Skip to content
Snippets Groups Projects
Unverified Commit de1d9df7 authored by Etienne Champetier's avatar Etienne Champetier Committed by GitHub
Browse files

Only use stat get_checksum: yes when needed (#7270)


By default Ansible stat module compute checksum, list extended attributes and find mime type
To find all stat invocations that really use one of those:
git grep -F stat. | grep -vE 'stat.(islnk|exists|lnk_source|writeable)'

Signed-off-by: default avatarEtienne Champetier <e.champetier@ateme.com>
parent 64502077
No related branches found
No related tags found
No related merge requests found
Showing
with 97 additions and 2 deletions
...@@ -69,6 +69,9 @@ ...@@ -69,6 +69,9 @@
- name: Check presence of fastestmirror.conf - name: Check presence of fastestmirror.conf
stat: stat:
path: /etc/yum/pluginconf.d/fastestmirror.conf path: /etc/yum/pluginconf.d/fastestmirror.conf
get_attributes: no
get_checksum: no
get_mime: no
register: fastestmirror register: fastestmirror
# the fastestmirror plugin can actually slow down Ansible deployments # the fastestmirror plugin can actually slow down Ansible deployments
......
...@@ -4,6 +4,9 @@ ...@@ -4,6 +4,9 @@
- name: Check that /etc/sysconfig/proxy file exists - name: Check that /etc/sysconfig/proxy file exists
stat: stat:
path: /etc/sysconfig/proxy path: /etc/sysconfig/proxy
get_attributes: no
get_checksum: no
get_mime: no
register: stat_result register: stat_result
- name: Create the /etc/sysconfig/proxy empty file - name: Create the /etc/sysconfig/proxy empty file
......
...@@ -85,6 +85,9 @@ ...@@ -85,6 +85,9 @@
- name: Check presence of fastestmirror.conf - name: Check presence of fastestmirror.conf
stat: stat:
path: /etc/yum/pluginconf.d/fastestmirror.conf path: /etc/yum/pluginconf.d/fastestmirror.conf
get_attributes: no
get_checksum: no
get_mime: no
register: fastestmirror register: fastestmirror
# the fastestmirror plugin can actually slow down Ansible deployments # the fastestmirror plugin can actually slow down Ansible deployments
......
...@@ -2,6 +2,9 @@ ...@@ -2,6 +2,9 @@
- name: check if fedora coreos - name: check if fedora coreos
stat: stat:
path: /run/ostree-booted path: /run/ostree-booted
get_attributes: no
get_checksum: no
get_mime: no
register: ostree register: ostree
- name: set is_ostree - name: set is_ostree
......
...@@ -2,6 +2,9 @@ ...@@ -2,6 +2,9 @@
- name: check if fedora coreos - name: check if fedora coreos
stat: stat:
path: /run/ostree-booted path: /run/ostree-booted
get_attributes: no
get_checksum: no
get_mime: no
register: ostree register: ostree
- name: set is_ostree - name: set is_ostree
...@@ -94,6 +97,9 @@ ...@@ -94,6 +97,9 @@
- name: Check if already installed - name: Check if already installed
stat: stat:
path: "/bin/crio" path: "/bin/crio"
get_attributes: no
get_checksum: no
get_mime: no
register: need_bootstrap_crio register: need_bootstrap_crio
when: is_ostree when: is_ostree
......
...@@ -9,6 +9,9 @@ ...@@ -9,6 +9,9 @@
- name: Check if binary exists - name: Check if binary exists
stat: stat:
path: "{{ crun_bin_dir }}/crun" path: "{{ crun_bin_dir }}/crun"
get_attributes: no
get_checksum: no
get_mime: no
register: crun_stat register: crun_stat
# TODO: use download_file.yml # TODO: use download_file.yml
......
...@@ -2,6 +2,9 @@ ...@@ -2,6 +2,9 @@
- name: check if fedora coreos - name: check if fedora coreos
stat: stat:
path: /run/ostree-booted path: /run/ostree-booted
get_attributes: no
get_checksum: no
get_mime: no
register: ostree register: ostree
- name: set is_ostree - name: set is_ostree
......
...@@ -24,6 +24,9 @@ ...@@ -24,6 +24,9 @@
- name: download_container | Determine if image is in cache - name: download_container | Determine if image is in cache
stat: stat:
path: "{{ image_path_cached }}" path: "{{ image_path_cached }}"
get_attributes: no
get_checksum: no
get_mime: no
delegate_to: localhost delegate_to: localhost
connection: local connection: local
delegate_facts: no delegate_facts: no
......
...@@ -29,6 +29,9 @@ ...@@ -29,6 +29,9 @@
- name: Stat etcd v2 data directory - name: Stat etcd v2 data directory
stat: stat:
path: "{{ etcd_data_dir }}/member" path: "{{ etcd_data_dir }}/member"
get_attributes: no
get_checksum: no
get_mime: no
register: etcd_data_dir_member register: etcd_data_dir_member
- name: Backup etcd v2 data - name: Backup etcd v2 data
......
...@@ -17,6 +17,9 @@ ...@@ -17,6 +17,9 @@
- name: "Check certs | Register ca and etcd admin/member certs on etcd hosts" - name: "Check certs | Register ca and etcd admin/member certs on etcd hosts"
stat: stat:
path: "{{ etcd_cert_dir }}/{{ item }}" path: "{{ etcd_cert_dir }}/{{ item }}"
get_attributes: no
get_checksum: yes
get_mime: no
register: etcd_member_certs register: etcd_member_certs
when: inventory_hostname in groups['etcd'] when: inventory_hostname in groups['etcd']
with_items: with_items:
......
...@@ -9,6 +9,9 @@ ...@@ -9,6 +9,9 @@
- name: Check if etcdctl exist - name: Check if etcdctl exist
stat: stat:
path: "{{ bin_dir }}/etcdctl" path: "{{ bin_dir }}/etcdctl"
get_attributes: no
get_checksum: no
get_mime: no
register: stat_etcdctl register: stat_etcdctl
- block: - block:
...@@ -28,6 +31,9 @@ ...@@ -28,6 +31,9 @@
- name: Check if etcdctl still exist after version check - name: Check if etcdctl still exist after version check
stat: stat:
path: "{{ bin_dir }}/etcdctl" path: "{{ bin_dir }}/etcdctl"
get_attributes: no
get_checksum: no
get_mime: no
register: stat_etcdctl register: stat_etcdctl
- block: - block:
......
...@@ -17,6 +17,9 @@ ...@@ -17,6 +17,9 @@
- name: Check if bash_completion.d folder exists # noqa 503 - name: Check if bash_completion.d folder exists # noqa 503
stat: stat:
path: "/etc/bash_completion.d/" path: "/etc/bash_completion.d/"
get_attributes: no
get_checksum: no
get_mime: no
register: stat_result register: stat_result
- name: Get helm completion - name: Get helm completion
......
...@@ -2,6 +2,9 @@ ...@@ -2,6 +2,9 @@
- name: Check if secret for encrypting data at rest already exist - name: Check if secret for encrypting data at rest already exist
stat: stat:
path: "{{ kube_cert_dir }}/secrets_encryption.yaml" path: "{{ kube_cert_dir }}/secrets_encryption.yaml"
get_attributes: no
get_checksum: no
get_mime: no
register: secrets_encryption_file register: secrets_encryption_file
- name: Slurp secrets_encryption file if it exists - name: Slurp secrets_encryption file if it exists
......
...@@ -2,6 +2,9 @@ ...@@ -2,6 +2,9 @@
- name: kubeadm | Check if old apiserver cert exists on host - name: kubeadm | Check if old apiserver cert exists on host
stat: stat:
path: "{{ kube_cert_dir }}/apiserver.pem" path: "{{ kube_cert_dir }}/apiserver.pem"
get_attributes: no
get_checksum: no
get_mime: no
register: old_apiserver_cert register: old_apiserver_cert
delegate_to: "{{ groups['kube-master'] | first }}" delegate_to: "{{ groups['kube-master'] | first }}"
run_once: true run_once: true
...@@ -24,12 +27,18 @@ ...@@ -24,12 +27,18 @@
- name: kubeadm | Check serviceaccount key - name: kubeadm | Check serviceaccount key
stat: stat:
path: "{{ kube_cert_dir }}/sa.key" path: "{{ kube_cert_dir }}/sa.key"
get_attributes: no
get_checksum: yes
get_mime: no
register: sa_key_before register: sa_key_before
run_once: true run_once: true
- name: kubeadm | Check if kubeadm has already run - name: kubeadm | Check if kubeadm has already run
stat: stat:
path: "/var/lib/kubelet/config.yaml" path: "/var/lib/kubelet/config.yaml"
get_attributes: no
get_checksum: no
get_mime: no
register: kubeadm_already_run register: kubeadm_already_run
- name: kubeadm | Delete old admin.conf - name: kubeadm | Delete old admin.conf
...@@ -211,6 +220,9 @@ ...@@ -211,6 +220,9 @@
- name: kubeadm | Check serviceaccount key again - name: kubeadm | Check serviceaccount key again
stat: stat:
path: "{{ kube_cert_dir }}/sa.key" path: "{{ kube_cert_dir }}/sa.key"
get_attributes: no
get_checksum: yes
get_mime: no
register: sa_key_after register: sa_key_after
run_once: true run_once: true
......
...@@ -13,11 +13,17 @@ ...@@ -13,11 +13,17 @@
- name: Check if kubelet.conf exists - name: Check if kubelet.conf exists
stat: stat:
path: "{{ kube_config_dir }}/kubelet.conf" path: "{{ kube_config_dir }}/kubelet.conf"
get_attributes: no
get_checksum: no
get_mime: no
register: kubelet_conf register: kubelet_conf
- name: Check if kubeadm CA cert is accessible - name: Check if kubeadm CA cert is accessible
stat: stat:
path: "{{ kube_cert_dir }}/ca.crt" path: "{{ kube_cert_dir }}/ca.crt"
get_attributes: no
get_checksum: no
get_mime: no
register: kubeadm_ca_stat register: kubeadm_ca_stat
delegate_to: "{{ groups['kube-master'][0] }}" delegate_to: "{{ groups['kube-master'][0] }}"
run_once: true run_once: true
......
...@@ -22,6 +22,9 @@ ...@@ -22,6 +22,9 @@
- name: haproxy | Get checksum from config - name: haproxy | Get checksum from config
stat: stat:
path: "{{ haproxy_config_dir }}/haproxy.cfg" path: "{{ haproxy_config_dir }}/haproxy.cfg"
get_attributes: no
get_checksum: yes
get_mime: no
register: haproxy_stat register: haproxy_stat
- name: haproxy | Write static pod - name: haproxy | Write static pod
......
...@@ -22,6 +22,9 @@ ...@@ -22,6 +22,9 @@
- name: nginx-proxy | Get checksum from config - name: nginx-proxy | Get checksum from config
stat: stat:
path: "{{ nginx_config_dir }}/nginx.conf" path: "{{ nginx_config_dir }}/nginx.conf"
get_attributes: no
get_checksum: yes
get_mime: no
register: nginx_stat register: nginx_stat
- name: nginx-proxy | Write static pod - name: nginx-proxy | Write static pod
......
...@@ -50,13 +50,21 @@ ...@@ -50,13 +50,21 @@
# FIXME(mattymo): Also restart for kubeadm mode # FIXME(mattymo): Also restart for kubeadm mode
- name: Preinstall | kube-apiserver configured - name: Preinstall | kube-apiserver configured
stat: path="{{ kube_manifest_dir }}/kube-apiserver.manifest" stat:
path: "{{ kube_manifest_dir }}/kube-apiserver.manifest"
get_attributes: no
get_checksum: no
get_mime: no
register: kube_apiserver_set register: kube_apiserver_set
when: inventory_hostname in groups['kube-master'] and dns_mode != 'none' and resolvconf_mode == 'host_resolvconf' when: inventory_hostname in groups['kube-master'] and dns_mode != 'none' and resolvconf_mode == 'host_resolvconf'
# FIXME(mattymo): Also restart for kubeadm mode # FIXME(mattymo): Also restart for kubeadm mode
- name: Preinstall | kube-controller configured - name: Preinstall | kube-controller configured
stat: path="{{ kube_manifest_dir }}/kube-controller-manager.manifest" stat:
path: "{{ kube_manifest_dir }}/kube-controller-manager.manifest"
get_attributes: no
get_checksum: no
get_mime: no
register: kube_controller_set register: kube_controller_set
when: inventory_hostname in groups['kube-master'] and dns_mode != 'none' and resolvconf_mode == 'host_resolvconf' when: inventory_hostname in groups['kube-master'] and dns_mode != 'none' and resolvconf_mode == 'host_resolvconf'
......
...@@ -9,6 +9,9 @@ ...@@ -9,6 +9,9 @@
- name: check if booted with ostree - name: check if booted with ostree
stat: stat:
path: /run/ostree-booted path: /run/ostree-booted
get_attributes: no
get_checksum: no
get_mime: no
register: ostree register: ostree
- name: set is_fedora_coreos - name: set is_fedora_coreos
...@@ -59,6 +62,9 @@ ...@@ -59,6 +62,9 @@
- name: check if kubelet is configured - name: check if kubelet is configured
stat: stat:
path: "{{ kube_config_dir }}/kubelet.env" path: "{{ kube_config_dir }}/kubelet.env"
get_attributes: no
get_checksum: no
get_mime: no
register: kubelet_configured register: kubelet_configured
changed_when: false changed_when: false
...@@ -84,6 +90,9 @@ ...@@ -84,6 +90,9 @@
- name: check if /etc/dhclient.conf exists - name: check if /etc/dhclient.conf exists
stat: stat:
path: /etc/dhclient.conf path: /etc/dhclient.conf
get_attributes: no
get_checksum: no
get_mime: no
register: dhclient_stat register: dhclient_stat
- name: target dhclient conf file for /etc/dhclient.conf - name: target dhclient conf file for /etc/dhclient.conf
...@@ -94,6 +103,9 @@ ...@@ -94,6 +103,9 @@
- name: check if /etc/dhcp/dhclient.conf exists - name: check if /etc/dhcp/dhclient.conf exists
stat: stat:
path: /etc/dhcp/dhclient.conf path: /etc/dhcp/dhclient.conf
get_attributes: no
get_checksum: no
get_mime: no
register: dhcp_dhclient_stat register: dhcp_dhclient_stat
- name: target dhclient conf file for /etc/dhcp/dhclient.conf - name: target dhclient conf file for /etc/dhcp/dhclient.conf
...@@ -170,6 +182,9 @@ ...@@ -170,6 +182,9 @@
- name: check /usr readonly - name: check /usr readonly
stat: stat:
path: "/usr" path: "/usr"
get_attributes: no
get_checksum: no
get_mime: no
register: usr register: usr
- name: set alternate flexvolume path - name: set alternate flexvolume path
......
...@@ -46,6 +46,9 @@ ...@@ -46,6 +46,9 @@
- name: Check if kubernetes kubeadm compat cert dir exists - name: Check if kubernetes kubeadm compat cert dir exists
stat: stat:
path: "{{ kube_cert_compat_dir }}" path: "{{ kube_cert_compat_dir }}"
get_attributes: no
get_checksum: no
get_mime: no
register: kube_cert_compat_dir_check register: kube_cert_compat_dir_check
when: when:
- inventory_hostname in groups['k8s-cluster'] - inventory_hostname in groups['k8s-cluster']
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Please register or to comment