system-config/playbooks/roles/zuul-user/README.rst
Monty Taylor 9fd2135a46 Split eavesdrop into its own playbook
Extract eavedrop into its own service playbook and
puppet manifest. While doing that, stop using jenkinsuser
on eavesdrop in favor of zuul-user.

Add the ability to override the keys for the zuul user.

Remove openstack_project::server, it doesn't do anything.

Containerize and anisblize accessbot. The structure of
how we're doing it in puppet makes it hard to actually
run the puppet in the gate. Run the script in its own
playbook so that we can avoid running it in the gate.

Change-Id: I53cb63ffa4ae50575d4fa37b24323ad13ec1bac3
2020-04-23 14:34:28 -05:00

17 lines
390 B
ReStructuredText

zuul user
Install a user ``zuul`` that has the per-project key from
``system-config`` as an ``authorized_key``.
**Role Variables**
.. zuul:rolevar:: zuul_user_enable_sudo
:default: False
Enable passwordless ``sudo`` access for the zuul user.
.. zuul:rolevar:: zuul_user_authorized_key
:default: per-project key from system-config
Authorized key content for the zuul user.