Remove action: in all roles.
This commit is contained in:
parent
5c0cca432b
commit
f0c80375b5
50 changed files with 139 additions and 139 deletions
|
@ -35,7 +35,7 @@
|
||||||
- restart apache
|
- restart apache
|
||||||
|
|
||||||
- name: create the folder where we store the ssl cert if not already there
|
- name: create the folder where we store the ssl cert if not already there
|
||||||
action: file state=directory
|
file: state=directory
|
||||||
path=/etc/pki/tls/certs/
|
path=/etc/pki/tls/certs/
|
||||||
owner=root group=root mode=0755
|
owner=root group=root mode=0755
|
||||||
|
|
||||||
|
@ -65,7 +65,7 @@
|
||||||
- restart apache
|
- restart apache
|
||||||
|
|
||||||
- name: set sebooleans so anitya can talk to the db
|
- name: set sebooleans so anitya can talk to the db
|
||||||
action: seboolean name={{ item }}
|
seboolean: name={{ item }}
|
||||||
state=true
|
state=true
|
||||||
persistent=true
|
persistent=true
|
||||||
with_items:
|
with_items:
|
||||||
|
|
|
@ -30,7 +30,7 @@
|
||||||
- python-openid
|
- python-openid
|
||||||
|
|
||||||
- name: set sebooleans so ask can talk to the db
|
- name: set sebooleans so ask can talk to the db
|
||||||
action: seboolean name=httpd_can_network_connect_db
|
seboolean: name=httpd_can_network_connect_db
|
||||||
state=true
|
state=true
|
||||||
persistent=true
|
persistent=true
|
||||||
tags:
|
tags:
|
||||||
|
@ -38,7 +38,7 @@
|
||||||
- selinux
|
- selinux
|
||||||
|
|
||||||
- name: set sebooleans so ask can use the gluster mount
|
- name: set sebooleans so ask can use the gluster mount
|
||||||
action: seboolean name=httpd_use_fusefs
|
seboolean: name=httpd_use_fusefs
|
||||||
state=true
|
state=true
|
||||||
persistent=true
|
persistent=true
|
||||||
tags:
|
tags:
|
||||||
|
@ -46,7 +46,7 @@
|
||||||
- selinux
|
- selinux
|
||||||
|
|
||||||
- name: set sebooleans so ask can talk to the memcache
|
- name: set sebooleans so ask can talk to the memcache
|
||||||
action: seboolean name=httpd_can_network_memcache
|
seboolean: name=httpd_can_network_memcache
|
||||||
state=true
|
state=true
|
||||||
persistent=true
|
persistent=true
|
||||||
tags:
|
tags:
|
||||||
|
@ -54,7 +54,7 @@
|
||||||
- selinux
|
- selinux
|
||||||
|
|
||||||
- name: set sebooleans so ask can talk to fedmsg
|
- name: set sebooleans so ask can talk to fedmsg
|
||||||
action: seboolean name=allow_httpd_sys_script_anon_write
|
seboolean: name=allow_httpd_sys_script_anon_write
|
||||||
state=true
|
state=true
|
||||||
persistent=true
|
persistent=true
|
||||||
tags:
|
tags:
|
||||||
|
@ -62,7 +62,7 @@
|
||||||
- selinux
|
- selinux
|
||||||
|
|
||||||
- name: set sebooleans so ask can talk to fedmsg
|
- name: set sebooleans so ask can talk to fedmsg
|
||||||
action: seboolean name=allow_ypbind
|
seboolean: name=allow_ypbind
|
||||||
state=true
|
state=true
|
||||||
persistent=true
|
persistent=true
|
||||||
tags:
|
tags:
|
||||||
|
|
|
@ -52,7 +52,7 @@
|
||||||
|
|
||||||
# http://docs.openstack.org/icehouse/install-guide/install/yum/content/nova-compute.html
|
# http://docs.openstack.org/icehouse/install-guide/install/yum/content/nova-compute.html
|
||||||
- name: install the Compute packages necessary for the controller node.
|
- name: install the Compute packages necessary for the controller node.
|
||||||
action: yum state=present pkg={{ item }}
|
yum: state=present pkg={{ item }}
|
||||||
with_items:
|
with_items:
|
||||||
- openstack-nova-compute
|
- openstack-nova-compute
|
||||||
- python-novaclient
|
- python-novaclient
|
||||||
|
@ -157,7 +157,7 @@
|
||||||
- sysctl: name=net.ipv4.conf.default.rp_filter value=0 state=present sysctl_set=yes reload=yes
|
- sysctl: name=net.ipv4.conf.default.rp_filter value=0 state=present sysctl_set=yes reload=yes
|
||||||
|
|
||||||
- name: install the Networking components
|
- name: install the Networking components
|
||||||
action: yum state=present pkg={{ item }}
|
yum: state=present pkg={{ item }}
|
||||||
with_items:
|
with_items:
|
||||||
- openstack-neutron-ml2
|
- openstack-neutron-ml2
|
||||||
- openstack-neutron-openvswitch
|
- openstack-neutron-openvswitch
|
||||||
|
|
|
@ -42,10 +42,10 @@
|
||||||
|
|
||||||
tasks:
|
tasks:
|
||||||
- name: edit hostname to be instance name
|
- name: edit hostname to be instance name
|
||||||
action: shell hostname `curl -s http://169.254.169.254/2009-04-04/meta-data/instance-id`
|
shell: hostname `curl -s http://169.254.169.254/2009-04-04/meta-data/instance-id`
|
||||||
|
|
||||||
- name: install pkgs
|
- name: install pkgs
|
||||||
action: yum state=present pkg={{ item }}
|
yum: state=present pkg={{ item }}
|
||||||
with_items:
|
with_items:
|
||||||
- rsync
|
- rsync
|
||||||
- openssh-clients
|
- openssh-clients
|
||||||
|
@ -53,12 +53,12 @@
|
||||||
- libsemanage-python
|
- libsemanage-python
|
||||||
|
|
||||||
- name: add repos
|
- name: add repos
|
||||||
action: copy src={{ files }}/{{ item }} dest=/etc/yum.repos.d/{{ item }}
|
copy: src={{ files }}/{{ item }} dest=/etc/yum.repos.d/{{ item }}
|
||||||
with_items:
|
with_items:
|
||||||
- epel6.repo
|
- epel6.repo
|
||||||
|
|
||||||
- name: install additional pkgs
|
- name: install additional pkgs
|
||||||
action: yum state=present pkg={{ item }}
|
yum: state=present pkg={{ item }}
|
||||||
with_items:
|
with_items:
|
||||||
- mock
|
- mock
|
||||||
- createrepo
|
- createrepo
|
||||||
|
@ -66,7 +66,7 @@
|
||||||
- pyliblzma
|
- pyliblzma
|
||||||
|
|
||||||
- name: make sure newest rpm
|
- name: make sure newest rpm
|
||||||
action: yum name={{ item }} state=latest
|
yum: name={{ item }} state=latest
|
||||||
with_items:
|
with_items:
|
||||||
- rpm
|
- rpm
|
||||||
- glib2
|
- glib2
|
||||||
|
@ -75,16 +75,16 @@
|
||||||
#- yum: name=mock enablerepo=epel-testing state=latest
|
#- yum: name=mock enablerepo=epel-testing state=latest
|
||||||
|
|
||||||
- name: mockbuilder user
|
- name: mockbuilder user
|
||||||
action: user name=mockbuilder groups=mock
|
user: name=mockbuilder groups=mock
|
||||||
|
|
||||||
- name: mockbuilder .ssh
|
- name: mockbuilder .ssh
|
||||||
action: file state=directory path=/home/mockbuilder/.ssh mode=0700 owner=mockbuilder group=mockbuilder
|
file: state=directory path=/home/mockbuilder/.ssh mode=0700 owner=mockbuilder group=mockbuilder
|
||||||
|
|
||||||
- name: mockbuilder authorized_keys
|
- name: mockbuilder authorized_keys
|
||||||
action: authorized_key user=mockbuilder key='{{ lookup('file', '/home/copr/provision/files/buildsys.pub') }}'
|
authorized_key: user=mockbuilder key='{{ lookup('file', '/home/copr/provision/files/buildsys.pub') }}'
|
||||||
|
|
||||||
- name: put updated mock configs into /etc/mock
|
- name: put updated mock configs into /etc/mock
|
||||||
action: template src={{ files }}/mock/{{ item }} dest=/etc/mock
|
template: src={{ files }}/mock/{{ item }} dest=/etc/mock
|
||||||
with_items:
|
with_items:
|
||||||
- site-defaults.cfg
|
- site-defaults.cfg
|
||||||
|
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
- name: chmod_key
|
- name: chmod_key
|
||||||
action: file path=/etc/lighttpd/copr-be.fedoraproject.org.pem owner=root group=root mode=0600
|
file: path=/etc/lighttpd/copr-be.fedoraproject.org.pem owner=root group=root mode=0600
|
||||||
|
|
||||||
- name: restart copr-backend
|
- name: restart copr-backend
|
||||||
service: name=copr-backend state=restarted
|
service: name=copr-backend state=restarted
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
- name: install postresql
|
- name: install postresql
|
||||||
action: yum state=present pkg={{ item }}
|
yum: state=present pkg={{ item }}
|
||||||
with_items:
|
with_items:
|
||||||
- "postgresql-server"
|
- "postgresql-server"
|
||||||
- "postgresql-contrib"
|
- "postgresql-contrib"
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
---
|
---
|
||||||
- name: restart haveged
|
- name: restart haveged
|
||||||
action: service name=haveged state=restarted
|
service: name=haveged state=restarted
|
||||||
|
|
||||||
- name: restart obs-signd
|
- name: restart obs-signd
|
||||||
action: service name=signd state=restarted
|
service: name=signd state=restarted
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
- name: install postresql
|
- name: install postresql
|
||||||
action: yum state=present pkg={{ item }}
|
yum: state=present pkg={{ item }}
|
||||||
with_items:
|
with_items:
|
||||||
- "postgresql-server"
|
- "postgresql-server"
|
||||||
- "postgresql-contrib"
|
- "postgresql-contrib"
|
||||||
|
|
|
@ -18,7 +18,7 @@
|
||||||
yum: pkg=mod_ssl state=present
|
yum: pkg=mod_ssl state=present
|
||||||
|
|
||||||
- name: Set httpd_use_nfs seboolean
|
- name: Set httpd_use_nfs seboolean
|
||||||
action: seboolean name=httpd_use_nfs state=yes persistent=yes
|
seboolean: name=httpd_use_nfs state=yes persistent=yes
|
||||||
|
|
||||||
- name: check the selinux context rsyncd log
|
- name: check the selinux context rsyncd log
|
||||||
command: matchpathcon /var/log/rsyncd-fedora.log
|
command: matchpathcon /var/log/rsyncd-fedora.log
|
||||||
|
|
|
@ -3,14 +3,14 @@
|
||||||
|
|
||||||
## Create all the folder used/needed
|
## Create all the folder used/needed
|
||||||
- name: Create the easyfix folder
|
- name: Create the easyfix folder
|
||||||
action: file state=directory
|
file: state=directory
|
||||||
path=/srv/web/easyfix
|
path=/srv/web/easyfix
|
||||||
owner=apache group=apache mode=0755
|
owner=apache group=apache mode=0755
|
||||||
tags:
|
tags:
|
||||||
- easyfix
|
- easyfix
|
||||||
|
|
||||||
- name: Create the easyfix configuration folder
|
- name: Create the easyfix configuration folder
|
||||||
action: file state=directory
|
file: state=directory
|
||||||
path=/etc/fedora-gather-easyfix/
|
path=/etc/fedora-gather-easyfix/
|
||||||
owner=root group=root mode=0755
|
owner=root group=root mode=0755
|
||||||
tags:
|
tags:
|
||||||
|
|
|
@ -42,7 +42,7 @@
|
||||||
- restart apache
|
- restart apache
|
||||||
|
|
||||||
- name: set sebooleans so fedora-elections can talk to the db
|
- name: set sebooleans so fedora-elections can talk to the db
|
||||||
action: seboolean name=httpd_can_network_connect_db
|
seboolean: name=httpd_can_network_connect_db
|
||||||
state=true
|
state=true
|
||||||
persistent=true
|
persistent=true
|
||||||
tags:
|
tags:
|
||||||
|
@ -68,7 +68,7 @@
|
||||||
- elections
|
- elections
|
||||||
|
|
||||||
- name: set sebooleans so apache can talk to memcached0*
|
- name: set sebooleans so apache can talk to memcached0*
|
||||||
action: seboolean name=httpd_can_network_memcache
|
seboolean: name=httpd_can_network_memcache
|
||||||
state=true
|
state=true
|
||||||
persistent=true
|
persistent=true
|
||||||
tags:
|
tags:
|
||||||
|
|
|
@ -1,3 +1,3 @@
|
||||||
---
|
---
|
||||||
- name: run fasclient
|
- name: run fasclient
|
||||||
action: command /usr/bin/fasClient -i
|
command: /usr/bin/fasClient -i
|
||||||
|
|
|
@ -55,7 +55,7 @@
|
||||||
- config
|
- config
|
||||||
|
|
||||||
- name: set sebooleans so fedocal can talk to the db
|
- name: set sebooleans so fedocal can talk to the db
|
||||||
action: seboolean name=httpd_can_network_connect_db
|
seboolean: name=httpd_can_network_connect_db
|
||||||
state=true
|
state=true
|
||||||
persistent=true
|
persistent=true
|
||||||
|
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
---
|
---
|
||||||
- name: add repo
|
- name: add repo
|
||||||
action: copy src=cabal-install.repo dest=/etc/yum.repos.d/cabal-install.repo
|
copy: src=cabal-install.repo dest=/etc/yum.repos.d/cabal-install.repo
|
||||||
tags:
|
tags:
|
||||||
- cabal-install
|
- cabal-install
|
||||||
- packages
|
- packages
|
||||||
|
|
|
@ -12,7 +12,7 @@
|
||||||
rpm_key: state=present key=https://grafanarel.s3.amazonaws.com/RPM-GPG-KEY-grafana
|
rpm_key: state=present key=https://grafanarel.s3.amazonaws.com/RPM-GPG-KEY-grafana
|
||||||
|
|
||||||
- name: add repo
|
- name: add repo
|
||||||
action: copy src=grafana.repo dest=/etc/yum.repos.d/grafana.repo
|
copy: src=grafana.repo dest=/etc/yum.repos.d/grafana.repo
|
||||||
tags:
|
tags:
|
||||||
- grafana
|
- grafana
|
||||||
- packages
|
- packages
|
||||||
|
@ -25,7 +25,7 @@
|
||||||
- packages
|
- packages
|
||||||
|
|
||||||
- name: set sebool so apache can talk to grafana-server
|
- name: set sebool so apache can talk to grafana-server
|
||||||
action: seboolean name=httpd_can_network_connect
|
seboolean: name=httpd_can_network_connect
|
||||||
state=true
|
state=true
|
||||||
persistent=true
|
persistent=true
|
||||||
|
|
||||||
|
|
|
@ -10,7 +10,7 @@
|
||||||
# Note that if it's not set it will just skip this play and do nothing.
|
# Note that if it's not set it will just skip this play and do nothing.
|
||||||
#
|
#
|
||||||
- name: setup /etc/hosts for some clients
|
- name: setup /etc/hosts for some clients
|
||||||
action: copy src={{ item }} dest=/etc/hosts
|
copy: src={{ item }} dest=/etc/hosts
|
||||||
with_first_found:
|
with_first_found:
|
||||||
- files:
|
- files:
|
||||||
- "{{ inventory_hostname }}-hosts"
|
- "{{ inventory_hostname }}-hosts"
|
||||||
|
|
|
@ -82,7 +82,7 @@
|
||||||
- config
|
- config
|
||||||
|
|
||||||
- name: enable infinoted
|
- name: enable infinoted
|
||||||
action: service name=infinoted state=running enabled=true
|
service: name=infinoted state=running enabled=true
|
||||||
tags:
|
tags:
|
||||||
- infinote
|
- infinote
|
||||||
- config
|
- config
|
||||||
|
|
|
@ -119,7 +119,7 @@
|
||||||
when: env == "staging"
|
when: env == "staging"
|
||||||
|
|
||||||
- name: set sebooleans so ipsilon can talk to the db
|
- name: set sebooleans so ipsilon can talk to the db
|
||||||
action: seboolean name=httpd_can_network_connect_db
|
seboolean: name=httpd_can_network_connect_db
|
||||||
state=true
|
state=true
|
||||||
persistent=true
|
persistent=true
|
||||||
|
|
||||||
|
|
|
@ -39,13 +39,13 @@
|
||||||
- packages
|
- packages
|
||||||
|
|
||||||
- name: mount jenkins persistent storage
|
- name: mount jenkins persistent storage
|
||||||
action: mount name=/var/lib/jenkins src='LABEL=jenkins' fstype=ext4 state=mounted
|
mount: name=/var/lib/jenkins src='LABEL=jenkins' fstype=ext4 state=mounted
|
||||||
tags:
|
tags:
|
||||||
- jenkins
|
- jenkins
|
||||||
- jenkins/master
|
- jenkins/master
|
||||||
|
|
||||||
- name: Install custom jenkins plugins (from ansible bigfiles)
|
- name: Install custom jenkins plugins (from ansible bigfiles)
|
||||||
action: copy src="{{ bigfiles }}/jenkins/{{ item }}.hpi" dest=/var/lib/jenkins/plugins/{{ item }}.hpi
|
copy: src="{{ bigfiles }}/jenkins/{{ item }}.hpi" dest=/var/lib/jenkins/plugins/{{ item }}.hpi
|
||||||
with_items:
|
with_items:
|
||||||
- fedmsg
|
- fedmsg
|
||||||
notify:
|
notify:
|
||||||
|
@ -104,14 +104,14 @@
|
||||||
- config
|
- config
|
||||||
|
|
||||||
- name: install private ssh key
|
- name: install private ssh key
|
||||||
action: copy src="{{ private }}/files/jenkins/ssh/jenkins_master" dest=/etc/jenkins/id_rsa mode=400 owner=jenkins group=jenkins
|
copy: src="{{ private }}/files/jenkins/ssh/jenkins_master" dest=/etc/jenkins/id_rsa mode=400 owner=jenkins group=jenkins
|
||||||
tags:
|
tags:
|
||||||
- jenkins
|
- jenkins
|
||||||
- jenkins/master
|
- jenkins/master
|
||||||
- config
|
- config
|
||||||
|
|
||||||
- name: enable jenkins service to start on boot
|
- name: enable jenkins service to start on boot
|
||||||
action: service name=jenkins state=running enabled=true
|
service: name=jenkins state=running enabled=true
|
||||||
tags:
|
tags:
|
||||||
- jenkins
|
- jenkins
|
||||||
- jenkins/master
|
- jenkins/master
|
||||||
|
|
|
@ -53,14 +53,14 @@
|
||||||
- packages
|
- packages
|
||||||
|
|
||||||
- name: create jenkins user
|
- name: create jenkins user
|
||||||
action: user name=jenkins state=present createhome=yes system=no groups=mock
|
user: name=jenkins state=present createhome=yes system=no groups=mock
|
||||||
tags:
|
tags:
|
||||||
- jenkins
|
- jenkins
|
||||||
- jenkins/slave
|
- jenkins/slave
|
||||||
- config
|
- config
|
||||||
|
|
||||||
- name: add jenkins ssh public key to authorized keys
|
- name: add jenkins ssh public key to authorized keys
|
||||||
action: authorized_key user=jenkins key="{{ item }}"
|
authorized_key: user=jenkins key="{{ item }}"
|
||||||
with_file:
|
with_file:
|
||||||
- "{{ private }}/files/jenkins/ssh/jenkins_master.pub"
|
- "{{ private }}/files/jenkins/ssh/jenkins_master.pub"
|
||||||
tags:
|
tags:
|
||||||
|
@ -69,7 +69,7 @@
|
||||||
- config
|
- config
|
||||||
|
|
||||||
- name: create workspace directory
|
- name: create workspace directory
|
||||||
action: file state=directory path=/srv/jenkins owner=jenkins group=jenkins
|
file: state=directory path=/srv/jenkins owner=jenkins group=jenkins
|
||||||
tags:
|
tags:
|
||||||
- jenkins
|
- jenkins
|
||||||
- jenkins/slave
|
- jenkins/slave
|
||||||
|
|
|
@ -21,7 +21,7 @@
|
||||||
- kerneltest
|
- kerneltest
|
||||||
|
|
||||||
- name: Create the folder to store the logs
|
- name: Create the folder to store the logs
|
||||||
action: file state=directory
|
file: state=directory
|
||||||
path=/var/www/logs
|
path=/var/www/logs
|
||||||
owner=apache group=apache mode=0755
|
owner=apache group=apache mode=0755
|
||||||
tags:
|
tags:
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
- name: restart sks-db
|
- name: restart sks-db
|
||||||
action: service name=sks-db state=restarted
|
service: name=sks-db state=restarted
|
||||||
|
|
||||||
- name: restart sks-recon
|
- name: restart sks-recon
|
||||||
action: service name=sks-recon state=restarted
|
service: name=sks-recon state=restarted
|
||||||
|
|
||||||
|
|
|
@ -277,7 +277,7 @@
|
||||||
- koji_builder
|
- koji_builder
|
||||||
|
|
||||||
- name: set kernel params for more loops
|
- name: set kernel params for more loops
|
||||||
action: command /sbin/grubby --update-kernel=ALL --args=max_loop=64
|
command: /sbin/grubby --update-kernel=ALL --args=max_loop=64
|
||||||
when: max_loop is defined and max_loop.stdout.find("max_loop=64") == -1
|
when: max_loop is defined and max_loop.stdout.find("max_loop=64") == -1
|
||||||
tags:
|
tags:
|
||||||
- koji_builder
|
- koji_builder
|
||||||
|
|
|
@ -90,7 +90,7 @@
|
||||||
- config
|
- config
|
||||||
|
|
||||||
- name: enable services to start on boot
|
- name: enable services to start on boot
|
||||||
action: service name={{ item }} state=running enabled=true
|
service: name={{ item }} state=running enabled=true
|
||||||
with_items:
|
with_items:
|
||||||
- koschei-polling
|
- koschei-polling
|
||||||
- koschei-resolver
|
- koschei-resolver
|
||||||
|
|
|
@ -1,9 +1,9 @@
|
||||||
---
|
---
|
||||||
- name: restart mailman3
|
- name: restart mailman3
|
||||||
action: service name=mailman3 state=restarted
|
service: name=mailman3 state=restarted
|
||||||
|
|
||||||
- name: reload apache
|
- name: reload apache
|
||||||
action: service name=httpd state=reloaded
|
service: name=httpd state=reloaded
|
||||||
|
|
||||||
- name: restart memcached
|
- name: restart memcached
|
||||||
action: service name=memcached state=restarted
|
service: name=memcached state=restarted
|
||||||
|
|
|
@ -12,7 +12,7 @@
|
||||||
- packages
|
- packages
|
||||||
|
|
||||||
- name: create all the directory for the configuration file
|
- name: create all the directory for the configuration file
|
||||||
action: file state=directory path=/etc/mdapi
|
file: state=directory path=/etc/mdapi
|
||||||
tags:
|
tags:
|
||||||
- mdapi
|
- mdapi
|
||||||
- config
|
- config
|
||||||
|
|
|
@ -20,7 +20,7 @@
|
||||||
- mediawiki
|
- mediawiki
|
||||||
|
|
||||||
- name: set sebooleans so apache can send emails
|
- name: set sebooleans so apache can send emails
|
||||||
action: seboolean name=httpd_can_sendmail state=yes persistent=yes
|
seboolean: name=httpd_can_sendmail state=yes persistent=yes
|
||||||
tags:
|
tags:
|
||||||
- mediawiki
|
- mediawiki
|
||||||
|
|
||||||
|
|
|
@ -20,7 +20,7 @@
|
||||||
- mediawiki
|
- mediawiki
|
||||||
|
|
||||||
- name: set sebooleans so apache can send emails
|
- name: set sebooleans so apache can send emails
|
||||||
action: seboolean name=httpd_can_sendmail state=yes persistent=yes
|
seboolean: name=httpd_can_sendmail state=yes persistent=yes
|
||||||
tags:
|
tags:
|
||||||
- mediawiki
|
- mediawiki
|
||||||
|
|
||||||
|
|
|
@ -43,7 +43,7 @@
|
||||||
- config
|
- config
|
||||||
|
|
||||||
- name: set sebooleans so mirrormanager can connect to its db
|
- name: set sebooleans so mirrormanager can connect to its db
|
||||||
action: seboolean name=httpd_can_network_connect_db
|
seboolean: name=httpd_can_network_connect_db
|
||||||
state=true
|
state=true
|
||||||
persistent=true
|
persistent=true
|
||||||
tags:
|
tags:
|
||||||
|
@ -51,7 +51,7 @@
|
||||||
- config
|
- config
|
||||||
|
|
||||||
- name: set sebooleans so mirrormanager can send exception mails
|
- name: set sebooleans so mirrormanager can send exception mails
|
||||||
action: seboolean name=httpd_can_sendmail
|
seboolean: name=httpd_can_sendmail
|
||||||
state=true
|
state=true
|
||||||
persistent=true
|
persistent=true
|
||||||
tags:
|
tags:
|
||||||
|
|
|
@ -58,7 +58,7 @@
|
||||||
- selinux
|
- selinux
|
||||||
|
|
||||||
- name: set sebooleans so apache can use memcached
|
- name: set sebooleans so apache can use memcached
|
||||||
action: seboolean name=httpd_can_network_memcache
|
seboolean: name=httpd_can_network_memcache
|
||||||
state=true
|
state=true
|
||||||
persistent=true
|
persistent=true
|
||||||
tags:
|
tags:
|
||||||
|
|
|
@ -1,3 +1,3 @@
|
||||||
---
|
---
|
||||||
- name: restart nrpe
|
- name: restart nrpe
|
||||||
action: service name=nrpe state=restarted
|
service: name=nrpe state=restarted
|
||||||
|
|
|
@ -1,3 +1,3 @@
|
||||||
---
|
---
|
||||||
- name: restart nrpe
|
- name: restart nrpe
|
||||||
action: service name=nrpe state=restarted
|
service: name=nrpe state=restarted
|
||||||
|
|
|
@ -64,7 +64,7 @@
|
||||||
- nfs/client
|
- nfs/client
|
||||||
|
|
||||||
- name: enable nfs-related services and run them (rhel6)
|
- name: enable nfs-related services and run them (rhel6)
|
||||||
action: service name={{ item }} enabled=true state=started
|
service: name={{ item }} enabled=true state=started
|
||||||
with_items:
|
with_items:
|
||||||
- rpcidmapd
|
- rpcidmapd
|
||||||
- rpcbind
|
- rpcbind
|
||||||
|
|
|
@ -16,7 +16,7 @@
|
||||||
- nfs/server
|
- nfs/server
|
||||||
|
|
||||||
- name: enable nfs-related services and run them (fedora)
|
- name: enable nfs-related services and run them (fedora)
|
||||||
action: service name={{ item }} enabled=true state=started
|
service: name={{ item }} enabled=true state=started
|
||||||
with_items:
|
with_items:
|
||||||
- nfs-idmap
|
- nfs-idmap
|
||||||
- rpc-statd
|
- rpc-statd
|
||||||
|
@ -25,7 +25,7 @@
|
||||||
- nfs/server
|
- nfs/server
|
||||||
|
|
||||||
- name: enable nfs-related services and run them (rhel)
|
- name: enable nfs-related services and run them (rhel)
|
||||||
action: service name={{ item }} enabled=true state=started
|
service: name={{ item }} enabled=true state=started
|
||||||
with_items:
|
with_items:
|
||||||
- rpcbind
|
- rpcbind
|
||||||
- nfs-server
|
- nfs-server
|
||||||
|
|
|
@ -30,7 +30,7 @@
|
||||||
- restart apache
|
- restart apache
|
||||||
|
|
||||||
- name: create pictures folder where we upload the pictures
|
- name: create pictures folder where we upload the pictures
|
||||||
action: file state=directory
|
file: state=directory
|
||||||
path=/var/cache/nuancier/pictures
|
path=/var/cache/nuancier/pictures
|
||||||
owner=apache group=apache mode=0700
|
owner=apache group=apache mode=0700
|
||||||
tags:
|
tags:
|
||||||
|
@ -38,7 +38,7 @@
|
||||||
- nuancier
|
- nuancier
|
||||||
|
|
||||||
- name: create the cache folder where nuancier creates the thumbnails
|
- name: create the cache folder where nuancier creates the thumbnails
|
||||||
action: file state=directory
|
file: state=directory
|
||||||
path=/var/cache/nuancier/cache
|
path=/var/cache/nuancier/cache
|
||||||
owner=apache group=apache mode=0700
|
owner=apache group=apache mode=0700
|
||||||
tags:
|
tags:
|
||||||
|
@ -69,7 +69,7 @@
|
||||||
- restart apache
|
- restart apache
|
||||||
|
|
||||||
- name: set sebooleans so nuancier can talk to the db
|
- name: set sebooleans so nuancier can talk to the db
|
||||||
action: seboolean name=httpd_can_network_connect_db
|
seboolean: name=httpd_can_network_connect_db
|
||||||
state=true
|
state=true
|
||||||
persistent=true
|
persistent=true
|
||||||
tags:
|
tags:
|
||||||
|
@ -87,7 +87,7 @@
|
||||||
- selinux
|
- selinux
|
||||||
|
|
||||||
- name: set sebooleans so apache can use glusterfs
|
- name: set sebooleans so apache can use glusterfs
|
||||||
action: seboolean name=httpd_use_fusefs
|
seboolean: name=httpd_use_fusefs
|
||||||
state=true
|
state=true
|
||||||
persistent=true
|
persistent=true
|
||||||
tags:
|
tags:
|
||||||
|
@ -95,7 +95,7 @@
|
||||||
- selinux
|
- selinux
|
||||||
|
|
||||||
- name: set sebooleans so apache can send emails
|
- name: set sebooleans so apache can send emails
|
||||||
action: seboolean name=httpd_can_sendmail
|
seboolean: name=httpd_can_sendmail
|
||||||
state=true
|
state=true
|
||||||
persistent=true
|
persistent=true
|
||||||
tags:
|
tags:
|
||||||
|
|
|
@ -124,14 +124,14 @@
|
||||||
delegate_to: "{{ openqa_dbhost }}"
|
delegate_to: "{{ openqa_dbhost }}"
|
||||||
sudo_user: postgres
|
sudo_user: postgres
|
||||||
sudo: true
|
sudo: true
|
||||||
action: postgresql_db db={{ openqa_dbname }}
|
postgresql_db: db={{ openqa_dbname }}
|
||||||
when: "openqa_dbhost is defined"
|
when: "openqa_dbhost is defined"
|
||||||
|
|
||||||
- name: Ensure db user has access to database
|
- name: Ensure db user has access to database
|
||||||
delegate_to: "{{ openqa_dbhost }}"
|
delegate_to: "{{ openqa_dbhost }}"
|
||||||
sudo_user: postgres
|
sudo_user: postgres
|
||||||
sudo: true
|
sudo: true
|
||||||
action: postgresql_user db={{ openqa_dbname }} user={{ openqa_dbuser }} password={{ openqa_dbpassword }} role_attr_flags=NOSUPERUSER
|
postgresql_user: db={{ openqa_dbname }} user={{ openqa_dbuser }} password={{ openqa_dbpassword }} role_attr_flags=NOSUPERUSER
|
||||||
when: "openqa_dbhost is defined"
|
when: "openqa_dbhost is defined"
|
||||||
|
|
||||||
- name: Database config
|
- name: Database config
|
||||||
|
|
|
@ -50,7 +50,7 @@
|
||||||
- pagure
|
- pagure
|
||||||
|
|
||||||
- name: create the /srv/git/.gitolite/conf folder
|
- name: create the /srv/git/.gitolite/conf folder
|
||||||
action: file state=directory
|
file: state=directory
|
||||||
path=/srv/git/.gitolite/conf
|
path=/srv/git/.gitolite/conf
|
||||||
owner=git group=git mode=0775
|
owner=git group=git mode=0775
|
||||||
tags:
|
tags:
|
||||||
|
@ -58,7 +58,7 @@
|
||||||
- pagure
|
- pagure
|
||||||
|
|
||||||
- name: create the /srv/git/.gitolite/keydir folder
|
- name: create the /srv/git/.gitolite/keydir folder
|
||||||
action: file state=directory
|
file: state=directory
|
||||||
path=/srv/git/.gitolite/keydir
|
path=/srv/git/.gitolite/keydir
|
||||||
owner=git group=git mode=0775
|
owner=git group=git mode=0775
|
||||||
tags:
|
tags:
|
||||||
|
@ -66,7 +66,7 @@
|
||||||
- pagure
|
- pagure
|
||||||
|
|
||||||
- name: create the /srv/git/.gitolite/logs folder
|
- name: create the /srv/git/.gitolite/logs folder
|
||||||
action: file state=directory
|
file: state=directory
|
||||||
path=/srv/git/.gitolite/logs
|
path=/srv/git/.gitolite/logs
|
||||||
owner=git group=git mode=0775
|
owner=git group=git mode=0775
|
||||||
tags:
|
tags:
|
||||||
|
@ -94,7 +94,7 @@
|
||||||
- pagure
|
- pagure
|
||||||
|
|
||||||
- name: create all the directories where we store the git repos
|
- name: create all the directories where we store the git repos
|
||||||
action: file state=directory
|
file: state=directory
|
||||||
path={{ item }}
|
path={{ item }}
|
||||||
owner=git group=git mode=0775
|
owner=git group=git mode=0775
|
||||||
with_items:
|
with_items:
|
||||||
|
@ -109,7 +109,7 @@
|
||||||
- pagure
|
- pagure
|
||||||
|
|
||||||
- name: create the /srv/tmp folder where to clone repos
|
- name: create the /srv/tmp folder where to clone repos
|
||||||
action: file state=directory
|
file: state=directory
|
||||||
path=/srv/tmp
|
path=/srv/tmp
|
||||||
owner=git group=git mode=0775
|
owner=git group=git mode=0775
|
||||||
tags:
|
tags:
|
||||||
|
@ -166,7 +166,7 @@
|
||||||
# Set-up Pagure
|
# Set-up Pagure
|
||||||
|
|
||||||
- name: create the /var/www/releases folder
|
- name: create the /var/www/releases folder
|
||||||
action: file state=directory
|
file: state=directory
|
||||||
path=/var/www/releases
|
path=/var/www/releases
|
||||||
owner=git group=git mode=0775
|
owner=git group=git mode=0775
|
||||||
tags:
|
tags:
|
||||||
|
@ -258,7 +258,7 @@
|
||||||
- pagure
|
- pagure
|
||||||
|
|
||||||
- name: set sebooleans so pagure can talk to the db
|
- name: set sebooleans so pagure can talk to the db
|
||||||
action: seboolean name=httpd_can_network_connect_db
|
seboolean: name=httpd_can_network_connect_db
|
||||||
state=true
|
state=true
|
||||||
persistent=true
|
persistent=true
|
||||||
tags:
|
tags:
|
||||||
|
@ -267,7 +267,7 @@
|
||||||
- pagure
|
- pagure
|
||||||
|
|
||||||
- name: set sebooleans so apache can send emails
|
- name: set sebooleans so apache can send emails
|
||||||
action: seboolean name=httpd_can_sendmail
|
seboolean: name=httpd_can_sendmail
|
||||||
state=true
|
state=true
|
||||||
persistent=true
|
persistent=true
|
||||||
tags:
|
tags:
|
||||||
|
|
|
@ -41,7 +41,7 @@
|
||||||
- pdc
|
- pdc
|
||||||
|
|
||||||
- name: create /etc/httpd/saml2
|
- name: create /etc/httpd/saml2
|
||||||
action: file state=directory
|
file: state=directory
|
||||||
path=/etc/httpd/saml2
|
path=/etc/httpd/saml2
|
||||||
owner=apache group=apache mode=0775
|
owner=apache group=apache mode=0775
|
||||||
tags:
|
tags:
|
||||||
|
|
|
@ -3,5 +3,5 @@
|
||||||
#
|
#
|
||||||
|
|
||||||
- name: restart phd
|
- name: restart phd
|
||||||
action: service name=phd state=restarted
|
service: name=phd state=restarted
|
||||||
|
|
||||||
|
|
|
@ -79,7 +79,7 @@
|
||||||
- pkgdb
|
- pkgdb
|
||||||
|
|
||||||
- name: set sebooleans so pkgdb2 can talk to the db
|
- name: set sebooleans so pkgdb2 can talk to the db
|
||||||
action: seboolean name=httpd_can_network_connect_db
|
seboolean: name=httpd_can_network_connect_db
|
||||||
state=true
|
state=true
|
||||||
persistent=true
|
persistent=true
|
||||||
tags:
|
tags:
|
||||||
|
@ -87,7 +87,7 @@
|
||||||
- pkgdb
|
- pkgdb
|
||||||
|
|
||||||
- name: set sebooleans so apache can send emails
|
- name: set sebooleans so apache can send emails
|
||||||
action: seboolean name=httpd_can_sendmail
|
seboolean: name=httpd_can_sendmail
|
||||||
state=true
|
state=true
|
||||||
persistent=true
|
persistent=true
|
||||||
tags:
|
tags:
|
||||||
|
@ -95,7 +95,7 @@
|
||||||
- pkgdb
|
- pkgdb
|
||||||
|
|
||||||
- name: set sebooleans so apache can talk to memcached0*
|
- name: set sebooleans so apache can talk to memcached0*
|
||||||
action: seboolean name=httpd_can_network_memcache
|
seboolean: name=httpd_can_network_memcache
|
||||||
state=true
|
state=true
|
||||||
persistent=true
|
persistent=true
|
||||||
tags:
|
tags:
|
||||||
|
|
|
@ -1,62 +1,62 @@
|
||||||
- name: set root passwd
|
- name: set root passwd
|
||||||
action: user name=root password={{ builder_rootpw }} state=present
|
user: name=root password={{ builder_rootpw }} state=present
|
||||||
|
|
||||||
- name: add mock user as 425
|
- name: add mock user as 425
|
||||||
action: user name=mock uid=425 state=present home=/var/lib/mock createhome=yes system=yes
|
user: name=mock uid=425 state=present home=/var/lib/mock createhome=yes system=yes
|
||||||
- name: make mock homedir 2775
|
- name: make mock homedir 2775
|
||||||
action: file state=directory path=/var/lib/mock mode=2775 owner=mock group=mock
|
file: state=directory path=/var/lib/mock mode=2775 owner=mock group=mock
|
||||||
- name: add mock ssh dir
|
- name: add mock ssh dir
|
||||||
action: file state=directory path=/var/lib/mock/.ssh mode=700 owner=mock group=mock
|
file: state=directory path=/var/lib/mock/.ssh mode=700 owner=mock group=mock
|
||||||
- name: add mock ssh keys
|
- name: add mock ssh keys
|
||||||
action: copy src="{{ files }}/../roles/koji_builder/files//mock_auth_keys" dest=/var/lib/mock/.ssh/authorized_keys mode=644 owner=mock group=mock
|
copy: src="{{ files }}/../roles/koji_builder/files//mock_auth_keys" dest=/var/lib/mock/.ssh/authorized_keys mode=644 owner=mock group=mock
|
||||||
|
|
||||||
- name: add ftpsync group
|
- name: add ftpsync group
|
||||||
action: group name=ftpsync gid=263 system=yes state=present
|
group: name=ftpsync gid=263 system=yes state=present
|
||||||
|
|
||||||
- name: add ftpsync user
|
- name: add ftpsync user
|
||||||
user: name=ftpsync uid=263 group=ftpsync createhome=yes system=yes state=present
|
user: name=ftpsync uid=263 group=ftpsync createhome=yes system=yes state=present
|
||||||
|
|
||||||
- name: add the ftpsync update-fullfilelist script
|
- name: add the ftpsync update-fullfilelist script
|
||||||
action: copy src=update-fullfilelist dest=/usr/local/bin/update-fullfilelist owner=ftpsync group=ftpsync mode=555
|
copy: src=update-fullfilelist dest=/usr/local/bin/update-fullfilelist owner=ftpsync group=ftpsync mode=555
|
||||||
|
|
||||||
- name: add masher group
|
- name: add masher group
|
||||||
action: group name=masher gid=751 system=yes state=present
|
group: name=masher gid=751 system=yes state=present
|
||||||
# masher user 751
|
# masher user 751
|
||||||
- name: add masher user as 751 - and group
|
- name: add masher user as 751 - and group
|
||||||
action: user name=masher uid=751 group=masher home=/home/masher groups=mock,ftpsync
|
user: name=masher uid=751 group=masher home=/home/masher groups=mock,ftpsync
|
||||||
# masher ssh keys and config
|
# masher ssh keys and config
|
||||||
- name: add masher ssh dir
|
- name: add masher ssh dir
|
||||||
action: file state=directory path=/home/masher/.ssh mode=700 owner=masher group=masher
|
file: state=directory path=/home/masher/.ssh mode=700 owner=masher group=masher
|
||||||
- name: add masher ssh keys
|
- name: add masher ssh keys
|
||||||
action: copy src="mash/masher.{{ item }}" dest="/home/masher/.ssh/{{ item }}" mode=600 owner=masher group=masher
|
copy: src="mash/masher.{{ item }}" dest="/home/masher/.ssh/{{ item }}" mode=600 owner=masher group=masher
|
||||||
with_items:
|
with_items:
|
||||||
- id_rsa.pub
|
- id_rsa.pub
|
||||||
- config
|
- config
|
||||||
|
|
||||||
- name: add masher ssh priv key
|
- name: add masher ssh priv key
|
||||||
action: copy src="{{ private }}/files/mash/masher.id_rsa" dest=/home/masher/.ssh/id_rsa mode=600 owner=masher group=masher
|
copy: src="{{ private }}/files/mash/masher.id_rsa" dest=/home/masher/.ssh/id_rsa mode=600 owner=masher group=masher
|
||||||
|
|
||||||
- name: add masher koji cert/key
|
- name: add masher koji cert/key
|
||||||
action: copy src="{{ private }}/files/mash/masher.pem" dest=/home/masher/.fedora.cert mode=600 owner=masher group=masher
|
copy: src="{{ private }}/files/mash/masher.pem" dest=/home/masher/.fedora.cert mode=600 owner=masher group=masher
|
||||||
- name: add masher koji ca cert
|
- name: add masher koji ca cert
|
||||||
action: copy src="{{ private }}/files/koji/buildercerts/fedora-ca.cert" dest=/home/masher/.fedora-server-ca.cert
|
copy: src="{{ private }}/files/koji/buildercerts/fedora-ca.cert" dest=/home/masher/.fedora-server-ca.cert
|
||||||
- name: add masher koji ca upload cert
|
- name: add masher koji ca upload cert
|
||||||
action: copy src="{{ private }}/files/koji/buildercerts/fedora-ca.cert" dest=/home/masher/.fedora-upload-ca.cert
|
copy: src="{{ private }}/files/koji/buildercerts/fedora-ca.cert" dest=/home/masher/.fedora-upload-ca.cert
|
||||||
|
|
||||||
- name: add koji ca cert to central system ca-trust
|
- name: add koji ca cert to central system ca-trust
|
||||||
action: copy src="{{ private }}/files/koji/buildercerts/fedora-ca.cert" dest=/etc/pki/ca-trust/source/anchors/fedora-server-ca.cert
|
copy: src="{{ private }}/files/koji/buildercerts/fedora-ca.cert" dest=/etc/pki/ca-trust/source/anchors/fedora-server-ca.cert
|
||||||
- name: update ca-trust
|
- name: update ca-trust
|
||||||
command: /usr/bin/update-ca-trust
|
command: /usr/bin/update-ca-trust
|
||||||
|
|
||||||
# rawhide group
|
# rawhide group
|
||||||
- name: rawhide group
|
- name: rawhide group
|
||||||
action: group name=rawhide gid=265
|
group: name=rawhide gid=265
|
||||||
# rawhide user 265
|
# rawhide user 265
|
||||||
- name: add rawhide user
|
- name: add rawhide user
|
||||||
action: user name=rawhide uid=265 group=rawhide home=/tmp comment="rawhide compose account"
|
user: name=rawhide uid=265 group=rawhide home=/tmp comment="rawhide compose account"
|
||||||
|
|
||||||
- name: make a bunch of dirs
|
- name: make a bunch of dirs
|
||||||
action: file state=directory path={{ item }}
|
file: state=directory path={{ item }}
|
||||||
with_items:
|
with_items:
|
||||||
- /pub
|
- /pub
|
||||||
- /epel
|
- /epel
|
||||||
|
@ -127,55 +127,55 @@
|
||||||
|
|
||||||
# idmapd and make sure it's set to run
|
# idmapd and make sure it's set to run
|
||||||
- name: idmapd.conf
|
- name: idmapd.conf
|
||||||
action: copy src="{{ files }}/../roles/koji_builder/files//idmapd.conf" dest=/etc/idmapd.conf
|
copy: src="{{ files }}/../roles/koji_builder/files//idmapd.conf" dest=/etc/idmapd.conf
|
||||||
tags:
|
tags:
|
||||||
- configs
|
- configs
|
||||||
|
|
||||||
- name: make a mnt/koji link
|
- name: make a mnt/koji link
|
||||||
action: file state=link src=/mnt/fedora_koji/koji dest=/mnt/koji
|
file: state=link src=/mnt/fedora_koji/koji dest=/mnt/koji
|
||||||
when: inventory_hostname.startswith(('compose-x86-01'))
|
when: inventory_hostname.startswith(('compose-x86-01'))
|
||||||
|
|
||||||
- name: symlink /srv/pungi
|
- name: symlink /srv/pungi
|
||||||
action: file src=/mnt/fedora_koji/compose dest=/srv/pungi state=link
|
file: src=/mnt/fedora_koji/compose dest=/srv/pungi state=link
|
||||||
when: not inventory_hostname.startswith('compose-aarch64-01')
|
when: not inventory_hostname.startswith('compose-aarch64-01')
|
||||||
|
|
||||||
- name: add pkgs for nightly compose
|
- name: add pkgs for nightly compose
|
||||||
action: yum state=present pkg={{ item }}
|
yum: state=present pkg={{ item }}
|
||||||
with_items:
|
with_items:
|
||||||
- packagedb-cli
|
- packagedb-cli
|
||||||
when: inventory_hostname.startswith('branched-composer') or inventory_hostname.startswith('rawhide-composer') or inventory_hostname.startswith('composer.stg')
|
when: inventory_hostname.startswith('branched-composer') or inventory_hostname.startswith('rawhide-composer') or inventory_hostname.startswith('composer.stg')
|
||||||
|
|
||||||
# put cron job in for branched compose
|
# put cron job in for branched compose
|
||||||
- name: branched compose cron
|
- name: branched compose cron
|
||||||
action: copy src="branched" dest=/etc/cron.d/branched
|
copy: src="branched" dest=/etc/cron.d/branched
|
||||||
when: inventory_hostname.startswith('branched-composer')
|
when: inventory_hostname.startswith('branched-composer')
|
||||||
|
|
||||||
# put cron job in for rawhide compose
|
# put cron job in for rawhide compose
|
||||||
- name: rawhide compose cron
|
- name: rawhide compose cron
|
||||||
action: copy src="rawhide" dest=/etc/cron.d/rawhide
|
copy: src="rawhide" dest=/etc/cron.d/rawhide
|
||||||
when: inventory_hostname.startswith('rawhide-composer')
|
when: inventory_hostname.startswith('rawhide-composer')
|
||||||
|
|
||||||
# put cron job in for aarch64 branched compose
|
# put cron job in for aarch64 branched compose
|
||||||
- name: aarch64 branched compose cron
|
- name: aarch64 branched compose cron
|
||||||
action: copy src="aarch64.branched" dest=/etc/cron.d/branched
|
copy: src="aarch64.branched" dest=/etc/cron.d/branched
|
||||||
when: inventory_hostname.startswith('compose-aarch64-01')
|
when: inventory_hostname.startswith('compose-aarch64-01')
|
||||||
|
|
||||||
# put cron job in for aarch64 rawhide compose
|
# put cron job in for aarch64 rawhide compose
|
||||||
- name: aarch64 rawhide compose cron
|
- name: aarch64 rawhide compose cron
|
||||||
action: copy src="aarch64.rawhide" dest=/etc/cron.d/rawhide
|
copy: src="aarch64.rawhide" dest=/etc/cron.d/rawhide
|
||||||
when: inventory_hostname.startswith('compose-aarch64-01')
|
when: inventory_hostname.startswith('compose-aarch64-01')
|
||||||
|
|
||||||
# put cron job in for two-week nightly compose
|
# put cron job in for two-week nightly compose
|
||||||
- name: twoweek compose cron
|
- name: twoweek compose cron
|
||||||
action: copy src="twoweek-updates" dest=/etc/cron.d/twoweek-updates
|
copy: src="twoweek-updates" dest=/etc/cron.d/twoweek-updates
|
||||||
when: inventory_hostname.startswith('compose-x86-01')
|
when: inventory_hostname.startswith('compose-x86-01')
|
||||||
|
|
||||||
- name: sudoers defaults
|
- name: sudoers defaults
|
||||||
action: copy src="{{ private }}/files/sudo/releng-sudoers" dest=/etc/sudoers mode=0440
|
copy: src="{{ private }}/files/sudo/releng-sudoers" dest=/etc/sudoers mode=0440
|
||||||
tags:
|
tags:
|
||||||
- configs
|
- configs
|
||||||
- name: sudoers for ftpsync
|
- name: sudoers for ftpsync
|
||||||
action: copy src="{{ private }}/files/sudo/ftpsync-sudo" dest=/etc/sudoers.d/ftpsync mode=0440
|
copy: src="{{ private }}/files/sudo/ftpsync-sudo" dest=/etc/sudoers.d/ftpsync mode=0440
|
||||||
tags:
|
tags:
|
||||||
- configs
|
- configs
|
||||||
|
|
||||||
|
|
|
@ -55,7 +55,7 @@
|
||||||
- services
|
- services
|
||||||
|
|
||||||
- name: set sebooleans so rsync can read dirs
|
- name: set sebooleans so rsync can read dirs
|
||||||
action: seboolean name=rsync_export_all_ro
|
seboolean: name=rsync_export_all_ro
|
||||||
state=true
|
state=true
|
||||||
persistent=true
|
persistent=true
|
||||||
|
|
||||||
|
|
|
@ -36,7 +36,7 @@
|
||||||
# This will move a /etc/sudoers.d/ file in place
|
# This will move a /etc/sudoers.d/ file in place
|
||||||
#
|
#
|
||||||
- name: setup /etc/sudoers.d/sudoer file for client use
|
- name: setup /etc/sudoers.d/sudoer file for client use
|
||||||
action: copy src={{ item }} dest=/etc/sudoers.d/{{ item | basename | replace('.', '_') }}
|
copy: src={{ item }} dest=/etc/sudoers.d/{{ item | basename | replace('.', '_') }}
|
||||||
owner=root group=root mode=0600
|
owner=root group=root mode=0600
|
||||||
with_first_found:
|
with_first_found:
|
||||||
- files:
|
- files:
|
||||||
|
|
|
@ -12,4 +12,4 @@
|
||||||
service: name=nginx state=restarted
|
service: name=nginx state=restarted
|
||||||
|
|
||||||
- name: restart postfix
|
- name: restart postfix
|
||||||
action: service name=postfix state=restarted
|
service: name=postfix state=restarted
|
||||||
|
|
|
@ -63,35 +63,35 @@
|
||||||
delegate_to: "{{ buildmaster_db_host }}"
|
delegate_to: "{{ buildmaster_db_host }}"
|
||||||
sudo: true
|
sudo: true
|
||||||
sudo_user: postgres
|
sudo_user: postgres
|
||||||
action: postgresql_db db={{ buildmaster_db_name }}
|
postgresql_db: db={{ buildmaster_db_name }}
|
||||||
|
|
||||||
- name: ensure dev db user has access to dev database
|
- name: ensure dev db user has access to dev database
|
||||||
when: deployment_type == 'dev'
|
when: deployment_type == 'dev'
|
||||||
delegate_to: "{{ buildmaster_db_host }}"
|
delegate_to: "{{ buildmaster_db_host }}"
|
||||||
sudo: true
|
sudo: true
|
||||||
sudo_user: postgres
|
sudo_user: postgres
|
||||||
action: postgresql_user db={{ buildmaster_db_name }} user={{ dev_buildmaster_db_user }} password={{ dev_buildmaster_db_password }} role_attr_flags=NOSUPERUSER
|
postgresql_user: db={{ buildmaster_db_name }} user={{ dev_buildmaster_db_user }} password={{ dev_buildmaster_db_password }} role_attr_flags=NOSUPERUSER
|
||||||
|
|
||||||
- name: ensure stg db user has access to stg database
|
- name: ensure stg db user has access to stg database
|
||||||
when: deployment_type == 'stg'
|
when: deployment_type == 'stg'
|
||||||
delegate_to: "{{ buildmaster_db_host }}"
|
delegate_to: "{{ buildmaster_db_host }}"
|
||||||
sudo: true
|
sudo: true
|
||||||
sudo_user: postgres
|
sudo_user: postgres
|
||||||
action: postgresql_user db={{ buildmaster_db_name }} user={{ stg_buildmaster_db_user }} password={{ stg_buildmaster_db_password }} role_attr_flags=NOSUPERUSER
|
postgresql_user: db={{ buildmaster_db_name }} user={{ stg_buildmaster_db_user }} password={{ stg_buildmaster_db_password }} role_attr_flags=NOSUPERUSER
|
||||||
|
|
||||||
- name: ensure prod db user has access to prod database
|
- name: ensure prod db user has access to prod database
|
||||||
when: deployment_type == 'prod'
|
when: deployment_type == 'prod'
|
||||||
delegate_to: "{{ buildmaster_db_host }}"
|
delegate_to: "{{ buildmaster_db_host }}"
|
||||||
sudo: true
|
sudo: true
|
||||||
sudo_user: postgres
|
sudo_user: postgres
|
||||||
action: postgresql_user db={{ buildmaster_db_name }} user={{ prod_buildmaster_db_user }} password={{ prod_buildmaster_db_password }} role_attr_flags=NOSUPERUSER
|
postgresql_user: db={{ buildmaster_db_name }} user={{ prod_buildmaster_db_user }} password={{ prod_buildmaster_db_password }} role_attr_flags=NOSUPERUSER
|
||||||
|
|
||||||
- name: ensure local db user has access to local database
|
- name: ensure local db user has access to local database
|
||||||
when: deployment_type == 'local'
|
when: deployment_type == 'local'
|
||||||
delegate_to: "{{ buildmaster_db_host }}"
|
delegate_to: "{{ buildmaster_db_host }}"
|
||||||
sudo: true
|
sudo: true
|
||||||
sudo_user: postgres
|
sudo_user: postgres
|
||||||
action: postgresql_user db={{ buildmaster_db_name }} user={{ local_buildmaster_db_user }} password={{ local_buildmaster_db_password }} role_attr_flags=NOSUPERUSER
|
postgresql_user: db={{ buildmaster_db_name }} user={{ local_buildmaster_db_user }} password={{ local_buildmaster_db_password }} role_attr_flags=NOSUPERUSER
|
||||||
|
|
||||||
- name: put robots.txt at web root of external hostname
|
- name: put robots.txt at web root of external hostname
|
||||||
when: robots_path is defined
|
when: robots_path is defined
|
||||||
|
|
|
@ -21,35 +21,35 @@
|
||||||
delegate_to: "{{ execdb_db_host_machine }}"
|
delegate_to: "{{ execdb_db_host_machine }}"
|
||||||
sudo_user: postgres
|
sudo_user: postgres
|
||||||
sudo: true
|
sudo: true
|
||||||
action: postgresql_db db={{ execdb_db_name }}
|
postgresql_db: db={{ execdb_db_name }}
|
||||||
|
|
||||||
- name: ensure dev execdb db user has access to dev database
|
- name: ensure dev execdb db user has access to dev database
|
||||||
when: deployment_type == 'dev'
|
when: deployment_type == 'dev'
|
||||||
delegate_to: "{{ execdb_db_host_machine }}"
|
delegate_to: "{{ execdb_db_host_machine }}"
|
||||||
sudo_user: postgres
|
sudo_user: postgres
|
||||||
sudo: true
|
sudo: true
|
||||||
action: postgresql_user db={{ execdb_db_name }} user={{ execdb_db_user }} password={{ execdb_db_password }} role_attr_flags=NOSUPERUSER
|
postgresql_user: db={{ execdb_db_name }} user={{ execdb_db_user }} password={{ execdb_db_password }} role_attr_flags=NOSUPERUSER
|
||||||
|
|
||||||
- name: ensure stg execdb db user has access to stg database
|
- name: ensure stg execdb db user has access to stg database
|
||||||
when: deployment_type == 'stg'
|
when: deployment_type == 'stg'
|
||||||
delegate_to: "{{ execdb_db_host }}"
|
delegate_to: "{{ execdb_db_host }}"
|
||||||
sudo_user: postgres
|
sudo_user: postgres
|
||||||
sudo: true
|
sudo: true
|
||||||
action: postgresql_user db={{ execdb_db_name }} user={{ stg_execdb_db_user }} password={{ stg_execdb_db_password }} role_attr_flags=NOSUPERUSER
|
postgresql_user: db={{ execdb_db_name }} user={{ stg_execdb_db_user }} password={{ stg_execdb_db_password }} role_attr_flags=NOSUPERUSER
|
||||||
|
|
||||||
- name: ensure prod execdb db user has access to prod database
|
- name: ensure prod execdb db user has access to prod database
|
||||||
when: deployment_type == 'prod'
|
when: deployment_type == 'prod'
|
||||||
delegate_to: "{{ execdb_db_host }}"
|
delegate_to: "{{ execdb_db_host }}"
|
||||||
sudo_user: postgres
|
sudo_user: postgres
|
||||||
sudo: true
|
sudo: true
|
||||||
action: postgresql_user db={{ execdb_db_name }} user={{ prod_execdb_db_user }} password={{ prod_execdb_db_password }} role_attr_flags=NOSUPERUSER
|
postgresql_user: db={{ execdb_db_name }} user={{ prod_execdb_db_user }} password={{ prod_execdb_db_password }} role_attr_flags=NOSUPERUSER
|
||||||
|
|
||||||
- name: ensure local execdb db user has access to prod database
|
- name: ensure local execdb db user has access to prod database
|
||||||
when: deployment_type == 'local'
|
when: deployment_type == 'local'
|
||||||
delegate_to: "{{ execdb_db_host }}"
|
delegate_to: "{{ execdb_db_host }}"
|
||||||
sudo_user: postgres
|
sudo_user: postgres
|
||||||
sudo: true
|
sudo: true
|
||||||
action: postgresql_user db={{ execdb_db_name }} user={{ local_execdb_db_user }} password={{ local_execdb_db_password }} role_attr_flags=NOSUPERUSER
|
postgresql_user: db={{ execdb_db_name }} user={{ local_execdb_db_user }} password={{ local_execdb_db_password }} role_attr_flags=NOSUPERUSER
|
||||||
|
|
||||||
- name: ensure selinux lets httpd talk to postgres
|
- name: ensure selinux lets httpd talk to postgres
|
||||||
seboolean: name=httpd_can_network_connect_db persistent=yes state=yes
|
seboolean: name=httpd_can_network_connect_db persistent=yes state=yes
|
||||||
|
|
|
@ -1,12 +1,12 @@
|
||||||
- name: ensure packages required for fakefedorainfra are installed
|
- name: ensure packages required for fakefedorainfra are installed
|
||||||
action: yum name={{ item }} state=latest
|
yum: name={{ item }} state=latest
|
||||||
when: deployment_type == 'prod' or deployment_type == 'local'
|
when: deployment_type == 'prod' or deployment_type == 'local'
|
||||||
with_items:
|
with_items:
|
||||||
- mod_wsgi
|
- mod_wsgi
|
||||||
- fake_fedorainfra
|
- fake_fedorainfra
|
||||||
|
|
||||||
- name: ensure packages required for fakefedorainfra are installed (infra-testing)
|
- name: ensure packages required for fakefedorainfra are installed (infra-testing)
|
||||||
action: yum name={{ item }} state=latest enablerepo=infrastructure-testing
|
yum: name={{ item }} state=latest enablerepo=infrastructure-testing
|
||||||
when: deployment_type == 'dev' or deployment_type == 'stg'
|
when: deployment_type == 'dev' or deployment_type == 'stg'
|
||||||
with_items:
|
with_items:
|
||||||
- mod_wsgi
|
- mod_wsgi
|
||||||
|
@ -16,28 +16,28 @@
|
||||||
delegate_to: "{{ buildmaster_db_host }}"
|
delegate_to: "{{ buildmaster_db_host }}"
|
||||||
sudo: true
|
sudo: true
|
||||||
sudo_user: postgres
|
sudo_user: postgres
|
||||||
action: postgresql_db db={{ fakefedorainfra_db_name }}
|
postgresql_db: db={{ fakefedorainfra_db_name }}
|
||||||
|
|
||||||
- name: ensure stg fakefedorainfra user has access to stg database
|
- name: ensure stg fakefedorainfra user has access to stg database
|
||||||
when: deployment_type == 'stg'
|
when: deployment_type == 'stg'
|
||||||
delegate_to: "{{ buildmaster_db_host }}"
|
delegate_to: "{{ buildmaster_db_host }}"
|
||||||
sudo: true
|
sudo: true
|
||||||
sudo_user: postgres
|
sudo_user: postgres
|
||||||
action: postgresql_user db={{ fakefedorainfra_db_name }} user={{ stg_fakefedorainfra_db_user }} password={{ stg_fakefedorainfra_db_password }} role_attr_flags=NOSUPERUSER
|
postgresql_user: db={{ fakefedorainfra_db_name }} user={{ stg_fakefedorainfra_db_user }} password={{ stg_fakefedorainfra_db_password }} role_attr_flags=NOSUPERUSER
|
||||||
|
|
||||||
- name: ensure dev fakefedorainfra user has access to dev database
|
- name: ensure dev fakefedorainfra user has access to dev database
|
||||||
when: deployment_type == 'dev'
|
when: deployment_type == 'dev'
|
||||||
delegate_to: "{{ buildmaster_db_host }}"
|
delegate_to: "{{ buildmaster_db_host }}"
|
||||||
sudo: true
|
sudo: true
|
||||||
sudo_user: postgres
|
sudo_user: postgres
|
||||||
action: postgresql_user db={{ fakefedorainfra_db_name }} user={{ dev_fakefedorainfra_db_user }} password={{ dev_fakefedorainfra_db_password }} role_attr_flags=NOSUPERUSER
|
postgresql_user: db={{ fakefedorainfra_db_name }} user={{ dev_fakefedorainfra_db_user }} password={{ dev_fakefedorainfra_db_password }} role_attr_flags=NOSUPERUSER
|
||||||
|
|
||||||
- name: ensure local fakefedorainfra user has access to local database
|
- name: ensure local fakefedorainfra user has access to local database
|
||||||
when: deployment_type == 'local'
|
when: deployment_type == 'local'
|
||||||
delegate_to: "{{ buildmaster_db_host }}"
|
delegate_to: "{{ buildmaster_db_host }}"
|
||||||
sudo: true
|
sudo: true
|
||||||
sudo_user: postgres
|
sudo_user: postgres
|
||||||
action: postgresql_user db={{ fakefedorainfra_db_name }} user={{ local_fakefedorainfra_db_user }} password={{ local_fakefedorainfra_db_password }} role_attr_flags=NOSUPERUSER
|
postgresql_user: db={{ fakefedorainfra_db_name }} user={{ local_fakefedorainfra_db_user }} password={{ local_fakefedorainfra_db_password }} role_attr_flags=NOSUPERUSER
|
||||||
|
|
||||||
- name: generate fakefedorainfra config
|
- name: generate fakefedorainfra config
|
||||||
template: src=settings.py.j2 dest=/etc/fake_fedorainfra/settings.py owner=root group=root mode=0644
|
template: src=settings.py.j2 dest=/etc/fake_fedorainfra/settings.py owner=root group=root mode=0644
|
||||||
|
|
|
@ -21,28 +21,28 @@
|
||||||
delegate_to: "{{ resultsdb_db_host_machine }}"
|
delegate_to: "{{ resultsdb_db_host_machine }}"
|
||||||
sudo_user: postgres
|
sudo_user: postgres
|
||||||
sudo: true
|
sudo: true
|
||||||
action: postgresql_db db={{ resultsdb_db_name }}
|
postgresql_db: db={{ resultsdb_db_name }}
|
||||||
|
|
||||||
- name: ensure resultsdb db user has access to database
|
- name: ensure resultsdb db user has access to database
|
||||||
when: deployment_type == 'dev' or deployment_type == 'local'
|
when: deployment_type == 'dev' or deployment_type == 'local'
|
||||||
delegate_to: "{{ resultsdb_db_host_machine }}"
|
delegate_to: "{{ resultsdb_db_host_machine }}"
|
||||||
sudo_user: postgres
|
sudo_user: postgres
|
||||||
sudo: true
|
sudo: true
|
||||||
action: postgresql_user db={{ resultsdb_db_name }} user={{ resultsdb_db_user }} password={{ resultsdb_db_password }} role_attr_flags=NOSUPERUSER
|
postgresql_user: db={{ resultsdb_db_name }} user={{ resultsdb_db_user }} password={{ resultsdb_db_password }} role_attr_flags=NOSUPERUSER
|
||||||
|
|
||||||
- name: ensure stg resultsdb db user has access to stg database
|
- name: ensure stg resultsdb db user has access to stg database
|
||||||
when: deployment_type == 'stg'
|
when: deployment_type == 'stg'
|
||||||
delegate_to: "{{ resultsdb_db_host }}"
|
delegate_to: "{{ resultsdb_db_host }}"
|
||||||
sudo_user: postgres
|
sudo_user: postgres
|
||||||
sudo: true
|
sudo: true
|
||||||
action: postgresql_user db={{ resultsdb_db_name }} user={{ stg_resultsdb_db_user }} password={{ stg_resultsdb_db_password }} role_attr_flags=NOSUPERUSER
|
postgresql_user: db={{ resultsdb_db_name }} user={{ stg_resultsdb_db_user }} password={{ stg_resultsdb_db_password }} role_attr_flags=NOSUPERUSER
|
||||||
|
|
||||||
- name: ensure prod resultsdb db user has access to prod database
|
- name: ensure prod resultsdb db user has access to prod database
|
||||||
when: deployment_type == 'prod'
|
when: deployment_type == 'prod'
|
||||||
delegate_to: "{{ resultsdb_db_host }}"
|
delegate_to: "{{ resultsdb_db_host }}"
|
||||||
sudo_user: postgres
|
sudo_user: postgres
|
||||||
sudo: true
|
sudo: true
|
||||||
action: postgresql_user db={{ resultsdb_db_name }} user={{ prod_resultsdb_db_user }} password={{ prod_resultsdb_db_password }} role_attr_flags=NOSUPERUSER
|
postgresql_user: db={{ resultsdb_db_name }} user={{ prod_resultsdb_db_user }} password={{ prod_resultsdb_db_password }} role_attr_flags=NOSUPERUSER
|
||||||
|
|
||||||
- name: ensure selinux lets httpd talk to postgres
|
- name: ensure selinux lets httpd talk to postgres
|
||||||
seboolean: name=httpd_can_network_connect_db persistent=yes state=yes
|
seboolean: name=httpd_can_network_connect_db persistent=yes state=yes
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
---
|
---
|
||||||
- name: ensure packages required for testdays are installed
|
- name: ensure packages required for testdays are installed
|
||||||
action: yum name={{ item }} state=present
|
yum: name={{ item }} state=present
|
||||||
with_items:
|
with_items:
|
||||||
- testdays
|
- testdays
|
||||||
- mod_wsgi
|
- mod_wsgi
|
||||||
|
@ -11,13 +11,13 @@
|
||||||
delegate_to: "{{ testdays_db_host }}"
|
delegate_to: "{{ testdays_db_host }}"
|
||||||
sudo_user: postgres
|
sudo_user: postgres
|
||||||
sudo: true
|
sudo: true
|
||||||
action: postgresql_db db={{ testdays_db_name }}
|
postgresql_db: db={{ testdays_db_name }}
|
||||||
|
|
||||||
- name: ensure testdays db user has access to database
|
- name: ensure testdays db user has access to database
|
||||||
delegate_to: "{{ testdays_db_host }}"
|
delegate_to: "{{ testdays_db_host }}"
|
||||||
sudo_user: postgres
|
sudo_user: postgres
|
||||||
sudo: true
|
sudo: true
|
||||||
action: postgresql_user db={{ testdays_db_name }} user={{ testdays_db_user }} password={{ testdays_db_password }} role_attr_flags=NOSUPERUSER
|
postgresql_user: db={{ testdays_db_name }} user={{ testdays_db_user }} password={{ testdays_db_password }} role_attr_flags=NOSUPERUSER
|
||||||
|
|
||||||
- name: ensure selinux lets httpd talk to postgres
|
- name: ensure selinux lets httpd talk to postgres
|
||||||
seboolean: name=httpd_can_network_connect_db persistent=yes state=yes
|
seboolean: name=httpd_can_network_connect_db persistent=yes state=yes
|
||||||
|
|
|
@ -19,7 +19,7 @@
|
||||||
- { file: ykval-config.php, dest: /etc/ykval/ykval-config.php }
|
- { file: ykval-config.php, dest: /etc/ykval/ykval-config.php }
|
||||||
|
|
||||||
- name: symlink the configuration files to /usr/share/...
|
- name: symlink the configuration files to /usr/share/...
|
||||||
action: file src={{item.file}} dest={{ item.dest }} state=link
|
file: src={{item.file}} dest={{ item.dest }} state=link
|
||||||
with_items:
|
with_items:
|
||||||
- {file: /etc/ykval/ykval-config.php, dest: /usr/share/ykval/ykval-config.php }
|
- {file: /etc/ykval/ykval-config.php, dest: /usr/share/ykval/ykval-config.php }
|
||||||
- {file: /etc/ykksm/ykksm-config.php, dest: /usr/share/ykksm/ykksm-config.php }
|
- {file: /etc/ykksm/ykksm-config.php, dest: /usr/share/ykksm/ykksm-config.php }
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue