From d3ff5880139592495970ce651291ac1d88d160d7 Mon Sep 17 00:00:00 2001 From: Jeremy Stanley Date: Thu, 28 Sep 2017 19:19:04 +0000 Subject: [PATCH] Correctly revoke /etc/sudoers.d/zuul According to our zuul-worker DIB element the path we want to remove to revoke zuul sudo access is /etc/sudoers.d/zuul: http://git.openstack.org/cgit/openstack-infra/project-config/tree/nodepool/elements/zuul-worker/install.d/60-zuul-worker Generated via: sed -i 's/zuul-sudo/zuul/' \ `git grep --files-with-match '/etc/sudoers.d/zuul-sudo'` Change-Id: Iea8cf915d815dbf876ca0cee74933f04152395b8 --- playbooks/legacy/announce-release/run.yaml | 2 +- playbooks/legacy/ansible-hardening-announce-release/run.yaml | 2 +- playbooks/legacy/ansible-lint/run.yaml | 2 +- playbooks/legacy/api-guide/run.yaml | 2 +- playbooks/legacy/api-ref/run.yaml | 2 +- playbooks/legacy/api-site-propose-translation-update/run.yaml | 2 +- playbooks/legacy/api-site-tox-doc-publish-checklang/run.yaml | 2 +- playbooks/legacy/api-site-upstream-translation-update/run.yaml | 2 +- playbooks/legacy/app-catalog-nodejs4-npm-run-lint/run.yaml | 2 +- playbooks/legacy/app-catalog-ui-nodejs4-npm-run-lint/run.yaml | 2 +- playbooks/legacy/bashate-python36-fedora-26/run.yaml | 2 +- playbooks/legacy/beaker-localhost-rake/run.yaml | 2 +- playbooks/legacy/beaker-nodepool-rake/run.yaml | 2 +- playbooks/legacy/blazar-dashboard-releasenotes/run.yaml | 2 +- playbooks/legacy/blazar-pylint/run.yaml | 2 +- playbooks/legacy/blazar-releasenotes/run.yaml | 2 +- playbooks/legacy/ceilometer-tox-py27-mongodb/run.yaml | 2 +- playbooks/legacy/ceilometer-tox-py27-mysql/run.yaml | 2 +- playbooks/legacy/ceilometer-tox-py27-postgresql/run.yaml | 2 +- playbooks/legacy/check-osc-plugins/run.yaml | 2 +- playbooks/legacy/chef-rake/run.yaml | 2 +- playbooks/legacy/cinder-pylint/run.yaml | 2 +- playbooks/legacy/cinder-tox-bandit-baseline/run.yaml | 2 +- playbooks/legacy/cinder-tox-compliance/run.yaml | 2 +- playbooks/legacy/cinder-tox-functional/run.yaml | 2 +- playbooks/legacy/cl-openstack-client-run-tests/run.yaml | 2 +- playbooks/legacy/cliff-tox-neutronclient-tip/run.yaml | 2 +- playbooks/legacy/cliff-tox-openstackclient-tip/run.yaml | 2 +- playbooks/legacy/craton-dashboard-nodejs4-npm-run-lint/run.yaml | 2 +- playbooks/legacy/craton-dashboard-nodejs4-npm-run-test/run.yaml | 2 +- playbooks/legacy/craton-dashboard-tox-py27dj110/run.yaml | 2 +- playbooks/legacy/craton-dashboard-tox-py27dj19/run.yaml | 2 +- playbooks/legacy/craton-tox-functional/run.yaml | 2 +- playbooks/legacy/cross-cinder-python27/run.yaml | 2 +- playbooks/legacy/cross-cinder-python35/run.yaml | 2 +- playbooks/legacy/cross-glance-python27/run.yaml | 2 +- playbooks/legacy/cross-glance-python35/run.yaml | 2 +- playbooks/legacy/cross-horizon-python27/run.yaml | 2 +- playbooks/legacy/cross-horizon-python35/run.yaml | 2 +- playbooks/legacy/cross-keystone-python27/run.yaml | 2 +- playbooks/legacy/cross-keystone-python35/run.yaml | 2 +- playbooks/legacy/cross-networking-midonet-python35/run.yaml | 2 +- playbooks/legacy/cross-neutron-python27/run.yaml | 2 +- playbooks/legacy/cross-neutron-python35/run.yaml | 2 +- playbooks/legacy/cross-nova-func/run.yaml | 2 +- playbooks/legacy/cross-nova-python27/run.yaml | 2 +- playbooks/legacy/cross-nova-python35/run.yaml | 2 +- playbooks/legacy/cross-swift-python27/run.yaml | 2 +- playbooks/legacy/cross-swift-python35/run.yaml | 2 +- playbooks/legacy/deploy-guide/run.yaml | 2 +- .../legacy/designate-dashboard-nodejs4-npm-run-lint/run.yaml | 2 +- .../legacy/designate-dashboard-nodejs4-npm-run-test/run.yaml | 2 +- playbooks/legacy/devstack-gate-tox-py3-run-tests/run.yaml | 2 +- playbooks/legacy/devstack-gate-tox-run-tests/run.yaml | 2 +- playbooks/legacy/devstack-unit-tests/run.yaml | 2 +- playbooks/legacy/dib-utils-tox-func/run.yaml | 2 +- playbooks/legacy/diskimage-builder-pylint/run.yaml | 2 +- playbooks/legacy/django_openstack_auth-tox-py27dj110/run.yaml | 2 +- playbooks/legacy/django_openstack_auth-tox-py27dj18/run.yaml | 2 +- playbooks/legacy/django_openstack_auth-tox-py27dj19/run.yaml | 2 +- playbooks/legacy/dox-buildimages/run.yaml | 2 +- playbooks/legacy/elastic-recheck-docs/run.yaml | 2 +- playbooks/legacy/elastic-recheck-tox-queries/run.yaml | 2 +- playbooks/legacy/freezer-api-pylint/run.yaml | 2 +- playbooks/legacy/freezer-dr-pylint/run.yaml | 2 +- playbooks/legacy/freezer-pylint/run.yaml | 2 +- playbooks/legacy/freezer-web-ui-pylint/run.yaml | 2 +- playbooks/legacy/fuel-astute-puppet-unit-3.8-centos-7/run.yaml | 2 +- playbooks/legacy/fuel-ccp-validate/run.yaml | 2 +- playbooks/legacy/fuel-devops-pylint-ubuntu-trusty/run.yaml | 2 +- playbooks/legacy/fuel-devops-pylint/run.yaml | 2 +- playbooks/legacy/fuel-library-puppet-lint/run.yaml | 2 +- playbooks/legacy/fuel-library-puppet-unit-3.8-centos-7/run.yaml | 2 +- playbooks/legacy/fuel-library-puppet-unit-4.5-centos-7/run.yaml | 2 +- .../legacy/fuel-nailgun-agent-puppet-unit-3.8-centos-7/run.yaml | 2 +- playbooks/legacy/fuel-octane-puppet-lint/run.yaml | 2 +- playbooks/legacy/fuel-qa-pylint-ubuntu-trusty/run.yaml | 2 +- playbooks/legacy/fuel-qa-pylint/run.yaml | 2 +- playbooks/legacy/fuel-ui-nodejs4-npm-run-lint/run.yaml | 2 +- playbooks/legacy/gate-placement-api-ref/run.yaml | 2 +- playbooks/legacy/gate-training-labs-scripts/run.yaml | 2 +- playbooks/legacy/gearman-plugin-hpi-artifact/run.yaml | 2 +- playbooks/legacy/gearman-plugin-jenkinsci-upload/run.yaml | 2 +- .../legacy/gearman-plugin-maven-build-ubuntu-trusty/run.yaml | 2 +- playbooks/legacy/gerrit-buck/run.yaml | 2 +- playbooks/legacy/gerrit-package-buck/run.yaml | 2 +- playbooks/legacy/gitdm/run.yaml | 2 +- playbooks/legacy/golang-fmt/run.yaml | 2 +- playbooks/legacy/golang-unit/run.yaml | 2 +- playbooks/legacy/governance-tox-validate/run.yaml | 2 +- playbooks/legacy/grenade-publish-docs/run.yaml | 2 +- playbooks/legacy/groups-release-branch/run.yaml | 2 +- playbooks/legacy/groups-release-master/run.yaml | 2 +- playbooks/legacy/groups-unittests/run.yaml | 2 +- playbooks/legacy/hacking-integration-nova/run.yaml | 2 +- playbooks/legacy/heat-translator-tox-py27-tp/run.yaml | 2 +- playbooks/legacy/horizon-selenium-headless-legacy/run.yaml | 2 +- playbooks/legacy/horizon-selenium-headless/run.yaml | 2 +- playbooks/legacy/horizon-tox-py27dj110/run.yaml | 2 +- playbooks/legacy/horizon-tox-py27dj18/run.yaml | 2 +- playbooks/legacy/horizon-tox-py27dj19/run.yaml | 2 +- playbooks/legacy/i18n-tox-doc-docs/run.yaml | 2 +- playbooks/legacy/infra-ansible/run.yaml | 2 +- playbooks/legacy/infra-publications-publish-index/run.yaml | 2 +- playbooks/legacy/infra-publications-publish/run.yaml | 2 +- playbooks/legacy/instack-undercloud-puppet-lint/run.yaml | 2 +- playbooks/legacy/install-guide/run.yaml | 2 +- playbooks/legacy/interop-tox-doc8/run.yaml | 2 +- playbooks/legacy/interop-tox-jsonlint/run.yaml | 2 +- playbooks/legacy/interop-tox-jsonschema/run.yaml | 2 +- playbooks/legacy/irc-meetings-tox-ical/run.yaml | 2 +- playbooks/legacy/ironic-inspector-tox-func/run.yaml | 2 +- playbooks/legacy/ironic-inspector-tox-func3/run.yaml | 2 +- playbooks/legacy/ironic-python-agent-tox-func/run.yaml | 2 +- .../legacy/its-storyboard-gerrit-plugin-stable-2.13/run.yaml | 2 +- playbooks/legacy/javamelody-gerrit-plugin-stable-2.13/run.yaml | 2 +- .../legacy/js-generator-openstack-nodejs6-npm-docs/run.yaml | 2 +- playbooks/legacy/js-openstack-lib-nodejs6-npm-sdk-docs/run.yaml | 2 +- .../legacy/k8s-docker-suite-app-murano-releasenotes/run.yaml | 2 +- playbooks/legacy/keystone-tox-patch_cover/run.yaml | 2 +- playbooks/legacy/laravel-openstackid-release-branch/run.yaml | 2 +- playbooks/legacy/laravel-openstackid-release-master/run.yaml | 2 +- playbooks/legacy/laravel-openstackid-unittests/run.yaml | 2 +- playbooks/legacy/magnum-tox-migration/run.yaml | 2 +- playbooks/legacy/manila-pylint/run.yaml | 2 +- playbooks/legacy/manila-tox-genconfig/run.yaml | 2 +- playbooks/legacy/manila-ui-tox-py27dj110/run.yaml | 2 +- playbooks/legacy/manila-ui-tox-py27dj19/run.yaml | 2 +- playbooks/legacy/merlin-js-release-branch/run.yaml | 2 +- playbooks/legacy/merlin-js-release-master/run.yaml | 2 +- playbooks/legacy/mistral-tox-unit-mysql/run.yaml | 2 +- playbooks/legacy/mistral-tox-unit-postgresql/run.yaml | 2 +- playbooks/legacy/mogan-tox-functional/run.yaml | 2 +- playbooks/legacy/monasca-api-localrepo-upload/run.yaml | 2 +- playbooks/legacy/monasca-api-maven-build/run.yaml | 2 +- playbooks/legacy/monasca-common-localrepo-upload/run.yaml | 2 +- playbooks/legacy/monasca-common-maven-build/run.yaml | 2 +- playbooks/legacy/monasca-persister-localrepo-upload/run.yaml | 2 +- playbooks/legacy/monasca-persister-maven-build/run.yaml | 2 +- playbooks/legacy/monasca-thresh-localrepo-upload/run.yaml | 2 +- playbooks/legacy/monasca-thresh-maven-build/run.yaml | 2 +- playbooks/legacy/monitorstack-releasenotes/run.yaml | 2 +- playbooks/legacy/murano-firstapp-docs/run.yaml | 2 +- playbooks/legacy/networking-cisco-tox-master/run.yaml | 2 +- playbooks/legacy/networking-cisco-tox-newton/run.yaml | 2 +- playbooks/legacy/networking-cisco-tox-ocata/run.yaml | 2 +- playbooks/legacy/networking-cisco-tox-pike/run.yaml | 2 +- .../neutron-lbaas-dashboard-nodejs4-npm-run-lint/run.yaml | 2 +- .../neutron-lbaas-dashboard-nodejs4-npm-run-test/run.yaml | 2 +- playbooks/legacy/neutron-vpnaas-dashboard-releasenotes/run.yaml | 2 +- playbooks/legacy/neutron-vpnaas-releasenotes/run.yaml | 2 +- playbooks/legacy/nodejs4-npm-run-lint/run.yaml | 2 +- playbooks/legacy/nodejs4-npm-run-test/run.yaml | 2 +- playbooks/legacy/nodejs6-npm-run-lint/run.yaml | 2 +- playbooks/legacy/nodejs6-npm-run-test/run.yaml | 2 +- playbooks/legacy/nova-api-ref-src/run.yaml | 2 +- playbooks/legacy/nova-dpm-tox-functional-py35/run.yaml | 2 +- playbooks/legacy/nova-dpm-tox-functional/run.yaml | 2 +- playbooks/legacy/nova-tox-functional-py35/run.yaml | 2 +- playbooks/legacy/nova-tox-functional/run.yaml | 2 +- playbooks/legacy/oaktreemodel-distcheck/run.yaml | 2 +- .../legacy/octavia-dashboard-nodejs4-npm-run-lint/run.yaml | 2 +- .../legacy/octavia-dashboard-nodejs4-npm-run-test/run.yaml | 2 +- playbooks/legacy/octavia-tox-functional-py35/run.yaml | 2 +- playbooks/legacy/octavia-tox-functional/run.yaml | 2 +- playbooks/legacy/omni-tests/run.yaml | 2 +- playbooks/legacy/ooi-tox-functional/run.yaml | 2 +- playbooks/legacy/openstack-ansible-announce-release/run.yaml | 2 +- .../openstack-ansible-galera_server-announce-release/run.yaml | 2 +- .../openstack-ansible-haproxy_server-announce-release/run.yaml | 2 +- .../run.yaml | 2 +- .../openstack-ansible-os_almanach-announce-release/run.yaml | 2 +- .../legacy/openstack-ansible-os_aodh-announce-release/run.yaml | 2 +- .../openstack-ansible-os_barbican-announce-release/run.yaml | 2 +- .../openstack-ansible-os_ceilometer-announce-release/run.yaml | 2 +- .../openstack-ansible-os_cinder-announce-release/run.yaml | 2 +- .../openstack-ansible-os_cloudkitty-announce-release/run.yaml | 2 +- .../openstack-ansible-os_designate-announce-release/run.yaml | 2 +- .../openstack-ansible-os_freezer-announce-release/run.yaml | 2 +- .../openstack-ansible-os_glance-announce-release/run.yaml | 2 +- .../openstack-ansible-os_gnocchi-announce-release/run.yaml | 2 +- .../legacy/openstack-ansible-os_heat-announce-release/run.yaml | 2 +- .../openstack-ansible-os_horizon-announce-release/run.yaml | 2 +- .../openstack-ansible-os_ironic-announce-release/run.yaml | 2 +- .../openstack-ansible-os_keystone-announce-release/run.yaml | 2 +- .../openstack-ansible-os_magnum-announce-release/run.yaml | 2 +- .../openstack-ansible-os_monasca-announce-release/run.yaml | 2 +- .../openstack-ansible-os_neutron-announce-release/run.yaml | 2 +- .../legacy/openstack-ansible-os_nova-announce-release/run.yaml | 2 +- .../legacy/openstack-ansible-os_rally-announce-release/run.yaml | 2 +- .../openstack-ansible-os_sahara-announce-release/run.yaml | 2 +- .../legacy/openstack-ansible-os_swift-announce-release/run.yaml | 2 +- .../legacy/openstack-ansible-os_trove-announce-release/run.yaml | 2 +- .../openstack-ansible-os_watcher-announce-release/run.yaml | 2 +- .../legacy/openstack-ansible-os_zaqar-announce-release/run.yaml | 2 +- .../legacy/openstack-ansible-plugins-announce-release/run.yaml | 2 +- .../openstack-ansible-rabbitmq_server-announce-release/run.yaml | 2 +- .../openstack-ansible-rsyslog_server-announce-release/run.yaml | 2 +- playbooks/legacy/openstack-api-ref-publish-lang/run.yaml | 2 +- playbooks/legacy/openstack-api-ref/run.yaml | 2 +- playbooks/legacy/openstack-manuals-tox-doc-publishdocs/run.yaml | 2 +- playbooks/legacy/openstack-planet-unittest/run.yaml | 2 +- playbooks/legacy/openstackci-beaker-centos-7/run.yaml | 2 +- playbooks/legacy/openstackci-beaker-ubuntu-trusty/run.yaml | 2 +- playbooks/legacy/openstackci-beaker/run.yaml | 2 +- playbooks/legacy/openstackdocstheme-api-ref/run.yaml | 2 +- .../legacy/openstackdocstheme-tox-doc-publish-buildpdf/run.yaml | 2 +- playbooks/legacy/os-brick-pylint/run.yaml | 2 +- playbooks/legacy/oslo-cookiecutter-tox-cookiecutter/run.yaml | 2 +- playbooks/legacy/oslo.db-tox-mysql-python/run.yaml | 2 +- playbooks/legacy/oslo.messaging-tox-py27-func-amqp1/run.yaml | 2 +- playbooks/legacy/oslo.messaging-tox-py27-func-kafka/run.yaml | 2 +- playbooks/legacy/oslo.messaging-tox-py27-func-pika/run.yaml | 2 +- playbooks/legacy/oslo.messaging-tox-py27-func-rabbit/run.yaml | 2 +- .../legacy/oslo.messaging-tox-py27-func-zmq-proxy/run.yaml | 2 +- .../legacy/oslo.messaging-tox-py27-func-zmq-pubsub/run.yaml | 2 +- playbooks/legacy/oslo.messaging-tox-py27-func-zmq/run.yaml | 2 +- playbooks/legacy/oslo.messaging-tox-py35-func-amqp1/run.yaml | 2 +- playbooks/legacy/oslo.messaging-tox-py35-func-rabbit/run.yaml | 2 +- playbooks/legacy/oslo.messaging-tox-py35-func-zmq/run.yaml | 2 +- playbooks/legacy/ovsdbapp-tox-functional/run.yaml | 2 +- playbooks/legacy/packstack-releasenotes/run.yaml | 2 +- playbooks/legacy/panko-tox-py27-mongodb/run.yaml | 2 +- playbooks/legacy/panko-tox-py27-mysql/run.yaml | 2 +- playbooks/legacy/panko-tox-py27-postgresql/run.yaml | 2 +- playbooks/legacy/panko-tox-py35-mongodb/run.yaml | 2 +- playbooks/legacy/panko-tox-py35-mysql/run.yaml | 2 +- playbooks/legacy/panko-tox-py35-postgresql/run.yaml | 2 +- playbooks/legacy/periodic-docs-newton/run.yaml | 2 +- playbooks/legacy/periodic-docs-ocata/run.yaml | 2 +- playbooks/legacy/periodic-docs-pike/run.yaml | 2 +- playbooks/legacy/periodic-gitdm/run.yaml | 2 +- playbooks/legacy/periodic-package-stackviz-element/run.yaml | 2 +- playbooks/legacy/periodic-py27-with-oslo-master/run.yaml | 2 +- playbooks/legacy/periodic-py35-with-neutron-lib-master/run.yaml | 2 +- playbooks/legacy/periodic-py35-with-oslo-master/run.yaml | 2 +- playbooks/legacy/periodic-py35-with-ovsdbapp-master/run.yaml | 2 +- playbooks/legacy/periodic-python27-newton/run.yaml | 2 +- playbooks/legacy/periodic-python27-ocata/run.yaml | 2 +- playbooks/legacy/periodic-python27-pike/run.yaml | 2 +- playbooks/legacy/placement-api-ref/run.yaml | 2 +- playbooks/legacy/project-config-jenkins-project/run.yaml | 2 +- playbooks/legacy/project-config-layout/run.yaml | 2 +- playbooks/legacy/project-navigator-data-tox-validate/run.yaml | 2 +- playbooks/legacy/project-team-guide-publish/run.yaml | 2 +- .../legacy/propose-requirements-constraints-master/run.yaml | 2 +- playbooks/legacy/propose-translation-update-ocata/run.yaml | 2 +- playbooks/legacy/propose-translation-update-pike/run.yaml | 2 +- playbooks/legacy/propose-translation-update/run.yaml | 2 +- playbooks/legacy/propose-update-constraints/run.yaml | 2 +- playbooks/legacy/puppet-httpd-forge-upload/run.yaml | 2 +- playbooks/legacy/puppet-lint/run.yaml | 2 +- .../legacy/puppet-midonet-puppet-unit-3.6-centos-7/run.yaml | 2 +- .../legacy/puppet-midonet-puppet-unit-3.8-centos-7/run.yaml | 2 +- .../legacy/puppet-midonet-puppet-unit-4.5-centos-7/run.yaml | 2 +- .../legacy/puppet-midonet-puppet-unit-latest-centos-7/run.yaml | 2 +- playbooks/legacy/puppet-storyboard-forge-upload/run.yaml | 2 +- playbooks/legacy/puppet-syntax-3-centos-7/run.yaml | 2 +- playbooks/legacy/puppet-syntax-3/run.yaml | 2 +- playbooks/legacy/puppet-syntax-4-centos-7/run.yaml | 2 +- .../legacy/puppet-tripleo-puppet-unit-4.8-centos-7/run.yaml | 2 +- .../legacy/puppet-tripleo-puppet-unit-latest-centos-7/run.yaml | 2 +- playbooks/legacy/puppet-unit-3.6-centos-7/run.yaml | 2 +- playbooks/legacy/puppet-unit-3.8-centos-7/run.yaml | 2 +- playbooks/legacy/puppet-unit-4.8-centos-7/run.yaml | 2 +- playbooks/legacy/puppet-unit-latest-centos-7/run.yaml | 2 +- playbooks/legacy/pyeclib-python35/run.yaml | 2 +- playbooks/legacy/pyeclib-tox-py27-centos-7/run.yaml | 2 +- playbooks/legacy/pypi-both-upload/run.yaml | 2 +- playbooks/legacy/python-cinderclient-pylint/run.yaml | 2 +- playbooks/legacy/python-freezerclient-pylint/run.yaml | 2 +- .../legacy/python-ironic-inspector-client-tox-func/run.yaml | 2 +- playbooks/legacy/python-openstacksdk-docs/run.yaml | 2 +- playbooks/legacy/python-swiftclient-python36-fedora-26/run.yaml | 2 +- playbooks/legacy/python34/run.yaml | 2 +- playbooks/legacy/python35/run.yaml | 2 +- playbooks/legacy/rally-tox-self/run.yaml | 2 +- playbooks/legacy/refstack-tox-py27-func-mysql/run.yaml | 2 +- playbooks/legacy/refstack-tox-py35-func-mysql/run.yaml | 2 +- playbooks/legacy/releasenotes/run.yaml | 2 +- playbooks/legacy/releases-python35/run.yaml | 2 +- playbooks/legacy/releases-tox-list-changes/run.yaml | 2 +- playbooks/legacy/releases-tox-validate/run.yaml | 2 +- playbooks/legacy/requests-mock-tox-keystoneclient-tip/run.yaml | 2 +- playbooks/legacy/requests-mock-tox-novaclient-tip/run.yaml | 2 +- playbooks/legacy/requirements-python34/run.yaml | 2 +- playbooks/legacy/requirements-tox-babel/run.yaml | 2 +- playbooks/legacy/requirements-tox-py27-check-uc/run.yaml | 2 +- playbooks/legacy/requirements-tox-py35-check-uc/run.yaml | 2 +- playbooks/legacy/requirements-tox-validate-projects/run.yaml | 2 +- playbooks/legacy/requirements-tox-validate/run.yaml | 2 +- playbooks/legacy/requirements/run.yaml | 2 +- playbooks/legacy/rpm-packaging-tox-lint/run.yaml | 2 +- playbooks/legacy/sahara-dashboard-tox-py27dj110/run.yaml | 2 +- playbooks/legacy/sahara-dashboard-tox-py27dj19/run.yaml | 2 +- playbooks/legacy/sahara-pylint/run.yaml | 2 +- playbooks/legacy/sahara-tests-pylint/run.yaml | 2 +- playbooks/legacy/sandbox-tag/run.yaml | 2 +- playbooks/legacy/searchlight-ui-nodejs4-npm-run-lint/run.yaml | 2 +- playbooks/legacy/searchlight-ui-nodejs4-npm-run-test/run.yaml | 2 +- playbooks/legacy/security-doc-tox-doc-publishdocs/run.yaml | 2 +- playbooks/legacy/senlin-dashboard-nodejs4-npm-run-lint/run.yaml | 2 +- playbooks/legacy/senlin-dashboard-nodejs4-npm-run-test/run.yaml | 2 +- playbooks/legacy/service-types-authority-validate/run.yaml | 2 +- playbooks/legacy/sqlalchemy-migrate-tox-py27sa07/run.yaml | 2 +- playbooks/legacy/static-election-publish/run.yaml | 2 +- playbooks/legacy/static-governance-publish/run.yaml | 2 +- playbooks/legacy/static-governance-uc-publish/run.yaml | 2 +- playbooks/legacy/static-governance-website-publish/run.yaml | 2 +- playbooks/legacy/static-ossa-publish/run.yaml | 2 +- playbooks/legacy/static-releases-publish/run.yaml | 2 +- playbooks/legacy/static-transparency-policy-publish/run.yaml | 2 +- playbooks/legacy/storyboard-webclient-js-draft/run.yaml | 2 +- .../legacy/storyboard-webclient-js-release-branch/run.yaml | 2 +- .../legacy/storyboard-webclient-js-release-master/run.yaml | 2 +- .../legacy/storyboard-webclient-nodejs4-npm-run-lint/run.yaml | 2 +- .../run.yaml | 2 +- .../run.yaml | 2 +- .../storyboard-webclient-nodejs4-npm-run-test-unit/run.yaml | 2 +- playbooks/legacy/swift-tox-xfs-tmp-func-centos-7/run.yaml | 2 +- playbooks/legacy/swift-tox-xfs-tmp-func-ec-centos-7/run.yaml | 2 +- playbooks/legacy/swift-tox-xfs-tmp-func-ec/run.yaml | 2 +- .../legacy/swift-tox-xfs-tmp-func-encryption-centos-7/run.yaml | 2 +- playbooks/legacy/swift-tox-xfs-tmp-func-encryption/run.yaml | 2 +- .../legacy/swift-tox-xfs-tmp-func-fast-post-centos-7/run.yaml | 2 +- playbooks/legacy/swift-tox-xfs-tmp-func-fast-post/run.yaml | 2 +- .../swift-tox-xfs-tmp-func-post-as-copy-centos-7/run.yaml | 2 +- playbooks/legacy/swift-tox-xfs-tmp-func-post-as-copy/run.yaml | 2 +- playbooks/legacy/swift-tox-xfs-tmp-func/run.yaml | 2 +- playbooks/legacy/swift-tox-xfs-tmp-py27-centos-7/run.yaml | 2 +- playbooks/legacy/swift-tox-xfs-tmp-py27/run.yaml | 2 +- playbooks/legacy/swift-tox-xfs-tmp-py35/run.yaml | 2 +- playbooks/legacy/swift3-pylint/run.yaml | 2 +- playbooks/legacy/swift3-tox-keystone/run.yaml | 2 +- playbooks/legacy/swift3-tox-s3acl/run.yaml | 2 +- playbooks/legacy/swift3-tox-s3tests_keystone/run.yaml | 2 +- playbooks/legacy/swift3-tox-s3tests_tempauth/run.yaml | 2 +- playbooks/legacy/swift3-tox-tempauth/run.yaml | 2 +- playbooks/legacy/system-config-puppet-syntax-3/run.yaml | 2 +- playbooks/legacy/tempest-tox-plugin-sanity-check/run.yaml | 2 +- playbooks/legacy/tooz-tox-py27-consul/run.yaml | 2 +- playbooks/legacy/tooz-tox-py27-etcd/run.yaml | 2 +- playbooks/legacy/tooz-tox-py27-etcd3/run.yaml | 2 +- playbooks/legacy/tooz-tox-py27-etcd3gw/run.yaml | 2 +- playbooks/legacy/tooz-tox-py27-memcached/run.yaml | 2 +- playbooks/legacy/tooz-tox-py27-mysql/run.yaml | 2 +- playbooks/legacy/tooz-tox-py27-postgresql/run.yaml | 2 +- playbooks/legacy/tooz-tox-py27-redis/run.yaml | 2 +- playbooks/legacy/tooz-tox-py27-sentinel/run.yaml | 2 +- playbooks/legacy/tooz-tox-py27-zookeeper/run.yaml | 2 +- playbooks/legacy/tooz-tox-py35-consul/run.yaml | 2 +- playbooks/legacy/tooz-tox-py35-etcd/run.yaml | 2 +- playbooks/legacy/tooz-tox-py35-etcd3/run.yaml | 2 +- playbooks/legacy/tooz-tox-py35-etcd3gw/run.yaml | 2 +- playbooks/legacy/tooz-tox-py35-memcached/run.yaml | 2 +- playbooks/legacy/tooz-tox-py35-mysql/run.yaml | 2 +- playbooks/legacy/tooz-tox-py35-postgresql/run.yaml | 2 +- playbooks/legacy/tooz-tox-py35-redis/run.yaml | 2 +- playbooks/legacy/tooz-tox-py35-sentinel/run.yaml | 2 +- playbooks/legacy/tooz-tox-py35-zookeeper/run.yaml | 2 +- playbooks/legacy/tox-build/run.yaml | 2 +- playbooks/legacy/tox-checkniceness/run.yaml | 2 +- playbooks/legacy/tox-doc-publish-checkbuild/run.yaml | 2 +- playbooks/legacy/tox-doc-publish-checklang/run.yaml | 2 +- playbooks/legacy/tox-doc-publishlang/run.yaml | 2 +- .../legacy/training-guides-tox-doc-publish-checkbuild/run.yaml | 2 +- playbooks/legacy/training-guides-tox-doc-publishdocs/run.yaml | 2 +- playbooks/legacy/training-labs-scripts/run.yaml | 2 +- playbooks/legacy/tripleo-ui-nodejs6-npm-run-lint/run.yaml | 2 +- playbooks/legacy/tripleo-ui-nodejs6-npm-run-test/run.yaml | 2 +- playbooks/legacy/trove-pylint/run.yaml | 2 +- playbooks/legacy/trove-tox-apiexamples/run.yaml | 2 +- playbooks/legacy/trove-tox-fakemodetests/run.yaml | 2 +- playbooks/legacy/upstream-translation-update/run.yaml | 2 +- playbooks/legacy/vinz-webclient-js-draft/run.yaml | 2 +- playbooks/legacy/vinz-webclient-js-release-branch/run.yaml | 2 +- playbooks/legacy/vinz-webclient-js-release-master/run.yaml | 2 +- playbooks/legacy/zaqar-tox-integration/run.yaml | 2 +- playbooks/legacy/zaqar-ui-nodejs4-npm-run-lint/run.yaml | 2 +- playbooks/legacy/zaqar-ui-nodejs4-npm-run-test/run.yaml | 2 +- playbooks/legacy/zmq-event-publisher-hpi-artifact/run.yaml | 2 +- playbooks/legacy/zmq-event-publisher-jenkinsci-upload/run.yaml | 2 +- .../zmq-event-publisher-maven-build-ubuntu-trusty/run.yaml | 2 +- playbooks/legacy/zun-ui-nodejs4-npm-run-lint/run.yaml | 2 +- playbooks/legacy/zun-ui-nodejs4-npm-run-test/run.yaml | 2 +- 385 files changed, 385 insertions(+), 385 deletions(-) diff --git a/playbooks/legacy/announce-release/run.yaml b/playbooks/legacy/announce-release/run.yaml index f4879ad0..f186435a 100644 --- a/playbooks/legacy/announce-release/run.yaml +++ b/playbooks/legacy/announce-release/run.yaml @@ -81,7 +81,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/ansible-hardening-announce-release/run.yaml b/playbooks/legacy/ansible-hardening-announce-release/run.yaml index e2975476..5ca0e7ad 100644 --- a/playbooks/legacy/ansible-hardening-announce-release/run.yaml +++ b/playbooks/legacy/ansible-hardening-announce-release/run.yaml @@ -81,7 +81,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/ansible-lint/run.yaml b/playbooks/legacy/ansible-lint/run.yaml index fc694db3..db8aece8 100644 --- a/playbooks/legacy/ansible-lint/run.yaml +++ b/playbooks/legacy/ansible-lint/run.yaml @@ -62,7 +62,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/api-guide/run.yaml b/playbooks/legacy/api-guide/run.yaml index c5871332..16ca10e9 100644 --- a/playbooks/legacy/api-guide/run.yaml +++ b/playbooks/legacy/api-guide/run.yaml @@ -50,7 +50,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/api-ref/run.yaml b/playbooks/legacy/api-ref/run.yaml index 95ea25f9..f57c859c 100644 --- a/playbooks/legacy/api-ref/run.yaml +++ b/playbooks/legacy/api-ref/run.yaml @@ -50,7 +50,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/api-site-propose-translation-update/run.yaml b/playbooks/legacy/api-site-propose-translation-update/run.yaml index 9043c71f..000bd8dc 100644 --- a/playbooks/legacy/api-site-propose-translation-update/run.yaml +++ b/playbooks/legacy/api-site-propose-translation-update/run.yaml @@ -21,7 +21,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/api-site-tox-doc-publish-checklang/run.yaml b/playbooks/legacy/api-site-tox-doc-publish-checklang/run.yaml index 258f1b68..e0777a2f 100644 --- a/playbooks/legacy/api-site-tox-doc-publish-checklang/run.yaml +++ b/playbooks/legacy/api-site-tox-doc-publish-checklang/run.yaml @@ -50,7 +50,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/api-site-upstream-translation-update/run.yaml b/playbooks/legacy/api-site-upstream-translation-update/run.yaml index c1df6c9f..ba5cf7a1 100644 --- a/playbooks/legacy/api-site-upstream-translation-update/run.yaml +++ b/playbooks/legacy/api-site-upstream-translation-update/run.yaml @@ -21,7 +21,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/app-catalog-nodejs4-npm-run-lint/run.yaml b/playbooks/legacy/app-catalog-nodejs4-npm-run-lint/run.yaml index f1570c67..85d1ba51 100644 --- a/playbooks/legacy/app-catalog-nodejs4-npm-run-lint/run.yaml +++ b/playbooks/legacy/app-catalog-nodejs4-npm-run-lint/run.yaml @@ -92,7 +92,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/app-catalog-ui-nodejs4-npm-run-lint/run.yaml b/playbooks/legacy/app-catalog-ui-nodejs4-npm-run-lint/run.yaml index b372fdb4..73492de3 100644 --- a/playbooks/legacy/app-catalog-ui-nodejs4-npm-run-lint/run.yaml +++ b/playbooks/legacy/app-catalog-ui-nodejs4-npm-run-lint/run.yaml @@ -93,7 +93,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/bashate-python36-fedora-26/run.yaml b/playbooks/legacy/bashate-python36-fedora-26/run.yaml index f065fbee..e1518233 100644 --- a/playbooks/legacy/bashate-python36-fedora-26/run.yaml +++ b/playbooks/legacy/bashate-python36-fedora-26/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/beaker-localhost-rake/run.yaml b/playbooks/legacy/beaker-localhost-rake/run.yaml index 66215b53..f93882d0 100644 --- a/playbooks/legacy/beaker-localhost-rake/run.yaml +++ b/playbooks/legacy/beaker-localhost-rake/run.yaml @@ -44,7 +44,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/beaker-nodepool-rake/run.yaml b/playbooks/legacy/beaker-nodepool-rake/run.yaml index 7af96561..acbd43bb 100644 --- a/playbooks/legacy/beaker-nodepool-rake/run.yaml +++ b/playbooks/legacy/beaker-nodepool-rake/run.yaml @@ -44,7 +44,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/blazar-dashboard-releasenotes/run.yaml b/playbooks/legacy/blazar-dashboard-releasenotes/run.yaml index cc273f89..13ca8e56 100644 --- a/playbooks/legacy/blazar-dashboard-releasenotes/run.yaml +++ b/playbooks/legacy/blazar-dashboard-releasenotes/run.yaml @@ -50,7 +50,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/blazar-pylint/run.yaml b/playbooks/legacy/blazar-pylint/run.yaml index a591bcaf..a9871f2d 100644 --- a/playbooks/legacy/blazar-pylint/run.yaml +++ b/playbooks/legacy/blazar-pylint/run.yaml @@ -50,7 +50,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/blazar-releasenotes/run.yaml b/playbooks/legacy/blazar-releasenotes/run.yaml index df2ccd94..824faebe 100644 --- a/playbooks/legacy/blazar-releasenotes/run.yaml +++ b/playbooks/legacy/blazar-releasenotes/run.yaml @@ -50,7 +50,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/ceilometer-tox-py27-mongodb/run.yaml b/playbooks/legacy/ceilometer-tox-py27-mongodb/run.yaml index 71e4baba..42391ed7 100644 --- a/playbooks/legacy/ceilometer-tox-py27-mongodb/run.yaml +++ b/playbooks/legacy/ceilometer-tox-py27-mongodb/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/ceilometer-tox-py27-mysql/run.yaml b/playbooks/legacy/ceilometer-tox-py27-mysql/run.yaml index 512ea4f8..181119fb 100644 --- a/playbooks/legacy/ceilometer-tox-py27-mysql/run.yaml +++ b/playbooks/legacy/ceilometer-tox-py27-mysql/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/ceilometer-tox-py27-postgresql/run.yaml b/playbooks/legacy/ceilometer-tox-py27-postgresql/run.yaml index c2aa7997..69b20fd7 100644 --- a/playbooks/legacy/ceilometer-tox-py27-postgresql/run.yaml +++ b/playbooks/legacy/ceilometer-tox-py27-postgresql/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/check-osc-plugins/run.yaml b/playbooks/legacy/check-osc-plugins/run.yaml index 603c9a04..f0c3af8b 100644 --- a/playbooks/legacy/check-osc-plugins/run.yaml +++ b/playbooks/legacy/check-osc-plugins/run.yaml @@ -44,7 +44,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/chef-rake/run.yaml b/playbooks/legacy/chef-rake/run.yaml index aaa9c7ac..f2894686 100644 --- a/playbooks/legacy/chef-rake/run.yaml +++ b/playbooks/legacy/chef-rake/run.yaml @@ -52,7 +52,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/cinder-pylint/run.yaml b/playbooks/legacy/cinder-pylint/run.yaml index c24b1bc3..3b11a0fc 100644 --- a/playbooks/legacy/cinder-pylint/run.yaml +++ b/playbooks/legacy/cinder-pylint/run.yaml @@ -50,7 +50,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/cinder-tox-bandit-baseline/run.yaml b/playbooks/legacy/cinder-tox-bandit-baseline/run.yaml index c8d4ea3f..2174c86d 100644 --- a/playbooks/legacy/cinder-tox-bandit-baseline/run.yaml +++ b/playbooks/legacy/cinder-tox-bandit-baseline/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/cinder-tox-compliance/run.yaml b/playbooks/legacy/cinder-tox-compliance/run.yaml index a54db430..6e32722f 100644 --- a/playbooks/legacy/cinder-tox-compliance/run.yaml +++ b/playbooks/legacy/cinder-tox-compliance/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/cinder-tox-functional/run.yaml b/playbooks/legacy/cinder-tox-functional/run.yaml index 06094a04..9bb003f6 100644 --- a/playbooks/legacy/cinder-tox-functional/run.yaml +++ b/playbooks/legacy/cinder-tox-functional/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/cl-openstack-client-run-tests/run.yaml b/playbooks/legacy/cl-openstack-client-run-tests/run.yaml index cdec2a30..680d8353 100644 --- a/playbooks/legacy/cl-openstack-client-run-tests/run.yaml +++ b/playbooks/legacy/cl-openstack-client-run-tests/run.yaml @@ -44,7 +44,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/cliff-tox-neutronclient-tip/run.yaml b/playbooks/legacy/cliff-tox-neutronclient-tip/run.yaml index a107fc9e..9d149f66 100644 --- a/playbooks/legacy/cliff-tox-neutronclient-tip/run.yaml +++ b/playbooks/legacy/cliff-tox-neutronclient-tip/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/cliff-tox-openstackclient-tip/run.yaml b/playbooks/legacy/cliff-tox-openstackclient-tip/run.yaml index fdd6c22a..38eb4385 100644 --- a/playbooks/legacy/cliff-tox-openstackclient-tip/run.yaml +++ b/playbooks/legacy/cliff-tox-openstackclient-tip/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/craton-dashboard-nodejs4-npm-run-lint/run.yaml b/playbooks/legacy/craton-dashboard-nodejs4-npm-run-lint/run.yaml index d4523d23..f966bf77 100644 --- a/playbooks/legacy/craton-dashboard-nodejs4-npm-run-lint/run.yaml +++ b/playbooks/legacy/craton-dashboard-nodejs4-npm-run-lint/run.yaml @@ -93,7 +93,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/craton-dashboard-nodejs4-npm-run-test/run.yaml b/playbooks/legacy/craton-dashboard-nodejs4-npm-run-test/run.yaml index 79d472bf..627c0da8 100644 --- a/playbooks/legacy/craton-dashboard-nodejs4-npm-run-test/run.yaml +++ b/playbooks/legacy/craton-dashboard-nodejs4-npm-run-test/run.yaml @@ -93,7 +93,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/craton-dashboard-tox-py27dj110/run.yaml b/playbooks/legacy/craton-dashboard-tox-py27dj110/run.yaml index 54eb5603..d08fda86 100644 --- a/playbooks/legacy/craton-dashboard-tox-py27dj110/run.yaml +++ b/playbooks/legacy/craton-dashboard-tox-py27dj110/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/craton-dashboard-tox-py27dj19/run.yaml b/playbooks/legacy/craton-dashboard-tox-py27dj19/run.yaml index 1e2780ba..65d6f70a 100644 --- a/playbooks/legacy/craton-dashboard-tox-py27dj19/run.yaml +++ b/playbooks/legacy/craton-dashboard-tox-py27dj19/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/craton-tox-functional/run.yaml b/playbooks/legacy/craton-tox-functional/run.yaml index a6454c2c..7e768afc 100644 --- a/playbooks/legacy/craton-tox-functional/run.yaml +++ b/playbooks/legacy/craton-tox-functional/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/cross-cinder-python27/run.yaml b/playbooks/legacy/cross-cinder-python27/run.yaml index 9873dcda..f2734aaa 100644 --- a/playbooks/legacy/cross-cinder-python27/run.yaml +++ b/playbooks/legacy/cross-cinder-python27/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/cross-cinder-python35/run.yaml b/playbooks/legacy/cross-cinder-python35/run.yaml index f3950e4b..8cb0c38e 100644 --- a/playbooks/legacy/cross-cinder-python35/run.yaml +++ b/playbooks/legacy/cross-cinder-python35/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/cross-glance-python27/run.yaml b/playbooks/legacy/cross-glance-python27/run.yaml index f0f05710..f42e5c68 100644 --- a/playbooks/legacy/cross-glance-python27/run.yaml +++ b/playbooks/legacy/cross-glance-python27/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/cross-glance-python35/run.yaml b/playbooks/legacy/cross-glance-python35/run.yaml index 538eb611..958ad599 100644 --- a/playbooks/legacy/cross-glance-python35/run.yaml +++ b/playbooks/legacy/cross-glance-python35/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/cross-horizon-python27/run.yaml b/playbooks/legacy/cross-horizon-python27/run.yaml index 76dda551..c2edb0eb 100644 --- a/playbooks/legacy/cross-horizon-python27/run.yaml +++ b/playbooks/legacy/cross-horizon-python27/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/cross-horizon-python35/run.yaml b/playbooks/legacy/cross-horizon-python35/run.yaml index 9fe4c2a4..864e4f3b 100644 --- a/playbooks/legacy/cross-horizon-python35/run.yaml +++ b/playbooks/legacy/cross-horizon-python35/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/cross-keystone-python27/run.yaml b/playbooks/legacy/cross-keystone-python27/run.yaml index 90340cbc..d0bcb719 100644 --- a/playbooks/legacy/cross-keystone-python27/run.yaml +++ b/playbooks/legacy/cross-keystone-python27/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/cross-keystone-python35/run.yaml b/playbooks/legacy/cross-keystone-python35/run.yaml index 955145f4..dc24891e 100644 --- a/playbooks/legacy/cross-keystone-python35/run.yaml +++ b/playbooks/legacy/cross-keystone-python35/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/cross-networking-midonet-python35/run.yaml b/playbooks/legacy/cross-networking-midonet-python35/run.yaml index 4f0295f8..abd0712e 100644 --- a/playbooks/legacy/cross-networking-midonet-python35/run.yaml +++ b/playbooks/legacy/cross-networking-midonet-python35/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/cross-neutron-python27/run.yaml b/playbooks/legacy/cross-neutron-python27/run.yaml index 9d0da5b8..25293278 100644 --- a/playbooks/legacy/cross-neutron-python27/run.yaml +++ b/playbooks/legacy/cross-neutron-python27/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/cross-neutron-python35/run.yaml b/playbooks/legacy/cross-neutron-python35/run.yaml index a77e0aac..6bfece69 100644 --- a/playbooks/legacy/cross-neutron-python35/run.yaml +++ b/playbooks/legacy/cross-neutron-python35/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/cross-nova-func/run.yaml b/playbooks/legacy/cross-nova-func/run.yaml index f4ef39ed..af79b2cf 100644 --- a/playbooks/legacy/cross-nova-func/run.yaml +++ b/playbooks/legacy/cross-nova-func/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/cross-nova-python27/run.yaml b/playbooks/legacy/cross-nova-python27/run.yaml index 3fd509a9..f46cb975 100644 --- a/playbooks/legacy/cross-nova-python27/run.yaml +++ b/playbooks/legacy/cross-nova-python27/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/cross-nova-python35/run.yaml b/playbooks/legacy/cross-nova-python35/run.yaml index 6cce3075..caa644fc 100644 --- a/playbooks/legacy/cross-nova-python35/run.yaml +++ b/playbooks/legacy/cross-nova-python35/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/cross-swift-python27/run.yaml b/playbooks/legacy/cross-swift-python27/run.yaml index f6f5e8d8..16e7ccee 100644 --- a/playbooks/legacy/cross-swift-python27/run.yaml +++ b/playbooks/legacy/cross-swift-python27/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/cross-swift-python35/run.yaml b/playbooks/legacy/cross-swift-python35/run.yaml index 9896cd7b..3283f94a 100644 --- a/playbooks/legacy/cross-swift-python35/run.yaml +++ b/playbooks/legacy/cross-swift-python35/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/deploy-guide/run.yaml b/playbooks/legacy/deploy-guide/run.yaml index 13d9f55f..d5cc6e3e 100644 --- a/playbooks/legacy/deploy-guide/run.yaml +++ b/playbooks/legacy/deploy-guide/run.yaml @@ -50,7 +50,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/designate-dashboard-nodejs4-npm-run-lint/run.yaml b/playbooks/legacy/designate-dashboard-nodejs4-npm-run-lint/run.yaml index c50d0fe9..00eee78c 100644 --- a/playbooks/legacy/designate-dashboard-nodejs4-npm-run-lint/run.yaml +++ b/playbooks/legacy/designate-dashboard-nodejs4-npm-run-lint/run.yaml @@ -93,7 +93,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/designate-dashboard-nodejs4-npm-run-test/run.yaml b/playbooks/legacy/designate-dashboard-nodejs4-npm-run-test/run.yaml index 3ec4179e..c56ef90f 100644 --- a/playbooks/legacy/designate-dashboard-nodejs4-npm-run-test/run.yaml +++ b/playbooks/legacy/designate-dashboard-nodejs4-npm-run-test/run.yaml @@ -93,7 +93,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/devstack-gate-tox-py3-run-tests/run.yaml b/playbooks/legacy/devstack-gate-tox-py3-run-tests/run.yaml index ea81c452..c2b88b7a 100644 --- a/playbooks/legacy/devstack-gate-tox-py3-run-tests/run.yaml +++ b/playbooks/legacy/devstack-gate-tox-py3-run-tests/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/devstack-gate-tox-run-tests/run.yaml b/playbooks/legacy/devstack-gate-tox-run-tests/run.yaml index d7874426..5627120f 100644 --- a/playbooks/legacy/devstack-gate-tox-run-tests/run.yaml +++ b/playbooks/legacy/devstack-gate-tox-run-tests/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/devstack-unit-tests/run.yaml b/playbooks/legacy/devstack-unit-tests/run.yaml index 4b08cd91..25f69470 100644 --- a/playbooks/legacy/devstack-unit-tests/run.yaml +++ b/playbooks/legacy/devstack-unit-tests/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/dib-utils-tox-func/run.yaml b/playbooks/legacy/dib-utils-tox-func/run.yaml index f0be5475..499feb49 100644 --- a/playbooks/legacy/dib-utils-tox-func/run.yaml +++ b/playbooks/legacy/dib-utils-tox-func/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/diskimage-builder-pylint/run.yaml b/playbooks/legacy/diskimage-builder-pylint/run.yaml index 34d1ef46..ab7940c4 100644 --- a/playbooks/legacy/diskimage-builder-pylint/run.yaml +++ b/playbooks/legacy/diskimage-builder-pylint/run.yaml @@ -50,7 +50,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/django_openstack_auth-tox-py27dj110/run.yaml b/playbooks/legacy/django_openstack_auth-tox-py27dj110/run.yaml index aae61d7c..32d6b664 100644 --- a/playbooks/legacy/django_openstack_auth-tox-py27dj110/run.yaml +++ b/playbooks/legacy/django_openstack_auth-tox-py27dj110/run.yaml @@ -59,7 +59,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/django_openstack_auth-tox-py27dj18/run.yaml b/playbooks/legacy/django_openstack_auth-tox-py27dj18/run.yaml index d3fd2409..b3546198 100644 --- a/playbooks/legacy/django_openstack_auth-tox-py27dj18/run.yaml +++ b/playbooks/legacy/django_openstack_auth-tox-py27dj18/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/django_openstack_auth-tox-py27dj19/run.yaml b/playbooks/legacy/django_openstack_auth-tox-py27dj19/run.yaml index 458445f3..2e22430f 100644 --- a/playbooks/legacy/django_openstack_auth-tox-py27dj19/run.yaml +++ b/playbooks/legacy/django_openstack_auth-tox-py27dj19/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/dox-buildimages/run.yaml b/playbooks/legacy/dox-buildimages/run.yaml index f3e59ac3..698bc557 100644 --- a/playbooks/legacy/dox-buildimages/run.yaml +++ b/playbooks/legacy/dox-buildimages/run.yaml @@ -52,7 +52,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/elastic-recheck-docs/run.yaml b/playbooks/legacy/elastic-recheck-docs/run.yaml index 8da349b9..91708c18 100644 --- a/playbooks/legacy/elastic-recheck-docs/run.yaml +++ b/playbooks/legacy/elastic-recheck-docs/run.yaml @@ -44,7 +44,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/elastic-recheck-tox-queries/run.yaml b/playbooks/legacy/elastic-recheck-tox-queries/run.yaml index 72d22fc5..4ceb814f 100644 --- a/playbooks/legacy/elastic-recheck-tox-queries/run.yaml +++ b/playbooks/legacy/elastic-recheck-tox-queries/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/freezer-api-pylint/run.yaml b/playbooks/legacy/freezer-api-pylint/run.yaml index d534a6cd..37d880f4 100644 --- a/playbooks/legacy/freezer-api-pylint/run.yaml +++ b/playbooks/legacy/freezer-api-pylint/run.yaml @@ -50,7 +50,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/freezer-dr-pylint/run.yaml b/playbooks/legacy/freezer-dr-pylint/run.yaml index 25a658da..3611c423 100644 --- a/playbooks/legacy/freezer-dr-pylint/run.yaml +++ b/playbooks/legacy/freezer-dr-pylint/run.yaml @@ -50,7 +50,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/freezer-pylint/run.yaml b/playbooks/legacy/freezer-pylint/run.yaml index c75ebe94..77137df3 100644 --- a/playbooks/legacy/freezer-pylint/run.yaml +++ b/playbooks/legacy/freezer-pylint/run.yaml @@ -50,7 +50,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/freezer-web-ui-pylint/run.yaml b/playbooks/legacy/freezer-web-ui-pylint/run.yaml index 98882769..51ab4300 100644 --- a/playbooks/legacy/freezer-web-ui-pylint/run.yaml +++ b/playbooks/legacy/freezer-web-ui-pylint/run.yaml @@ -50,7 +50,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/fuel-astute-puppet-unit-3.8-centos-7/run.yaml b/playbooks/legacy/fuel-astute-puppet-unit-3.8-centos-7/run.yaml index 303642e4..5f90ccc7 100644 --- a/playbooks/legacy/fuel-astute-puppet-unit-3.8-centos-7/run.yaml +++ b/playbooks/legacy/fuel-astute-puppet-unit-3.8-centos-7/run.yaml @@ -64,7 +64,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/fuel-ccp-validate/run.yaml b/playbooks/legacy/fuel-ccp-validate/run.yaml index 0c354183..b600be54 100644 --- a/playbooks/legacy/fuel-ccp-validate/run.yaml +++ b/playbooks/legacy/fuel-ccp-validate/run.yaml @@ -10,7 +10,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/fuel-devops-pylint-ubuntu-trusty/run.yaml b/playbooks/legacy/fuel-devops-pylint-ubuntu-trusty/run.yaml index cc42c9dc..ded11a4d 100644 --- a/playbooks/legacy/fuel-devops-pylint-ubuntu-trusty/run.yaml +++ b/playbooks/legacy/fuel-devops-pylint-ubuntu-trusty/run.yaml @@ -50,7 +50,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/fuel-devops-pylint/run.yaml b/playbooks/legacy/fuel-devops-pylint/run.yaml index 3ae8ac6c..679584c0 100644 --- a/playbooks/legacy/fuel-devops-pylint/run.yaml +++ b/playbooks/legacy/fuel-devops-pylint/run.yaml @@ -50,7 +50,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/fuel-library-puppet-lint/run.yaml b/playbooks/legacy/fuel-library-puppet-lint/run.yaml index de73df2f..d1495835 100644 --- a/playbooks/legacy/fuel-library-puppet-lint/run.yaml +++ b/playbooks/legacy/fuel-library-puppet-lint/run.yaml @@ -63,7 +63,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/fuel-library-puppet-unit-3.8-centos-7/run.yaml b/playbooks/legacy/fuel-library-puppet-unit-3.8-centos-7/run.yaml index 5ec3f0e7..75bd1b93 100644 --- a/playbooks/legacy/fuel-library-puppet-unit-3.8-centos-7/run.yaml +++ b/playbooks/legacy/fuel-library-puppet-unit-3.8-centos-7/run.yaml @@ -64,7 +64,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/fuel-library-puppet-unit-4.5-centos-7/run.yaml b/playbooks/legacy/fuel-library-puppet-unit-4.5-centos-7/run.yaml index 30ae91b7..247dac0d 100644 --- a/playbooks/legacy/fuel-library-puppet-unit-4.5-centos-7/run.yaml +++ b/playbooks/legacy/fuel-library-puppet-unit-4.5-centos-7/run.yaml @@ -64,7 +64,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/fuel-nailgun-agent-puppet-unit-3.8-centos-7/run.yaml b/playbooks/legacy/fuel-nailgun-agent-puppet-unit-3.8-centos-7/run.yaml index 2198c2ba..370f8c6d 100644 --- a/playbooks/legacy/fuel-nailgun-agent-puppet-unit-3.8-centos-7/run.yaml +++ b/playbooks/legacy/fuel-nailgun-agent-puppet-unit-3.8-centos-7/run.yaml @@ -64,7 +64,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/fuel-octane-puppet-lint/run.yaml b/playbooks/legacy/fuel-octane-puppet-lint/run.yaml index eaa237c5..9bd39f50 100644 --- a/playbooks/legacy/fuel-octane-puppet-lint/run.yaml +++ b/playbooks/legacy/fuel-octane-puppet-lint/run.yaml @@ -63,7 +63,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/fuel-qa-pylint-ubuntu-trusty/run.yaml b/playbooks/legacy/fuel-qa-pylint-ubuntu-trusty/run.yaml index 8cee7528..513f127c 100644 --- a/playbooks/legacy/fuel-qa-pylint-ubuntu-trusty/run.yaml +++ b/playbooks/legacy/fuel-qa-pylint-ubuntu-trusty/run.yaml @@ -50,7 +50,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/fuel-qa-pylint/run.yaml b/playbooks/legacy/fuel-qa-pylint/run.yaml index 9189be2a..f7486e80 100644 --- a/playbooks/legacy/fuel-qa-pylint/run.yaml +++ b/playbooks/legacy/fuel-qa-pylint/run.yaml @@ -50,7 +50,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/fuel-ui-nodejs4-npm-run-lint/run.yaml b/playbooks/legacy/fuel-ui-nodejs4-npm-run-lint/run.yaml index 27d9664b..1cee5722 100644 --- a/playbooks/legacy/fuel-ui-nodejs4-npm-run-lint/run.yaml +++ b/playbooks/legacy/fuel-ui-nodejs4-npm-run-lint/run.yaml @@ -92,7 +92,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/gate-placement-api-ref/run.yaml b/playbooks/legacy/gate-placement-api-ref/run.yaml index c35d33e8..1ff81807 100644 --- a/playbooks/legacy/gate-placement-api-ref/run.yaml +++ b/playbooks/legacy/gate-placement-api-ref/run.yaml @@ -50,7 +50,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/gate-training-labs-scripts/run.yaml b/playbooks/legacy/gate-training-labs-scripts/run.yaml index 46df4d4f..868f73e1 100644 --- a/playbooks/legacy/gate-training-labs-scripts/run.yaml +++ b/playbooks/legacy/gate-training-labs-scripts/run.yaml @@ -44,7 +44,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/gearman-plugin-hpi-artifact/run.yaml b/playbooks/legacy/gearman-plugin-hpi-artifact/run.yaml index 4172cbb5..3c4bb180 100644 --- a/playbooks/legacy/gearman-plugin-hpi-artifact/run.yaml +++ b/playbooks/legacy/gearman-plugin-hpi-artifact/run.yaml @@ -44,7 +44,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/gearman-plugin-jenkinsci-upload/run.yaml b/playbooks/legacy/gearman-plugin-jenkinsci-upload/run.yaml index 7172d7e7..cb024da9 100644 --- a/playbooks/legacy/gearman-plugin-jenkinsci-upload/run.yaml +++ b/playbooks/legacy/gearman-plugin-jenkinsci-upload/run.yaml @@ -10,7 +10,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/gearman-plugin-maven-build-ubuntu-trusty/run.yaml b/playbooks/legacy/gearman-plugin-maven-build-ubuntu-trusty/run.yaml index 716fb46a..f02af6c3 100644 --- a/playbooks/legacy/gearman-plugin-maven-build-ubuntu-trusty/run.yaml +++ b/playbooks/legacy/gearman-plugin-maven-build-ubuntu-trusty/run.yaml @@ -45,7 +45,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/gerrit-buck/run.yaml b/playbooks/legacy/gerrit-buck/run.yaml index c0cdd7ce..08fe069b 100644 --- a/playbooks/legacy/gerrit-buck/run.yaml +++ b/playbooks/legacy/gerrit-buck/run.yaml @@ -28,7 +28,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/gerrit-package-buck/run.yaml b/playbooks/legacy/gerrit-package-buck/run.yaml index 1491d1d6..ad6207c6 100644 --- a/playbooks/legacy/gerrit-package-buck/run.yaml +++ b/playbooks/legacy/gerrit-package-buck/run.yaml @@ -28,7 +28,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/gitdm/run.yaml b/playbooks/legacy/gitdm/run.yaml index 414a8b4d..e1093cc3 100644 --- a/playbooks/legacy/gitdm/run.yaml +++ b/playbooks/legacy/gitdm/run.yaml @@ -44,7 +44,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/golang-fmt/run.yaml b/playbooks/legacy/golang-fmt/run.yaml index 850f0e49..a95879c1 100644 --- a/playbooks/legacy/golang-fmt/run.yaml +++ b/playbooks/legacy/golang-fmt/run.yaml @@ -52,7 +52,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/golang-unit/run.yaml b/playbooks/legacy/golang-unit/run.yaml index 30d57dcf..b5ba64e2 100644 --- a/playbooks/legacy/golang-unit/run.yaml +++ b/playbooks/legacy/golang-unit/run.yaml @@ -52,7 +52,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/governance-tox-validate/run.yaml b/playbooks/legacy/governance-tox-validate/run.yaml index 8766dc32..89e34906 100644 --- a/playbooks/legacy/governance-tox-validate/run.yaml +++ b/playbooks/legacy/governance-tox-validate/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/grenade-publish-docs/run.yaml b/playbooks/legacy/grenade-publish-docs/run.yaml index eb5350ac..06d2e77d 100644 --- a/playbooks/legacy/grenade-publish-docs/run.yaml +++ b/playbooks/legacy/grenade-publish-docs/run.yaml @@ -50,7 +50,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/groups-release-branch/run.yaml b/playbooks/legacy/groups-release-branch/run.yaml index 3c3eb3b1..b918a68f 100644 --- a/playbooks/legacy/groups-release-branch/run.yaml +++ b/playbooks/legacy/groups-release-branch/run.yaml @@ -44,7 +44,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/groups-release-master/run.yaml b/playbooks/legacy/groups-release-master/run.yaml index 2967f8e2..1c4026f8 100644 --- a/playbooks/legacy/groups-release-master/run.yaml +++ b/playbooks/legacy/groups-release-master/run.yaml @@ -44,7 +44,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/groups-unittests/run.yaml b/playbooks/legacy/groups-unittests/run.yaml index 360aabf4..690198a6 100644 --- a/playbooks/legacy/groups-unittests/run.yaml +++ b/playbooks/legacy/groups-unittests/run.yaml @@ -44,7 +44,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/hacking-integration-nova/run.yaml b/playbooks/legacy/hacking-integration-nova/run.yaml index c3d02aba..9a9365c2 100644 --- a/playbooks/legacy/hacking-integration-nova/run.yaml +++ b/playbooks/legacy/hacking-integration-nova/run.yaml @@ -15,7 +15,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/heat-translator-tox-py27-tp/run.yaml b/playbooks/legacy/heat-translator-tox-py27-tp/run.yaml index 56096318..934b244b 100644 --- a/playbooks/legacy/heat-translator-tox-py27-tp/run.yaml +++ b/playbooks/legacy/heat-translator-tox-py27-tp/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/horizon-selenium-headless-legacy/run.yaml b/playbooks/legacy/horizon-selenium-headless-legacy/run.yaml index d7e29ccf..0dc1761d 100644 --- a/playbooks/legacy/horizon-selenium-headless-legacy/run.yaml +++ b/playbooks/legacy/horizon-selenium-headless-legacy/run.yaml @@ -50,7 +50,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/horizon-selenium-headless/run.yaml b/playbooks/legacy/horizon-selenium-headless/run.yaml index 69327688..f4719b73 100644 --- a/playbooks/legacy/horizon-selenium-headless/run.yaml +++ b/playbooks/legacy/horizon-selenium-headless/run.yaml @@ -50,7 +50,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/horizon-tox-py27dj110/run.yaml b/playbooks/legacy/horizon-tox-py27dj110/run.yaml index 559fe097..f494dcdd 100644 --- a/playbooks/legacy/horizon-tox-py27dj110/run.yaml +++ b/playbooks/legacy/horizon-tox-py27dj110/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/horizon-tox-py27dj18/run.yaml b/playbooks/legacy/horizon-tox-py27dj18/run.yaml index 6d4504b9..ca20fa8e 100644 --- a/playbooks/legacy/horizon-tox-py27dj18/run.yaml +++ b/playbooks/legacy/horizon-tox-py27dj18/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/horizon-tox-py27dj19/run.yaml b/playbooks/legacy/horizon-tox-py27dj19/run.yaml index 53821c11..2e5025a9 100644 --- a/playbooks/legacy/horizon-tox-py27dj19/run.yaml +++ b/playbooks/legacy/horizon-tox-py27dj19/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/i18n-tox-doc-docs/run.yaml b/playbooks/legacy/i18n-tox-doc-docs/run.yaml index 82a83b08..e384ea23 100644 --- a/playbooks/legacy/i18n-tox-doc-docs/run.yaml +++ b/playbooks/legacy/i18n-tox-doc-docs/run.yaml @@ -50,7 +50,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/infra-ansible/run.yaml b/playbooks/legacy/infra-ansible/run.yaml index 137404a4..607c77f5 100644 --- a/playbooks/legacy/infra-ansible/run.yaml +++ b/playbooks/legacy/infra-ansible/run.yaml @@ -44,7 +44,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/infra-publications-publish-index/run.yaml b/playbooks/legacy/infra-publications-publish-index/run.yaml index 3dbc72aa..6c177ae5 100644 --- a/playbooks/legacy/infra-publications-publish-index/run.yaml +++ b/playbooks/legacy/infra-publications-publish-index/run.yaml @@ -44,7 +44,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/infra-publications-publish/run.yaml b/playbooks/legacy/infra-publications-publish/run.yaml index f17db416..a0921261 100644 --- a/playbooks/legacy/infra-publications-publish/run.yaml +++ b/playbooks/legacy/infra-publications-publish/run.yaml @@ -44,7 +44,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/instack-undercloud-puppet-lint/run.yaml b/playbooks/legacy/instack-undercloud-puppet-lint/run.yaml index 0dd9a4cf..ce1b1491 100644 --- a/playbooks/legacy/instack-undercloud-puppet-lint/run.yaml +++ b/playbooks/legacy/instack-undercloud-puppet-lint/run.yaml @@ -63,7 +63,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/install-guide/run.yaml b/playbooks/legacy/install-guide/run.yaml index e864e4a4..bfc88551 100644 --- a/playbooks/legacy/install-guide/run.yaml +++ b/playbooks/legacy/install-guide/run.yaml @@ -50,7 +50,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/interop-tox-doc8/run.yaml b/playbooks/legacy/interop-tox-doc8/run.yaml index bf3704a1..7221fbc0 100644 --- a/playbooks/legacy/interop-tox-doc8/run.yaml +++ b/playbooks/legacy/interop-tox-doc8/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/interop-tox-jsonlint/run.yaml b/playbooks/legacy/interop-tox-jsonlint/run.yaml index e6e03a24..2f9f25d6 100644 --- a/playbooks/legacy/interop-tox-jsonlint/run.yaml +++ b/playbooks/legacy/interop-tox-jsonlint/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/interop-tox-jsonschema/run.yaml b/playbooks/legacy/interop-tox-jsonschema/run.yaml index 92148322..5bdb55d0 100644 --- a/playbooks/legacy/interop-tox-jsonschema/run.yaml +++ b/playbooks/legacy/interop-tox-jsonschema/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/irc-meetings-tox-ical/run.yaml b/playbooks/legacy/irc-meetings-tox-ical/run.yaml index ffbd65bd..e944e4a8 100644 --- a/playbooks/legacy/irc-meetings-tox-ical/run.yaml +++ b/playbooks/legacy/irc-meetings-tox-ical/run.yaml @@ -44,7 +44,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/ironic-inspector-tox-func/run.yaml b/playbooks/legacy/ironic-inspector-tox-func/run.yaml index 2edc2067..22bb0c71 100644 --- a/playbooks/legacy/ironic-inspector-tox-func/run.yaml +++ b/playbooks/legacy/ironic-inspector-tox-func/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/ironic-inspector-tox-func3/run.yaml b/playbooks/legacy/ironic-inspector-tox-func3/run.yaml index b01f434a..9a449320 100644 --- a/playbooks/legacy/ironic-inspector-tox-func3/run.yaml +++ b/playbooks/legacy/ironic-inspector-tox-func3/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/ironic-python-agent-tox-func/run.yaml b/playbooks/legacy/ironic-python-agent-tox-func/run.yaml index e3278a4f..0a422faa 100644 --- a/playbooks/legacy/ironic-python-agent-tox-func/run.yaml +++ b/playbooks/legacy/ironic-python-agent-tox-func/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/its-storyboard-gerrit-plugin-stable-2.13/run.yaml b/playbooks/legacy/its-storyboard-gerrit-plugin-stable-2.13/run.yaml index 5f870351..8b8c9238 100644 --- a/playbooks/legacy/its-storyboard-gerrit-plugin-stable-2.13/run.yaml +++ b/playbooks/legacy/its-storyboard-gerrit-plugin-stable-2.13/run.yaml @@ -29,7 +29,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/javamelody-gerrit-plugin-stable-2.13/run.yaml b/playbooks/legacy/javamelody-gerrit-plugin-stable-2.13/run.yaml index e7bdfe7d..3cc6eb04 100644 --- a/playbooks/legacy/javamelody-gerrit-plugin-stable-2.13/run.yaml +++ b/playbooks/legacy/javamelody-gerrit-plugin-stable-2.13/run.yaml @@ -29,7 +29,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/js-generator-openstack-nodejs6-npm-docs/run.yaml b/playbooks/legacy/js-generator-openstack-nodejs6-npm-docs/run.yaml index e4cfa161..24291201 100644 --- a/playbooks/legacy/js-generator-openstack-nodejs6-npm-docs/run.yaml +++ b/playbooks/legacy/js-generator-openstack-nodejs6-npm-docs/run.yaml @@ -72,7 +72,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/js-openstack-lib-nodejs6-npm-sdk-docs/run.yaml b/playbooks/legacy/js-openstack-lib-nodejs6-npm-sdk-docs/run.yaml index d01c3cf6..d5465aa7 100644 --- a/playbooks/legacy/js-openstack-lib-nodejs6-npm-sdk-docs/run.yaml +++ b/playbooks/legacy/js-openstack-lib-nodejs6-npm-sdk-docs/run.yaml @@ -72,7 +72,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/k8s-docker-suite-app-murano-releasenotes/run.yaml b/playbooks/legacy/k8s-docker-suite-app-murano-releasenotes/run.yaml index 7e6e02de..6152bb47 100644 --- a/playbooks/legacy/k8s-docker-suite-app-murano-releasenotes/run.yaml +++ b/playbooks/legacy/k8s-docker-suite-app-murano-releasenotes/run.yaml @@ -51,7 +51,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/keystone-tox-patch_cover/run.yaml b/playbooks/legacy/keystone-tox-patch_cover/run.yaml index ae2b4b34..0b9f8388 100644 --- a/playbooks/legacy/keystone-tox-patch_cover/run.yaml +++ b/playbooks/legacy/keystone-tox-patch_cover/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/laravel-openstackid-release-branch/run.yaml b/playbooks/legacy/laravel-openstackid-release-branch/run.yaml index 812737ea..146e193e 100644 --- a/playbooks/legacy/laravel-openstackid-release-branch/run.yaml +++ b/playbooks/legacy/laravel-openstackid-release-branch/run.yaml @@ -53,7 +53,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/laravel-openstackid-release-master/run.yaml b/playbooks/legacy/laravel-openstackid-release-master/run.yaml index b37cb8ac..80d97ef1 100644 --- a/playbooks/legacy/laravel-openstackid-release-master/run.yaml +++ b/playbooks/legacy/laravel-openstackid-release-master/run.yaml @@ -53,7 +53,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/laravel-openstackid-unittests/run.yaml b/playbooks/legacy/laravel-openstackid-unittests/run.yaml index 9bd7f9ab..34aa6f78 100644 --- a/playbooks/legacy/laravel-openstackid-unittests/run.yaml +++ b/playbooks/legacy/laravel-openstackid-unittests/run.yaml @@ -53,7 +53,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/magnum-tox-migration/run.yaml b/playbooks/legacy/magnum-tox-migration/run.yaml index b3ad5414..3183366e 100644 --- a/playbooks/legacy/magnum-tox-migration/run.yaml +++ b/playbooks/legacy/magnum-tox-migration/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/manila-pylint/run.yaml b/playbooks/legacy/manila-pylint/run.yaml index 27371d75..2d0c267d 100644 --- a/playbooks/legacy/manila-pylint/run.yaml +++ b/playbooks/legacy/manila-pylint/run.yaml @@ -50,7 +50,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/manila-tox-genconfig/run.yaml b/playbooks/legacy/manila-tox-genconfig/run.yaml index 535a1aaf..c602bac4 100644 --- a/playbooks/legacy/manila-tox-genconfig/run.yaml +++ b/playbooks/legacy/manila-tox-genconfig/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/manila-ui-tox-py27dj110/run.yaml b/playbooks/legacy/manila-ui-tox-py27dj110/run.yaml index 52a5c58d..dc681417 100644 --- a/playbooks/legacy/manila-ui-tox-py27dj110/run.yaml +++ b/playbooks/legacy/manila-ui-tox-py27dj110/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/manila-ui-tox-py27dj19/run.yaml b/playbooks/legacy/manila-ui-tox-py27dj19/run.yaml index e3881bcc..a54280df 100644 --- a/playbooks/legacy/manila-ui-tox-py27dj19/run.yaml +++ b/playbooks/legacy/manila-ui-tox-py27dj19/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/merlin-js-release-branch/run.yaml b/playbooks/legacy/merlin-js-release-branch/run.yaml index d038b080..0dd8469d 100644 --- a/playbooks/legacy/merlin-js-release-branch/run.yaml +++ b/playbooks/legacy/merlin-js-release-branch/run.yaml @@ -71,7 +71,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/merlin-js-release-master/run.yaml b/playbooks/legacy/merlin-js-release-master/run.yaml index 617f0004..a9642a59 100644 --- a/playbooks/legacy/merlin-js-release-master/run.yaml +++ b/playbooks/legacy/merlin-js-release-master/run.yaml @@ -71,7 +71,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/mistral-tox-unit-mysql/run.yaml b/playbooks/legacy/mistral-tox-unit-mysql/run.yaml index 037c4774..9c7cdedc 100644 --- a/playbooks/legacy/mistral-tox-unit-mysql/run.yaml +++ b/playbooks/legacy/mistral-tox-unit-mysql/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/mistral-tox-unit-postgresql/run.yaml b/playbooks/legacy/mistral-tox-unit-postgresql/run.yaml index 032919c9..c8bbca8c 100644 --- a/playbooks/legacy/mistral-tox-unit-postgresql/run.yaml +++ b/playbooks/legacy/mistral-tox-unit-postgresql/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/mogan-tox-functional/run.yaml b/playbooks/legacy/mogan-tox-functional/run.yaml index d1a36fe4..99b013c6 100644 --- a/playbooks/legacy/mogan-tox-functional/run.yaml +++ b/playbooks/legacy/mogan-tox-functional/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/monasca-api-localrepo-upload/run.yaml b/playbooks/legacy/monasca-api-localrepo-upload/run.yaml index f12a6050..ec075972 100644 --- a/playbooks/legacy/monasca-api-localrepo-upload/run.yaml +++ b/playbooks/legacy/monasca-api-localrepo-upload/run.yaml @@ -44,7 +44,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/monasca-api-maven-build/run.yaml b/playbooks/legacy/monasca-api-maven-build/run.yaml index a7097f3f..0ea2b0bf 100644 --- a/playbooks/legacy/monasca-api-maven-build/run.yaml +++ b/playbooks/legacy/monasca-api-maven-build/run.yaml @@ -44,7 +44,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/monasca-common-localrepo-upload/run.yaml b/playbooks/legacy/monasca-common-localrepo-upload/run.yaml index 38b15213..b1c5d692 100644 --- a/playbooks/legacy/monasca-common-localrepo-upload/run.yaml +++ b/playbooks/legacy/monasca-common-localrepo-upload/run.yaml @@ -44,7 +44,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/monasca-common-maven-build/run.yaml b/playbooks/legacy/monasca-common-maven-build/run.yaml index 0de6b835..e092d819 100644 --- a/playbooks/legacy/monasca-common-maven-build/run.yaml +++ b/playbooks/legacy/monasca-common-maven-build/run.yaml @@ -44,7 +44,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/monasca-persister-localrepo-upload/run.yaml b/playbooks/legacy/monasca-persister-localrepo-upload/run.yaml index e9b468be..d23842af 100644 --- a/playbooks/legacy/monasca-persister-localrepo-upload/run.yaml +++ b/playbooks/legacy/monasca-persister-localrepo-upload/run.yaml @@ -44,7 +44,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/monasca-persister-maven-build/run.yaml b/playbooks/legacy/monasca-persister-maven-build/run.yaml index 3e4aa485..0d30b0b8 100644 --- a/playbooks/legacy/monasca-persister-maven-build/run.yaml +++ b/playbooks/legacy/monasca-persister-maven-build/run.yaml @@ -44,7 +44,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/monasca-thresh-localrepo-upload/run.yaml b/playbooks/legacy/monasca-thresh-localrepo-upload/run.yaml index 1ae1c954..dc6ebc2b 100644 --- a/playbooks/legacy/monasca-thresh-localrepo-upload/run.yaml +++ b/playbooks/legacy/monasca-thresh-localrepo-upload/run.yaml @@ -44,7 +44,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/monasca-thresh-maven-build/run.yaml b/playbooks/legacy/monasca-thresh-maven-build/run.yaml index 036e9943..9d9547cd 100644 --- a/playbooks/legacy/monasca-thresh-maven-build/run.yaml +++ b/playbooks/legacy/monasca-thresh-maven-build/run.yaml @@ -44,7 +44,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/monitorstack-releasenotes/run.yaml b/playbooks/legacy/monitorstack-releasenotes/run.yaml index c3c0057c..21e4c632 100644 --- a/playbooks/legacy/monitorstack-releasenotes/run.yaml +++ b/playbooks/legacy/monitorstack-releasenotes/run.yaml @@ -50,7 +50,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/murano-firstapp-docs/run.yaml b/playbooks/legacy/murano-firstapp-docs/run.yaml index a926182a..6d4c1feb 100644 --- a/playbooks/legacy/murano-firstapp-docs/run.yaml +++ b/playbooks/legacy/murano-firstapp-docs/run.yaml @@ -50,7 +50,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/networking-cisco-tox-master/run.yaml b/playbooks/legacy/networking-cisco-tox-master/run.yaml index 85026515..9bafc1f7 100644 --- a/playbooks/legacy/networking-cisco-tox-master/run.yaml +++ b/playbooks/legacy/networking-cisco-tox-master/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/networking-cisco-tox-newton/run.yaml b/playbooks/legacy/networking-cisco-tox-newton/run.yaml index 4b9b1d6a..692015b4 100644 --- a/playbooks/legacy/networking-cisco-tox-newton/run.yaml +++ b/playbooks/legacy/networking-cisco-tox-newton/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/networking-cisco-tox-ocata/run.yaml b/playbooks/legacy/networking-cisco-tox-ocata/run.yaml index a7da9d07..89c5102f 100644 --- a/playbooks/legacy/networking-cisco-tox-ocata/run.yaml +++ b/playbooks/legacy/networking-cisco-tox-ocata/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/networking-cisco-tox-pike/run.yaml b/playbooks/legacy/networking-cisco-tox-pike/run.yaml index c1c91fcd..a40e359e 100644 --- a/playbooks/legacy/networking-cisco-tox-pike/run.yaml +++ b/playbooks/legacy/networking-cisco-tox-pike/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/neutron-lbaas-dashboard-nodejs4-npm-run-lint/run.yaml b/playbooks/legacy/neutron-lbaas-dashboard-nodejs4-npm-run-lint/run.yaml index f6d1f8b5..212b8bdf 100644 --- a/playbooks/legacy/neutron-lbaas-dashboard-nodejs4-npm-run-lint/run.yaml +++ b/playbooks/legacy/neutron-lbaas-dashboard-nodejs4-npm-run-lint/run.yaml @@ -93,7 +93,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/neutron-lbaas-dashboard-nodejs4-npm-run-test/run.yaml b/playbooks/legacy/neutron-lbaas-dashboard-nodejs4-npm-run-test/run.yaml index be5e3660..3fb659ff 100644 --- a/playbooks/legacy/neutron-lbaas-dashboard-nodejs4-npm-run-test/run.yaml +++ b/playbooks/legacy/neutron-lbaas-dashboard-nodejs4-npm-run-test/run.yaml @@ -93,7 +93,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/neutron-vpnaas-dashboard-releasenotes/run.yaml b/playbooks/legacy/neutron-vpnaas-dashboard-releasenotes/run.yaml index 0b206d43..c7e0ed3c 100644 --- a/playbooks/legacy/neutron-vpnaas-dashboard-releasenotes/run.yaml +++ b/playbooks/legacy/neutron-vpnaas-dashboard-releasenotes/run.yaml @@ -51,7 +51,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/neutron-vpnaas-releasenotes/run.yaml b/playbooks/legacy/neutron-vpnaas-releasenotes/run.yaml index d38f3d97..7925a562 100644 --- a/playbooks/legacy/neutron-vpnaas-releasenotes/run.yaml +++ b/playbooks/legacy/neutron-vpnaas-releasenotes/run.yaml @@ -50,7 +50,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/nodejs4-npm-run-lint/run.yaml b/playbooks/legacy/nodejs4-npm-run-lint/run.yaml index 54585a4b..2bbf6818 100644 --- a/playbooks/legacy/nodejs4-npm-run-lint/run.yaml +++ b/playbooks/legacy/nodejs4-npm-run-lint/run.yaml @@ -92,7 +92,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/nodejs4-npm-run-test/run.yaml b/playbooks/legacy/nodejs4-npm-run-test/run.yaml index ebb7b0d9..18964102 100644 --- a/playbooks/legacy/nodejs4-npm-run-test/run.yaml +++ b/playbooks/legacy/nodejs4-npm-run-test/run.yaml @@ -92,7 +92,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/nodejs6-npm-run-lint/run.yaml b/playbooks/legacy/nodejs6-npm-run-lint/run.yaml index fcfbb7cb..d3f9cb1c 100644 --- a/playbooks/legacy/nodejs6-npm-run-lint/run.yaml +++ b/playbooks/legacy/nodejs6-npm-run-lint/run.yaml @@ -92,7 +92,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/nodejs6-npm-run-test/run.yaml b/playbooks/legacy/nodejs6-npm-run-test/run.yaml index 2a5fc9f4..44dae4ec 100644 --- a/playbooks/legacy/nodejs6-npm-run-test/run.yaml +++ b/playbooks/legacy/nodejs6-npm-run-test/run.yaml @@ -92,7 +92,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/nova-api-ref-src/run.yaml b/playbooks/legacy/nova-api-ref-src/run.yaml index 6bf84d02..d3910e58 100644 --- a/playbooks/legacy/nova-api-ref-src/run.yaml +++ b/playbooks/legacy/nova-api-ref-src/run.yaml @@ -46,7 +46,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/nova-dpm-tox-functional-py35/run.yaml b/playbooks/legacy/nova-dpm-tox-functional-py35/run.yaml index c19e1b55..333a6bda 100644 --- a/playbooks/legacy/nova-dpm-tox-functional-py35/run.yaml +++ b/playbooks/legacy/nova-dpm-tox-functional-py35/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/nova-dpm-tox-functional/run.yaml b/playbooks/legacy/nova-dpm-tox-functional/run.yaml index 5baa0e69..1fc7ab97 100644 --- a/playbooks/legacy/nova-dpm-tox-functional/run.yaml +++ b/playbooks/legacy/nova-dpm-tox-functional/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/nova-tox-functional-py35/run.yaml b/playbooks/legacy/nova-tox-functional-py35/run.yaml index 23435378..f64c6fd5 100644 --- a/playbooks/legacy/nova-tox-functional-py35/run.yaml +++ b/playbooks/legacy/nova-tox-functional-py35/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/nova-tox-functional/run.yaml b/playbooks/legacy/nova-tox-functional/run.yaml index b6a80f9f..3f5ddde3 100644 --- a/playbooks/legacy/nova-tox-functional/run.yaml +++ b/playbooks/legacy/nova-tox-functional/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/oaktreemodel-distcheck/run.yaml b/playbooks/legacy/oaktreemodel-distcheck/run.yaml index fe556ec0..60721f5c 100644 --- a/playbooks/legacy/oaktreemodel-distcheck/run.yaml +++ b/playbooks/legacy/oaktreemodel-distcheck/run.yaml @@ -59,7 +59,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/octavia-dashboard-nodejs4-npm-run-lint/run.yaml b/playbooks/legacy/octavia-dashboard-nodejs4-npm-run-lint/run.yaml index 42d03eed..34fa37e9 100644 --- a/playbooks/legacy/octavia-dashboard-nodejs4-npm-run-lint/run.yaml +++ b/playbooks/legacy/octavia-dashboard-nodejs4-npm-run-lint/run.yaml @@ -93,7 +93,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/octavia-dashboard-nodejs4-npm-run-test/run.yaml b/playbooks/legacy/octavia-dashboard-nodejs4-npm-run-test/run.yaml index 7f7c8fbd..a43d3aad 100644 --- a/playbooks/legacy/octavia-dashboard-nodejs4-npm-run-test/run.yaml +++ b/playbooks/legacy/octavia-dashboard-nodejs4-npm-run-test/run.yaml @@ -93,7 +93,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/octavia-tox-functional-py35/run.yaml b/playbooks/legacy/octavia-tox-functional-py35/run.yaml index 16905329..5cb32ec8 100644 --- a/playbooks/legacy/octavia-tox-functional-py35/run.yaml +++ b/playbooks/legacy/octavia-tox-functional-py35/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/octavia-tox-functional/run.yaml b/playbooks/legacy/octavia-tox-functional/run.yaml index afef48eb..39ef3ba4 100644 --- a/playbooks/legacy/octavia-tox-functional/run.yaml +++ b/playbooks/legacy/octavia-tox-functional/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/omni-tests/run.yaml b/playbooks/legacy/omni-tests/run.yaml index 3cba2434..752e37f4 100644 --- a/playbooks/legacy/omni-tests/run.yaml +++ b/playbooks/legacy/omni-tests/run.yaml @@ -44,7 +44,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/ooi-tox-functional/run.yaml b/playbooks/legacy/ooi-tox-functional/run.yaml index 0c17515f..037fc5bd 100644 --- a/playbooks/legacy/ooi-tox-functional/run.yaml +++ b/playbooks/legacy/ooi-tox-functional/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/openstack-ansible-announce-release/run.yaml b/playbooks/legacy/openstack-ansible-announce-release/run.yaml index 3bb7115d..0f38ba60 100644 --- a/playbooks/legacy/openstack-ansible-announce-release/run.yaml +++ b/playbooks/legacy/openstack-ansible-announce-release/run.yaml @@ -81,7 +81,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/openstack-ansible-galera_server-announce-release/run.yaml b/playbooks/legacy/openstack-ansible-galera_server-announce-release/run.yaml index 5460857f..ced918a4 100644 --- a/playbooks/legacy/openstack-ansible-galera_server-announce-release/run.yaml +++ b/playbooks/legacy/openstack-ansible-galera_server-announce-release/run.yaml @@ -82,7 +82,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/openstack-ansible-haproxy_server-announce-release/run.yaml b/playbooks/legacy/openstack-ansible-haproxy_server-announce-release/run.yaml index e8991b5a..e4b17864 100644 --- a/playbooks/legacy/openstack-ansible-haproxy_server-announce-release/run.yaml +++ b/playbooks/legacy/openstack-ansible-haproxy_server-announce-release/run.yaml @@ -82,7 +82,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/openstack-ansible-memcached_server-announce-release/run.yaml b/playbooks/legacy/openstack-ansible-memcached_server-announce-release/run.yaml index c7ad9490..e482765c 100644 --- a/playbooks/legacy/openstack-ansible-memcached_server-announce-release/run.yaml +++ b/playbooks/legacy/openstack-ansible-memcached_server-announce-release/run.yaml @@ -82,7 +82,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/openstack-ansible-os_almanach-announce-release/run.yaml b/playbooks/legacy/openstack-ansible-os_almanach-announce-release/run.yaml index aa86c549..8719c370 100644 --- a/playbooks/legacy/openstack-ansible-os_almanach-announce-release/run.yaml +++ b/playbooks/legacy/openstack-ansible-os_almanach-announce-release/run.yaml @@ -82,7 +82,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/openstack-ansible-os_aodh-announce-release/run.yaml b/playbooks/legacy/openstack-ansible-os_aodh-announce-release/run.yaml index a6a29e39..63db35f8 100644 --- a/playbooks/legacy/openstack-ansible-os_aodh-announce-release/run.yaml +++ b/playbooks/legacy/openstack-ansible-os_aodh-announce-release/run.yaml @@ -82,7 +82,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/openstack-ansible-os_barbican-announce-release/run.yaml b/playbooks/legacy/openstack-ansible-os_barbican-announce-release/run.yaml index f5e523ec..337139da 100644 --- a/playbooks/legacy/openstack-ansible-os_barbican-announce-release/run.yaml +++ b/playbooks/legacy/openstack-ansible-os_barbican-announce-release/run.yaml @@ -82,7 +82,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/openstack-ansible-os_ceilometer-announce-release/run.yaml b/playbooks/legacy/openstack-ansible-os_ceilometer-announce-release/run.yaml index 7f14e67e..a7e4b3a1 100644 --- a/playbooks/legacy/openstack-ansible-os_ceilometer-announce-release/run.yaml +++ b/playbooks/legacy/openstack-ansible-os_ceilometer-announce-release/run.yaml @@ -82,7 +82,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/openstack-ansible-os_cinder-announce-release/run.yaml b/playbooks/legacy/openstack-ansible-os_cinder-announce-release/run.yaml index 642db6c0..67be3612 100644 --- a/playbooks/legacy/openstack-ansible-os_cinder-announce-release/run.yaml +++ b/playbooks/legacy/openstack-ansible-os_cinder-announce-release/run.yaml @@ -82,7 +82,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/openstack-ansible-os_cloudkitty-announce-release/run.yaml b/playbooks/legacy/openstack-ansible-os_cloudkitty-announce-release/run.yaml index 81e0bbdd..25756403 100644 --- a/playbooks/legacy/openstack-ansible-os_cloudkitty-announce-release/run.yaml +++ b/playbooks/legacy/openstack-ansible-os_cloudkitty-announce-release/run.yaml @@ -82,7 +82,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/openstack-ansible-os_designate-announce-release/run.yaml b/playbooks/legacy/openstack-ansible-os_designate-announce-release/run.yaml index c4d70d61..4c818c65 100644 --- a/playbooks/legacy/openstack-ansible-os_designate-announce-release/run.yaml +++ b/playbooks/legacy/openstack-ansible-os_designate-announce-release/run.yaml @@ -82,7 +82,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/openstack-ansible-os_freezer-announce-release/run.yaml b/playbooks/legacy/openstack-ansible-os_freezer-announce-release/run.yaml index bee48b44..2d616e6a 100644 --- a/playbooks/legacy/openstack-ansible-os_freezer-announce-release/run.yaml +++ b/playbooks/legacy/openstack-ansible-os_freezer-announce-release/run.yaml @@ -82,7 +82,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/openstack-ansible-os_glance-announce-release/run.yaml b/playbooks/legacy/openstack-ansible-os_glance-announce-release/run.yaml index f54fde1e..7cba61be 100644 --- a/playbooks/legacy/openstack-ansible-os_glance-announce-release/run.yaml +++ b/playbooks/legacy/openstack-ansible-os_glance-announce-release/run.yaml @@ -82,7 +82,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/openstack-ansible-os_gnocchi-announce-release/run.yaml b/playbooks/legacy/openstack-ansible-os_gnocchi-announce-release/run.yaml index fcad738f..43242fa3 100644 --- a/playbooks/legacy/openstack-ansible-os_gnocchi-announce-release/run.yaml +++ b/playbooks/legacy/openstack-ansible-os_gnocchi-announce-release/run.yaml @@ -82,7 +82,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/openstack-ansible-os_heat-announce-release/run.yaml b/playbooks/legacy/openstack-ansible-os_heat-announce-release/run.yaml index 618e2496..1efc8b14 100644 --- a/playbooks/legacy/openstack-ansible-os_heat-announce-release/run.yaml +++ b/playbooks/legacy/openstack-ansible-os_heat-announce-release/run.yaml @@ -82,7 +82,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/openstack-ansible-os_horizon-announce-release/run.yaml b/playbooks/legacy/openstack-ansible-os_horizon-announce-release/run.yaml index 62369602..5db1c0f5 100644 --- a/playbooks/legacy/openstack-ansible-os_horizon-announce-release/run.yaml +++ b/playbooks/legacy/openstack-ansible-os_horizon-announce-release/run.yaml @@ -82,7 +82,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/openstack-ansible-os_ironic-announce-release/run.yaml b/playbooks/legacy/openstack-ansible-os_ironic-announce-release/run.yaml index 888f171e..6e701ab4 100644 --- a/playbooks/legacy/openstack-ansible-os_ironic-announce-release/run.yaml +++ b/playbooks/legacy/openstack-ansible-os_ironic-announce-release/run.yaml @@ -82,7 +82,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/openstack-ansible-os_keystone-announce-release/run.yaml b/playbooks/legacy/openstack-ansible-os_keystone-announce-release/run.yaml index adf80713..21833316 100644 --- a/playbooks/legacy/openstack-ansible-os_keystone-announce-release/run.yaml +++ b/playbooks/legacy/openstack-ansible-os_keystone-announce-release/run.yaml @@ -82,7 +82,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/openstack-ansible-os_magnum-announce-release/run.yaml b/playbooks/legacy/openstack-ansible-os_magnum-announce-release/run.yaml index 0b1563ad..c62b8161 100644 --- a/playbooks/legacy/openstack-ansible-os_magnum-announce-release/run.yaml +++ b/playbooks/legacy/openstack-ansible-os_magnum-announce-release/run.yaml @@ -82,7 +82,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/openstack-ansible-os_monasca-announce-release/run.yaml b/playbooks/legacy/openstack-ansible-os_monasca-announce-release/run.yaml index ea226ec6..25f2f0ef 100644 --- a/playbooks/legacy/openstack-ansible-os_monasca-announce-release/run.yaml +++ b/playbooks/legacy/openstack-ansible-os_monasca-announce-release/run.yaml @@ -82,7 +82,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/openstack-ansible-os_neutron-announce-release/run.yaml b/playbooks/legacy/openstack-ansible-os_neutron-announce-release/run.yaml index 5d0959b2..431d720d 100644 --- a/playbooks/legacy/openstack-ansible-os_neutron-announce-release/run.yaml +++ b/playbooks/legacy/openstack-ansible-os_neutron-announce-release/run.yaml @@ -82,7 +82,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/openstack-ansible-os_nova-announce-release/run.yaml b/playbooks/legacy/openstack-ansible-os_nova-announce-release/run.yaml index 237ce5be..d2f3bf15 100644 --- a/playbooks/legacy/openstack-ansible-os_nova-announce-release/run.yaml +++ b/playbooks/legacy/openstack-ansible-os_nova-announce-release/run.yaml @@ -82,7 +82,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/openstack-ansible-os_rally-announce-release/run.yaml b/playbooks/legacy/openstack-ansible-os_rally-announce-release/run.yaml index ad474310..df3dc323 100644 --- a/playbooks/legacy/openstack-ansible-os_rally-announce-release/run.yaml +++ b/playbooks/legacy/openstack-ansible-os_rally-announce-release/run.yaml @@ -82,7 +82,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/openstack-ansible-os_sahara-announce-release/run.yaml b/playbooks/legacy/openstack-ansible-os_sahara-announce-release/run.yaml index 8dcf0867..5708089e 100644 --- a/playbooks/legacy/openstack-ansible-os_sahara-announce-release/run.yaml +++ b/playbooks/legacy/openstack-ansible-os_sahara-announce-release/run.yaml @@ -82,7 +82,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/openstack-ansible-os_swift-announce-release/run.yaml b/playbooks/legacy/openstack-ansible-os_swift-announce-release/run.yaml index 39b87b0d..873222de 100644 --- a/playbooks/legacy/openstack-ansible-os_swift-announce-release/run.yaml +++ b/playbooks/legacy/openstack-ansible-os_swift-announce-release/run.yaml @@ -82,7 +82,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/openstack-ansible-os_trove-announce-release/run.yaml b/playbooks/legacy/openstack-ansible-os_trove-announce-release/run.yaml index ed885f9f..6ee17b7b 100644 --- a/playbooks/legacy/openstack-ansible-os_trove-announce-release/run.yaml +++ b/playbooks/legacy/openstack-ansible-os_trove-announce-release/run.yaml @@ -82,7 +82,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/openstack-ansible-os_watcher-announce-release/run.yaml b/playbooks/legacy/openstack-ansible-os_watcher-announce-release/run.yaml index 3a7eb1cf..1c03518f 100644 --- a/playbooks/legacy/openstack-ansible-os_watcher-announce-release/run.yaml +++ b/playbooks/legacy/openstack-ansible-os_watcher-announce-release/run.yaml @@ -82,7 +82,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/openstack-ansible-os_zaqar-announce-release/run.yaml b/playbooks/legacy/openstack-ansible-os_zaqar-announce-release/run.yaml index 6bce4fbd..d0fc92b1 100644 --- a/playbooks/legacy/openstack-ansible-os_zaqar-announce-release/run.yaml +++ b/playbooks/legacy/openstack-ansible-os_zaqar-announce-release/run.yaml @@ -82,7 +82,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/openstack-ansible-plugins-announce-release/run.yaml b/playbooks/legacy/openstack-ansible-plugins-announce-release/run.yaml index 150bd651..6dab32d4 100644 --- a/playbooks/legacy/openstack-ansible-plugins-announce-release/run.yaml +++ b/playbooks/legacy/openstack-ansible-plugins-announce-release/run.yaml @@ -82,7 +82,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/openstack-ansible-rabbitmq_server-announce-release/run.yaml b/playbooks/legacy/openstack-ansible-rabbitmq_server-announce-release/run.yaml index c5fd2b65..f8d8eeee 100644 --- a/playbooks/legacy/openstack-ansible-rabbitmq_server-announce-release/run.yaml +++ b/playbooks/legacy/openstack-ansible-rabbitmq_server-announce-release/run.yaml @@ -82,7 +82,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/openstack-ansible-rsyslog_server-announce-release/run.yaml b/playbooks/legacy/openstack-ansible-rsyslog_server-announce-release/run.yaml index 5220413e..9335bc12 100644 --- a/playbooks/legacy/openstack-ansible-rsyslog_server-announce-release/run.yaml +++ b/playbooks/legacy/openstack-ansible-rsyslog_server-announce-release/run.yaml @@ -82,7 +82,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/openstack-api-ref-publish-lang/run.yaml b/playbooks/legacy/openstack-api-ref-publish-lang/run.yaml index dfd125f2..18a0dc10 100644 --- a/playbooks/legacy/openstack-api-ref-publish-lang/run.yaml +++ b/playbooks/legacy/openstack-api-ref-publish-lang/run.yaml @@ -44,7 +44,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/openstack-api-ref/run.yaml b/playbooks/legacy/openstack-api-ref/run.yaml index 10b9ac58..84e8a13b 100644 --- a/playbooks/legacy/openstack-api-ref/run.yaml +++ b/playbooks/legacy/openstack-api-ref/run.yaml @@ -44,7 +44,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/openstack-manuals-tox-doc-publishdocs/run.yaml b/playbooks/legacy/openstack-manuals-tox-doc-publishdocs/run.yaml index f7c5e957..d11dbac3 100644 --- a/playbooks/legacy/openstack-manuals-tox-doc-publishdocs/run.yaml +++ b/playbooks/legacy/openstack-manuals-tox-doc-publishdocs/run.yaml @@ -51,7 +51,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/openstack-planet-unittest/run.yaml b/playbooks/legacy/openstack-planet-unittest/run.yaml index 6ddbf49b..758e5151 100644 --- a/playbooks/legacy/openstack-planet-unittest/run.yaml +++ b/playbooks/legacy/openstack-planet-unittest/run.yaml @@ -44,7 +44,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/openstackci-beaker-centos-7/run.yaml b/playbooks/legacy/openstackci-beaker-centos-7/run.yaml index fa86ce44..127b8eed 100644 --- a/playbooks/legacy/openstackci-beaker-centos-7/run.yaml +++ b/playbooks/legacy/openstackci-beaker-centos-7/run.yaml @@ -79,7 +79,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/openstackci-beaker-ubuntu-trusty/run.yaml b/playbooks/legacy/openstackci-beaker-ubuntu-trusty/run.yaml index 65fcfc54..5a4bf0b3 100644 --- a/playbooks/legacy/openstackci-beaker-ubuntu-trusty/run.yaml +++ b/playbooks/legacy/openstackci-beaker-ubuntu-trusty/run.yaml @@ -79,7 +79,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/openstackci-beaker/run.yaml b/playbooks/legacy/openstackci-beaker/run.yaml index 4fc0ff09..81bb91f4 100644 --- a/playbooks/legacy/openstackci-beaker/run.yaml +++ b/playbooks/legacy/openstackci-beaker/run.yaml @@ -79,7 +79,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/openstackdocstheme-api-ref/run.yaml b/playbooks/legacy/openstackdocstheme-api-ref/run.yaml index ab33948d..6e160f65 100644 --- a/playbooks/legacy/openstackdocstheme-api-ref/run.yaml +++ b/playbooks/legacy/openstackdocstheme-api-ref/run.yaml @@ -50,7 +50,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/openstackdocstheme-tox-doc-publish-buildpdf/run.yaml b/playbooks/legacy/openstackdocstheme-tox-doc-publish-buildpdf/run.yaml index ef9762ed..730b3cbf 100644 --- a/playbooks/legacy/openstackdocstheme-tox-doc-publish-buildpdf/run.yaml +++ b/playbooks/legacy/openstackdocstheme-tox-doc-publish-buildpdf/run.yaml @@ -51,7 +51,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/os-brick-pylint/run.yaml b/playbooks/legacy/os-brick-pylint/run.yaml index 9ad17341..af9bcf7a 100644 --- a/playbooks/legacy/os-brick-pylint/run.yaml +++ b/playbooks/legacy/os-brick-pylint/run.yaml @@ -50,7 +50,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/oslo-cookiecutter-tox-cookiecutter/run.yaml b/playbooks/legacy/oslo-cookiecutter-tox-cookiecutter/run.yaml index c4c90d83..4dc34446 100644 --- a/playbooks/legacy/oslo-cookiecutter-tox-cookiecutter/run.yaml +++ b/playbooks/legacy/oslo-cookiecutter-tox-cookiecutter/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/oslo.db-tox-mysql-python/run.yaml b/playbooks/legacy/oslo.db-tox-mysql-python/run.yaml index 42de5d61..5bdd811f 100644 --- a/playbooks/legacy/oslo.db-tox-mysql-python/run.yaml +++ b/playbooks/legacy/oslo.db-tox-mysql-python/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/oslo.messaging-tox-py27-func-amqp1/run.yaml b/playbooks/legacy/oslo.messaging-tox-py27-func-amqp1/run.yaml index 7b51fc5e..b5d797a4 100644 --- a/playbooks/legacy/oslo.messaging-tox-py27-func-amqp1/run.yaml +++ b/playbooks/legacy/oslo.messaging-tox-py27-func-amqp1/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/oslo.messaging-tox-py27-func-kafka/run.yaml b/playbooks/legacy/oslo.messaging-tox-py27-func-kafka/run.yaml index 6cc374af..dda437ae 100644 --- a/playbooks/legacy/oslo.messaging-tox-py27-func-kafka/run.yaml +++ b/playbooks/legacy/oslo.messaging-tox-py27-func-kafka/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/oslo.messaging-tox-py27-func-pika/run.yaml b/playbooks/legacy/oslo.messaging-tox-py27-func-pika/run.yaml index 4cde3b0d..8d8fc36d 100644 --- a/playbooks/legacy/oslo.messaging-tox-py27-func-pika/run.yaml +++ b/playbooks/legacy/oslo.messaging-tox-py27-func-pika/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/oslo.messaging-tox-py27-func-rabbit/run.yaml b/playbooks/legacy/oslo.messaging-tox-py27-func-rabbit/run.yaml index a28d1a8c..dbc4128b 100644 --- a/playbooks/legacy/oslo.messaging-tox-py27-func-rabbit/run.yaml +++ b/playbooks/legacy/oslo.messaging-tox-py27-func-rabbit/run.yaml @@ -59,7 +59,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/oslo.messaging-tox-py27-func-zmq-proxy/run.yaml b/playbooks/legacy/oslo.messaging-tox-py27-func-zmq-proxy/run.yaml index 15785b67..b9d6ce35 100644 --- a/playbooks/legacy/oslo.messaging-tox-py27-func-zmq-proxy/run.yaml +++ b/playbooks/legacy/oslo.messaging-tox-py27-func-zmq-proxy/run.yaml @@ -59,7 +59,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/oslo.messaging-tox-py27-func-zmq-pubsub/run.yaml b/playbooks/legacy/oslo.messaging-tox-py27-func-zmq-pubsub/run.yaml index 42d91083..e1e8ce4c 100644 --- a/playbooks/legacy/oslo.messaging-tox-py27-func-zmq-pubsub/run.yaml +++ b/playbooks/legacy/oslo.messaging-tox-py27-func-zmq-pubsub/run.yaml @@ -59,7 +59,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/oslo.messaging-tox-py27-func-zmq/run.yaml b/playbooks/legacy/oslo.messaging-tox-py27-func-zmq/run.yaml index 658c141b..5da3bbf9 100644 --- a/playbooks/legacy/oslo.messaging-tox-py27-func-zmq/run.yaml +++ b/playbooks/legacy/oslo.messaging-tox-py27-func-zmq/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/oslo.messaging-tox-py35-func-amqp1/run.yaml b/playbooks/legacy/oslo.messaging-tox-py35-func-amqp1/run.yaml index eaee96d7..d7d4bff6 100644 --- a/playbooks/legacy/oslo.messaging-tox-py35-func-amqp1/run.yaml +++ b/playbooks/legacy/oslo.messaging-tox-py35-func-amqp1/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/oslo.messaging-tox-py35-func-rabbit/run.yaml b/playbooks/legacy/oslo.messaging-tox-py35-func-rabbit/run.yaml index cbb08d32..082a1633 100644 --- a/playbooks/legacy/oslo.messaging-tox-py35-func-rabbit/run.yaml +++ b/playbooks/legacy/oslo.messaging-tox-py35-func-rabbit/run.yaml @@ -59,7 +59,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/oslo.messaging-tox-py35-func-zmq/run.yaml b/playbooks/legacy/oslo.messaging-tox-py35-func-zmq/run.yaml index b445bc6b..a0f8065f 100644 --- a/playbooks/legacy/oslo.messaging-tox-py35-func-zmq/run.yaml +++ b/playbooks/legacy/oslo.messaging-tox-py35-func-zmq/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/ovsdbapp-tox-functional/run.yaml b/playbooks/legacy/ovsdbapp-tox-functional/run.yaml index 829be80e..88ef3695 100644 --- a/playbooks/legacy/ovsdbapp-tox-functional/run.yaml +++ b/playbooks/legacy/ovsdbapp-tox-functional/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/packstack-releasenotes/run.yaml b/playbooks/legacy/packstack-releasenotes/run.yaml index 33991a58..b2176927 100644 --- a/playbooks/legacy/packstack-releasenotes/run.yaml +++ b/playbooks/legacy/packstack-releasenotes/run.yaml @@ -50,7 +50,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/panko-tox-py27-mongodb/run.yaml b/playbooks/legacy/panko-tox-py27-mongodb/run.yaml index 64b9d077..9f39458f 100644 --- a/playbooks/legacy/panko-tox-py27-mongodb/run.yaml +++ b/playbooks/legacy/panko-tox-py27-mongodb/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/panko-tox-py27-mysql/run.yaml b/playbooks/legacy/panko-tox-py27-mysql/run.yaml index 5cf4e07e..63550176 100644 --- a/playbooks/legacy/panko-tox-py27-mysql/run.yaml +++ b/playbooks/legacy/panko-tox-py27-mysql/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/panko-tox-py27-postgresql/run.yaml b/playbooks/legacy/panko-tox-py27-postgresql/run.yaml index 8c00ec91..97c818d7 100644 --- a/playbooks/legacy/panko-tox-py27-postgresql/run.yaml +++ b/playbooks/legacy/panko-tox-py27-postgresql/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/panko-tox-py35-mongodb/run.yaml b/playbooks/legacy/panko-tox-py35-mongodb/run.yaml index 47588bc1..41ee1bf4 100644 --- a/playbooks/legacy/panko-tox-py35-mongodb/run.yaml +++ b/playbooks/legacy/panko-tox-py35-mongodb/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/panko-tox-py35-mysql/run.yaml b/playbooks/legacy/panko-tox-py35-mysql/run.yaml index 6958cfa1..da88f6bd 100644 --- a/playbooks/legacy/panko-tox-py35-mysql/run.yaml +++ b/playbooks/legacy/panko-tox-py35-mysql/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/panko-tox-py35-postgresql/run.yaml b/playbooks/legacy/panko-tox-py35-postgresql/run.yaml index d49cd5f9..4081dd83 100644 --- a/playbooks/legacy/panko-tox-py35-postgresql/run.yaml +++ b/playbooks/legacy/panko-tox-py35-postgresql/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/periodic-docs-newton/run.yaml b/playbooks/legacy/periodic-docs-newton/run.yaml index f7cbac4b..15e8b89b 100644 --- a/playbooks/legacy/periodic-docs-newton/run.yaml +++ b/playbooks/legacy/periodic-docs-newton/run.yaml @@ -52,7 +52,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/periodic-docs-ocata/run.yaml b/playbooks/legacy/periodic-docs-ocata/run.yaml index cf130f3d..adab4582 100644 --- a/playbooks/legacy/periodic-docs-ocata/run.yaml +++ b/playbooks/legacy/periodic-docs-ocata/run.yaml @@ -52,7 +52,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/periodic-docs-pike/run.yaml b/playbooks/legacy/periodic-docs-pike/run.yaml index f2021066..294b2056 100644 --- a/playbooks/legacy/periodic-docs-pike/run.yaml +++ b/playbooks/legacy/periodic-docs-pike/run.yaml @@ -52,7 +52,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/periodic-gitdm/run.yaml b/playbooks/legacy/periodic-gitdm/run.yaml index b1e97654..3acc61e8 100644 --- a/playbooks/legacy/periodic-gitdm/run.yaml +++ b/playbooks/legacy/periodic-gitdm/run.yaml @@ -44,7 +44,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/periodic-package-stackviz-element/run.yaml b/playbooks/legacy/periodic-package-stackviz-element/run.yaml index 59c554f4..b9922990 100644 --- a/playbooks/legacy/periodic-package-stackviz-element/run.yaml +++ b/playbooks/legacy/periodic-package-stackviz-element/run.yaml @@ -38,7 +38,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/periodic-py27-with-oslo-master/run.yaml b/playbooks/legacy/periodic-py27-with-oslo-master/run.yaml index 09ac0c89..e610de3e 100644 --- a/playbooks/legacy/periodic-py27-with-oslo-master/run.yaml +++ b/playbooks/legacy/periodic-py27-with-oslo-master/run.yaml @@ -60,7 +60,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/periodic-py35-with-neutron-lib-master/run.yaml b/playbooks/legacy/periodic-py35-with-neutron-lib-master/run.yaml index cecdde1b..455b8399 100644 --- a/playbooks/legacy/periodic-py35-with-neutron-lib-master/run.yaml +++ b/playbooks/legacy/periodic-py35-with-neutron-lib-master/run.yaml @@ -61,7 +61,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/periodic-py35-with-oslo-master/run.yaml b/playbooks/legacy/periodic-py35-with-oslo-master/run.yaml index 20b579b9..56a957a0 100644 --- a/playbooks/legacy/periodic-py35-with-oslo-master/run.yaml +++ b/playbooks/legacy/periodic-py35-with-oslo-master/run.yaml @@ -60,7 +60,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/periodic-py35-with-ovsdbapp-master/run.yaml b/playbooks/legacy/periodic-py35-with-ovsdbapp-master/run.yaml index 331caa0a..ce0da6b8 100644 --- a/playbooks/legacy/periodic-py35-with-ovsdbapp-master/run.yaml +++ b/playbooks/legacy/periodic-py35-with-ovsdbapp-master/run.yaml @@ -52,7 +52,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/periodic-python27-newton/run.yaml b/playbooks/legacy/periodic-python27-newton/run.yaml index 1fc69875..4d6c8219 100644 --- a/playbooks/legacy/periodic-python27-newton/run.yaml +++ b/playbooks/legacy/periodic-python27-newton/run.yaml @@ -52,7 +52,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/periodic-python27-ocata/run.yaml b/playbooks/legacy/periodic-python27-ocata/run.yaml index ed457b51..1c66e8f2 100644 --- a/playbooks/legacy/periodic-python27-ocata/run.yaml +++ b/playbooks/legacy/periodic-python27-ocata/run.yaml @@ -52,7 +52,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/periodic-python27-pike/run.yaml b/playbooks/legacy/periodic-python27-pike/run.yaml index 267f557e..59502c98 100644 --- a/playbooks/legacy/periodic-python27-pike/run.yaml +++ b/playbooks/legacy/periodic-python27-pike/run.yaml @@ -52,7 +52,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/placement-api-ref/run.yaml b/playbooks/legacy/placement-api-ref/run.yaml index 36e06914..09fa0f53 100644 --- a/playbooks/legacy/placement-api-ref/run.yaml +++ b/playbooks/legacy/placement-api-ref/run.yaml @@ -50,7 +50,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/project-config-jenkins-project/run.yaml b/playbooks/legacy/project-config-jenkins-project/run.yaml index 416f66b2..41281a62 100644 --- a/playbooks/legacy/project-config-jenkins-project/run.yaml +++ b/playbooks/legacy/project-config-jenkins-project/run.yaml @@ -44,7 +44,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/project-config-layout/run.yaml b/playbooks/legacy/project-config-layout/run.yaml index e720c048..b2d7b918 100644 --- a/playbooks/legacy/project-config-layout/run.yaml +++ b/playbooks/legacy/project-config-layout/run.yaml @@ -44,7 +44,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/project-navigator-data-tox-validate/run.yaml b/playbooks/legacy/project-navigator-data-tox-validate/run.yaml index 0207f68a..265c1afa 100644 --- a/playbooks/legacy/project-navigator-data-tox-validate/run.yaml +++ b/playbooks/legacy/project-navigator-data-tox-validate/run.yaml @@ -59,7 +59,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/project-team-guide-publish/run.yaml b/playbooks/legacy/project-team-guide-publish/run.yaml index 710daffb..7b605c4e 100644 --- a/playbooks/legacy/project-team-guide-publish/run.yaml +++ b/playbooks/legacy/project-team-guide-publish/run.yaml @@ -44,7 +44,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/propose-requirements-constraints-master/run.yaml b/playbooks/legacy/propose-requirements-constraints-master/run.yaml index c4030996..e5a8d993 100644 --- a/playbooks/legacy/propose-requirements-constraints-master/run.yaml +++ b/playbooks/legacy/propose-requirements-constraints-master/run.yaml @@ -21,7 +21,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/propose-translation-update-ocata/run.yaml b/playbooks/legacy/propose-translation-update-ocata/run.yaml index 57881f60..84e6c750 100644 --- a/playbooks/legacy/propose-translation-update-ocata/run.yaml +++ b/playbooks/legacy/propose-translation-update-ocata/run.yaml @@ -20,7 +20,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/propose-translation-update-pike/run.yaml b/playbooks/legacy/propose-translation-update-pike/run.yaml index 1516ee35..8ec307dc 100644 --- a/playbooks/legacy/propose-translation-update-pike/run.yaml +++ b/playbooks/legacy/propose-translation-update-pike/run.yaml @@ -20,7 +20,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/propose-translation-update/run.yaml b/playbooks/legacy/propose-translation-update/run.yaml index 99cc62bb..02f80d6f 100644 --- a/playbooks/legacy/propose-translation-update/run.yaml +++ b/playbooks/legacy/propose-translation-update/run.yaml @@ -20,7 +20,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/propose-update-constraints/run.yaml b/playbooks/legacy/propose-update-constraints/run.yaml index cc4b14c9..3b110ce5 100644 --- a/playbooks/legacy/propose-update-constraints/run.yaml +++ b/playbooks/legacy/propose-update-constraints/run.yaml @@ -39,7 +39,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/puppet-httpd-forge-upload/run.yaml b/playbooks/legacy/puppet-httpd-forge-upload/run.yaml index 03daa862..90151e7d 100644 --- a/playbooks/legacy/puppet-httpd-forge-upload/run.yaml +++ b/playbooks/legacy/puppet-httpd-forge-upload/run.yaml @@ -10,7 +10,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/puppet-lint/run.yaml b/playbooks/legacy/puppet-lint/run.yaml index 2f7a04b6..54863ead 100644 --- a/playbooks/legacy/puppet-lint/run.yaml +++ b/playbooks/legacy/puppet-lint/run.yaml @@ -63,7 +63,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/puppet-midonet-puppet-unit-3.6-centos-7/run.yaml b/playbooks/legacy/puppet-midonet-puppet-unit-3.6-centos-7/run.yaml index 4fcdd9bc..d2defb2d 100644 --- a/playbooks/legacy/puppet-midonet-puppet-unit-3.6-centos-7/run.yaml +++ b/playbooks/legacy/puppet-midonet-puppet-unit-3.6-centos-7/run.yaml @@ -64,7 +64,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/puppet-midonet-puppet-unit-3.8-centos-7/run.yaml b/playbooks/legacy/puppet-midonet-puppet-unit-3.8-centos-7/run.yaml index 09826b01..64099de1 100644 --- a/playbooks/legacy/puppet-midonet-puppet-unit-3.8-centos-7/run.yaml +++ b/playbooks/legacy/puppet-midonet-puppet-unit-3.8-centos-7/run.yaml @@ -64,7 +64,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/puppet-midonet-puppet-unit-4.5-centos-7/run.yaml b/playbooks/legacy/puppet-midonet-puppet-unit-4.5-centos-7/run.yaml index dc368ec2..674dc7b2 100644 --- a/playbooks/legacy/puppet-midonet-puppet-unit-4.5-centos-7/run.yaml +++ b/playbooks/legacy/puppet-midonet-puppet-unit-4.5-centos-7/run.yaml @@ -64,7 +64,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/puppet-midonet-puppet-unit-latest-centos-7/run.yaml b/playbooks/legacy/puppet-midonet-puppet-unit-latest-centos-7/run.yaml index 8aa1703f..1425a128 100644 --- a/playbooks/legacy/puppet-midonet-puppet-unit-latest-centos-7/run.yaml +++ b/playbooks/legacy/puppet-midonet-puppet-unit-latest-centos-7/run.yaml @@ -64,7 +64,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/puppet-storyboard-forge-upload/run.yaml b/playbooks/legacy/puppet-storyboard-forge-upload/run.yaml index 74b0fa90..04fa3804 100644 --- a/playbooks/legacy/puppet-storyboard-forge-upload/run.yaml +++ b/playbooks/legacy/puppet-storyboard-forge-upload/run.yaml @@ -10,7 +10,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/puppet-syntax-3-centos-7/run.yaml b/playbooks/legacy/puppet-syntax-3-centos-7/run.yaml index 6f58498e..5462c350 100644 --- a/playbooks/legacy/puppet-syntax-3-centos-7/run.yaml +++ b/playbooks/legacy/puppet-syntax-3-centos-7/run.yaml @@ -63,7 +63,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/puppet-syntax-3/run.yaml b/playbooks/legacy/puppet-syntax-3/run.yaml index 1fe7d780..f7c7458d 100644 --- a/playbooks/legacy/puppet-syntax-3/run.yaml +++ b/playbooks/legacy/puppet-syntax-3/run.yaml @@ -63,7 +63,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/puppet-syntax-4-centos-7/run.yaml b/playbooks/legacy/puppet-syntax-4-centos-7/run.yaml index 35b0c1aa..536c4459 100644 --- a/playbooks/legacy/puppet-syntax-4-centos-7/run.yaml +++ b/playbooks/legacy/puppet-syntax-4-centos-7/run.yaml @@ -63,7 +63,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/puppet-tripleo-puppet-unit-4.8-centos-7/run.yaml b/playbooks/legacy/puppet-tripleo-puppet-unit-4.8-centos-7/run.yaml index 160035ab..dc17f089 100644 --- a/playbooks/legacy/puppet-tripleo-puppet-unit-4.8-centos-7/run.yaml +++ b/playbooks/legacy/puppet-tripleo-puppet-unit-4.8-centos-7/run.yaml @@ -64,7 +64,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/puppet-tripleo-puppet-unit-latest-centos-7/run.yaml b/playbooks/legacy/puppet-tripleo-puppet-unit-latest-centos-7/run.yaml index e47f3adf..4a4448ca 100644 --- a/playbooks/legacy/puppet-tripleo-puppet-unit-latest-centos-7/run.yaml +++ b/playbooks/legacy/puppet-tripleo-puppet-unit-latest-centos-7/run.yaml @@ -64,7 +64,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/puppet-unit-3.6-centos-7/run.yaml b/playbooks/legacy/puppet-unit-3.6-centos-7/run.yaml index f3f44965..f2c8424f 100644 --- a/playbooks/legacy/puppet-unit-3.6-centos-7/run.yaml +++ b/playbooks/legacy/puppet-unit-3.6-centos-7/run.yaml @@ -63,7 +63,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/puppet-unit-3.8-centos-7/run.yaml b/playbooks/legacy/puppet-unit-3.8-centos-7/run.yaml index 7e5c15d0..4aa30680 100644 --- a/playbooks/legacy/puppet-unit-3.8-centos-7/run.yaml +++ b/playbooks/legacy/puppet-unit-3.8-centos-7/run.yaml @@ -63,7 +63,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/puppet-unit-4.8-centos-7/run.yaml b/playbooks/legacy/puppet-unit-4.8-centos-7/run.yaml index 7e4b045b..50ad23a4 100644 --- a/playbooks/legacy/puppet-unit-4.8-centos-7/run.yaml +++ b/playbooks/legacy/puppet-unit-4.8-centos-7/run.yaml @@ -63,7 +63,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/puppet-unit-latest-centos-7/run.yaml b/playbooks/legacy/puppet-unit-latest-centos-7/run.yaml index b75b3bb7..35dcedc5 100644 --- a/playbooks/legacy/puppet-unit-latest-centos-7/run.yaml +++ b/playbooks/legacy/puppet-unit-latest-centos-7/run.yaml @@ -63,7 +63,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/pyeclib-python35/run.yaml b/playbooks/legacy/pyeclib-python35/run.yaml index 024e5760..ba4f01a9 100644 --- a/playbooks/legacy/pyeclib-python35/run.yaml +++ b/playbooks/legacy/pyeclib-python35/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/pyeclib-tox-py27-centos-7/run.yaml b/playbooks/legacy/pyeclib-tox-py27-centos-7/run.yaml index 1a2b381f..90478c98 100644 --- a/playbooks/legacy/pyeclib-tox-py27-centos-7/run.yaml +++ b/playbooks/legacy/pyeclib-tox-py27-centos-7/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/pypi-both-upload/run.yaml b/playbooks/legacy/pypi-both-upload/run.yaml index 4496f73c..605d406d 100644 --- a/playbooks/legacy/pypi-both-upload/run.yaml +++ b/playbooks/legacy/pypi-both-upload/run.yaml @@ -10,7 +10,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/python-cinderclient-pylint/run.yaml b/playbooks/legacy/python-cinderclient-pylint/run.yaml index 36655c29..18b7f0cd 100644 --- a/playbooks/legacy/python-cinderclient-pylint/run.yaml +++ b/playbooks/legacy/python-cinderclient-pylint/run.yaml @@ -50,7 +50,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/python-freezerclient-pylint/run.yaml b/playbooks/legacy/python-freezerclient-pylint/run.yaml index 52b7b66c..42961c77 100644 --- a/playbooks/legacy/python-freezerclient-pylint/run.yaml +++ b/playbooks/legacy/python-freezerclient-pylint/run.yaml @@ -50,7 +50,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/python-ironic-inspector-client-tox-func/run.yaml b/playbooks/legacy/python-ironic-inspector-client-tox-func/run.yaml index df495946..542916a8 100644 --- a/playbooks/legacy/python-ironic-inspector-client-tox-func/run.yaml +++ b/playbooks/legacy/python-ironic-inspector-client-tox-func/run.yaml @@ -59,7 +59,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/python-openstacksdk-docs/run.yaml b/playbooks/legacy/python-openstacksdk-docs/run.yaml index 58850eec..fa7e4207 100644 --- a/playbooks/legacy/python-openstacksdk-docs/run.yaml +++ b/playbooks/legacy/python-openstacksdk-docs/run.yaml @@ -44,7 +44,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/python-swiftclient-python36-fedora-26/run.yaml b/playbooks/legacy/python-swiftclient-python36-fedora-26/run.yaml index 58504b7d..21057be4 100644 --- a/playbooks/legacy/python-swiftclient-python36-fedora-26/run.yaml +++ b/playbooks/legacy/python-swiftclient-python36-fedora-26/run.yaml @@ -59,7 +59,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/python34/run.yaml b/playbooks/legacy/python34/run.yaml index 1850db4a..30bc1331 100644 --- a/playbooks/legacy/python34/run.yaml +++ b/playbooks/legacy/python34/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/python35/run.yaml b/playbooks/legacy/python35/run.yaml index 9f9bdd00..1033b4a7 100644 --- a/playbooks/legacy/python35/run.yaml +++ b/playbooks/legacy/python35/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/rally-tox-self/run.yaml b/playbooks/legacy/rally-tox-self/run.yaml index 8ca60c3b..7031859a 100644 --- a/playbooks/legacy/rally-tox-self/run.yaml +++ b/playbooks/legacy/rally-tox-self/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/refstack-tox-py27-func-mysql/run.yaml b/playbooks/legacy/refstack-tox-py27-func-mysql/run.yaml index fd8474dd..561f8b8a 100644 --- a/playbooks/legacy/refstack-tox-py27-func-mysql/run.yaml +++ b/playbooks/legacy/refstack-tox-py27-func-mysql/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/refstack-tox-py35-func-mysql/run.yaml b/playbooks/legacy/refstack-tox-py35-func-mysql/run.yaml index d216f031..128a7c0d 100644 --- a/playbooks/legacy/refstack-tox-py35-func-mysql/run.yaml +++ b/playbooks/legacy/refstack-tox-py35-func-mysql/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/releasenotes/run.yaml b/playbooks/legacy/releasenotes/run.yaml index bb1614a7..d6d4d374 100644 --- a/playbooks/legacy/releasenotes/run.yaml +++ b/playbooks/legacy/releasenotes/run.yaml @@ -50,7 +50,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/releases-python35/run.yaml b/playbooks/legacy/releases-python35/run.yaml index 0ce557df..ea295eba 100644 --- a/playbooks/legacy/releases-python35/run.yaml +++ b/playbooks/legacy/releases-python35/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/releases-tox-list-changes/run.yaml b/playbooks/legacy/releases-tox-list-changes/run.yaml index ff92e5c4..f5e4a7ed 100644 --- a/playbooks/legacy/releases-tox-list-changes/run.yaml +++ b/playbooks/legacy/releases-tox-list-changes/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/releases-tox-validate/run.yaml b/playbooks/legacy/releases-tox-validate/run.yaml index 48bb4f24..dafbd3e1 100644 --- a/playbooks/legacy/releases-tox-validate/run.yaml +++ b/playbooks/legacy/releases-tox-validate/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/requests-mock-tox-keystoneclient-tip/run.yaml b/playbooks/legacy/requests-mock-tox-keystoneclient-tip/run.yaml index c56c4ff7..1d6339b9 100644 --- a/playbooks/legacy/requests-mock-tox-keystoneclient-tip/run.yaml +++ b/playbooks/legacy/requests-mock-tox-keystoneclient-tip/run.yaml @@ -59,7 +59,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/requests-mock-tox-novaclient-tip/run.yaml b/playbooks/legacy/requests-mock-tox-novaclient-tip/run.yaml index c267b7a5..67b8ad10 100644 --- a/playbooks/legacy/requests-mock-tox-novaclient-tip/run.yaml +++ b/playbooks/legacy/requests-mock-tox-novaclient-tip/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/requirements-python34/run.yaml b/playbooks/legacy/requirements-python34/run.yaml index 9ddc1f73..3e3b0b6c 100644 --- a/playbooks/legacy/requirements-python34/run.yaml +++ b/playbooks/legacy/requirements-python34/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/requirements-tox-babel/run.yaml b/playbooks/legacy/requirements-tox-babel/run.yaml index 10e7908d..71371bf8 100644 --- a/playbooks/legacy/requirements-tox-babel/run.yaml +++ b/playbooks/legacy/requirements-tox-babel/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/requirements-tox-py27-check-uc/run.yaml b/playbooks/legacy/requirements-tox-py27-check-uc/run.yaml index 1a88688a..9f85da1f 100644 --- a/playbooks/legacy/requirements-tox-py27-check-uc/run.yaml +++ b/playbooks/legacy/requirements-tox-py27-check-uc/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/requirements-tox-py35-check-uc/run.yaml b/playbooks/legacy/requirements-tox-py35-check-uc/run.yaml index c72f6a84..193498c0 100644 --- a/playbooks/legacy/requirements-tox-py35-check-uc/run.yaml +++ b/playbooks/legacy/requirements-tox-py35-check-uc/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/requirements-tox-validate-projects/run.yaml b/playbooks/legacy/requirements-tox-validate-projects/run.yaml index bfe7b27d..aa2f81a2 100644 --- a/playbooks/legacy/requirements-tox-validate-projects/run.yaml +++ b/playbooks/legacy/requirements-tox-validate-projects/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/requirements-tox-validate/run.yaml b/playbooks/legacy/requirements-tox-validate/run.yaml index cf5742aa..1396c39d 100644 --- a/playbooks/legacy/requirements-tox-validate/run.yaml +++ b/playbooks/legacy/requirements-tox-validate/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/requirements/run.yaml b/playbooks/legacy/requirements/run.yaml index 594ce691..4c1e6a2f 100644 --- a/playbooks/legacy/requirements/run.yaml +++ b/playbooks/legacy/requirements/run.yaml @@ -44,7 +44,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/rpm-packaging-tox-lint/run.yaml b/playbooks/legacy/rpm-packaging-tox-lint/run.yaml index 6076cb02..1f7982a6 100644 --- a/playbooks/legacy/rpm-packaging-tox-lint/run.yaml +++ b/playbooks/legacy/rpm-packaging-tox-lint/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/sahara-dashboard-tox-py27dj110/run.yaml b/playbooks/legacy/sahara-dashboard-tox-py27dj110/run.yaml index efdf99a1..56c076f2 100644 --- a/playbooks/legacy/sahara-dashboard-tox-py27dj110/run.yaml +++ b/playbooks/legacy/sahara-dashboard-tox-py27dj110/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/sahara-dashboard-tox-py27dj19/run.yaml b/playbooks/legacy/sahara-dashboard-tox-py27dj19/run.yaml index 4010a899..291b30e2 100644 --- a/playbooks/legacy/sahara-dashboard-tox-py27dj19/run.yaml +++ b/playbooks/legacy/sahara-dashboard-tox-py27dj19/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/sahara-pylint/run.yaml b/playbooks/legacy/sahara-pylint/run.yaml index f9fc0f28..911913fd 100644 --- a/playbooks/legacy/sahara-pylint/run.yaml +++ b/playbooks/legacy/sahara-pylint/run.yaml @@ -50,7 +50,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/sahara-tests-pylint/run.yaml b/playbooks/legacy/sahara-tests-pylint/run.yaml index b2cc3af6..6bd1f07b 100644 --- a/playbooks/legacy/sahara-tests-pylint/run.yaml +++ b/playbooks/legacy/sahara-tests-pylint/run.yaml @@ -50,7 +50,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/sandbox-tag/run.yaml b/playbooks/legacy/sandbox-tag/run.yaml index 195c964e..425092d4 100644 --- a/playbooks/legacy/sandbox-tag/run.yaml +++ b/playbooks/legacy/sandbox-tag/run.yaml @@ -44,7 +44,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/searchlight-ui-nodejs4-npm-run-lint/run.yaml b/playbooks/legacy/searchlight-ui-nodejs4-npm-run-lint/run.yaml index c55f273a..3cd02d1c 100644 --- a/playbooks/legacy/searchlight-ui-nodejs4-npm-run-lint/run.yaml +++ b/playbooks/legacy/searchlight-ui-nodejs4-npm-run-lint/run.yaml @@ -93,7 +93,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/searchlight-ui-nodejs4-npm-run-test/run.yaml b/playbooks/legacy/searchlight-ui-nodejs4-npm-run-test/run.yaml index 829aac80..43284476 100644 --- a/playbooks/legacy/searchlight-ui-nodejs4-npm-run-test/run.yaml +++ b/playbooks/legacy/searchlight-ui-nodejs4-npm-run-test/run.yaml @@ -93,7 +93,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/security-doc-tox-doc-publishdocs/run.yaml b/playbooks/legacy/security-doc-tox-doc-publishdocs/run.yaml index 73fc717e..211abcc5 100644 --- a/playbooks/legacy/security-doc-tox-doc-publishdocs/run.yaml +++ b/playbooks/legacy/security-doc-tox-doc-publishdocs/run.yaml @@ -50,7 +50,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/senlin-dashboard-nodejs4-npm-run-lint/run.yaml b/playbooks/legacy/senlin-dashboard-nodejs4-npm-run-lint/run.yaml index d18ef56a..7b99a3ca 100644 --- a/playbooks/legacy/senlin-dashboard-nodejs4-npm-run-lint/run.yaml +++ b/playbooks/legacy/senlin-dashboard-nodejs4-npm-run-lint/run.yaml @@ -93,7 +93,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/senlin-dashboard-nodejs4-npm-run-test/run.yaml b/playbooks/legacy/senlin-dashboard-nodejs4-npm-run-test/run.yaml index bafe5253..587a28fe 100644 --- a/playbooks/legacy/senlin-dashboard-nodejs4-npm-run-test/run.yaml +++ b/playbooks/legacy/senlin-dashboard-nodejs4-npm-run-test/run.yaml @@ -93,7 +93,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/service-types-authority-validate/run.yaml b/playbooks/legacy/service-types-authority-validate/run.yaml index 2fdfab0e..8543789f 100644 --- a/playbooks/legacy/service-types-authority-validate/run.yaml +++ b/playbooks/legacy/service-types-authority-validate/run.yaml @@ -52,7 +52,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/sqlalchemy-migrate-tox-py27sa07/run.yaml b/playbooks/legacy/sqlalchemy-migrate-tox-py27sa07/run.yaml index 53b888ff..a052e92a 100644 --- a/playbooks/legacy/sqlalchemy-migrate-tox-py27sa07/run.yaml +++ b/playbooks/legacy/sqlalchemy-migrate-tox-py27sa07/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/static-election-publish/run.yaml b/playbooks/legacy/static-election-publish/run.yaml index 00f90567..a81b6161 100644 --- a/playbooks/legacy/static-election-publish/run.yaml +++ b/playbooks/legacy/static-election-publish/run.yaml @@ -44,7 +44,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/static-governance-publish/run.yaml b/playbooks/legacy/static-governance-publish/run.yaml index f15b76e6..397be9ee 100644 --- a/playbooks/legacy/static-governance-publish/run.yaml +++ b/playbooks/legacy/static-governance-publish/run.yaml @@ -44,7 +44,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/static-governance-uc-publish/run.yaml b/playbooks/legacy/static-governance-uc-publish/run.yaml index 51ea845d..6eaa67de 100644 --- a/playbooks/legacy/static-governance-uc-publish/run.yaml +++ b/playbooks/legacy/static-governance-uc-publish/run.yaml @@ -44,7 +44,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/static-governance-website-publish/run.yaml b/playbooks/legacy/static-governance-website-publish/run.yaml index db1c2ae6..ef5c9dc7 100644 --- a/playbooks/legacy/static-governance-website-publish/run.yaml +++ b/playbooks/legacy/static-governance-website-publish/run.yaml @@ -44,7 +44,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/static-ossa-publish/run.yaml b/playbooks/legacy/static-ossa-publish/run.yaml index a41aa3c1..43281518 100644 --- a/playbooks/legacy/static-ossa-publish/run.yaml +++ b/playbooks/legacy/static-ossa-publish/run.yaml @@ -44,7 +44,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/static-releases-publish/run.yaml b/playbooks/legacy/static-releases-publish/run.yaml index 94f01b81..9b0696e1 100644 --- a/playbooks/legacy/static-releases-publish/run.yaml +++ b/playbooks/legacy/static-releases-publish/run.yaml @@ -44,7 +44,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/static-transparency-policy-publish/run.yaml b/playbooks/legacy/static-transparency-policy-publish/run.yaml index 22b2f35b..dd607452 100644 --- a/playbooks/legacy/static-transparency-policy-publish/run.yaml +++ b/playbooks/legacy/static-transparency-policy-publish/run.yaml @@ -44,7 +44,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/storyboard-webclient-js-draft/run.yaml b/playbooks/legacy/storyboard-webclient-js-draft/run.yaml index 23ec2be8..6b618c32 100644 --- a/playbooks/legacy/storyboard-webclient-js-draft/run.yaml +++ b/playbooks/legacy/storyboard-webclient-js-draft/run.yaml @@ -71,7 +71,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/storyboard-webclient-js-release-branch/run.yaml b/playbooks/legacy/storyboard-webclient-js-release-branch/run.yaml index 59e8558b..9c8950b0 100644 --- a/playbooks/legacy/storyboard-webclient-js-release-branch/run.yaml +++ b/playbooks/legacy/storyboard-webclient-js-release-branch/run.yaml @@ -72,7 +72,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/storyboard-webclient-js-release-master/run.yaml b/playbooks/legacy/storyboard-webclient-js-release-master/run.yaml index 93689748..dc249f8e 100644 --- a/playbooks/legacy/storyboard-webclient-js-release-master/run.yaml +++ b/playbooks/legacy/storyboard-webclient-js-release-master/run.yaml @@ -72,7 +72,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/storyboard-webclient-nodejs4-npm-run-lint/run.yaml b/playbooks/legacy/storyboard-webclient-nodejs4-npm-run-lint/run.yaml index 44c33a70..b2d4db75 100644 --- a/playbooks/legacy/storyboard-webclient-nodejs4-npm-run-lint/run.yaml +++ b/playbooks/legacy/storyboard-webclient-nodejs4-npm-run-lint/run.yaml @@ -93,7 +93,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/storyboard-webclient-nodejs4-npm-run-test-functional/run.yaml b/playbooks/legacy/storyboard-webclient-nodejs4-npm-run-test-functional/run.yaml index a91c78e6..7c83f224 100644 --- a/playbooks/legacy/storyboard-webclient-nodejs4-npm-run-test-functional/run.yaml +++ b/playbooks/legacy/storyboard-webclient-nodejs4-npm-run-test-functional/run.yaml @@ -93,7 +93,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/storyboard-webclient-nodejs4-npm-run-test-integration/run.yaml b/playbooks/legacy/storyboard-webclient-nodejs4-npm-run-test-integration/run.yaml index 0ab51466..11e2fa7b 100644 --- a/playbooks/legacy/storyboard-webclient-nodejs4-npm-run-test-integration/run.yaml +++ b/playbooks/legacy/storyboard-webclient-nodejs4-npm-run-test-integration/run.yaml @@ -93,7 +93,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/storyboard-webclient-nodejs4-npm-run-test-unit/run.yaml b/playbooks/legacy/storyboard-webclient-nodejs4-npm-run-test-unit/run.yaml index baeabe75..23538ab8 100644 --- a/playbooks/legacy/storyboard-webclient-nodejs4-npm-run-test-unit/run.yaml +++ b/playbooks/legacy/storyboard-webclient-nodejs4-npm-run-test-unit/run.yaml @@ -93,7 +93,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/swift-tox-xfs-tmp-func-centos-7/run.yaml b/playbooks/legacy/swift-tox-xfs-tmp-func-centos-7/run.yaml index 3fd98c89..75865e5b 100644 --- a/playbooks/legacy/swift-tox-xfs-tmp-func-centos-7/run.yaml +++ b/playbooks/legacy/swift-tox-xfs-tmp-func-centos-7/run.yaml @@ -66,7 +66,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/swift-tox-xfs-tmp-func-ec-centos-7/run.yaml b/playbooks/legacy/swift-tox-xfs-tmp-func-ec-centos-7/run.yaml index 0ad9ba23..a8d09a0c 100644 --- a/playbooks/legacy/swift-tox-xfs-tmp-func-ec-centos-7/run.yaml +++ b/playbooks/legacy/swift-tox-xfs-tmp-func-ec-centos-7/run.yaml @@ -66,7 +66,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/swift-tox-xfs-tmp-func-ec/run.yaml b/playbooks/legacy/swift-tox-xfs-tmp-func-ec/run.yaml index fe4ecf41..27386c7e 100644 --- a/playbooks/legacy/swift-tox-xfs-tmp-func-ec/run.yaml +++ b/playbooks/legacy/swift-tox-xfs-tmp-func-ec/run.yaml @@ -66,7 +66,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/swift-tox-xfs-tmp-func-encryption-centos-7/run.yaml b/playbooks/legacy/swift-tox-xfs-tmp-func-encryption-centos-7/run.yaml index da594245..6bf54458 100644 --- a/playbooks/legacy/swift-tox-xfs-tmp-func-encryption-centos-7/run.yaml +++ b/playbooks/legacy/swift-tox-xfs-tmp-func-encryption-centos-7/run.yaml @@ -67,7 +67,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/swift-tox-xfs-tmp-func-encryption/run.yaml b/playbooks/legacy/swift-tox-xfs-tmp-func-encryption/run.yaml index f26fac91..d7fcd783 100644 --- a/playbooks/legacy/swift-tox-xfs-tmp-func-encryption/run.yaml +++ b/playbooks/legacy/swift-tox-xfs-tmp-func-encryption/run.yaml @@ -66,7 +66,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/swift-tox-xfs-tmp-func-fast-post-centos-7/run.yaml b/playbooks/legacy/swift-tox-xfs-tmp-func-fast-post-centos-7/run.yaml index cee97263..03e7e139 100644 --- a/playbooks/legacy/swift-tox-xfs-tmp-func-fast-post-centos-7/run.yaml +++ b/playbooks/legacy/swift-tox-xfs-tmp-func-fast-post-centos-7/run.yaml @@ -67,7 +67,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/swift-tox-xfs-tmp-func-fast-post/run.yaml b/playbooks/legacy/swift-tox-xfs-tmp-func-fast-post/run.yaml index b5b71d6f..7940b530 100644 --- a/playbooks/legacy/swift-tox-xfs-tmp-func-fast-post/run.yaml +++ b/playbooks/legacy/swift-tox-xfs-tmp-func-fast-post/run.yaml @@ -66,7 +66,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/swift-tox-xfs-tmp-func-post-as-copy-centos-7/run.yaml b/playbooks/legacy/swift-tox-xfs-tmp-func-post-as-copy-centos-7/run.yaml index abb2fdd1..b458f372 100644 --- a/playbooks/legacy/swift-tox-xfs-tmp-func-post-as-copy-centos-7/run.yaml +++ b/playbooks/legacy/swift-tox-xfs-tmp-func-post-as-copy-centos-7/run.yaml @@ -67,7 +67,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/swift-tox-xfs-tmp-func-post-as-copy/run.yaml b/playbooks/legacy/swift-tox-xfs-tmp-func-post-as-copy/run.yaml index 4243a180..3b9b3d71 100644 --- a/playbooks/legacy/swift-tox-xfs-tmp-func-post-as-copy/run.yaml +++ b/playbooks/legacy/swift-tox-xfs-tmp-func-post-as-copy/run.yaml @@ -67,7 +67,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/swift-tox-xfs-tmp-func/run.yaml b/playbooks/legacy/swift-tox-xfs-tmp-func/run.yaml index d9ea4c9f..91a466f2 100644 --- a/playbooks/legacy/swift-tox-xfs-tmp-func/run.yaml +++ b/playbooks/legacy/swift-tox-xfs-tmp-func/run.yaml @@ -66,7 +66,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/swift-tox-xfs-tmp-py27-centos-7/run.yaml b/playbooks/legacy/swift-tox-xfs-tmp-py27-centos-7/run.yaml index 6c419af5..adb9aba5 100644 --- a/playbooks/legacy/swift-tox-xfs-tmp-py27-centos-7/run.yaml +++ b/playbooks/legacy/swift-tox-xfs-tmp-py27-centos-7/run.yaml @@ -66,7 +66,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/swift-tox-xfs-tmp-py27/run.yaml b/playbooks/legacy/swift-tox-xfs-tmp-py27/run.yaml index 795ee72f..4b43613e 100644 --- a/playbooks/legacy/swift-tox-xfs-tmp-py27/run.yaml +++ b/playbooks/legacy/swift-tox-xfs-tmp-py27/run.yaml @@ -66,7 +66,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/swift-tox-xfs-tmp-py35/run.yaml b/playbooks/legacy/swift-tox-xfs-tmp-py35/run.yaml index d1331792..29b53084 100644 --- a/playbooks/legacy/swift-tox-xfs-tmp-py35/run.yaml +++ b/playbooks/legacy/swift-tox-xfs-tmp-py35/run.yaml @@ -66,7 +66,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/swift3-pylint/run.yaml b/playbooks/legacy/swift3-pylint/run.yaml index 391187e0..a151ef68 100644 --- a/playbooks/legacy/swift3-pylint/run.yaml +++ b/playbooks/legacy/swift3-pylint/run.yaml @@ -50,7 +50,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/swift3-tox-keystone/run.yaml b/playbooks/legacy/swift3-tox-keystone/run.yaml index acadf58a..b5705024 100644 --- a/playbooks/legacy/swift3-tox-keystone/run.yaml +++ b/playbooks/legacy/swift3-tox-keystone/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/swift3-tox-s3acl/run.yaml b/playbooks/legacy/swift3-tox-s3acl/run.yaml index bf6bad16..aa6504e2 100644 --- a/playbooks/legacy/swift3-tox-s3acl/run.yaml +++ b/playbooks/legacy/swift3-tox-s3acl/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/swift3-tox-s3tests_keystone/run.yaml b/playbooks/legacy/swift3-tox-s3tests_keystone/run.yaml index d1e3e334..e0d318be 100644 --- a/playbooks/legacy/swift3-tox-s3tests_keystone/run.yaml +++ b/playbooks/legacy/swift3-tox-s3tests_keystone/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/swift3-tox-s3tests_tempauth/run.yaml b/playbooks/legacy/swift3-tox-s3tests_tempauth/run.yaml index 5893da16..8e1e0fc2 100644 --- a/playbooks/legacy/swift3-tox-s3tests_tempauth/run.yaml +++ b/playbooks/legacy/swift3-tox-s3tests_tempauth/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/swift3-tox-tempauth/run.yaml b/playbooks/legacy/swift3-tox-tempauth/run.yaml index d344bef2..859e46d7 100644 --- a/playbooks/legacy/swift3-tox-tempauth/run.yaml +++ b/playbooks/legacy/swift3-tox-tempauth/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/system-config-puppet-syntax-3/run.yaml b/playbooks/legacy/system-config-puppet-syntax-3/run.yaml index b30cd280..5c8a92f5 100644 --- a/playbooks/legacy/system-config-puppet-syntax-3/run.yaml +++ b/playbooks/legacy/system-config-puppet-syntax-3/run.yaml @@ -63,7 +63,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/tempest-tox-plugin-sanity-check/run.yaml b/playbooks/legacy/tempest-tox-plugin-sanity-check/run.yaml index 0a012d48..dcaddfd4 100644 --- a/playbooks/legacy/tempest-tox-plugin-sanity-check/run.yaml +++ b/playbooks/legacy/tempest-tox-plugin-sanity-check/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/tooz-tox-py27-consul/run.yaml b/playbooks/legacy/tooz-tox-py27-consul/run.yaml index 9053877e..6932ccf6 100644 --- a/playbooks/legacy/tooz-tox-py27-consul/run.yaml +++ b/playbooks/legacy/tooz-tox-py27-consul/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/tooz-tox-py27-etcd/run.yaml b/playbooks/legacy/tooz-tox-py27-etcd/run.yaml index 41b7491d..afabc2a5 100644 --- a/playbooks/legacy/tooz-tox-py27-etcd/run.yaml +++ b/playbooks/legacy/tooz-tox-py27-etcd/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/tooz-tox-py27-etcd3/run.yaml b/playbooks/legacy/tooz-tox-py27-etcd3/run.yaml index 95abf561..985530e7 100644 --- a/playbooks/legacy/tooz-tox-py27-etcd3/run.yaml +++ b/playbooks/legacy/tooz-tox-py27-etcd3/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/tooz-tox-py27-etcd3gw/run.yaml b/playbooks/legacy/tooz-tox-py27-etcd3gw/run.yaml index f94ca80f..d18fa9a3 100644 --- a/playbooks/legacy/tooz-tox-py27-etcd3gw/run.yaml +++ b/playbooks/legacy/tooz-tox-py27-etcd3gw/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/tooz-tox-py27-memcached/run.yaml b/playbooks/legacy/tooz-tox-py27-memcached/run.yaml index 4539e135..3ddf57df 100644 --- a/playbooks/legacy/tooz-tox-py27-memcached/run.yaml +++ b/playbooks/legacy/tooz-tox-py27-memcached/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/tooz-tox-py27-mysql/run.yaml b/playbooks/legacy/tooz-tox-py27-mysql/run.yaml index a7426b65..b4fccb3e 100644 --- a/playbooks/legacy/tooz-tox-py27-mysql/run.yaml +++ b/playbooks/legacy/tooz-tox-py27-mysql/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/tooz-tox-py27-postgresql/run.yaml b/playbooks/legacy/tooz-tox-py27-postgresql/run.yaml index 70cfef78..7451629a 100644 --- a/playbooks/legacy/tooz-tox-py27-postgresql/run.yaml +++ b/playbooks/legacy/tooz-tox-py27-postgresql/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/tooz-tox-py27-redis/run.yaml b/playbooks/legacy/tooz-tox-py27-redis/run.yaml index 09ed767e..b5b23253 100644 --- a/playbooks/legacy/tooz-tox-py27-redis/run.yaml +++ b/playbooks/legacy/tooz-tox-py27-redis/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/tooz-tox-py27-sentinel/run.yaml b/playbooks/legacy/tooz-tox-py27-sentinel/run.yaml index 907c8dbb..eb6bd0a4 100644 --- a/playbooks/legacy/tooz-tox-py27-sentinel/run.yaml +++ b/playbooks/legacy/tooz-tox-py27-sentinel/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/tooz-tox-py27-zookeeper/run.yaml b/playbooks/legacy/tooz-tox-py27-zookeeper/run.yaml index 92ddc99d..6b97d37d 100644 --- a/playbooks/legacy/tooz-tox-py27-zookeeper/run.yaml +++ b/playbooks/legacy/tooz-tox-py27-zookeeper/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/tooz-tox-py35-consul/run.yaml b/playbooks/legacy/tooz-tox-py35-consul/run.yaml index c392b573..c2923a06 100644 --- a/playbooks/legacy/tooz-tox-py35-consul/run.yaml +++ b/playbooks/legacy/tooz-tox-py35-consul/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/tooz-tox-py35-etcd/run.yaml b/playbooks/legacy/tooz-tox-py35-etcd/run.yaml index 654c1f8a..ea34fba2 100644 --- a/playbooks/legacy/tooz-tox-py35-etcd/run.yaml +++ b/playbooks/legacy/tooz-tox-py35-etcd/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/tooz-tox-py35-etcd3/run.yaml b/playbooks/legacy/tooz-tox-py35-etcd3/run.yaml index fd5ef51c..d3be8f32 100644 --- a/playbooks/legacy/tooz-tox-py35-etcd3/run.yaml +++ b/playbooks/legacy/tooz-tox-py35-etcd3/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/tooz-tox-py35-etcd3gw/run.yaml b/playbooks/legacy/tooz-tox-py35-etcd3gw/run.yaml index bb0ec956..f7c3411f 100644 --- a/playbooks/legacy/tooz-tox-py35-etcd3gw/run.yaml +++ b/playbooks/legacy/tooz-tox-py35-etcd3gw/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/tooz-tox-py35-memcached/run.yaml b/playbooks/legacy/tooz-tox-py35-memcached/run.yaml index 138ed79e..1ebc6e02 100644 --- a/playbooks/legacy/tooz-tox-py35-memcached/run.yaml +++ b/playbooks/legacy/tooz-tox-py35-memcached/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/tooz-tox-py35-mysql/run.yaml b/playbooks/legacy/tooz-tox-py35-mysql/run.yaml index b8aaf4ff..586c0683 100644 --- a/playbooks/legacy/tooz-tox-py35-mysql/run.yaml +++ b/playbooks/legacy/tooz-tox-py35-mysql/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/tooz-tox-py35-postgresql/run.yaml b/playbooks/legacy/tooz-tox-py35-postgresql/run.yaml index ac7c31d0..97995101 100644 --- a/playbooks/legacy/tooz-tox-py35-postgresql/run.yaml +++ b/playbooks/legacy/tooz-tox-py35-postgresql/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/tooz-tox-py35-redis/run.yaml b/playbooks/legacy/tooz-tox-py35-redis/run.yaml index fb7f18ae..3612b754 100644 --- a/playbooks/legacy/tooz-tox-py35-redis/run.yaml +++ b/playbooks/legacy/tooz-tox-py35-redis/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/tooz-tox-py35-sentinel/run.yaml b/playbooks/legacy/tooz-tox-py35-sentinel/run.yaml index bdfcb35c..7d5804fe 100644 --- a/playbooks/legacy/tooz-tox-py35-sentinel/run.yaml +++ b/playbooks/legacy/tooz-tox-py35-sentinel/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/tooz-tox-py35-zookeeper/run.yaml b/playbooks/legacy/tooz-tox-py35-zookeeper/run.yaml index cd26645c..3403ee25 100644 --- a/playbooks/legacy/tooz-tox-py35-zookeeper/run.yaml +++ b/playbooks/legacy/tooz-tox-py35-zookeeper/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/tox-build/run.yaml b/playbooks/legacy/tox-build/run.yaml index ab95b347..0e0ea882 100644 --- a/playbooks/legacy/tox-build/run.yaml +++ b/playbooks/legacy/tox-build/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/tox-checkniceness/run.yaml b/playbooks/legacy/tox-checkniceness/run.yaml index 3cd4a605..67571f2c 100644 --- a/playbooks/legacy/tox-checkniceness/run.yaml +++ b/playbooks/legacy/tox-checkniceness/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/tox-doc-publish-checkbuild/run.yaml b/playbooks/legacy/tox-doc-publish-checkbuild/run.yaml index b5884d5a..976d0c6f 100644 --- a/playbooks/legacy/tox-doc-publish-checkbuild/run.yaml +++ b/playbooks/legacy/tox-doc-publish-checkbuild/run.yaml @@ -50,7 +50,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/tox-doc-publish-checklang/run.yaml b/playbooks/legacy/tox-doc-publish-checklang/run.yaml index e53eef0a..b1d1191f 100644 --- a/playbooks/legacy/tox-doc-publish-checklang/run.yaml +++ b/playbooks/legacy/tox-doc-publish-checklang/run.yaml @@ -50,7 +50,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/tox-doc-publishlang/run.yaml b/playbooks/legacy/tox-doc-publishlang/run.yaml index a7fb5d56..0f8e9819 100644 --- a/playbooks/legacy/tox-doc-publishlang/run.yaml +++ b/playbooks/legacy/tox-doc-publishlang/run.yaml @@ -50,7 +50,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/training-guides-tox-doc-publish-checkbuild/run.yaml b/playbooks/legacy/training-guides-tox-doc-publish-checkbuild/run.yaml index 30b5b55b..f0613a8c 100644 --- a/playbooks/legacy/training-guides-tox-doc-publish-checkbuild/run.yaml +++ b/playbooks/legacy/training-guides-tox-doc-publish-checkbuild/run.yaml @@ -51,7 +51,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/training-guides-tox-doc-publishdocs/run.yaml b/playbooks/legacy/training-guides-tox-doc-publishdocs/run.yaml index b8765869..8c3b3d7b 100644 --- a/playbooks/legacy/training-guides-tox-doc-publishdocs/run.yaml +++ b/playbooks/legacy/training-guides-tox-doc-publishdocs/run.yaml @@ -51,7 +51,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/training-labs-scripts/run.yaml b/playbooks/legacy/training-labs-scripts/run.yaml index ec99d97f..25c34e2b 100644 --- a/playbooks/legacy/training-labs-scripts/run.yaml +++ b/playbooks/legacy/training-labs-scripts/run.yaml @@ -44,7 +44,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/tripleo-ui-nodejs6-npm-run-lint/run.yaml b/playbooks/legacy/tripleo-ui-nodejs6-npm-run-lint/run.yaml index 677ed8aa..2867aa13 100644 --- a/playbooks/legacy/tripleo-ui-nodejs6-npm-run-lint/run.yaml +++ b/playbooks/legacy/tripleo-ui-nodejs6-npm-run-lint/run.yaml @@ -92,7 +92,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/tripleo-ui-nodejs6-npm-run-test/run.yaml b/playbooks/legacy/tripleo-ui-nodejs6-npm-run-test/run.yaml index 788b8789..81a9c10e 100644 --- a/playbooks/legacy/tripleo-ui-nodejs6-npm-run-test/run.yaml +++ b/playbooks/legacy/tripleo-ui-nodejs6-npm-run-test/run.yaml @@ -92,7 +92,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/trove-pylint/run.yaml b/playbooks/legacy/trove-pylint/run.yaml index 08bde1a8..b822285e 100644 --- a/playbooks/legacy/trove-pylint/run.yaml +++ b/playbooks/legacy/trove-pylint/run.yaml @@ -50,7 +50,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/trove-tox-apiexamples/run.yaml b/playbooks/legacy/trove-tox-apiexamples/run.yaml index c775fe0b..e043b771 100644 --- a/playbooks/legacy/trove-tox-apiexamples/run.yaml +++ b/playbooks/legacy/trove-tox-apiexamples/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/trove-tox-fakemodetests/run.yaml b/playbooks/legacy/trove-tox-fakemodetests/run.yaml index 2b6952ad..418eaf44 100644 --- a/playbooks/legacy/trove-tox-fakemodetests/run.yaml +++ b/playbooks/legacy/trove-tox-fakemodetests/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/upstream-translation-update/run.yaml b/playbooks/legacy/upstream-translation-update/run.yaml index 7e7533b3..dff388d1 100644 --- a/playbooks/legacy/upstream-translation-update/run.yaml +++ b/playbooks/legacy/upstream-translation-update/run.yaml @@ -20,7 +20,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/vinz-webclient-js-draft/run.yaml b/playbooks/legacy/vinz-webclient-js-draft/run.yaml index ffdfe70e..7978bf21 100644 --- a/playbooks/legacy/vinz-webclient-js-draft/run.yaml +++ b/playbooks/legacy/vinz-webclient-js-draft/run.yaml @@ -71,7 +71,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/vinz-webclient-js-release-branch/run.yaml b/playbooks/legacy/vinz-webclient-js-release-branch/run.yaml index 6ebb8aa2..3bdefec8 100644 --- a/playbooks/legacy/vinz-webclient-js-release-branch/run.yaml +++ b/playbooks/legacy/vinz-webclient-js-release-branch/run.yaml @@ -71,7 +71,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/vinz-webclient-js-release-master/run.yaml b/playbooks/legacy/vinz-webclient-js-release-master/run.yaml index acb6c429..65ff4923 100644 --- a/playbooks/legacy/vinz-webclient-js-release-master/run.yaml +++ b/playbooks/legacy/vinz-webclient-js-release-master/run.yaml @@ -71,7 +71,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/zaqar-tox-integration/run.yaml b/playbooks/legacy/zaqar-tox-integration/run.yaml index d0cfe4be..f20232df 100644 --- a/playbooks/legacy/zaqar-tox-integration/run.yaml +++ b/playbooks/legacy/zaqar-tox-integration/run.yaml @@ -58,7 +58,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/zaqar-ui-nodejs4-npm-run-lint/run.yaml b/playbooks/legacy/zaqar-ui-nodejs4-npm-run-lint/run.yaml index c7dcd4a2..2f6e8af3 100644 --- a/playbooks/legacy/zaqar-ui-nodejs4-npm-run-lint/run.yaml +++ b/playbooks/legacy/zaqar-ui-nodejs4-npm-run-lint/run.yaml @@ -92,7 +92,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/zaqar-ui-nodejs4-npm-run-test/run.yaml b/playbooks/legacy/zaqar-ui-nodejs4-npm-run-test/run.yaml index 73115da2..c4a153b0 100644 --- a/playbooks/legacy/zaqar-ui-nodejs4-npm-run-test/run.yaml +++ b/playbooks/legacy/zaqar-ui-nodejs4-npm-run-test/run.yaml @@ -92,7 +92,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/zmq-event-publisher-hpi-artifact/run.yaml b/playbooks/legacy/zmq-event-publisher-hpi-artifact/run.yaml index 9bba9559..10a8788d 100644 --- a/playbooks/legacy/zmq-event-publisher-hpi-artifact/run.yaml +++ b/playbooks/legacy/zmq-event-publisher-hpi-artifact/run.yaml @@ -44,7 +44,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/zmq-event-publisher-jenkinsci-upload/run.yaml b/playbooks/legacy/zmq-event-publisher-jenkinsci-upload/run.yaml index d2f8d8a8..e34dc17e 100644 --- a/playbooks/legacy/zmq-event-publisher-jenkinsci-upload/run.yaml +++ b/playbooks/legacy/zmq-event-publisher-jenkinsci-upload/run.yaml @@ -11,7 +11,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/zmq-event-publisher-maven-build-ubuntu-trusty/run.yaml b/playbooks/legacy/zmq-event-publisher-maven-build-ubuntu-trusty/run.yaml index ca398a0f..ce571ea2 100644 --- a/playbooks/legacy/zmq-event-publisher-maven-build-ubuntu-trusty/run.yaml +++ b/playbooks/legacy/zmq-event-publisher-maven-build-ubuntu-trusty/run.yaml @@ -45,7 +45,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/zun-ui-nodejs4-npm-run-lint/run.yaml b/playbooks/legacy/zun-ui-nodejs4-npm-run-lint/run.yaml index 3bbf2647..2b6a492a 100644 --- a/playbooks/legacy/zun-ui-nodejs4-npm-run-lint/run.yaml +++ b/playbooks/legacy/zun-ui-nodejs4-npm-run-lint/run.yaml @@ -92,7 +92,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash diff --git a/playbooks/legacy/zun-ui-nodejs4-npm-run-test/run.yaml b/playbooks/legacy/zun-ui-nodejs4-npm-run-test/run.yaml index 42f86d5a..eda09d58 100644 --- a/playbooks/legacy/zun-ui-nodejs4-npm-run-test/run.yaml +++ b/playbooks/legacy/zun-ui-nodejs4-npm-run-test/run.yaml @@ -92,7 +92,7 @@ - shell: cmd: | set -x - sudo rm -f /etc/sudoers.d/zuul-sudo + sudo rm -f /etc/sudoers.d/zuul # Prove that general sudo access is actually revoked ! sudo -n true executable: /bin/bash