:: - Run this module from a system that has direct access to Dell OpenManage Enterprise Modular. - - This module supports ``check_mode``. + - This module supports \ :literal:`check\_mode`\ . diff --git a/ansible_collections/dellemc/openmanage/docs/modules/ome_network_vlan.rst b/ansible_collections/dellemc/openmanage/docs/modules/ome_network_vlan.rst index 0ab868cb9..d6b4810ad 100644 --- a/ansible_collections/dellemc/openmanage/docs/modules/ome_network_vlan.rst +++ b/ansible_collections/dellemc/openmanage/docs/modules/ome_network_vlan.rst @@ -24,7 +24,7 @@ Requirements ------------ The below requirements are needed on the host that executes this module. -- python >= 3.8.6 +- python \>= 3.9.6 @@ -32,19 +32,19 @@ Parameters ---------- state (optional, str, present) - ``present`` creates a new VLAN or modifies an existing VLAN. + \ :literal:`present`\ creates a new VLAN or modifies an existing VLAN. - ``absent`` deletes an existing VLAN. + \ :literal:`absent`\ deletes an existing VLAN. - *WARNING* Deleting a VLAN can impact the network infrastructure. + \ :emphasis:`WARNING`\ Deleting a VLAN can impact the network infrastructure. name (True, str, None) - Provide the *name* of the VLAN to be created, deleted or modified. + Provide the \ :emphasis:`name`\ of the VLAN to be created, deleted or modified. new_name (optional, str, None) - Provide the *name* of the VLAN to be modified. + Provide the \ :emphasis:`name`\ of the VLAN to be modified. description (optional, str, None) @@ -58,37 +58,53 @@ Parameters vlan_maximum (optional, int, None) The maximum VLAN value of the range. - A single value VLAN is created if the vlan_maximum and vlan_minmum values are the same. + A single value VLAN is created if the vlan\_maximum and vlan\_minmum values are the same. type (optional, str, None) Types of supported VLAN networks. - For the description of each network type, use API https://*hostname*/api/NetworkConfigurationService/NetworkTypes. + For the description of each network type, use API \ https://I(hostname\ /api/NetworkConfigurationService/NetworkTypes). hostname (True, str, None) OpenManage Enterprise or OpenManage Enterprise Modular IP address or hostname. - username (True, str, None) + username (False, str, None) OpenManage Enterprise or OpenManage Enterprise Modular username. + If the username is not provided, then the environment variable \ :envvar:`OME\_USERNAME`\ is used. - password (True, str, None) + Example: export OME\_USERNAME=username + + + password (False, str, None) OpenManage Enterprise or OpenManage Enterprise Modular password. + If the password is not provided, then the environment variable \ :envvar:`OME\_PASSWORD`\ is used. + + Example: export OME\_PASSWORD=password + + + x_auth_token (False, str, None) + Authentication token. + + If the x\_auth\_token is not provided, then the environment variable \ :envvar:`OME\_X\_AUTH\_TOKEN`\ is used. + + Example: export OME\_X\_AUTH\_TOKEN=x\_auth\_token + port (optional, int, 443) OpenManage Enterprise or OpenManage Enterprise Modular HTTPS port. validate_certs (optional, bool, True) - If ``false``, the SSL certificates will not be validated. + If \ :literal:`false`\ , the SSL certificates will not be validated. - Configure ``false`` only on personally controlled sites where self-signed certificates are used. + Configure \ :literal:`false`\ only on personally controlled sites where self-signed certificates are used. - Prior to collection version ``5.0.0``, the *validate_certs* is ``false`` by default. + Prior to collection version \ :literal:`5.0.0`\ , the \ :emphasis:`validate\_certs`\ is \ :literal:`false`\ by default. ca_path (optional, path, None) @@ -107,7 +123,7 @@ Notes .. note:: - Run this module from a system that has direct access to Dell OpenManage Enterprise. - - This module supports ``check_mode``. + - This module supports \ :literal:`check\_mode`\ . diff --git a/ansible_collections/dellemc/openmanage/docs/modules/ome_network_vlan_info.rst b/ansible_collections/dellemc/openmanage/docs/modules/ome_network_vlan_info.rst index af790fa30..89d53d9d4 100644 --- a/ansible_collections/dellemc/openmanage/docs/modules/ome_network_vlan_info.rst +++ b/ansible_collections/dellemc/openmanage/docs/modules/ome_network_vlan_info.rst @@ -12,7 +12,7 @@ ome_network_vlan_info -- Retrieves the information about networks VLAN(s) presen Synopsis -------- -This module allows to retrieve the following. - A list of all the network VLANs with their detailed information. - Information about a specific network VLAN using VLAN *id* or VLAN *name*. +This module allows to retrieve the following. - A list of all the network VLANs with their detailed information. - Information about a specific network VLAN using VLAN \ :emphasis:`id`\ or VLAN \ :emphasis:`name`\ . @@ -20,7 +20,7 @@ Requirements ------------ The below requirements are needed on the host that executes this module. -- python >= 3.8.6 +- python \>= 3.9.6 @@ -30,37 +30,53 @@ Parameters id (optional, int, None) A unique identifier of the network VLAN available in the device. - *id* and *name* are mutually exclusive. + \ :emphasis:`id`\ and \ :emphasis:`name`\ are mutually exclusive. name (optional, str, None) A unique name of the network VLAN available in the device. - *name* and *id* are mutually exclusive. + \ :emphasis:`name`\ and \ :emphasis:`id`\ are mutually exclusive. hostname (True, str, None) OpenManage Enterprise or OpenManage Enterprise Modular IP address or hostname. - username (True, str, None) + username (False, str, None) OpenManage Enterprise or OpenManage Enterprise Modular username. + If the username is not provided, then the environment variable \ :envvar:`OME\_USERNAME`\ is used. - password (True, str, None) + Example: export OME\_USERNAME=username + + + password (False, str, None) OpenManage Enterprise or OpenManage Enterprise Modular password. + If the password is not provided, then the environment variable \ :envvar:`OME\_PASSWORD`\ is used. + + Example: export OME\_PASSWORD=password + + + x_auth_token (False, str, None) + Authentication token. + + If the x\_auth\_token is not provided, then the environment variable \ :envvar:`OME\_X\_AUTH\_TOKEN`\ is used. + + Example: export OME\_X\_AUTH\_TOKEN=x\_auth\_token + port (optional, int, 443) OpenManage Enterprise or OpenManage Enterprise Modular HTTPS port. validate_certs (optional, bool, True) - If ``false``, the SSL certificates will not be validated. + If \ :literal:`false`\ , the SSL certificates will not be validated. - Configure ``false`` only on personally controlled sites where self-signed certificates are used. + Configure \ :literal:`false`\ only on personally controlled sites where self-signed certificates are used. - Prior to collection version ``5.0.0``, the *validate_certs* is ``false`` by default. + Prior to collection version \ :literal:`5.0.0`\ , the \ :emphasis:`validate\_certs`\ is \ :literal:`false`\ by default. ca_path (optional, path, None) @@ -79,7 +95,7 @@ Notes .. note:: - Run this module from a system that has direct access to Dell OpenManage Enterprise. - - This module supports ``check_mode``. + - This module supports \ :literal:`check\_mode`\ . diff --git a/ansible_collections/dellemc/openmanage/docs/modules/ome_powerstate.rst b/ansible_collections/dellemc/openmanage/docs/modules/ome_powerstate.rst index a9046a98e..c1d8f316b 100644 --- a/ansible_collections/dellemc/openmanage/docs/modules/ome_powerstate.rst +++ b/ansible_collections/dellemc/openmanage/docs/modules/ome_powerstate.rst @@ -20,7 +20,7 @@ Requirements ------------ The below requirements are needed on the host that executes this module. -- python >= 3.8.6 +- python \>= 3.9.6 @@ -34,37 +34,53 @@ Parameters device_service_tag (optional, str, None) Targeted device service tag. - *device_service_tag* is mutually exclusive with *device_id*. + \ :emphasis:`device\_service\_tag`\ is mutually exclusive with \ :emphasis:`device\_id`\ . device_id (optional, int, None) Targeted device id. - *device_id* is mutually exclusive with *device_service_tag*. + \ :emphasis:`device\_id`\ is mutually exclusive with \ :emphasis:`device\_service\_tag`\ . hostname (True, str, None) OpenManage Enterprise or OpenManage Enterprise Modular IP address or hostname. - username (True, str, None) + username (False, str, None) OpenManage Enterprise or OpenManage Enterprise Modular username. + If the username is not provided, then the environment variable \ :envvar:`OME\_USERNAME`\ is used. - password (True, str, None) + Example: export OME\_USERNAME=username + + + password (False, str, None) OpenManage Enterprise or OpenManage Enterprise Modular password. + If the password is not provided, then the environment variable \ :envvar:`OME\_PASSWORD`\ is used. + + Example: export OME\_PASSWORD=password + + + x_auth_token (False, str, None) + Authentication token. + + If the x\_auth\_token is not provided, then the environment variable \ :envvar:`OME\_X\_AUTH\_TOKEN`\ is used. + + Example: export OME\_X\_AUTH\_TOKEN=x\_auth\_token + port (optional, int, 443) OpenManage Enterprise or OpenManage Enterprise Modular HTTPS port. validate_certs (optional, bool, True) - If ``false``, the SSL certificates will not be validated. + If \ :literal:`false`\ , the SSL certificates will not be validated. - Configure ``false`` only on personally controlled sites where self-signed certificates are used. + Configure \ :literal:`false`\ only on personally controlled sites where self-signed certificates are used. - Prior to collection version ``5.0.0``, the *validate_certs* is ``false`` by default. + Prior to collection version \ :literal:`5.0.0`\ , the \ :emphasis:`validate\_certs`\ is \ :literal:`false`\ by default. ca_path (optional, path, None) @@ -83,7 +99,7 @@ Notes .. note:: - Run this module from a system that has direct access to Dell OpenManage Enterprise. - - This module supports ``check_mode``. + - This module supports \ :literal:`check\_mode`\ . diff --git a/ansible_collections/dellemc/openmanage/docs/modules/ome_profile.rst b/ansible_collections/dellemc/openmanage/docs/modules/ome_profile.rst index 8faf8b8fe..418acddf4 100644 --- a/ansible_collections/dellemc/openmanage/docs/modules/ome_profile.rst +++ b/ansible_collections/dellemc/openmanage/docs/modules/ome_profile.rst @@ -20,7 +20,7 @@ Requirements ------------ The below requirements are needed on the host that executes this module. -- python >= 3.8.6 +- python \>= 3.9.6 @@ -28,17 +28,17 @@ Parameters ---------- command (optional, str, create) - ``create`` creates new profiles. + \ :literal:`create`\ creates new profiles. - ``modify`` modifies an existing profile. Only *name*, *description*, *boot_to_network_iso*, and *attributes* can be modified. + \ :literal:`modify`\ modifies an existing profile. Only \ :emphasis:`name`\ , \ :emphasis:`description`\ , \ :emphasis:`boot\_to\_network\_iso`\ , and \ :emphasis:`attributes`\ can be modified. - ``delete`` deletes an existing profile. + \ :literal:`delete`\ deletes an existing profile. - ``assign`` Deploys an existing profile on a target device and returns a task ID. + \ :literal:`assign`\ Deploys an existing profile on a target device and returns a task ID. - ``unassign`` unassigns a profile from a specified target and returns a task ID. + \ :literal:`unassign`\ unassigns a profile from a specified target and returns a task ID. - ``migrate`` migrates an existing profile and returns a task ID. + \ :literal:`migrate`\ migrates an existing profile and returns a task ID. name_prefix (optional, str, Profile) @@ -46,7 +46,7 @@ Parameters This is applicable only for a create operation. - This option is mutually exclusive with *name*. + This option is mutually exclusive with \ :emphasis:`name`\ . name (optional, str, None) @@ -54,21 +54,21 @@ Parameters This is applicable for modify, delete, assign, unassign, and migrate operations. - This option is mutually exclusive with *name_prefix* and *number_of_profiles*. + This option is mutually exclusive with \ :emphasis:`name\_prefix`\ and \ :emphasis:`number\_of\_profiles`\ . new_name (optional, str, None) New name of the profile. - Applicable when *command* is ``modify``. + Applicable when \ :emphasis:`command`\ is \ :literal:`modify`\ . number_of_profiles (optional, int, 1) Provide the number of profiles to be created. - This is applicable when *name_prefix* is used with ``create``. + This is applicable when \ :emphasis:`name\_prefix`\ is used with \ :literal:`create`\ . - This option is mutually exclusive with *name*. + This option is mutually exclusive with \ :emphasis:`name`\ . Openmanage Enterprise can create a maximum of 100 profiles. @@ -76,25 +76,25 @@ Parameters template_name (optional, str, None) Name of the template for creating the profile(s). - This is applicable when *command* is ``create``. + This is applicable when \ :emphasis:`command`\ is \ :literal:`create`\ . - This option is mutually exclusive with *template_id*. + This option is mutually exclusive with \ :emphasis:`template\_id`\ . template_id (optional, int, None) ID of the template. - This is applicable when *command* is ``create``. + This is applicable when \ :emphasis:`command`\ is \ :literal:`create`\ . - This option is mutually exclusive with *template_name*. + This option is mutually exclusive with \ :emphasis:`template\_name`\ . device_id (optional, int, None) ID of the target device. - This is applicable when *command* is ``assign`` and ``migrate``. + This is applicable when \ :emphasis:`command`\ is \ :literal:`assign`\ and \ :literal:`migrate`\ . - This option is mutually exclusive with *device_service_tag*. + This option is mutually exclusive with \ :emphasis:`device\_service\_tag`\ . device_service_tag (optional, str, None) @@ -102,11 +102,11 @@ Parameters This is typically 7 to 8 characters in length. - Applicable when *command* is ``assign``, and ``migrate``. + Applicable when \ :emphasis:`command`\ is \ :literal:`assign`\ , and \ :literal:`migrate`\ . - This option is mutually exclusive with *device_id*. + This option is mutually exclusive with \ :emphasis:`device\_id`\ . - If the device does not exist when *command* is ``assign`` then the profile is auto-deployed. + If the device does not exist when \ :emphasis:`command`\ is \ :literal:`assign`\ then the profile is auto-deployed. description (optional, str, None) @@ -116,7 +116,7 @@ Parameters boot_to_network_iso (optional, dict, None) Details of the Share iso. - Applicable when *command* is ``create``, ``assign``, and ``modify``. + Applicable when \ :emphasis:`command`\ is \ :literal:`create`\ , \ :literal:`assign`\ , and \ :literal:`modify`\ . boot_to_network (True, bool, None) @@ -132,15 +132,15 @@ Parameters share_user (optional, str, None) - User name when *share_type* is ``CIFS``. + User name when \ :emphasis:`share\_type`\ is \ :literal:`CIFS`\ . share_password (optional, str, None) - User password when *share_type* is ``CIFS``. + User password when \ :emphasis:`share\_type`\ is \ :literal:`CIFS`\ . workgroup (optional, str, None) - User workgroup when *share_type* is ``CIFS``. + User workgroup when \ :emphasis:`share\_type`\ is \ :literal:`CIFS`\ . iso_path (optional, str, None) @@ -155,45 +155,45 @@ Parameters filters (optional, dict, None) Filters the profiles based on selected criteria. - This is applicable when *command* is ``delete`` or ``unassign``. + This is applicable when \ :emphasis:`command`\ is \ :literal:`delete`\ or \ :literal:`unassign`\ . - This supports suboption *ProfileIds* which takes a list of profile IDs. + This supports suboption \ :emphasis:`ProfileIds`\ which takes a list of profile IDs. - This also supports OData filter expressions with the suboption *Filters*. + This also supports OData filter expressions with the suboption \ :emphasis:`Filters`\ . See OpenManage Enterprise REST API guide for the filtering options available. - *WARNING* When this option is used in case of ``unassign``, task ID is not returned for any of the profiles affected. + \ :emphasis:`WARNING`\ When this option is used in case of \ :literal:`unassign`\ , task ID is not returned for any of the profiles affected. force (optional, bool, False) Provides the option to force the migration of a profile even if the source device cannot be contacted. - This option is applicable when *command* is ``migrate``. + This option is applicable when \ :emphasis:`command`\ is \ :literal:`migrate`\ . attributes (optional, dict, None) - Attributes for ``modify`` and ``assign``. + Attributes for \ :literal:`modify`\ and \ :literal:`assign`\ . Attributes (optional, list, None) - List of attributes to be modified, when *command* is ``modify``. + List of attributes to be modified, when \ :emphasis:`command`\ is \ :literal:`modify`\ . - List of attributes to be overridden when *command* is ``assign``. + List of attributes to be overridden when \ :emphasis:`command`\ is \ :literal:`assign`\ . - Use the *Id* If the attribute Id is available. If not, use the comma separated I (DisplayName). For more details about using the *DisplayName*, see the example provided. + Use the \ :emphasis:`Id`\ If the attribute Id is available. If not, use the comma separated I (DisplayName). For more details about using the \ :emphasis:`DisplayName`\ , see the example provided. Options (optional, dict, None) Provides the different shut down options. - This is applicable when *command* is ``assign``. + This is applicable when \ :emphasis:`command`\ is \ :literal:`assign`\ . Schedule (optional, dict, None) Schedule for profile deployment. - This is applicable when *command* is ``assign``. + This is applicable when \ :emphasis:`command`\ is \ :literal:`assign`\ . @@ -201,24 +201,40 @@ Parameters OpenManage Enterprise or OpenManage Enterprise Modular IP address or hostname. - username (True, str, None) + username (False, str, None) OpenManage Enterprise or OpenManage Enterprise Modular username. + If the username is not provided, then the environment variable \ :envvar:`OME\_USERNAME`\ is used. - password (True, str, None) + Example: export OME\_USERNAME=username + + + password (False, str, None) OpenManage Enterprise or OpenManage Enterprise Modular password. + If the password is not provided, then the environment variable \ :envvar:`OME\_PASSWORD`\ is used. + + Example: export OME\_PASSWORD=password + + + x_auth_token (False, str, None) + Authentication token. + + If the x\_auth\_token is not provided, then the environment variable \ :envvar:`OME\_X\_AUTH\_TOKEN`\ is used. + + Example: export OME\_X\_AUTH\_TOKEN=x\_auth\_token + port (optional, int, 443) OpenManage Enterprise or OpenManage Enterprise Modular HTTPS port. validate_certs (optional, bool, True) - If ``false``, the SSL certificates will not be validated. + If \ :literal:`false`\ , the SSL certificates will not be validated. - Configure ``false`` only on personally controlled sites where self-signed certificates are used. + Configure \ :literal:`false`\ only on personally controlled sites where self-signed certificates are used. - Prior to collection version ``5.0.0``, the *validate_certs* is ``false`` by default. + Prior to collection version \ :literal:`5.0.0`\ , the \ :emphasis:`validate\_certs`\ is \ :literal:`false`\ by default. ca_path (optional, path, None) @@ -237,8 +253,8 @@ Notes .. note:: - Run this module from a system that has direct access to Dell OpenManage Enterprise. - - This module supports ``check_mode``. - - ``assign`` operation on a already assigned profile will not redeploy. + - This module supports \ :literal:`check\_mode`\ . + - \ :literal:`assign`\ operation on a already assigned profile will not redeploy. @@ -444,9 +460,9 @@ profile_ids (when I(command) is C(create), list, [1234, 5678]) job_id (when I(command) is C(assign), C(migrate) or C(unassign), int, 14123) - Task ID created when *command* is ``assign``, ``migrate`` or ``unassign``. + Task ID created when \ :emphasis:`command`\ is \ :literal:`assign`\ , \ :literal:`migrate`\ or \ :literal:`unassign`\ . - ``assign`` and ``unassign`` operations do not trigger a task if a profile is auto-deployed. + \ :literal:`assign`\ and \ :literal:`unassign`\ operations do not trigger a task if a profile is auto-deployed. error_info (on HTTP error, dict, {'error': {'code': 'Base.1.0.GeneralError', 'message': 'A general error has occurred. See ExtendedInfo for more information.', '@Message.ExtendedInfo': [{'MessageId': 'GEN1234', 'RelatedProperties': [], 'Message': 'Unable to process the request because an error occurred.', 'MessageArgs': [], 'Severity': 'Critical', 'Resolution': 'Retry the operation. If the issue persists, contact your system administrator.'}]}}) diff --git a/ansible_collections/dellemc/openmanage/docs/modules/ome_profile_info.rst b/ansible_collections/dellemc/openmanage/docs/modules/ome_profile_info.rst index 697a8c05f..d501e43ba 100644 --- a/ansible_collections/dellemc/openmanage/docs/modules/ome_profile_info.rst +++ b/ansible_collections/dellemc/openmanage/docs/modules/ome_profile_info.rst @@ -20,7 +20,7 @@ Requirements ------------ The below requirements are needed on the host that executes this module. -- python >= 3.9.6 +- python \>= 3.9.6 @@ -30,25 +30,25 @@ Parameters profile_id (optional, int, None) Id of the profile. - This is mutually exclusive with *profile_name*, *system_query_options*, *template_id*, and *template_name*. + This is mutually exclusive with \ :emphasis:`profile\_name`\ , \ :emphasis:`system\_query\_options`\ , \ :emphasis:`template\_id`\ , and \ :emphasis:`template\_name`\ . profile_name (optional, str, None) Name of the profile. - This is mutually exclusive with *template_id*, *profile_id*, *system_query_options*, and *template_name*. + This is mutually exclusive with \ :emphasis:`template\_id`\ , \ :emphasis:`profile\_id`\ , \ :emphasis:`system\_query\_options`\ , and \ :emphasis:`template\_name`\ . template_id (optional, int, None) Provide the ID of the template to retrieve the list of profile(s) linked to it. - This is mutually exclusive with *profile_name*, *profile_id*, *system_query_options*, and *template_name*. + This is mutually exclusive with \ :emphasis:`profile\_name`\ , \ :emphasis:`profile\_id`\ , \ :emphasis:`system\_query\_options`\ , and \ :emphasis:`template\_name`\ . template_name (optional, str, None) Provide the name of the template to retrieve the list of profile(s) linked to it. - This is mutually exclusive with *profile_name*, *profile_id*, *template_id*, and *system_query_options*. + This is mutually exclusive with \ :emphasis:`profile\_name`\ , \ :emphasis:`profile\_id`\ , \ :emphasis:`template\_id`\ , and \ :emphasis:`system\_query\_options`\ . system_query_options (optional, dict, None) @@ -56,33 +56,49 @@ Parameters The profile list can be fetched and sorted based on ProfileName, TemplateName, TargetTypeId, TargetName, ChassisName, ProfileState, LastRunStatus, or ProfileModified. - This is mutually exclusive with *profile_name*, *profile_id*, *template_id*, and *template_name*. + This is mutually exclusive with \ :emphasis:`profile\_name`\ , \ :emphasis:`profile\_id`\ , \ :emphasis:`template\_id`\ , and \ :emphasis:`template\_name`\ . - ``Note`` If *profile_name*, *profile_id*, *template_id*, or *template_name* option is not provided, the module retrieves all the profiles. + \ :literal:`Note`\ If \ :emphasis:`profile\_name`\ , \ :emphasis:`profile\_id`\ , \ :emphasis:`template\_id`\ , or \ :emphasis:`template\_name`\ option is not provided, the module retrieves all the profiles. hostname (True, str, None) OpenManage Enterprise or OpenManage Enterprise Modular IP address or hostname. - username (True, str, None) + username (False, str, None) OpenManage Enterprise or OpenManage Enterprise Modular username. + If the username is not provided, then the environment variable \ :envvar:`OME\_USERNAME`\ is used. - password (True, str, None) + Example: export OME\_USERNAME=username + + + password (False, str, None) OpenManage Enterprise or OpenManage Enterprise Modular password. + If the password is not provided, then the environment variable \ :envvar:`OME\_PASSWORD`\ is used. + + Example: export OME\_PASSWORD=password + + + x_auth_token (False, str, None) + Authentication token. + + If the x\_auth\_token is not provided, then the environment variable \ :envvar:`OME\_X\_AUTH\_TOKEN`\ is used. + + Example: export OME\_X\_AUTH\_TOKEN=x\_auth\_token + port (optional, int, 443) OpenManage Enterprise or OpenManage Enterprise Modular HTTPS port. validate_certs (optional, bool, True) - If ``false``, the SSL certificates will not be validated. + If \ :literal:`false`\ , the SSL certificates will not be validated. - Configure ``false`` only on personally controlled sites where self-signed certificates are used. + Configure \ :literal:`false`\ only on personally controlled sites where self-signed certificates are used. - Prior to collection version ``5.0.0``, the *validate_certs* is ``false`` by default. + Prior to collection version \ :literal:`5.0.0`\ , the \ :emphasis:`validate\_certs`\ is \ :literal:`false`\ by default. ca_path (optional, path, None) @@ -101,7 +117,7 @@ Notes .. note:: - Run this module on a system that has direct access to Dell OpenManage Enterprise. - - This module supports ``check_mode``. + - This module supports \ :literal:`check\_mode`\ . diff --git a/ansible_collections/dellemc/openmanage/docs/modules/ome_server_interface_profile_info.rst b/ansible_collections/dellemc/openmanage/docs/modules/ome_server_interface_profile_info.rst index 95cd95bd5..9f6c1db33 100644 --- a/ansible_collections/dellemc/openmanage/docs/modules/ome_server_interface_profile_info.rst +++ b/ansible_collections/dellemc/openmanage/docs/modules/ome_server_interface_profile_info.rst @@ -20,7 +20,7 @@ Requirements ------------ The below requirements are needed on the host that executes this module. -- python >= 3.8.6 +- python \>= 3.9.6 @@ -30,37 +30,53 @@ Parameters device_id (optional, list, None) The ID of the device. - *device_id* is mutually exclusive with *device_service_tag*. + \ :emphasis:`device\_id`\ is mutually exclusive with \ :emphasis:`device\_service\_tag`\ . device_service_tag (optional, list, None) The service tag of the device. - *device_service_tag* is mutually exclusive with *device_id*. + \ :emphasis:`device\_service\_tag`\ is mutually exclusive with \ :emphasis:`device\_id`\ . hostname (True, str, None) OpenManage Enterprise Modular IP address or hostname. - username (True, str, None) + username (False, str, None) OpenManage Enterprise Modular username. + If the username is not provided, then the environment variable \ :envvar:`OME\_USERNAME`\ is used. - password (True, str, None) + Example: export OME\_USERNAME=username + + + password (False, str, None) OpenManage Enterprise Modular password. + If the password is not provided, then the environment variable \ :envvar:`OME\_PASSWORD`\ is used. + + Example: export OME\_PASSWORD=password + + + x_auth_token (False, str, None) + Authentication token. + + If the x\_auth\_token is not provided, then the environment variable \ :envvar:`OME\_X\_AUTH\_TOKEN`\ is used. + + Example: export OME\_X\_AUTH\_TOKEN=x\_auth\_token + port (optional, int, 443) OpenManage Enterprise Modular HTTPS port. validate_certs (optional, bool, True) - If ``false``, the SSL certificates will not be validated. + If \ :literal:`false`\ , the SSL certificates will not be validated. - Configure ``false`` only on personally controlled sites where self-signed certificates are used. + Configure \ :literal:`false`\ only on personally controlled sites where self-signed certificates are used. - Prior to collection version ``5.0.0``, the *validate_certs* is ``false`` by default. + Prior to collection version \ :literal:`5.0.0`\ , the \ :emphasis:`validate\_certs`\ is \ :literal:`false`\ by default. ca_path (optional, path, None) @@ -79,7 +95,7 @@ Notes .. note:: - Run this module from a system that has direct access to OpenManage Enterprise Modular. - - This module supports ``check_mode``. + - This module supports \ :literal:`check\_mode`\ . diff --git a/ansible_collections/dellemc/openmanage/docs/modules/ome_server_interface_profiles.rst b/ansible_collections/dellemc/openmanage/docs/modules/ome_server_interface_profiles.rst index f70a50125..ff0031683 100644 --- a/ansible_collections/dellemc/openmanage/docs/modules/ome_server_interface_profiles.rst +++ b/ansible_collections/dellemc/openmanage/docs/modules/ome_server_interface_profiles.rst @@ -20,7 +20,7 @@ Requirements ------------ The below requirements are needed on the host that executes this module. -- python >= 3.8.6 +- python \>= 3.9.6 @@ -30,23 +30,23 @@ Parameters device_id (optional, list, None) Device id of the Server under chassis fabric. - *device_id* and *device_service_tag* is mutually exclusive. + \ :emphasis:`device\_id`\ and \ :emphasis:`device\_service\_tag`\ is mutually exclusive. device_service_tag (optional, list, None) Service tag of the Server under chassis fabric. - *device_service_tag* and *device_id* is mutually exclusive. + \ :emphasis:`device\_service\_tag`\ and \ :emphasis:`device\_id`\ is mutually exclusive. nic_teaming (optional, str, None) NIC teaming options. - ``NoTeaming`` the NICs are not bonded and provide no load balancing or redundancy. + \ :literal:`NoTeaming`\ the NICs are not bonded and provide no load balancing or redundancy. - ``LACP`` use LACP for NIC teaming. + \ :literal:`LACP`\ use LACP for NIC teaming. - ``Other`` use other technology for NIC teaming. + \ :literal:`Other`\ use other technology for NIC teaming. nic_configuration (optional, list, None) @@ -56,23 +56,23 @@ Parameters nic_identifier (True, str, None) ID of the NIC or port number. - ``Note`` This will not be validated. + \ :literal:`Note`\ This will not be validated. team (optional, bool, None) Group two or more ports. The ports must be connected to the same pair of Ethernet switches. - *team* is applicable only if *nic_teaming* is ``LACP``. + \ :emphasis:`team`\ is applicable only if \ :emphasis:`nic\_teaming`\ is \ :literal:`LACP`\ . untagged_network (optional, int, None) The maximum or minimum VLAN id of the network to be untagged. - The *untagged_network* can be retrieved using the :ref:`dellemc.openmanage.ome_network_vlan_info <dellemc.openmanage.ome_network_vlan_info_module>` + The \ :emphasis:`untagged\_network`\ can be retrieved using the \ :ref:`dellemc.openmanage.ome\_network\_vlan\_info <ansible_collections.dellemc.openmanage.ome_network_vlan_info_module>`\ - If *untagged_network* needs to be unset this needs to be sent as ``0`` + If \ :emphasis:`untagged\_network`\ needs to be unset this needs to be sent as \ :literal:`0`\ - ``Note`` The network cannot be added as a untagged network if it is already assigned to a tagged network. + \ :literal:`Note`\ The network cannot be added as a untagged network if it is already assigned to a tagged network. tagged_networks (optional, dict, None) @@ -84,15 +84,15 @@ Parameters state (optional, str, present) Indicates if a list of networks needs to be added or deleted. - ``present`` to add the network to the tagged list + \ :literal:`present`\ to add the network to the tagged list - ``absent`` to delete the Network from the tagged list + \ :literal:`absent`\ to delete the Network from the tagged list names (True, list, None) List of network name to be marked as tagged networks - The *names* can be retrieved using the :ref:`dellemc.openmanage.ome_network_vlan_info <dellemc.openmanage.ome_network_vlan_info_module>` + The \ :emphasis:`names`\ can be retrieved using the \ :ref:`dellemc.openmanage.ome\_network\_vlan\_info <ansible_collections.dellemc.openmanage.ome_network_vlan_info_module>`\ @@ -102,33 +102,49 @@ Parameters job_wait_timeout (optional, int, 120) - The maximum wait time of *job_wait* in seconds. The job is tracked only for this duration. + The maximum wait time of \ :emphasis:`job\_wait`\ in seconds. The job is tracked only for this duration. - This option is applicable when *job_wait* is ``true``. + This option is applicable when \ :emphasis:`job\_wait`\ is \ :literal:`true`\ . hostname (True, str, None) OpenManage Enterprise Modular IP address or hostname. - username (True, str, None) + username (False, str, None) OpenManage Enterprise Modular username. + If the username is not provided, then the environment variable \ :envvar:`OME\_USERNAME`\ is used. - password (True, str, None) + Example: export OME\_USERNAME=username + + + password (False, str, None) OpenManage Enterprise Modular password. + If the password is not provided, then the environment variable \ :envvar:`OME\_PASSWORD`\ is used. + + Example: export OME\_PASSWORD=password + + + x_auth_token (False, str, None) + Authentication token. + + If the x\_auth\_token is not provided, then the environment variable \ :envvar:`OME\_X\_AUTH\_TOKEN`\ is used. + + Example: export OME\_X\_AUTH\_TOKEN=x\_auth\_token + port (optional, int, 443) OpenManage Enterprise Modular HTTPS port. validate_certs (optional, bool, True) - If ``false``, the SSL certificates will not be validated. + If \ :literal:`false`\ , the SSL certificates will not be validated. - Configure ``false`` only on personally controlled sites where self-signed certificates are used. + Configure \ :literal:`false`\ only on personally controlled sites where self-signed certificates are used. - Prior to collection version ``5.0.0``, the *validate_certs* is ``false`` by default. + Prior to collection version \ :literal:`5.0.0`\ , the \ :emphasis:`validate\_certs`\ is \ :literal:`false`\ by default. ca_path (optional, path, None) @@ -146,7 +162,7 @@ Notes ----- .. note:: - - This module supports ``check_mode``. + - This module supports \ :literal:`check\_mode`\ . - Run this module from a system that has direct access to Dell OpenManage Enterprise Modular. diff --git a/ansible_collections/dellemc/openmanage/docs/modules/ome_session.rst b/ansible_collections/dellemc/openmanage/docs/modules/ome_session.rst new file mode 100644 index 000000000..d18023729 --- /dev/null +++ b/ansible_collections/dellemc/openmanage/docs/modules/ome_session.rst @@ -0,0 +1,190 @@ +.. _ome_session_module: + + +ome_session -- Manage OpenManage Enterprise and OpenManage Enterprise modular sessions +====================================================================================== + +.. contents:: + :local: + :depth: 1 + + +Synopsis +-------- + +This module allows you to create and delete sessions on OpenManage Enterprise and OpenManage Enterprise Modular. + + + +Requirements +------------ +The below requirements are needed on the host that executes this module. + +- python \>= 3.9.6 + + + +Parameters +---------- + + hostname (optional, str, None) + IP address or hostname of the OpenManage Enterprise. + + + username (optional, str, None) + Username of the OpenManage Enterprise. If the username is not provided, then the environment variable \ :envvar:`OME\_USERNAME`\ is used. + + \ :emphasis:`username`\ is required when \ :emphasis:`state`\ is \ :literal:`present`\ . + + + password (optional, str, None) + Password of the OpenManage Enterprise. If the password is not provided, then the environment variable \ :envvar:`OME\_PASSWORD`\ is used. + + \ :emphasis:`password`\ is required when \ :emphasis:`state`\ is \ :literal:`present`\ . + + + port (optional, int, 443) + Port of the OpenManage Enterprise. + + + validate_certs (optional, bool, True) + If \ :literal:`false`\ , the SSL certificates will not be validated. + + Configure \ :literal:`false`\ only on personally controlled sites where self-signed certificates are used. + + + ca_path (optional, path, None) + The Privacy Enhanced Mail (PEM) file that contains a CA certificate to be used for the validation. + + + timeout (optional, int, 30) + The HTTPS socket level timeout in seconds. + + + state (optional, str, present) + The state of the session in OpenManage Enterprise. + + \ :literal:`present`\ creates a session. + + \ :literal:`absent`\ deletes a session. + + Module will always report changes found to be applied when \ :emphasis:`state`\ is \ :literal:`present`\ . + + + x_auth_token (optional, str, None) + Authentication token. + + \ :emphasis:`x\_auth\_token`\ is required when \ :emphasis:`state`\ is \ :literal:`absent`\ . + + + session_id (optional, str, None) + Session ID of the OpenManage Enterprise. + + \ :emphasis:`session\_id`\ is required when \ :emphasis:`state`\ is \ :literal:`absent`\ . + + + + + +Notes +----- + +.. note:: + - Run this module from a system that has direct access to Dell OpenManage Enterprise. + - This module supports IPv4 and IPv6 addresses. + - This module supports \ :literal:`check\_mode`\ . + - This module will always report changes found to be applied when \ :emphasis:`state`\ is \ :literal:`present`\ . + + + + +Examples +-------- + +.. code-block:: yaml+jinja + + + --- + - name: Create a session + dellemc.openmanage.ome_session: + hostname: 198.162.0.1 + username: username + password: password + ca_path: "/path/to/ca_cert.pem" + state: present + + - name: Delete a session + dellemc.openmanage.ome_session: + hostname: 198.162.0.1 + ca_path: "/path/to/ca_cert.pem" + state: absent + x_auth_token: aed4aa802b748d2f3b31deec00a6b28a + session_id: 4b48e9ab-809e-4087-b7c4-201a16e0143d + + - name: Create a session and execute other modules + block: + - name: Create a session + dellemc.openmanage.ome_session: + hostname: 198.162.0.1 + username: username + password: password + ca_path: "/path/to/ca_cert.pem" + state: present + register: authData + + - name: Call ome_user_info module + dellemc.openmanage.ome_user_info: + hostname: 198.162.0.1 + ca_path: "/path/to/ca_cert.pem" + x_auth_token: "{{ authData.x_auth_token }}" + + - name: Call ome_network_vlan_info module + dellemc.openmanage.ome_network_vlan_info: + hostname: 198.162.0.1 + ca_path: "/path/to/ca_cert.pem" + x_auth_token: "{{ authData.x_auth_token }}" + always: + - name: Destroy a session + dellemc.openmanage.ome_session: + hostname: 198.162.0.1 + ca_path: "/path/to/ca_cert.pem" + state: absent + x_auth_token: "{{ authData.x_auth_token }}" + session_id: "{{ authData.session_data.Id }}" + + + +Return Values +------------- + +msg (always, str, The session has been created successfully.) + Status of the session operation. + + +session_data (For session creation operation, dict, {'Id': 'd5c28d8e-1084-4055-9c01-e1051cfee2dd', 'Description': 'admin', 'Name': 'API', 'UserName': 'admin', 'UserId': 10078, 'Password': None, 'Roles': ['BACKUP_ADMINISTRATOR'], 'IpAddress': '100.198.162.0', 'StartTimeStamp': '2023-07-03 07:22:43.683', 'LastAccessedTimeStamp': '2023-07-03 07:22:43.683', 'DirectoryGroup': []}) + The session details. + + +x_auth_token (For session creation operation, str, d15f17f01cd627c30173b1582642497d) + Authentication token. + + +error_info (On HTTP error, dict, {'error': {'@Message.ExtendedInfo': [{'Message': 'Unable to complete the operation because an invalid username and/or password is entered, and therefore authentication failed.', 'MessageArgs': [], 'MessageArgs@odata.count': 0, 'MessageId': 'IDRAC.2.7.SYS415', 'RelatedProperties': [], 'RelatedProperties@odata.count': 0, 'Resolution': 'Enter valid user name and password and retry the operation.', 'Severity': 'Warning'}], 'code': 'Base.1.12.GeneralError', 'message': 'A general error has occurred. See ExtendedInfo for more information'}}) + Details of the HTTP Error. + + + + + +Status +------ + + + + + +Authors +~~~~~~~ + +- Kritika Bhateja (@Kritika-Bhateja-03) + diff --git a/ansible_collections/dellemc/openmanage/docs/modules/ome_smart_fabric.rst b/ansible_collections/dellemc/openmanage/docs/modules/ome_smart_fabric.rst index 69e22ab98..412ead3d3 100644 --- a/ansible_collections/dellemc/openmanage/docs/modules/ome_smart_fabric.rst +++ b/ansible_collections/dellemc/openmanage/docs/modules/ome_smart_fabric.rst @@ -20,7 +20,7 @@ Requirements ------------ The below requirements are needed on the host that executes this module. -- python >= 3.8.6 +- python \>= 3.9.6 @@ -28,19 +28,19 @@ Parameters ---------- state (optional, str, present) - ``present`` creates a new fabric or modifies an existing fabric. + \ :literal:`present`\ creates a new fabric or modifies an existing fabric. - ``absent`` deletes an existing fabric. + \ :literal:`absent`\ deletes an existing fabric. Notes: The create, modify, or delete fabric operation takes around 15-20 minutes to complete. It is recommended not to start an another operation until the current operation is completed. name (True, str, None) - Provide the *name* of the fabric to be created, deleted or modified. + Provide the \ :emphasis:`name`\ of the fabric to be created, deleted or modified. new_name (optional, str, None) - Provide the *name* of the fabric to be modified. + Provide the \ :emphasis:`name`\ of the fabric to be modified. description (optional, str, None) @@ -48,25 +48,25 @@ Parameters fabric_design (optional, str, None) - Specify the fabric topology.See the use API https://www.dell.com/support/manuals/en-in/poweredge-mx7000/omem_1_20_10_ug/smartfabric-network-topologies to know why its topology. + Specify the fabric topology.See the use API \ https://www.dell.com/support/manuals/en-in/poweredge-mx7000/omem_1_20_10_ug/smartfabric-network-topologies\ to know why its topology. - *fabric_design* is mandatory for fabric creation. + \ :emphasis:`fabric\_design`\ is mandatory for fabric creation. primary_switch_service_tag (optional, str, None) Service tag of the first switch. - *primary_switch_service_tag* is mandatory for fabric creation. + \ :emphasis:`primary\_switch\_service\_tag`\ is mandatory for fabric creation. - *primary_switch_service_tag* must belong to the model selected in *fabric_design*. + \ :emphasis:`primary\_switch\_service\_tag`\ must belong to the model selected in \ :emphasis:`fabric\_design`\ . secondary_switch_service_tag (optional, str, None) Service tag of the second switch. - *secondary_switch_service_tag* is mandatory for fabric creation. + \ :emphasis:`secondary\_switch\_service\_tag`\ is mandatory for fabric creation. - *secondary_switch_service_tag* must belong to the model selected in *fabric_design*. + \ :emphasis:`secondary\_switch\_service\_tag`\ must belong to the model selected in \ :emphasis:`fabric\_design`\ . override_LLDP_configuration (optional, str, None) @@ -79,24 +79,40 @@ Parameters OpenManage Enterprise Modular IP address or hostname. - username (True, str, None) + username (False, str, None) OpenManage Enterprise Modular username. + If the username is not provided, then the environment variable \ :envvar:`OME\_USERNAME`\ is used. - password (True, str, None) + Example: export OME\_USERNAME=username + + + password (False, str, None) OpenManage Enterprise Modular password. + If the password is not provided, then the environment variable \ :envvar:`OME\_PASSWORD`\ is used. + + Example: export OME\_PASSWORD=password + + + x_auth_token (False, str, None) + Authentication token. + + If the x\_auth\_token is not provided, then the environment variable \ :envvar:`OME\_X\_AUTH\_TOKEN`\ is used. + + Example: export OME\_X\_AUTH\_TOKEN=x\_auth\_token + port (optional, int, 443) OpenManage Enterprise Modular HTTPS port. validate_certs (optional, bool, True) - If ``false``, the SSL certificates will not be validated. + If \ :literal:`false`\ , the SSL certificates will not be validated. - Configure ``false`` only on personally controlled sites where self-signed certificates are used. + Configure \ :literal:`false`\ only on personally controlled sites where self-signed certificates are used. - Prior to collection version ``5.0.0``, the *validate_certs* is ``false`` by default. + Prior to collection version \ :literal:`5.0.0`\ , the \ :emphasis:`validate\_certs`\ is \ :literal:`false`\ by default. ca_path (optional, path, None) @@ -115,7 +131,7 @@ Notes .. note:: - Run this module from a system that has direct access to Dell OpenManage Enterprise Modular. - - This module supports ``check_mode``. + - This module supports \ :literal:`check\_mode`\ . diff --git a/ansible_collections/dellemc/openmanage/docs/modules/ome_smart_fabric_info.rst b/ansible_collections/dellemc/openmanage/docs/modules/ome_smart_fabric_info.rst index ccad0973a..bde6942b0 100644 --- a/ansible_collections/dellemc/openmanage/docs/modules/ome_smart_fabric_info.rst +++ b/ansible_collections/dellemc/openmanage/docs/modules/ome_smart_fabric_info.rst @@ -20,7 +20,7 @@ Requirements ------------ The below requirements are needed on the host that executes this module. -- python >= 3.9.6 +- python \>= 3.9.6 @@ -30,37 +30,53 @@ Parameters fabric_id (optional, str, None) Unique Id of the fabric. - *fabric_id* is mutually exclusive with *fabric_name*. + \ :emphasis:`fabric\_id`\ is mutually exclusive with \ :emphasis:`fabric\_name`\ . fabric_name (optional, str, None) Name of the fabric. - *fabric_name* is mutually exclusive with *fabric_id*. + \ :emphasis:`fabric\_name`\ is mutually exclusive with \ :emphasis:`fabric\_id`\ . hostname (True, str, None) OpenManage Enterprise Modular IP address or hostname. - username (True, str, None) + username (False, str, None) OpenManage Enterprise Modular username. + If the username is not provided, then the environment variable \ :envvar:`OME\_USERNAME`\ is used. - password (True, str, None) + Example: export OME\_USERNAME=username + + + password (False, str, None) OpenManage Enterprise Modular password. + If the password is not provided, then the environment variable \ :envvar:`OME\_PASSWORD`\ is used. + + Example: export OME\_PASSWORD=password + + + x_auth_token (False, str, None) + Authentication token. + + If the x\_auth\_token is not provided, then the environment variable \ :envvar:`OME\_X\_AUTH\_TOKEN`\ is used. + + Example: export OME\_X\_AUTH\_TOKEN=x\_auth\_token + port (optional, int, 443) OpenManage Enterprise Modular HTTPS port. validate_certs (optional, bool, True) - If ``false``, the SSL certificates will not be validated. + If \ :literal:`false`\ , the SSL certificates will not be validated. - Configure ``false`` only on personally controlled sites where self-signed certificates are used. + Configure \ :literal:`false`\ only on personally controlled sites where self-signed certificates are used. - Prior to collection version ``5.0.0``, the *validate_certs* is ``false`` by default. + Prior to collection version \ :literal:`5.0.0`\ , the \ :emphasis:`validate\_certs`\ is \ :literal:`false`\ by default. ca_path (optional, path, None) @@ -79,7 +95,7 @@ Notes .. note:: - Run this module from a system that has direct access to Dell OpenManage Enterprise Modular. - - This module supports ``check_mode``. + - This module supports \ :literal:`check\_mode`\ . diff --git a/ansible_collections/dellemc/openmanage/docs/modules/ome_smart_fabric_uplink.rst b/ansible_collections/dellemc/openmanage/docs/modules/ome_smart_fabric_uplink.rst index fa691dd07..4815ea356 100644 --- a/ansible_collections/dellemc/openmanage/docs/modules/ome_smart_fabric_uplink.rst +++ b/ansible_collections/dellemc/openmanage/docs/modules/ome_smart_fabric_uplink.rst @@ -20,7 +20,7 @@ Requirements ------------ The below requirements are needed on the host that executes this module. -- python >= 3.8.6 +- python \>= 3.9.6 @@ -28,23 +28,23 @@ Parameters ---------- state (optional, str, present) - ``present`` - Creates a new uplink with the provided *name*. - Modifies an existing uplink with the provided *name*. + \ :literal:`present`\ - Creates a new uplink with the provided \ :emphasis:`name`\ . - Modifies an existing uplink with the provided \ :emphasis:`name`\ . - ``absent`` – Deletes the uplink with the provided *name*. + \ :literal:`absent`\ – Deletes the uplink with the provided \ :emphasis:`name`\ . - *WARNING* Delete operation can impact the network infrastructure. + \ :emphasis:`WARNING`\ Delete operation can impact the network infrastructure. fabric_name (True, str, None) - Provide the *fabric_name* of the fabric for which the uplink is to be configured. + Provide the \ :emphasis:`fabric\_name`\ of the fabric for which the uplink is to be configured. name (True, str, None) - Provide the *name* of the uplink to be created, modified or deleted. + Provide the \ :emphasis:`name`\ of the uplink to be created, modified or deleted. new_name (optional, str, None) - Provide the new *new_name* for the uplink. + Provide the new \ :emphasis:`new\_name`\ for the uplink. description (optional, str, None) @@ -54,13 +54,13 @@ Parameters uplink_type (optional, str, None) Specify the uplink type. - *NOTE* The uplink type cannot be changed for an existing uplink. + \ :emphasis:`NOTE`\ The uplink type cannot be changed for an existing uplink. ufd_enable (optional, str, None) Add or Remove the uplink to the Uplink Failure Detection (UFD) group. The UFD group identifies the loss of connectivity to the upstream switch and notifies the servers that are connected to the switch. During an uplink failure, the switch disables the corresponding downstream server ports. The downstream servers can then select alternate connectivity routes, if available. - *WARNING* The firmware version of the I/O Module running the Fabric Manager must support this configuration feature. If not, uplink creation will be successful with an appropriate error message in response. + \ :emphasis:`WARNING`\ The firmware version of the I/O Module running the Fabric Manager must support this configuration feature. If not, uplink creation will be successful with an appropriate error message in response. primary_switch_service_tag (optional, str, None) @@ -70,7 +70,7 @@ Parameters primary_switch_ports (optional, list, None) The IOM slots to be connected to the primary switch. - *primary_switch_service_tag* is mandatory for this option. + \ :emphasis:`primary\_switch\_service\_tag`\ is mandatory for this option. secondary_switch_service_tag (optional, str, None) @@ -80,11 +80,11 @@ Parameters secondary_switch_ports (optional, list, None) The IOM slots to be connected to the secondary switch. - *secondary_switch_service_tag* is mandatory for this option. + \ :emphasis:`secondary\_switch\_service\_tag`\ is mandatory for this option. tagged_networks (optional, list, None) - VLANs to be associated with the uplink *name*. + VLANs to be associated with the uplink \ :emphasis:`name`\ . untagged_network (optional, str, None) @@ -95,24 +95,40 @@ Parameters OpenManage Enterprise Modular IP address or hostname. - username (True, str, None) + username (False, str, None) OpenManage Enterprise Modular username. + If the username is not provided, then the environment variable \ :envvar:`OME\_USERNAME`\ is used. - password (True, str, None) + Example: export OME\_USERNAME=username + + + password (False, str, None) OpenManage Enterprise Modular password. + If the password is not provided, then the environment variable \ :envvar:`OME\_PASSWORD`\ is used. + + Example: export OME\_PASSWORD=password + + + x_auth_token (False, str, None) + Authentication token. + + If the x\_auth\_token is not provided, then the environment variable \ :envvar:`OME\_X\_AUTH\_TOKEN`\ is used. + + Example: export OME\_X\_AUTH\_TOKEN=x\_auth\_token + port (optional, int, 443) OpenManage Enterprise Modular HTTPS port. validate_certs (optional, bool, True) - If ``false``, the SSL certificates will not be validated. + If \ :literal:`false`\ , the SSL certificates will not be validated. - Configure ``false`` only on personally controlled sites where self-signed certificates are used. + Configure \ :literal:`false`\ only on personally controlled sites where self-signed certificates are used. - Prior to collection version ``5.0.0``, the *validate_certs* is ``false`` by default. + Prior to collection version \ :literal:`5.0.0`\ , the \ :emphasis:`validate\_certs`\ is \ :literal:`false`\ by default. ca_path (optional, path, None) @@ -131,7 +147,7 @@ Notes .. note:: - Run this module from a system that has direct access to Dell OpenManage Enterprise Modular. - - This module supports ``check_mode``. + - This module supports \ :literal:`check\_mode`\ . diff --git a/ansible_collections/dellemc/openmanage/docs/modules/ome_smart_fabric_uplink_info.rst b/ansible_collections/dellemc/openmanage/docs/modules/ome_smart_fabric_uplink_info.rst index 96a111bcb..a38f88c17 100644 --- a/ansible_collections/dellemc/openmanage/docs/modules/ome_smart_fabric_uplink_info.rst +++ b/ansible_collections/dellemc/openmanage/docs/modules/ome_smart_fabric_uplink_info.rst @@ -20,7 +20,7 @@ Requirements ------------ The below requirements are needed on the host that executes this module. -- python >= 3.9.6 +- python \>= 3.9.6 @@ -30,53 +30,69 @@ Parameters fabric_id (optional, str, None) Unique id of the fabric. - *fabric_id* is mutually exclusive with *fabric_name*. + \ :emphasis:`fabric\_id`\ is mutually exclusive with \ :emphasis:`fabric\_name`\ . fabric_name (optional, str, None) Unique name of the fabric. - *fabric_name* is mutually exclusive with *fabric_id*. + \ :emphasis:`fabric\_name`\ is mutually exclusive with \ :emphasis:`fabric\_id`\ . uplink_id (optional, str, None) Unique id of the uplink. - *uplink_id* is mutually exclusive with *uplink_name*. + \ :emphasis:`uplink\_id`\ is mutually exclusive with \ :emphasis:`uplink\_name`\ . - *fabric_id* or *fabric_name* is required along with *uplink_id*. + \ :emphasis:`fabric\_id`\ or \ :emphasis:`fabric\_name`\ is required along with \ :emphasis:`uplink\_id`\ . uplink_name (optional, str, None) Unique name of the uplink. - *uplink_name* is mutually exclusive with *uplink_id*. + \ :emphasis:`uplink\_name`\ is mutually exclusive with \ :emphasis:`uplink\_id`\ . - *fabric_id* or *fabric_name* is required along with *uplink_name*. + \ :emphasis:`fabric\_id`\ or \ :emphasis:`fabric\_name`\ is required along with \ :emphasis:`uplink\_name`\ . hostname (True, str, None) OpenManage Enterprise Modular IP address or hostname. - username (True, str, None) + username (False, str, None) OpenManage Enterprise Modular username. + If the username is not provided, then the environment variable \ :envvar:`OME\_USERNAME`\ is used. - password (True, str, None) + Example: export OME\_USERNAME=username + + + password (False, str, None) OpenManage Enterprise Modular password. + If the password is not provided, then the environment variable \ :envvar:`OME\_PASSWORD`\ is used. + + Example: export OME\_PASSWORD=password + + + x_auth_token (False, str, None) + Authentication token. + + If the x\_auth\_token is not provided, then the environment variable \ :envvar:`OME\_X\_AUTH\_TOKEN`\ is used. + + Example: export OME\_X\_AUTH\_TOKEN=x\_auth\_token + port (optional, int, 443) OpenManage Enterprise Modular HTTPS port. validate_certs (optional, bool, True) - If ``false``, the SSL certificates will not be validated. + If \ :literal:`false`\ , the SSL certificates will not be validated. - Configure ``false`` only on personally controlled sites where self-signed certificates are used. + Configure \ :literal:`false`\ only on personally controlled sites where self-signed certificates are used. - Prior to collection version ``5.0.0``, the *validate_certs* is ``false`` by default. + Prior to collection version \ :literal:`5.0.0`\ , the \ :emphasis:`validate\_certs`\ is \ :literal:`false`\ by default. ca_path (optional, path, None) @@ -95,7 +111,7 @@ Notes .. note:: - Run this module from a system that has direct access to Dell OpenManage Enterprise Modular. - - This module supports ``check_mode``. + - This module supports \ :literal:`check\_mode`\ . diff --git a/ansible_collections/dellemc/openmanage/docs/modules/ome_template.rst b/ansible_collections/dellemc/openmanage/docs/modules/ome_template.rst index 409d2f7e8..a03fa7a0b 100644 --- a/ansible_collections/dellemc/openmanage/docs/modules/ome_template.rst +++ b/ansible_collections/dellemc/openmanage/docs/modules/ome_template.rst @@ -20,7 +20,7 @@ Requirements ------------ The below requirements are needed on the host that executes this module. -- python >= 3.8.6 +- python \>= 3.9.6 @@ -28,83 +28,83 @@ Parameters ---------- command (optional, str, create) - ``create`` creates a new template. + \ :literal:`create`\ creates a new template. - ``modify`` modifies an existing template. + \ :literal:`modify`\ modifies an existing template. - ``deploy`` creates a template-deployment job. + \ :literal:`deploy`\ creates a template-deployment job. - ``delete`` deletes an existing template. + \ :literal:`delete`\ deletes an existing template. - ``export`` exports an existing template. + \ :literal:`export`\ exports an existing template. - ``import`` creates a template from a specified configuration text in SCP XML format. + \ :literal:`import`\ creates a template from a specified configuration text in SCP XML format. - ``clone`` creates a clone of a existing template. + \ :literal:`clone`\ creates a clone of a existing template. template_id (optional, int, None) ID of the existing template. - This option is applicable when *command* is ``modify``, ``deploy``, ``delete``, ``clone`` and ``export``. + This option is applicable when \ :emphasis:`command`\ is \ :literal:`modify`\ , \ :literal:`deploy`\ , \ :literal:`delete`\ , \ :literal:`clone`\ and \ :literal:`export`\ . - This option is mutually exclusive with *template_name*. + This option is mutually exclusive with \ :emphasis:`template\_name`\ . template_name (optional, str, None) Name of the existing template. - This option is applicable when *command* is ``modify``, ``deploy``, ``delete``, ``clone`` and ``export``. + This option is applicable when \ :emphasis:`command`\ is \ :literal:`modify`\ , \ :literal:`deploy`\ , \ :literal:`delete`\ , \ :literal:`clone`\ and \ :literal:`export`\ . - This option is mutually exclusive with *template_id*. + This option is mutually exclusive with \ :emphasis:`template\_id`\ . device_id (optional, list, []) - Specify the list of targeted device ID(s) when *command* is ``deploy``. When I (command) is ``create``, specify the ID of a single device. + Specify the list of targeted device ID(s) when \ :emphasis:`command`\ is \ :literal:`deploy`\ . When I (command) is \ :literal:`create`\ , specify the ID of a single device. - Either *device_id* or *device_service_tag* is mandatory or both can be applicable. + Either \ :emphasis:`device\_id`\ or \ :emphasis:`device\_service\_tag`\ is mandatory or both can be applicable. device_service_tag (optional, list, []) - Specify the list of targeted device service tags when I (command) is ``deploy``. When *command* is ``create``, specify the service tag of a single device. + Specify the list of targeted device service tags when I (command) is \ :literal:`deploy`\ . When \ :emphasis:`command`\ is \ :literal:`create`\ , specify the service tag of a single device. - Either *device_id* or *device_service_tag* is mandatory or both can be applicable. + Either \ :emphasis:`device\_id`\ or \ :emphasis:`device\_service\_tag`\ is mandatory or both can be applicable. device_group_names (optional, list, []) - Specify the list of groups when I (command) is ``deploy``. + Specify the list of groups when I (command) is \ :literal:`deploy`\ . - Provide at least one of the mandatory options *device_id*, *device_service_tag*, or *device_group_names*. + Provide at least one of the mandatory options \ :emphasis:`device\_id`\ , \ :emphasis:`device\_service\_tag`\ , or \ :emphasis:`device\_group\_names`\ . template_view_type (optional, str, Deployment) Select the type of view of the OME template. - This is applicable when *command* is ``create``,``clone`` and ``import``. + This is applicable when \ :emphasis:`command`\ is \ :literal:`create`\ ,\ :literal:`clone`\ and \ :literal:`import`\ . attributes (optional, dict, None) - Payload data for the template operations. All the variables in this option are added as payload for ``create``, ``modify``, ``deploy``, ``import``, and ``clone`` operations. It takes the following attributes. + Payload data for the template operations. All the variables in this option are added as payload for \ :literal:`create`\ , \ :literal:`modify`\ , \ :literal:`deploy`\ , \ :literal:`import`\ , and \ :literal:`clone`\ operations. It takes the following attributes. - Attributes: List of dictionaries of attributes (if any) to be modified in the deployment template. This is applicable when *command* is ``deploy`` and ``modify``. Use the *Id* If the attribute Id is available. If not, use the comma separated I (DisplayName). For more details about using the *DisplayName*, see the example provided. + Attributes: List of dictionaries of attributes (if any) to be modified in the deployment template. This is applicable when \ :emphasis:`command`\ is \ :literal:`deploy`\ and \ :literal:`modify`\ . Use the \ :emphasis:`Id`\ If the attribute Id is available. If not, use the comma separated I (DisplayName). For more details about using the \ :emphasis:`DisplayName`\ , see the example provided. - Name: Name of the template. This is mandatory when *command* is ``create``, ``import``, ``clone``, and optional when *command* is ``modify``. + Name: Name of the template. This is mandatory when \ :emphasis:`command`\ is \ :literal:`create`\ , \ :literal:`import`\ , \ :literal:`clone`\ , and optional when \ :emphasis:`command`\ is \ :literal:`modify`\ . - Description: Description for the template. This is applicable when *command* is ``create`` or ``modify``. + Description: Description for the template. This is applicable when \ :emphasis:`command`\ is \ :literal:`create`\ or \ :literal:`modify`\ . - Fqdds: This allows to create a template using components from a specified reference server. One or more, of the following values must be specified in a comma-separated string: iDRAC, System, BIOS, NIC, LifeCycleController, RAID, and EventFilters. If none of the values are specified, the default value 'All' is selected. This is applicable when I (command) is ``create``. + Fqdds: This allows to create a template using components from a specified reference server. One or more, of the following values must be specified in a comma-separated string: iDRAC, System, BIOS, NIC, LifeCycleController, RAID, and EventFilters. If none of the values are specified, the default value 'All' is selected. This is applicable when I (command) is \ :literal:`create`\ . - Options: Options to control device shutdown or end power state post template deployment. This is applicable for ``deploy`` operation. + Options: Options to control device shutdown or end power state post template deployment. This is applicable for \ :literal:`deploy`\ operation. - Schedule: Provides options to schedule the deployment task immediately, or at a specified time. This is applicable when *command* is ``deploy``. + Schedule: Provides options to schedule the deployment task immediately, or at a specified time. This is applicable when \ :emphasis:`command`\ is \ :literal:`deploy`\ . - NetworkBootIsoModel: Payload to specify the ISO deployment details. This is applicable when *command* is ``deploy``. + NetworkBootIsoModel: Payload to specify the ISO deployment details. This is applicable when \ :emphasis:`command`\ is \ :literal:`deploy`\ . - Content: The XML content of template. This is applicable when *command* is ``import``. + Content: The XML content of template. This is applicable when \ :emphasis:`command`\ is \ :literal:`import`\ . - Type: Template type ID, indicating the type of device for which configuration is supported, such as chassis and servers. This is applicable when *command* is ``import``. + Type: Template type ID, indicating the type of device for which configuration is supported, such as chassis and servers. This is applicable when \ :emphasis:`command`\ is \ :literal:`import`\ . - TypeId: Template type ID, indicating the type of device for which configuration is supported, such as chassis and servers. This is applicable when *command* is ``create``. + TypeId: Template type ID, indicating the type of device for which configuration is supported, such as chassis and servers. This is applicable when \ :emphasis:`command`\ is \ :literal:`create`\ . Refer OpenManage Enterprise API Reference Guide for more details. @@ -112,37 +112,53 @@ Parameters job_wait (optional, bool, True) Provides the option to wait for job completion. - This option is applicable when *command* is ``create``, or ``deploy``. + This option is applicable when \ :emphasis:`command`\ is \ :literal:`create`\ , or \ :literal:`deploy`\ . job_wait_timeout (optional, int, 1200) - The maximum wait time of *job_wait* in seconds. The job is tracked only for this duration. + The maximum wait time of \ :emphasis:`job\_wait`\ in seconds. The job is tracked only for this duration. - This option is applicable when *job_wait* is ``true``. + This option is applicable when \ :emphasis:`job\_wait`\ is \ :literal:`true`\ . hostname (True, str, None) OpenManage Enterprise or OpenManage Enterprise Modular IP address or hostname. - username (True, str, None) + username (False, str, None) OpenManage Enterprise or OpenManage Enterprise Modular username. + If the username is not provided, then the environment variable \ :envvar:`OME\_USERNAME`\ is used. - password (True, str, None) + Example: export OME\_USERNAME=username + + + password (False, str, None) OpenManage Enterprise or OpenManage Enterprise Modular password. + If the password is not provided, then the environment variable \ :envvar:`OME\_PASSWORD`\ is used. + + Example: export OME\_PASSWORD=password + + + x_auth_token (False, str, None) + Authentication token. + + If the x\_auth\_token is not provided, then the environment variable \ :envvar:`OME\_X\_AUTH\_TOKEN`\ is used. + + Example: export OME\_X\_AUTH\_TOKEN=x\_auth\_token + port (optional, int, 443) OpenManage Enterprise or OpenManage Enterprise Modular HTTPS port. validate_certs (optional, bool, True) - If ``false``, the SSL certificates will not be validated. + If \ :literal:`false`\ , the SSL certificates will not be validated. - Configure ``false`` only on personally controlled sites where self-signed certificates are used. + Configure \ :literal:`false`\ only on personally controlled sites where self-signed certificates are used. - Prior to collection version ``5.0.0``, the *validate_certs* is ``false`` by default. + Prior to collection version \ :literal:`5.0.0`\ , the \ :emphasis:`validate\_certs`\ is \ :literal:`false`\ by default. ca_path (optional, path, None) @@ -161,7 +177,7 @@ Notes .. note:: - Run this module from a system that has direct access to Dell OpenManage Enterprise. - - This module supports ``check_mode``. + - This module supports \ :literal:`check\_mode`\ . @@ -523,11 +539,11 @@ msg (always, str, Successfully created a template with ID 23) return_id (success, when I(command) is C(create), C(modify), C(import), C(clone) and C(deploy), int, 12) - ID of the template for ``create``, ``modify``, ``import`` and ``clone`` or task created in case of ``deploy``. + ID of the template for \ :literal:`create`\ , \ :literal:`modify`\ , \ :literal:`import`\ and \ :literal:`clone`\ or task created in case of \ :literal:`deploy`\ . TemplateId (success, when I(command) is C(export), int, 13) - ID of the template for ``export``. + ID of the template for \ :literal:`export`\ . Content (success, when I(command) is C(export), str, <SystemConfiguration Model="PowerEdge R940" ServiceTag="DEFG123" TimeStamp="Tue Sep 24 09:20:57.872551 2019"> diff --git a/ansible_collections/dellemc/openmanage/docs/modules/ome_template_identity_pool.rst b/ansible_collections/dellemc/openmanage/docs/modules/ome_template_identity_pool.rst index 64a63b477..ce31bea37 100644 --- a/ansible_collections/dellemc/openmanage/docs/modules/ome_template_identity_pool.rst +++ b/ansible_collections/dellemc/openmanage/docs/modules/ome_template_identity_pool.rst @@ -20,7 +20,7 @@ Requirements ------------ The below requirements are needed on the host that executes this module. -- python >= 3.8.6 +- python \>= 3.9.6 @@ -39,24 +39,40 @@ Parameters OpenManage Enterprise or OpenManage Enterprise Modular IP address or hostname. - username (True, str, None) + username (False, str, None) OpenManage Enterprise or OpenManage Enterprise Modular username. + If the username is not provided, then the environment variable \ :envvar:`OME\_USERNAME`\ is used. - password (True, str, None) + Example: export OME\_USERNAME=username + + + password (False, str, None) OpenManage Enterprise or OpenManage Enterprise Modular password. + If the password is not provided, then the environment variable \ :envvar:`OME\_PASSWORD`\ is used. + + Example: export OME\_PASSWORD=password + + + x_auth_token (False, str, None) + Authentication token. + + If the x\_auth\_token is not provided, then the environment variable \ :envvar:`OME\_X\_AUTH\_TOKEN`\ is used. + + Example: export OME\_X\_AUTH\_TOKEN=x\_auth\_token + port (optional, int, 443) OpenManage Enterprise or OpenManage Enterprise Modular HTTPS port. validate_certs (optional, bool, True) - If ``false``, the SSL certificates will not be validated. + If \ :literal:`false`\ , the SSL certificates will not be validated. - Configure ``false`` only on personally controlled sites where self-signed certificates are used. + Configure \ :literal:`false`\ only on personally controlled sites where self-signed certificates are used. - Prior to collection version ``5.0.0``, the *validate_certs* is ``false`` by default. + Prior to collection version \ :literal:`5.0.0`\ , the \ :emphasis:`validate\_certs`\ is \ :literal:`false`\ by default. ca_path (optional, path, None) @@ -75,7 +91,7 @@ Notes .. note:: - Run this module from a system that has direct access to Dell OpenManage Enterprise. - - This module supports ``check_mode``. + - This module supports \ :literal:`check\_mode`\ . diff --git a/ansible_collections/dellemc/openmanage/docs/modules/ome_template_info.rst b/ansible_collections/dellemc/openmanage/docs/modules/ome_template_info.rst index d1da26467..e0aebd802 100644 --- a/ansible_collections/dellemc/openmanage/docs/modules/ome_template_info.rst +++ b/ansible_collections/dellemc/openmanage/docs/modules/ome_template_info.rst @@ -20,7 +20,7 @@ Requirements ------------ The below requirements are needed on the host that executes this module. -- python >= 3.8.6 +- python \>= 3.9.6 @@ -44,24 +44,40 @@ Parameters OpenManage Enterprise or OpenManage Enterprise Modular IP address or hostname. - username (True, str, None) + username (False, str, None) OpenManage Enterprise or OpenManage Enterprise Modular username. + If the username is not provided, then the environment variable \ :envvar:`OME\_USERNAME`\ is used. - password (True, str, None) + Example: export OME\_USERNAME=username + + + password (False, str, None) OpenManage Enterprise or OpenManage Enterprise Modular password. + If the password is not provided, then the environment variable \ :envvar:`OME\_PASSWORD`\ is used. + + Example: export OME\_PASSWORD=password + + + x_auth_token (False, str, None) + Authentication token. + + If the x\_auth\_token is not provided, then the environment variable \ :envvar:`OME\_X\_AUTH\_TOKEN`\ is used. + + Example: export OME\_X\_AUTH\_TOKEN=x\_auth\_token + port (optional, int, 443) OpenManage Enterprise or OpenManage Enterprise Modular HTTPS port. validate_certs (optional, bool, True) - If ``false``, the SSL certificates will not be validated. + If \ :literal:`false`\ , the SSL certificates will not be validated. - Configure ``false`` only on personally controlled sites where self-signed certificates are used. + Configure \ :literal:`false`\ only on personally controlled sites where self-signed certificates are used. - Prior to collection version ``5.0.0``, the *validate_certs* is ``false`` by default. + Prior to collection version \ :literal:`5.0.0`\ , the \ :emphasis:`validate\_certs`\ is \ :literal:`false`\ by default. ca_path (optional, path, None) @@ -80,7 +96,7 @@ Notes .. note:: - Run this module from a system that has direct access to Dell OpenManage Enterprise. - - This module supports ``check_mode``. + - This module supports \ :literal:`check\_mode`\ . diff --git a/ansible_collections/dellemc/openmanage/docs/modules/ome_template_network_vlan.rst b/ansible_collections/dellemc/openmanage/docs/modules/ome_template_network_vlan.rst index 89d908556..2277c137a 100644 --- a/ansible_collections/dellemc/openmanage/docs/modules/ome_template_network_vlan.rst +++ b/ansible_collections/dellemc/openmanage/docs/modules/ome_template_network_vlan.rst @@ -20,7 +20,7 @@ Requirements ------------ The below requirements are needed on the host that executes this module. -- python >= 3.8.6 +- python \>= 3.9.6 @@ -30,13 +30,13 @@ Parameters template_name (optional, str, None) Name of the template. - It is mutually exclusive with *template_id*. + It is mutually exclusive with \ :emphasis:`template\_id`\ . template_id (optional, int, None) Id of the template. - It is mutually exclusive with *template_name*. + It is mutually exclusive with \ :emphasis:`template\_name`\ . nic_identifier (True, str, None) @@ -62,17 +62,17 @@ Parameters Enter 0 to clear the untagged VLAN from the port. - This option is mutually exclusive with *untagged_network_name* + This option is mutually exclusive with \ :emphasis:`untagged\_network\_name`\ - To get the VLAN network ID use the API https://*hostname*/api/NetworkConfigurationService/Networks + To get the VLAN network ID use the API \ %20https://I(hostname\ /api/NetworkConfigurationService/Networks) untagged_network_name (optional, str, None) name of the vlan for untagging - provide 0 for clearing the untagging for this *port* + provide 0 for clearing the untagging for this \ :emphasis:`port`\ - This parameter is mutually exclusive with *untagged_network_id* + This parameter is mutually exclusive with \ :emphasis:`untagged\_network\_id`\ @@ -89,9 +89,9 @@ Parameters Enter [] to remove the tagged VLAN from a port. - List of *tagged_network_ids* is combined with list of *tagged_network_names* when adding tagged VLANs to a port. + List of \ :emphasis:`tagged\_network\_ids`\ is combined with list of \ :emphasis:`tagged\_network\_names`\ when adding tagged VLANs to a port. - To get the VLAN network ID use the API https://*hostname*/api/NetworkConfigurationService/Networks + To get the VLAN network ID use the API \ %20https://I(hostname\ /api/NetworkConfigurationService/Networks) tagged_network_names (optional, list, None) @@ -99,7 +99,7 @@ Parameters Enter [] to remove the tagged VLAN from a port. - List of *tagged_network_names* is combined with list of *tagged_network_ids* when adding tagged VLANs to a port. + List of \ :emphasis:`tagged\_network\_names`\ is combined with list of \ :emphasis:`tagged\_network\_ids`\ when adding tagged VLANs to a port. @@ -107,24 +107,40 @@ Parameters OpenManage Enterprise or OpenManage Enterprise Modular IP address or hostname. - username (True, str, None) + username (False, str, None) OpenManage Enterprise or OpenManage Enterprise Modular username. + If the username is not provided, then the environment variable \ :envvar:`OME\_USERNAME`\ is used. - password (True, str, None) + Example: export OME\_USERNAME=username + + + password (False, str, None) OpenManage Enterprise or OpenManage Enterprise Modular password. + If the password is not provided, then the environment variable \ :envvar:`OME\_PASSWORD`\ is used. + + Example: export OME\_PASSWORD=password + + + x_auth_token (False, str, None) + Authentication token. + + If the x\_auth\_token is not provided, then the environment variable \ :envvar:`OME\_X\_AUTH\_TOKEN`\ is used. + + Example: export OME\_X\_AUTH\_TOKEN=x\_auth\_token + port (optional, int, 443) OpenManage Enterprise or OpenManage Enterprise Modular HTTPS port. validate_certs (optional, bool, True) - If ``false``, the SSL certificates will not be validated. + If \ :literal:`false`\ , the SSL certificates will not be validated. - Configure ``false`` only on personally controlled sites where self-signed certificates are used. + Configure \ :literal:`false`\ only on personally controlled sites where self-signed certificates are used. - Prior to collection version ``5.0.0``, the *validate_certs* is ``false`` by default. + Prior to collection version \ :literal:`5.0.0`\ , the \ :emphasis:`validate\_certs`\ is \ :literal:`false`\ by default. ca_path (optional, path, None) @@ -143,7 +159,7 @@ Notes .. note:: - Run this module from a system that has direct access to Dell OpenManage Enterprise. - - This module supports ``check_mode``. + - This module supports \ :literal:`check\_mode`\ . diff --git a/ansible_collections/dellemc/openmanage/docs/modules/ome_template_network_vlan_info.rst b/ansible_collections/dellemc/openmanage/docs/modules/ome_template_network_vlan_info.rst index 6d5c9fad8..25c309dda 100644 --- a/ansible_collections/dellemc/openmanage/docs/modules/ome_template_network_vlan_info.rst +++ b/ansible_collections/dellemc/openmanage/docs/modules/ome_template_network_vlan_info.rst @@ -20,7 +20,7 @@ Requirements ------------ The below requirements are needed on the host that executes this module. -- python >= 3.9.6 +- python \>= 3.9.6 @@ -30,39 +30,55 @@ Parameters template_id (optional, int, None) Id of the template. - This is mutually exclusive with *template_name*. + This is mutually exclusive with \ :emphasis:`template\_name`\ . template_name (optional, str, None) Name of the template. - This is mutually exclusive with *template_id*. + This is mutually exclusive with \ :emphasis:`template\_id`\ . - ``Note`` If *template_id* or *template_name* option is not provided, the module retrieves network VLAN info of all templates. + \ :literal:`Note`\ If \ :emphasis:`template\_id`\ or \ :emphasis:`template\_name`\ option is not provided, the module retrieves network VLAN info of all templates. hostname (True, str, None) OpenManage Enterprise or OpenManage Enterprise Modular IP address or hostname. - username (True, str, None) + username (False, str, None) OpenManage Enterprise or OpenManage Enterprise Modular username. + If the username is not provided, then the environment variable \ :envvar:`OME\_USERNAME`\ is used. - password (True, str, None) + Example: export OME\_USERNAME=username + + + password (False, str, None) OpenManage Enterprise or OpenManage Enterprise Modular password. + If the password is not provided, then the environment variable \ :envvar:`OME\_PASSWORD`\ is used. + + Example: export OME\_PASSWORD=password + + + x_auth_token (False, str, None) + Authentication token. + + If the x\_auth\_token is not provided, then the environment variable \ :envvar:`OME\_X\_AUTH\_TOKEN`\ is used. + + Example: export OME\_X\_AUTH\_TOKEN=x\_auth\_token + port (optional, int, 443) OpenManage Enterprise or OpenManage Enterprise Modular HTTPS port. validate_certs (optional, bool, True) - If ``false``, the SSL certificates will not be validated. + If \ :literal:`false`\ , the SSL certificates will not be validated. - Configure ``false`` only on personally controlled sites where self-signed certificates are used. + Configure \ :literal:`false`\ only on personally controlled sites where self-signed certificates are used. - Prior to collection version ``5.0.0``, the *validate_certs* is ``false`` by default. + Prior to collection version \ :literal:`5.0.0`\ , the \ :emphasis:`validate\_certs`\ is \ :literal:`false`\ by default. ca_path (optional, path, None) @@ -81,7 +97,7 @@ Notes .. note:: - Run this module on a system that has direct access to Dell OpenManage Enterprise. - - This module supports ``check_mode``. + - This module supports \ :literal:`check\_mode`\ . diff --git a/ansible_collections/dellemc/openmanage/docs/modules/ome_user.rst b/ansible_collections/dellemc/openmanage/docs/modules/ome_user.rst index 908640f5e..d58653d1c 100644 --- a/ansible_collections/dellemc/openmanage/docs/modules/ome_user.rst +++ b/ansible_collections/dellemc/openmanage/docs/modules/ome_user.rst @@ -20,7 +20,7 @@ Requirements ------------ The below requirements are needed on the host that executes this module. -- python >= 3.8.6 +- python \>= 3.9.6 @@ -28,27 +28,27 @@ Parameters ---------- state (optional, str, present) - ``present`` creates a user in case the *UserName* provided inside *attributes* does not exist. + \ :literal:`present`\ creates a user in case the \ :emphasis:`UserName`\ provided inside \ :emphasis:`attributes`\ does not exist. - ``present`` modifies a user in case the *UserName* provided inside *attributes* exists. + \ :literal:`present`\ modifies a user in case the \ :emphasis:`UserName`\ provided inside \ :emphasis:`attributes`\ exists. - ``absent`` deletes an existing user. + \ :literal:`absent`\ deletes an existing user. user_id (optional, int, None) Unique ID of the user to be deleted. - Either *user_id* or *name* is mandatory for ``absent`` operation. + Either \ :emphasis:`user\_id`\ or \ :emphasis:`name`\ is mandatory for \ :literal:`absent`\ operation. name (optional, str, None) Unique Name of the user to be deleted. - Either *user_id* or *name* is mandatory for ``absent`` operation. + Either \ :emphasis:`user\_id`\ or \ :emphasis:`name`\ is mandatory for \ :literal:`absent`\ operation. attributes (optional, dict, {}) - Payload data for the user operations. It can take the following attributes for ``present``. + Payload data for the user operations. It can take the following attributes for \ :literal:`present`\ . UserTypeId, DirectoryServiceId, Description, Name, Password, UserName, RoleId, Locked, Enabled. @@ -61,24 +61,40 @@ Parameters OpenManage Enterprise or OpenManage Enterprise Modular IP address or hostname. - username (True, str, None) + username (False, str, None) OpenManage Enterprise or OpenManage Enterprise Modular username. + If the username is not provided, then the environment variable \ :envvar:`OME\_USERNAME`\ is used. - password (True, str, None) + Example: export OME\_USERNAME=username + + + password (False, str, None) OpenManage Enterprise or OpenManage Enterprise Modular password. + If the password is not provided, then the environment variable \ :envvar:`OME\_PASSWORD`\ is used. + + Example: export OME\_PASSWORD=password + + + x_auth_token (False, str, None) + Authentication token. + + If the x\_auth\_token is not provided, then the environment variable \ :envvar:`OME\_X\_AUTH\_TOKEN`\ is used. + + Example: export OME\_X\_AUTH\_TOKEN=x\_auth\_token + port (optional, int, 443) OpenManage Enterprise or OpenManage Enterprise Modular HTTPS port. validate_certs (optional, bool, True) - If ``false``, the SSL certificates will not be validated. + If \ :literal:`false`\ , the SSL certificates will not be validated. - Configure ``false`` only on personally controlled sites where self-signed certificates are used. + Configure \ :literal:`false`\ only on personally controlled sites where self-signed certificates are used. - Prior to collection version ``5.0.0``, the *validate_certs* is ``false`` by default. + Prior to collection version \ :literal:`5.0.0`\ , the \ :emphasis:`validate\_certs`\ is \ :literal:`false`\ by default. ca_path (optional, path, None) @@ -97,7 +113,7 @@ Notes .. note:: - Run this module from a system that has direct access to Dell OpenManage Enterprise. - - This module does not support ``check_mode``. + - This module does not support \ :literal:`check\_mode`\ . @@ -179,7 +195,7 @@ msg (always, str, Successfully created a User) user_status (When I(state) is C(present)., dict, {'Description': 'Test user creation', 'DirectoryServiceId': 0, 'Enabled': True, 'Id': '61546', 'IsBuiltin': False, 'Locked': False, 'Name': 'test', 'Password': None, 'PlainTextPassword': None, 'RoleId': '10', 'UserName': 'test', 'UserTypeId': 1}) - Details of the user operation, when *state* is ``present``. + Details of the user operation, when \ :emphasis:`state`\ is \ :literal:`present`\ . diff --git a/ansible_collections/dellemc/openmanage/docs/modules/ome_user_info.rst b/ansible_collections/dellemc/openmanage/docs/modules/ome_user_info.rst index ba0043f28..c8f409231 100644 --- a/ansible_collections/dellemc/openmanage/docs/modules/ome_user_info.rst +++ b/ansible_collections/dellemc/openmanage/docs/modules/ome_user_info.rst @@ -20,7 +20,7 @@ Requirements ------------ The below requirements are needed on the host that executes this module. -- python >= 3.8.6 +- python \>= 3.9.6 @@ -44,24 +44,40 @@ Parameters OpenManage Enterprise or OpenManage Enterprise Modular IP address or hostname. - username (True, str, None) + username (False, str, None) OpenManage Enterprise or OpenManage Enterprise Modular username. + If the username is not provided, then the environment variable \ :envvar:`OME\_USERNAME`\ is used. - password (True, str, None) + Example: export OME\_USERNAME=username + + + password (False, str, None) OpenManage Enterprise or OpenManage Enterprise Modular password. + If the password is not provided, then the environment variable \ :envvar:`OME\_PASSWORD`\ is used. + + Example: export OME\_PASSWORD=password + + + x_auth_token (False, str, None) + Authentication token. + + If the x\_auth\_token is not provided, then the environment variable \ :envvar:`OME\_X\_AUTH\_TOKEN`\ is used. + + Example: export OME\_X\_AUTH\_TOKEN=x\_auth\_token + port (optional, int, 443) OpenManage Enterprise or OpenManage Enterprise Modular HTTPS port. validate_certs (optional, bool, True) - If ``false``, the SSL certificates will not be validated. + If \ :literal:`false`\ , the SSL certificates will not be validated. - Configure ``false`` only on personally controlled sites where self-signed certificates are used. + Configure \ :literal:`false`\ only on personally controlled sites where self-signed certificates are used. - Prior to collection version ``5.0.0``, the *validate_certs* is ``false`` by default. + Prior to collection version \ :literal:`5.0.0`\ , the \ :emphasis:`validate\_certs`\ is \ :literal:`false`\ by default. ca_path (optional, path, None) @@ -80,7 +96,7 @@ Notes .. note:: - Run this module from a system that has direct access to Dell OpenManage Enterprise. - - This module supports ``check_mode``. + - This module supports \ :literal:`check\_mode`\ . @@ -142,5 +158,5 @@ Status Authors ~~~~~~~ -- Jagadeesh N V(@jagadeeshnv) +- Jagadeesh N V (@jagadeeshnv) diff --git a/ansible_collections/dellemc/openmanage/docs/modules/redfish_event_subscription.rst b/ansible_collections/dellemc/openmanage/docs/modules/redfish_event_subscription.rst index 0ea5da0d6..d828b35da 100644 --- a/ansible_collections/dellemc/openmanage/docs/modules/redfish_event_subscription.rst +++ b/ansible_collections/dellemc/openmanage/docs/modules/redfish_event_subscription.rst @@ -20,7 +20,7 @@ Requirements ------------ The below requirements are needed on the host that executes this module. -- python >= 3.8.6 +- python \>= 3.9.6 @@ -36,43 +36,59 @@ Parameters event_type (optional, str, Alert) Specifies the event type to be subscribed. - ``Alert`` used to subscribe for alert. + \ :literal:`Alert`\ used to subscribe for alert. - ``MetricReport`` used to subscribe for the metrics report. + \ :literal:`MetricReport`\ used to subscribe for the metrics report. event_format_type (optional, str, Event) Specifies the format type of the event to be subscribed. - ``Event`` used to subscribe for Event format type. + \ :literal:`Event`\ used to subscribe for Event format type. - ``MetricReport`` used to subscribe for the metrics report format type. + \ :literal:`MetricReport`\ used to subscribe for the metrics report format type. state (optional, str, present) - ``present`` adds new event subscription. + \ :literal:`present`\ adds new event subscription. - ``absent`` deletes event subscription with the specified *destination*. + \ :literal:`absent`\ deletes event subscription with the specified \ :emphasis:`destination`\ . baseuri (True, str, None) - IP address of the target out-of-band controller. For example- <ipaddress>:<port>. + IP address of the target out-of-band controller. For example- \<ipaddress\>:\<port\>. - username (True, str, None) + username (False, str, None) Username of the target out-of-band controller. + If the username is not provided, then the environment variable \ :envvar:`IDRAC\_USERNAME`\ is used. - password (True, str, None) + Example: export IDRAC\_USERNAME=username + + + password (False, str, None) Password of the target out-of-band controller. + If the password is not provided, then the environment variable \ :envvar:`IDRAC\_PASSWORD`\ is used. + + Example: export IDRAC\_PASSWORD=password + + + x_auth_token (False, str, None) + Authentication token. + + If the x\_auth\_token is not provided, then the environment variable \ :envvar:`IDRAC\_X\_AUTH\_TOKEN`\ is used. + + Example: export IDRAC\_X\_AUTH\_TOKEN=x\_auth\_token + validate_certs (optional, bool, True) - If ``false``, the SSL certificates will not be validated. + If \ :literal:`false`\ , the SSL certificates will not be validated. - Configure ``false`` only on personally controlled sites where self-signed certificates are used. + Configure \ :literal:`false`\ only on personally controlled sites where self-signed certificates are used. - Prior to collection version ``5.0.0``, the *validate_certs* is ``false`` by default. + Prior to collection version \ :literal:`5.0.0`\ , the \ :emphasis:`validate\_certs`\ is \ :literal:`false`\ by default. ca_path (optional, path, None) @@ -90,11 +106,11 @@ Notes ----- .. note:: - - *event_type* needs to be ``MetricReport`` and *event_format_type* needs to be ``MetricReport`` for metrics subscription. - - *event_type* needs to be ``Alert`` and *event_format_type* needs to be ``Event`` for event subscription. + - \ :emphasis:`event\_type`\ needs to be \ :literal:`MetricReport`\ and \ :emphasis:`event\_format\_type`\ needs to be \ :literal:`MetricReport`\ for metrics subscription. + - \ :emphasis:`event\_type`\ needs to be \ :literal:`Alert`\ and \ :emphasis:`event\_format\_type`\ needs to be \ :literal:`Event`\ for event subscription. - Modifying a subscription is not supported. - Context is always set to RedfishEvent. - - This module supports ``check_mode``. + - This module supports \ :literal:`check\_mode`\ . diff --git a/ansible_collections/dellemc/openmanage/docs/modules/redfish_firmware.rst b/ansible_collections/dellemc/openmanage/docs/modules/redfish_firmware.rst index 3a3471c1f..ad66141c4 100644 --- a/ansible_collections/dellemc/openmanage/docs/modules/redfish_firmware.rst +++ b/ansible_collections/dellemc/openmanage/docs/modules/redfish_firmware.rst @@ -22,7 +22,7 @@ Requirements ------------ The below requirements are needed on the host that executes this module. -- python >= 3.8.6 +- python \>= 3.9.6 - urllib3 @@ -33,7 +33,7 @@ Parameters image_uri (True, str, None) Firmware Image location URI or local path. - For example- http://<web_address>/components.exe or /home/firmware_repo/component.exe. + For example- \ http://%3Cweb_address%3E/components.exe\ or /home/firmware\_repo/component.exe. transfer_protocol (optional, str, HTTP) @@ -45,31 +45,47 @@ Parameters job_wait_timeout (optional, int, 3600) - The maximum wait time of *job_wait* in seconds. The job is tracked only for this duration. + The maximum wait time of \ :emphasis:`job\_wait`\ in seconds. The job is tracked only for this duration. - This option is applicable when *job_wait* is ``true``. + This option is applicable when \ :emphasis:`job\_wait`\ is \ :literal:`true`\ . - Note: If a firmware update needs a reboot, the job will get scheduled and waits for no of seconds specfied in *job_wait_time*. to reduce the wait time either give *job_wait_time* minimum or make *job_wait*as false and retrigger. + Note: If a firmware update needs a reboot, the job will get scheduled and waits for no of seconds specfied in \ :emphasis:`job\_wait\_time`\ . to reduce the wait time either give \ :emphasis:`job\_wait\_time`\ minimum or make \ :emphasis:`job\_wait`\ as false and retrigger. baseuri (True, str, None) - IP address of the target out-of-band controller. For example- <ipaddress>:<port>. + IP address of the target out-of-band controller. For example- \<ipaddress\>:\<port\>. - username (True, str, None) + username (False, str, None) Username of the target out-of-band controller. + If the username is not provided, then the environment variable \ :envvar:`IDRAC\_USERNAME`\ is used. - password (True, str, None) + Example: export IDRAC\_USERNAME=username + + + password (False, str, None) Password of the target out-of-band controller. + If the password is not provided, then the environment variable \ :envvar:`IDRAC\_PASSWORD`\ is used. + + Example: export IDRAC\_PASSWORD=password + + + x_auth_token (False, str, None) + Authentication token. + + If the x\_auth\_token is not provided, then the environment variable \ :envvar:`IDRAC\_X\_AUTH\_TOKEN`\ is used. + + Example: export IDRAC\_X\_AUTH\_TOKEN=x\_auth\_token + validate_certs (optional, bool, True) - If ``false``, the SSL certificates will not be validated. + If \ :literal:`false`\ , the SSL certificates will not be validated. - Configure ``false`` only on personally controlled sites where self-signed certificates are used. + Configure \ :literal:`false`\ only on personally controlled sites where self-signed certificates are used. - Prior to collection version ``5.0.0``, the *validate_certs* is ``false`` by default. + Prior to collection version \ :literal:`5.0.0`\ , the \ :emphasis:`validate\_certs`\ is \ :literal:`false`\ by default. ca_path (optional, path, None) @@ -90,7 +106,7 @@ Notes - Run this module from a system that has direct access to Redfish APIs. - This module supports both IPv4 and IPv6 addresses. - This module supports only iDRAC9 and above. - - This module does not support ``check_mode``. + - This module does not support \ :literal:`check\_mode`\ . diff --git a/ansible_collections/dellemc/openmanage/docs/modules/redfish_firmware_rollback.rst b/ansible_collections/dellemc/openmanage/docs/modules/redfish_firmware_rollback.rst index 466239e40..8fa80d7bd 100644 --- a/ansible_collections/dellemc/openmanage/docs/modules/redfish_firmware_rollback.rst +++ b/ansible_collections/dellemc/openmanage/docs/modules/redfish_firmware_rollback.rst @@ -22,7 +22,7 @@ Requirements ------------ The below requirements are needed on the host that executes this module. -- python >= 3.9.6 +- python \>= 3.9.6 @@ -36,11 +36,11 @@ Parameters reboot (optional, bool, True) Reboot the server to apply the previous version of the firmware. - ``true`` reboots the server to rollback the firmware to the available version. + \ :literal:`true`\ reboots the server to rollback the firmware to the available version. - ``false`` schedules the rollback of firmware until the next restart. + \ :literal:`false`\ schedules the rollback of firmware until the next restart. - When *reboot* is ``false``, some components update immediately, and the server may reboot. So, the module must wait till the server is accessible. + When \ :emphasis:`reboot`\ is \ :literal:`false`\ , some components update immediately, and the server may reboot. So, the module must wait till the server is accessible. reboot_timeout (optional, int, 900) @@ -48,23 +48,39 @@ Parameters baseuri (True, str, None) - IP address of the target out-of-band controller. For example- <ipaddress>:<port>. + IP address of the target out-of-band controller. For example- \<ipaddress\>:\<port\>. - username (True, str, None) + username (False, str, None) Username of the target out-of-band controller. + If the username is not provided, then the environment variable \ :envvar:`IDRAC\_USERNAME`\ is used. - password (True, str, None) + Example: export IDRAC\_USERNAME=username + + + password (False, str, None) Password of the target out-of-band controller. + If the password is not provided, then the environment variable \ :envvar:`IDRAC\_PASSWORD`\ is used. + + Example: export IDRAC\_PASSWORD=password + + + x_auth_token (False, str, None) + Authentication token. + + If the x\_auth\_token is not provided, then the environment variable \ :envvar:`IDRAC\_X\_AUTH\_TOKEN`\ is used. + + Example: export IDRAC\_X\_AUTH\_TOKEN=x\_auth\_token + validate_certs (optional, bool, True) - If ``false``, the SSL certificates will not be validated. + If \ :literal:`false`\ , the SSL certificates will not be validated. - Configure ``false`` only on personally controlled sites where self-signed certificates are used. + Configure \ :literal:`false`\ only on personally controlled sites where self-signed certificates are used. - Prior to collection version ``5.0.0``, the *validate_certs* is ``false`` by default. + Prior to collection version \ :literal:`5.0.0`\ , the \ :emphasis:`validate\_certs`\ is \ :literal:`false`\ by default. ca_path (optional, path, None) @@ -83,9 +99,9 @@ Notes .. note:: - Run this module from a system that has direct access to Redfish APIs. - - For components that do not require a reboot, firmware rollback proceeds irrespective of *reboot* is ``true`` or ``false``. + - For components that do not require a reboot, firmware rollback proceeds irrespective of \ :emphasis:`reboot`\ is \ :literal:`true`\ or \ :literal:`false`\ . - This module supports IPv4 and IPv6 addresses. - - This module supports ``check_mode``. + - This module supports \ :literal:`check\_mode`\ . diff --git a/ansible_collections/dellemc/openmanage/docs/modules/redfish_powerstate.rst b/ansible_collections/dellemc/openmanage/docs/modules/redfish_powerstate.rst index fa8ac069e..027efa96b 100644 --- a/ansible_collections/dellemc/openmanage/docs/modules/redfish_powerstate.rst +++ b/ansible_collections/dellemc/openmanage/docs/modules/redfish_powerstate.rst @@ -20,7 +20,7 @@ Requirements ------------ The below requirements are needed on the host that executes this module. -- python >= 3.8.6 +- python \>= 3.9.6 @@ -28,55 +28,71 @@ Parameters ---------- resource_id (False, str, None) - The unique identifier of the device being managed. For example- https://<*baseuri*>/redfish/v1/Systems/<*resource_id*>. + The unique identifier of the device being managed. For example- \ https://%3CI(baseuri\ \>/redfish/v1/Systems/\<\ :emphasis:`resource\_id`\ \>). - This option is mandatory for *base_uri* with multiple devices. + This option is mandatory for \ :emphasis:`base\_uri`\ with multiple devices. - To get the device details, use the API https://<*baseuri*>/redfish/v1/Systems. + To get the device details, use the API \ https://%3CI(baseuri\ \>/redfish/v1/Systems). reset_type (True, str, None) This option resets the device. - If ``ForceOff``, Turns off the device immediately. + If \ :literal:`ForceOff`\ , Turns off the device immediately. - If ``ForceOn``, Turns on the device immediately. + If \ :literal:`ForceOn`\ , Turns on the device immediately. - If ``ForceRestart``, Turns off the device immediately, and then restarts the device. + If \ :literal:`ForceRestart`\ , Turns off the device immediately, and then restarts the device. - If ``GracefulRestart``, Performs graceful shutdown of the device, and then restarts the device. + If \ :literal:`GracefulRestart`\ , Performs graceful shutdown of the device, and then restarts the device. - If ``GracefulShutdown``, Performs a graceful shutdown of the device, and the turns off the device. + If \ :literal:`GracefulShutdown`\ , Performs a graceful shutdown of the device, and the turns off the device. - If ``Nmi``, Sends a diagnostic interrupt to the device. This is usually a non-maskable interrupt (NMI) on x86 device. + If \ :literal:`Nmi`\ , Sends a diagnostic interrupt to the device. This is usually a non-maskable interrupt (NMI) on x86 device. - If ``On``, Turns on the device. + If \ :literal:`On`\ , Turns on the device. - If ``PowerCycle``, Performs power cycle on the device. + If \ :literal:`PowerCycle`\ , Performs power cycle on the device. - If ``PushPowerButton``, Simulates the pressing of a physical power button on the device. + If \ :literal:`PushPowerButton`\ , Simulates the pressing of a physical power button on the device. When a power control operation is performed, which is not supported on the device, an error message is displayed with the list of operations that can be performed. baseuri (True, str, None) - IP address of the target out-of-band controller. For example- <ipaddress>:<port>. + IP address of the target out-of-band controller. For example- \<ipaddress\>:\<port\>. - username (True, str, None) + username (False, str, None) Username of the target out-of-band controller. + If the username is not provided, then the environment variable \ :envvar:`IDRAC\_USERNAME`\ is used. - password (True, str, None) + Example: export IDRAC\_USERNAME=username + + + password (False, str, None) Password of the target out-of-band controller. + If the password is not provided, then the environment variable \ :envvar:`IDRAC\_PASSWORD`\ is used. + + Example: export IDRAC\_PASSWORD=password + + + x_auth_token (False, str, None) + Authentication token. + + If the x\_auth\_token is not provided, then the environment variable \ :envvar:`IDRAC\_X\_AUTH\_TOKEN`\ is used. + + Example: export IDRAC\_X\_AUTH\_TOKEN=x\_auth\_token + validate_certs (optional, bool, True) - If ``false``, the SSL certificates will not be validated. + If \ :literal:`false`\ , the SSL certificates will not be validated. - Configure ``false`` only on personally controlled sites where self-signed certificates are used. + Configure \ :literal:`false`\ only on personally controlled sites where self-signed certificates are used. - Prior to collection version ``5.0.0``, the *validate_certs* is ``false`` by default. + Prior to collection version \ :literal:`5.0.0`\ , the \ :emphasis:`validate\_certs`\ is \ :literal:`false`\ by default. ca_path (optional, path, None) @@ -95,7 +111,7 @@ Notes .. note:: - Run this module from a system that has direct access to Redfish APIs. - - This module supports ``check_mode``. + - This module supports \ :literal:`check\_mode`\ . diff --git a/ansible_collections/dellemc/openmanage/docs/modules/redfish_storage_volume.rst b/ansible_collections/dellemc/openmanage/docs/modules/redfish_storage_volume.rst index c349b7d99..ade865af9 100644 --- a/ansible_collections/dellemc/openmanage/docs/modules/redfish_storage_volume.rst +++ b/ansible_collections/dellemc/openmanage/docs/modules/redfish_storage_volume.rst @@ -193,13 +193,29 @@ Parameters IP address of the target out-of-band controller. For example- \<ipaddress\>:\<port\>. - username (True, str, None) + username (False, str, None) Username of the target out-of-band controller. + If the username is not provided, then the environment variable \ :envvar:`IDRAC\_USERNAME`\ is used. - password (True, str, None) + Example: export IDRAC\_USERNAME=username + + + password (False, str, None) Password of the target out-of-band controller. + If the password is not provided, then the environment variable \ :envvar:`IDRAC\_PASSWORD`\ is used. + + Example: export IDRAC\_PASSWORD=password + + + x_auth_token (False, str, None) + Authentication token. + + If the x\_auth\_token is not provided, then the environment variable \ :envvar:`IDRAC\_X\_AUTH\_TOKEN`\ is used. + + Example: export IDRAC\_X\_AUTH\_TOKEN=x\_auth\_token + validate_certs (optional, bool, True) If \ :literal:`false`\ , the SSL certificates will not be validated. diff --git a/ansible_collections/dellemc/openmanage/playbooks/ome/ome_session.yml b/ansible_collections/dellemc/openmanage/playbooks/ome/ome_session.yml new file mode 100644 index 000000000..f734b016d --- /dev/null +++ b/ansible_collections/dellemc/openmanage/playbooks/ome/ome_session.yml @@ -0,0 +1,52 @@ +--- +- name: Dell OpenManage Ansible iDRAC Session Management. + hosts: ome + gather_facts: false + + tasks: + - name: Create a session + dellemc.openmanage.ome_session: + hostname: 198.162.0.1 + username: username + password: password + state: present + delegate_to: localhost + + - name: Delete a session + dellemc.openmanage.ome_session: + hostname: 198.162.0.1 + state: absent + x_auth_token: aed4aa802b748d2f3b31deec00a6b28a + session_id: 4b48e9ab-809e-4087-b7c4-201a16e0143d + delegate_to: localhost + + - name: Create a session and execute other modules + block: + - name: Create a session + dellemc.openmanage.ome_session: + hostname: 198.162.0.1 + username: username + password: password + ca_path: "/path/to/ca_cert.pem" + state: present + register: authdata + + - name: Call ome_user_info module + dellemc.openmanage.ome_user_info: + hostname: 198.162.0.1 + ca_path: "/path/to/ca_cert.pem" + x_auth_token: "{{ authdata.x_auth_token }}" + + - name: Call ome_network_vlan_info module + dellemc.openmanage.ome_network_vlan_info: + hostname: 198.162.0.1 + ca_path: "/path/to/ca_cert.pem" + x_auth_token: "{{ authdata.x_auth_token }}" + always: + - name: Destroy a session + dellemc.openmanage.ome_session: + hostname: 198.162.0.1 + ca_path: "/path/to/ca_cert.pem" + state: absent + x_auth_token: "{{ authData.x_auth_token }}" + session_id: "{{ authData.session_data.Id }}" diff --git a/ansible_collections/dellemc/openmanage/plugins/doc_fragments/idrac_auth_options.py b/ansible_collections/dellemc/openmanage/plugins/doc_fragments/idrac_auth_options.py index cdad6d1b8..49eebcd2e 100644 --- a/ansible_collections/dellemc/openmanage/plugins/doc_fragments/idrac_auth_options.py +++ b/ansible_collections/dellemc/openmanage/plugins/doc_fragments/idrac_auth_options.py @@ -26,14 +26,14 @@ options: type: str description: - iDRAC username. - - If the username is not provided, then the environment variable C(IDRAC_USERNAME) is used. + - If the username is not provided, then the environment variable E(IDRAC_USERNAME) is used. - "Example: export IDRAC_USERNAME=username" idrac_password: required: true type: str description: - iDRAC user password. - - If the password is not provided, then the environment variable C(IDRAC_PASSWORD) is used. + - If the password is not provided, then the environment variable E(IDRAC_PASSWORD) is used. - "Example: export IDRAC_PASSWORD=password" aliases: ['idrac_pwd'] idrac_port: diff --git a/ansible_collections/dellemc/openmanage/plugins/doc_fragments/idrac_x_auth_options.py b/ansible_collections/dellemc/openmanage/plugins/doc_fragments/idrac_x_auth_options.py new file mode 100644 index 000000000..4df58680e --- /dev/null +++ b/ansible_collections/dellemc/openmanage/plugins/doc_fragments/idrac_x_auth_options.py @@ -0,0 +1,69 @@ +# -*- coding: utf-8 -*- + +# +# Dell OpenManage Ansible Modules +# Version 9.3.0 +# Copyright (C) 2024 Dell Inc. or its subsidiaries. All Rights Reserved. + +# GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) +# + + +from __future__ import (absolute_import, division, print_function) +__metaclass__ = type + + +class ModuleDocFragment(object): + + DOCUMENTATION = r''' +options: + idrac_ip: + required: true + type: str + description: iDRAC IP Address. + idrac_user: + required: false + type: str + description: + - iDRAC username. + - If the username is not provided, then the environment variable E(IDRAC_USERNAME) is used. + - "Example: export IDRAC_USERNAME=username" + idrac_password: + required: false + type: str + description: + - iDRAC user password. + - If the password is not provided, then the environment variable E(IDRAC_PASSWORD) is used. + - "Example: export IDRAC_PASSWORD=password" + aliases: ['idrac_pwd'] + x_auth_token: + description: + - Authentication token. + - If the x_auth_token is not provided, then the environment variable E(IDRAC_X_AUTH_TOKEN) is used. + - "Example: export IDRAC_X_AUTH_TOKEN=x_auth_token" + type: str + required: false + version_added: 9.3.0 + idrac_port: + type: int + description: iDRAC port. + default: 443 + validate_certs: + description: + - If C(false), the SSL certificates will not be validated. + - Configure C(false) only on personally controlled sites where self-signed certificates are used. + - Prior to collection version C(5.0.0), the I(validate_certs) is C(false) by default. + type: bool + default: true + version_added: 5.0.0 + ca_path: + description: + - The Privacy Enhanced Mail (PEM) file that contains a CA certificate to be used for the validation. + type: path + version_added: 5.0.0 + timeout: + description: The socket level timeout in seconds. + type: int + default: 30 + version_added: 5.0.0 +''' diff --git a/ansible_collections/dellemc/openmanage/plugins/doc_fragments/ome_auth_options.py b/ansible_collections/dellemc/openmanage/plugins/doc_fragments/ome_auth_options.py index 7627a6621..28e68f7cb 100644 --- a/ansible_collections/dellemc/openmanage/plugins/doc_fragments/ome_auth_options.py +++ b/ansible_collections/dellemc/openmanage/plugins/doc_fragments/ome_auth_options.py @@ -2,8 +2,8 @@ # # Dell OpenManage Ansible Modules -# Version 7.0.0 -# Copyright (C) 2020-2022 Dell Inc. or its subsidiaries. All Rights Reserved. +# Version 9.3.0 +# Copyright (C) 2020-2024 Dell Inc. or its subsidiaries. All Rights Reserved. # GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) # @@ -24,17 +24,25 @@ options: username: description: - OpenManage Enterprise or OpenManage Enterprise Modular username. - - If the username is not provided, then the environment variable C(OME_USERNAME) is used. + - If the username is not provided, then the environment variable E(OME_USERNAME) is used. - "Example: export OME_USERNAME=username" type: str - required: true + required: false password: description: - OpenManage Enterprise or OpenManage Enterprise Modular password. - - If the password is not provided, then the environment variable C(OME_PASSWORD) is used. + - If the password is not provided, then the environment variable E(OME_PASSWORD) is used. - "Example: export OME_PASSWORD=password" type: str - required: true + required: false + x_auth_token: + description: + - Authentication token. + - If the x_auth_token is not provided, then the environment variable E(OME_X_AUTH_TOKEN) is used. + - "Example: export OME_X_AUTH_TOKEN=x_auth_token" + type: str + required: false + version_added: 9.3.0 port: description: OpenManage Enterprise or OpenManage Enterprise Modular HTTPS port. type: int diff --git a/ansible_collections/dellemc/openmanage/plugins/doc_fragments/omem_auth_options.py b/ansible_collections/dellemc/openmanage/plugins/doc_fragments/omem_auth_options.py index e611e02df..8a7b4f8d9 100644 --- a/ansible_collections/dellemc/openmanage/plugins/doc_fragments/omem_auth_options.py +++ b/ansible_collections/dellemc/openmanage/plugins/doc_fragments/omem_auth_options.py @@ -2,8 +2,8 @@ # # Dell OpenManage Ansible Modules -# Version 7.0.0 -# Copyright (C) 2020-2022 Dell Inc. or its subsidiaries. All Rights Reserved. +# Version 9.3.0 +# Copyright (C) 2020-2024 Dell Inc. or its subsidiaries. All Rights Reserved. # GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) # @@ -24,17 +24,25 @@ options: username: description: - OpenManage Enterprise Modular username. - - If the username is not provided, then the environment variable C(OME_USERNAME) is used. + - If the username is not provided, then the environment variable E(OME_USERNAME) is used. - "Example: export OME_USERNAME=username" type: str - required: true + required: false password: description: - OpenManage Enterprise Modular password. - - If the password is not provided, then the environment variable C(OME_PASSWORD) is used. + - If the password is not provided, then the environment variable E(OME_PASSWORD) is used. - "Example: export OME_PASSWORD=password" type: str - required: true + required: false + x_auth_token: + description: + - Authentication token. + - If the x_auth_token is not provided, then the environment variable E(OME_X_AUTH_TOKEN) is used. + - "Example: export OME_X_AUTH_TOKEN=x_auth_token" + type: str + required: false + version_added: 9.3.0 port: description: OpenManage Enterprise Modular HTTPS port. type: int diff --git a/ansible_collections/dellemc/openmanage/plugins/doc_fragments/oment_auth_options.py b/ansible_collections/dellemc/openmanage/plugins/doc_fragments/oment_auth_options.py index 676ded435..9430cb9a6 100644 --- a/ansible_collections/dellemc/openmanage/plugins/doc_fragments/oment_auth_options.py +++ b/ansible_collections/dellemc/openmanage/plugins/doc_fragments/oment_auth_options.py @@ -2,8 +2,8 @@ # # Dell OpenManage Ansible Modules -# Version 7.0.0 -# Copyright (C) 2020-2022 Dell Inc. or its subsidiaries. All Rights Reserved. +# Version 9.3.0 +# Copyright (C) 2020-2024 Dell Inc. or its subsidiaries. All Rights Reserved. # GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) # @@ -24,17 +24,25 @@ options: username: description: - OpenManage Enterprise username. - - If the username is not provided, then the environment variable C(OME_USERNAME) is used. + - If the username is not provided, then the environment variable E(OME_USERNAME) is used. - "Example: export OME_USERNAME=username" type: str - required: true + required: false password: description: - OpenManage Enterprise password. - - If the password is not provided, then the environment variable C(OME_PASSWORD) is used. + - If the password is not provided, then the environment variable E(OME_PASSWORD) is used. - "Example: export OME_PASSWORD=password" type: str - required: true + required: false + x_auth_token: + description: + - Authentication token. + - If the x_auth_token is not provided, then the environment variable E(OME_X_AUTH_TOKEN) is used. + - "Example: export OME_X_AUTH_TOKEN=x_auth_token" + type: str + required: false + version_added: 9.3.0 port: description: OpenManage Enterprise HTTPS port. type: int diff --git a/ansible_collections/dellemc/openmanage/plugins/doc_fragments/redfish_auth_options.py b/ansible_collections/dellemc/openmanage/plugins/doc_fragments/redfish_auth_options.py index 452bc8a2d..7e15aef25 100644 --- a/ansible_collections/dellemc/openmanage/plugins/doc_fragments/redfish_auth_options.py +++ b/ansible_collections/dellemc/openmanage/plugins/doc_fragments/redfish_auth_options.py @@ -2,8 +2,8 @@ # # Dell OpenManage Ansible Modules -# Version 7.0.0 -# Copyright (C) 2020-2022 Dell Inc. or its subsidiaries. All Rights Reserved. +# Version 9.3.0 +# Copyright (C) 2020-2024 Dell Inc. or its subsidiaries. All Rights Reserved. # GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) # @@ -24,17 +24,25 @@ options: username: description: - Username of the target out-of-band controller. - - If the username is not provided, then the environment variable C(IDRAC_USERNAME) is used. + - If the username is not provided, then the environment variable E(IDRAC_USERNAME) is used. - "Example: export IDRAC_USERNAME=username" type: str - required: true + required: false password: description: - Password of the target out-of-band controller. - - If the password is not provided, then the environment variable C(IDRAC_PASSWORD) is used. + - If the password is not provided, then the environment variable E(IDRAC_PASSWORD) is used. - "Example: export IDRAC_PASSWORD=password" type: str - required: true + required: false + x_auth_token: + description: + - Authentication token. + - If the x_auth_token is not provided, then the environment variable E(IDRAC_X_AUTH_TOKEN) is used. + - "Example: export IDRAC_X_AUTH_TOKEN=x_auth_token" + type: str + required: false + version_added: 9.3.0 validate_certs: description: - If C(false), the SSL certificates will not be validated. diff --git a/ansible_collections/dellemc/openmanage/plugins/module_utils/idrac_redfish.py b/ansible_collections/dellemc/openmanage/plugins/module_utils/idrac_redfish.py index cf4581e89..7e55364a1 100644 --- a/ansible_collections/dellemc/openmanage/plugins/module_utils/idrac_redfish.py +++ b/ansible_collections/dellemc/openmanage/plugins/module_utils/idrac_redfish.py @@ -1,8 +1,8 @@ # -*- coding: utf-8 -*- # Dell OpenManage Ansible Modules -# Version 8.0.0 -# Copyright (C) 2019-2023 Dell Inc. or its subsidiaries. All Rights Reserved. +# Version 9.3.0 +# Copyright (C) 2019-2024 Dell Inc. or its subsidiaries. All Rights Reserved. # Redistribution and use in source and binary forms, with or without modification, # are permitted provided that the following conditions are met: @@ -38,6 +38,7 @@ from ansible.module_utils.six.moves.urllib.error import URLError, HTTPError from ansible.module_utils.six.moves.urllib.parse import urlencode from ansible.module_utils.common.parameters import env_fallback from ansible_collections.dellemc.openmanage.plugins.module_utils.utils import config_ipv6 +from ansible.module_utils.basic import AnsibleModule idrac_auth_params = { "idrac_ip": {"required": True, "type": 'str'}, @@ -101,6 +102,7 @@ class iDRACRedfishAPI(object): self.ipaddress = module_params['idrac_ip'] self.username = module_params['idrac_user'] self.password = module_params['idrac_password'] + self.x_auth_token = module_params.get('x_auth_token') self.port = module_params['idrac_port'] self.validate_certs = module_params.get("validate_certs", False) self.ca_path = module_params.get("ca_path") @@ -180,7 +182,7 @@ class iDRACRedfishAPI(object): def __enter__(self): """Creates sessions by passing it to header""" - if self.req_session: + if self.req_session and not self.x_auth_token: payload = {'UserName': self.username, 'Password': self.password} path = SESSION_RESOURCE_COLLECTION["SESSION"] @@ -191,6 +193,8 @@ class iDRACRedfishAPI(object): else: msg = "Could not create the session" raise ConnectionError(msg) + elif self.x_auth_token is not None: + self._headers["X-Auth-Token"] = self.x_auth_token return self def __exit__(self, exc_type, exc_value, traceback): @@ -300,7 +304,7 @@ class iDRACRedfishAPI(object): return response def import_scp_share(self, shutdown_type=None, host_powerstate=None, job_wait=True, - target=None, import_buffer=None, share=None): + target=None, import_buffer=None, share=None, time_to_wait=300): """ This method imports system configuration using share. :param shutdown_type: graceful @@ -312,7 +316,7 @@ class iDRACRedfishAPI(object): :return: json response """ payload = {"ShutdownType": shutdown_type, "EndHostPowerState": host_powerstate, - "ShareParameters": {"Target": target}} + "ShareParameters": {"Target": target}, "TimeToWait": time_to_wait} if import_buffer is not None: payload["ImportBuffer"] = import_buffer if share is None: @@ -384,7 +388,7 @@ class iDRACRedfishAPI(object): response = self.wait_for_job_complete(task_uri, job_wait=job_wait) return response - def import_scp(self, import_buffer=None, target=None, job_wait=False): + def import_scp(self, import_buffer=None, target=None, job_wait=False, time_to_wait=300): """ This method imports system configuration details to the system. :param import_buffer: import buffer payload content xml or json format @@ -392,7 +396,7 @@ class iDRACRedfishAPI(object): :param job_wait: True or False decide whether to wait till the job completion. :return: json response """ - payload = {"ImportBuffer": import_buffer, "ShareParameters": {"Target": target}} + payload = {"ImportBuffer": import_buffer, "ShareParameters": {"Target": target}, "TimeToWait": time_to_wait} response = self.invoke_request(IMPORT_URI, "POST", data=payload) if response.status_code == 202 and job_wait: task_uri = response.headers["Location"] @@ -433,3 +437,42 @@ class iDRACRedfishAPI(object): def _get_omam_ca_env(self): """Check if the value is set in REQUESTS_CA_BUNDLE or CURL_CA_BUNDLE or OMAM_CA_BUNDLE or returns None""" return os.environ.get("REQUESTS_CA_BUNDLE") or os.environ.get("CURL_CA_BUNDLE") or os.environ.get("OMAM_CA_BUNDLE") + + +class IdracAnsibleModule(AnsibleModule): + def __init__(self, argument_spec, bypass_checks=False, no_log=False, + mutually_exclusive=None, required_together=None, + required_one_of=None, add_file_common_args=False, + supports_check_mode=False, required_if=None, required_by=None): + idrac_argument_spec = { + "idrac_ip": {"required": True, "type": 'str'}, + "idrac_user": {"required": False, "type": 'str', "fallback": (env_fallback, ['IDRAC_USERNAME'])}, + "idrac_password": {"required": False, "type": 'str', "aliases": ['idrac_pwd'], "no_log": True, "fallback": (env_fallback, ['IDRAC_PASSWORD'])}, + "x_auth_token": {"required": False, "type": 'str', "no_log": True, "fallback": (env_fallback, ['IDRAC_X_AUTH_TOKEN'])}, + "idrac_port": {"required": False, "default": 443, "type": 'int'}, + "validate_certs": {"type": "bool", "default": True}, + "ca_path": {"type": "path"}, + "timeout": {"type": "int", "default": 30}, + } + argument_spec.update(idrac_argument_spec) + + auth_mutually_exclusive = [("idrac_user", "x_auth_token"), ("idrac_password", "x_auth_token")] + auth_required_one_of = [("idrac_user", "x_auth_token")] + auth_required_together = [("idrac_user", "idrac_password")] + + if mutually_exclusive is None: + mutually_exclusive = [] + mutually_exclusive.extend(auth_mutually_exclusive) + if required_together is None: + required_together = [] + required_together.extend(auth_required_together) + if required_one_of is None: + required_one_of = [] + required_one_of.extend(auth_required_one_of) + if required_by is None: + required_by = {} + + super().__init__(argument_spec, bypass_checks, no_log, + mutually_exclusive, required_together, + required_one_of, add_file_common_args, + supports_check_mode, required_if, required_by) diff --git a/ansible_collections/dellemc/openmanage/plugins/module_utils/ome.py b/ansible_collections/dellemc/openmanage/plugins/module_utils/ome.py index cd0bb6be0..4aeba6201 100644 --- a/ansible_collections/dellemc/openmanage/plugins/module_utils/ome.py +++ b/ansible_collections/dellemc/openmanage/plugins/module_utils/ome.py @@ -1,8 +1,8 @@ # -*- coding: utf-8 -*- # Dell OpenManage Ansible Modules -# Version 8.2.0 -# Copyright (C) 2019-2023 Dell Inc. or its subsidiaries. All Rights Reserved. +# Version 9.3.0 +# Copyright (C) 2019-2024 Dell Inc. or its subsidiaries. All Rights Reserved. # Redistribution and use in source and binary forms, with or without modification, # are permitted provided that the following conditions are met: @@ -38,6 +38,7 @@ from ansible.module_utils.common.parameters import env_fallback from ansible.module_utils.six.moves.urllib.error import URLError, HTTPError from ansible.module_utils.six.moves.urllib.parse import urlencode from ansible_collections.dellemc.openmanage.plugins.module_utils.utils import config_ipv6 +from ansible.module_utils.basic import AnsibleModule ome_auth_params = { "hostname": {"required": True, "type": "str"}, @@ -96,6 +97,7 @@ class RestOME(object): self.hostname = str(self.module_params["hostname"]).strip('][') self.username = self.module_params["username"] self.password = self.module_params["password"] + self.x_auth_token = self.module_params.get("x_auth_token") self.port = self.module_params["port"] self.validate_certs = self.module_params.get("validate_certs", True) self.ca_path = self.module_params.get("ca_path") @@ -191,7 +193,7 @@ class RestOME(object): def __enter__(self): """Creates sessions by passing it to header""" - if self.req_session: + if self.req_session and not self.x_auth_token: payload = {'UserName': self.username, 'Password': self.password, 'SessionType': 'API', } @@ -203,6 +205,8 @@ class RestOME(object): else: msg = "Could not create the session" raise ConnectionError(msg) + elif self.x_auth_token is not None: + self._headers["X-Auth-Token"] = self.x_auth_token return self def __exit__(self, exc_type, exc_value, traceback): @@ -401,3 +405,42 @@ class RestOME(object): def _get_omam_ca_env(self): """Check if the value is set in REQUESTS_CA_BUNDLE or CURL_CA_BUNDLE or OMAM_CA_BUNDLE or returns None""" return os.environ.get("REQUESTS_CA_BUNDLE") or os.environ.get("CURL_CA_BUNDLE") or os.environ.get("OMAM_CA_BUNDLE") + + +class OmeAnsibleModule(AnsibleModule): + def __init__(self, argument_spec, bypass_checks=False, no_log=False, + mutually_exclusive=None, required_together=None, + required_one_of=None, add_file_common_args=False, + supports_check_mode=False, required_if=None, required_by=None): + ome_argument_spec = { + "hostname": {"required": True, "type": "str"}, + "username": {"required": False, "type": "str", "fallback": (env_fallback, ['OME_USERNAME'])}, + "password": {"required": False, "type": "str", "no_log": True, "fallback": (env_fallback, ['OME_PASSWORD'])}, + "x_auth_token": {"required": False, "type": "str", "no_log": True, "fallback": (env_fallback, ['OME_X_AUTH_TOKEN'])}, + "port": {"type": "int", "default": 443}, + "validate_certs": {"type": "bool", "default": True}, + "ca_path": {"type": "path"}, + "timeout": {"type": "int", "default": 30}, + } + argument_spec.update(ome_argument_spec) + + auth_mutually_exclusive = [("username", "x_auth_token"), ("password", "x_auth_token")] + auth_required_one_of = [("username", "x_auth_token")] + auth_required_together = [("username", "password")] + + if mutually_exclusive is None: + mutually_exclusive = [] + mutually_exclusive.extend(auth_mutually_exclusive) + if required_together is None: + required_together = [] + required_together.extend(auth_required_together) + if required_one_of is None: + required_one_of = [] + required_one_of.extend(auth_required_one_of) + if required_by is None: + required_by = {} + + super().__init__(argument_spec, bypass_checks, no_log, + mutually_exclusive, required_together, + required_one_of, add_file_common_args, + supports_check_mode, required_if, required_by) diff --git a/ansible_collections/dellemc/openmanage/plugins/module_utils/redfish.py b/ansible_collections/dellemc/openmanage/plugins/module_utils/redfish.py index 8a26eaf60..7e1615ab4 100644 --- a/ansible_collections/dellemc/openmanage/plugins/module_utils/redfish.py +++ b/ansible_collections/dellemc/openmanage/plugins/module_utils/redfish.py @@ -1,8 +1,8 @@ # -*- coding: utf-8 -*- # Dell OpenManage Ansible Modules -# Version 8.2.0 -# Copyright (C) 2019-2023 Dell Inc. or its subsidiaries. All Rights Reserved. +# Version 9.3.0 +# Copyright (C) 2019-2024 Dell Inc. or its subsidiaries. All Rights Reserved. # Redistribution and use in source and binary forms, with or without modification, # are permitted provided that the following conditions are met: @@ -36,6 +36,7 @@ from ansible.module_utils.six.moves.urllib.error import URLError, HTTPError from ansible.module_utils.six.moves.urllib.parse import urlencode from ansible.module_utils.common.parameters import env_fallback from ansible_collections.dellemc.openmanage.plugins.module_utils.utils import config_ipv6 +from ansible.module_utils.basic import AnsibleModule redfish_auth_params = { "baseuri": {"required": True, "type": "str"}, @@ -96,6 +97,7 @@ class Redfish(object): self.hostname = self.module_params["baseuri"] self.username = self.module_params["username"] self.password = self.module_params["password"] + self.x_auth_token = self.module_params.get("x_auth_token") self.validate_certs = self.module_params.get("validate_certs", True) self.ca_path = self.module_params.get("ca_path") self.timeout = self.module_params.get("timeout", 30) @@ -191,7 +193,7 @@ class Redfish(object): def __enter__(self): """Creates sessions by passing it to header""" - if self.req_session: + if self.req_session and not self.x_auth_token: payload = {'UserName': self.username, 'Password': self.password} path = SESSION_RESOURCE_COLLECTION["SESSION"] @@ -202,6 +204,8 @@ class Redfish(object): else: msg = "Could not create the session" raise ConnectionError(msg) + elif self.x_auth_token is not None: + self._headers["X-Auth-Token"] = self.x_auth_token return self def __exit__(self, exc_type, exc_value, traceback): @@ -222,3 +226,41 @@ class Redfish(object): def _get_omam_ca_env(self): """Check if the value is set in REQUESTS_CA_BUNDLE or CURL_CA_BUNDLE or OMAM_CA_BUNDLE or returns None""" return os.environ.get("REQUESTS_CA_BUNDLE") or os.environ.get("CURL_CA_BUNDLE") or os.environ.get("OMAM_CA_BUNDLE") + + +class RedfishAnsibleModule(AnsibleModule): + def __init__(self, argument_spec, bypass_checks=False, no_log=False, + mutually_exclusive=None, required_together=None, + required_one_of=None, add_file_common_args=False, + supports_check_mode=False, required_if=None, required_by=None): + redfish_argument_spec = { + "baseuri": {"required": True, "type": "str"}, + "username": {"required": False, "type": "str", "fallback": (env_fallback, ['IDRAC_USERNAME'])}, + "password": {"required": False, "type": "str", "no_log": True, "fallback": (env_fallback, ['IDRAC_PASSWORD'])}, + "x_auth_token": {"required": False, "type": "str", "no_log": True, "fallback": (env_fallback, ['IDRAC_X_AUTH_TOKEN'])}, + "validate_certs": {"type": "bool", "default": True}, + "ca_path": {"type": "path"}, + "timeout": {"type": "int", "default": 30}, + } + argument_spec.update(redfish_argument_spec) + + auth_mutually_exclusive = [("username", "x_auth_token"), ("password", "x_auth_token")] + auth_required_one_of = [("username", "x_auth_token")] + auth_required_together = [("username", "password")] + + if mutually_exclusive is None: + mutually_exclusive = [] + mutually_exclusive.extend(auth_mutually_exclusive) + if required_together is None: + required_together = [] + required_together.extend(auth_required_together) + if required_one_of is None: + required_one_of = [] + required_one_of.extend(auth_required_one_of) + if required_by is None: + required_by = {} + + super().__init__(argument_spec, bypass_checks, no_log, + mutually_exclusive, required_together, + required_one_of, add_file_common_args, + supports_check_mode, required_if, required_by) diff --git a/ansible_collections/dellemc/openmanage/plugins/module_utils/session_utils.py b/ansible_collections/dellemc/openmanage/plugins/module_utils/session_utils.py index 4bead057a..54728a771 100644 --- a/ansible_collections/dellemc/openmanage/plugins/module_utils/session_utils.py +++ b/ansible_collections/dellemc/openmanage/plugins/module_utils/session_utils.py @@ -34,6 +34,8 @@ import os from ansible.module_utils.urls import open_url from ansible.module_utils.six.moves.urllib.parse import urlencode from ansible_collections.dellemc.openmanage.plugins.module_utils.utils import config_ipv6 +from ansible.module_utils.urls import open_url +from abc import ABC, abstractmethod HEADER_TYPE = "application/json" @@ -177,7 +179,7 @@ class SessionAPI(): self._headers = { 'Content-Type': HEADER_TYPE, 'Accept': HEADER_TYPE, - 'X-Auth-Token': module_params.get("auth_token") + 'X-Auth-Token': module_params.get("x_auth_token") } def _get_url(self, uri): @@ -220,7 +222,7 @@ class SessionAPI(): url += f"?{urlencode(query_param)}" return url - def _url_common_args_spec(self, method, api_timeout, headers=None): + def _url_common_args_spec(self, method, api_timeout, headers=None, url_kwargs=None): """ Generates the common arguments for a URL request. @@ -242,25 +244,27 @@ class SessionAPI(): - follow_redirects (str): The policy for following redirects. """ - req_header = self._headers - if headers: - req_header.update(headers) if api_timeout is None: api_timeout = self.timeout if self.ca_path is None: self.ca_path = self._get_omam_ca_env() - url_kwargs = { + req_header = self._headers + if headers: + req_header.update(headers) + url_params = { "method": method, "validate_certs": self.validate_certs, "ca_path": self.ca_path, "use_proxy": self.use_proxy, "headers": req_header, "timeout": api_timeout, - "follow_redirects": 'all', + "follow_redirects": 'all' } - return url_kwargs + if url_kwargs: + url_params.update(url_kwargs) + return url_params - def _args_session(self, method, api_timeout, headers=None): + def _args_session(self, method, api_timeout, headers=None, url_kwargs=None): """ Returns a dictionary containing the arguments needed to establish a session. @@ -275,11 +279,11 @@ class SessionAPI(): req_header = self._headers if headers: req_header.update(headers) - url_kwargs = self._url_common_args_spec(method, api_timeout, headers=headers) + url_kwargs = self._url_common_args_spec(method, api_timeout, headers=headers, url_kwargs=url_kwargs) return url_kwargs def invoke_request(self, uri, method, data=None, query_param=None, headers=None, - api_timeout=None, dump=True): + api_timeout=None, dump=True, url_kwargs=None): """ Invokes a request to the specified URI using the given method and optional parameters. @@ -300,7 +304,7 @@ class SessionAPI(): :return: The response data from the request. :rtype: OpenURLResponse """ - url_kwargs = self._args_session(method, api_timeout, headers=headers) + url_kwargs = self._args_session(method, api_timeout, headers=headers, url_kwargs=url_kwargs) if data and dump: data = json.dumps(data) url = self._build_url(uri, query_param=query_param) @@ -320,3 +324,50 @@ class SessionAPI(): return (os.environ.get("REQUESTS_CA_BUNDLE") or os.environ.get("CURL_CA_BUNDLE") or os.environ.get("OMAM_CA_BUNDLE")) + + +class Session(ABC): + """ + Parent class for all session operations. + """ + def __init__(self, module): + """ + Initializes the object with the given instance and module parameters. + + Args: + instance (object): The ome object. + module (object): The module object. + + Returns: + None + """ + self.instance = SessionAPI(module.params) + self.module = module + + @abstractmethod + def create_session(self): + """ + Abstract method to create a session. + Must be implemented by subclasses. + + Args: + None + + Returns: + None + """ + pass + + @abstractmethod + def delete_session(self): + """ + Abstract method to delete a session. + Must be implemented by subclasses. + + Args: + None + + Returns: + None + """ + pass diff --git a/ansible_collections/dellemc/openmanage/plugins/modules/idrac_attributes.py b/ansible_collections/dellemc/openmanage/plugins/modules/idrac_attributes.py index 1b61b3ebe..2dd0d4bf9 100644 --- a/ansible_collections/dellemc/openmanage/plugins/modules/idrac_attributes.py +++ b/ansible_collections/dellemc/openmanage/plugins/modules/idrac_attributes.py @@ -3,8 +3,8 @@ # # Dell OpenManage Ansible Modules -# Version 8.1.0 -# Copyright (C) 2022-2023 Dell Inc. or its subsidiaries. All Rights Reserved. +# Version 9.3.0 +# Copyright (C) 2022-2024 Dell Inc. or its subsidiaries. All Rights Reserved. # GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) # @@ -22,7 +22,7 @@ version_added: "6.0.0" description: - This module allows to configure the iDRAC attributes. extends_documentation_fragment: - - dellemc.openmanage.idrac_auth_options + - dellemc.openmanage.idrac_x_auth_options options: idrac_attributes: type: dict @@ -62,7 +62,7 @@ options: type: str description: Redfish ID of the resource. requirements: - - "python >= 3.8.6" + - "python >= 3.9.6" author: - Husniya Abdul Hameed (@husniya-hameed) - Felix Stephen (@felixs88) @@ -262,9 +262,8 @@ import json import re from ansible.module_utils.six.moves.urllib.error import URLError, HTTPError from ansible.module_utils.urls import ConnectionError -from ansible_collections.dellemc.openmanage.plugins.module_utils.idrac_redfish import iDRACRedfishAPI, idrac_auth_params +from ansible_collections.dellemc.openmanage.plugins.module_utils.idrac_redfish import iDRACRedfishAPI, IdracAnsibleModule from ansible_collections.dellemc.openmanage.plugins.module_utils.utils import get_manager_res_id -from ansible.module_utils.basic import AnsibleModule SUCCESS_MSG = "Successfully updated the attributes." @@ -496,8 +495,8 @@ def main(): "lifecycle_controller_attributes": {"required": False, "type": 'dict'}, "resource_id": {"required": False, "type": 'str'} } - specs.update(idrac_auth_params) - module = AnsibleModule( + + module = IdracAnsibleModule( argument_spec=specs, required_one_of=[('idrac_attributes', 'system_attributes', 'lifecycle_controller_attributes')], supports_check_mode=True diff --git a/ansible_collections/dellemc/openmanage/plugins/modules/idrac_boot.py b/ansible_collections/dellemc/openmanage/plugins/modules/idrac_boot.py index 1e28ef30d..a02e7498e 100644 --- a/ansible_collections/dellemc/openmanage/plugins/modules/idrac_boot.py +++ b/ansible_collections/dellemc/openmanage/plugins/modules/idrac_boot.py @@ -3,8 +3,8 @@ # # Dell OpenManage Ansible Modules -# Version 8.0.0 -# Copyright (C) 2022-2023 Dell Inc. or its subsidiaries. All Rights Reserved. +# Version 9.3.0 +# Copyright (C) 2022-2024 Dell Inc. or its subsidiaries. All Rights Reserved. # GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) # @@ -21,7 +21,7 @@ version_added: "6.1.0" description: - This module allows to configure the boot order settings. extends_documentation_fragment: - - dellemc.openmanage.idrac_auth_options + - dellemc.openmanage.idrac_x_auth_options options: boot_options: type: list @@ -121,7 +121,7 @@ options: type: str description: Redfish ID of the resource. requirements: - - "python >= 3.8.6" + - "python >= 3.9.6" author: - "Felix Stephen (@felixs88)" notes: @@ -264,11 +264,11 @@ import json import time from ansible.module_utils.six.moves.urllib.error import URLError, HTTPError from ansible.module_utils.urls import ConnectionError, SSLValidationError -from ansible_collections.dellemc.openmanage.plugins.module_utils.idrac_redfish import iDRACRedfishAPI, idrac_auth_params +from ansible_collections.dellemc.openmanage.plugins.module_utils.idrac_redfish import iDRACRedfishAPI, IdracAnsibleModule from ansible_collections.dellemc.openmanage.plugins.module_utils.utils import (strip_substr_dict, idrac_system_reset, get_system_res_id, wait_for_idrac_job_completion) -from ansible.module_utils.basic import AnsibleModule + SYSTEM_URI = "/redfish/v1/Systems" BOOT_OPTIONS_URI = "/redfish/v1/Systems/{0}/BootOptions?$expand=*($levels=1)" @@ -286,7 +286,7 @@ INVALID_BOOT_OPT = "{0} boot order reference provided." SUCCESS_MSG = "Successfully updated the boot settings." FAILED_MSG = "Failed to update the boot settings." UNSUPPORTED_MSG = "The system does not support the BootOptions feature." -JOB_WAIT_MSG = "The boot settings job is triggered successfully." +JOB_WAIT_MSG = "The boot settings operation is triggered/submitted successfully." AUTH_ERROR_MSG = "Unable to communicate with iDRAC {0}. This may be due to one of the following: " \ "Incorrect username or password, unreachable iDRAC IP or a failure in TLS/SSL handshake." @@ -512,8 +512,8 @@ def main(): "job_wait_timeout": {"required": False, "type": "int", "default": 900}, "resource_id": {"required": False, "type": "str"} } - specs.update(idrac_auth_params) - module = AnsibleModule( + + module = IdracAnsibleModule( argument_spec=specs, required_one_of=[["boot_options", "boot_order", "boot_source_override_mode", "boot_source_override_enabled", "boot_source_override_target", diff --git a/ansible_collections/dellemc/openmanage/plugins/modules/idrac_certificates.py b/ansible_collections/dellemc/openmanage/plugins/modules/idrac_certificates.py index a429c639b..274bcf898 100644 --- a/ansible_collections/dellemc/openmanage/plugins/modules/idrac_certificates.py +++ b/ansible_collections/dellemc/openmanage/plugins/modules/idrac_certificates.py @@ -3,8 +3,8 @@ # # Dell OpenManage Ansible Modules -# Version 8.6.0 -# Copyright (C) 2022-2023 Dell Inc. or its subsidiaries. All Rights Reserved. +# Version 9.3.0 +# Copyright (C) 2022-2024 Dell Inc. or its subsidiaries. All Rights Reserved. # GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) # @@ -22,7 +22,7 @@ version_added: "5.5.0" description: - This module allows to generate certificate signing request, import, and export certificates on iDRAC. extends_documentation_fragment: - - dellemc.openmanage.idrac_auth_options + - dellemc.openmanage.idrac_x_auth_options options: command: description: @@ -113,7 +113,7 @@ options: type: int default: 300 requirements: - - "python >= 3.8.6" + - "python >= 3.9.6" author: - "Jagadeesh N V(@jagadeeshnv)" - "Rajshekar P(@rajshekarp87)" @@ -248,8 +248,7 @@ import json import base64 import os from datetime import datetime -from ansible.module_utils.basic import AnsibleModule -from ansible_collections.dellemc.openmanage.plugins.module_utils.idrac_redfish import iDRACRedfishAPI, idrac_auth_params +from ansible_collections.dellemc.openmanage.plugins.module_utils.idrac_redfish import iDRACRedfishAPI, IdracAnsibleModule from ansible.module_utils.six.moves.urllib.error import URLError, HTTPError from ansible.module_utils.urls import ConnectionError, SSLValidationError from ansible_collections.dellemc.openmanage.plugins.module_utils.utils import reset_idrac @@ -383,7 +382,11 @@ def _build_generate_csr_payload(module, cert_type): for key, value in csr_transform.items(): if cert_params.get(key) is not None: - payload[value] = cert_params.get(key) + if value == 'AlternativeNames': + forming_string = ",".join(cert_params.get(key)) + payload[value] = [forming_string] + else: + payload[value] = cert_params.get(key) if rfish_cert_coll.get(cert_type): payload["CertificateCollection"] = rfish_cert_coll.get(cert_type) @@ -564,8 +567,8 @@ def main(): "reset": {"type": 'bool', "default": True}, "wait": {"type": 'int', "default": 300} } - specs.update(idrac_auth_params) - module = AnsibleModule( + + module = IdracAnsibleModule( argument_spec=specs, required_if=[ ['command', 'generate_csr', ('cert_params', 'certificate_path',)], diff --git a/ansible_collections/dellemc/openmanage/plugins/modules/idrac_diagnostics.py b/ansible_collections/dellemc/openmanage/plugins/modules/idrac_diagnostics.py index 3df5a68fd..e19c0107b 100644 --- a/ansible_collections/dellemc/openmanage/plugins/modules/idrac_diagnostics.py +++ b/ansible_collections/dellemc/openmanage/plugins/modules/idrac_diagnostics.py @@ -3,7 +3,7 @@ # # Dell OpenManage Ansible Modules -# Version 9.0.0 +# Version 9.3.0 # Copyright (C) 2024 Dell Inc. or its subsidiaries. All Rights Reserved. # GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) @@ -22,7 +22,7 @@ version_added: "9.0.0" description: - This module allows you to run and export diagnostics on iDRAC. extends_documentation_fragment: - - dellemc.openmanage.idrac_auth_options + - dellemc.openmanage.idrac_x_auth_options options: run: description: @@ -344,8 +344,7 @@ error_info: import json import os -from ansible.module_utils.basic import AnsibleModule -from ansible_collections.dellemc.openmanage.plugins.module_utils.idrac_redfish import iDRACRedfishAPI, idrac_auth_params +from ansible_collections.dellemc.openmanage.plugins.module_utils.idrac_redfish import iDRACRedfishAPI, IdracAnsibleModule from ansible.module_utils.six.moves.urllib.error import URLError, HTTPError from ansible.module_utils.urls import ConnectionError, SSLValidationError from ansible_collections.dellemc.openmanage.plugins.module_utils.utils import ( @@ -768,8 +767,8 @@ class DiagnosticsType: def main(): specs = get_argument_spec() - specs.update(idrac_auth_params) - module = AnsibleModule( + + module = IdracAnsibleModule( argument_spec=specs, required_one_of=[["run", "export"]], required_if=[ diff --git a/ansible_collections/dellemc/openmanage/plugins/modules/idrac_license.py b/ansible_collections/dellemc/openmanage/plugins/modules/idrac_license.py index 565c61cd4..1bf0e2b3c 100644 --- a/ansible_collections/dellemc/openmanage/plugins/modules/idrac_license.py +++ b/ansible_collections/dellemc/openmanage/plugins/modules/idrac_license.py @@ -3,7 +3,7 @@ # # Dell OpenManage Ansible Modules -# Version 8.7.0 +# Version 9.3.0 # Copyright (C) 2024 Dell Inc. or its subsidiaries. All Rights Reserved. # GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) @@ -22,7 +22,7 @@ version_added: "8.7.0" description: - This module allows to import, export and delete licenses on iDRAC. extends_documentation_fragment: - - dellemc.openmanage.idrac_auth_options + - dellemc.openmanage.idrac_x_auth_options options: license_id: description: @@ -390,8 +390,7 @@ import json import os import base64 from urllib.error import HTTPError, URLError -from ansible_collections.dellemc.openmanage.plugins.module_utils.idrac_redfish import iDRACRedfishAPI, idrac_auth_params -from ansible.module_utils.basic import AnsibleModule +from ansible_collections.dellemc.openmanage.plugins.module_utils.idrac_redfish import iDRACRedfishAPI, IdracAnsibleModule from ansible.module_utils.urls import ConnectionError, SSLValidationError from ansible.module_utils.compat.version import LooseVersion from ansible_collections.dellemc.openmanage.plugins.module_utils.utils import ( @@ -634,15 +633,15 @@ class ExportLicense(License): self.module.exit_json(msg=INSUFFICIENT_DIRECTORY_PERMISSION_MSG.format(path=path), failed=True) license_name = self.module.params.get('share_parameters').get('file_name') if license_name: - license_file_name = f"{license_name}_iDRAC_license.txt" + license_file_name = f"{license_name}" else: - license_file_name = f"{self.module.params['license_id']}_iDRAC_license.txt" + license_file_name = f"{self.module.params['license_id']}_iDRAC_license.xml" license_status = self.idrac.invoke_request(export_license_url, "POST", data=payload) license_data = license_status.json_data - license_file = license_data.get("LicenseFile") + license_file = base64.b64decode(license_data.get("LicenseFile")).decode('utf-8') file_name = os.path.join(path, license_file_name) with open(file_name, "w") as fp: - fp.writelines(license_file) + fp.write(license_file) return license_status def __export_license_http(self, export_license_url): @@ -737,7 +736,7 @@ class ExportLicense(License): """ license_name = self.module.params.get('share_parameters').get('file_name') if license_name: - license_file_name = f"{license_name}_iDRAC_license.xml" + license_file_name = f"{license_name}" else: license_file_name = f"{self.module.params['license_id']}_iDRAC_license.xml" payload["FileName"] = license_file_name @@ -999,8 +998,8 @@ def main(): None """ specs = get_argument_spec() - specs.update(idrac_auth_params) - module = AnsibleModule( + + module = IdracAnsibleModule( argument_spec=specs, mutually_exclusive=[("import", "export", "delete")], required_if=[ diff --git a/ansible_collections/dellemc/openmanage/plugins/modules/idrac_network_attributes.py b/ansible_collections/dellemc/openmanage/plugins/modules/idrac_network_attributes.py index 0103570be..dbaa9b4f2 100644 --- a/ansible_collections/dellemc/openmanage/plugins/modules/idrac_network_attributes.py +++ b/ansible_collections/dellemc/openmanage/plugins/modules/idrac_network_attributes.py @@ -3,8 +3,8 @@ # # Dell OpenManage Ansible Modules -# Version 8.4.0 -# Copyright (C) 2023 Dell Inc. or its subsidiaries. All Rights Reserved. +# Version 9.3.0 +# Copyright (C) 2023-2024 Dell Inc. or its subsidiaries. All Rights Reserved. # GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) # @@ -22,7 +22,7 @@ version_added: "8.4.0" description: - This module allows you to configure the port and partition network attributes on the network interface cards. extends_documentation_fragment: - - dellemc.openmanage.idrac_auth_options + - dellemc.openmanage.idrac_x_auth_options options: network_adapter_id: type: str @@ -40,17 +40,17 @@ options: type: dict description: - "Dictionary of network attributes and value. To view the list of attributes and its structure, see the below API - U(https://I(idrac_ip)/redfish/v1/Systems/System.Embedded.1/NetworkAdapters/<network_id>/NetworkDeviceFunctions/ - <network_port_id>/Settings) and U(https://<idrac_ip>/redfish/v1/Schemas/NetworkDeviceFunction.v1_8_0.json)." + U(https://I(idrac_ip)/redfish/v1/Systems/System.Embedded.1/NetworkAdapters/<network_adapter_id>/NetworkDeviceFunctions/ + <network_device_function_id>/Settings) and U(https://<idrac_ip>/redfish/v1/Schemas/NetworkDeviceFunction.v1_8_0.json)." - I(network_attributes) is mutually exclusive with I(oem_network_attributes). oem_network_attributes: type: dict description: - "The attributes must be part of the Integrated Dell Remote Access Controller Attribute Registry. To view the list of attributes in Attribute Registry for iDRAC9 and newer versions. For more information, - see, U(https://I(idrac_ip)/redfish/v1/Chassis/System.Embedded.1/NetworkAdapters/<network_id>/NetworkDeviceFunctions/ - <network_port_id>/Oem/Dell/DellNetworkAttributes/<network_port_id>) - and U(https://I(idrac_ip)/redfish/v1/Registries/NetworkAttributesRegistry_<network_port_id>/ + see, U(https://I(idrac_ip)/redfish/v1/Chassis/System.Embedded.1/NetworkAdapters/<network_adapter_id>/NetworkDeviceFunctions/ + <network_device_function_id>/Oem/Dell/DellNetworkAttributes/<network_device_function_id>) + and U(https://I(idrac_ip)/redfish/v1/Registries/NetworkAttributesRegistry_<network_device_function_id>/ NetworkAttributesRegistry_network_port_id.json)." - For iDRAC8 based servers, derive the network attribute name from Server Configuration Profile. - I(oem_network_attributes) is mutually exclusive with I(network_attributes). @@ -131,8 +131,8 @@ EXAMPLES = """ idrac_ip: "192.168.0.1" idrac_user: "user_name" idrac_password: "user_password" - network_id: "NIC.Integrated.1" - network_port_id: "NIC.Integrated.1-1-1" + network_adapter_id: "NIC.Integrated.1" + network_device_function_id: "NIC.Integrated.1-1-1" apply_time: "Immediate" oem_network_attributes: BannerMessageTimeout: "4" @@ -142,8 +142,8 @@ EXAMPLES = """ idrac_ip: "192.168.0.1" idrac_user: "user_name" idrac_password: "user_password" - network_id: NIC.Integrated.1 - network_port_id: "NIC.Integrated.1-1-1" + network_adapter_id: NIC.Integrated.1 + network_device_function_id: "NIC.Integrated.1-1-1" oem_network_attributes: BannerMessageTimeout: "4" apply_time: OnReset @@ -153,8 +153,8 @@ EXAMPLES = """ idrac_ip: "192.168.0.1" idrac_user: "user_name" idrac_password: "user_password" - network_id: NIC.Integrated.1 - network_port_id: "NIC.Integrated.1-1-1" + network_adapter_id: NIC.Integrated.1 + network_device_function_id: "NIC.Integrated.1-1-1" oem_network_attributes: BannerMessageTimeout: "4" apply_time: AtMaintenanceWindowStart @@ -167,8 +167,8 @@ EXAMPLES = """ idrac_ip: "192.168.0.1" idrac_user: "user_name" idrac_password: "user_password" - network_id: NIC.Integrated.1 - network_port_id: "NIC.Integrated.1-1-1" + network_adapter_id: NIC.Integrated.1 + network_device_function_id: "NIC.Integrated.1-1-1" apply_time: "Immediate" clear_pending: true @@ -177,8 +177,8 @@ EXAMPLES = """ idrac_ip: "192.168.0.1" idrac_user: "user_name" idrac_password: "user_password" - network_id: NIC.Integrated.1 - network_port_id: "NIC.Integrated.1-1-1" + network_adapter_id: NIC.Integrated.1 + network_device_function_id: "NIC.Integrated.1-1-1" apply_time: "Immediate" clear_pending: true oem_network_attributes: @@ -189,8 +189,8 @@ EXAMPLES = """ idrac_ip: "192.168.0.1" idrac_user: "user_name" idrac_password: "user_password" - network_id: NIC.Integrated.1 - network_port_id: "NIC.Integrated.1-1-1" + network_adapter_id: NIC.Integrated.1 + network_device_function_id: "NIC.Integrated.1-1-1" apply_time: "Immediate" oem_network_attributes: LnkSpeed: "10MbpsHalf" @@ -204,8 +204,8 @@ EXAMPLES = """ idrac_ip: "192.168.0.1" idrac_user: "user_name" idrac_password: "user_password" - network_id: NIC.Integrated.1 - network_port_id: "NIC.Integrated.1-1-1" + network_adapter_id: NIC.Integrated.1 + network_device_function_id: "NIC.Integrated.1-1-1" apply_time: OnReset network_attributes: Ethernet: @@ -217,8 +217,8 @@ EXAMPLES = """ idrac_ip: "192.168.0.1" idrac_user: "user_name" idrac_password: "user_password" - network_id: NIC.Integrated.1 - network_port_id: "NIC.Integrated.1-1-1" + network_adapter_id: NIC.Integrated.1 + network_device_function_id: "NIC.Integrated.1-1-1" network_attributes: Ethernet: VLAN: @@ -230,8 +230,8 @@ EXAMPLES = """ idrac_ip: "192.168.0.1" idrac_user: "user_name" idrac_password: "user_password" - network_id: NIC.Integrated.1 - network_port_id: "NIC.Integrated.1-1-1" + network_adapter_id: NIC.Integrated.1 + network_device_function_id: "NIC.Integrated.1-1-1" network_attributes: iSCSIBoot: InitiatorIPAddress: 1.0.0.1 @@ -245,8 +245,8 @@ EXAMPLES = """ idrac_ip: "192.168.0.1" idrac_user: "user_name" idrac_password: "user_password" - network_id: NIC.Integrated.1 - network_port_id: "NIC.Integrated.1-1-1" + network_adapter_id: NIC.Integrated.1 + network_device_function_id: "NIC.Integrated.1-1-1" network_attributes: Ethernet: VLAN: @@ -319,12 +319,9 @@ error_info: import json import time from urllib.error import HTTPError, URLError - -from ansible.module_utils.basic import AnsibleModule from ansible.module_utils.compat.version import LooseVersion from ansible.module_utils.urls import ConnectionError, SSLValidationError -from ansible_collections.dellemc.openmanage.plugins.module_utils.idrac_redfish import ( - idrac_auth_params, iDRACRedfishAPI) +from ansible_collections.dellemc.openmanage.plugins.module_utils.idrac_redfish import iDRACRedfishAPI, IdracAnsibleModule from ansible_collections.dellemc.openmanage.plugins.module_utils.utils import ( delete_job, get_current_time, get_dynamic_uri, get_idrac_firmware_version, get_scheduled_job_resp, remove_key, validate_and_get_first_resource_id_uri, @@ -713,13 +710,12 @@ def main(): "job_wait": {"type": "bool", "default": True}, "job_wait_timeout": {"type": "int", "default": 1200} } - specs.update(idrac_auth_params) - module = AnsibleModule(argument_spec=specs, - mutually_exclusive=[ - ('network_attributes', 'oem_network_attributes')], - required_if=[["apply_time", "AtMaintenanceWindowStart", ("maintenance_window",)], - ["apply_time", "InMaintenanceWindowOnReset", ("maintenance_window",)]], - supports_check_mode=True) + + module = IdracAnsibleModule(argument_spec=specs, + mutually_exclusive=[('network_attributes', 'oem_network_attributes')], + required_if=[["apply_time", "AtMaintenanceWindowStart", ("maintenance_window",)], + ["apply_time", "InMaintenanceWindowOnReset", ("maintenance_window",)]], + supports_check_mode=True) with iDRACRedfishAPI(module.params, req_session=True) as idrac: if module_attribute := module.params.get('network_attributes'): network_attr_obj = NetworkAttributes(idrac, module) diff --git a/ansible_collections/dellemc/openmanage/plugins/modules/idrac_redfish_storage_controller.py b/ansible_collections/dellemc/openmanage/plugins/modules/idrac_redfish_storage_controller.py index 40cc5768d..1695f2b6f 100644 --- a/ansible_collections/dellemc/openmanage/plugins/modules/idrac_redfish_storage_controller.py +++ b/ansible_collections/dellemc/openmanage/plugins/modules/idrac_redfish_storage_controller.py @@ -3,8 +3,8 @@ # # Dell OpenManage Ansible Modules -# Version 8.1.0 -# Copyright (C) 2019-2023 Dell Inc. or its subsidiaries. All Rights Reserved. +# Version 9.3.0 +# Copyright (C) 2019-2024 Dell Inc. or its subsidiaries. All Rights Reserved. # GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) # @@ -519,9 +519,8 @@ error_info: import json -from ansible_collections.dellemc.openmanage.plugins.module_utils.redfish import Redfish, redfish_auth_params +from ansible_collections.dellemc.openmanage.plugins.module_utils.redfish import Redfish, RedfishAnsibleModule from ansible_collections.dellemc.openmanage.plugins.module_utils.utils import wait_for_job_completion, strip_substr_dict -from ansible.module_utils.basic import AnsibleModule from ansible.module_utils.six.moves.urllib.error import URLError, HTTPError from ansible.module_utils.urls import ConnectionError, SSLValidationError @@ -1001,8 +1000,7 @@ def main(): "job_wait_timeout": {"required": False, "type": "int", "default": 120}, "size": {"required": False, "type": "int"} } - specs.update(redfish_auth_params) - module = AnsibleModule( + module = RedfishAnsibleModule( argument_spec=specs, mutually_exclusive=[('attributes', 'command'), ("target", "size")], required_one_of=[('attributes', 'command')], diff --git a/ansible_collections/dellemc/openmanage/plugins/modules/idrac_reset.py b/ansible_collections/dellemc/openmanage/plugins/modules/idrac_reset.py index 940f86dc2..48aff3dcf 100644 --- a/ansible_collections/dellemc/openmanage/plugins/modules/idrac_reset.py +++ b/ansible_collections/dellemc/openmanage/plugins/modules/idrac_reset.py @@ -3,7 +3,7 @@ # # Dell OpenManage Ansible Modules -# Version 9.2.0 +# Version 9.3.0 # Copyright (C) 2018-2024 Dell Inc. or its subsidiaries. All Rights Reserved. # GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) @@ -20,7 +20,7 @@ version_added: "2.1.0" description: - This module resets the iDRAC to factory default settings. extends_documentation_fragment: - - dellemc.openmanage.idrac_auth_options + - dellemc.openmanage.idrac_x_auth_options options: reset_to_default: type: str @@ -55,7 +55,7 @@ options: job_wait_timeout: description: - Time in seconds to wait for job completion. - - This is applicable when I(job_wait) is C(true). + - This is applicable when I(wait_for_idrac) is C(true). type: int default: 600 version_added: 9.2.0 @@ -184,8 +184,7 @@ import os import json import time from urllib.error import HTTPError, URLError -from ansible_collections.dellemc.openmanage.plugins.module_utils.idrac_redfish import iDRACRedfishAPI, idrac_auth_params -from ansible.module_utils.basic import AnsibleModule +from ansible_collections.dellemc.openmanage.plugins.module_utils.idrac_redfish import iDRACRedfishAPI, IdracAnsibleModule from ansible.module_utils.compat.version import LooseVersion from ansible.module_utils.urls import ConnectionError, SSLValidationError from ansible_collections.dellemc.openmanage.plugins.module_utils.utils import ( @@ -532,8 +531,8 @@ def main(): "job_wait_timeout": {"type": 'int', "default": 600}, "force_reset": {"type": "bool", "default": False} } - specs.update(idrac_auth_params) - module = AnsibleModule( + + module = IdracAnsibleModule( argument_spec=specs, mutually_exclusive=[("custom_defaults_file", "custom_defaults_buffer")], supports_check_mode=True) diff --git a/ansible_collections/dellemc/openmanage/plugins/modules/idrac_server_config_profile.py b/ansible_collections/dellemc/openmanage/plugins/modules/idrac_server_config_profile.py index f89272ca3..216a79da4 100644 --- a/ansible_collections/dellemc/openmanage/plugins/modules/idrac_server_config_profile.py +++ b/ansible_collections/dellemc/openmanage/plugins/modules/idrac_server_config_profile.py @@ -3,8 +3,8 @@ # # Dell OpenManage Ansible Modules -# Version 8.4.0 -# Copyright (C) 2019-2023 Dell Inc. or its subsidiaries. All Rights Reserved. +# Version 9.3.0 +# Copyright (C) 2019-2024 Dell Inc. or its subsidiaries. All Rights Reserved. # GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) # @@ -22,7 +22,7 @@ description: - Export the Server Configuration Profile (SCP) from the iDRAC or import from a network share (CIFS, NFS, HTTP, HTTPS) or a local path. extends_documentation_fragment: - - dellemc.openmanage.idrac_auth_options + - dellemc.openmanage.idrac_x_auth_options options: command: description: @@ -527,8 +527,7 @@ import os import json from datetime import datetime from os.path import exists -from ansible.module_utils.basic import AnsibleModule -from ansible_collections.dellemc.openmanage.plugins.module_utils.idrac_redfish import iDRACRedfishAPI, idrac_auth_params +from ansible_collections.dellemc.openmanage.plugins.module_utils.idrac_redfish import iDRACRedfishAPI, IdracAnsibleModule from ansible_collections.dellemc.openmanage.plugins.module_utils.utils import idrac_redfish_job_tracking, \ strip_substr_dict from ansible.module_utils.six.moves.urllib.error import URLError, HTTPError @@ -919,8 +918,8 @@ class PreviewCommand(): def main(): specs = get_argument_spec() - specs.update(idrac_auth_params) - module = AnsibleModule( + + module = IdracAnsibleModule( argument_spec=specs, required_if=[ ["command", "export", ["share_name"]], diff --git a/ansible_collections/dellemc/openmanage/plugins/modules/idrac_session.py b/ansible_collections/dellemc/openmanage/plugins/modules/idrac_session.py index 3303b4ade..ac4e9b85c 100644 --- a/ansible_collections/dellemc/openmanage/plugins/modules/idrac_session.py +++ b/ansible_collections/dellemc/openmanage/plugins/modules/idrac_session.py @@ -3,7 +3,7 @@ # # Dell OpenManage Ansible Modules -# Version 9.2.0 +# Version 9.3.0 # Copyright (C) 2024 Dell Inc. or its subsidiaries. All Rights Reserved. # GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) @@ -28,12 +28,14 @@ options: type: str username: description: - - Username of the iDRAC. + - Username of the iDRAC. If the username is not provided, then + the environment variable E(IDRAC_USERNAME) is used. - I(username) is required when I(state) is C(present). type: str password: description: - - Password of the iDRAC. + - Password of the iDRAC. If the password is not provided, then + the environment variable E(IDRAC_PASSWORD) is used. - I(password) is required when I(state) is C(present). type: str port: @@ -65,20 +67,22 @@ options: choices: [present, absent] type: str default: present - auth_token: + x_auth_token: description: - Authentication token. - - I(auth_token) is required when I(state) is C(absent). + - I(x_auth_token) is required when I(state) is C(absent). type: str session_id: description: - Session ID of the iDRAC. - I(session_id) is required when I(state) is C(absent). type: int + aliases: ['auth_token'] requirements: - "python >= 3.9.6" author: - "Rajshekar P(@rajshekarp87)" + - "Kritika Bhateja (@Kritika-Bhateja-03)" notes: - Run this module from a system that has direct access to Dell iDRAC. - This module supports IPv4 and IPv6 addresses. @@ -93,14 +97,47 @@ EXAMPLES = r""" hostname: 198.162.0.1 username: username password: password + ca_path: "/path/to/ca_cert.pem" state: present - name: Delete a session dellemc.openmanage.idrac_session: hostname: 198.162.0.1 + ca_path: "/path/to/ca_cert.pem" state: absent - auth_token: aed4aa802b748d2f3b31deec00a6b28a - session_is: 2 + x_auth_token: aed4aa802b748d2f3b31deec00a6b28a + session_id: 2 + +- name: Create a session and execute other modules + block: + - name: Create a session + dellemc.openmanage.idrac_session: + hostname: 198.162.0.1 + username: username + password: password + ca_path: "/path/to/ca_cert.pem" + state: present + register: authData + + - name: Call idrac_firmware_info module + dellemc.openmanage.idrac_firmware_info: + idrac_ip: 198.162.0.1 + ca_path: "/path/to/ca_cert.pem" + x_auth_token: "{{ authData.x_auth_token }}" + + - name: Call idrac_user_info module + dellemc.openmanage.idrac_user_info: + idrac_ip: 198.162.0.1 + ca_path: "/path/to/ca_cert.pem" + x_auth_token: "{{ authData.x_auth_token }}" + always: + - name: Destroy a session + dellemc.openmanage.idrac_session: + hostname: 198.162.0.1 + ca_path: "/path/to/ca_cert.pem" + state: absent + x_auth_token: "{{ authData.x_auth_token }}" + session_id: "{{ authData.session_data.Id }}" """ RETURN = r''' @@ -361,7 +398,7 @@ def main(): argument_spec=specs, required_if=[ ["state", "present", ("username", "password",)], - ["state", "absent", ("auth_token", "session_id",)] + ["state", "absent", ("x_auth_token", "session_id",)] ], supports_check_mode=True ) @@ -400,7 +437,7 @@ def get_argument_spec(): - "timeout": An integer representing the timeout value. The default value is 30. - "state": A string representing the state. The default value is "present". The choices are ["present", "absent"]. - - "auth_token": A string representing the authentication token. It is marked as not to be + - "x_auth_token": A string representing the authentication token. It is marked as not to be logged. - "session_id": An integer representing the session ID. @@ -416,7 +453,7 @@ def get_argument_spec(): "ca_path": {"type": "path", "default": None}, "timeout": {"type": "int", "default": 30}, "state": {"type": 'str', "default": "present", "choices": ["present", "absent"]}, - "auth_token": {"type": "str", "no_log": True}, + "x_auth_token": {"type": "str", "no_log": True, "aliases": ['auth_token']}, "session_id": {"type": "int"} } diff --git a/ansible_collections/dellemc/openmanage/plugins/modules/idrac_storage_volume.py b/ansible_collections/dellemc/openmanage/plugins/modules/idrac_storage_volume.py index 13c1ec065..eec8ef043 100644 --- a/ansible_collections/dellemc/openmanage/plugins/modules/idrac_storage_volume.py +++ b/ansible_collections/dellemc/openmanage/plugins/modules/idrac_storage_volume.py @@ -3,7 +3,7 @@ # # Dell OpenManage Ansible Modules -# Version 9.1.0 +# Version 9.3.0 # Copyright (C) 2024 Dell Inc. or its subsidiaries. All Rights Reserved. # GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) @@ -21,7 +21,7 @@ version_added: "9.1.0" description: - This module is responsible for configuring the RAID attributes. extends_documentation_fragment: - - dellemc.openmanage.idrac_auth_options + - dellemc.openmanage.idrac_x_auth_options options: state: type: str @@ -128,6 +128,12 @@ options: - This option is applicable when I(job_wait) is C(true). type: int default: 900 + time_to_wait: + description: + - The maximum wait time before shutdown in seconds for the Server Configuration Profile (SCP) import operation. + - This option is applicable when I(state) is C(create) or C(delete). + type: int + default: 300 requirements: - "python >= 3.9.6" @@ -281,8 +287,7 @@ import re import operator from urllib.error import HTTPError, URLError from copy import deepcopy -from ansible_collections.dellemc.openmanage.plugins.module_utils.idrac_redfish import iDRACRedfishAPI, idrac_auth_params -from ansible.module_utils.basic import AnsibleModule +from ansible_collections.dellemc.openmanage.plugins.module_utils.idrac_redfish import iDRACRedfishAPI, IdracAnsibleModule from ansible.module_utils.urls import ConnectionError, SSLValidationError from ansible_collections.dellemc.openmanage.plugins.module_utils.utils import ( get_dynamic_uri, validate_and_get_first_resource_id_uri, xml_data_conversion, idrac_redfish_job_tracking, remove_key, get_idrac_firmware_version) @@ -303,6 +308,7 @@ ID_AND_LOCATION_BOTH_NOT_DEFINED = "Either id or location should be specified." DRIVES_NOT_DEFINED = "Drives must be defined for volume creation." NOT_ENOUGH_DRIVES = "Number of sufficient disks not found in Controller '{controller_id}'!" WAIT_TIMEOUT_MSG = "The job is not complete after {0} seconds." +TIME_TO_WAIT_MSG = "Time to wait value is invalid. Minimum value is 300 and Maximum is 3600 seconds." JOB_TRIGERRED = "Successfully triggered the {0} storage volume operation." VOLUME_NAME_REQUIRED_FOR_DELETE = "Virtual disk name is a required parameter for remove virtual disk operations." VOLUME_NOT_FOUND = "Unable to find the virtual disk." @@ -551,6 +557,11 @@ class StorageValidation(StorageBase): self.idrac_data = StorageData(idrac, module).all_storage_data() self.controller_id = module.params.get("controller_id") + def validate_time_to_wait(self): + to_wait = self.module_ext_params.get("time_to_wait") + if to_wait < 300 or to_wait > 3600: + self.module.exit_json(msg=TIME_TO_WAIT_MSG, failed=True) + def validate_controller_exists(self): if not self.controller_id: self.module.exit_json(msg=CONTROLLER_NOT_DEFINED, failed=True) @@ -720,6 +731,7 @@ class StorageCreate(StorageValidation): def validate(self): # Validate upper layer input + self.validate_time_to_wait() self.validate_controller_exists() self.validate_job_wait_negative_values() # Validate std raid validation for inner layer @@ -741,7 +753,7 @@ class StorageCreate(StorageValidation): parent_payload = """<SystemConfiguration>{0}</SystemConfiguration>""" payload = self.constuct_payload(name_id_mapping) parent_payload = parent_payload.format(payload) - resp = self.idrac.import_scp(import_buffer=parent_payload, target="RAID", job_wait=False) + resp = self.idrac.import_scp(import_buffer=parent_payload, target="RAID", job_wait=False, time_to_wait=self.module.params.get('time_to_wait')) job_dict = self.wait_for_job_completion(resp) return job_dict @@ -768,6 +780,7 @@ class StorageDelete(StorageValidation): def validate(self): # Validate upper layer input + self.validate_time_to_wait() self.validate_job_wait_negative_values() # Validate for volume and volume_name @@ -803,7 +816,7 @@ class StorageDelete(StorageValidation): self.validate_volume_exists_in_server(set(volume_name_input_list)) cntrl_id_vd_id_mapping = self.get_vd_id_based_on_controller_id_vd_name(set(volume_name_input_list)) payload = self.construct_payload_for_delete(cntrl_id_vd_id_mapping) - resp = self.idrac.import_scp(import_buffer=payload, target="RAID", job_wait=False) + resp = self.idrac.import_scp(import_buffer=payload, target="RAID", job_wait=False, time_to_wait=self.module.params.get('time_to_wait')) job_dict = self.wait_for_job_completion(resp) return job_dict @@ -891,10 +904,11 @@ def main(): "raid_reset_config": {"choices": ['true', 'false'], "default": 'false'}, "raid_init_operation": {"choices": ['None', 'Fast']}, "job_wait": {"type": "bool", "default": True}, - "job_wait_timeout": {"type": "int", "default": 900} + "job_wait_timeout": {"type": "int", "default": 900}, + "time_to_wait": {"type": "int", "default": 300} } - specs.update(idrac_auth_params) - module = AnsibleModule( + + module = IdracAnsibleModule( argument_spec=specs, supports_check_mode=True) try: diff --git a/ansible_collections/dellemc/openmanage/plugins/modules/idrac_user.py b/ansible_collections/dellemc/openmanage/plugins/modules/idrac_user.py index bcd16b872..4cd67b7b5 100644 --- a/ansible_collections/dellemc/openmanage/plugins/modules/idrac_user.py +++ b/ansible_collections/dellemc/openmanage/plugins/modules/idrac_user.py @@ -3,8 +3,8 @@ # # Dell OpenManage Ansible Modules -# Version 8.1.0 -# Copyright (C) 2018-2023 Dell Inc. or its subsidiaries. All Rights Reserved. +# Version 9.3.0 +# Copyright (C) 2018-2024 Dell Inc. or its subsidiaries. All Rights Reserved. # GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) # @@ -24,7 +24,7 @@ description: - Edit a user account. - Enable or Disable a user account. extends_documentation_fragment: - - dellemc.openmanage.idrac_auth_options + - dellemc.openmanage.idrac_x_auth_options options: state: type: str @@ -101,7 +101,7 @@ options: - A privacy protocol is not configured if C(None) is selected. choices: [None, DES, AES] requirements: - - "python >= 3.8.6" + - "python >= 3.9.6" author: "Felix Stephen (@felixs88)" notes: - Run this module from a system that has direct access to Dell iDRAC. @@ -209,9 +209,7 @@ import time from ssl import SSLError from ansible.module_utils.six.moves.urllib.error import URLError, HTTPError from ansible.module_utils.urls import ConnectionError, SSLValidationError -from ansible_collections.dellemc.openmanage.plugins.module_utils.idrac_redfish import iDRACRedfishAPI, idrac_auth_params -from ansible.module_utils.basic import AnsibleModule - +from ansible_collections.dellemc.openmanage.plugins.module_utils.idrac_redfish import iDRACRedfishAPI, IdracAnsibleModule ACCOUNT_URI = "/redfish/v1/Managers/iDRAC.Embedded.1/Accounts/" ATTRIBUTE_URI = "/redfish/v1/Managers/iDRAC.Embedded.1/Attributes/" @@ -412,8 +410,7 @@ def main(): "authentication_protocol": {"required": False, "choices": ['SHA', 'MD5', 'None']}, "privacy_protocol": {"required": False, "choices": ['AES', 'DES', 'None']}, } - specs.update(idrac_auth_params) - module = AnsibleModule( + module = IdracAnsibleModule( argument_spec=specs, supports_check_mode=True) try: diff --git a/ansible_collections/dellemc/openmanage/plugins/modules/idrac_user_info.py b/ansible_collections/dellemc/openmanage/plugins/modules/idrac_user_info.py index 6d06a60be..895e0d338 100644 --- a/ansible_collections/dellemc/openmanage/plugins/modules/idrac_user_info.py +++ b/ansible_collections/dellemc/openmanage/plugins/modules/idrac_user_info.py @@ -3,8 +3,8 @@ # # Dell OpenManage Ansible Modules -# Version 7.0.0 -# Copyright (C) 2022 Dell Inc. or its subsidiaries. All Rights Reserved. +# Version 9.3.0 +# Copyright (C) 2022-2024 Dell Inc. or its subsidiaries. All Rights Reserved. # GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) # @@ -22,7 +22,7 @@ description: - "This module retrieves the list and basic details of all users or details of a specific user on iDRAC" extends_documentation_fragment: - - dellemc.openmanage.idrac_auth_options + - dellemc.openmanage.idrac_x_auth_options options: user_id: description: @@ -35,7 +35,7 @@ options: - Username of the account that is created in iDRAC local users. - I(username) is mutually exclusive with I(user_id) requirements: - - "python >= 3.8.6" + - "python >= 3.9.6" author: "Husniya Hameed(@husniya_hameed)" notes: - Run this module on a system that has direct access to Dell iDRAC. @@ -116,8 +116,7 @@ import json from ssl import SSLError from ansible.module_utils.six.moves.urllib.error import URLError, HTTPError from ansible.module_utils.urls import ConnectionError, SSLValidationError -from ansible_collections.dellemc.openmanage.plugins.module_utils.idrac_redfish import iDRACRedfishAPI, idrac_auth_params -from ansible.module_utils.basic import AnsibleModule +from ansible_collections.dellemc.openmanage.plugins.module_utils.idrac_redfish import iDRACRedfishAPI, IdracAnsibleModule from ansible_collections.dellemc.openmanage.plugins.module_utils.utils import strip_substr_dict @@ -193,8 +192,8 @@ def main(): "user_id": {"type": 'int'}, "username": {"type": 'str'} } - specs.update(idrac_auth_params) - module = AnsibleModule( + + module = IdracAnsibleModule( argument_spec=specs, mutually_exclusive=[ ('user_id', 'username') diff --git a/ansible_collections/dellemc/openmanage/plugins/modules/idrac_virtual_media.py b/ansible_collections/dellemc/openmanage/plugins/modules/idrac_virtual_media.py index 4c5fb10db..aef7c2a70 100644 --- a/ansible_collections/dellemc/openmanage/plugins/modules/idrac_virtual_media.py +++ b/ansible_collections/dellemc/openmanage/plugins/modules/idrac_virtual_media.py @@ -3,8 +3,8 @@ # # Dell OpenManage Ansible Modules -# Version 6.3.0 -# Copyright (C) 2022 Dell Inc. or its subsidiaries. All Rights Reserved. +# Version 9.3.0 +# Copyright (C) 2022-2024 Dell Inc. or its subsidiaries. All Rights Reserved. # GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) # @@ -21,7 +21,7 @@ version_added: "6.3.0" description: - This module allows to configure Remote File Share settings. extends_documentation_fragment: - - dellemc.openmanage.idrac_auth_options + - dellemc.openmanage.idrac_x_auth_options options: virtual_media: required: true @@ -78,7 +78,7 @@ options: type: str description: Resource id of the iDRAC, if not specified manager collection id will be used. requirements: - - "python >= 3.8.6" + - "python >= 3.9.6" author: - "Felix Stephen (@felixs88)" notes: @@ -217,8 +217,8 @@ import copy import time from ansible.module_utils.six.moves.urllib.error import URLError, HTTPError from ansible.module_utils.urls import ConnectionError, SSLValidationError -from ansible_collections.dellemc.openmanage.plugins.module_utils.idrac_redfish import iDRACRedfishAPI, idrac_auth_params -from ansible.module_utils.basic import AnsibleModule +from ansible_collections.dellemc.openmanage.plugins.module_utils.idrac_redfish import iDRACRedfishAPI, IdracAnsibleModule + MANAGER_BASE = "/redfish/v1/Managers/iDRAC.Embedded.1/VirtualMedia" SYSTEM_BASE = "/redfish/v1/Systems/System.Embedded.1/VirtualMedia" @@ -441,8 +441,8 @@ def main(): "force": {"required": False, "type": "bool", "default": False}, "resource_id": {"required": False, "type": 'str'}, } - specs.update(idrac_auth_params) - module = AnsibleModule(argument_spec=specs, supports_check_mode=True) + + module = IdracAnsibleModule(argument_spec=specs, supports_check_mode=True) try: with iDRACRedfishAPI(module.params, req_session=True) as idrac: vr_media = module.params["virtual_media"] diff --git a/ansible_collections/dellemc/openmanage/plugins/modules/ome_active_directory.py b/ansible_collections/dellemc/openmanage/plugins/modules/ome_active_directory.py index 6f420bec7..b23f2d0ef 100644 --- a/ansible_collections/dellemc/openmanage/plugins/modules/ome_active_directory.py +++ b/ansible_collections/dellemc/openmanage/plugins/modules/ome_active_directory.py @@ -3,8 +3,8 @@ # # Dell OpenManage Ansible Modules -# Version 7.0.0 -# Copyright (C) 2021-2022 Dell Inc. or its subsidiaries. All Rights Reserved. +# Version 9.3.0 +# Copyright (C) 2021-2024 Dell Inc. or its subsidiaries. All Rights Reserved. # GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) # @@ -117,7 +117,7 @@ options: - The certificate should be a Root CA Certificate encoded in Base64 format. - This is applicable when I(validate_certificate) is C(true). requirements: - - "python >= 3.8.6" + - "python >= 3.9.6" notes: - The module will always report change when I(validate_certificate) is C(true). - Run this module from a system that has direct access to OpenManage Enterprise. @@ -241,10 +241,9 @@ error_info: import json import os from ssl import SSLError -from ansible.module_utils.basic import AnsibleModule from ansible.module_utils.six.moves.urllib.error import URLError, HTTPError from ansible.module_utils.urls import ConnectionError -from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, ome_auth_params +from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, OmeAnsibleModule from ansible.module_utils.common.dict_transformations import recursive_diff AD_URI = "AccountService/ExternalAccountProvider/ADAccountProvider" @@ -418,8 +417,8 @@ def main(): "domain_username": {"type": 'str'}, "domain_password": {"type": 'str', "no_log": True} } - specs.update(ome_auth_params) - module = AnsibleModule( + + module = OmeAnsibleModule( argument_spec=specs, required_one_of=[('name', 'id')], required_if=[ diff --git a/ansible_collections/dellemc/openmanage/plugins/modules/ome_alert_policies.py b/ansible_collections/dellemc/openmanage/plugins/modules/ome_alert_policies.py index 9e8a17fd2..b279d9739 100644 --- a/ansible_collections/dellemc/openmanage/plugins/modules/ome_alert_policies.py +++ b/ansible_collections/dellemc/openmanage/plugins/modules/ome_alert_policies.py @@ -3,8 +3,8 @@ # # Dell OpenManage Ansible Modules -# Version 8.3.0 -# Copyright (C) 2023 Dell Inc. or its subsidiaries. All Rights Reserved. +# Version 9.3.0 +# Copyright (C) 2023-2024 Dell Inc. or its subsidiaries. All Rights Reserved. # GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) # @@ -478,9 +478,8 @@ error_info: import csv import os import json -from ansible.module_utils.basic import AnsibleModule from ansible_collections.dellemc.openmanage.plugins.module_utils.utils import get_all_data_with_pagination, strip_substr_dict -from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, ome_auth_params +from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, OmeAnsibleModule from ansible.module_utils.six.moves.urllib.error import URLError, HTTPError from ansible.module_utils.urls import ConnectionError, SSLValidationError from ansible.module_utils.common.dict_transformations import recursive_diff @@ -1083,11 +1082,11 @@ def main(): } } } - specs.update(ome_auth_params) + present_args = ['enable', 'new_name', 'description', 'device_service_tag', 'device_group', 'specific_undiscovered_devices', 'any_undiscovered_devices', 'all_devices', 'category', 'message_ids', 'message_file', 'date_and_time', 'severity', 'actions'] - module = AnsibleModule( + module = OmeAnsibleModule( argument_spec=specs, required_if=[['state', 'present', present_args, True]], mutually_exclusive=[('device_service_tag', 'device_group', 'any_undiscovered_devices', 'specific_undiscovered_devices', 'all_devices',), diff --git a/ansible_collections/dellemc/openmanage/plugins/modules/ome_alert_policies_actions_info.py b/ansible_collections/dellemc/openmanage/plugins/modules/ome_alert_policies_actions_info.py index 0d1f0c726..6bb50acf1 100644 --- a/ansible_collections/dellemc/openmanage/plugins/modules/ome_alert_policies_actions_info.py +++ b/ansible_collections/dellemc/openmanage/plugins/modules/ome_alert_policies_actions_info.py @@ -3,8 +3,8 @@ # # Dell OpenManage Ansible Modules -# Version 8.2.0 -# Copyright (C) 2023 Dell Inc. or its subsidiaries. All Rights Reserved. +# Version 9.3.0 +# Copyright (C) 2023-2024 Dell Inc. or its subsidiaries. All Rights Reserved. # GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) # @@ -253,8 +253,7 @@ msg: ''' import json -from ansible.module_utils.basic import AnsibleModule -from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, ome_auth_params +from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, OmeAnsibleModule from ansible_collections.dellemc.openmanage.plugins.module_utils.utils import remove_key from ansible.module_utils.six.moves.urllib.error import URLError, HTTPError from ansible.module_utils.urls import ConnectionError, SSLValidationError @@ -267,8 +266,8 @@ EMPTY_ALERT_POLICY_ACTION_MSG = "No alert policies action information were found def main(): """ function to retrieve the information on actions of alert policies """ - specs = ome_auth_params - module = AnsibleModule( + specs = {} + module = OmeAnsibleModule( argument_spec=specs, supports_check_mode=True) try: diff --git a/ansible_collections/dellemc/openmanage/plugins/modules/ome_alert_policies_category_info.py b/ansible_collections/dellemc/openmanage/plugins/modules/ome_alert_policies_category_info.py index 6d3151fe9..0af0bf338 100644 --- a/ansible_collections/dellemc/openmanage/plugins/modules/ome_alert_policies_category_info.py +++ b/ansible_collections/dellemc/openmanage/plugins/modules/ome_alert_policies_category_info.py @@ -3,8 +3,8 @@ # # Dell OpenManage Ansible Modules -# Version 8.2.0 -# Copyright (C) 2023 Dell Inc. or its subsidiaries. All Rights Reserved. +# Version 9.3.0 +# Copyright (C) 2023-2024 Dell Inc. or its subsidiaries. All Rights Reserved. # GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) # @@ -278,10 +278,9 @@ error_info: ''' import json -from ansible.module_utils.basic import AnsibleModule from ansible.module_utils.urls import ConnectionError, SSLValidationError from ansible.module_utils.six.moves.urllib.error import URLError, HTTPError -from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, ome_auth_params +from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, OmeAnsibleModule from ansible_collections.dellemc.openmanage.plugins.module_utils.utils import remove_key from ansible_collections.dellemc.openmanage.plugins.module_utils.utils import get_all_data_with_pagination @@ -296,8 +295,8 @@ def get_formatted_categories(rest_obj): def main(): - specs = ome_auth_params - module = AnsibleModule( + specs = {} + module = OmeAnsibleModule( argument_spec=specs, supports_check_mode=True) try: diff --git a/ansible_collections/dellemc/openmanage/plugins/modules/ome_alert_policies_info.py b/ansible_collections/dellemc/openmanage/plugins/modules/ome_alert_policies_info.py index d9a97c070..51ed53b9d 100644 --- a/ansible_collections/dellemc/openmanage/plugins/modules/ome_alert_policies_info.py +++ b/ansible_collections/dellemc/openmanage/plugins/modules/ome_alert_policies_info.py @@ -3,8 +3,8 @@ # # Dell OpenManage Ansible Modules -# Version 8.2.0 -# Copyright (C) 2023 Dell Inc. or its subsidiaries. All Rights Reserved. +# Version 9.3.0 +# Copyright (C) 2023-2024 Dell Inc. or its subsidiaries. All Rights Reserved. # GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) # @@ -129,8 +129,7 @@ error_info: ''' import json -from ansible.module_utils.basic import AnsibleModule -from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, ome_auth_params +from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, OmeAnsibleModule from ansible_collections.dellemc.openmanage.plugins.module_utils.utils import remove_key from ansible.module_utils.six.moves.urllib.error import URLError, HTTPError from ansible.module_utils.urls import ConnectionError, SSLValidationError @@ -182,13 +181,13 @@ class OMEAlertPolicyInfo: self.module.exit_json(msg=str(err), failed=True) -def get_module_parameters() -> AnsibleModule: +def get_module_parameters() -> OmeAnsibleModule: specs = { "policy_name": {"type": 'str'} } - specs.update(ome_auth_params) - module = AnsibleModule(argument_spec=specs, - supports_check_mode=True) + + module = OmeAnsibleModule(argument_spec=specs, + supports_check_mode=True) return module diff --git a/ansible_collections/dellemc/openmanage/plugins/modules/ome_alert_policies_message_id_info.py b/ansible_collections/dellemc/openmanage/plugins/modules/ome_alert_policies_message_id_info.py index 577eac7d0..3bde29a33 100644 --- a/ansible_collections/dellemc/openmanage/plugins/modules/ome_alert_policies_message_id_info.py +++ b/ansible_collections/dellemc/openmanage/plugins/modules/ome_alert_policies_message_id_info.py @@ -3,8 +3,8 @@ # # Dell OpenManage Ansible Modules -# Version 8.2.0 -# Copyright (C) 2023 Dell Inc. or its subsidiaries. All Rights Reserved. +# Version 9.3.0 +# Copyright (C) 2023-2024 Dell Inc. or its subsidiaries. All Rights Reserved. # GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) # @@ -105,8 +105,7 @@ error_info: import json from ssl import SSLError -from ansible.module_utils.basic import AnsibleModule -from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, ome_auth_params +from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, OmeAnsibleModule from ansible_collections.dellemc.openmanage.plugins.module_utils.utils import remove_key, get_all_data_with_pagination from ansible.module_utils.six.moves.urllib.error import URLError, HTTPError from ansible.module_utils.urls import ConnectionError, SSLValidationError @@ -117,8 +116,8 @@ EMPTY_MSG = "No alert policies message id information were found." def main(): - specs = ome_auth_params - module = AnsibleModule( + specs = {} + module = OmeAnsibleModule( argument_spec=specs, supports_check_mode=True ) diff --git a/ansible_collections/dellemc/openmanage/plugins/modules/ome_application_alerts_smtp.py b/ansible_collections/dellemc/openmanage/plugins/modules/ome_application_alerts_smtp.py index 58572bae0..855c7b022 100644 --- a/ansible_collections/dellemc/openmanage/plugins/modules/ome_application_alerts_smtp.py +++ b/ansible_collections/dellemc/openmanage/plugins/modules/ome_application_alerts_smtp.py @@ -3,8 +3,8 @@ # # Dell OpenManage Ansible Modules -# Version 7.0.0 -# Copyright (C) 2021-2022 Dell Inc. or its subsidiaries. All Rights Reserved. +# Version 9.3.0 +# Copyright (C) 2021-2024 Dell Inc. or its subsidiaries. All Rights Reserved. # GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) # @@ -57,7 +57,7 @@ options: type: str required: true requirements: - - "python >= 3.8.6" + - "python >= 3.9.6" notes: - The module will always report change when I(enable_authentication) is C(true). - Run this module from a system that has direct access to Dell OpenManage Enterprise @@ -139,10 +139,9 @@ error_info: import json from ssl import SSLError -from ansible.module_utils.basic import AnsibleModule from ansible.module_utils.six.moves.urllib.error import URLError, HTTPError from ansible.module_utils.urls import ConnectionError -from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, ome_auth_params +from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, OmeAnsibleModule from ansible.module_utils.common.dict_transformations import recursive_diff SUCCESS_MSG = "Successfully updated the SMTP settings." @@ -235,8 +234,8 @@ def main(): "options": credentials_options, }, } - specs.update(ome_auth_params) - module = AnsibleModule( + + module = OmeAnsibleModule( argument_spec=specs, required_if=[['enable_authentication', True, ['credentials']], ], supports_check_mode=True diff --git a/ansible_collections/dellemc/openmanage/plugins/modules/ome_application_alerts_syslog.py b/ansible_collections/dellemc/openmanage/plugins/modules/ome_application_alerts_syslog.py index a72093752..ecb20b336 100644 --- a/ansible_collections/dellemc/openmanage/plugins/modules/ome_application_alerts_syslog.py +++ b/ansible_collections/dellemc/openmanage/plugins/modules/ome_application_alerts_syslog.py @@ -3,8 +3,8 @@ # # Dell OpenManage Ansible Modules -# Version 7.0.0 -# Copyright (C) 2021-2022 Dell Inc. or its subsidiaries. All Rights Reserved. +# Version 9.3.0 +# Copyright (C) 2021-2024 Dell Inc. or its subsidiaries. All Rights Reserved. # GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) # @@ -44,7 +44,7 @@ options: description: The UDP port number of the syslog server. type: int requirements: - - "python >= 3.8.6" + - "python >= 3.9.6" author: - Jagadeesh N V(@jagadeeshnv) notes: @@ -152,10 +152,9 @@ error_info: import json from ssl import SSLError -from ansible.module_utils.basic import AnsibleModule from ansible.module_utils.six.moves.urllib.error import URLError, HTTPError from ansible.module_utils.urls import ConnectionError -from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, ome_auth_params +from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, OmeAnsibleModule from ansible.module_utils.common.dict_transformations import recursive_diff from ansible.module_utils.common.dict_transformations import snake_dict_to_camel_dict @@ -232,9 +231,8 @@ def main(): "required_if": [("enabled", True, ("destination_address",))] } } - specs.update(ome_auth_params) - module = AnsibleModule( + module = OmeAnsibleModule( argument_spec=specs, supports_check_mode=True ) diff --git a/ansible_collections/dellemc/openmanage/plugins/modules/ome_application_certificate.py b/ansible_collections/dellemc/openmanage/plugins/modules/ome_application_certificate.py index 60f170f76..b8283537c 100644 --- a/ansible_collections/dellemc/openmanage/plugins/modules/ome_application_certificate.py +++ b/ansible_collections/dellemc/openmanage/plugins/modules/ome_application_certificate.py @@ -3,8 +3,8 @@ # # Dell OpenManage Ansible Modules -# Version 8.3.0 -# Copyright (C) 2020-2023 Dell Inc. or its subsidiaries. All Rights Reserved. +# Version 9.3.0 +# Copyright (C) 2020-2024 Dell Inc. or its subsidiaries. All Rights Reserved. # GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) # @@ -159,8 +159,7 @@ error_info: import json import os -from ansible.module_utils.basic import AnsibleModule -from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, ome_auth_params +from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, OmeAnsibleModule from ansible.module_utils.six.moves.urllib.error import URLError, HTTPError from ansible.module_utils.urls import ConnectionError, SSLValidationError @@ -195,6 +194,21 @@ def get_san(subject_alternative_names): return subject_alternative_names.replace(" ", "") +def format_csr_string(csr_string): + # Remove the header and footer + csr_string = csr_string.replace("-----BEGIN CERTIFICATE REQUEST-----", "") + csr_string = csr_string.replace("-----END CERTIFICATE REQUEST-----", "") + csr_string = csr_string.replace("\n", "") + + # Format the remaining string with proper line breaks + formatted_csr = '\n'.join([csr_string[i:i + 64] for i in range(0, len(csr_string), 64)]) + + # Add the header and footer back + formatted_csr = "-----BEGIN CERTIFICATE REQUEST-----\n" + formatted_csr + "\n-----END CERTIFICATE REQUEST-----" + + return formatted_csr + + def main(): specs = { "command": {"type": "str", "required": False, @@ -209,8 +223,8 @@ def main(): "upload_file": {"required": False, "type": "str"}, "subject_alternative_names": {"required": False, "type": "str"} } - specs.update(ome_auth_params) - module = AnsibleModule( + + module = OmeAnsibleModule( argument_spec=specs, required_if=[["command", "generate_csr", ["distinguished_name", "department_name", "business_name", "locality", "country_state", @@ -228,8 +242,11 @@ def main(): resp = rest_obj.invoke_request(method, uri, headers=headers, data=payload, dump=dump) if resp.success: if command == "generate_csr": + resp_copy = resp.json_data + formated_csr = format_csr_string(resp_copy["CertificateData"]) + resp_copy["CertificateData"] = formated_csr module.exit_json(msg="Successfully generated certificate signing request.", - csr_status=resp.json_data) + csr_status=resp_copy) module.exit_json(msg="Successfully uploaded application certificate.", changed=True) except HTTPError as err: module.fail_json(msg=str(err), error_info=json.load(err)) diff --git a/ansible_collections/dellemc/openmanage/plugins/modules/ome_application_console_preferences.py b/ansible_collections/dellemc/openmanage/plugins/modules/ome_application_console_preferences.py index 760546f02..93c0b9af2 100644 --- a/ansible_collections/dellemc/openmanage/plugins/modules/ome_application_console_preferences.py +++ b/ansible_collections/dellemc/openmanage/plugins/modules/ome_application_console_preferences.py @@ -3,7 +3,7 @@ # # Dell OpenManage Ansible Modules -# Version 9.1.0 +# Version 9.3.0 # Copyright (C) 2022-2024 Dell Inc. or its subsidiaries. All Rights Reserved. # GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) @@ -365,10 +365,9 @@ error_info: import json from ssl import SSLError -from ansible.module_utils.basic import AnsibleModule from ansible.module_utils.six.moves.urllib.error import URLError, HTTPError from ansible.module_utils.urls import ConnectionError -from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, ome_auth_params +from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, OmeAnsibleModule from ansible_collections.dellemc.openmanage.plugins.module_utils.utils import strip_substr_dict SUCCESS_MSG = "Successfully updated the Console Preferences settings." @@ -631,13 +630,13 @@ def main(): "trap_forwarding_format": {"required": False, "type": "str", "choices": ["Normalized", "Original"]}, "metrics_collection_settings": {"required": False, "type": "int"}, } - specs.update(ome_auth_params) - module = AnsibleModule(argument_spec=specs, - required_one_of=[["report_row_limit", "device_health", "discovery_settings", - "server_initiated_discovery", "mx7000_onboarding_preferences", - "builtin_appliance_share", "email_sender_settings", - "trap_forwarding_format", "metrics_collection_settings"]], - supports_check_mode=True, ) + + module = OmeAnsibleModule(argument_spec=specs, + required_one_of=[["report_row_limit", "device_health", "discovery_settings", + "server_initiated_discovery", "mx7000_onboarding_preferences", + "builtin_appliance_share", "email_sender_settings", + "trap_forwarding_format", "metrics_collection_settings"]], + supports_check_mode=True) try: _validate_params(module) diff --git a/ansible_collections/dellemc/openmanage/plugins/modules/ome_application_network_address.py b/ansible_collections/dellemc/openmanage/plugins/modules/ome_application_network_address.py index ab8814a42..bdea896f4 100644 --- a/ansible_collections/dellemc/openmanage/plugins/modules/ome_application_network_address.py +++ b/ansible_collections/dellemc/openmanage/plugins/modules/ome_application_network_address.py @@ -3,8 +3,8 @@ # # Dell OpenManage Ansible Modules -# Version 7.0.0 -# Copyright (C) 2020-2022 Dell Inc. or its subsidiaries. All Rights Reserved. +# Version 9.3.0 +# Copyright (C) 2020-2024 Dell Inc. or its subsidiaries. All Rights Reserved. # GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) # @@ -182,7 +182,7 @@ options: - This option is not mandatory. type: int requirements: - - "python >= 3.8.6" + - "python >= 3.9.6" author: - "Jagadeesh N V(@jagadeeshnv)" ''' @@ -426,8 +426,7 @@ error_info: import json import socket from ssl import SSLError -from ansible.module_utils.basic import AnsibleModule -from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, ome_auth_params +from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, OmeAnsibleModule from ansible.module_utils.urls import ConnectionError, SSLValidationError from ansible.module_utils.six.moves.urllib.error import URLError, HTTPError @@ -716,8 +715,8 @@ def main(): }, "reboot_delay": {"required": False, "type": "int"} } - specs.update(ome_auth_params) - module = AnsibleModule( + + module = OmeAnsibleModule( argument_spec=specs, required_if=[ ["enable_nic", True, diff --git a/ansible_collections/dellemc/openmanage/plugins/modules/ome_application_network_proxy.py b/ansible_collections/dellemc/openmanage/plugins/modules/ome_application_network_proxy.py index 0ca58de09..76ee7c961 100644 --- a/ansible_collections/dellemc/openmanage/plugins/modules/ome_application_network_proxy.py +++ b/ansible_collections/dellemc/openmanage/plugins/modules/ome_application_network_proxy.py @@ -3,8 +3,8 @@ # # Dell OpenManage Ansible Modules -# Version 7.0.0 -# Copyright (C) 2020-2022 Dell Inc. or its subsidiaries. All Rights Reserved. +# Version 9.3.0 +# Copyright (C) 2020-2024 Dell Inc. or its subsidiaries. All Rights Reserved. # GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) # @@ -56,7 +56,7 @@ options: - This option is mandatory when I(enable_authentication) is true. type: str requirements: - - "python >= 3.8.6" + - "python >= 3.9.6" author: - "Sajna Shetty(@Sajna-Shetty)" notes: @@ -145,8 +145,7 @@ error_info: import json from ssl import SSLError -from ansible.module_utils.basic import AnsibleModule -from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, ome_auth_params +from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, OmeAnsibleModule from ansible.module_utils.urls import ConnectionError, SSLValidationError from ansible.module_utils.six.moves.urllib.error import URLError, HTTPError @@ -225,8 +224,8 @@ def main(): "proxy_password": {"required": False, "type": "str", "no_log": True}, "enable_authentication": {"required": False, "type": "bool"}, } - specs.update(ome_auth_params) - module = AnsibleModule( + + module = OmeAnsibleModule( argument_spec=specs, required_if=[['enable_proxy', True, ['ip_address', 'proxy_port']], ['enable_authentication', True, ['proxy_username', 'proxy_password']], ], diff --git a/ansible_collections/dellemc/openmanage/plugins/modules/ome_application_network_settings.py b/ansible_collections/dellemc/openmanage/plugins/modules/ome_application_network_settings.py index 91a0de1d7..d14388e95 100644 --- a/ansible_collections/dellemc/openmanage/plugins/modules/ome_application_network_settings.py +++ b/ansible_collections/dellemc/openmanage/plugins/modules/ome_application_network_settings.py @@ -3,8 +3,8 @@ # # Dell OpenManage Ansible Modules -# Version 7.0.0 -# Copyright (C) 2021-2022 Dell Inc. or its subsidiaries. All Rights Reserved. +# Version 9.3.0 +# Copyright (C) 2021-2024 Dell Inc. or its subsidiaries. All Rights Reserved. # GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) # @@ -81,7 +81,7 @@ options: - This is applicable only for OpenManage Enterprise Modular. type: int requirements: - - "python >= 3.8.6" + - "python >= 3.9.6" notes: - Run this module from a system that has direct access to Dell OpenManage Enterprise or OpenManage Enterprise Modular. @@ -250,10 +250,9 @@ error_info: import json from ssl import SSLError -from ansible.module_utils.basic import AnsibleModule from ansible.module_utils.six.moves.urllib.error import URLError, HTTPError from ansible.module_utils.urls import ConnectionError -from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, ome_auth_params +from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, OmeAnsibleModule SUCCESS_MSG = "Successfully updated the session timeout settings." SESSION_INACTIVITY_GET = "SessionService/SessionConfiguration" @@ -355,9 +354,8 @@ def main(): ] } } - specs.update(ome_auth_params) - module = AnsibleModule( + module = OmeAnsibleModule( argument_spec=specs, supports_check_mode=True ) diff --git a/ansible_collections/dellemc/openmanage/plugins/modules/ome_application_network_time.py b/ansible_collections/dellemc/openmanage/plugins/modules/ome_application_network_time.py index baf533c0a..c206b59a4 100644 --- a/ansible_collections/dellemc/openmanage/plugins/modules/ome_application_network_time.py +++ b/ansible_collections/dellemc/openmanage/plugins/modules/ome_application_network_time.py @@ -3,8 +3,8 @@ # # Dell OpenManage Ansible Modules -# Version 7.0.0 -# Copyright (C) 2020-2022 Dell Inc. or its subsidiaries. All Rights Reserved. +# Version 9.3.0 +# Copyright (C) 2020-2024 Dell Inc. or its subsidiaries. All Rights Reserved. # GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) # @@ -55,7 +55,7 @@ options: - This option is applicable when I(enable_ntp) is true. type: str requirements: - - "python >= 3.8.6" + - "python >= 3.9.6" author: - "Sajna Shetty(@Sajna-Shetty)" notes: @@ -139,8 +139,7 @@ error_info: import json from ssl import SSLError -from ansible.module_utils.basic import AnsibleModule -from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, ome_auth_params +from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, OmeAnsibleModule from ansible.module_utils.urls import ConnectionError, SSLValidationError from ansible.module_utils.six.moves.urllib.error import URLError, HTTPError @@ -230,8 +229,8 @@ def main(): "secondary_ntp_address1": {"required": False, "type": "str"}, "secondary_ntp_address2": {"required": False, "type": "str"}, } - specs.update(ome_auth_params) - module = AnsibleModule( + + module = OmeAnsibleModule( argument_spec=specs, required_if=[['enable_ntp', False, ('time_zone', 'system_time',), True], ['enable_ntp', True, ('time_zone', 'primary_ntp_address', diff --git a/ansible_collections/dellemc/openmanage/plugins/modules/ome_application_network_webserver.py b/ansible_collections/dellemc/openmanage/plugins/modules/ome_application_network_webserver.py index 9e6cdffd5..f012fa977 100644 --- a/ansible_collections/dellemc/openmanage/plugins/modules/ome_application_network_webserver.py +++ b/ansible_collections/dellemc/openmanage/plugins/modules/ome_application_network_webserver.py @@ -3,8 +3,8 @@ # # Dell OpenManage Ansible Modules -# Version 7.0.0 -# Copyright (C) 2020-2022 Dell Inc. or its subsidiaries. All Rights Reserved. +# Version 9.3.0 +# Copyright (C) 2020-2024 Dell Inc. or its subsidiaries. All Rights Reserved. # GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) # @@ -35,7 +35,7 @@ options: - If a change is made to the session timeout, it will only take effect after the next log in. type: int requirements: - - "python >= 3.8.6" + - "python >= 3.9.6" author: - "Jagadeesh N V(@jagadeeshnv)" notes: @@ -114,8 +114,7 @@ error_info: import json from ssl import SSLError -from ansible.module_utils.basic import AnsibleModule -from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, ome_auth_params +from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, OmeAnsibleModule from ansible.module_utils.urls import ConnectionError, SSLValidationError from ansible.module_utils.six.moves.urllib.error import URLError, HTTPError @@ -162,8 +161,8 @@ def main(): "webserver_port": {"required": False, "type": "int"}, "webserver_timeout": {"required": False, "type": "int"}, } - specs.update(ome_auth_params) - module = AnsibleModule( + + module = OmeAnsibleModule( argument_spec=specs, required_one_of=[["webserver_port", "webserver_timeout"]], supports_check_mode=True diff --git a/ansible_collections/dellemc/openmanage/plugins/modules/ome_application_security_settings.py b/ansible_collections/dellemc/openmanage/plugins/modules/ome_application_security_settings.py index af869fb16..f75554f02 100644 --- a/ansible_collections/dellemc/openmanage/plugins/modules/ome_application_security_settings.py +++ b/ansible_collections/dellemc/openmanage/plugins/modules/ome_application_security_settings.py @@ -3,8 +3,8 @@ # # Dell OpenManage Ansible Modules -# Version 7.0.0 -# Copyright (C) 2021-2022 Dell Inc. or its subsidiaries. All Rights Reserved. +# Version 9.3.0 +# Copyright (C) 2021-2024 Dell Inc. or its subsidiaries. All Rights Reserved. # GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) # @@ -94,7 +94,7 @@ options: author: - Jagadeesh N V(@jagadeeshnv) requirements: - - "python >= 3.8.6" + - "python >= 3.9.6" notes: - Run this module from a system that has direct access to Dell OpenManage Enterprise or OpenManage Enterprise Modular. - This module supports C(check_mode). @@ -202,8 +202,7 @@ JOB_POLL_INTERVAL = 3 import json import time from ssl import SSLError -from ansible.module_utils.basic import AnsibleModule -from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, ome_auth_params +from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, OmeAnsibleModule from ansible.module_utils.six.moves.urllib.error import URLError, HTTPError from ansible.module_utils.urls import ConnectionError, SSLValidationError @@ -333,9 +332,8 @@ def main(): "job_wait": {"type": 'bool', "default": True}, "job_wait_timeout": {"type": 'int', "default": 120} } - specs.update(ome_auth_params) - module = AnsibleModule( + module = OmeAnsibleModule( argument_spec=specs, mutually_exclusive=[("fips_mode_enable", "login_lockout_policy"), ("fips_mode_enable", "restrict_allowed_ip_range")], diff --git a/ansible_collections/dellemc/openmanage/plugins/modules/ome_chassis_slots.py b/ansible_collections/dellemc/openmanage/plugins/modules/ome_chassis_slots.py index adcc53566..65274ec5b 100644 --- a/ansible_collections/dellemc/openmanage/plugins/modules/ome_chassis_slots.py +++ b/ansible_collections/dellemc/openmanage/plugins/modules/ome_chassis_slots.py @@ -3,8 +3,8 @@ # # Dell OpenManage Ansible Modules -# Version 7.0.0 -# Copyright (C) 2021-2022 Dell Inc. or its subsidiaries. All Rights Reserved. +# Version 9.3.0 +# Copyright (C) 2021-2024 Dell Inc. or its subsidiaries. All Rights Reserved. # GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) # @@ -72,7 +72,7 @@ options: description: Provide name for the slot. required: true requirements: - - "python >= 3.8.6" + - "python >= 3.9.6" notes: - "This module initiates the refresh inventory task. It may take a minute for new names to be reflected. If the task exceeds 300 seconds to refresh, the task times out." @@ -254,10 +254,9 @@ error_info: import json import time from ssl import SSLError -from ansible.module_utils.basic import AnsibleModule from ansible.module_utils.six.moves.urllib.error import URLError, HTTPError from ansible.module_utils.urls import ConnectionError -from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, ome_auth_params +from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, OmeAnsibleModule from ansible.module_utils.common.dict_transformations import recursive_diff DEVICE_URI = "DeviceService/Devices" @@ -578,8 +577,8 @@ def main(): }, }, } - specs.update(ome_auth_params) - module = AnsibleModule( + + module = OmeAnsibleModule( argument_spec=specs, required_one_of=[('slot_options', 'device_options')], mutually_exclusive=[('slot_options', 'device_options')], diff --git a/ansible_collections/dellemc/openmanage/plugins/modules/ome_configuration_compliance_baseline.py b/ansible_collections/dellemc/openmanage/plugins/modules/ome_configuration_compliance_baseline.py index fa0f2a90a..31f4f6ed1 100644 --- a/ansible_collections/dellemc/openmanage/plugins/modules/ome_configuration_compliance_baseline.py +++ b/ansible_collections/dellemc/openmanage/plugins/modules/ome_configuration_compliance_baseline.py @@ -3,8 +3,8 @@ # # Dell OpenManage Ansible Modules -# Version 7.6.0 -# Copyright (C) 2021-2023 Dell Inc. or its subsidiaries. All Rights Reserved. +# Version 9.3.0 +# Copyright (C) 2021-2024 Dell Inc. or its subsidiaries. All Rights Reserved. # GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) # @@ -106,7 +106,7 @@ options: type: int default: 10800 requirements: - - "python >= 3.8.6" + - "python >= 3.9.6" author: - "Sajna Shetty(@Sajna-Shetty)" - "Abhishek Sinha(@Abhishek-Dell)" @@ -291,8 +291,7 @@ error_info: import json import time from ssl import SSLError -from ansible.module_utils.basic import AnsibleModule -from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, ome_auth_params +from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, OmeAnsibleModule from ansible.module_utils.six.moves.urllib.error import URLError, HTTPError from ansible.module_utils.urls import ConnectionError, SSLValidationError from ansible.module_utils.compat.version import LooseVersion @@ -811,8 +810,8 @@ def main(): "job_wait_timeout": {"required": False, "type": 'int', "default": 10800}, "new_name": {"type": 'str'}, } - specs.update(ome_auth_params) - module = AnsibleModule( + + module = OmeAnsibleModule( argument_spec=specs, required_if=[ ['command', 'create', ['template_name', 'template_id'], True], diff --git a/ansible_collections/dellemc/openmanage/plugins/modules/ome_configuration_compliance_info.py b/ansible_collections/dellemc/openmanage/plugins/modules/ome_configuration_compliance_info.py index 8132ffe9d..39c202f92 100644 --- a/ansible_collections/dellemc/openmanage/plugins/modules/ome_configuration_compliance_info.py +++ b/ansible_collections/dellemc/openmanage/plugins/modules/ome_configuration_compliance_info.py @@ -3,8 +3,8 @@ # # Dell OpenManage Ansible Modules -# Version 6.1.0 -# Copyright (C) 2021-2022 Dell Inc. or its subsidiaries. All Rights Reserved. +# Version 9.3.0 +# Copyright (C) 2021-2024 Dell Inc. or its subsidiaries. All Rights Reserved. # GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) # @@ -42,7 +42,7 @@ options: - I(device_service_tag) is mutually exclusive with I(device_id). type: str requirements: - - "python >= 3.8.6" + - "python >= 3.9.6" author: - "Felix Stephen A (@felixs88)" - "Kritika Bhateja (@Kritika-Bhateja)" @@ -148,8 +148,7 @@ error_info: import json from ssl import SSLError -from ansible.module_utils.basic import AnsibleModule -from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, ome_auth_params +from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, OmeAnsibleModule from ansible.module_utils.six.moves.urllib.error import URLError, HTTPError from ansible.module_utils.urls import ConnectionError, SSLValidationError @@ -222,8 +221,8 @@ def main(): "device_id": {"required": False, "type": "int"}, "device_service_tag": {"required": False, "type": "str"}, } - specs.update(ome_auth_params) - module = AnsibleModule( + + module = OmeAnsibleModule( argument_spec=specs, mutually_exclusive=[["device_id", "device_service_tag"]], supports_check_mode=True diff --git a/ansible_collections/dellemc/openmanage/plugins/modules/ome_device_group.py b/ansible_collections/dellemc/openmanage/plugins/modules/ome_device_group.py index f6a085cd9..49bb23d96 100644 --- a/ansible_collections/dellemc/openmanage/plugins/modules/ome_device_group.py +++ b/ansible_collections/dellemc/openmanage/plugins/modules/ome_device_group.py @@ -3,8 +3,8 @@ # # Dell OpenManage Ansible Modules -# Version 6.1.0 -# Copyright (C) 2021-2022 Dell Inc. or its subsidiaries. All Rights Reserved. +# Version 9.3.0 +# Copyright (C) 2021-2024 Dell Inc. or its subsidiaries. All Rights Reserved. # GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) # @@ -70,7 +70,7 @@ options: available in OpenManage Enterprise.The module reports failure only if none of the IP addresses provided in the list are available in OpenManage Enterprise. requirements: - - "python >= 3.8.6" + - "python >= 3.9.6" - "netaddr >= 0.7.19" author: - "Felix Stephen (@felixs88)" @@ -277,8 +277,7 @@ error_info: import json from ssl import SSLError -from ansible.module_utils.basic import AnsibleModule -from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, ome_auth_params +from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, OmeAnsibleModule from ansible.module_utils.six.moves.urllib.error import URLError, HTTPError from ansible.module_utils.urls import ConnectionError @@ -480,16 +479,16 @@ def main(): "device_ids": {"required": False, "type": "list", "elements": 'int'}, "ip_addresses": {"required": False, "type": "list", "elements": 'str'}, } - specs.update(ome_auth_params) - module = AnsibleModule( + + module = OmeAnsibleModule( argument_spec=specs, - required_if=( + required_if=[ ["state", "present", ("device_ids", "device_service_tags", "ip_addresses"), True], - ), - mutually_exclusive=( + ], + mutually_exclusive=[ ("name", "group_id"), ("device_ids", "device_service_tags", "ip_addresses"), - ), + ], required_one_of=[("name", "group_id"), ("device_ids", "device_service_tags", "ip_addresses")], supports_check_mode=True diff --git a/ansible_collections/dellemc/openmanage/plugins/modules/ome_device_info.py b/ansible_collections/dellemc/openmanage/plugins/modules/ome_device_info.py index 62430402c..ee1ca2c46 100644 --- a/ansible_collections/dellemc/openmanage/plugins/modules/ome_device_info.py +++ b/ansible_collections/dellemc/openmanage/plugins/modules/ome_device_info.py @@ -3,8 +3,8 @@ # # Dell OpenManage Ansible Modules -# Version 8.1.0 -# Copyright (C) 2019-2023 Dell Inc. or its subsidiaries. All Rights Reserved. +# Version 9.3.0 +# Copyright (C) 2019-2024 Dell Inc. or its subsidiaries. All Rights Reserved. # GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) # @@ -59,7 +59,7 @@ options: type: str requirements: - - "python >= 3.8.6" + - "python >= 3.9.6" author: - "Sajna Shetty (@Sajna-Shetty)" - "Felix Stephen (@felixs88)" @@ -195,8 +195,8 @@ device_info: ''' from ssl import SSLError -from ansible.module_utils.basic import AnsibleModule -from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, ome_auth_params + +from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, OmeAnsibleModule from ansible_collections.dellemc.openmanage.plugins.module_utils.utils import get_all_data_with_pagination from ansible.module_utils.six.moves.urllib.error import URLError, HTTPError from ansible.module_utils.urls import ConnectionError, SSLValidationError @@ -376,8 +376,8 @@ def main(): "choices": ['basic_inventory', 'detailed_inventory', 'subsystem_health']}, "system_query_options": system_query_options, } - specs.update(ome_auth_params) - module = AnsibleModule( + + module = OmeAnsibleModule( argument_spec=specs, required_if=[['fact_subset', 'detailed_inventory', ['system_query_options']], ['fact_subset', 'subsystem_health', ['system_query_options']]], diff --git a/ansible_collections/dellemc/openmanage/plugins/modules/ome_device_local_access_configuration.py b/ansible_collections/dellemc/openmanage/plugins/modules/ome_device_local_access_configuration.py index c6245a6de..7cec5d985 100644 --- a/ansible_collections/dellemc/openmanage/plugins/modules/ome_device_local_access_configuration.py +++ b/ansible_collections/dellemc/openmanage/plugins/modules/ome_device_local_access_configuration.py @@ -3,7 +3,7 @@ # # Dell OpenManage Ansible Modules -# Version 9.1.0 +# Version 9.3.0 # Copyright (C) 2022-2024 Dell Inc. or its subsidiaries. All Rights Reserved. # GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) @@ -261,10 +261,9 @@ import json import socket import copy from ssl import SSLError -from ansible.module_utils.basic import AnsibleModule from ansible.module_utils.six.moves.urllib.error import URLError, HTTPError from ansible.module_utils.urls import ConnectionError -from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, ome_auth_params +from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, OmeAnsibleModule DOMAIN_URI = "ManagementDomainService/Domains" DEVICE_URI = "DeviceService/Devices" @@ -450,8 +449,8 @@ def main(): "required": False, "type": "dict", "options": lcd_options, }, } - specs.update(ome_auth_params) - module = AnsibleModule( + + module = OmeAnsibleModule( argument_spec=specs, mutually_exclusive=[('device_id', 'device_service_tag')], required_one_of=[["enable_kvm_access", "enable_chassis_direct_access", diff --git a/ansible_collections/dellemc/openmanage/plugins/modules/ome_device_location.py b/ansible_collections/dellemc/openmanage/plugins/modules/ome_device_location.py index 9c73b7c46..a03ba5116 100644 --- a/ansible_collections/dellemc/openmanage/plugins/modules/ome_device_location.py +++ b/ansible_collections/dellemc/openmanage/plugins/modules/ome_device_location.py @@ -3,8 +3,8 @@ # # Dell OpenManage Ansible Modules -# Version 7.0.0 -# Copyright (C) 2021-2022 Dell Inc. or its subsidiaries. All Rights Reserved. +# Version 9.3.0 +# Copyright (C) 2021-2024 Dell Inc. or its subsidiaries. All Rights Reserved. # GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) # @@ -55,7 +55,7 @@ options: type: str description: The physical location of the chassis. requirements: - - "python >= 3.8.6" + - "python >= 3.9.6" author: - "Felix Stephen (@felixs88)" notes: @@ -153,10 +153,9 @@ error_info: import json import socket from ssl import SSLError -from ansible.module_utils.basic import AnsibleModule from ansible.module_utils.six.moves.urllib.error import URLError, HTTPError from ansible.module_utils.urls import ConnectionError -from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, ome_auth_params +from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, OmeAnsibleModule LOCATION_API = "DeviceService/Devices({0})/Settings('Location')" DEVICE_URI = "DeviceService/Devices" @@ -278,8 +277,8 @@ def main(): "rack_slot": {"required": False, "type": "int"}, "location": {"required": False, "type": "str"}, } - specs.update(ome_auth_params) - module = AnsibleModule( + + module = OmeAnsibleModule( argument_spec=specs, mutually_exclusive=[('device_id', 'device_service_tag')], supports_check_mode=True diff --git a/ansible_collections/dellemc/openmanage/plugins/modules/ome_device_mgmt_network.py b/ansible_collections/dellemc/openmanage/plugins/modules/ome_device_mgmt_network.py index 0d4b0a483..a7d5477a5 100644 --- a/ansible_collections/dellemc/openmanage/plugins/modules/ome_device_mgmt_network.py +++ b/ansible_collections/dellemc/openmanage/plugins/modules/ome_device_mgmt_network.py @@ -3,8 +3,8 @@ # # Dell OpenManage Ansible Modules -# Version 7.0.0 -# Copyright (C) 2021-2022 Dell Inc. or its subsidiaries. All Rights Reserved. +# Version 9.3.0 +# Copyright (C) 2021-2024 Dell Inc. or its subsidiaries. All Rights Reserved. # GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) # @@ -229,7 +229,7 @@ options: - Enter the IP address of the second alternate DNS server. type: str requirements: - - "python >= 3.8.6" + - "python >= 3.9.6" notes: - Run this module from a system that has direct access to Dell OpenManage Enterprise Modular. - This module supports C(check_mode). @@ -370,10 +370,9 @@ import json import socket import copy from ssl import SSLError -from ansible.module_utils.basic import AnsibleModule from ansible.module_utils.six.moves.urllib.error import URLError, HTTPError from ansible.module_utils.urls import ConnectionError -from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, ome_auth_params +from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, OmeAnsibleModule from ansible.module_utils.common.dict_transformations import recursive_diff DEVICE_URI = "DeviceService/Devices" @@ -748,8 +747,8 @@ def main(): "required_one_of": [("preferred_dns_server", "alternate_dns_server1", "alternate_dns_server2")] } } - specs.update(ome_auth_params) - module = AnsibleModule( + + module = OmeAnsibleModule( argument_spec=specs, required_one_of=[('device_id', 'device_service_tag')], mutually_exclusive=[('device_id', 'device_service_tag')], diff --git a/ansible_collections/dellemc/openmanage/plugins/modules/ome_device_network_services.py b/ansible_collections/dellemc/openmanage/plugins/modules/ome_device_network_services.py index 6d1518b34..d91d6e136 100644 --- a/ansible_collections/dellemc/openmanage/plugins/modules/ome_device_network_services.py +++ b/ansible_collections/dellemc/openmanage/plugins/modules/ome_device_network_services.py @@ -3,8 +3,8 @@ # # Dell OpenManage Ansible Modules -# Version 7.0.0 -# Copyright (C) 2021-2022 Dell Inc. or its subsidiaries. All Rights Reserved. +# Version 9.3.0 +# Copyright (C) 2021-2024 Dell Inc. or its subsidiaries. All Rights Reserved. # GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) # @@ -79,7 +79,7 @@ options: required: true description: Enables or disables the remote RACADM settings. requirements: - - "python >= 3.8.6" + - "python >= 3.9.6" author: - "Felix Stephen (@felixs88)" notes: @@ -192,10 +192,9 @@ error_info: import json import socket from ssl import SSLError -from ansible.module_utils.basic import AnsibleModule from ansible.module_utils.six.moves.urllib.error import URLError, HTTPError from ansible.module_utils.urls import ConnectionError -from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, ome_auth_params +from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, OmeAnsibleModule DOMAIN_URI = "ManagementDomainService/Domains" DEVICE_URI = "DeviceService/Devices" @@ -369,8 +368,8 @@ def main(): "ssh_settings": {"type": "dict", "required": False, "options": ssh_options}, "remote_racadm_settings": {"type": "dict", "required": False, "options": racadm_options}, } - specs.update(ome_auth_params) - module = AnsibleModule( + + module = OmeAnsibleModule( argument_spec=specs, mutually_exclusive=[('device_id', 'device_service_tag')], required_one_of=[["snmp_settings", "ssh_settings", "remote_racadm_settings"]], diff --git a/ansible_collections/dellemc/openmanage/plugins/modules/ome_device_power_settings.py b/ansible_collections/dellemc/openmanage/plugins/modules/ome_device_power_settings.py index f0587791e..9bab4de02 100644 --- a/ansible_collections/dellemc/openmanage/plugins/modules/ome_device_power_settings.py +++ b/ansible_collections/dellemc/openmanage/plugins/modules/ome_device_power_settings.py @@ -3,8 +3,8 @@ # # Dell OpenManage Ansible Modules -# Version 7.0.0 -# Copyright (C) 2021-2022 Dell Inc. or its subsidiaries. All Rights Reserved. +# Version 9.3.0 +# Copyright (C) 2021-2024 Dell Inc. or its subsidiaries. All Rights Reserved. # GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) # @@ -77,7 +77,7 @@ options: choices: ['GRID_1', 'GRID_2'] default: GRID_1 requirements: - - "python >= 3.8.6" + - "python >= 3.9.6" author: - "Felix Stephen (@felixs88)" notes: @@ -168,10 +168,9 @@ import json import socket import copy from ssl import SSLError -from ansible.module_utils.basic import AnsibleModule from ansible.module_utils.six.moves.urllib.error import URLError, HTTPError from ansible.module_utils.urls import ConnectionError -from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, ome_auth_params +from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, OmeAnsibleModule POWER_API = "DeviceService/Devices({0})/Settings('Power')" DEVICE_URI = "DeviceService/Devices" DOMAIN_URI = "ManagementDomainService/Domains" @@ -314,8 +313,8 @@ def main(): "hot_spare_configuration": {"type": "dict", "required": False, "options": hot_spare_options, "required_if": [["enable_hot_spare", True, ("primary_grid",)]]}, } - specs.update(ome_auth_params) - module = AnsibleModule( + + module = OmeAnsibleModule( argument_spec=specs, mutually_exclusive=[('device_id', 'device_service_tag')], required_one_of=[["power_configuration", "redundancy_configuration", "hot_spare_configuration"]], diff --git a/ansible_collections/dellemc/openmanage/plugins/modules/ome_device_quick_deploy.py b/ansible_collections/dellemc/openmanage/plugins/modules/ome_device_quick_deploy.py index 7d45bf7e9..d343576be 100644 --- a/ansible_collections/dellemc/openmanage/plugins/modules/ome_device_quick_deploy.py +++ b/ansible_collections/dellemc/openmanage/plugins/modules/ome_device_quick_deploy.py @@ -3,7 +3,7 @@ # # Dell OpenManage Ansible Modules -# Version 9.1.0 +# Version 9.3.0 # Copyright (C) 2022-2024 Dell Inc. or its subsidiaries. All Rights Reserved. # GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) @@ -349,10 +349,9 @@ import copy import json import socket from ssl import SSLError -from ansible.module_utils.basic import AnsibleModule from ansible.module_utils.six.moves.urllib.error import URLError, HTTPError from ansible.module_utils.urls import ConnectionError -from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, ome_auth_params +from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, OmeAnsibleModule DOMAIN_URI = "ManagementDomainService/Domains" DEVICE_URI = "DeviceService/Devices" @@ -663,10 +662,10 @@ def main(): "job_wait": {"type": "bool", "default": True}, "job_wait_timeout": {"type": "int", "default": 120}, } - specs.update(ome_auth_params) - module = AnsibleModule(argument_spec=specs, - mutually_exclusive=[('device_id', 'device_service_tag')], - supports_check_mode=True,) + + module = OmeAnsibleModule(argument_spec=specs, + mutually_exclusive=[('device_id', 'device_service_tag')], + supports_check_mode=True,) if module.params["quick_deploy_options"] is None: module.exit_json(msg="missing required arguments: quick_deploy_options", failed=True) fields = [("ipv4_subnet_mask", "IPV4"), ("ipv4_gateway", "IPV4"), ("ipv6_gateway", "IPV6")] diff --git a/ansible_collections/dellemc/openmanage/plugins/modules/ome_devices.py b/ansible_collections/dellemc/openmanage/plugins/modules/ome_devices.py index 2dc7b625d..0b8181932 100644 --- a/ansible_collections/dellemc/openmanage/plugins/modules/ome_devices.py +++ b/ansible_collections/dellemc/openmanage/plugins/modules/ome_devices.py @@ -3,7 +3,7 @@ # # Dell OpenManage Ansible Modules -# Version 9.1.0 +# Version 9.3.0 # Copyright (C) 2022-2024 Dell Inc. or its subsidiaries. All Rights Reserved. # GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) @@ -230,10 +230,9 @@ error_info: import json from ssl import SSLError -from ansible.module_utils.basic import AnsibleModule from ansible.module_utils.six.moves.urllib.error import URLError, HTTPError from ansible.module_utils.urls import ConnectionError -from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, ome_auth_params +from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, OmeAnsibleModule from ansible_collections.dellemc.openmanage.plugins.module_utils.utils import strip_substr_dict, job_tracking from ansible_collections.dellemc.openmanage.plugins.module_utils.utils import CHANGES_MSG, NO_CHANGES_MSG @@ -410,8 +409,8 @@ def main(): "job_description": {"type": "str"}, # "job_params": {"type": "dict"} } - specs.update(ome_auth_params) - module = AnsibleModule( + + module = OmeAnsibleModule( argument_spec=specs, required_if=[], mutually_exclusive=[ diff --git a/ansible_collections/dellemc/openmanage/plugins/modules/ome_diagnostics.py b/ansible_collections/dellemc/openmanage/plugins/modules/ome_diagnostics.py index b16604c3c..64650b9ff 100644 --- a/ansible_collections/dellemc/openmanage/plugins/modules/ome_diagnostics.py +++ b/ansible_collections/dellemc/openmanage/plugins/modules/ome_diagnostics.py @@ -3,8 +3,8 @@ # # Dell OpenManage Ansible Modules -# Version 8.2.0 -# Copyright (C) 2021-2023 Dell Inc. or its subsidiaries. All Rights Reserved. +# Version 9.3.0 +# Copyright (C) 2021-2024 Dell Inc. or its subsidiaries. All Rights Reserved. # GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) # @@ -128,7 +128,7 @@ options: - I(lead_chassis_only) is only applicable when I(log_type) is C(application) on OpenManage Enterprise Modular. default: false requirements: - - "python >= 3.8.6" + - "python >= 3.9.6" author: - "Felix Stephen (@felixs88)" - "Sachin Apagundi(@sachin-apa)" @@ -267,8 +267,7 @@ error_info: import json import re from ssl import SSLError -from ansible.module_utils.basic import AnsibleModule -from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, ome_auth_params +from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, OmeAnsibleModule from ansible.module_utils.six.moves.urllib.error import URLError, HTTPError from ansible.module_utils.urls import ConnectionError, SSLValidationError LOG_SELECTOR = {"OS_LOGS": 1, "RAID_LOGS": 2, "DEBUG_LOGS": 3} @@ -431,8 +430,8 @@ def main(): "test_connection": {"required": False, "type": "bool", "default": False}, "lead_chassis_only": {"required": False, "type": "bool", "default": False}, } - specs.update(ome_auth_params) - module = AnsibleModule( + + module = OmeAnsibleModule( argument_spec=specs, required_if=[ ['log_type', 'application', ['mask_sensitive_info']], diff --git a/ansible_collections/dellemc/openmanage/plugins/modules/ome_discovery.py b/ansible_collections/dellemc/openmanage/plugins/modules/ome_discovery.py index f50d8f25e..f0747d5d1 100644 --- a/ansible_collections/dellemc/openmanage/plugins/modules/ome_discovery.py +++ b/ansible_collections/dellemc/openmanage/plugins/modules/ome_discovery.py @@ -3,8 +3,8 @@ # # Dell OpenManage Ansible Modules -# Version 8.1.0 -# Copyright (C) 2021-2023 Dell Inc. or its subsidiaries. All Rights Reserved. +# Version 9.3.0 +# Copyright (C) 2021-2024 Dell Inc. or its subsidiaries. All Rights Reserved. # GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) # @@ -366,7 +366,7 @@ options: description: KgKey for the IPMI protocol. type: str requirements: - - "python >= 3.8.6" + - "python >= 3.9.6" author: - "Jagadeesh N V (@jagadeeshnv)" - "Sajna Shetty (@Sajna-Shetty)" @@ -644,8 +644,7 @@ error_info: import json import time -from ansible.module_utils.basic import AnsibleModule -from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, ome_auth_params +from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, OmeAnsibleModule from ansible_collections.dellemc.openmanage.plugins.module_utils.utils import strip_substr_dict from ansible.module_utils.urls import ConnectionError, SSLValidationError from ansible.module_utils.six.moves.urllib.error import URLError, HTTPError @@ -1056,8 +1055,8 @@ def main(): "email_recipient": {"type": 'str'}, "ignore_partial_failure": {"type": 'bool', "default": False} } - specs.update(ome_auth_params) - module = AnsibleModule( + + module = OmeAnsibleModule( argument_spec=specs, required_if=[ ['state', 'present', ('discovery_config_targets',)], diff --git a/ansible_collections/dellemc/openmanage/plugins/modules/ome_domain_user_groups.py b/ansible_collections/dellemc/openmanage/plugins/modules/ome_domain_user_groups.py index bd15dccc6..52fee50df 100644 --- a/ansible_collections/dellemc/openmanage/plugins/modules/ome_domain_user_groups.py +++ b/ansible_collections/dellemc/openmanage/plugins/modules/ome_domain_user_groups.py @@ -3,8 +3,8 @@ # # Dell OpenManage Ansible Modules -# Version 7.2.0 -# Copyright (C) 2021-2023 Dell Inc. or its subsidiaries. All Rights Reserved. +# Version 9.3.0 +# Copyright (C) 2021-2024 Dell Inc. or its subsidiaries. All Rights Reserved. # GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) # @@ -194,8 +194,7 @@ error_info: import json from ssl import SSLError -from ansible.module_utils.basic import AnsibleModule -from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, ome_auth_params +from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, OmeAnsibleModule from ansible.module_utils.six.moves.urllib.error import URLError, HTTPError from ansible.module_utils.urls import ConnectionError, SSLValidationError ROLE_URI = "AccountService/Roles" @@ -346,8 +345,8 @@ def main(): "domain_username": {"required": False, "type": 'str'}, "domain_password": {"required": False, "type": 'str', "no_log": True}, } - specs.update(ome_auth_params) - module = AnsibleModule( + + module = OmeAnsibleModule( argument_spec=specs, mutually_exclusive=[['directory_name', 'directory_id'], ], supports_check_mode=True) diff --git a/ansible_collections/dellemc/openmanage/plugins/modules/ome_firmware.py b/ansible_collections/dellemc/openmanage/plugins/modules/ome_firmware.py index 5e83a07d5..ee15e45b7 100644 --- a/ansible_collections/dellemc/openmanage/plugins/modules/ome_firmware.py +++ b/ansible_collections/dellemc/openmanage/plugins/modules/ome_firmware.py @@ -3,8 +3,8 @@ # # Dell OpenManage Ansible Modules -# Version 8.3.0 -# Copyright (C) 2019-2023 Dell Inc. or its subsidiaries. All Rights Reserved. +# Version 9.3.0 +# Copyright (C) 2019-2024 Dell Inc. or its subsidiaries. All Rights Reserved. # GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) # @@ -351,8 +351,7 @@ error_info: import json from ssl import SSLError -from ansible.module_utils.basic import AnsibleModule -from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, ome_auth_params +from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, OmeAnsibleModule from ansible.module_utils.urls import ConnectionError from ansible.module_utils.six.moves.urllib.error import URLError, HTTPError @@ -650,8 +649,8 @@ def main(): "required_one_of": [('id', 'service_tag')] }, } - specs.update(ome_auth_params) - module = AnsibleModule( + + module = OmeAnsibleModule( argument_spec=specs, required_one_of=[["dup_file", "baseline_name"]], mutually_exclusive=[ diff --git a/ansible_collections/dellemc/openmanage/plugins/modules/ome_firmware_baseline.py b/ansible_collections/dellemc/openmanage/plugins/modules/ome_firmware_baseline.py index 6c2c6a1c5..3b13d272d 100644 --- a/ansible_collections/dellemc/openmanage/plugins/modules/ome_firmware_baseline.py +++ b/ansible_collections/dellemc/openmanage/plugins/modules/ome_firmware_baseline.py @@ -3,8 +3,8 @@ # # Dell OpenManage Ansible Modules -# Version 8.1.0 -# Copyright (C) 2019-2023 Dell Inc. or its subsidiaries. All Rights Reserved. +# Version 9.3.0 +# Copyright (C) 2019-2024 Dell Inc. or its subsidiaries. All Rights Reserved. # GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) # @@ -109,7 +109,7 @@ options: version_added: 8.1.0 requirements: - - "python >= 3.8.6" + - "python >= 3.9.6" notes: - Run this module from a system that has direct access to Dell OpenManage Enterprise or OpenManage Enterprise Modular. - I(device_group_names) option is not applicable for OpenManage Enterprise Modular. @@ -315,8 +315,7 @@ GROUP_ID = 6000 import json import time -from ansible.module_utils.basic import AnsibleModule -from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, ome_auth_params +from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, OmeAnsibleModule from ansible.module_utils.six.moves.urllib.error import URLError, HTTPError from ansible.module_utils.urls import ConnectionError, SSLValidationError from ansible.module_utils.common.dict_transformations import recursive_diff @@ -568,8 +567,8 @@ def main(): "job_wait_timeout": {"type": 'int', "default": 600}, "filter_no_reboot_required": {"type": 'bool'} } - specs.update(ome_auth_params) - module = AnsibleModule( + + module = OmeAnsibleModule( argument_spec=specs, mutually_exclusive=[ ('device_ids', 'device_service_tags', 'device_group_names'), diff --git a/ansible_collections/dellemc/openmanage/plugins/modules/ome_firmware_baseline_compliance_info.py b/ansible_collections/dellemc/openmanage/plugins/modules/ome_firmware_baseline_compliance_info.py index af48fc151..8866cc993 100644 --- a/ansible_collections/dellemc/openmanage/plugins/modules/ome_firmware_baseline_compliance_info.py +++ b/ansible_collections/dellemc/openmanage/plugins/modules/ome_firmware_baseline_compliance_info.py @@ -3,8 +3,8 @@ # # Dell OpenManage Ansible Modules -# Version 7.0.0 -# Copyright (C) 2019-2022 Dell Inc. or its subsidiaries. All Rights Reserved. +# Version 9.3.0 +# Copyright (C) 2019-2024 Dell Inc. or its subsidiaries. All Rights Reserved. # GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) # @@ -61,7 +61,7 @@ options: type: list elements: str requirements: - - "python >= 3.8.6" + - "python >= 3.9.6" author: "Sajna Shetty(@Sajna-Shetty)" notes: - Run this module from a system that has direct access to Dell OpenManage Enterprise. @@ -225,8 +225,7 @@ error_info: import json from ssl import SSLError -from ansible.module_utils.basic import AnsibleModule -from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, ome_auth_params +from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, OmeAnsibleModule from ansible.module_utils.six.moves.urllib.error import URLError, HTTPError from ansible.module_utils.urls import ConnectionError, SSLValidationError @@ -391,8 +390,8 @@ def main(): "device_ids": {"required": False, "type": "list", "elements": 'int'}, "device_group_names": {"required": False, "type": "list", "elements": 'str'}, } - specs.update(ome_auth_params) - module = AnsibleModule( + + module = OmeAnsibleModule( argument_spec=specs, mutually_exclusive=[['baseline_name', 'device_service_tags', 'device_ids', 'device_group_names']], required_one_of=[['device_ids', 'device_service_tags', 'device_group_names', 'baseline_name']], diff --git a/ansible_collections/dellemc/openmanage/plugins/modules/ome_firmware_baseline_info.py b/ansible_collections/dellemc/openmanage/plugins/modules/ome_firmware_baseline_info.py index 261d67030..ddc6531fb 100644 --- a/ansible_collections/dellemc/openmanage/plugins/modules/ome_firmware_baseline_info.py +++ b/ansible_collections/dellemc/openmanage/plugins/modules/ome_firmware_baseline_info.py @@ -3,8 +3,8 @@ # # Dell OpenManage Ansible Modules -# Version 7.0.0 -# Copyright (C) 2020-2022 Dell Inc. or its subsidiaries. All Rights Reserved. +# Version 9.3.0 +# Copyright (C) 2020-2024 Dell Inc. or its subsidiaries. All Rights Reserved. # GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) # @@ -28,7 +28,7 @@ options: all the available firmware baselines are returned. type: str requirements: - - "python >= 3.8.6" + - "python >= 3.9.6" author: "Sajna Shetty(@Sajna-Shetty)" notes: - Run this module from a system that has direct access to Dell OpenManage Enterprise. @@ -101,8 +101,7 @@ baseline_info: import json from ssl import SSLError -from ansible.module_utils.basic import AnsibleModule -from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, ome_auth_params +from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, OmeAnsibleModule from ansible.module_utils.six.moves.urllib.error import URLError, HTTPError from ansible.module_utils.urls import ConnectionError @@ -124,8 +123,8 @@ def main(): specs = { "baseline_name": {"type": 'str', "required": False}, } - specs.update(ome_auth_params) - module = AnsibleModule( + + module = OmeAnsibleModule( argument_spec=specs, supports_check_mode=True ) diff --git a/ansible_collections/dellemc/openmanage/plugins/modules/ome_firmware_catalog.py b/ansible_collections/dellemc/openmanage/plugins/modules/ome_firmware_catalog.py index b437db3ae..b477fd9ac 100644 --- a/ansible_collections/dellemc/openmanage/plugins/modules/ome_firmware_catalog.py +++ b/ansible_collections/dellemc/openmanage/plugins/modules/ome_firmware_catalog.py @@ -3,8 +3,8 @@ # # Dell OpenManage Ansible Modules -# Version 8.2.0 -# Copyright (C) 2019-2023 Dell Inc. or its subsidiaries. All Rights Reserved. +# Version 9.3.0 +# Copyright (C) 2019-2024 Dell Inc. or its subsidiaries. All Rights Reserved. # GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) # @@ -114,7 +114,7 @@ options: default: 600 version_added: 3.4.0 requirements: - - "python >= 3.8.6" + - "python >= 3.9.6" author: - "Sajna Shetty(@Sajna-Shetty)" - "Jagadeesh N V(@jagadeeshnv)" @@ -354,8 +354,7 @@ import json import time import os from ssl import SSLError -from ansible.module_utils.basic import AnsibleModule -from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, ome_auth_params +from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, OmeAnsibleModule from ansible_collections.dellemc.openmanage.plugins.module_utils.utils import remove_key from ansible.module_utils.six.moves.urllib.error import URLError, HTTPError from ansible.module_utils.urls import ConnectionError, SSLValidationError @@ -621,8 +620,8 @@ def main(): "job_wait": {"type": 'bool', "default": True}, "job_wait_timeout": {"type": 'int', "default": 600} } - specs.update(ome_auth_params) - module = AnsibleModule( + + module = OmeAnsibleModule( argument_spec=specs, required_if=[ ['state', 'present', diff --git a/ansible_collections/dellemc/openmanage/plugins/modules/ome_groups.py b/ansible_collections/dellemc/openmanage/plugins/modules/ome_groups.py index 3daf178cf..94d978aaa 100644 --- a/ansible_collections/dellemc/openmanage/plugins/modules/ome_groups.py +++ b/ansible_collections/dellemc/openmanage/plugins/modules/ome_groups.py @@ -3,8 +3,8 @@ # # Dell OpenManage Ansible Modules -# Version 7.0.0 -# Copyright (C) 2021-2022 Dell Inc. or its subsidiaries. All Rights Reserved. +# Version 9.3.0 +# Copyright (C) 2021-2024 Dell Inc. or its subsidiaries. All Rights Reserved. # GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) # @@ -71,7 +71,7 @@ options: - This is applicable only when I(state) is C(present). - This option is mutually exclusive with I(parent_group_name). requirements: - - "python >= 3.8.6" + - "python >= 3.9.6" notes: - This module manages only static device groups on Dell OpenManage Enterprise. - If a device group with the name I(parent_group_name) does not exist, a new device group with the same name is created. @@ -194,10 +194,9 @@ error_info: import json import time from ssl import SSLError -from ansible.module_utils.basic import AnsibleModule from ansible.module_utils.six.moves.urllib.error import URLError, HTTPError from ansible.module_utils.urls import ConnectionError -from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, ome_auth_params +from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, OmeAnsibleModule GROUP_URI = "GroupService/Groups" OP_URI = "GroupService/Actions/GroupService.{op}Group" @@ -406,8 +405,8 @@ def main(): "parent_group_name": {"type": "str", "default": STATIC_ROOT}, "parent_group_id": {"type": "int"}, } - specs.update(ome_auth_params) - module = AnsibleModule( + + module = OmeAnsibleModule( argument_spec=specs, required_if=[ ["state", "present", ("new_name", "description", "parent_group_name", "parent_group_id"), True], diff --git a/ansible_collections/dellemc/openmanage/plugins/modules/ome_identity_pool.py b/ansible_collections/dellemc/openmanage/plugins/modules/ome_identity_pool.py index 9a627b234..04ffa88eb 100644 --- a/ansible_collections/dellemc/openmanage/plugins/modules/ome_identity_pool.py +++ b/ansible_collections/dellemc/openmanage/plugins/modules/ome_identity_pool.py @@ -3,8 +3,8 @@ # # Dell OpenManage Ansible Modules -# Version 7.0.0 -# Copyright (C) 2020-2022 Dell Inc. or its subsidiaries. All Rights Reserved. +# Version 9.3.0 +# Copyright (C) 2020-2024 Dell Inc. or its subsidiaries. All Rights Reserved. # GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) # @@ -124,7 +124,7 @@ options: description: Number of MAC addresses.I(identity_count) is required to option to create FC settings. type: int requirements: - - "python >= 3.8.6" + - "python >= 3.9.6" author: - "Sajna Shetty(@Sajna-Shetty)" - "Deepak Joshi(@Dell-Deepak-Joshi))" @@ -263,8 +263,7 @@ import json import codecs import binascii from ssl import SSLError -from ansible.module_utils.basic import AnsibleModule -from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, ome_auth_params +from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, OmeAnsibleModule from ansible.module_utils.urls import ConnectionError from ansible.module_utils.six.moves.urllib.error import URLError, HTTPError @@ -575,8 +574,8 @@ def main(): "options": iscsi_specific_settings}, "fc_settings": {"required": False, "type": "dict", "options": fc_settings}, } - specs.update(ome_auth_params) - module = AnsibleModule( + + module = OmeAnsibleModule( argument_spec=specs, supports_check_mode=True ) diff --git a/ansible_collections/dellemc/openmanage/plugins/modules/ome_job_info.py b/ansible_collections/dellemc/openmanage/plugins/modules/ome_job_info.py index 8a875c756..ab166dacf 100644 --- a/ansible_collections/dellemc/openmanage/plugins/modules/ome_job_info.py +++ b/ansible_collections/dellemc/openmanage/plugins/modules/ome_job_info.py @@ -3,8 +3,8 @@ # # Dell OpenManage Ansible Modules -# Version 8.1.0 -# Copyright (C) 2020-2023 Dell Inc. or its subsidiaries. All Rights Reserved. +# Version 9.3.0 +# Copyright (C) 2020-2024 Dell Inc. or its subsidiaries. All Rights Reserved. # GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) # @@ -46,7 +46,7 @@ options: type: bool default: false requirements: - - "python >= 3.8.6" + - "python >= 3.9.6" author: - "Jagadeesh N V (@jagadeeshnv)" - "Abhishek Sinha (@Abhishek-Dell)" @@ -292,8 +292,7 @@ job_info: ''' import json -from ansible.module_utils.basic import AnsibleModule -from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, ome_auth_params +from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, OmeAnsibleModule from ansible_collections.dellemc.openmanage.plugins.module_utils.utils import strip_substr_dict, remove_key from ansible.module_utils.six.moves.urllib.error import URLError, HTTPError from ansible.module_utils.urls import ConnectionError, SSLValidationError @@ -364,8 +363,8 @@ def main(): }}, "fetch_execution_history": {"type": 'bool', "default": False}, } - specs.update(ome_auth_params) - module = AnsibleModule( + + module = OmeAnsibleModule( argument_spec=specs, supports_check_mode=True ) diff --git a/ansible_collections/dellemc/openmanage/plugins/modules/ome_network_port_breakout.py b/ansible_collections/dellemc/openmanage/plugins/modules/ome_network_port_breakout.py index 044601d0d..65b7c869f 100644 --- a/ansible_collections/dellemc/openmanage/plugins/modules/ome_network_port_breakout.py +++ b/ansible_collections/dellemc/openmanage/plugins/modules/ome_network_port_breakout.py @@ -3,8 +3,8 @@ # # Dell OpenManage Ansible Modules -# Version 7.0.0 -# Copyright (C) 2020-2022 Dell Inc. or its subsidiaries. All Rights Reserved. +# Version 9.3.0 +# Copyright (C) 2020-2024 Dell Inc. or its subsidiaries. All Rights Reserved. # GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) # @@ -35,7 +35,7 @@ options: - To revoke the default breakout configuration, enter 'HardwareDefault'. type: str requirements: - - "python >= 3.8.6" + - "python >= 3.9.6" author: "Felix Stephen (@felixs88)" notes: - Run this module from a system that has direct access to Dell OpenManage Enterprise Modular. @@ -126,8 +126,7 @@ error_info: import json import re from ssl import SSLError -from ansible.module_utils.basic import AnsibleModule -from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, ome_auth_params +from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, OmeAnsibleModule from ansible.module_utils.six.moves.urllib.error import URLError, HTTPError from ansible.module_utils.urls import ConnectionError, SSLValidationError @@ -257,8 +256,8 @@ def main(): "target_port": {"required": True, "type": 'str'}, "breakout_type": {"required": True, "type": 'str'}, } - specs.update(ome_auth_params) - module = AnsibleModule( + + module = OmeAnsibleModule( argument_spec=specs, supports_check_mode=True ) diff --git a/ansible_collections/dellemc/openmanage/plugins/modules/ome_network_vlan.py b/ansible_collections/dellemc/openmanage/plugins/modules/ome_network_vlan.py index 393f44a71..762acefac 100644 --- a/ansible_collections/dellemc/openmanage/plugins/modules/ome_network_vlan.py +++ b/ansible_collections/dellemc/openmanage/plugins/modules/ome_network_vlan.py @@ -3,8 +3,8 @@ # # Dell OpenManage Ansible Modules -# Version 7.0.0 -# Copyright (C) 2020-2022 Dell Inc. or its subsidiaries. All Rights Reserved. +# Version 9.3.0 +# Copyright (C) 2020-2024 Dell Inc. or its subsidiaries. All Rights Reserved. # GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) # @@ -63,7 +63,7 @@ options: 'Storage - iSCSI', 'Storage - FCoE', 'Storage - Data Replication', 'VM Migration', 'VMWare FT Logging'] requirements: - - "python >= 3.8.6" + - "python >= 3.9.6" author: - "Jagadeesh N V(@jagadeeshnv)" notes: @@ -183,8 +183,7 @@ error_info: import json from ssl import SSLError -from ansible.module_utils.basic import AnsibleModule -from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, ome_auth_params +from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, OmeAnsibleModule from ansible.module_utils.urls import ConnectionError, SSLValidationError from ansible.module_utils.six.moves.urllib.error import URLError, HTTPError @@ -318,8 +317,8 @@ def main(): 'Storage - iSCSI', 'Storage - FCoE', 'Storage - Data Replication', 'VM Migration', 'VMWare FT Logging']} } - specs.update(ome_auth_params) - module = AnsibleModule( + + module = OmeAnsibleModule( argument_spec=specs, required_if=[['state', 'present', ('new_name', 'description', 'vlan_minimum', 'vlan_maximum', 'type',), True]], supports_check_mode=True diff --git a/ansible_collections/dellemc/openmanage/plugins/modules/ome_network_vlan_info.py b/ansible_collections/dellemc/openmanage/plugins/modules/ome_network_vlan_info.py index ea9861a3b..fb315947a 100644 --- a/ansible_collections/dellemc/openmanage/plugins/modules/ome_network_vlan_info.py +++ b/ansible_collections/dellemc/openmanage/plugins/modules/ome_network_vlan_info.py @@ -3,8 +3,8 @@ # # Dell OpenManage Ansible Modules -# Version 7.0.0 -# Copyright (C) 2020-2022 Dell Inc. or its subsidiaries. All Rights Reserved. +# Version 9.3.0 +# Copyright (C) 2020-2024 Dell Inc. or its subsidiaries. All Rights Reserved. # GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) # @@ -37,7 +37,7 @@ options: type: str requirements: - - "python >= 3.8.6" + - "python >= 3.9.6" author: "Deepak Joshi(@deepakjoshishri)" notes: - Run this module from a system that has direct access to Dell OpenManage Enterprise. @@ -151,8 +151,7 @@ error_info: import json from ssl import SSLError -from ansible.module_utils.basic import AnsibleModule -from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, ome_auth_params +from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, OmeAnsibleModule from ansible.module_utils.six.moves.urllib.error import URLError, HTTPError from ansible.module_utils.urls import ConnectionError, SSLValidationError @@ -216,8 +215,8 @@ def main(): "id": {"required": False, "type": 'int'}, "name": {"required": False, "type": 'str'} } - specs.update(ome_auth_params) - module = AnsibleModule( + + module = OmeAnsibleModule( argument_spec=specs, mutually_exclusive=[["id", "name"]], supports_check_mode=True) diff --git a/ansible_collections/dellemc/openmanage/plugins/modules/ome_powerstate.py b/ansible_collections/dellemc/openmanage/plugins/modules/ome_powerstate.py index 0122848c4..b5056b133 100644 --- a/ansible_collections/dellemc/openmanage/plugins/modules/ome_powerstate.py +++ b/ansible_collections/dellemc/openmanage/plugins/modules/ome_powerstate.py @@ -3,8 +3,8 @@ # # Dell OpenManage Ansible Modules -# Version 7.0.0 -# Copyright (C) 2019-2022 Dell Inc. or its subsidiaries. All Rights Reserved. +# Version 9.3.0 +# Copyright (C) 2019-2024 Dell Inc. or its subsidiaries. All Rights Reserved. # GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) # @@ -38,7 +38,7 @@ options: - I(device_id) is mutually exclusive with I(device_service_tag). type: int requirements: - - "python >= 3.8.6" + - "python >= 3.9.6" author: "Felix Stephen (@felixs88)" notes: - Run this module from a system that has direct access to Dell OpenManage Enterprise. @@ -157,8 +157,7 @@ job_status: import json from ssl import SSLError -from ansible.module_utils.basic import AnsibleModule -from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, ome_auth_params +from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, OmeAnsibleModule from ansible.module_utils.six.moves.urllib.error import URLError, HTTPError from ansible.module_utils.urls import ConnectionError, SSLValidationError @@ -251,8 +250,8 @@ def main(): "device_service_tag": {"required": False, "type": "str"}, "device_id": {"required": False, "type": "int"}, } - specs.update(ome_auth_params) - module = AnsibleModule( + + module = OmeAnsibleModule( argument_spec=specs, required_one_of=[["device_service_tag", "device_id"]], mutually_exclusive=[["device_service_tag", "device_id"]], diff --git a/ansible_collections/dellemc/openmanage/plugins/modules/ome_profile.py b/ansible_collections/dellemc/openmanage/plugins/modules/ome_profile.py index eed9a45fd..adc189dc6 100644 --- a/ansible_collections/dellemc/openmanage/plugins/modules/ome_profile.py +++ b/ansible_collections/dellemc/openmanage/plugins/modules/ome_profile.py @@ -3,8 +3,8 @@ # # Dell OpenManage Ansible Modules -# Version 7.0.0 -# Copyright (C) 2021-2022 Dell Inc. or its subsidiaries. All Rights Reserved. +# Version 9.3.0 +# Copyright (C) 2021-2024 Dell Inc. or its subsidiaries. All Rights Reserved. # GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) # @@ -162,7 +162,7 @@ options: - This is applicable when I(command) is C(assign). type: dict requirements: - - "python >= 3.8.6" + - "python >= 3.9.6" author: "Jagadeesh N V (@jagadeeshnv)" notes: - Run this module from a system that has direct access to Dell OpenManage Enterprise. @@ -397,8 +397,7 @@ error_info: import json import time from ssl import SSLError -from ansible.module_utils.basic import AnsibleModule -from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, ome_auth_params +from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, OmeAnsibleModule from ansible.module_utils.six.moves.urllib.error import URLError, HTTPError from ansible.module_utils.urls import ConnectionError, SSLValidationError from ansible.module_utils.common.dict_transformations import recursive_diff @@ -827,8 +826,8 @@ def main(): "attributes": {"type": 'dict', "options": assign_spec}, "force": {"default": False, "type": 'bool'} } - specs.update(ome_auth_params) - module = AnsibleModule( + + module = OmeAnsibleModule( argument_spec=specs, required_if=[ ['command', 'create', ['template_name', 'template_id'], True], diff --git a/ansible_collections/dellemc/openmanage/plugins/modules/ome_profile_info.py b/ansible_collections/dellemc/openmanage/plugins/modules/ome_profile_info.py index 4c5f07dd2..a3dd49e86 100644 --- a/ansible_collections/dellemc/openmanage/plugins/modules/ome_profile_info.py +++ b/ansible_collections/dellemc/openmanage/plugins/modules/ome_profile_info.py @@ -3,8 +3,8 @@ # # Dell OpenManage Ansible Modules -# Version 7.2.0 -# Copyright (C) 2023 Dell Inc. or its subsidiaries. All Rights Reserved. +# Version 9.3.0 +# Copyright (C) 2023-2024 Dell Inc. or its subsidiaries. All Rights Reserved. # GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) # @@ -249,10 +249,9 @@ error_info: import json from ssl import SSLError -from ansible.module_utils.basic import AnsibleModule from ansible.module_utils.six.moves.urllib.error import URLError, HTTPError from ansible.module_utils.urls import ConnectionError -from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, ome_auth_params +from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, OmeAnsibleModule from ansible_collections.dellemc.openmanage.plugins.module_utils.utils import strip_substr_dict @@ -347,11 +346,10 @@ def main(): "template_name": {"type": 'str'}, "system_query_options": {"type": 'dict'} } - argument_spec.update(ome_auth_params) - module = AnsibleModule(argument_spec=argument_spec, - mutually_exclusive=[('profile_id', 'profile_name', 'template_name', 'template_id', - 'system_query_options')], - supports_check_mode=True) + module = OmeAnsibleModule(argument_spec=argument_spec, + mutually_exclusive=[('profile_id', 'profile_name', 'template_name', 'template_id', + 'system_query_options')], + supports_check_mode=True) try: with RestOME(module.params, req_session=True) as rest_obj: query = {} diff --git a/ansible_collections/dellemc/openmanage/plugins/modules/ome_server_interface_profile_info.py b/ansible_collections/dellemc/openmanage/plugins/modules/ome_server_interface_profile_info.py index 12286bff3..adf3ee810 100644 --- a/ansible_collections/dellemc/openmanage/plugins/modules/ome_server_interface_profile_info.py +++ b/ansible_collections/dellemc/openmanage/plugins/modules/ome_server_interface_profile_info.py @@ -3,8 +3,8 @@ # # Dell OpenManage Ansible Modules -# Version 7.0.0 -# Copyright (C) 2022 Dell Inc. or its subsidiaries. All Rights Reserved. +# Version 9.3.0 +# Copyright (C) 2022-2024 Dell Inc. or its subsidiaries. All Rights Reserved. # GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) # @@ -35,7 +35,7 @@ options: - I(device_service_tag) is mutually exclusive with I(device_id). elements: str requirements: - - "python >= 3.8.6" + - "python >= 3.9.6" author: - "Felix Stephen (@felixs88)" notes: @@ -154,10 +154,9 @@ error_info: import json from ssl import SSLError -from ansible.module_utils.basic import AnsibleModule from ansible.module_utils.six.moves.urllib.error import URLError, HTTPError from ansible.module_utils.urls import ConnectionError -from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, ome_auth_params +from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, OmeAnsibleModule DOMAIN_URI = "ManagementDomainService/Domains" PROFILE_URI = "NetworkService/ServerProfiles" @@ -237,11 +236,10 @@ def main(): "device_id": {"required": False, "type": "list", "elements": "int"}, "device_service_tag": {"required": False, "type": "list", "elements": "str"}, } - argument_spec.update(ome_auth_params) - module = AnsibleModule(argument_spec=argument_spec, - mutually_exclusive=[('device_id', 'device_service_tag')], - required_one_of=[["device_id", "device_service_tag"]], - supports_check_mode=True, ) + module = OmeAnsibleModule(argument_spec=argument_spec, + mutually_exclusive=[('device_id', 'device_service_tag')], + required_one_of=[["device_id", "device_service_tag"]], + supports_check_mode=True) if not any([module.params.get("device_id"), module.params.get("device_service_tag")]): module.fail_json(msg=CONFIG_FAIL_MSG) try: diff --git a/ansible_collections/dellemc/openmanage/plugins/modules/ome_server_interface_profiles.py b/ansible_collections/dellemc/openmanage/plugins/modules/ome_server_interface_profiles.py index 60b436a29..554a44656 100644 --- a/ansible_collections/dellemc/openmanage/plugins/modules/ome_server_interface_profiles.py +++ b/ansible_collections/dellemc/openmanage/plugins/modules/ome_server_interface_profiles.py @@ -3,8 +3,8 @@ # # Dell OpenManage Ansible Modules -# Version 7.0.0 -# Copyright (C) 2022 Dell Inc. or its subsidiaries. All Rights Reserved. +# Version 9.3.0 +# Copyright (C) 2022-2024 Dell Inc. or its subsidiaries. All Rights Reserved. # GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) # @@ -99,7 +99,7 @@ options: type: int default: 120 requirements: - - "python >= 3.8.6" + - "python >= 3.9.6" author: "Jagadeesh N V (@jagadeeshnv)" notes: - This module supports C(check_mode). @@ -193,10 +193,9 @@ error_info: import json from ssl import SSLError -from ansible.module_utils.basic import AnsibleModule from ansible.module_utils.six.moves.urllib.error import URLError, HTTPError from ansible.module_utils.urls import ConnectionError, SSLValidationError -from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, ome_auth_params +from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, OmeAnsibleModule from ansible_collections.dellemc.openmanage.plugins.module_utils.utils import \ get_rest_items, strip_substr_dict, job_tracking, apply_diff_key @@ -397,8 +396,8 @@ def main(): }}, "job_wait": {"type": 'bool', "default": True}, "job_wait_timeout": {"type": 'int', "default": 120}} - specs.update(ome_auth_params) - module = AnsibleModule( + + module = OmeAnsibleModule( argument_spec=specs, mutually_exclusive=[ ('device_id', 'device_service_tag',)], diff --git a/ansible_collections/dellemc/openmanage/plugins/modules/ome_session.py b/ansible_collections/dellemc/openmanage/plugins/modules/ome_session.py new file mode 100644 index 000000000..8560b7220 --- /dev/null +++ b/ansible_collections/dellemc/openmanage/plugins/modules/ome_session.py @@ -0,0 +1,408 @@ +#!/usr/bin/python +# -*- coding: utf-8 -*- + +# +# Dell OpenManage Ansible Modules +# Version 9.3.0 +# Copyright (C) 2024 Dell Inc. or its subsidiaries. All Rights Reserved. + +# GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) +# + + +from __future__ import (absolute_import, division, print_function) + +__metaclass__ = type + +DOCUMENTATION = r""" +--- +module: ome_session +short_description: Manage OpenManage Enterprise and OpenManage Enterprise modular sessions +version_added: "9.3.0" +description: + - This module allows you to create and delete sessions on OpenManage Enterprise and OpenManage Enterprise Modular. +options: + hostname: + description: + - IP address or hostname of the OpenManage Enterprise. + type: str + username: + description: + - Username of the OpenManage Enterprise. If the username is not provided, then + the environment variable E(OME_USERNAME) is used. + - I(username) is required when I(state) is C(present). + type: str + password: + description: + - Password of the OpenManage Enterprise. If the password is not provided, then + the environment variable E(OME_PASSWORD) is used. + - I(password) is required when I(state) is C(present). + type: str + port: + description: + - Port of the OpenManage Enterprise. + type: int + default: 443 + validate_certs: + description: + - If C(false), the SSL certificates will not be validated. + - Configure C(false) only on personally controlled sites where self-signed certificates are used. + type: bool + default: true + ca_path: + description: + - The Privacy Enhanced Mail (PEM) file that contains a CA certificate to be used for the validation. + type: path + timeout: + description: + - The HTTPS socket level timeout in seconds. + type: int + default: 30 + state: + description: + - The state of the session in OpenManage Enterprise. + - C(present) creates a session. + - C(absent) deletes a session. + - Module will always report changes found to be applied when I(state) is C(present). + choices: [present, absent] + type: str + default: present + x_auth_token: + description: + - Authentication token. + - I(x_auth_token) is required when I(state) is C(absent). + type: str + aliases: ['auth_token'] + session_id: + description: + - Session ID of the OpenManage Enterprise. + - I(session_id) is required when I(state) is C(absent). + type: str +requirements: + - "python >= 3.9.6" +author: + - "Kritika Bhateja (@Kritika-Bhateja-03)" +notes: + - Run this module from a system that has direct access to Dell OpenManage Enterprise. + - This module supports IPv4 and IPv6 addresses. + - This module supports C(check_mode). + - This module will always report changes found to be applied when I(state) is C(present). +""" + +EXAMPLES = r""" +--- +- name: Create a session + dellemc.openmanage.ome_session: + hostname: 198.162.0.1 + username: username + password: password + ca_path: "/path/to/ca_cert.pem" + state: present + +- name: Delete a session + dellemc.openmanage.ome_session: + hostname: 198.162.0.1 + ca_path: "/path/to/ca_cert.pem" + state: absent + x_auth_token: aed4aa802b748d2f3b31deec00a6b28a + session_id: 4b48e9ab-809e-4087-b7c4-201a16e0143d + +- name: Create a session and execute other modules + block: + - name: Create a session + dellemc.openmanage.ome_session: + hostname: 198.162.0.1 + username: username + password: password + ca_path: "/path/to/ca_cert.pem" + state: present + register: authData + + - name: Call ome_user_info module + dellemc.openmanage.ome_user_info: + hostname: 198.162.0.1 + ca_path: "/path/to/ca_cert.pem" + x_auth_token: "{{ authData.x_auth_token }}" + + - name: Call ome_network_vlan_info module + dellemc.openmanage.ome_network_vlan_info: + hostname: 198.162.0.1 + ca_path: "/path/to/ca_cert.pem" + x_auth_token: "{{ authData.x_auth_token }}" + always: + - name: Destroy a session + dellemc.openmanage.ome_session: + hostname: 198.162.0.1 + ca_path: "/path/to/ca_cert.pem" + state: absent + x_auth_token: "{{ authData.x_auth_token }}" + session_id: "{{ authData.session_data.Id }}" +""" + +RETURN = r''' +--- +msg: + description: Status of the session operation. + returned: always + type: str + sample: "The session has been created successfully." +session_data: + description: The session details. + returned: For session creation operation + type: dict + sample: { + "Id": "d5c28d8e-1084-4055-9c01-e1051cfee2dd", + "Description": "admin", + "Name": "API", + "UserName": "admin", + "UserId": 10078, + "Password": null, + "Roles": [ + "BACKUP_ADMINISTRATOR" + ], + "IpAddress": "100.198.162.0", + "StartTimeStamp": "2023-07-03 07:22:43.683", + "LastAccessedTimeStamp": "2023-07-03 07:22:43.683", + "DirectoryGroup": [] + } +x_auth_token: + description: Authentication token. + returned: For session creation operation + type: str + sample: "d15f17f01cd627c30173b1582642497d" +error_info: + description: Details of the HTTP Error. + returned: On HTTP error + type: dict + sample: { + "error": { + "@Message.ExtendedInfo": [ + { + "Message": "Unable to complete the operation because an invalid username and/or password is entered, and therefore authentication failed.", + "MessageArgs": [], + "MessageArgs@odata.count": 0, + "MessageId": "IDRAC.2.7.SYS415", + "RelatedProperties": [], + "RelatedProperties@odata.count": 0, + "Resolution": "Enter valid user name and password and retry the operation.", + "Severity": "Warning" + } + ], + "code": "Base.1.12.GeneralError", + "message": "A general error has occurred. See ExtendedInfo for more information" + } + } +''' + + +import json +from urllib.error import HTTPError, URLError +from ansible_collections.dellemc.openmanage.plugins.module_utils.session_utils import Session +from ansible.module_utils.basic import AnsibleModule +from ansible.module_utils.urls import ConnectionError, SSLValidationError +from ansible.module_utils.common.parameters import env_fallback +from ansible_collections.dellemc.openmanage.plugins.module_utils.utils import remove_key + +SESSION_URL = "/api/SessionService/Sessions" +ODATA = "@odata.id" +ODATA_REGEX = "(.*?)@odata" + +CREATE_SUCCESS_MSG = "The session has been created successfully." +DELETE_SUCCESS_MSG = "The session has been deleted successfully." +FAILURE_MSG = "Unable to '{operation}' a session." +CHANGES_FOUND_MSG = "Changes found to be applied." +NO_CHANGES_FOUND_MSG = "No changes found to be applied." + + +class OMESession(Session): + def __init__(self, module): + super().__init__(module) + self.url_kwrags = {"force_basic_auth": True, + "url_username": self.module.params.get("username"), + "url_password": self.module.params.get("password")} + + def get_session_status(self, session_url, session_id): + """ + Retrieves the status of a session given its URL and ID. + + Args: + session_url (str): The URL of the session. + session_id (str): The ID of the session. + + Returns: + int: The status code of the session status response. If an HTTPError occurs, the status + code of the error is returned. + """ + session_status_response = self.instance.invoke_request(SESSION_URL, "GET") + sessions_data = session_status_response.json_data + session_ids = [session_id["@odata.id"].split("'")[1] for session_id in sessions_data["value"]] + session_status = session_id in session_ids + return session_status + + def create_session(self): + """ + Executes the session creation process. + + This function creates a session by sending a POST request to the session URL with the + provided username and password. + If the request is successful (status code 201), it retrieves the session details, removes + any OData keys from the response, + and extracts the X-Auth-Token from the response headers. It then exits the module with a + success message, indicating that + the session was created successfully, and provides the session data and X-Auth-Token as + output variables. + + If the request fails (status code other than 201), it exits the module with a failure + message, indicating that the session creation failed. + + Parameters: + None + + Returns: + None + """ + payload = {"UserName": self.module.params.get("username"), + "Password": self.module.params.get("password")} + if self.module.check_mode: + self.module.exit_json(msg=CHANGES_FOUND_MSG, changed=True) + session_response = self.instance.invoke_request(SESSION_URL, "POST", data=payload, url_kwargs=self.url_kwrags) + status = session_response.status_code + if status == 201: + session_details = session_response.json_data + session_data = remove_key(session_details, regex_pattern=ODATA_REGEX) + x_auth_token = session_response.headers.get('X-Auth-Token') + self.module.exit_json(msg=CREATE_SUCCESS_MSG, + changed=True, + session_data=session_data, + x_auth_token=x_auth_token) + else: + self.module.exit_json(msg=FAILURE_MSG.format(operation="create"), failed=True) + + def delete_session(self): + """ + Executes the deletion of a session. + This function retrieves the session ID from the module parameters.It then invokes a + DELETE request to the session URL with the session ID appended. The response from + the request is stored in the `session_response` variable. + + If the response status code is 200, indicating a successful deletion, the function exits + the module with a success message and sets the `changed` parameter to True. Otherwise, it + exits the module with a failure message and sets the `failed` parameter to True. + + Parameters: + None + + Returns: + None + """ + session_id = self.module.params.get("session_id") + session_status = self.get_session_status(SESSION_URL, session_id) + if self.module.check_mode: + if session_status: + self.module.exit_json(msg=CHANGES_FOUND_MSG, changed=True) + else: + self.module.exit_json(msg=NO_CHANGES_FOUND_MSG) + else: + if session_status: + try: + delete_session_url = SESSION_URL + "('" + session_id + "')" + session_response = self.instance.invoke_request(delete_session_url, "DELETE") + status = session_response.status_code + if status == 204: + self.module.exit_json(msg=DELETE_SUCCESS_MSG, changed=True) + except HTTPError as err: + filter_err = remove_key(json.load(err), regex_pattern=ODATA_REGEX) + self.module.exit_json(msg=FAILURE_MSG.format(operation="delete"), + error_info=filter_err, + failed=True) + else: + self.module.exit_json(msg=NO_CHANGES_FOUND_MSG) + + +def main(): + """ + Main function that initializes the Ansible module with the argument specs and required if + conditions. + It then creates a SessionAPI object with the module parameters and performs a session operation + based on the state parameter. + If the state is "present", it creates a CreateSession object and executes it. If the state is + "absent", it creates a DeleteSession object and executes it. + The session status is returned. + + Raises: + HTTPError: If an HTTP error occurs, the error message and filtered error information are + returned in the module's exit_json. + URLError: If a URL error occurs, the error message is returned in the module's exit_json. + SSLValidationError, ConnectionError, TypeError, ValueError, OSError: If any other error + occurs, the error message is returned in the module's exit_json. + + Returns: + None + """ + specs = get_argument_spec() + module = AnsibleModule( + argument_spec=specs, + required_if=[ + ["state", "present", ("username", "password",)], + ["state", "absent", ("x_auth_token", "session_id",)] + ], + supports_check_mode=True + ) + try: + ome = OMESession(module) + session_operation = module.params.get("state") + if session_operation == "present": + ome.create_session() + else: + ome.delete_session() + except HTTPError as err: + filter_err = {} + if isinstance(err, dict): + filter_err = remove_key(json.load(err), regex_pattern=ODATA_REGEX) + module.exit_json(msg=str(err), error_info=filter_err, failed=True) + except URLError as err: + module.exit_json(msg=str(err), unreachable=True) + except (SSLValidationError, ConnectionError, TypeError, ValueError, OSError) as err: + module.exit_json(msg=str(err), failed=True) + + +def get_argument_spec(): + """ + Returns a dictionary representing the argument specification for a module. + + The dictionary contains the following keys and their corresponding values: + - "hostname": A string representing the hostname. + - "username": A string representing the username. It has a fallback option to retrieve the + value from the environment variable 'IDRAC_USERNAME'. + - "password": A string representing the password. It is marked as not to be logged and has a + fallback option to retrieve the value from the environment variable 'IDRAC_PASSWORD'. + - "port": An integer representing the port number. The default value is 443. + - "validate_certs": A boolean representing whether to validate certificates. The default value + is True. + - "ca_path": A path representing the certificate authority path. The default value is None. + - "timeout": An integer representing the timeout value. The default value is 30. + - "state": A string representing the state. The default value is "present". The choices are + ["present", "absent"]. + - "x_auth_token": A string representing the authentication token. It is marked as not to be + logged. + - "session_id": A string representing the session ID. + + Returns: + A dictionary representing the argument specification. + """ + return { + "hostname": {"type": "str"}, + "username": {"type": "str", "fallback": (env_fallback, ['OME_USERNAME'])}, + "password": {"type": "str", "no_log": True, "fallback": (env_fallback, ['OME_PASSWORD'])}, + "port": {"type": "int", "default": 443}, + "validate_certs": {"type": "bool", "default": True}, + "ca_path": {"type": "path", "default": None}, + "timeout": {"type": "int", "default": 30}, + "state": {"type": 'str', "default": "present", "choices": ["present", "absent"]}, + "x_auth_token": {"type": "str", "no_log": True, "aliases": ['auth_token']}, + "session_id": {"type": "str"} + } + + +if __name__ == '__main__': + main() diff --git a/ansible_collections/dellemc/openmanage/plugins/modules/ome_smart_fabric.py b/ansible_collections/dellemc/openmanage/plugins/modules/ome_smart_fabric.py index 2e790fc08..96e947182 100644 --- a/ansible_collections/dellemc/openmanage/plugins/modules/ome_smart_fabric.py +++ b/ansible_collections/dellemc/openmanage/plugins/modules/ome_smart_fabric.py @@ -3,8 +3,8 @@ # # Dell OpenManage Ansible Modules -# Version 7.0.0 -# Copyright (C) 2020-2022 Dell Inc. or its subsidiaries. All Rights Reserved. +# Version 9.3.0 +# Copyright (C) 2020-2024 Dell Inc. or its subsidiaries. All Rights Reserved. # GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) # @@ -75,7 +75,7 @@ options: to represent the entire fabric. Enable this feature only when connecting to such a solution." choices: ['Enabled', 'Disabled'] requirements: - - "python >= 3.8.6" + - "python >= 3.9.6" author: - "Sajna Shetty(@Sajna-Shetty)" notes: @@ -179,8 +179,7 @@ error_info: import json import socket -from ansible.module_utils.basic import AnsibleModule -from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, ome_auth_params +from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, OmeAnsibleModule from ansible.module_utils.six.moves.urllib.error import URLError, HTTPError from ansible.module_utils.urls import ConnectionError, SSLValidationError from ssl import SSLError @@ -711,8 +710,8 @@ def main(): "secondary_switch_service_tag": {"required": False, "type": "str"}, "override_LLDP_configuration": {"required": False, "type": "str", "choices": ['Enabled', 'Disabled']}, } - specs.update(ome_auth_params) - module = AnsibleModule( + + module = OmeAnsibleModule( argument_spec=specs, required_if=[['state', 'present', ('new_name', 'description', 'fabric_design', 'primary_switch_service_tag', 'secondary_switch_service_tag', 'override_LLDP_configuration',), True]], diff --git a/ansible_collections/dellemc/openmanage/plugins/modules/ome_smart_fabric_info.py b/ansible_collections/dellemc/openmanage/plugins/modules/ome_smart_fabric_info.py index 9ce352d5e..4433afbdf 100644 --- a/ansible_collections/dellemc/openmanage/plugins/modules/ome_smart_fabric_info.py +++ b/ansible_collections/dellemc/openmanage/plugins/modules/ome_smart_fabric_info.py @@ -3,8 +3,8 @@ # # Dell OpenManage Ansible Modules -# Version 7.1.0 -# Copyright (C) 2022 Dell Inc. or its subsidiaries. All Rights Reserved. +# Version 9.3.0 +# Copyright (C) 2022-2024 Dell Inc. or its subsidiaries. All Rights Reserved. # GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) # @@ -570,8 +570,7 @@ error_info: import json from ssl import SSLError -from ansible.module_utils.basic import AnsibleModule -from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, ome_auth_params +from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, OmeAnsibleModule from ansible.module_utils.six.moves.urllib.error import URLError, HTTPError from ansible.module_utils.urls import ConnectionError, SSLValidationError from ansible_collections.dellemc.openmanage.plugins.module_utils.utils import strip_substr_dict @@ -655,8 +654,8 @@ def main(): "fabric_id": {"type": 'str', "required": False}, "fabric_name": {"type": 'str', "required": False} } - specs.update(ome_auth_params) - module = AnsibleModule( + + module = OmeAnsibleModule( argument_spec=specs, mutually_exclusive=[ ('fabric_id', 'fabric_name') diff --git a/ansible_collections/dellemc/openmanage/plugins/modules/ome_smart_fabric_uplink.py b/ansible_collections/dellemc/openmanage/plugins/modules/ome_smart_fabric_uplink.py index 0ac1f2557..311a2596b 100644 --- a/ansible_collections/dellemc/openmanage/plugins/modules/ome_smart_fabric_uplink.py +++ b/ansible_collections/dellemc/openmanage/plugins/modules/ome_smart_fabric_uplink.py @@ -3,8 +3,8 @@ # # Dell OpenManage Ansible Modules -# Version 7.0.0 -# Copyright (C) 2020-2022 Dell Inc. or its subsidiaries. All Rights Reserved. +# Version 9.3.0 +# Copyright (C) 2020-2024 Dell Inc. or its subsidiaries. All Rights Reserved. # GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) # @@ -89,7 +89,7 @@ options: description: Specify the name of the VLAN to be added as untagged to the uplink. type: str requirements: - - "python >= 3.8.6" + - "python >= 3.9.6" author: - "Jagadeesh N V(@jagadeeshnv)" notes: @@ -270,11 +270,10 @@ error_info: import json from ssl import SSLError -from ansible.module_utils.basic import AnsibleModule from ansible.module_utils.urls import ConnectionError, SSLValidationError from ansible.module_utils.six.moves.urllib.error import URLError, HTTPError from ansible.module_utils.common.dict_transformations import recursive_diff -from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, ome_auth_params +from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, OmeAnsibleModule from ansible_collections.dellemc.openmanage.plugins.module_utils.utils import get_item_and_list FABRIC_URI = "NetworkService/Fabrics" @@ -503,8 +502,8 @@ def main(): "tagged_networks": {"type": "list", "elements": "str"}, "untagged_network": {"type": "str"} } - specs.update(ome_auth_params) - module = AnsibleModule( + + module = OmeAnsibleModule( argument_spec=specs, required_if=[['state', 'present', ('new_name', 'description', 'uplink_type', 'ufd_enable', diff --git a/ansible_collections/dellemc/openmanage/plugins/modules/ome_smart_fabric_uplink_info.py b/ansible_collections/dellemc/openmanage/plugins/modules/ome_smart_fabric_uplink_info.py index d6bb0683e..09daad9d3 100644 --- a/ansible_collections/dellemc/openmanage/plugins/modules/ome_smart_fabric_uplink_info.py +++ b/ansible_collections/dellemc/openmanage/plugins/modules/ome_smart_fabric_uplink_info.py @@ -3,8 +3,8 @@ # # Dell OpenManage Ansible Modules -# Version 7.2.0 -# Copyright (C) 2022-2023 Dell Inc. or its subsidiaries. All Rights Reserved. +# Version 9.3.0 +# Copyright (C) 2022-2024 Dell Inc. or its subsidiaries. All Rights Reserved. # GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) # @@ -186,10 +186,9 @@ error_info: import json from ssl import SSLError -from ansible.module_utils.basic import AnsibleModule from ansible.module_utils.urls import ConnectionError, SSLValidationError from ansible.module_utils.six.moves.urllib.error import URLError, HTTPError -from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, ome_auth_params +from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, OmeAnsibleModule from ansible_collections.dellemc.openmanage.plugins.module_utils.utils import strip_substr_dict ALL_UPLINKS_URI = "NetworkService/Fabrics('{0}')/Uplinks?$expand=Networks,Ports" @@ -294,8 +293,8 @@ def main(): "uplink_id": {"type": "str"}, "uplink_name": {"type": "str"} } - specs.update(ome_auth_params) - module = AnsibleModule( + + module = OmeAnsibleModule( argument_spec=specs, mutually_exclusive=[('fabric_id', 'fabric_name'), ('uplink_id', 'uplink_name')], supports_check_mode=True diff --git a/ansible_collections/dellemc/openmanage/plugins/modules/ome_template.py b/ansible_collections/dellemc/openmanage/plugins/modules/ome_template.py index 6bf77ad02..29f851089 100644 --- a/ansible_collections/dellemc/openmanage/plugins/modules/ome_template.py +++ b/ansible_collections/dellemc/openmanage/plugins/modules/ome_template.py @@ -3,8 +3,8 @@ # # Dell OpenManage Ansible Modules -# Version 7.5.0 -# Copyright (C) 2019-2023 Dell Inc. or its subsidiaries. All Rights Reserved. +# Version 9.3.0 +# Copyright (C) 2019-2024 Dell Inc. or its subsidiaries. All Rights Reserved. # GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) # @@ -133,7 +133,7 @@ options: - This option is applicable when I(job_wait) is C(true). default: 1200 requirements: - - "python >= 3.8.6" + - "python >= 3.9.6" author: - "Jagadeesh N V (@jagadeeshnv)" - "Husniya Hameed (@husniya_hameed)" @@ -546,8 +546,7 @@ error_info: import json import time from ssl import SSLError -from ansible.module_utils.basic import AnsibleModule -from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, ome_auth_params +from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, OmeAnsibleModule from ansible.module_utils.six.moves.urllib.error import URLError, HTTPError from ansible.module_utils.urls import ConnectionError, SSLValidationError from ansible_collections.dellemc.openmanage.plugins.module_utils.utils import apply_diff_key, job_tracking @@ -1016,8 +1015,8 @@ def main(): "job_wait": {"required": False, "type": "bool", "default": True}, "job_wait_timeout": {"required": False, "type": "int", "default": 1200} } - specs.update(ome_auth_params) - module = AnsibleModule( + + module = OmeAnsibleModule( argument_spec=specs, required_if=[ ['command', 'create', ['attributes']], diff --git a/ansible_collections/dellemc/openmanage/plugins/modules/ome_template_identity_pool.py b/ansible_collections/dellemc/openmanage/plugins/modules/ome_template_identity_pool.py index 88a09ae95..2f21bda8d 100644 --- a/ansible_collections/dellemc/openmanage/plugins/modules/ome_template_identity_pool.py +++ b/ansible_collections/dellemc/openmanage/plugins/modules/ome_template_identity_pool.py @@ -3,8 +3,8 @@ # # Dell OpenManage Ansible Modules -# Version 7.0.0 -# Copyright (C) 2020-2022 Dell Inc. or its subsidiaries. All Rights Reserved. +# Version 9.3.0 +# Copyright (C) 2020-2024 Dell Inc. or its subsidiaries. All Rights Reserved. # GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) # @@ -34,7 +34,7 @@ options: - This option is not applicable when detaching an identity pool from a template. type: str requirements: - - "python >= 3.8.6" + - "python >= 3.9.6" author: "Felix Stephen (@felixs88)" notes: - Run this module from a system that has direct access to Dell OpenManage Enterprise. @@ -91,8 +91,7 @@ error_info: ''' import json -from ansible.module_utils.basic import AnsibleModule -from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, ome_auth_params +from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, OmeAnsibleModule from ansible.module_utils.urls import ConnectionError, SSLValidationError from ansible.module_utils.six.moves.urllib.error import URLError, HTTPError from ssl import SSLError @@ -157,8 +156,8 @@ def main(): "template_name": {"required": True, "type": "str"}, "identity_pool_name": {"required": False, "type": "str"}, } - specs.update(ome_auth_params) - module = AnsibleModule( + + module = OmeAnsibleModule( argument_spec=specs, supports_check_mode=True ) diff --git a/ansible_collections/dellemc/openmanage/plugins/modules/ome_template_info.py b/ansible_collections/dellemc/openmanage/plugins/modules/ome_template_info.py index 9e91a5fb3..75ddc5ff5 100644 --- a/ansible_collections/dellemc/openmanage/plugins/modules/ome_template_info.py +++ b/ansible_collections/dellemc/openmanage/plugins/modules/ome_template_info.py @@ -3,8 +3,8 @@ # # Dell OpenManage Ansible Modules -# Version 7.0.0 -# Copyright (C) 2019-2022 Dell Inc. or its subsidiaries. All Rights Reserved. +# Version 9.3.0 +# Copyright (C) 2019-2024 Dell Inc. or its subsidiaries. All Rights Reserved. # GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) # @@ -34,7 +34,7 @@ options: description: Filter records by the supported values. type: str requirements: - - "python >= 3.8.6" + - "python >= 3.9.6" author: "Sajna Shetty(@Sajna-Shetty)" notes: - Run this module from a system that has direct access to Dell OpenManage Enterprise. @@ -105,8 +105,7 @@ template_info: import json from ssl import SSLError -from ansible.module_utils.basic import AnsibleModule -from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, ome_auth_params +from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, OmeAnsibleModule from ansible.module_utils.six.moves.urllib.error import URLError, HTTPError from ansible.module_utils.urls import ConnectionError, SSLValidationError @@ -131,8 +130,8 @@ def main(): "options": {"filter": {"type": 'str', "required": False}} }, } - specs.update(ome_auth_params) - module = AnsibleModule( + + module = OmeAnsibleModule( argument_spec=specs, mutually_exclusive=[['template_id', 'system_query_options']], supports_check_mode=True diff --git a/ansible_collections/dellemc/openmanage/plugins/modules/ome_template_network_vlan.py b/ansible_collections/dellemc/openmanage/plugins/modules/ome_template_network_vlan.py index c9d0bd97d..b4dc386bc 100644 --- a/ansible_collections/dellemc/openmanage/plugins/modules/ome_template_network_vlan.py +++ b/ansible_collections/dellemc/openmanage/plugins/modules/ome_template_network_vlan.py @@ -3,8 +3,8 @@ # # Dell OpenManage Ansible Modules -# Version 7.0.0 -# Copyright (C) 2020-2022 Dell Inc. or its subsidiaries. All Rights Reserved. +# Version 9.3.0 +# Copyright (C) 2020-2024 Dell Inc. or its subsidiaries. All Rights Reserved. # GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) # @@ -91,7 +91,7 @@ options: type: list elements: str requirements: - - "python >= 3.8.6" + - "python >= 3.9.6" author: - "Jagadeesh N V(@jagadeeshnv)" notes: @@ -192,8 +192,7 @@ error_info: import json from ssl import SSLError -from ansible.module_utils.basic import AnsibleModule -from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, ome_auth_params +from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, OmeAnsibleModule from ansible.module_utils.urls import ConnectionError, SSLValidationError from ansible.module_utils.six.moves.urllib.error import URLError, HTTPError @@ -421,8 +420,8 @@ def main(): "tagged_networks": {"required": False, "type": "list", "elements": "dict", "options": port_tagged_spec}, "propagate_vlan": {"type": "bool", "default": True} } - specs.update(ome_auth_params) - module = AnsibleModule( + + module = OmeAnsibleModule( argument_spec=specs, required_one_of=[("template_id", "template_name"), ("untagged_networks", "tagged_networks")], diff --git a/ansible_collections/dellemc/openmanage/plugins/modules/ome_template_network_vlan_info.py b/ansible_collections/dellemc/openmanage/plugins/modules/ome_template_network_vlan_info.py index b91a6a946..c2b4d2a32 100644 --- a/ansible_collections/dellemc/openmanage/plugins/modules/ome_template_network_vlan_info.py +++ b/ansible_collections/dellemc/openmanage/plugins/modules/ome_template_network_vlan_info.py @@ -3,8 +3,8 @@ # # Dell OpenManage Ansible Modules -# Version 7.2.0 -# Copyright (C) 2023 Dell Inc. or its subsidiaries. All Rights Reserved. +# Version 9.3.0 +# Copyright (C) 2023-2024 Dell Inc. or its subsidiaries. All Rights Reserved. # GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) # @@ -133,10 +133,9 @@ error_info: import json from ssl import SSLError -from ansible.module_utils.basic import AnsibleModule from ansible.module_utils.six.moves.urllib.error import URLError, HTTPError from ansible.module_utils.urls import ConnectionError -from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, ome_auth_params +from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, OmeAnsibleModule NETWORK_HIERARCHY_VIEW = 4 # For Network hierarchy View in a Template TEMPLATE_ATTRIBUTE_VIEW = "TemplateService/Templates({0})/Views({1})/AttributeViewDetails" @@ -212,10 +211,9 @@ def main(): "template_id": {"type": 'int'}, "template_name": {"type": 'str'} } - argument_spec.update(ome_auth_params) - module = AnsibleModule(argument_spec=argument_spec, - mutually_exclusive=[('template_id', 'template_name')], - supports_check_mode=True) + module = OmeAnsibleModule(argument_spec=argument_spec, + mutually_exclusive=[('template_id', 'template_name')], + supports_check_mode=True) try: templates = [] with RestOME(module.params, req_session=True) as rest_obj: diff --git a/ansible_collections/dellemc/openmanage/plugins/modules/ome_user.py b/ansible_collections/dellemc/openmanage/plugins/modules/ome_user.py index 27092a036..38f47dc25 100644 --- a/ansible_collections/dellemc/openmanage/plugins/modules/ome_user.py +++ b/ansible_collections/dellemc/openmanage/plugins/modules/ome_user.py @@ -3,8 +3,8 @@ # # Dell OpenManage Ansible Modules -# Version 7.0.0 -# Copyright (C) 2019-2022 Dell Inc. or its subsidiaries. All Rights Reserved. +# Version 9.3.0 +# Copyright (C) 2019-2024 Dell Inc. or its subsidiaries. All Rights Reserved. # GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) # @@ -53,7 +53,7 @@ options: - >- Refer OpenManage Enterprise API Reference Guide for more details. requirements: - - "python >= 3.8.6" + - "python >= 3.9.6" author: "Sajna Shetty(@Sajna-Shetty)" notes: - Run this module from a system that has direct access to Dell OpenManage Enterprise. @@ -153,8 +153,7 @@ user_status: import json from ssl import SSLError -from ansible.module_utils.basic import AnsibleModule -from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, ome_auth_params +from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, OmeAnsibleModule from ansible.module_utils.six.moves.urllib.error import URLError, HTTPError from ansible.module_utils.urls import ConnectionError, SSLValidationError @@ -238,8 +237,8 @@ def main(): "name": {"required": False, "type": 'str'}, "attributes": {"required": False, "type": 'dict', "default": {}}, } - specs.update(ome_auth_params) - module = AnsibleModule( + + module = OmeAnsibleModule( argument_spec=specs, mutually_exclusive=[['user_id', 'name'], ], required_if=[['state', 'present', ['attributes']], ], diff --git a/ansible_collections/dellemc/openmanage/plugins/modules/ome_user_info.py b/ansible_collections/dellemc/openmanage/plugins/modules/ome_user_info.py index 488444694..7c9dd6fae 100644 --- a/ansible_collections/dellemc/openmanage/plugins/modules/ome_user_info.py +++ b/ansible_collections/dellemc/openmanage/plugins/modules/ome_user_info.py @@ -3,8 +3,8 @@ # # Dell OpenManage Ansible Modules -# Version 7.0.0 -# Copyright (C) 2019-2022 Dell Inc. or its subsidiaries. All Rights Reserved. +# Version 9.3.0 +# Copyright (C) 2019-2024 Dell Inc. or its subsidiaries. All Rights Reserved. # GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) # @@ -34,7 +34,7 @@ options: description: Filter records for the supported values. type: str requirements: - - "python >= 3.8.6" + - "python >= 3.9.6" author: "Jagadeesh N V (@jagadeeshnv)" notes: - Run this module from a system that has direct access to Dell OpenManage Enterprise. @@ -98,8 +98,7 @@ user_info: import json from ssl import SSLError -from ansible.module_utils.basic import AnsibleModule -from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, ome_auth_params +from ansible_collections.dellemc.openmanage.plugins.module_utils.ome import RestOME, OmeAnsibleModule from ansible.module_utils.six.moves.urllib.error import URLError, HTTPError from ansible.module_utils.urls import ConnectionError, SSLValidationError @@ -124,8 +123,8 @@ def main(): "filter": {"type": 'str', "required": False}, }}, } - specs.update(ome_auth_params) - module = AnsibleModule( + + module = OmeAnsibleModule( argument_spec=specs, mutually_exclusive=[ ('account_id', 'system_query_options') diff --git a/ansible_collections/dellemc/openmanage/plugins/modules/redfish_event_subscription.py b/ansible_collections/dellemc/openmanage/plugins/modules/redfish_event_subscription.py index c974aaccc..0eec0b55b 100644 --- a/ansible_collections/dellemc/openmanage/plugins/modules/redfish_event_subscription.py +++ b/ansible_collections/dellemc/openmanage/plugins/modules/redfish_event_subscription.py @@ -3,8 +3,8 @@ # # Dell OpenManage Ansible Modules -# Version 7.0.0 -# Copyright (C) 2021-2022 Dell Inc. or its subsidiaries. All Rights Reserved. +# Version 9.3.0 +# Copyright (C) 2021-2024 Dell Inc. or its subsidiaries. All Rights Reserved. # GNU General Public License v3.0+ # see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt @@ -55,7 +55,7 @@ options: default: present choices: ["present", "absent"] requirements: - - "python >= 3.8.6" + - "python >= 3.9.6" author: - "Trevor Squillario (@TrevorSquillario)" - "Sachin Apagundi (@sachin-apa)" @@ -197,8 +197,7 @@ error_info: import json import os from ssl import SSLError -from ansible_collections.dellemc.openmanage.plugins.module_utils.redfish import Redfish, redfish_auth_params -from ansible.module_utils.basic import AnsibleModule +from ansible_collections.dellemc.openmanage.plugins.module_utils.redfish import Redfish, RedfishAnsibleModule from ansible.module_utils.urls import ConnectionError, SSLValidationError from ansible.module_utils.six.moves.urllib.error import URLError, HTTPError @@ -291,9 +290,8 @@ def main(): "choices": ['Event', 'MetricReport']}, "state": {"type": "str", "default": "present", "choices": ['present', 'absent']}, } - specs.update(redfish_auth_params) - module = AnsibleModule( + module = RedfishAnsibleModule( argument_spec=specs, supports_check_mode=True) diff --git a/ansible_collections/dellemc/openmanage/plugins/modules/redfish_firmware.py b/ansible_collections/dellemc/openmanage/plugins/modules/redfish_firmware.py index 98f64f780..a135198fd 100644 --- a/ansible_collections/dellemc/openmanage/plugins/modules/redfish_firmware.py +++ b/ansible_collections/dellemc/openmanage/plugins/modules/redfish_firmware.py @@ -3,8 +3,8 @@ # # Dell OpenManage Ansible Modules -# Version 8.2.0 -# Copyright (C) 2019-2023 Dell Inc. or its subsidiaries. All Rights Reserved. +# Version 9.3.0 +# Copyright (C) 2019-2024 Dell Inc. or its subsidiaries. All Rights Reserved. # GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) # @@ -50,7 +50,7 @@ options: I(job_wait_time) minimum or make I(job_wait)as false and retrigger." default: 3600 requirements: - - "python >= 3.8.6" + - "python >= 3.9.6" - "urllib3" author: - "Felix Stephen (@felixs88)" @@ -144,8 +144,8 @@ import json import os import time from ssl import SSLError -from ansible_collections.dellemc.openmanage.plugins.module_utils.redfish import Redfish, redfish_auth_params -from ansible.module_utils.basic import AnsibleModule, missing_required_lib +from ansible_collections.dellemc.openmanage.plugins.module_utils.redfish import Redfish, RedfishAnsibleModule +from ansible.module_utils.basic import missing_required_lib from ansible.module_utils.urls import ConnectionError, SSLValidationError from ansible.module_utils.six.moves.urllib.error import URLError, HTTPError @@ -271,8 +271,8 @@ def main(): "job_wait": {"required": False, "type": 'bool', "default": True}, "job_wait_timeout": {"required": False, "type": "int", "default": 3600} } - specs.update(redfish_auth_params) - module = AnsibleModule( + + module = RedfishAnsibleModule( argument_spec=specs, supports_check_mode=False) if not HAS_LIB: diff --git a/ansible_collections/dellemc/openmanage/plugins/modules/redfish_firmware_rollback.py b/ansible_collections/dellemc/openmanage/plugins/modules/redfish_firmware_rollback.py index ef93d669f..1779b89b0 100644 --- a/ansible_collections/dellemc/openmanage/plugins/modules/redfish_firmware_rollback.py +++ b/ansible_collections/dellemc/openmanage/plugins/modules/redfish_firmware_rollback.py @@ -3,8 +3,8 @@ # # Dell OpenManage Ansible Modules -# Version 8.2.0 -# Copyright (C) 2023 Dell Inc. or its subsidiaries. All Rights Reserved. +# Version 9.3.0 +# Copyright (C) 2023-2024 Dell Inc. or its subsidiaries. All Rights Reserved. # GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) # @@ -144,11 +144,10 @@ import json import re import time from ssl import SSLError -from ansible_collections.dellemc.openmanage.plugins.module_utils.redfish import Redfish, redfish_auth_params, \ +from ansible_collections.dellemc.openmanage.plugins.module_utils.redfish import Redfish, RedfishAnsibleModule, \ SESSION_RESOURCE_COLLECTION from ansible_collections.dellemc.openmanage.plugins.module_utils.utils import wait_for_redfish_reboot_job, \ wait_for_redfish_job_complete, strip_substr_dict, MANAGER_JOB_ID_URI, RESET_UNTRACK, MANAGERS_URI, RESET_SUCCESS -from ansible.module_utils.basic import AnsibleModule from ansible.module_utils.urls import ConnectionError, SSLValidationError from ansible.module_utils.six.moves.urllib.error import URLError, HTTPError @@ -324,8 +323,8 @@ def main(): "reboot": {"type": "bool", "default": True}, "reboot_timeout": {"type": "int", "default": 900}, } - specs.update(redfish_auth_params) - module = AnsibleModule(argument_spec=specs, supports_check_mode=True) + + module = RedfishAnsibleModule(argument_spec=specs, supports_check_mode=True) if module.params["reboot_timeout"] <= 0: module.fail_json(msg=NEGATIVE_TIMEOUT_MESSAGE) try: diff --git a/ansible_collections/dellemc/openmanage/plugins/modules/redfish_powerstate.py b/ansible_collections/dellemc/openmanage/plugins/modules/redfish_powerstate.py index 085bbc018..a361f7b34 100644 --- a/ansible_collections/dellemc/openmanage/plugins/modules/redfish_powerstate.py +++ b/ansible_collections/dellemc/openmanage/plugins/modules/redfish_powerstate.py @@ -3,8 +3,8 @@ # # Dell OpenManage Ansible Modules -# Version 7.0.0 -# Copyright (C) 2020-2022 Dell Inc. or its subsidiaries. All Rights Reserved. +# Version 9.3.0 +# Copyright (C) 2020-2024 Dell Inc. or its subsidiaries. All Rights Reserved. # GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) # @@ -51,7 +51,7 @@ options: choices: ["ForceOff", "ForceOn", "ForceRestart", "GracefulRestart", "GracefulShutdown", "Nmi", "On", "PowerCycle", "PushPowerButton"] requirements: - - "python >= 3.8.6" + - "python >= 3.9.6" author: - "Sajna Shetty(@Sajna-Shetty)" notes: @@ -118,8 +118,7 @@ error_info: import json import re from ssl import SSLError -from ansible_collections.dellemc.openmanage.plugins.module_utils.redfish import Redfish, redfish_auth_params -from ansible.module_utils.basic import AnsibleModule +from ansible_collections.dellemc.openmanage.plugins.module_utils.redfish import Redfish, RedfishAnsibleModule from ansible.module_utils.six.moves.urllib.error import URLError, HTTPError from ansible.module_utils.urls import ConnectionError @@ -241,9 +240,7 @@ def main(): "choices": ['ForceOff', 'ForceOn', 'ForceRestart', 'GracefulRestart', 'GracefulShutdown', 'Nmi', 'On', 'PowerCycle', 'PushPowerButton']}, } - specs.update(redfish_auth_params) - - module = AnsibleModule( + module = RedfishAnsibleModule( argument_spec=specs, supports_check_mode=True) try: diff --git a/ansible_collections/dellemc/openmanage/plugins/modules/redfish_storage_volume.py b/ansible_collections/dellemc/openmanage/plugins/modules/redfish_storage_volume.py index 3de200a8f..25360bece 100644 --- a/ansible_collections/dellemc/openmanage/plugins/modules/redfish_storage_volume.py +++ b/ansible_collections/dellemc/openmanage/plugins/modules/redfish_storage_volume.py @@ -3,7 +3,7 @@ # # Dell OpenManage Ansible Modules -# Version 9.1.0 +# Version 9.3.0 # Copyright (C) 2019-2024 Dell Inc. or its subsidiaries. All Rights Reserved. # GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) @@ -374,8 +374,7 @@ error_info: import json import copy from ssl import SSLError -from ansible_collections.dellemc.openmanage.plugins.module_utils.redfish import Redfish, redfish_auth_params -from ansible.module_utils.basic import AnsibleModule +from ansible_collections.dellemc.openmanage.plugins.module_utils.redfish import Redfish, RedfishAnsibleModule from ansible.module_utils.compat.version import LooseVersion from ansible.module_utils.six.moves.urllib.error import URLError, HTTPError from ansible.module_utils.urls import ConnectionError, SSLValidationError @@ -945,10 +944,7 @@ def main(): "job_wait": {"required": False, "type": "bool", "default": False}, "job_wait_timeout": {"required": False, "type": "int", "default": 1200} } - - specs.update(redfish_auth_params) - - module = AnsibleModule( + module = RedfishAnsibleModule( argument_spec=specs, mutually_exclusive=[['state', 'command'], ['volume_type', 'raid_type']], required_one_of=[['state', 'command']], diff --git a/ansible_collections/dellemc/openmanage/roles/idrac_attributes/molecule/default/converge.yml b/ansible_collections/dellemc/openmanage/roles/idrac_attributes/molecule/default/converge.yml index f1ae0f548..d7d393ec1 100644 --- a/ansible_collections/dellemc/openmanage/roles/idrac_attributes/molecule/default/converge.yml +++ b/ansible_collections/dellemc/openmanage/roles/idrac_attributes/molecule/default/converge.yml @@ -13,16 +13,14 @@ validate_certs: false idrac_attributes: SSH.1.Timeout: 1800 - ignore_errors: true ignore_unreachable: true register: idrac_attributes_error_msg - name: Asserting after performing operation with wrong hostname ansible.builtin.assert: - that: - - "'Incorrect username or password, - unreachable iDRAC IP' in '{{ idrac_attributes_out.msg }}' or - 'Name or service not known' in '{{ idrac_attributes_out.msg }}'" + that: >- + '"<urlopen error [Errno -2] Name or service not known>" in + idrac_attributes_out.msg' - name: Perform update with wrong username ansible.builtin.import_role: @@ -35,7 +33,6 @@ idrac_attributes: SSH.1.Timeout: 1800 ignore_errors: true - ignore_unreachable: true register: idrac_attributes_error_msg - name: Asserting after performing operation with wrong username @@ -54,15 +51,12 @@ idrac_attributes: SSH.1.Timeout: 1800 ignore_errors: true - ignore_unreachable: true register: idrac_attributes_error_msg - name: Asserting after performing operation with wrong password ansible.builtin.assert: - that: |- - ('"HTTP Error 401" in idrac_attributes_out.msg') - or - ('"urlopen error timed out" in idrac_attributes_out.msg') + that: + - '"HTTP Error 401" in idrac_attributes_out.msg' - name: Perform update with invalid https_port ansible.builtin.import_role: @@ -75,16 +69,14 @@ https_port: 9999999 idrac_attributes: SSH.1.Timeout: 1800 - ignore_errors: true ignore_unreachable: true register: idrac_attributes_error_msg - name: Asserting after performing operation with invalid https_port ansible.builtin.assert: - that: - - ('"Connection refused" in idrac_attributes_out.msg') - or - ('"urlopen error timed out" in idrac_attributes_out.msg') + that: >- + '"<urlopen error [Errno 111] Connection refused>" in + idrac_attributes_out.msg' - name: Perform update with invalid validate_certs ansible.builtin.import_role: @@ -118,14 +110,15 @@ validate_certs: true idrac_attributes: SSH.1.Timeout: 1800 - ignore_errors: true ignore_unreachable: true register: idrac_attributes_error_msg - name: Asserting after performing operation with wrong ca_path ansible.builtin.assert: - that: - - '"certificate verify failed" in idrac_attributes_out.msg' + that: >- + '"<urlopen error [SSL: CERTIFICATE_VERIFY_FAILED] certificate verify + failed: self signed certificate (_ssl.c:1129)>" in + idrac_attributes_out.msg' - name: Perform update with wrong manager_id ansible.builtin.import_role: @@ -140,13 +133,12 @@ SSH.1.Timeout: 1800 manager_id: idrac.random.5 ignore_errors: true - ignore_unreachable: true register: idrac_attributes_error_msg - name: Asserting after performing operation with wrong manager_id ansible.builtin.assert: that: - - '"HTTP Error 404" in idrac_attributes_out.msg' + - '"HTTP Error 404: Not Found" in idrac_attributes_out.msg' - name: Perform update with read only attributes ansible.builtin.import_role: @@ -161,7 +153,6 @@ SSH.1.MaxSessions: 5 manager_id: "{{ null | default(omit) }}" ignore_errors: true - ignore_unreachable: true register: idrac_attributes_error_msg - name: Asserting after performing operation with read only attributes diff --git a/ansible_collections/dellemc/openmanage/roles/idrac_bios/molecule/clear_pending_attributes/prepare.yml b/ansible_collections/dellemc/openmanage/roles/idrac_bios/molecule/clear_pending_attributes/prepare.yml index a91b20b69..bce98ac96 100644 --- a/ansible_collections/dellemc/openmanage/roles/idrac_bios/molecule/clear_pending_attributes/prepare.yml +++ b/ansible_collections/dellemc/openmanage/roles/idrac_bios/molecule/clear_pending_attributes/prepare.yml @@ -13,6 +13,10 @@ url: "https://{{ idrac_ip }}:{{ idrac_port }}/redfish/v1/Managers\ /iDRAC.Embedded.1/Jobs?$expand=*($levels=1)" + - name: Initialize idrac_bios_jobs_items variable + ansible.builtin.set_fact: + idrac_bios_jobs_items: [] + - name: Fetch Bios Jobs Data loop: "{{ idrac_bios_uri_data.json.Members }}" when: item.JobType == 'BIOSConfiguration' and item.JobState in ['Scheduled', 'Scheduling'] diff --git a/ansible_collections/dellemc/openmanage/roles/idrac_boot/molecule/boot_source_override_enabled_as_continuous_reset_type_none/converge.yml b/ansible_collections/dellemc/openmanage/roles/idrac_boot/molecule/boot_source_override_enabled_as_continuous_reset_type_none/converge.yml index a1e11acdd..dbf9d273b 100644 --- a/ansible_collections/dellemc/openmanage/roles/idrac_boot/molecule/boot_source_override_enabled_as_continuous_reset_type_none/converge.yml +++ b/ansible_collections/dellemc/openmanage/roles/idrac_boot/molecule/boot_source_override_enabled_as_continuous_reset_type_none/converge.yml @@ -109,5 +109,7 @@ - name: Asserting TC-115433 in normal mode ansible.builtin.assert: - that: idrac_boot_out.msg == "The boot settings job is triggered successfully." + that: >- + "The boot settings operation is triggered/submitted successfully." in + idrac_boot_out.msg when: not ansible_check_mode diff --git a/ansible_collections/dellemc/openmanage/roles/idrac_boot/molecule/boot_source_override_enabled_as_disabled_reset_type_none/converge.yml b/ansible_collections/dellemc/openmanage/roles/idrac_boot/molecule/boot_source_override_enabled_as_disabled_reset_type_none/converge.yml index 8c8d2d443..3cd71f208 100644 --- a/ansible_collections/dellemc/openmanage/roles/idrac_boot/molecule/boot_source_override_enabled_as_disabled_reset_type_none/converge.yml +++ b/ansible_collections/dellemc/openmanage/roles/idrac_boot/molecule/boot_source_override_enabled_as_disabled_reset_type_none/converge.yml @@ -92,7 +92,9 @@ - name: Asserting TC-115431 in normal mode ansible.builtin.assert: - that: idrac_boot_out.msg == "The boot settings job is triggered successfully." + that: >- + "The boot settings operation is triggered/submitted successfully." in + idrac_boot_out.msg when: not ansible_check_mode and idrac_boot_out.changed - name: Asserting TC-115431 in idempotence mode diff --git a/ansible_collections/dellemc/openmanage/roles/idrac_boot/molecule/boot_source_override_enabled_as_once_reset_type_none/converge.yml b/ansible_collections/dellemc/openmanage/roles/idrac_boot/molecule/boot_source_override_enabled_as_once_reset_type_none/converge.yml index 8fc9af6dc..d9aeee409 100644 --- a/ansible_collections/dellemc/openmanage/roles/idrac_boot/molecule/boot_source_override_enabled_as_once_reset_type_none/converge.yml +++ b/ansible_collections/dellemc/openmanage/roles/idrac_boot/molecule/boot_source_override_enabled_as_once_reset_type_none/converge.yml @@ -91,6 +91,8 @@ - name: Asserting TC-115432 in normal mode or idempotence mode ansible.builtin.assert: - that: - - 'idrac_boot_out.msg == "The boot settings job is triggered successfully." or "No changes found to be applied."' + that: >- + 'idrac_boot_out.msg == "The boot settings operation is + triggered/submitted successfully." or "No changes found to be + applied."' when: not ansible_check_mode and not idrac_boot_out.changed diff --git a/ansible_collections/dellemc/openmanage/roles/idrac_boot/molecule/boot_source_override_mode_legacy_job_wait_false/converge.yml b/ansible_collections/dellemc/openmanage/roles/idrac_boot/molecule/boot_source_override_mode_legacy_job_wait_false/converge.yml index 85b84477f..142a0bebb 100644 --- a/ansible_collections/dellemc/openmanage/roles/idrac_boot/molecule/boot_source_override_mode_legacy_job_wait_false/converge.yml +++ b/ansible_collections/dellemc/openmanage/roles/idrac_boot/molecule/boot_source_override_mode_legacy_job_wait_false/converge.yml @@ -105,6 +105,8 @@ - name: Asserting TC-115429 in normal mode or idempotence mode ansible.builtin.assert: - that: - - 'idrac_boot_out.msg == "The boot settings job is triggered successfully." or "No changes found to be applied."' + that: >- + 'idrac_boot_out.msg == "The boot settings operation is + triggered/submitted successfully." or "No changes found to + be applied."' when: not ansible_check_mode and not idrac_boot_out.changed diff --git a/ansible_collections/dellemc/openmanage/roles/idrac_certificate/molecule/default/converge.yml b/ansible_collections/dellemc/openmanage/roles/idrac_certificate/molecule/default/converge.yml index 021cec95f..3b394ff6b 100644 --- a/ansible_collections/dellemc/openmanage/roles/idrac_certificate/molecule/default/converge.yml +++ b/ansible_collections/dellemc/openmanage/roles/idrac_certificate/molecule/default/converge.yml @@ -165,9 +165,9 @@ - name: Verify task status - Negative - invalid unreachable host ansible.builtin.assert: - that: - - idrac_certificate_out.unreachable - - '"Unable to communicate with" in idrac_certificate_out.msg' + that: >- + '"<urlopen error [Errno -2] Name or service not known>" in + idrac_certificate_out.msg' and idrac_certificate_out.unreachable - name: Negative - invalid idrac user ansible.builtin.import_role: diff --git a/ansible_collections/dellemc/openmanage/roles/idrac_certificate/molecule/default/molecule.yml b/ansible_collections/dellemc/openmanage/roles/idrac_certificate/molecule/default/molecule.yml index e69de29bb..c6b1e43af 100644 --- a/ansible_collections/dellemc/openmanage/roles/idrac_certificate/molecule/default/molecule.yml +++ b/ansible_collections/dellemc/openmanage/roles/idrac_certificate/molecule/default/molecule.yml @@ -0,0 +1,12 @@ +--- +scenario: + test_sequence: + - dependency + - cleanup + - destroy + - syntax + - create + - prepare + - check + - converge + - destroy diff --git a/ansible_collections/dellemc/openmanage/roles/idrac_gather_facts/molecule/backplane/converge.yml b/ansible_collections/dellemc/openmanage/roles/idrac_gather_facts/molecule/backplane/converge.yml index 9aab189c2..928369a3b 100644 --- a/ansible_collections/dellemc/openmanage/roles/idrac_gather_facts/molecule/backplane/converge.yml +++ b/ansible_collections/dellemc/openmanage/roles/idrac_gather_facts/molecule/backplane/converge.yml @@ -40,12 +40,6 @@ register: backplane_result_url no_log: true - - name: Validate whether PCIeSSDBackPlane information exists - ansible.builtin.assert: - that: - - "{{ backplane_result_url.json.Members | length > 0 }}" - fail_msg: "PCIeSSDBackPlane information does not exist" - - name: Set PCIeSSDBackPlane facts ansible.builtin.set_fact: api_response: "{{ backplane_result_url.json.Members | ansible.utils.remove_keys(target=['@odata.context', '@odata.id', '@odata.type']) }}" @@ -54,9 +48,18 @@ ansible.builtin.include_role: name: "idrac_gather_facts" + - name: Assert backplane data + ansible.builtin.assert: + that: + - "((api_response | length == 0) and (backplane | length == 0))" + fail_msg: "The response from the role does not match" + success_msg: "The response from the role matches" + when: api_response | length == 0 + - name: Check whether output differs ansible.builtin.set_fact: result_diff: "{{ backplane | symmetric_difference(api_response) }}" + when: api_response | length > 0 - name: Assert the differences in List ansible.builtin.assert: @@ -64,3 +67,4 @@ success_msg: "The response from the role matches" that: - "{{ (result_diff | length) == 0 }}" + when: api_response | length > 0 diff --git a/ansible_collections/dellemc/openmanage/roles/idrac_gather_facts/molecule/passensor/converge.yml b/ansible_collections/dellemc/openmanage/roles/idrac_gather_facts/molecule/passensor/converge.yml index c4d86a62b..0194b2019 100644 --- a/ansible_collections/dellemc/openmanage/roles/idrac_gather_facts/molecule/passensor/converge.yml +++ b/ansible_collections/dellemc/openmanage/roles/idrac_gather_facts/molecule/passensor/converge.yml @@ -27,13 +27,52 @@ api_system: "/redfish/v1/Systems/System.Embedded.1" tasks: + - name: Fetching Presence and Status Sensor info + ansible.builtin.uri: + url: "https://{{ hostname }}{{ api_system }}/Oem/ + Dell/DellPresenceAndStatusSensors" + validate_certs: "{{ validate_certs }}" + ca_path: "{{ ca_path | default(omit) }}" + method: "{{ idrac_gather_facts_uri_method }}" + user: "{{ username }}" + password: "{{ password }}" + headers: "{{ idrac_gather_facts_uri_headers }}" + body_format: "{{ idrac_gather_facts_uri_body_format }}" + status_code: "{{ idrac_gather_facts_uri_status_code }}" + return_content: "{{ idrac_gather_facts_uri_return_content }}" + no_log: true + register: passensor_result + + - name: Set presence and status sensor facts + ansible.builtin.set_fact: + api_response: "{{ passensor_result.json.Members | + ansible.utils.remove_keys(target=['@odata.context', + '@odata.id', '@odata.type', 'Assembly', 'Links']) }}" + when: passensor_result.json.Members is defined + - name: Gather Facts for the Presence and Status Sensor ansible.builtin.include_role: name: "idrac_gather_facts" - - name: Call assertion - ansible.builtin.include_tasks: ../../tests/asserts/passensor_assert.yml - with_items: "{{ presence_and_status_sensor }}" - loop_control: - loop_var: passensor_data - when: presence_and_status_sensor | length > 0 + - name: Assert Presence and Status Sensor data + ansible.builtin.assert: + that: + - "((api_response | length == 0) and + (presence_and_status_sensor | length == 0))" + fail_msg: "The response from the role does not match" + success_msg: "The response from the role matches" + when: api_response | length == 0 + + - name: Check whether output differs + ansible.builtin.set_fact: + result_diff: "{{ presence_and_status_sensor | + symmetric_difference(api_response) }}" + when: api_response | length > 0 + + - name: Assert the differences in List + ansible.builtin.assert: + fail_msg: "The response from the role does not match" + success_msg: "The response from the role matches" + that: + - "{{ (result_diff | length) == 0 }}" + when: api_response | length > 0 diff --git a/ansible_collections/dellemc/openmanage/roles/idrac_gather_facts/molecule/physicaldisk/converge.yml b/ansible_collections/dellemc/openmanage/roles/idrac_gather_facts/molecule/physicaldisk/converge.yml index ef2414535..430237de0 100644 --- a/ansible_collections/dellemc/openmanage/roles/idrac_gather_facts/molecule/physicaldisk/converge.yml +++ b/ansible_collections/dellemc/openmanage/roles/idrac_gather_facts/molecule/physicaldisk/converge.yml @@ -43,7 +43,10 @@ - name: Get all storage controller ids. ansible.builtin.set_fact: - storage_ids_list: "{{ idrac_gather_facts_controllers_result.json.Members | map('dict2items') | flatten | map(attribute='value') }}" + storage_ids_list: + "{{ idrac_gather_facts_controllers_result.json.Members | + map('dict2items') | flatten | map(attribute='value') }}" + when: idrac_gather_facts_controllers_result.json.Members is defined - name: Get physical disk information using API. ansible.builtin.uri: @@ -52,31 +55,42 @@ loop: "{{ storage_ids_list }}" no_log: true register: idrac_gather_facts_disk_result + when: storage_ids_list is defined - name: Count the number of drives in drives_result.results ansible.builtin.set_fact: - drives_count: "{{ idrac_gather_facts_disk_result.results | map(attribute='json.drives') | list | length }}" - - - name: Validate whether physical disk information exists - ansible.builtin.assert: - that: - - "{{ drives_count | int > 0 }}" - fail_msg: "Physical Disk information does not exist" + drives_count: "{{ idrac_gather_facts_disk_result.results | + map(attribute='json.drives') | list | length }}" + when: idrac_gather_facts_disk_result.results is defined - name: Set Physical Disk facts ansible.builtin.set_fact: api_response: - "{{ disk_result.results | selectattr('json', 'defined') | map(attribute='json') | selectattr('Drives', 'defined') | - map(attribute='Drives') | flatten | ansible.utils.remove_keys(target=['@odata.context', '@odata.id', '@odata.type', - 'Actions', 'Assembly', 'Links', 'DellDriveSMARTAttributes', 'DellNVMeSMARTAttributes', 'Operations@odata.count']) }}" + "{{ idrac_gather_facts_disk_result.results | + selectattr('json', 'defined') | map(attribute='json') | + selectattr('Drives', 'defined') | map(attribute='Drives') | + flatten | ansible.utils.remove_keys(target=['@odata.context', + '@odata.id', '@odata.type', 'Actions', 'Assembly', 'Links', + 'DellDriveSMARTAttributes', 'DellNVMeSMARTAttributes', + 'Operations@odata.count']) }}" + when: idrac_gather_facts_disk_result.results is defined - name: Gather Facts for the Physical Disk component ansible.builtin.include_role: name: "idrac_gather_facts" + - name: Assert Physical Disk data + ansible.builtin.assert: + that: + - "((drives_count | length == 0) and (physical_disk | length == 0))" + fail_msg: "The response from the role does not match" + success_msg: "The response from the role matches" + when: drives_count | length == 0 + - name: Check whether output differs ansible.builtin.set_fact: result_diff: "{{ physical_disk | symmetric_difference(api_response) }}" + when: drives_count | length > 0 - name: Assert the differences in List ansible.builtin.assert: @@ -84,3 +98,4 @@ success_msg: "The response from the role matches" that: - "{{ (result_diff | length) == 0 }}" + when: drives_count | length > 0 diff --git a/ansible_collections/dellemc/openmanage/roles/idrac_gather_facts/molecule/powersupply/converge.yml b/ansible_collections/dellemc/openmanage/roles/idrac_gather_facts/molecule/powersupply/converge.yml index 0f648b875..b0e9a2f0b 100644 --- a/ansible_collections/dellemc/openmanage/roles/idrac_gather_facts/molecule/powersupply/converge.yml +++ b/ansible_collections/dellemc/openmanage/roles/idrac_gather_facts/molecule/powersupply/converge.yml @@ -24,20 +24,54 @@ idrac_gather_facts_uri_return_content: true diff_data: {} exclude_keys: [] + api_chassis: "/redfish/v1/Chassis/System.Embedded.1" + power_supply_api: "/PowerSubsystem/PowerSupplies?$expand=*($levels=1)" tasks: + - name: Fetching Power Supply info + ansible.builtin.uri: + url: "https://{{ hostname }}{{ api_chassis }}{{ power_supply_api }}" + validate_certs: "{{ validate_certs }}" + ca_path: "{{ ca_path | default(omit) }}" + method: "{{ idrac_gather_facts_uri_method }}" + user: "{{ username }}" + password: "{{ password }}" + headers: "{{ idrac_gather_facts_uri_headers }}" + body_format: "{{ idrac_gather_facts_uri_body_format }}" + status_code: "{{ idrac_gather_facts_uri_status_code }}" + return_content: "{{ idrac_gather_facts_uri_return_content }}" + register: powersupply_result + no_log: true + + - name: Set powersupply facts + ansible.builtin.set_fact: + api_response: + "{{ powersupply_result.json.Members | + ansible.utils.remove_keys(target=['@odata.context', '@odata.id', + '@odata.type', 'ActiveInputVoltage@Redfish.Deprecated', + 'OperationalStatus@odata.count', 'RedTypeOfSet@odata.count']) }}" + - name: Gather Facts for the Power Supply component ansible.builtin.include_role: name: "idrac_gather_facts" - - name: Assert power supply dict for length + - name: Assert power supply data ansible.builtin.assert: that: - - "{{ power_supply | length > 0 }}" + - "((api_response | length == 0) and (power_supply | length == 0))" + fail_msg: "The response from the role does not match" + success_msg: "The response from the role matches" + when: api_response | length == 0 + + - name: Check whether output differs + ansible.builtin.set_fact: + result_diff: "{{ power_supply | symmetric_difference(api_response) }}" + when: api_response | length > 0 - - name: Call assertion - ansible.builtin.include_tasks: ../../tests/asserts/powersupply_assert.yml - with_items: "{{ power_supply }}" - loop_control: - loop_var: powersupply_data - when: power_supply | length > 0 + - name: Assert the differences in List + ansible.builtin.assert: + fail_msg: "The response from the role does not match" + success_msg: "The response from the role matches" + that: + - "{{ (result_diff | length) == 0 }}" + when: api_response | length > 0 diff --git a/ansible_collections/dellemc/openmanage/roles/idrac_gather_facts/molecule/systemmetrics/converge.yml b/ansible_collections/dellemc/openmanage/roles/idrac_gather_facts/molecule/systemmetrics/converge.yml index 418aa2b78..ea49daa8d 100644 --- a/ansible_collections/dellemc/openmanage/roles/idrac_gather_facts/molecule/systemmetrics/converge.yml +++ b/ansible_collections/dellemc/openmanage/roles/idrac_gather_facts/molecule/systemmetrics/converge.yml @@ -30,49 +30,11 @@ ansible.builtin.include_role: name: "idrac_gather_facts" - - name: Assert power metrics dict for length - ansible.builtin.assert: - that: - - "{{ power_metrics | length > 0 }}" - - - name: Assert thermal metrics dict for length - ansible.builtin.assert: - that: - - "{{ thermal_metrics | length > 0 }}" - - - name: Assert memory metrics dict for length - ansible.builtin.assert: - that: - - "{{ memory_metrics | length > 0 }}" - - - name: Get Thermal Metrics information. - ansible.builtin.uri: - url: "https://{{ hostname }}{{ api_chassis }}/ThermalSubsystem/ThermalMetrics" - validate_certs: "{{ validate_certs }}" - method: "{{ idrac_gather_facts_uri_method }}" - user: "{{ username }}" - password: "{{ password }}" - headers: "{{ idrac_gather_facts_uri_headers }}" - body_format: "{{ idrac_gather_facts_uri_body_format }}" - status_code: "{{ idrac_gather_facts_uri_status_code }}" - return_content: "{{ idrac_gather_facts_uri_return_content }}" - register: response_thermal_metrics - no_log: true - - - name: Set Thermal Metrics facts - ansible.builtin.set_fact: - api_thermal_metrics: "{{ response_thermal_metrics.json | - ansible.utils.remove_keys(target=['@odata.context', '@odata.type', '@odata.id', 'DataSourceUri', 'TemperatureReadingsCelsius@odata.count']) }}" - - name: Call assertion for thermal metrics ansible.builtin.include_tasks: ../../tests/asserts/tmetrics_assert.yml - name: Call assertion for memory metrics ansible.builtin.include_tasks: ../../tests/asserts/mmetrics_assert.yml - with_items: "{{ memory_metrics }}" - loop_control: - loop_var: memory_data - when: memory_metrics | length > 0 - name: Get Power Supply information. ansible.builtin.uri: @@ -92,10 +54,18 @@ ansible.builtin.set_fact: psu_ids: "{{ power_result.json.Members | map(attribute='Id') | list }}" + - name: Assert Power Supply Metrics metrics + ansible.builtin.assert: + that: + - "((psu_ids | length == 0) and (power_metrics | length == 0))" + fail_msg: "The response from the role does not match" + success_msg: "The response from the role matches" + when: psu_ids| length == 0 + - name: Call assertion for Power metrics ansible.builtin.include_tasks: ../../tests/asserts/psmetrics_assert.yml with_items: "{{ power_metrics }}" loop_control: loop_var: power_data index_var: index - when: power_metrics | length > 0 + when: psu_ids | length > 0 diff --git a/ansible_collections/dellemc/openmanage/roles/idrac_gather_facts/tests/asserts/mmetrics_assert.yml b/ansible_collections/dellemc/openmanage/roles/idrac_gather_facts/tests/asserts/mmetrics_assert.yml index 1cc040b73..6964f8d12 100644 --- a/ansible_collections/dellemc/openmanage/roles/idrac_gather_facts/tests/asserts/mmetrics_assert.yml +++ b/ansible_collections/dellemc/openmanage/roles/idrac_gather_facts/tests/asserts/mmetrics_assert.yml @@ -1,6 +1,6 @@ - name: Get Memory information. - ansible.builtin.uri: - url: "https://{{ hostname }}{{ api_system }}/Memory/{{ memory_data.Id }}/MemoryMetrics" + ansible.builtin.uri: &api_params + url: "https://{{ hostname }}{{ api_system }}/Memory?$expand=*($levels=1)" validate_certs: "{{ validate_certs }}" method: "{{ idrac_gather_facts_uri_method }}" user: "{{ username }}" @@ -9,30 +9,50 @@ body_format: "{{ idrac_gather_facts_uri_body_format }}" status_code: "{{ idrac_gather_facts_uri_status_code }}" return_content: "{{ idrac_gather_facts_uri_return_content }}" + register: response_memory + no_log: true + +- name: Get Memory Metrics ids + ansible.builtin.set_fact: + memory_metrics_ids: "{{ response_memory.json.Members | + selectattr('Metrics', 'defined') | map(attribute='Metrics') | flatten }}" + when: response_memory.json.Members is defined + +- name: Get Memory Metrics information. + ansible.builtin.uri: + url: "https://{{ hostname }}{{ item['@odata.id'] }}" + <<: *api_params + loop: "{{ memory_metrics_ids }}" register: response_memory_metrics no_log: true - name: Set Memory Metrics facts ansible.builtin.set_fact: - api_memory_metrics: "{{ response_memory_metrics.json | ansible.utils.remove_keys(target=['@odata.context', '@odata.type', '@odata.id', 'DataSourceUri']) }}" + api_memory_metrics: "{{ response_memory_metrics.results | + selectattr('json', 'defined') | map(attribute='json') | + flatten | ansible.utils.remove_keys(target=['@odata.context', + '@odata.type', '@odata.id', 'DataSourceUri']) }}" + when: response_memory_metrics.results is defined -- name: Set the keys diff - ansible.builtin.set_fact: - diff_keys: "{{ memory_data.keys() | list | symmetric_difference((api_memory_metrics.keys() | list)) }}" +- name: Assert memory metrics + ansible.builtin.assert: + that: + - "((api_memory_metrics | length == 0) and + (memory_metrics | length == 0))" + fail_msg: "The response from the role does not match" + success_msg: "The response from the role matches" + when: api_memory_metrics| length == 0 -- name: Set a diff of dict +- name: Check whether output differs ansible.builtin.set_fact: - diff_data: "{{ diff_data | combine({item: memory_data[item]}) }}" - loop: "{{ memory_data.keys() }}" - when: - - diff_keys | length == 0 - - memory_data[item] != api_memory_metrics[item] - - item not in exclude_keys + result_diff: "{{ memory_metrics | + symmetric_difference(api_memory_metrics) }}" + when: api_memory_metrics| length > 0 -- name: Assert the difference in Keys +- name: Assert the differences in List ansible.builtin.assert: + fail_msg: "The response from the role does not match" + success_msg: "The response from the role matches" that: - - "{{ (diff_keys | length) == 0 }}" - - "{{ (diff_data | length) == 0 }}" - fail_msg: "The response from the role does not match | Diff Keys : {{ diff_keys }} Diff Data : {{ diff_data }}" - success_msg: "The response from the role matches | Diff Keys : {{ diff_keys }} Diff Data : {{ diff_data }}" + - "{{ (result_diff | length) == 0 }}" + when: api_memory_metrics| length > 0 diff --git a/ansible_collections/dellemc/openmanage/roles/idrac_gather_facts/tests/asserts/passensor_assert.yml b/ansible_collections/dellemc/openmanage/roles/idrac_gather_facts/tests/asserts/passensor_assert.yml deleted file mode 100644 index 6931c9204..000000000 --- a/ansible_collections/dellemc/openmanage/roles/idrac_gather_facts/tests/asserts/passensor_assert.yml +++ /dev/null @@ -1,39 +0,0 @@ -- name: Fetching Presence and Status Sensor info - ansible.builtin.uri: - url: "https://{{ hostname }}{{ api_system }}/Oem/Dell/DellPresenceAndStatusSensors/{{ passensor_data.Id }}" - validate_certs: "{{ validate_certs }}" - ca_path: "{{ ca_path | default(omit) }}" - method: "{{ idrac_gather_facts_uri_method }}" - user: "{{ username }}" - password: "{{ password }}" - headers: "{{ idrac_gather_facts_uri_headers }}" - body_format: "{{ idrac_gather_facts_uri_body_format }}" - status_code: "{{ idrac_gather_facts_uri_status_code }}" - return_content: "{{ idrac_gather_facts_uri_return_content }}" - no_log: true - register: passensor_result - -- name: Set presence and status sensor facts - ansible.builtin.set_fact: - api_response: "{{ passensor_result.json | ansible.utils.remove_keys(target=['@odata.context', '@odata.id', '@odata.type', 'Assembly', 'Links']) }}" - -- name: Set the keys diff - ansible.builtin.set_fact: - diff_keys: "{{ passensor_data.keys() | list | symmetric_difference((api_response.keys() | list)) }}" - -- name: Set a diff of dict - ansible.builtin.set_fact: - diff_data: "{{ diff_data | combine({item: passensor_data[item]}) }}" - loop: "{{ passensor_data.keys() }}" - when: - - diff_keys | length == 0 - - passensor_data[item] != api_response[item] - - item not in exclude_keys - -- name: Assert the difference in Keys - ansible.builtin.assert: - that: - - "{{ (diff_keys | length) == 0 }}" - - "{{ (diff_data | length) == 0 }}" - fail_msg: "The response from the role does not match | Diff Keys : {{ diff_keys }} Diff Data : {{ diff_data }}" - success_msg: "The response from the role matches | Diff Keys : {{ diff_keys }} Diff Data : {{ diff_data }}" diff --git a/ansible_collections/dellemc/openmanage/roles/idrac_gather_facts/tests/asserts/powersupply_assert.yml b/ansible_collections/dellemc/openmanage/roles/idrac_gather_facts/tests/asserts/powersupply_assert.yml deleted file mode 100644 index ddb77ce04..000000000 --- a/ansible_collections/dellemc/openmanage/roles/idrac_gather_facts/tests/asserts/powersupply_assert.yml +++ /dev/null @@ -1,42 +0,0 @@ -- name: Fetching Power Supply info - ansible.builtin.uri: - url: "https://{{ hostname }}{{ api_chassis }}/PowerSubsystem/PowerSupplies/{{ powersupply_data.Id }}" - validate_certs: "{{ validate_certs }}" - ca_path: "{{ ca_path | default(omit) }}" - method: "{{ idrac_gather_facts_uri_method }}" - user: "{{ username }}" - password: "{{ password }}" - headers: "{{ idrac_gather_facts_uri_headers }}" - body_format: "{{ idrac_gather_facts_uri_body_format }}" - status_code: "{{ idrac_gather_facts_uri_status_code }}" - return_content: "{{ idrac_gather_facts_uri_return_content }}" - register: powersupply_result - no_log: true - -- name: Set powersupply facts - ansible.builtin.set_fact: - api_response: - "{{ powersupply_result.json | ansible.utils.remove_keys(target=['@odata.context', - '@odata.id', '@odata.type', 'ActiveInputVoltage@Redfish.Deprecated', 'OperationalStatus@odata.count', - 'RedTypeOfSet@odata.count']) }}" - -- name: Set the keys diff - ansible.builtin.set_fact: - diff_keys: "{{ powersupply_data.keys() | list | symmetric_difference((api_response.keys() | list)) }}" - -- name: Set a diff of dict - ansible.builtin.set_fact: - diff_data: "{{ diff_data | combine({item: powersupply_data[item]}) }}" - loop: "{{ powersupply_data.keys() }}" - when: - - diff_keys | length == 0 - - powersupply_data[item] != api_response[item] - - item not in exclude_keys - -- name: Assert the difference in Keys - ansible.builtin.assert: - that: - - "{{ (diff_keys | length) == 0 }}" - - "{{ (diff_data | length) == 0 }}" - fail_msg: "The response from the role does not match | Diff Keys : {{ diff_keys }} Diff Data : {{ diff_data }}" - success_msg: "The response from the role matches | Diff Keys : {{ diff_keys }} Diff Data : {{ diff_data }}" diff --git a/ansible_collections/dellemc/openmanage/roles/idrac_gather_facts/tests/asserts/tmetrics_assert.yml b/ansible_collections/dellemc/openmanage/roles/idrac_gather_facts/tests/asserts/tmetrics_assert.yml index 25a8229cf..93f1e3960 100644 --- a/ansible_collections/dellemc/openmanage/roles/idrac_gather_facts/tests/asserts/tmetrics_assert.yml +++ b/ansible_collections/dellemc/openmanage/roles/idrac_gather_facts/tests/asserts/tmetrics_assert.yml @@ -1,20 +1,46 @@ -- name: Set the keys diff +--- +- name: Get Thermal Metrics information. + ansible.builtin.uri: + url: + "https://{{ hostname }}{{ api_chassis }}/ThermalSubsystem/ThermalMetrics" + validate_certs: "{{ validate_certs }}" + method: "{{ idrac_gather_facts_uri_method }}" + user: "{{ username }}" + password: "{{ password }}" + headers: "{{ idrac_gather_facts_uri_headers }}" + body_format: "{{ idrac_gather_facts_uri_body_format }}" + status_code: "{{ idrac_gather_facts_uri_status_code }}" + return_content: "{{ idrac_gather_facts_uri_return_content }}" + register: response_thermal_metrics + no_log: true + +- name: Set Thermal Metrics facts ansible.builtin.set_fact: - diff_keys: "{{ thermal_metrics.keys() | list | symmetric_difference((api_thermal_metrics.keys() | list)) }}" + api_thermal_metrics: "{{ response_thermal_metrics.json | + ansible.utils.remove_keys(target=['@odata.context', '@odata.type', + '@odata.id', 'DataSourceUri', + 'TemperatureReadingsCelsius@odata.count']) }}" + when: response_thermal_metrics is defined + +- name: Assert thermal metrics + ansible.builtin.assert: + that: + - "((api_thermal_metrics | length == 0) and + (thermal_metrics | length == 0))" + fail_msg: "The response from the role does not match" + success_msg: "The response from the role matches" + when: api_thermal_metrics| length == 0 -- name: Set a diff of dict +- name: Check whether output differs ansible.builtin.set_fact: - diff_data: "{{ diff_data | combine({item: thermal_metrics[item]}) }}" - loop: "{{ thermal_metrics.keys() }}" - when: - - diff_keys | length == 0 - - thermal_metrics[item] != api_thermal_metrics[item] - - item not in exclude_keys + result_diff: "{{ thermal_metrics | + symmetric_difference(api_thermal_metrics) }}" + when: api_thermal_metrics | length > 0 -- name: Assert the difference in Keys +- name: Assert the differences in List ansible.builtin.assert: + fail_msg: "The response from the role does not match" + success_msg: "The response from the role matches" that: - - "{{ (diff_keys | length) == 0 }}" - - "{{ (diff_data | length) == 0 }}" - fail_msg: "The response from the role does not match | Diff Keys : {{ diff_keys }} Diff Data : {{ diff_data }}" - success_msg: "The response from the role matches | Diff Keys : {{ diff_keys }} Diff Data : {{ diff_data }}" + - "{{ (result_diff | length) == 0 }}" + when: api_thermal_metrics | length > 0 diff --git a/ansible_collections/dellemc/openmanage/roles/idrac_job_queue/molecule/default/converge.yml b/ansible_collections/dellemc/openmanage/roles/idrac_job_queue/molecule/default/converge.yml index 2c16c6319..24909882f 100644 --- a/ansible_collections/dellemc/openmanage/roles/idrac_job_queue/molecule/default/converge.yml +++ b/ansible_collections/dellemc/openmanage/roles/idrac_job_queue/molecule/default/converge.yml @@ -8,7 +8,7 @@ idrac_ip: "{{ lookup('env', 'IDRAC_IP') }}" idrac_user: "{{ lookup('env', 'IDRAC_USER') }}" idrac_password: "{{ lookup('env', 'IDRAC_PASSWORD') }}" - validate_certs: "{{ lookup('env', 'VALIDATE_CERT') }}" + validate_certs: false scp_components: - IDRAC share_name: "/root/" @@ -26,7 +26,7 @@ hostname: "{{ lookup('env', 'IDRAC_IP') }}" username: "{{ lookup('env', 'IDRAC_USER') }}" password: "{{ lookup('env', 'IDRAC_PASSWORD') }}" - validate_certs: "{{ lookup('env', 'VALIDATE_CERT') }}" + validate_certs: false job_id: JID_12345678 rescue: - name: "Verifying invalid job deletion from the job queue" @@ -44,7 +44,7 @@ username: "{{ lookup('env', 'IDRAC_USER') }}" password: "{{ lookup('env', 'IDRAC_PASSWORD') }}" clear_job_queue: true - validate_certs: "{{ lookup('env', 'VALIDATE_CERT') }}" + validate_certs: false rescue: - name: "Verifying job queue clear with an invalid hostname" @@ -63,7 +63,7 @@ username: "invalidUsername" password: "{{ lookup('env', 'IDRAC_PASSWORD') }}" clear_job_queue: true - validate_certs: "{{ lookup('env', 'VALIDATE_CERT') }}" + validate_certs: false rescue: - name: "Verifying job queue clear with an invalid username" @@ -81,7 +81,7 @@ username: "{{ lookup('env', 'IDRAC_USER') }}" password: "invalidPassword" clear_job_queue: true - validate_certs: "{{ lookup('env', 'VALIDATE_CERT') }}" + validate_certs: false rescue: - name: "Verifying job queue clear with an invalid password" diff --git a/ansible_collections/dellemc/openmanage/roles/idrac_job_queue/molecule/delete_job/converge.yml b/ansible_collections/dellemc/openmanage/roles/idrac_job_queue/molecule/delete_job/converge.yml index 809dda61f..4c99d6b45 100644 --- a/ansible_collections/dellemc/openmanage/roles/idrac_job_queue/molecule/delete_job/converge.yml +++ b/ansible_collections/dellemc/openmanage/roles/idrac_job_queue/molecule/delete_job/converge.yml @@ -9,7 +9,7 @@ hostname: "{{ lookup('env', 'IDRAC_IP') }}" username: "{{ lookup('env', 'IDRAC_USER') }}" password: "{{ lookup('env', 'IDRAC_PASSWORD') }}" - validate_certs: "{{ lookup('env', 'VALIDATE_CERT') }}" + validate_certs: false no_log: true - name: Creating job which configures iDRAC attributes @@ -39,7 +39,7 @@ idrac_ip: "{{ lookup('env', 'IDRAC_IP') }}" idrac_user: "{{ lookup('env', 'IDRAC_USER') }}" idrac_password: "{{ lookup('env', 'IDRAC_PASSWORD') }}" - validate_certs: "{{ lookup('env', 'VALIDATE_CERT') }}" + validate_certs: false scp_components: - IDRAC share_name: "/root/" @@ -53,7 +53,7 @@ - name: Get Job ID. ansible.builtin.uri: url: "https://{{ lookup('env', 'IDRAC_IP') }}/redfish/v1/Managers/iDRAC.Embedded.1/Jobs" - validate_certs: "{{ lookup('env', 'VALIDATE_CERT') }}" + validate_certs: false method: "GET" user: "{{ lookup('env', 'IDRAC_USER') }}" password: "{{ lookup('env', 'IDRAC_PASSWORD') }}" diff --git a/ansible_collections/dellemc/openmanage/roles/redfish_storage_volume/molecule/default/converge.yml b/ansible_collections/dellemc/openmanage/roles/redfish_storage_volume/molecule/default/converge.yml index 221fe3bbd..11e682d7b 100644 --- a/ansible_collections/dellemc/openmanage/roles/redfish_storage_volume/molecule/default/converge.yml +++ b/ansible_collections/dellemc/openmanage/roles/redfish_storage_volume/molecule/default/converge.yml @@ -14,9 +14,9 @@ validate_certs: false state: present volume_type: "NonRedundant" - name: "VD" # noqa: var-naming[no-reserved] - controller_id: "{{ lookup('env', 'CONTROLLER_ID') }}" - drives: "{{ lookup('env', 'PHYSICAL_DISK') }}" + name: "VD" # noqa: var-naming[no-reserved] + controller_id: "" + drives: "" capacity_bytes: 214748364800 optimum_io_size_bytes: 65536 encrypted: false @@ -27,8 +27,9 @@ - name: Asserting after performing operation. ansible.builtin.assert: - that: |- - redfish_storage_volume_out.msg == "<urlopen error [Errno -2] Name or service not known>" + that: >- + '"<urlopen error [Errno 111] Connection refused>" in + redfish_storage_volume_out.msg' - name: To check the behaviour of invalid credentials. ansible.builtin.import_role: @@ -40,9 +41,9 @@ validate_certs: false state: present volume_type: "NonRedundant" - name: "VD" # noqa: var-naming[no-reserved] - controller_id: "{{ lookup('env', 'CONTROLLER_ID') }}" - drives: "{{ lookup('env', 'PHYSICAL_DISK') }}" + name: "VD" # noqa: var-naming[no-reserved] + controller_id: "" + drives: "" capacity_bytes: 214748364800 optimum_io_size_bytes: 65536 encrypted: false @@ -55,7 +56,7 @@ that: |- redfish_storage_volume_out.msg == "HTTP Error 401: Unauthorized" - - name: To check the behaviour of invalid span count. + - name: To check the behaviour of invalid state. ansible.builtin.import_role: name: redfish_storage_volume vars: @@ -63,11 +64,11 @@ username: "{{ lookup('env', 'IDRAC_USER') }}" password: "{{ lookup('env', 'IDRAC_PASSWORD') }}" validate_certs: false - state: present + state: invalid volume_type: "SpannedStripesWithParity" - name: "VD" # noqa: var-naming[no-reserved] - controller_id: "{{ lookup('env', 'CONTROLLER_ID') }}" - drives: "{{ lookup('env', 'PHYSICAL_DISK') }}" + name: "VD" # noqa: var-naming[no-reserved] + controller_id: "" + drives: "" capacity_bytes: 214748364800 optimum_io_size_bytes: 65536 encrypted: false @@ -77,8 +78,9 @@ - name: Asserting after performing operation for invalid span count. ansible.builtin.assert: - that: |- - redfish_storage_volume_out.msg == "HTTP Error 400: Bad Request" + that: >- + redfish_storage_volume_out.msg == "value of state must be one of: + present, absent, got: invalid" when: not ansible_check_mode - name: To check the behaviour of invalid certificate path. @@ -92,9 +94,9 @@ ca_path: "/tmp/invalid_ca_path.pem" state: present volume_type: "SpannedStripesWithParity" - name: "VD" # noqa: var-naming[no-reserved] - controller_id: "{{ lookup('env', 'CONTROLLER_ID') }}" - drives: "{{ lookup('env', 'PHYSICAL_DISK') }}" + name: "VD" # noqa: var-naming[no-reserved] + controller_id: "" + drives: "" capacity_bytes: 214748364800 optimum_io_size_bytes: 65536 encrypted: false @@ -105,10 +107,38 @@ - name: Asserting after performing operation for invalid certificate path. ansible.builtin.assert: - that: |- - "certificate verify failed" in redfish_storage_volume_out.msg + that: >- + "[Errno 2] No such file or directory" in + redfish_storage_volume_out.msg + + - name: To check the behaviour of invalid raid type. + ansible.builtin.import_role: + name: redfish_storage_volume + vars: + hostname: "{{ lookup('env', 'IDRAC_IP') }}" + username: "{{ lookup('env', 'IDRAC_USER') }}" + password: "{{ lookup('env', 'IDRAC_PASSWORD') }}" + validate_certs: false + state: present + raid_type: "Invalid" + name: "VD" # noqa: var-naming[no-reserved] + controller_id: "" + drives: "" + capacity_bytes: 214748364800 + optimum_io_size_bytes: 65536 + encrypted: false + job_wait: false + ignore_errors: true + register: redfish_storage_volume_result - - name: To check the behaviour of invalid volume type. + - name: Asserting after performing operation for invalid raid type. + ansible.builtin.assert: + that: >- + "value of raid_type must be one of: RAID0, RAID1, RAID5, RAID6, + RAID10, RAID50, RAID60, got: Invalid" in + redfish_storage_volume_out.msg + + - name: To check the behaviour of invalid controller_id. ansible.builtin.import_role: name: redfish_storage_volume vars: @@ -117,19 +147,20 @@ password: "{{ lookup('env', 'IDRAC_PASSWORD') }}" validate_certs: false state: present - volume_type: "InvalidMirrored" - name: "VD" # noqa: var-naming[no-reserved] - controller_id: "{{ lookup('env', 'CONTROLLER_ID') }}" - drives: "{{ lookup('env', 'PHYSICAL_DISK') }}" + raid_type: "RAID0" + name: "VD" # noqa: var-naming[no-reserved] + controller_id: "invalid" capacity_bytes: 214748364800 optimum_io_size_bytes: 65536 encrypted: false job_wait: false ignore_errors: true + ignore_unreachable: true register: redfish_storage_volume_result - - name: Asserting after performing operation for invalid volume type. + - name: Asserting after performing operation for invalid controller_id. ansible.builtin.assert: - that: > - redfish_storage_volume_out.msg == "value of volume_type must be one of: NonRedundant, Mirrored, - StripedWithParity, SpannedMirrors, SpannedStripesWithParity, got: InvalidMirrored" + that: >- + "Specified Controller invalid does not exist in the System." in + redfish_storage_volume_out.msg + when: redfish_storage_volume_out.failed diff --git a/ansible_collections/dellemc/openmanage/roles/redfish_storage_volume/molecule/default/molecule.yml b/ansible_collections/dellemc/openmanage/roles/redfish_storage_volume/molecule/default/molecule.yml index e69de29bb..6fe7d44bb 100644 --- a/ansible_collections/dellemc/openmanage/roles/redfish_storage_volume/molecule/default/molecule.yml +++ b/ansible_collections/dellemc/openmanage/roles/redfish_storage_volume/molecule/default/molecule.yml @@ -0,0 +1,10 @@ +--- +scenario: + test_sequence: + - dependency + - destroy + - syntax + - create + - converge + - cleanup + - destroy diff --git a/ansible_collections/dellemc/openmanage/tests/README.md b/ansible_collections/dellemc/openmanage/tests/README.md index a7d90ff01..e9bb0a645 100644 --- a/ansible_collections/dellemc/openmanage/tests/README.md +++ b/ansible_collections/dellemc/openmanage/tests/README.md @@ -1,6 +1,6 @@ ### Overview Dell OpenManage Ansible Modules unit test scripts are located under - [unit](./tests/unit) directory. + [unit](./unit) directory. ### Implementing the unit tests Any contribution must have an associated unit test. This section covers the diff --git a/ansible_collections/dellemc/openmanage/tests/unit/plugins/modules/test_idrac_boot.py b/ansible_collections/dellemc/openmanage/tests/unit/plugins/modules/test_idrac_boot.py index d5f43360f..bb746d12e 100644 --- a/ansible_collections/dellemc/openmanage/tests/unit/plugins/modules/test_idrac_boot.py +++ b/ansible_collections/dellemc/openmanage/tests/unit/plugins/modules/test_idrac_boot.py @@ -347,7 +347,7 @@ class TestConfigBios(FakeAnsibleModule): result = self._run_module(idrac_default_args) assert 'msg' in result - def test_manin_success(self, boot_connection_mock, redfish_response_mock, idrac_default_args, mocker): + def test_main_success(self, boot_connection_mock, redfish_response_mock, idrac_default_args, mocker): idrac_default_args.update({"boot_source_override_mode": "legacy"}) redfish_response_mock.success = True mocker.patch(MODULE_PATH + 'idrac_boot.get_system_res_id', return_value=("System.Embedded.1", "")) @@ -403,4 +403,4 @@ class TestConfigBios(FakeAnsibleModule): job_resp.update({"JobState": "Running"}) # with pytest.raises(Exception) as err: module_return = self._run_module(idrac_default_args) - assert module_return["msg"] == "The boot settings job is triggered successfully." + assert module_return["msg"] == "The boot settings operation is triggered/submitted successfully." diff --git a/ansible_collections/dellemc/openmanage/tests/unit/plugins/modules/test_idrac_certificates.py b/ansible_collections/dellemc/openmanage/tests/unit/plugins/modules/test_idrac_certificates.py index 5e94faf91..4d45cae73 100644 --- a/ansible_collections/dellemc/openmanage/tests/unit/plugins/modules/test_idrac_certificates.py +++ b/ansible_collections/dellemc/openmanage/tests/unit/plugins/modules/test_idrac_certificates.py @@ -288,6 +288,17 @@ class TestIdracCertificates(FakeAnsibleModule): assert "Permission denied" in ex.value.args[0] os.remove(temp_ssl.name) + def test_build_generate_csr_payload(self, idrac_default_args): + cert_params_data = { + "cert_params": { + "subject_alt_name": ['192.198.2.1,192.198.2.2', 'X.X.X.X'] + } + } + idrac_default_args.update(cert_params_data) + f_module = self.get_module_mock(params=idrac_default_args) + payload = self.module._build_generate_csr_payload(f_module, None) + assert payload["AlternativeNames"] == ['192.198.2.1,192.198.2.2,X.X.X.X'] + @pytest.mark.parametrize("params", [{"json_data": { "Actions": { EXPORT_SSL_CERTIFICATE: { diff --git a/ansible_collections/dellemc/openmanage/tests/unit/plugins/modules/test_idrac_diagnostics.py b/ansible_collections/dellemc/openmanage/tests/unit/plugins/modules/test_idrac_diagnostics.py index 987ff83d2..7a2cabf1f 100644 --- a/ansible_collections/dellemc/openmanage/tests/unit/plugins/modules/test_idrac_diagnostics.py +++ b/ansible_collections/dellemc/openmanage/tests/unit/plugins/modules/test_idrac_diagnostics.py @@ -2,7 +2,7 @@ # # Dell OpenManage Ansible Modules -# Version 9.0.0 +# Version 9.3.0 # Copyright (C) 2024 Dell Inc. or its subsidiaries. All Rights Reserved. # GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) @@ -1045,10 +1045,8 @@ class TestDiagnosticsType(FakeAnsibleModule): idrac_mock = mocker.MagicMock() diagnostics_mock = mocker.MagicMock() diagnostics_mock.execute.return_value = (None, None, None) - mocker.patch(MODULE_PATH + 'get_argument_spec', return_value={}) - mocker.patch(MODULE_PATH + 'idrac_auth_params', {}) - mocker.patch(MODULE_PATH + 'AnsibleModule', return_value=module_mock) + mocker.patch(MODULE_PATH + 'IdracAnsibleModule', return_value=module_mock) mocker.patch(MODULE_PATH + 'iDRACRedfishAPI', return_value=idrac_mock) mocker.patch(MODULE_PATH + 'DiagnosticsType.diagnostics_operation', return_value=diagnostics_mock) main() diff --git a/ansible_collections/dellemc/openmanage/tests/unit/plugins/modules/test_idrac_license.py b/ansible_collections/dellemc/openmanage/tests/unit/plugins/modules/test_idrac_license.py index a07cc1eb1..021de2fbb 100644 --- a/ansible_collections/dellemc/openmanage/tests/unit/plugins/modules/test_idrac_license.py +++ b/ansible_collections/dellemc/openmanage/tests/unit/plugins/modules/test_idrac_license.py @@ -2,7 +2,7 @@ # # Dell OpenManage Ansible Modules -# Version 8.7.0 +# Version 9.3.0 # Copyright (C) 2024 Dell Inc. or its subsidiaries. All Rights Reserved. # GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) @@ -281,21 +281,21 @@ class TestExportLicense(FakeAnsibleModule): 'license_id': 'test_license_id', 'share_parameters': { 'share_name': str(tmp_path), - 'file_name': 'test_lic' + 'file_name': 'test_lic.xml' } } idr_obj = MagicMock() - idr_obj.json_data = {"license_id": "1234", "LicenseFile": "test_license_content"} + idr_obj.json_data = {"license_id": "1234", "LicenseFile": "dGVzdF9saWNlbnNlX2NvbnRlbnQK"} mocker.patch(MODULE_PATH + API_INVOKE_MOCKER, return_value=idr_obj) idrac_default_args.update(export_params) f_module = self.get_module_mock(params=idrac_default_args, check_mode=False) export_license_obj = self.module.ExportLicense(idrac_connection_license_mock, f_module) result = export_license_obj._ExportLicense__export_license_local(EXPORT_URL_MOCK) - assert result.json_data == {'LicenseFile': 'test_license_content', 'license_id': '1234'} - assert os.path.exists(f"{tmp_path}/test_lic_iDRAC_license.txt") - if os.path.exists(f"{tmp_path}/test_lic_iDRAC_license.txt"): - os.remove(f"{tmp_path}/test_lic_iDRAC_license.txt") + assert result.json_data == {'LicenseFile': 'dGVzdF9saWNlbnNlX2NvbnRlbnQK', 'license_id': '1234'} + assert os.path.exists(f"{tmp_path}/test_lic.xml") + if os.path.exists(f"{tmp_path}/test_lic.xml"): + os.remove(f"{tmp_path}/test_lic.xml") export_params = { 'license_id': 'test_license_id', @@ -305,10 +305,10 @@ class TestExportLicense(FakeAnsibleModule): } idrac_default_args.update(export_params) result = export_license_obj._ExportLicense__export_license_local(EXPORT_URL_MOCK) - assert result.json_data == {'LicenseFile': 'test_license_content', 'license_id': '1234'} - assert os.path.exists(f"{tmp_path}/test_license_id_iDRAC_license.txt") - if os.path.exists(f"{tmp_path}/test_license_id_iDRAC_license.txt"): - os.remove(f"{tmp_path}/test_license_id_iDRAC_license.txt") + assert result.json_data == {'LicenseFile': 'dGVzdF9saWNlbnNlX2NvbnRlbnQK', 'license_id': '1234'} + assert os.path.exists(f"{tmp_path}/test_license_id_iDRAC_license.xml") + if os.path.exists(f"{tmp_path}/test_license_id_iDRAC_license.xml"): + os.remove(f"{tmp_path}/test_license_id_iDRAC_license.xml") def test_export_license_http(self, idrac_default_args, idrac_connection_license_mock, mocker): export_params = { @@ -736,8 +736,7 @@ class TestLicenseType(FakeAnsibleModule): # Mock the necessary functions and objects mocker.patch(MODULE_PATH + 'get_argument_spec', return_value={}) - mocker.patch(MODULE_PATH + 'idrac_auth_params', {}) - mocker.patch(MODULE_PATH + 'AnsibleModule', return_value=module_mock) + mocker.patch(MODULE_PATH + 'IdracAnsibleModule', return_value=module_mock) mocker.patch(MODULE_PATH + 'iDRACRedfishAPI', return_value=idrac_mock) mocker.patch(MODULE_PATH + 'get_idrac_firmware_version', return_value='3.1') mocker.patch(MODULE_PATH + 'LicenseType.license_operation', return_value=license_mock) diff --git a/ansible_collections/dellemc/openmanage/tests/unit/plugins/modules/test_idrac_reset.py b/ansible_collections/dellemc/openmanage/tests/unit/plugins/modules/test_idrac_reset.py index d8c23160e..8ff72383c 100644 --- a/ansible_collections/dellemc/openmanage/tests/unit/plugins/modules/test_idrac_reset.py +++ b/ansible_collections/dellemc/openmanage/tests/unit/plugins/modules/test_idrac_reset.py @@ -57,6 +57,7 @@ STATUS_SUCCESS = [200, 202, 204] ERR_STATUS_CODE = [400, 404] RESET_KEY = "Oem.#DellManager.ResetToDefaults" RESTART_KEY = "#Manager.Reset" +SLEEP_KEY = "time.sleep" GET_BASE_URI_KEY = "Validation.get_base_uri" INVOKE_REQ_KEY = "iDRACRedfishAPI.invoke_request" GET_CUSTOM_DEFAULT_KEY = "CustomDefaultsDownloadURI" @@ -374,6 +375,7 @@ class TestFactoryReset(FakeAnsibleModule): return self.action_api_resp mocker.patch(MODULE_PATH + CHECK_IDRAC_VERSION, return_value=True) mocker.patch(MODULE_PATH + GET_BASE_URI_KEY, return_value=IDRAC_URI) + mocker.patch(MODULE_PATH + SLEEP_KEY, side_effect=lambda *args, **kwargs: None) mocker.patch(MODULE_PATH + INVOKE_REQ_KEY, return_value=obj) mocker.patch(MODULE_PATH + "get_dynamic_uri", side_effect=mock_get_dynamic_uri_request) @@ -397,6 +399,7 @@ class TestFactoryReset(FakeAnsibleModule): return self.action_api_resp mocker.patch(MODULE_PATH + "get_idrac_firmware_version", return_value="7.10.05") mocker.patch(MODULE_PATH + CHECK_IDRAC_VERSION, return_value=True) + mocker.patch(MODULE_PATH + SLEEP_KEY, side_effect=lambda *args, **kwargs: None) mocker.patch(MODULE_PATH + GET_BASE_URI_KEY, return_value=IDRAC_URI) mocker.patch(MODULE_PATH + INVOKE_REQ_KEY, side_effect=[obj, obj2, obj, URLError('URL error occurred'), obj, URLError('URL error occurred'), obj3, obj]) mocker.patch(MODULE_PATH + "get_dynamic_uri", @@ -422,6 +425,7 @@ class TestFactoryReset(FakeAnsibleModule): mocker.patch(MODULE_PATH + GET_BASE_URI_KEY, return_value=IDRAC_URI) mocker.patch(MODULE_PATH + VALIDATE_RESET_OPTION_KEY, side_effect=[(allowed_values, True), (allowed_values, True)]) mocker.patch(MODULE_PATH + INVOKE_REQ_KEY, side_effect=[obj, obj2, obj, obj2]) + mocker.patch(MODULE_PATH + SLEEP_KEY, side_effect=lambda *args, **kwargs: None) mocker.patch(MODULE_PATH + 'idrac_redfish_job_tracking', return_value=idrac_redfish_resp) mocker.patch(MODULE_PATH + "get_dynamic_uri", side_effect=[self.lc_status_api_links, self.action_api_resp_restart, @@ -499,6 +503,7 @@ class TestFactoryReset(FakeAnsibleModule): mocker.patch(MODULE_PATH + "get_idrac_firmware_version", return_value="7.10.05") mocker.patch(MODULE_PATH + CHECK_IDRAC_VERSION, return_value=True) mocker.patch(MODULE_PATH + CHECK_LC_STATUS, return_value=None) + mocker.patch(MODULE_PATH + SLEEP_KEY, side_effect=lambda *args, **kwargs: None) mocker.patch(MODULE_PATH + "Validation.validate_path", return_value=None) mocker.patch(MODULE_PATH + "Validation.validate_file_format", return_value=None) mocker.patch(MODULE_PATH + "Validation.validate_custom_option", return_value=None) @@ -534,6 +539,7 @@ class TestFactoryReset(FakeAnsibleModule): mocker.patch(MODULE_PATH + GET_BASE_URI_KEY, return_value=IDRAC_URI) mocker.patch(MODULE_PATH + VALIDATE_RESET_OPTION_KEY, return_value=(allowed_values, True)) mocker.patch(MODULE_PATH + INVOKE_REQ_KEY, side_effect=[obj]) + mocker.patch(MODULE_PATH + SLEEP_KEY, side_effect=lambda *args, **kwargs: None) mocker.patch(MODULE_PATH + "get_dynamic_uri", side_effect=mock_get_dynamic_uri_request) idrac_default_args.update({"reset_to_default": "ResetAllWithRootDefaults"}) diff --git a/ansible_collections/dellemc/openmanage/tests/unit/plugins/modules/test_idrac_session.py b/ansible_collections/dellemc/openmanage/tests/unit/plugins/modules/test_idrac_session.py index a28aab255..1cd10fc02 100644 --- a/ansible_collections/dellemc/openmanage/tests/unit/plugins/modules/test_idrac_session.py +++ b/ansible_collections/dellemc/openmanage/tests/unit/plugins/modules/test_idrac_session.py @@ -2,7 +2,7 @@ # # Dell OpenManage Ansible Modules -# Version 9.2.0 +# Version 9.3.0 # Copyright (C) 2024 Dell Inc. or its subsidiaries. All Rights Reserved. # GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) @@ -579,7 +579,7 @@ class TestMain(FakeAnsibleModule): StringIO(json_str))) else: ome_default_args.update({"state": "absent", "session_id": "1234", - "auth_token": "token123"}) + "x_auth_token": "token123"}) mocker.patch(MODULE_PATH + "DeleteSession.get_session_url", side_effect=exc_type('test')) result = self._run_module(ome_default_args) diff --git a/ansible_collections/dellemc/openmanage/tests/unit/plugins/modules/test_idrac_storage_volume.py b/ansible_collections/dellemc/openmanage/tests/unit/plugins/modules/test_idrac_storage_volume.py index 3cdf742d2..ad70fe701 100644 --- a/ansible_collections/dellemc/openmanage/tests/unit/plugins/modules/test_idrac_storage_volume.py +++ b/ansible_collections/dellemc/openmanage/tests/unit/plugins/modules/test_idrac_storage_volume.py @@ -2,7 +2,7 @@ # # Dell OpenManage Ansible Modules -# Version 9.0.0 +# Version 9.3.0 # Copyright (C) 2024 Dell Inc. or its subsidiaries. All Rights Reserved. # GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) @@ -39,6 +39,7 @@ ID_AND_LOCATION_BOTH_NOT_DEFINED = "Either id or location should be specified." DRIVES_NOT_DEFINED = "Drives must be defined for volume creation." NOT_ENOUGH_DRIVES = "Number of sufficient disks not found in Controller '{controller_id}'!" WAIT_TIMEOUT_MSG = "The job is not complete after {0} seconds." +TIME_TO_WAIT_MSG = "Time to wait value is invalid. Minimum value is 300 and Maximum is 3600 seconds." JOB_TRIGERRED = "Successfully triggered the {0} storage volume operation." VOLUME_NAME_REQUIRED_FOR_DELETE = "Virtual disk name is a required parameter for remove virtual disk operations." VOLUME_NOT_FOUND = "Unable to find the virtual disk." @@ -756,6 +757,27 @@ class TestStorageValidation(TestStorageBase): idr_obj = self.module.StorageValidation(idrac_connection_storage_volume_mock, f_module) idr_obj.validate_job_wait_negative_values() + def test_validate_time_to_wait(self, idrac_default_args, idrac_connection_storage_volume_mock, mocker): + # Scenario - when time_to_wait < 300 + mocker.patch(MODULE_PATH + ALL_STORAGE_DATA_METHOD, + return_value=TestStorageData.storage_data) + idrac_default_args.update({"time_to_wait": 299}) + f_module = self.get_module_mock( + params=idrac_default_args, check_mode=False) + idr_obj = self.module.StorageValidation(idrac_connection_storage_volume_mock, f_module) + with pytest.raises(Exception) as exc: + idr_obj.validate_time_to_wait() + assert exc.value.args[0] == TIME_TO_WAIT_MSG + + # Scenario - when time_to_wait > 3600 + idrac_default_args.update({"time_to_wait": 3601}) + f_module = self.get_module_mock( + params=idrac_default_args, check_mode=False) + idr_obj = self.module.StorageValidation(idrac_connection_storage_volume_mock, f_module) + with pytest.raises(Exception) as exc: + idr_obj.validate_time_to_wait() + assert exc.value.args[0] == TIME_TO_WAIT_MSG + @pytest.mark.parametrize("params", [ {"span_depth": -1, "span_length": 2, "capacity": 200, "strip_size": 131072}, {"span_depth": 1, "span_length": -1, "capacity": 200, "strip_size": 131072}, @@ -1058,6 +1080,7 @@ class TestStorageCreate(TestStorageBase): def test_validate_create(self, idrac_default_args, idrac_connection_storage_volume_mock, mocker): mocker.patch(MODULE_PATH + ALL_STORAGE_DATA_METHOD, return_value=TestStorageData.storage_data) + mocker.patch(MODULE_PATH + 'StorageValidation.validate_time_to_wait', return_value=None) mocker.patch(MODULE_PATH + 'StorageValidation.validate_controller_exists', return_value=None) mocker.patch(MODULE_PATH + 'StorageValidation.validate_job_wait_negative_values', return_value=None) mocker.patch(MODULE_PATH + 'StorageValidation.validate_negative_values_for_volume_params', return_value=None) diff --git a/ansible_collections/dellemc/openmanage/tests/unit/plugins/modules/test_ome_application_certificate.py b/ansible_collections/dellemc/openmanage/tests/unit/plugins/modules/test_ome_application_certificate.py index 99c49c210..a996a73ea 100644 --- a/ansible_collections/dellemc/openmanage/tests/unit/plugins/modules/test_ome_application_certificate.py +++ b/ansible_collections/dellemc/openmanage/tests/unit/plugins/modules/test_ome_application_certificate.py @@ -107,7 +107,8 @@ class TestOmeAppCSR(FakeAnsibleModule): def test_generate_csr(self, mocker, ome_default_args, ome_connection_mock_for_application_certificate, ome_response_mock): - csr_json = {"CertificateData": "--BEGIN-REQUEST--"} + csr_data = "-----BEGIN CERTIFICATE REQUEST-----MIIFMDCCAxgCAQAwgbAxCzAJBgNVBAYTAlVTMREwDwYDVQQIDAhWaXJnaW5pYTES-----END CERTIFICATE REQUEST-----" + csr_json = {"CertificateData": csr_data} payload = {"DistinguishedName": "hostname.com", "DepartmentName": "Remote Access Group", "BusinessName": "Dell Inc.", "Locality": "Round Rock", "State": "Texas", "Country": "US", "Email": EMAIL_ADDRESS, "subject_alternative_names": "XX.XX.XX.XX"} @@ -121,4 +122,5 @@ class TestOmeAppCSR(FakeAnsibleModule): ome_response_mock.json_data = csr_json result = self.execute_module(ome_default_args) assert result['msg'] == "Successfully generated certificate signing request." - assert result['csr_status'] == {'CertificateData': '--BEGIN-REQUEST--'} + data = '''-----BEGIN CERTIFICATE REQUEST-----\nMIIFMDCCAxgCAQAwgbAxCzAJBgNVBAYTAlVTMREwDwYDVQQIDAhWaXJnaW5pYTES\n-----END CERTIFICATE REQUEST-----''' + assert result['csr_status']['CertificateData'] == data diff --git a/ansible_collections/dellemc/openmanage/tests/unit/plugins/modules/test_ome_session.py b/ansible_collections/dellemc/openmanage/tests/unit/plugins/modules/test_ome_session.py new file mode 100644 index 000000000..6a547dc10 --- /dev/null +++ b/ansible_collections/dellemc/openmanage/tests/unit/plugins/modules/test_ome_session.py @@ -0,0 +1,448 @@ +# -*- coding: utf-8 -*- + +# +# Dell OpenManage Ansible Modules +# Version 9.3.0 +# Copyright (C) 2024 Dell Inc. or its subsidiaries. All Rights Reserved. + +# GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) +# + +from __future__ import absolute_import, division, print_function + +from io import StringIO +import json + +from urllib.error import HTTPError, URLError +import pytest +from mock import MagicMock +from ansible_collections.dellemc.openmanage.plugins.modules import ome_session +from ansible_collections.dellemc.openmanage.tests.unit.plugins.modules.common import FakeAnsibleModule +from ansible.module_utils.urls import SSLValidationError +from ansible_collections.dellemc.openmanage.tests.unit.plugins.modules.common import AnsibleFailJSonException +from ansible.module_utils._text import to_text + +MODULE_PATH = 'ansible_collections.dellemc.openmanage.plugins.modules.ome_session.' +MODULE_UTILS_PATH = 'ansible_collections.dellemc.openmanage.plugins.module_utils.utils.' +SESSION_UTILS_PATH = 'ansible_collections.dellemc.openmanage.plugins.module_utils.session_utils.' + +REDFISH = "/redfish/v1" +SESSIONS = "Sessions" +ODATA = "@odata.id" +ODATA_REGEX = "(.*?)@odata" + +SESSION_URL = "/api/SessionService/Sessions" +GET_SESSION_URL = "Session.get_session_url" + +CREATE_SUCCESS_MSG = "The session has been created successfully." +DELETE_SUCCESS_MSG = "The session has been deleted successfully." +FAILURE_MSG = "Unable to '{operation}' a session." +CHANGES_FOUND_MSG = "Changes found to be applied." +NO_CHANGES_FOUND_MSG = "No changes found to be applied." +HTTPS_PATH = "https://testhost.com" +HTTP_ERROR = "http error message" +APPLICATION_JSON = "application/json" + + +class TestOMESession(FakeAnsibleModule): + """ + Main class for testing the ome_session module. + """ + module = ome_session + + @pytest.fixture + def ome_session_mock(self): + """ + Creates a mock object for the `ome_session` fixture. + + This function uses the `MagicMock` class from the `unittest.mock` module to create a mock + object. The mock object is then returned by the function. + + Returns: + MagicMock: A mock object representing the `ome_session`. + """ + ome_obj = MagicMock() + return ome_obj + + @pytest.fixture + def ome_connection_session_mock(self, mocker, ome_session_mock): + """ + Returns a mock object for the `SessionAPI` class from the `MODULE_PATH` module. + The mock object is initialized with the `ome_session_mock` as the return value. + The `__enter__` method of the mock object is also mocked to return `ome_session_mock`. + + :param mocker: The pytest fixture for mocking objects. + :type mocker: pytest_mock.plugin.MockerFixture + :param ome_session_mock: The mock object for the `ome_session_mock`. + :type ome_session_mock: Any + :return: The mock object for the `SessionAPI` class. + :rtype: MagicMock + """ + ome_conn_mock = mocker.patch(SESSION_UTILS_PATH + 'SessionAPI', return_value=ome_session_mock) + ome_conn_mock.return_value.__enter__.return_value = ome_session_mock + return ome_conn_mock + + def test_create_session_failure(self, ome_connection_session_mock, mocker): + """ + Test the failure scenario of creating a session. + + Args: + ome_connection_session_mock (MagicMock): A mock object for the + ome_connection_session. + mocker (MockerFixture): A fixture for mocking objects. + + Returns: + None + + This test function creates a session object using the `ome_connection_session_mock` and + `f_module` objects. + It sets the `f_module.check_mode` to False and `f_module.params` to a dictionary containing + the username and password. + It mocks the `ome_connection_session_mock.invoke_request` method to return a response + with a status code of 201. + It calls the `session_obj.execute()` method to create the session. + It asserts that the `f_module.exit_json` method is called once with the message "Unable to + 'create' a session." and `failed` set to True. + """ + f_module = MagicMock() + session_obj = self.module.OMESession(f_module) + f_module.check_mode = False + f_module.params = { + "username": "admin", + "password": "password" + } + response_mock = MagicMock() + response_mock.status_code = 400 + mocker.patch.object(ome_connection_session_mock.return_value, 'invoke_request', + return_value=response_mock) + session_obj.create_session() + f_module.exit_json.assert_called_once_with( + msg="Unable to 'create' a session.", + failed=True + ) + + def test_create_session_check_mode(self, ome_connection_session_mock): + """ + Test the create session functionality in check mode. + + Args: + ome_connection_session_mock (MagicMock): A mock object for the ome connection + session. + + Returns: + None + + This function tests the create session functionality in check mode. It creates an instance + of the `CreateSession` class with the provided `ome_connection_session_mock` and a mock + `f_module` object. + method of the `session_obj` to return the session URL. It also mocks the `exit_json` method + of the `f_module` object. + + Finally, it calls the `execute` method of the `session_obj` to execute the create session + functionality in check mode. + + Note: + This function assumes that the necessary imports and setup for the test are already + done. + """ + f_module = MagicMock() + session_obj = self.module.OMESession(f_module) + f_module = self.get_module_mock( + params={"session_id": "abcd", "hostname": "X.X.X.X"}, check_mode=True) + f_module.exit_json = MagicMock() + + session_obj.create_session() + + def test_create_session_success(self, ome_connection_session_mock): + """ + Test the successful creation of a session. + + Args: + ome_connection_session_mock (MagicMock): A mock object representing the ome + connection session. + + This test case verifies the successful creation of a session by mocking the necessary + objects and invoking the `execute()` method of the `CreateSession` class. It sets the + parameters for the `f_module` object, initializes the `session_obj` with the mocked + `ome_connection_session_mock` and `f_module`, and mocks the necessary methods and + attributes of the `ome` object. It then asserts that the `exit_json` method of the + `f_module` object is called with the expected arguments. + + Returns: + None + """ + f_module = self.get_module_mock( + params={"username": "admin", "password": "password"}, check_mode=False) + session_obj = self.module.OMESession(f_module) + session_obj.instance.invoke_request.return_value.status_code = 201 + session_obj.instance.invoke_request.return_value.json_data = {"SessionID": "123456"} + session_obj.instance.invoke_request.return_value.headers.get.return_value = "token123" + f_module.exit_json = MagicMock() + + session_obj.create_session() + f_module.exit_json.assert_called_once_with( + msg=CREATE_SUCCESS_MSG, + changed=True, + session_data={"SessionID": "123456"}, + x_auth_token="token123" + ) + + def test_delete_session_success_check_mode_changes(self, ome_connection_session_mock): + """ + Test the `delete_session_success_check_mode_changes` method of the `DeleteSession` class. + + This method is responsible for testing the success case when the `delete_session` method + is called in check mode. + It verifies that the `exit_json` method of the `f_module` object is called with the + appropriate arguments when the session is successfully deleted. + + Parameters: + - ome_connection_session_mock (MagicMock): A mock object representing the + `ome_connection_session` object. + + Returns: + None + """ + f_module = MagicMock() + session_obj = self.module.OMESession(f_module) + session_obj.get_session_status = MagicMock(return_value=True) + session_obj.delete_session() + f_module.exit_json.assert_called_once_with(msg=CHANGES_FOUND_MSG, changed=True) + + def test_delete_session_success_check_mode_no_changes(self, ome_connection_session_mock): + """ + Test the success case of deleting a session in check mode when no changes are expected. + + Args: + ome_connection_session_mock (MagicMock): A mock object representing the ome + connection session. + + This function tests the scenario where the deletion of a session is successful in check + mode and no changes are expected. It sets up the necessary mock objects and asserts that + the `exit_json` method of the `f_module` object is called once with the `msg` parameter + set to `NO_CHANGES_FOUND_MSG`. + + Returns: + None + """ + f_module = MagicMock() + session_obj = self.module.OMESession(f_module) + session_obj.instance.invoke_request.return_value.status_code = 201 + session_obj.delete_session() + f_module.exit_json.assert_called_once_with(msg=NO_CHANGES_FOUND_MSG) + + def test_delete_session_success(self, ome_connection_session_mock): + """ + Test the successful deletion of a session. + + This test function verifies the behavior of the `DeleteSession` class when a session is + successfully deleted. It mocks the `ome_connection_session_mock` object and sets up the + necessary parameters for the `f_module` object. It then creates an instance of the + `DeleteSession` class with the mocked `ome_connection_session_mock` and the + `f_module` object. + + The `invoke_request` method of the `ome` object of the `session_obj` is also mocked + to return a response with a status code of 200. The `exit_json` method of the `f_module` + object is mocked as well. + + The `execute` method of the `session_obj` is called to execute the deletion of the session. + Finally, the `exit_json` method of the `f_module` object is asserted to have been called + with the expected arguments, including the success message and the changed flag set to + `True`. + + Parameters: + - ome_connection_session_mock (MagicMock): A mocked object representing the + `ome_connection_session_mock` object. + + Returns: + None + """ + f_module = self.get_module_mock( + params={"session_id": "abcd", "hostname": "X.X.X.X", "x_auth_token": "token"}, check_mode=False) + session_obj = self.module.OMESession(f_module) + session_obj.get_session_status = MagicMock(return_value=200) + session_obj.instance.invoke_request.return_value.status_code = 204 + f_module.exit_json = MagicMock() + session_obj.delete_session() + f_module.exit_json.assert_called_once_with(msg=DELETE_SUCCESS_MSG, changed=True) + + def test_delete_session_success_02(self, ome_connection_session_mock): + """ + Test the successful deletion of a session. + + This test function verifies the behavior of the `DeleteSession` class when a session is + successfully deleted. It mocks the `ome_connection_session_mock` object and sets up the + necessary parameters for the `f_module` object. It then creates an instance of the + `DeleteSession` class with the mocked `ome_connection_session_mock` and the + `f_module` object. + + The `invoke_request` method of the `ome` object of the `session_obj` is also mocked + to return a response with a status code of 200. The `exit_json` method of the `f_module` + object is mocked as well. + + The `execute` method of the `session_obj` is called to execute the deletion of the session. + Finally, the `exit_json` method of the `f_module` object is asserted to have been called + with the expected arguments, including the success message and the changed flag set to + `True`. + + Parameters: + - ome_connection_session_mock (MagicMock): A mocked object representing the + `ome_connection_session_mock` object. + + Returns: + None + """ + f_module = self.get_module_mock( + params={"session_id": "abcd", "hostname": "X.X.X.X", "x_auth_token": "token"}, check_mode=False) + session_obj = self.module.OMESession(f_module) + session_obj.get_session_status = MagicMock(return_value=200) + session_obj.instance.invoke_request.return_value.status_code = 400 + obj = session_obj.delete_session() + assert not obj + + def test_delete_session_http_error(self, ome_connection_session_mock): + """ + Test the behavior of the `DeleteSession` class when an HTTP error occurs during the + deletion of a session. + + This test case creates a mock `f_module` object with the necessary parameters and + initializes a `DeleteSession` object with the mock `ome_connection_session_mock` and the + `f_module` object. It then sets up the necessary mock functions and side effects to + simulate an HTTP error during the deletion of a session. Finally, it executes the + `execute()` method of the `DeleteSession` object and asserts that an + `AnsibleFailJSonException` is raised with the expected failure message and error + information. + + Parameters: + - ome_connection_session_mock (MagicMock): A mock object representing the + `ome_connection_session_mock` parameter. + + Raises: + - AssertionError: If the expected failure message or error information is not present + in the raised exception. + + Returns: + None + """ + f_module = self.get_module_mock( + params={"session_id": "abcd", "hostname": "X.X.X.X"}, check_mode=False) + session_obj = self.module.OMESession(f_module) + session_obj.get_session_status = MagicMock(return_value=200) + json_str = to_text(json.dumps({"data": "out"})) + session_obj.instance.invoke_request.side_effect = HTTPError(HTTPS_PATH, 200, + HTTP_ERROR, + {"accept-type": APPLICATION_JSON}, + StringIO(json_str)) + try: + session_obj.delete_session() + except AnsibleFailJSonException as ex: + assert ex.fail_msg == "Unable to 'delete' a session." + assert ex.fail_kwargs == {'error_info': {'data': 'out'}, 'failed': True} + + def test_delete_session_check_mode_false_no_changes(self, ome_connection_session_mock): + """ + Test the scenario where the delete session is executed in check mode with `check_mode` set + to False and no changes are expected. + + Args: + ome_connection_session_mock (MagicMock): A mock object representing the ome + connection session. + + Returns: + None + + This function creates a mock module object with the specified parameters and + initializes the `DeleteSession` object with the mock ome connection and module.It + sets the status code of the invoke request to 201. It then asserts that the `exit_json` + method of the module object is called once with the `msg` parameter set to the + `NO_CHANGES_FOUND_MSG` constant. + """ + f_module = self.get_module_mock( + params={"session_id": "abcd", "hostname": "X.X.X.X"}, check_mode=False) + session_obj = self.module.OMESession(f_module) + session_obj.instance.invoke_request.return_value.status_code = 201 + f_module.exit_json = MagicMock() + session_obj.delete_session() + f_module.exit_json.assert_called_once_with(msg=NO_CHANGES_FOUND_MSG) + + def test_get_session_status_http_error(self, ome_connection_session_mock): + """ + Test the behavior of the `DeleteSession` class when an HTTP error occurs during the + deletion of a session. + + This test case creates a mock `f_module` object with the necessary parameters and + initializes a `DeleteSession` object with the mock `ome_connection_session_mock` and the + `f_module` object. It then sets up the necessary mock functions and side effects to + simulate an HTTP error during the deletion of a session. Finally, it executes the + `execute()` method of the `DeleteSession` object and asserts that an + `AnsibleFailJSonException` is raised with the expected failure message and error + information. + + Parameters: + - ome_connection_session_mock (MagicMock): A mock object representing the + `ome_connection_session_mock` parameter. + + Raises: + - AssertionError: If the expected failure message or error information is not present + in the raised exception. + + Returns: + None + """ + params = {"session_id": "abcd", "hostname": "X.X.X.X"} + f_module = self.get_module_mock( + params=params, check_mode=False) + session_obj = self.module.OMESession(f_module) + session_obj.instance.invoke_request.side_effect = HTTPError(HTTPS_PATH, 400, '', {}, None) + with pytest.raises(HTTPError): + session_obj.get_session_status(SESSION_URL, params["session_id"]) + + @pytest.mark.parametrize("exc_type", + [URLError, HTTPError, SSLValidationError, ConnectionError, TypeError, ValueError]) + def test_ome_session_main_exception_handling_case(self, exc_type, ome_default_args, mocker): + """ + Test the exception handling of the `ome_session_main` module. + + This function tests the exception handling of the `ome_session_main` module by mocking + different exceptions and verifying the expected behavior. + + Parameters: + - exc_type (Exception): The type of exception to be raised. + - ome_default_args (dict): The default arguments for the module. + - mocker (MockerFixture): The mocker fixture for mocking functions. + + Returns: + None + + Raises: + AssertionError: If the expected result does not match the actual result. + + Notes: + - The function uses the `pytest.mark.parametrize` decorator to parameterize the test + cases. + - The `exc_type` parameter represents the type of exception to be raised. + - The `ome_default_args` parameter contains the default arguments for the module. + - The `mocker` parameter is used to mock functions and simulate different exceptions. + - The function calls the `_run_module` method with the `ome_default_args` to execute + the module. + - The function verifies the expected result based on the raised exception type. + + """ + json_str = to_text(json.dumps({"data": "out"})) + if exc_type in [HTTPError, SSLValidationError]: + mocker.patch(MODULE_PATH + "OMESession.delete_session", + side_effect=exc_type(HTTPS_PATH, 400, + HTTP_ERROR, + {"accept-type": APPLICATION_JSON}, + StringIO(json_str))) + else: + ome_default_args.update({"state": "absent", "session_id": "abcd", + "x_auth_token": "token123"}) + mocker.patch(MODULE_PATH + "OMESession.delete_session", + side_effect=exc_type('test')) + result = self._run_module(ome_default_args) + if exc_type == URLError: + assert result['unreachable'] is True + else: + assert result['failed'] is True + assert 'msg' in result |