|
1 | 1 | - name: Disable dhcpd service |
2 | | - service: name=dhcpd |
3 | | - enabled=no |
| 2 | + service: |
| 3 | + name: dhcpd |
| 4 | + enabled: no |
4 | 5 | when: not dhcpd_enabled and dhcpd_install |
5 | 6 |
|
6 | 7 | # service is restarted with NM dispatcher.d script |
7 | 8 | - name: Enable dhcpd service |
8 | | - service: name=dhcpd |
9 | | - enabled=yes |
| 9 | + service: |
| 10 | + name: dhcpd |
| 11 | + enabled: yes |
10 | 12 | when: dhcpd_enabled and dhcpd_install |
11 | 13 |
|
12 | 14 | - name: Copy /etc/sysconfig/dhcpd file |
13 | | - template: src={{ item.src }} |
14 | | - dest={{ item.dest }} |
15 | | - owner=root |
16 | | - group=root |
17 | | - mode={{ item.mode }} |
| 15 | + template: |
| 16 | + src: "{{ item.src }}" |
| 17 | + dest: "{{ item.dest }}" |
| 18 | + owner: root |
| 19 | + group: root |
| 20 | + mode: "{{ item.mode }}" |
18 | 21 | with_items: |
19 | | - - { src: 'dhcp/dhcpd-env.j2' , dest: '/etc/sysconfig/dhcpd' , mode: '0644' } |
| 22 | + - { src: 'dhcp/dhcpd-env.j2', dest: '/etc/sysconfig/dhcpd', mode: '0644' } |
20 | 23 | - { src: 'dhcp/dhcpd-iiab.conf.j2', dest: '/etc/dhcpd-iiab.conf', mode: '0644' } |
21 | 24 | when: dhcpd_enabled and dhcpd_install |
22 | 25 |
|
23 | 26 | - name: Copy named file |
24 | | - template: src={{ item.src }} |
25 | | - dest={{ item.dest }} |
26 | | - owner=root |
27 | | - group=root |
28 | | - mode={{ item.mode }} |
| 27 | + template: |
| 28 | + src: "{{ item.src }}" |
| 29 | + dest: "{{ item.dest }}" |
| 30 | + owner: root |
| 31 | + group: root |
| 32 | + mode: "{{ item.mode }}" |
29 | 33 | with_items: |
30 | | - - { src: 'named/named-iiab.conf.j2' , dest: '/etc/named-iiab.conf' , mode: '0644' } |
31 | | - - { src: 'named/school.local.zone.db' , dest: '/var/named-iiab/' , mode: '0644' } |
32 | | - - { src: 'named/school.internal.zone.db' , dest: '/var/named-iiab/' , mode: '0644' } |
| 34 | + - { src: 'named/named-iiab.conf.j2', dest: '/etc/named-iiab.conf', mode: '0644' } |
| 35 | + - { src: 'named/school.local.zone.db', dest: '/var/named-iiab/', mode: '0644' } |
| 36 | + - { src: 'named/school.internal.zone.db', dest: '/var/named-iiab/', mode: '0644' } |
33 | 37 |
|
34 | 38 | - name: Enable named service |
35 | | - service: name={{ dns_service }} |
36 | | - enabled=yes |
| 39 | + service: |
| 40 | + name: "{{ dns_service }}" |
| 41 | + enabled: yes |
37 | 42 | when: named_enabled and named_install |
38 | 43 |
|
39 | 44 | - name: Disable named service |
40 | | - service: name={{ dns_service }} |
41 | | - enabled=no |
| 45 | + service: |
| 46 | + name: "{{ dns_service }}" |
| 47 | + enabled: no |
42 | 48 | when: not named_enabled and named_install |
43 | 49 |
|
44 | 50 | - name: Disable dnsmasq |
45 | | - service: name=dnsmasq |
46 | | - enabled=no |
| 51 | + service: |
| 52 | + name: dnsmasq |
| 53 | + enabled: no |
47 | 54 | when: not dnsmasq_enabled and dnsmasq_install |
48 | 55 |
|
49 | | -- name: dnsmasq copy config file to /etc |
50 | | - template: src=network/dnsmasq.conf.j2 dest=/etc/dnsmasq.conf |
| 56 | +- name: Copy dnsmasq.conf to /etc |
| 57 | + template: |
| 58 | + src: network/dnsmasq.conf.j2 |
| 59 | + dest: /etc/dnsmasq.conf |
51 | 60 | when: dnsmasq_enabled and dnsmasq_install |
52 | 61 |
|
53 | 62 | - name: Enable dnsmasq |
54 | | - service: name=dnsmasq |
55 | | - enabled=yes |
| 63 | + service: |
| 64 | + name: dnsmasq |
| 65 | + enabled: yes |
56 | 66 | when: dnsmasq_enabled and dnsmasq_install |
57 | 67 |
|
58 | 68 | - name: Enable DansGuardian |
59 | | - service: name=dansguardian |
60 | | - enabled=yes |
| 69 | + service: |
| 70 | + name: dansguardian |
| 71 | + enabled: yes |
61 | 72 | when: dansguardian_enabled and dansguardian_install |
62 | 73 |
|
63 | 74 | - name: Disable DansGuardian |
64 | | - service: name=dansguardian |
65 | | - enabled=no |
| 75 | + service: |
| 76 | + name: dansguardian |
| 77 | + enabled: no |
66 | 78 | when: not dansguardian_enabled and dansguardian_install |
67 | 79 |
|
68 | 80 | - name: Create xs_httpcache flag |
69 | | - lineinfile: dest=/etc/iiab/iiab.env |
70 | | - regexp='^HTTPCACHE_ON=*' |
71 | | - line='HTTPCACHE_ON=True' |
72 | | - state=present |
| 81 | + lineinfile: |
| 82 | + dest: /etc/iiab/iiab.env |
| 83 | + regexp: '^HTTPCACHE_ON=*' |
| 84 | + line: 'HTTPCACHE_ON=True' |
| 85 | + state: present |
73 | 86 | when: squid_enabled and squid_install |
74 | 87 |
|
75 | 88 | - name: Enable Squid service |
76 | | - service: name={{ proxy }} |
77 | | - enabled=yes |
| 89 | + service: |
| 90 | + name: "{{ proxy }}" |
| 91 | + enabled: yes |
78 | 92 | when: squid_enabled and squid_install |
79 | 93 |
|
80 | 94 | - name: Copy init script and config file |
81 | | - template: src={{ item.src }} |
82 | | - dest={{ item.dest }} |
83 | | - owner={{ item.owner }} |
84 | | - group={{ item.group }} |
85 | | - mode={{ item.mode }} |
| 95 | + template: |
| 96 | + src: "{{ item.src }}" |
| 97 | + dest: "{{ item.dest }}" |
| 98 | + owner: "{{ item.owner }}" |
| 99 | + group: "{{ item.group }}" |
| 100 | + mode: "{{ item.mode }}" |
86 | 101 | with_items: |
87 | | - - src: 'squid/squid-iiab.conf.j2' |
88 | | - dest: '/etc/{{ proxy }}/squid-iiab.conf' |
89 | | - owner: '{{ proxy_user }}' |
90 | | - group: '{{ proxy_user }}' |
91 | | - mode: '0644' |
| 102 | + - src: squid/squid-iiab.conf.j2 |
| 103 | + dest: "/etc/{{ proxy }}/squid-iiab.conf" |
| 104 | + owner: "{{ proxy_user }}" |
| 105 | + group: "{{ proxy_user }}" |
| 106 | + mode: 0644 |
92 | 107 | when: squid_enabled and squid_install |
93 | 108 |
|
94 | 109 | - name: Point to Squid config file from startup file |
95 | | - lineinfile: regexp='^CONFIG' |
96 | | - line='CONFIG=/etc/{{ proxy }}/squid-iiab.conf' |
97 | | - dest=/etc/init.d/{{ proxy }} |
| 110 | + lineinfile: |
| 111 | + regexp: '^CONFIG' |
| 112 | + line: "CONFIG=/etc/{{ proxy }}/squid-iiab.conf" |
| 113 | + dest: "/etc/init.d/{{ proxy }}" |
98 | 114 | when: squid_enabled and squid_install and is_debuntu |
99 | 115 |
|
100 | 116 | - name: Disable Squid service |
101 | | - service: name={{ proxy }} |
102 | | - enabled=no |
| 117 | + service: |
| 118 | + name: "{{ proxy }}" |
| 119 | + enabled: no |
103 | 120 | when: not squid_enabled and squid_install |
104 | 121 |
|
105 | 122 | - name: Remove xs_httpcache flag |
106 | | - lineinfile: dest=/etc/iiab/iiab.env |
107 | | - regexp='^HTTPCACHE_ON=*' |
108 | | - line='HTTPCACHE_ON=False' |
109 | | - state=present |
| 123 | + lineinfile: |
| 124 | + dest: /etc/iiab/iiab.env |
| 125 | + regexp: '^HTTPCACHE_ON=*' |
| 126 | + line: 'HTTPCACHE_ON=False' |
| 127 | + state: present |
110 | 128 | when: not squid_enabled |
111 | 129 |
|
112 | 130 | - name: Enable Wondershaper service |
113 | | - service: name=wondershaper |
114 | | - enabled=yes |
| 131 | + service: |
| 132 | + name: wondershaper |
| 133 | + enabled: yes |
115 | 134 | when: wondershaper_enabled and wondershaper_install |
116 | 135 |
|
117 | 136 | - name: Disable Wondershaper service |
118 | | - service: name=wondershaper |
119 | | - enabled=no |
| 137 | + service: |
| 138 | + name: wondershaper |
| 139 | + enabled: no |
120 | 140 | when: not wondershaper_enabled and wondershaper_install |
121 | 141 |
|
122 | 142 | # check-LAN should be iptables.yml remove later |
123 | 143 | - name: Grab clean copy of iiab-gen-iptables |
124 | | - template: src={{ item.0 }} |
125 | | - dest={{ item.1 }} |
126 | | - owner='root' |
127 | | - group='root' |
128 | | - mode='0755' |
| 144 | + template: |
| 145 | + src: "{{ item.0 }}" |
| 146 | + dest: "{{ item.1 }}" |
| 147 | + owner: root |
| 148 | + group: root |
| 149 | + mode: 0755 |
129 | 150 | with_items: |
130 | 151 | - { 0: 'gateway/iiab-gen-iptables', 1: '/usr/bin/iiab-gen-iptables' } |
131 | 152 |
|
132 | | -- name: Add 'squid' to service list |
133 | | - ini_file: dest='{{ service_filelist }}' |
134 | | - section=squid |
135 | | - option='{{ item.option }}' |
136 | | - value='{{ item.value }}' |
| 153 | +- name: Add 'squid' to list of services at /etc/iiab/iiab.ini |
| 154 | + ini_file: |
| 155 | + dest: "{{ service_filelist }}" |
| 156 | + section: squid |
| 157 | + option: "{{ item.option }}" |
| 158 | + value: "{{ item.value }}" |
137 | 159 | with_items: |
138 | 160 | - option: enabled |
139 | 161 | value: "{{ squid_enabled }}" |
140 | 162 |
|
141 | | -- name: Add 'dansguardian' to service list |
142 | | - ini_file: dest='{{ service_filelist }}' |
143 | | - section=dansguardian |
144 | | - option='{{ item.option }}' |
145 | | - value='{{ item.value }}' |
| 163 | +- name: Add 'dansguardian' to list of services at /etc/iiab/iiab.ini |
| 164 | + ini_file: |
| 165 | + dest: "{{ service_filelist }}" |
| 166 | + section: dansguardian |
| 167 | + option: "{{ item.option }}" |
| 168 | + value: "{{ item.value }}" |
146 | 169 | with_items: |
147 | 170 | - option: enabled |
148 | 171 | value: "{{ dansguardian_enabled }}" |
149 | 172 |
|
150 | | -- name: Add 'wondershaper' to service list |
151 | | - ini_file: dest='{{ service_filelist }}' |
152 | | - section=wondershaper |
153 | | - option='{{ item.option }}' |
154 | | - value='{{ item.value }}' |
| 173 | +- name: Add 'wondershaper' to list of services at /etc/iiab/iiab.ini |
| 174 | + ini_file: |
| 175 | + dest: "{{ service_filelist }}" |
| 176 | + section: wondershaper |
| 177 | + option: "{{ item.option }}" |
| 178 | + value: "{{ item.value }}" |
155 | 179 | with_items: |
156 | 180 | - option: enabled |
157 | 181 | value: "{{ wondershaper_enabled }}" |
0 commit comments