2875f64ed3
The gitea and static services both deploy apache using our UA filters. We were not testing these services when updating UA filters. This change fixes that giving us some basic sanity checking that UA filter updates are functional and quicker deployments of these filters. Change-Id: Icbe6558bb47946299a43905e2f64522576bad939
1256 lines
40 KiB
YAML
1256 lines
40 KiB
YAML
- job:
|
|
name: system-config-run
|
|
timeout: 3600
|
|
description: |
|
|
Run the "base" playbook for system-config hosts.
|
|
|
|
This is a parent job designed to be inherited.
|
|
abstract: true
|
|
pre-run: playbooks/zuul/run-base-pre.yaml
|
|
run: playbooks/zuul/run-base.yaml
|
|
post-run: playbooks/zuul/run-base-post.yaml
|
|
vars:
|
|
zuul_copy_output: "{{ copy_output | combine(host_copy_output | default({})) }}"
|
|
stage_dir: "{{ ansible_user_dir }}/zuul-output"
|
|
copy_output:
|
|
'/var/log/syslog': logs_txt
|
|
'/var/log/messages': logs_txt
|
|
'/var/log/exim4': logs
|
|
'/var/log/docker': logs
|
|
'/var/log/containers': logs
|
|
'/var/log/dstat-csv.log': logs
|
|
'/etc/iptables/rules.v4': logs_txt
|
|
'/etc/iptables/rules.v6': logs_txt
|
|
host-vars:
|
|
bridge99.opendev.org:
|
|
install_ansible_ara_enable: true
|
|
host_copy_output:
|
|
'{{ zuul.project.src_dir }}/junit.xml': logs
|
|
'{{ zuul.project.src_dir }}/test-results.html': logs
|
|
'{{ zuul.project.src_dir }}/inventory/base/gate-hosts.yaml': logs
|
|
'/var/log/screenshots': logs
|
|
'/var/log/ansible': logs
|
|
|
|
# Note: the following two jobs implement the variant-based multiple
|
|
# inheritance trick. Both of these variants will always apply,
|
|
# therefore both parents will appear in the inheritance hierarchy).
|
|
- job:
|
|
name: system-config-run-containers
|
|
parent: system-config-run
|
|
|
|
# Note: see above re multiple-inheritance.
|
|
- job:
|
|
name: system-config-run-containers
|
|
parent: opendev-buildset-registry-consumer
|
|
description: |
|
|
Run the "base" playbook for system-config hosts which use
|
|
containers.
|
|
|
|
This is a parent job designed to be inherited. Use this job if
|
|
the service in question is container-based. It expects a
|
|
buildset registry and pulls images from the intermediate
|
|
registry.
|
|
|
|
- job:
|
|
name: system-config-run-base
|
|
parent: system-config-run
|
|
description: |
|
|
Run the "base" playbook on each of the node types
|
|
currently in use.
|
|
nodeset:
|
|
nodes:
|
|
- &bridge_node_x86 { name: bridge99.opendev.org, label: ubuntu-jammy }
|
|
- name: xenial
|
|
label: ubuntu-xenial
|
|
- name: bionic
|
|
label: ubuntu-bionic
|
|
- name: focal
|
|
label: ubuntu-focal
|
|
- name: jammy
|
|
label: ubuntu-jammy
|
|
groups:
|
|
# Each job should define this group -- to avoid hard-coding
|
|
# the bastion hostname in the job setup, playbooks/tasks refer
|
|
# to it only by this group. This should only have one entry
|
|
# -- in a couple of places the jobs use the actual hostname
|
|
# and assume element [0] here is that hostname.
|
|
#
|
|
# Note that this shouldn't be confused with the group in
|
|
# inventory/service/groups.yaml -- this group contains the
|
|
# host that Zuul, running on the executor, will setup as the
|
|
# bridge node. This node will then run a nested Ansible to
|
|
# test the production playbooks -- *that* Ansible has a
|
|
# "bastion" group too
|
|
- &bastion_group { name: prod_bastion, nodes: [ bridge99.opendev.org ] }
|
|
files:
|
|
- tox.ini
|
|
- playbooks/
|
|
- roles/
|
|
- testinfra/
|
|
|
|
- job:
|
|
name: system-config-run-base-ansible-devel
|
|
parent: system-config-run-base
|
|
description: |
|
|
Run the base playbook with the latest ansible.
|
|
nodeset:
|
|
nodes:
|
|
- <<: *bridge_node_x86
|
|
- name: xenial
|
|
label: ubuntu-xenial
|
|
- name: bionic
|
|
label: ubuntu-bionic
|
|
- name: focal
|
|
label: ubuntu-focal
|
|
- name: jammy
|
|
label: ubuntu-jammy
|
|
groups:
|
|
- <<: *bastion_group
|
|
required-projects:
|
|
- name: github.com/ansible/ansible
|
|
override-checkout: devel
|
|
- name: github.com/pytest-dev/pytest-testinfra
|
|
override-checkout: main
|
|
- name: openstack/openstacksdk
|
|
- name: github.com/ansible-collections/ansible.posix
|
|
override-checkout: main
|
|
- name: github.com/ansible-collections/ansible.netcommon
|
|
override-checkout: main
|
|
- name: github.com/ansible-collections/community.crypto
|
|
override-checkout: main
|
|
- name: github.com/ansible-collections/community.general
|
|
override-checkout: main
|
|
- name: github.com/ansible-community/ara
|
|
vars:
|
|
install_ansible_requirements:
|
|
# Zuul checkout of Ansible devel
|
|
- '{{ ansible_user_dir}}/src/github.com/ansible/ansible'
|
|
- '{{ ansible_user_dir }}/src/opendev.org/openstack/openstacksdk'
|
|
- '{{ ansible_user_dir}}/src/github.com/ansible-community/ara[server]'
|
|
# These are required because we are not install the pypi
|
|
# "ansible" bundle here, but the upstream devel branch
|
|
install_ansible_collections:
|
|
- namespace: ansible
|
|
name: netcommon
|
|
repo: ansible-collections/ansible.netcommon
|
|
- namespace: ansible
|
|
name: posix
|
|
repo: ansible-collections/ansible.posix
|
|
- namespace: community
|
|
name: general
|
|
repo: ansible-collections/community.general
|
|
- namespace: community
|
|
name: crypto
|
|
repo: ansible-collections/community.crypto
|
|
|
|
|
|
# Although we don't have an arm64 based bridge; Zuul can't currently
|
|
# allocate a mixed x86/arm64 situation across clouds. Thus it helps
|
|
# to keep this clean so we can run the other tests.
|
|
- job:
|
|
name: system-config-run-base-arm64
|
|
parent: system-config-run
|
|
description: |
|
|
Run the "base" playbook on ARM64.
|
|
nodeset:
|
|
nodes:
|
|
- &bridge_node_arm64 { name: bridge99.opendev.org, label: ubuntu-jammy-arm64 }
|
|
- name: bionic
|
|
label: ubuntu-bionic-arm64
|
|
- name: focal
|
|
label: ubuntu-focal-arm64
|
|
- name: jammy
|
|
label: ubuntu-jammy-arm64
|
|
groups:
|
|
- <<: *bastion_group
|
|
files:
|
|
- playbooks/
|
|
- roles/
|
|
- testinfra/
|
|
|
|
- job:
|
|
name: system-config-run-eavesdrop
|
|
parent: system-config-run-containers
|
|
description: |
|
|
Run the playbook for an eavesdrop server.
|
|
required-projects:
|
|
- opendev/system-config
|
|
- openstack/project-config
|
|
requires:
|
|
- accessbot-container-image
|
|
- gerritbot-container-image
|
|
- statusbot-container-image
|
|
- ircbot-container-image
|
|
- matrix-eavesdrop-container-image
|
|
- ptgbot-container-image
|
|
nodeset:
|
|
nodes:
|
|
- <<: *bridge_node_x86
|
|
- name: eavesdrop01.opendev.org
|
|
label: ubuntu-focal
|
|
groups:
|
|
- <<: *bastion_group
|
|
vars:
|
|
run_playbooks:
|
|
- playbooks/letsencrypt.yaml
|
|
- playbooks/service-eavesdrop.yaml
|
|
host-vars:
|
|
eavesdrop01.opendev.org:
|
|
host_copy_output:
|
|
'/var/lib/limnoria': logs
|
|
'/var/log/apache2': logs
|
|
'/var/log/acme.sh': logs
|
|
'/etc/apache2': logs
|
|
'/var/log/statusbot': logs
|
|
'/etc/statusbot': logs
|
|
files:
|
|
- playbooks/service-eavesdrop.yaml
|
|
- playbooks/run-accessbot.yaml
|
|
- inventory/service/group_vars/eavesdrop.yaml
|
|
- playbooks/roles/install-docker
|
|
- playbooks/roles/accessbot
|
|
- playbooks/roles/limnoria
|
|
- playbooks/roles/logrotate
|
|
- playbooks/roles/matrix-eavesdrop
|
|
- playbooks/roles/matrix-gerritbot
|
|
- playbooks/roles/statusbot
|
|
- playbooks/roles/ptgbot
|
|
- playbooks/zuul/templates/group_vars/eavesdrop.yaml.j2
|
|
- docker/accessbot/
|
|
- docker/ircbot
|
|
- docker/matrix-eavesdrop
|
|
- testinfra/test_eavesdrop.py
|
|
|
|
- job:
|
|
name: system-config-run-letsencrypt
|
|
parent: system-config-run
|
|
description: |
|
|
Run the playbook for letsencrypt key acquisition
|
|
nodeset:
|
|
nodes:
|
|
- <<: *bridge_node_x86
|
|
# The other tests run the letsencrypt.yaml playbook to create
|
|
# self-signed certificates but do not exercise any of the DNS
|
|
# path because they don't have DNS servers in the inventory.
|
|
# By adding them for this test, the letsencrypt.yaml playbook
|
|
# will make a request to LE staging and get TXT records, which
|
|
# it will populate to the test DNS servers. LE won't actually
|
|
# authenticate those records, but we are validating the path
|
|
# of at least creating and collecting them here.
|
|
- name: adns99.opendev.org
|
|
label: ubuntu-jammy
|
|
- name: ns99.opendev.org
|
|
label: ubuntu-jammy
|
|
- name: letsencrypt01.opendev.org
|
|
label: ubuntu-jammy
|
|
- name: letsencrypt02.opendev.org
|
|
label: ubuntu-jammy
|
|
groups:
|
|
- <<: *bastion_group
|
|
vars:
|
|
run_playbooks:
|
|
- playbooks/service-nameserver.yaml
|
|
- playbooks/letsencrypt.yaml
|
|
# Make sure this test runs acme.sh
|
|
letsencrypt_self_generate_tokens: False
|
|
host-vars:
|
|
bridge99.opendev.org:
|
|
host_copy_output:
|
|
'/var/lib/certcheck': logs
|
|
letsencrypt01.opendev.org:
|
|
host_copy_output:
|
|
'/var/log/acme.sh': logs
|
|
letsencrypt02.opendev.org:
|
|
host_copy_output:
|
|
'/var/log/acme.sh': logs
|
|
files:
|
|
- playbooks/bootstrap-bridge.yaml
|
|
- inventory/service/group_vars/letsencrypt.yaml
|
|
# This is split because we ant to avoid
|
|
# ...create-certs/handlers/main.yaml matching since every
|
|
# letsencrypt user has its handler in there. re2 matching
|
|
# doesn't provide us a way to say "everything but this file"
|
|
- playbooks/roles/letsencrypt-acme-sh-install
|
|
- playbooks/roles/letsencrypt-config-certcheck
|
|
- playbooks/roles/letsencrypt-create-certs/defaults
|
|
- playbooks/roles/letsencrypt-create-certs/handlers/restart_apache.yaml
|
|
- playbooks/roles/letsencrypt-create-certs/handlers/touch_file.yaml
|
|
- playbooks/roles/letsencrypt-create-certs/tasks
|
|
- playbooks/roles/letsencrypt-install-txt-record
|
|
- playbooks/roles/letsencrypt-request-certs
|
|
|
|
- job:
|
|
name: system-config-run-lists
|
|
parent: system-config-run
|
|
description: |
|
|
Run the playbook for a list server.
|
|
post-run: playbooks/zuul/run-lists-post.yaml
|
|
nodeset:
|
|
nodes:
|
|
- <<: *bridge_node_x86
|
|
- name: lists.openstack.org
|
|
label: ubuntu-focal
|
|
- name: lists.katacontainers.io
|
|
label: ubuntu-focal
|
|
groups:
|
|
- <<: *bastion_group
|
|
required-projects:
|
|
- opendev/system-config
|
|
files:
|
|
- playbooks/bootstrap-bridge.yaml
|
|
- inventory/service/host_vars/lists.openstack.org.yaml
|
|
- inventory/service/host_vars/lists.katacontainers.io.yaml
|
|
- inventory/service/group_vars/mailman.yaml
|
|
- playbooks/roles/base/exim
|
|
- playbooks/roles/mailman/
|
|
- playbooks/service-lists.yaml
|
|
- playbooks/test-lists.yaml
|
|
- playbooks/zuul/templates/host_vars/lists.openstack.org.yaml.j2
|
|
- playbooks/zuul/templates/host_vars/lists.katacontainers.io.yaml.j2
|
|
- testinfra/test_lists_k_i.py
|
|
- testinfra/test_lists_o_o.py
|
|
- playbooks/zuul/run-lists-post.yaml
|
|
vars:
|
|
run_playbooks:
|
|
- playbooks/letsencrypt.yaml
|
|
- playbooks/service-lists.yaml
|
|
# Run this twice to check idempotency
|
|
- playbooks/service-lists.yaml
|
|
run_test_playbook: playbooks/test-lists.yaml
|
|
host-vars:
|
|
lists.katacontainers.io:
|
|
host_copy_output:
|
|
'/var/log/acme.sh': logs
|
|
'/var/log/apache2': logs
|
|
'/var/log/mailman': logs
|
|
'/etc/apache2/sites-enabled': logs
|
|
lists.openstack.org:
|
|
host_copy_output:
|
|
'/etc/aliases.domain': logs_txt
|
|
'/var/log/acme.sh': logs
|
|
'/var/log/apache2': logs
|
|
'/var/log/mailman': logs
|
|
'/etc/apache2/sites-enabled': logs
|
|
|
|
- job:
|
|
name: system-config-run-lists3
|
|
# We don't use the system-config-run-containers base job because we
|
|
# are consuming upstream containers only.
|
|
parent: system-config-run-containers
|
|
requires: mailman-container-images
|
|
description: |
|
|
Run the playbook for a mailman3 list server.
|
|
timeout: 3600
|
|
nodeset:
|
|
nodes:
|
|
- <<: *bridge_node_x86
|
|
- name: lists99.opendev.org
|
|
label: ubuntu-jammy
|
|
groups:
|
|
- <<: *bastion_group
|
|
required-projects:
|
|
- opendev/system-config
|
|
files:
|
|
- playbooks/bootstrap-bridge.yaml
|
|
- inventory/service/host_vars/lists01.opendev.org.yaml
|
|
- inventory/service/group_vars/mailman3.yaml
|
|
- playbooks/roles/base/exim
|
|
- playbooks/roles/mailman3
|
|
- playbooks/service-lists3.yaml
|
|
- playbooks/test-lists3.yaml
|
|
- playbooks/zuul/files/host_vars/lists99.opendev.org.yaml
|
|
- testinfra/test_lists_opendev_org.py
|
|
vars:
|
|
run_playbooks:
|
|
- playbooks/letsencrypt.yaml
|
|
- playbooks/service-lists3.yaml
|
|
# Run this twice to check idempotency
|
|
- playbooks/service-lists3.yaml
|
|
- playbooks/zuul/lists3-alias-logs.yaml
|
|
run_test_playbook: playbooks/zuul/test-lists3.yaml
|
|
host-vars:
|
|
lists99.opendev.org:
|
|
host_copy_output:
|
|
'/var/log/acme.sh': logs
|
|
'/var/log/apache2': logs
|
|
'/var/lib/mailman/mailman-web-logs': logs
|
|
'/var/lib/mailman/mailman-core-logs': logs
|
|
|
|
- job:
|
|
name: system-config-run-nodepool
|
|
parent: system-config-run
|
|
description: |
|
|
Run the playbook for nodepool.
|
|
nodeset:
|
|
nodes:
|
|
- <<: *bridge_node_x86
|
|
- name: zk04.opendev.org
|
|
label: ubuntu-focal
|
|
- name: nl01.opendev.org
|
|
label: ubuntu-focal
|
|
- name: nb01.opendev.org
|
|
label: ubuntu-focal
|
|
groups:
|
|
- <<: *bastion_group
|
|
required-projects:
|
|
- opendev/system-config
|
|
- openstack/project-config
|
|
host-vars:
|
|
nl01.opendev.org:
|
|
host_copy_output:
|
|
'/etc/nodepool/nodepool.yaml': logs
|
|
'/var/log/nodepool/launcher-debug.log': logs
|
|
nb01.opendev.org:
|
|
host_copy_output:
|
|
'/etc/nodepool/nodepool.yaml': logs
|
|
'/var/log/nodepool/builder-debug.log': logs
|
|
vars:
|
|
run_playbooks:
|
|
- playbooks/letsencrypt.yaml
|
|
- playbooks/service-zookeeper.yaml
|
|
- playbooks/service-nodepool.yaml
|
|
# Test our ad hoc restart playbook works
|
|
- playbooks/nodepool_restart.yaml
|
|
files:
|
|
- playbooks/bootstrap-bridge.yaml
|
|
- inventory/service/group_vars/nodepool.yaml
|
|
- inventory/service/group_vars/nodepool-builder.yaml
|
|
- inventory/service/group_vars/nodepool-launcher.yaml
|
|
- playbooks/roles/configure-openstacksdk/
|
|
- playbooks/roles/nodepool
|
|
- playbooks/templates/clouds/
|
|
- playbooks/nodepool_restart.yaml
|
|
- testinfra/test_nodepool.py
|
|
- playbooks/zuul/templates/group_vars/nodepool.yaml.j2
|
|
|
|
- job:
|
|
name: system-config-run-dns
|
|
parent: system-config-run
|
|
description: |
|
|
Run the playbook for dns.
|
|
required-projects:
|
|
- opendev/zone-opendev.org
|
|
- opendev/zone-zuul-ci.org
|
|
nodeset:
|
|
nodes:
|
|
- <<: *bridge_node_x86
|
|
- name: adns99.opendev.org
|
|
label: ubuntu-jammy
|
|
- name: ns99.opendev.org
|
|
label: ubuntu-jammy
|
|
groups:
|
|
- <<: *bastion_group
|
|
vars:
|
|
run_playbooks:
|
|
- playbooks/service-nameserver.yaml
|
|
host-vars:
|
|
adns99.opendev.org:
|
|
host_copy_output:
|
|
'/etc/bind/named.conf': logs
|
|
'/var/lib/bind/zones': logs
|
|
files:
|
|
- playbooks/bootstrap-bridge.yaml
|
|
- inventory/service/group_vars/adns-primary.yaml
|
|
- inventory/service/group_vars/adns-secondary.yaml
|
|
- inventory/service/group_vars/adns.yaml
|
|
- playbooks/zuul/templates/group_vars/adns-primary.yaml.j2
|
|
- playbooks/zuul/templates/group_vars/adns-secondary.yaml.j2
|
|
- playbooks/roles/master-nameserver/
|
|
- playbooks/roles/nameserver/
|
|
- testinfra/test_adns.py
|
|
- testinfra/test_ns.py
|
|
|
|
- job:
|
|
name: system-config-run-borg-backup
|
|
parent: system-config-run
|
|
description: |
|
|
Run the playbook for borg backup configuration
|
|
nodeset:
|
|
nodes:
|
|
- <<: *bridge_node_x86
|
|
- name: borg-backup01.region.provider.opendev.org
|
|
label: ubuntu-focal
|
|
- name: borg-backup-focal.opendev.org
|
|
label: ubuntu-focal
|
|
- name: borg-backup-bionic.opendev.org
|
|
label: ubuntu-bionic
|
|
- name: borg-backup-jammy.opendev.org
|
|
label: ubuntu-jammy
|
|
groups:
|
|
- <<: *bastion_group
|
|
vars:
|
|
run_playbooks:
|
|
- playbooks/service-borg-backup.yaml
|
|
run_test_playbook: playbooks/test-borg-backup.yaml
|
|
files:
|
|
- playbooks/service-borg-backup.yaml
|
|
- playbooks/test-borg-bcakup.yaml
|
|
- playbooks/bootstrap-bridge.yaml
|
|
- playbooks/roles/install-borg
|
|
- playbooks/roles/borg-backup
|
|
- playbooks/roles/create-venv
|
|
- playbooks/zuul/templates/host_vars/borg-backup
|
|
- testinfra/test_borg_backups.py
|
|
host-vars:
|
|
borg-backup01.region.provider.opendev.org:
|
|
host_copy_output:
|
|
'/var/log/prune-borg-backups.log': logs
|
|
'/var/log/verify-borg-backups.log': logs
|
|
borg-backup-bionic.opendev.org:
|
|
host_copy_output:
|
|
'/var/log/borg-backup-borg-backup01.region.provider.opendev.org.log': logs
|
|
borg-backup-focal.opendev.org:
|
|
host_copy_output:
|
|
'/var/log/borg-backup-borg-backup01.region.provider.opendev.org.log': logs
|
|
borg-backup-jammy.opendev.org:
|
|
host_copy_output:
|
|
'/var/log/borg-backup-borg-backup01.region.provider.opendev.org.log': logs
|
|
|
|
- job:
|
|
name: system-config-run-mirror-base
|
|
parent: system-config-run
|
|
abstract: true
|
|
description: |
|
|
Run the playbook for a mirror node
|
|
vars:
|
|
run_playbooks:
|
|
- playbooks/letsencrypt.yaml
|
|
- playbooks/service-mirror.yaml
|
|
host-vars:
|
|
mirror01.openafs.provider.opendev.org:
|
|
host_copy_output:
|
|
'/var/log/apache2/': logs
|
|
'/var/log/acme.sh': logs
|
|
'/etc/apache2/sites-available/mirror.conf': logs
|
|
mirror02.openafs.provider.opendev.org:
|
|
host_copy_output:
|
|
'/var/log/apache2/': logs
|
|
'/var/log/acme.sh': logs
|
|
'/etc/apache2/sites-available/mirror.conf': logs
|
|
files:
|
|
- playbooks/bootstrap-bridge.yaml
|
|
- roles/
|
|
- playbooks/roles/base/
|
|
- inventory/service/group_vars/mirror.yaml
|
|
- playbooks/roles/mirror/
|
|
- playbooks/roles/letsencrypt
|
|
- playbooks/letsencrypt.yaml
|
|
- playbooks/service-mirror.yaml
|
|
- playbooks/zuul/templates/group_vars/mirror.yaml.j2
|
|
- testinfra/test_mirror.py
|
|
|
|
- job:
|
|
name: system-config-run-mirror-x86
|
|
parent: system-config-run-mirror-base
|
|
nodeset:
|
|
nodes:
|
|
- <<: *bridge_node_x86
|
|
- name: mirror01.openafs.provider.opendev.org
|
|
label: ubuntu-bionic
|
|
- name: mirror02.openafs.provider.opendev.org
|
|
label: ubuntu-focal
|
|
groups:
|
|
- <<: *bastion_group
|
|
|
|
- job:
|
|
name: system-config-run-mirror-arm64
|
|
parent: system-config-run-mirror-base
|
|
nodeset:
|
|
nodes:
|
|
- <<: *bridge_node_arm64
|
|
- name: mirror01.openafs.provider.opendev.org
|
|
label: ubuntu-focal-arm64
|
|
groups:
|
|
- <<: *bastion_group
|
|
|
|
- job:
|
|
name: system-config-run-mirror-update
|
|
parent: system-config-run
|
|
description: |
|
|
Run the playbook for a mirror update node
|
|
nodeset:
|
|
nodes:
|
|
- <<: *bridge_node_x86
|
|
- name: mirror-update99.opendev.org
|
|
label: ubuntu-focal
|
|
groups:
|
|
- <<: *bastion_group
|
|
vars:
|
|
run_playbooks:
|
|
- playbooks/service-mirror-update.yaml
|
|
files:
|
|
- playbooks/bootstrap-bridge.yaml
|
|
- roles/
|
|
- playbooks/roles/mirror-update/
|
|
- playbooks/roles/reprepro/
|
|
- playbooks/roles/afs-release/
|
|
- playbooks/service-mirror-update.yaml
|
|
- playbooks/zuul/templates/host_vars/mirror-update99.opendev.org.yaml.j2
|
|
- testinfra/test_mirror-update.py
|
|
|
|
- job:
|
|
name: system-config-run-docker-registry
|
|
parent: system-config-run
|
|
description: |
|
|
Run the playbook for the docker registry.
|
|
nodeset:
|
|
nodes:
|
|
- <<: *bridge_node_x86
|
|
- name: insecure-ci-registry01.opendev.org
|
|
label: ubuntu-bionic
|
|
groups:
|
|
- <<: *bastion_group
|
|
vars:
|
|
run_playbooks:
|
|
- playbooks/letsencrypt.yaml
|
|
- playbooks/service-registry.yaml
|
|
host-vars:
|
|
insecure-ci-registry01.opendev.org:
|
|
host_copy_output:
|
|
'/var/registry/auth': logs
|
|
'/var/registry/certs': logs
|
|
files:
|
|
- playbooks/bootstrap-bridge.yaml
|
|
- inventory/service/group_vars/registry.yaml
|
|
- inventory/service/host_vars/insecure-ci-registry\d+.opendev.org.yaml
|
|
- playbooks/zuul/templates/group_vars/registry.yaml.j2
|
|
- playbooks/roles/letsencrypt-create-certs/handlers/restart_zuul_registry.yaml
|
|
- playbooks/roles/registry/
|
|
- playbooks/roles/pip3/
|
|
- playbooks/roles/install-docker/
|
|
- testinfra/test_registry.py
|
|
|
|
- job:
|
|
name: system-config-run-codesearch
|
|
parent: system-config-run-containers
|
|
description: |
|
|
Run the playbook for the codesearch server.
|
|
requires: codesearch-container-image
|
|
required-projects:
|
|
- opendev/system-config
|
|
nodeset:
|
|
nodes:
|
|
- <<: *bridge_node_x86
|
|
- name: codesearch01.opendev.org
|
|
label: ubuntu-focal
|
|
groups:
|
|
- <<: *bastion_group
|
|
vars:
|
|
run_playbooks:
|
|
- playbooks/letsencrypt.yaml
|
|
- playbooks/service-codesearch.yaml
|
|
run_test_playbook: playbooks/test-codesearch.yaml
|
|
files:
|
|
- playbooks/bootstrap-bridge.yaml
|
|
- playbooks/letsencrypt.yaml
|
|
- playbooks/service-codesearch.yaml
|
|
- playbooks/roles/codesearch/
|
|
- playbooks/roles/install-docker/
|
|
- playbooks/roles/pip3/
|
|
- playbooks/roles/run-selenium/
|
|
- testinfra/util.py
|
|
- docker/hound/
|
|
- testinfra/test_codesearch.py
|
|
|
|
|
|
- job:
|
|
name: system-config-run-etherpad
|
|
parent: system-config-run-containers
|
|
description: |
|
|
Run the playbook for the etherpad servers.
|
|
requires: etherpad-container-image
|
|
nodeset:
|
|
nodes:
|
|
- <<: *bridge_node_x86
|
|
- name: etherpad99.opendev.org
|
|
label: ubuntu-jammy
|
|
groups:
|
|
- <<: *bastion_group
|
|
vars:
|
|
run_playbooks:
|
|
- playbooks/letsencrypt.yaml
|
|
- playbooks/service-etherpad.yaml
|
|
files:
|
|
- playbooks/bootstrap-bridge.yaml
|
|
- playbooks/letsencrypt.yaml
|
|
- playbooks/service-etherpad.yaml
|
|
- playbooks/roles/etherpad/
|
|
- playbooks/roles/install-docker/
|
|
- playbooks/roles/pip3/
|
|
- docker/etherpad/
|
|
- testinfra/test_etherpad.py
|
|
|
|
- job:
|
|
name: system-config-run-gitea
|
|
parent: system-config-run-containers
|
|
description: |
|
|
Run the playbook for the gitea servers.
|
|
timeout: 4800
|
|
nodeset:
|
|
nodes:
|
|
- <<: *bridge_node_x86
|
|
- name: gitea-lb02.opendev.org
|
|
label: ubuntu-jammy
|
|
- name: gitea99.opendev.org
|
|
label: ubuntu-jammy
|
|
groups:
|
|
- <<: *bastion_group
|
|
required-projects:
|
|
- openstack/project-config
|
|
- opendev/system-config
|
|
requires:
|
|
- gitea-container-image
|
|
- haproxy-statsd-container-image
|
|
vars:
|
|
run_playbooks:
|
|
- playbooks/letsencrypt.yaml
|
|
- playbooks/service-gitea-lb.yaml
|
|
- playbooks/service-gitea.yaml
|
|
- playbooks/manage-projects.yaml
|
|
- playbooks/test-update-zuul-description.yaml
|
|
# Run twice to ensure that we noop properly when
|
|
# all projects are created in gitea. We also update
|
|
# zuul's description to ensure that descriptions are
|
|
# updated. This uses a test specific playbook to set
|
|
# the always_update flag.
|
|
- playbooks/test-manage-projects.yaml
|
|
run_test_playbook: playbooks/test-gitea.yaml
|
|
host-vars:
|
|
gitea99.opendev.org:
|
|
host_copy_output:
|
|
'/var/gitea/conf': logs
|
|
'/var/gitea/certs': logs
|
|
'/var/gitea/logs': logs
|
|
'/var/log/apache2': logs
|
|
gitea-lb02.opendev.org:
|
|
host_copy_output:
|
|
'/var/haproxy/etc': logs
|
|
'/var/log/haproxy.log': logs
|
|
files:
|
|
- playbooks/bootstrap-bridge.yaml
|
|
- playbooks/letsencrypt.yaml
|
|
- playbooks/service-gitea-lb.yaml
|
|
- playbooks/service-gitea.yaml
|
|
- playbooks/manage-projects.yaml
|
|
- playbooks/test-gitea.yaml
|
|
- playbooks/rename_repos.yaml
|
|
- inventory/service/group_vars/gitea.yaml
|
|
- inventory/service/group_vars/gitea-lb.yaml
|
|
- inventory/service/host_vars/gitea
|
|
- playbooks/zuul/templates/group_vars/gitea.yaml.j2
|
|
- playbooks/zuul/templates/group_vars/gitea-lb.yaml.j2
|
|
- playbooks/roles/apache-ua-filter/
|
|
- playbooks/roles/pip3/
|
|
- playbooks/roles/install-docker/
|
|
- playbooks/roles/letsencrypt
|
|
- playbooks/roles/gerrit/
|
|
- playbooks/roles/gitea.*
|
|
- playbooks/roles/haproxy/
|
|
- playbooks/roles/letsencrypt-create-certs/handlers/restart_gitea.yaml
|
|
- testinfra/test_gitea.py
|
|
- testinfra/test_gitea_lb.py
|
|
# From gitea_files -- If we rebuild the image, we want to run
|
|
# this job as well.
|
|
- docker/gitea/
|
|
# From haproxy-statsd_files -- If we rebuild the image, we want
|
|
# to run this job as well.
|
|
- docker/haproxy-statsd/
|
|
- playbooks/roles/run-selenium/
|
|
- testinfra/util.py
|
|
|
|
- job:
|
|
name: system-config-run-grafana
|
|
parent: system-config-run-containers
|
|
description: |
|
|
Run the playbook for the etherpad servers.
|
|
requires: grafyaml-container-image
|
|
required-projects:
|
|
- opendev/system-config
|
|
- openstack/project-config
|
|
nodeset:
|
|
nodes:
|
|
- <<: *bridge_node_x86
|
|
- name: grafana01.opendev.org
|
|
label: ubuntu-focal
|
|
groups:
|
|
- <<: *bastion_group
|
|
vars:
|
|
run_playbooks:
|
|
- playbooks/letsencrypt.yaml
|
|
- playbooks/service-grafana.yaml
|
|
run_test_playbook: playbooks/test-grafana.yaml
|
|
files:
|
|
- playbooks/bootstrap-bridge.yaml
|
|
- playbooks/letsencrypt.yaml
|
|
- playbooks/service-grafana.yaml
|
|
- playbooks/roles/grafana/
|
|
- playbooks/roles/install-docker/
|
|
- playbooks/roles/pip3/
|
|
- playbooks/roles/run-selenium/
|
|
- tesinfra/util.py
|
|
- testinfra/test_grafana.py
|
|
|
|
- job:
|
|
name: system-config-run-graphite
|
|
parent: system-config-run
|
|
description: |
|
|
Run the playbook for the graphite servers.
|
|
required-projects:
|
|
- opendev/system-config
|
|
nodeset:
|
|
nodes:
|
|
- <<: *bridge_node_x86
|
|
- name: graphite02.opendev.org
|
|
label: ubuntu-focal
|
|
groups:
|
|
- <<: *bastion_group
|
|
vars:
|
|
run_playbooks:
|
|
- playbooks/letsencrypt.yaml
|
|
- playbooks/service-graphite.yaml
|
|
host-vars:
|
|
graphite02.opendev.org:
|
|
host_copy_output:
|
|
'/var/log/graphite': logs
|
|
'/etc/graphite-docker': logs
|
|
files:
|
|
- playbooks/bootstrap-bridge.yaml
|
|
- playbooks/letsencrypt.yaml
|
|
- playbooks/service-graphite.yaml
|
|
- playbooks/roles/graphite
|
|
- playbooks/roles/install-docker/
|
|
- playbooks/roles/pip3/
|
|
- testinfra/test_graphite.py
|
|
|
|
- job:
|
|
name: system-config-run-keycloak
|
|
parent: system-config-run
|
|
description: |
|
|
Run the playbook for the keycloak servers.
|
|
nodeset:
|
|
nodes:
|
|
- <<: *bridge_node_x86
|
|
- name: keycloak01.opendev.org
|
|
label: ubuntu-focal
|
|
groups:
|
|
- <<: *bastion_group
|
|
vars:
|
|
run_playbooks:
|
|
- playbooks/letsencrypt.yaml
|
|
- playbooks/service-keycloak.yaml
|
|
files:
|
|
- inventory/service/host_vars/keycloak01.opendev.org.yaml
|
|
- playbooks/install-ansible.yaml
|
|
- playbooks/letsencrypt.yaml
|
|
- playbooks/service-keycloak.yaml
|
|
- playbooks/roles/keycloak/
|
|
- playbooks/roles/install-docker/
|
|
- playbooks/roles/iptables/
|
|
- playbooks/zuul/templates/group_vars/keycloak.yaml.j2
|
|
- testinfra/test_keycloak.py
|
|
|
|
- job:
|
|
name: system-config-run-meetpad
|
|
parent: system-config-run
|
|
description: |
|
|
Run the playbook for jitsi-meet.
|
|
nodeset:
|
|
nodes:
|
|
- <<: *bridge_node_x86
|
|
- name: meetpad01.opendev.org
|
|
label: ubuntu-bionic
|
|
- name: jvb01.opendev.org
|
|
label: ubuntu-bionic
|
|
groups:
|
|
- <<: *bastion_group
|
|
vars:
|
|
run_playbooks:
|
|
- playbooks/letsencrypt.yaml
|
|
- playbooks/service-meetpad.yaml
|
|
host-vars:
|
|
meetpad01.opendev.org:
|
|
host_copy_output:
|
|
'/var/jitsi-meet': logs
|
|
jvb01.opendev.org:
|
|
host_copy_output:
|
|
'/var/jitsi-meet': logs
|
|
files:
|
|
- playbooks/bootstrap-bridge.yaml
|
|
- inventory/service/group_vars/meetpad.yaml
|
|
- inventory/service/host_vars/meetpad\d+.opendev.org.yaml
|
|
- playbooks/roles/letsencrypt-create-certs/handlers/restart_jitsi_meet.yaml
|
|
- playbooks/roles/jitsi-meet/
|
|
- playbooks/roles/pip3/
|
|
- playbooks/roles/install-docker/
|
|
- playbooks/zuul/templates/group_vars/meetpad.yaml.j2
|
|
- testinfra/test_meetpad.py
|
|
|
|
- job:
|
|
name: system-config-run-paste
|
|
parent: system-config-run-containers
|
|
description: |
|
|
Run the playbook for the paste server.
|
|
required-projects:
|
|
- opendev/system-config
|
|
requires:
|
|
- lodgeit-container-image
|
|
nodeset:
|
|
nodes:
|
|
- <<: *bridge_node_x86
|
|
- name: paste99.opendev.org
|
|
label: ubuntu-focal
|
|
groups:
|
|
- <<: *bastion_group
|
|
vars:
|
|
run_playbooks:
|
|
- playbooks/letsencrypt.yaml
|
|
- playbooks/service-paste.yaml
|
|
run_test_playbook: playbooks/test-paste.yaml
|
|
files:
|
|
- playbooks/bootstrap-bridge.yaml
|
|
- playbooks/letsencrypt.yaml
|
|
- playbooks/service-paste.yaml
|
|
- playbooks/roles/lodgeit
|
|
- playbooks/roles/install-docker/
|
|
- playbooks/roles/pip3/
|
|
- playbooks/roles/run-selenium/
|
|
- testinfra/util.py
|
|
- playbooks/test-paste.yaml
|
|
- testinfra/test_paste.py
|
|
|
|
- job:
|
|
name: system-config-run-tracing
|
|
parent: system-config-run
|
|
description: |
|
|
Run the playbook for the jaeger servers.
|
|
nodeset:
|
|
nodes:
|
|
- <<: *bridge_node_x86
|
|
- name: tracing99.opendev.org
|
|
label: ubuntu-focal
|
|
groups:
|
|
- <<: *bastion_group
|
|
vars:
|
|
run_playbooks:
|
|
- playbooks/letsencrypt.yaml
|
|
- playbooks/service-tracing.yaml
|
|
files:
|
|
- inventory/service/group_vars/tracing.yaml
|
|
- playbooks/install-ansible.yaml
|
|
- playbooks/letsencrypt.yaml
|
|
- playbooks/service-tracing.yaml
|
|
- playbooks/roles/jaeger/
|
|
- playbooks/roles/install-docker/
|
|
- playbooks/roles/iptables/
|
|
- testinfra/test_tracing.py
|
|
|
|
- job:
|
|
name: system-config-run-zookeeper
|
|
parent: system-config-run
|
|
description: |
|
|
Run the playbook for the zookeeper cluster.
|
|
nodeset:
|
|
nodes:
|
|
- <<: *bridge_node_x86
|
|
- name: zk04.opendev.org
|
|
label: ubuntu-focal
|
|
groups:
|
|
- <<: *bastion_group
|
|
vars:
|
|
run_playbooks:
|
|
- playbooks/service-zookeeper.yaml
|
|
files:
|
|
- playbooks/bootstrap-bridge.yaml
|
|
- inventory/service/group_vars/zookeeper.yaml
|
|
- ^inventory/service/host_vars/zk\d+\..*
|
|
- playbooks/roles/zookeeper/
|
|
- playbooks/roles/pip3/
|
|
- playbooks/roles/install-docker/
|
|
- testinfra/test_zookeeper.py
|
|
# From zookeeper-statsd_files -- If we rebuild the image, we want
|
|
# to run this job as well.
|
|
- docker/zookeeper-statsd/
|
|
|
|
- job:
|
|
name: system-config-run-zuul-preview
|
|
parent: system-config-run
|
|
description: |
|
|
Run the playbook for the zuul-preview service.
|
|
nodeset:
|
|
nodes:
|
|
- <<: *bridge_node_x86
|
|
- name: zp01.opendev.org
|
|
label: ubuntu-bionic
|
|
groups:
|
|
- <<: *bastion_group
|
|
vars:
|
|
run_playbooks:
|
|
- playbooks/service-zuul-preview.yaml
|
|
files:
|
|
- playbooks/bootstrap-bridge.yaml
|
|
- playbooks/roles/zuul-preview/
|
|
- playbooks/roles/pip3/
|
|
- playbooks/roles/install-docker/
|
|
- testinfra/test_zuul_preview.py
|
|
|
|
- job:
|
|
name: system-config-run-zuul
|
|
parent: system-config-run
|
|
description: |
|
|
Run the playbook for the main Zuul cluster.
|
|
nodeset:
|
|
nodes:
|
|
- <<: *bridge_node_x86
|
|
- name: zk04.opendev.org
|
|
label: ubuntu-focal
|
|
- name: zm01.opendev.org
|
|
label: ubuntu-focal
|
|
- name: ze01.opendev.org
|
|
label: ubuntu-focal
|
|
- name: zuul02.opendev.org
|
|
label: ubuntu-focal
|
|
- name: zuul-lb01.opendev.org
|
|
label: ubuntu-focal
|
|
groups:
|
|
- <<: *bastion_group
|
|
required-projects:
|
|
- openstack/project-config
|
|
- opendev/system-config
|
|
vars:
|
|
run_playbooks:
|
|
- playbooks/letsencrypt.yaml
|
|
- playbooks/service-zookeeper.yaml
|
|
- playbooks/service-zuul.yaml
|
|
- playbooks/service-zuul-lb.yaml
|
|
# Test our ad hoc restart playbook works
|
|
- playbooks/zuul_restart.yaml
|
|
host-vars:
|
|
zm01.opendev.org:
|
|
host_copy_output:
|
|
'/etc/hosts': logs
|
|
'/etc/zuul/zuul.conf': logs
|
|
'/var/log/zuul/merger-debug.log': logs
|
|
ze01.opendev.org:
|
|
host_copy_output:
|
|
'/etc/hosts': logs
|
|
'/etc/zuul/zuul.conf': logs
|
|
'/var/log/zuul/executor-debug.log': logs
|
|
zuul02.opendev.org:
|
|
host_copy_output:
|
|
'/etc/hosts': logs
|
|
'/etc/zuul/zuul.conf': logs
|
|
'/var/log/zuul/debug.log': logs
|
|
bridge99.opendev.org:
|
|
host_copy_output:
|
|
'/etc/hosts': logs
|
|
zuul-lb01.opendev.org:
|
|
host_copy_output:
|
|
'/var/haproxy/etc': logs
|
|
'/var/log/haproxy.log': logs
|
|
files:
|
|
- playbooks/bootstrap-bridge.yaml
|
|
- playbooks/service-zookeeper.yaml
|
|
- playbooks/service-zuul.yaml
|
|
- playbooks/service-zuul-lb.yaml
|
|
- inventory/service/group_vars/zuul
|
|
- inventory/service/group_vars/zuul-lb.yaml
|
|
- inventory/service/group_vars/zookeeper.yaml
|
|
- inventory/service/host_vars/zk\d+
|
|
- inventory/service/host_vars/zuul02.opendev.org
|
|
- playbooks/roles/zookeeper/
|
|
- playbooks/roles/install-apt-repo/
|
|
- playbooks/roles/zuul.*
|
|
- playbooks/zuul/templates/group_vars/zuul.*
|
|
- playbooks/zuul/templates/group_vars/zookeeper.yaml
|
|
- playbooks/zuul/templates/group_vars/zuul-lb.yaml.j2
|
|
- playbooks/zuul/templates/host_vars/zk\d+
|
|
- playbooks/zuul/templates/host_vars/zuul02.opendev.org
|
|
- playbooks/zuul_restart.yaml
|
|
- testinfra/test_zuul_executor.py
|
|
- testinfra/test_zuul_scheduler.py
|
|
- testinfra/test_zuul_merger.py
|
|
- testinfra/util.py
|
|
|
|
- job:
|
|
name: system-config-run-review-base
|
|
parent: system-config-run-containers
|
|
description: |
|
|
Base job for testing gerrit
|
|
nodeset:
|
|
nodes:
|
|
- <<: *bridge_node_x86
|
|
- name: review99.opendev.org
|
|
label: ubuntu-focal
|
|
groups:
|
|
- <<: *bastion_group
|
|
required-projects:
|
|
- openstack/project-config
|
|
- opendev/system-config
|
|
vars:
|
|
run_playbooks:
|
|
- playbooks/letsencrypt.yaml
|
|
- playbooks/service-review.yaml
|
|
run_test_playbook: playbooks/zuul/bootstrap-and-test-review.yaml
|
|
host-vars:
|
|
review99.opendev.org:
|
|
host_copy_output:
|
|
'/home/gerrit2/review_site/etc': logs
|
|
'/home/gerrit2/review_site/logs': logs
|
|
'/var/log/apache2/': logs
|
|
'/var/log/acme.sh': logs
|
|
files:
|
|
- playbooks/bootstrap-bridge.yaml
|
|
- playbooks/letsencrypt.yaml
|
|
- playbooks/service-review.*.yaml
|
|
- playbooks/rename_repos.yaml
|
|
- inventory/service/group_vars/review.yaml
|
|
- playbooks/roles/pip3/
|
|
- playbooks/roles/run-selenium/
|
|
- testinfra/util.py
|
|
- playbooks/roles/install-docker/
|
|
- playbooks/roles/letsencrypt
|
|
- playbooks/roles/gerrit/
|
|
- playbooks/zuul/gerrit/
|
|
- playbooks/zuul/templates/host_vars/review99.opendev.org.yaml.j2
|
|
- roles/bazelisk-build/
|
|
- testinfra/test_gerrit.py
|
|
- docker/gerrit/
|
|
- playbooks/zuul/bootstrap-and-test-review.yaml
|
|
- playbooks/zuul/bootstrap-test-review.yaml
|
|
- playbooks/zuul/test-review.yaml
|
|
- playbooks/zuul/upgrade-review.yaml
|
|
|
|
- job:
|
|
name: system-config-run-review-3.7
|
|
parent: system-config-run-review-base
|
|
description: |
|
|
Run the playbook for gerrit 3.7 (in a container).
|
|
requires: gerrit-3.7-container-image
|
|
vars:
|
|
zuul_test_gerrit_version: '3.7'
|
|
|
|
- job:
|
|
name: system-config-run-review-3.8
|
|
parent: system-config-run-review-base
|
|
description: |
|
|
Run the playbook for gerrit 3.8 (in a container).
|
|
requires: gerrit-3.8-container-image
|
|
vars:
|
|
zuul_test_gerrit_version: '3.8'
|
|
|
|
- job:
|
|
name: system-config-upgrade-review
|
|
parent: system-config-run-review-base
|
|
description: |
|
|
Test we can upgrade a gerrit 3.7 to 3.8
|
|
requires:
|
|
- gerrit-3.7-container-image
|
|
- gerrit-3.8-container-image
|
|
vars:
|
|
run_playbooks:
|
|
- playbooks/letsencrypt.yaml
|
|
- playbooks/zuul/upgrade-review.yaml
|
|
run_test_playbook: playbooks/zuul/test-review.yaml
|
|
zuul_test_gerrit_version: '3.7'
|
|
|
|
- job:
|
|
name: system-config-run-static
|
|
parent: system-config-run
|
|
description: |
|
|
Run the playbook for a static node.
|
|
nodeset:
|
|
nodes:
|
|
- <<: *bridge_node_x86
|
|
- name: static99.opendev.org
|
|
label: ubuntu-jammy
|
|
groups:
|
|
- <<: *bastion_group
|
|
vars:
|
|
run_playbooks:
|
|
- playbooks/letsencrypt.yaml
|
|
- playbooks/service-static.yaml
|
|
run_test_playbook: playbooks/test-static.yaml
|
|
files:
|
|
- playbooks/bootstrap-bridge.yaml
|
|
- playbooks/roles/apache-ua-filter/
|
|
- playbooks/roles/static/
|
|
- playbooks/roles/letsencrypt
|
|
- playbooks/letsencrypt.yaml
|
|
- playbooks/service-static.yaml
|
|
- playbooks/test-static.yaml
|
|
- testinfra/test_static.py
|
|
host-vars:
|
|
static99.opendev.org:
|
|
host_copy_output:
|
|
'/var/log/acme.sh/': logs
|
|
'/etc/apache2/': logs
|
|
'/var/log/apache2/': logs
|
|
|
|
- job:
|
|
name: system-config-run-refstack
|
|
parent: system-config-run
|
|
description: |
|
|
Run the playbook for refstack server.
|
|
requires:
|
|
- refstack-container-image
|
|
nodeset:
|
|
nodes:
|
|
- <<: *bridge_node_x86
|
|
- name: refstack01.openstack.org
|
|
label: ubuntu-focal
|
|
groups:
|
|
- <<: *bastion_group
|
|
host-vars:
|
|
refstack01.openstack.org:
|
|
host_copy_output:
|
|
'/var/log/apache2/': logs
|
|
'/var/lib/refstack/': logs
|
|
'/var/refstack/': logs
|
|
vars:
|
|
run_playbooks:
|
|
- playbooks/letsencrypt.yaml
|
|
- playbooks/service-refstack.yaml
|
|
container_command: docker
|
|
files:
|
|
- playbooks/bootstrap-bridge.yaml
|
|
- inventory/service/group-vars/refstack.yaml
|
|
- playbooks/zuul/templates/group_vars/refstack.yaml.j2
|
|
- playbooks/roles/refstack/
|
|
- playbooks/roles/letsencrypt-create-certs/handlers/restart_apache.yaml
|
|
- testinfra/test_refstack.py
|
|
# If we rebuild the image, we want to run this job as well.
|
|
- docker/refstack/.*
|
|
|
|
- job:
|
|
name: system-config-run-kerberos
|
|
parent: system-config-run
|
|
description: |
|
|
Run the playbook for kerberos servers
|
|
nodeset:
|
|
nodes:
|
|
- <<: *bridge_node_x86
|
|
- name: kdc-primary.opendev.org
|
|
label: ubuntu-focal
|
|
- name: kdc-replica.opendev.org
|
|
label: ubuntu-focal
|
|
groups:
|
|
- <<: *bastion_group
|
|
host-vars:
|
|
kdc-primary.opendev.org:
|
|
host_copy_output:
|
|
'/etc/krb5kdc/': logs
|
|
'/var/krb5kdc/': logs
|
|
kdc-replica.opendev.org:
|
|
host_copy_output:
|
|
'/etc/krb5kdc/': logs
|
|
'/var/krb5kdc/': logs
|
|
vars:
|
|
run_playbooks:
|
|
- playbooks/service-kerberos.yaml
|
|
# Run twice to double-check idempotence
|
|
- playbooks/service-kerberos.yaml
|
|
run_test_playbook: playbooks/test-kerberos.yaml
|
|
files:
|
|
- playbooks/bootstrap-bridge.yaml
|
|
- playbooks/roles/kerberos-kdc/
|