├── images ├── cypher.png ├── ansiblehound.png ├── create-token.png ├── tokens-tab.png └── user-details.png ├── go.mod ├── core ├── output.go ├── constants.go ├── clients.go ├── gatherer.go └── objects.go ├── CHANGELOG.md ├── scripts └── import-icons.py ├── go.sum ├── README.md ├── collector └── Main.go ├── LICENSE └── samples └── example.json /images/cypher.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheSleekBoyCompany/AnsibleHound/HEAD/images/cypher.png -------------------------------------------------------------------------------- /images/ansiblehound.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheSleekBoyCompany/AnsibleHound/HEAD/images/ansiblehound.png -------------------------------------------------------------------------------- /images/create-token.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheSleekBoyCompany/AnsibleHound/HEAD/images/create-token.png -------------------------------------------------------------------------------- /images/tokens-tab.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheSleekBoyCompany/AnsibleHound/HEAD/images/tokens-tab.png -------------------------------------------------------------------------------- /images/user-details.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheSleekBoyCompany/AnsibleHound/HEAD/images/user-details.png -------------------------------------------------------------------------------- /go.mod: -------------------------------------------------------------------------------- 1 | module ansible-hound 2 | 3 | go 1.24.2 4 | 5 | require ( 6 | github.com/charmbracelet/log v0.4.1 7 | github.com/spf13/cobra v1.9.1 8 | ) 9 | 10 | require ( 11 | github.com/aymanbagabas/go-osc52/v2 v2.0.1 // indirect 12 | github.com/charmbracelet/lipgloss v1.0.0 // indirect 13 | github.com/charmbracelet/x/ansi v0.4.2 // indirect 14 | github.com/go-logfmt/logfmt v0.6.0 // indirect 15 | github.com/inconshreveable/mousetrap v1.1.0 // indirect 16 | github.com/lucasb-eyer/go-colorful v1.2.0 // indirect 17 | github.com/mattn/go-isatty v0.0.20 // indirect 18 | github.com/muesli/termenv v0.16.0 // indirect 19 | github.com/rivo/uniseg v0.4.7 // indirect 20 | github.com/spf13/pflag v1.0.6 // indirect 21 | golang.org/x/exp v0.0.0-20231006140011-7918f672742d // indirect 22 | golang.org/x/sys v0.30.0 // indirect 23 | ) 24 | -------------------------------------------------------------------------------- /core/output.go: -------------------------------------------------------------------------------- 1 | package core 2 | 3 | import ( 4 | "fmt" 5 | "os" 6 | "time" 7 | 8 | "github.com/charmbracelet/log" 9 | ) 10 | 11 | func GenerateEdge(kind string, startId string, endId string) Edge { 12 | 13 | start := Link{ 14 | Value: startId, 15 | MatchBy: "id", 16 | } 17 | 18 | end := Link{ 19 | Value: endId, 20 | MatchBy: "id", 21 | } 22 | 23 | edge := Edge{ 24 | Kind: kind, 25 | Start: start, 26 | End: end, 27 | } 28 | 29 | return edge 30 | } 31 | 32 | func GenerateNodes[T AnsibleType](objects map[int]T) (nodes []Node) { 33 | for _, object := range objects { 34 | nodes = append(nodes, object.ToBHNode()) 35 | } 36 | return nodes 37 | } 38 | 39 | func CalculateName(objectType string) string { 40 | now := time.Now() 41 | epoch := now.Unix() 42 | return fmt.Sprintf("%d_%s.json", epoch, objectType) 43 | } 44 | 45 | func WriteToFile(content []byte, filePath string) error { 46 | 47 | log.Debug(fmt.Sprintf("Writing to file `%s`.", filePath)) 48 | 49 | file, err := os.Create(filePath) 50 | if err != nil { 51 | return err 52 | } 53 | defer file.Close() 54 | 55 | _, err = file.Write(content) 56 | if err != nil { 57 | return err 58 | } 59 | 60 | return nil 61 | } 62 | -------------------------------------------------------------------------------- /core/constants.go: -------------------------------------------------------------------------------- 1 | package core 2 | 3 | import "fmt" 4 | 5 | const VERSION = "0.0.1" 6 | 7 | const API_ENDPOINT = "/api/v2/" 8 | const ME_ENDPOINT = API_ENDPOINT + "me/" 9 | const ORGANIZATIONS_ENDPOINT = API_ENDPOINT + "organizations/" 10 | const PROJECTS_ENDPOINT = API_ENDPOINT + "projects/" 11 | const INVENTORIES_ENDPOINT = API_ENDPOINT + "inventories/" 12 | const JOB_TEMPLATE_ENDPOINT = API_ENDPOINT + "job_templates/" 13 | const CREDENTIALS_ENDPOINT = API_ENDPOINT + "credentials/" 14 | const CREDENTIAL_TYPES_ENDPOINT = API_ENDPOINT + "credential_types/" 15 | const USERS_ENDPOINT = API_ENDPOINT + "users/" 16 | const USER_ROLES_ENDPOINT = API_ENDPOINT + "users/%d/roles/" 17 | const GROUPS_ENDPOINT = API_ENDPOINT + "groups/" 18 | const GROUP_HOSTS_ENDPOINT = API_ENDPOINT + "groups/%d/hosts/" 19 | const JOBS_ENDPOINT = API_ENDPOINT + "jobs/" 20 | const HOSTS_ENDPOINT = API_ENDPOINT + "hosts/" 21 | const TEAMS_ENDPOINT = API_ENDPOINT + "teams/" 22 | const TEAM_ROLES_ENDPOINT = API_ENDPOINT + "teams/%d/roles/" 23 | const TEAM_USERS_ENDPOINT = API_ENDPOINT + "teams/%d/users/" 24 | const JOB_TEMPLATE_CREDENTIALS_ENDPOINT = API_ENDPOINT + "job_templates/%d/credentials/" 25 | const PING_ENDPOINT = API_ENDPOINT + "ping" 26 | const PAGE_SIZE = 200 27 | 28 | var PAGE_SIZE_ARG = fmt.Sprintf("?page_size=%d", PAGE_SIZE) 29 | var CURRENT_PAGE_ARG = "&page=%d" 30 | -------------------------------------------------------------------------------- /CHANGELOG.md: -------------------------------------------------------------------------------- 1 | # Changelog 2 | 3 | All notable changes to this project will be documented in this file. 4 | 5 | The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.1.0/), 6 | and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0.html). 7 | 8 | ## [Unreleased] 9 | 10 | ### Added 11 | 12 | - Now creates a new Custom Icon for Credential Types. 13 | - Now gathers Credential Types. 14 | - Now creates an `ATUsesType` edge between, Credentials and their Credential Type. 15 | - Now gathers Groups in inventories and their Hosts. 16 | - Now creates an ATContains edge between Groups and their Hosts. 17 | - Now creates an ATContains edge between Inventories and their Groups. 18 | - Now able to skip TLS/SSL verification using the `-k`/`skip-verify-ssl` flag. 19 | - Now gathers information on the target Ansible WorX/Tower instance using `/ping` before gathering resources. 20 | - Now gathers Credentials used by Job Templates and creates an `ATUses` edge between them. 21 | 22 | 23 | ### Changed 24 | 25 | - Moved `ToBHNode` to the objects themselves and now uses an interface to interact with it. 26 | - Remodeled the object system to enable better code patterns. 27 | - Changed Data Structure to handle nodes and edge from `[]AnsibleType` to `map[int]AnsibleType` to enable direct mapping using the Ansible ID. 28 | - Renamed Edge generation function. 29 | - OID for nodes is now based on the following data: `sha1(INSTALL_UUID + ID + RESOURCE_TYPE)`, allowing reproducible OIDs that stay different between Ansible instances. 30 | 31 | [unreleased] https://github.com/TheSleekBoyCompany/AnsibleHound/?ref=main 32 | -------------------------------------------------------------------------------- /scripts/import-icons.py: -------------------------------------------------------------------------------- 1 | import requests 2 | import urllib3 3 | import json 4 | import sys 5 | 6 | urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning) 7 | 8 | CUSTOM_NODE_ENDPOINT = "/api/v2/custom-nodes" 9 | 10 | def define_icon(url, token, icon_type, icon_name, icon_color): 11 | payload = { 12 | "custom_types": { 13 | icon_type: { 14 | "icon": { 15 | "type": "font-awesome", 16 | "name": icon_name, 17 | "color": icon_color 18 | } 19 | } 20 | } 21 | } 22 | 23 | 24 | headers = { 25 | "Authorization": "Bearer %s" % token , 26 | "Content-Type": "application/json" 27 | } 28 | 29 | response = requests.post( 30 | url, 31 | headers=headers, 32 | json=payload, 33 | verify=False # Disables SSL verification 34 | ) 35 | 36 | print(f"🔹 Sent icon for: {icon_type}") 37 | print("Status Code:", response.status_code) 38 | print("Response Body:", response.text) 39 | print("---") 40 | 41 | if __name__ == "__main__": 42 | if len(sys.argv) != 3: 43 | print("[!] Missing arguments.", file=sys.stderr) 44 | print("[?] Usage: import-icons.py ", file=sys.stderr) 45 | print("[?] Example: import-icons.py http://127.0.0.1:8080 ey[...]", file=sys.stderr) 46 | sys.exit(1) 47 | 48 | url = sys.argv[1] + CUSTOM_NODE_ENDPOINT 49 | jwt_token = sys.argv[2] 50 | 51 | # Call function for each icon type you want to send 52 | define_icon(url, jwt_token, "ATAnsibleInstance", "sitemap", "#E43131") 53 | define_icon(url, jwt_token, "ATOrganization", "building", "#F59C36") 54 | define_icon(url, jwt_token, "ATInventory", "network-wired", "#FF78F2") 55 | define_icon(url, jwt_token, "ATUser", "user", "#7ADEE9") 56 | define_icon(url, jwt_token, "ATJob", "gears", "#7CAAFF") 57 | define_icon(url, jwt_token, "ATJobTemplate", "code", "#493EB0") 58 | define_icon(url, jwt_token, "ATProject", "folder-open", "#EC7589") 59 | define_icon(url, jwt_token, "ATCredential", "key", "#94E16A") 60 | define_icon(url, jwt_token, "ATCredentialType", "gear", "#94E16A") 61 | define_icon(url, jwt_token, "ATHost", "desktop", "#E9E350") 62 | define_icon(url, jwt_token, "ATTeam", "people-group", "#724752") 63 | define_icon(url, jwt_token, "ATGroup", "object-group", "#159b7c") 64 | -------------------------------------------------------------------------------- /core/clients.go: -------------------------------------------------------------------------------- 1 | package core 2 | 3 | import ( 4 | "crypto/tls" 5 | "encoding/base64" 6 | "fmt" 7 | "io" 8 | "net/http" 9 | "net/url" 10 | 11 | "github.com/charmbracelet/log" 12 | ) 13 | 14 | func executeReq(client AHClient, req *http.Request) ([]byte, error) { 15 | 16 | resp, err := client.Do(req) 17 | if err != nil { 18 | return []byte{}, err 19 | } 20 | defer resp.Body.Close() 21 | 22 | if resp.StatusCode == http.StatusUnauthorized { 23 | return []byte{}, fmt.Errorf("HTTP error occurred: %s", resp.Status) 24 | } 25 | 26 | body, err := io.ReadAll(resp.Body) 27 | if err != nil { 28 | return []byte{}, err 29 | } 30 | 31 | return body, nil 32 | } 33 | 34 | func getPage(client AHClient, url string, currentPage int) ([]byte, error) { 35 | 36 | req, err := initReq(url, currentPage) 37 | if err != nil { 38 | return []byte{}, err 39 | } 40 | 41 | body, err := executeReq(client, req) 42 | if err != nil { 43 | return []byte{}, err 44 | } 45 | 46 | return body, nil 47 | } 48 | 49 | func InitClient(proxyURL *url.URL, skipVerifySSL bool, 50 | username string, password string, token string) AHClient { 51 | // Returns a client configured for the gatherer. 52 | // For now, this only configures the Proxy, might be useful to handle SSL verification too. 53 | 54 | transport := &http.Transport{} 55 | 56 | if skipVerifySSL { 57 | TLSClientConfig := &tls.Config{ 58 | InsecureSkipVerify: true, 59 | } 60 | transport.TLSClientConfig = TLSClientConfig 61 | } 62 | 63 | if proxyURL != nil { 64 | transport.Proxy = http.ProxyURL(proxyURL) 65 | } 66 | 67 | httpClient := &http.Client{ 68 | Transport: transport, 69 | } 70 | 71 | headers := http.Header{} 72 | if username != "" && password != "" { 73 | raw := username + ":" + password 74 | encoded := base64.StdEncoding.EncodeToString([]byte(raw)) 75 | headers.Add("Authorization", "Basic "+encoded) 76 | if token != "" { 77 | log.Warn("Prioritizing username/password authentication material, token was ignored.") 78 | } 79 | } else if token != "" { 80 | if password != "" || username != "" { 81 | log.Warn("Prioritizing token authentication material, username/password was ignored.") 82 | } 83 | headers.Add("Authorization", "Bearer "+token) 84 | } else { 85 | log.Fatal("No authentication material provided, exiting.") 86 | } 87 | 88 | client := AHClient{ 89 | Client: httpClient, 90 | Headers: headers, 91 | } 92 | 93 | return client 94 | } 95 | 96 | func initReq(url string, currentPage int) (*http.Request, error) { 97 | 98 | url = url + PAGE_SIZE_ARG + fmt.Sprintf(CURRENT_PAGE_ARG, currentPage) 99 | 100 | req, err := http.NewRequest("GET", url, nil) 101 | if err != nil { 102 | return nil, err 103 | } 104 | 105 | return req, nil 106 | 107 | } 108 | -------------------------------------------------------------------------------- /core/gatherer.go: -------------------------------------------------------------------------------- 1 | package core 2 | 3 | import ( 4 | "encoding/json" 5 | "fmt" 6 | "io" 7 | "net/http" 8 | "net/url" 9 | ) 10 | 11 | func Gather[T AnsibleType](client AHClient, target url.URL, 12 | endpoint string) ([]T, error) { 13 | 14 | var objects []T 15 | count := 0 16 | current := 0 17 | page := 1 18 | 19 | url := target.String() + endpoint 20 | 21 | body, err := getPage(client, url, page) 22 | if err != nil { 23 | return nil, err 24 | } 25 | 26 | if count == 0 { 27 | r := Response[T]{} 28 | err = json.Unmarshal(body, &r) 29 | if err != nil { 30 | return nil, err 31 | } 32 | count = r.Count 33 | objects = append(objects, r.Results...) 34 | } 35 | current += PAGE_SIZE 36 | 37 | if count >= PAGE_SIZE { 38 | for { 39 | page += 1 40 | body, err := getPage(client, url, page) 41 | if err != nil { 42 | return nil, err 43 | } 44 | r := Response[T]{} 45 | err = json.Unmarshal(body, &r) 46 | if err != nil { 47 | return nil, err 48 | } 49 | objects = append(objects, r.Results...) 50 | current += PAGE_SIZE 51 | if current >= count { 52 | break 53 | } 54 | } 55 | } 56 | 57 | return objects, nil 58 | 59 | } 60 | 61 | func GatherObject[T AnsibleType](installUUID string, client AHClient, 62 | target url.URL, endpoint string) ( 63 | objectMap map[int]T, err error) { 64 | 65 | objectMap = make(map[int]T) 66 | 67 | objects, err := Gather[T](client, target, endpoint) 68 | if err != nil { 69 | return nil, err 70 | } 71 | 72 | for _, object := range objects { 73 | object.InitOID(installUUID) 74 | objectMap[object.GetID()] = object 75 | } 76 | 77 | return objectMap, nil 78 | } 79 | 80 | func GatherAnsibleInstance(client AHClient, target url.URL) (instance AnsibleInstance, err error) { 81 | 82 | url := target.String() + PING_ENDPOINT 83 | 84 | req, err := http.NewRequest("GET", url, nil) 85 | if err != nil { 86 | return instance, err 87 | } 88 | 89 | resp, err := client.Do(req) 90 | if err != nil { 91 | return instance, err 92 | } 93 | defer resp.Body.Close() 94 | 95 | body, err := io.ReadAll(resp.Body) 96 | if err != nil { 97 | return instance, err 98 | } 99 | 100 | err = json.Unmarshal(body, &instance) 101 | if err != nil { 102 | return instance, err 103 | } 104 | 105 | instance.InitOID(instance.InstallUUID) 106 | 107 | return instance, nil 108 | } 109 | 110 | func HasAccessTo[T AnsibleType](objectMap map[int]T, ID int) (result bool) { 111 | // NOTE: If ID = 0, then the resource is not bound to a resource of this type. 112 | // EX: A Credential can exist without being bound to an Organization. 113 | // This might also mean a resource is used, but your user cannot read it. 114 | if ID != 0 { 115 | if _, ok := objectMap[ID]; ok { 116 | result = true 117 | } 118 | } 119 | return result 120 | } 121 | 122 | func AuthenticateOnAnsibleInstance(client AHClient, 123 | target url.URL, endpoint string) ([]byte, error) { 124 | 125 | url := target.String() + endpoint 126 | 127 | req, err := http.NewRequest("GET", url, nil) 128 | if err != nil { 129 | return nil, err 130 | } 131 | 132 | resp, err := client.Do(req) 133 | if err != nil { 134 | return []byte{}, err 135 | } 136 | defer resp.Body.Close() 137 | 138 | if resp.StatusCode == http.StatusUnauthorized { 139 | return []byte{}, fmt.Errorf("HTTP error occurred: %s", resp.Status) 140 | } 141 | 142 | return []byte{}, nil 143 | } 144 | -------------------------------------------------------------------------------- /go.sum: -------------------------------------------------------------------------------- 1 | github.com/aymanbagabas/go-osc52/v2 v2.0.1 h1:HwpRHbFMcZLEVr42D4p7XBqjyuxQH5SMiErDT4WkJ2k= 2 | github.com/aymanbagabas/go-osc52/v2 v2.0.1/go.mod h1:uYgXzlJ7ZpABp8OJ+exZzJJhRNQ2ASbcXHWsFqH8hp8= 3 | github.com/charmbracelet/lipgloss v1.0.0 h1:O7VkGDvqEdGi93X+DeqsQ7PKHDgtQfF8j8/O2qFMQNg= 4 | github.com/charmbracelet/lipgloss v1.0.0/go.mod h1:U5fy9Z+C38obMs+T+tJqst9VGzlOYGj4ri9reL3qUlo= 5 | github.com/charmbracelet/log v0.4.1 h1:6AYnoHKADkghm/vt4neaNEXkxcXLSV2g1rdyFDOpTyk= 6 | github.com/charmbracelet/log v0.4.1/go.mod h1:pXgyTsqsVu4N9hGdHmQ0xEA4RsXof402LX9ZgiITn2I= 7 | github.com/charmbracelet/x/ansi v0.4.2 h1:0JM6Aj/g/KC154/gOP4vfxun0ff6itogDYk41kof+qk= 8 | github.com/charmbracelet/x/ansi v0.4.2/go.mod h1:dk73KoMTT5AX5BsX0KrqhsTqAnhZZoCBjs7dGWp4Ktw= 9 | github.com/cpuguy83/go-md2man/v2 v2.0.6/go.mod h1:oOW0eioCTA6cOiMLiUPZOpcVxMig6NIQQ7OS05n1F4g= 10 | github.com/davecgh/go-spew v1.1.1 h1:vj9j/u1bqnvCEfJOwUhtlOARqs3+rkHYY13jYWTU97c= 11 | github.com/davecgh/go-spew v1.1.1/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38= 12 | github.com/go-logfmt/logfmt v0.6.0 h1:wGYYu3uicYdqXVgoYbvnkrPVXkuLM1p1ifugDMEdRi4= 13 | github.com/go-logfmt/logfmt v0.6.0/go.mod h1:WYhtIu8zTZfxdn5+rREduYbwxfcBr/Vr6KEVveWlfTs= 14 | github.com/inconshreveable/mousetrap v1.1.0 h1:wN+x4NVGpMsO7ErUn/mUI3vEoE6Jt13X2s0bqwp9tc8= 15 | github.com/inconshreveable/mousetrap v1.1.0/go.mod h1:vpF70FUmC8bwa3OWnCshd2FqLfsEA9PFc4w1p2J65bw= 16 | github.com/lucasb-eyer/go-colorful v1.2.0 h1:1nnpGOrhyZZuNyfu1QjKiUICQ74+3FNCN69Aj6K7nkY= 17 | github.com/lucasb-eyer/go-colorful v1.2.0/go.mod h1:R4dSotOR9KMtayYi1e77YzuveK+i7ruzyGqttikkLy0= 18 | github.com/mattn/go-isatty v0.0.20 h1:xfD0iDuEKnDkl03q4limB+vH+GxLEtL/jb4xVJSWWEY= 19 | github.com/mattn/go-isatty v0.0.20/go.mod h1:W+V8PltTTMOvKvAeJH7IuucS94S2C6jfK/D7dTCTo3Y= 20 | github.com/muesli/termenv v0.16.0 h1:S5AlUN9dENB57rsbnkPyfdGuWIlkmzJjbFf0Tf5FWUc= 21 | github.com/muesli/termenv v0.16.0/go.mod h1:ZRfOIKPFDYQoDFF4Olj7/QJbW60Ol/kL1pU3VfY/Cnk= 22 | github.com/pmezard/go-difflib v1.0.0 h1:4DBwDE0NGyQoBHbLQYPwSUPoCMWR5BEzIk/f1lZbAQM= 23 | github.com/pmezard/go-difflib v1.0.0/go.mod h1:iKH77koFhYxTK1pcRnkKkqfTogsbg7gZNVY4sRDYZ/4= 24 | github.com/rivo/uniseg v0.4.7 h1:WUdvkW8uEhrYfLC4ZzdpI2ztxP1I582+49Oc5Mq64VQ= 25 | github.com/rivo/uniseg v0.4.7/go.mod h1:FN3SvrM+Zdj16jyLfmOkMNblXMcoc8DfTHruCPUcx88= 26 | github.com/russross/blackfriday/v2 v2.1.0/go.mod h1:+Rmxgy9KzJVeS9/2gXHxylqXiyQDYRxCVz55jmeOWTM= 27 | github.com/spf13/cobra v1.9.1 h1:CXSaggrXdbHK9CF+8ywj8Amf7PBRmPCOJugH954Nnlo= 28 | github.com/spf13/cobra v1.9.1/go.mod h1:nDyEzZ8ogv936Cinf6g1RU9MRY64Ir93oCnqb9wxYW0= 29 | github.com/spf13/pflag v1.0.6 h1:jFzHGLGAlb3ruxLB8MhbI6A8+AQX/2eW4qeyNZXNp2o= 30 | github.com/spf13/pflag v1.0.6/go.mod h1:McXfInJRrz4CZXVZOBLb0bTZqETkiAhM9Iw0y3An2Bg= 31 | github.com/stretchr/testify v1.10.0 h1:Xv5erBjTwe/5IxqUQTdXv5kgmIvbHo3QQyRwhJsOfJA= 32 | github.com/stretchr/testify v1.10.0/go.mod h1:r2ic/lqez/lEtzL7wO/rwa5dbSLXVDPFyf8C91i36aY= 33 | golang.org/x/exp v0.0.0-20231006140011-7918f672742d h1:jtJma62tbqLibJ5sFQz8bKtEM8rJBtfilJ2qTU199MI= 34 | golang.org/x/exp v0.0.0-20231006140011-7918f672742d/go.mod h1:ldy0pHrwJyGW56pPQzzkH36rKxoZW1tw7ZJpeKx+hdo= 35 | golang.org/x/sys v0.6.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= 36 | golang.org/x/sys v0.30.0 h1:QjkSwP/36a20jFYWkSue1YwXzLmsV5Gfq7Eiy72C1uc= 37 | golang.org/x/sys v0.30.0/go.mod h1:/VUhepiaJMQUp4+oa/7Zr1D23ma6VTLIYjOOTFZPUcA= 38 | gopkg.in/check.v1 v0.0.0-20161208181325-20d25e280405/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0= 39 | gopkg.in/yaml.v3 v3.0.1 h1:fxVm/GzAzEWqLHuvctI91KS9hhNmmWOoWu0XTYJS7CA= 40 | gopkg.in/yaml.v3 v3.0.1/go.mod h1:K4uyk7z7BCEPqu6E+C64Yfv1cQ7kz7rIZviUmN+EgEM= 41 | -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 | # AnsibleHound 2 | 3 | ![](./images/ansiblehound.png) 4 | 5 | ## Overview 6 | 7 | **AnsibleHound** is a BloodHound OpenGraph collector for **Ansible WorX** and **Ansible Tower**. The collector is designed to map the structure and permission of your organization into a navigable attack‑path graph. 8 | 9 | Developped by [@Ramoreik](https://github.com/Ramoreik) and [@s_lck](https://github.com/s-lck). 10 | 11 | ## Collector Setup & Usage 12 | 13 | ### Building the tool 14 | 15 | ```bash 16 | go build . -o build/collector 17 | ``` 18 | 19 | ### Running the Collection 20 | 21 | The collector can be run using any of the following authentication materials: 22 | 23 | - `token` who is working only for local users 24 | - `username/password` who is working for both local and LDAP users 25 | 26 | The collector will then list the access permissions available to the user. The collection's results depend on the user's level of access used for collection. 27 | 28 | > Note : If you have multiple instances of Ansible you need to run the collector against each of them 29 | 30 | #### Token 31 | 32 | To obtain a valid token for **Ansible WorX** or **Ansible Tower**, you can navigate to the **User Details** of your current user. 33 | 34 | ![](./images/user-details.png) 35 | 36 | Then the **tokens** tab. 37 | 38 | ![](./images/tokens-tab.png) 39 | 40 | Finally, create a token and give it **Read** permissions. 41 | 42 | ![](./images/create-token.png) 43 | 44 | To run the collector, provide it with a target and a token: 45 | 46 | ```bash 47 | ./collector -t '' --token '' 48 | 49 | # Example 50 | ./collector -t 'http://localhost:8080/' --token '56KOmh...' 51 | ``` 52 | 53 | #### Username/Password 54 | 55 | To run the collector, provide it with a username and a password: 56 | 57 | ```bash 58 | ./collector -u '' -p '' -t '' 59 | 60 | # Example 61 | ./collector -u 'admin' -p 'tcrA...' -t 'http://10.10.10.10:8080' 62 | ``` 63 | 64 | > Provide the domain password for Active Directory / LDAP accounts. 65 | 66 | ### Load Icons 67 | 68 | A script is provided to import the icon for the custom nodes used by AnsibleHound. 69 | You have to provide it the `bloodhound-url` and `jwt-token`. 70 | 71 | ```bash 72 | python3 ./scripts/import-icons.py 73 | 74 | # Example 75 | python3 ./scripts/import-icons.py 'http://localhost:8080' 'ey[...]' 76 | ``` 77 | 78 | ### Samples 79 | 80 | If you don't have any Ansible WorX or Tower environment, you can just drop `./samples/example.json` on BHCE to enjoy the graph. 81 | 82 | ## Schema 83 | 84 | ![](./images/cypher.png) 85 | 86 | ### Nodes 87 | 88 | Nodes correspond to each object type. 89 | 90 | | Node | Description | Icon | Color | 91 | | ----------------- | --------------------------------------------------------------------------------------------------------------------- | ------------- | ------- | 92 | | ATAnsibleInstance | Complete installation of Ansible | sitemap | #F59C36 | 93 | | ATOrganization | Logical collection of users, teams, projects, and inventories. It is the highest-level object in the object hierarchy | building | #F59C36 | 94 | | ATInventory | Collection of hosts and groups | network-wired | #FF78F2 | 95 | | ATGroup | Group of hosts | object-group | #159b7c | 96 | | ATUser | An individual user account | user | #7ADEE9 | 97 | | ATJob | Instance launching a playbook against an inventory of hosts | gears | #7CAAFF | 98 | | ATJobTemplate | Combines an Ansible playbook from a project and the settings required to launch it | code | #493EB0 | 99 | | ATProject | Logical collection of Ansible playbooks | folder-open | #EC7589 | 100 | | ATCredential | Authenticate the user to launch playbooks (passwords - SSH keys) against inventory hosts | key | #94E16A | 101 | | ATCredentialType | | key | #94E16A | Type of the Credential and information about this type. 102 | | ATHost | These are the target devices (servers, network appliances or any computer) you aim to manage | desktop | #E9E350 | 103 | | ATTeam | A group of users | people-group | #724752 | 104 | 105 | > **Note** : This is a work in progress 106 | 107 | ### Edges 108 | 109 | All the edges are prefixed by `AT` to make it distinct from other collectors edges. 110 | 111 | | Edge Type | Source | Target | 112 | | ------------ | ------------------- | -------------------------------------------------------------------------------------------- | 113 | | `ATContains` | `ATAnsibleInstance` | `ATOrganization` | 114 | | `ATContains` | `ATOrganization` | `ATInventory` | 115 | | `ATContains` | `ATInventory` | `ATHost` | 116 | | `ATContains` | `ATInventory` | `ATGroup` | 117 | | `ATContains` | `ATGroup` | `ATHost` | 118 | | `ATContains` | `ATJobTemplate` | `ATJob` | 119 | | `ATContains` | `ATOrganization` | `ATJobTemplate` | 120 | | `ATContains` | `ATOrganization` | `ATCredential` | 121 | | `ATContains` | `ATOrganization` | `ATProject` | 122 | | `ATUses` | `ATJobTemplate` | `ATProject` | 123 | | `ATUses` | `ATJobTemplate` | `ATInventory` | 124 | | `ATUsesType` | `ATCredential` | `ATCredentialType` | 125 | | `ATExecute` | `ATUser` | `ATJobTemplate` | 126 | | `ATExecute` | `ATTeam` | `ATJobTemplate` | 127 | | `ATMember` | `ATUser` | `ATOrganization` - `ATTeam` | 128 | | `ATRead` | `ATUser` | `ATOrganization` - `ATTeam` - `ATInventory` - `ATProject` - `ATJobTemplate` | 129 | | `ATRead` | `ATTeam` | `ATOrganization` - `ATUser` - `ATInventory` - `ATProject` - `ATJobTemplate` | 130 | | `ATAuditor` | `ATUser` | `ATOrganization` - `ATProject` - `ATInventory` - `ATJobTemplate` | 131 | | `ATAdmin` | `ATUser` | `ATOrganization` - `ATTeam` - `ATInventory` - `ATProject` - `ATJobTemplate` - `ATCredential` | 132 | 133 | > **Note** : This is a work in progress 134 | 135 | ## Licensing 136 | 137 | ``` 138 | GNU GENERAL PUBLIC LICENSE 139 | Version 3, 29 June 2007 140 | 141 | Copyright (C) 2007 Free Software Foundation, Inc. 142 | Everyone is permitted to copy and distribute verbatim copies 143 | of this license document, but changing it is not allowed. 144 | ``` 145 | -------------------------------------------------------------------------------- /collector/Main.go: -------------------------------------------------------------------------------- 1 | package main 2 | 3 | import ( 4 | "encoding/json" 5 | "fmt" 6 | "net/url" 7 | "os" 8 | "path" 9 | "strings" 10 | 11 | core "ansible-hound/core" 12 | 13 | "github.com/charmbracelet/log" 14 | "github.com/spf13/cobra" 15 | ) 16 | 17 | func launchGathering(client core.AHClient, targetUrl *url.URL, outdir string) { 18 | 19 | output := core.OutputJson{ 20 | Metadata: core.Metadata{ 21 | SourceKind: "AnsibleBase", 22 | }, 23 | } 24 | nodes := []core.Node{} 25 | edges := []core.Edge{} 26 | 27 | // -- Check if credentials are valid 28 | 29 | log.Info("Authenticating on Ansible Worx/Tower instance.") 30 | _, err := core.AuthenticateOnAnsibleInstance(client, *targetUrl, core.ME_ENDPOINT) 31 | if err != nil { 32 | log.Error("Unable to authenticate on Ansible WorX/Tower instance due to invalid credentials.") 33 | log.Error(err) 34 | return 35 | } 36 | 37 | // -- Gathering Ansible Instance information -- 38 | 39 | log.Info("Gathering Ansible Worx/Tower instance information.") 40 | instance, err := core.GatherAnsibleInstance(client, *targetUrl) 41 | if err != nil { 42 | log.Fatalf("Unable to gather Ansible WorX/Tower information (%s).", targetUrl) 43 | } 44 | 45 | instance.Name = targetUrl.Host 46 | 47 | instanceNode := instance.ToBHNode() 48 | nodes = append(nodes, instanceNode) 49 | 50 | // -- Gathering all nodes -- 51 | 52 | log.Info("Gathering Users.") 53 | users, err := core.GatherObject[*core.User]( 54 | instance.InstallUUID, client, *targetUrl, core.USERS_ENDPOINT, 55 | ) 56 | if err != nil { 57 | log.Error("An error occured while gathering Users, skipping.") 58 | log.Error(err) 59 | } 60 | 61 | log.Info("Gathering User Roles.") 62 | for i, user := range users { 63 | userRolesEndpoint := fmt.Sprintf(core.USER_ROLES_ENDPOINT, user.ID) 64 | roles, err := core.GatherObject[*core.Role]( 65 | instance.InstallUUID, client, *targetUrl, userRolesEndpoint) 66 | if err != nil { 67 | log.Error("An error occured while gathering User Roles.") 68 | log.Error(err) 69 | continue 70 | } 71 | user.Roles = roles 72 | users[i] = user 73 | } 74 | userNodes := core.GenerateNodes(users) 75 | nodes = append(nodes, userNodes...) 76 | 77 | log.Info("Gathering Hosts.") 78 | hosts, err := core.GatherObject[*core.Host]( 79 | instance.InstallUUID, client, *targetUrl, core.HOSTS_ENDPOINT, 80 | ) 81 | if err != nil { 82 | log.Error("An error occured while gathering Hosts, skipping.") 83 | log.Error(err) 84 | } 85 | hostNodes := core.GenerateNodes(hosts) 86 | nodes = append(nodes, hostNodes...) 87 | 88 | log.Info("Gathering Groups.") 89 | groups, err := core.GatherObject[*core.Group]( 90 | instance.InstallUUID, client, *targetUrl, core.GROUPS_ENDPOINT, 91 | ) 92 | if err != nil { 93 | log.Error("An error occured while gathering Users, skipping.") 94 | log.Error(err) 95 | } 96 | groupsNodes := core.GenerateNodes(groups) 97 | nodes = append(nodes, groupsNodes...) 98 | 99 | log.Info("Gathering Group Hosts.") 100 | for i, group := range groups { 101 | 102 | groupHostsEndpoint := fmt.Sprintf(core.GROUP_HOSTS_ENDPOINT, group.ID) 103 | hosts, err := core.GatherObject[*core.Host]( 104 | instance.InstallUUID, client, *targetUrl, groupHostsEndpoint, 105 | ) 106 | if err != nil { 107 | log.Error("An error occured while gathering Team Roles.") 108 | log.Error(err) 109 | continue 110 | } 111 | group.Hosts = hosts 112 | groups[i] = group 113 | } 114 | 115 | log.Info("Gathering Jobs.") 116 | jobs, err := core.GatherObject[*core.Job]( 117 | instance.InstallUUID, client, *targetUrl, core.JOBS_ENDPOINT, 118 | ) 119 | if err != nil { 120 | log.Error("An error occured while gathering Jobs, skipping.") 121 | log.Error(err) 122 | } 123 | jobsNodes := core.GenerateNodes(jobs) 124 | nodes = append(nodes, jobsNodes...) 125 | 126 | log.Info("Gathering Job Templates.") 127 | jobTemplates, err := core.GatherObject[*core.JobTemplate]( 128 | instance.InstallUUID, client, *targetUrl, core.JOB_TEMPLATE_ENDPOINT, 129 | ) 130 | if err != nil { 131 | log.Error("An error occured while gathering Job Templates, skipping.") 132 | log.Error(err) 133 | } 134 | log.Info("Gathering Job Templates Credentials.") 135 | for i, jobTemplate := range jobTemplates { 136 | 137 | jobTemplatesCredentialsEndpoint := fmt.Sprintf(core. 138 | JOB_TEMPLATE_CREDENTIALS_ENDPOINT, jobTemplate.ID) 139 | credentials, err := core.GatherObject[*core.Credential]( 140 | instance.InstallUUID, client, *targetUrl, jobTemplatesCredentialsEndpoint, 141 | ) 142 | if err != nil { 143 | log.Error("An error occured while gathering Job Template Credentials.") 144 | log.Error(err) 145 | continue 146 | } 147 | 148 | jobTemplate.Credentials = credentials 149 | jobTemplates[i] = jobTemplate 150 | } 151 | jobTemplatesNodes := core.GenerateNodes(jobTemplates) 152 | nodes = append(nodes, jobTemplatesNodes...) 153 | 154 | log.Info("Gathering Inventories.") 155 | inventories, err := core.GatherObject[*core.Inventory]( 156 | instance.InstallUUID, client, *targetUrl, core.INVENTORIES_ENDPOINT, 157 | ) 158 | if err != nil { 159 | log.Error("An error occured while gathering Inventories, skipping.") 160 | log.Error(err) 161 | } 162 | inventoriesNodes := core.GenerateNodes(inventories) 163 | nodes = append(nodes, inventoriesNodes...) 164 | 165 | log.Info("Gathering Organizations.") 166 | organizations, err := core.GatherObject[*core.Organization]( 167 | instance.InstallUUID, client, *targetUrl, core.ORGANIZATIONS_ENDPOINT, 168 | ) 169 | if err != nil { 170 | log.Error("An error occured while gathering Organizations, skipping.") 171 | log.Error(err) 172 | } 173 | organizationNodes := core.GenerateNodes(organizations) 174 | nodes = append(nodes, organizationNodes...) 175 | 176 | log.Info("Gathering Credentials.") 177 | credentials, err := core.GatherObject[*core.Credential]( 178 | instance.InstallUUID, client, *targetUrl, core.CREDENTIALS_ENDPOINT, 179 | ) 180 | if err != nil { 181 | log.Error("An error occured while gathering Credentials, skipping.") 182 | log.Error(err) 183 | } 184 | credentialNodes := core.GenerateNodes(credentials) 185 | nodes = append(nodes, credentialNodes...) 186 | 187 | log.Info("Gathering Credential Types.") 188 | credentialTypes, err := core.GatherObject[*core.CredentialType]( 189 | instance.InstallUUID, client, *targetUrl, core.CREDENTIAL_TYPES_ENDPOINT, 190 | ) 191 | if err != nil { 192 | log.Error("An error occured while gathering Credential Types, skipping.") 193 | log.Error(err) 194 | } 195 | credentialTypesNodes := core.GenerateNodes(credentialTypes) 196 | nodes = append(nodes, credentialTypesNodes...) 197 | 198 | log.Info("Gathering Projects.") 199 | projects, err := core.GatherObject[*core.Project]( 200 | instance.InstallUUID, client, *targetUrl, core.PROJECTS_ENDPOINT, 201 | ) 202 | if err != nil { 203 | log.Error("An error occured while gathering Projects, skipping.") 204 | log.Error(err) 205 | } 206 | projectNodes := core.GenerateNodes(projects) 207 | nodes = append(nodes, projectNodes...) 208 | 209 | log.Info("Gathering Teams.") 210 | teams, err := core.GatherObject[*core.Team]( 211 | instance.InstallUUID, client, *targetUrl, core.TEAMS_ENDPOINT, 212 | ) 213 | if err != nil { 214 | log.Error("An error occured while gathering Teams, skipping.") 215 | log.Error(err) 216 | } 217 | 218 | log.Info("Gathering Team Roles.") 219 | for i, team := range teams { 220 | 221 | teamRolesEndpoint := fmt.Sprintf(core.TEAM_ROLES_ENDPOINT, team.ID) 222 | roles, err := core.GatherObject[*core.Role]( 223 | instance.InstallUUID, client, *targetUrl, teamRolesEndpoint, 224 | ) 225 | if err != nil { 226 | log.Error("An error occured while gathering Team Roles.") 227 | log.Error(err) 228 | continue 229 | } 230 | 231 | teamMembersEndpoint := fmt.Sprintf(core.TEAM_USERS_ENDPOINT, team.ID) 232 | members, err := core.GatherObject[*core.User]( 233 | instance.InstallUUID, client, *targetUrl, teamMembersEndpoint, 234 | ) 235 | if err != nil { 236 | log.Error("An error occured while gathering Team Members.") 237 | log.Error(err) 238 | continue 239 | } 240 | team.Roles = roles 241 | team.Members = members 242 | teams[i] = team 243 | } 244 | teamNodes := core.GenerateNodes(teams) 245 | nodes = append(nodes, teamNodes...) 246 | 247 | // -- Creating all edges -- 248 | 249 | log.Info("Linking Instance and Organizations.") 250 | kind := "ATContains" 251 | for _, organization := range organizations { 252 | edge := core.GenerateEdge(kind, instance.OID, organization.OID) 253 | edges = append(edges, edge) 254 | } 255 | 256 | log.Info("Linking Organizations and Inventories.") 257 | kind = "ATContains" 258 | for _, inventory := range inventories { 259 | if core.HasAccessTo(organizations, inventory.Organization) { 260 | edge := core.GenerateEdge(kind, organizations[inventory.Organization].OID, inventory.OID) 261 | edges = append(edges, edge) 262 | } 263 | } 264 | 265 | log.Info("Linking Inventories and Hosts.") 266 | kind = "ATContains" 267 | for _, host := range hosts { 268 | if core.HasAccessTo(inventories, host.Inventory) { 269 | edge := core.GenerateEdge(kind, inventories[host.Inventory].OID, host.OID) 270 | edges = append(edges, edge) 271 | } 272 | } 273 | 274 | log.Info("Linking Inventories and Groups.") 275 | kind = "ATContains" 276 | for _, group := range groups { 277 | if core.HasAccessTo(inventories, group.Inventory) { 278 | edge := core.GenerateEdge(kind, inventories[group.Inventory].OID, group.OID) 279 | edges = append(edges, edge) 280 | } 281 | } 282 | 283 | log.Info("Linking Groups and Hosts.") 284 | kind = "ATContains" 285 | for _, group := range groups { 286 | for _, host := range group.Hosts { 287 | if core.HasAccessTo(hosts, host.ID) { 288 | edge := core.GenerateEdge(kind, groups[group.ID].OID, host.OID) 289 | edges = append(edges, edge) 290 | } 291 | } 292 | } 293 | 294 | log.Info("Linking Job Templates and Jobs.") 295 | kind = "ATContains" 296 | for _, job := range jobs { 297 | if core.HasAccessTo(jobTemplates, job.UnifiedJobTemplate) { 298 | edge := core.GenerateEdge(kind, jobTemplates[job.UnifiedJobTemplate].OID, job.OID) 299 | edges = append(edges, edge) 300 | } 301 | } 302 | 303 | log.Info("Linking Organizations and Job Templates.") 304 | kind = "ATContains" 305 | for _, jobTemplate := range jobTemplates { 306 | if core.HasAccessTo(organizations, jobTemplate.Organization) { 307 | edge := core.GenerateEdge(kind, organizations[jobTemplate.Organization].OID, jobTemplate.OID) 308 | edges = append(edges, edge) 309 | } 310 | } 311 | 312 | log.Info("Linking Organizations and Credentials.") 313 | kind = "ATContains" 314 | for _, credential := range credentials { 315 | if core.HasAccessTo(organizations, credential.Organization) { 316 | edge := core.GenerateEdge(kind, organizations[credential.Organization].OID, credential.OID) 317 | edges = append(edges, edge) 318 | } 319 | } 320 | 321 | log.Info("Linking Organizations and Projects") 322 | kind = "ATContains" 323 | for _, project := range projects { 324 | if core.HasAccessTo(organizations, project.Organization) { 325 | edge := core.GenerateEdge(kind, organizations[project.Organization].OID, project.OID) 326 | edges = append(edges, edge) 327 | } 328 | } 329 | 330 | log.Info("Linking Job Templates and Projects.") 331 | kind = "ATUses" 332 | for _, jobTemplate := range jobTemplates { 333 | if core.HasAccessTo(projects, jobTemplate.Project) { 334 | edge := core.GenerateEdge(kind, jobTemplate.OID, projects[jobTemplate.Project].OID) 335 | edges = append(edges, edge) 336 | } 337 | } 338 | 339 | log.Info("Linking Job Template and Inventories.") 340 | kind = "ATUses" 341 | for _, jobTemplate := range jobTemplates { 342 | if core.HasAccessTo(inventories, jobTemplate.Inventory) { 343 | edge := core.GenerateEdge(kind, jobTemplate.OID, inventories[jobTemplate.Inventory].OID) 344 | edges = append(edges, edge) 345 | } 346 | } 347 | 348 | log.Info("Linking Credentials to Credential Type.") 349 | kind = "ATUsesType" 350 | for _, credential := range credentials { 351 | if core.HasAccessTo(credentialTypes, credential.CredentialType) { 352 | edge := core.GenerateEdge(kind, credential.OID, credentialTypes[credential.CredentialType].OID) 353 | edges = append(edges, edge) 354 | } 355 | } 356 | 357 | log.Info("Linking Job Template and Credentials.") 358 | kind = "ATUses" 359 | for _, jobTemplate := range jobTemplates { 360 | for _, credential := range jobTemplate.Credentials { 361 | edge := core.GenerateEdge(kind, jobTemplate.OID, credential.OID) 362 | edges = append(edges, edge) 363 | } 364 | } 365 | 366 | log.Info("Linking User Roles.") 367 | for _, user := range users { 368 | 369 | for _, role := range user.Roles { 370 | kind := "AT" + strings.ReplaceAll(role.Name, " ", "") 371 | 372 | var edge core.Edge 373 | 374 | switch role.SummaryFields.ResourceType { 375 | 376 | case "organization": 377 | if core.HasAccessTo(organizations, role.SummaryFields.ResourceId) { 378 | edge = core.GenerateEdge(kind, user.OID, organizations[role.SummaryFields.ResourceId].OID) 379 | edges = append(edges, edge) 380 | } 381 | case "inventory": 382 | if core.HasAccessTo(inventories, role.SummaryFields.ResourceId) { 383 | edge = core.GenerateEdge(kind, user.OID, inventories[role.SummaryFields.ResourceId].OID) 384 | edges = append(edges, edge) 385 | } 386 | case "team": 387 | if core.HasAccessTo(teams, role.SummaryFields.ResourceId) { 388 | edge = core.GenerateEdge(kind, user.OID, teams[role.SummaryFields.ResourceId].OID) 389 | edges = append(edges, edge) 390 | } 391 | case "credential": 392 | if core.HasAccessTo(credentials, role.SummaryFields.ResourceId) { 393 | edge = core.GenerateEdge(kind, user.OID, credentials[role.SummaryFields.ResourceId].OID) 394 | edges = append(edges, edge) 395 | } 396 | case "job_template": 397 | if core.HasAccessTo(jobTemplates, role.SummaryFields.ResourceId) { 398 | edge = core.GenerateEdge(kind, user.OID, jobTemplates[role.SummaryFields.ResourceId].OID) 399 | edges = append(edges, edge) 400 | } 401 | } 402 | 403 | } 404 | } 405 | 406 | log.Info("Linking Team Roles.") 407 | for _, team := range teams { 408 | for _, role := range team.Roles { 409 | kind := "AT" + strings.ReplaceAll(role.Name, " ", "") 410 | 411 | var edge core.Edge 412 | 413 | switch role.SummaryFields.ResourceType { 414 | 415 | case "organization": 416 | if core.HasAccessTo(organizations, role.SummaryFields.ResourceId) { 417 | edge = core.GenerateEdge(kind, team.OID, organizations[role.SummaryFields.ResourceId].OID) 418 | edges = append(edges, edge) 419 | } 420 | case "inventory": 421 | if core.HasAccessTo(inventories, role.SummaryFields.ResourceId) { 422 | edge = core.GenerateEdge(kind, team.OID, inventories[role.SummaryFields.ResourceId].OID) 423 | edges = append(edges, edge) 424 | } 425 | case "team": 426 | if core.HasAccessTo(teams, role.SummaryFields.ResourceId) { 427 | edge = core.GenerateEdge(kind, team.OID, teams[role.SummaryFields.ResourceId].OID) 428 | edges = append(edges, edge) 429 | } 430 | case "credential": 431 | if core.HasAccessTo(credentials, role.SummaryFields.ResourceId) { 432 | edge = core.GenerateEdge(kind, team.OID, credentials[role.SummaryFields.ResourceId].OID) 433 | edges = append(edges, edge) 434 | } 435 | case "job_template": 436 | if core.HasAccessTo(jobTemplates, role.SummaryFields.ResourceId) { 437 | edge = core.GenerateEdge(kind, team.OID, jobTemplates[role.SummaryFields.ResourceId].OID) 438 | edges = append(edges, edge) 439 | } 440 | } 441 | } 442 | } 443 | 444 | output.Graph = core.Graph{ 445 | Nodes: nodes, 446 | Edges: edges, 447 | } 448 | 449 | outputJson, err := json.MarshalIndent(output, "", " ") 450 | if err != nil { 451 | log.Fatal(err) 452 | } 453 | 454 | core.WriteToFile( 455 | outputJson, 456 | path.Join(outdir, core.CalculateName("output")), 457 | ) 458 | 459 | } 460 | 461 | var ingestCmd = &cobra.Command{ 462 | Use: "collect", 463 | Short: "Go collector for adding Ansible WorX and Ansible Tower attack paths to BloodHound with OpenGraph ", 464 | Run: func(cmd *cobra.Command, args []string) { 465 | 466 | target, _ := cmd.Flags().GetString("target") 467 | if target == "" { 468 | log.Fatal("Empty target provided.") 469 | } 470 | 471 | targetUrl, err := url.Parse(target) 472 | if err != nil { 473 | log.Fatal("Invalid target URL specified.\n%s", err) 474 | } 475 | 476 | username, _ := cmd.Flags().GetString("username") 477 | password, _ := cmd.Flags().GetString("password") 478 | token, _ := cmd.Flags().GetString("token") 479 | if (username == "" || password == "") && token == "" { 480 | log.Fatal("Invalid authentication material provided.") 481 | } 482 | 483 | verbose, _ := cmd.Flags().GetBool("verbose") 484 | if verbose { 485 | log.SetLevel(log.DebugLevel) 486 | } 487 | 488 | var proxyURL *url.URL 489 | proxy, _ := cmd.Flags().GetString("proxy") 490 | if proxy != "" { 491 | proxyURL, err = url.Parse(proxy) 492 | if err != nil { 493 | log.Fatalf("Invalid proxy URL specified.\n%s", err) 494 | } 495 | } 496 | 497 | outdir, _ := cmd.Flags().GetString("outdir") 498 | 499 | skipVerifySSL, _ := cmd.Flags().GetBool("skip-verify-ssl") 500 | 501 | client := core.InitClient(proxyURL, skipVerifySSL, username, password, token) 502 | launchGathering(client, targetUrl, outdir) 503 | 504 | }, 505 | } 506 | 507 | func main() { 508 | 509 | ingestCmd.Flags().StringP("target", "t", "", "Target URL of AWX/Tower instance.") 510 | _ = ingestCmd.MarkFlagRequired("target") 511 | 512 | ingestCmd.Flags().StringP("username", "u", "", "Username to use for authentication.") 513 | ingestCmd.Flags().StringP("token", "", "", "Token to use for authentication.") 514 | ingestCmd.Flags().StringP("password", "p", "", "Password to use for authentication.") 515 | 516 | ingestCmd.Flags().StringP("proxy", "", "", "(optional) Configure HTTP/HTTPS proxy.") 517 | ingestCmd.Flags().StringP("outdir", "", "", "(optional) Output directory for the json files.") 518 | ingestCmd.Flags().BoolP("verbose", "v", false, "(optional) Enable debug logs.") 519 | ingestCmd.Flags().BoolP("skip-verify-ssl", "k", false, "(optional) Skips SSL/TLS verification.") 520 | 521 | if err := ingestCmd.Execute(); err != nil { 522 | msg := fmt.Sprintf("CLI error: %v\n", err) 523 | log.Error(msg) 524 | os.Exit(1) 525 | } 526 | 527 | } 528 | -------------------------------------------------------------------------------- /core/objects.go: -------------------------------------------------------------------------------- 1 | package core 2 | 3 | import ( 4 | "crypto/sha1" 5 | "encoding/hex" 6 | "encoding/json" 7 | "fmt" 8 | "net/http" 9 | "strconv" 10 | "strings" 11 | ) 12 | 13 | var Instance AnsibleInstance 14 | 15 | // TODO: Remove this, it is now obsolete. 16 | type AnsibleTypeList interface { 17 | []*User | []*Job | []*JobTemplate | []*Inventory | 18 | []*Project | []*Organization | []*Role | []*Credential | 19 | []*Host | []*Team | []*RoleDefinition | []*RoleTeamAssignments | 20 | []*RoleUserAssignments | []*Group 21 | } 22 | 23 | type AnsibleType interface { 24 | GetID() int 25 | GetOID() string 26 | InitOID(string) 27 | ToBHNode() Node 28 | } 29 | 30 | type Object struct { 31 | OID string `json:"uuid,omitempty"` 32 | ID int `json:"id"` 33 | Name string `json:"name"` 34 | Description string `json:"description,omitempty"` 35 | Url string `json:"url,omitempty"` 36 | Type string `json:"type,omitempty"` 37 | Created string `json:"created,omitempty"` 38 | Modified string `json:"modified,omitempty"` 39 | } 40 | 41 | func (o Object) GetOID() (uuid string) { 42 | return o.OID 43 | } 44 | 45 | func (o Object) GetID() (id int) { 46 | return o.ID 47 | } 48 | 49 | func (o *Object) InitOID(installUUID string) { 50 | data := fmt.Sprintf("%s_%s_%s", installUUID, strconv.Itoa(o.ID), o.Type) 51 | hasher := sha1.New() 52 | hasher.Write([]byte(data)) 53 | hashBytes := hasher.Sum(nil) 54 | o.OID = hex.EncodeToString(hashBytes) 55 | } 56 | 57 | type Response[T any] struct { 58 | Count int `json:"count"` 59 | Results []T `json:"results"` 60 | } 61 | 62 | type AnsibleInstance struct { 63 | Object 64 | Version string `json:"version"` 65 | ActiveNode string `json:"active_node"` 66 | InstallUUID string `json:"install_uuid"` 67 | } 68 | 69 | func (i *AnsibleInstance) MarshalJSON() ([]byte, error) { 70 | type instance AnsibleInstance 71 | return json.MarshalIndent((*instance)(i), "", " ") 72 | } 73 | 74 | func (i *AnsibleInstance) ToBHNode() (node Node) { 75 | node.Kinds = []string{ 76 | "ATAnsibleInstance", 77 | } 78 | node.Id = i.OID 79 | node.Properties = map[string]string{ 80 | "name": i.Name, 81 | "version": i.Version, 82 | "active_node": i.ActiveNode, 83 | "install_uuid": i.InstallUUID, 84 | } 85 | return node 86 | } 87 | 88 | type User struct { 89 | Object 90 | Username string `json:"username"` 91 | FirstName string `json:"first_name,omitempty"` 92 | LastName string `json:"last_name,omitempty"` 93 | Email string `json:"email,omitempty"` 94 | IsSuperUser bool `json:"is_superuser,omitempty"` 95 | IsSystemAuditor bool `json:"is_sytem_auditor,omitempty"` 96 | LdapDn string `json:"ldap_dn,omitempty"` 97 | LastLogin string `json:"last_login,omitempty"` 98 | ExternalAccount string `json:"external_account,omitempty"` 99 | Roles map[int]*Role `json:"roles"` 100 | } 101 | 102 | func (u *User) MarshalJSON() ([]byte, error) { 103 | type user User 104 | return json.MarshalIndent((*user)(u), "", " ") 105 | } 106 | 107 | func (u *User) ToBHNode() (node Node) { 108 | node.Kinds = []string{ 109 | "ATUser", 110 | } 111 | node.Id = u.OID 112 | node.Properties = map[string]string{ 113 | "id": strconv.Itoa(u.ID), 114 | "name": u.Username, 115 | "description": u.Description, 116 | "url": u.Url, 117 | "firstname": u.FirstName, 118 | "lastname": u.LastName, 119 | "email": u.Email, 120 | "is_super_user": strconv.FormatBool(u.IsSuperUser), 121 | "is_system_auditor": strconv.FormatBool(u.IsSystemAuditor), 122 | "ldap_dn": u.LdapDn, 123 | "last_login": u.LastLogin, 124 | "external_account": u.ExternalAccount, 125 | } 126 | return node 127 | } 128 | 129 | type Team struct { 130 | Object 131 | Organization int `json:"organization,omitempty"` 132 | Members map[int]*User `json:"members"` 133 | Roles map[int]*Role `json:"roles"` 134 | } 135 | 136 | func (u *Team) MarshalJSON() ([]byte, error) { 137 | type team Team 138 | return json.MarshalIndent((*team)(u), "", " ") 139 | } 140 | 141 | func (t *Team) ToBHNode() (node Node) { 142 | node.Kinds = []string{ 143 | "ATTeam", 144 | } 145 | node.Id = t.OID 146 | node.Properties = map[string]string{ 147 | "id": strconv.Itoa(t.ID), 148 | "name": t.Name, 149 | "description": t.Description, 150 | "url": t.Url, 151 | "type": t.Type, 152 | "created": t.Created, 153 | "modified": t.Modified, 154 | } 155 | return node 156 | } 157 | 158 | type Role struct { 159 | Object 160 | UserOnly bool `json:"user_only,omitempty"` 161 | SummaryFields RoleSummaryFields `json:"summary_fields"` 162 | } 163 | 164 | type RoleSummaryFields struct { 165 | ResourceName string `json:"resource_name"` 166 | ResourceType string `json:"resource_type"` 167 | ResourceTypeDisplayName string `json:"resource_type_display_name"` 168 | ResourceId int `json:"resource_id"` 169 | } 170 | 171 | func (r Role) MarshalJSON() ([]byte, error) { 172 | type role Role 173 | return json.MarshalIndent((role)(r), "", " ") 174 | } 175 | 176 | func (r *Role) ToBHNode() (node Node) { 177 | return Node{} 178 | } 179 | 180 | type Organization struct { 181 | Object 182 | MaxHosts int `json:"max_hosts,omitempty"` 183 | CustomVirtualenv string `json:"custom_virtualenv,omitempty"` 184 | DefaultEnvironment int `json:"default_environment,omitempty"` 185 | } 186 | 187 | func (o Organization) MarshalJSON() ([]byte, error) { 188 | type organization Organization 189 | return json.MarshalIndent((organization)(o), "", " ") 190 | } 191 | 192 | func (o *Organization) ToBHNode() (node Node) { 193 | node.Kinds = []string{ 194 | "ATOrganization", 195 | } 196 | node.Id = o.OID 197 | node.Properties = map[string]string{ 198 | "id": strconv.Itoa(o.ID), 199 | "name": o.Name, 200 | "description": o.Description, 201 | "url": o.Url, 202 | "max_hosts": strconv.FormatInt(int64(o.MaxHosts), 10), 203 | "custom_virtualenv": o.CustomVirtualenv, 204 | "default_environment": strconv.FormatInt(int64(o.DefaultEnvironment), 10), 205 | } 206 | return node 207 | } 208 | 209 | type JobTemplate struct { 210 | Object 211 | JobType string `json:"job_type"` 212 | Inventory int `json:"inventory"` 213 | Project int `json:"project"` 214 | Organization int `json:"organization,omitempty"` 215 | Playbook string `json:"playbook"` 216 | SCMBranch string `json:"scm_branch,omitempty"` 217 | Limit string `json:"limit"` 218 | Verbosity int `json:"verbosity"` 219 | Credentials map[int]*Credential `json:"credentials"` 220 | ExtraVars string `json:"extra_vars"` 221 | Status string `json:"status,omitempty"` 222 | JobTags string `json:"job_tags,omitempty"` 223 | Forks int `json:"forks"` 224 | SkipTags string `json:"skip_tags,omitempty"` 225 | StartAtTask string `json:"start_at_task,omitempty"` 226 | Timeout int `json:"timeout,omitempty"` 227 | UseFactCache bool `json:"use_fact_cache,omitempty"` 228 | ForceHandler bool `json:"force_handlers,omitempty"` 229 | LastJobRun string `json:"last_job_run,omitempty"` 230 | NextJobRun string `json:"next_job_run,omitempty"` 231 | LastJobFailed bool `json:"last_job_failed,omitempty"` 232 | ExecutionEnvironment int `json:"execution_environment,omitempty"` 233 | HostConfigKey string `json:"host_config_key,omitempty"` 234 | AskScmBranchOnLaunch bool `json:"ask_scm_branch_on_launch,omitempty"` 235 | AskDiffModeOnLaunch bool `json:"ask_diff_mode_on_launch,omitempty"` 236 | AskVariablesOnLaunch bool `json:"ask_variables_on_launch,omitempty"` 237 | AskLimitOnLaunch bool `json:"ask_limit_on_launch,omitempty"` 238 | AskTagsOnLaunch bool `json:"ask_tags_on_launch,omitempty"` 239 | AskJobTypeOnLaunch bool `json:"ask_job_type_on_launch,omitempty"` 240 | AskVerbosityOnLaunch bool `json:"ask_verbosity_on_launch,omitempty"` 241 | AskInventoryOnLaunch bool `json:"ask_inventory_on_launch,omitempty"` 242 | AskCredentialOnLaunch bool `json:"ask_credential_on_launch,omitempty"` 243 | AskExecutionEnvironmentOnLaunch bool `json:"ask_execution_environment_on_launch,omitempty"` 244 | AskLabelsOnLaunch bool `json:"ask_labels_on_launch,omitempty"` 245 | AskForksOnLaunch bool `json:"ask_forks_on_launch,omitempty"` 246 | AskJobSliceCountOnLaunch bool `json:"ask_job_slice_count_on_launch,omitempty"` 247 | AskTimeoutOnLaunch bool `json:"ask_timeout_on_launch,omitempty"` 248 | AskInstanceGroupsOnLaunch bool `json:"ask_instance_groups_on_launch,omitempty"` 249 | SurveyEnabled bool `json:"survey_enabled,omitempty"` 250 | BecomeEnabled bool `json:"become_enabled,omitempty"` 251 | DiffMode bool `json:"diff_mode,omitempty"` 252 | AllowSimultaneous bool `json:"allow_simultaneous,omitempty"` 253 | CustomVirtualenv string `json:"custom_virtualenv,omitempty"` 254 | JobSliceCount int `json:"job_slice_count,omitempty"` 255 | WebhookService string `json:"webhook_service,omitempty"` 256 | WebhookCredential int `json:"webhook_credential,omitempty"` 257 | PreventInstanceGroupFallback bool `json:"prevent_instance_group_fallback,omitempty"` 258 | } 259 | 260 | func (j JobTemplate) MarshalJSON() ([]byte, error) { 261 | type jobTemplate JobTemplate 262 | return json.MarshalIndent((jobTemplate)(j), "", " ") 263 | } 264 | 265 | func (j *JobTemplate) ToBHNode() (node Node) { 266 | node.Kinds = []string{ 267 | "ATJobTemplate", 268 | } 269 | node.Id = j.OID 270 | node.Properties = map[string]string{ 271 | "id": strconv.Itoa(j.ID), 272 | "name": j.Name, 273 | "description": j.Description, 274 | "url": j.Url, 275 | "job_type": j.JobType, 276 | "project": strconv.FormatInt(int64(j.Project), 10), 277 | "organization": strconv.FormatInt(int64(j.Organization), 10), 278 | "playbook": j.Playbook, 279 | "scm_branch": j.SCMBranch, 280 | "limit": j.Limit, 281 | "verbosity": strconv.FormatInt(int64(j.Verbosity), 10), 282 | "extra_vars": j.ExtraVars, 283 | "status": j.Status, 284 | "job_tags": j.JobTags, 285 | "forks": strconv.FormatInt(int64(j.Forks), 10), 286 | "skip_tags": j.SkipTags, 287 | "start_at_task": j.StartAtTask, 288 | "timeout": strconv.FormatInt(int64(j.Timeout), 10), 289 | "use_fact_cache": strconv.FormatBool(j.UseFactCache), 290 | "force_handler": strconv.FormatBool(j.ForceHandler), 291 | "last_job_run": j.LastJobRun, 292 | "next_job_run": j.NextJobRun, 293 | "last_job_failed": strconv.FormatBool(j.LastJobFailed), 294 | "execution_environment": strconv.FormatInt(int64(j.ExecutionEnvironment), 10), 295 | "host_config_key": j.HostConfigKey, 296 | "ask_scm_branch_on_launch": strconv.FormatBool(j.AskScmBranchOnLaunch), 297 | "ask_diff_mode_on_launch": strconv.FormatBool(j.AskDiffModeOnLaunch), 298 | "ask_variables_on_launch": strconv.FormatBool(j.AskVariablesOnLaunch), 299 | "ask_limit_on_launch": strconv.FormatBool(j.AskLimitOnLaunch), 300 | "ask_tags_on_launch": strconv.FormatBool(j.AskTagsOnLaunch), 301 | "ask_job_type_on_launch": strconv.FormatBool(j.AskJobTypeOnLaunch), 302 | "ask_verbosity_on_launch": strconv.FormatBool(j.AskVerbosityOnLaunch), 303 | "ask_inventory_on_launch": strconv.FormatBool(j.AskInventoryOnLaunch), 304 | "ask_credential_on_launch": strconv.FormatBool(j.AskCredentialOnLaunch), 305 | "ask_execution_environment_on_launch": strconv.FormatBool(j.AskExecutionEnvironmentOnLaunch), 306 | "ask_labels_on_launch": strconv.FormatBool(j.AskLabelsOnLaunch), 307 | "ask_forks_on_launch": strconv.FormatBool(j.AskForksOnLaunch), 308 | "ask_job_slice_count_on_launch": strconv.FormatBool(j.AskJobSliceCountOnLaunch), 309 | "ask_timeout_on_launch": strconv.FormatBool(j.AskTimeoutOnLaunch), 310 | "ask_instance_groups_on_launch": strconv.FormatBool(j.AskInstanceGroupsOnLaunch), 311 | "survey_enabled": strconv.FormatBool(j.SurveyEnabled), 312 | "become_enabled": strconv.FormatBool(j.BecomeEnabled), 313 | "diff_mode": strconv.FormatBool(j.DiffMode), 314 | "allow_simultaneous": strconv.FormatBool(j.AllowSimultaneous), 315 | "custom_virtualenv": j.CustomVirtualenv, 316 | "job_slice_count": strconv.FormatInt(int64(j.JobSliceCount), 10), 317 | "webhook_service": j.WebhookService, 318 | "webhook_credential": strconv.FormatInt(int64(j.WebhookCredential), 10), 319 | "prevent_instance_group_fallback": strconv.FormatBool(j.PreventInstanceGroupFallback), 320 | } 321 | return node 322 | } 323 | 324 | type Job struct { 325 | Object 326 | Inventory int `json:"inventory"` 327 | Project int `json:"project"` 328 | Organization int `json:"organization,omitempty"` 329 | Playbook string `json:"playbook"` 330 | ScmBranch string `json:"scm_branch,omitempty"` 331 | Forks int `json:"forks,omitempty"` 332 | Limit string `json:"limit,omitempty"` 333 | Verbosity int `json:"verbosity,omitempty"` 334 | ExtraVars string `json:"extra_vars,omitempty"` 335 | Started string `json:"started,omitempty"` 336 | Finished string `json:"finished,omitempty"` 337 | CanceledOn string `json:"canceled_on,omitempty"` 338 | Elapsed float32 `json:"elapsed,omitempty"` 339 | JobExplanation string `json:"job_explanation,omitempty"` 340 | Created string `json:"created,omitempty"` 341 | Modified string `json:"modified,omitempty"` 342 | UnifiedJobTemplate int `json:"unified_job_template"` 343 | LaunchType string `json:"launch_type"` 344 | Failed bool `json:"failed"` 345 | Status string `json:"status,omitempty"` 346 | ExecutionEnvironment int `json:"execution_environment,omitempty"` 347 | ExecutionNode string `json:"execution_node,omitempty"` 348 | ControllerNode string `json:"controller_node,omitempty"` 349 | LaunchedBy map[string]any `json:"launched_by,omitempty"` 350 | WorkUnitId string `json:"work_unit_id,omitempty"` 351 | JobTags string `json:"job_tags,omitempty"` 352 | JobType string `json:"job_type,omitempty"` 353 | ForceHandler bool `json:"force_handlers,omitempty"` 354 | SkipTags string `json:"skip_tags,omitempty"` 355 | StartAtTask string `json:"start_at_task,omitempty"` 356 | Timeout int `json:"timeout,omitempty"` 357 | UseFactCache bool `json:"use_fact_cache,omitempty"` 358 | PasswordNeededToStart string `json:"password_needed_to_start,omitempty"` 359 | AllowSimultaneous bool `json:"allow_simultaneous,omitempty"` 360 | Artifacts map[string]any `json:"artifacts,omitempty"` 361 | ScmRevision string `json:"scm_revision,omitempty"` 362 | InstanceGroup int `json:"instance_group,omitempty"` 363 | DiffMode bool `json:"diff_mode,omitempty"` 364 | JobSliceNumber int `json:"job_slice_number,omitempty"` 365 | JobSliceCount int `json:"job_slice_count,omitempty"` 366 | WebhookGuid string `json:"webhook_guid,omitempty"` 367 | WebhookService string `json:"webhook_service,omitempty"` 368 | WebhookCredential int `json:"webhook_credential,omitempty"` 369 | } 370 | 371 | func (j Job) MarshalJSON() ([]byte, error) { 372 | type job Job 373 | return json.MarshalIndent((job)(j), "", " ") 374 | } 375 | 376 | func (j *Job) ToBHNode() (node Node) { 377 | node.Kinds = []string{ 378 | "ATJob", 379 | } 380 | node.Id = j.OID 381 | node.Properties = map[string]string{ 382 | "id": strconv.FormatInt(int64(j.ID), 10), 383 | "name": j.Name, 384 | "description": j.Description, 385 | "url": j.Url, 386 | "type": j.Type, 387 | "created": j.Created, 388 | "modified": j.Modified, 389 | "playbook": j.Playbook, 390 | "scm_branch": j.ScmBranch, 391 | "forks": strconv.FormatInt(int64(j.Forks), 10), 392 | "limit": j.Limit, 393 | "verbosity": strconv.FormatInt(int64(j.Verbosity), 10), 394 | "extra_vars": j.ExtraVars, 395 | "started": j.Started, 396 | "finished": j.Finished, 397 | "canceled_on": j.CanceledOn, 398 | "elapsed": strconv.FormatFloat(float64(j.Elapsed), 'e', 10, 32), 399 | "job_explanation": j.JobExplanation, 400 | "launch_type": j.LaunchType, 401 | "unified_job_template": strconv.FormatInt(int64(j.UnifiedJobTemplate), 10), 402 | "organization": strconv.FormatInt(int64(j.Organization), 10), 403 | "inventory": strconv.FormatInt(int64(j.Inventory), 10), 404 | "project": strconv.FormatInt(int64(j.Project), 10), 405 | "failed": strconv.FormatBool(j.Failed), 406 | "status": j.Status, 407 | "execution_environment": strconv.FormatInt(int64(j.ExecutionEnvironment), 10), 408 | "execution_node": j.ExecutionNode, 409 | "controller_node": j.ControllerNode, 410 | "work_unit_id": j.WorkUnitId, 411 | "job_tags": j.JobTags, 412 | "job_type": j.JobType, 413 | "force_handler": strconv.FormatBool(j.ForceHandler), 414 | "skip_tags": j.SkipTags, 415 | "start_at_task": j.StartAtTask, 416 | "timeout": strconv.FormatInt(int64(j.Timeout), 10), 417 | "use_fact_cache": strconv.FormatBool(j.UseFactCache), 418 | "password_needed_to_start": j.PasswordNeededToStart, 419 | "allow_simultaneous": strconv.FormatBool(j.AllowSimultaneous), 420 | "scm_revision": j.ScmRevision, 421 | "instance_group": strconv.FormatInt(int64(j.InstanceGroup), 10), 422 | "diff_mode": strconv.FormatBool(j.DiffMode), 423 | "job_slice_number": strconv.FormatInt(int64(j.JobSliceNumber), 10), 424 | "job_slice_count": strconv.FormatInt(int64(j.JobSliceCount), 10), 425 | "webhook_guid": j.WebhookGuid, 426 | "webhook_service": j.WebhookService, 427 | "webhook_credential": strconv.FormatInt(int64(j.WebhookCredential), 10), 428 | } 429 | return node 430 | } 431 | 432 | type Project struct { 433 | Object 434 | Organization int `json:"organization"` 435 | Status string `json:"status,omitempty"` 436 | LocalPath string `json:"local_path,omitempty"` 437 | ScmType string `json:"scm_type,omitempty"` 438 | ScmUrl string `json:"scm_url,omitempty"` 439 | ScmBranch string `json:"scm_branch,omitempty"` 440 | ScmRefSpec string `json:"scm_refspec,omitempty"` 441 | ScmClean bool `json:"scm_clean,omitempty"` 442 | ScmTrackSubmodules bool `json:"scm_track_submodules,omitempty"` 443 | ScmDeleteOnUpdate bool `json:"scm_delete_on_update,omitempty"` 444 | Credential int `json:"credential,omitempty"` 445 | Timeout int `json:"timeout,omitempty"` 446 | ScmRevision string `json:"scm_revision,omitempty"` 447 | LastJobRun string `json:"last_job_run,omitempty"` 448 | NextJobRun string `json:"next_job_run,omitempty"` 449 | LastJobFailed bool `json:"last_job_failed,omitempty"` 450 | ScmUpdateOnLaunch bool `json:"scm_update_on_launch,omitempty"` 451 | ScmUpdateCacheTimeout int `json:"scm_update_cache_timeout"` 452 | AllowOverride bool `json:"allow_override,omitempty"` 453 | CustomVirtualenv string `json:"custom_virtualenv,omitempty"` 454 | DefaultEnvironment int `json:"default_environment,omitempty"` 455 | SignatureValidationCredential int `json:"signature_validation_credential,omitempty"` 456 | LastUpdateFailed bool `json:"last_update_failed,omitempty"` 457 | LastUpdate string `json:"last_updated,omitempty"` 458 | } 459 | 460 | func (p Project) MarshalJSON() ([]byte, error) { 461 | type project Project 462 | return json.MarshalIndent((project)(p), "", " ") 463 | } 464 | 465 | func (p *Project) ToBHNode() (node Node) { 466 | node.Kinds = []string{ 467 | "ATProject", 468 | } 469 | node.Id = p.OID 470 | node.Properties = map[string]string{ 471 | "id": strconv.Itoa(p.ID), 472 | "name": p.Name, 473 | "description": p.Description, 474 | "url": p.Url, 475 | "organization": strconv.FormatInt(int64(p.Organization), 10), 476 | "credential": strconv.FormatInt(int64(p.Credential), 10), 477 | "timeout": strconv.FormatInt(int64(p.Timeout), 10), 478 | "status": p.Status, 479 | "local_path": p.LocalPath, 480 | "scm_type": p.ScmType, 481 | "scm_url": p.ScmUrl, 482 | "scm_branch": p.ScmBranch, 483 | "scm_ref_spec": p.ScmRefSpec, 484 | "scm_clean": strconv.FormatBool(p.ScmClean), 485 | "scm_track_submodules": strconv.FormatBool(p.ScmTrackSubmodules), 486 | "scm_delete_on_update": strconv.FormatBool(p.ScmDeleteOnUpdate), 487 | "scm_revision": p.ScmRevision, 488 | "last_job_run": p.LastJobRun, 489 | "next_job_run": p.NextJobRun, 490 | "last_job_failed": strconv.FormatBool(p.LastJobFailed), 491 | "scm_update_on_launch": strconv.FormatBool(p.ScmUpdateOnLaunch), 492 | "scm_update_cache_timeout": strconv.FormatInt(int64(p.ScmUpdateCacheTimeout), 10), 493 | "allow_override": strconv.FormatBool(p.AllowOverride), 494 | "custom_virtualenv": p.CustomVirtualenv, 495 | "default_environment": strconv.FormatInt(int64(p.DefaultEnvironment), 10), 496 | "signature_validation_credential": strconv.FormatInt(int64(p.SignatureValidationCredential), 10), 497 | "last_update_failed": strconv.FormatBool(p.LastUpdateFailed), 498 | "last_update": p.LastUpdate, 499 | } 500 | return node 501 | } 502 | 503 | type Credential struct { 504 | Object 505 | Organization int `json:"organization"` 506 | CredentialType int `json:"credential_type,omitempty"` 507 | Managed bool `json:"managed,omitempty"` 508 | Inputs map[string]any `json:"inputs,omitempty"` 509 | Cloud bool `json:"cloud,omitempty"` 510 | Kubernetes bool `json:"kubernetes,omitempty"` 511 | Kind string `json:"kind,omitempty"` 512 | } 513 | 514 | func (c Credential) MarshalJSON() ([]byte, error) { 515 | type credential Credential 516 | return json.MarshalIndent((credential)(c), "", " ") 517 | } 518 | 519 | func (c *Credential) ToBHNode() (node Node) { 520 | node.Kinds = []string{ 521 | "ATCredential", 522 | } 523 | node.Id = c.OID 524 | node.Properties = map[string]string{ 525 | "id": strconv.Itoa(c.ID), 526 | "name": c.Name, 527 | "description": c.Description, 528 | "url": c.Url, 529 | "organization": strconv.FormatInt(int64(c.Organization), 10), 530 | "credential_type": strconv.FormatInt(int64(c.CredentialType), 10), 531 | "managed": strconv.FormatBool(c.Managed), 532 | "cloud": strconv.FormatBool(c.Cloud), 533 | "kubernetes": strconv.FormatBool(c.Kubernetes), 534 | } 535 | return node 536 | } 537 | 538 | type CredentialType struct { 539 | Object 540 | Managed bool `json:"managed,omitempty"` 541 | Inputs map[string]any `json:"inputs,omitempty"` 542 | Injectors map[string]any `json:"injectors,omitempty"` 543 | Cloud bool `json:"cloud,omitempty"` 544 | Kubernetes bool `json:"kubernetes,omitempty"` 545 | Namespace string `json:"namespace,omitempty"` 546 | Kind string `json:"kind,omitempty"` 547 | } 548 | 549 | func (ct CredentialType) MarshalJSON() ([]byte, error) { 550 | type credentialType CredentialType 551 | return json.MarshalIndent((credentialType)(ct), "", " ") 552 | } 553 | 554 | func (ct *CredentialType) ToBHNode() (node Node) { 555 | node.Kinds = []string{ 556 | "ATCredentialType", 557 | } 558 | node.Id = ct.OID 559 | 560 | node.Properties = map[string]string{ 561 | "id": strconv.Itoa(ct.ID), 562 | "name": ct.Name, 563 | "description": ct.Description, 564 | "url": ct.Url, 565 | "namespace": ct.Namespace, 566 | "managed": strconv.FormatBool(ct.Managed), 567 | "cloud": strconv.FormatBool(ct.Cloud), 568 | "kubernetes": strconv.FormatBool(ct.Kubernetes), 569 | } 570 | 571 | var ok bool 572 | // TODO: Create object to manage `inputs`, the any is getting annoying to manage. 573 | // Most of these fields are documented and hardcoded. 574 | if _, ok = ct.Inputs["fields"]; ok { 575 | fields := ct.Inputs["fields"].([]any) 576 | for _, field := range fields { 577 | 578 | // There is type checking for these values on AWX/Tower's side. 579 | field := field.(map[string]any) 580 | id := field["id"].(string) // ID and Label are needed fields and should never be missing empty. 581 | 582 | if _, ok = field["help_text"]; ok { 583 | node.Properties["field_"+id+"_help"] = field["help_text"].(string) 584 | } 585 | if _, ok = field["type"]; ok { 586 | node.Properties["field_"+id+"_type"] = field["type"].(string) 587 | } 588 | if _, ok = field["secret"]; ok { 589 | node.Properties["field_"+id+"_secret"] = strconv.FormatBool(field["secret"].(bool)) 590 | } 591 | if _, ok = field["help_text"]; ok { 592 | node.Properties["field_"+id+"_help"] = field["help_text"].(string) 593 | } 594 | } 595 | 596 | var requiredAny []any 597 | var required []string 598 | if _, ok = ct.Inputs["required"]; ok { 599 | requiredAny = ct.Inputs["required"].([]any) 600 | for _, entry := range requiredAny { 601 | entry := entry.(string) 602 | required = append(required, entry) 603 | } 604 | } 605 | node.Properties["fields_required"] = strings.Join(required, ", ") 606 | 607 | } 608 | 609 | if _, ok = ct.Injectors["file"]; ok { 610 | fileInjectors := ct.Injectors["file"].(map[string]any) 611 | for k, v := range fileInjectors { 612 | node.Properties["injector_file_"+k] = v.(string) 613 | } 614 | } 615 | if _, ok = ct.Injectors["extra_vars"]; ok { 616 | fileInjectors := ct.Injectors["extra_vars"].(map[string]any) 617 | for k, v := range fileInjectors { 618 | node.Properties["injector_extra_vars_"+k] = v.(string) 619 | } 620 | } 621 | if _, ok = ct.Injectors["env"]; ok { 622 | fileInjectors := ct.Injectors["env"].(map[string]any) 623 | for k, v := range fileInjectors { 624 | node.Properties["injector_env_"+k] = v.(string) 625 | } 626 | } 627 | return node 628 | } 629 | 630 | type Inventory struct { 631 | Object 632 | Organization int `json:"organization"` 633 | Kind string `json:"kind,omitempty"` 634 | HostFilter string `json:"host_filder,omitempty"` 635 | Variables string `json:"variables,omitempty"` 636 | HasActiveFailures bool `json:"has_active_failures,omitempty"` 637 | TotalHosts int `json:"total_hosts,omitempty"` 638 | HostsWithActiveFailures int `json:"host_with_active_failures,omitempty"` 639 | TotalGroups int `json:"total_groups,omitempty"` 640 | HasInventorySources bool `json:"has_inventory_sources,omitempty"` 641 | TotalInventorySources int `json:"total_inventory_sources,omitempty"` 642 | InventorySourcesWithFailures int `json:"inventory_sources_with_failures,omitempty"` 643 | PendingDeletion bool `json:"pending_deletion,omitempty"` 644 | PreventInstanceGroupFallback bool `json:"prevent_instance_group_fallback,omitempty"` 645 | } 646 | 647 | func (i Inventory) MarshalJSON() ([]byte, error) { 648 | type inventory Inventory 649 | return json.MarshalIndent((inventory)(i), "", " ") 650 | } 651 | 652 | func (i *Inventory) ToBHNode() (node Node) { 653 | node.Id = i.OID 654 | node.Kinds = []string{"ATInventory"} 655 | node.Properties = map[string]string{ 656 | "id": strconv.FormatInt(int64(i.ID), 10), 657 | "name": i.Name, 658 | "description": i.Description, 659 | "url": i.Url, 660 | "organization": strconv.FormatInt(int64(i.Organization), 10), 661 | "kind": i.Kind, 662 | "host_filter": i.HostFilter, 663 | "has_active_failures": strconv.FormatBool(i.HasActiveFailures), 664 | "has_inventory_source": strconv.FormatBool(i.HasInventorySources), 665 | "total_hosts": strconv.FormatInt(int64(i.TotalHosts), 10), 666 | "hosts_with_active_failures": strconv.FormatInt(int64(i.HostsWithActiveFailures), 10), 667 | "total_groups": strconv.FormatInt(int64(i.TotalGroups), 10), 668 | "total_inventory_sources": strconv.FormatInt(int64(i.TotalInventorySources), 10), 669 | "inventory_sources_with_failures": strconv.FormatInt(int64(i.InventorySourcesWithFailures), 10), 670 | "pending_deletion": strconv.FormatBool(i.PendingDeletion), 671 | "prevent_instance_group_fallback": strconv.FormatBool(i.PreventInstanceGroupFallback), 672 | } 673 | return node 674 | } 675 | 676 | type Host struct { 677 | Object 678 | Inventory int `json:"inventory,omitempty"` 679 | Enabled bool `json:"enabled,omitempty"` 680 | InstanceId string `json:"instance_id,omitempty"` 681 | Variables string `json:"variables,omitempty"` 682 | HasActiveFailures bool `json:"has_active_failures,omitempty"` 683 | LastJob int `json:"last_job,omitempty"` 684 | LastJobHostSummary int `json:"last_job_host_summary,omitempty"` 685 | AnsibleFactsModified string `json:"ansible_facts_modified,omitempty"` 686 | } 687 | 688 | func (i Host) MarshalJSON() ([]byte, error) { 689 | type host Host 690 | return json.MarshalIndent((host)(i), "", " ") 691 | } 692 | 693 | func (h *Host) ToBHNode() (node Node) { 694 | node.Kinds = []string{ 695 | "ATHost", 696 | } 697 | node.Id = h.OID 698 | node.Properties = map[string]string{ 699 | "id": strconv.Itoa(h.ID), 700 | "name": h.Name, 701 | "description": h.Description, 702 | "url": h.Url, 703 | "type": h.Type, 704 | "created": h.Created, 705 | "modified": h.Modified, 706 | "inventory": strconv.FormatInt(int64(h.Inventory), 10), 707 | "enabled": strconv.FormatBool(h.Enabled), 708 | "instance_id": h.InstanceId, 709 | "variables": h.Variables, 710 | "has_active_failures": strconv.FormatBool(h.HasActiveFailures), 711 | "last_job": strconv.FormatInt(int64(h.LastJob), 10), 712 | "last_job_host_summary": strconv.FormatInt(int64(h.LastJobHostSummary), 10), 713 | "ansible_facts_modified": h.AnsibleFactsModified, 714 | } 715 | return node 716 | } 717 | 718 | type Group struct { 719 | Object 720 | Inventory int `json:"inventory,omitempty"` 721 | Variables string `json:"variables,omitempty"` 722 | Hosts map[int]*Host `json:"hosts,omitempty"` 723 | } 724 | 725 | func (i Group) MarshalJSON() ([]byte, error) { 726 | type group Group 727 | return json.MarshalIndent((group)(i), "", " ") 728 | } 729 | 730 | func (g *Group) ToBHNode() (node Node) { 731 | node.Kinds = []string{ 732 | "ATGroup", 733 | } 734 | node.Id = g.OID 735 | node.Properties = map[string]string{ 736 | "id": strconv.Itoa(g.ID), 737 | "name": g.Name, 738 | "description": g.Description, 739 | "url": g.Url, 740 | "type": g.Type, 741 | "created": g.Created, 742 | "modified": g.Modified, 743 | "inventory": strconv.FormatInt(int64(g.Inventory), 10), 744 | "variables": g.Variables, 745 | } 746 | return node 747 | } 748 | 749 | // -- Future proofing, current RBAC APIs has been deprecated, it will eventually switch to these APIs -- 750 | 751 | type RoleDefinition struct { 752 | Object 753 | Permissions []string `json:"permissions"` 754 | ContentType string `json:"content_type"` 755 | Managed bool `json:"managed"` 756 | } 757 | 758 | func (r RoleDefinition) MarshalJSON() ([]byte, error) { 759 | type roleDefinition RoleDefinition 760 | return json.MarshalIndent((roleDefinition)(r), "", " ") 761 | } 762 | 763 | type RoleUserAssignments struct { 764 | Object 765 | ContentType string `json:"content_type"` 766 | ObjectId string `json:"object_id"` 767 | RoleDefinition int `json:"role_definition"` 768 | UserId int `json:"user"` 769 | } 770 | 771 | func (r RoleUserAssignments) MarshalJSON() ([]byte, error) { 772 | type roleUserAssignments RoleUserAssignments 773 | return json.MarshalIndent((roleUserAssignments)(r), "", " ") 774 | } 775 | 776 | type RoleTeamAssignments struct { 777 | Object 778 | ContentType string `json:"content_type"` 779 | ObjectId string `json:"object_id"` 780 | RoleDefinition int `json:"role_definition"` 781 | TeamId int `json:"team"` 782 | } 783 | 784 | func (r RoleTeamAssignments) MarshalJSON() ([]byte, error) { 785 | type roleTeamAssignments RoleTeamAssignments 786 | return json.MarshalIndent((roleTeamAssignments)(r), "", " ") 787 | } 788 | 789 | // -- Gestion du json de sortie -- 790 | 791 | type OutputJson struct { 792 | Metadata Metadata `json:"metadata"` 793 | Graph Graph `json:"graph"` 794 | } 795 | 796 | type Metadata struct { 797 | SourceKind string `json:"source_kind,omitempty"` 798 | } 799 | 800 | type Graph struct { 801 | Nodes []Node `json:"nodes"` 802 | Edges []Edge `json:"edges"` 803 | } 804 | 805 | type Node struct { 806 | Id string `json:"id"` 807 | Kinds []string `json:"kinds,omitempty"` 808 | Properties map[string]string `json:"properties"` 809 | } 810 | 811 | type Edge struct { 812 | Kind string `json:"kind"` 813 | Start Link `json:"start"` 814 | End Link `json:"end"` 815 | } 816 | 817 | type Link struct { 818 | Value string `json:"value"` 819 | MatchBy string `json:"match_by"` 820 | } 821 | 822 | type AHClient struct { 823 | Client *http.Client 824 | Headers http.Header 825 | } 826 | 827 | func (ahc *AHClient) Do(req *http.Request) (*http.Response, error) { 828 | for k, vals := range ahc.Headers { 829 | for _, v := range vals { 830 | req.Header.Add(k, v) 831 | } 832 | } 833 | return ahc.Client.Do(req) 834 | } 835 | -------------------------------------------------------------------------------- /LICENSE: -------------------------------------------------------------------------------- 1 | GNU GENERAL PUBLIC LICENSE 2 | Version 3, 29 June 2007 3 | 4 | Copyright (C) 2007 Free Software Foundation, Inc. 5 | Everyone is permitted to copy and distribute verbatim copies 6 | of this license document, but changing it is not allowed. 7 | 8 | Preamble 9 | 10 | The GNU General Public License is a free, copyleft license for 11 | software and other kinds of works. 12 | 13 | The licenses for most software and other practical works are designed 14 | to take away your freedom to share and change the works. By contrast, 15 | the GNU General Public License is intended to guarantee your freedom to 16 | share and change all versions of a program--to make sure it remains free 17 | software for all its users. We, the Free Software Foundation, use the 18 | GNU General Public License for most of our software; it applies also to 19 | any other work released this way by its authors. You can apply it to 20 | your programs, too. 21 | 22 | When we speak of free software, we are referring to freedom, not 23 | price. Our General Public Licenses are designed to make sure that you 24 | have the freedom to distribute copies of free software (and charge for 25 | them if you wish), that you receive source code or can get it if you 26 | want it, that you can change the software or use pieces of it in new 27 | free programs, and that you know you can do these things. 28 | 29 | To protect your rights, we need to prevent others from denying you 30 | these rights or asking you to surrender the rights. Therefore, you have 31 | certain responsibilities if you distribute copies of the software, or if 32 | you modify it: responsibilities to respect the freedom of others. 33 | 34 | For example, if you distribute copies of such a program, whether 35 | gratis or for a fee, you must pass on to the recipients the same 36 | freedoms that you received. You must make sure that they, too, receive 37 | or can get the source code. And you must show them these terms so they 38 | know their rights. 39 | 40 | Developers that use the GNU GPL protect your rights with two steps: 41 | (1) assert copyright on the software, and (2) offer you this License 42 | giving you legal permission to copy, distribute and/or modify it. 43 | 44 | For the developers' and authors' protection, the GPL clearly explains 45 | that there is no warranty for this free software. For both users' and 46 | authors' sake, the GPL requires that modified versions be marked as 47 | changed, so that their problems will not be attributed erroneously to 48 | authors of previous versions. 49 | 50 | Some devices are designed to deny users access to install or run 51 | modified versions of the software inside them, although the manufacturer 52 | can do so. This is fundamentally incompatible with the aim of 53 | protecting users' freedom to change the software. The systematic 54 | pattern of such abuse occurs in the area of products for individuals to 55 | use, which is precisely where it is most unacceptable. Therefore, we 56 | have designed this version of the GPL to prohibit the practice for those 57 | products. If such problems arise substantially in other domains, we 58 | stand ready to extend this provision to those domains in future versions 59 | of the GPL, as needed to protect the freedom of users. 60 | 61 | Finally, every program is threatened constantly by software patents. 62 | States should not allow patents to restrict development and use of 63 | software on general-purpose computers, but in those that do, we wish to 64 | avoid the special danger that patents applied to a free program could 65 | make it effectively proprietary. To prevent this, the GPL assures that 66 | patents cannot be used to render the program non-free. 67 | 68 | The precise terms and conditions for copying, distribution and 69 | modification follow. 70 | 71 | TERMS AND CONDITIONS 72 | 73 | 0. Definitions. 74 | 75 | "This License" refers to version 3 of the GNU General Public License. 76 | 77 | "Copyright" also means copyright-like laws that apply to other kinds of 78 | works, such as semiconductor masks. 79 | 80 | "The Program" refers to any copyrightable work licensed under this 81 | License. Each licensee is addressed as "you". "Licensees" and 82 | "recipients" may be individuals or organizations. 83 | 84 | To "modify" a work means to copy from or adapt all or part of the work 85 | in a fashion requiring copyright permission, other than the making of an 86 | exact copy. The resulting work is called a "modified version" of the 87 | earlier work or a work "based on" the earlier work. 88 | 89 | A "covered work" means either the unmodified Program or a work based 90 | on the Program. 91 | 92 | To "propagate" a work means to do anything with it that, without 93 | permission, would make you directly or secondarily liable for 94 | infringement under applicable copyright law, except executing it on a 95 | computer or modifying a private copy. Propagation includes copying, 96 | distribution (with or without modification), making available to the 97 | public, and in some countries other activities as well. 98 | 99 | To "convey" a work means any kind of propagation that enables other 100 | parties to make or receive copies. Mere interaction with a user through 101 | a computer network, with no transfer of a copy, is not conveying. 102 | 103 | An interactive user interface displays "Appropriate Legal Notices" 104 | to the extent that it includes a convenient and prominently visible 105 | feature that (1) displays an appropriate copyright notice, and (2) 106 | tells the user that there is no warranty for the work (except to the 107 | extent that warranties are provided), that licensees may convey the 108 | work under this License, and how to view a copy of this License. If 109 | the interface presents a list of user commands or options, such as a 110 | menu, a prominent item in the list meets this criterion. 111 | 112 | 1. Source Code. 113 | 114 | The "source code" for a work means the preferred form of the work 115 | for making modifications to it. "Object code" means any non-source 116 | form of a work. 117 | 118 | A "Standard Interface" means an interface that either is an official 119 | standard defined by a recognized standards body, or, in the case of 120 | interfaces specified for a particular programming language, one that 121 | is widely used among developers working in that language. 122 | 123 | The "System Libraries" of an executable work include anything, other 124 | than the work as a whole, that (a) is included in the normal form of 125 | packaging a Major Component, but which is not part of that Major 126 | Component, and (b) serves only to enable use of the work with that 127 | Major Component, or to implement a Standard Interface for which an 128 | implementation is available to the public in source code form. A 129 | "Major Component", in this context, means a major essential component 130 | (kernel, window system, and so on) of the specific operating system 131 | (if any) on which the executable work runs, or a compiler used to 132 | produce the work, or an object code interpreter used to run it. 133 | 134 | The "Corresponding Source" for a work in object code form means all 135 | the source code needed to generate, install, and (for an executable 136 | work) run the object code and to modify the work, including scripts to 137 | control those activities. However, it does not include the work's 138 | System Libraries, or general-purpose tools or generally available free 139 | programs which are used unmodified in performing those activities but 140 | which are not part of the work. For example, Corresponding Source 141 | includes interface definition files associated with source files for 142 | the work, and the source code for shared libraries and dynamically 143 | linked subprograms that the work is specifically designed to require, 144 | such as by intimate data communication or control flow between those 145 | subprograms and other parts of the work. 146 | 147 | The Corresponding Source need not include anything that users 148 | can regenerate automatically from other parts of the Corresponding 149 | Source. 150 | 151 | The Corresponding Source for a work in source code form is that 152 | same work. 153 | 154 | 2. Basic Permissions. 155 | 156 | All rights granted under this License are granted for the term of 157 | copyright on the Program, and are irrevocable provided the stated 158 | conditions are met. This License explicitly affirms your unlimited 159 | permission to run the unmodified Program. The output from running a 160 | covered work is covered by this License only if the output, given its 161 | content, constitutes a covered work. This License acknowledges your 162 | rights of fair use or other equivalent, as provided by copyright law. 163 | 164 | You may make, run and propagate covered works that you do not 165 | convey, without conditions so long as your license otherwise remains 166 | in force. You may convey covered works to others for the sole purpose 167 | of having them make modifications exclusively for you, or provide you 168 | with facilities for running those works, provided that you comply with 169 | the terms of this License in conveying all material for which you do 170 | not control copyright. Those thus making or running the covered works 171 | for you must do so exclusively on your behalf, under your direction 172 | and control, on terms that prohibit them from making any copies of 173 | your copyrighted material outside their relationship with you. 174 | 175 | Conveying under any other circumstances is permitted solely under 176 | the conditions stated below. Sublicensing is not allowed; section 10 177 | makes it unnecessary. 178 | 179 | 3. Protecting Users' Legal Rights From Anti-Circumvention Law. 180 | 181 | No covered work shall be deemed part of an effective technological 182 | measure under any applicable law fulfilling obligations under article 183 | 11 of the WIPO copyright treaty adopted on 20 December 1996, or 184 | similar laws prohibiting or restricting circumvention of such 185 | measures. 186 | 187 | When you convey a covered work, you waive any legal power to forbid 188 | circumvention of technological measures to the extent such circumvention 189 | is effected by exercising rights under this License with respect to 190 | the covered work, and you disclaim any intention to limit operation or 191 | modification of the work as a means of enforcing, against the work's 192 | users, your or third parties' legal rights to forbid circumvention of 193 | technological measures. 194 | 195 | 4. Conveying Verbatim Copies. 196 | 197 | You may convey verbatim copies of the Program's source code as you 198 | receive it, in any medium, provided that you conspicuously and 199 | appropriately publish on each copy an appropriate copyright notice; 200 | keep intact all notices stating that this License and any 201 | non-permissive terms added in accord with section 7 apply to the code; 202 | keep intact all notices of the absence of any warranty; and give all 203 | recipients a copy of this License along with the Program. 204 | 205 | You may charge any price or no price for each copy that you convey, 206 | and you may offer support or warranty protection for a fee. 207 | 208 | 5. Conveying Modified Source Versions. 209 | 210 | You may convey a work based on the Program, or the modifications to 211 | produce it from the Program, in the form of source code under the 212 | terms of section 4, provided that you also meet all of these conditions: 213 | 214 | a) The work must carry prominent notices stating that you modified 215 | it, and giving a relevant date. 216 | 217 | b) The work must carry prominent notices stating that it is 218 | released under this License and any conditions added under section 219 | 7. This requirement modifies the requirement in section 4 to 220 | "keep intact all notices". 221 | 222 | c) You must license the entire work, as a whole, under this 223 | License to anyone who comes into possession of a copy. This 224 | License will therefore apply, along with any applicable section 7 225 | additional terms, to the whole of the work, and all its parts, 226 | regardless of how they are packaged. This License gives no 227 | permission to license the work in any other way, but it does not 228 | invalidate such permission if you have separately received it. 229 | 230 | d) If the work has interactive user interfaces, each must display 231 | Appropriate Legal Notices; however, if the Program has interactive 232 | interfaces that do not display Appropriate Legal Notices, your 233 | work need not make them do so. 234 | 235 | A compilation of a covered work with other separate and independent 236 | works, which are not by their nature extensions of the covered work, 237 | and which are not combined with it such as to form a larger program, 238 | in or on a volume of a storage or distribution medium, is called an 239 | "aggregate" if the compilation and its resulting copyright are not 240 | used to limit the access or legal rights of the compilation's users 241 | beyond what the individual works permit. Inclusion of a covered work 242 | in an aggregate does not cause this License to apply to the other 243 | parts of the aggregate. 244 | 245 | 6. Conveying Non-Source Forms. 246 | 247 | You may convey a covered work in object code form under the terms 248 | of sections 4 and 5, provided that you also convey the 249 | machine-readable Corresponding Source under the terms of this License, 250 | in one of these ways: 251 | 252 | a) Convey the object code in, or embodied in, a physical product 253 | (including a physical distribution medium), accompanied by the 254 | Corresponding Source fixed on a durable physical medium 255 | customarily used for software interchange. 256 | 257 | b) Convey the object code in, or embodied in, a physical product 258 | (including a physical distribution medium), accompanied by a 259 | written offer, valid for at least three years and valid for as 260 | long as you offer spare parts or customer support for that product 261 | model, to give anyone who possesses the object code either (1) a 262 | copy of the Corresponding Source for all the software in the 263 | product that is covered by this License, on a durable physical 264 | medium customarily used for software interchange, for a price no 265 | more than your reasonable cost of physically performing this 266 | conveying of source, or (2) access to copy the 267 | Corresponding Source from a network server at no charge. 268 | 269 | c) Convey individual copies of the object code with a copy of the 270 | written offer to provide the Corresponding Source. This 271 | alternative is allowed only occasionally and noncommercially, and 272 | only if you received the object code with such an offer, in accord 273 | with subsection 6b. 274 | 275 | d) Convey the object code by offering access from a designated 276 | place (gratis or for a charge), and offer equivalent access to the 277 | Corresponding Source in the same way through the same place at no 278 | further charge. You need not require recipients to copy the 279 | Corresponding Source along with the object code. If the place to 280 | copy the object code is a network server, the Corresponding Source 281 | may be on a different server (operated by you or a third party) 282 | that supports equivalent copying facilities, provided you maintain 283 | clear directions next to the object code saying where to find the 284 | Corresponding Source. Regardless of what server hosts the 285 | Corresponding Source, you remain obligated to ensure that it is 286 | available for as long as needed to satisfy these requirements. 287 | 288 | e) Convey the object code using peer-to-peer transmission, provided 289 | you inform other peers where the object code and Corresponding 290 | Source of the work are being offered to the general public at no 291 | charge under subsection 6d. 292 | 293 | A separable portion of the object code, whose source code is excluded 294 | from the Corresponding Source as a System Library, need not be 295 | included in conveying the object code work. 296 | 297 | A "User Product" is either (1) a "consumer product", which means any 298 | tangible personal property which is normally used for personal, family, 299 | or household purposes, or (2) anything designed or sold for incorporation 300 | into a dwelling. In determining whether a product is a consumer product, 301 | doubtful cases shall be resolved in favor of coverage. For a particular 302 | product received by a particular user, "normally used" refers to a 303 | typical or common use of that class of product, regardless of the status 304 | of the particular user or of the way in which the particular user 305 | actually uses, or expects or is expected to use, the product. A product 306 | is a consumer product regardless of whether the product has substantial 307 | commercial, industrial or non-consumer uses, unless such uses represent 308 | the only significant mode of use of the product. 309 | 310 | "Installation Information" for a User Product means any methods, 311 | procedures, authorization keys, or other information required to install 312 | and execute modified versions of a covered work in that User Product from 313 | a modified version of its Corresponding Source. The information must 314 | suffice to ensure that the continued functioning of the modified object 315 | code is in no case prevented or interfered with solely because 316 | modification has been made. 317 | 318 | If you convey an object code work under this section in, or with, or 319 | specifically for use in, a User Product, and the conveying occurs as 320 | part of a transaction in which the right of possession and use of the 321 | User Product is transferred to the recipient in perpetuity or for a 322 | fixed term (regardless of how the transaction is characterized), the 323 | Corresponding Source conveyed under this section must be accompanied 324 | by the Installation Information. But this requirement does not apply 325 | if neither you nor any third party retains the ability to install 326 | modified object code on the User Product (for example, the work has 327 | been installed in ROM). 328 | 329 | The requirement to provide Installation Information does not include a 330 | requirement to continue to provide support service, warranty, or updates 331 | for a work that has been modified or installed by the recipient, or for 332 | the User Product in which it has been modified or installed. Access to a 333 | network may be denied when the modification itself materially and 334 | adversely affects the operation of the network or violates the rules and 335 | protocols for communication across the network. 336 | 337 | Corresponding Source conveyed, and Installation Information provided, 338 | in accord with this section must be in a format that is publicly 339 | documented (and with an implementation available to the public in 340 | source code form), and must require no special password or key for 341 | unpacking, reading or copying. 342 | 343 | 7. Additional Terms. 344 | 345 | "Additional permissions" are terms that supplement the terms of this 346 | License by making exceptions from one or more of its conditions. 347 | Additional permissions that are applicable to the entire Program shall 348 | be treated as though they were included in this License, to the extent 349 | that they are valid under applicable law. If additional permissions 350 | apply only to part of the Program, that part may be used separately 351 | under those permissions, but the entire Program remains governed by 352 | this License without regard to the additional permissions. 353 | 354 | When you convey a copy of a covered work, you may at your option 355 | remove any additional permissions from that copy, or from any part of 356 | it. (Additional permissions may be written to require their own 357 | removal in certain cases when you modify the work.) You may place 358 | additional permissions on material, added by you to a covered work, 359 | for which you have or can give appropriate copyright permission. 360 | 361 | Notwithstanding any other provision of this License, for material you 362 | add to a covered work, you may (if authorized by the copyright holders of 363 | that material) supplement the terms of this License with terms: 364 | 365 | a) Disclaiming warranty or limiting liability differently from the 366 | terms of sections 15 and 16 of this License; or 367 | 368 | b) Requiring preservation of specified reasonable legal notices or 369 | author attributions in that material or in the Appropriate Legal 370 | Notices displayed by works containing it; or 371 | 372 | c) Prohibiting misrepresentation of the origin of that material, or 373 | requiring that modified versions of such material be marked in 374 | reasonable ways as different from the original version; or 375 | 376 | d) Limiting the use for publicity purposes of names of licensors or 377 | authors of the material; or 378 | 379 | e) Declining to grant rights under trademark law for use of some 380 | trade names, trademarks, or service marks; or 381 | 382 | f) Requiring indemnification of licensors and authors of that 383 | material by anyone who conveys the material (or modified versions of 384 | it) with contractual assumptions of liability to the recipient, for 385 | any liability that these contractual assumptions directly impose on 386 | those licensors and authors. 387 | 388 | All other non-permissive additional terms are considered "further 389 | restrictions" within the meaning of section 10. If the Program as you 390 | received it, or any part of it, contains a notice stating that it is 391 | governed by this License along with a term that is a further 392 | restriction, you may remove that term. If a license document contains 393 | a further restriction but permits relicensing or conveying under this 394 | License, you may add to a covered work material governed by the terms 395 | of that license document, provided that the further restriction does 396 | not survive such relicensing or conveying. 397 | 398 | If you add terms to a covered work in accord with this section, you 399 | must place, in the relevant source files, a statement of the 400 | additional terms that apply to those files, or a notice indicating 401 | where to find the applicable terms. 402 | 403 | Additional terms, permissive or non-permissive, may be stated in the 404 | form of a separately written license, or stated as exceptions; 405 | the above requirements apply either way. 406 | 407 | 8. Termination. 408 | 409 | You may not propagate or modify a covered work except as expressly 410 | provided under this License. Any attempt otherwise to propagate or 411 | modify it is void, and will automatically terminate your rights under 412 | this License (including any patent licenses granted under the third 413 | paragraph of section 11). 414 | 415 | However, if you cease all violation of this License, then your 416 | license from a particular copyright holder is reinstated (a) 417 | provisionally, unless and until the copyright holder explicitly and 418 | finally terminates your license, and (b) permanently, if the copyright 419 | holder fails to notify you of the violation by some reasonable means 420 | prior to 60 days after the cessation. 421 | 422 | Moreover, your license from a particular copyright holder is 423 | reinstated permanently if the copyright holder notifies you of the 424 | violation by some reasonable means, this is the first time you have 425 | received notice of violation of this License (for any work) from that 426 | copyright holder, and you cure the violation prior to 30 days after 427 | your receipt of the notice. 428 | 429 | Termination of your rights under this section does not terminate the 430 | licenses of parties who have received copies or rights from you under 431 | this License. If your rights have been terminated and not permanently 432 | reinstated, you do not qualify to receive new licenses for the same 433 | material under section 10. 434 | 435 | 9. Acceptance Not Required for Having Copies. 436 | 437 | You are not required to accept this License in order to receive or 438 | run a copy of the Program. Ancillary propagation of a covered work 439 | occurring solely as a consequence of using peer-to-peer transmission 440 | to receive a copy likewise does not require acceptance. However, 441 | nothing other than this License grants you permission to propagate or 442 | modify any covered work. These actions infringe copyright if you do 443 | not accept this License. Therefore, by modifying or propagating a 444 | covered work, you indicate your acceptance of this License to do so. 445 | 446 | 10. Automatic Licensing of Downstream Recipients. 447 | 448 | Each time you convey a covered work, the recipient automatically 449 | receives a license from the original licensors, to run, modify and 450 | propagate that work, subject to this License. You are not responsible 451 | for enforcing compliance by third parties with this License. 452 | 453 | An "entity transaction" is a transaction transferring control of an 454 | organization, or substantially all assets of one, or subdividing an 455 | organization, or merging organizations. If propagation of a covered 456 | work results from an entity transaction, each party to that 457 | transaction who receives a copy of the work also receives whatever 458 | licenses to the work the party's predecessor in interest had or could 459 | give under the previous paragraph, plus a right to possession of the 460 | Corresponding Source of the work from the predecessor in interest, if 461 | the predecessor has it or can get it with reasonable efforts. 462 | 463 | You may not impose any further restrictions on the exercise of the 464 | rights granted or affirmed under this License. For example, you may 465 | not impose a license fee, royalty, or other charge for exercise of 466 | rights granted under this License, and you may not initiate litigation 467 | (including a cross-claim or counterclaim in a lawsuit) alleging that 468 | any patent claim is infringed by making, using, selling, offering for 469 | sale, or importing the Program or any portion of it. 470 | 471 | 11. Patents. 472 | 473 | A "contributor" is a copyright holder who authorizes use under this 474 | License of the Program or a work on which the Program is based. The 475 | work thus licensed is called the contributor's "contributor version". 476 | 477 | A contributor's "essential patent claims" are all patent claims 478 | owned or controlled by the contributor, whether already acquired or 479 | hereafter acquired, that would be infringed by some manner, permitted 480 | by this License, of making, using, or selling its contributor version, 481 | but do not include claims that would be infringed only as a 482 | consequence of further modification of the contributor version. For 483 | purposes of this definition, "control" includes the right to grant 484 | patent sublicenses in a manner consistent with the requirements of 485 | this License. 486 | 487 | Each contributor grants you a non-exclusive, worldwide, royalty-free 488 | patent license under the contributor's essential patent claims, to 489 | make, use, sell, offer for sale, import and otherwise run, modify and 490 | propagate the contents of its contributor version. 491 | 492 | In the following three paragraphs, a "patent license" is any express 493 | agreement or commitment, however denominated, not to enforce a patent 494 | (such as an express permission to practice a patent or covenant not to 495 | sue for patent infringement). To "grant" such a patent license to a 496 | party means to make such an agreement or commitment not to enforce a 497 | patent against the party. 498 | 499 | If you convey a covered work, knowingly relying on a patent license, 500 | and the Corresponding Source of the work is not available for anyone 501 | to copy, free of charge and under the terms of this License, through a 502 | publicly available network server or other readily accessible means, 503 | then you must either (1) cause the Corresponding Source to be so 504 | available, or (2) arrange to deprive yourself of the benefit of the 505 | patent license for this particular work, or (3) arrange, in a manner 506 | consistent with the requirements of this License, to extend the patent 507 | license to downstream recipients. "Knowingly relying" means you have 508 | actual knowledge that, but for the patent license, your conveying the 509 | covered work in a country, or your recipient's use of the covered work 510 | in a country, would infringe one or more identifiable patents in that 511 | country that you have reason to believe are valid. 512 | 513 | If, pursuant to or in connection with a single transaction or 514 | arrangement, you convey, or propagate by procuring conveyance of, a 515 | covered work, and grant a patent license to some of the parties 516 | receiving the covered work authorizing them to use, propagate, modify 517 | or convey a specific copy of the covered work, then the patent license 518 | you grant is automatically extended to all recipients of the covered 519 | work and works based on it. 520 | 521 | A patent license is "discriminatory" if it does not include within 522 | the scope of its coverage, prohibits the exercise of, or is 523 | conditioned on the non-exercise of one or more of the rights that are 524 | specifically granted under this License. You may not convey a covered 525 | work if you are a party to an arrangement with a third party that is 526 | in the business of distributing software, under which you make payment 527 | to the third party based on the extent of your activity of conveying 528 | the work, and under which the third party grants, to any of the 529 | parties who would receive the covered work from you, a discriminatory 530 | patent license (a) in connection with copies of the covered work 531 | conveyed by you (or copies made from those copies), or (b) primarily 532 | for and in connection with specific products or compilations that 533 | contain the covered work, unless you entered into that arrangement, 534 | or that patent license was granted, prior to 28 March 2007. 535 | 536 | Nothing in this License shall be construed as excluding or limiting 537 | any implied license or other defenses to infringement that may 538 | otherwise be available to you under applicable patent law. 539 | 540 | 12. No Surrender of Others' Freedom. 541 | 542 | If conditions are imposed on you (whether by court order, agreement or 543 | otherwise) that contradict the conditions of this License, they do not 544 | excuse you from the conditions of this License. If you cannot convey a 545 | covered work so as to satisfy simultaneously your obligations under this 546 | License and any other pertinent obligations, then as a consequence you may 547 | not convey it at all. For example, if you agree to terms that obligate you 548 | to collect a royalty for further conveying from those to whom you convey 549 | the Program, the only way you could satisfy both those terms and this 550 | License would be to refrain entirely from conveying the Program. 551 | 552 | 13. Use with the GNU Affero General Public License. 553 | 554 | Notwithstanding any other provision of this License, you have 555 | permission to link or combine any covered work with a work licensed 556 | under version 3 of the GNU Affero General Public License into a single 557 | combined work, and to convey the resulting work. The terms of this 558 | License will continue to apply to the part which is the covered work, 559 | but the special requirements of the GNU Affero General Public License, 560 | section 13, concerning interaction through a network will apply to the 561 | combination as such. 562 | 563 | 14. Revised Versions of this License. 564 | 565 | The Free Software Foundation may publish revised and/or new versions of 566 | the GNU General Public License from time to time. Such new versions will 567 | be similar in spirit to the present version, but may differ in detail to 568 | address new problems or concerns. 569 | 570 | Each version is given a distinguishing version number. If the 571 | Program specifies that a certain numbered version of the GNU General 572 | Public License "or any later version" applies to it, you have the 573 | option of following the terms and conditions either of that numbered 574 | version or of any later version published by the Free Software 575 | Foundation. If the Program does not specify a version number of the 576 | GNU General Public License, you may choose any version ever published 577 | by the Free Software Foundation. 578 | 579 | If the Program specifies that a proxy can decide which future 580 | versions of the GNU General Public License can be used, that proxy's 581 | public statement of acceptance of a version permanently authorizes you 582 | to choose that version for the Program. 583 | 584 | Later license versions may give you additional or different 585 | permissions. However, no additional obligations are imposed on any 586 | author or copyright holder as a result of your choosing to follow a 587 | later version. 588 | 589 | 15. Disclaimer of Warranty. 590 | 591 | THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY 592 | APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT 593 | HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY 594 | OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, 595 | THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR 596 | PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM 597 | IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF 598 | ALL NECESSARY SERVICING, REPAIR OR CORRECTION. 599 | 600 | 16. Limitation of Liability. 601 | 602 | IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING 603 | WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS 604 | THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY 605 | GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE 606 | USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF 607 | DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD 608 | PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), 609 | EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF 610 | SUCH DAMAGES. 611 | 612 | 17. Interpretation of Sections 15 and 16. 613 | 614 | If the disclaimer of warranty and limitation of liability provided 615 | above cannot be given local legal effect according to their terms, 616 | reviewing courts shall apply local law that most closely approximates 617 | an absolute waiver of all civil liability in connection with the 618 | Program, unless a warranty or assumption of liability accompanies a 619 | copy of the Program in return for a fee. 620 | 621 | END OF TERMS AND CONDITIONS 622 | 623 | How to Apply These Terms to Your New Programs 624 | 625 | If you develop a new program, and you want it to be of the greatest 626 | possible use to the public, the best way to achieve this is to make it 627 | free software which everyone can redistribute and change under these terms. 628 | 629 | To do so, attach the following notices to the program. It is safest 630 | to attach them to the start of each source file to most effectively 631 | state the exclusion of warranty; and each file should have at least 632 | the "copyright" line and a pointer to where the full notice is found. 633 | 634 | 635 | Copyright (C) 636 | 637 | This program is free software: you can redistribute it and/or modify 638 | it under the terms of the GNU General Public License as published by 639 | the Free Software Foundation, either version 3 of the License, or 640 | (at your option) any later version. 641 | 642 | This program is distributed in the hope that it will be useful, 643 | but WITHOUT ANY WARRANTY; without even the implied warranty of 644 | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the 645 | GNU General Public License for more details. 646 | 647 | You should have received a copy of the GNU General Public License 648 | along with this program. If not, see . 649 | 650 | Also add information on how to contact you by electronic and paper mail. 651 | 652 | If the program does terminal interaction, make it output a short 653 | notice like this when it starts in an interactive mode: 654 | 655 | Copyright (C) 656 | This program comes with ABSOLUTELY NO WARRANTY; for details type `show w'. 657 | This is free software, and you are welcome to redistribute it 658 | under certain conditions; type `show c' for details. 659 | 660 | The hypothetical commands `show w' and `show c' should show the appropriate 661 | parts of the General Public License. Of course, your program's commands 662 | might be different; for a GUI interface, you would use an "about box". 663 | 664 | You should also get your employer (if you work as a programmer) or school, 665 | if any, to sign a "copyright disclaimer" for the program, if necessary. 666 | For more information on this, and how to apply and follow the GNU GPL, see 667 | . 668 | 669 | The GNU General Public License does not permit incorporating your program 670 | into proprietary programs. If your program is a subroutine library, you 671 | may consider it more useful to permit linking proprietary applications with 672 | the library. If this is what you want to do, use the GNU Lesser General 673 | Public License instead of this License. But first, please read 674 | . 675 | -------------------------------------------------------------------------------- /samples/example.json: -------------------------------------------------------------------------------- 1 | { 2 | "metadata": { 3 | "source_kind": "AnsibleBase" 4 | }, 5 | "graph": { 6 | "nodes": [ 7 | { 8 | "id": "7a32916c0776a53db125ac371721a2ef6aee473b", 9 | "kinds": [ 10 | "ATAnsibleInstance" 11 | ], 12 | "properties": { 13 | "active_node": "awx-operator-research-web-557cd7dff5-gqhws", 14 | "install_uuid": "d3bee2d8-ec3f-4f09-8e8f-aad4d5a0035a", 15 | "name": "10.188.218.44:9443", 16 | "version": "24.3.0" 17 | } 18 | }, 19 | { 20 | "id": "2e25345f4e80234aa18e13a142029b03b3dc2919", 21 | "kinds": [ 22 | "ATUser" 23 | ], 24 | "properties": { 25 | "description": "", 26 | "email": "test@example.com", 27 | "external_account": "", 28 | "firstname": "", 29 | "id": "1", 30 | "is_super_user": "true", 31 | "is_system_auditor": "false", 32 | "last_login": "2025-08-10T17:19:17.060803Z", 33 | "lastname": "", 34 | "ldap_dn": "", 35 | "name": "admin", 36 | "url": "/api/v2/users/1/" 37 | } 38 | }, 39 | { 40 | "id": "0200d454b16e5a187a9c227c9228894910aa6326", 41 | "kinds": [ 42 | "ATUser" 43 | ], 44 | "properties": { 45 | "description": "", 46 | "email": "", 47 | "external_account": "", 48 | "firstname": "Alice", 49 | "id": "92", 50 | "is_super_user": "false", 51 | "is_system_auditor": "false", 52 | "last_login": "", 53 | "lastname": "", 54 | "ldap_dn": "", 55 | "name": "alice", 56 | "url": "/api/v2/users/92/" 57 | } 58 | }, 59 | { 60 | "id": "270996d0f6eba477cc9ebbab8039468a0989204e", 61 | "kinds": [ 62 | "ATUser" 63 | ], 64 | "properties": { 65 | "description": "", 66 | "email": "", 67 | "external_account": "", 68 | "firstname": "Bob", 69 | "id": "93", 70 | "is_super_user": "false", 71 | "is_system_auditor": "false", 72 | "last_login": "", 73 | "lastname": "", 74 | "ldap_dn": "", 75 | "name": "bob", 76 | "url": "/api/v2/users/93/" 77 | } 78 | }, 79 | { 80 | "id": "85396c3ee679a094da67ed40413052db0ae930e1", 81 | "kinds": [ 82 | "ATUser" 83 | ], 84 | "properties": { 85 | "description": "", 86 | "email": "", 87 | "external_account": "", 88 | "firstname": "Joe", 89 | "id": "94", 90 | "is_super_user": "false", 91 | "is_system_auditor": "false", 92 | "last_login": "", 93 | "lastname": "", 94 | "ldap_dn": "", 95 | "name": "joe", 96 | "url": "/api/v2/users/94/" 97 | } 98 | }, 99 | { 100 | "id": "b996409b88ef8c07d7b5c435157a3a181a95f1ed", 101 | "kinds": [ 102 | "ATUser" 103 | ], 104 | "properties": { 105 | "description": "", 106 | "email": "", 107 | "external_account": "", 108 | "firstname": "Karen", 109 | "id": "96", 110 | "is_super_user": "false", 111 | "is_system_auditor": "false", 112 | "last_login": "", 113 | "lastname": "", 114 | "ldap_dn": "", 115 | "name": "karen", 116 | "url": "/api/v2/users/96/" 117 | } 118 | }, 119 | { 120 | "id": "2f77f0cf6202823ec834d447e3cbb69452982e02", 121 | "kinds": [ 122 | "ATUser" 123 | ], 124 | "properties": { 125 | "description": "", 126 | "email": "", 127 | "external_account": "", 128 | "firstname": "Kyle", 129 | "id": "95", 130 | "is_super_user": "false", 131 | "is_system_auditor": "false", 132 | "last_login": "2025-07-30T20:23:47.670612Z", 133 | "lastname": "", 134 | "ldap_dn": "", 135 | "name": "kyle", 136 | "url": "/api/v2/users/95/" 137 | } 138 | }, 139 | { 140 | "id": "f532c9b1db2c2ed16a1c043d9e9f2e3e78170d1b", 141 | "kinds": [ 142 | "ATUser" 143 | ], 144 | "properties": { 145 | "description": "", 146 | "email": "", 147 | "external_account": "", 148 | "firstname": "timmy", 149 | "id": "97", 150 | "is_super_user": "false", 151 | "is_system_auditor": "false", 152 | "last_login": "", 153 | "lastname": "", 154 | "ldap_dn": "", 155 | "name": "timmy", 156 | "url": "/api/v2/users/97/" 157 | } 158 | }, 159 | { 160 | "id": "c2182531cc464ae5e836e6ef0a1a88870b251b6c", 161 | "kinds": [ 162 | "ATHost" 163 | ], 164 | "properties": { 165 | "ansible_facts_modified": "", 166 | "created": "2025-07-30T19:51:04.648465Z", 167 | "description": "", 168 | "enabled": "true", 169 | "has_active_failures": "true", 170 | "id": "513", 171 | "instance_id": "", 172 | "inventory": "74", 173 | "last_job": "84", 174 | "last_job_host_summary": "5", 175 | "modified": "2025-07-30T19:51:04.648481Z", 176 | "name": "dev-01.example.tld", 177 | "type": "host", 178 | "url": "/api/v2/hosts/513/", 179 | "variables": "---" 180 | } 181 | }, 182 | { 183 | "id": "219e3bd4dfe45e4ae43bfd421fc317dedc3e8831", 184 | "kinds": [ 185 | "ATHost" 186 | ], 187 | "properties": { 188 | "ansible_facts_modified": "", 189 | "created": "2025-07-30T19:51:13.590893Z", 190 | "description": "", 191 | "enabled": "true", 192 | "has_active_failures": "true", 193 | "id": "514", 194 | "instance_id": "", 195 | "inventory": "74", 196 | "last_job": "84", 197 | "last_job_host_summary": "4", 198 | "modified": "2025-07-30T19:51:13.590901Z", 199 | "name": "dev-02.example.tld", 200 | "type": "host", 201 | "url": "/api/v2/hosts/514/", 202 | "variables": "---" 203 | } 204 | }, 205 | { 206 | "id": "28824c822cbbfb047e77c5b743c2e72c7f3de9cb", 207 | "kinds": [ 208 | "ATHost" 209 | ], 210 | "properties": { 211 | "ansible_facts_modified": "", 212 | "created": "2025-07-30T20:15:12.523320Z", 213 | "description": "", 214 | "enabled": "true", 215 | "has_active_failures": "true", 216 | "id": "515", 217 | "instance_id": "", 218 | "inventory": "75", 219 | "last_job": "85", 220 | "last_job_host_summary": "3", 221 | "modified": "2025-07-30T20:15:12.523328Z", 222 | "name": "prod-01.example.tld", 223 | "type": "host", 224 | "url": "/api/v2/hosts/515/", 225 | "variables": "---" 226 | } 227 | }, 228 | { 229 | "id": "61c56a6e232280b9d37e0e7cd4dc3feb8118de1e", 230 | "kinds": [ 231 | "ATHost" 232 | ], 233 | "properties": { 234 | "ansible_facts_modified": "", 235 | "created": "2025-07-30T20:15:30.807967Z", 236 | "description": "", 237 | "enabled": "true", 238 | "has_active_failures": "true", 239 | "id": "516", 240 | "instance_id": "", 241 | "inventory": "75", 242 | "last_job": "85", 243 | "last_job_host_summary": "2", 244 | "modified": "2025-07-30T20:15:30.807974Z", 245 | "name": "prod-02.example.tld", 246 | "type": "host", 247 | "url": "/api/v2/hosts/516/", 248 | "variables": "---" 249 | } 250 | }, 251 | { 252 | "id": "c7e72c4a8935d660ce8f2e2311c3c1795b60c009", 253 | "kinds": [ 254 | "ATHost" 255 | ], 256 | "properties": { 257 | "ansible_facts_modified": "", 258 | "created": "2025-07-30T20:15:46.525818Z", 259 | "description": "", 260 | "enabled": "true", 261 | "has_active_failures": "true", 262 | "id": "517", 263 | "instance_id": "", 264 | "inventory": "75", 265 | "last_job": "83", 266 | "last_job_host_summary": "6", 267 | "modified": "2025-07-30T20:15:55.679546Z", 268 | "name": "prod-backup.example.tld", 269 | "type": "host", 270 | "url": "/api/v2/hosts/517/", 271 | "variables": "---" 272 | } 273 | }, 274 | { 275 | "id": "05ab1c0ff989862c0190447f698cf02a05542d72", 276 | "kinds": [ 277 | "ATGroup" 278 | ], 279 | "properties": { 280 | "created": "2025-08-10T14:07:51.813543Z", 281 | "description": "", 282 | "id": "1", 283 | "inventory": "75", 284 | "modified": "2025-08-10T14:07:51.813552Z", 285 | "name": "backup", 286 | "type": "group", 287 | "url": "/api/v2/groups/1/", 288 | "variables": "---" 289 | } 290 | }, 291 | { 292 | "id": "6b6103a6f1264e0691765160d0d77c631221029e", 293 | "kinds": [ 294 | "ATGroup" 295 | ], 296 | "properties": { 297 | "created": "2025-08-10T14:08:24.093973Z", 298 | "description": "", 299 | "id": "2", 300 | "inventory": "75", 301 | "modified": "2025-08-10T14:08:24.093981Z", 302 | "name": "prod-app", 303 | "type": "group", 304 | "url": "/api/v2/groups/2/", 305 | "variables": "---" 306 | } 307 | }, 308 | { 309 | "id": "594bb965968920d3af722e2e5a73e17a1dc71318", 310 | "kinds": [ 311 | "ATJob" 312 | ], 313 | "properties": { 314 | "allow_simultaneous": "false", 315 | "canceled_on": "", 316 | "controller_node": "awx-operator-research-task-6794dc494c-5xlqz", 317 | "created": "2025-08-04T12:50:47.979868Z", 318 | "description": "", 319 | "diff_mode": "false", 320 | "elapsed": "3.6687000275e+01", 321 | "execution_environment": "2", 322 | "execution_node": "", 323 | "extra_vars": "{}", 324 | "failed": "true", 325 | "finished": "2025-08-04T12:51:24.936242Z", 326 | "force_handler": "false", 327 | "forks": "0", 328 | "id": "83", 329 | "instance_group": "2", 330 | "inventory": "75", 331 | "job_explanation": "", 332 | "job_slice_count": "1", 333 | "job_slice_number": "0", 334 | "job_tags": "", 335 | "job_type": "run", 336 | "launch_type": "manual", 337 | "limit": "prod-backup.example.tld", 338 | "modified": "2025-08-04T12:50:48.146666Z", 339 | "name": "Backup Prod", 340 | "organization": "15", 341 | "password_needed_to_start": "", 342 | "playbook": "helloworld.yml", 343 | "project": "88", 344 | "scm_branch": "", 345 | "scm_revision": "42c93829ab9f566db2a05e5e2444279f697549a5", 346 | "skip_tags": "", 347 | "start_at_task": "", 348 | "started": "2025-08-04T12:50:48.249450Z", 349 | "status": "failed", 350 | "timeout": "0", 351 | "type": "job", 352 | "unified_job_template": "91", 353 | "url": "/api/v2/jobs/83/", 354 | "use_fact_cache": "false", 355 | "verbosity": "0", 356 | "webhook_credential": "0", 357 | "webhook_guid": "", 358 | "webhook_service": "", 359 | "work_unit_id": "ZnqVBRF5" 360 | } 361 | }, 362 | { 363 | "id": "3024d461aec4c4f22df80ffa145909b123e1ae9c", 364 | "kinds": [ 365 | "ATJob" 366 | ], 367 | "properties": { 368 | "allow_simultaneous": "false", 369 | "canceled_on": "", 370 | "controller_node": "awx-operator-research-task-6794dc494c-5xlqz", 371 | "created": "2025-08-04T12:51:01.251835Z", 372 | "description": "", 373 | "diff_mode": "false", 374 | "elapsed": "2.3365999222e+01", 375 | "execution_environment": "2", 376 | "execution_node": "", 377 | "extra_vars": "{\"test\": \"var\"}", 378 | "failed": "true", 379 | "finished": "2025-08-04T12:51:24.880813Z", 380 | "force_handler": "false", 381 | "forks": "0", 382 | "id": "84", 383 | "instance_group": "2", 384 | "inventory": "74", 385 | "job_explanation": "", 386 | "job_slice_count": "1", 387 | "job_slice_number": "0", 388 | "job_tags": "", 389 | "job_type": "run", 390 | "launch_type": "manual", 391 | "limit": "", 392 | "modified": "2025-08-04T12:51:01.411552Z", 393 | "name": "Deploy Dev", 394 | "organization": "14", 395 | "password_needed_to_start": "", 396 | "playbook": "helloworld.yml", 397 | "project": "86", 398 | "scm_branch": "", 399 | "scm_revision": "42c93829ab9f566db2a05e5e2444279f697549a5", 400 | "skip_tags": "", 401 | "start_at_task": "", 402 | "started": "2025-08-04T12:51:01.514597Z", 403 | "status": "failed", 404 | "timeout": "0", 405 | "type": "job", 406 | "unified_job_template": "89", 407 | "url": "/api/v2/jobs/84/", 408 | "use_fact_cache": "false", 409 | "verbosity": "0", 410 | "webhook_credential": "0", 411 | "webhook_guid": "", 412 | "webhook_service": "", 413 | "work_unit_id": "0oNwctm1" 414 | } 415 | }, 416 | { 417 | "id": "5bbdf2e6490ba72bf8d2cf95f3f0cd9c95f001d8", 418 | "kinds": [ 419 | "ATJob" 420 | ], 421 | "properties": { 422 | "allow_simultaneous": "false", 423 | "canceled_on": "", 424 | "controller_node": "awx-operator-research-task-6794dc494c-5xlqz", 425 | "created": "2025-08-04T12:51:04.546044Z", 426 | "description": "", 427 | "diff_mode": "false", 428 | "elapsed": "2.0174999237e+01", 429 | "execution_environment": "2", 430 | "execution_node": "", 431 | "extra_vars": "{}", 432 | "failed": "true", 433 | "finished": "2025-08-04T12:51:25.007279Z", 434 | "force_handler": "false", 435 | "forks": "0", 436 | "id": "85", 437 | "instance_group": "2", 438 | "inventory": "75", 439 | "job_explanation": "", 440 | "job_slice_count": "1", 441 | "job_slice_number": "0", 442 | "job_tags": "", 443 | "job_type": "run", 444 | "launch_type": "manual", 445 | "limit": "", 446 | "modified": "2025-08-04T12:51:04.726516Z", 447 | "name": "Deploy Prod", 448 | "organization": "15", 449 | "password_needed_to_start": "", 450 | "playbook": "helloworld.yml", 451 | "project": "87", 452 | "scm_branch": "", 453 | "scm_revision": "42c93829ab9f566db2a05e5e2444279f697549a5", 454 | "skip_tags": "", 455 | "start_at_task": "", 456 | "started": "2025-08-04T12:51:04.832035Z", 457 | "status": "failed", 458 | "timeout": "0", 459 | "type": "job", 460 | "unified_job_template": "90", 461 | "url": "/api/v2/jobs/85/", 462 | "use_fact_cache": "false", 463 | "verbosity": "0", 464 | "webhook_credential": "0", 465 | "webhook_guid": "", 466 | "webhook_service": "", 467 | "work_unit_id": "G9NSZnHn" 468 | } 469 | }, 470 | { 471 | "id": "594bb965968920d3af722e2e5a73e17a1dc71318", 472 | "kinds": [ 473 | "ATJob" 474 | ], 475 | "properties": { 476 | "allow_simultaneous": "false", 477 | "canceled_on": "", 478 | "controller_node": "awx-operator-research-task-6794dc494c-5xlqz", 479 | "created": "2025-08-04T12:50:47.979868Z", 480 | "description": "", 481 | "diff_mode": "false", 482 | "elapsed": "3.6687000275e+01", 483 | "execution_environment": "2", 484 | "execution_node": "", 485 | "extra_vars": "{}", 486 | "failed": "true", 487 | "finished": "2025-08-04T12:51:24.936242Z", 488 | "force_handler": "false", 489 | "forks": "0", 490 | "id": "83", 491 | "instance_group": "2", 492 | "inventory": "75", 493 | "job_explanation": "", 494 | "job_slice_count": "1", 495 | "job_slice_number": "0", 496 | "job_tags": "", 497 | "job_type": "run", 498 | "launch_type": "manual", 499 | "limit": "prod-backup.example.tld", 500 | "modified": "2025-08-04T12:50:48.146666Z", 501 | "name": "Backup Prod", 502 | "organization": "15", 503 | "password_needed_to_start": "", 504 | "playbook": "helloworld.yml", 505 | "project": "88", 506 | "scm_branch": "", 507 | "scm_revision": "42c93829ab9f566db2a05e5e2444279f697549a5", 508 | "skip_tags": "", 509 | "start_at_task": "", 510 | "started": "2025-08-04T12:50:48.249450Z", 511 | "status": "failed", 512 | "timeout": "0", 513 | "type": "job", 514 | "unified_job_template": "91", 515 | "url": "/api/v2/jobs/83/", 516 | "use_fact_cache": "false", 517 | "verbosity": "0", 518 | "webhook_credential": "0", 519 | "webhook_guid": "", 520 | "webhook_service": "", 521 | "work_unit_id": "ZnqVBRF5" 522 | } 523 | }, 524 | { 525 | "id": "783ca43e4a7b5b23f796f29cf5bb11dcde67f375", 526 | "kinds": [ 527 | "ATJobTemplate" 528 | ], 529 | "properties": { 530 | "allow_simultaneous": "false", 531 | "ask_credential_on_launch": "false", 532 | "ask_diff_mode_on_launch": "false", 533 | "ask_execution_environment_on_launch": "false", 534 | "ask_forks_on_launch": "false", 535 | "ask_instance_groups_on_launch": "false", 536 | "ask_inventory_on_launch": "false", 537 | "ask_job_slice_count_on_launch": "false", 538 | "ask_job_type_on_launch": "false", 539 | "ask_labels_on_launch": "false", 540 | "ask_limit_on_launch": "false", 541 | "ask_scm_branch_on_launch": "false", 542 | "ask_tags_on_launch": "false", 543 | "ask_timeout_on_launch": "false", 544 | "ask_variables_on_launch": "false", 545 | "ask_verbosity_on_launch": "false", 546 | "become_enabled": "false", 547 | "custom_virtualenv": "", 548 | "description": "", 549 | "diff_mode": "false", 550 | "execution_environment": "0", 551 | "extra_vars": "---", 552 | "force_handler": "false", 553 | "forks": "0", 554 | "host_config_key": "", 555 | "id": "91", 556 | "job_slice_count": "1", 557 | "job_tags": "", 558 | "job_type": "run", 559 | "last_job_failed": "true", 560 | "last_job_run": "2025-08-04T12:51:24.936242Z", 561 | "limit": "prod-backup.example.tld", 562 | "name": "Backup Prod", 563 | "next_job_run": "", 564 | "organization": "15", 565 | "playbook": "helloworld.yml", 566 | "prevent_instance_group_fallback": "false", 567 | "project": "88", 568 | "scm_branch": "", 569 | "skip_tags": "", 570 | "start_at_task": "", 571 | "status": "failed", 572 | "survey_enabled": "false", 573 | "timeout": "0", 574 | "url": "/api/v2/job_templates/91/", 575 | "use_fact_cache": "false", 576 | "verbosity": "0", 577 | "webhook_credential": "0", 578 | "webhook_service": "" 579 | } 580 | }, 581 | { 582 | "id": "4f52a300bb5c02f66853e2fb2ff978e5a6757836", 583 | "kinds": [ 584 | "ATJobTemplate" 585 | ], 586 | "properties": { 587 | "allow_simultaneous": "false", 588 | "ask_credential_on_launch": "false", 589 | "ask_diff_mode_on_launch": "false", 590 | "ask_execution_environment_on_launch": "false", 591 | "ask_forks_on_launch": "false", 592 | "ask_instance_groups_on_launch": "false", 593 | "ask_inventory_on_launch": "false", 594 | "ask_job_slice_count_on_launch": "false", 595 | "ask_job_type_on_launch": "false", 596 | "ask_labels_on_launch": "false", 597 | "ask_limit_on_launch": "true", 598 | "ask_scm_branch_on_launch": "false", 599 | "ask_tags_on_launch": "false", 600 | "ask_timeout_on_launch": "false", 601 | "ask_variables_on_launch": "true", 602 | "ask_verbosity_on_launch": "false", 603 | "become_enabled": "false", 604 | "custom_virtualenv": "", 605 | "description": "", 606 | "diff_mode": "false", 607 | "execution_environment": "0", 608 | "extra_vars": "---", 609 | "force_handler": "false", 610 | "forks": "0", 611 | "host_config_key": "", 612 | "id": "89", 613 | "job_slice_count": "1", 614 | "job_tags": "", 615 | "job_type": "run", 616 | "last_job_failed": "true", 617 | "last_job_run": "2025-08-04T12:51:24.880813Z", 618 | "limit": "", 619 | "name": "Deploy Dev", 620 | "next_job_run": "", 621 | "organization": "14", 622 | "playbook": "helloworld.yml", 623 | "prevent_instance_group_fallback": "false", 624 | "project": "86", 625 | "scm_branch": "", 626 | "skip_tags": "", 627 | "start_at_task": "", 628 | "status": "failed", 629 | "survey_enabled": "false", 630 | "timeout": "0", 631 | "url": "/api/v2/job_templates/89/", 632 | "use_fact_cache": "false", 633 | "verbosity": "0", 634 | "webhook_credential": "0", 635 | "webhook_service": "" 636 | } 637 | }, 638 | { 639 | "id": "7c2118b527eac71c4d2a8cf9686e3cbc2ce9fe34", 640 | "kinds": [ 641 | "ATJobTemplate" 642 | ], 643 | "properties": { 644 | "allow_simultaneous": "false", 645 | "ask_credential_on_launch": "false", 646 | "ask_diff_mode_on_launch": "false", 647 | "ask_execution_environment_on_launch": "false", 648 | "ask_forks_on_launch": "false", 649 | "ask_instance_groups_on_launch": "false", 650 | "ask_inventory_on_launch": "false", 651 | "ask_job_slice_count_on_launch": "false", 652 | "ask_job_type_on_launch": "false", 653 | "ask_labels_on_launch": "false", 654 | "ask_limit_on_launch": "false", 655 | "ask_scm_branch_on_launch": "false", 656 | "ask_tags_on_launch": "false", 657 | "ask_timeout_on_launch": "false", 658 | "ask_variables_on_launch": "false", 659 | "ask_verbosity_on_launch": "false", 660 | "become_enabled": "false", 661 | "custom_virtualenv": "", 662 | "description": "", 663 | "diff_mode": "false", 664 | "execution_environment": "0", 665 | "extra_vars": "---", 666 | "force_handler": "false", 667 | "forks": "0", 668 | "host_config_key": "", 669 | "id": "90", 670 | "job_slice_count": "1", 671 | "job_tags": "", 672 | "job_type": "run", 673 | "last_job_failed": "true", 674 | "last_job_run": "2025-08-04T12:51:25.007279Z", 675 | "limit": "", 676 | "name": "Deploy Prod", 677 | "next_job_run": "", 678 | "organization": "15", 679 | "playbook": "helloworld.yml", 680 | "prevent_instance_group_fallback": "false", 681 | "project": "87", 682 | "scm_branch": "", 683 | "skip_tags": "", 684 | "start_at_task": "", 685 | "status": "failed", 686 | "survey_enabled": "false", 687 | "timeout": "0", 688 | "url": "/api/v2/job_templates/90/", 689 | "use_fact_cache": "false", 690 | "verbosity": "0", 691 | "webhook_credential": "0", 692 | "webhook_service": "" 693 | } 694 | }, 695 | { 696 | "id": "2f9be2650f46eef5a82821fcdcd431142b76c451", 697 | "kinds": [ 698 | "ATInventory" 699 | ], 700 | "properties": { 701 | "description": "", 702 | "has_active_failures": "true", 703 | "has_inventory_source": "false", 704 | "host_filter": "", 705 | "hosts_with_active_failures": "0", 706 | "id": "74", 707 | "inventory_sources_with_failures": "0", 708 | "kind": "", 709 | "name": "Dev", 710 | "organization": "14", 711 | "pending_deletion": "false", 712 | "prevent_instance_group_fallback": "false", 713 | "total_groups": "0", 714 | "total_hosts": "2", 715 | "total_inventory_sources": "0", 716 | "url": "/api/v2/inventories/74/" 717 | } 718 | }, 719 | { 720 | "id": "59b3eb42485dad9f98009b91bb06711f7e3157f5", 721 | "kinds": [ 722 | "ATInventory" 723 | ], 724 | "properties": { 725 | "description": "", 726 | "has_active_failures": "true", 727 | "has_inventory_source": "false", 728 | "host_filter": "", 729 | "hosts_with_active_failures": "0", 730 | "id": "75", 731 | "inventory_sources_with_failures": "0", 732 | "kind": "", 733 | "name": "Prod", 734 | "organization": "15", 735 | "pending_deletion": "false", 736 | "prevent_instance_group_fallback": "false", 737 | "total_groups": "2", 738 | "total_hosts": "3", 739 | "total_inventory_sources": "0", 740 | "url": "/api/v2/inventories/75/" 741 | } 742 | }, 743 | { 744 | "id": "41bef9871b17b4532fffbfda3768086253c4c78c", 745 | "kinds": [ 746 | "ATOrganization" 747 | ], 748 | "properties": { 749 | "custom_virtualenv": "", 750 | "default_environment": "0", 751 | "description": "PROD ORG", 752 | "id": "15", 753 | "max_hosts": "0", 754 | "name": "PROD ORG", 755 | "url": "/api/v2/organizations/15/" 756 | } 757 | }, 758 | { 759 | "id": "17b5f0743c31cc14dfcb9d46a637fe5dcf1f9396", 760 | "kinds": [ 761 | "ATOrganization" 762 | ], 763 | "properties": { 764 | "custom_virtualenv": "", 765 | "default_environment": "0", 766 | "description": "DEV ORG", 767 | "id": "14", 768 | "max_hosts": "0", 769 | "name": "DEV ORG", 770 | "url": "/api/v2/organizations/14/" 771 | } 772 | }, 773 | { 774 | "id": "11c6d92c8c1ad62649584e6289d93dfdcf9e860f", 775 | "kinds": [ 776 | "ATCredential" 777 | ], 778 | "properties": { 779 | "cloud": "false", 780 | "credential_type": "3", 781 | "description": "", 782 | "id": "97", 783 | "kubernetes": "false", 784 | "managed": "false", 785 | "name": "PROD Ansible Vault", 786 | "organization": "15", 787 | "url": "/api/v2/credentials/97/" 788 | } 789 | }, 790 | { 791 | "id": "5de872773808ad07583e05324946670532f8df26", 792 | "kinds": [ 793 | "ATCredential" 794 | ], 795 | "properties": { 796 | "cloud": "false", 797 | "credential_type": "30", 798 | "description": "", 799 | "id": "96", 800 | "kubernetes": "false", 801 | "managed": "false", 802 | "name": "PROD Secret Server", 803 | "organization": "15", 804 | "url": "/api/v2/credentials/96/" 805 | } 806 | }, 807 | { 808 | "id": "347a6efeeaa70b969c7bf5cb8c7cbc0861c98d46", 809 | "kinds": [ 810 | "ATCredential" 811 | ], 812 | "properties": { 813 | "cloud": "false", 814 | "credential_type": "19", 815 | "description": "", 816 | "id": "2", 817 | "kubernetes": "false", 818 | "managed": "true", 819 | "name": "Ansible Galaxy", 820 | "organization": "0", 821 | "url": "/api/v2/credentials/2/" 822 | } 823 | }, 824 | { 825 | "id": "2269964c910971bd3c23c847a2487314222ac117", 826 | "kinds": [ 827 | "ATCredential" 828 | ], 829 | "properties": { 830 | "cloud": "false", 831 | "credential_type": "1", 832 | "description": "", 833 | "id": "91", 834 | "kubernetes": "false", 835 | "managed": "false", 836 | "name": "Dev", 837 | "organization": "14", 838 | "url": "/api/v2/credentials/91/" 839 | } 840 | }, 841 | { 842 | "id": "11c6d92c8c1ad62649584e6289d93dfdcf9e860f", 843 | "kinds": [ 844 | "ATCredential" 845 | ], 846 | "properties": { 847 | "cloud": "false", 848 | "credential_type": "3", 849 | "description": "", 850 | "id": "97", 851 | "kubernetes": "false", 852 | "managed": "false", 853 | "name": "PROD Ansible Vault", 854 | "organization": "15", 855 | "url": "/api/v2/credentials/97/" 856 | } 857 | }, 858 | { 859 | "id": "5de872773808ad07583e05324946670532f8df26", 860 | "kinds": [ 861 | "ATCredential" 862 | ], 863 | "properties": { 864 | "cloud": "false", 865 | "credential_type": "30", 866 | "description": "", 867 | "id": "96", 868 | "kubernetes": "false", 869 | "managed": "false", 870 | "name": "PROD Secret Server", 871 | "organization": "15", 872 | "url": "/api/v2/credentials/96/" 873 | } 874 | }, 875 | { 876 | "id": "381f90fde10f3f53614041fd43fd63b36db18994", 877 | "kinds": [ 878 | "ATCredential" 879 | ], 880 | "properties": { 881 | "cloud": "false", 882 | "credential_type": "1", 883 | "description": "", 884 | "id": "94", 885 | "kubernetes": "false", 886 | "managed": "false", 887 | "name": "Backup", 888 | "organization": "15", 889 | "url": "/api/v2/credentials/94/" 890 | } 891 | }, 892 | { 893 | "id": "d1d869457af3e25fb27e83da9dee46e77cab165c", 894 | "kinds": [ 895 | "ATCredential" 896 | ], 897 | "properties": { 898 | "cloud": "false", 899 | "credential_type": "30", 900 | "description": "", 901 | "id": "95", 902 | "kubernetes": "false", 903 | "managed": "false", 904 | "name": "DEV Secret Server", 905 | "organization": "14", 906 | "url": "/api/v2/credentials/95/" 907 | } 908 | }, 909 | { 910 | "id": "9696d536ff2eb09768090f629e4b303289125ae0", 911 | "kinds": [ 912 | "ATCredential" 913 | ], 914 | "properties": { 915 | "cloud": "false", 916 | "credential_type": "11", 917 | "description": "", 918 | "id": "92", 919 | "kubernetes": "false", 920 | "managed": "false", 921 | "name": "GH Token", 922 | "organization": "0", 923 | "url": "/api/v2/credentials/92/" 924 | } 925 | }, 926 | { 927 | "id": "2ecf986fa3a26d3984e2d123ef345b6617ab9b96", 928 | "kinds": [ 929 | "ATCredential" 930 | ], 931 | "properties": { 932 | "cloud": "false", 933 | "credential_type": "1", 934 | "description": "", 935 | "id": "93", 936 | "kubernetes": "false", 937 | "managed": "false", 938 | "name": "Prod", 939 | "organization": "15", 940 | "url": "/api/v2/credentials/93/" 941 | } 942 | }, 943 | { 944 | "id": "626618b124bb6e6349428db214ce9133aa8a64af", 945 | "kinds": [ 946 | "ATProject" 947 | ], 948 | "properties": { 949 | "cloud": "true", 950 | "credential_type": "16", 951 | "description": "", 952 | "id": "98", 953 | "kubernetes": "false", 954 | "managed": "false", 955 | "name": "Red hat token", 956 | "organization": "0", 957 | "url": "/api/v2/credentials/98/" 958 | } 959 | }, 960 | { 961 | "id": "7557d8ec81969a84f8bced2af7f38a764d46a1f4", 962 | "kinds": [ 963 | "ATCredentialType" 964 | ], 965 | "properties": { 966 | "cloud": "false", 967 | "description": "", 968 | "field_project_help": "The Project ID is the GCE assigned identification. It is often constructed as three words or two words followed by a three-digit number. Examples: project-id-000 and another-project-id", 969 | "field_project_type": "string", 970 | "field_ssh_key_data_help": "Paste the contents of the PEM file associated with the service account email.", 971 | "field_ssh_key_data_secret": "true", 972 | "field_ssh_key_data_type": "string", 973 | "field_username_help": "The email address assigned to the Google Compute Engine service account.", 974 | "field_username_type": "string", 975 | "fields_required": "username, ssh_key_data", 976 | "id": "9", 977 | "kubernetes": "false", 978 | "managed": "true", 979 | "name": "Google Compute Engine", 980 | "namespace": "gce", 981 | "url": "/api/v2/credential_types/9/" 982 | } 983 | }, 984 | { 985 | "id": "7eb01afb0695af2a914cd438d3b78a7184f35a54", 986 | "kinds": [ 987 | "ATCredentialType" 988 | ], 989 | "properties": { 990 | "cloud": "false", 991 | "description": "", 992 | "field_cacert_help": "The CA certificate used to verify the SSL certificate of the Vault server", 993 | "field_cacert_type": "string", 994 | "field_client_cert_private_help": "The certificate private key used for TLS client authentication.", 995 | "field_client_cert_private_secret": "true", 996 | "field_client_cert_private_type": "string", 997 | "field_client_cert_public_help": "The PEM-encoded client certificate used for TLS client authentication. This should include the certificate and any intermediate certififcates.", 998 | "field_client_cert_public_type": "string", 999 | "field_client_cert_role_help": "The role configured in Hashicorp Vault for TLS client authentication. If not provided, Hashicorp Vault may assign roles based on the certificate used.", 1000 | "field_client_cert_role_type": "string", 1001 | "field_default_auth_path_help": "The Authentication path to use if one isn't provided in the metadata when linking to an input field. Defaults to 'approle'", 1002 | "field_default_auth_path_type": "string", 1003 | "field_kubernetes_role_help": "The Role for Kubernetes Authentication. This is the named role, configured in Vault server, for AWX pod auth policies. see https://www.vaultproject.io/docs/auth/kubernetes#configuration", 1004 | "field_kubernetes_role_type": "string", 1005 | "field_namespace_help": "Name of the namespace to use when authenticate and retrieve secrets", 1006 | "field_namespace_type": "string", 1007 | "field_password_help": "Password for user authentication.", 1008 | "field_password_secret": "true", 1009 | "field_password_type": "string", 1010 | "field_role_id_help": "The Role ID for AppRole Authentication", 1011 | "field_role_id_type": "string", 1012 | "field_secret_id_help": "The Secret ID for AppRole Authentication", 1013 | "field_secret_id_secret": "true", 1014 | "field_secret_id_type": "string", 1015 | "field_token_help": "The access token used to authenticate to the Vault server", 1016 | "field_token_secret": "true", 1017 | "field_token_type": "string", 1018 | "field_url_help": "The URL to the HashiCorp Vault", 1019 | "field_url_type": "string", 1020 | "field_username_help": "Username for user authentication.", 1021 | "field_username_secret": "false", 1022 | "field_username_type": "string", 1023 | "fields_required": "url, secret_path, public_key, role", 1024 | "id": "28", 1025 | "kubernetes": "false", 1026 | "managed": "true", 1027 | "name": "HashiCorp Vault Signed SSH", 1028 | "namespace": "hashivault_ssh", 1029 | "url": "/api/v2/credential_types/28/" 1030 | } 1031 | }, 1032 | { 1033 | "id": "ac03cc867b3636a9eba4b1191c50f2183902d114", 1034 | "kinds": [ 1035 | "ATCredentialType" 1036 | ], 1037 | "properties": { 1038 | "cloud": "false", 1039 | "description": "", 1040 | "field_domain_help": "The (Application) user domain", 1041 | "field_domain_type": "string", 1042 | "field_password_help": "The corresponding password", 1043 | "field_password_secret": "true", 1044 | "field_password_type": "string", 1045 | "field_server_url_help": "The Base URL of Secret Server e.g. https://myserver/SecretServer or https://mytenant.secretservercloud.com", 1046 | "field_server_url_type": "string", 1047 | "field_username_help": "The (Application) user username", 1048 | "field_username_type": "string", 1049 | "fields_required": "server_url, username, password, secret_id, secret_field", 1050 | "id": "30", 1051 | "kubernetes": "false", 1052 | "managed": "true", 1053 | "name": "Thycotic Secret Server", 1054 | "namespace": "thycotic_tss", 1055 | "url": "/api/v2/credential_types/30/" 1056 | } 1057 | }, 1058 | { 1059 | "id": "f707272b535efe23c20ff464740c59badcab2143", 1060 | "kinds": [ 1061 | "ATCredentialType" 1062 | ], 1063 | "properties": { 1064 | "cloud": "false", 1065 | "description": "", 1066 | "field_host_help": "Enter the hostname or IP address that corresponds to your VMware vCenter.", 1067 | "field_host_type": "string", 1068 | "field_password_secret": "true", 1069 | "field_password_type": "string", 1070 | "field_username_type": "string", 1071 | "fields_required": "host, username, password", 1072 | "id": "7", 1073 | "kubernetes": "false", 1074 | "managed": "true", 1075 | "name": "VMware vCenter", 1076 | "namespace": "vmware", 1077 | "url": "/api/v2/credential_types/7/" 1078 | } 1079 | }, 1080 | { 1081 | "id": "8404f54b91fac7a35bf6a15591f08d518a249f88", 1082 | "kinds": [ 1083 | "ATCredentialType" 1084 | ], 1085 | "properties": { 1086 | "cloud": "false", 1087 | "description": "", 1088 | "field_client_type": "string", 1089 | "field_cloud_name_help": "Specify which azure cloud environment to use.", 1090 | "field_secret_secret": "true", 1091 | "field_secret_type": "string", 1092 | "field_tenant_type": "string", 1093 | "field_url_type": "string", 1094 | "fields_required": "url, client, secret, tenant, secret_field", 1095 | "id": "24", 1096 | "kubernetes": "false", 1097 | "managed": "true", 1098 | "name": "Microsoft Azure Key Vault", 1099 | "namespace": "azure_kv", 1100 | "url": "/api/v2/credential_types/24/" 1101 | } 1102 | }, 1103 | { 1104 | "id": "8cefca1141f8d059dbd1afb7e2b9692ab649ecd4", 1105 | "kinds": [ 1106 | "ATCredentialType" 1107 | ], 1108 | "properties": { 1109 | "cloud": "false", 1110 | "description": "", 1111 | "field_host_help": "Red Hat Ansible Automation Platform base URL to authenticate with.", 1112 | "field_host_type": "string", 1113 | "field_oauth_token_help": "An OAuth token to use to authenticate with.This should not be set if username/password are being used.", 1114 | "field_oauth_token_secret": "true", 1115 | "field_oauth_token_type": "string", 1116 | "field_password_secret": "true", 1117 | "field_password_type": "string", 1118 | "field_username_help": "Red Hat Ansible Automation Platform username id to authenticate as.This should not be set if an OAuth token is being used.", 1119 | "field_username_type": "string", 1120 | "field_verify_ssl_secret": "false", 1121 | "field_verify_ssl_type": "boolean", 1122 | "fields_required": "host", 1123 | "id": "16", 1124 | "injector_env_CONTROLLER_HOST": "{{host}}", 1125 | "injector_env_CONTROLLER_OAUTH_TOKEN": "{{oauth_token}}", 1126 | "injector_env_CONTROLLER_PASSWORD": "{{password}}", 1127 | "injector_env_CONTROLLER_USERNAME": "{{username}}", 1128 | "injector_env_CONTROLLER_VERIFY_SSL": "{{verify_ssl}}", 1129 | "injector_env_TOWER_HOST": "{{host}}", 1130 | "injector_env_TOWER_OAUTH_TOKEN": "{{oauth_token}}", 1131 | "injector_env_TOWER_PASSWORD": "{{password}}", 1132 | "injector_env_TOWER_USERNAME": "{{username}}", 1133 | "injector_env_TOWER_VERIFY_SSL": "{{verify_ssl}}", 1134 | "kubernetes": "false", 1135 | "managed": "true", 1136 | "name": "Red Hat Ansible Automation Platform", 1137 | "namespace": "controller", 1138 | "url": "/api/v2/credential_types/16/" 1139 | } 1140 | }, 1141 | { 1142 | "id": "7975b9a91023692eaec66ca66b56e14e58a20980", 1143 | "kinds": [ 1144 | "ATCredentialType" 1145 | ], 1146 | "properties": { 1147 | "cloud": "false", 1148 | "description": "", 1149 | "field_client_id_help": "Centrify API User, having necessary permissions as mentioned in support doc", 1150 | "field_client_id_type": "string", 1151 | "field_client_password_help": "Password of Centrify API User with necessary permissions", 1152 | "field_client_password_secret": "true", 1153 | "field_client_password_type": "string", 1154 | "field_oauth_application_id_help": "Application ID of the configured OAuth2 Client (defaults to 'awx')", 1155 | "field_oauth_application_id_type": "string", 1156 | "field_oauth_scope_help": "Scope of the configured OAuth2 Client (defaults to 'awx')", 1157 | "field_oauth_scope_type": "string", 1158 | "field_url_help": "Centrify Tenant URL", 1159 | "field_url_type": "string", 1160 | "fields_required": "url, account-name, system-name, client_id, client_password", 1161 | "id": "25", 1162 | "kubernetes": "false", 1163 | "managed": "true", 1164 | "name": "Centrify Vault Credential Provider Lookup", 1165 | "namespace": "centrify_vault_kv", 1166 | "url": "/api/v2/credential_types/25/" 1167 | } 1168 | }, 1169 | { 1170 | "id": "e5f2a15d91165787f3c506c3b7b12c48773f25d3", 1171 | "kinds": [ 1172 | "ATCredentialType" 1173 | ], 1174 | "properties": { 1175 | "cloud": "false", 1176 | "description": "", 1177 | "field_api_version_help": "API v1 is for static key/value lookups. API v2 is for versioned key/value lookups.", 1178 | "field_cacert_help": "The CA certificate used to verify the SSL certificate of the Vault server", 1179 | "field_cacert_type": "string", 1180 | "field_client_cert_private_help": "The certificate private key used for TLS client authentication.", 1181 | "field_client_cert_private_secret": "true", 1182 | "field_client_cert_private_type": "string", 1183 | "field_client_cert_public_help": "The PEM-encoded client certificate used for TLS client authentication. This should include the certificate and any intermediate certififcates.", 1184 | "field_client_cert_public_type": "string", 1185 | "field_client_cert_role_help": "The role configured in Hashicorp Vault for TLS client authentication. If not provided, Hashicorp Vault may assign roles based on the certificate used.", 1186 | "field_client_cert_role_type": "string", 1187 | "field_default_auth_path_help": "The Authentication path to use if one isn't provided in the metadata when linking to an input field. Defaults to 'approle'", 1188 | "field_default_auth_path_type": "string", 1189 | "field_kubernetes_role_help": "The Role for Kubernetes Authentication. This is the named role, configured in Vault server, for AWX pod auth policies. see https://www.vaultproject.io/docs/auth/kubernetes#configuration", 1190 | "field_kubernetes_role_type": "string", 1191 | "field_namespace_help": "Name of the namespace to use when authenticate and retrieve secrets", 1192 | "field_namespace_type": "string", 1193 | "field_password_help": "Password for user authentication.", 1194 | "field_password_secret": "true", 1195 | "field_password_type": "string", 1196 | "field_role_id_help": "The Role ID for AppRole Authentication", 1197 | "field_role_id_type": "string", 1198 | "field_secret_id_help": "The Secret ID for AppRole Authentication", 1199 | "field_secret_id_secret": "true", 1200 | "field_secret_id_type": "string", 1201 | "field_token_help": "The access token used to authenticate to the Vault server", 1202 | "field_token_secret": "true", 1203 | "field_token_type": "string", 1204 | "field_url_help": "The URL to the HashiCorp Vault", 1205 | "field_url_type": "string", 1206 | "field_username_help": "Username for user authentication.", 1207 | "field_username_secret": "false", 1208 | "field_username_type": "string", 1209 | "fields_required": "url, secret_path, api_version, secret_key", 1210 | "id": "27", 1211 | "kubernetes": "false", 1212 | "managed": "true", 1213 | "name": "HashiCorp Vault Secret Lookup", 1214 | "namespace": "hashivault_kv", 1215 | "url": "/api/v2/credential_types/27/" 1216 | } 1217 | }, 1218 | { 1219 | "id": "3515f82637bdedd5242cdfc5c16a4b4026eb6616", 1220 | "kinds": [ 1221 | "ATCredentialType" 1222 | ], 1223 | "properties": { 1224 | "cloud": "false", 1225 | "description": "", 1226 | "field_token_help": "This token needs to come from your profile settings in GitHub", 1227 | "field_token_secret": "true", 1228 | "field_token_type": "string", 1229 | "fields_required": "token", 1230 | "id": "11", 1231 | "kubernetes": "false", 1232 | "managed": "true", 1233 | "name": "GitHub Personal Access Token", 1234 | "namespace": "github_token", 1235 | "url": "/api/v2/credential_types/11/" 1236 | } 1237 | }, 1238 | { 1239 | "id": "451c3df214dbfa12e6b773bd991cc7015acb0f9d", 1240 | "kinds": [ 1241 | "ATCredentialType" 1242 | ], 1243 | "properties": { 1244 | "cloud": "false", 1245 | "description": "", 1246 | "field_token_help": "This token needs to come from your profile settings in GitLab", 1247 | "field_token_secret": "true", 1248 | "field_token_type": "string", 1249 | "fields_required": "token", 1250 | "id": "12", 1251 | "kubernetes": "false", 1252 | "managed": "true", 1253 | "name": "GitLab Personal Access Token", 1254 | "namespace": "gitlab_token", 1255 | "url": "/api/v2/credential_types/12/" 1256 | } 1257 | }, 1258 | { 1259 | "id": "6092c63160d7f0ad6a2961c2ebaa16421fb5f4e2", 1260 | "kinds": [ 1261 | "ATCredentialType" 1262 | ], 1263 | "properties": { 1264 | "cloud": "false", 1265 | "description": "", 1266 | "field_token_help": "This token needs to come from your user settings in Bitbucket", 1267 | "field_token_secret": "true", 1268 | "field_token_type": "string", 1269 | "fields_required": "token", 1270 | "id": "13", 1271 | "kubernetes": "false", 1272 | "managed": "true", 1273 | "name": "Bitbucket Data Center HTTP Access Token", 1274 | "namespace": "bitbucket_dc_token", 1275 | "url": "/api/v2/credential_types/13/" 1276 | } 1277 | }, 1278 | { 1279 | "id": "6be48da5e52b37dd71d516aefaf5aebfcd916e60", 1280 | "kinds": [ 1281 | "ATCredentialType" 1282 | ], 1283 | "properties": { 1284 | "cloud": "false", 1285 | "description": "", 1286 | "field_domain_help": "OpenStack domains define administrative boundaries. It is only needed for Keystone v3 authentication URLs. Refer to the documentation for common scenarios.", 1287 | "field_domain_type": "string", 1288 | "field_host_help": "The host to authenticate with. For example, https://openstack.business.com/v2.0/", 1289 | "field_host_type": "string", 1290 | "field_password_secret": "true", 1291 | "field_password_type": "string", 1292 | "field_project_domain_name_type": "string", 1293 | "field_project_type": "string", 1294 | "field_region_help": "For some cloud providers, like OVH, region must be specified", 1295 | "field_region_type": "string", 1296 | "field_username_type": "string", 1297 | "field_verify_ssl_type": "boolean", 1298 | "fields_required": "username, password, host, project", 1299 | "id": "6", 1300 | "kubernetes": "false", 1301 | "managed": "true", 1302 | "name": "OpenStack", 1303 | "namespace": "openstack", 1304 | "url": "/api/v2/credential_types/6/" 1305 | } 1306 | }, 1307 | { 1308 | "id": "00b767c534bef898aa94b4cb44630f9c1084d1aa", 1309 | "kinds": [ 1310 | "ATCredentialType" 1311 | ], 1312 | "properties": { 1313 | "cloud": "false", 1314 | "description": "", 1315 | "field_configuration_help": "Terraform backend config as Hashicorp configuration language.", 1316 | "field_configuration_secret": "true", 1317 | "field_configuration_type": "string", 1318 | "field_gce_credentials_help": "Google Cloud Platform account credentials in JSON format.", 1319 | "field_gce_credentials_secret": "true", 1320 | "field_gce_credentials_type": "string", 1321 | "fields_required": "configuration", 1322 | "id": "21", 1323 | "kubernetes": "false", 1324 | "managed": "true", 1325 | "name": "Terraform backend configuration", 1326 | "namespace": "terraform", 1327 | "url": "/api/v2/credential_types/21/" 1328 | } 1329 | }, 1330 | { 1331 | "id": "8b303a523367feaf3e423ac6f8553f01ed488869", 1332 | "kinds": [ 1333 | "ATCredentialType" 1334 | ], 1335 | "properties": { 1336 | "cloud": "false", 1337 | "description": "", 1338 | "field_account_type": "string", 1339 | "field_api_key_secret": "true", 1340 | "field_api_key_type": "string", 1341 | "field_cacert_type": "string", 1342 | "field_url_type": "string", 1343 | "field_username_type": "string", 1344 | "fields_required": "url, api_key, account, username", 1345 | "id": "26", 1346 | "kubernetes": "false", 1347 | "managed": "true", 1348 | "name": "CyberArk Conjur Secrets Manager Lookup", 1349 | "namespace": "conjur", 1350 | "url": "/api/v2/credential_types/26/" 1351 | } 1352 | }, 1353 | { 1354 | "id": "8ae55a854ca9d757bea60af843503cee796c6526", 1355 | "kinds": [ 1356 | "ATCredentialType" 1357 | ], 1358 | "properties": { 1359 | "cloud": "false", 1360 | "description": "", 1361 | "field_password_secret": "true", 1362 | "field_password_type": "string", 1363 | "field_username_type": "string", 1364 | "fields_required": "username, password", 1365 | "id": "14", 1366 | "injector_env_INSIGHTS_PASSWORD": "{{password}}", 1367 | "injector_env_INSIGHTS_USER": "{{username}}", 1368 | "injector_extra_vars_scm_password": "{{password}}", 1369 | "injector_extra_vars_scm_username": "{{username}}", 1370 | "kubernetes": "false", 1371 | "managed": "true", 1372 | "name": "Insights", 1373 | "namespace": "insights", 1374 | "url": "/api/v2/credential_types/14/" 1375 | } 1376 | }, 1377 | { 1378 | "id": "67738ab7f0671453f66af8fa6028b68b235c3281", 1379 | "kinds": [ 1380 | "ATCredentialType" 1381 | ], 1382 | "properties": { 1383 | "cloud": "false", 1384 | "description": "", 1385 | "field_password_secret": "true", 1386 | "field_password_type": "string", 1387 | "field_ssh_key_data_secret": "true", 1388 | "field_ssh_key_data_type": "string", 1389 | "field_ssh_key_unlock_secret": "true", 1390 | "field_ssh_key_unlock_type": "string", 1391 | "field_username_type": "string", 1392 | "fields_required": "", 1393 | "id": "2", 1394 | "kubernetes": "false", 1395 | "managed": "true", 1396 | "name": "Source Control", 1397 | "namespace": "scm", 1398 | "url": "/api/v2/credential_types/2/" 1399 | } 1400 | }, 1401 | { 1402 | "id": "e560df7f9f46529c6cd737d4f2476abd2dca387e", 1403 | "kinds": [ 1404 | "ATCredentialType" 1405 | ], 1406 | "properties": { 1407 | "cloud": "false", 1408 | "description": "", 1409 | "field_vault_id_help": "Specify an (optional) Vault ID. This is equivalent to specifying the --vault-id Ansible parameter for providing multiple Vault passwords. Note: this feature only works in Ansible 2.4+.", 1410 | "field_vault_id_type": "string", 1411 | "field_vault_password_secret": "true", 1412 | "field_vault_password_type": "string", 1413 | "fields_required": "vault_password", 1414 | "id": "3", 1415 | "kubernetes": "false", 1416 | "managed": "true", 1417 | "name": "Vault", 1418 | "namespace": "vault", 1419 | "url": "/api/v2/credential_types/3/" 1420 | } 1421 | }, 1422 | { 1423 | "id": "ff1c27b8fcc114efc772b7e64e6d7d17a1d6e91e", 1424 | "kinds": [ 1425 | "ATCredentialType" 1426 | ], 1427 | "properties": { 1428 | "cloud": "false", 1429 | "description": "", 1430 | "field_password_secret": "true", 1431 | "field_password_type": "string", 1432 | "field_security_token_help": "Security Token Service (STS) is a web service that enables you to request temporary, limited-privilege credentials for AWS Identity and Access Management (IAM) users.", 1433 | "field_security_token_secret": "true", 1434 | "field_security_token_type": "string", 1435 | "field_username_type": "string", 1436 | "fields_required": "username, password", 1437 | "id": "5", 1438 | "kubernetes": "false", 1439 | "managed": "true", 1440 | "name": "Amazon Web Services", 1441 | "namespace": "aws", 1442 | "url": "/api/v2/credential_types/5/" 1443 | } 1444 | }, 1445 | { 1446 | "id": "2b191c8ce419ee612e507285b6704e33ab329d60", 1447 | "kinds": [ 1448 | "ATCredentialType" 1449 | ], 1450 | "properties": { 1451 | "cloud": "false", 1452 | "description": "", 1453 | "field_client_type": "string", 1454 | "field_cloud_environment_help": "Environment variable AZURE_CLOUD_ENVIRONMENT when using Azure GovCloud or Azure stack.", 1455 | "field_cloud_environment_type": "string", 1456 | "field_password_secret": "true", 1457 | "field_password_type": "string", 1458 | "field_secret_secret": "true", 1459 | "field_secret_type": "string", 1460 | "field_subscription_help": "Subscription ID is an Azure construct, which is mapped to a username.", 1461 | "field_subscription_type": "string", 1462 | "field_tenant_type": "string", 1463 | "field_username_type": "string", 1464 | "fields_required": "subscription", 1465 | "id": "10", 1466 | "kubernetes": "false", 1467 | "managed": "true", 1468 | "name": "Microsoft Azure Resource Manager", 1469 | "namespace": "azure_rm", 1470 | "url": "/api/v2/credential_types/10/" 1471 | } 1472 | }, 1473 | { 1474 | "id": "dcac3b056d4fb5cb13620d17343be26810aeaeec", 1475 | "kinds": [ 1476 | "ATCredentialType" 1477 | ], 1478 | "properties": { 1479 | "cloud": "false", 1480 | "description": "", 1481 | "field_ca_file_help": "Absolute file path to the CA file to use (optional)", 1482 | "field_ca_file_type": "string", 1483 | "field_host_help": "The host to authenticate with.", 1484 | "field_host_type": "string", 1485 | "field_password_secret": "true", 1486 | "field_password_type": "string", 1487 | "field_username_type": "string", 1488 | "fields_required": "host, username, password", 1489 | "id": "15", 1490 | "injector_env_OVIRT_INI_PATH": "{{tower.filename}}", 1491 | "injector_env_OVIRT_PASSWORD": "{{password}}", 1492 | "injector_env_OVIRT_URL": "{{host}}", 1493 | "injector_env_OVIRT_USERNAME": "{{username}}", 1494 | "injector_file_template": "[ovirt]\novirt_url={{host}}\novirt_username={{username}}\novirt_password={{password}}\n{% if ca_file %}ovirt_ca_file={{ca_file}}{% endif %}", 1495 | "kubernetes": "false", 1496 | "managed": "true", 1497 | "name": "Red Hat Virtualization", 1498 | "namespace": "rhv", 1499 | "url": "/api/v2/credential_types/15/" 1500 | } 1501 | }, 1502 | { 1503 | "id": "468f3903c7dcf98739104d43fd262385a0bbfc1d", 1504 | "kinds": [ 1505 | "ATCredentialType" 1506 | ], 1507 | "properties": { 1508 | "cloud": "false", 1509 | "description": "", 1510 | "field_app_id_secret": "true", 1511 | "field_app_id_type": "string", 1512 | "field_client_cert_secret": "true", 1513 | "field_client_cert_type": "string", 1514 | "field_client_key_secret": "true", 1515 | "field_client_key_type": "string", 1516 | "field_url_type": "string", 1517 | "field_verify_type": "boolean", 1518 | "field_webservice_id_help": "The CCP Web Service ID. Leave blank to default to AIMWebService.", 1519 | "field_webservice_id_type": "string", 1520 | "fields_required": "url, app_id, object_query", 1521 | "id": "22", 1522 | "kubernetes": "false", 1523 | "managed": "true", 1524 | "name": "CyberArk Central Credential Provider Lookup", 1525 | "namespace": "aim", 1526 | "url": "/api/v2/credential_types/22/" 1527 | } 1528 | }, 1529 | { 1530 | "id": "168cf0d00417260b5ebd8e725c11a86e644da8e7", 1531 | "kinds": [ 1532 | "ATCredentialType" 1533 | ], 1534 | "properties": { 1535 | "cloud": "false", 1536 | "description": "", 1537 | "field_become_method_help": "Specify a method for \"become\" operations. This is equivalent to specifying the --become-method Ansible parameter.", 1538 | "field_become_method_type": "string", 1539 | "field_become_password_secret": "true", 1540 | "field_become_password_type": "string", 1541 | "field_become_username_type": "string", 1542 | "field_password_secret": "true", 1543 | "field_password_type": "string", 1544 | "field_ssh_key_data_secret": "true", 1545 | "field_ssh_key_data_type": "string", 1546 | "field_ssh_key_unlock_secret": "true", 1547 | "field_ssh_key_unlock_type": "string", 1548 | "field_ssh_public_key_data_secret": "true", 1549 | "field_ssh_public_key_data_type": "string", 1550 | "field_username_type": "string", 1551 | "fields_required": "", 1552 | "id": "1", 1553 | "kubernetes": "false", 1554 | "managed": "true", 1555 | "name": "Machine", 1556 | "namespace": "ssh", 1557 | "url": "/api/v2/credential_types/1/" 1558 | } 1559 | }, 1560 | { 1561 | "id": "2ec5aba4ba8e940b49b3fad83f98b59214093931", 1562 | "kinds": [ 1563 | "ATCredentialType" 1564 | ], 1565 | "properties": { 1566 | "cloud": "false", 1567 | "description": "", 1568 | "field_host_help": "Enter the URL that corresponds to your Red Hat Satellite 6 server. For example, https://satellite.example.org", 1569 | "field_host_type": "string", 1570 | "field_password_secret": "true", 1571 | "field_password_type": "string", 1572 | "field_username_type": "string", 1573 | "fields_required": "host, username, password", 1574 | "id": "8", 1575 | "kubernetes": "false", 1576 | "managed": "true", 1577 | "name": "Red Hat Satellite 6", 1578 | "namespace": "satellite6", 1579 | "url": "/api/v2/credential_types/8/" 1580 | } 1581 | }, 1582 | { 1583 | "id": "b88579ef6bc253837b4816479daea5b810cecab8", 1584 | "kinds": [ 1585 | "ATCredentialType" 1586 | ], 1587 | "properties": { 1588 | "cloud": "false", 1589 | "description": "", 1590 | "field_authorize_password_secret": "true", 1591 | "field_authorize_password_type": "string", 1592 | "field_authorize_type": "boolean", 1593 | "field_password_secret": "true", 1594 | "field_password_type": "string", 1595 | "field_ssh_key_data_secret": "true", 1596 | "field_ssh_key_data_type": "string", 1597 | "field_ssh_key_unlock_secret": "true", 1598 | "field_ssh_key_unlock_type": "string", 1599 | "field_username_type": "string", 1600 | "fields_required": "username", 1601 | "id": "4", 1602 | "kubernetes": "false", 1603 | "managed": "true", 1604 | "name": "Network", 1605 | "namespace": "net", 1606 | "url": "/api/v2/credential_types/4/" 1607 | } 1608 | }, 1609 | { 1610 | "id": "b19f8010f1a6d2722e5c260daa61e8162b12f814", 1611 | "kinds": [ 1612 | "ATCredentialType" 1613 | ], 1614 | "properties": { 1615 | "cloud": "false", 1616 | "description": "", 1617 | "field_host_help": "Authentication endpoint for the container registry.", 1618 | "field_host_type": "string", 1619 | "field_password_help": "A password or token used to authenticate with", 1620 | "field_password_secret": "true", 1621 | "field_password_type": "string", 1622 | "field_username_type": "string", 1623 | "field_verify_ssl_type": "boolean", 1624 | "fields_required": "host", 1625 | "id": "18", 1626 | "kubernetes": "false", 1627 | "managed": "true", 1628 | "name": "Container Registry", 1629 | "namespace": "registry", 1630 | "url": "/api/v2/credential_types/18/" 1631 | } 1632 | }, 1633 | { 1634 | "id": "f822a2ee8b41e61a8d097280fb51ccbe6c438776", 1635 | "kinds": [ 1636 | "ATCredentialType" 1637 | ], 1638 | "properties": { 1639 | "cloud": "false", 1640 | "description": "", 1641 | "field_kek_secret": "true", 1642 | "field_kek_type": "string", 1643 | "fields_required": "kek", 1644 | "id": "31", 1645 | "kubernetes": "false", 1646 | "managed": "false", 1647 | "name": "test", 1648 | "namespace": "", 1649 | "url": "/api/v2/credential_types/31/" 1650 | } 1651 | }, 1652 | { 1653 | "id": "f311cebf6998af263cf55cad095333fe979014ca", 1654 | "kinds": [ 1655 | "ATCredentialType" 1656 | ], 1657 | "properties": { 1658 | "cloud": "false", 1659 | "description": "", 1660 | "field_gpg_public_key_help": "GPG Public Key used to validate content signatures.", 1661 | "field_gpg_public_key_secret": "true", 1662 | "field_gpg_public_key_type": "string", 1663 | "fields_required": "gpg_public_key", 1664 | "id": "20", 1665 | "kubernetes": "false", 1666 | "managed": "true", 1667 | "name": "GPG Public Key", 1668 | "namespace": "gpg_public_key", 1669 | "url": "/api/v2/credential_types/20/" 1670 | } 1671 | }, 1672 | { 1673 | "id": "81531b65f49fae9207a63604c56a8703b62bf3f0", 1674 | "kinds": [ 1675 | "ATCredentialType" 1676 | ], 1677 | "properties": { 1678 | "cloud": "false", 1679 | "description": "", 1680 | "field_aws_access_key_type": "string", 1681 | "field_aws_secret_key_secret": "true", 1682 | "field_aws_secret_key_type": "string", 1683 | "fields_required": "aws_access_key, aws_secret_key, region_name, secret_name", 1684 | "id": "23", 1685 | "kubernetes": "false", 1686 | "managed": "true", 1687 | "name": "AWS Secrets Manager lookup", 1688 | "namespace": "aws_secretsmanager_credential", 1689 | "url": "/api/v2/credential_types/23/" 1690 | } 1691 | }, 1692 | { 1693 | "id": "4b45f8b98271be0f66f0d9a60ff7fc11b2adec9c", 1694 | "kinds": [ 1695 | "ATCredentialType" 1696 | ], 1697 | "properties": { 1698 | "cloud": "false", 1699 | "description": "", 1700 | "field_client_id_type": "string", 1701 | "field_client_secret_secret": "true", 1702 | "field_client_secret_type": "string", 1703 | "field_tenant_help": "The tenant e.g. \"ex\" when the URL is https://ex.secretsvaultcloud.com", 1704 | "field_tenant_type": "string", 1705 | "field_tld_help": "The TLD of the tenant e.g. \"com\" when the URL is https://ex.secretsvaultcloud.com", 1706 | "fields_required": "tenant, client_id, client_secret, path, secret_field, secret_decoding", 1707 | "id": "29", 1708 | "kubernetes": "false", 1709 | "managed": "true", 1710 | "name": "Thycotic DevOps Secrets Vault", 1711 | "namespace": "thycotic_dsv", 1712 | "url": "/api/v2/credential_types/29/" 1713 | } 1714 | }, 1715 | { 1716 | "id": "dfa6868df3fc444f07d602eac2d59af01d948d96", 1717 | "kinds": [ 1718 | "ATCredentialType" 1719 | ], 1720 | "properties": { 1721 | "cloud": "false", 1722 | "description": "", 1723 | "field_auth_url_help": "The URL of a Keycloak server token_endpoint, if using SSO auth.", 1724 | "field_auth_url_type": "string", 1725 | "field_token_help": "A token to use for authentication against the Galaxy instance.", 1726 | "field_token_secret": "true", 1727 | "field_token_type": "string", 1728 | "field_url_help": "The URL of the Galaxy instance to connect to.", 1729 | "field_url_type": "string", 1730 | "fields_required": "url", 1731 | "id": "19", 1732 | "kubernetes": "false", 1733 | "managed": "true", 1734 | "name": "Ansible Galaxy/Automation Hub API Token", 1735 | "namespace": "galaxy_api_token", 1736 | "url": "/api/v2/credential_types/19/" 1737 | } 1738 | }, 1739 | { 1740 | "id": "2e273ca9f9a60387abacfc676c86d2049073eeec", 1741 | "kinds": [ 1742 | "ATCredentialType" 1743 | ], 1744 | "properties": { 1745 | "cloud": "false", 1746 | "description": "", 1747 | "field_bearer_token_secret": "true", 1748 | "field_bearer_token_type": "string", 1749 | "field_host_help": "The OpenShift or Kubernetes API Endpoint to authenticate with.", 1750 | "field_host_type": "string", 1751 | "field_ssl_ca_cert_secret": "true", 1752 | "field_ssl_ca_cert_type": "string", 1753 | "field_verify_ssl_type": "boolean", 1754 | "fields_required": "host, bearer_token", 1755 | "id": "17", 1756 | "kubernetes": "false", 1757 | "managed": "true", 1758 | "name": "OpenShift or Kubernetes API Bearer Token", 1759 | "namespace": "kubernetes_bearer_token", 1760 | "url": "/api/v2/credential_types/17/" 1761 | } 1762 | }, 1763 | { 1764 | "id": "02d7de3ac095241d5085b3fd178d67512097fcb3", 1765 | "kinds": [ 1766 | "ATProject" 1767 | ], 1768 | "properties": { 1769 | "allow_override": "false", 1770 | "credential": "0", 1771 | "custom_virtualenv": "", 1772 | "default_environment": "0", 1773 | "description": "", 1774 | "id": "87", 1775 | "last_job_failed": "false", 1776 | "last_job_run": "2025-07-30T19:14:30.248480Z", 1777 | "last_update": "2025-07-30T19:14:30.248480Z", 1778 | "last_update_failed": "false", 1779 | "local_path": "_87__projectb", 1780 | "name": "DEPLOY", 1781 | "next_job_run": "", 1782 | "organization": "15", 1783 | "scm_branch": "", 1784 | "scm_clean": "false", 1785 | "scm_delete_on_update": "false", 1786 | "scm_ref_spec": "", 1787 | "scm_revision": "42c93829ab9f566db2a05e5e2444279f697549a5", 1788 | "scm_track_submodules": "false", 1789 | "scm_type": "git", 1790 | "scm_update_cache_timeout": "0", 1791 | "scm_update_on_launch": "false", 1792 | "scm_url": "https://github.com/ansible/tower-example", 1793 | "signature_validation_credential": "0", 1794 | "status": "successful", 1795 | "timeout": "0", 1796 | "url": "/api/v2/projects/87/" 1797 | } 1798 | }, 1799 | { 1800 | "id": "ca312f6080a788380fed0e55f630eacad4d176de", 1801 | "kinds": [ 1802 | "ATProject" 1803 | ], 1804 | "properties": { 1805 | "allow_override": "false", 1806 | "credential": "0", 1807 | "custom_virtualenv": "", 1808 | "default_environment": "0", 1809 | "description": "", 1810 | "id": "88", 1811 | "last_job_failed": "false", 1812 | "last_job_run": "2025-07-30T19:14:44.340132Z", 1813 | "last_update": "2025-07-30T19:14:44.340132Z", 1814 | "last_update_failed": "false", 1815 | "local_path": "_88__projectc", 1816 | "name": "BACKUP", 1817 | "next_job_run": "", 1818 | "organization": "15", 1819 | "scm_branch": "", 1820 | "scm_clean": "false", 1821 | "scm_delete_on_update": "false", 1822 | "scm_ref_spec": "", 1823 | "scm_revision": "42c93829ab9f566db2a05e5e2444279f697549a5", 1824 | "scm_track_submodules": "false", 1825 | "scm_type": "git", 1826 | "scm_update_cache_timeout": "0", 1827 | "scm_update_on_launch": "false", 1828 | "scm_url": "https://github.com/ansible/tower-example", 1829 | "signature_validation_credential": "0", 1830 | "status": "successful", 1831 | "timeout": "0", 1832 | "url": "/api/v2/projects/88/" 1833 | } 1834 | }, 1835 | { 1836 | "id": "c8a09945d2bfda16eb4c2b1e1ec0ad5170fab31e", 1837 | "kinds": [ 1838 | "ATTeam" 1839 | ], 1840 | "properties": { 1841 | "created": "2025-07-30T19:07:16.266198Z", 1842 | "description": "", 1843 | "id": "4", 1844 | "modified": "2025-07-30T19:07:16.266205Z", 1845 | "name": "Ansible Support", 1846 | "type": "team", 1847 | "url": "/api/v2/teams/4/" 1848 | } 1849 | }, 1850 | { 1851 | "id": "2b4d3f313efb4bae5a6a991c7c487ab8914b415f", 1852 | "kinds": [ 1853 | "ATTeam" 1854 | ], 1855 | "properties": { 1856 | "created": "2025-07-30T19:03:17.569550Z", 1857 | "description": "", 1858 | "id": "2", 1859 | "modified": "2025-07-30T19:06:53.858578Z", 1860 | "name": "Dev", 1861 | "type": "team", 1862 | "url": "/api/v2/teams/2/" 1863 | } 1864 | }, 1865 | { 1866 | "id": "005bca8511d340c0d35f87ba277f5b832311ed2c", 1867 | "kinds": [ 1868 | "ATTeam" 1869 | ], 1870 | "properties": { 1871 | "created": "2025-07-30T19:05:45.564916Z", 1872 | "description": "", 1873 | "id": "3", 1874 | "modified": "2025-07-30T19:05:51.105328Z", 1875 | "name": "Collaborator", 1876 | "type": "team", 1877 | "url": "/api/v2/teams/3/" 1878 | } 1879 | } 1880 | ], 1881 | "edges": [ 1882 | { 1883 | "kind": "ATContains", 1884 | "start": { 1885 | "value": "7a32916c0776a53db125ac371721a2ef6aee473b", 1886 | "match_by": "id" 1887 | }, 1888 | "end": { 1889 | "value": "17b5f0743c31cc14dfcb9d46a637fe5dcf1f9396", 1890 | "match_by": "id" 1891 | } 1892 | }, 1893 | { 1894 | "kind": "ATContains", 1895 | "start": { 1896 | "value": "7a32916c0776a53db125ac371721a2ef6aee473b", 1897 | "match_by": "id" 1898 | }, 1899 | "end": { 1900 | "value": "41bef9871b17b4532fffbfda3768086253c4c78c", 1901 | "match_by": "id" 1902 | } 1903 | }, 1904 | { 1905 | "kind": "ATContains", 1906 | "start": { 1907 | "value": "17b5f0743c31cc14dfcb9d46a637fe5dcf1f9396", 1908 | "match_by": "id" 1909 | }, 1910 | "end": { 1911 | "value": "2f9be2650f46eef5a82821fcdcd431142b76c451", 1912 | "match_by": "id" 1913 | } 1914 | }, 1915 | { 1916 | "kind": "ATContains", 1917 | "start": { 1918 | "value": "41bef9871b17b4532fffbfda3768086253c4c78c", 1919 | "match_by": "id" 1920 | }, 1921 | "end": { 1922 | "value": "59b3eb42485dad9f98009b91bb06711f7e3157f5", 1923 | "match_by": "id" 1924 | } 1925 | }, 1926 | { 1927 | "kind": "ATContains", 1928 | "start": { 1929 | "value": "2f9be2650f46eef5a82821fcdcd431142b76c451", 1930 | "match_by": "id" 1931 | }, 1932 | "end": { 1933 | "value": "c2182531cc464ae5e836e6ef0a1a88870b251b6c", 1934 | "match_by": "id" 1935 | } 1936 | }, 1937 | { 1938 | "kind": "ATContains", 1939 | "start": { 1940 | "value": "2f9be2650f46eef5a82821fcdcd431142b76c451", 1941 | "match_by": "id" 1942 | }, 1943 | "end": { 1944 | "value": "219e3bd4dfe45e4ae43bfd421fc317dedc3e8831", 1945 | "match_by": "id" 1946 | } 1947 | }, 1948 | { 1949 | "kind": "ATContains", 1950 | "start": { 1951 | "value": "59b3eb42485dad9f98009b91bb06711f7e3157f5", 1952 | "match_by": "id" 1953 | }, 1954 | "end": { 1955 | "value": "28824c822cbbfb047e77c5b743c2e72c7f3de9cb", 1956 | "match_by": "id" 1957 | } 1958 | }, 1959 | { 1960 | "kind": "ATContains", 1961 | "start": { 1962 | "value": "59b3eb42485dad9f98009b91bb06711f7e3157f5", 1963 | "match_by": "id" 1964 | }, 1965 | "end": { 1966 | "value": "61c56a6e232280b9d37e0e7cd4dc3feb8118de1e", 1967 | "match_by": "id" 1968 | } 1969 | }, 1970 | { 1971 | "kind": "ATContains", 1972 | "start": { 1973 | "value": "59b3eb42485dad9f98009b91bb06711f7e3157f5", 1974 | "match_by": "id" 1975 | }, 1976 | "end": { 1977 | "value": "c7e72c4a8935d660ce8f2e2311c3c1795b60c009", 1978 | "match_by": "id" 1979 | } 1980 | }, 1981 | { 1982 | "kind": "ATContains", 1983 | "start": { 1984 | "value": "59b3eb42485dad9f98009b91bb06711f7e3157f5", 1985 | "match_by": "id" 1986 | }, 1987 | "end": { 1988 | "value": "05ab1c0ff989862c0190447f698cf02a05542d72", 1989 | "match_by": "id" 1990 | } 1991 | }, 1992 | { 1993 | "kind": "ATContains", 1994 | "start": { 1995 | "value": "59b3eb42485dad9f98009b91bb06711f7e3157f5", 1996 | "match_by": "id" 1997 | }, 1998 | "end": { 1999 | "value": "6b6103a6f1264e0691765160d0d77c631221029e", 2000 | "match_by": "id" 2001 | } 2002 | }, 2003 | { 2004 | "kind": "ATContains", 2005 | "start": { 2006 | "value": "05ab1c0ff989862c0190447f698cf02a05542d72", 2007 | "match_by": "id" 2008 | }, 2009 | "end": { 2010 | "value": "c7e72c4a8935d660ce8f2e2311c3c1795b60c009", 2011 | "match_by": "id" 2012 | } 2013 | }, 2014 | { 2015 | "kind": "ATContains", 2016 | "start": { 2017 | "value": "6b6103a6f1264e0691765160d0d77c631221029e", 2018 | "match_by": "id" 2019 | }, 2020 | "end": { 2021 | "value": "28824c822cbbfb047e77c5b743c2e72c7f3de9cb", 2022 | "match_by": "id" 2023 | } 2024 | }, 2025 | { 2026 | "kind": "ATContains", 2027 | "start": { 2028 | "value": "6b6103a6f1264e0691765160d0d77c631221029e", 2029 | "match_by": "id" 2030 | }, 2031 | "end": { 2032 | "value": "61c56a6e232280b9d37e0e7cd4dc3feb8118de1e", 2033 | "match_by": "id" 2034 | } 2035 | }, 2036 | { 2037 | "kind": "ATContains", 2038 | "start": { 2039 | "value": "4f52a300bb5c02f66853e2fb2ff978e5a6757836", 2040 | "match_by": "id" 2041 | }, 2042 | "end": { 2043 | "value": "3024d461aec4c4f22df80ffa145909b123e1ae9c", 2044 | "match_by": "id" 2045 | } 2046 | }, 2047 | { 2048 | "kind": "ATContains", 2049 | "start": { 2050 | "value": "7c2118b527eac71c4d2a8cf9686e3cbc2ce9fe34", 2051 | "match_by": "id" 2052 | }, 2053 | "end": { 2054 | "value": "5bbdf2e6490ba72bf8d2cf95f3f0cd9c95f001d8", 2055 | "match_by": "id" 2056 | } 2057 | }, 2058 | { 2059 | "kind": "ATContains", 2060 | "start": { 2061 | "value": "41bef9871b17b4532fffbfda3768086253c4c78c", 2062 | "match_by": "id" 2063 | }, 2064 | "end": { 2065 | "value": "783ca43e4a7b5b23f796f29cf5bb11dcde67f375", 2066 | "match_by": "id" 2067 | } 2068 | }, 2069 | { 2070 | "kind": "ATContains", 2071 | "start": { 2072 | "value": "17b5f0743c31cc14dfcb9d46a637fe5dcf1f9396", 2073 | "match_by": "id" 2074 | }, 2075 | "end": { 2076 | "value": "594bb965968920d3af722e2e5a73e17a1dc71318", 2077 | "match_by": "id" 2078 | } 2079 | }, 2080 | { 2081 | "kind": "ATContains", 2082 | "start": { 2083 | "value": "41bef9871b17b4532fffbfda3768086253c4c78c", 2084 | "match_by": "id" 2085 | }, 2086 | "end": { 2087 | "value": "381f90fde10f3f53614041fd43fd63b36db18994", 2088 | "match_by": "id" 2089 | } 2090 | }, 2091 | { 2092 | "kind": "ATContains", 2093 | "start": { 2094 | "value": "17b5f0743c31cc14dfcb9d46a637fe5dcf1f9396", 2095 | "match_by": "id" 2096 | }, 2097 | "end": { 2098 | "value": "d1d869457af3e25fb27e83da9dee46e77cab165c", 2099 | "match_by": "id" 2100 | } 2101 | }, 2102 | { 2103 | "kind": "ATContains", 2104 | "start": { 2105 | "value": "17b5f0743c31cc14dfcb9d46a637fe5dcf1f9396", 2106 | "match_by": "id" 2107 | }, 2108 | "end": { 2109 | "value": "4f52a300bb5c02f66853e2fb2ff978e5a6757836", 2110 | "match_by": "id" 2111 | } 2112 | }, 2113 | { 2114 | "kind": "ATContains", 2115 | "start": { 2116 | "value": "17b5f0743c31cc14dfcb9d46a637fe5dcf1f9396", 2117 | "match_by": "id" 2118 | }, 2119 | "end": { 2120 | "value": "2269964c910971bd3c23c847a2487314222ac117", 2121 | "match_by": "id" 2122 | } 2123 | }, 2124 | { 2125 | "kind": "ATContains", 2126 | "start": { 2127 | "value": "41bef9871b17b4532fffbfda3768086253c4c78c", 2128 | "match_by": "id" 2129 | }, 2130 | "end": { 2131 | "value": "7c2118b527eac71c4d2a8cf9686e3cbc2ce9fe34", 2132 | "match_by": "id" 2133 | } 2134 | }, 2135 | { 2136 | "kind": "ATContains", 2137 | "start": { 2138 | "value": "41bef9871b17b4532fffbfda3768086253c4c78c", 2139 | "match_by": "id" 2140 | }, 2141 | "end": { 2142 | "value": "381f90fde10f3f53614041fd43fd63b36db18994", 2143 | "match_by": "id" 2144 | } 2145 | }, 2146 | { 2147 | "kind": "ATContains", 2148 | "start": { 2149 | "value": "17b5f0743c31cc14dfcb9d46a637fe5dcf1f9396", 2150 | "match_by": "id" 2151 | }, 2152 | "end": { 2153 | "value": "2269964c910971bd3c23c847a2487314222ac117", 2154 | "match_by": "id" 2155 | } 2156 | }, 2157 | { 2158 | "kind": "ATContains", 2159 | "start": { 2160 | "value": "17b5f0743c31cc14dfcb9d46a637fe5dcf1f9396", 2161 | "match_by": "id" 2162 | }, 2163 | "end": { 2164 | "value": "d1d869457af3e25fb27e83da9dee46e77cab165c", 2165 | "match_by": "id" 2166 | } 2167 | }, 2168 | { 2169 | "kind": "ATContains", 2170 | "start": { 2171 | "value": "41bef9871b17b4532fffbfda3768086253c4c78c", 2172 | "match_by": "id" 2173 | }, 2174 | "end": { 2175 | "value": "2ecf986fa3a26d3984e2d123ef345b6617ab9b96", 2176 | "match_by": "id" 2177 | } 2178 | }, 2179 | { 2180 | "kind": "ATContains", 2181 | "start": { 2182 | "value": "41bef9871b17b4532fffbfda3768086253c4c78c", 2183 | "match_by": "id" 2184 | }, 2185 | "end": { 2186 | "value": "11c6d92c8c1ad62649584e6289d93dfdcf9e860f", 2187 | "match_by": "id" 2188 | } 2189 | }, 2190 | { 2191 | "kind": "ATContains", 2192 | "start": { 2193 | "value": "41bef9871b17b4532fffbfda3768086253c4c78c", 2194 | "match_by": "id" 2195 | }, 2196 | "end": { 2197 | "value": "5de872773808ad07583e05324946670532f8df26", 2198 | "match_by": "id" 2199 | } 2200 | }, 2201 | { 2202 | "kind": "ATContains", 2203 | "start": { 2204 | "value": "17b5f0743c31cc14dfcb9d46a637fe5dcf1f9396", 2205 | "match_by": "id" 2206 | }, 2207 | "end": { 2208 | "value": "1cf66f5039ea5ba3042721702eba7db3852798da", 2209 | "match_by": "id" 2210 | } 2211 | }, 2212 | { 2213 | "kind": "ATContains", 2214 | "start": { 2215 | "value": "41bef9871b17b4532fffbfda3768086253c4c78c", 2216 | "match_by": "id" 2217 | }, 2218 | "end": { 2219 | "value": "02d7de3ac095241d5085b3fd178d67512097fcb3", 2220 | "match_by": "id" 2221 | } 2222 | }, 2223 | { 2224 | "kind": "ATContains", 2225 | "start": { 2226 | "value": "41bef9871b17b4532fffbfda3768086253c4c78c", 2227 | "match_by": "id" 2228 | }, 2229 | "end": { 2230 | "value": "ca312f6080a788380fed0e55f630eacad4d176de", 2231 | "match_by": "id" 2232 | } 2233 | }, 2234 | { 2235 | "kind": "ATUses", 2236 | "start": { 2237 | "value": "4f52a300bb5c02f66853e2fb2ff978e5a6757836", 2238 | "match_by": "id" 2239 | }, 2240 | "end": { 2241 | "value": "1cf66f5039ea5ba3042721702eba7db3852798da", 2242 | "match_by": "id" 2243 | } 2244 | }, 2245 | { 2246 | "kind": "ATUses", 2247 | "start": { 2248 | "value": "7c2118b527eac71c4d2a8cf9686e3cbc2ce9fe34", 2249 | "match_by": "id" 2250 | }, 2251 | "end": { 2252 | "value": "02d7de3ac095241d5085b3fd178d67512097fcb3", 2253 | "match_by": "id" 2254 | } 2255 | }, 2256 | { 2257 | "kind": "ATUses", 2258 | "start": { 2259 | "value": "783ca43e4a7b5b23f796f29cf5bb11dcde67f375", 2260 | "match_by": "id" 2261 | }, 2262 | "end": { 2263 | "value": "ca312f6080a788380fed0e55f630eacad4d176de", 2264 | "match_by": "id" 2265 | } 2266 | }, 2267 | { 2268 | "kind": "ATUses", 2269 | "start": { 2270 | "value": "783ca43e4a7b5b23f796f29cf5bb11dcde67f375", 2271 | "match_by": "id" 2272 | }, 2273 | "end": { 2274 | "value": "59b3eb42485dad9f98009b91bb06711f7e3157f5", 2275 | "match_by": "id" 2276 | } 2277 | }, 2278 | { 2279 | "kind": "ATUses", 2280 | "start": { 2281 | "value": "4f52a300bb5c02f66853e2fb2ff978e5a6757836", 2282 | "match_by": "id" 2283 | }, 2284 | "end": { 2285 | "value": "2f9be2650f46eef5a82821fcdcd431142b76c451", 2286 | "match_by": "id" 2287 | } 2288 | }, 2289 | { 2290 | "kind": "ATUses", 2291 | "start": { 2292 | "value": "7c2118b527eac71c4d2a8cf9686e3cbc2ce9fe34", 2293 | "match_by": "id" 2294 | }, 2295 | "end": { 2296 | "value": "59b3eb42485dad9f98009b91bb06711f7e3157f5", 2297 | "match_by": "id" 2298 | } 2299 | }, 2300 | { 2301 | "kind": "ATUses", 2302 | "start": { 2303 | "value": "783ca43e4a7b5b23f796f29cf5bb11dcde67f375", 2304 | "match_by": "id" 2305 | }, 2306 | "end": { 2307 | "value": "59b3eb42485dad9f98009b91bb06711f7e3157f5", 2308 | "match_by": "id" 2309 | } 2310 | }, 2311 | { 2312 | "kind": "ATUsesType", 2313 | "start": { 2314 | "value": "381f90fde10f3f53614041fd43fd63b36db18994", 2315 | "match_by": "id" 2316 | }, 2317 | "end": { 2318 | "value": "168cf0d00417260b5ebd8e725c11a86e644da8e7", 2319 | "match_by": "id" 2320 | } 2321 | }, 2322 | { 2323 | "kind": "ATUsesType", 2324 | "start": { 2325 | "value": "d1d869457af3e25fb27e83da9dee46e77cab165c", 2326 | "match_by": "id" 2327 | }, 2328 | "end": { 2329 | "value": "ac03cc867b3636a9eba4b1191c50f2183902d114", 2330 | "match_by": "id" 2331 | } 2332 | }, 2333 | { 2334 | "kind": "ATUsesType", 2335 | "start": { 2336 | "value": "9696d536ff2eb09768090f629e4b303289125ae0", 2337 | "match_by": "id" 2338 | }, 2339 | "end": { 2340 | "value": "3515f82637bdedd5242cdfc5c16a4b4026eb6616", 2341 | "match_by": "id" 2342 | } 2343 | }, 2344 | { 2345 | "kind": "ATUsesType", 2346 | "start": { 2347 | "value": "2ecf986fa3a26d3984e2d123ef345b6617ab9b96", 2348 | "match_by": "id" 2349 | }, 2350 | "end": { 2351 | "value": "168cf0d00417260b5ebd8e725c11a86e644da8e7", 2352 | "match_by": "id" 2353 | } 2354 | }, 2355 | { 2356 | "kind": "ATUsesType", 2357 | "start": { 2358 | "value": "626618b124bb6e6349428db214ce9133aa8a64af", 2359 | "match_by": "id" 2360 | }, 2361 | "end": { 2362 | "value": "8cefca1141f8d059dbd1afb7e2b9692ab649ecd4", 2363 | "match_by": "id" 2364 | } 2365 | }, 2366 | { 2367 | "kind": "ATUsesType", 2368 | "start": { 2369 | "value": "347a6efeeaa70b969c7bf5cb8c7cbc0861c98d46", 2370 | "match_by": "id" 2371 | }, 2372 | "end": { 2373 | "value": "dfa6868df3fc444f07d602eac2d59af01d948d96", 2374 | "match_by": "id" 2375 | } 2376 | }, 2377 | { 2378 | "kind": "ATUsesType", 2379 | "start": { 2380 | "value": "2269964c910971bd3c23c847a2487314222ac117", 2381 | "match_by": "id" 2382 | }, 2383 | "end": { 2384 | "value": "168cf0d00417260b5ebd8e725c11a86e644da8e7", 2385 | "match_by": "id" 2386 | } 2387 | }, 2388 | { 2389 | "kind": "ATUsesType", 2390 | "start": { 2391 | "value": "11c6d92c8c1ad62649584e6289d93dfdcf9e860f", 2392 | "match_by": "id" 2393 | }, 2394 | "end": { 2395 | "value": "e560df7f9f46529c6cd737d4f2476abd2dca387e", 2396 | "match_by": "id" 2397 | } 2398 | }, 2399 | { 2400 | "kind": "ATUsesType", 2401 | "start": { 2402 | "value": "5de872773808ad07583e05324946670532f8df26", 2403 | "match_by": "id" 2404 | }, 2405 | "end": { 2406 | "value": "ac03cc867b3636a9eba4b1191c50f2183902d114", 2407 | "match_by": "id" 2408 | } 2409 | }, 2410 | { 2411 | "kind": "ATUses", 2412 | "start": { 2413 | "value": "783ca43e4a7b5b23f796f29cf5bb11dcde67f375", 2414 | "match_by": "id" 2415 | }, 2416 | "end": { 2417 | "value": "381f90fde10f3f53614041fd43fd63b36db18994", 2418 | "match_by": "id" 2419 | } 2420 | }, 2421 | { 2422 | "kind": "ATUses", 2423 | "start": { 2424 | "value": "4f52a300bb5c02f66853e2fb2ff978e5a6757836", 2425 | "match_by": "id" 2426 | }, 2427 | "end": { 2428 | "value": "2269964c910971bd3c23c847a2487314222ac117", 2429 | "match_by": "id" 2430 | } 2431 | }, 2432 | { 2433 | "kind": "ATUses", 2434 | "start": { 2435 | "value": "7c2118b527eac71c4d2a8cf9686e3cbc2ce9fe34", 2436 | "match_by": "id" 2437 | }, 2438 | "end": { 2439 | "value": "2ecf986fa3a26d3984e2d123ef345b6617ab9b96", 2440 | "match_by": "id" 2441 | } 2442 | }, 2443 | { 2444 | "kind": "ATMember", 2445 | "start": { 2446 | "value": "0200d454b16e5a187a9c227c9228894910aa6326", 2447 | "match_by": "id" 2448 | }, 2449 | "end": { 2450 | "value": "2b4d3f313efb4bae5a6a991c7c487ab8914b415f", 2451 | "match_by": "id" 2452 | } 2453 | }, 2454 | { 2455 | "kind": "ATMember", 2456 | "start": { 2457 | "value": "270996d0f6eba477cc9ebbab8039468a0989204e", 2458 | "match_by": "id" 2459 | }, 2460 | "end": { 2461 | "value": "41bef9871b17b4532fffbfda3768086253c4c78c", 2462 | "match_by": "id" 2463 | } 2464 | }, 2465 | { 2466 | "kind": "ATMember", 2467 | "start": { 2468 | "value": "270996d0f6eba477cc9ebbab8039468a0989204e", 2469 | "match_by": "id" 2470 | }, 2471 | "end": { 2472 | "value": "c8a09945d2bfda16eb4c2b1e1ec0ad5170fab31e", 2473 | "match_by": "id" 2474 | } 2475 | }, 2476 | { 2477 | "kind": "ATAdmin", 2478 | "start": { 2479 | "value": "270996d0f6eba477cc9ebbab8039468a0989204e", 2480 | "match_by": "id" 2481 | }, 2482 | "end": { 2483 | "value": "9696d536ff2eb09768090f629e4b303289125ae0", 2484 | "match_by": "id" 2485 | } 2486 | }, 2487 | { 2488 | "kind": "ATMember", 2489 | "start": { 2490 | "value": "85396c3ee679a094da67ed40413052db0ae930e1", 2491 | "match_by": "id" 2492 | }, 2493 | "end": { 2494 | "value": "41bef9871b17b4532fffbfda3768086253c4c78c", 2495 | "match_by": "id" 2496 | } 2497 | }, 2498 | { 2499 | "kind": "ATMember", 2500 | "start": { 2501 | "value": "85396c3ee679a094da67ed40413052db0ae930e1", 2502 | "match_by": "id" 2503 | }, 2504 | "end": { 2505 | "value": "005bca8511d340c0d35f87ba277f5b832311ed2c", 2506 | "match_by": "id" 2507 | } 2508 | }, 2509 | { 2510 | "kind": "ATExecute", 2511 | "start": { 2512 | "value": "b996409b88ef8c07d7b5c435157a3a181a95f1ed", 2513 | "match_by": "id" 2514 | }, 2515 | "end": { 2516 | "value": "783ca43e4a7b5b23f796f29cf5bb11dcde67f375", 2517 | "match_by": "id" 2518 | } 2519 | }, 2520 | { 2521 | "kind": "ATAdmin", 2522 | "start": { 2523 | "value": "b996409b88ef8c07d7b5c435157a3a181a95f1ed", 2524 | "match_by": "id" 2525 | }, 2526 | "end": { 2527 | "value": "381f90fde10f3f53614041fd43fd63b36db18994", 2528 | "match_by": "id" 2529 | } 2530 | }, 2531 | { 2532 | "kind": "ATRead", 2533 | "start": { 2534 | "value": "b996409b88ef8c07d7b5c435157a3a181a95f1ed", 2535 | "match_by": "id" 2536 | }, 2537 | "end": { 2538 | "value": "59b3eb42485dad9f98009b91bb06711f7e3157f5", 2539 | "match_by": "id" 2540 | } 2541 | }, 2542 | { 2543 | "kind": "ATMember", 2544 | "start": { 2545 | "value": "b996409b88ef8c07d7b5c435157a3a181a95f1ed", 2546 | "match_by": "id" 2547 | }, 2548 | "end": { 2549 | "value": "41bef9871b17b4532fffbfda3768086253c4c78c", 2550 | "match_by": "id" 2551 | } 2552 | }, 2553 | { 2554 | "kind": "ATExecute", 2555 | "start": { 2556 | "value": "b996409b88ef8c07d7b5c435157a3a181a95f1ed", 2557 | "match_by": "id" 2558 | }, 2559 | "end": { 2560 | "value": "783ca43e4a7b5b23f796f29cf5bb11dcde67f375", 2561 | "match_by": "id" 2562 | } 2563 | }, 2564 | { 2565 | "kind": "ATProjectAdmin", 2566 | "start": { 2567 | "value": "c8a09945d2bfda16eb4c2b1e1ec0ad5170fab31e", 2568 | "match_by": "id" 2569 | }, 2570 | "end": { 2571 | "value": "17b5f0743c31cc14dfcb9d46a637fe5dcf1f9396", 2572 | "match_by": "id" 2573 | } 2574 | }, 2575 | { 2576 | "kind": "ATInventoryAdmin", 2577 | "start": { 2578 | "value": "c8a09945d2bfda16eb4c2b1e1ec0ad5170fab31e", 2579 | "match_by": "id" 2580 | }, 2581 | "end": { 2582 | "value": "17b5f0743c31cc14dfcb9d46a637fe5dcf1f9396", 2583 | "match_by": "id" 2584 | } 2585 | }, 2586 | { 2587 | "kind": "ATCredentialAdmin", 2588 | "start": { 2589 | "value": "c8a09945d2bfda16eb4c2b1e1ec0ad5170fab31e", 2590 | "match_by": "id" 2591 | }, 2592 | "end": { 2593 | "value": "17b5f0743c31cc14dfcb9d46a637fe5dcf1f9396", 2594 | "match_by": "id" 2595 | } 2596 | }, 2597 | { 2598 | "kind": "ATJobTemplateAdmin", 2599 | "start": { 2600 | "value": "c8a09945d2bfda16eb4c2b1e1ec0ad5170fab31e", 2601 | "match_by": "id" 2602 | }, 2603 | "end": { 2604 | "value": "17b5f0743c31cc14dfcb9d46a637fe5dcf1f9396", 2605 | "match_by": "id" 2606 | } 2607 | }, 2608 | { 2609 | "kind": "ATInventoryAdmin", 2610 | "start": { 2611 | "value": "c8a09945d2bfda16eb4c2b1e1ec0ad5170fab31e", 2612 | "match_by": "id" 2613 | }, 2614 | "end": { 2615 | "value": "41bef9871b17b4532fffbfda3768086253c4c78c", 2616 | "match_by": "id" 2617 | } 2618 | }, 2619 | { 2620 | "kind": "ATCredentialAdmin", 2621 | "start": { 2622 | "value": "c8a09945d2bfda16eb4c2b1e1ec0ad5170fab31e", 2623 | "match_by": "id" 2624 | }, 2625 | "end": { 2626 | "value": "41bef9871b17b4532fffbfda3768086253c4c78c", 2627 | "match_by": "id" 2628 | } 2629 | }, 2630 | { 2631 | "kind": "ATRead", 2632 | "start": { 2633 | "value": "c8a09945d2bfda16eb4c2b1e1ec0ad5170fab31e", 2634 | "match_by": "id" 2635 | }, 2636 | "end": { 2637 | "value": "41bef9871b17b4532fffbfda3768086253c4c78c", 2638 | "match_by": "id" 2639 | } 2640 | }, 2641 | { 2642 | "kind": "ATApprove", 2643 | "start": { 2644 | "value": "c8a09945d2bfda16eb4c2b1e1ec0ad5170fab31e", 2645 | "match_by": "id" 2646 | }, 2647 | "end": { 2648 | "value": "41bef9871b17b4532fffbfda3768086253c4c78c", 2649 | "match_by": "id" 2650 | } 2651 | }, 2652 | { 2653 | "kind": "ATExecutionEnvironmentAdmin", 2654 | "start": { 2655 | "value": "c8a09945d2bfda16eb4c2b1e1ec0ad5170fab31e", 2656 | "match_by": "id" 2657 | }, 2658 | "end": { 2659 | "value": "17b5f0743c31cc14dfcb9d46a637fe5dcf1f9396", 2660 | "match_by": "id" 2661 | } 2662 | }, 2663 | { 2664 | "kind": "ATAuditor", 2665 | "start": { 2666 | "value": "c8a09945d2bfda16eb4c2b1e1ec0ad5170fab31e", 2667 | "match_by": "id" 2668 | }, 2669 | "end": { 2670 | "value": "17b5f0743c31cc14dfcb9d46a637fe5dcf1f9396", 2671 | "match_by": "id" 2672 | } 2673 | }, 2674 | { 2675 | "kind": "ATRead", 2676 | "start": { 2677 | "value": "c8a09945d2bfda16eb4c2b1e1ec0ad5170fab31e", 2678 | "match_by": "id" 2679 | }, 2680 | "end": { 2681 | "value": "17b5f0743c31cc14dfcb9d46a637fe5dcf1f9396", 2682 | "match_by": "id" 2683 | } 2684 | }, 2685 | { 2686 | "kind": "ATApprove", 2687 | "start": { 2688 | "value": "c8a09945d2bfda16eb4c2b1e1ec0ad5170fab31e", 2689 | "match_by": "id" 2690 | }, 2691 | "end": { 2692 | "value": "17b5f0743c31cc14dfcb9d46a637fe5dcf1f9396", 2693 | "match_by": "id" 2694 | } 2695 | }, 2696 | { 2697 | "kind": "ATExecute", 2698 | "start": { 2699 | "value": "c8a09945d2bfda16eb4c2b1e1ec0ad5170fab31e", 2700 | "match_by": "id" 2701 | }, 2702 | "end": { 2703 | "value": "41bef9871b17b4532fffbfda3768086253c4c78c", 2704 | "match_by": "id" 2705 | } 2706 | }, 2707 | { 2708 | "kind": "ATWorkflowAdmin", 2709 | "start": { 2710 | "value": "c8a09945d2bfda16eb4c2b1e1ec0ad5170fab31e", 2711 | "match_by": "id" 2712 | }, 2713 | "end": { 2714 | "value": "41bef9871b17b4532fffbfda3768086253c4c78c", 2715 | "match_by": "id" 2716 | } 2717 | }, 2718 | { 2719 | "kind": "ATAuditor", 2720 | "start": { 2721 | "value": "c8a09945d2bfda16eb4c2b1e1ec0ad5170fab31e", 2722 | "match_by": "id" 2723 | }, 2724 | "end": { 2725 | "value": "41bef9871b17b4532fffbfda3768086253c4c78c", 2726 | "match_by": "id" 2727 | } 2728 | }, 2729 | { 2730 | "kind": "ATNotificationAdmin", 2731 | "start": { 2732 | "value": "c8a09945d2bfda16eb4c2b1e1ec0ad5170fab31e", 2733 | "match_by": "id" 2734 | }, 2735 | "end": { 2736 | "value": "17b5f0743c31cc14dfcb9d46a637fe5dcf1f9396", 2737 | "match_by": "id" 2738 | } 2739 | }, 2740 | { 2741 | "kind": "ATJobTemplateAdmin", 2742 | "start": { 2743 | "value": "c8a09945d2bfda16eb4c2b1e1ec0ad5170fab31e", 2744 | "match_by": "id" 2745 | }, 2746 | "end": { 2747 | "value": "41bef9871b17b4532fffbfda3768086253c4c78c", 2748 | "match_by": "id" 2749 | } 2750 | }, 2751 | { 2752 | "kind": "ATExecute", 2753 | "start": { 2754 | "value": "c8a09945d2bfda16eb4c2b1e1ec0ad5170fab31e", 2755 | "match_by": "id" 2756 | }, 2757 | "end": { 2758 | "value": "17b5f0743c31cc14dfcb9d46a637fe5dcf1f9396", 2759 | "match_by": "id" 2760 | } 2761 | }, 2762 | { 2763 | "kind": "ATWorkflowAdmin", 2764 | "start": { 2765 | "value": "c8a09945d2bfda16eb4c2b1e1ec0ad5170fab31e", 2766 | "match_by": "id" 2767 | }, 2768 | "end": { 2769 | "value": "17b5f0743c31cc14dfcb9d46a637fe5dcf1f9396", 2770 | "match_by": "id" 2771 | } 2772 | }, 2773 | { 2774 | "kind": "ATProjectAdmin", 2775 | "start": { 2776 | "value": "c8a09945d2bfda16eb4c2b1e1ec0ad5170fab31e", 2777 | "match_by": "id" 2778 | }, 2779 | "end": { 2780 | "value": "41bef9871b17b4532fffbfda3768086253c4c78c", 2781 | "match_by": "id" 2782 | } 2783 | }, 2784 | { 2785 | "kind": "ATNotificationAdmin", 2786 | "start": { 2787 | "value": "c8a09945d2bfda16eb4c2b1e1ec0ad5170fab31e", 2788 | "match_by": "id" 2789 | }, 2790 | "end": { 2791 | "value": "41bef9871b17b4532fffbfda3768086253c4c78c", 2792 | "match_by": "id" 2793 | } 2794 | }, 2795 | { 2796 | "kind": "ATExecutionEnvironmentAdmin", 2797 | "start": { 2798 | "value": "c8a09945d2bfda16eb4c2b1e1ec0ad5170fab31e", 2799 | "match_by": "id" 2800 | }, 2801 | "end": { 2802 | "value": "41bef9871b17b4532fffbfda3768086253c4c78c", 2803 | "match_by": "id" 2804 | } 2805 | }, 2806 | { 2807 | "kind": "ATJobTemplateAdmin", 2808 | "start": { 2809 | "value": "2b4d3f313efb4bae5a6a991c7c487ab8914b415f", 2810 | "match_by": "id" 2811 | }, 2812 | "end": { 2813 | "value": "17b5f0743c31cc14dfcb9d46a637fe5dcf1f9396", 2814 | "match_by": "id" 2815 | } 2816 | }, 2817 | { 2818 | "kind": "ATRead", 2819 | "start": { 2820 | "value": "2b4d3f313efb4bae5a6a991c7c487ab8914b415f", 2821 | "match_by": "id" 2822 | }, 2823 | "end": { 2824 | "value": "17b5f0743c31cc14dfcb9d46a637fe5dcf1f9396", 2825 | "match_by": "id" 2826 | } 2827 | }, 2828 | { 2829 | "kind": "ATProjectAdmin", 2830 | "start": { 2831 | "value": "2b4d3f313efb4bae5a6a991c7c487ab8914b415f", 2832 | "match_by": "id" 2833 | }, 2834 | "end": { 2835 | "value": "17b5f0743c31cc14dfcb9d46a637fe5dcf1f9396", 2836 | "match_by": "id" 2837 | } 2838 | }, 2839 | { 2840 | "kind": "ATInventoryAdmin", 2841 | "start": { 2842 | "value": "2b4d3f313efb4bae5a6a991c7c487ab8914b415f", 2843 | "match_by": "id" 2844 | }, 2845 | "end": { 2846 | "value": "17b5f0743c31cc14dfcb9d46a637fe5dcf1f9396", 2847 | "match_by": "id" 2848 | } 2849 | }, 2850 | { 2851 | "kind": "ATCredentialAdmin", 2852 | "start": { 2853 | "value": "2b4d3f313efb4bae5a6a991c7c487ab8914b415f", 2854 | "match_by": "id" 2855 | }, 2856 | "end": { 2857 | "value": "17b5f0743c31cc14dfcb9d46a637fe5dcf1f9396", 2858 | "match_by": "id" 2859 | } 2860 | }, 2861 | { 2862 | "kind": "ATWorkflowAdmin", 2863 | "start": { 2864 | "value": "2b4d3f313efb4bae5a6a991c7c487ab8914b415f", 2865 | "match_by": "id" 2866 | }, 2867 | "end": { 2868 | "value": "17b5f0743c31cc14dfcb9d46a637fe5dcf1f9396", 2869 | "match_by": "id" 2870 | } 2871 | }, 2872 | { 2873 | "kind": "ATExecute", 2874 | "start": { 2875 | "value": "005bca8511d340c0d35f87ba277f5b832311ed2c", 2876 | "match_by": "id" 2877 | }, 2878 | "end": { 2879 | "value": "41bef9871b17b4532fffbfda3768086253c4c78c", 2880 | "match_by": "id" 2881 | } 2882 | }, 2883 | { 2884 | "kind": "ATInventoryAdmin", 2885 | "start": { 2886 | "value": "c8a09945d2bfda16eb4c2b1e1ec0ad5170fab31e", 2887 | "match_by": "id" 2888 | }, 2889 | "end": { 2890 | "value": "17b5f0743c31cc14dfcb9d46a637fe5dcf1f9396", 2891 | "match_by": "id" 2892 | } 2893 | }, 2894 | { 2895 | "kind": "ATNotificationAdmin", 2896 | "start": { 2897 | "value": "c8a09945d2bfda16eb4c2b1e1ec0ad5170fab31e", 2898 | "match_by": "id" 2899 | }, 2900 | "end": { 2901 | "value": "17b5f0743c31cc14dfcb9d46a637fe5dcf1f9396", 2902 | "match_by": "id" 2903 | } 2904 | }, 2905 | { 2906 | "kind": "ATApprove", 2907 | "start": { 2908 | "value": "c8a09945d2bfda16eb4c2b1e1ec0ad5170fab31e", 2909 | "match_by": "id" 2910 | }, 2911 | "end": { 2912 | "value": "17b5f0743c31cc14dfcb9d46a637fe5dcf1f9396", 2913 | "match_by": "id" 2914 | } 2915 | }, 2916 | { 2917 | "kind": "ATExecute", 2918 | "start": { 2919 | "value": "c8a09945d2bfda16eb4c2b1e1ec0ad5170fab31e", 2920 | "match_by": "id" 2921 | }, 2922 | "end": { 2923 | "value": "41bef9871b17b4532fffbfda3768086253c4c78c", 2924 | "match_by": "id" 2925 | } 2926 | }, 2927 | { 2928 | "kind": "ATInventoryAdmin", 2929 | "start": { 2930 | "value": "c8a09945d2bfda16eb4c2b1e1ec0ad5170fab31e", 2931 | "match_by": "id" 2932 | }, 2933 | "end": { 2934 | "value": "41bef9871b17b4532fffbfda3768086253c4c78c", 2935 | "match_by": "id" 2936 | } 2937 | }, 2938 | { 2939 | "kind": "ATCredentialAdmin", 2940 | "start": { 2941 | "value": "c8a09945d2bfda16eb4c2b1e1ec0ad5170fab31e", 2942 | "match_by": "id" 2943 | }, 2944 | "end": { 2945 | "value": "41bef9871b17b4532fffbfda3768086253c4c78c", 2946 | "match_by": "id" 2947 | } 2948 | }, 2949 | { 2950 | "kind": "ATWorkflowAdmin", 2951 | "start": { 2952 | "value": "c8a09945d2bfda16eb4c2b1e1ec0ad5170fab31e", 2953 | "match_by": "id" 2954 | }, 2955 | "end": { 2956 | "value": "41bef9871b17b4532fffbfda3768086253c4c78c", 2957 | "match_by": "id" 2958 | } 2959 | }, 2960 | { 2961 | "kind": "ATCredentialAdmin", 2962 | "start": { 2963 | "value": "c8a09945d2bfda16eb4c2b1e1ec0ad5170fab31e", 2964 | "match_by": "id" 2965 | }, 2966 | "end": { 2967 | "value": "17b5f0743c31cc14dfcb9d46a637fe5dcf1f9396", 2968 | "match_by": "id" 2969 | } 2970 | }, 2971 | { 2972 | "kind": "ATAuditor", 2973 | "start": { 2974 | "value": "c8a09945d2bfda16eb4c2b1e1ec0ad5170fab31e", 2975 | "match_by": "id" 2976 | }, 2977 | "end": { 2978 | "value": "17b5f0743c31cc14dfcb9d46a637fe5dcf1f9396", 2979 | "match_by": "id" 2980 | } 2981 | }, 2982 | { 2983 | "kind": "ATRead", 2984 | "start": { 2985 | "value": "c8a09945d2bfda16eb4c2b1e1ec0ad5170fab31e", 2986 | "match_by": "id" 2987 | }, 2988 | "end": { 2989 | "value": "17b5f0743c31cc14dfcb9d46a637fe5dcf1f9396", 2990 | "match_by": "id" 2991 | } 2992 | }, 2993 | { 2994 | "kind": "ATNotificationAdmin", 2995 | "start": { 2996 | "value": "c8a09945d2bfda16eb4c2b1e1ec0ad5170fab31e", 2997 | "match_by": "id" 2998 | }, 2999 | "end": { 3000 | "value": "41bef9871b17b4532fffbfda3768086253c4c78c", 3001 | "match_by": "id" 3002 | } 3003 | }, 3004 | { 3005 | "kind": "ATRead", 3006 | "start": { 3007 | "value": "c8a09945d2bfda16eb4c2b1e1ec0ad5170fab31e", 3008 | "match_by": "id" 3009 | }, 3010 | "end": { 3011 | "value": "41bef9871b17b4532fffbfda3768086253c4c78c", 3012 | "match_by": "id" 3013 | } 3014 | }, 3015 | { 3016 | "kind": "ATApprove", 3017 | "start": { 3018 | "value": "c8a09945d2bfda16eb4c2b1e1ec0ad5170fab31e", 3019 | "match_by": "id" 3020 | }, 3021 | "end": { 3022 | "value": "41bef9871b17b4532fffbfda3768086253c4c78c", 3023 | "match_by": "id" 3024 | } 3025 | }, 3026 | { 3027 | "kind": "ATProjectAdmin", 3028 | "start": { 3029 | "value": "c8a09945d2bfda16eb4c2b1e1ec0ad5170fab31e", 3030 | "match_by": "id" 3031 | }, 3032 | "end": { 3033 | "value": "17b5f0743c31cc14dfcb9d46a637fe5dcf1f9396", 3034 | "match_by": "id" 3035 | } 3036 | }, 3037 | { 3038 | "kind": "ATExecutionEnvironmentAdmin", 3039 | "start": { 3040 | "value": "c8a09945d2bfda16eb4c2b1e1ec0ad5170fab31e", 3041 | "match_by": "id" 3042 | }, 3043 | "end": { 3044 | "value": "17b5f0743c31cc14dfcb9d46a637fe5dcf1f9396", 3045 | "match_by": "id" 3046 | } 3047 | }, 3048 | { 3049 | "kind": "ATProjectAdmin", 3050 | "start": { 3051 | "value": "c8a09945d2bfda16eb4c2b1e1ec0ad5170fab31e", 3052 | "match_by": "id" 3053 | }, 3054 | "end": { 3055 | "value": "41bef9871b17b4532fffbfda3768086253c4c78c", 3056 | "match_by": "id" 3057 | } 3058 | }, 3059 | { 3060 | "kind": "ATJobTemplateAdmin", 3061 | "start": { 3062 | "value": "c8a09945d2bfda16eb4c2b1e1ec0ad5170fab31e", 3063 | "match_by": "id" 3064 | }, 3065 | "end": { 3066 | "value": "41bef9871b17b4532fffbfda3768086253c4c78c", 3067 | "match_by": "id" 3068 | } 3069 | }, 3070 | { 3071 | "kind": "ATExecute", 3072 | "start": { 3073 | "value": "c8a09945d2bfda16eb4c2b1e1ec0ad5170fab31e", 3074 | "match_by": "id" 3075 | }, 3076 | "end": { 3077 | "value": "17b5f0743c31cc14dfcb9d46a637fe5dcf1f9396", 3078 | "match_by": "id" 3079 | } 3080 | }, 3081 | { 3082 | "kind": "ATWorkflowAdmin", 3083 | "start": { 3084 | "value": "c8a09945d2bfda16eb4c2b1e1ec0ad5170fab31e", 3085 | "match_by": "id" 3086 | }, 3087 | "end": { 3088 | "value": "17b5f0743c31cc14dfcb9d46a637fe5dcf1f9396", 3089 | "match_by": "id" 3090 | } 3091 | }, 3092 | { 3093 | "kind": "ATJobTemplateAdmin", 3094 | "start": { 3095 | "value": "c8a09945d2bfda16eb4c2b1e1ec0ad5170fab31e", 3096 | "match_by": "id" 3097 | }, 3098 | "end": { 3099 | "value": "17b5f0743c31cc14dfcb9d46a637fe5dcf1f9396", 3100 | "match_by": "id" 3101 | } 3102 | }, 3103 | { 3104 | "kind": "ATExecutionEnvironmentAdmin", 3105 | "start": { 3106 | "value": "c8a09945d2bfda16eb4c2b1e1ec0ad5170fab31e", 3107 | "match_by": "id" 3108 | }, 3109 | "end": { 3110 | "value": "41bef9871b17b4532fffbfda3768086253c4c78c", 3111 | "match_by": "id" 3112 | } 3113 | }, 3114 | { 3115 | "kind": "ATAuditor", 3116 | "start": { 3117 | "value": "c8a09945d2bfda16eb4c2b1e1ec0ad5170fab31e", 3118 | "match_by": "id" 3119 | }, 3120 | "end": { 3121 | "value": "41bef9871b17b4532fffbfda3768086253c4c78c", 3122 | "match_by": "id" 3123 | } 3124 | }, 3125 | { 3126 | "kind": "ATWorkflowAdmin", 3127 | "start": { 3128 | "value": "2b4d3f313efb4bae5a6a991c7c487ab8914b415f", 3129 | "match_by": "id" 3130 | }, 3131 | "end": { 3132 | "value": "17b5f0743c31cc14dfcb9d46a637fe5dcf1f9396", 3133 | "match_by": "id" 3134 | } 3135 | }, 3136 | { 3137 | "kind": "ATJobTemplateAdmin", 3138 | "start": { 3139 | "value": "2b4d3f313efb4bae5a6a991c7c487ab8914b415f", 3140 | "match_by": "id" 3141 | }, 3142 | "end": { 3143 | "value": "17b5f0743c31cc14dfcb9d46a637fe5dcf1f9396", 3144 | "match_by": "id" 3145 | } 3146 | }, 3147 | { 3148 | "kind": "ATRead", 3149 | "start": { 3150 | "value": "2b4d3f313efb4bae5a6a991c7c487ab8914b415f", 3151 | "match_by": "id" 3152 | }, 3153 | "end": { 3154 | "value": "17b5f0743c31cc14dfcb9d46a637fe5dcf1f9396", 3155 | "match_by": "id" 3156 | } 3157 | }, 3158 | { 3159 | "kind": "ATProjectAdmin", 3160 | "start": { 3161 | "value": "2b4d3f313efb4bae5a6a991c7c487ab8914b415f", 3162 | "match_by": "id" 3163 | }, 3164 | "end": { 3165 | "value": "17b5f0743c31cc14dfcb9d46a637fe5dcf1f9396", 3166 | "match_by": "id" 3167 | } 3168 | }, 3169 | { 3170 | "kind": "ATInventoryAdmin", 3171 | "start": { 3172 | "value": "2b4d3f313efb4bae5a6a991c7c487ab8914b415f", 3173 | "match_by": "id" 3174 | }, 3175 | "end": { 3176 | "value": "17b5f0743c31cc14dfcb9d46a637fe5dcf1f9396", 3177 | "match_by": "id" 3178 | } 3179 | }, 3180 | { 3181 | "kind": "ATCredentialAdmin", 3182 | "start": { 3183 | "value": "2b4d3f313efb4bae5a6a991c7c487ab8914b415f", 3184 | "match_by": "id" 3185 | }, 3186 | "end": { 3187 | "value": "17b5f0743c31cc14dfcb9d46a637fe5dcf1f9396", 3188 | "match_by": "id" 3189 | } 3190 | } 3191 | ] 3192 | } 3193 | } --------------------------------------------------------------------------------