ansiblelint fixes-- fqcn[action-core] - file to ansible.builtin.file
Replaces many references to file: with ansible.builtin.file Signed-off-by: Ryan Lerch <rlerch@redhat.com>
This commit is contained in:
parent
f3517ab537
commit
62952df107
167 changed files with 380 additions and 381 deletions
|
@ -4,7 +4,7 @@
|
|||
- import_tasks: repositories.yml
|
||||
|
||||
- name: Ensure directory for FAF database backups exists
|
||||
file:
|
||||
ansible.builtin.file:
|
||||
path: "{{ faf_backup_dir }}"
|
||||
state: directory
|
||||
owner: faf
|
||||
|
|
|
@ -11,14 +11,14 @@
|
|||
- import_tasks: services.yml
|
||||
|
||||
- name: Create a directory /srv/faf
|
||||
file:
|
||||
ansible.builtin.file:
|
||||
path: /srv/faf
|
||||
state: directory
|
||||
owner: faf
|
||||
group: faf
|
||||
|
||||
- name: Create folders where we place certs for fedora-messaging
|
||||
file: path=/etc/fedora-messaging/faf owner=root group=root mode=0755 state=directory
|
||||
ansible.builtin.file: path=/etc/fedora-messaging/faf owner=root group=root mode=0755 state=directory
|
||||
|
||||
- name: Install certs for fedora-messaging
|
||||
copy: src={{ item.src }}
|
||||
|
|
|
@ -7,7 +7,7 @@
|
|||
|
||||
# setup fedora-messaging
|
||||
- name: Create the config folder for fedora-messaging
|
||||
file:
|
||||
ansible.builtin.file:
|
||||
path: /etc/fedora-messaging/
|
||||
owner: root
|
||||
group: root
|
||||
|
|
|
@ -17,21 +17,21 @@
|
|||
tags: [rs_reposync, rs_fedora]
|
||||
when: env != 'staging'
|
||||
|
||||
- file:
|
||||
- ansible.builtin.file:
|
||||
path: /srv/retrace/repos
|
||||
state: directory
|
||||
mode: "0755"
|
||||
owner: retrace
|
||||
group: retrace
|
||||
|
||||
- file:
|
||||
- ansible.builtin.file:
|
||||
path: /srv/retrace/tasks
|
||||
state: directory
|
||||
mode: "0755"
|
||||
owner: retrace
|
||||
group: retrace
|
||||
|
||||
- file:
|
||||
- ansible.builtin.file:
|
||||
path: /srv/retrace/hardlink-local
|
||||
state: directory
|
||||
mode: "0755"
|
||||
|
|
|
@ -44,7 +44,7 @@
|
|||
state: started
|
||||
|
||||
- name: Create directory for repositories
|
||||
file:
|
||||
ansible.builtin.file:
|
||||
path: /srv/retrace/repos
|
||||
state: directory
|
||||
mode: "0755"
|
||||
|
@ -52,14 +52,14 @@
|
|||
group: retrace
|
||||
|
||||
- name: Create directory for retrace tasks
|
||||
file:
|
||||
ansible.builtin.file:
|
||||
path: /srv/retrace/tasks
|
||||
state: directory
|
||||
mode: "0755"
|
||||
owner: retrace
|
||||
group: retrace
|
||||
|
||||
- file:
|
||||
- ansible.builtin.file:
|
||||
path: /srv/retrace/hardlink-local
|
||||
state: directory
|
||||
mode: "0755"
|
||||
|
|
|
@ -14,7 +14,7 @@
|
|||
- apps-fp-o
|
||||
|
||||
- name: Ensure directory exixts
|
||||
file:
|
||||
ansible.builtin.file:
|
||||
path: "{{ item }}"
|
||||
state: directory
|
||||
mode: '2755'
|
||||
|
|
|
@ -88,7 +88,7 @@
|
|||
|
||||
- name: Destroy stored keytab
|
||||
delegate_to: "{{ ipa_server }}"
|
||||
file: path=/tmp/{{inventory_hostname}}.kt state=absent
|
||||
ansible.builtin.file: path=/tmp/{{inventory_hostname}}.kt state=absent
|
||||
tags:
|
||||
- base
|
||||
- config
|
||||
|
@ -114,7 +114,7 @@
|
|||
when: not host_keytab_status.stat.exists
|
||||
|
||||
- name: Set keytab permissions
|
||||
file: path=/etc/krb5.keytab owner=root group=root mode=0600
|
||||
ansible.builtin.file: path=/etc/krb5.keytab owner=root group=root mode=0600
|
||||
tags:
|
||||
- base
|
||||
- config
|
||||
|
@ -122,7 +122,7 @@
|
|||
when: not host_keytab_status.stat.exists
|
||||
|
||||
- name: Destroy encoded keytab
|
||||
file: path=/etc/krb5.keytab.b64 state=absent
|
||||
ansible.builtin.file: path=/etc/krb5.keytab.b64 state=absent
|
||||
tags:
|
||||
- base
|
||||
- config
|
||||
|
|
|
@ -238,7 +238,7 @@
|
|||
when: baseiptables|bool
|
||||
|
||||
- name: Enable journald persistence
|
||||
file: path=/var/log/journal state=directory
|
||||
ansible.builtin.file: path=/var/log/journal state=directory
|
||||
owner=root group=systemd-journal mode=2755
|
||||
when: ansible_distribution_major_version|int >= 7 and ansible_distribution == 'RedHat'
|
||||
tags:
|
||||
|
@ -249,7 +249,7 @@
|
|||
- flush journald tmpfiles to persistent store
|
||||
|
||||
- name: Enable journald persistence
|
||||
file: path=/var/log/journal state=directory
|
||||
ansible.builtin.file: path=/var/log/journal state=directory
|
||||
owner=root group=systemd-journal mode=2755
|
||||
when: ansible_distribution_major_version|int >= 29 and ansible_distribution == 'Fedora'
|
||||
tags:
|
||||
|
@ -341,7 +341,7 @@
|
|||
- base
|
||||
|
||||
- name: Rsyslogd make systemd limits directory for file handles
|
||||
file: dest=/etc/systemd/system/rsyslog.service.d/ mode=0755 owner=root group=root state=directory
|
||||
ansible.builtin.file: dest=/etc/systemd/system/rsyslog.service.d/ mode=0755 owner=root group=root state=directory
|
||||
when: inventory_hostname.startswith('log') or inventory_hostname.startswith('people')
|
||||
tags:
|
||||
- rsyslogd
|
||||
|
@ -357,7 +357,7 @@
|
|||
|
||||
# Custom selinux policy to allow rsyslog to read and send audit to log01
|
||||
- name: Ensure a directory exists for our custom selinux module
|
||||
file: dest=/usr/local/share/rsyslog state=directory
|
||||
ansible.builtin.file: dest=/usr/local/share/rsyslog state=directory
|
||||
tags:
|
||||
- rsyslogd
|
||||
- config
|
||||
|
@ -504,7 +504,7 @@
|
|||
# is actually expired, and kinit's still not refreshing them and such alike.
|
||||
# Let's just nuke it for now.
|
||||
- name: We do NOT use sssd-kcm
|
||||
file: path=/etc/krb5.conf.d/kcm_default_ccache state=absent
|
||||
ansible.builtin.file: path=/etc/krb5.conf.d/kcm_default_ccache state=absent
|
||||
tags:
|
||||
- base
|
||||
- config
|
||||
|
|
|
@ -156,7 +156,7 @@
|
|||
- base
|
||||
|
||||
- name: Create directory for storing pubkeys
|
||||
file: path="{{pubkeydir}}"
|
||||
ansible.builtin.file: path="{{pubkeydir}}"
|
||||
owner=root
|
||||
group=root
|
||||
mode=0600
|
||||
|
|
|
@ -8,7 +8,7 @@
|
|||
|
||||
---
|
||||
- name: Create /srv/web/pub for nfs mounts
|
||||
file: dest=/srv/web/pub state=directory mode=0755
|
||||
ansible.builtin.file: dest=/srv/web/pub state=directory mode=0755
|
||||
tags:
|
||||
- batcave
|
||||
- config
|
||||
|
@ -129,7 +129,7 @@
|
|||
- fedora-messaging
|
||||
|
||||
- name: Create folder where we'll place the certs
|
||||
file: path=/etc/pki/rabbitmq/ owner=root group=root mode=0755 state=directory
|
||||
ansible.builtin.file: path=/etc/pki/rabbitmq/ owner=root group=root mode=0755 state=directory
|
||||
tags:
|
||||
- batcave
|
||||
- config
|
||||
|
@ -372,7 +372,7 @@
|
|||
#
|
||||
|
||||
- name: Create repo2json directory
|
||||
file: dest=/srv/web/repo/json mode=0755 state=directory owner=apache group=apache
|
||||
ansible.builtin.file: dest=/srv/web/repo/json mode=0755 state=directory owner=apache group=apache
|
||||
tags:
|
||||
- batcave
|
||||
- config
|
||||
|
@ -557,14 +557,14 @@
|
|||
- batcave
|
||||
|
||||
- name: Create some tmp dirs
|
||||
file: path=/tmp-inst mode=000 owner=root group=root state=directory
|
||||
ansible.builtin.file: path=/tmp-inst mode=000 owner=root group=root state=directory
|
||||
tags:
|
||||
- config
|
||||
- batcave
|
||||
- selinux
|
||||
|
||||
- name: Create some tmp dirs
|
||||
file: path=/var/tmp-inst mode=000 owner=root group=root state=directory
|
||||
ansible.builtin.file: path=/var/tmp-inst mode=000 owner=root group=root state=directory
|
||||
tags:
|
||||
- config
|
||||
- batcave
|
||||
|
@ -578,7 +578,7 @@
|
|||
- selinux
|
||||
|
||||
- name: Create the /var/tmux folder for shared tmux session
|
||||
file: path=/var/tmux mode=2774 owner=root group=sysadmin state=directory
|
||||
ansible.builtin.file: path=/var/tmux mode=2774 owner=root group=sysadmin state=directory
|
||||
tags:
|
||||
- batcave
|
||||
- tmux
|
||||
|
@ -590,7 +590,7 @@
|
|||
- tmux
|
||||
|
||||
- name: Create dir for openshift pxe boot files
|
||||
file: path=/srv/web/infra/bigfiles/{{item}} mode=2660 owner=root group=sysadmin-openshift state=directory
|
||||
ansible.builtin.file: path=/srv/web/infra/bigfiles/{{item}} mode=2660 owner=root group=sysadmin-openshift state=directory
|
||||
with_items:
|
||||
- openshiftboot
|
||||
- tftpboot/rhcos
|
||||
|
|
|
@ -330,7 +330,7 @@
|
|||
- bodhi
|
||||
|
||||
- name: Create /etc/pki/fedora-messaging
|
||||
file:
|
||||
ansible.builtin.file:
|
||||
dest: /etc/pki/fedora-messaging
|
||||
mode: "0775"
|
||||
owner: root
|
||||
|
@ -382,12 +382,12 @@
|
|||
- bodhi
|
||||
|
||||
- name: Make a mnt/koji link
|
||||
file: state=link src=/mnt/fedora_koji/koji dest=/mnt/koji force=yes
|
||||
ansible.builtin.file: state=link src=/mnt/fedora_koji/koji dest=/mnt/koji force=yes
|
||||
tags:
|
||||
- bodhi
|
||||
|
||||
- name: Create /etc/systemd/system/fm-consumer@.service.d
|
||||
file:
|
||||
ansible.builtin.file:
|
||||
state: directory
|
||||
path: /etc/systemd/system/fm-consumer@.service.d
|
||||
owner: root
|
||||
|
|
|
@ -3,7 +3,7 @@
|
|||
# This is the base set of files needed for bodhi
|
||||
|
||||
- name: Create the bodhi configuration directory
|
||||
file:
|
||||
ansible.builtin.file:
|
||||
path: /etc/bodhi
|
||||
state: directory
|
||||
owner: root
|
||||
|
|
|
@ -7,7 +7,7 @@
|
|||
|
||||
|
||||
- name: Create /etc/systemd/system/btrfs-balance.timer.d
|
||||
file:
|
||||
ansible.builtin.file:
|
||||
state: directory
|
||||
path: /etc/systemd/system/btrfs-balance.timer.d
|
||||
owner: root
|
||||
|
|
|
@ -22,7 +22,7 @@
|
|||
- bugzilla2fedmsg
|
||||
|
||||
- name: Make sure a few directories exist.
|
||||
file:
|
||||
ansible.builtin.file:
|
||||
dest="{{ item }}"
|
||||
owner=fedmsg
|
||||
group=fedmsg
|
||||
|
|
|
@ -1,5 +1,5 @@
|
|||
---
|
||||
- name: Add builder infra yum repo
|
||||
file: dest=/etc/yum.repos.d/builder-infrastructure.repo state=absent
|
||||
ansible.builtin.file: dest=/etc/yum.repos.d/builder-infrastructure.repo state=absent
|
||||
tags:
|
||||
- builder_infra
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
---
|
||||
- name: Create the CentosCIAuthorization operator keytab path
|
||||
file:
|
||||
ansible.builtin.file:
|
||||
path: "/etc/openshift_apps/centos-ci-authorization/"
|
||||
state: directory
|
||||
owner: root
|
||||
|
|
|
@ -13,11 +13,11 @@
|
|||
|
||||
# See https://github.com/robyduck/cgit-custom
|
||||
- name: Make sure cgit directory exists
|
||||
file: dest=/usr/share/cgit state=directory owner=root group=root mode=0755
|
||||
ansible.builtin.file: dest=/usr/share/cgit state=directory owner=root group=root mode=0755
|
||||
tags: cgit
|
||||
|
||||
- name: Make sure cgit images directory exists
|
||||
file: dest=/usr/share/cgit/images state=directory owner=root group=root mode=0755
|
||||
ansible.builtin.file: dest=/usr/share/cgit/images state=directory owner=root group=root mode=0755
|
||||
tags: cgit
|
||||
|
||||
- name: Copy cgit them into place.
|
||||
|
|
|
@ -6,7 +6,7 @@
|
|||
tags: cgit
|
||||
|
||||
- name: Create the git root directory (/srv/git)
|
||||
file: dest=/srv/git state=directory mode=0755
|
||||
ansible.builtin.file: dest=/srv/git state=directory mode=0755
|
||||
tags: cgit
|
||||
|
||||
- name: Ensure the repo list file exists
|
||||
|
|
|
@ -137,7 +137,7 @@
|
|||
- restart check-compose
|
||||
|
||||
- name: Create /etc/pki/fedora-messaging
|
||||
file:
|
||||
ansible.builtin.file:
|
||||
dest: /etc/pki/fedora-messaging
|
||||
mode: "0775"
|
||||
owner: root
|
||||
|
|
|
@ -119,7 +119,7 @@
|
|||
|
||||
# Three tasks for handling our (two) custom selinux modules.
|
||||
- name: Ensure a directory exists for our custom selinux module
|
||||
file: dest=/usr/share/collectd state=directory
|
||||
ansible.builtin.file: dest=/usr/share/collectd state=directory
|
||||
tags:
|
||||
- collectd
|
||||
- selinux
|
||||
|
|
|
@ -24,7 +24,7 @@
|
|||
|
||||
# Three tasks for handling our custom selinux module.
|
||||
- name: Ensure a directory exists for our custom selinux module
|
||||
file: dest=/usr/share/collectd state=directory
|
||||
ansible.builtin.file: dest=/usr/share/collectd state=directory
|
||||
tags:
|
||||
- collectd
|
||||
- selinux
|
||||
|
|
|
@ -73,7 +73,7 @@
|
|||
|
||||
# create /var/log/collectd as it's on a larger volume
|
||||
- name: Create /var/log/collectd
|
||||
file: path=/var/log/collectd owner=root group=root mode=0755 state=directory
|
||||
ansible.builtin.file: path=/var/log/collectd owner=root group=root mode=0755 state=directory
|
||||
tags:
|
||||
- config
|
||||
- collectd/server
|
||||
|
@ -88,7 +88,7 @@
|
|||
- collectd/server
|
||||
|
||||
- name: Create the service configuration directory
|
||||
file:
|
||||
ansible.builtin.file:
|
||||
path: /etc/systemd/system/collectd.service.d
|
||||
state: directory
|
||||
tags:
|
||||
|
|
|
@ -11,7 +11,7 @@
|
|||
- deploy-operators
|
||||
|
||||
- name: Create the CommunishiftAuthorization operator keytab path
|
||||
file:
|
||||
ansible.builtin.file:
|
||||
path: "/etc/openshift_apps/communishift-authorization/"
|
||||
state: directory
|
||||
owner: root
|
||||
|
|
|
@ -35,12 +35,12 @@
|
|||
- starting_builder
|
||||
|
||||
- name: work-around for wrongly generated ami
|
||||
file:
|
||||
ansible.builtin.file:
|
||||
path: /etc/yum.repos.d/pr.repo
|
||||
state: absent
|
||||
|
||||
- name: disable updates-testing
|
||||
file:
|
||||
ansible.builtin.file:
|
||||
path: /etc/yum.repos.d/fedora-updates-testing.repo
|
||||
state: absent
|
||||
when:
|
||||
|
@ -55,7 +55,7 @@
|
|||
register: system_updated
|
||||
|
||||
- name: disable updates-testing, could be restored after update
|
||||
file:
|
||||
ansible.builtin.file:
|
||||
path: /etc/yum.repos.d/fedora-updates-testing.repo
|
||||
state: absent
|
||||
when: system_updated.changed
|
||||
|
@ -174,7 +174,7 @@
|
|||
|
||||
- name: check disk space
|
||||
include_tasks:
|
||||
file: check_path_free_space.yml
|
||||
ansible.builtin.file: check_path_free_space.yml
|
||||
vars:
|
||||
path: "{{ item.path }}"
|
||||
size: "{{ item.size|int }}"
|
||||
|
@ -241,7 +241,7 @@
|
|||
- preparing_image
|
||||
|
||||
- name: mockbuilder .ssh
|
||||
file: state=directory path=/home/mockbuilder/.ssh mode=0700 owner=mockbuilder group=mockbuilder
|
||||
ansible.builtin.file: state=directory path=/home/mockbuilder/.ssh mode=0700 owner=mockbuilder group=mockbuilder
|
||||
when:
|
||||
- preparing_image
|
||||
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
---
|
||||
- name: chmod_key
|
||||
file: path=/etc/lighttpd/copr-be.fedoraproject.org.pem owner=root group=root mode=0600
|
||||
ansible.builtin.file: path=/etc/lighttpd/copr-be.fedoraproject.org.pem owner=root group=root mode=0600
|
||||
|
||||
- name: restart copr-backend
|
||||
service: name="{{ copr_backend_target }}" state=restarted
|
||||
|
|
|
@ -3,7 +3,7 @@
|
|||
dnf: state=present name=awscli
|
||||
|
||||
- name: Create aws HOME config directory
|
||||
file: state=directory
|
||||
ansible.builtin.file: state=directory
|
||||
path="{{ item.homedir }}/.aws"
|
||||
owner={{ item.user }}
|
||||
group={{ item.user }}
|
||||
|
|
|
@ -15,7 +15,7 @@
|
|||
tags: copr_ping
|
||||
|
||||
- name: Pre-create ping log file
|
||||
file:
|
||||
ansible.builtin.file:
|
||||
path: "{{ ping_log }}"
|
||||
owner: "{{ ping_user }}"
|
||||
group: nagios
|
||||
|
@ -61,7 +61,7 @@
|
|||
tags: copr_ping
|
||||
|
||||
- name: Create home/.config dir
|
||||
file:
|
||||
ansible.builtin.file:
|
||||
path: "{{ ping_homedir }}/.config"
|
||||
owner: "{{ ping_user }}"
|
||||
group: "{{ ping_user }}"
|
||||
|
|
|
@ -44,13 +44,13 @@
|
|||
when: devel|bool
|
||||
|
||||
- name: Make copr dirs
|
||||
file: state=directory path={{ item }}
|
||||
ansible.builtin.file: state=directory path={{ item }}
|
||||
with_items:
|
||||
- /var/lib/copr/jobs
|
||||
- /var/lib/copr/public_html/results
|
||||
|
||||
- name: Setup dirs there
|
||||
file: state=directory path="/home/copr/{{ item }}" owner=copr group=copr mode=0700
|
||||
ansible.builtin.file: state=directory path="/home/copr/{{ item }}" owner=copr group=copr mode=0700
|
||||
with_items:
|
||||
- cloud
|
||||
- .ssh
|
||||
|
@ -77,7 +77,7 @@
|
|||
ignore_errors: yes
|
||||
|
||||
- name: Create empty known_hosts
|
||||
file: state=touch dest=/home/copr/.ssh/known_hosts owner=copr group=copr mode=600
|
||||
ansible.builtin.file: state=touch dest=/home/copr/.ssh/known_hosts owner=copr group=copr mode=600
|
||||
when: hostsstat.rc == 1
|
||||
|
||||
- name: Replace bashrc for copr user
|
||||
|
@ -118,7 +118,7 @@
|
|||
seboolean: name=httpd_setrlimit state=yes persistent=yes
|
||||
|
||||
- name: Create directory for compress module of lighttpd
|
||||
file: path=/var/cache/lighttpd/compress owner=lighttpd group=lighttpd mode=0644 state=directory
|
||||
ansible.builtin.file: path=/var/cache/lighttpd/compress owner=lighttpd group=lighttpd mode=0644 state=directory
|
||||
|
||||
# mime default to text/plain and enable dirlisting for indexes
|
||||
- name: Update lighttpd configs
|
||||
|
@ -168,7 +168,7 @@
|
|||
|
||||
# setup dirs for the ansible execution off of provisioning
|
||||
# - name: Dirs from provision
|
||||
# file: state=directory path="/home/copr/provision/{{ item }}" owner=copr group=copr
|
||||
# ansible.builtin.file: state=directory path="/home/copr/provision/{{ item }}" owner=copr group=copr
|
||||
# with_items:
|
||||
# - action_plugins
|
||||
# - library
|
||||
|
@ -248,7 +248,7 @@
|
|||
- provision_config
|
||||
|
||||
- name: Create messaging config directory
|
||||
file: dest=/etc/copr/msgbuses state=directory owner=copr group=copr mode=0700
|
||||
ansible.builtin.file: dest=/etc/copr/msgbuses state=directory owner=copr group=copr mode=0700
|
||||
when: copr_messaging
|
||||
tags:
|
||||
- config
|
||||
|
@ -357,7 +357,7 @@
|
|||
|
||||
# Three tasks for handling our custom selinux module
|
||||
- name: Ensure a directory exists for our custom selinux module
|
||||
file: dest=/usr/local/share/copr state=directory
|
||||
ansible.builtin.file: dest=/usr/local/share/copr state=directory
|
||||
|
||||
- name: Copy over our custom selinux module
|
||||
copy: src=selinux/copr_rules.pp dest=/usr/local/share/copr/copr_rules.pp
|
||||
|
|
|
@ -70,7 +70,7 @@
|
|||
notify: systemctl daemon-reload
|
||||
|
||||
- name: Prepare mount point
|
||||
file: state=directory path=/var/lib/copr/public_html
|
||||
ansible.builtin.file: state=directory path=/var/lib/copr/public_html
|
||||
|
||||
- name: Mount up disk of copr repo
|
||||
mount: name=/var/lib/copr/public_html src='LABEL=copr-repo' fstype=ext4 state=mounted opts=nofail
|
||||
|
|
|
@ -5,7 +5,7 @@
|
|||
# dnf: state=present name=pulp-cli
|
||||
|
||||
- name: Create pulp config directory
|
||||
file:
|
||||
ansible.builtin.file:
|
||||
state: directory
|
||||
path: /home/copr/.config/pulp/
|
||||
owner: copr
|
||||
|
|
|
@ -131,7 +131,7 @@
|
|||
- provision_config
|
||||
|
||||
- name: Resalloc, ssh directory
|
||||
file:
|
||||
ansible.builtin.file:
|
||||
path: /var/lib/resallocserver/.ssh
|
||||
state: directory
|
||||
mode: "0700"
|
||||
|
|
|
@ -82,7 +82,7 @@
|
|||
- provision_config
|
||||
|
||||
- name: Remove currently unused and broken os_nova filter
|
||||
file: state=absent
|
||||
ansible.builtin.file: state=absent
|
||||
path="{{ provision_directory }}/filter_plugins/os_nova.py"
|
||||
tags:
|
||||
- provision_config
|
||||
|
|
|
@ -130,7 +130,7 @@
|
|||
|
||||
- name: Prepare the certbot backup directory on batcave
|
||||
delegate_to: localhost
|
||||
file:
|
||||
ansible.builtin.file:
|
||||
path: "{{ le_backup_path }}"
|
||||
# nobody, except for root, can step into this directory (on batcave)
|
||||
mode: "0700"
|
||||
|
|
|
@ -36,7 +36,7 @@
|
|||
selinux: policy=targeted state=enforcing
|
||||
|
||||
- name: Make sure directories are owned by copr-dist-git user
|
||||
file: path={{ item }} owner=copr-dist-git group=copr-dist-git state=directory recurse=yes
|
||||
ansible.builtin.file: path={{ item }} owner=copr-dist-git group=copr-dist-git state=directory recurse=yes
|
||||
with_items:
|
||||
- /var/log/copr-dist-git/
|
||||
|
||||
|
@ -114,7 +114,7 @@
|
|||
when: not services_disabled|bool
|
||||
|
||||
- name: Create place for our custom SELinux policy
|
||||
file: path=/usr/local/share/selinux state=directory
|
||||
ansible.builtin.file: path=/usr/local/share/selinux state=directory
|
||||
|
||||
- name: Copy over our custom selinux policy for cgit
|
||||
copy: src=git_script_t.pp dest=/usr/local/share/selinux/git_script_t.pp
|
||||
|
@ -132,7 +132,7 @@
|
|||
command: /usr/bin/copr-dist-git-refresh-cgit creates=/var/cache/cgit/repo-configuration.rc
|
||||
|
||||
- name: Ensure that .config directory exists
|
||||
file: path=/home/copr-dist-git/.config state=directory
|
||||
ansible.builtin.file: path=/home/copr-dist-git/.config state=directory
|
||||
|
||||
- name: Install .config/copr for copr-dist-git user (required for pruning)
|
||||
template: src="copr.conf" dest="/home/copr-dist-git/.config/copr" owner=copr-dist-git group=copr-dist-git
|
||||
|
@ -161,7 +161,7 @@
|
|||
- cron
|
||||
|
||||
- name: Drop monthly cron job
|
||||
file:
|
||||
ansible.builtin.file:
|
||||
path: /etc/cron.monthly/copr-dist-git
|
||||
state: absent
|
||||
tags:
|
||||
|
|
|
@ -1,15 +1,15 @@
|
|||
---
|
||||
- name: Prepare mount point
|
||||
file: state=directory path=/var/lib/dist-git
|
||||
ansible.builtin.file: state=directory path=/var/lib/dist-git
|
||||
|
||||
- name: Mount up disk of copr repo
|
||||
mount: name=/var/lib/dist-git src='LABEL=copr-dist-git' fstype=ext4 state=mounted
|
||||
|
||||
- name: Prepare mount point
|
||||
file: state=directory path=/var/lib/copr-dist-git
|
||||
ansible.builtin.file: state=directory path=/var/lib/copr-dist-git
|
||||
|
||||
- name: Create symlink for per-task-logs
|
||||
file:
|
||||
ansible.builtin.file:
|
||||
state: link
|
||||
src: /var/lib/dist-git/per-task-logs
|
||||
path: /var/lib/copr-dist-git/per-task-logs
|
||||
|
|
|
@ -11,7 +11,7 @@
|
|||
- certbot
|
||||
|
||||
- name: Drop old and now unused coprs_ssl.conf
|
||||
file: path=/etc/httpd/conf.d/coprs_ssl.conf state=absent
|
||||
ansible.builtin.file: path=/etc/httpd/conf.d/coprs_ssl.conf state=absent
|
||||
notify:
|
||||
- reload httpd
|
||||
tags:
|
||||
|
|
|
@ -76,11 +76,11 @@
|
|||
# tags: patches
|
||||
|
||||
- name: Directory for postgresql dumps
|
||||
file: state=directory path=/var/www/html/db_dumps/
|
||||
ansible.builtin.file: state=directory path=/var/www/html/db_dumps/
|
||||
owner=copr-fe mode=755
|
||||
|
||||
- name: Directory for usage graphs
|
||||
file: state=directory path=/var/www/html/usage/
|
||||
ansible.builtin.file: state=directory path=/var/www/html/usage/
|
||||
owner=copr-fe mode=755
|
||||
|
||||
- name: Install copr configs
|
||||
|
@ -176,7 +176,7 @@
|
|||
when: update_indexes_required_result.rc != 0
|
||||
|
||||
- name: Make sure /etc/fedora-messaging directory exists
|
||||
file: path=/etc/fedora-messaging state=directory
|
||||
ansible.builtin.file: path=/etc/fedora-messaging state=directory
|
||||
|
||||
- name: Install fedora messaging config for Copr
|
||||
template: src="fedora-messaging/copr_messaging.toml" dest="/etc/fedora-messaging/copr_messaging.toml"
|
||||
|
|
|
@ -22,7 +22,7 @@
|
|||
- config
|
||||
|
||||
- name: Ensure postgres has a place to backup to
|
||||
file: dest=/backups state=directory owner=postgres
|
||||
ansible.builtin.file: dest=/backups state=directory owner=postgres
|
||||
tags:
|
||||
- config
|
||||
|
||||
|
@ -147,6 +147,6 @@
|
|||
register: history_file
|
||||
|
||||
- name: Install pghistory file
|
||||
file: path="{{ copr_fe_homedir }}/.psql_history" state=touch
|
||||
ansible.builtin.file: path="{{ copr_fe_homedir }}/.psql_history" state=touch
|
||||
owner=copr-fe group=copr-fe mode=0600
|
||||
when: not history_file.stat.exists
|
||||
|
|
|
@ -57,7 +57,7 @@
|
|||
tags: libvirtd
|
||||
|
||||
- name: Create libvirt image directory
|
||||
file: path={{ image_pool_dir }}
|
||||
ansible.builtin.file: path={{ image_pool_dir }}
|
||||
owner=qemu group=qemu mode=ug=rwx,g+s
|
||||
state=directory
|
||||
tags: libvirtd
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
---
|
||||
- name: Prepare mount point
|
||||
file: state=directory path=/var/lib/copr-keygen
|
||||
ansible.builtin.file: state=directory path=/var/lib/copr-keygen
|
||||
|
||||
- name: Mount up disk of copr repo
|
||||
mount: name=/var/lib/copr-keygen src='LABEL=copr-keygen' fstype=ext4 state=mounted
|
||||
|
@ -12,8 +12,7 @@
|
|||
- restart haveged
|
||||
|
||||
- name: Change owner of data to copr-signer
|
||||
file: path=/var/lib/copr-keygen owner=copr-signer group=copr-signer recurse=yes
|
||||
when: keychain_mounted.changed
|
||||
ansible.builtin.file: path=/var/lib/copr-keygen owner=copr-signer group=copr-signer recurse=yes
|
||||
|
||||
- name: Put keygen vhost for httpd
|
||||
copy: src="httpd/copr-keygen.conf" dest="/etc/httpd/conf.d/copr-keygen.conf"
|
||||
|
@ -46,7 +45,7 @@
|
|||
|
||||
# Three tasks for handling our custom selinux module
|
||||
- name: Ensure a directory exists for our custom selinux module
|
||||
file: dest=/usr/local/share/copr state=directory
|
||||
ansible.builtin.file: dest=/usr/local/share/copr state=directory
|
||||
|
||||
- name: Copy over our custom selinux module
|
||||
copy: src=selinux/copr_rules.pp dest=/usr/local/share/copr/copr_rules.pp
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
---
|
||||
- name: Ensure /backup dir
|
||||
file: path=/backup state=directory
|
||||
ansible.builtin.file: path=/backup state=directory
|
||||
|
||||
- name: Copy pubkey for backup encryption
|
||||
copy: src="{{ private }}/files/copr/keygen/backup_key.asc" dest="/root/backup_key.asc"
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
---
|
||||
- name: Create directories
|
||||
file: state=directory
|
||||
ansible.builtin.file: state=directory
|
||||
path=/srv/web/{{item}}
|
||||
owner=apache group=apache mode=0755
|
||||
setype=httpd_sys_content_t seuser=system_u
|
||||
|
|
|
@ -49,7 +49,7 @@
|
|||
# - stunnel
|
||||
|
||||
# - name: Ensure old stunnel init file is gone
|
||||
# file: dest=/etc/init.d/stunnel/stunnel.init state=absent
|
||||
# ansible.builtin.file: dest=/etc/init.d/stunnel/stunnel.init state=absent
|
||||
# tags:
|
||||
# - pagure
|
||||
# - stunnel
|
||||
|
@ -93,7 +93,7 @@
|
|||
- pagure
|
||||
|
||||
- name: Create the /var/log/pagure folder where to store the logs
|
||||
file: state=directory
|
||||
ansible.builtin.file: state=directory
|
||||
path=/var/log/pagure
|
||||
owner=pagure group=packager mode=u+rwx,g+rwxs,o+rx
|
||||
tags:
|
||||
|
@ -113,7 +113,7 @@
|
|||
- fix_log
|
||||
|
||||
- name: Create the /srv/tmp folder where to clone repos
|
||||
file: state=directory
|
||||
ansible.builtin.file: state=directory
|
||||
path=/srv/tmp
|
||||
owner=pagure group=pagure mode=0775
|
||||
tags:
|
||||
|
@ -163,7 +163,7 @@
|
|||
- pagure
|
||||
|
||||
- name: Create all the directories where we store the git repos
|
||||
file: state=directory
|
||||
ansible.builtin.file: state=directory
|
||||
path={{ item }}
|
||||
owner=root group=packager mode=2775
|
||||
with_items:
|
||||
|
@ -176,7 +176,7 @@
|
|||
- pagure
|
||||
|
||||
- name: Create the remotes folder so pagure can clone remote repos
|
||||
file: state=directory
|
||||
ansible.builtin.file: state=directory
|
||||
path={{ item }}
|
||||
owner=root group=packager mode=2775
|
||||
with_items:
|
||||
|
@ -271,7 +271,7 @@
|
|||
- restart apache
|
||||
|
||||
- name: Create the /srv/cache/extras folder for the crons
|
||||
file: state=directory
|
||||
ansible.builtin.file: state=directory
|
||||
path=/srv/cache/extras
|
||||
owner=apache group=apache mode=0775
|
||||
tags:
|
||||
|
@ -321,7 +321,7 @@
|
|||
- fedora-messaging
|
||||
|
||||
- name: Create the config folder for fedora-messaging
|
||||
file: path=/etc/fedora-messaging/ owner=root group=root mode=0755 state=directory
|
||||
ansible.builtin.file: path=/etc/fedora-messaging/ owner=root group=root mode=0755 state=directory
|
||||
tags:
|
||||
- pagure
|
||||
- fedora-messaging
|
||||
|
@ -335,7 +335,7 @@
|
|||
- fedora-messaging
|
||||
|
||||
- name: Create folder where we'll place the certs
|
||||
file: path=/etc/pki/rabbitmq/pagurecert/ owner=root group=root mode=0755 state=directory
|
||||
ansible.builtin.file: path=/etc/pki/rabbitmq/pagurecert/ owner=root group=root mode=0755 state=directory
|
||||
tags:
|
||||
- pagure
|
||||
- fedora-messaging
|
||||
|
|
|
@ -42,7 +42,7 @@
|
|||
- distgit
|
||||
|
||||
- name: Create suexec wrapper directory
|
||||
file: path=/var/www/bin state=directory owner=pagure group=packager
|
||||
ansible.builtin.file: path=/var/www/bin state=directory owner=pagure group=packager
|
||||
tags:
|
||||
- distgit
|
||||
|
||||
|
@ -168,13 +168,13 @@
|
|||
when: inventory_hostname.startswith('batcave')
|
||||
|
||||
- name: Create the distgit root directory (/srv/git)
|
||||
file: dest=/srv/git state=directory mode=0755
|
||||
ansible.builtin.file: dest=/srv/git state=directory mode=0755
|
||||
tags:
|
||||
- distgit
|
||||
|
||||
# These should all map to pkgdb namespaces
|
||||
- name: Create our namespace directories inside there..
|
||||
file: dest=/srv/git/repositories/{{item}} state=directory mode=2775 group=packager
|
||||
ansible.builtin.file: dest=/srv/git/repositories/{{item}} state=directory mode=2775 group=packager
|
||||
with_items:
|
||||
- rpms
|
||||
- docker
|
||||
|
@ -247,7 +247,7 @@
|
|||
- sslciphers
|
||||
|
||||
- name: Create the Lookaside Cache root directory
|
||||
file: dest=/srv/cache/lookaside/pkgs state=directory
|
||||
ansible.builtin.file: dest=/srv/cache/lookaside/pkgs state=directory
|
||||
owner=apache group=apache
|
||||
tags:
|
||||
- distgit
|
||||
|
@ -310,7 +310,7 @@
|
|||
|
||||
# Three tasks for handling our selinux policy for upload.cgi
|
||||
- name: Ensure a directory exists for our SELinux policy
|
||||
file: dest=/usr/local/share/selinux/ state=directory
|
||||
ansible.builtin.file: dest=/usr/local/share/selinux/ state=directory
|
||||
tags: selinux
|
||||
|
||||
- name: Copy over our custom selinux policy
|
||||
|
@ -349,7 +349,7 @@
|
|||
- pkgs
|
||||
|
||||
- name: Make dir for grokmirror manifest
|
||||
file: path=/srv/git/grokmirror state=directory owner=root group=packager mode=2775
|
||||
ansible.builtin.file: path=/srv/git/grokmirror state=directory owner=root group=packager mode=2775
|
||||
tags:
|
||||
- grokmirror
|
||||
- pkgs
|
||||
|
|
|
@ -20,7 +20,7 @@
|
|||
- docker-distribution
|
||||
|
||||
- name: Ensure docker certs dir exists
|
||||
file:
|
||||
ansible.builtin.file:
|
||||
path: "{{ cert.dest_dir }}"
|
||||
state: directory
|
||||
when: tls.enabled
|
||||
|
|
|
@ -9,10 +9,10 @@
|
|||
- packages
|
||||
|
||||
- name: Create /srv/pub directory
|
||||
file: path=/srv/pub state=directory
|
||||
ansible.builtin.file: path=/srv/pub state=directory
|
||||
|
||||
- name: Create /srv/web directory
|
||||
file: path=/srv/web state=directory
|
||||
ansible.builtin.file: path=/srv/web state=directory
|
||||
|
||||
- name: Set httpd_use_nfs seboolean
|
||||
seboolean: name=httpd_use_nfs state=yes persistent=yes
|
||||
|
|
|
@ -3,14 +3,14 @@
|
|||
|
||||
## Create all the folder used/needed
|
||||
- name: Create the easyfix folder
|
||||
file: state=directory
|
||||
ansible.builtin.file: state=directory
|
||||
path=/srv/web/easyfix
|
||||
owner=apache group=apache mode=0755
|
||||
tags:
|
||||
- easyfix
|
||||
|
||||
- name: Create the easyfix configuration folder
|
||||
file: state=directory
|
||||
ansible.builtin.file: state=directory
|
||||
path=/etc/fedora-gather-easyfix/
|
||||
owner=root group=root mode=0755
|
||||
tags:
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
---
|
||||
- name: Ensure dir for content exists
|
||||
file: dest=/srv/web/gather-easyfix owner=root group=root mode=0755 state=directory
|
||||
ansible.builtin.file: dest=/srv/web/gather-easyfix owner=root group=root mode=0755 state=directory
|
||||
tags:
|
||||
- easyfix
|
||||
- easyfix/proxy
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
---
|
||||
- name: Create the directories to hold the templates
|
||||
file:
|
||||
ansible.builtin.file:
|
||||
path: "/root/ocp4/openshift-apps/fas2discourse-operator"
|
||||
state: directory
|
||||
owner: root
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
---
|
||||
|
||||
- name: Create the fas2discourse keytab path on the batcave01
|
||||
file:
|
||||
ansible.builtin.file:
|
||||
path: "/etc/openshift_apps/fas2discourse/"
|
||||
state: directory
|
||||
owner: root
|
||||
|
|
|
@ -43,13 +43,13 @@
|
|||
when: ansible_distribution_major_version|int < 31 and ansible_distribution == 'Fedora'
|
||||
|
||||
- name: Setup /etc/fedmsg.d directory
|
||||
file: path=/etc/fedmsg.d owner=root group=root mode=0755 state=directory
|
||||
ansible.builtin.file: path=/etc/fedmsg.d owner=root group=root mode=0755 state=directory
|
||||
tags:
|
||||
- config
|
||||
- fedmsg/base
|
||||
|
||||
- name: Remove any old static endpoints files
|
||||
file: dest="/etc/fedmsg.d/{{item}}" state=absent
|
||||
ansible.builtin.file: dest="/etc/fedmsg.d/{{item}}" state=absent
|
||||
with_items:
|
||||
- endpoints-bodhi.py
|
||||
- endpoints-elections.py
|
||||
|
@ -172,7 +172,7 @@
|
|||
- restart fedmsg-relay
|
||||
|
||||
- name: Destroy standard config to make way for debug loopback.
|
||||
file: dest=/etc/fedmsg.d/{{item}} state=absent
|
||||
ansible.builtin.file: dest=/etc/fedmsg.d/{{item}} state=absent
|
||||
with_items:
|
||||
- relay.py
|
||||
- policy.py
|
||||
|
@ -208,7 +208,7 @@
|
|||
- fedmsg/base
|
||||
|
||||
- name: Setup /etc/pki/fedmsg directory
|
||||
file: path=/etc/pki/fedmsg owner=root group=root mode=0755 state=directory
|
||||
ansible.builtin.file: path=/etc/pki/fedmsg owner=root group=root mode=0755 state=directory
|
||||
tags:
|
||||
- config
|
||||
- fedmsg/base
|
||||
|
@ -254,7 +254,7 @@
|
|||
|
||||
# Three tasks for handling our custom selinux module
|
||||
- name: Ensure a directory exists for our custom selinux module
|
||||
file: dest=/usr/local/share/fedmsg state=directory
|
||||
ansible.builtin.file: dest=/usr/local/share/fedmsg state=directory
|
||||
tags:
|
||||
- fedmsg/base
|
||||
|
||||
|
|
|
@ -5,7 +5,7 @@
|
|||
|
||||
---
|
||||
- name: Ensure dir for content exists
|
||||
file: dest=/srv/web/fedmsg owner=apache group=apache mode=0755 state=directory
|
||||
ansible.builtin.file: dest=/srv/web/fedmsg owner=apache group=apache mode=0755 state=directory
|
||||
tags:
|
||||
- fedmsg
|
||||
- fedmsg/crl
|
||||
|
|
|
@ -61,7 +61,7 @@
|
|||
# Stunnel specific bits
|
||||
|
||||
- name: Create directories
|
||||
file: path=/etc/{{ item }} state=directory
|
||||
ansible.builtin.file: path=/etc/{{ item }} state=directory
|
||||
with_items:
|
||||
- stunnel
|
||||
tags:
|
||||
|
@ -80,7 +80,7 @@
|
|||
- fedmsg/gateway/slave
|
||||
|
||||
- name: Ensure old stunnel init file is gone
|
||||
file: dest=/etc/init.d/stunnel/stunnel.init state=absent
|
||||
ansible.builtin.file: dest=/etc/init.d/stunnel/stunnel.init state=absent
|
||||
tags:
|
||||
- fedmsg/gateway
|
||||
- fedmsg/gateway/slave
|
||||
|
|
|
@ -6,7 +6,7 @@
|
|||
- fedmsg/gateway
|
||||
|
||||
- name: Ensure that nrpe has rights to monitor us
|
||||
file: >
|
||||
ansible.builtin.file: >
|
||||
dest=/var/run/fedmsg/monitoring-fedmsg-gateway.socket
|
||||
mode=0775
|
||||
owner=fedmsg
|
||||
|
@ -25,7 +25,7 @@
|
|||
- restart fedmsg-gateway
|
||||
|
||||
- name: Create systemd drop-in directory
|
||||
file: >
|
||||
ansible.builtin.file: >
|
||||
dest=/etc/systemd/system/fedmsg-gateway.service.d
|
||||
state=directory
|
||||
tags:
|
||||
|
|
|
@ -35,12 +35,12 @@
|
|||
notify: restart fedmsg-hub
|
||||
|
||||
- name: Disable the websocket server if we should..
|
||||
file: dest=/etc/fedmsg.d/websockets.py state=absent
|
||||
ansible.builtin.file: dest=/etc/fedmsg.d/websockets.py state=absent
|
||||
when: not enable_websocket_server
|
||||
notify: restart fedmsg-hub
|
||||
|
||||
- name: Set fedmsg ownership on /var/run/fedmsg
|
||||
file: >
|
||||
ansible.builtin.file: >
|
||||
dest=/var/run/fedmsg/
|
||||
mode=2775
|
||||
owner=fedmsg
|
||||
|
@ -50,7 +50,7 @@
|
|||
- fedmsgmonitor
|
||||
|
||||
- name: Ensure that nrpe has rights to monitor us
|
||||
file: >
|
||||
ansible.builtin.file: >
|
||||
dest=/var/run/fedmsg/monitoring-fedmsg-hub.socket
|
||||
mode=0775
|
||||
owner=fedmsg
|
||||
|
@ -63,7 +63,7 @@
|
|||
- fedmsgmonitor
|
||||
|
||||
- name: Create systemd config directoryies
|
||||
file: path="/etc/systemd/system/{{ item }}.service.d" state=directory
|
||||
ansible.builtin.file: path="/etc/systemd/system/{{ item }}.service.d" state=directory
|
||||
with_items:
|
||||
- fedmsg-hub
|
||||
- fedmsg-hub-3
|
||||
|
|
|
@ -11,7 +11,7 @@
|
|||
- fedmsg/irc
|
||||
|
||||
- name: Ensure that nrpe has rights to monitor us
|
||||
file: >
|
||||
ansible.builtin.file: >
|
||||
dest=/var/run/fedmsg/monitoring-fedmsg-irc.socket
|
||||
mode=0775
|
||||
owner=fedmsg
|
||||
|
|
|
@ -17,7 +17,7 @@
|
|||
when: ansible_distribution_major_version|int > 21
|
||||
|
||||
- name: Ensure that nrpe has rights to monitor us
|
||||
file: >
|
||||
ansible.builtin.file: >
|
||||
dest=/var/run/fedmsg/monitoring-fedmsg-relay.socket
|
||||
mode=0775
|
||||
owner=fedmsg
|
||||
|
|
|
@ -1,5 +1,5 @@
|
|||
---
|
||||
- file: dest=/srv/web/budget.fedoraproject.org state=directory
|
||||
- ansible.builtin.file: dest=/srv/web/budget.fedoraproject.org state=directory
|
||||
|
||||
- template: >
|
||||
src=budget-sync.j2 dest=/usr/local/bin/budget-sync
|
||||
|
|
|
@ -57,7 +57,7 @@
|
|||
- fedora-web
|
||||
|
||||
- name: Create directories
|
||||
file:
|
||||
ansible.builtin.file:
|
||||
state: directory
|
||||
path: /srv/web/{{ item }}
|
||||
owner: apache
|
||||
|
@ -75,7 +75,7 @@
|
|||
- fedora-web
|
||||
|
||||
- name: Make fmw dir
|
||||
file:
|
||||
ansible.builtin.file:
|
||||
state: directory
|
||||
path: /srv/web/fmw
|
||||
owner: apache
|
||||
|
@ -88,7 +88,7 @@
|
|||
when: env != 'staging'
|
||||
|
||||
- name: Make fmw dir
|
||||
file:
|
||||
ansible.builtin.file:
|
||||
state: directory
|
||||
path: /srv/web/fmw
|
||||
owner: apache
|
||||
|
@ -101,14 +101,14 @@
|
|||
when: env == 'staging'
|
||||
|
||||
- name: Remove the syncTranslations cronjob
|
||||
file:
|
||||
ansible.builtin.file:
|
||||
path: /etc/cron.d/syncTranslations.cron
|
||||
state: absent
|
||||
tags:
|
||||
- cron
|
||||
|
||||
- name: Remove the syncStatic cronjob
|
||||
file:
|
||||
ansible.builtin.file:
|
||||
path: /etc/cron.d/syncStatic.cron
|
||||
state: absent
|
||||
tags:
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
---
|
||||
- name: Make /srv/web/fedora.im dir
|
||||
file: state=directory
|
||||
ansible.builtin.file: state=directory
|
||||
path=/srv/web/fedora.im
|
||||
owner=apache
|
||||
group=apache
|
||||
|
|
|
@ -10,7 +10,7 @@
|
|||
|
||||
- name: Load s3 credentials
|
||||
ansible.builtin.include_vars:
|
||||
file: "{{ private }}/files/websites/s3_fedoraproject_{{ env_short }}.yml"
|
||||
ansible.builtin.file: "{{ private }}/files/websites/s3_fedoraproject_{{ env_short }}.yml"
|
||||
ignore_errors: true
|
||||
tags:
|
||||
- fedora-web
|
||||
|
@ -38,7 +38,7 @@
|
|||
- fedoraproject_s3_bucket_name is defined
|
||||
|
||||
- name: Make directory for the config files for {{website}} we are about to copy
|
||||
file: path=/etc/httpd/conf.d/{{website}} state=directory owner=root group=root mode=0755
|
||||
ansible.builtin.file: path=/etc/httpd/conf.d/{{website}} state=directory owner=root group=root mode=0755
|
||||
tags:
|
||||
- fedora-web
|
||||
- fedora-web/main
|
||||
|
@ -80,7 +80,7 @@
|
|||
- fedora-web/main
|
||||
|
||||
- name: Create a directory for hotspot
|
||||
file: path=/srv/web state=directory owner=root group=root mode=0755
|
||||
ansible.builtin.file: path=/srv/web state=directory owner=root group=root mode=0755
|
||||
tags:
|
||||
- fedora-web
|
||||
- fedora-web/main
|
||||
|
|
|
@ -8,7 +8,7 @@
|
|||
- ostree
|
||||
|
||||
- name: Make ostree dir
|
||||
file: state=directory
|
||||
ansible.builtin.file: state=directory
|
||||
path=/srv/web/ostree
|
||||
owner=apache
|
||||
group=sysadmin-releng
|
||||
|
@ -21,7 +21,7 @@
|
|||
when: env != 'staging'
|
||||
|
||||
- name: Make ostree dir
|
||||
file: state=directory
|
||||
ansible.builtin.file: state=directory
|
||||
path=/srv/web/ostree
|
||||
owner=apache
|
||||
group=apache
|
||||
|
@ -43,7 +43,7 @@
|
|||
- ostree
|
||||
|
||||
- name: Make IoT ostree dir
|
||||
file: state=directory
|
||||
ansible.builtin.file: state=directory
|
||||
path=/srv/web/ostree/iot
|
||||
owner=apache
|
||||
group=sysadmin-releng
|
||||
|
@ -56,7 +56,7 @@
|
|||
when: env != 'staging'
|
||||
|
||||
- name: Make IoT ostree dir
|
||||
file: state=directory
|
||||
ansible.builtin.file: state=directory
|
||||
path=/srv/web/ostree/iot
|
||||
owner=apache
|
||||
group=apache
|
||||
|
|
|
@ -1,11 +1,11 @@
|
|||
---
|
||||
- name: Make registry-signatures dir
|
||||
file: state=directory path=/srv/web/registry-signatures owner=apache group=sysadmin-releng mode=2775 setype=httpd_sys_content_t seuser=system_u
|
||||
ansible.builtin.file: state=directory path=/srv/web/registry-signatures owner=apache group=sysadmin-releng mode=2775 setype=httpd_sys_content_t seuser=system_u
|
||||
tags:
|
||||
- fedora-web
|
||||
|
||||
- name: Make registry-index dir
|
||||
file: state=directory path=/srv/web/registry-index owner=apache group=apache mode=755 setype=httpd_sys_content_t seuser=system_u
|
||||
ansible.builtin.file: state=directory path=/srv/web/registry-index owner=apache group=apache mode=755 setype=httpd_sys_content_t seuser=system_u
|
||||
tags:
|
||||
- fedora-web
|
||||
|
||||
|
|
|
@ -104,7 +104,7 @@
|
|||
- restart fedora_nightlies
|
||||
|
||||
- name: Create /etc/pki/fedora-messaging
|
||||
file:
|
||||
ansible.builtin.file:
|
||||
dest: /etc/pki/fedora-messaging
|
||||
mode: "0775"
|
||||
owner: root
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
---
|
||||
- name: Create directories
|
||||
file:
|
||||
ansible.builtin.file:
|
||||
state: directory
|
||||
path: "/srv/web/{{item}}"
|
||||
owner: apache
|
||||
|
|
|
@ -11,7 +11,7 @@
|
|||
- config
|
||||
|
||||
- name: Ensure /var/spool/squid directory exists
|
||||
file:
|
||||
ansible.builtin.file:
|
||||
path: /var/spool/squid
|
||||
state: directory
|
||||
owner: squid
|
||||
|
@ -22,7 +22,7 @@
|
|||
- config
|
||||
|
||||
- name: Ensure /etc/pki/squid directory exists
|
||||
file:
|
||||
ansible.builtin.file:
|
||||
path: /etc/pki/squid
|
||||
state: directory
|
||||
owner: squid
|
||||
|
|
|
@ -12,7 +12,7 @@
|
|||
- packages
|
||||
|
||||
- name: Setup /srv/web/freemedia directory
|
||||
file: path=/srv/web/freemedia owner=root group=root mode=0755 state=directory
|
||||
ansible.builtin.file: path=/srv/web/freemedia owner=root group=root mode=0755 state=directory
|
||||
tags:
|
||||
- config
|
||||
|
||||
|
|
|
@ -41,7 +41,7 @@
|
|||
- geoip-city-wsgi/app
|
||||
|
||||
- name: Setup /usr/share/geoip-city-wsgi directory
|
||||
file: >
|
||||
ansible.builtin.file: >
|
||||
path=/usr/share/geoip-city-wsgi
|
||||
owner=root
|
||||
group=root
|
||||
|
|
|
@ -11,7 +11,7 @@
|
|||
- geoip-city-wsgi/proxy
|
||||
|
||||
- name: Make a dir for our fancy about page. So chic!
|
||||
file: dest=/srv/web/geoip state=directory mode=0775 owner=root group=root
|
||||
ansible.builtin.file: dest=/srv/web/geoip state=directory mode=0775 owner=root group=root
|
||||
tags:
|
||||
- geoip-city-wsgi
|
||||
- geoip-city-wsgi/proxy
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
when: (ansible_distribution == 'RedHat' and ansible_distribution_major_version|int >= 8)
|
||||
|
||||
- name: Make sure the /usr/share/GeoIP/ directory exists
|
||||
file:
|
||||
ansible.builtin.file:
|
||||
path: /usr/share/GeoIP/
|
||||
state: directory
|
||||
owner: root
|
||||
|
|
|
@ -8,7 +8,7 @@
|
|||
- python2
|
||||
|
||||
- name: Create the destination directory
|
||||
file: dest=/srv/git_seed owner=root group=root mode=0755 state=directory
|
||||
ansible.builtin.file: dest=/srv/git_seed owner=root group=root mode=0755 state=directory
|
||||
when: env != 'staging'
|
||||
|
||||
- name: Install the production version of the script and schedule its execution
|
||||
|
|
|
@ -7,12 +7,12 @@
|
|||
|
||||
# If NOT using xinetd
|
||||
- name: Delete stock git daemon config
|
||||
file: path="/usr/lib/systemd/system/git.service" state=absent
|
||||
ansible.builtin.file: path="/usr/lib/systemd/system/git.service" state=absent
|
||||
when: ansible_distribution_major_version|int >= 7 and ansible_distribution == 'RedHat'
|
||||
tags: git/server
|
||||
|
||||
- name: Delete stock git daemon config
|
||||
file: path="/usr/lib/systemd/system/git.service" state=absent
|
||||
ansible.builtin.file: path="/usr/lib/systemd/system/git.service" state=absent
|
||||
when: ansible_distribution_major_version|int >= 29 and ansible_distribution == 'Fedora'
|
||||
tags: git/server
|
||||
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
- github2fedmsg
|
||||
|
||||
- name: Make some directories
|
||||
file: dest="{{item}}" mode=0755 state=directory
|
||||
ansible.builtin.file: dest="{{item}}" mode=0755 state=directory
|
||||
with_items:
|
||||
- /etc/github2fedmsg
|
||||
- /usr/share/github2fedmsg
|
||||
|
|
|
@ -8,4 +8,4 @@
|
|||
- perl-Sys-Syslog
|
||||
|
||||
- name: Ensure the /etc/gitolite directory
|
||||
file: path=/etc/gitolite owner=root group=root mode=0755 state=directory
|
||||
ansible.builtin.file: path=/etc/gitolite owner=root group=root mode=0755 state=directory
|
||||
|
|
|
@ -11,7 +11,7 @@
|
|||
- grobi
|
||||
|
||||
- name: Make sure that /usr/local/bin exists
|
||||
file: path=/usr/local/bin state=directory
|
||||
ansible.builtin.file: path=/usr/local/bin state=directory
|
||||
tags:
|
||||
- grobi
|
||||
|
||||
|
|
|
@ -12,12 +12,12 @@
|
|||
user: name=grokmirror local=true
|
||||
|
||||
- name: Create directory to mirror repos to
|
||||
file: dest={{grokmirror_topdir}} mode=0755 state=directory owner=grokmirror
|
||||
ansible.builtin.file: dest={{grokmirror_topdir}} mode=0755 state=directory owner=grokmirror
|
||||
tags:
|
||||
- grokmirror-mirror
|
||||
|
||||
- name: Create directory to mirror site to
|
||||
file: dest={{grokmirror_topdir}}/src.fedoraproject.org mode=0755 state=directory owner=grokmirror
|
||||
ansible.builtin.file: dest={{grokmirror_topdir}}/src.fedoraproject.org mode=0755 state=directory owner=grokmirror
|
||||
tags:
|
||||
- grokmirror-mirror
|
||||
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
---
|
||||
- name: Make directory for the config files for {{website}} we are about to copy
|
||||
file: path=/etc/httpd/conf.d/{{website}} state=directory owner=root group=root mode=0755
|
||||
ansible.builtin.file: path=/etc/httpd/conf.d/{{website}} state=directory owner=root group=root mode=0755
|
||||
tags:
|
||||
- haproxy
|
||||
- haproxy/rewrite
|
||||
|
|
|
@ -79,7 +79,7 @@
|
|||
# These following four tasks are used for copying over our custom selinux
|
||||
# module.
|
||||
- name: Ensure a directory exists for our custom selinux module
|
||||
file: dest=/usr/share/haproxy state=directory
|
||||
ansible.builtin.file: dest=/usr/share/haproxy state=directory
|
||||
tags:
|
||||
- haproxy
|
||||
- selinux
|
||||
|
|
|
@ -16,7 +16,7 @@
|
|||
- httpd/proxy
|
||||
|
||||
- name: Make sure certain files are gone
|
||||
file: dest=/etc/httpd/conf.d/{{item}} state=absent
|
||||
ansible.builtin.file: dest=/etc/httpd/conf.d/{{item}} state=absent
|
||||
with_items:
|
||||
- welcome.conf
|
||||
tags:
|
||||
|
@ -38,7 +38,7 @@
|
|||
- httpd/proxy
|
||||
|
||||
- name: Remove the keepalives configuration
|
||||
file: path=/etc/httpd/conf.d/01-keepalives.conf state=absent
|
||||
ansible.builtin.file: path=/etc/httpd/conf.d/01-keepalives.conf state=absent
|
||||
notify:
|
||||
- reload proxyhttpd
|
||||
tags:
|
||||
|
@ -86,7 +86,7 @@
|
|||
- selinux
|
||||
|
||||
- name: Create pki/httpd
|
||||
file: path=/etc/pki/httpd state=directory
|
||||
ansible.builtin.file: path=/etc/pki/httpd state=directory
|
||||
owner=root group=root mode=0600
|
||||
tags:
|
||||
- httpd
|
||||
|
@ -100,7 +100,7 @@
|
|||
- disablesystemdoomd
|
||||
|
||||
- name: Create systemd drop in dir for httpd
|
||||
file: path=/etc/systemd/system/httpd.service.d/ state=directory
|
||||
ansible.builtin.file: path=/etc/systemd/system/httpd.service.d/ state=directory
|
||||
tags:
|
||||
- httpd
|
||||
- httpd/proxy
|
||||
|
|
|
@ -9,7 +9,7 @@
|
|||
|
||||
---
|
||||
- name: Ensure directory exists for redirect
|
||||
file:
|
||||
ansible.builtin.file:
|
||||
path: /etc/httpd/conf.d/{{website}}
|
||||
state: directory
|
||||
mode: '0755'
|
||||
|
|
|
@ -10,7 +10,7 @@
|
|||
|
||||
---
|
||||
- name: Create site directory in httpd/conf.d/{{site_name}}
|
||||
file: >
|
||||
ansible.builtin.file: >
|
||||
dest=/etc/httpd/conf.d/{{site_name}}
|
||||
state=directory
|
||||
owner=root
|
||||
|
@ -63,7 +63,7 @@
|
|||
- robots
|
||||
|
||||
- name: Create /srv/web
|
||||
file: >
|
||||
ansible.builtin.file: >
|
||||
dest=/srv/web
|
||||
state=directory
|
||||
owner=root
|
||||
|
|
|
@ -34,7 +34,7 @@
|
|||
- config
|
||||
|
||||
- name: Remove ipa sshd config since we do not need it
|
||||
file:
|
||||
ansible.builtin.file:
|
||||
state: absent
|
||||
path: /etc/ssh/sshd_config.d/04-ipa.conf
|
||||
tags:
|
||||
|
|
|
@ -95,7 +95,7 @@
|
|||
- patches
|
||||
|
||||
- name: Make sure /etc/ipsilon/root is owned correctly
|
||||
file:
|
||||
ansible.builtin.file:
|
||||
path: "/etc/ipsilon/root"
|
||||
owner: ipsilon
|
||||
group: ipsilon
|
||||
|
@ -166,7 +166,7 @@
|
|||
- ipsilon
|
||||
|
||||
- name: Create SAML2 dir
|
||||
file:
|
||||
ansible.builtin.file:
|
||||
path: /etc/ipsilon/root/saml2
|
||||
state: directory
|
||||
mode: "0700"
|
||||
|
@ -251,7 +251,7 @@
|
|||
- ipsilon
|
||||
|
||||
- name: Apply selinux type to the wsgi file
|
||||
file:
|
||||
ansible.builtin.file:
|
||||
dest: /usr/libexec/ipsilon
|
||||
setype: httpd_sys_content_t
|
||||
tags:
|
||||
|
|
|
@ -6,7 +6,7 @@
|
|||
- patchutils
|
||||
|
||||
- name: Prepare the patches directory
|
||||
file:
|
||||
ansible.builtin.file:
|
||||
path: /opt/ipsilon-patches
|
||||
state: directory
|
||||
|
||||
|
|
|
@ -15,7 +15,7 @@
|
|||
- kerneltest
|
||||
|
||||
- name: Create the folder to store the logs
|
||||
file: state=directory
|
||||
ansible.builtin.file: state=directory
|
||||
path=/var/www/logs
|
||||
owner=apache group=apache mode=0755
|
||||
tags:
|
||||
|
@ -56,7 +56,7 @@
|
|||
- selinux
|
||||
|
||||
- name: Apply selinux type to log files
|
||||
file: >
|
||||
ansible.builtin.file: >
|
||||
dest=/var/www/logs
|
||||
setype=httpd_sys_rw_content_t
|
||||
state=directory
|
||||
|
|
|
@ -108,7 +108,7 @@
|
|||
|
||||
- name: Destroy stored keytab
|
||||
delegate_to: "{{ ipa_server }}"
|
||||
file: path=/tmp/{{service}}_{{host}}.kt state=absent
|
||||
ansible.builtin.file: path=/tmp/{{service}}_{{host}}.kt state=absent
|
||||
tags:
|
||||
- keytab
|
||||
- config
|
||||
|
@ -134,14 +134,14 @@
|
|||
when: not keytab_status.stat.exists
|
||||
|
||||
- name: Destroy encoded keytab
|
||||
file: path={{kt_location}}.b64 state=absent
|
||||
ansible.builtin.file: path={{kt_location}}.b64 state=absent
|
||||
tags:
|
||||
- keytab
|
||||
- config
|
||||
- krb5
|
||||
|
||||
- name: Set keytab permissions
|
||||
file: path={{kt_location}} owner={{owner_user}} group={{owner_group}} mode=0640 state=file
|
||||
ansible.builtin.file: path={{kt_location}} owner={{owner_user}} group={{owner_group}} mode=0640 state=file
|
||||
tags:
|
||||
- keytab
|
||||
- config
|
||||
|
|
|
@ -19,12 +19,12 @@
|
|||
- koji_builder
|
||||
|
||||
- name: Make mock homedir perms
|
||||
file: state=directory path=/var/lib/mock mode=2775 owner=root group=mock
|
||||
ansible.builtin.file: state=directory path=/var/lib/mock mode=2775 owner=root group=mock
|
||||
tags:
|
||||
- koji_builder
|
||||
|
||||
- name: Add mock ssh dir
|
||||
file: state=directory path=/var/lib/mock/.ssh mode=700 owner=mock group=mock
|
||||
ansible.builtin.file: state=directory path=/var/lib/mock/.ssh mode=700 owner=mock group=mock
|
||||
tags:
|
||||
- koji_builder
|
||||
|
||||
|
@ -44,7 +44,7 @@
|
|||
- koji_builder
|
||||
|
||||
- name: Mockbuilder .ssh dir
|
||||
file: state=directory path=/home/mockbuilder/.ssh mode=700 owner=mockbuilder group=mockbuilder
|
||||
ansible.builtin.file: state=directory path=/home/mockbuilder/.ssh mode=700 owner=mockbuilder group=mockbuilder
|
||||
tags:
|
||||
- koji_builder
|
||||
|
||||
|
@ -54,7 +54,7 @@
|
|||
- koji_builder
|
||||
|
||||
- name: Make a bunch of dirs
|
||||
file: state=directory path={{ item }}
|
||||
ansible.builtin.file: state=directory path={{ item }}
|
||||
with_items:
|
||||
- /pub
|
||||
- /mnt/fedora_koji
|
||||
|
@ -115,7 +115,7 @@
|
|||
- rpmautospec
|
||||
|
||||
- name: Remove obsolete configuration of rpmautospec
|
||||
file:
|
||||
ansible.builtin.file:
|
||||
path: "/etc/kojid/plugins/{{ item }}"
|
||||
state: absent
|
||||
loop:
|
||||
|
@ -161,7 +161,7 @@
|
|||
- rpmautospec
|
||||
|
||||
- name: Create osbuild builder config directory
|
||||
file: path=/etc/koji-osbuild state=directory mode=0755
|
||||
ansible.builtin.file: path=/etc/koji-osbuild state=directory mode=0755
|
||||
tags:
|
||||
- koji_builder
|
||||
- koji_builder_osbuild
|
||||
|
@ -197,12 +197,12 @@
|
|||
|
||||
# setup for oz/imagefactory
|
||||
- name: Make .psphere dir
|
||||
file: state=directory path=/root/.psphere mode=775 owner=root group=root
|
||||
ansible.builtin.file: state=directory path=/root/.psphere mode=775 owner=root group=root
|
||||
tags:
|
||||
- koji_builder
|
||||
|
||||
- name: Make .psphere/templates dir
|
||||
file: state=directory path=/root/.psphere/templates mode=775 owner=root group=root
|
||||
ansible.builtin.file: state=directory path=/root/.psphere/templates mode=775 owner=root group=root
|
||||
tags:
|
||||
- koji_builder
|
||||
|
||||
|
@ -256,13 +256,13 @@
|
|||
#
|
||||
|
||||
- name: Make a mnt/koji link
|
||||
file: state=link src=/mnt/fedora_koji/koji dest=/mnt/koji
|
||||
ansible.builtin.file: state=link src=/mnt/fedora_koji/koji dest=/mnt/koji
|
||||
when: koji_hub_nfs is defined and koji_hub_nfs == "fedora_koji" and createrepo == True
|
||||
tags:
|
||||
- koji_builder
|
||||
|
||||
- name: Make a mnt/koji link
|
||||
file: state=link src=/mnt/fedora_koji/koji dest=/mnt/koji force=yes
|
||||
ansible.builtin.file: state=link src=/mnt/fedora_koji/koji dest=/mnt/koji force=yes
|
||||
when: inventory_hostname.startswith(('buildvm-s390x-11', 'buildvm-s390x-12', 'buildvm-s390x-13'))
|
||||
tags:
|
||||
- koji_builder
|
||||
|
@ -272,7 +272,7 @@
|
|||
#
|
||||
|
||||
- name: Make a mnt/koji link
|
||||
file: state=link src=/mnt/fedora_koji dest=/mnt/koji
|
||||
ansible.builtin.file: state=link src=/mnt/fedora_koji dest=/mnt/koji
|
||||
when: koji_hub_nfs is defined and koji_hub_nfs != "fedora_koji" and createrepo == True
|
||||
tags:
|
||||
- koji_builder
|
||||
|
@ -332,7 +332,7 @@
|
|||
- selinux
|
||||
|
||||
- name: Create directory for shared secrets
|
||||
file:
|
||||
ansible.builtin.file:
|
||||
path: /etc/kojid/secrets
|
||||
state: directory
|
||||
owner: root
|
||||
|
@ -394,7 +394,7 @@
|
|||
- koji_builder/osbuildapi
|
||||
|
||||
- name: Create override dir for systemd-nspawn containers config
|
||||
file:
|
||||
ansible.builtin.file:
|
||||
state: directory
|
||||
owner: root
|
||||
group: root
|
||||
|
|
|
@ -35,10 +35,10 @@
|
|||
- koji_hub_osbuild
|
||||
|
||||
- name: Make koji pki directory
|
||||
file: state=directory path=/etc/pki/koji/ owner=root group=root
|
||||
ansible.builtin.file: state=directory path=/etc/pki/koji/ owner=root group=root
|
||||
|
||||
- name: Make koji pki subdirectories
|
||||
file: state=directory path=/etc/pki/koji/{{ item }} owner=root group=root
|
||||
ansible.builtin.file: state=directory path=/etc/pki/koji/{{ item }} owner=root group=root
|
||||
with_items:
|
||||
- certs
|
||||
- private
|
||||
|
@ -104,7 +104,7 @@
|
|||
when: ansible_distribution == "Fedora"
|
||||
|
||||
- name: Create the config folder for fedora-messaging
|
||||
file: path=/etc/fedora-messaging/ owner=root group=root mode=0755 state=directory
|
||||
ansible.builtin.file: path=/etc/fedora-messaging/ owner=root group=root mode=0755 state=directory
|
||||
tags:
|
||||
- koji_hub
|
||||
- fedora-messaging
|
||||
|
@ -119,7 +119,7 @@
|
|||
- fedora-messaging
|
||||
|
||||
- name: Create folder where we'll place the certs
|
||||
file: path=/etc/pki/rabbitmq/kojicert/ owner=root group=root mode=0755 state=directory
|
||||
ansible.builtin.file: path=/etc/pki/rabbitmq/kojicert/ owner=root group=root mode=0755 state=directory
|
||||
tags:
|
||||
- config
|
||||
- koji_hub
|
||||
|
@ -183,7 +183,7 @@
|
|||
- rpmautospec
|
||||
|
||||
- name: Remove obsolete configuration for rpmautospec
|
||||
file:
|
||||
ansible.builtin.file:
|
||||
path: "/etc/koji-hub/plugins/{{ item }}"
|
||||
state: absent
|
||||
loop:
|
||||
|
@ -306,7 +306,7 @@
|
|||
notify: reload httpd
|
||||
|
||||
- name: Kojira log dir
|
||||
file: dest=/var/log/kojira owner=root group=root mode=0750 state=directory
|
||||
ansible.builtin.file: dest=/var/log/kojira owner=root group=root mode=0750 state=directory
|
||||
tags:
|
||||
- config
|
||||
- koji_hub
|
||||
|
@ -321,13 +321,13 @@
|
|||
- restart kojira
|
||||
|
||||
- name: Make an empty /mnt/fedora_koji for stg.
|
||||
file: state=directory path=/mnt/fedora_koji/koji owner=root group=root
|
||||
ansible.builtin.file: state=directory path=/mnt/fedora_koji/koji owner=root group=root
|
||||
tags:
|
||||
- koji_hub
|
||||
when: env == "staging" and ansible_hostname.startswith('koji')
|
||||
|
||||
- name: Make mnt/koji directory
|
||||
file: state=link src=/mnt/fedora_koji/koji dest=/mnt/koji owner=root group=root
|
||||
ansible.builtin.file: state=link src=/mnt/fedora_koji/koji dest=/mnt/koji owner=root group=root
|
||||
tags:
|
||||
- koji_hub
|
||||
when: ansible_hostname.startswith('koji')
|
||||
|
@ -370,7 +370,7 @@
|
|||
when: ansible_distribution == "RedHat" and ansible_distribution_major_version|int == 7
|
||||
|
||||
- name: Make httpd override directory
|
||||
file:
|
||||
ansible.builtin.file:
|
||||
state: directory
|
||||
path: /etc/systemd/system/httpd.service.d
|
||||
owner: root
|
||||
|
|
|
@ -30,7 +30,7 @@
|
|||
- kojipkgs
|
||||
|
||||
- name: Make a mnt/koji link
|
||||
file: state=link src=/mnt/fedora_koji/koji dest=/mnt/koji
|
||||
ansible.builtin.file: state=link src=/mnt/fedora_koji/koji dest=/mnt/koji
|
||||
tags:
|
||||
- kojipkgs
|
||||
|
||||
|
@ -40,7 +40,7 @@
|
|||
- kojipkgs
|
||||
|
||||
- name: Make systemd drop-in override dir
|
||||
file: name=/etc/systemd/system/varnish.service.d
|
||||
ansible.builtin.file: name=/etc/systemd/system/varnish.service.d
|
||||
state=directory
|
||||
recurse=yes
|
||||
owner=root group=root
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
---
|
||||
- name: Create /etc/pki/fedora-messaging
|
||||
file:
|
||||
ansible.builtin.file:
|
||||
dest: /etc/pki/fedora-messaging
|
||||
mode: "0775"
|
||||
owner: root
|
||||
|
|
|
@ -44,7 +44,7 @@
|
|||
template: src=dotmy.cnf.j2 dest=/root/.my.cnf owner=root group=root mode=0700
|
||||
|
||||
- name: Ensure mariadb has a place to backup to
|
||||
file: dest=/backups state=directory owner=mysql
|
||||
ansible.builtin.file: dest=/backups state=directory owner=mysql
|
||||
tags:
|
||||
- mariadb-server
|
||||
|
||||
|
|
|
@ -73,7 +73,7 @@
|
|||
- mediawiki
|
||||
|
||||
- name: Create /etc/pki/fedora-messaging
|
||||
file:
|
||||
ansible.builtin.file:
|
||||
dest: /etc/pki/fedora-messaging
|
||||
mode: "0775"
|
||||
owner: root
|
||||
|
@ -144,18 +144,18 @@
|
|||
- mediawiki
|
||||
|
||||
- name: Creating wiki dir
|
||||
file: path=/srv/web/{{wikiname}}-wiki owner=root group=root mode=755 state=directory
|
||||
ansible.builtin.file: path=/srv/web/{{wikiname}}-wiki owner=root group=root mode=755 state=directory
|
||||
tags:
|
||||
- mediawiki
|
||||
|
||||
# - name: Creating config dir
|
||||
# file: src=/usr/share/{{ wikiver }}/config dest=/srv/web/{{wikiname}}/config owner=apache group=apache mode=755 state=directory
|
||||
# ansible.builtin.file: src=/usr/share/{{ wikiver }}/config dest=/srv/web/{{wikiname}}/config owner=apache group=apache mode=755 state=directory
|
||||
# tags:
|
||||
# - mediawiki
|
||||
|
||||
# This doesn't seem to exist anymore in upstream....
|
||||
# - name: Install utils
|
||||
# file: src=/usr/share/{{ wikiver }}/install-utils.inc dest=/srv/web/{{wikiname}}-wiki/install-utils.inc state=link
|
||||
# ansible.builtin.file: src=/usr/share/{{ wikiver }}/install-utils.inc dest=/srv/web/{{wikiname}}-wiki/install-utils.inc state=link
|
||||
# tags:
|
||||
# - mediawiki
|
||||
|
||||
|
@ -173,62 +173,62 @@
|
|||
- mediawiki
|
||||
|
||||
- name: Linking index.php
|
||||
file: dest=/srv/web/{{wikiname}}-wiki/index.php src=/usr/share/{{ wikiver }}/index.php state=link
|
||||
ansible.builtin.file: dest=/srv/web/{{wikiname}}-wiki/index.php src=/usr/share/{{ wikiver }}/index.php state=link
|
||||
tags:
|
||||
- mediawiki
|
||||
|
||||
- name: Linkng api.php
|
||||
file: dest=/srv/web/{{wikiname}}-wiki/api.php src=/usr/share/{{ wikiver }}/api.php state=link
|
||||
ansible.builtin.file: dest=/srv/web/{{wikiname}}-wiki/api.php src=/usr/share/{{ wikiver }}/api.php state=link
|
||||
tags:
|
||||
- mediawiki
|
||||
|
||||
- name: Linking opensearch
|
||||
file: dest=/srv/web/{{wikiname}}-wiki/opensearch_desc.php src=/usr/share/{{ wikiver }}/opensearch_desc.php state=link
|
||||
ansible.builtin.file: dest=/srv/web/{{wikiname}}-wiki/opensearch_desc.php src=/usr/share/{{ wikiver }}/opensearch_desc.php state=link
|
||||
tags:
|
||||
- mediawiki
|
||||
|
||||
- name: Linking extensions
|
||||
file: dest=/srv/web/{{wikiname}}-wiki/extensions src=/usr/share/{{ wikiver }}/extensions state=link
|
||||
ansible.builtin.file: dest=/srv/web/{{wikiname}}-wiki/extensions src=/usr/share/{{ wikiver }}/extensions state=link
|
||||
tags:
|
||||
- mediawiki
|
||||
|
||||
- name: Linking includes
|
||||
file: dest=/srv/web/{{wikiname}}-wiki/includes src=/usr/share/{{ wikiver }}/includes state=link
|
||||
ansible.builtin.file: dest=/srv/web/{{wikiname}}-wiki/includes src=/usr/share/{{ wikiver }}/includes state=link
|
||||
tags:
|
||||
- mediawiki
|
||||
|
||||
- name: Linking languages
|
||||
file: dest=/srv/web/{{wikiname}}-wiki/languages src=/usr/share/{{ wikiver }}/languages state=link
|
||||
ansible.builtin.file: dest=/srv/web/{{wikiname}}-wiki/languages src=/usr/share/{{ wikiver }}/languages state=link
|
||||
tags:
|
||||
- mediawiki
|
||||
|
||||
- name: Linking maintenance
|
||||
file: dest=/srv/web/{{wikiname}}-wiki/maintenance src=/usr/share/{{ wikiver }}/maintenance state=link
|
||||
ansible.builtin.file: dest=/srv/web/{{wikiname}}-wiki/maintenance src=/usr/share/{{ wikiver }}/maintenance state=link
|
||||
tags:
|
||||
- mediawiki
|
||||
|
||||
# - name: Linking serialized
|
||||
# file: dest=/srv/web/{{wikiname}}-wiki/serialized src=/usr/share/{{ wikiver }}/serialized state=link
|
||||
# ansible.builtin.file: dest=/srv/web/{{wikiname}}-wiki/serialized src=/usr/share/{{ wikiver }}/serialized state=link
|
||||
# tags:
|
||||
# - mediawiki
|
||||
|
||||
- name: Linking skins
|
||||
file: dest=/srv/web/{{wikiname}}-wiki/skins src=/usr/share/{{ wikiver }}/skins state=link
|
||||
ansible.builtin.file: dest=/srv/web/{{wikiname}}-wiki/skins src=/usr/share/{{ wikiver }}/skins state=link
|
||||
tags:
|
||||
- mediawiki
|
||||
|
||||
- name: Linking load
|
||||
file: dest=/srv/web/{{wikiname}}-wiki/load.php src=/usr/share/{{ wikiver }}/load.php state=link
|
||||
ansible.builtin.file: dest=/srv/web/{{wikiname}}-wiki/load.php src=/usr/share/{{ wikiver }}/load.php state=link
|
||||
tags:
|
||||
- mediawiki
|
||||
|
||||
- name: Linking resources
|
||||
file: dest=/srv/web/{{wikiname}}-wiki/resources src=/usr/share/{{ wikiver }}/resources state=link
|
||||
ansible.builtin.file: dest=/srv/web/{{wikiname}}-wiki/resources src=/usr/share/{{ wikiver }}/resources state=link
|
||||
tags:
|
||||
- mediawiki
|
||||
|
||||
- name: Linking vendor
|
||||
file: dest=/srv/web/{{wikiname}}-wiki/vendor src=/usr/share/{{ wikiver }}/vendor state=link
|
||||
ansible.builtin.file: dest=/srv/web/{{wikiname}}-wiki/vendor src=/usr/share/{{ wikiver }}/vendor state=link
|
||||
tags:
|
||||
- mediawiki
|
||||
|
||||
|
@ -244,7 +244,7 @@
|
|||
- fedora-messaging
|
||||
|
||||
- name: Create a directory for the php dependencies
|
||||
file:
|
||||
ansible.builtin.file:
|
||||
path: /srv/web/fp-wiki/extensions/FedoraMessaging/vendor
|
||||
owner: apache
|
||||
group: apache
|
||||
|
@ -268,7 +268,7 @@
|
|||
- fedora-messaging
|
||||
|
||||
- name: Ensure a directory exists for our SELinux policy
|
||||
file: dest=/usr/local/share/selinux/ state=directory
|
||||
ansible.builtin.file: dest=/usr/local/share/selinux/ state=directory
|
||||
tags: selinux
|
||||
|
||||
- name: Copy over our custom selinux policy
|
||||
|
|
|
@ -21,7 +21,7 @@
|
|||
- memcached
|
||||
|
||||
- name: Make systemd override dir
|
||||
file: state=directory path=/etc/systemd/system/memcached.service.d mode=0755 owner=root group=root
|
||||
ansible.builtin.file: state=directory path=/etc/systemd/system/memcached.service.d mode=0755 owner=root group=root
|
||||
tags:
|
||||
- memcached
|
||||
when: ansible_distribution == 'RedHat' and ansible_distribution_major_version|int == 7
|
||||
|
|
|
@ -7,12 +7,12 @@
|
|||
- fedora-messaging
|
||||
|
||||
- name: Create rabitmq directory
|
||||
file: path=/etc/pki/rabbitmq/ owner=root group=root mode=0755 state=directory
|
||||
ansible.builtin.file: path=/etc/pki/rabbitmq/ owner=root group=root mode=0755 state=directory
|
||||
tags:
|
||||
- fedora-messaging
|
||||
|
||||
- name: "Create key/cert directory"
|
||||
file: path=/etc/pki/rabbitmq/{{ item.username }}/
|
||||
- name: "create key/cert directory"
|
||||
ansible.builtin.file: path=/etc/pki/rabbitmq/{{ item.username }}/
|
||||
owner={{ item.username }} group={{ item.username }}
|
||||
mode=0700 state=directory
|
||||
with_items: "{{ messaging.certificates }}"
|
||||
|
|
|
@ -32,7 +32,7 @@
|
|||
# configure all the fedora-messaging files
|
||||
|
||||
- name: Create /etc/pki/fedora-messaging
|
||||
file:
|
||||
ansible.builtin.file:
|
||||
dest: /etc/pki/fedora-messaging
|
||||
mode: "0775"
|
||||
owner: root
|
||||
|
@ -81,7 +81,7 @@
|
|||
# Install the script
|
||||
|
||||
- name: Create /usr/local/libexec/mirror_pagure_ansible
|
||||
file:
|
||||
ansible.builtin.file:
|
||||
dest: /usr/local/libexec/mirror_pagure_ansible
|
||||
mode: "0775"
|
||||
owner: root
|
||||
|
|
|
@ -16,7 +16,7 @@
|
|||
- mirrorlist_proxy
|
||||
|
||||
- name: Setup directories
|
||||
file: dest="{{item}}" mode=0755 state=directory
|
||||
ansible.builtin.file: dest="{{item}}" mode=0755 state=directory
|
||||
with_items:
|
||||
- /srv/mirrorlist
|
||||
- /srv/mirrorlist/data
|
||||
|
@ -27,7 +27,7 @@
|
|||
- mirrorlist_proxy
|
||||
|
||||
- name: Make sure the /usr/share/GeoIP/ directory exists
|
||||
file:
|
||||
ansible.builtin.file:
|
||||
path: /usr/share/GeoIP/
|
||||
state: directory
|
||||
owner: root
|
||||
|
@ -44,7 +44,7 @@
|
|||
- mirrorlist_proxy
|
||||
|
||||
- name: Make sure mirrormanager user can write new protobuf based cache file
|
||||
file: dest="{{item}}" owner=mirrormanager group=mirrormanager
|
||||
ansible.builtin.file: dest="{{item}}" owner=mirrormanager group=mirrormanager
|
||||
with_items:
|
||||
- /srv/mirrorlist/data
|
||||
- /srv/mirrorlist/data/mirrorlist1
|
||||
|
@ -53,14 +53,14 @@
|
|||
- mirrorlist_proxy
|
||||
|
||||
- name: For the rust based mirrorlist server chown directories
|
||||
file: dest="{{item}}" owner=mirrormanager group=mirrormanager
|
||||
ansible.builtin.file: dest="{{item}}" owner=mirrormanager group=mirrormanager
|
||||
with_items:
|
||||
- /var/log/mirrormanager
|
||||
tags:
|
||||
- mirrorlist_proxy
|
||||
|
||||
- name: Ensure log file for content exists
|
||||
file: dest="{{item}}" owner=mirrormanager group=mirrormanager mode=0755 state=touch
|
||||
ansible.builtin.file: dest="{{item}}" owner=mirrormanager group=mirrormanager mode=0755 state=touch
|
||||
with_items:
|
||||
- /var/log/mirrormanager/mirrorlist1.service.log
|
||||
- /var/log/mirrormanager/mirrorlist2.service.log
|
||||
|
@ -68,7 +68,7 @@
|
|||
- mirrorlist_proxy
|
||||
|
||||
- name: For the rust based mirrorlist server chown log files
|
||||
file: dest="{{item}}" owner=mirrormanager group=mirrormanager
|
||||
ansible.builtin.file: dest="{{item}}" owner=mirrormanager group=mirrormanager
|
||||
with_items:
|
||||
- /var/log/mirrormanager/mirrorlist1.service.log
|
||||
- /var/log/mirrormanager/mirrorlist2.service.log
|
||||
|
@ -139,7 +139,7 @@
|
|||
|
||||
# Custom selinux policy to allow logrotate to rotate our mirrorlist logs
|
||||
- name: Ensure a directory exists for our custom selinux module
|
||||
file: dest=/usr/local/share/mirrorlist-logrotate state=directory
|
||||
ansible.builtin.file: dest=/usr/local/share/mirrorlist-logrotate state=directory
|
||||
tags:
|
||||
- selinux
|
||||
- mirrorlist_proxy
|
||||
|
|
|
@ -1,3 +1,3 @@
|
|||
---
|
||||
- name: Nuke mote json cache
|
||||
file: dest=/var/cache/httpd/mote/cache.json state=absent
|
||||
ansible.builtin.file: dest=/var/cache/httpd/mote/cache.json state=absent
|
||||
|
|
|
@ -20,7 +20,7 @@
|
|||
- restart memcached
|
||||
|
||||
- name: Make systemd override dir
|
||||
file:
|
||||
ansible.builtin.file:
|
||||
state: directory
|
||||
path: /etc/systemd/system/memcached.service.d
|
||||
mode: "0755"
|
||||
|
@ -67,7 +67,7 @@
|
|||
- restart apache
|
||||
|
||||
- name: Create /usr/share/httpd/.local for mote-updater to store the fedmsg CRL
|
||||
file: dest=/usr/share/httpd/.local owner=apache group=apache state=directory
|
||||
ansible.builtin.file: dest=/usr/share/httpd/.local owner=apache group=apache state=directory
|
||||
tags:
|
||||
- mote
|
||||
|
||||
|
@ -78,7 +78,7 @@
|
|||
- mote
|
||||
|
||||
- name: Apply selinux type to static files
|
||||
file: >
|
||||
ansible.builtin.file: >
|
||||
dest=/usr/lib/python2.7/site-packages/mote/static/
|
||||
setype=httpd_sys_content_t
|
||||
state=directory
|
||||
|
@ -88,7 +88,7 @@
|
|||
- selinux
|
||||
|
||||
- name: Apply selinux type to meetbot files
|
||||
file: >
|
||||
ansible.builtin.file: >
|
||||
dest=/srv/web/meetbot/
|
||||
setype=httpd_sys_content_t
|
||||
state=directory
|
||||
|
@ -114,7 +114,7 @@
|
|||
- selinux
|
||||
|
||||
- name: Apply selinux type to the wsgi file
|
||||
file: >
|
||||
ansible.builtin.file: >
|
||||
dest=/usr/share/mote/mote.wsgi
|
||||
setype=httpd_sys_content_t
|
||||
tags:
|
||||
|
@ -122,7 +122,7 @@
|
|||
- selinux
|
||||
|
||||
- name: Apply selinux type to the name mappings file
|
||||
file: >
|
||||
ansible.builtin.file: >
|
||||
dest=/usr/share/mote/name_mappings.json
|
||||
setype=httpd_sys_content_t
|
||||
notify:
|
||||
|
@ -132,7 +132,7 @@
|
|||
- selinux
|
||||
|
||||
- name: Apply selinux type to the category mappings file
|
||||
file: >
|
||||
ansible.builtin.file: >
|
||||
dest=/usr/share/mote/category_mappings.json
|
||||
setype=httpd_sys_content_t
|
||||
notify:
|
||||
|
|
|
@ -83,7 +83,7 @@
|
|||
|
||||
# Three tasks for handling our custom selinux module
|
||||
- name: Ensure a directory exists for our custom selinux module
|
||||
file: dest=/usr/share/nrpe state=directory
|
||||
ansible.builtin.file: dest=/usr/share/nrpe state=directory
|
||||
tags:
|
||||
- config
|
||||
- nagios_client
|
||||
|
|
|
@ -87,7 +87,7 @@
|
|||
|
||||
## Setup directories for files to be copied
|
||||
- name: Create or confirm directories to be made
|
||||
file: dest={{item}} mode=2755 owner=root group=sysadmin-main state=directory
|
||||
ansible.builtin.file: dest={{item}} mode=2755 owner=root group=sysadmin-main state=directory
|
||||
with_items:
|
||||
- /etc/nagios/commands
|
||||
- /etc/nagios/contacts
|
||||
|
@ -102,12 +102,12 @@
|
|||
|
||||
## Remove the items we don't want
|
||||
- name: Nuke default nagios passwd
|
||||
file: dest=/etc/nagios/passwd state=absent
|
||||
ansible.builtin.file: dest=/etc/nagios/passwd state=absent
|
||||
tags:
|
||||
- nagios_server
|
||||
|
||||
- name: Nuke default nagios objects
|
||||
file: dest=/etc/nagios/objects state=absent
|
||||
ansible.builtin.file: dest=/etc/nagios/objects state=absent
|
||||
tags:
|
||||
- nagios_server
|
||||
|
||||
|
@ -266,7 +266,7 @@
|
|||
|
||||
## Drop services we don't need
|
||||
- name: Nuke unneded services from /etc/nagios/services (External)
|
||||
file: dest=/etc/nagios/services/{{ item }} state=absent
|
||||
ansible.builtin.file: dest=/etc/nagios/services/{{ item }} state=absent
|
||||
with_items:
|
||||
- copr_external.cfg
|
||||
tags:
|
||||
|
@ -334,7 +334,7 @@
|
|||
- nagios_server
|
||||
|
||||
- name: Configure perms on nrpe correctly
|
||||
file: dest=/etc/nagios/nrpe.cfg mode=0644 group=root owner=root
|
||||
ansible.builtin.file: dest=/etc/nagios/nrpe.cfg mode=0644 group=root owner=root
|
||||
tags:
|
||||
- config
|
||||
- nagios_server
|
||||
|
@ -522,7 +522,7 @@
|
|||
|
||||
## Handle selinux annoyances - roughly copied from fedmsg role
|
||||
- name: Ensure a directory exists for our custom selinux module
|
||||
file: dest=/usr/local/share/nagios-policy state=directory
|
||||
ansible.builtin.file: dest=/usr/local/share/nagios-policy state=directory
|
||||
tags:
|
||||
- nagios_server
|
||||
|
||||
|
|
Some files were not shown because too many files have changed in this diff Show more
Loading…
Add table
Add a link
Reference in a new issue