Remove action: in all roles.

This commit is contained in:
Kevin Fenzi 2016-01-06 21:58:31 +00:00
parent 5c0cca432b
commit f0c80375b5
50 changed files with 139 additions and 139 deletions

View file

@ -35,7 +35,7 @@
- restart apache - restart apache
- name: create the folder where we store the ssl cert if not already there - name: create the folder where we store the ssl cert if not already there
action: file state=directory file: state=directory
path=/etc/pki/tls/certs/ path=/etc/pki/tls/certs/
owner=root group=root mode=0755 owner=root group=root mode=0755
@ -65,7 +65,7 @@
- restart apache - restart apache
- name: set sebooleans so anitya can talk to the db - name: set sebooleans so anitya can talk to the db
action: seboolean name={{ item }} seboolean: name={{ item }}
state=true state=true
persistent=true persistent=true
with_items: with_items:

View file

@ -30,7 +30,7 @@
- python-openid - python-openid
- name: set sebooleans so ask can talk to the db - name: set sebooleans so ask can talk to the db
action: seboolean name=httpd_can_network_connect_db seboolean: name=httpd_can_network_connect_db
state=true state=true
persistent=true persistent=true
tags: tags:
@ -38,7 +38,7 @@
- selinux - selinux
- name: set sebooleans so ask can use the gluster mount - name: set sebooleans so ask can use the gluster mount
action: seboolean name=httpd_use_fusefs seboolean: name=httpd_use_fusefs
state=true state=true
persistent=true persistent=true
tags: tags:
@ -46,7 +46,7 @@
- selinux - selinux
- name: set sebooleans so ask can talk to the memcache - name: set sebooleans so ask can talk to the memcache
action: seboolean name=httpd_can_network_memcache seboolean: name=httpd_can_network_memcache
state=true state=true
persistent=true persistent=true
tags: tags:
@ -54,7 +54,7 @@
- selinux - selinux
- name: set sebooleans so ask can talk to fedmsg - name: set sebooleans so ask can talk to fedmsg
action: seboolean name=allow_httpd_sys_script_anon_write seboolean: name=allow_httpd_sys_script_anon_write
state=true state=true
persistent=true persistent=true
tags: tags:
@ -62,7 +62,7 @@
- selinux - selinux
- name: set sebooleans so ask can talk to fedmsg - name: set sebooleans so ask can talk to fedmsg
action: seboolean name=allow_ypbind seboolean: name=allow_ypbind
state=true state=true
persistent=true persistent=true
tags: tags:

View file

@ -52,7 +52,7 @@
# http://docs.openstack.org/icehouse/install-guide/install/yum/content/nova-compute.html # http://docs.openstack.org/icehouse/install-guide/install/yum/content/nova-compute.html
- name: install the Compute packages necessary for the controller node. - name: install the Compute packages necessary for the controller node.
action: yum state=present pkg={{ item }} yum: state=present pkg={{ item }}
with_items: with_items:
- openstack-nova-compute - openstack-nova-compute
- python-novaclient - python-novaclient
@ -157,7 +157,7 @@
- sysctl: name=net.ipv4.conf.default.rp_filter value=0 state=present sysctl_set=yes reload=yes - sysctl: name=net.ipv4.conf.default.rp_filter value=0 state=present sysctl_set=yes reload=yes
- name: install the Networking components - name: install the Networking components
action: yum state=present pkg={{ item }} yum: state=present pkg={{ item }}
with_items: with_items:
- openstack-neutron-ml2 - openstack-neutron-ml2
- openstack-neutron-openvswitch - openstack-neutron-openvswitch

View file

@ -42,10 +42,10 @@
tasks: tasks:
- name: edit hostname to be instance name - name: edit hostname to be instance name
action: shell hostname `curl -s http://169.254.169.254/2009-04-04/meta-data/instance-id` shell: hostname `curl -s http://169.254.169.254/2009-04-04/meta-data/instance-id`
- name: install pkgs - name: install pkgs
action: yum state=present pkg={{ item }} yum: state=present pkg={{ item }}
with_items: with_items:
- rsync - rsync
- openssh-clients - openssh-clients
@ -53,12 +53,12 @@
- libsemanage-python - libsemanage-python
- name: add repos - name: add repos
action: copy src={{ files }}/{{ item }} dest=/etc/yum.repos.d/{{ item }} copy: src={{ files }}/{{ item }} dest=/etc/yum.repos.d/{{ item }}
with_items: with_items:
- epel6.repo - epel6.repo
- name: install additional pkgs - name: install additional pkgs
action: yum state=present pkg={{ item }} yum: state=present pkg={{ item }}
with_items: with_items:
- mock - mock
- createrepo - createrepo
@ -66,7 +66,7 @@
- pyliblzma - pyliblzma
- name: make sure newest rpm - name: make sure newest rpm
action: yum name={{ item }} state=latest yum: name={{ item }} state=latest
with_items: with_items:
- rpm - rpm
- glib2 - glib2
@ -75,16 +75,16 @@
#- yum: name=mock enablerepo=epel-testing state=latest #- yum: name=mock enablerepo=epel-testing state=latest
- name: mockbuilder user - name: mockbuilder user
action: user name=mockbuilder groups=mock user: name=mockbuilder groups=mock
- name: mockbuilder .ssh - name: mockbuilder .ssh
action: file state=directory path=/home/mockbuilder/.ssh mode=0700 owner=mockbuilder group=mockbuilder file: state=directory path=/home/mockbuilder/.ssh mode=0700 owner=mockbuilder group=mockbuilder
- name: mockbuilder authorized_keys - name: mockbuilder authorized_keys
action: authorized_key user=mockbuilder key='{{ lookup('file', '/home/copr/provision/files/buildsys.pub') }}' authorized_key: user=mockbuilder key='{{ lookup('file', '/home/copr/provision/files/buildsys.pub') }}'
- name: put updated mock configs into /etc/mock - name: put updated mock configs into /etc/mock
action: template src={{ files }}/mock/{{ item }} dest=/etc/mock template: src={{ files }}/mock/{{ item }} dest=/etc/mock
with_items: with_items:
- site-defaults.cfg - site-defaults.cfg

View file

@ -1,5 +1,5 @@
- name: chmod_key - name: chmod_key
action: file path=/etc/lighttpd/copr-be.fedoraproject.org.pem owner=root group=root mode=0600 file: path=/etc/lighttpd/copr-be.fedoraproject.org.pem owner=root group=root mode=0600
- name: restart copr-backend - name: restart copr-backend
service: name=copr-backend state=restarted service: name=copr-backend state=restarted

View file

@ -1,5 +1,5 @@
- name: install postresql - name: install postresql
action: yum state=present pkg={{ item }} yum: state=present pkg={{ item }}
with_items: with_items:
- "postgresql-server" - "postgresql-server"
- "postgresql-contrib" - "postgresql-contrib"

View file

@ -1,6 +1,6 @@
--- ---
- name: restart haveged - name: restart haveged
action: service name=haveged state=restarted service: name=haveged state=restarted
- name: restart obs-signd - name: restart obs-signd
action: service name=signd state=restarted service: name=signd state=restarted

View file

@ -1,5 +1,5 @@
- name: install postresql - name: install postresql
action: yum state=present pkg={{ item }} yum: state=present pkg={{ item }}
with_items: with_items:
- "postgresql-server" - "postgresql-server"
- "postgresql-contrib" - "postgresql-contrib"

View file

@ -18,7 +18,7 @@
yum: pkg=mod_ssl state=present yum: pkg=mod_ssl state=present
- name: Set httpd_use_nfs seboolean - name: Set httpd_use_nfs seboolean
action: seboolean name=httpd_use_nfs state=yes persistent=yes seboolean: name=httpd_use_nfs state=yes persistent=yes
- name: check the selinux context rsyncd log - name: check the selinux context rsyncd log
command: matchpathcon /var/log/rsyncd-fedora.log command: matchpathcon /var/log/rsyncd-fedora.log

View file

@ -3,14 +3,14 @@
## Create all the folder used/needed ## Create all the folder used/needed
- name: Create the easyfix folder - name: Create the easyfix folder
action: file state=directory file: state=directory
path=/srv/web/easyfix path=/srv/web/easyfix
owner=apache group=apache mode=0755 owner=apache group=apache mode=0755
tags: tags:
- easyfix - easyfix
- name: Create the easyfix configuration folder - name: Create the easyfix configuration folder
action: file state=directory file: state=directory
path=/etc/fedora-gather-easyfix/ path=/etc/fedora-gather-easyfix/
owner=root group=root mode=0755 owner=root group=root mode=0755
tags: tags:

View file

@ -42,7 +42,7 @@
- restart apache - restart apache
- name: set sebooleans so fedora-elections can talk to the db - name: set sebooleans so fedora-elections can talk to the db
action: seboolean name=httpd_can_network_connect_db seboolean: name=httpd_can_network_connect_db
state=true state=true
persistent=true persistent=true
tags: tags:
@ -68,7 +68,7 @@
- elections - elections
- name: set sebooleans so apache can talk to memcached0* - name: set sebooleans so apache can talk to memcached0*
action: seboolean name=httpd_can_network_memcache seboolean: name=httpd_can_network_memcache
state=true state=true
persistent=true persistent=true
tags: tags:

View file

@ -1,3 +1,3 @@
--- ---
- name: run fasclient - name: run fasclient
action: command /usr/bin/fasClient -i command: /usr/bin/fasClient -i

View file

@ -55,7 +55,7 @@
- config - config
- name: set sebooleans so fedocal can talk to the db - name: set sebooleans so fedocal can talk to the db
action: seboolean name=httpd_can_network_connect_db seboolean: name=httpd_can_network_connect_db
state=true state=true
persistent=true persistent=true

View file

@ -1,6 +1,6 @@
--- ---
- name: add repo - name: add repo
action: copy src=cabal-install.repo dest=/etc/yum.repos.d/cabal-install.repo copy: src=cabal-install.repo dest=/etc/yum.repos.d/cabal-install.repo
tags: tags:
- cabal-install - cabal-install
- packages - packages

View file

@ -12,7 +12,7 @@
rpm_key: state=present key=https://grafanarel.s3.amazonaws.com/RPM-GPG-KEY-grafana rpm_key: state=present key=https://grafanarel.s3.amazonaws.com/RPM-GPG-KEY-grafana
- name: add repo - name: add repo
action: copy src=grafana.repo dest=/etc/yum.repos.d/grafana.repo copy: src=grafana.repo dest=/etc/yum.repos.d/grafana.repo
tags: tags:
- grafana - grafana
- packages - packages
@ -25,7 +25,7 @@
- packages - packages
- name: set sebool so apache can talk to grafana-server - name: set sebool so apache can talk to grafana-server
action: seboolean name=httpd_can_network_connect seboolean: name=httpd_can_network_connect
state=true state=true
persistent=true persistent=true

View file

@ -10,7 +10,7 @@
# Note that if it's not set it will just skip this play and do nothing. # Note that if it's not set it will just skip this play and do nothing.
# #
- name: setup /etc/hosts for some clients - name: setup /etc/hosts for some clients
action: copy src={{ item }} dest=/etc/hosts copy: src={{ item }} dest=/etc/hosts
with_first_found: with_first_found:
- files: - files:
- "{{ inventory_hostname }}-hosts" - "{{ inventory_hostname }}-hosts"

View file

@ -82,7 +82,7 @@
- config - config
- name: enable infinoted - name: enable infinoted
action: service name=infinoted state=running enabled=true service: name=infinoted state=running enabled=true
tags: tags:
- infinote - infinote
- config - config

View file

@ -119,7 +119,7 @@
when: env == "staging" when: env == "staging"
- name: set sebooleans so ipsilon can talk to the db - name: set sebooleans so ipsilon can talk to the db
action: seboolean name=httpd_can_network_connect_db seboolean: name=httpd_can_network_connect_db
state=true state=true
persistent=true persistent=true

View file

@ -39,13 +39,13 @@
- packages - packages
- name: mount jenkins persistent storage - name: mount jenkins persistent storage
action: mount name=/var/lib/jenkins src='LABEL=jenkins' fstype=ext4 state=mounted mount: name=/var/lib/jenkins src='LABEL=jenkins' fstype=ext4 state=mounted
tags: tags:
- jenkins - jenkins
- jenkins/master - jenkins/master
- name: Install custom jenkins plugins (from ansible bigfiles) - name: Install custom jenkins plugins (from ansible bigfiles)
action: copy src="{{ bigfiles }}/jenkins/{{ item }}.hpi" dest=/var/lib/jenkins/plugins/{{ item }}.hpi copy: src="{{ bigfiles }}/jenkins/{{ item }}.hpi" dest=/var/lib/jenkins/plugins/{{ item }}.hpi
with_items: with_items:
- fedmsg - fedmsg
notify: notify:
@ -104,14 +104,14 @@
- config - config
- name: install private ssh key - name: install private ssh key
action: copy src="{{ private }}/files/jenkins/ssh/jenkins_master" dest=/etc/jenkins/id_rsa mode=400 owner=jenkins group=jenkins copy: src="{{ private }}/files/jenkins/ssh/jenkins_master" dest=/etc/jenkins/id_rsa mode=400 owner=jenkins group=jenkins
tags: tags:
- jenkins - jenkins
- jenkins/master - jenkins/master
- config - config
- name: enable jenkins service to start on boot - name: enable jenkins service to start on boot
action: service name=jenkins state=running enabled=true service: name=jenkins state=running enabled=true
tags: tags:
- jenkins - jenkins
- jenkins/master - jenkins/master

View file

@ -53,14 +53,14 @@
- packages - packages
- name: create jenkins user - name: create jenkins user
action: user name=jenkins state=present createhome=yes system=no groups=mock user: name=jenkins state=present createhome=yes system=no groups=mock
tags: tags:
- jenkins - jenkins
- jenkins/slave - jenkins/slave
- config - config
- name: add jenkins ssh public key to authorized keys - name: add jenkins ssh public key to authorized keys
action: authorized_key user=jenkins key="{{ item }}" authorized_key: user=jenkins key="{{ item }}"
with_file: with_file:
- "{{ private }}/files/jenkins/ssh/jenkins_master.pub" - "{{ private }}/files/jenkins/ssh/jenkins_master.pub"
tags: tags:
@ -69,7 +69,7 @@
- config - config
- name: create workspace directory - name: create workspace directory
action: file state=directory path=/srv/jenkins owner=jenkins group=jenkins file: state=directory path=/srv/jenkins owner=jenkins group=jenkins
tags: tags:
- jenkins - jenkins
- jenkins/slave - jenkins/slave

View file

@ -21,7 +21,7 @@
- kerneltest - kerneltest
- name: Create the folder to store the logs - name: Create the folder to store the logs
action: file state=directory file: state=directory
path=/var/www/logs path=/var/www/logs
owner=apache group=apache mode=0755 owner=apache group=apache mode=0755
tags: tags:

View file

@ -1,6 +1,6 @@
- name: restart sks-db - name: restart sks-db
action: service name=sks-db state=restarted service: name=sks-db state=restarted
- name: restart sks-recon - name: restart sks-recon
action: service name=sks-recon state=restarted service: name=sks-recon state=restarted

View file

@ -277,7 +277,7 @@
- koji_builder - koji_builder
- name: set kernel params for more loops - name: set kernel params for more loops
action: command /sbin/grubby --update-kernel=ALL --args=max_loop=64 command: /sbin/grubby --update-kernel=ALL --args=max_loop=64
when: max_loop is defined and max_loop.stdout.find("max_loop=64") == -1 when: max_loop is defined and max_loop.stdout.find("max_loop=64") == -1
tags: tags:
- koji_builder - koji_builder

View file

@ -90,7 +90,7 @@
- config - config
- name: enable services to start on boot - name: enable services to start on boot
action: service name={{ item }} state=running enabled=true service: name={{ item }} state=running enabled=true
with_items: with_items:
- koschei-polling - koschei-polling
- koschei-resolver - koschei-resolver

View file

@ -1,9 +1,9 @@
--- ---
- name: restart mailman3 - name: restart mailman3
action: service name=mailman3 state=restarted service: name=mailman3 state=restarted
- name: reload apache - name: reload apache
action: service name=httpd state=reloaded service: name=httpd state=reloaded
- name: restart memcached - name: restart memcached
action: service name=memcached state=restarted service: name=memcached state=restarted

View file

@ -12,7 +12,7 @@
- packages - packages
- name: create all the directory for the configuration file - name: create all the directory for the configuration file
action: file state=directory path=/etc/mdapi file: state=directory path=/etc/mdapi
tags: tags:
- mdapi - mdapi
- config - config

View file

@ -20,7 +20,7 @@
- mediawiki - mediawiki
- name: set sebooleans so apache can send emails - name: set sebooleans so apache can send emails
action: seboolean name=httpd_can_sendmail state=yes persistent=yes seboolean: name=httpd_can_sendmail state=yes persistent=yes
tags: tags:
- mediawiki - mediawiki

View file

@ -20,7 +20,7 @@
- mediawiki - mediawiki
- name: set sebooleans so apache can send emails - name: set sebooleans so apache can send emails
action: seboolean name=httpd_can_sendmail state=yes persistent=yes seboolean: name=httpd_can_sendmail state=yes persistent=yes
tags: tags:
- mediawiki - mediawiki

View file

@ -43,7 +43,7 @@
- config - config
- name: set sebooleans so mirrormanager can connect to its db - name: set sebooleans so mirrormanager can connect to its db
action: seboolean name=httpd_can_network_connect_db seboolean: name=httpd_can_network_connect_db
state=true state=true
persistent=true persistent=true
tags: tags:
@ -51,7 +51,7 @@
- config - config
- name: set sebooleans so mirrormanager can send exception mails - name: set sebooleans so mirrormanager can send exception mails
action: seboolean name=httpd_can_sendmail seboolean: name=httpd_can_sendmail
state=true state=true
persistent=true persistent=true
tags: tags:

View file

@ -58,7 +58,7 @@
- selinux - selinux
- name: set sebooleans so apache can use memcached - name: set sebooleans so apache can use memcached
action: seboolean name=httpd_can_network_memcache seboolean: name=httpd_can_network_memcache
state=true state=true
persistent=true persistent=true
tags: tags:

View file

@ -1,3 +1,3 @@
--- ---
- name: restart nrpe - name: restart nrpe
action: service name=nrpe state=restarted service: name=nrpe state=restarted

View file

@ -1,3 +1,3 @@
--- ---
- name: restart nrpe - name: restart nrpe
action: service name=nrpe state=restarted service: name=nrpe state=restarted

View file

@ -64,7 +64,7 @@
- nfs/client - nfs/client
- name: enable nfs-related services and run them (rhel6) - name: enable nfs-related services and run them (rhel6)
action: service name={{ item }} enabled=true state=started service: name={{ item }} enabled=true state=started
with_items: with_items:
- rpcidmapd - rpcidmapd
- rpcbind - rpcbind

View file

@ -16,7 +16,7 @@
- nfs/server - nfs/server
- name: enable nfs-related services and run them (fedora) - name: enable nfs-related services and run them (fedora)
action: service name={{ item }} enabled=true state=started service: name={{ item }} enabled=true state=started
with_items: with_items:
- nfs-idmap - nfs-idmap
- rpc-statd - rpc-statd
@ -25,7 +25,7 @@
- nfs/server - nfs/server
- name: enable nfs-related services and run them (rhel) - name: enable nfs-related services and run them (rhel)
action: service name={{ item }} enabled=true state=started service: name={{ item }} enabled=true state=started
with_items: with_items:
- rpcbind - rpcbind
- nfs-server - nfs-server

View file

@ -30,7 +30,7 @@
- restart apache - restart apache
- name: create pictures folder where we upload the pictures - name: create pictures folder where we upload the pictures
action: file state=directory file: state=directory
path=/var/cache/nuancier/pictures path=/var/cache/nuancier/pictures
owner=apache group=apache mode=0700 owner=apache group=apache mode=0700
tags: tags:
@ -38,7 +38,7 @@
- nuancier - nuancier
- name: create the cache folder where nuancier creates the thumbnails - name: create the cache folder where nuancier creates the thumbnails
action: file state=directory file: state=directory
path=/var/cache/nuancier/cache path=/var/cache/nuancier/cache
owner=apache group=apache mode=0700 owner=apache group=apache mode=0700
tags: tags:
@ -69,7 +69,7 @@
- restart apache - restart apache
- name: set sebooleans so nuancier can talk to the db - name: set sebooleans so nuancier can talk to the db
action: seboolean name=httpd_can_network_connect_db seboolean: name=httpd_can_network_connect_db
state=true state=true
persistent=true persistent=true
tags: tags:
@ -87,7 +87,7 @@
- selinux - selinux
- name: set sebooleans so apache can use glusterfs - name: set sebooleans so apache can use glusterfs
action: seboolean name=httpd_use_fusefs seboolean: name=httpd_use_fusefs
state=true state=true
persistent=true persistent=true
tags: tags:
@ -95,7 +95,7 @@
- selinux - selinux
- name: set sebooleans so apache can send emails - name: set sebooleans so apache can send emails
action: seboolean name=httpd_can_sendmail seboolean: name=httpd_can_sendmail
state=true state=true
persistent=true persistent=true
tags: tags:

View file

@ -124,14 +124,14 @@
delegate_to: "{{ openqa_dbhost }}" delegate_to: "{{ openqa_dbhost }}"
sudo_user: postgres sudo_user: postgres
sudo: true sudo: true
action: postgresql_db db={{ openqa_dbname }} postgresql_db: db={{ openqa_dbname }}
when: "openqa_dbhost is defined" when: "openqa_dbhost is defined"
- name: Ensure db user has access to database - name: Ensure db user has access to database
delegate_to: "{{ openqa_dbhost }}" delegate_to: "{{ openqa_dbhost }}"
sudo_user: postgres sudo_user: postgres
sudo: true sudo: true
action: postgresql_user db={{ openqa_dbname }} user={{ openqa_dbuser }} password={{ openqa_dbpassword }} role_attr_flags=NOSUPERUSER postgresql_user: db={{ openqa_dbname }} user={{ openqa_dbuser }} password={{ openqa_dbpassword }} role_attr_flags=NOSUPERUSER
when: "openqa_dbhost is defined" when: "openqa_dbhost is defined"
- name: Database config - name: Database config

View file

@ -50,7 +50,7 @@
- pagure - pagure
- name: create the /srv/git/.gitolite/conf folder - name: create the /srv/git/.gitolite/conf folder
action: file state=directory file: state=directory
path=/srv/git/.gitolite/conf path=/srv/git/.gitolite/conf
owner=git group=git mode=0775 owner=git group=git mode=0775
tags: tags:
@ -58,7 +58,7 @@
- pagure - pagure
- name: create the /srv/git/.gitolite/keydir folder - name: create the /srv/git/.gitolite/keydir folder
action: file state=directory file: state=directory
path=/srv/git/.gitolite/keydir path=/srv/git/.gitolite/keydir
owner=git group=git mode=0775 owner=git group=git mode=0775
tags: tags:
@ -66,7 +66,7 @@
- pagure - pagure
- name: create the /srv/git/.gitolite/logs folder - name: create the /srv/git/.gitolite/logs folder
action: file state=directory file: state=directory
path=/srv/git/.gitolite/logs path=/srv/git/.gitolite/logs
owner=git group=git mode=0775 owner=git group=git mode=0775
tags: tags:
@ -94,7 +94,7 @@
- pagure - pagure
- name: create all the directories where we store the git repos - name: create all the directories where we store the git repos
action: file state=directory file: state=directory
path={{ item }} path={{ item }}
owner=git group=git mode=0775 owner=git group=git mode=0775
with_items: with_items:
@ -109,7 +109,7 @@
- pagure - pagure
- name: create the /srv/tmp folder where to clone repos - name: create the /srv/tmp folder where to clone repos
action: file state=directory file: state=directory
path=/srv/tmp path=/srv/tmp
owner=git group=git mode=0775 owner=git group=git mode=0775
tags: tags:
@ -166,7 +166,7 @@
# Set-up Pagure # Set-up Pagure
- name: create the /var/www/releases folder - name: create the /var/www/releases folder
action: file state=directory file: state=directory
path=/var/www/releases path=/var/www/releases
owner=git group=git mode=0775 owner=git group=git mode=0775
tags: tags:
@ -258,7 +258,7 @@
- pagure - pagure
- name: set sebooleans so pagure can talk to the db - name: set sebooleans so pagure can talk to the db
action: seboolean name=httpd_can_network_connect_db seboolean: name=httpd_can_network_connect_db
state=true state=true
persistent=true persistent=true
tags: tags:
@ -267,7 +267,7 @@
- pagure - pagure
- name: set sebooleans so apache can send emails - name: set sebooleans so apache can send emails
action: seboolean name=httpd_can_sendmail seboolean: name=httpd_can_sendmail
state=true state=true
persistent=true persistent=true
tags: tags:

View file

@ -41,7 +41,7 @@
- pdc - pdc
- name: create /etc/httpd/saml2 - name: create /etc/httpd/saml2
action: file state=directory file: state=directory
path=/etc/httpd/saml2 path=/etc/httpd/saml2
owner=apache group=apache mode=0775 owner=apache group=apache mode=0775
tags: tags:

View file

@ -3,5 +3,5 @@
# #
- name: restart phd - name: restart phd
action: service name=phd state=restarted service: name=phd state=restarted

View file

@ -79,7 +79,7 @@
- pkgdb - pkgdb
- name: set sebooleans so pkgdb2 can talk to the db - name: set sebooleans so pkgdb2 can talk to the db
action: seboolean name=httpd_can_network_connect_db seboolean: name=httpd_can_network_connect_db
state=true state=true
persistent=true persistent=true
tags: tags:
@ -87,7 +87,7 @@
- pkgdb - pkgdb
- name: set sebooleans so apache can send emails - name: set sebooleans so apache can send emails
action: seboolean name=httpd_can_sendmail seboolean: name=httpd_can_sendmail
state=true state=true
persistent=true persistent=true
tags: tags:
@ -95,7 +95,7 @@
- pkgdb - pkgdb
- name: set sebooleans so apache can talk to memcached0* - name: set sebooleans so apache can talk to memcached0*
action: seboolean name=httpd_can_network_memcache seboolean: name=httpd_can_network_memcache
state=true state=true
persistent=true persistent=true
tags: tags:

View file

@ -1,62 +1,62 @@
- name: set root passwd - name: set root passwd
action: user name=root password={{ builder_rootpw }} state=present user: name=root password={{ builder_rootpw }} state=present
- name: add mock user as 425 - name: add mock user as 425
action: user name=mock uid=425 state=present home=/var/lib/mock createhome=yes system=yes user: name=mock uid=425 state=present home=/var/lib/mock createhome=yes system=yes
- name: make mock homedir 2775 - name: make mock homedir 2775
action: file state=directory path=/var/lib/mock mode=2775 owner=mock group=mock file: state=directory path=/var/lib/mock mode=2775 owner=mock group=mock
- name: add mock ssh dir - name: add mock ssh dir
action: file state=directory path=/var/lib/mock/.ssh mode=700 owner=mock group=mock file: state=directory path=/var/lib/mock/.ssh mode=700 owner=mock group=mock
- name: add mock ssh keys - name: add mock ssh keys
action: copy src="{{ files }}/../roles/koji_builder/files//mock_auth_keys" dest=/var/lib/mock/.ssh/authorized_keys mode=644 owner=mock group=mock copy: src="{{ files }}/../roles/koji_builder/files//mock_auth_keys" dest=/var/lib/mock/.ssh/authorized_keys mode=644 owner=mock group=mock
- name: add ftpsync group - name: add ftpsync group
action: group name=ftpsync gid=263 system=yes state=present group: name=ftpsync gid=263 system=yes state=present
- name: add ftpsync user - name: add ftpsync user
user: name=ftpsync uid=263 group=ftpsync createhome=yes system=yes state=present user: name=ftpsync uid=263 group=ftpsync createhome=yes system=yes state=present
- name: add the ftpsync update-fullfilelist script - name: add the ftpsync update-fullfilelist script
action: copy src=update-fullfilelist dest=/usr/local/bin/update-fullfilelist owner=ftpsync group=ftpsync mode=555 copy: src=update-fullfilelist dest=/usr/local/bin/update-fullfilelist owner=ftpsync group=ftpsync mode=555
- name: add masher group - name: add masher group
action: group name=masher gid=751 system=yes state=present group: name=masher gid=751 system=yes state=present
# masher user 751 # masher user 751
- name: add masher user as 751 - and group - name: add masher user as 751 - and group
action: user name=masher uid=751 group=masher home=/home/masher groups=mock,ftpsync user: name=masher uid=751 group=masher home=/home/masher groups=mock,ftpsync
# masher ssh keys and config # masher ssh keys and config
- name: add masher ssh dir - name: add masher ssh dir
action: file state=directory path=/home/masher/.ssh mode=700 owner=masher group=masher file: state=directory path=/home/masher/.ssh mode=700 owner=masher group=masher
- name: add masher ssh keys - name: add masher ssh keys
action: copy src="mash/masher.{{ item }}" dest="/home/masher/.ssh/{{ item }}" mode=600 owner=masher group=masher copy: src="mash/masher.{{ item }}" dest="/home/masher/.ssh/{{ item }}" mode=600 owner=masher group=masher
with_items: with_items:
- id_rsa.pub - id_rsa.pub
- config - config
- name: add masher ssh priv key - name: add masher ssh priv key
action: copy src="{{ private }}/files/mash/masher.id_rsa" dest=/home/masher/.ssh/id_rsa mode=600 owner=masher group=masher copy: src="{{ private }}/files/mash/masher.id_rsa" dest=/home/masher/.ssh/id_rsa mode=600 owner=masher group=masher
- name: add masher koji cert/key - name: add masher koji cert/key
action: copy src="{{ private }}/files/mash/masher.pem" dest=/home/masher/.fedora.cert mode=600 owner=masher group=masher copy: src="{{ private }}/files/mash/masher.pem" dest=/home/masher/.fedora.cert mode=600 owner=masher group=masher
- name: add masher koji ca cert - name: add masher koji ca cert
action: copy src="{{ private }}/files/koji/buildercerts/fedora-ca.cert" dest=/home/masher/.fedora-server-ca.cert copy: src="{{ private }}/files/koji/buildercerts/fedora-ca.cert" dest=/home/masher/.fedora-server-ca.cert
- name: add masher koji ca upload cert - name: add masher koji ca upload cert
action: copy src="{{ private }}/files/koji/buildercerts/fedora-ca.cert" dest=/home/masher/.fedora-upload-ca.cert copy: src="{{ private }}/files/koji/buildercerts/fedora-ca.cert" dest=/home/masher/.fedora-upload-ca.cert
- name: add koji ca cert to central system ca-trust - name: add koji ca cert to central system ca-trust
action: copy src="{{ private }}/files/koji/buildercerts/fedora-ca.cert" dest=/etc/pki/ca-trust/source/anchors/fedora-server-ca.cert copy: src="{{ private }}/files/koji/buildercerts/fedora-ca.cert" dest=/etc/pki/ca-trust/source/anchors/fedora-server-ca.cert
- name: update ca-trust - name: update ca-trust
command: /usr/bin/update-ca-trust command: /usr/bin/update-ca-trust
# rawhide group # rawhide group
- name: rawhide group - name: rawhide group
action: group name=rawhide gid=265 group: name=rawhide gid=265
# rawhide user 265 # rawhide user 265
- name: add rawhide user - name: add rawhide user
action: user name=rawhide uid=265 group=rawhide home=/tmp comment="rawhide compose account" user: name=rawhide uid=265 group=rawhide home=/tmp comment="rawhide compose account"
- name: make a bunch of dirs - name: make a bunch of dirs
action: file state=directory path={{ item }} file: state=directory path={{ item }}
with_items: with_items:
- /pub - /pub
- /epel - /epel
@ -127,55 +127,55 @@
# idmapd and make sure it's set to run # idmapd and make sure it's set to run
- name: idmapd.conf - name: idmapd.conf
action: copy src="{{ files }}/../roles/koji_builder/files//idmapd.conf" dest=/etc/idmapd.conf copy: src="{{ files }}/../roles/koji_builder/files//idmapd.conf" dest=/etc/idmapd.conf
tags: tags:
- configs - configs
- name: make a mnt/koji link - name: make a mnt/koji link
action: file state=link src=/mnt/fedora_koji/koji dest=/mnt/koji file: state=link src=/mnt/fedora_koji/koji dest=/mnt/koji
when: inventory_hostname.startswith(('compose-x86-01')) when: inventory_hostname.startswith(('compose-x86-01'))
- name: symlink /srv/pungi - name: symlink /srv/pungi
action: file src=/mnt/fedora_koji/compose dest=/srv/pungi state=link file: src=/mnt/fedora_koji/compose dest=/srv/pungi state=link
when: not inventory_hostname.startswith('compose-aarch64-01') when: not inventory_hostname.startswith('compose-aarch64-01')
- name: add pkgs for nightly compose - name: add pkgs for nightly compose
action: yum state=present pkg={{ item }} yum: state=present pkg={{ item }}
with_items: with_items:
- packagedb-cli - packagedb-cli
when: inventory_hostname.startswith('branched-composer') or inventory_hostname.startswith('rawhide-composer') or inventory_hostname.startswith('composer.stg') when: inventory_hostname.startswith('branched-composer') or inventory_hostname.startswith('rawhide-composer') or inventory_hostname.startswith('composer.stg')
# put cron job in for branched compose # put cron job in for branched compose
- name: branched compose cron - name: branched compose cron
action: copy src="branched" dest=/etc/cron.d/branched copy: src="branched" dest=/etc/cron.d/branched
when: inventory_hostname.startswith('branched-composer') when: inventory_hostname.startswith('branched-composer')
# put cron job in for rawhide compose # put cron job in for rawhide compose
- name: rawhide compose cron - name: rawhide compose cron
action: copy src="rawhide" dest=/etc/cron.d/rawhide copy: src="rawhide" dest=/etc/cron.d/rawhide
when: inventory_hostname.startswith('rawhide-composer') when: inventory_hostname.startswith('rawhide-composer')
# put cron job in for aarch64 branched compose # put cron job in for aarch64 branched compose
- name: aarch64 branched compose cron - name: aarch64 branched compose cron
action: copy src="aarch64.branched" dest=/etc/cron.d/branched copy: src="aarch64.branched" dest=/etc/cron.d/branched
when: inventory_hostname.startswith('compose-aarch64-01') when: inventory_hostname.startswith('compose-aarch64-01')
# put cron job in for aarch64 rawhide compose # put cron job in for aarch64 rawhide compose
- name: aarch64 rawhide compose cron - name: aarch64 rawhide compose cron
action: copy src="aarch64.rawhide" dest=/etc/cron.d/rawhide copy: src="aarch64.rawhide" dest=/etc/cron.d/rawhide
when: inventory_hostname.startswith('compose-aarch64-01') when: inventory_hostname.startswith('compose-aarch64-01')
# put cron job in for two-week nightly compose # put cron job in for two-week nightly compose
- name: twoweek compose cron - name: twoweek compose cron
action: copy src="twoweek-updates" dest=/etc/cron.d/twoweek-updates copy: src="twoweek-updates" dest=/etc/cron.d/twoweek-updates
when: inventory_hostname.startswith('compose-x86-01') when: inventory_hostname.startswith('compose-x86-01')
- name: sudoers defaults - name: sudoers defaults
action: copy src="{{ private }}/files/sudo/releng-sudoers" dest=/etc/sudoers mode=0440 copy: src="{{ private }}/files/sudo/releng-sudoers" dest=/etc/sudoers mode=0440
tags: tags:
- configs - configs
- name: sudoers for ftpsync - name: sudoers for ftpsync
action: copy src="{{ private }}/files/sudo/ftpsync-sudo" dest=/etc/sudoers.d/ftpsync mode=0440 copy: src="{{ private }}/files/sudo/ftpsync-sudo" dest=/etc/sudoers.d/ftpsync mode=0440
tags: tags:
- configs - configs

View file

@ -55,7 +55,7 @@
- services - services
- name: set sebooleans so rsync can read dirs - name: set sebooleans so rsync can read dirs
action: seboolean name=rsync_export_all_ro seboolean: name=rsync_export_all_ro
state=true state=true
persistent=true persistent=true

View file

@ -36,7 +36,7 @@
# This will move a /etc/sudoers.d/ file in place # This will move a /etc/sudoers.d/ file in place
# #
- name: setup /etc/sudoers.d/sudoer file for client use - name: setup /etc/sudoers.d/sudoer file for client use
action: copy src={{ item }} dest=/etc/sudoers.d/{{ item | basename | replace('.', '_') }} copy: src={{ item }} dest=/etc/sudoers.d/{{ item | basename | replace('.', '_') }}
owner=root group=root mode=0600 owner=root group=root mode=0600
with_first_found: with_first_found:
- files: - files:

View file

@ -12,4 +12,4 @@
service: name=nginx state=restarted service: name=nginx state=restarted
- name: restart postfix - name: restart postfix
action: service name=postfix state=restarted service: name=postfix state=restarted

View file

@ -63,35 +63,35 @@
delegate_to: "{{ buildmaster_db_host }}" delegate_to: "{{ buildmaster_db_host }}"
sudo: true sudo: true
sudo_user: postgres sudo_user: postgres
action: postgresql_db db={{ buildmaster_db_name }} postgresql_db: db={{ buildmaster_db_name }}
- name: ensure dev db user has access to dev database - name: ensure dev db user has access to dev database
when: deployment_type == 'dev' when: deployment_type == 'dev'
delegate_to: "{{ buildmaster_db_host }}" delegate_to: "{{ buildmaster_db_host }}"
sudo: true sudo: true
sudo_user: postgres sudo_user: postgres
action: postgresql_user db={{ buildmaster_db_name }} user={{ dev_buildmaster_db_user }} password={{ dev_buildmaster_db_password }} role_attr_flags=NOSUPERUSER postgresql_user: db={{ buildmaster_db_name }} user={{ dev_buildmaster_db_user }} password={{ dev_buildmaster_db_password }} role_attr_flags=NOSUPERUSER
- name: ensure stg db user has access to stg database - name: ensure stg db user has access to stg database
when: deployment_type == 'stg' when: deployment_type == 'stg'
delegate_to: "{{ buildmaster_db_host }}" delegate_to: "{{ buildmaster_db_host }}"
sudo: true sudo: true
sudo_user: postgres sudo_user: postgres
action: postgresql_user db={{ buildmaster_db_name }} user={{ stg_buildmaster_db_user }} password={{ stg_buildmaster_db_password }} role_attr_flags=NOSUPERUSER postgresql_user: db={{ buildmaster_db_name }} user={{ stg_buildmaster_db_user }} password={{ stg_buildmaster_db_password }} role_attr_flags=NOSUPERUSER
- name: ensure prod db user has access to prod database - name: ensure prod db user has access to prod database
when: deployment_type == 'prod' when: deployment_type == 'prod'
delegate_to: "{{ buildmaster_db_host }}" delegate_to: "{{ buildmaster_db_host }}"
sudo: true sudo: true
sudo_user: postgres sudo_user: postgres
action: postgresql_user db={{ buildmaster_db_name }} user={{ prod_buildmaster_db_user }} password={{ prod_buildmaster_db_password }} role_attr_flags=NOSUPERUSER postgresql_user: db={{ buildmaster_db_name }} user={{ prod_buildmaster_db_user }} password={{ prod_buildmaster_db_password }} role_attr_flags=NOSUPERUSER
- name: ensure local db user has access to local database - name: ensure local db user has access to local database
when: deployment_type == 'local' when: deployment_type == 'local'
delegate_to: "{{ buildmaster_db_host }}" delegate_to: "{{ buildmaster_db_host }}"
sudo: true sudo: true
sudo_user: postgres sudo_user: postgres
action: postgresql_user db={{ buildmaster_db_name }} user={{ local_buildmaster_db_user }} password={{ local_buildmaster_db_password }} role_attr_flags=NOSUPERUSER postgresql_user: db={{ buildmaster_db_name }} user={{ local_buildmaster_db_user }} password={{ local_buildmaster_db_password }} role_attr_flags=NOSUPERUSER
- name: put robots.txt at web root of external hostname - name: put robots.txt at web root of external hostname
when: robots_path is defined when: robots_path is defined

View file

@ -21,35 +21,35 @@
delegate_to: "{{ execdb_db_host_machine }}" delegate_to: "{{ execdb_db_host_machine }}"
sudo_user: postgres sudo_user: postgres
sudo: true sudo: true
action: postgresql_db db={{ execdb_db_name }} postgresql_db: db={{ execdb_db_name }}
- name: ensure dev execdb db user has access to dev database - name: ensure dev execdb db user has access to dev database
when: deployment_type == 'dev' when: deployment_type == 'dev'
delegate_to: "{{ execdb_db_host_machine }}" delegate_to: "{{ execdb_db_host_machine }}"
sudo_user: postgres sudo_user: postgres
sudo: true sudo: true
action: postgresql_user db={{ execdb_db_name }} user={{ execdb_db_user }} password={{ execdb_db_password }} role_attr_flags=NOSUPERUSER postgresql_user: db={{ execdb_db_name }} user={{ execdb_db_user }} password={{ execdb_db_password }} role_attr_flags=NOSUPERUSER
- name: ensure stg execdb db user has access to stg database - name: ensure stg execdb db user has access to stg database
when: deployment_type == 'stg' when: deployment_type == 'stg'
delegate_to: "{{ execdb_db_host }}" delegate_to: "{{ execdb_db_host }}"
sudo_user: postgres sudo_user: postgres
sudo: true sudo: true
action: postgresql_user db={{ execdb_db_name }} user={{ stg_execdb_db_user }} password={{ stg_execdb_db_password }} role_attr_flags=NOSUPERUSER postgresql_user: db={{ execdb_db_name }} user={{ stg_execdb_db_user }} password={{ stg_execdb_db_password }} role_attr_flags=NOSUPERUSER
- name: ensure prod execdb db user has access to prod database - name: ensure prod execdb db user has access to prod database
when: deployment_type == 'prod' when: deployment_type == 'prod'
delegate_to: "{{ execdb_db_host }}" delegate_to: "{{ execdb_db_host }}"
sudo_user: postgres sudo_user: postgres
sudo: true sudo: true
action: postgresql_user db={{ execdb_db_name }} user={{ prod_execdb_db_user }} password={{ prod_execdb_db_password }} role_attr_flags=NOSUPERUSER postgresql_user: db={{ execdb_db_name }} user={{ prod_execdb_db_user }} password={{ prod_execdb_db_password }} role_attr_flags=NOSUPERUSER
- name: ensure local execdb db user has access to prod database - name: ensure local execdb db user has access to prod database
when: deployment_type == 'local' when: deployment_type == 'local'
delegate_to: "{{ execdb_db_host }}" delegate_to: "{{ execdb_db_host }}"
sudo_user: postgres sudo_user: postgres
sudo: true sudo: true
action: postgresql_user db={{ execdb_db_name }} user={{ local_execdb_db_user }} password={{ local_execdb_db_password }} role_attr_flags=NOSUPERUSER postgresql_user: db={{ execdb_db_name }} user={{ local_execdb_db_user }} password={{ local_execdb_db_password }} role_attr_flags=NOSUPERUSER
- name: ensure selinux lets httpd talk to postgres - name: ensure selinux lets httpd talk to postgres
seboolean: name=httpd_can_network_connect_db persistent=yes state=yes seboolean: name=httpd_can_network_connect_db persistent=yes state=yes

View file

@ -1,12 +1,12 @@
- name: ensure packages required for fakefedorainfra are installed - name: ensure packages required for fakefedorainfra are installed
action: yum name={{ item }} state=latest yum: name={{ item }} state=latest
when: deployment_type == 'prod' or deployment_type == 'local' when: deployment_type == 'prod' or deployment_type == 'local'
with_items: with_items:
- mod_wsgi - mod_wsgi
- fake_fedorainfra - fake_fedorainfra
- name: ensure packages required for fakefedorainfra are installed (infra-testing) - name: ensure packages required for fakefedorainfra are installed (infra-testing)
action: yum name={{ item }} state=latest enablerepo=infrastructure-testing yum: name={{ item }} state=latest enablerepo=infrastructure-testing
when: deployment_type == 'dev' or deployment_type == 'stg' when: deployment_type == 'dev' or deployment_type == 'stg'
with_items: with_items:
- mod_wsgi - mod_wsgi
@ -16,28 +16,28 @@
delegate_to: "{{ buildmaster_db_host }}" delegate_to: "{{ buildmaster_db_host }}"
sudo: true sudo: true
sudo_user: postgres sudo_user: postgres
action: postgresql_db db={{ fakefedorainfra_db_name }} postgresql_db: db={{ fakefedorainfra_db_name }}
- name: ensure stg fakefedorainfra user has access to stg database - name: ensure stg fakefedorainfra user has access to stg database
when: deployment_type == 'stg' when: deployment_type == 'stg'
delegate_to: "{{ buildmaster_db_host }}" delegate_to: "{{ buildmaster_db_host }}"
sudo: true sudo: true
sudo_user: postgres sudo_user: postgres
action: postgresql_user db={{ fakefedorainfra_db_name }} user={{ stg_fakefedorainfra_db_user }} password={{ stg_fakefedorainfra_db_password }} role_attr_flags=NOSUPERUSER postgresql_user: db={{ fakefedorainfra_db_name }} user={{ stg_fakefedorainfra_db_user }} password={{ stg_fakefedorainfra_db_password }} role_attr_flags=NOSUPERUSER
- name: ensure dev fakefedorainfra user has access to dev database - name: ensure dev fakefedorainfra user has access to dev database
when: deployment_type == 'dev' when: deployment_type == 'dev'
delegate_to: "{{ buildmaster_db_host }}" delegate_to: "{{ buildmaster_db_host }}"
sudo: true sudo: true
sudo_user: postgres sudo_user: postgres
action: postgresql_user db={{ fakefedorainfra_db_name }} user={{ dev_fakefedorainfra_db_user }} password={{ dev_fakefedorainfra_db_password }} role_attr_flags=NOSUPERUSER postgresql_user: db={{ fakefedorainfra_db_name }} user={{ dev_fakefedorainfra_db_user }} password={{ dev_fakefedorainfra_db_password }} role_attr_flags=NOSUPERUSER
- name: ensure local fakefedorainfra user has access to local database - name: ensure local fakefedorainfra user has access to local database
when: deployment_type == 'local' when: deployment_type == 'local'
delegate_to: "{{ buildmaster_db_host }}" delegate_to: "{{ buildmaster_db_host }}"
sudo: true sudo: true
sudo_user: postgres sudo_user: postgres
action: postgresql_user db={{ fakefedorainfra_db_name }} user={{ local_fakefedorainfra_db_user }} password={{ local_fakefedorainfra_db_password }} role_attr_flags=NOSUPERUSER postgresql_user: db={{ fakefedorainfra_db_name }} user={{ local_fakefedorainfra_db_user }} password={{ local_fakefedorainfra_db_password }} role_attr_flags=NOSUPERUSER
- name: generate fakefedorainfra config - name: generate fakefedorainfra config
template: src=settings.py.j2 dest=/etc/fake_fedorainfra/settings.py owner=root group=root mode=0644 template: src=settings.py.j2 dest=/etc/fake_fedorainfra/settings.py owner=root group=root mode=0644

View file

@ -21,28 +21,28 @@
delegate_to: "{{ resultsdb_db_host_machine }}" delegate_to: "{{ resultsdb_db_host_machine }}"
sudo_user: postgres sudo_user: postgres
sudo: true sudo: true
action: postgresql_db db={{ resultsdb_db_name }} postgresql_db: db={{ resultsdb_db_name }}
- name: ensure resultsdb db user has access to database - name: ensure resultsdb db user has access to database
when: deployment_type == 'dev' or deployment_type == 'local' when: deployment_type == 'dev' or deployment_type == 'local'
delegate_to: "{{ resultsdb_db_host_machine }}" delegate_to: "{{ resultsdb_db_host_machine }}"
sudo_user: postgres sudo_user: postgres
sudo: true sudo: true
action: postgresql_user db={{ resultsdb_db_name }} user={{ resultsdb_db_user }} password={{ resultsdb_db_password }} role_attr_flags=NOSUPERUSER postgresql_user: db={{ resultsdb_db_name }} user={{ resultsdb_db_user }} password={{ resultsdb_db_password }} role_attr_flags=NOSUPERUSER
- name: ensure stg resultsdb db user has access to stg database - name: ensure stg resultsdb db user has access to stg database
when: deployment_type == 'stg' when: deployment_type == 'stg'
delegate_to: "{{ resultsdb_db_host }}" delegate_to: "{{ resultsdb_db_host }}"
sudo_user: postgres sudo_user: postgres
sudo: true sudo: true
action: postgresql_user db={{ resultsdb_db_name }} user={{ stg_resultsdb_db_user }} password={{ stg_resultsdb_db_password }} role_attr_flags=NOSUPERUSER postgresql_user: db={{ resultsdb_db_name }} user={{ stg_resultsdb_db_user }} password={{ stg_resultsdb_db_password }} role_attr_flags=NOSUPERUSER
- name: ensure prod resultsdb db user has access to prod database - name: ensure prod resultsdb db user has access to prod database
when: deployment_type == 'prod' when: deployment_type == 'prod'
delegate_to: "{{ resultsdb_db_host }}" delegate_to: "{{ resultsdb_db_host }}"
sudo_user: postgres sudo_user: postgres
sudo: true sudo: true
action: postgresql_user db={{ resultsdb_db_name }} user={{ prod_resultsdb_db_user }} password={{ prod_resultsdb_db_password }} role_attr_flags=NOSUPERUSER postgresql_user: db={{ resultsdb_db_name }} user={{ prod_resultsdb_db_user }} password={{ prod_resultsdb_db_password }} role_attr_flags=NOSUPERUSER
- name: ensure selinux lets httpd talk to postgres - name: ensure selinux lets httpd talk to postgres
seboolean: name=httpd_can_network_connect_db persistent=yes state=yes seboolean: name=httpd_can_network_connect_db persistent=yes state=yes

View file

@ -1,6 +1,6 @@
--- ---
- name: ensure packages required for testdays are installed - name: ensure packages required for testdays are installed
action: yum name={{ item }} state=present yum: name={{ item }} state=present
with_items: with_items:
- testdays - testdays
- mod_wsgi - mod_wsgi
@ -11,13 +11,13 @@
delegate_to: "{{ testdays_db_host }}" delegate_to: "{{ testdays_db_host }}"
sudo_user: postgres sudo_user: postgres
sudo: true sudo: true
action: postgresql_db db={{ testdays_db_name }} postgresql_db: db={{ testdays_db_name }}
- name: ensure testdays db user has access to database - name: ensure testdays db user has access to database
delegate_to: "{{ testdays_db_host }}" delegate_to: "{{ testdays_db_host }}"
sudo_user: postgres sudo_user: postgres
sudo: true sudo: true
action: postgresql_user db={{ testdays_db_name }} user={{ testdays_db_user }} password={{ testdays_db_password }} role_attr_flags=NOSUPERUSER postgresql_user: db={{ testdays_db_name }} user={{ testdays_db_user }} password={{ testdays_db_password }} role_attr_flags=NOSUPERUSER
- name: ensure selinux lets httpd talk to postgres - name: ensure selinux lets httpd talk to postgres
seboolean: name=httpd_can_network_connect_db persistent=yes state=yes seboolean: name=httpd_can_network_connect_db persistent=yes state=yes

View file

@ -19,7 +19,7 @@
- { file: ykval-config.php, dest: /etc/ykval/ykval-config.php } - { file: ykval-config.php, dest: /etc/ykval/ykval-config.php }
- name: symlink the configuration files to /usr/share/... - name: symlink the configuration files to /usr/share/...
action: file src={{item.file}} dest={{ item.dest }} state=link file: src={{item.file}} dest={{ item.dest }} state=link
with_items: with_items:
- {file: /etc/ykval/ykval-config.php, dest: /usr/share/ykval/ykval-config.php } - {file: /etc/ykval/ykval-config.php, dest: /usr/share/ykval/ykval-config.php }
- {file: /etc/ykksm/ykksm-config.php, dest: /usr/share/ykksm/ykksm-config.php } - {file: /etc/ykksm/ykksm-config.php, dest: /usr/share/ykksm/ykksm-config.php }