Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Adding-wazuh-path-defaults #1480

Merged
merged 2 commits into from
Feb 27, 2024
Merged
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 2 additions & 0 deletions roles/debian/wazuh/defaults/main.yml
Original file line number Diff line number Diff line change
@@ -1,4 +1,6 @@
---
_wazuh_path: ""

wazuh:
#roles_directory: "/path/to/roles" # defaults to /home/controller/.ansible/roles/wazuh-ansible
branch: "v4.7.2" # wazuh-ansible git branch to checkout - not to be confused with wazuh_version!

Unchanged files with check annotations Beta

- name: Add public subnet to the list.
ansible.builtin.set_fact:
_aws_ecs_cluster_public_subnets_ids: "{{ _aws_ecs_cluster_public_subnets_ids + [ _aws_ecs_cluster_public_subnet.subnets[0].subnet_id ] }}"

Check warning on line 12 in roles/aws/_aws_network_info/tasks/subnet.yml

GitHub Actions / Lint the codebase

jinja[spacing]

Jinja2 spacing could be improved: {{ _aws_ecs_cluster_public_subnets_ids + [ _aws_ecs_cluster_public_subnet.subnets[0].subnet_id ] }} -> {{ _aws_ecs_cluster_public_subnets_ids + [_aws_ecs_cluster_public_subnet.subnets[0].subnet_id] }}
- name: Add rule to list
ansible.builtin.set_fact:
acl_rules: "{{ acl_rules + ip_block_rule}}"

Check warning on line 69 in roles/aws/aws_cloudfront_distribution/tasks/create_acl.yml

GitHub Actions / Lint the codebase

jinja[spacing]

Jinja2 spacing could be improved: {{ acl_rules + ip_block_rule}} -> {{ acl_rules + ip_block_rule }}
# Workaround for rate limit rule in ACL (any variable gets interpreted as string instead of int)
- name: Set rate limit variable
- name: Add rule to list
ansible.builtin.set_fact:
acl_rules: "{{ acl_rules + rate_rule}}"

Check warning on line 97 in roles/aws/aws_cloudfront_distribution/tasks/create_acl.yml

GitHub Actions / Lint the codebase

jinja[spacing]

Jinja2 spacing could be improved: {{ acl_rules + rate_rule}} -> {{ acl_rules + rate_rule }}
- name: Create web acl

Check warning on line 99 in roles/aws/aws_cloudfront_distribution/tasks/create_acl.yml

GitHub Actions / Lint the codebase

args[module]

Elements value for option 'rules' is of type <class 'str'> and we were unable to convert to dict: unable to evaluate string as dictionary
community.aws.wafv2_web_acl:
name: "{{ cf_acl.acl_name }}" # Member must satisfy regular expression pattern: ^[\\w\\-]+$
description: "WAF protecting the {{ _domain_name }}"
- name: Add subnet id to the ids list.
ansible.builtin.set_fact:
_aws_efs_subnets_ids: "{{ _aws_efs_subnets_ids + [ _aws_efs_subnet.subnets[0].subnet_id ] }}"

Check warning on line 12 in roles/aws/aws_efs/tasks/subnet.yml

GitHub Actions / Lint the codebase

jinja[spacing]

Jinja2 spacing could be improved: {{ _aws_efs_subnets_ids + [ _aws_efs_subnet.subnets[0].subnet_id ] }} -> {{ _aws_efs_subnets_ids + [_aws_efs_subnet.subnets[0].subnet_id] }}
# _aws_security_group_list variable populated by the aws_security_groups role.
- name: Add subnet to the list of EFS targets.
ansible.builtin.set_fact:
_aws_efs_targets: "{{ _aws_efs_targets | combine({target: {'subnet_id': target, 'security_groups': _aws_security_group_list }}) }}"

Check warning on line 5 in roles/aws/aws_efs/tasks/target.yml

GitHub Actions / Lint the codebase

jinja[spacing]

Jinja2 spacing could be improved: {{ _aws_efs_targets | combine({target: {'subnet_id': target, 'security_groups': _aws_security_group_list }}) }} -> {{ _aws_efs_targets | combine({target: {'subnet_id': target, 'security_groups': _aws_security_group_list}}) }}
- name: Add HTTP listeners.
ansible.builtin.set_fact:
_aws_ec2_listeners: "{{ [ _aws_ec2_listeners_http ] }}"

Check warning on line 97 in roles/aws/aws_elb/tasks/main.yml

GitHub Actions / Lint the codebase

jinja[spacing]

Jinja2 spacing could be improved: {{ [ _aws_ec2_listeners_http ] }} -> {{ [_aws_ec2_listeners_http] }}
when: _ssl_certificate_ARN | length < 1
- name: Add HTTPS Listener.
ansible.builtin.set_fact:
_aws_ec2_listeners: "{{ [ _aws_ec2_listeners_redirect, _aws_ec2_listeners_https ] }}"

Check warning on line 102 in roles/aws/aws_elb/tasks/main.yml

GitHub Actions / Lint the codebase

jinja[spacing]

Jinja2 spacing could be improved: {{ [ _aws_ec2_listeners_redirect, _aws_ec2_listeners_https ] }} -> {{ [_aws_ec2_listeners_redirect, _aws_ec2_listeners_https] }}
when: _ssl_certificate_ARN | length > 1
- name: Add custom Listeners.
- name: Add public subnet to the list.
ansible.builtin.set_fact:
_aws_ec2_elb_public_subnets_ids: "{{ _aws_ec2_elb_public_subnets_ids + [ _aws_ec2_elb_public_subnet.subnets[0].subnet_id ] }}"

Check warning on line 12 in roles/aws/aws_elb/tasks/subnet.yml

GitHub Actions / Lint the codebase

jinja[spacing]

Jinja2 spacing could be improved: {{ _aws_ec2_elb_public_subnets_ids + [ _aws_ec2_elb_public_subnet.subnets[0].subnet_id ] }} -> {{ _aws_ec2_elb_public_subnets_ids + [_aws_ec2_elb_public_subnet.subnets[0].subnet_id] }}
- name: Add instance to target group list.
ansible.builtin.set_fact:
_targets: "{{ _targets + [ {'Id': _aws_ec2_target_group_instance.instances[0].instance_id, 'Port': target_group.targets_port} ] }}"

Check warning on line 12 in roles/aws/aws_elb/tasks/target_group_instances.yml

GitHub Actions / Lint the codebase

jinja[spacing]

Jinja2 spacing could be improved: {{ _targets + [ {'Id': _aws_ec2_target_group_instance.instances[0].instance_id, 'Port': target_group.targets_port} ] }} -> {{ _targets + [{'Id': _aws_ec2_target_group_instance.instances[0].instance_id, 'Port': target_group.targets_port}] }}