Changeset - 6d61ce0ca2c9
roles/backup/molecule/default/group_vars/parameters-mandatory.yml
Show inline comments
 
---
 

	
 
backup_patterns_filename: "test"
 

	
 
# backup_client role parameters.
 
backup_encryption_key: "{{ lookup('file', 'tests/data/gnupg/parameters-mandatory.asc') }}"
 
backup_server: 10.31.127.10
 
backup_server_host_ssh_public_keys:
 
  - "{{ lookup('file', 'tests/data/ssh/server_rsa.pub') }}"
 
  - "{{ lookup('file', 'tests/data/ssh/server_ed25519.pub') }}"
 
  - "{{ lookup('file', 'tests/data/ssh/server_ecdsa.pub') }}"
 
backup_ssh_key: "{{ lookup('file', 'tests/data/ssh/parameters-mandatory' ) }}"
 
backup_ssh_key: "{{ lookup('file', 'tests/data/ssh/parameters-mandatory') }}"
roles/backup/molecule/default/group_vars/parameters-optional.yml
Show inline comments
 
@@ -4,13 +4,13 @@ backup_patterns_filename: "test"
 
backup_patterns:
 
  - /etc/hosts
 
  - /etc/ethers
 
  - /var/log
 

	
 
# backup_client role parameters.
 
backup_encryption_key: "{{ lookup('file', 'tests/data/gnupg/parameters-optional.asc') }}"
 
backup_server: 10.31.127.10
 
backup_server_host_ssh_public_keys:
 
  - "{{ lookup('file', 'tests/data/ssh/server_rsa.pub') }}"
 
  - "{{ lookup('file', 'tests/data/ssh/server_ed25519.pub') }}"
 
  - "{{ lookup('file', 'tests/data/ssh/server_ecdsa.pub') }}"
 
backup_ssh_key: "{{ lookup('file', 'tests/data/ssh/parameters-mandatory' ) }}"
 
backup_ssh_key: "{{ lookup('file', 'tests/data/ssh/parameters-mandatory') }}"
roles/backup_client/molecule/default/group_vars/parameters-mandatory.yml
Show inline comments
 
---
 

	
 
backup_encryption_key: "{{ lookup('file', 'tests/data/gnupg/parameters-mandatory.asc') }}"
 
backup_server: 192.168.56.10
 
backup_server_host_ssh_public_keys:
 
  - "{{ lookup('file', 'tests/data/ssh/server_rsa.pub') }}"
 
  - "{{ lookup('file', 'tests/data/ssh/server_ed25519.pub') }}"
 
  - "{{ lookup('file', 'tests/data/ssh/server_ecdsa.pub') }}"
 
backup_ssh_key: "{{ lookup('file', 'tests/data/ssh/parameters-mandatory' ) }}"
 
backup_ssh_key: "{{ lookup('file', 'tests/data/ssh/parameters-mandatory') }}"
roles/backup_client/molecule/default/group_vars/parameters-optional.yml
Show inline comments
 
@@ -4,13 +4,13 @@ backup_additional_encryption_keys:
 
  - "{{ lookup('file', 'tests/data/gnupg/additional_encryption_key_1.asc') }}"
 
  - "{{ lookup('file', 'tests/data/gnupg/additional_encryption_key_2.asc') }}"
 
  - "{{ lookup('file', 'tests/data/gnupg/additional_encryption_key_3.asc') }}"
 
backup_client_username: backupuser
 
backup_encryption_key: "{{ lookup('file', 'tests/data/gnupg/parameters-optional.asc') }}"
 
backup_server: 192.168.56.10
 
backup_server_destination: "/duplicity/{{ inventory_hostname }}"
 
backup_server_host_ssh_public_keys:
 
  - "{{ lookup('file', 'tests/data/ssh/server_rsa.pub') }}"
 
  - "{{ lookup('file', 'tests/data/ssh/server_ed25519.pub') }}"
 
  - "{{ lookup('file', 'tests/data/ssh/server_ecdsa.pub') }}"
 
backup_server_port: 3333
 
backup_ssh_key: "{{ lookup('file', 'tests/data/ssh/parameters-optional' ) }}"
 
backup_ssh_key: "{{ lookup('file', 'tests/data/ssh/parameters-optional') }}"
roles/database/molecule/default/group_vars/parameters-optional.yml
Show inline comments
 
@@ -3,13 +3,13 @@
 
db_name: testdb
 
db_password: testdbpassword
 
enable_backup: true
 

	
 
# backup_client
 
backup_client_username: "bak-localhost"
 
backup_encryption_key: "{{ lookup('file', 'tests/data/gnupg/parameters-optional.asc') }}"
 
backup_server: localhost
 
backup_server_host_ssh_public_keys:
 
  - "{{ lookup('file', 'tests/data/ssh/server_rsa.pub') }}"
 
  - "{{ lookup('file', 'tests/data/ssh/server_ed25519.pub') }}"
 
  - "{{ lookup('file', 'tests/data/ssh/server_ecdsa.pub') }}"
 
backup_ssh_key: "{{ lookup('file', 'tests/data/ssh/parameters-optional' ) }}"
 
backup_ssh_key: "{{ lookup('file', 'tests/data/ssh/parameters-optional') }}"
roles/ldap_server/molecule/default/group_vars/parameters-optional.yml
Show inline comments
 
@@ -67,13 +67,13 @@ ldap_client_config:
 
    option: TLS_REQCERT
 
    value: demand
 

	
 
# backup_client
 
enable_backup: true
 
backup_client_username: "bak-localhost"
 
backup_encryption_key: "{{ lookup('file', 'tests/data/gnupg/parameters-optional.asc') }}"
 
backup_server: localhost
 
backup_server_host_ssh_public_keys:
 
  - "{{ lookup('file', 'tests/data/ssh/server_rsa.pub') }}"
 
  - "{{ lookup('file', 'tests/data/ssh/server_ed25519.pub') }}"
 
  - "{{ lookup('file', 'tests/data/ssh/server_ecdsa.pub') }}"
 
backup_ssh_key: "{{ lookup('file', 'tests/data/ssh/parameters-optional' ) }}"
 
backup_ssh_key: "{{ lookup('file', 'tests/data/ssh/parameters-optional') }}"
roles/mail_server/molecule/default/group_vars/parameters-optional.yml
Show inline comments
 
@@ -40,13 +40,13 @@ release_based_smtp_allow_relay_from:
 
ca_certificates:
 
  testca: "{{ lookup('file', 'tests/data/x509/ca/level1.cert.pem') }}"
 

	
 
# backup_client
 
enable_backup: true
 
backup_client_username: "bak-param-optional-{{ ansible_distribution_release }}"
 
backup_encryption_key: "{{ lookup('file', 'tests/data/gnupg/parameters-optional.asc') }}"
 
backup_server: ldap-server
 
backup_server_host_ssh_public_keys:
 
  - "{{ lookup('file', 'tests/data/ssh/server_rsa.pub') }}"
 
  - "{{ lookup('file', 'tests/data/ssh/server_ed25519.pub') }}"
 
  - "{{ lookup('file', 'tests/data/ssh/server_ecdsa.pub') }}"
 
backup_ssh_key: "{{ lookup('file', 'tests/data/ssh/parameters-optional' ) }}"
 
backup_ssh_key: "{{ lookup('file', 'tests/data/ssh/parameters-optional') }}"
roles/mail_server/molecule/default/prepare.yml
Show inline comments
 
@@ -13,25 +13,25 @@
 
        chdir: "tests/data/"
 

	
 
    - name: Generate server private keys and certificates
 
      command:
 
      args:
 
        chdir: "tests/data/"
 
        creates: ".gimmecert/server/{{ item.name }}.cert.pem"
 
        argv:
 
          - "gimmecert"
 
          - "server"
 
          - "{{ item.name }}"
 
          - "{{ item.fqdn }}"
 
          - "{{ item.fqdn[:item.fqdn.rfind('-')] }}"
 
          - "{{ item.fqdn[: item.fqdn.rfind('-')] }}"
 
      with_items:
 
        - name: clamav-database_https
 
          fqdn: database.clamav.net
 
        - name: ldap-server_ldap
 
          fqdn: ldap-server
 

	
 
        - name: parameters-mandatory-bookworm_imap
 
          fqdn: parameters-mandatory-bookworm
 
        - name: parameters-mandatory-bookworm_smtp
 
          fqdn: parameters-mandatory-bookworm
 
        - name: parameters-optional-bookworm_imap
 
          fqdn: parameters-optional-bookworm
roles/wsgi_website/tasks/main.yml
Show inline comments
 
@@ -291,25 +291,25 @@
 
- name: Set-up empty list of WSGI services to restart
 
  set_fact:
 
    wsgi_services_to_restart: []
 
  when: "wsgi_services_to_restart is not defined"
 
  tags:
 
    - handlers
 

	
 
- name: Add service to list of WSGI services to restart  # noqa 503
 
  # [503] Tasks that run when changed should likely be handlers
 
  #   This specific task is used in order to work around inability of Ansible
 
  #   to provide properly parametrised handlers for reusable roles.
 
  set_fact:
 
    wsgi_services_to_restart: "{{ wsgi_services_to_restart + [ fqdn ] }}"
 
    wsgi_services_to_restart: "{{ wsgi_services_to_restart + [fqdn] }}"
 
  when: |
 
    fqdn not in wsgi_services_to_restart and
 
    ((install_extra_packages is defined and install_extra_packages.changed) or
 
    (install_additional_packages_in_virtualenv is defined and install_additional_packages_in_virtualenv.changed) or
 
    (deploy_systemd_socket_configuration is defined and deploy_systemd_socket_configuration.changed) or
 
    (deploy_systemd_service_configuration is defined and deploy_systemd_service_configuration.changed) or
 
    (install_gunicorn_via_requirements is defined and install_gunicorn_via_requirements.changed) or
 
    (run_handlers | default(False) | bool()))
 
  tags:
 
    - handlers
 

	
 
- name: Explicitly run all handlers
roles/xmpp_server/molecule/default/group_vars/parameters-optional.yml
Show inline comments
 
@@ -21,13 +21,13 @@ ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:!aNULL:!MD5:!EXPORT"
 
ca_certificates:
 
  testca: "{{ lookup('file', 'tests/data/x509/ca/level1.cert.pem') }}"
 

	
 
# backup_client
 
enable_backup: true
 
backup_client_username: "bak-parameters-optional-{{ ansible_distribution_release }}"
 
backup_encryption_key: "{{ lookup('file', 'tests/data/gnupg/parameters-optional.asc') }}"
 
backup_server: backup-server
 
backup_server_host_ssh_public_keys:
 
  - "{{ lookup('file', 'tests/data/ssh/server_rsa.pub') }}"
 
  - "{{ lookup('file', 'tests/data/ssh/server_ed25519.pub') }}"
 
  - "{{ lookup('file', 'tests/data/ssh/server_ecdsa.pub') }}"
 
backup_ssh_key: "{{ lookup('file', 'tests/data/ssh/parameters-optional' ) }}"
 
backup_ssh_key: "{{ lookup('file', 'tests/data/ssh/parameters-optional') }}"
0 comments (0 inline, 0 general)