Skip to content

Commit

Permalink
Fixed new linter issues.
Browse files Browse the repository at this point in the history
  • Loading branch information
pneerincx committed Feb 16, 2023
1 parent 5b506d2 commit ee1c86c
Show file tree
Hide file tree
Showing 12 changed files with 18 additions and 18 deletions.
2 changes: 1 addition & 1 deletion roles/grafana/meta/main.yml
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@ galaxy_info:
role_name: grafana
author: Pieter Neerincx (UMCG) Egon Rijpkema (UG)
description: runs grafana in a docker container.
min_ansible_version: 2.4
min_ansible_version: '2.4'
license: "license (GPLv3)"
platforms:
- name: CentOS
Expand Down
4 changes: 2 additions & 2 deletions roles/grafana/tasks/main.yml
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@
ansible.builtin.file:
path: "{{ item }}"
state: directory
mode: 0755
mode: '0755'
owner: '65534'
with_items:
- '/srv/grafana/lib'
Expand All @@ -15,7 +15,7 @@
ansible.builtin.template:
src: 'templates/grafana.service'
dest: '/etc/systemd/system/grafana.service'
mode: 0644
mode: '0644'
owner: root
group: root
tags:
Expand Down
4 changes: 2 additions & 2 deletions roles/grafana_proxy/tasks/main.yml
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@
ansible.builtin.template:
src: templates/nginx.conf
dest: /etc/nginx/nginx.conf
mode: 0644
mode: '0644'
owner: root
group: root
become: true
Expand All @@ -19,7 +19,7 @@
ansible.builtin.file:
path: /etc/certificates/live/airlock.hpc.rug.nl
state: directory
mode: 0751
mode: '0751'
become: true

- name: Copy certificate and chain files in place.
Expand Down
2 changes: 1 addition & 1 deletion roles/iptables/tasks/main.yml
Original file line number Diff line number Diff line change
Expand Up @@ -72,7 +72,7 @@
dest: '/etc/sysconfig/iptables-init.bash'
owner: root
group: root
mode: 0700
mode: '0700'
notify: configure_iptables
become: true

Expand Down
4 changes: 2 additions & 2 deletions roles/pulp_server/tasks/main.yml
Original file line number Diff line number Diff line change
Expand Up @@ -188,7 +188,7 @@
ansible.builtin.template:
src: templates/repo_management_user.netrc.j2
dest: "/admin/{{ repo_management_user }}/.netrc"
mode: 0600
mode: '0600'
owner: "{{ repo_management_user }}"
group: "{{ repo_management_user }}"
become: true
Expand All @@ -198,7 +198,7 @@
ansible.builtin.template:
src: templates/repo_management_user.settings.toml.j2
dest: "/admin/{{ repo_management_user }}/.config/pulp/settings.toml"
mode: 0600
mode: '0600'
owner: "{{ repo_management_user }}"
group: "{{ repo_management_user }}"
become: true
Expand Down
4 changes: 2 additions & 2 deletions roles/rsyslog_client/tasks/client.yml
Original file line number Diff line number Diff line change
Expand Up @@ -50,7 +50,7 @@
ansible.builtin.template:
src: templates/client_template.csr
dest: /tmp/client_template.csr
mode: 0600
mode: '0600'
force: true
when: not remote_client_key_status.stat.exists or verify_certificate_result.rc == 1

Expand Down Expand Up @@ -100,7 +100,7 @@
ansible.builtin.template:
src: templates/client_template.csr
dest: /tmp/{{ inventory_hostname }}_client_template.csr
mode: 0600
mode: '0600'
force: true
become: true
when: not remote_client_key_status.stat.exists or verify_certificate_result.rc == 1
Expand Down
6 changes: 3 additions & 3 deletions roles/rsyslog_client/tasks/deploy.yml
Original file line number Diff line number Diff line change
Expand Up @@ -19,7 +19,7 @@
src: templates/rsyslog.conf
dest: /etc/rsyslog.conf
force: true
mode: 0644
mode: '0644'
become: true
when: inventory_hostname not in groups['rsyslog']
notify: client_restart_rsyslog
Expand All @@ -29,7 +29,7 @@
src: templates/rsyslog_managed.conf
dest: /etc/rsyslog.d/managed.conf
force: true
mode: 0644
mode: '0644'
become: true
when: inventory_hostname not in groups['rsyslog']
notify: client_restart_rsyslog
Expand All @@ -39,7 +39,7 @@
src: templates/rsyslog_unmanaged.conf
dest: /etc/rsyslog.d/unmanaged.conf
force: true
mode: 0644
mode: '0644'
become: true
when: inventory_hostname not in groups['rsyslog']
notify: client_restart_rsyslog
Expand Down
2 changes: 1 addition & 1 deletion roles/rsyslog_server/tasks/create_ca.yml
Original file line number Diff line number Diff line change
Expand Up @@ -24,7 +24,7 @@
ansible.builtin.template:
src: roles/rsyslog_server/templates/ca.template
dest: /tmp/ca.template
mode: 0600
mode: '0600'
when: not ca_key_on_server.stat.exists

- name: Generate CA cert on managed rsyslog server
Expand Down
2 changes: 1 addition & 1 deletion roles/rsyslog_server/tasks/rsyslog.yml
Original file line number Diff line number Diff line change
Expand Up @@ -93,7 +93,7 @@
src: roles/rsyslog_server/templates/rsyslog.conf
dest: /etc/rsyslog.conf
force: true
mode: 0644
mode: '0644'
become: true
notify: restart-rsyslog.service

Expand Down
2 changes: 1 addition & 1 deletion roles/ssh_known_hosts/tasks/main.yml
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
- name: Create /etc/ssh/ssh_known_hosts file with public key from CA that signed the host keys.
ansible.builtin.copy:
dest: /etc/ssh/ssh_known_hosts
mode: 0644
mode: '0644'
owner: root
group: root
content: "@cert-authority * {{ lookup('file', ssh_host_signer_ca_private_key + '.pub') }}"
Expand Down
2 changes: 1 addition & 1 deletion roles/static_hostname_lookup/tasks/main.yml
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@
ansible.builtin.template:
src: templates/hosts.j2
dest: /etc/hosts
mode: 0644
mode: '0644'
owner: root
group: root
backup: true
Expand Down
2 changes: 1 addition & 1 deletion roles/swap/tasks/enable_swap.yml
Original file line number Diff line number Diff line change
Expand Up @@ -18,7 +18,7 @@
path: "{{ swap_file_path }}"
owner: root
group: root
mode: 0600
mode: '0600'
become: true

- name: Add swap file entry to fstab.
Expand Down

0 comments on commit ee1c86c

Please sign in to comment.