ansiblelint fixes-- fqcn[action-core] - file to ansible.builtin.file

Replaces many references to  file: with ansible.builtin.file

Signed-off-by: Ryan Lerch <rlerch@redhat.com>
This commit is contained in:
Ryan Lercho 2024-12-17 15:31:55 +10:00
parent f3517ab537
commit 62952df107
167 changed files with 380 additions and 381 deletions

View file

@ -4,7 +4,7 @@
- import_tasks: repositories.yml
- name: Ensure directory for FAF database backups exists
file:
ansible.builtin.file:
path: "{{ faf_backup_dir }}"
state: directory
owner: faf

View file

@ -11,14 +11,14 @@
- import_tasks: services.yml
- name: Create a directory /srv/faf
file:
ansible.builtin.file:
path: /srv/faf
state: directory
owner: faf
group: faf
- name: Create folders where we place certs for fedora-messaging
file: path=/etc/fedora-messaging/faf owner=root group=root mode=0755 state=directory
ansible.builtin.file: path=/etc/fedora-messaging/faf owner=root group=root mode=0755 state=directory
- name: Install certs for fedora-messaging
copy: src={{ item.src }}

View file

@ -7,7 +7,7 @@
# setup fedora-messaging
- name: Create the config folder for fedora-messaging
file:
ansible.builtin.file:
path: /etc/fedora-messaging/
owner: root
group: root

View file

@ -17,21 +17,21 @@
tags: [rs_reposync, rs_fedora]
when: env != 'staging'
- file:
- ansible.builtin.file:
path: /srv/retrace/repos
state: directory
mode: "0755"
owner: retrace
group: retrace
- file:
- ansible.builtin.file:
path: /srv/retrace/tasks
state: directory
mode: "0755"
owner: retrace
group: retrace
- file:
- ansible.builtin.file:
path: /srv/retrace/hardlink-local
state: directory
mode: "0755"

View file

@ -44,7 +44,7 @@
state: started
- name: Create directory for repositories
file:
ansible.builtin.file:
path: /srv/retrace/repos
state: directory
mode: "0755"
@ -52,14 +52,14 @@
group: retrace
- name: Create directory for retrace tasks
file:
ansible.builtin.file:
path: /srv/retrace/tasks
state: directory
mode: "0755"
owner: retrace
group: retrace
- file:
- ansible.builtin.file:
path: /srv/retrace/hardlink-local
state: directory
mode: "0755"

View file

@ -14,7 +14,7 @@
- apps-fp-o
- name: Ensure directory exixts
file:
ansible.builtin.file:
path: "{{ item }}"
state: directory
mode: '2755'

View file

@ -88,7 +88,7 @@
- name: Destroy stored keytab
delegate_to: "{{ ipa_server }}"
file: path=/tmp/{{inventory_hostname}}.kt state=absent
ansible.builtin.file: path=/tmp/{{inventory_hostname}}.kt state=absent
tags:
- base
- config
@ -114,7 +114,7 @@
when: not host_keytab_status.stat.exists
- name: Set keytab permissions
file: path=/etc/krb5.keytab owner=root group=root mode=0600
ansible.builtin.file: path=/etc/krb5.keytab owner=root group=root mode=0600
tags:
- base
- config
@ -122,7 +122,7 @@
when: not host_keytab_status.stat.exists
- name: Destroy encoded keytab
file: path=/etc/krb5.keytab.b64 state=absent
ansible.builtin.file: path=/etc/krb5.keytab.b64 state=absent
tags:
- base
- config

View file

@ -238,7 +238,7 @@
when: baseiptables|bool
- name: Enable journald persistence
file: path=/var/log/journal state=directory
ansible.builtin.file: path=/var/log/journal state=directory
owner=root group=systemd-journal mode=2755
when: ansible_distribution_major_version|int >= 7 and ansible_distribution == 'RedHat'
tags:
@ -249,7 +249,7 @@
- flush journald tmpfiles to persistent store
- name: Enable journald persistence
file: path=/var/log/journal state=directory
ansible.builtin.file: path=/var/log/journal state=directory
owner=root group=systemd-journal mode=2755
when: ansible_distribution_major_version|int >= 29 and ansible_distribution == 'Fedora'
tags:
@ -341,7 +341,7 @@
- base
- name: Rsyslogd make systemd limits directory for file handles
file: dest=/etc/systemd/system/rsyslog.service.d/ mode=0755 owner=root group=root state=directory
ansible.builtin.file: dest=/etc/systemd/system/rsyslog.service.d/ mode=0755 owner=root group=root state=directory
when: inventory_hostname.startswith('log') or inventory_hostname.startswith('people')
tags:
- rsyslogd
@ -357,7 +357,7 @@
# Custom selinux policy to allow rsyslog to read and send audit to log01
- name: Ensure a directory exists for our custom selinux module
file: dest=/usr/local/share/rsyslog state=directory
ansible.builtin.file: dest=/usr/local/share/rsyslog state=directory
tags:
- rsyslogd
- config
@ -504,7 +504,7 @@
# is actually expired, and kinit's still not refreshing them and such alike.
# Let's just nuke it for now.
- name: We do NOT use sssd-kcm
file: path=/etc/krb5.conf.d/kcm_default_ccache state=absent
ansible.builtin.file: path=/etc/krb5.conf.d/kcm_default_ccache state=absent
tags:
- base
- config

View file

@ -156,7 +156,7 @@
- base
- name: Create directory for storing pubkeys
file: path="{{pubkeydir}}"
ansible.builtin.file: path="{{pubkeydir}}"
owner=root
group=root
mode=0600

View file

@ -8,7 +8,7 @@
---
- name: Create /srv/web/pub for nfs mounts
file: dest=/srv/web/pub state=directory mode=0755
ansible.builtin.file: dest=/srv/web/pub state=directory mode=0755
tags:
- batcave
- config
@ -129,7 +129,7 @@
- fedora-messaging
- name: Create folder where we'll place the certs
file: path=/etc/pki/rabbitmq/ owner=root group=root mode=0755 state=directory
ansible.builtin.file: path=/etc/pki/rabbitmq/ owner=root group=root mode=0755 state=directory
tags:
- batcave
- config
@ -372,7 +372,7 @@
#
- name: Create repo2json directory
file: dest=/srv/web/repo/json mode=0755 state=directory owner=apache group=apache
ansible.builtin.file: dest=/srv/web/repo/json mode=0755 state=directory owner=apache group=apache
tags:
- batcave
- config
@ -557,14 +557,14 @@
- batcave
- name: Create some tmp dirs
file: path=/tmp-inst mode=000 owner=root group=root state=directory
ansible.builtin.file: path=/tmp-inst mode=000 owner=root group=root state=directory
tags:
- config
- batcave
- selinux
- name: Create some tmp dirs
file: path=/var/tmp-inst mode=000 owner=root group=root state=directory
ansible.builtin.file: path=/var/tmp-inst mode=000 owner=root group=root state=directory
tags:
- config
- batcave
@ -578,7 +578,7 @@
- selinux
- name: Create the /var/tmux folder for shared tmux session
file: path=/var/tmux mode=2774 owner=root group=sysadmin state=directory
ansible.builtin.file: path=/var/tmux mode=2774 owner=root group=sysadmin state=directory
tags:
- batcave
- tmux
@ -590,7 +590,7 @@
- tmux
- name: Create dir for openshift pxe boot files
file: path=/srv/web/infra/bigfiles/{{item}} mode=2660 owner=root group=sysadmin-openshift state=directory
ansible.builtin.file: path=/srv/web/infra/bigfiles/{{item}} mode=2660 owner=root group=sysadmin-openshift state=directory
with_items:
- openshiftboot
- tftpboot/rhcos

View file

@ -330,7 +330,7 @@
- bodhi
- name: Create /etc/pki/fedora-messaging
file:
ansible.builtin.file:
dest: /etc/pki/fedora-messaging
mode: "0775"
owner: root
@ -382,12 +382,12 @@
- bodhi
- name: Make a mnt/koji link
file: state=link src=/mnt/fedora_koji/koji dest=/mnt/koji force=yes
ansible.builtin.file: state=link src=/mnt/fedora_koji/koji dest=/mnt/koji force=yes
tags:
- bodhi
- name: Create /etc/systemd/system/fm-consumer@.service.d
file:
ansible.builtin.file:
state: directory
path: /etc/systemd/system/fm-consumer@.service.d
owner: root

View file

@ -3,7 +3,7 @@
# This is the base set of files needed for bodhi
- name: Create the bodhi configuration directory
file:
ansible.builtin.file:
path: /etc/bodhi
state: directory
owner: root

View file

@ -7,7 +7,7 @@
- name: Create /etc/systemd/system/btrfs-balance.timer.d
file:
ansible.builtin.file:
state: directory
path: /etc/systemd/system/btrfs-balance.timer.d
owner: root

View file

@ -22,7 +22,7 @@
- bugzilla2fedmsg
- name: Make sure a few directories exist.
file:
ansible.builtin.file:
dest="{{ item }}"
owner=fedmsg
group=fedmsg

View file

@ -1,5 +1,5 @@
---
- name: Add builder infra yum repo
file: dest=/etc/yum.repos.d/builder-infrastructure.repo state=absent
ansible.builtin.file: dest=/etc/yum.repos.d/builder-infrastructure.repo state=absent
tags:
- builder_infra

View file

@ -1,6 +1,6 @@
---
- name: Create the CentosCIAuthorization operator keytab path
file:
ansible.builtin.file:
path: "/etc/openshift_apps/centos-ci-authorization/"
state: directory
owner: root

View file

@ -13,11 +13,11 @@
# See https://github.com/robyduck/cgit-custom
- name: Make sure cgit directory exists
file: dest=/usr/share/cgit state=directory owner=root group=root mode=0755
ansible.builtin.file: dest=/usr/share/cgit state=directory owner=root group=root mode=0755
tags: cgit
- name: Make sure cgit images directory exists
file: dest=/usr/share/cgit/images state=directory owner=root group=root mode=0755
ansible.builtin.file: dest=/usr/share/cgit/images state=directory owner=root group=root mode=0755
tags: cgit
- name: Copy cgit them into place.

View file

@ -6,7 +6,7 @@
tags: cgit
- name: Create the git root directory (/srv/git)
file: dest=/srv/git state=directory mode=0755
ansible.builtin.file: dest=/srv/git state=directory mode=0755
tags: cgit
- name: Ensure the repo list file exists

View file

@ -137,7 +137,7 @@
- restart check-compose
- name: Create /etc/pki/fedora-messaging
file:
ansible.builtin.file:
dest: /etc/pki/fedora-messaging
mode: "0775"
owner: root

View file

@ -119,7 +119,7 @@
# Three tasks for handling our (two) custom selinux modules.
- name: Ensure a directory exists for our custom selinux module
file: dest=/usr/share/collectd state=directory
ansible.builtin.file: dest=/usr/share/collectd state=directory
tags:
- collectd
- selinux

View file

@ -24,7 +24,7 @@
# Three tasks for handling our custom selinux module.
- name: Ensure a directory exists for our custom selinux module
file: dest=/usr/share/collectd state=directory
ansible.builtin.file: dest=/usr/share/collectd state=directory
tags:
- collectd
- selinux

View file

@ -73,7 +73,7 @@
# create /var/log/collectd as it's on a larger volume
- name: Create /var/log/collectd
file: path=/var/log/collectd owner=root group=root mode=0755 state=directory
ansible.builtin.file: path=/var/log/collectd owner=root group=root mode=0755 state=directory
tags:
- config
- collectd/server
@ -88,7 +88,7 @@
- collectd/server
- name: Create the service configuration directory
file:
ansible.builtin.file:
path: /etc/systemd/system/collectd.service.d
state: directory
tags:

View file

@ -11,7 +11,7 @@
- deploy-operators
- name: Create the CommunishiftAuthorization operator keytab path
file:
ansible.builtin.file:
path: "/etc/openshift_apps/communishift-authorization/"
state: directory
owner: root

View file

@ -35,12 +35,12 @@
- starting_builder
- name: work-around for wrongly generated ami
file:
ansible.builtin.file:
path: /etc/yum.repos.d/pr.repo
state: absent
- name: disable updates-testing
file:
ansible.builtin.file:
path: /etc/yum.repos.d/fedora-updates-testing.repo
state: absent
when:
@ -55,7 +55,7 @@
register: system_updated
- name: disable updates-testing, could be restored after update
file:
ansible.builtin.file:
path: /etc/yum.repos.d/fedora-updates-testing.repo
state: absent
when: system_updated.changed
@ -174,7 +174,7 @@
- name: check disk space
include_tasks:
file: check_path_free_space.yml
ansible.builtin.file: check_path_free_space.yml
vars:
path: "{{ item.path }}"
size: "{{ item.size|int }}"
@ -241,7 +241,7 @@
- preparing_image
- name: mockbuilder .ssh
file: state=directory path=/home/mockbuilder/.ssh mode=0700 owner=mockbuilder group=mockbuilder
ansible.builtin.file: state=directory path=/home/mockbuilder/.ssh mode=0700 owner=mockbuilder group=mockbuilder
when:
- preparing_image

View file

@ -1,6 +1,6 @@
---
- name: chmod_key
file: path=/etc/lighttpd/copr-be.fedoraproject.org.pem owner=root group=root mode=0600
ansible.builtin.file: path=/etc/lighttpd/copr-be.fedoraproject.org.pem owner=root group=root mode=0600
- name: restart copr-backend
service: name="{{ copr_backend_target }}" state=restarted

View file

@ -3,7 +3,7 @@
dnf: state=present name=awscli
- name: Create aws HOME config directory
file: state=directory
ansible.builtin.file: state=directory
path="{{ item.homedir }}/.aws"
owner={{ item.user }}
group={{ item.user }}

View file

@ -15,7 +15,7 @@
tags: copr_ping
- name: Pre-create ping log file
file:
ansible.builtin.file:
path: "{{ ping_log }}"
owner: "{{ ping_user }}"
group: nagios
@ -61,7 +61,7 @@
tags: copr_ping
- name: Create home/.config dir
file:
ansible.builtin.file:
path: "{{ ping_homedir }}/.config"
owner: "{{ ping_user }}"
group: "{{ ping_user }}"

View file

@ -44,13 +44,13 @@
when: devel|bool
- name: Make copr dirs
file: state=directory path={{ item }}
ansible.builtin.file: state=directory path={{ item }}
with_items:
- /var/lib/copr/jobs
- /var/lib/copr/public_html/results
- name: Setup dirs there
file: state=directory path="/home/copr/{{ item }}" owner=copr group=copr mode=0700
ansible.builtin.file: state=directory path="/home/copr/{{ item }}" owner=copr group=copr mode=0700
with_items:
- cloud
- .ssh
@ -77,7 +77,7 @@
ignore_errors: yes
- name: Create empty known_hosts
file: state=touch dest=/home/copr/.ssh/known_hosts owner=copr group=copr mode=600
ansible.builtin.file: state=touch dest=/home/copr/.ssh/known_hosts owner=copr group=copr mode=600
when: hostsstat.rc == 1
- name: Replace bashrc for copr user
@ -118,7 +118,7 @@
seboolean: name=httpd_setrlimit state=yes persistent=yes
- name: Create directory for compress module of lighttpd
file: path=/var/cache/lighttpd/compress owner=lighttpd group=lighttpd mode=0644 state=directory
ansible.builtin.file: path=/var/cache/lighttpd/compress owner=lighttpd group=lighttpd mode=0644 state=directory
# mime default to text/plain and enable dirlisting for indexes
- name: Update lighttpd configs
@ -168,7 +168,7 @@
# setup dirs for the ansible execution off of provisioning
# - name: Dirs from provision
# file: state=directory path="/home/copr/provision/{{ item }}" owner=copr group=copr
# ansible.builtin.file: state=directory path="/home/copr/provision/{{ item }}" owner=copr group=copr
# with_items:
# - action_plugins
# - library
@ -248,7 +248,7 @@
- provision_config
- name: Create messaging config directory
file: dest=/etc/copr/msgbuses state=directory owner=copr group=copr mode=0700
ansible.builtin.file: dest=/etc/copr/msgbuses state=directory owner=copr group=copr mode=0700
when: copr_messaging
tags:
- config
@ -357,7 +357,7 @@
# Three tasks for handling our custom selinux module
- name: Ensure a directory exists for our custom selinux module
file: dest=/usr/local/share/copr state=directory
ansible.builtin.file: dest=/usr/local/share/copr state=directory
- name: Copy over our custom selinux module
copy: src=selinux/copr_rules.pp dest=/usr/local/share/copr/copr_rules.pp

View file

@ -70,7 +70,7 @@
notify: systemctl daemon-reload
- name: Prepare mount point
file: state=directory path=/var/lib/copr/public_html
ansible.builtin.file: state=directory path=/var/lib/copr/public_html
- name: Mount up disk of copr repo
mount: name=/var/lib/copr/public_html src='LABEL=copr-repo' fstype=ext4 state=mounted opts=nofail

View file

@ -5,7 +5,7 @@
# dnf: state=present name=pulp-cli
- name: Create pulp config directory
file:
ansible.builtin.file:
state: directory
path: /home/copr/.config/pulp/
owner: copr

View file

@ -131,7 +131,7 @@
- provision_config
- name: Resalloc, ssh directory
file:
ansible.builtin.file:
path: /var/lib/resallocserver/.ssh
state: directory
mode: "0700"

View file

@ -82,7 +82,7 @@
- provision_config
- name: Remove currently unused and broken os_nova filter
file: state=absent
ansible.builtin.file: state=absent
path="{{ provision_directory }}/filter_plugins/os_nova.py"
tags:
- provision_config

View file

@ -130,7 +130,7 @@
- name: Prepare the certbot backup directory on batcave
delegate_to: localhost
file:
ansible.builtin.file:
path: "{{ le_backup_path }}"
# nobody, except for root, can step into this directory (on batcave)
mode: "0700"

View file

@ -36,7 +36,7 @@
selinux: policy=targeted state=enforcing
- name: Make sure directories are owned by copr-dist-git user
file: path={{ item }} owner=copr-dist-git group=copr-dist-git state=directory recurse=yes
ansible.builtin.file: path={{ item }} owner=copr-dist-git group=copr-dist-git state=directory recurse=yes
with_items:
- /var/log/copr-dist-git/
@ -114,7 +114,7 @@
when: not services_disabled|bool
- name: Create place for our custom SELinux policy
file: path=/usr/local/share/selinux state=directory
ansible.builtin.file: path=/usr/local/share/selinux state=directory
- name: Copy over our custom selinux policy for cgit
copy: src=git_script_t.pp dest=/usr/local/share/selinux/git_script_t.pp
@ -132,7 +132,7 @@
command: /usr/bin/copr-dist-git-refresh-cgit creates=/var/cache/cgit/repo-configuration.rc
- name: Ensure that .config directory exists
file: path=/home/copr-dist-git/.config state=directory
ansible.builtin.file: path=/home/copr-dist-git/.config state=directory
- name: Install .config/copr for copr-dist-git user (required for pruning)
template: src="copr.conf" dest="/home/copr-dist-git/.config/copr" owner=copr-dist-git group=copr-dist-git
@ -161,7 +161,7 @@
- cron
- name: Drop monthly cron job
file:
ansible.builtin.file:
path: /etc/cron.monthly/copr-dist-git
state: absent
tags:

View file

@ -1,15 +1,15 @@
---
- name: Prepare mount point
file: state=directory path=/var/lib/dist-git
ansible.builtin.file: state=directory path=/var/lib/dist-git
- name: Mount up disk of copr repo
mount: name=/var/lib/dist-git src='LABEL=copr-dist-git' fstype=ext4 state=mounted
- name: Prepare mount point
file: state=directory path=/var/lib/copr-dist-git
ansible.builtin.file: state=directory path=/var/lib/copr-dist-git
- name: Create symlink for per-task-logs
file:
ansible.builtin.file:
state: link
src: /var/lib/dist-git/per-task-logs
path: /var/lib/copr-dist-git/per-task-logs

View file

@ -11,7 +11,7 @@
- certbot
- name: Drop old and now unused coprs_ssl.conf
file: path=/etc/httpd/conf.d/coprs_ssl.conf state=absent
ansible.builtin.file: path=/etc/httpd/conf.d/coprs_ssl.conf state=absent
notify:
- reload httpd
tags:

View file

@ -76,11 +76,11 @@
# tags: patches
- name: Directory for postgresql dumps
file: state=directory path=/var/www/html/db_dumps/
ansible.builtin.file: state=directory path=/var/www/html/db_dumps/
owner=copr-fe mode=755
- name: Directory for usage graphs
file: state=directory path=/var/www/html/usage/
ansible.builtin.file: state=directory path=/var/www/html/usage/
owner=copr-fe mode=755
- name: Install copr configs
@ -176,7 +176,7 @@
when: update_indexes_required_result.rc != 0
- name: Make sure /etc/fedora-messaging directory exists
file: path=/etc/fedora-messaging state=directory
ansible.builtin.file: path=/etc/fedora-messaging state=directory
- name: Install fedora messaging config for Copr
template: src="fedora-messaging/copr_messaging.toml" dest="/etc/fedora-messaging/copr_messaging.toml"

View file

@ -22,7 +22,7 @@
- config
- name: Ensure postgres has a place to backup to
file: dest=/backups state=directory owner=postgres
ansible.builtin.file: dest=/backups state=directory owner=postgres
tags:
- config
@ -147,6 +147,6 @@
register: history_file
- name: Install pghistory file
file: path="{{ copr_fe_homedir }}/.psql_history" state=touch
ansible.builtin.file: path="{{ copr_fe_homedir }}/.psql_history" state=touch
owner=copr-fe group=copr-fe mode=0600
when: not history_file.stat.exists

View file

@ -57,7 +57,7 @@
tags: libvirtd
- name: Create libvirt image directory
file: path={{ image_pool_dir }}
ansible.builtin.file: path={{ image_pool_dir }}
owner=qemu group=qemu mode=ug=rwx,g+s
state=directory
tags: libvirtd

View file

@ -1,6 +1,6 @@
---
- name: Prepare mount point
file: state=directory path=/var/lib/copr-keygen
ansible.builtin.file: state=directory path=/var/lib/copr-keygen
- name: Mount up disk of copr repo
mount: name=/var/lib/copr-keygen src='LABEL=copr-keygen' fstype=ext4 state=mounted
@ -12,8 +12,7 @@
- restart haveged
- name: Change owner of data to copr-signer
file: path=/var/lib/copr-keygen owner=copr-signer group=copr-signer recurse=yes
when: keychain_mounted.changed
ansible.builtin.file: path=/var/lib/copr-keygen owner=copr-signer group=copr-signer recurse=yes
- name: Put keygen vhost for httpd
copy: src="httpd/copr-keygen.conf" dest="/etc/httpd/conf.d/copr-keygen.conf"
@ -46,7 +45,7 @@
# Three tasks for handling our custom selinux module
- name: Ensure a directory exists for our custom selinux module
file: dest=/usr/local/share/copr state=directory
ansible.builtin.file: dest=/usr/local/share/copr state=directory
- name: Copy over our custom selinux module
copy: src=selinux/copr_rules.pp dest=/usr/local/share/copr/copr_rules.pp

View file

@ -1,6 +1,6 @@
---
- name: Ensure /backup dir
file: path=/backup state=directory
ansible.builtin.file: path=/backup state=directory
- name: Copy pubkey for backup encryption
copy: src="{{ private }}/files/copr/keygen/backup_key.asc" dest="/root/backup_key.asc"

View file

@ -1,6 +1,6 @@
---
- name: Create directories
file: state=directory
ansible.builtin.file: state=directory
path=/srv/web/{{item}}
owner=apache group=apache mode=0755
setype=httpd_sys_content_t seuser=system_u

View file

@ -49,7 +49,7 @@
# - stunnel
# - name: Ensure old stunnel init file is gone
# file: dest=/etc/init.d/stunnel/stunnel.init state=absent
# ansible.builtin.file: dest=/etc/init.d/stunnel/stunnel.init state=absent
# tags:
# - pagure
# - stunnel
@ -93,7 +93,7 @@
- pagure
- name: Create the /var/log/pagure folder where to store the logs
file: state=directory
ansible.builtin.file: state=directory
path=/var/log/pagure
owner=pagure group=packager mode=u+rwx,g+rwxs,o+rx
tags:
@ -113,7 +113,7 @@
- fix_log
- name: Create the /srv/tmp folder where to clone repos
file: state=directory
ansible.builtin.file: state=directory
path=/srv/tmp
owner=pagure group=pagure mode=0775
tags:
@ -163,7 +163,7 @@
- pagure
- name: Create all the directories where we store the git repos
file: state=directory
ansible.builtin.file: state=directory
path={{ item }}
owner=root group=packager mode=2775
with_items:
@ -176,7 +176,7 @@
- pagure
- name: Create the remotes folder so pagure can clone remote repos
file: state=directory
ansible.builtin.file: state=directory
path={{ item }}
owner=root group=packager mode=2775
with_items:
@ -271,7 +271,7 @@
- restart apache
- name: Create the /srv/cache/extras folder for the crons
file: state=directory
ansible.builtin.file: state=directory
path=/srv/cache/extras
owner=apache group=apache mode=0775
tags:
@ -321,7 +321,7 @@
- fedora-messaging
- name: Create the config folder for fedora-messaging
file: path=/etc/fedora-messaging/ owner=root group=root mode=0755 state=directory
ansible.builtin.file: path=/etc/fedora-messaging/ owner=root group=root mode=0755 state=directory
tags:
- pagure
- fedora-messaging
@ -335,7 +335,7 @@
- fedora-messaging
- name: Create folder where we'll place the certs
file: path=/etc/pki/rabbitmq/pagurecert/ owner=root group=root mode=0755 state=directory
ansible.builtin.file: path=/etc/pki/rabbitmq/pagurecert/ owner=root group=root mode=0755 state=directory
tags:
- pagure
- fedora-messaging

View file

@ -42,7 +42,7 @@
- distgit
- name: Create suexec wrapper directory
file: path=/var/www/bin state=directory owner=pagure group=packager
ansible.builtin.file: path=/var/www/bin state=directory owner=pagure group=packager
tags:
- distgit
@ -168,13 +168,13 @@
when: inventory_hostname.startswith('batcave')
- name: Create the distgit root directory (/srv/git)
file: dest=/srv/git state=directory mode=0755
ansible.builtin.file: dest=/srv/git state=directory mode=0755
tags:
- distgit
# These should all map to pkgdb namespaces
- name: Create our namespace directories inside there..
file: dest=/srv/git/repositories/{{item}} state=directory mode=2775 group=packager
ansible.builtin.file: dest=/srv/git/repositories/{{item}} state=directory mode=2775 group=packager
with_items:
- rpms
- docker
@ -247,7 +247,7 @@
- sslciphers
- name: Create the Lookaside Cache root directory
file: dest=/srv/cache/lookaside/pkgs state=directory
ansible.builtin.file: dest=/srv/cache/lookaside/pkgs state=directory
owner=apache group=apache
tags:
- distgit
@ -310,7 +310,7 @@
# Three tasks for handling our selinux policy for upload.cgi
- name: Ensure a directory exists for our SELinux policy
file: dest=/usr/local/share/selinux/ state=directory
ansible.builtin.file: dest=/usr/local/share/selinux/ state=directory
tags: selinux
- name: Copy over our custom selinux policy
@ -349,7 +349,7 @@
- pkgs
- name: Make dir for grokmirror manifest
file: path=/srv/git/grokmirror state=directory owner=root group=packager mode=2775
ansible.builtin.file: path=/srv/git/grokmirror state=directory owner=root group=packager mode=2775
tags:
- grokmirror
- pkgs

View file

@ -20,7 +20,7 @@
- docker-distribution
- name: Ensure docker certs dir exists
file:
ansible.builtin.file:
path: "{{ cert.dest_dir }}"
state: directory
when: tls.enabled

View file

@ -9,10 +9,10 @@
- packages
- name: Create /srv/pub directory
file: path=/srv/pub state=directory
ansible.builtin.file: path=/srv/pub state=directory
- name: Create /srv/web directory
file: path=/srv/web state=directory
ansible.builtin.file: path=/srv/web state=directory
- name: Set httpd_use_nfs seboolean
seboolean: name=httpd_use_nfs state=yes persistent=yes

View file

@ -3,14 +3,14 @@
## Create all the folder used/needed
- name: Create the easyfix folder
file: state=directory
ansible.builtin.file: state=directory
path=/srv/web/easyfix
owner=apache group=apache mode=0755
tags:
- easyfix
- name: Create the easyfix configuration folder
file: state=directory
ansible.builtin.file: state=directory
path=/etc/fedora-gather-easyfix/
owner=root group=root mode=0755
tags:

View file

@ -1,6 +1,6 @@
---
- name: Ensure dir for content exists
file: dest=/srv/web/gather-easyfix owner=root group=root mode=0755 state=directory
ansible.builtin.file: dest=/srv/web/gather-easyfix owner=root group=root mode=0755 state=directory
tags:
- easyfix
- easyfix/proxy

View file

@ -1,6 +1,6 @@
---
- name: Create the directories to hold the templates
file:
ansible.builtin.file:
path: "/root/ocp4/openshift-apps/fas2discourse-operator"
state: directory
owner: root

View file

@ -1,7 +1,7 @@
---
- name: Create the fas2discourse keytab path on the batcave01
file:
ansible.builtin.file:
path: "/etc/openshift_apps/fas2discourse/"
state: directory
owner: root

View file

@ -43,13 +43,13 @@
when: ansible_distribution_major_version|int < 31 and ansible_distribution == 'Fedora'
- name: Setup /etc/fedmsg.d directory
file: path=/etc/fedmsg.d owner=root group=root mode=0755 state=directory
ansible.builtin.file: path=/etc/fedmsg.d owner=root group=root mode=0755 state=directory
tags:
- config
- fedmsg/base
- name: Remove any old static endpoints files
file: dest="/etc/fedmsg.d/{{item}}" state=absent
ansible.builtin.file: dest="/etc/fedmsg.d/{{item}}" state=absent
with_items:
- endpoints-bodhi.py
- endpoints-elections.py
@ -172,7 +172,7 @@
- restart fedmsg-relay
- name: Destroy standard config to make way for debug loopback.
file: dest=/etc/fedmsg.d/{{item}} state=absent
ansible.builtin.file: dest=/etc/fedmsg.d/{{item}} state=absent
with_items:
- relay.py
- policy.py
@ -208,7 +208,7 @@
- fedmsg/base
- name: Setup /etc/pki/fedmsg directory
file: path=/etc/pki/fedmsg owner=root group=root mode=0755 state=directory
ansible.builtin.file: path=/etc/pki/fedmsg owner=root group=root mode=0755 state=directory
tags:
- config
- fedmsg/base
@ -254,7 +254,7 @@
# Three tasks for handling our custom selinux module
- name: Ensure a directory exists for our custom selinux module
file: dest=/usr/local/share/fedmsg state=directory
ansible.builtin.file: dest=/usr/local/share/fedmsg state=directory
tags:
- fedmsg/base

View file

@ -5,7 +5,7 @@
---
- name: Ensure dir for content exists
file: dest=/srv/web/fedmsg owner=apache group=apache mode=0755 state=directory
ansible.builtin.file: dest=/srv/web/fedmsg owner=apache group=apache mode=0755 state=directory
tags:
- fedmsg
- fedmsg/crl

View file

@ -61,7 +61,7 @@
# Stunnel specific bits
- name: Create directories
file: path=/etc/{{ item }} state=directory
ansible.builtin.file: path=/etc/{{ item }} state=directory
with_items:
- stunnel
tags:
@ -80,7 +80,7 @@
- fedmsg/gateway/slave
- name: Ensure old stunnel init file is gone
file: dest=/etc/init.d/stunnel/stunnel.init state=absent
ansible.builtin.file: dest=/etc/init.d/stunnel/stunnel.init state=absent
tags:
- fedmsg/gateway
- fedmsg/gateway/slave

View file

@ -6,7 +6,7 @@
- fedmsg/gateway
- name: Ensure that nrpe has rights to monitor us
file: >
ansible.builtin.file: >
dest=/var/run/fedmsg/monitoring-fedmsg-gateway.socket
mode=0775
owner=fedmsg
@ -25,7 +25,7 @@
- restart fedmsg-gateway
- name: Create systemd drop-in directory
file: >
ansible.builtin.file: >
dest=/etc/systemd/system/fedmsg-gateway.service.d
state=directory
tags:

View file

@ -35,12 +35,12 @@
notify: restart fedmsg-hub
- name: Disable the websocket server if we should..
file: dest=/etc/fedmsg.d/websockets.py state=absent
ansible.builtin.file: dest=/etc/fedmsg.d/websockets.py state=absent
when: not enable_websocket_server
notify: restart fedmsg-hub
- name: Set fedmsg ownership on /var/run/fedmsg
file: >
ansible.builtin.file: >
dest=/var/run/fedmsg/
mode=2775
owner=fedmsg
@ -50,7 +50,7 @@
- fedmsgmonitor
- name: Ensure that nrpe has rights to monitor us
file: >
ansible.builtin.file: >
dest=/var/run/fedmsg/monitoring-fedmsg-hub.socket
mode=0775
owner=fedmsg
@ -63,7 +63,7 @@
- fedmsgmonitor
- name: Create systemd config directoryies
file: path="/etc/systemd/system/{{ item }}.service.d" state=directory
ansible.builtin.file: path="/etc/systemd/system/{{ item }}.service.d" state=directory
with_items:
- fedmsg-hub
- fedmsg-hub-3

View file

@ -11,7 +11,7 @@
- fedmsg/irc
- name: Ensure that nrpe has rights to monitor us
file: >
ansible.builtin.file: >
dest=/var/run/fedmsg/monitoring-fedmsg-irc.socket
mode=0775
owner=fedmsg

View file

@ -17,7 +17,7 @@
when: ansible_distribution_major_version|int > 21
- name: Ensure that nrpe has rights to monitor us
file: >
ansible.builtin.file: >
dest=/var/run/fedmsg/monitoring-fedmsg-relay.socket
mode=0775
owner=fedmsg

View file

@ -1,5 +1,5 @@
---
- file: dest=/srv/web/budget.fedoraproject.org state=directory
- ansible.builtin.file: dest=/srv/web/budget.fedoraproject.org state=directory
- template: >
src=budget-sync.j2 dest=/usr/local/bin/budget-sync

View file

@ -57,7 +57,7 @@
- fedora-web
- name: Create directories
file:
ansible.builtin.file:
state: directory
path: /srv/web/{{ item }}
owner: apache
@ -75,7 +75,7 @@
- fedora-web
- name: Make fmw dir
file:
ansible.builtin.file:
state: directory
path: /srv/web/fmw
owner: apache
@ -88,7 +88,7 @@
when: env != 'staging'
- name: Make fmw dir
file:
ansible.builtin.file:
state: directory
path: /srv/web/fmw
owner: apache
@ -101,14 +101,14 @@
when: env == 'staging'
- name: Remove the syncTranslations cronjob
file:
ansible.builtin.file:
path: /etc/cron.d/syncTranslations.cron
state: absent
tags:
- cron
- name: Remove the syncStatic cronjob
file:
ansible.builtin.file:
path: /etc/cron.d/syncStatic.cron
state: absent
tags:

View file

@ -1,6 +1,6 @@
---
- name: Make /srv/web/fedora.im dir
file: state=directory
ansible.builtin.file: state=directory
path=/srv/web/fedora.im
owner=apache
group=apache

View file

@ -10,7 +10,7 @@
- name: Load s3 credentials
ansible.builtin.include_vars:
file: "{{ private }}/files/websites/s3_fedoraproject_{{ env_short }}.yml"
ansible.builtin.file: "{{ private }}/files/websites/s3_fedoraproject_{{ env_short }}.yml"
ignore_errors: true
tags:
- fedora-web
@ -38,7 +38,7 @@
- fedoraproject_s3_bucket_name is defined
- name: Make directory for the config files for {{website}} we are about to copy
file: path=/etc/httpd/conf.d/{{website}} state=directory owner=root group=root mode=0755
ansible.builtin.file: path=/etc/httpd/conf.d/{{website}} state=directory owner=root group=root mode=0755
tags:
- fedora-web
- fedora-web/main
@ -80,7 +80,7 @@
- fedora-web/main
- name: Create a directory for hotspot
file: path=/srv/web state=directory owner=root group=root mode=0755
ansible.builtin.file: path=/srv/web state=directory owner=root group=root mode=0755
tags:
- fedora-web
- fedora-web/main

View file

@ -8,7 +8,7 @@
- ostree
- name: Make ostree dir
file: state=directory
ansible.builtin.file: state=directory
path=/srv/web/ostree
owner=apache
group=sysadmin-releng
@ -21,7 +21,7 @@
when: env != 'staging'
- name: Make ostree dir
file: state=directory
ansible.builtin.file: state=directory
path=/srv/web/ostree
owner=apache
group=apache
@ -43,7 +43,7 @@
- ostree
- name: Make IoT ostree dir
file: state=directory
ansible.builtin.file: state=directory
path=/srv/web/ostree/iot
owner=apache
group=sysadmin-releng
@ -56,7 +56,7 @@
when: env != 'staging'
- name: Make IoT ostree dir
file: state=directory
ansible.builtin.file: state=directory
path=/srv/web/ostree/iot
owner=apache
group=apache

View file

@ -1,11 +1,11 @@
---
- name: Make registry-signatures dir
file: state=directory path=/srv/web/registry-signatures owner=apache group=sysadmin-releng mode=2775 setype=httpd_sys_content_t seuser=system_u
ansible.builtin.file: state=directory path=/srv/web/registry-signatures owner=apache group=sysadmin-releng mode=2775 setype=httpd_sys_content_t seuser=system_u
tags:
- fedora-web
- name: Make registry-index dir
file: state=directory path=/srv/web/registry-index owner=apache group=apache mode=755 setype=httpd_sys_content_t seuser=system_u
ansible.builtin.file: state=directory path=/srv/web/registry-index owner=apache group=apache mode=755 setype=httpd_sys_content_t seuser=system_u
tags:
- fedora-web

View file

@ -104,7 +104,7 @@
- restart fedora_nightlies
- name: Create /etc/pki/fedora-messaging
file:
ansible.builtin.file:
dest: /etc/pki/fedora-messaging
mode: "0775"
owner: root

View file

@ -1,6 +1,6 @@
---
- name: Create directories
file:
ansible.builtin.file:
state: directory
path: "/srv/web/{{item}}"
owner: apache

View file

@ -11,7 +11,7 @@
- config
- name: Ensure /var/spool/squid directory exists
file:
ansible.builtin.file:
path: /var/spool/squid
state: directory
owner: squid
@ -22,7 +22,7 @@
- config
- name: Ensure /etc/pki/squid directory exists
file:
ansible.builtin.file:
path: /etc/pki/squid
state: directory
owner: squid

View file

@ -12,7 +12,7 @@
- packages
- name: Setup /srv/web/freemedia directory
file: path=/srv/web/freemedia owner=root group=root mode=0755 state=directory
ansible.builtin.file: path=/srv/web/freemedia owner=root group=root mode=0755 state=directory
tags:
- config

View file

@ -41,7 +41,7 @@
- geoip-city-wsgi/app
- name: Setup /usr/share/geoip-city-wsgi directory
file: >
ansible.builtin.file: >
path=/usr/share/geoip-city-wsgi
owner=root
group=root

View file

@ -11,7 +11,7 @@
- geoip-city-wsgi/proxy
- name: Make a dir for our fancy about page. So chic!
file: dest=/srv/web/geoip state=directory mode=0775 owner=root group=root
ansible.builtin.file: dest=/srv/web/geoip state=directory mode=0775 owner=root group=root
tags:
- geoip-city-wsgi
- geoip-city-wsgi/proxy

View file

@ -13,7 +13,7 @@
when: (ansible_distribution == 'RedHat' and ansible_distribution_major_version|int >= 8)
- name: Make sure the /usr/share/GeoIP/ directory exists
file:
ansible.builtin.file:
path: /usr/share/GeoIP/
state: directory
owner: root

View file

@ -8,7 +8,7 @@
- python2
- name: Create the destination directory
file: dest=/srv/git_seed owner=root group=root mode=0755 state=directory
ansible.builtin.file: dest=/srv/git_seed owner=root group=root mode=0755 state=directory
when: env != 'staging'
- name: Install the production version of the script and schedule its execution

View file

@ -7,12 +7,12 @@
# If NOT using xinetd
- name: Delete stock git daemon config
file: path="/usr/lib/systemd/system/git.service" state=absent
ansible.builtin.file: path="/usr/lib/systemd/system/git.service" state=absent
when: ansible_distribution_major_version|int >= 7 and ansible_distribution == 'RedHat'
tags: git/server
- name: Delete stock git daemon config
file: path="/usr/lib/systemd/system/git.service" state=absent
ansible.builtin.file: path="/usr/lib/systemd/system/git.service" state=absent
when: ansible_distribution_major_version|int >= 29 and ansible_distribution == 'Fedora'
tags: git/server

View file

@ -13,7 +13,7 @@
- github2fedmsg
- name: Make some directories
file: dest="{{item}}" mode=0755 state=directory
ansible.builtin.file: dest="{{item}}" mode=0755 state=directory
with_items:
- /etc/github2fedmsg
- /usr/share/github2fedmsg

View file

@ -8,4 +8,4 @@
- perl-Sys-Syslog
- name: Ensure the /etc/gitolite directory
file: path=/etc/gitolite owner=root group=root mode=0755 state=directory
ansible.builtin.file: path=/etc/gitolite owner=root group=root mode=0755 state=directory

View file

@ -11,7 +11,7 @@
- grobi
- name: Make sure that /usr/local/bin exists
file: path=/usr/local/bin state=directory
ansible.builtin.file: path=/usr/local/bin state=directory
tags:
- grobi

View file

@ -12,12 +12,12 @@
user: name=grokmirror local=true
- name: Create directory to mirror repos to
file: dest={{grokmirror_topdir}} mode=0755 state=directory owner=grokmirror
ansible.builtin.file: dest={{grokmirror_topdir}} mode=0755 state=directory owner=grokmirror
tags:
- grokmirror-mirror
- name: Create directory to mirror site to
file: dest={{grokmirror_topdir}}/src.fedoraproject.org mode=0755 state=directory owner=grokmirror
ansible.builtin.file: dest={{grokmirror_topdir}}/src.fedoraproject.org mode=0755 state=directory owner=grokmirror
tags:
- grokmirror-mirror

View file

@ -1,6 +1,6 @@
---
- name: Make directory for the config files for {{website}} we are about to copy
file: path=/etc/httpd/conf.d/{{website}} state=directory owner=root group=root mode=0755
ansible.builtin.file: path=/etc/httpd/conf.d/{{website}} state=directory owner=root group=root mode=0755
tags:
- haproxy
- haproxy/rewrite

View file

@ -79,7 +79,7 @@
# These following four tasks are used for copying over our custom selinux
# module.
- name: Ensure a directory exists for our custom selinux module
file: dest=/usr/share/haproxy state=directory
ansible.builtin.file: dest=/usr/share/haproxy state=directory
tags:
- haproxy
- selinux

View file

@ -16,7 +16,7 @@
- httpd/proxy
- name: Make sure certain files are gone
file: dest=/etc/httpd/conf.d/{{item}} state=absent
ansible.builtin.file: dest=/etc/httpd/conf.d/{{item}} state=absent
with_items:
- welcome.conf
tags:
@ -38,7 +38,7 @@
- httpd/proxy
- name: Remove the keepalives configuration
file: path=/etc/httpd/conf.d/01-keepalives.conf state=absent
ansible.builtin.file: path=/etc/httpd/conf.d/01-keepalives.conf state=absent
notify:
- reload proxyhttpd
tags:
@ -86,7 +86,7 @@
- selinux
- name: Create pki/httpd
file: path=/etc/pki/httpd state=directory
ansible.builtin.file: path=/etc/pki/httpd state=directory
owner=root group=root mode=0600
tags:
- httpd
@ -100,7 +100,7 @@
- disablesystemdoomd
- name: Create systemd drop in dir for httpd
file: path=/etc/systemd/system/httpd.service.d/ state=directory
ansible.builtin.file: path=/etc/systemd/system/httpd.service.d/ state=directory
tags:
- httpd
- httpd/proxy

View file

@ -9,7 +9,7 @@
---
- name: Ensure directory exists for redirect
file:
ansible.builtin.file:
path: /etc/httpd/conf.d/{{website}}
state: directory
mode: '0755'

View file

@ -10,7 +10,7 @@
---
- name: Create site directory in httpd/conf.d/{{site_name}}
file: >
ansible.builtin.file: >
dest=/etc/httpd/conf.d/{{site_name}}
state=directory
owner=root
@ -63,7 +63,7 @@
- robots
- name: Create /srv/web
file: >
ansible.builtin.file: >
dest=/srv/web
state=directory
owner=root

View file

@ -34,7 +34,7 @@
- config
- name: Remove ipa sshd config since we do not need it
file:
ansible.builtin.file:
state: absent
path: /etc/ssh/sshd_config.d/04-ipa.conf
tags:

View file

@ -95,7 +95,7 @@
- patches
- name: Make sure /etc/ipsilon/root is owned correctly
file:
ansible.builtin.file:
path: "/etc/ipsilon/root"
owner: ipsilon
group: ipsilon
@ -166,7 +166,7 @@
- ipsilon
- name: Create SAML2 dir
file:
ansible.builtin.file:
path: /etc/ipsilon/root/saml2
state: directory
mode: "0700"
@ -251,7 +251,7 @@
- ipsilon
- name: Apply selinux type to the wsgi file
file:
ansible.builtin.file:
dest: /usr/libexec/ipsilon
setype: httpd_sys_content_t
tags:

View file

@ -6,7 +6,7 @@
- patchutils
- name: Prepare the patches directory
file:
ansible.builtin.file:
path: /opt/ipsilon-patches
state: directory

View file

@ -15,7 +15,7 @@
- kerneltest
- name: Create the folder to store the logs
file: state=directory
ansible.builtin.file: state=directory
path=/var/www/logs
owner=apache group=apache mode=0755
tags:
@ -56,7 +56,7 @@
- selinux
- name: Apply selinux type to log files
file: >
ansible.builtin.file: >
dest=/var/www/logs
setype=httpd_sys_rw_content_t
state=directory

View file

@ -108,7 +108,7 @@
- name: Destroy stored keytab
delegate_to: "{{ ipa_server }}"
file: path=/tmp/{{service}}_{{host}}.kt state=absent
ansible.builtin.file: path=/tmp/{{service}}_{{host}}.kt state=absent
tags:
- keytab
- config
@ -134,14 +134,14 @@
when: not keytab_status.stat.exists
- name: Destroy encoded keytab
file: path={{kt_location}}.b64 state=absent
ansible.builtin.file: path={{kt_location}}.b64 state=absent
tags:
- keytab
- config
- krb5
- name: Set keytab permissions
file: path={{kt_location}} owner={{owner_user}} group={{owner_group}} mode=0640 state=file
ansible.builtin.file: path={{kt_location}} owner={{owner_user}} group={{owner_group}} mode=0640 state=file
tags:
- keytab
- config

View file

@ -19,12 +19,12 @@
- koji_builder
- name: Make mock homedir perms
file: state=directory path=/var/lib/mock mode=2775 owner=root group=mock
ansible.builtin.file: state=directory path=/var/lib/mock mode=2775 owner=root group=mock
tags:
- koji_builder
- name: Add mock ssh dir
file: state=directory path=/var/lib/mock/.ssh mode=700 owner=mock group=mock
ansible.builtin.file: state=directory path=/var/lib/mock/.ssh mode=700 owner=mock group=mock
tags:
- koji_builder
@ -44,7 +44,7 @@
- koji_builder
- name: Mockbuilder .ssh dir
file: state=directory path=/home/mockbuilder/.ssh mode=700 owner=mockbuilder group=mockbuilder
ansible.builtin.file: state=directory path=/home/mockbuilder/.ssh mode=700 owner=mockbuilder group=mockbuilder
tags:
- koji_builder
@ -54,7 +54,7 @@
- koji_builder
- name: Make a bunch of dirs
file: state=directory path={{ item }}
ansible.builtin.file: state=directory path={{ item }}
with_items:
- /pub
- /mnt/fedora_koji
@ -115,7 +115,7 @@
- rpmautospec
- name: Remove obsolete configuration of rpmautospec
file:
ansible.builtin.file:
path: "/etc/kojid/plugins/{{ item }}"
state: absent
loop:
@ -161,7 +161,7 @@
- rpmautospec
- name: Create osbuild builder config directory
file: path=/etc/koji-osbuild state=directory mode=0755
ansible.builtin.file: path=/etc/koji-osbuild state=directory mode=0755
tags:
- koji_builder
- koji_builder_osbuild
@ -197,12 +197,12 @@
# setup for oz/imagefactory
- name: Make .psphere dir
file: state=directory path=/root/.psphere mode=775 owner=root group=root
ansible.builtin.file: state=directory path=/root/.psphere mode=775 owner=root group=root
tags:
- koji_builder
- name: Make .psphere/templates dir
file: state=directory path=/root/.psphere/templates mode=775 owner=root group=root
ansible.builtin.file: state=directory path=/root/.psphere/templates mode=775 owner=root group=root
tags:
- koji_builder
@ -256,13 +256,13 @@
#
- name: Make a mnt/koji link
file: state=link src=/mnt/fedora_koji/koji dest=/mnt/koji
ansible.builtin.file: state=link src=/mnt/fedora_koji/koji dest=/mnt/koji
when: koji_hub_nfs is defined and koji_hub_nfs == "fedora_koji" and createrepo == True
tags:
- koji_builder
- name: Make a mnt/koji link
file: state=link src=/mnt/fedora_koji/koji dest=/mnt/koji force=yes
ansible.builtin.file: state=link src=/mnt/fedora_koji/koji dest=/mnt/koji force=yes
when: inventory_hostname.startswith(('buildvm-s390x-11', 'buildvm-s390x-12', 'buildvm-s390x-13'))
tags:
- koji_builder
@ -272,7 +272,7 @@
#
- name: Make a mnt/koji link
file: state=link src=/mnt/fedora_koji dest=/mnt/koji
ansible.builtin.file: state=link src=/mnt/fedora_koji dest=/mnt/koji
when: koji_hub_nfs is defined and koji_hub_nfs != "fedora_koji" and createrepo == True
tags:
- koji_builder
@ -332,7 +332,7 @@
- selinux
- name: Create directory for shared secrets
file:
ansible.builtin.file:
path: /etc/kojid/secrets
state: directory
owner: root
@ -394,7 +394,7 @@
- koji_builder/osbuildapi
- name: Create override dir for systemd-nspawn containers config
file:
ansible.builtin.file:
state: directory
owner: root
group: root

View file

@ -35,10 +35,10 @@
- koji_hub_osbuild
- name: Make koji pki directory
file: state=directory path=/etc/pki/koji/ owner=root group=root
ansible.builtin.file: state=directory path=/etc/pki/koji/ owner=root group=root
- name: Make koji pki subdirectories
file: state=directory path=/etc/pki/koji/{{ item }} owner=root group=root
ansible.builtin.file: state=directory path=/etc/pki/koji/{{ item }} owner=root group=root
with_items:
- certs
- private
@ -104,7 +104,7 @@
when: ansible_distribution == "Fedora"
- name: Create the config folder for fedora-messaging
file: path=/etc/fedora-messaging/ owner=root group=root mode=0755 state=directory
ansible.builtin.file: path=/etc/fedora-messaging/ owner=root group=root mode=0755 state=directory
tags:
- koji_hub
- fedora-messaging
@ -119,7 +119,7 @@
- fedora-messaging
- name: Create folder where we'll place the certs
file: path=/etc/pki/rabbitmq/kojicert/ owner=root group=root mode=0755 state=directory
ansible.builtin.file: path=/etc/pki/rabbitmq/kojicert/ owner=root group=root mode=0755 state=directory
tags:
- config
- koji_hub
@ -183,7 +183,7 @@
- rpmautospec
- name: Remove obsolete configuration for rpmautospec
file:
ansible.builtin.file:
path: "/etc/koji-hub/plugins/{{ item }}"
state: absent
loop:
@ -306,7 +306,7 @@
notify: reload httpd
- name: Kojira log dir
file: dest=/var/log/kojira owner=root group=root mode=0750 state=directory
ansible.builtin.file: dest=/var/log/kojira owner=root group=root mode=0750 state=directory
tags:
- config
- koji_hub
@ -321,13 +321,13 @@
- restart kojira
- name: Make an empty /mnt/fedora_koji for stg.
file: state=directory path=/mnt/fedora_koji/koji owner=root group=root
ansible.builtin.file: state=directory path=/mnt/fedora_koji/koji owner=root group=root
tags:
- koji_hub
when: env == "staging" and ansible_hostname.startswith('koji')
- name: Make mnt/koji directory
file: state=link src=/mnt/fedora_koji/koji dest=/mnt/koji owner=root group=root
ansible.builtin.file: state=link src=/mnt/fedora_koji/koji dest=/mnt/koji owner=root group=root
tags:
- koji_hub
when: ansible_hostname.startswith('koji')
@ -370,7 +370,7 @@
when: ansible_distribution == "RedHat" and ansible_distribution_major_version|int == 7
- name: Make httpd override directory
file:
ansible.builtin.file:
state: directory
path: /etc/systemd/system/httpd.service.d
owner: root

View file

@ -30,7 +30,7 @@
- kojipkgs
- name: Make a mnt/koji link
file: state=link src=/mnt/fedora_koji/koji dest=/mnt/koji
ansible.builtin.file: state=link src=/mnt/fedora_koji/koji dest=/mnt/koji
tags:
- kojipkgs
@ -40,7 +40,7 @@
- kojipkgs
- name: Make systemd drop-in override dir
file: name=/etc/systemd/system/varnish.service.d
ansible.builtin.file: name=/etc/systemd/system/varnish.service.d
state=directory
recurse=yes
owner=root group=root

View file

@ -1,6 +1,6 @@
---
- name: Create /etc/pki/fedora-messaging
file:
ansible.builtin.file:
dest: /etc/pki/fedora-messaging
mode: "0775"
owner: root

View file

@ -44,7 +44,7 @@
template: src=dotmy.cnf.j2 dest=/root/.my.cnf owner=root group=root mode=0700
- name: Ensure mariadb has a place to backup to
file: dest=/backups state=directory owner=mysql
ansible.builtin.file: dest=/backups state=directory owner=mysql
tags:
- mariadb-server

View file

@ -73,7 +73,7 @@
- mediawiki
- name: Create /etc/pki/fedora-messaging
file:
ansible.builtin.file:
dest: /etc/pki/fedora-messaging
mode: "0775"
owner: root
@ -144,18 +144,18 @@
- mediawiki
- name: Creating wiki dir
file: path=/srv/web/{{wikiname}}-wiki owner=root group=root mode=755 state=directory
ansible.builtin.file: path=/srv/web/{{wikiname}}-wiki owner=root group=root mode=755 state=directory
tags:
- mediawiki
# - name: Creating config dir
# file: src=/usr/share/{{ wikiver }}/config dest=/srv/web/{{wikiname}}/config owner=apache group=apache mode=755 state=directory
# ansible.builtin.file: src=/usr/share/{{ wikiver }}/config dest=/srv/web/{{wikiname}}/config owner=apache group=apache mode=755 state=directory
# tags:
# - mediawiki
# This doesn't seem to exist anymore in upstream....
# - name: Install utils
# file: src=/usr/share/{{ wikiver }}/install-utils.inc dest=/srv/web/{{wikiname}}-wiki/install-utils.inc state=link
# ansible.builtin.file: src=/usr/share/{{ wikiver }}/install-utils.inc dest=/srv/web/{{wikiname}}-wiki/install-utils.inc state=link
# tags:
# - mediawiki
@ -173,62 +173,62 @@
- mediawiki
- name: Linking index.php
file: dest=/srv/web/{{wikiname}}-wiki/index.php src=/usr/share/{{ wikiver }}/index.php state=link
ansible.builtin.file: dest=/srv/web/{{wikiname}}-wiki/index.php src=/usr/share/{{ wikiver }}/index.php state=link
tags:
- mediawiki
- name: Linkng api.php
file: dest=/srv/web/{{wikiname}}-wiki/api.php src=/usr/share/{{ wikiver }}/api.php state=link
ansible.builtin.file: dest=/srv/web/{{wikiname}}-wiki/api.php src=/usr/share/{{ wikiver }}/api.php state=link
tags:
- mediawiki
- name: Linking opensearch
file: dest=/srv/web/{{wikiname}}-wiki/opensearch_desc.php src=/usr/share/{{ wikiver }}/opensearch_desc.php state=link
ansible.builtin.file: dest=/srv/web/{{wikiname}}-wiki/opensearch_desc.php src=/usr/share/{{ wikiver }}/opensearch_desc.php state=link
tags:
- mediawiki
- name: Linking extensions
file: dest=/srv/web/{{wikiname}}-wiki/extensions src=/usr/share/{{ wikiver }}/extensions state=link
ansible.builtin.file: dest=/srv/web/{{wikiname}}-wiki/extensions src=/usr/share/{{ wikiver }}/extensions state=link
tags:
- mediawiki
- name: Linking includes
file: dest=/srv/web/{{wikiname}}-wiki/includes src=/usr/share/{{ wikiver }}/includes state=link
ansible.builtin.file: dest=/srv/web/{{wikiname}}-wiki/includes src=/usr/share/{{ wikiver }}/includes state=link
tags:
- mediawiki
- name: Linking languages
file: dest=/srv/web/{{wikiname}}-wiki/languages src=/usr/share/{{ wikiver }}/languages state=link
ansible.builtin.file: dest=/srv/web/{{wikiname}}-wiki/languages src=/usr/share/{{ wikiver }}/languages state=link
tags:
- mediawiki
- name: Linking maintenance
file: dest=/srv/web/{{wikiname}}-wiki/maintenance src=/usr/share/{{ wikiver }}/maintenance state=link
ansible.builtin.file: dest=/srv/web/{{wikiname}}-wiki/maintenance src=/usr/share/{{ wikiver }}/maintenance state=link
tags:
- mediawiki
# - name: Linking serialized
# file: dest=/srv/web/{{wikiname}}-wiki/serialized src=/usr/share/{{ wikiver }}/serialized state=link
# ansible.builtin.file: dest=/srv/web/{{wikiname}}-wiki/serialized src=/usr/share/{{ wikiver }}/serialized state=link
# tags:
# - mediawiki
- name: Linking skins
file: dest=/srv/web/{{wikiname}}-wiki/skins src=/usr/share/{{ wikiver }}/skins state=link
ansible.builtin.file: dest=/srv/web/{{wikiname}}-wiki/skins src=/usr/share/{{ wikiver }}/skins state=link
tags:
- mediawiki
- name: Linking load
file: dest=/srv/web/{{wikiname}}-wiki/load.php src=/usr/share/{{ wikiver }}/load.php state=link
ansible.builtin.file: dest=/srv/web/{{wikiname}}-wiki/load.php src=/usr/share/{{ wikiver }}/load.php state=link
tags:
- mediawiki
- name: Linking resources
file: dest=/srv/web/{{wikiname}}-wiki/resources src=/usr/share/{{ wikiver }}/resources state=link
ansible.builtin.file: dest=/srv/web/{{wikiname}}-wiki/resources src=/usr/share/{{ wikiver }}/resources state=link
tags:
- mediawiki
- name: Linking vendor
file: dest=/srv/web/{{wikiname}}-wiki/vendor src=/usr/share/{{ wikiver }}/vendor state=link
ansible.builtin.file: dest=/srv/web/{{wikiname}}-wiki/vendor src=/usr/share/{{ wikiver }}/vendor state=link
tags:
- mediawiki
@ -244,7 +244,7 @@
- fedora-messaging
- name: Create a directory for the php dependencies
file:
ansible.builtin.file:
path: /srv/web/fp-wiki/extensions/FedoraMessaging/vendor
owner: apache
group: apache
@ -268,7 +268,7 @@
- fedora-messaging
- name: Ensure a directory exists for our SELinux policy
file: dest=/usr/local/share/selinux/ state=directory
ansible.builtin.file: dest=/usr/local/share/selinux/ state=directory
tags: selinux
- name: Copy over our custom selinux policy

View file

@ -21,7 +21,7 @@
- memcached
- name: Make systemd override dir
file: state=directory path=/etc/systemd/system/memcached.service.d mode=0755 owner=root group=root
ansible.builtin.file: state=directory path=/etc/systemd/system/memcached.service.d mode=0755 owner=root group=root
tags:
- memcached
when: ansible_distribution == 'RedHat' and ansible_distribution_major_version|int == 7

View file

@ -7,12 +7,12 @@
- fedora-messaging
- name: Create rabitmq directory
file: path=/etc/pki/rabbitmq/ owner=root group=root mode=0755 state=directory
ansible.builtin.file: path=/etc/pki/rabbitmq/ owner=root group=root mode=0755 state=directory
tags:
- fedora-messaging
- name: "Create key/cert directory"
file: path=/etc/pki/rabbitmq/{{ item.username }}/
- name: "create key/cert directory"
ansible.builtin.file: path=/etc/pki/rabbitmq/{{ item.username }}/
owner={{ item.username }} group={{ item.username }}
mode=0700 state=directory
with_items: "{{ messaging.certificates }}"

View file

@ -32,7 +32,7 @@
# configure all the fedora-messaging files
- name: Create /etc/pki/fedora-messaging
file:
ansible.builtin.file:
dest: /etc/pki/fedora-messaging
mode: "0775"
owner: root
@ -81,7 +81,7 @@
# Install the script
- name: Create /usr/local/libexec/mirror_pagure_ansible
file:
ansible.builtin.file:
dest: /usr/local/libexec/mirror_pagure_ansible
mode: "0775"
owner: root

View file

@ -16,7 +16,7 @@
- mirrorlist_proxy
- name: Setup directories
file: dest="{{item}}" mode=0755 state=directory
ansible.builtin.file: dest="{{item}}" mode=0755 state=directory
with_items:
- /srv/mirrorlist
- /srv/mirrorlist/data
@ -27,7 +27,7 @@
- mirrorlist_proxy
- name: Make sure the /usr/share/GeoIP/ directory exists
file:
ansible.builtin.file:
path: /usr/share/GeoIP/
state: directory
owner: root
@ -44,7 +44,7 @@
- mirrorlist_proxy
- name: Make sure mirrormanager user can write new protobuf based cache file
file: dest="{{item}}" owner=mirrormanager group=mirrormanager
ansible.builtin.file: dest="{{item}}" owner=mirrormanager group=mirrormanager
with_items:
- /srv/mirrorlist/data
- /srv/mirrorlist/data/mirrorlist1
@ -53,14 +53,14 @@
- mirrorlist_proxy
- name: For the rust based mirrorlist server chown directories
file: dest="{{item}}" owner=mirrormanager group=mirrormanager
ansible.builtin.file: dest="{{item}}" owner=mirrormanager group=mirrormanager
with_items:
- /var/log/mirrormanager
tags:
- mirrorlist_proxy
- name: Ensure log file for content exists
file: dest="{{item}}" owner=mirrormanager group=mirrormanager mode=0755 state=touch
ansible.builtin.file: dest="{{item}}" owner=mirrormanager group=mirrormanager mode=0755 state=touch
with_items:
- /var/log/mirrormanager/mirrorlist1.service.log
- /var/log/mirrormanager/mirrorlist2.service.log
@ -68,7 +68,7 @@
- mirrorlist_proxy
- name: For the rust based mirrorlist server chown log files
file: dest="{{item}}" owner=mirrormanager group=mirrormanager
ansible.builtin.file: dest="{{item}}" owner=mirrormanager group=mirrormanager
with_items:
- /var/log/mirrormanager/mirrorlist1.service.log
- /var/log/mirrormanager/mirrorlist2.service.log
@ -139,7 +139,7 @@
# Custom selinux policy to allow logrotate to rotate our mirrorlist logs
- name: Ensure a directory exists for our custom selinux module
file: dest=/usr/local/share/mirrorlist-logrotate state=directory
ansible.builtin.file: dest=/usr/local/share/mirrorlist-logrotate state=directory
tags:
- selinux
- mirrorlist_proxy

View file

@ -1,3 +1,3 @@
---
- name: Nuke mote json cache
file: dest=/var/cache/httpd/mote/cache.json state=absent
ansible.builtin.file: dest=/var/cache/httpd/mote/cache.json state=absent

View file

@ -20,7 +20,7 @@
- restart memcached
- name: Make systemd override dir
file:
ansible.builtin.file:
state: directory
path: /etc/systemd/system/memcached.service.d
mode: "0755"
@ -67,7 +67,7 @@
- restart apache
- name: Create /usr/share/httpd/.local for mote-updater to store the fedmsg CRL
file: dest=/usr/share/httpd/.local owner=apache group=apache state=directory
ansible.builtin.file: dest=/usr/share/httpd/.local owner=apache group=apache state=directory
tags:
- mote
@ -78,7 +78,7 @@
- mote
- name: Apply selinux type to static files
file: >
ansible.builtin.file: >
dest=/usr/lib/python2.7/site-packages/mote/static/
setype=httpd_sys_content_t
state=directory
@ -88,7 +88,7 @@
- selinux
- name: Apply selinux type to meetbot files
file: >
ansible.builtin.file: >
dest=/srv/web/meetbot/
setype=httpd_sys_content_t
state=directory
@ -114,7 +114,7 @@
- selinux
- name: Apply selinux type to the wsgi file
file: >
ansible.builtin.file: >
dest=/usr/share/mote/mote.wsgi
setype=httpd_sys_content_t
tags:
@ -122,7 +122,7 @@
- selinux
- name: Apply selinux type to the name mappings file
file: >
ansible.builtin.file: >
dest=/usr/share/mote/name_mappings.json
setype=httpd_sys_content_t
notify:
@ -132,7 +132,7 @@
- selinux
- name: Apply selinux type to the category mappings file
file: >
ansible.builtin.file: >
dest=/usr/share/mote/category_mappings.json
setype=httpd_sys_content_t
notify:

View file

@ -83,7 +83,7 @@
# Three tasks for handling our custom selinux module
- name: Ensure a directory exists for our custom selinux module
file: dest=/usr/share/nrpe state=directory
ansible.builtin.file: dest=/usr/share/nrpe state=directory
tags:
- config
- nagios_client

View file

@ -87,7 +87,7 @@
## Setup directories for files to be copied
- name: Create or confirm directories to be made
file: dest={{item}} mode=2755 owner=root group=sysadmin-main state=directory
ansible.builtin.file: dest={{item}} mode=2755 owner=root group=sysadmin-main state=directory
with_items:
- /etc/nagios/commands
- /etc/nagios/contacts
@ -102,12 +102,12 @@
## Remove the items we don't want
- name: Nuke default nagios passwd
file: dest=/etc/nagios/passwd state=absent
ansible.builtin.file: dest=/etc/nagios/passwd state=absent
tags:
- nagios_server
- name: Nuke default nagios objects
file: dest=/etc/nagios/objects state=absent
ansible.builtin.file: dest=/etc/nagios/objects state=absent
tags:
- nagios_server
@ -266,7 +266,7 @@
## Drop services we don't need
- name: Nuke unneded services from /etc/nagios/services (External)
file: dest=/etc/nagios/services/{{ item }} state=absent
ansible.builtin.file: dest=/etc/nagios/services/{{ item }} state=absent
with_items:
- copr_external.cfg
tags:
@ -334,7 +334,7 @@
- nagios_server
- name: Configure perms on nrpe correctly
file: dest=/etc/nagios/nrpe.cfg mode=0644 group=root owner=root
ansible.builtin.file: dest=/etc/nagios/nrpe.cfg mode=0644 group=root owner=root
tags:
- config
- nagios_server
@ -522,7 +522,7 @@
## Handle selinux annoyances - roughly copied from fedmsg role
- name: Ensure a directory exists for our custom selinux module
file: dest=/usr/local/share/nagios-policy state=directory
ansible.builtin.file: dest=/usr/local/share/nagios-policy state=directory
tags:
- nagios_server

Some files were not shown because too many files have changed in this diff Show more