Remove action: in all roles.

This commit is contained in:
Kevin Fenzi 2016-01-06 21:58:31 +00:00
parent 5c0cca432b
commit f0c80375b5
50 changed files with 139 additions and 139 deletions

View file

@ -35,7 +35,7 @@
- restart apache
- name: create the folder where we store the ssl cert if not already there
action: file state=directory
file: state=directory
path=/etc/pki/tls/certs/
owner=root group=root mode=0755
@ -65,7 +65,7 @@
- restart apache
- name: set sebooleans so anitya can talk to the db
action: seboolean name={{ item }}
seboolean: name={{ item }}
state=true
persistent=true
with_items:

View file

@ -30,7 +30,7 @@
- python-openid
- name: set sebooleans so ask can talk to the db
action: seboolean name=httpd_can_network_connect_db
seboolean: name=httpd_can_network_connect_db
state=true
persistent=true
tags:
@ -38,7 +38,7 @@
- selinux
- name: set sebooleans so ask can use the gluster mount
action: seboolean name=httpd_use_fusefs
seboolean: name=httpd_use_fusefs
state=true
persistent=true
tags:
@ -46,7 +46,7 @@
- selinux
- name: set sebooleans so ask can talk to the memcache
action: seboolean name=httpd_can_network_memcache
seboolean: name=httpd_can_network_memcache
state=true
persistent=true
tags:
@ -54,7 +54,7 @@
- selinux
- name: set sebooleans so ask can talk to fedmsg
action: seboolean name=allow_httpd_sys_script_anon_write
seboolean: name=allow_httpd_sys_script_anon_write
state=true
persistent=true
tags:
@ -62,7 +62,7 @@
- selinux
- name: set sebooleans so ask can talk to fedmsg
action: seboolean name=allow_ypbind
seboolean: name=allow_ypbind
state=true
persistent=true
tags:

View file

@ -52,7 +52,7 @@
# http://docs.openstack.org/icehouse/install-guide/install/yum/content/nova-compute.html
- name: install the Compute packages necessary for the controller node.
action: yum state=present pkg={{ item }}
yum: state=present pkg={{ item }}
with_items:
- openstack-nova-compute
- python-novaclient
@ -157,7 +157,7 @@
- sysctl: name=net.ipv4.conf.default.rp_filter value=0 state=present sysctl_set=yes reload=yes
- name: install the Networking components
action: yum state=present pkg={{ item }}
yum: state=present pkg={{ item }}
with_items:
- openstack-neutron-ml2
- openstack-neutron-openvswitch

View file

@ -42,10 +42,10 @@
tasks:
- name: edit hostname to be instance name
action: shell hostname `curl -s http://169.254.169.254/2009-04-04/meta-data/instance-id`
shell: hostname `curl -s http://169.254.169.254/2009-04-04/meta-data/instance-id`
- name: install pkgs
action: yum state=present pkg={{ item }}
yum: state=present pkg={{ item }}
with_items:
- rsync
- openssh-clients
@ -53,12 +53,12 @@
- libsemanage-python
- name: add repos
action: copy src={{ files }}/{{ item }} dest=/etc/yum.repos.d/{{ item }}
copy: src={{ files }}/{{ item }} dest=/etc/yum.repos.d/{{ item }}
with_items:
- epel6.repo
- name: install additional pkgs
action: yum state=present pkg={{ item }}
yum: state=present pkg={{ item }}
with_items:
- mock
- createrepo
@ -66,7 +66,7 @@
- pyliblzma
- name: make sure newest rpm
action: yum name={{ item }} state=latest
yum: name={{ item }} state=latest
with_items:
- rpm
- glib2
@ -75,16 +75,16 @@
#- yum: name=mock enablerepo=epel-testing state=latest
- name: mockbuilder user
action: user name=mockbuilder groups=mock
user: name=mockbuilder groups=mock
- name: mockbuilder .ssh
action: file state=directory path=/home/mockbuilder/.ssh mode=0700 owner=mockbuilder group=mockbuilder
file: state=directory path=/home/mockbuilder/.ssh mode=0700 owner=mockbuilder group=mockbuilder
- name: mockbuilder authorized_keys
action: authorized_key user=mockbuilder key='{{ lookup('file', '/home/copr/provision/files/buildsys.pub') }}'
authorized_key: user=mockbuilder key='{{ lookup('file', '/home/copr/provision/files/buildsys.pub') }}'
- name: put updated mock configs into /etc/mock
action: template src={{ files }}/mock/{{ item }} dest=/etc/mock
template: src={{ files }}/mock/{{ item }} dest=/etc/mock
with_items:
- site-defaults.cfg

View file

@ -1,5 +1,5 @@
- name: chmod_key
action: file path=/etc/lighttpd/copr-be.fedoraproject.org.pem owner=root group=root mode=0600
file: path=/etc/lighttpd/copr-be.fedoraproject.org.pem owner=root group=root mode=0600
- name: restart copr-backend
service: name=copr-backend state=restarted

View file

@ -1,5 +1,5 @@
- name: install postresql
action: yum state=present pkg={{ item }}
yum: state=present pkg={{ item }}
with_items:
- "postgresql-server"
- "postgresql-contrib"

View file

@ -1,6 +1,6 @@
---
- name: restart haveged
action: service name=haveged state=restarted
service: name=haveged state=restarted
- name: restart obs-signd
action: service name=signd state=restarted
service: name=signd state=restarted

View file

@ -1,5 +1,5 @@
- name: install postresql
action: yum state=present pkg={{ item }}
yum: state=present pkg={{ item }}
with_items:
- "postgresql-server"
- "postgresql-contrib"

View file

@ -18,7 +18,7 @@
yum: pkg=mod_ssl state=present
- name: Set httpd_use_nfs seboolean
action: seboolean name=httpd_use_nfs state=yes persistent=yes
seboolean: name=httpd_use_nfs state=yes persistent=yes
- name: check the selinux context rsyncd log
command: matchpathcon /var/log/rsyncd-fedora.log

View file

@ -3,14 +3,14 @@
## Create all the folder used/needed
- name: Create the easyfix folder
action: file state=directory
file: state=directory
path=/srv/web/easyfix
owner=apache group=apache mode=0755
tags:
- easyfix
- name: Create the easyfix configuration folder
action: file state=directory
file: state=directory
path=/etc/fedora-gather-easyfix/
owner=root group=root mode=0755
tags:

View file

@ -42,7 +42,7 @@
- restart apache
- name: set sebooleans so fedora-elections can talk to the db
action: seboolean name=httpd_can_network_connect_db
seboolean: name=httpd_can_network_connect_db
state=true
persistent=true
tags:
@ -68,7 +68,7 @@
- elections
- name: set sebooleans so apache can talk to memcached0*
action: seboolean name=httpd_can_network_memcache
seboolean: name=httpd_can_network_memcache
state=true
persistent=true
tags:

View file

@ -1,3 +1,3 @@
---
- name: run fasclient
action: command /usr/bin/fasClient -i
command: /usr/bin/fasClient -i

View file

@ -55,7 +55,7 @@
- config
- name: set sebooleans so fedocal can talk to the db
action: seboolean name=httpd_can_network_connect_db
seboolean: name=httpd_can_network_connect_db
state=true
persistent=true

View file

@ -1,6 +1,6 @@
---
- name: add repo
action: copy src=cabal-install.repo dest=/etc/yum.repos.d/cabal-install.repo
copy: src=cabal-install.repo dest=/etc/yum.repos.d/cabal-install.repo
tags:
- cabal-install
- packages

View file

@ -12,7 +12,7 @@
rpm_key: state=present key=https://grafanarel.s3.amazonaws.com/RPM-GPG-KEY-grafana
- name: add repo
action: copy src=grafana.repo dest=/etc/yum.repos.d/grafana.repo
copy: src=grafana.repo dest=/etc/yum.repos.d/grafana.repo
tags:
- grafana
- packages
@ -25,7 +25,7 @@
- packages
- name: set sebool so apache can talk to grafana-server
action: seboolean name=httpd_can_network_connect
seboolean: name=httpd_can_network_connect
state=true
persistent=true

View file

@ -10,7 +10,7 @@
# Note that if it's not set it will just skip this play and do nothing.
#
- name: setup /etc/hosts for some clients
action: copy src={{ item }} dest=/etc/hosts
copy: src={{ item }} dest=/etc/hosts
with_first_found:
- files:
- "{{ inventory_hostname }}-hosts"

View file

@ -82,7 +82,7 @@
- config
- name: enable infinoted
action: service name=infinoted state=running enabled=true
service: name=infinoted state=running enabled=true
tags:
- infinote
- config

View file

@ -119,7 +119,7 @@
when: env == "staging"
- name: set sebooleans so ipsilon can talk to the db
action: seboolean name=httpd_can_network_connect_db
seboolean: name=httpd_can_network_connect_db
state=true
persistent=true

View file

@ -39,13 +39,13 @@
- packages
- name: mount jenkins persistent storage
action: mount name=/var/lib/jenkins src='LABEL=jenkins' fstype=ext4 state=mounted
mount: name=/var/lib/jenkins src='LABEL=jenkins' fstype=ext4 state=mounted
tags:
- jenkins
- jenkins/master
- name: Install custom jenkins plugins (from ansible bigfiles)
action: copy src="{{ bigfiles }}/jenkins/{{ item }}.hpi" dest=/var/lib/jenkins/plugins/{{ item }}.hpi
copy: src="{{ bigfiles }}/jenkins/{{ item }}.hpi" dest=/var/lib/jenkins/plugins/{{ item }}.hpi
with_items:
- fedmsg
notify:
@ -104,14 +104,14 @@
- config
- name: install private ssh key
action: copy src="{{ private }}/files/jenkins/ssh/jenkins_master" dest=/etc/jenkins/id_rsa mode=400 owner=jenkins group=jenkins
copy: src="{{ private }}/files/jenkins/ssh/jenkins_master" dest=/etc/jenkins/id_rsa mode=400 owner=jenkins group=jenkins
tags:
- jenkins
- jenkins/master
- config
- name: enable jenkins service to start on boot
action: service name=jenkins state=running enabled=true
service: name=jenkins state=running enabled=true
tags:
- jenkins
- jenkins/master

View file

@ -53,14 +53,14 @@
- packages
- name: create jenkins user
action: user name=jenkins state=present createhome=yes system=no groups=mock
user: name=jenkins state=present createhome=yes system=no groups=mock
tags:
- jenkins
- jenkins/slave
- config
- name: add jenkins ssh public key to authorized keys
action: authorized_key user=jenkins key="{{ item }}"
authorized_key: user=jenkins key="{{ item }}"
with_file:
- "{{ private }}/files/jenkins/ssh/jenkins_master.pub"
tags:
@ -69,7 +69,7 @@
- config
- name: create workspace directory
action: file state=directory path=/srv/jenkins owner=jenkins group=jenkins
file: state=directory path=/srv/jenkins owner=jenkins group=jenkins
tags:
- jenkins
- jenkins/slave

View file

@ -21,7 +21,7 @@
- kerneltest
- name: Create the folder to store the logs
action: file state=directory
file: state=directory
path=/var/www/logs
owner=apache group=apache mode=0755
tags:

View file

@ -1,6 +1,6 @@
- name: restart sks-db
action: service name=sks-db state=restarted
service: name=sks-db state=restarted
- name: restart sks-recon
action: service name=sks-recon state=restarted
service: name=sks-recon state=restarted

View file

@ -277,7 +277,7 @@
- koji_builder
- name: set kernel params for more loops
action: command /sbin/grubby --update-kernel=ALL --args=max_loop=64
command: /sbin/grubby --update-kernel=ALL --args=max_loop=64
when: max_loop is defined and max_loop.stdout.find("max_loop=64") == -1
tags:
- koji_builder

View file

@ -90,7 +90,7 @@
- config
- name: enable services to start on boot
action: service name={{ item }} state=running enabled=true
service: name={{ item }} state=running enabled=true
with_items:
- koschei-polling
- koschei-resolver

View file

@ -1,9 +1,9 @@
---
- name: restart mailman3
action: service name=mailman3 state=restarted
service: name=mailman3 state=restarted
- name: reload apache
action: service name=httpd state=reloaded
service: name=httpd state=reloaded
- name: restart memcached
action: service name=memcached state=restarted
service: name=memcached state=restarted

View file

@ -12,7 +12,7 @@
- packages
- name: create all the directory for the configuration file
action: file state=directory path=/etc/mdapi
file: state=directory path=/etc/mdapi
tags:
- mdapi
- config

View file

@ -20,7 +20,7 @@
- mediawiki
- name: set sebooleans so apache can send emails
action: seboolean name=httpd_can_sendmail state=yes persistent=yes
seboolean: name=httpd_can_sendmail state=yes persistent=yes
tags:
- mediawiki

View file

@ -20,7 +20,7 @@
- mediawiki
- name: set sebooleans so apache can send emails
action: seboolean name=httpd_can_sendmail state=yes persistent=yes
seboolean: name=httpd_can_sendmail state=yes persistent=yes
tags:
- mediawiki

View file

@ -43,7 +43,7 @@
- config
- name: set sebooleans so mirrormanager can connect to its db
action: seboolean name=httpd_can_network_connect_db
seboolean: name=httpd_can_network_connect_db
state=true
persistent=true
tags:
@ -51,7 +51,7 @@
- config
- name: set sebooleans so mirrormanager can send exception mails
action: seboolean name=httpd_can_sendmail
seboolean: name=httpd_can_sendmail
state=true
persistent=true
tags:

View file

@ -58,7 +58,7 @@
- selinux
- name: set sebooleans so apache can use memcached
action: seboolean name=httpd_can_network_memcache
seboolean: name=httpd_can_network_memcache
state=true
persistent=true
tags:

View file

@ -1,3 +1,3 @@
---
- name: restart nrpe
action: service name=nrpe state=restarted
service: name=nrpe state=restarted

View file

@ -1,3 +1,3 @@
---
- name: restart nrpe
action: service name=nrpe state=restarted
service: name=nrpe state=restarted

View file

@ -64,7 +64,7 @@
- nfs/client
- name: enable nfs-related services and run them (rhel6)
action: service name={{ item }} enabled=true state=started
service: name={{ item }} enabled=true state=started
with_items:
- rpcidmapd
- rpcbind

View file

@ -16,7 +16,7 @@
- nfs/server
- name: enable nfs-related services and run them (fedora)
action: service name={{ item }} enabled=true state=started
service: name={{ item }} enabled=true state=started
with_items:
- nfs-idmap
- rpc-statd
@ -25,7 +25,7 @@
- nfs/server
- name: enable nfs-related services and run them (rhel)
action: service name={{ item }} enabled=true state=started
service: name={{ item }} enabled=true state=started
with_items:
- rpcbind
- nfs-server

View file

@ -30,7 +30,7 @@
- restart apache
- name: create pictures folder where we upload the pictures
action: file state=directory
file: state=directory
path=/var/cache/nuancier/pictures
owner=apache group=apache mode=0700
tags:
@ -38,7 +38,7 @@
- nuancier
- name: create the cache folder where nuancier creates the thumbnails
action: file state=directory
file: state=directory
path=/var/cache/nuancier/cache
owner=apache group=apache mode=0700
tags:
@ -69,7 +69,7 @@
- restart apache
- name: set sebooleans so nuancier can talk to the db
action: seboolean name=httpd_can_network_connect_db
seboolean: name=httpd_can_network_connect_db
state=true
persistent=true
tags:
@ -87,7 +87,7 @@
- selinux
- name: set sebooleans so apache can use glusterfs
action: seboolean name=httpd_use_fusefs
seboolean: name=httpd_use_fusefs
state=true
persistent=true
tags:
@ -95,7 +95,7 @@
- selinux
- name: set sebooleans so apache can send emails
action: seboolean name=httpd_can_sendmail
seboolean: name=httpd_can_sendmail
state=true
persistent=true
tags:

View file

@ -124,14 +124,14 @@
delegate_to: "{{ openqa_dbhost }}"
sudo_user: postgres
sudo: true
action: postgresql_db db={{ openqa_dbname }}
postgresql_db: db={{ openqa_dbname }}
when: "openqa_dbhost is defined"
- name: Ensure db user has access to database
delegate_to: "{{ openqa_dbhost }}"
sudo_user: postgres
sudo: true
action: postgresql_user db={{ openqa_dbname }} user={{ openqa_dbuser }} password={{ openqa_dbpassword }} role_attr_flags=NOSUPERUSER
postgresql_user: db={{ openqa_dbname }} user={{ openqa_dbuser }} password={{ openqa_dbpassword }} role_attr_flags=NOSUPERUSER
when: "openqa_dbhost is defined"
- name: Database config

View file

@ -50,7 +50,7 @@
- pagure
- name: create the /srv/git/.gitolite/conf folder
action: file state=directory
file: state=directory
path=/srv/git/.gitolite/conf
owner=git group=git mode=0775
tags:
@ -58,7 +58,7 @@
- pagure
- name: create the /srv/git/.gitolite/keydir folder
action: file state=directory
file: state=directory
path=/srv/git/.gitolite/keydir
owner=git group=git mode=0775
tags:
@ -66,7 +66,7 @@
- pagure
- name: create the /srv/git/.gitolite/logs folder
action: file state=directory
file: state=directory
path=/srv/git/.gitolite/logs
owner=git group=git mode=0775
tags:
@ -94,7 +94,7 @@
- pagure
- name: create all the directories where we store the git repos
action: file state=directory
file: state=directory
path={{ item }}
owner=git group=git mode=0775
with_items:
@ -109,7 +109,7 @@
- pagure
- name: create the /srv/tmp folder where to clone repos
action: file state=directory
file: state=directory
path=/srv/tmp
owner=git group=git mode=0775
tags:
@ -166,7 +166,7 @@
# Set-up Pagure
- name: create the /var/www/releases folder
action: file state=directory
file: state=directory
path=/var/www/releases
owner=git group=git mode=0775
tags:
@ -258,7 +258,7 @@
- pagure
- name: set sebooleans so pagure can talk to the db
action: seboolean name=httpd_can_network_connect_db
seboolean: name=httpd_can_network_connect_db
state=true
persistent=true
tags:
@ -267,7 +267,7 @@
- pagure
- name: set sebooleans so apache can send emails
action: seboolean name=httpd_can_sendmail
seboolean: name=httpd_can_sendmail
state=true
persistent=true
tags:

View file

@ -41,7 +41,7 @@
- pdc
- name: create /etc/httpd/saml2
action: file state=directory
file: state=directory
path=/etc/httpd/saml2
owner=apache group=apache mode=0775
tags:

View file

@ -3,5 +3,5 @@
#
- name: restart phd
action: service name=phd state=restarted
service: name=phd state=restarted

View file

@ -79,7 +79,7 @@
- pkgdb
- name: set sebooleans so pkgdb2 can talk to the db
action: seboolean name=httpd_can_network_connect_db
seboolean: name=httpd_can_network_connect_db
state=true
persistent=true
tags:
@ -87,7 +87,7 @@
- pkgdb
- name: set sebooleans so apache can send emails
action: seboolean name=httpd_can_sendmail
seboolean: name=httpd_can_sendmail
state=true
persistent=true
tags:
@ -95,7 +95,7 @@
- pkgdb
- name: set sebooleans so apache can talk to memcached0*
action: seboolean name=httpd_can_network_memcache
seboolean: name=httpd_can_network_memcache
state=true
persistent=true
tags:

View file

@ -1,62 +1,62 @@
- name: set root passwd
action: user name=root password={{ builder_rootpw }} state=present
user: name=root password={{ builder_rootpw }} state=present
- name: add mock user as 425
action: user name=mock uid=425 state=present home=/var/lib/mock createhome=yes system=yes
user: name=mock uid=425 state=present home=/var/lib/mock createhome=yes system=yes
- name: make mock homedir 2775
action: file state=directory path=/var/lib/mock mode=2775 owner=mock group=mock
file: state=directory path=/var/lib/mock mode=2775 owner=mock group=mock
- name: add mock ssh dir
action: file state=directory path=/var/lib/mock/.ssh mode=700 owner=mock group=mock
file: state=directory path=/var/lib/mock/.ssh mode=700 owner=mock group=mock
- name: add mock ssh keys
action: copy src="{{ files }}/../roles/koji_builder/files//mock_auth_keys" dest=/var/lib/mock/.ssh/authorized_keys mode=644 owner=mock group=mock
copy: src="{{ files }}/../roles/koji_builder/files//mock_auth_keys" dest=/var/lib/mock/.ssh/authorized_keys mode=644 owner=mock group=mock
- name: add ftpsync group
action: group name=ftpsync gid=263 system=yes state=present
group: name=ftpsync gid=263 system=yes state=present
- name: add ftpsync user
user: name=ftpsync uid=263 group=ftpsync createhome=yes system=yes state=present
- name: add the ftpsync update-fullfilelist script
action: copy src=update-fullfilelist dest=/usr/local/bin/update-fullfilelist owner=ftpsync group=ftpsync mode=555
copy: src=update-fullfilelist dest=/usr/local/bin/update-fullfilelist owner=ftpsync group=ftpsync mode=555
- name: add masher group
action: group name=masher gid=751 system=yes state=present
group: name=masher gid=751 system=yes state=present
# masher user 751
- name: add masher user as 751 - and group
action: user name=masher uid=751 group=masher home=/home/masher groups=mock,ftpsync
user: name=masher uid=751 group=masher home=/home/masher groups=mock,ftpsync
# masher ssh keys and config
- name: add masher ssh dir
action: file state=directory path=/home/masher/.ssh mode=700 owner=masher group=masher
file: state=directory path=/home/masher/.ssh mode=700 owner=masher group=masher
- name: add masher ssh keys
action: copy src="mash/masher.{{ item }}" dest="/home/masher/.ssh/{{ item }}" mode=600 owner=masher group=masher
copy: src="mash/masher.{{ item }}" dest="/home/masher/.ssh/{{ item }}" mode=600 owner=masher group=masher
with_items:
- id_rsa.pub
- config
- name: add masher ssh priv key
action: copy src="{{ private }}/files/mash/masher.id_rsa" dest=/home/masher/.ssh/id_rsa mode=600 owner=masher group=masher
copy: src="{{ private }}/files/mash/masher.id_rsa" dest=/home/masher/.ssh/id_rsa mode=600 owner=masher group=masher
- name: add masher koji cert/key
action: copy src="{{ private }}/files/mash/masher.pem" dest=/home/masher/.fedora.cert mode=600 owner=masher group=masher
copy: src="{{ private }}/files/mash/masher.pem" dest=/home/masher/.fedora.cert mode=600 owner=masher group=masher
- name: add masher koji ca cert
action: copy src="{{ private }}/files/koji/buildercerts/fedora-ca.cert" dest=/home/masher/.fedora-server-ca.cert
copy: src="{{ private }}/files/koji/buildercerts/fedora-ca.cert" dest=/home/masher/.fedora-server-ca.cert
- name: add masher koji ca upload cert
action: copy src="{{ private }}/files/koji/buildercerts/fedora-ca.cert" dest=/home/masher/.fedora-upload-ca.cert
copy: src="{{ private }}/files/koji/buildercerts/fedora-ca.cert" dest=/home/masher/.fedora-upload-ca.cert
- name: add koji ca cert to central system ca-trust
action: copy src="{{ private }}/files/koji/buildercerts/fedora-ca.cert" dest=/etc/pki/ca-trust/source/anchors/fedora-server-ca.cert
copy: src="{{ private }}/files/koji/buildercerts/fedora-ca.cert" dest=/etc/pki/ca-trust/source/anchors/fedora-server-ca.cert
- name: update ca-trust
command: /usr/bin/update-ca-trust
# rawhide group
- name: rawhide group
action: group name=rawhide gid=265
group: name=rawhide gid=265
# rawhide user 265
- name: add rawhide user
action: user name=rawhide uid=265 group=rawhide home=/tmp comment="rawhide compose account"
user: name=rawhide uid=265 group=rawhide home=/tmp comment="rawhide compose account"
- name: make a bunch of dirs
action: file state=directory path={{ item }}
file: state=directory path={{ item }}
with_items:
- /pub
- /epel
@ -127,55 +127,55 @@
# idmapd and make sure it's set to run
- name: idmapd.conf
action: copy src="{{ files }}/../roles/koji_builder/files//idmapd.conf" dest=/etc/idmapd.conf
copy: src="{{ files }}/../roles/koji_builder/files//idmapd.conf" dest=/etc/idmapd.conf
tags:
- configs
- name: make a mnt/koji link
action: file state=link src=/mnt/fedora_koji/koji dest=/mnt/koji
file: state=link src=/mnt/fedora_koji/koji dest=/mnt/koji
when: inventory_hostname.startswith(('compose-x86-01'))
- name: symlink /srv/pungi
action: file src=/mnt/fedora_koji/compose dest=/srv/pungi state=link
file: src=/mnt/fedora_koji/compose dest=/srv/pungi state=link
when: not inventory_hostname.startswith('compose-aarch64-01')
- name: add pkgs for nightly compose
action: yum state=present pkg={{ item }}
yum: state=present pkg={{ item }}
with_items:
- packagedb-cli
when: inventory_hostname.startswith('branched-composer') or inventory_hostname.startswith('rawhide-composer') or inventory_hostname.startswith('composer.stg')
# put cron job in for branched compose
- name: branched compose cron
action: copy src="branched" dest=/etc/cron.d/branched
copy: src="branched" dest=/etc/cron.d/branched
when: inventory_hostname.startswith('branched-composer')
# put cron job in for rawhide compose
- name: rawhide compose cron
action: copy src="rawhide" dest=/etc/cron.d/rawhide
copy: src="rawhide" dest=/etc/cron.d/rawhide
when: inventory_hostname.startswith('rawhide-composer')
# put cron job in for aarch64 branched compose
- name: aarch64 branched compose cron
action: copy src="aarch64.branched" dest=/etc/cron.d/branched
copy: src="aarch64.branched" dest=/etc/cron.d/branched
when: inventory_hostname.startswith('compose-aarch64-01')
# put cron job in for aarch64 rawhide compose
- name: aarch64 rawhide compose cron
action: copy src="aarch64.rawhide" dest=/etc/cron.d/rawhide
copy: src="aarch64.rawhide" dest=/etc/cron.d/rawhide
when: inventory_hostname.startswith('compose-aarch64-01')
# put cron job in for two-week nightly compose
- name: twoweek compose cron
action: copy src="twoweek-updates" dest=/etc/cron.d/twoweek-updates
copy: src="twoweek-updates" dest=/etc/cron.d/twoweek-updates
when: inventory_hostname.startswith('compose-x86-01')
- name: sudoers defaults
action: copy src="{{ private }}/files/sudo/releng-sudoers" dest=/etc/sudoers mode=0440
copy: src="{{ private }}/files/sudo/releng-sudoers" dest=/etc/sudoers mode=0440
tags:
- configs
- name: sudoers for ftpsync
action: copy src="{{ private }}/files/sudo/ftpsync-sudo" dest=/etc/sudoers.d/ftpsync mode=0440
copy: src="{{ private }}/files/sudo/ftpsync-sudo" dest=/etc/sudoers.d/ftpsync mode=0440
tags:
- configs

View file

@ -55,7 +55,7 @@
- services
- name: set sebooleans so rsync can read dirs
action: seboolean name=rsync_export_all_ro
seboolean: name=rsync_export_all_ro
state=true
persistent=true

View file

@ -36,7 +36,7 @@
# This will move a /etc/sudoers.d/ file in place
#
- name: setup /etc/sudoers.d/sudoer file for client use
action: copy src={{ item }} dest=/etc/sudoers.d/{{ item | basename | replace('.', '_') }}
copy: src={{ item }} dest=/etc/sudoers.d/{{ item | basename | replace('.', '_') }}
owner=root group=root mode=0600
with_first_found:
- files:

View file

@ -12,4 +12,4 @@
service: name=nginx state=restarted
- name: restart postfix
action: service name=postfix state=restarted
service: name=postfix state=restarted

View file

@ -63,35 +63,35 @@
delegate_to: "{{ buildmaster_db_host }}"
sudo: true
sudo_user: postgres
action: postgresql_db db={{ buildmaster_db_name }}
postgresql_db: db={{ buildmaster_db_name }}
- name: ensure dev db user has access to dev database
when: deployment_type == 'dev'
delegate_to: "{{ buildmaster_db_host }}"
sudo: true
sudo_user: postgres
action: postgresql_user db={{ buildmaster_db_name }} user={{ dev_buildmaster_db_user }} password={{ dev_buildmaster_db_password }} role_attr_flags=NOSUPERUSER
postgresql_user: db={{ buildmaster_db_name }} user={{ dev_buildmaster_db_user }} password={{ dev_buildmaster_db_password }} role_attr_flags=NOSUPERUSER
- name: ensure stg db user has access to stg database
when: deployment_type == 'stg'
delegate_to: "{{ buildmaster_db_host }}"
sudo: true
sudo_user: postgres
action: postgresql_user db={{ buildmaster_db_name }} user={{ stg_buildmaster_db_user }} password={{ stg_buildmaster_db_password }} role_attr_flags=NOSUPERUSER
postgresql_user: db={{ buildmaster_db_name }} user={{ stg_buildmaster_db_user }} password={{ stg_buildmaster_db_password }} role_attr_flags=NOSUPERUSER
- name: ensure prod db user has access to prod database
when: deployment_type == 'prod'
delegate_to: "{{ buildmaster_db_host }}"
sudo: true
sudo_user: postgres
action: postgresql_user db={{ buildmaster_db_name }} user={{ prod_buildmaster_db_user }} password={{ prod_buildmaster_db_password }} role_attr_flags=NOSUPERUSER
postgresql_user: db={{ buildmaster_db_name }} user={{ prod_buildmaster_db_user }} password={{ prod_buildmaster_db_password }} role_attr_flags=NOSUPERUSER
- name: ensure local db user has access to local database
when: deployment_type == 'local'
delegate_to: "{{ buildmaster_db_host }}"
sudo: true
sudo_user: postgres
action: postgresql_user db={{ buildmaster_db_name }} user={{ local_buildmaster_db_user }} password={{ local_buildmaster_db_password }} role_attr_flags=NOSUPERUSER
postgresql_user: db={{ buildmaster_db_name }} user={{ local_buildmaster_db_user }} password={{ local_buildmaster_db_password }} role_attr_flags=NOSUPERUSER
- name: put robots.txt at web root of external hostname
when: robots_path is defined

View file

@ -21,35 +21,35 @@
delegate_to: "{{ execdb_db_host_machine }}"
sudo_user: postgres
sudo: true
action: postgresql_db db={{ execdb_db_name }}
postgresql_db: db={{ execdb_db_name }}
- name: ensure dev execdb db user has access to dev database
when: deployment_type == 'dev'
delegate_to: "{{ execdb_db_host_machine }}"
sudo_user: postgres
sudo: true
action: postgresql_user db={{ execdb_db_name }} user={{ execdb_db_user }} password={{ execdb_db_password }} role_attr_flags=NOSUPERUSER
postgresql_user: db={{ execdb_db_name }} user={{ execdb_db_user }} password={{ execdb_db_password }} role_attr_flags=NOSUPERUSER
- name: ensure stg execdb db user has access to stg database
when: deployment_type == 'stg'
delegate_to: "{{ execdb_db_host }}"
sudo_user: postgres
sudo: true
action: postgresql_user db={{ execdb_db_name }} user={{ stg_execdb_db_user }} password={{ stg_execdb_db_password }} role_attr_flags=NOSUPERUSER
postgresql_user: db={{ execdb_db_name }} user={{ stg_execdb_db_user }} password={{ stg_execdb_db_password }} role_attr_flags=NOSUPERUSER
- name: ensure prod execdb db user has access to prod database
when: deployment_type == 'prod'
delegate_to: "{{ execdb_db_host }}"
sudo_user: postgres
sudo: true
action: postgresql_user db={{ execdb_db_name }} user={{ prod_execdb_db_user }} password={{ prod_execdb_db_password }} role_attr_flags=NOSUPERUSER
postgresql_user: db={{ execdb_db_name }} user={{ prod_execdb_db_user }} password={{ prod_execdb_db_password }} role_attr_flags=NOSUPERUSER
- name: ensure local execdb db user has access to prod database
when: deployment_type == 'local'
delegate_to: "{{ execdb_db_host }}"
sudo_user: postgres
sudo: true
action: postgresql_user db={{ execdb_db_name }} user={{ local_execdb_db_user }} password={{ local_execdb_db_password }} role_attr_flags=NOSUPERUSER
postgresql_user: db={{ execdb_db_name }} user={{ local_execdb_db_user }} password={{ local_execdb_db_password }} role_attr_flags=NOSUPERUSER
- name: ensure selinux lets httpd talk to postgres
seboolean: name=httpd_can_network_connect_db persistent=yes state=yes

View file

@ -1,12 +1,12 @@
- name: ensure packages required for fakefedorainfra are installed
action: yum name={{ item }} state=latest
yum: name={{ item }} state=latest
when: deployment_type == 'prod' or deployment_type == 'local'
with_items:
- mod_wsgi
- fake_fedorainfra
- name: ensure packages required for fakefedorainfra are installed (infra-testing)
action: yum name={{ item }} state=latest enablerepo=infrastructure-testing
yum: name={{ item }} state=latest enablerepo=infrastructure-testing
when: deployment_type == 'dev' or deployment_type == 'stg'
with_items:
- mod_wsgi
@ -16,28 +16,28 @@
delegate_to: "{{ buildmaster_db_host }}"
sudo: true
sudo_user: postgres
action: postgresql_db db={{ fakefedorainfra_db_name }}
postgresql_db: db={{ fakefedorainfra_db_name }}
- name: ensure stg fakefedorainfra user has access to stg database
when: deployment_type == 'stg'
delegate_to: "{{ buildmaster_db_host }}"
sudo: true
sudo_user: postgres
action: postgresql_user db={{ fakefedorainfra_db_name }} user={{ stg_fakefedorainfra_db_user }} password={{ stg_fakefedorainfra_db_password }} role_attr_flags=NOSUPERUSER
postgresql_user: db={{ fakefedorainfra_db_name }} user={{ stg_fakefedorainfra_db_user }} password={{ stg_fakefedorainfra_db_password }} role_attr_flags=NOSUPERUSER
- name: ensure dev fakefedorainfra user has access to dev database
when: deployment_type == 'dev'
delegate_to: "{{ buildmaster_db_host }}"
sudo: true
sudo_user: postgres
action: postgresql_user db={{ fakefedorainfra_db_name }} user={{ dev_fakefedorainfra_db_user }} password={{ dev_fakefedorainfra_db_password }} role_attr_flags=NOSUPERUSER
postgresql_user: db={{ fakefedorainfra_db_name }} user={{ dev_fakefedorainfra_db_user }} password={{ dev_fakefedorainfra_db_password }} role_attr_flags=NOSUPERUSER
- name: ensure local fakefedorainfra user has access to local database
when: deployment_type == 'local'
delegate_to: "{{ buildmaster_db_host }}"
sudo: true
sudo_user: postgres
action: postgresql_user db={{ fakefedorainfra_db_name }} user={{ local_fakefedorainfra_db_user }} password={{ local_fakefedorainfra_db_password }} role_attr_flags=NOSUPERUSER
postgresql_user: db={{ fakefedorainfra_db_name }} user={{ local_fakefedorainfra_db_user }} password={{ local_fakefedorainfra_db_password }} role_attr_flags=NOSUPERUSER
- name: generate fakefedorainfra config
template: src=settings.py.j2 dest=/etc/fake_fedorainfra/settings.py owner=root group=root mode=0644

View file

@ -21,28 +21,28 @@
delegate_to: "{{ resultsdb_db_host_machine }}"
sudo_user: postgres
sudo: true
action: postgresql_db db={{ resultsdb_db_name }}
postgresql_db: db={{ resultsdb_db_name }}
- name: ensure resultsdb db user has access to database
when: deployment_type == 'dev' or deployment_type == 'local'
delegate_to: "{{ resultsdb_db_host_machine }}"
sudo_user: postgres
sudo: true
action: postgresql_user db={{ resultsdb_db_name }} user={{ resultsdb_db_user }} password={{ resultsdb_db_password }} role_attr_flags=NOSUPERUSER
postgresql_user: db={{ resultsdb_db_name }} user={{ resultsdb_db_user }} password={{ resultsdb_db_password }} role_attr_flags=NOSUPERUSER
- name: ensure stg resultsdb db user has access to stg database
when: deployment_type == 'stg'
delegate_to: "{{ resultsdb_db_host }}"
sudo_user: postgres
sudo: true
action: postgresql_user db={{ resultsdb_db_name }} user={{ stg_resultsdb_db_user }} password={{ stg_resultsdb_db_password }} role_attr_flags=NOSUPERUSER
postgresql_user: db={{ resultsdb_db_name }} user={{ stg_resultsdb_db_user }} password={{ stg_resultsdb_db_password }} role_attr_flags=NOSUPERUSER
- name: ensure prod resultsdb db user has access to prod database
when: deployment_type == 'prod'
delegate_to: "{{ resultsdb_db_host }}"
sudo_user: postgres
sudo: true
action: postgresql_user db={{ resultsdb_db_name }} user={{ prod_resultsdb_db_user }} password={{ prod_resultsdb_db_password }} role_attr_flags=NOSUPERUSER
postgresql_user: db={{ resultsdb_db_name }} user={{ prod_resultsdb_db_user }} password={{ prod_resultsdb_db_password }} role_attr_flags=NOSUPERUSER
- name: ensure selinux lets httpd talk to postgres
seboolean: name=httpd_can_network_connect_db persistent=yes state=yes

View file

@ -1,6 +1,6 @@
---
- name: ensure packages required for testdays are installed
action: yum name={{ item }} state=present
yum: name={{ item }} state=present
with_items:
- testdays
- mod_wsgi
@ -11,13 +11,13 @@
delegate_to: "{{ testdays_db_host }}"
sudo_user: postgres
sudo: true
action: postgresql_db db={{ testdays_db_name }}
postgresql_db: db={{ testdays_db_name }}
- name: ensure testdays db user has access to database
delegate_to: "{{ testdays_db_host }}"
sudo_user: postgres
sudo: true
action: postgresql_user db={{ testdays_db_name }} user={{ testdays_db_user }} password={{ testdays_db_password }} role_attr_flags=NOSUPERUSER
postgresql_user: db={{ testdays_db_name }} user={{ testdays_db_user }} password={{ testdays_db_password }} role_attr_flags=NOSUPERUSER
- name: ensure selinux lets httpd talk to postgres
seboolean: name=httpd_can_network_connect_db persistent=yes state=yes

View file

@ -19,7 +19,7 @@
- { file: ykval-config.php, dest: /etc/ykval/ykval-config.php }
- name: symlink the configuration files to /usr/share/...
action: file src={{item.file}} dest={{ item.dest }} state=link
file: src={{item.file}} dest={{ item.dest }} state=link
with_items:
- {file: /etc/ykval/ykval-config.php, dest: /usr/share/ykval/ykval-config.php }
- {file: /etc/ykksm/ykksm-config.php, dest: /usr/share/ykksm/ykksm-config.php }