style: fix yaml
Some checks failed
continuous-integration/drone/push Build is failing

This commit is contained in:
vincent 2022-11-29 21:23:44 +01:00
parent 69c5e14b47
commit 5f105ae8e9
10 changed files with 21 additions and 21 deletions

View File

@ -1,8 +1,8 @@
--- ---
prerun: false prerun: false
dependency: dependency:
name: galaxy name: galaxy
enabled: False enabled: false
driver: driver:
name: lxd name: lxd
platforms: platforms:
@ -35,7 +35,6 @@ provisioner:
name: ansible-lint name: ansible-lint
inventory: inventory:
host_vars: [] host_vars: []
links: links:
group_vars: ../../group_vars group_vars: ../../group_vars
hosts: ../../staging hosts: ../../staging

View File

@ -1,9 +1,9 @@
---
- hosts: all - hosts: all
remote_user: root remote_user: root
become: true become: true
gather_facts: false gather_facts: false
tasks: tasks:
- name: Init pacman - name: Init pacman
ansible.builtin.include_role: ansible.builtin.include_role:
name: ansible_bootstrap name: ansible_bootstrap

View File

@ -1,3 +1,4 @@
---
- hosts: all - hosts: all
roles: roles:
- role: ansible-consul - role: ansible-consul

View File

@ -5,12 +5,12 @@
roles: roles:
- role: ansible-role-postgresql - role: ansible-role-postgresql
become: true become: true
tasks: tasks:
- name: add pg_read_all_data to dump - name: add pg_read_all_data to dump
community.postgresql.postgresql_membership: community.postgresql.postgresql_membership:
target_roles: target_roles:
- dump - dump
groups: groups:
- pg_read_all_data - pg_read_all_data
become: true become: true
become_user: "{{ postgresql_user }}" become_user: "{{ postgresql_user }}"

View File

@ -5,4 +5,3 @@
- cronie - cronie
- hass-client-control - hass-client-control
- mpd - mpd

View File

@ -1,5 +1,5 @@
--- ---
- hosts: - hosts:
- homelab - homelab
- VPS - VPS
vars: vars:

View File

@ -2,7 +2,7 @@
- hosts: all - hosts: all
roles: roles:
- role: ansible-role-sssd - role: ansible-role-sssd
become: True become: true
tasks: tasks:
- name: simulate login - name: simulate login
stat: stat:
@ -12,12 +12,12 @@
when: sssd_configure == true when: sssd_configure == true
- name: create profil - name: create profil
user: user:
name: "{{user.name}}" # required. Name of the user to create, remove or modify. name: "{{user.name}}"
create_home: yes # not required. Unless set to C(no), a home directory will be made for the user when the account is created or if the home directory does not exist.,Changed from C(createhome) to C(create_home) in version 2.5. create_home: yes
password: "{{userPassword}}" # not required. Optionally set the user's password to this crypted value.,On macOS systems, this value has to be cleartext. Beware of security issues.,See U(https://docs.ansible.com/ansible/faq.html#how-do-i-generate-crypted-passwords-for-the-user-module) for details on various ways to generate these password values. password: "{{userPassword}}"
system: no # not required. When creating an account C(state=present), setting this to C(yes) makes the user a system account. This setting cannot be changed on existing users. system: no
state: present # not required. choices: absent;present. Whether the account should exist or not, taking action if the state is different from what is stated. state: present
ssh_key_file: .ssh/id_rsa # not required. Optionally specify the SSH key filename. If this is a relative filename then it will be relative to the user's home directory. ssh_key_file: .ssh/id_rsa
uid: "{{ user.uid }}" uid: "{{ user.uid }}"
shell: /bin/bash shell: /bin/bash
when: sssd_configure is not defined or sssd_configure == false when: sssd_configure is not defined or sssd_configure == false

View File

@ -1,3 +1,4 @@
---
- hosts: all - hosts: all
vars: vars:
roles: roles:

View File

@ -2,4 +2,4 @@
- hosts: wireguard - hosts: wireguard
roles: roles:
- role: ansible-role-wireguard - role: ansible-role-wireguard
become: True become: true

View File

@ -10,8 +10,8 @@
remote_user: root remote_user: root
vars: vars:
ansible_password: "{{ lookup('hashi_vault','secret=secrets/data/ansible/user:root') }}" ansible_password: "{{ lookup('hashi_vault','secret=secrets/data/ansible/user:root') }}"
roles: roles:
- ansible_bootstrap - ansible_bootstrap
#- remote_user: "{{ user.name }}" # - remote_user: "{{ user.name }}"
#import_playbook: site.yml # import_playbook: site.yml