From d68771ea7ace5782b999f585dd2215cc48e484fe Mon Sep 17 00:00:00 2001
From: Sven-Hendrik Haase <svenstaro@gmail.com>
Date: Wed, 23 Sep 2020 22:22:34 +0200
Subject: [PATCH] Fix for ansible 2.10 (fixes #149)

---
 playbooks/luna.yml                        | 4 ++--
 playbooks/tasks/fetch-borg-keys.yml       | 2 +-
 roles/aurweb/tasks/main.yml               | 7 ++++++-
 roles/certbot/tasks/main.yml              | 2 +-
 roles/dbscripts/tasks/main.yml            | 4 ++--
 roles/dovecot/tasks/main.yml              | 2 +-
 roles/firewalld/tasks/main.yml            | 2 +-
 roles/gitlab/tasks/main.yml               | 4 ++--
 roles/gitlab_runner/tasks/main.yml        | 2 +-
 roles/keycloak/tasks/main.yml             | 2 +-
 roles/matrix/tasks/main.yml               | 2 +-
 roles/nginx/tasks/main.yml                | 2 +-
 roles/postfix/tasks/main.yml              | 2 +-
 roles/postgres/tasks/main.yml             | 4 ++--
 roles/prometheus_exporters/tasks/main.yml | 8 ++++----
 roles/quassel/tasks/main.yml              | 2 +-
 roles/sshd/tasks/main.yml                 | 2 +-
 roles/syncrepo/tasks/main.yml             | 2 +-
 roles/zabbix_agent/tasks/main.yml         | 2 +-
 roles/zabbix_server/tasks/main.yml        | 2 +-
 20 files changed, 32 insertions(+), 27 deletions(-)

diff --git a/playbooks/luna.yml b/playbooks/luna.yml
index 3617b546d..0441ad96a 100644
--- a/playbooks/luna.yml
+++ b/playbooks/luna.yml
@@ -5,7 +5,7 @@
   remote_user: root
   tasks:
     - name: open firewall holes for services
-      firewalld: service={{ item }} permanent=true state=enabled immediate=yes
+      ansible.posix.firewalld: service={{ item }} permanent=true state=enabled immediate=yes
       with_items:
         - http
         - https
@@ -17,7 +17,7 @@
         - firewall
 
     - name: open firewall holes for ports
-      firewalld: port={{ item }} permanent=true state=enabled immediate=yes
+      ansible.posix.firewalld: port={{ item }} permanent=true state=enabled immediate=yes
       with_items:
         - 6969/tcp
         - 4949/tcp
diff --git a/playbooks/tasks/fetch-borg-keys.yml b/playbooks/tasks/fetch-borg-keys.yml
index 9ef97ce4a..778dd698e 100644
--- a/playbooks/tasks/fetch-borg-keys.yml
+++ b/playbooks/tasks/fetch-borg-keys.yml
@@ -4,7 +4,7 @@
   hosts: 127.0.0.1
   tasks:
       - name: create borg-keys directory
-        file: path="{{ playbook_dir }}/../../borg-keys/" state=directory mode=preserve
+        file: path="{{ playbook_dir }}/../../borg-keys/" state=directory mode=preserve  # noqa 208
 
 - name: fetch borg keys
   hosts: borg_clients
diff --git a/roles/aurweb/tasks/main.yml b/roles/aurweb/tasks/main.yml
index e4d34ee94..6b8d04960 100644
--- a/roles/aurweb/tasks/main.yml
+++ b/roles/aurweb/tasks/main.yml
@@ -172,7 +172,12 @@
 - name: deploy new smartgit release
   become: true
   become_user: "{{ aurweb_user }}"
-  file: path=/etc/uwsgi/vassals/smartgit.ini state=touch mode=preserve
+  file:
+    path: /etc/uwsgi/vassals/smartgit.ini
+    state: touch
+    owner: "{{ aurweb_user }}"
+    group: http
+    mode: 0644
   when: git.changed
 
 - name: create git repo dir
diff --git a/roles/certbot/tasks/main.yml b/roles/certbot/tasks/main.yml
index 8481c81c4..1e74e0046 100644
--- a/roles/certbot/tasks/main.yml
+++ b/roles/certbot/tasks/main.yml
@@ -23,7 +23,7 @@
     daemon_reload: yes
 
 - name: open firewall holes for certbot standalone authenticator
-  firewalld: service={{ item }} permanent=true state=enabled immediate=yes
+  ansible.posix.firewalld: service={{ item }} permanent=true state=enabled immediate=yes
   with_items:
     - http
   when: configure_firewall
diff --git a/roles/dbscripts/tasks/main.yml b/roles/dbscripts/tasks/main.yml
index b92b1d26e..198b7b817 100644
--- a/roles/dbscripts/tasks/main.yml
+++ b/roles/dbscripts/tasks/main.yml
@@ -295,7 +295,7 @@
   service: name=rsyncd.socket enabled=yes state=started
 
 - name: open firewall holes for rsync
-  firewalld: service=rsyncd permanent=true state=enabled immediate=yes
+  ansible.posix.firewalld: service=rsyncd permanent=true state=enabled immediate=yes
   when: configure_firewall
   tags:
     - firewall
@@ -307,7 +307,7 @@
   service: name=svnserve enabled=yes state=started
 
 - name: open firewall holes for svnserve
-  firewalld: port=3690/tcp permanent=true state=enabled immediate=yes
+  ansible.posix.firewalld: port=3690/tcp permanent=true state=enabled immediate=yes
   when: configure_firewall
   tags:
     - firewall
diff --git a/roles/dovecot/tasks/main.yml b/roles/dovecot/tasks/main.yml
index 57b9662ee..b6a3e34d2 100644
--- a/roles/dovecot/tasks/main.yml
+++ b/roles/dovecot/tasks/main.yml
@@ -21,7 +21,7 @@
   service: name=dovecot enabled=yes state=started
 
 - name: open firewall holes
-  firewalld: service={{ item }} permanent=true state=enabled immediate=yes
+  ansible.posix.firewalld: service={{ item }} permanent=true state=enabled immediate=yes
   with_items:
     - pop3
     - pop3s
diff --git a/roles/firewalld/tasks/main.yml b/roles/firewalld/tasks/main.yml
index 39de6c741..c18233bd4 100644
--- a/roles/firewalld/tasks/main.yml
+++ b/roles/firewalld/tasks/main.yml
@@ -17,7 +17,7 @@
     state: "{{ configure_firewall | ternary('started', 'stopped') }}"
 
 - name: disable default dhcpv6-client rule
-  firewalld:
+  ansible.posix.firewalld:
     service: dhcpv6-client
     state: disabled
     immediate: yes
diff --git a/roles/gitlab/tasks/main.yml b/roles/gitlab/tasks/main.yml
index f6048f316..39860b0a1 100644
--- a/roles/gitlab/tasks/main.yml
+++ b/roles/gitlab/tasks/main.yml
@@ -86,7 +86,7 @@
       - "/srv/gitlab/data:/var/opt/gitlab"
 
 - name: open firewall holes
-  firewalld: port={{ item }} permanent=true state=enabled immediate=yes
+  ansible.posix.firewalld: port={{ item }} permanent=true state=enabled immediate=yes
   when: configure_firewall
   with_items:
     - "80/tcp"
@@ -97,7 +97,7 @@
     - firewall
 
 - name: make docker0 interface trusted
-  firewalld: interface=docker0 zone=trusted permanent=true state=enabled immediate=yes
+  ansible.posix.firewalld: interface=docker0 zone=trusted permanent=true state=enabled immediate=yes
   when: configure_firewall
   tags:
     - firewall
diff --git a/roles/gitlab_runner/tasks/main.yml b/roles/gitlab_runner/tasks/main.yml
index f1a70b46c..cebed672c 100644
--- a/roles/gitlab_runner/tasks/main.yml
+++ b/roles/gitlab_runner/tasks/main.yml
@@ -8,7 +8,7 @@
   systemd: name=docker enabled=yes state=started daemon_reload=yes
 
 - name: make docker0 interface trusted
-  firewalld: interface=docker0 zone=trusted permanent=true state=enabled immediate=yes
+  ansible.posix.firewalld: interface=docker0 zone=trusted permanent=true state=enabled immediate=yes
   when: configure_firewall
   tags:
     - firewall
diff --git a/roles/keycloak/tasks/main.yml b/roles/keycloak/tasks/main.yml
index a3d3a781e..5e6fc1e80 100644
--- a/roles/keycloak/tasks/main.yml
+++ b/roles/keycloak/tasks/main.yml
@@ -27,7 +27,7 @@
   service: name=keycloak enabled=yes state=started
 
 - name: open firewall hole
-  firewalld: port={{ item }} permanent=true state=enabled immediate=yes
+  ansible.posix.firewalld: port={{ item }} permanent=true state=enabled immediate=yes
   when: configure_firewall
   with_items:
     - 80/tcp
diff --git a/roles/matrix/tasks/main.yml b/roles/matrix/tasks/main.yml
index 3242ab0f9..125f56376 100644
--- a/roles/matrix/tasks/main.yml
+++ b/roles/matrix/tasks/main.yml
@@ -195,7 +195,7 @@
     - restart matrix-appservice-irc
 
 - name: open firewall holes
-  firewalld: port={{ item }} permanent=true state=enabled immediate=yes
+  ansible.posix.firewalld: port={{ item }} permanent=true state=enabled immediate=yes
   with_items:
     - 113/tcp
   when: configure_firewall
diff --git a/roles/nginx/tasks/main.yml b/roles/nginx/tasks/main.yml
index 1a882844e..443028701 100644
--- a/roles/nginx/tasks/main.yml
+++ b/roles/nginx/tasks/main.yml
@@ -56,7 +56,7 @@
   service: name=nginx enabled=yes
 
 - name: open firewall holes
-  firewalld: service={{ item }} permanent=true state=enabled immediate=yes
+  ansible.posix.firewalld: service={{ item }} permanent=true state=enabled immediate=yes
   with_items:
     - http
     - https
diff --git a/roles/postfix/tasks/main.yml b/roles/postfix/tasks/main.yml
index b2dbd6a63..256b398fd 100644
--- a/roles/postfix/tasks/main.yml
+++ b/roles/postfix/tasks/main.yml
@@ -104,7 +104,7 @@
     create_home: no
 
 - name: open firewall holes
-  firewalld: service={{ item }} permanent=true state=enabled immediate=yes
+  ansible.posix.firewalld: service={{ item }} permanent=true state=enabled immediate=yes
   with_items:
     - smtp
     - smtp-submission
diff --git a/roles/postgres/tasks/main.yml b/roles/postgres/tasks/main.yml
index c6a801e58..043cf87da 100644
--- a/roles/postgres/tasks/main.yml
+++ b/roles/postgres/tasks/main.yml
@@ -67,7 +67,7 @@
   when: postgres_ssl == 'on'
 
 - name: open firewall holes to known postgresql ipv4 clients
-  firewalld: permanent=true state=enabled immediate=yes
+  ansible.posix.firewalld: permanent=true state=enabled immediate=yes
     rich_rule="rule family=ipv4 source address={{ item }} port protocol=tcp port=5432 accept"
   with_items: "{{ postgres_ssl_hosts4 }}"
   when: configure_firewall
@@ -75,7 +75,7 @@
     - firewall
 
 - name: open firewall holes to known postgresql ipv6 clients
-  firewalld: permanent=true state=enabled immediate=yes
+  ansible.posix.firewalld: permanent=true state=enabled immediate=yes
     rich_rule="rule family=ipv6 source address={{ item }} port protocol=tcp port=5432 accept"
   with_items: "{{ postgres_ssl_hosts6 }}"
   when: configure_firewall
diff --git a/roles/prometheus_exporters/tasks/main.yml b/roles/prometheus_exporters/tasks/main.yml
index cfb743e6b..93af5f68b 100644
--- a/roles/prometheus_exporters/tasks/main.yml
+++ b/roles/prometheus_exporters/tasks/main.yml
@@ -110,21 +110,21 @@
   when: "'memcached' in group_names"
 
 - name: open prometheus-node-exporter ipv4 port for monitoring.archlinux.org
-  firewalld: state=enabled permanent=true immediate=yes
+  ansible.posix.firewalld: state=enabled permanent=true immediate=yes
         rich_rule="rule family=ipv4 source address={{ hostvars['monitoring.archlinux.org']['ipv4_address'] }} port protocol=tcp port={{ prometheus_exporter_port }} accept"
   when: "'prometheus' not in group_names"
 
 - name: open gitlab exporter ipv4 port for monitoring.archlinux.org
-  firewalld: state=enabled permanent=true immediate=yes
+  ansible.posix.firewalld: state=enabled permanent=true immediate=yes
         rich_rule="rule family=ipv4 source address={{ hostvars['monitoring.archlinux.org']['ipv4_address'] }} port protocol=tcp port={{ gitlab_runner_exporter_port }} accept"
   when: "'gitlab_runners' in group_names"
 
 - name: open prometheus mysqld exporter ipv4 port for monitoring.archlinux.org
-  firewalld: state=enabled permanent=true immediate=yes
+  ansible.posix.firewalld: state=enabled permanent=true immediate=yes
         rich_rule="rule family=ipv4 source address={{ hostvars['monitoring.archlinux.org']['ipv4_address'] }} port protocol=tcp port={{ prometheus_mysqld_exporter_port }} accept"
   when: "'mysql_servers' in group_names"
 
 - name: open prometheus memcached exporter ipv4 port for monitoring.archlinux.org
-  firewalld: state=enabled permanent=true immediate=yes
+  ansible.posix.firewalld: state=enabled permanent=true immediate=yes
         rich_rule="rule family=ipv4 source address={{ hostvars['monitoring.archlinux.org']['ipv4_address'] }} port protocol=tcp port={{ prometheus_memcached_exporter_port }} accept"
   when: "'memcached' in group_names"
diff --git a/roles/quassel/tasks/main.yml b/roles/quassel/tasks/main.yml
index d825bbfb1..0b92884bd 100644
--- a/roles/quassel/tasks/main.yml
+++ b/roles/quassel/tasks/main.yml
@@ -57,7 +57,7 @@
     - clean-quassel.timer
 
 - name: open firewall holes
-  firewalld: port={{ item }} permanent=true state=enabled immediate=yes
+  ansible.posix.firewalld: port={{ item }} permanent=true state=enabled immediate=yes
   with_items:
     - 4242/tcp
     - 113/tcp
diff --git a/roles/sshd/tasks/main.yml b/roles/sshd/tasks/main.yml
index 1c889b302..821a1f29e 100644
--- a/roles/sshd/tasks/main.yml
+++ b/roles/sshd/tasks/main.yml
@@ -22,7 +22,7 @@
   service: name=sshd enabled=yes state=started
 
 - name: open firewall holes
-  firewalld: service=ssh permanent=true state=enabled immediate=yes
+  ansible.posix.firewalld: service=ssh permanent=true state=enabled immediate=yes
   when: configure_firewall is defined and configure_firewall
   tags:
     - firewall
diff --git a/roles/syncrepo/tasks/main.yml b/roles/syncrepo/tasks/main.yml
index 5e42a837c..9f7f8b902 100644
--- a/roles/syncrepo/tasks/main.yml
+++ b/roles/syncrepo/tasks/main.yml
@@ -51,7 +51,7 @@
   tags: ['nginx']
 
 - name: open firewall holes
-  firewalld: service=rsyncd permanent=true state=enabled immediate=yes
+  ansible.posix.firewalld: service=rsyncd permanent=true state=enabled immediate=yes
   when: configure_firewall
   tags:
     - firewall
diff --git a/roles/zabbix_agent/tasks/main.yml b/roles/zabbix_agent/tasks/main.yml
index a888bef04..7476329a3 100644
--- a/roles/zabbix_agent/tasks/main.yml
+++ b/roles/zabbix_agent/tasks/main.yml
@@ -122,7 +122,7 @@
   service: name=zabbix-agent enabled=yes state=started
 
 - name: open firewall holes
-  firewalld: service=zabbix-agent permanent=true state=enabled immediate=yes
+  ansible.posix.firewalld: service=zabbix-agent permanent=true state=enabled immediate=yes
   when: configure_firewall
   tags:
     - firewall
diff --git a/roles/zabbix_server/tasks/main.yml b/roles/zabbix_server/tasks/main.yml
index f3c7fe6ee..35aeb15bc 100644
--- a/roles/zabbix_server/tasks/main.yml
+++ b/roles/zabbix_server/tasks/main.yml
@@ -75,7 +75,7 @@
   service: name=php-fpm@zabbix-web.socket state=started enabled=true
 
 - name: open firewall holes
-  firewalld: service=zabbix-server permanent=true state=enabled immediate=yes
+  ansible.posix.firewalld: service=zabbix-server permanent=true state=enabled immediate=yes
   when: configure_firewall
   tags:
     - firewall
-- 
GitLab