1
0
Fork 0
mirror of https://github.com/iiab/iiab.git synced 2025-02-12 19:22:24 +00:00
* xs- goes to iiab-

* more xs->iiab

* sysconfig was forgotten

* hyphen vs underscore i roles network templates

* bulk sed on pgsql-xs

* create links for old script names

* missed named-xs -> named-iiab

* squid-xs ->squid-iiab

* misspelled squid-iiab.conf.j2
This commit is contained in:
georgejhunt 2017-06-27 19:53:13 -07:00 committed by GitHub
parent 909439f40b
commit 4462652deb
36 changed files with 110 additions and 104 deletions

View file

@ -1,5 +1,5 @@
- name: Checking xs_domain_name
shell: "cat /etc/sysconfig/xs_domain_name"
- name: Checking iiab_domain_name
shell: "cat /etc/sysconfig/iiab_domain_name"
register: prior_domain
ignore_errors: True
@ -9,8 +9,8 @@
iiab_domain: "{{ prior_domain.stdout }}"
when: prior_domain.stdout != "lan" and prior_domain.stdout != ""
- name: xs_wan_device
shell: "cat /etc/sysconfig/xs_wan_device"
- name: iiab_wan_device
shell: "cat /etc/sysconfig/iiab_wan_device"
register: prior_gw
ignore_errors: True
@ -263,7 +263,7 @@
when: iiab_wireless_lan_iface != "none"
# OK try old gw this is a best guess based on what's in
# /etc/sysconfig/xs_wan_device's last state intended to
# /etc/sysconfig/iiab_wan_device's last state intended to
# provide a seed value to display in the GUI when no
# gateway is present but we had one.
- name: Has old gateway and no discovered gateway setting WAN

View file

@ -68,9 +68,9 @@
iiab_preload: '{{ ansible_local["local_facts"]["iiab_preload"] }}'
- name: Install script to fully initialize network config, and/or collect data
# calling xs-network-reset w/ snapshot name, stores info, but aborts reset
# calling iiab-network-reset w/ snapshot name, stores info, but aborts reset
# intended as a convenience function for us
template: src=xs-network-reset
template: src=iiab-network-reset
dest=/usr/bin
owner=root
group=root

View file

@ -80,21 +80,21 @@ else
touch /tmp/$basket/no_iiab-network.log
fi
if [ -f /etc/sysconfig/xs_domain_name ];then
cp -p /etc/sysconfig/xs_domain_name /tmp/$basket
if [ -f /etc/sysconfig/iiab_domain_name ];then
cp -p /etc/sysconfig/iiab_domain_name /tmp/$basket
else
touch /tmp/$basket/xs_domain_name_not_set
touch /tmp/$basket/iiab_domain_name_not_set
fi
if [ -f /etc/sysconfig/xs_lan_device ];then
cp -p /etc/sysconfig/xs_lan_device /tmp/$basket
if [ -f /etc/sysconfig/iiab_lan_device ];then
cp -p /etc/sysconfig/iiab_lan_device /tmp/$basket
else
touch /tmp/$basket/xs_lan_device_not_set
touch /tmp/$basket/iiab_lan_device_not_set
fi
if [ -f /etc/sysconfig/xs_wan_device ];then
cp -p /etc/sysconfig/xs_wan_device /tmp/$basket
if [ -f /etc/sysconfig/iiab_wan_device ];then
cp -p /etc/sysconfig/iiab_wan_device /tmp/$basket
else
touch /tmp/$basket/xs_wan_device_not_set
touch /tmp/$basket/iiab_wan_device_not_set
fi
ls /etc/NetworkManager/system-connections > /dev/null
if [ $? -eq 0 ]; then
@ -120,9 +120,9 @@ else
fi
# clear out all the memory variables and let auto-configure start from scratch
rm -rf /etc/sysconfig/xs_domain_name
rm -rf /etc/sysconfig/xs_lan_device
rm -rf /etc/sysconfig/xs_wan_device
rm -rf /etc/sysconfig/iiab_domain_name
rm -rf /etc/sysconfig/iiab_lan_device
rm -rf /etc/sysconfig/iiab_wan_device
rm -rf /etc/NetworkManager/system-connestions/*
if [ -f /etc/sysconfig/network-scripts/ifcfg-WAN ];then
mv /etc/sysconfig/network-scripts/ifcfg-WAN /root

View file

@ -7,7 +7,7 @@
when: postgresql_install and is_debuntu
- name: Start postgresql service
service: name=postgresql-xs
service: name=postgresql-iiab
state=restarted
enabled=yes
when: postgresql_enabled

View file

@ -13,7 +13,7 @@ and works as follows:
/etc/systemd/system/iptables.service calls
/etc/sysconfig/iptables-config which calls
/usr/bin/xs-gen-iptables
/usr/bin/iiab-gen-iptables
and saves the resultant configuration to /etc/sysconfig/iptables
it then supplies additional rules to iptables

View file

@ -1,6 +1,6 @@
check process postgresql with pidfile /library/pgsql-xs/postmaster.pid
start program = "/sbin/service postgresql-xs start"
stop program = "/sbin/service postgresql-xs stop"
check process postgresql with pidfile /library/pgsql-iiab/postmaster.pid
start program = "/sbin/service postgresql-iiab start"
stop program = "/sbin/service postgresql-iiab stop"
if failed unixsocket /var/run/postgresql/.s.PGSQL.5432 protocol pgsql then restart
if failed host localhost port 5432 protocol pgsql then restart
if 5 restarts within 5 cycles then timeout

View file

@ -34,8 +34,8 @@
service: name=postgresql
state=stopped
- name: Start postgresql-xs
service: name=postgresql-xs
- name: Start postgresql-iiab
service: name=postgresql-iiab
state=started
- name: Create db user
@ -58,8 +58,8 @@
- name: Execute moodle startup script
command: /usr/libexec/moodle-xs-init start
- name: Restart postgresql-xs
service: name=postgresql-xs
- name: Restart postgresql-iiab
service: name=postgresql-iiab
state=restarted
- name: Restart httpd

View file

@ -83,8 +83,8 @@
state=absent
when: not moodle_enabled and is_debuntu
- name: Start postgresql-xs
service: name=postgresql-xs
- name: Start postgresql-iiab
service: name=postgresql-iiab
state=restarted
- name: Create db user
@ -109,8 +109,8 @@
src=moodle_installer
mode=0755
- name: Restart postgresql-xs
service: name=postgresql-xs
- name: Restart postgresql-iiab
service: name=postgresql-iiab
state=restarted
enabled=yes
when: moodle_enabled

View file

@ -23,7 +23,7 @@
group=root
mode={{ item.mode }}
with_items:
- { src: 'dhcp/dhcpd-xs.conf.j2', dest: '/etc/dhcpd-xs.conf', mode: '0644' }
- { src: 'dhcp/dhcpd-iiab.conf.j2', dest: '/etc/dhcpd-iiab.conf', mode: '0644' }
- { src: 'dhcp/dhcpd.service', dest: '/etc/systemd/system/dhcpd.service', mode: '0755' }
- name: Create dhcpd needed files

View file

@ -26,8 +26,8 @@
group=root
mode={{ item.mode }}
with_items:
- { src: 'named/school.local.zone.db' , dest: '/var/named-xs/' , mode: '0755' }
- { src: 'named/school.internal.zone.db' , dest: '/var/named-xs/' , mode: '0755' }
- { src: 'named/school.local.zone.db' , dest: '/var/named-iiab/' , mode: '0755' }
- { src: 'named/school.internal.zone.db' , dest: '/var/named-iiab/' , mode: '0755' }
- name: Enable named service
service: name={{ dns_service }}
@ -66,8 +66,8 @@
group={{ item.group }}
mode={{ item.mode }}
with_items:
- src: 'squid/squid-xs.conf.j2'
dest: '/etc/{{ proxy }}/squid-xs.conf'
- src: 'squid/squid-iiab.conf.j2'
dest: '/etc/{{ proxy }}/squid-iiab.conf'
owner: '{{ proxy_user }}'
group: '{{ proxy_user }}'
mode: '0644'
@ -75,7 +75,7 @@
- name: point to Squid config file from startup file
lineinfile: regexp='^CONFIG'
line='CONFIG=/etc/{{ proxy }}/squid-xs.conf'
line='CONFIG=/etc/{{ proxy }}/squid-iiab.conf'
dest=/etc/init.d/{{ proxy }}
when: squid_enabled and is_debuntu
@ -100,18 +100,21 @@
when: not wondershaper_enabled
# check-LAN should be iptables.yml remove later
- name: Grab clean copy of xs-gen-iptables
- name: Grab clean copy of iiab-gen-iptables
template: src={{ item.0 }}
dest={{ item.1 }}
owner='root'
group='root'
mode='0755'
with_items:
- { 0: 'gateway/xs-gen-iptables', 1: '/usr/bin/xs-gen-iptables' }
- { 0: 'gateway/iiab-gen-iptables', 1: '/usr/bin/iiab-gen-iptables' }
- { 0: 'gateway/check-LAN', 1: '/usr/bin/check-LAN' }
- name: Create link so that old invocation will work
file: src=/usr/bin/iiab-gen-iptables dest=/usr/bin/xs-gen-iptables state=link
- name: Execute the script that sets up userspace firewall
shell: xs-gen-iptables
shell: iiab-gen-iptables
- name: Add squid to service list
ini_file: dest='{{ service_filelist }}'

View file

@ -27,12 +27,12 @@
- network
- domain
- name: Create xs_domain_name flag
- name: Create iiab_domain_name flag
template: src=network/{{ item }}.j2
dest=/etc/sysconfig/{{ item }}
mode=0644
with_items:
- xs_domain_name
- iiab_domain_name
register: domainname
tags:
- network
@ -105,13 +105,13 @@
- network
when: is_debuntu and is_rpi and not installing
- name: Create xs network flags
- name: Create iiab network flags
template: src=network/{{ item }}.j2
dest=/etc/sysconfig/{{ item }}
mode=0644
with_items:
- xs_wan_device
- xs_lan_device
- iiab_wan_device
- iiab_lan_device
when: not installing
tags:
- network

View file

@ -30,8 +30,8 @@
mode=0755
state=directory
with_items:
- /var/named-xs
- /var/named-xs/data
- /var/named-iiab
- /var/named-iiab/data
- /etc/sysconfig/olpc-scripts/domain_config.d
- name: Configure named
@ -41,28 +41,28 @@
group=root
mode={{ item.mode }}
with_items:
- { src: 'named/named-xs.conf.j2', dest: '/etc/named-xs.conf', owner: "root" , mode: '0644' }
- { src: 'named/named-iiab.conf.j2', dest: '/etc/named-iiab.conf', owner: "root" , mode: '0644' }
- { src: 'named/named.j2', dest: '/etc/sysconfig/named', owner: "root" , mode: '0644' }
- { src: 'named/named', dest: '/etc/sysconfig/olpc-scripts/domain_config.d/named', owner: "root" , mode: '0644' }
- { src: 'named/localdomain.zone', dest: '/var/named-xs/localdomain.zone',owner: "{{ dns_user }}" , mode: '0644' }
- { src: 'named/localhost.zone', dest: '/var/named-xs/localhost.zone', owner: "{{ dns_user }}" , mode: '0644' }
- { src: 'named/named.broadcast', dest: '/var/named-xs/named.broadcast', owner: "{{ dns_user }}" , mode: '0644'}
- { src: 'named/named.ip6.local', dest: '/var/named-xs/named.ip6.local' , owner: "{{ dns_user }}" , mode: '0644'}
- { src: 'named/named.local', dest: '/var/named-xs/named.local' , owner: "{{ dns_user }}" , mode: '0644'}
- { src: 'named/named.rfc1912.zones', dest: '/var/named-xs/named.rfc1912.zones' , owner: "{{ dns_user }}" , mode: '0644'}
- { src: 'named/named.root', dest: '/var/named-xs/named.root' , owner: "{{ dns_user }}" , mode: '0644'}
- { src: 'named/named.root.hints', dest: '/var/named-xs/named.root.hints' , owner: "{{ dns_user }}" , mode: '0644'}
- { src: 'named/named.zero', dest: '/var/named-xs/named.zero' , owner: "{{ dns_user }}" , mode: '0644'}
- { src: 'named/school.external.zone.db', dest: '/var/named-xs/school.external.zone.db' , owner: "{{ dns_user }}" , mode: '0644'}
- { src: 'named/school.internal.zone.16.in-addr.db.j2', dest: '/var/named-xs/school.internal.zone.16.in-addr.db' , owner: "{{ dns_user }}" , mode: '0644'}
- { src: 'named/school.internal.zone.32.in-addr.db.j2', dest: '/var/named-xs/school.internal.zone.32.in-addr.db' , owner: "{{ dns_user }}" , mode: '0644'}
- { src: 'named/school.internal.zone.48.in-addr.db.j2', dest: '/var/named-xs/school.internal.zone.48.in-addr.db' , owner: "{{ dns_user }}" , mode: '0644'}
- { src: 'named/localdomain.zone', dest: '/var/named-iiab/localdomain.zone',owner: "{{ dns_user }}" , mode: '0644' }
- { src: 'named/localhost.zone', dest: '/var/named-iiab/localhost.zone', owner: "{{ dns_user }}" , mode: '0644' }
- { src: 'named/named.broadcast', dest: '/var/named-iiab/named.broadcast', owner: "{{ dns_user }}" , mode: '0644'}
- { src: 'named/named.ip6.local', dest: '/var/named-iiab/named.ip6.local' , owner: "{{ dns_user }}" , mode: '0644'}
- { src: 'named/named.local', dest: '/var/named-iiab/named.local' , owner: "{{ dns_user }}" , mode: '0644'}
- { src: 'named/named.rfc1912.zones', dest: '/var/named-iiab/named.rfc1912.zones' , owner: "{{ dns_user }}" , mode: '0644'}
- { src: 'named/named.root', dest: '/var/named-iiab/named.root' , owner: "{{ dns_user }}" , mode: '0644'}
- { src: 'named/named.root.hints', dest: '/var/named-iiab/named.root.hints' , owner: "{{ dns_user }}" , mode: '0644'}
- { src: 'named/named.zero', dest: '/var/named-iiab/named.zero' , owner: "{{ dns_user }}" , mode: '0644'}
- { src: 'named/school.external.zone.db', dest: '/var/named-iiab/school.external.zone.db' , owner: "{{ dns_user }}" , mode: '0644'}
- { src: 'named/school.internal.zone.16.in-addr.db.j2', dest: '/var/named-iiab/school.internal.zone.16.in-addr.db' , owner: "{{ dns_user }}" , mode: '0644'}
- { src: 'named/school.internal.zone.32.in-addr.db.j2', dest: '/var/named-iiab/school.internal.zone.32.in-addr.db' , owner: "{{ dns_user }}" , mode: '0644'}
- { src: 'named/school.internal.zone.48.in-addr.db.j2', dest: '/var/named-iiab/school.internal.zone.48.in-addr.db' , owner: "{{ dns_user }}" , mode: '0644'}
# the following two files are not writeable by named, but bind 9.4 cannot discover that fact correctly
- { src: 'named/school.internal.zone.db', dest: '/var/named-xs/school.internal.zone.db' , owner: "root" , mode: '0644'}
- { src: 'named/school.local.zone.db', dest: '/var/named-xs/school.local.zone.db' , owner: "root" , mode: '0644'}
- { src: 'named/school.internal.zone.in-addr.db.j2', dest: '/var/named-xs/school.internal.zone.in-addr.db' , owner: "{{ dns_user }}" , mode: '0644'}
- { src: 'named/dummy', dest: '/var/named-xs/data/dummy' , owner: "{{ dns_user }}" , mode: '0644'}
- { src: 'named/named.blackhole', dest: '/var/named-xs/named.blackhole' , owner: "{{ dns_user }}" , mode: '0644'}
- { src: 'named/school.internal.zone.db', dest: '/var/named-iiab/school.internal.zone.db' , owner: "root" , mode: '0644'}
- { src: 'named/school.local.zone.db', dest: '/var/named-iiab/school.local.zone.db' , owner: "root" , mode: '0644'}
- { src: 'named/school.internal.zone.in-addr.db.j2', dest: '/var/named-iiab/school.internal.zone.in-addr.db' , owner: "{{ dns_user }}" , mode: '0644'}
- { src: 'named/dummy', dest: '/var/named-iiab/data/dummy' , owner: "{{ dns_user }}" , mode: '0644'}
- { src: 'named/named.blackhole', dest: '/var/named-iiab/named.blackhole' , owner: "{{ dns_user }}" , mode: '0644'}
- name: substitute our unit file which uses $OPTIONS from sysconfig
template: src=named/{{ dns_service }}.service
@ -70,7 +70,7 @@
mode=0644
- name: The dns-jail redirect requires the named.blackhole,disabling recursion
# in named-xs.conf, and the redirection of 404 error documents to /
# in named-iiab.conf, and the redirection of 404 error documents to /
template: src=named/dns-jail.conf dest=/etc/{{ apache_config_dir }}/
when: dns_jail_enabled

View file

@ -53,5 +53,5 @@
when: iiab_network_mode == "Gateway"
- name: Run iptables
command: /usr/bin/xs-gen-iptables
command: /usr/bin/iiab-gen-iptables

View file

@ -45,8 +45,8 @@
owner: '{{ proxy_user }}'
group: '{{ proxy_user }}'
mode: '0644'
- src: 'squid/xs-httpcache.j2'
dest: '/usr/bin/xs-httpcache'
- src: 'squid/iiab-httpcache.j2'
dest: '/usr/bin/iiab-httpcache'
owner: 'root'
group: 'root'
mode: '0755'

View file

@ -4,5 +4,5 @@
## see /usr/share/doc/xs-config-<version>/README
#
# Point dhcpd to the XS-specific config
DHCPDARGS='-cf /etc/dhcpd-xs.conf {{iiab_lan_iface}}'
DHCPDARGS='-cf /etc/dhcpd-iiab.conf {{iiab_lan_iface}}'

View file

@ -13,7 +13,7 @@ SERVICE_NAME={{ dns_service }}
# This is a list of files related to this service which will have
# the domain name globally replaced inside them
CONFIG_LIST="/etc/named-xs.conf /var/named-xs/school.internal.zone.in-addr.db /var/named-xs/school.internal.zone.in-addr.db /var/named-xs/school.internal.zone.16.in-addr.db /var/named-xs/school.internal.zone.32.in-addr.db /var/named-xs/school.internal.zone.48.in-addr.db"
CONFIG_LIST="/etc/named-iiab.conf /var/named-iiab/school.internal.zone.in-addr.db /var/named-iiab/school.internal.zone.in-addr.db /var/named-iiab/school.internal.zone.16.in-addr.db /var/named-iiab/school.internal.zone.32.in-addr.db /var/named-iiab/school.internal.zone.48.in-addr.db"
# This is the suffix which original versions of modified files will have
BACKUP_SUFFIX=old

View file

@ -17,7 +17,7 @@ options
listen-on { any; };
/* listen-on-v6 { any; }; */
// Put files that named is allowed to write in the data/ directory:
directory "/var/named-xs"; // the default
directory "/var/named-iiab"; // the default
// this line will be replaced by the @@forwarders@@ option -- please leave in place
dump-file "data/cache_dump.db";
statistics-file "data/named_stats.txt";
@ -58,13 +58,13 @@ view "localhost_resolver"
recursion yes;
{% endif %}
# all views must contain the root hints zone:
include "/var/named-xs/named.root.hints";
include "/var/named-iiab/named.root.hints";
/* these are zones that contain definitions for all the localhost
* names and addresses, as recommended in RFC1912 - these names should
* ONLY be served to localhost clients:
*/
include "/var/named-xs/named.rfc1912.zones";
include "/var/named-iiab/named.rfc1912.zones";
/* and these are the local subnet names */
zone "{{ iiab_domain }}" in {
@ -87,7 +87,7 @@ view "internal"
{% endif %}
// all views must contain the root hints zone:
include "/var/named-xs/named.root.hints";
include "/var/named-iiab/named.root.hints";
// These are your "authoritative" internal zones, and would probably
// also be included in the "localhost_resolver" view above :
@ -135,7 +135,7 @@ view "external"
recursion yes;
{% endif %}
// all views must contain the root hints zone:
include "/var/named-xs/named.root.hints";
include "/var/named-iiab/named.root.hints";
// These are your "authoritative" external zones, and would probably
// also be included in the "localhost_resolver" view above :

View file

@ -9,7 +9,7 @@
### IPv6 is disabled until we have verified that the XS's IPv6 setup
### is sane (#11630)
###
OPTIONS='-4 -c /etc/named-xs.conf'
OPTIONS='-4 -c /etc/named-iiab.conf'
# Currently, you can use the following options:
#

View file

@ -10,7 +10,7 @@ if [[ $1 == "enable" ]]; then
if [ ! -d $SQUID_CACHEDIR ]; then
mkdir $SQUID_CACHEDIR
chown $SQUID_USER $SQUID_CACHEDIR
/usr/sbin/squid -f /etc/squid/squid-xs.conf -z
/usr/sbin/squid -f /etc/squid/squid-iiab.conf -z
fi
# Turn squid on after the next reboot

View file

@ -11,4 +11,4 @@ SQUID_OPTS=""
SQUID_SHUTDOWN_TIMEOUT=100
# default squid conf file
SQUID_CONF="/etc/squid/squid-xs.conf"
SQUID_CONF="/etc/squid/squid-iiab.conf"

View file

@ -42,13 +42,16 @@
- { src: 'silence', dest: '/etc/openvpn/scripts/silence', owner: "root" , mode: '0755' }
- { src: 'xscenet.conf', dest: '/etc/openvpn/xscenet.conf', owner: "root" , mode: '0644' }
- { src: 'iiab-vpn.conf.in', dest: '/etc/openvpn/iiab-vpn.conf.in', owner: "root" , mode: '0644' }
- { src: 'xs-vpn', dest: '/usr/bin/xs-vpn', owner: "root" , mode: '0755' }
- { src: 'xs-handle', dest: '/usr/bin/xs-handle', owner: "root" , mode: '0755' }
- { src: 'iiab-vpn', dest: '/usr/bin/iiab-vpn', owner: "root" , mode: '0755' }
- { src: 'iiab-handle', dest: '/usr/bin/iiab-handle', owner: "root" , mode: '0755' }
- { src: 'up_wan', dest: '/usr/lib/iiab/up_wan', owner: "root" , mode: '0755' }
- { src: 'start.j2', dest: '/usr/lib/iiab/start', owner: "root" , mode: '0755' }
- { src: 'iiab-remote-on', dest: '/usr/bin/iiab-remote-on', owner: "root" , mode: '0755' }
- { src: 'iiab-remote-off', dest: '/usr/bin/iiab-remote-off', owner: "root" , mode: '0755' }
- name: Create a link to old script for changeing handle
file: src=./iiab-handle dest=/usr/bin/xs-handle state=link
- name: put up_wan in place for debian
template: src=up_wan dest=/usr/lib/iiab/up_wan
when: is_debuntu

View file

@ -101,13 +101,13 @@
become: yes
become_user: postgres
- name: Start postgresql-xs
service: name=postgresql-xs
- name: Start postgresql-iiab
service: name=postgresql-iiab
state=started
- name: Enable pathagar postgresql user access by md5 method
lineinfile: backup=yes
dest=/library/pgsql-xs/pg_hba.conf
dest=/library/pgsql-iiab/pg_hba.conf
regexp="^host\s+pathagar"
line="host pathagar pathagar samehost md5"
state=present
@ -117,7 +117,7 @@
register: enable_pathagar_md5_access
- name: Reload postgresql service
service: name=postgresql-xs
service: name=postgresql-iiab
state=reloaded
when: enable_pathagar_md5_access.changed

View file

@ -18,15 +18,15 @@
tags:
- download
- name: Create postgresql-xs systemd service
template: src=postgresql-xs.service
dest=/etc/systemd/system/postgresql-xs.service
- name: Create postgresql-iiab systemd service
template: src=postgresql-iiab.service
dest=/etc/systemd/system/postgresql-iiab.service
owner=root
group=root
mode=0644
- name: Create postgres data directory
file: path=/library/pgsql-xs
file: path=/library/pgsql-iiab
owner=postgres
group=postgres
mode=0700
@ -42,24 +42,24 @@
when: is_debuntu
- name: Initialize the postgres db
command: su - postgres -c "/usr/lib/postgresql/9.4/bin/initdb -E 'UTF-8' --locale={{ postgresql_locale }} -D /library/pgsql-xs"
creates=/library/pgsql-xs/pg_hba.conf
command: su - postgres -c "/usr/lib/postgresql/9.4/bin/initdb -E 'UTF-8' --locale={{ postgresql_locale }} -D /library/pgsql-iiab"
creates=/library/pgsql-iiab/pg_hba.conf
when: is_debian
- name: Initialize the postgres db
command: su - postgres -c "/usr/lib/postgresql/9.5/bin/initdb -E 'UTF-8' --locale={{ postgresql_locale }} -D /library/pgsql-xs"
creates=/library/pgsql-xs/pg_hba.conf
command: su - postgres -c "/usr/lib/postgresql/9.5/bin/initdb -E 'UTF-8' --locale={{ postgresql_locale }} -D /library/pgsql-iiab"
creates=/library/pgsql-iiab/pg_hba.conf
when: is_ubuntu
- name: Initialize the postgres db
command: su - postgres -c "/usr/bin/initdb -E 'UTF-8' --lc-collate={{ postgresql_locale }} --lc-ctype={{ postgresql_locale }} -D /library/pgsql-xs"
creates=/library/pgsql-xs/pg_hba.conf
command: su - postgres -c "/usr/bin/initdb -E 'UTF-8' --lc-collate={{ postgresql_locale }} --lc-ctype={{ postgresql_locale }} -D /library/pgsql-iiab"
creates=/library/pgsql-iiab/pg_hba.conf
when: not is_debuntu
- name: Configure postgres
template: backup=yes
src=postgresql.conf.j2
dest=/library/pgsql-xs/postgresql.conf
dest=/library/pgsql-iiab/postgresql.conf
owner=postgres
group=postgres
mode=0640
@ -69,8 +69,8 @@
state=stopped
enabled=no
- name: Start and enable postgresql-xs service
service: name=postgresql-xs
- name: Start and enable postgresql-iiab service
service: name=postgresql-iiab
state=started
enabled=yes
when: postgresql_enabled

View file

@ -25,7 +25,7 @@ Environment=PG_OOM_ADJUST_VALUE=0
# PGSTARTTIMEOUT should be less than TimeoutSec value.
Environment=PGSTARTTIMEOUT=270
Environment=PGDATA=/library/pgsql-xs
Environment=PGDATA=/library/pgsql-iiab
ExecStart=/usr/lib/postgresql/{{ postgresql_version }}/bin/pg_ctl start -D ${PGDATA} -s -w -t ${PGSTARTTIMEOUT}
ExecStop=/usr/lib/postgresql/{{ postgresql_version }}/bin/pg_ctl stop -D ${PGDATA} -s -m fast
@ -42,5 +42,5 @@ WantedBy=multi-user.target
# --postgres_xs.service
.include /usr/lib/systemd/system/postgresql.service
[Service]
Environment=PGDATA=/library/pgsql-xs
Environment=PGDATA=/library/pgsql-iiab
{% endif %}

View file

@ -27,7 +27,7 @@
- name: Enable postgresl access by md5 method
lineinfile: backup=yes
dest=/library/pgsql-xs/pg_hba.conf
dest=/library/pgsql-iiab/pg_hba.conf
regexp="^host\s+statsconso"
line="host statsconso statsconso samehost md5"
state=present
@ -36,7 +36,7 @@
group=postgres
- name: Restart postgresql service
service: name=postgresql-xs
service: name=postgresql-iiab
state=restarted
- name: Create postgres user