New in version 2.3.
parameter | required | default | choices | comments |
---|---|---|---|---|
auth | yes | Dictionary with values needed to create HTTP/HTTPS connection to oVirt: username [required] - The name of the user, something like admin@internal. Default value is set by OVIRT_USERNAME environment variable.password [required] - The password of the user. Default value is set by OVIRT_PASSWORD environment variable.url [required] - A string containing the base URL of the server, usually something like `https://server.example.com/ovirt-engine/api`. Default value is set by OVIRT_URL environment variable.token - Token to be used instead of login with username/password. Default value is set by OVIRT_TOKEN environment variable.insecure - A boolean flag that indicates if the server TLS certificate and host name should be checked.ca_file - A PEM file containing the trusted CA certificates. The certificate presented by the server will be verified using these CA certificates. If `ca_file ` parameter is not set, system wide CA certificate store is used. Default value is set by OVIRT_CAFILE environment variable.kerberos - A boolean flag indicating if Kerberos authentication should be used instead of the default basic authentication.headers - Dictionary of HTTP headers to be added to each API call. | ||
authz_name | yes | Authorization provider of the user/group. In previous versions of oVirt/RHV known as domain. aliases: domain | ||
fetch_nested (added in 2.3)
| no | If True the module will fetch additional data from the API. It will fetch IDs of the VMs disks, snapshots, etc. User can configure to fetch other attributes of the nested entities by specifying nested_attributes . | ||
group_name | no | Name of the group to manage. | ||
namespace | no | Namespace of the authorization provider, where user/group resides. | ||
nested_attributes (added in 2.3)
| no | Specifies list of the attributes which should be fetched from the API. This parameter apply only when fetch_nested is true. | ||
user_name | no | Username of the user to manage. In most LDAPs it's uid of the user, but in Active Directory you must specify UPN of the user. |
# Examples don't contain auth parameter for simplicity, # look at ovirt_auth module to see how to reuse authentication: # Gather facts about all permissions of user with username C(john): - ovirt_permissions_facts: user_name: john authz_name: example.com-authz - debug: var: ovirt_permissions
Common return values are documented here Return Values, the following are the fields unique to this module:
name | description | returned | type | sample |
---|---|---|---|---|
ovirt_permissions | List of dictionaries describing the permissions. Permission attribues are mapped to dictionary keys, all permissions attributes can be found at following url: http://ovirt.github.io/ovirt-engine-api-model/master/#types/permission. | On success. | list |
Note
ovirt_permissions
fact, which contains a list of permissions.This module is flagged as preview which means that it is not guaranteed to have a backwards compatible interface.
For help in developing on modules, should you be so inclined, please read Community Information & Contributing, Testing Ansible and Developing Modules.
© 2012–2017 Michael DeHaan
© 2017 Red Hat, Inc.
Licensed under the GNU General Public License version 3.
https://docs.ansible.com/ansible/latest/ovirt_permissions_facts_module.html