Remove action: in all roles.
This commit is contained in:
parent
5c0cca432b
commit
f0c80375b5
50 changed files with 139 additions and 139 deletions
|
@ -35,7 +35,7 @@
|
|||
- restart apache
|
||||
|
||||
- name: create the folder where we store the ssl cert if not already there
|
||||
action: file state=directory
|
||||
file: state=directory
|
||||
path=/etc/pki/tls/certs/
|
||||
owner=root group=root mode=0755
|
||||
|
||||
|
@ -65,7 +65,7 @@
|
|||
- restart apache
|
||||
|
||||
- name: set sebooleans so anitya can talk to the db
|
||||
action: seboolean name={{ item }}
|
||||
seboolean: name={{ item }}
|
||||
state=true
|
||||
persistent=true
|
||||
with_items:
|
||||
|
|
|
@ -30,7 +30,7 @@
|
|||
- python-openid
|
||||
|
||||
- name: set sebooleans so ask can talk to the db
|
||||
action: seboolean name=httpd_can_network_connect_db
|
||||
seboolean: name=httpd_can_network_connect_db
|
||||
state=true
|
||||
persistent=true
|
||||
tags:
|
||||
|
@ -38,7 +38,7 @@
|
|||
- selinux
|
||||
|
||||
- name: set sebooleans so ask can use the gluster mount
|
||||
action: seboolean name=httpd_use_fusefs
|
||||
seboolean: name=httpd_use_fusefs
|
||||
state=true
|
||||
persistent=true
|
||||
tags:
|
||||
|
@ -46,7 +46,7 @@
|
|||
- selinux
|
||||
|
||||
- name: set sebooleans so ask can talk to the memcache
|
||||
action: seboolean name=httpd_can_network_memcache
|
||||
seboolean: name=httpd_can_network_memcache
|
||||
state=true
|
||||
persistent=true
|
||||
tags:
|
||||
|
@ -54,7 +54,7 @@
|
|||
- selinux
|
||||
|
||||
- name: set sebooleans so ask can talk to fedmsg
|
||||
action: seboolean name=allow_httpd_sys_script_anon_write
|
||||
seboolean: name=allow_httpd_sys_script_anon_write
|
||||
state=true
|
||||
persistent=true
|
||||
tags:
|
||||
|
@ -62,7 +62,7 @@
|
|||
- selinux
|
||||
|
||||
- name: set sebooleans so ask can talk to fedmsg
|
||||
action: seboolean name=allow_ypbind
|
||||
seboolean: name=allow_ypbind
|
||||
state=true
|
||||
persistent=true
|
||||
tags:
|
||||
|
|
|
@ -52,7 +52,7 @@
|
|||
|
||||
# http://docs.openstack.org/icehouse/install-guide/install/yum/content/nova-compute.html
|
||||
- name: install the Compute packages necessary for the controller node.
|
||||
action: yum state=present pkg={{ item }}
|
||||
yum: state=present pkg={{ item }}
|
||||
with_items:
|
||||
- openstack-nova-compute
|
||||
- python-novaclient
|
||||
|
@ -157,7 +157,7 @@
|
|||
- sysctl: name=net.ipv4.conf.default.rp_filter value=0 state=present sysctl_set=yes reload=yes
|
||||
|
||||
- name: install the Networking components
|
||||
action: yum state=present pkg={{ item }}
|
||||
yum: state=present pkg={{ item }}
|
||||
with_items:
|
||||
- openstack-neutron-ml2
|
||||
- openstack-neutron-openvswitch
|
||||
|
|
|
@ -42,10 +42,10 @@
|
|||
|
||||
tasks:
|
||||
- name: edit hostname to be instance name
|
||||
action: shell hostname `curl -s http://169.254.169.254/2009-04-04/meta-data/instance-id`
|
||||
shell: hostname `curl -s http://169.254.169.254/2009-04-04/meta-data/instance-id`
|
||||
|
||||
- name: install pkgs
|
||||
action: yum state=present pkg={{ item }}
|
||||
yum: state=present pkg={{ item }}
|
||||
with_items:
|
||||
- rsync
|
||||
- openssh-clients
|
||||
|
@ -53,12 +53,12 @@
|
|||
- libsemanage-python
|
||||
|
||||
- name: add repos
|
||||
action: copy src={{ files }}/{{ item }} dest=/etc/yum.repos.d/{{ item }}
|
||||
copy: src={{ files }}/{{ item }} dest=/etc/yum.repos.d/{{ item }}
|
||||
with_items:
|
||||
- epel6.repo
|
||||
|
||||
- name: install additional pkgs
|
||||
action: yum state=present pkg={{ item }}
|
||||
yum: state=present pkg={{ item }}
|
||||
with_items:
|
||||
- mock
|
||||
- createrepo
|
||||
|
@ -66,7 +66,7 @@
|
|||
- pyliblzma
|
||||
|
||||
- name: make sure newest rpm
|
||||
action: yum name={{ item }} state=latest
|
||||
yum: name={{ item }} state=latest
|
||||
with_items:
|
||||
- rpm
|
||||
- glib2
|
||||
|
@ -75,16 +75,16 @@
|
|||
#- yum: name=mock enablerepo=epel-testing state=latest
|
||||
|
||||
- name: mockbuilder user
|
||||
action: user name=mockbuilder groups=mock
|
||||
user: name=mockbuilder groups=mock
|
||||
|
||||
- name: mockbuilder .ssh
|
||||
action: file state=directory path=/home/mockbuilder/.ssh mode=0700 owner=mockbuilder group=mockbuilder
|
||||
file: state=directory path=/home/mockbuilder/.ssh mode=0700 owner=mockbuilder group=mockbuilder
|
||||
|
||||
- name: mockbuilder authorized_keys
|
||||
action: authorized_key user=mockbuilder key='{{ lookup('file', '/home/copr/provision/files/buildsys.pub') }}'
|
||||
authorized_key: user=mockbuilder key='{{ lookup('file', '/home/copr/provision/files/buildsys.pub') }}'
|
||||
|
||||
- name: put updated mock configs into /etc/mock
|
||||
action: template src={{ files }}/mock/{{ item }} dest=/etc/mock
|
||||
template: src={{ files }}/mock/{{ item }} dest=/etc/mock
|
||||
with_items:
|
||||
- site-defaults.cfg
|
||||
|
||||
|
|
|
@ -1,5 +1,5 @@
|
|||
- name: chmod_key
|
||||
action: file path=/etc/lighttpd/copr-be.fedoraproject.org.pem owner=root group=root mode=0600
|
||||
file: path=/etc/lighttpd/copr-be.fedoraproject.org.pem owner=root group=root mode=0600
|
||||
|
||||
- name: restart copr-backend
|
||||
service: name=copr-backend state=restarted
|
||||
|
|
|
@ -1,5 +1,5 @@
|
|||
- name: install postresql
|
||||
action: yum state=present pkg={{ item }}
|
||||
yum: state=present pkg={{ item }}
|
||||
with_items:
|
||||
- "postgresql-server"
|
||||
- "postgresql-contrib"
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
---
|
||||
- name: restart haveged
|
||||
action: service name=haveged state=restarted
|
||||
service: name=haveged state=restarted
|
||||
|
||||
- name: restart obs-signd
|
||||
action: service name=signd state=restarted
|
||||
service: name=signd state=restarted
|
||||
|
|
|
@ -1,5 +1,5 @@
|
|||
- name: install postresql
|
||||
action: yum state=present pkg={{ item }}
|
||||
yum: state=present pkg={{ item }}
|
||||
with_items:
|
||||
- "postgresql-server"
|
||||
- "postgresql-contrib"
|
||||
|
|
|
@ -18,7 +18,7 @@
|
|||
yum: pkg=mod_ssl state=present
|
||||
|
||||
- name: Set httpd_use_nfs seboolean
|
||||
action: seboolean name=httpd_use_nfs state=yes persistent=yes
|
||||
seboolean: name=httpd_use_nfs state=yes persistent=yes
|
||||
|
||||
- name: check the selinux context rsyncd log
|
||||
command: matchpathcon /var/log/rsyncd-fedora.log
|
||||
|
|
|
@ -3,14 +3,14 @@
|
|||
|
||||
## Create all the folder used/needed
|
||||
- name: Create the easyfix folder
|
||||
action: file state=directory
|
||||
file: state=directory
|
||||
path=/srv/web/easyfix
|
||||
owner=apache group=apache mode=0755
|
||||
tags:
|
||||
- easyfix
|
||||
|
||||
- name: Create the easyfix configuration folder
|
||||
action: file state=directory
|
||||
file: state=directory
|
||||
path=/etc/fedora-gather-easyfix/
|
||||
owner=root group=root mode=0755
|
||||
tags:
|
||||
|
|
|
@ -42,7 +42,7 @@
|
|||
- restart apache
|
||||
|
||||
- name: set sebooleans so fedora-elections can talk to the db
|
||||
action: seboolean name=httpd_can_network_connect_db
|
||||
seboolean: name=httpd_can_network_connect_db
|
||||
state=true
|
||||
persistent=true
|
||||
tags:
|
||||
|
@ -68,7 +68,7 @@
|
|||
- elections
|
||||
|
||||
- name: set sebooleans so apache can talk to memcached0*
|
||||
action: seboolean name=httpd_can_network_memcache
|
||||
seboolean: name=httpd_can_network_memcache
|
||||
state=true
|
||||
persistent=true
|
||||
tags:
|
||||
|
|
|
@ -1,3 +1,3 @@
|
|||
---
|
||||
- name: run fasclient
|
||||
action: command /usr/bin/fasClient -i
|
||||
command: /usr/bin/fasClient -i
|
||||
|
|
|
@ -55,7 +55,7 @@
|
|||
- config
|
||||
|
||||
- name: set sebooleans so fedocal can talk to the db
|
||||
action: seboolean name=httpd_can_network_connect_db
|
||||
seboolean: name=httpd_can_network_connect_db
|
||||
state=true
|
||||
persistent=true
|
||||
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
---
|
||||
- name: add repo
|
||||
action: copy src=cabal-install.repo dest=/etc/yum.repos.d/cabal-install.repo
|
||||
copy: src=cabal-install.repo dest=/etc/yum.repos.d/cabal-install.repo
|
||||
tags:
|
||||
- cabal-install
|
||||
- packages
|
||||
|
|
|
@ -12,7 +12,7 @@
|
|||
rpm_key: state=present key=https://grafanarel.s3.amazonaws.com/RPM-GPG-KEY-grafana
|
||||
|
||||
- name: add repo
|
||||
action: copy src=grafana.repo dest=/etc/yum.repos.d/grafana.repo
|
||||
copy: src=grafana.repo dest=/etc/yum.repos.d/grafana.repo
|
||||
tags:
|
||||
- grafana
|
||||
- packages
|
||||
|
@ -25,7 +25,7 @@
|
|||
- packages
|
||||
|
||||
- name: set sebool so apache can talk to grafana-server
|
||||
action: seboolean name=httpd_can_network_connect
|
||||
seboolean: name=httpd_can_network_connect
|
||||
state=true
|
||||
persistent=true
|
||||
|
||||
|
|
|
@ -10,7 +10,7 @@
|
|||
# Note that if it's not set it will just skip this play and do nothing.
|
||||
#
|
||||
- name: setup /etc/hosts for some clients
|
||||
action: copy src={{ item }} dest=/etc/hosts
|
||||
copy: src={{ item }} dest=/etc/hosts
|
||||
with_first_found:
|
||||
- files:
|
||||
- "{{ inventory_hostname }}-hosts"
|
||||
|
|
|
@ -82,7 +82,7 @@
|
|||
- config
|
||||
|
||||
- name: enable infinoted
|
||||
action: service name=infinoted state=running enabled=true
|
||||
service: name=infinoted state=running enabled=true
|
||||
tags:
|
||||
- infinote
|
||||
- config
|
||||
|
|
|
@ -119,7 +119,7 @@
|
|||
when: env == "staging"
|
||||
|
||||
- name: set sebooleans so ipsilon can talk to the db
|
||||
action: seboolean name=httpd_can_network_connect_db
|
||||
seboolean: name=httpd_can_network_connect_db
|
||||
state=true
|
||||
persistent=true
|
||||
|
||||
|
|
|
@ -39,13 +39,13 @@
|
|||
- packages
|
||||
|
||||
- name: mount jenkins persistent storage
|
||||
action: mount name=/var/lib/jenkins src='LABEL=jenkins' fstype=ext4 state=mounted
|
||||
mount: name=/var/lib/jenkins src='LABEL=jenkins' fstype=ext4 state=mounted
|
||||
tags:
|
||||
- jenkins
|
||||
- jenkins/master
|
||||
|
||||
- name: Install custom jenkins plugins (from ansible bigfiles)
|
||||
action: copy src="{{ bigfiles }}/jenkins/{{ item }}.hpi" dest=/var/lib/jenkins/plugins/{{ item }}.hpi
|
||||
copy: src="{{ bigfiles }}/jenkins/{{ item }}.hpi" dest=/var/lib/jenkins/plugins/{{ item }}.hpi
|
||||
with_items:
|
||||
- fedmsg
|
||||
notify:
|
||||
|
@ -104,14 +104,14 @@
|
|||
- config
|
||||
|
||||
- name: install private ssh key
|
||||
action: copy src="{{ private }}/files/jenkins/ssh/jenkins_master" dest=/etc/jenkins/id_rsa mode=400 owner=jenkins group=jenkins
|
||||
copy: src="{{ private }}/files/jenkins/ssh/jenkins_master" dest=/etc/jenkins/id_rsa mode=400 owner=jenkins group=jenkins
|
||||
tags:
|
||||
- jenkins
|
||||
- jenkins/master
|
||||
- config
|
||||
|
||||
- name: enable jenkins service to start on boot
|
||||
action: service name=jenkins state=running enabled=true
|
||||
service: name=jenkins state=running enabled=true
|
||||
tags:
|
||||
- jenkins
|
||||
- jenkins/master
|
||||
|
|
|
@ -53,14 +53,14 @@
|
|||
- packages
|
||||
|
||||
- name: create jenkins user
|
||||
action: user name=jenkins state=present createhome=yes system=no groups=mock
|
||||
user: name=jenkins state=present createhome=yes system=no groups=mock
|
||||
tags:
|
||||
- jenkins
|
||||
- jenkins/slave
|
||||
- config
|
||||
|
||||
- name: add jenkins ssh public key to authorized keys
|
||||
action: authorized_key user=jenkins key="{{ item }}"
|
||||
authorized_key: user=jenkins key="{{ item }}"
|
||||
with_file:
|
||||
- "{{ private }}/files/jenkins/ssh/jenkins_master.pub"
|
||||
tags:
|
||||
|
@ -69,7 +69,7 @@
|
|||
- config
|
||||
|
||||
- name: create workspace directory
|
||||
action: file state=directory path=/srv/jenkins owner=jenkins group=jenkins
|
||||
file: state=directory path=/srv/jenkins owner=jenkins group=jenkins
|
||||
tags:
|
||||
- jenkins
|
||||
- jenkins/slave
|
||||
|
|
|
@ -21,7 +21,7 @@
|
|||
- kerneltest
|
||||
|
||||
- name: Create the folder to store the logs
|
||||
action: file state=directory
|
||||
file: state=directory
|
||||
path=/var/www/logs
|
||||
owner=apache group=apache mode=0755
|
||||
tags:
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
- name: restart sks-db
|
||||
action: service name=sks-db state=restarted
|
||||
service: name=sks-db state=restarted
|
||||
|
||||
- name: restart sks-recon
|
||||
action: service name=sks-recon state=restarted
|
||||
service: name=sks-recon state=restarted
|
||||
|
||||
|
|
|
@ -277,7 +277,7 @@
|
|||
- koji_builder
|
||||
|
||||
- name: set kernel params for more loops
|
||||
action: command /sbin/grubby --update-kernel=ALL --args=max_loop=64
|
||||
command: /sbin/grubby --update-kernel=ALL --args=max_loop=64
|
||||
when: max_loop is defined and max_loop.stdout.find("max_loop=64") == -1
|
||||
tags:
|
||||
- koji_builder
|
||||
|
|
|
@ -90,7 +90,7 @@
|
|||
- config
|
||||
|
||||
- name: enable services to start on boot
|
||||
action: service name={{ item }} state=running enabled=true
|
||||
service: name={{ item }} state=running enabled=true
|
||||
with_items:
|
||||
- koschei-polling
|
||||
- koschei-resolver
|
||||
|
|
|
@ -1,9 +1,9 @@
|
|||
---
|
||||
- name: restart mailman3
|
||||
action: service name=mailman3 state=restarted
|
||||
service: name=mailman3 state=restarted
|
||||
|
||||
- name: reload apache
|
||||
action: service name=httpd state=reloaded
|
||||
service: name=httpd state=reloaded
|
||||
|
||||
- name: restart memcached
|
||||
action: service name=memcached state=restarted
|
||||
service: name=memcached state=restarted
|
||||
|
|
|
@ -12,7 +12,7 @@
|
|||
- packages
|
||||
|
||||
- name: create all the directory for the configuration file
|
||||
action: file state=directory path=/etc/mdapi
|
||||
file: state=directory path=/etc/mdapi
|
||||
tags:
|
||||
- mdapi
|
||||
- config
|
||||
|
|
|
@ -20,7 +20,7 @@
|
|||
- mediawiki
|
||||
|
||||
- name: set sebooleans so apache can send emails
|
||||
action: seboolean name=httpd_can_sendmail state=yes persistent=yes
|
||||
seboolean: name=httpd_can_sendmail state=yes persistent=yes
|
||||
tags:
|
||||
- mediawiki
|
||||
|
||||
|
|
|
@ -20,7 +20,7 @@
|
|||
- mediawiki
|
||||
|
||||
- name: set sebooleans so apache can send emails
|
||||
action: seboolean name=httpd_can_sendmail state=yes persistent=yes
|
||||
seboolean: name=httpd_can_sendmail state=yes persistent=yes
|
||||
tags:
|
||||
- mediawiki
|
||||
|
||||
|
|
|
@ -43,7 +43,7 @@
|
|||
- config
|
||||
|
||||
- name: set sebooleans so mirrormanager can connect to its db
|
||||
action: seboolean name=httpd_can_network_connect_db
|
||||
seboolean: name=httpd_can_network_connect_db
|
||||
state=true
|
||||
persistent=true
|
||||
tags:
|
||||
|
@ -51,7 +51,7 @@
|
|||
- config
|
||||
|
||||
- name: set sebooleans so mirrormanager can send exception mails
|
||||
action: seboolean name=httpd_can_sendmail
|
||||
seboolean: name=httpd_can_sendmail
|
||||
state=true
|
||||
persistent=true
|
||||
tags:
|
||||
|
|
|
@ -58,7 +58,7 @@
|
|||
- selinux
|
||||
|
||||
- name: set sebooleans so apache can use memcached
|
||||
action: seboolean name=httpd_can_network_memcache
|
||||
seboolean: name=httpd_can_network_memcache
|
||||
state=true
|
||||
persistent=true
|
||||
tags:
|
||||
|
|
|
@ -1,3 +1,3 @@
|
|||
---
|
||||
- name: restart nrpe
|
||||
action: service name=nrpe state=restarted
|
||||
service: name=nrpe state=restarted
|
||||
|
|
|
@ -1,3 +1,3 @@
|
|||
---
|
||||
- name: restart nrpe
|
||||
action: service name=nrpe state=restarted
|
||||
service: name=nrpe state=restarted
|
||||
|
|
|
@ -64,7 +64,7 @@
|
|||
- nfs/client
|
||||
|
||||
- name: enable nfs-related services and run them (rhel6)
|
||||
action: service name={{ item }} enabled=true state=started
|
||||
service: name={{ item }} enabled=true state=started
|
||||
with_items:
|
||||
- rpcidmapd
|
||||
- rpcbind
|
||||
|
|
|
@ -16,7 +16,7 @@
|
|||
- nfs/server
|
||||
|
||||
- name: enable nfs-related services and run them (fedora)
|
||||
action: service name={{ item }} enabled=true state=started
|
||||
service: name={{ item }} enabled=true state=started
|
||||
with_items:
|
||||
- nfs-idmap
|
||||
- rpc-statd
|
||||
|
@ -25,7 +25,7 @@
|
|||
- nfs/server
|
||||
|
||||
- name: enable nfs-related services and run them (rhel)
|
||||
action: service name={{ item }} enabled=true state=started
|
||||
service: name={{ item }} enabled=true state=started
|
||||
with_items:
|
||||
- rpcbind
|
||||
- nfs-server
|
||||
|
|
|
@ -30,7 +30,7 @@
|
|||
- restart apache
|
||||
|
||||
- name: create pictures folder where we upload the pictures
|
||||
action: file state=directory
|
||||
file: state=directory
|
||||
path=/var/cache/nuancier/pictures
|
||||
owner=apache group=apache mode=0700
|
||||
tags:
|
||||
|
@ -38,7 +38,7 @@
|
|||
- nuancier
|
||||
|
||||
- name: create the cache folder where nuancier creates the thumbnails
|
||||
action: file state=directory
|
||||
file: state=directory
|
||||
path=/var/cache/nuancier/cache
|
||||
owner=apache group=apache mode=0700
|
||||
tags:
|
||||
|
@ -69,7 +69,7 @@
|
|||
- restart apache
|
||||
|
||||
- name: set sebooleans so nuancier can talk to the db
|
||||
action: seboolean name=httpd_can_network_connect_db
|
||||
seboolean: name=httpd_can_network_connect_db
|
||||
state=true
|
||||
persistent=true
|
||||
tags:
|
||||
|
@ -87,7 +87,7 @@
|
|||
- selinux
|
||||
|
||||
- name: set sebooleans so apache can use glusterfs
|
||||
action: seboolean name=httpd_use_fusefs
|
||||
seboolean: name=httpd_use_fusefs
|
||||
state=true
|
||||
persistent=true
|
||||
tags:
|
||||
|
@ -95,7 +95,7 @@
|
|||
- selinux
|
||||
|
||||
- name: set sebooleans so apache can send emails
|
||||
action: seboolean name=httpd_can_sendmail
|
||||
seboolean: name=httpd_can_sendmail
|
||||
state=true
|
||||
persistent=true
|
||||
tags:
|
||||
|
|
|
@ -124,14 +124,14 @@
|
|||
delegate_to: "{{ openqa_dbhost }}"
|
||||
sudo_user: postgres
|
||||
sudo: true
|
||||
action: postgresql_db db={{ openqa_dbname }}
|
||||
postgresql_db: db={{ openqa_dbname }}
|
||||
when: "openqa_dbhost is defined"
|
||||
|
||||
- name: Ensure db user has access to database
|
||||
delegate_to: "{{ openqa_dbhost }}"
|
||||
sudo_user: postgres
|
||||
sudo: true
|
||||
action: postgresql_user db={{ openqa_dbname }} user={{ openqa_dbuser }} password={{ openqa_dbpassword }} role_attr_flags=NOSUPERUSER
|
||||
postgresql_user: db={{ openqa_dbname }} user={{ openqa_dbuser }} password={{ openqa_dbpassword }} role_attr_flags=NOSUPERUSER
|
||||
when: "openqa_dbhost is defined"
|
||||
|
||||
- name: Database config
|
||||
|
|
|
@ -50,7 +50,7 @@
|
|||
- pagure
|
||||
|
||||
- name: create the /srv/git/.gitolite/conf folder
|
||||
action: file state=directory
|
||||
file: state=directory
|
||||
path=/srv/git/.gitolite/conf
|
||||
owner=git group=git mode=0775
|
||||
tags:
|
||||
|
@ -58,7 +58,7 @@
|
|||
- pagure
|
||||
|
||||
- name: create the /srv/git/.gitolite/keydir folder
|
||||
action: file state=directory
|
||||
file: state=directory
|
||||
path=/srv/git/.gitolite/keydir
|
||||
owner=git group=git mode=0775
|
||||
tags:
|
||||
|
@ -66,7 +66,7 @@
|
|||
- pagure
|
||||
|
||||
- name: create the /srv/git/.gitolite/logs folder
|
||||
action: file state=directory
|
||||
file: state=directory
|
||||
path=/srv/git/.gitolite/logs
|
||||
owner=git group=git mode=0775
|
||||
tags:
|
||||
|
@ -94,7 +94,7 @@
|
|||
- pagure
|
||||
|
||||
- name: create all the directories where we store the git repos
|
||||
action: file state=directory
|
||||
file: state=directory
|
||||
path={{ item }}
|
||||
owner=git group=git mode=0775
|
||||
with_items:
|
||||
|
@ -109,7 +109,7 @@
|
|||
- pagure
|
||||
|
||||
- name: create the /srv/tmp folder where to clone repos
|
||||
action: file state=directory
|
||||
file: state=directory
|
||||
path=/srv/tmp
|
||||
owner=git group=git mode=0775
|
||||
tags:
|
||||
|
@ -166,7 +166,7 @@
|
|||
# Set-up Pagure
|
||||
|
||||
- name: create the /var/www/releases folder
|
||||
action: file state=directory
|
||||
file: state=directory
|
||||
path=/var/www/releases
|
||||
owner=git group=git mode=0775
|
||||
tags:
|
||||
|
@ -258,7 +258,7 @@
|
|||
- pagure
|
||||
|
||||
- name: set sebooleans so pagure can talk to the db
|
||||
action: seboolean name=httpd_can_network_connect_db
|
||||
seboolean: name=httpd_can_network_connect_db
|
||||
state=true
|
||||
persistent=true
|
||||
tags:
|
||||
|
@ -267,7 +267,7 @@
|
|||
- pagure
|
||||
|
||||
- name: set sebooleans so apache can send emails
|
||||
action: seboolean name=httpd_can_sendmail
|
||||
seboolean: name=httpd_can_sendmail
|
||||
state=true
|
||||
persistent=true
|
||||
tags:
|
||||
|
|
|
@ -41,7 +41,7 @@
|
|||
- pdc
|
||||
|
||||
- name: create /etc/httpd/saml2
|
||||
action: file state=directory
|
||||
file: state=directory
|
||||
path=/etc/httpd/saml2
|
||||
owner=apache group=apache mode=0775
|
||||
tags:
|
||||
|
|
|
@ -3,5 +3,5 @@
|
|||
#
|
||||
|
||||
- name: restart phd
|
||||
action: service name=phd state=restarted
|
||||
service: name=phd state=restarted
|
||||
|
||||
|
|
|
@ -79,7 +79,7 @@
|
|||
- pkgdb
|
||||
|
||||
- name: set sebooleans so pkgdb2 can talk to the db
|
||||
action: seboolean name=httpd_can_network_connect_db
|
||||
seboolean: name=httpd_can_network_connect_db
|
||||
state=true
|
||||
persistent=true
|
||||
tags:
|
||||
|
@ -87,7 +87,7 @@
|
|||
- pkgdb
|
||||
|
||||
- name: set sebooleans so apache can send emails
|
||||
action: seboolean name=httpd_can_sendmail
|
||||
seboolean: name=httpd_can_sendmail
|
||||
state=true
|
||||
persistent=true
|
||||
tags:
|
||||
|
@ -95,7 +95,7 @@
|
|||
- pkgdb
|
||||
|
||||
- name: set sebooleans so apache can talk to memcached0*
|
||||
action: seboolean name=httpd_can_network_memcache
|
||||
seboolean: name=httpd_can_network_memcache
|
||||
state=true
|
||||
persistent=true
|
||||
tags:
|
||||
|
|
|
@ -1,62 +1,62 @@
|
|||
- name: set root passwd
|
||||
action: user name=root password={{ builder_rootpw }} state=present
|
||||
user: name=root password={{ builder_rootpw }} state=present
|
||||
|
||||
- name: add mock user as 425
|
||||
action: user name=mock uid=425 state=present home=/var/lib/mock createhome=yes system=yes
|
||||
user: name=mock uid=425 state=present home=/var/lib/mock createhome=yes system=yes
|
||||
- name: make mock homedir 2775
|
||||
action: file state=directory path=/var/lib/mock mode=2775 owner=mock group=mock
|
||||
file: state=directory path=/var/lib/mock mode=2775 owner=mock group=mock
|
||||
- name: add mock ssh dir
|
||||
action: file state=directory path=/var/lib/mock/.ssh mode=700 owner=mock group=mock
|
||||
file: state=directory path=/var/lib/mock/.ssh mode=700 owner=mock group=mock
|
||||
- name: add mock ssh keys
|
||||
action: copy src="{{ files }}/../roles/koji_builder/files//mock_auth_keys" dest=/var/lib/mock/.ssh/authorized_keys mode=644 owner=mock group=mock
|
||||
copy: src="{{ files }}/../roles/koji_builder/files//mock_auth_keys" dest=/var/lib/mock/.ssh/authorized_keys mode=644 owner=mock group=mock
|
||||
|
||||
- name: add ftpsync group
|
||||
action: group name=ftpsync gid=263 system=yes state=present
|
||||
group: name=ftpsync gid=263 system=yes state=present
|
||||
|
||||
- name: add ftpsync user
|
||||
user: name=ftpsync uid=263 group=ftpsync createhome=yes system=yes state=present
|
||||
|
||||
- name: add the ftpsync update-fullfilelist script
|
||||
action: copy src=update-fullfilelist dest=/usr/local/bin/update-fullfilelist owner=ftpsync group=ftpsync mode=555
|
||||
copy: src=update-fullfilelist dest=/usr/local/bin/update-fullfilelist owner=ftpsync group=ftpsync mode=555
|
||||
|
||||
- name: add masher group
|
||||
action: group name=masher gid=751 system=yes state=present
|
||||
group: name=masher gid=751 system=yes state=present
|
||||
# masher user 751
|
||||
- name: add masher user as 751 - and group
|
||||
action: user name=masher uid=751 group=masher home=/home/masher groups=mock,ftpsync
|
||||
user: name=masher uid=751 group=masher home=/home/masher groups=mock,ftpsync
|
||||
# masher ssh keys and config
|
||||
- name: add masher ssh dir
|
||||
action: file state=directory path=/home/masher/.ssh mode=700 owner=masher group=masher
|
||||
file: state=directory path=/home/masher/.ssh mode=700 owner=masher group=masher
|
||||
- name: add masher ssh keys
|
||||
action: copy src="mash/masher.{{ item }}" dest="/home/masher/.ssh/{{ item }}" mode=600 owner=masher group=masher
|
||||
copy: src="mash/masher.{{ item }}" dest="/home/masher/.ssh/{{ item }}" mode=600 owner=masher group=masher
|
||||
with_items:
|
||||
- id_rsa.pub
|
||||
- config
|
||||
|
||||
- name: add masher ssh priv key
|
||||
action: copy src="{{ private }}/files/mash/masher.id_rsa" dest=/home/masher/.ssh/id_rsa mode=600 owner=masher group=masher
|
||||
copy: src="{{ private }}/files/mash/masher.id_rsa" dest=/home/masher/.ssh/id_rsa mode=600 owner=masher group=masher
|
||||
|
||||
- name: add masher koji cert/key
|
||||
action: copy src="{{ private }}/files/mash/masher.pem" dest=/home/masher/.fedora.cert mode=600 owner=masher group=masher
|
||||
copy: src="{{ private }}/files/mash/masher.pem" dest=/home/masher/.fedora.cert mode=600 owner=masher group=masher
|
||||
- name: add masher koji ca cert
|
||||
action: copy src="{{ private }}/files/koji/buildercerts/fedora-ca.cert" dest=/home/masher/.fedora-server-ca.cert
|
||||
copy: src="{{ private }}/files/koji/buildercerts/fedora-ca.cert" dest=/home/masher/.fedora-server-ca.cert
|
||||
- name: add masher koji ca upload cert
|
||||
action: copy src="{{ private }}/files/koji/buildercerts/fedora-ca.cert" dest=/home/masher/.fedora-upload-ca.cert
|
||||
copy: src="{{ private }}/files/koji/buildercerts/fedora-ca.cert" dest=/home/masher/.fedora-upload-ca.cert
|
||||
|
||||
- name: add koji ca cert to central system ca-trust
|
||||
action: copy src="{{ private }}/files/koji/buildercerts/fedora-ca.cert" dest=/etc/pki/ca-trust/source/anchors/fedora-server-ca.cert
|
||||
copy: src="{{ private }}/files/koji/buildercerts/fedora-ca.cert" dest=/etc/pki/ca-trust/source/anchors/fedora-server-ca.cert
|
||||
- name: update ca-trust
|
||||
command: /usr/bin/update-ca-trust
|
||||
|
||||
# rawhide group
|
||||
- name: rawhide group
|
||||
action: group name=rawhide gid=265
|
||||
group: name=rawhide gid=265
|
||||
# rawhide user 265
|
||||
- name: add rawhide user
|
||||
action: user name=rawhide uid=265 group=rawhide home=/tmp comment="rawhide compose account"
|
||||
user: name=rawhide uid=265 group=rawhide home=/tmp comment="rawhide compose account"
|
||||
|
||||
- name: make a bunch of dirs
|
||||
action: file state=directory path={{ item }}
|
||||
file: state=directory path={{ item }}
|
||||
with_items:
|
||||
- /pub
|
||||
- /epel
|
||||
|
@ -127,55 +127,55 @@
|
|||
|
||||
# idmapd and make sure it's set to run
|
||||
- name: idmapd.conf
|
||||
action: copy src="{{ files }}/../roles/koji_builder/files//idmapd.conf" dest=/etc/idmapd.conf
|
||||
copy: src="{{ files }}/../roles/koji_builder/files//idmapd.conf" dest=/etc/idmapd.conf
|
||||
tags:
|
||||
- configs
|
||||
|
||||
- name: make a mnt/koji link
|
||||
action: file state=link src=/mnt/fedora_koji/koji dest=/mnt/koji
|
||||
file: state=link src=/mnt/fedora_koji/koji dest=/mnt/koji
|
||||
when: inventory_hostname.startswith(('compose-x86-01'))
|
||||
|
||||
- name: symlink /srv/pungi
|
||||
action: file src=/mnt/fedora_koji/compose dest=/srv/pungi state=link
|
||||
file: src=/mnt/fedora_koji/compose dest=/srv/pungi state=link
|
||||
when: not inventory_hostname.startswith('compose-aarch64-01')
|
||||
|
||||
- name: add pkgs for nightly compose
|
||||
action: yum state=present pkg={{ item }}
|
||||
yum: state=present pkg={{ item }}
|
||||
with_items:
|
||||
- packagedb-cli
|
||||
when: inventory_hostname.startswith('branched-composer') or inventory_hostname.startswith('rawhide-composer') or inventory_hostname.startswith('composer.stg')
|
||||
|
||||
# put cron job in for branched compose
|
||||
- name: branched compose cron
|
||||
action: copy src="branched" dest=/etc/cron.d/branched
|
||||
copy: src="branched" dest=/etc/cron.d/branched
|
||||
when: inventory_hostname.startswith('branched-composer')
|
||||
|
||||
# put cron job in for rawhide compose
|
||||
- name: rawhide compose cron
|
||||
action: copy src="rawhide" dest=/etc/cron.d/rawhide
|
||||
copy: src="rawhide" dest=/etc/cron.d/rawhide
|
||||
when: inventory_hostname.startswith('rawhide-composer')
|
||||
|
||||
# put cron job in for aarch64 branched compose
|
||||
- name: aarch64 branched compose cron
|
||||
action: copy src="aarch64.branched" dest=/etc/cron.d/branched
|
||||
copy: src="aarch64.branched" dest=/etc/cron.d/branched
|
||||
when: inventory_hostname.startswith('compose-aarch64-01')
|
||||
|
||||
# put cron job in for aarch64 rawhide compose
|
||||
- name: aarch64 rawhide compose cron
|
||||
action: copy src="aarch64.rawhide" dest=/etc/cron.d/rawhide
|
||||
copy: src="aarch64.rawhide" dest=/etc/cron.d/rawhide
|
||||
when: inventory_hostname.startswith('compose-aarch64-01')
|
||||
|
||||
# put cron job in for two-week nightly compose
|
||||
- name: twoweek compose cron
|
||||
action: copy src="twoweek-updates" dest=/etc/cron.d/twoweek-updates
|
||||
copy: src="twoweek-updates" dest=/etc/cron.d/twoweek-updates
|
||||
when: inventory_hostname.startswith('compose-x86-01')
|
||||
|
||||
- name: sudoers defaults
|
||||
action: copy src="{{ private }}/files/sudo/releng-sudoers" dest=/etc/sudoers mode=0440
|
||||
copy: src="{{ private }}/files/sudo/releng-sudoers" dest=/etc/sudoers mode=0440
|
||||
tags:
|
||||
- configs
|
||||
- name: sudoers for ftpsync
|
||||
action: copy src="{{ private }}/files/sudo/ftpsync-sudo" dest=/etc/sudoers.d/ftpsync mode=0440
|
||||
copy: src="{{ private }}/files/sudo/ftpsync-sudo" dest=/etc/sudoers.d/ftpsync mode=0440
|
||||
tags:
|
||||
- configs
|
||||
|
||||
|
|
|
@ -55,7 +55,7 @@
|
|||
- services
|
||||
|
||||
- name: set sebooleans so rsync can read dirs
|
||||
action: seboolean name=rsync_export_all_ro
|
||||
seboolean: name=rsync_export_all_ro
|
||||
state=true
|
||||
persistent=true
|
||||
|
||||
|
|
|
@ -36,7 +36,7 @@
|
|||
# This will move a /etc/sudoers.d/ file in place
|
||||
#
|
||||
- name: setup /etc/sudoers.d/sudoer file for client use
|
||||
action: copy src={{ item }} dest=/etc/sudoers.d/{{ item | basename | replace('.', '_') }}
|
||||
copy: src={{ item }} dest=/etc/sudoers.d/{{ item | basename | replace('.', '_') }}
|
||||
owner=root group=root mode=0600
|
||||
with_first_found:
|
||||
- files:
|
||||
|
|
|
@ -12,4 +12,4 @@
|
|||
service: name=nginx state=restarted
|
||||
|
||||
- name: restart postfix
|
||||
action: service name=postfix state=restarted
|
||||
service: name=postfix state=restarted
|
||||
|
|
|
@ -63,35 +63,35 @@
|
|||
delegate_to: "{{ buildmaster_db_host }}"
|
||||
sudo: true
|
||||
sudo_user: postgres
|
||||
action: postgresql_db db={{ buildmaster_db_name }}
|
||||
postgresql_db: db={{ buildmaster_db_name }}
|
||||
|
||||
- name: ensure dev db user has access to dev database
|
||||
when: deployment_type == 'dev'
|
||||
delegate_to: "{{ buildmaster_db_host }}"
|
||||
sudo: true
|
||||
sudo_user: postgres
|
||||
action: postgresql_user db={{ buildmaster_db_name }} user={{ dev_buildmaster_db_user }} password={{ dev_buildmaster_db_password }} role_attr_flags=NOSUPERUSER
|
||||
postgresql_user: db={{ buildmaster_db_name }} user={{ dev_buildmaster_db_user }} password={{ dev_buildmaster_db_password }} role_attr_flags=NOSUPERUSER
|
||||
|
||||
- name: ensure stg db user has access to stg database
|
||||
when: deployment_type == 'stg'
|
||||
delegate_to: "{{ buildmaster_db_host }}"
|
||||
sudo: true
|
||||
sudo_user: postgres
|
||||
action: postgresql_user db={{ buildmaster_db_name }} user={{ stg_buildmaster_db_user }} password={{ stg_buildmaster_db_password }} role_attr_flags=NOSUPERUSER
|
||||
postgresql_user: db={{ buildmaster_db_name }} user={{ stg_buildmaster_db_user }} password={{ stg_buildmaster_db_password }} role_attr_flags=NOSUPERUSER
|
||||
|
||||
- name: ensure prod db user has access to prod database
|
||||
when: deployment_type == 'prod'
|
||||
delegate_to: "{{ buildmaster_db_host }}"
|
||||
sudo: true
|
||||
sudo_user: postgres
|
||||
action: postgresql_user db={{ buildmaster_db_name }} user={{ prod_buildmaster_db_user }} password={{ prod_buildmaster_db_password }} role_attr_flags=NOSUPERUSER
|
||||
postgresql_user: db={{ buildmaster_db_name }} user={{ prod_buildmaster_db_user }} password={{ prod_buildmaster_db_password }} role_attr_flags=NOSUPERUSER
|
||||
|
||||
- name: ensure local db user has access to local database
|
||||
when: deployment_type == 'local'
|
||||
delegate_to: "{{ buildmaster_db_host }}"
|
||||
sudo: true
|
||||
sudo_user: postgres
|
||||
action: postgresql_user db={{ buildmaster_db_name }} user={{ local_buildmaster_db_user }} password={{ local_buildmaster_db_password }} role_attr_flags=NOSUPERUSER
|
||||
postgresql_user: db={{ buildmaster_db_name }} user={{ local_buildmaster_db_user }} password={{ local_buildmaster_db_password }} role_attr_flags=NOSUPERUSER
|
||||
|
||||
- name: put robots.txt at web root of external hostname
|
||||
when: robots_path is defined
|
||||
|
|
|
@ -21,35 +21,35 @@
|
|||
delegate_to: "{{ execdb_db_host_machine }}"
|
||||
sudo_user: postgres
|
||||
sudo: true
|
||||
action: postgresql_db db={{ execdb_db_name }}
|
||||
postgresql_db: db={{ execdb_db_name }}
|
||||
|
||||
- name: ensure dev execdb db user has access to dev database
|
||||
when: deployment_type == 'dev'
|
||||
delegate_to: "{{ execdb_db_host_machine }}"
|
||||
sudo_user: postgres
|
||||
sudo: true
|
||||
action: postgresql_user db={{ execdb_db_name }} user={{ execdb_db_user }} password={{ execdb_db_password }} role_attr_flags=NOSUPERUSER
|
||||
postgresql_user: db={{ execdb_db_name }} user={{ execdb_db_user }} password={{ execdb_db_password }} role_attr_flags=NOSUPERUSER
|
||||
|
||||
- name: ensure stg execdb db user has access to stg database
|
||||
when: deployment_type == 'stg'
|
||||
delegate_to: "{{ execdb_db_host }}"
|
||||
sudo_user: postgres
|
||||
sudo: true
|
||||
action: postgresql_user db={{ execdb_db_name }} user={{ stg_execdb_db_user }} password={{ stg_execdb_db_password }} role_attr_flags=NOSUPERUSER
|
||||
postgresql_user: db={{ execdb_db_name }} user={{ stg_execdb_db_user }} password={{ stg_execdb_db_password }} role_attr_flags=NOSUPERUSER
|
||||
|
||||
- name: ensure prod execdb db user has access to prod database
|
||||
when: deployment_type == 'prod'
|
||||
delegate_to: "{{ execdb_db_host }}"
|
||||
sudo_user: postgres
|
||||
sudo: true
|
||||
action: postgresql_user db={{ execdb_db_name }} user={{ prod_execdb_db_user }} password={{ prod_execdb_db_password }} role_attr_flags=NOSUPERUSER
|
||||
postgresql_user: db={{ execdb_db_name }} user={{ prod_execdb_db_user }} password={{ prod_execdb_db_password }} role_attr_flags=NOSUPERUSER
|
||||
|
||||
- name: ensure local execdb db user has access to prod database
|
||||
when: deployment_type == 'local'
|
||||
delegate_to: "{{ execdb_db_host }}"
|
||||
sudo_user: postgres
|
||||
sudo: true
|
||||
action: postgresql_user db={{ execdb_db_name }} user={{ local_execdb_db_user }} password={{ local_execdb_db_password }} role_attr_flags=NOSUPERUSER
|
||||
postgresql_user: db={{ execdb_db_name }} user={{ local_execdb_db_user }} password={{ local_execdb_db_password }} role_attr_flags=NOSUPERUSER
|
||||
|
||||
- name: ensure selinux lets httpd talk to postgres
|
||||
seboolean: name=httpd_can_network_connect_db persistent=yes state=yes
|
||||
|
|
|
@ -1,12 +1,12 @@
|
|||
- name: ensure packages required for fakefedorainfra are installed
|
||||
action: yum name={{ item }} state=latest
|
||||
yum: name={{ item }} state=latest
|
||||
when: deployment_type == 'prod' or deployment_type == 'local'
|
||||
with_items:
|
||||
- mod_wsgi
|
||||
- fake_fedorainfra
|
||||
|
||||
- name: ensure packages required for fakefedorainfra are installed (infra-testing)
|
||||
action: yum name={{ item }} state=latest enablerepo=infrastructure-testing
|
||||
yum: name={{ item }} state=latest enablerepo=infrastructure-testing
|
||||
when: deployment_type == 'dev' or deployment_type == 'stg'
|
||||
with_items:
|
||||
- mod_wsgi
|
||||
|
@ -16,28 +16,28 @@
|
|||
delegate_to: "{{ buildmaster_db_host }}"
|
||||
sudo: true
|
||||
sudo_user: postgres
|
||||
action: postgresql_db db={{ fakefedorainfra_db_name }}
|
||||
postgresql_db: db={{ fakefedorainfra_db_name }}
|
||||
|
||||
- name: ensure stg fakefedorainfra user has access to stg database
|
||||
when: deployment_type == 'stg'
|
||||
delegate_to: "{{ buildmaster_db_host }}"
|
||||
sudo: true
|
||||
sudo_user: postgres
|
||||
action: postgresql_user db={{ fakefedorainfra_db_name }} user={{ stg_fakefedorainfra_db_user }} password={{ stg_fakefedorainfra_db_password }} role_attr_flags=NOSUPERUSER
|
||||
postgresql_user: db={{ fakefedorainfra_db_name }} user={{ stg_fakefedorainfra_db_user }} password={{ stg_fakefedorainfra_db_password }} role_attr_flags=NOSUPERUSER
|
||||
|
||||
- name: ensure dev fakefedorainfra user has access to dev database
|
||||
when: deployment_type == 'dev'
|
||||
delegate_to: "{{ buildmaster_db_host }}"
|
||||
sudo: true
|
||||
sudo_user: postgres
|
||||
action: postgresql_user db={{ fakefedorainfra_db_name }} user={{ dev_fakefedorainfra_db_user }} password={{ dev_fakefedorainfra_db_password }} role_attr_flags=NOSUPERUSER
|
||||
postgresql_user: db={{ fakefedorainfra_db_name }} user={{ dev_fakefedorainfra_db_user }} password={{ dev_fakefedorainfra_db_password }} role_attr_flags=NOSUPERUSER
|
||||
|
||||
- name: ensure local fakefedorainfra user has access to local database
|
||||
when: deployment_type == 'local'
|
||||
delegate_to: "{{ buildmaster_db_host }}"
|
||||
sudo: true
|
||||
sudo_user: postgres
|
||||
action: postgresql_user db={{ fakefedorainfra_db_name }} user={{ local_fakefedorainfra_db_user }} password={{ local_fakefedorainfra_db_password }} role_attr_flags=NOSUPERUSER
|
||||
postgresql_user: db={{ fakefedorainfra_db_name }} user={{ local_fakefedorainfra_db_user }} password={{ local_fakefedorainfra_db_password }} role_attr_flags=NOSUPERUSER
|
||||
|
||||
- name: generate fakefedorainfra config
|
||||
template: src=settings.py.j2 dest=/etc/fake_fedorainfra/settings.py owner=root group=root mode=0644
|
||||
|
|
|
@ -21,28 +21,28 @@
|
|||
delegate_to: "{{ resultsdb_db_host_machine }}"
|
||||
sudo_user: postgres
|
||||
sudo: true
|
||||
action: postgresql_db db={{ resultsdb_db_name }}
|
||||
postgresql_db: db={{ resultsdb_db_name }}
|
||||
|
||||
- name: ensure resultsdb db user has access to database
|
||||
when: deployment_type == 'dev' or deployment_type == 'local'
|
||||
delegate_to: "{{ resultsdb_db_host_machine }}"
|
||||
sudo_user: postgres
|
||||
sudo: true
|
||||
action: postgresql_user db={{ resultsdb_db_name }} user={{ resultsdb_db_user }} password={{ resultsdb_db_password }} role_attr_flags=NOSUPERUSER
|
||||
postgresql_user: db={{ resultsdb_db_name }} user={{ resultsdb_db_user }} password={{ resultsdb_db_password }} role_attr_flags=NOSUPERUSER
|
||||
|
||||
- name: ensure stg resultsdb db user has access to stg database
|
||||
when: deployment_type == 'stg'
|
||||
delegate_to: "{{ resultsdb_db_host }}"
|
||||
sudo_user: postgres
|
||||
sudo: true
|
||||
action: postgresql_user db={{ resultsdb_db_name }} user={{ stg_resultsdb_db_user }} password={{ stg_resultsdb_db_password }} role_attr_flags=NOSUPERUSER
|
||||
postgresql_user: db={{ resultsdb_db_name }} user={{ stg_resultsdb_db_user }} password={{ stg_resultsdb_db_password }} role_attr_flags=NOSUPERUSER
|
||||
|
||||
- name: ensure prod resultsdb db user has access to prod database
|
||||
when: deployment_type == 'prod'
|
||||
delegate_to: "{{ resultsdb_db_host }}"
|
||||
sudo_user: postgres
|
||||
sudo: true
|
||||
action: postgresql_user db={{ resultsdb_db_name }} user={{ prod_resultsdb_db_user }} password={{ prod_resultsdb_db_password }} role_attr_flags=NOSUPERUSER
|
||||
postgresql_user: db={{ resultsdb_db_name }} user={{ prod_resultsdb_db_user }} password={{ prod_resultsdb_db_password }} role_attr_flags=NOSUPERUSER
|
||||
|
||||
- name: ensure selinux lets httpd talk to postgres
|
||||
seboolean: name=httpd_can_network_connect_db persistent=yes state=yes
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
---
|
||||
- name: ensure packages required for testdays are installed
|
||||
action: yum name={{ item }} state=present
|
||||
yum: name={{ item }} state=present
|
||||
with_items:
|
||||
- testdays
|
||||
- mod_wsgi
|
||||
|
@ -11,13 +11,13 @@
|
|||
delegate_to: "{{ testdays_db_host }}"
|
||||
sudo_user: postgres
|
||||
sudo: true
|
||||
action: postgresql_db db={{ testdays_db_name }}
|
||||
postgresql_db: db={{ testdays_db_name }}
|
||||
|
||||
- name: ensure testdays db user has access to database
|
||||
delegate_to: "{{ testdays_db_host }}"
|
||||
sudo_user: postgres
|
||||
sudo: true
|
||||
action: postgresql_user db={{ testdays_db_name }} user={{ testdays_db_user }} password={{ testdays_db_password }} role_attr_flags=NOSUPERUSER
|
||||
postgresql_user: db={{ testdays_db_name }} user={{ testdays_db_user }} password={{ testdays_db_password }} role_attr_flags=NOSUPERUSER
|
||||
|
||||
- name: ensure selinux lets httpd talk to postgres
|
||||
seboolean: name=httpd_can_network_connect_db persistent=yes state=yes
|
||||
|
|
|
@ -19,7 +19,7 @@
|
|||
- { file: ykval-config.php, dest: /etc/ykval/ykval-config.php }
|
||||
|
||||
- name: symlink the configuration files to /usr/share/...
|
||||
action: file src={{item.file}} dest={{ item.dest }} state=link
|
||||
file: src={{item.file}} dest={{ item.dest }} state=link
|
||||
with_items:
|
||||
- {file: /etc/ykval/ykval-config.php, dest: /usr/share/ykval/ykval-config.php }
|
||||
- {file: /etc/ykksm/ykksm-config.php, dest: /usr/share/ykksm/ykksm-config.php }
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue