/dports/sysutils/ansible2/ansible-2.9.27/test/integration/targets/scaleway_security_group_rule/tasks/ |
H A D | main.yml | 15 register: security_group 29 security_group: '{{ security_group.scaleway_security_group.id }}' 49 security_group: '{{ security_group.scaleway_security_group.id }}' 68 security_group: '{{ security_group.scaleway_security_group.id }}' 88 security_group: '{{ security_group.scaleway_security_group.id }}' 108 security_group: '{{ security_group.scaleway_security_group.id }}' 127 security_group: '{{ security_group.scaleway_security_group.id }}' 147 security_group: '{{ security_group.scaleway_security_group.id }}' 166 security_group: '{{ security_group.scaleway_security_group.id }}' 186 security_group: '{{ security_group.scaleway_security_group.id }}' [all …]
|
/dports/sysutils/ansible/ansible-4.7.0/ansible_collections/community/general/tests/integration/targets/scaleway_security_group_rule/tasks/ |
H A D | main.yml | 31 security_group: '{{ security_group.scaleway_security_group.id }}' 51 security_group: '{{ security_group.scaleway_security_group.id }}' 70 security_group: '{{ security_group.scaleway_security_group.id }}' 90 security_group: '{{ security_group.scaleway_security_group.id }}' 110 security_group: '{{ security_group.scaleway_security_group.id }}' 129 security_group: '{{ security_group.scaleway_security_group.id }}' 149 security_group: '{{ security_group.scaleway_security_group.id }}' 168 security_group: '{{ security_group.scaleway_security_group.id }}' 188 security_group: '{{ security_group.scaleway_security_group.id }}' 208 security_group: '{{ security_group.scaleway_security_group.id }}' [all …]
|
/dports/sysutils/ansible/ansible-4.7.0/ansible_collections/community/general/tests/integration/targets/scaleway_compute/tasks/ |
H A D | security_group.yml | 1 - name: Create a scaleway security_group 12 register: security_group 14 - debug: var=security_group 17 - name: Create a server with security_group (Check) 26 security_group: '{{ security_group.scaleway_security_group.id }}' 45 security_group: '{{ security_group.scaleway_security_group.id }}' 65 security_group: '{{ security_group.scaleway_security_group.id }}' 77 - name: Keep current security_group (Check) 86 security_group: '{{ security_group.scaleway_security_group.id }}' 98 - name: Keep current security_group [all …]
|
/dports/sysutils/ansible2/ansible-2.9.27/test/integration/targets/scaleway_compute/tasks/ |
H A D | security_group.yml | 1 - name: Create a scaleway security_group 12 register: security_group 14 - debug: var=security_group 17 - name: Create a server with security_group (Check) 26 security_group: '{{ security_group.scaleway_security_group.id }}' 45 security_group: '{{ security_group.scaleway_security_group.id }}' 65 security_group: '{{ security_group.scaleway_security_group.id }}' 77 - name: Keep current security_group (Check) 86 security_group: '{{ security_group.scaleway_security_group.id }}' 98 - name: Keep current security_group [all …]
|
/dports/sysutils/ansible2/ansible-2.9.27/lib/ansible/modules/cloud/scaleway/ |
H A D | scaleway_security_group.py | 131 def payload_from_security_group(security_group): argument 134 for k, v in security_group.items() 139 def present_strategy(api, security_group): argument 149 if security_group['name'] not in security_group_lookup.keys(): 158 data=payload_from_security_group(security_group)) 166 ret['scaleway_security_group'] = security_group_lookup[security_group['name']] 171 def absent_strategy(api, security_group): argument 180 if security_group['name'] not in security_group_lookup.keys(): 195 security_group = { 210 summary = present_strategy(api=api, security_group=security_group) [all …]
|
/dports/sysutils/ansible/ansible-4.7.0/ansible_collections/community/general/plugins/modules/cloud/scaleway/ |
H A D | scaleway_security_group.py | 131 def payload_from_security_group(security_group): argument 134 for k, v in security_group.items() 139 def present_strategy(api, security_group): argument 149 if security_group['name'] not in security_group_lookup.keys(): 158 data=payload_from_security_group(security_group)) 166 ret['scaleway_security_group'] = security_group_lookup[security_group['name']] 171 def absent_strategy(api, security_group): argument 180 if security_group['name'] not in security_group_lookup.keys(): 195 security_group = { 210 summary = present_strategy(api=api, security_group=security_group) [all …]
|
/dports/sysutils/ansible/ansible-4.7.0/ansible_collections/community/general/plugins/modules/ |
H A D | scaleway_security_group.py | 131 def payload_from_security_group(security_group): argument 134 for k, v in security_group.items() 139 def present_strategy(api, security_group): argument 149 if security_group['name'] not in security_group_lookup.keys(): 158 data=payload_from_security_group(security_group)) 166 ret['scaleway_security_group'] = security_group_lookup[security_group['name']] 171 def absent_strategy(api, security_group): argument 180 if security_group['name'] not in security_group_lookup.keys(): 195 security_group = { 210 summary = present_strategy(api=api, security_group=security_group) [all …]
|
/dports/sysutils/ansible/ansible-4.7.0/ansible_collections/ngine_io/cloudstack/plugins/modules/ |
H A D | cs_securitygroup.py | 110 self.security_group = None 113 if not self.security_group: 123 self.security_group = sgs['securitygroup'][0] 124 return self.security_group 127 security_group = self.get_security_group() 128 if not security_group: 141 security_group = res['securitygroup'] 143 return security_group 146 security_group = self.get_security_group() 147 if security_group: [all …]
|
H A D | cs_securitygroup_rule.py | 250 security_group = self.get_security_group() 273 args['securitygroupid'] = security_group['id'] 279 if 'ingressrule' in security_group: 287 if 'egressrule' in security_group: 296 security_group = self.poll_job(res, 'securitygroup') 298 if key in security_group: 299 rule = security_group[key][0] 303 security_group = self.get_security_group() 308 rule = self._get_rule(security_group['ingressrule']) 315 rule = self._get_rule(security_group['egressrule']) [all …]
|
/dports/sysutils/ansible2/ansible-2.9.27/lib/ansible/modules/cloud/cloudstack/ |
H A D | cs_securitygroup.py | 116 self.security_group = None 119 if not self.security_group: 129 self.security_group = sgs['securitygroup'][0] 130 return self.security_group 133 security_group = self.get_security_group() 134 if not security_group: 147 security_group = res['securitygroup'] 149 return security_group 152 security_group = self.get_security_group() 153 if security_group: [all …]
|
H A D | cs_securitygroup_rule.py | 259 security_group = self.get_security_group() 282 args['securitygroupid'] = security_group['id'] 288 if 'ingressrule' in security_group: 296 if 'egressrule' in security_group: 305 security_group = self.poll_job(res, 'securitygroup') 307 if key in security_group: 308 rule = security_group[key][0] 312 security_group = self.get_security_group() 317 rule = self._get_rule(security_group['ingressrule']) 324 rule = self._get_rule(security_group['egressrule']) [all …]
|
/dports/devel/py-openstacksdk/openstacksdk-0.60.0/openstack/tests/ansible/roles/security_group/tasks/ |
H A D | main.yml | 12 security_group: "{{ secgroup_name }}" 20 security_group: "{{ secgroup_name }}" 30 security_group: "{{ secgroup_name }}" 38 security_group: "{{ secgroup_name }}" 46 security_group: "{{ secgroup_name }}" 56 security_group: "{{ secgroup_name }}" 67 security_group: "{{ secgroup_name }}" 75 security_group: "{{ secgroup_name }}" 85 security_group: "{{ secgroup_name }}" 93 security_group: "{{ secgroup_name }}" [all …]
|
/dports/sysutils/ansible/ansible-4.7.0/ansible_collections/ngine_io/cloudstack/tests/integration/targets/cs_securitygroup_rule/tasks/ |
H A D | present.yml | 4 security_group: default 18 security_group: default 29 - sg_rule.security_group == 'default' 37 security_group: default 48 - sg_rule.security_group == 'default' 56 security_group: default 71 security_group: default 92 security_group: default 112 security_group: default 127 security_group: default [all …]
|
H A D | absent.yml | 4 security_group: default 17 - sg_rule.security_group == 'default' 25 security_group: default 37 - sg_rule.security_group == 'default' 45 security_group: default 59 security_group: default 81 security_group: default 102 security_group: default 117 security_group: default 139 security_group: default [all …]
|
/dports/sysutils/ansible2/ansible-2.9.27/test/integration/targets/cs_securitygroup_rule/tasks/ |
H A D | present.yml | 4 security_group: default 18 security_group: default 29 - sg_rule.security_group == 'default' 37 security_group: default 48 - sg_rule.security_group == 'default' 56 security_group: default 71 security_group: default 92 security_group: default 112 security_group: default 127 security_group: default [all …]
|
H A D | absent.yml | 4 security_group: default 17 - sg_rule.security_group == 'default' 25 security_group: default 37 - sg_rule.security_group == 'default' 45 security_group: default 59 security_group: default 81 security_group: default 102 security_group: default 117 security_group: default 139 security_group: default [all …]
|
/dports/net/py-python-openstackclient/python-openstackclient-5.2.1/openstackclient/api/ |
H A D | compute_v2.py | 475 security_group=None, 487 security_group = self.find( 490 value=security_group, 492 if security_group is not None: 499 security_group=None, 515 value=security_group, 552 security_group=None, 573 security_group = self.find( 576 value=security_group, 578 if security_group is not None: [all …]
|
/dports/sysutils/ansible/ansible-4.7.0/ansible_collections/amazon/aws/plugins/modules/ |
H A D | ec2_group_info.py | 137 for security_group in security_groups['SecurityGroups']: 140 security_group = camel_dict_to_snake_dict(security_group) 141 …security_group['tags'] = boto3_tag_list_to_ansible_dict(security_group.get('tags', {}), tag_name_k… 142 snaked_security_groups.append(security_group)
|
H A D | ec2_group_facts.py | 137 for security_group in security_groups['SecurityGroups']: 140 security_group = camel_dict_to_snake_dict(security_group) 141 …security_group['tags'] = boto3_tag_list_to_ansible_dict(security_group.get('tags', {}), tag_name_k… 142 snaked_security_groups.append(security_group)
|
/dports/sysutils/ansible2/ansible-2.9.27/lib/ansible/modules/cloud/amazon/ |
H A D | _ec2_group_facts.py | 154 for security_group in security_groups['SecurityGroups']: 157 security_group = camel_dict_to_snake_dict(security_group) 158 …security_group['tags'] = boto3_tag_list_to_ansible_dict(security_group.get('tags', {}), tag_name_k… 159 snaked_security_groups.append(security_group)
|
H A D | ec2_group_info.py | 154 for security_group in security_groups['SecurityGroups']: 157 security_group = camel_dict_to_snake_dict(security_group) 158 …security_group['tags'] = boto3_tag_list_to_ansible_dict(security_group.get('tags', {}), tag_name_k… 159 snaked_security_groups.append(security_group)
|
/dports/www/py-horizon/horizon-19.2.0/openstack_dashboard/dashboards/project/security_groups/ |
H A D | tables.py | 51 def allowed(self, request, security_group=None): argument 52 if not security_group: 54 return security_group.name != 'default' 68 def allowed(self, request, security_group=None): argument 90 def allowed(self, request, security_group=None): argument 91 if not security_group: 93 return security_group.name != 'default' 109 return [security_group for security_group in security_groups 110 if query in security_group.name.lower()] 140 def allowed(self, request, security_group=None): argument
|
/dports/devel/py-moto/moto-2.2.16/tests/test_ec2/ |
H A D | test_security_groups.py | 398 security_group.revoke( 410 security_group.revoke( 423 security_group.revoke( 642 security_group = [ 650 security_group.revoke( 658 security_group.revoke( 665 security_group = [ 781 security_group = [ 788 success = security_group.revoke( 797 security_group = [ [all …]
|
/dports/devel/py-moto/moto-2.2.16/moto/rds/ |
H A D | responses.py | 126 security_group = self.backend.create_security_group( 130 return template.render(security_group=security_group) 140 security_group = self.backend.delete_security_group(security_group_name) 142 return template.render(security_group=security_group) 147 security_group = self.backend.authorize_security_group( 151 return template.render(security_group=security_group)
|
H A D | models.py | 208 return template.render(security_group=self) 213 def authorize_security_group(self, security_group): argument 214 self.ec2_security_groups.append(security_group) 237 security_group = rds_backend.create_security_group( 244 security_group.authorize_cidr(ingress_value) 247 security_group.authorize_security_group(subnet) 250 security_group.authorize_security_group(subnet) 251 return security_group
|