|
7 | 7 | # Django REST Framework
|
8 | 8 | from rest_framework import serializers
|
9 | 9 |
|
10 |
| -# Tower |
| 10 | +# AWX |
11 | 11 | from awx.conf import fields, register, register_validate
|
12 | 12 | from awx.main.models import ExecutionEnvironment
|
13 | 13 |
|
|
58 | 58 | field_class=fields.URLField,
|
59 | 59 | schemes=('http', 'https'),
|
60 | 60 | allow_plain_hostname=True, # Allow hostname only without TLD.
|
61 |
| - label=_('Base URL of the Tower host'), |
62 |
| - help_text=_('This setting is used by services like notifications to render ' 'a valid url to the Tower host.'), |
| 61 | + label=_('Base URL of the service'), |
| 62 | + help_text=_('This setting is used by services like notifications to render ' 'a valid url to the service.'), |
63 | 63 | category=_('System'),
|
64 | 64 | category_slug='system',
|
65 | 65 | )
|
|
84 | 84 | field_class=fields.StringListField,
|
85 | 85 | label=_('Proxy IP Allowed List'),
|
86 | 86 | help_text=_(
|
87 |
| - "If Tower is behind a reverse proxy/load balancer, use this setting " |
88 |
| - "to configure the proxy IP addresses from which Tower should trust " |
| 87 | + "If the service is behind a reverse proxy/load balancer, use this setting " |
| 88 | + "to configure the proxy IP addresses from which the service should trust " |
89 | 89 | "custom REMOTE_HOST_HEADERS header values. "
|
90 | 90 | "If this setting is an empty list (the default), the headers specified by "
|
91 | 91 | "REMOTE_HOST_HEADERS will be trusted unconditionally')"
|
|
172 | 172 | register(
|
173 | 173 | 'INSTALL_UUID',
|
174 | 174 | field_class=fields.CharField,
|
175 |
| - label=_('Unique identifier for an AWX/Tower installation'), |
| 175 | + label=_('Unique identifier for an installation'), |
176 | 176 | category=_('System'),
|
177 | 177 | category_slug='system',
|
178 | 178 | read_only=True,
|
|
223 | 223 | help_text=_(
|
224 | 224 | 'Ansible allows variable substitution via the Jinja2 templating '
|
225 | 225 | 'language for --extra-vars. This poses a potential security '
|
226 |
| - 'risk where Tower users with the ability to specify extra vars at job ' |
| 226 | + 'risk where users with the ability to specify extra vars at job ' |
227 | 227 | 'launch time can use Jinja2 templates to run arbitrary Python. It is '
|
228 | 228 | 'recommended that this value be set to "template" or "never".'
|
229 | 229 | ),
|
|
235 | 235 | 'AWX_ISOLATION_BASE_PATH',
|
236 | 236 | field_class=fields.CharField,
|
237 | 237 | label=_('Job execution path'),
|
238 |
| - help_text=_('The directory in which Tower will create new temporary directories for job execution and isolation (such as credential files).'), |
| 238 | + help_text=_('The directory in which the service will create new temporary directories for job execution and isolation (such as credential files).'), |
239 | 239 | category=_('Jobs'),
|
240 | 240 | category_slug='jobs',
|
241 | 241 | )
|
|
266 | 266 | field_class=fields.BooleanField,
|
267 | 267 | default=False,
|
268 | 268 | label=_('Gather data for Automation Analytics'),
|
269 |
| - help_text=_('Enables Tower to gather data on automation and send it to Red Hat.'), |
| 269 | + help_text=_('Enables the service to gather data on automation and send it to Red Hat Insights.'), |
270 | 270 | category=_('System'),
|
271 | 271 | category_slug='system',
|
272 | 272 | )
|
|
537 | 537 | field_class=fields.CharField,
|
538 | 538 | allow_blank=True,
|
539 | 539 | default='',
|
540 |
| - label=_('Cluster-wide Tower unique identifier.'), |
541 |
| - help_text=_('Useful to uniquely identify Tower instances.'), |
| 540 | + label=_('Cluster-wide unique identifier.'), |
| 541 | + help_text=_('Useful to uniquely identify instances.'), |
542 | 542 | category=_('Logging'),
|
543 | 543 | category_slug='logging',
|
544 | 544 | )
|
|
573 | 573 | label=_('Enable/disable HTTPS certificate verification'),
|
574 | 574 | help_text=_(
|
575 | 575 | 'Flag to control enable/disable of certificate verification'
|
576 |
| - ' when LOG_AGGREGATOR_PROTOCOL is "https". If enabled, Tower\'s' |
| 576 | + ' when LOG_AGGREGATOR_PROTOCOL is "https". If enabled, the' |
577 | 577 | ' log handler will verify certificate sent by external log aggregator'
|
578 | 578 | ' before establishing connection.'
|
579 | 579 | ),
|
|
0 commit comments