Skip to content

Instantly share code, notes, and snippets.

DEBUG: xmsg_host is not defined
DEBUG: irods_authentication_scheme is not defined
DEBUG: xmsg_port is not defined
DEBUG: irods_debug is not defined
DEBUG: irods_authentication_file is not defined
DEBUG: irods_ssl_ca_certificate_path is not defined
DEBUG: irods_ssl_ca_certificate_file is not defined
DEBUG: irods_ssl_verify_server is not defined
DEBUG: irods_ssl_certificate_chain_file is not defined
DEBUG: irods_ssl_certificate_key_file is not defined
+---------------------+
| Attempting test put |
+---------------------+
Putting the test file into iRODS...
Error encountered running setup_irods:
Traceback (most recent call last):
File "/var/lib/irods/scripts/setup_irods.py", line 436, in main
setup_server(irods_config, json_configuration_file=options.json_configuration_file)
File "/var/lib/irods/scripts/setup_irods.py", line 131, in setup_server
-bash-4.2$ ils [52/1937]
DEBUG: irods_authentication_file is not defined
DEBUG: irods_ssl_ca_certificate_path is not defined
DEBUG: irods_ssl_ca_certificate_file is not defined
DEBUG: irods_ssl_verify_server is not defined
DEBUG: irods_ssl_certificate_chain_file is not defined
DEBUG: irods_ssl_certificate_key_file is not defined
DEBUG: irods_ssl_dh_params_file is not defined
DEBUG: irods_server_control_plane_key is not defined
DEBUG: irods_server_control_plane_encryption_num_hash_rounds is not defined
Mar 6 09:37:14 pid:79062 NOTICE: Agent factory process pid = [79063]
LocalHostName: test-irods, 172.30.16.58, localhost, Port Num: 1247.
terminating with uncaught exception of type irods::exception: iRODS Exception:
file: /tmp/tmpjt2RjT/lib/core/include/irods_configuration_parser.hpp
function: T &irods::configuration_parser::get(const std::string &) [T = const std::__1::vector<boost::any, std::__1::allocator<boost::any> > &]
line: 81
code: -1800000
message:
key "rule_engine_namespaces" not found in map.
{
"admin_password": "test",
"host_access_control_config": {
"access_entries": []
},
"host_system_information": {
"service_account_user_name": "irodsuser",
"service_account_group_name": "irodsusergroup"
},
"hosts_config": {
@cinek810
cinek810 / validateKnownSuffix.py
Created February 3, 2019 13:00
ansible-review standard making sure that template is validate for specific destination file names
#Author: Marcin Stolarek (stolarek.marcin@gmail.com/funinit.wordpress.com)
###############################
from jinja2 import Environment
def template_of_known_type_should_be_verified(candidate,setting):
result = Result(candidate.path)
with codecs.open(candidate.path, mode='rb', encoding='utf-8') as f:
tasks = parse_yaml_linenumbers(f.read(), candidate.path)
import codecs
import os
import yaml
from ansiblereview import Result, Error, Standard, lintcheck
from ansiblereview.utils.yamlindent import yamlreview
from ansiblereview.inventory import parse, no_vars_in_host_file
from ansiblereview.code import code_passes_flake8
from ansiblereview.vars import repeated_vars
from ansiblereview.playbook import repeated_names
@cinek810
cinek810 / ansible-review-standard-serviceShouldNotBeRestartedInTask.py
Created December 15, 2018 22:10
ansible-review standard checking if service is restarted in task (funinit.wordpress.com)
import json
def check_service_restart(candidate,setting):
result = Result(candidate.path)
with codecs.open(candidate.path, mode='rb', encoding='utf-8') as f:
tasks = parse_yaml_linenumbers(f.read(), candidate.path)
for task in tasks:
if "service" in task and task["service"]["state"] is not None and task["service"]["state"] == "restarted":
result.errors.append(Error(task["__line__"],json.dumps(task["service"],indent=4)))
return result
@cinek810
cinek810 / ansible-review-standard-allVaultedDefaultsShouldByPrefixedByRoleName.py
Last active December 16, 2018 12:49
ansible review standard checking vaulted defaults in roles and verifying if all defaults are prefixed by role name
from ansible_vault import Vault
def check_defaults_prefix(candidate,setting):
result = Result(candidate.path)
pathSpliter = re.compile("roles/([a-zA-Z0-9_\-]+)/defaults/main.yml")
splittedPath = pathSpliter.match(candidate.path)
if splittedPath is not None:
with codecs.open(candidate.path, mode='rb', encoding='utf-8') as f:
vault_password = open('/etc/ansible/vault-password','r').readline().rstrip("\n")
vault = Vault(vault_password)
@cinek810
cinek810 / ansible-review-standard-allTasksShouldContainTag.py
Created December 15, 2018 22:07
ansible-review standard checking if all tasks in role are tagged with "role_ROLENAME"
import re
def check_role_tag(candidate,setting):
result = Result(candidate.path)
pathSpliter = re.compile("roles/([a-zA-Z0-9_\-]+)/tasks/main.yml")
splittedPath = pathSpliter.match(candidate.path)
if splittedPath is not None:
with codecs.open(candidate.path, mode='rb', encoding='utf-8') as f:
tasks = parse_yaml_linenumbers(f.read(), candidate.path)
for task in tasks:
if "role_"+splittedPath.group(1) not in task["tags"]: