Legacy Roles
A list of legacy roles.
GET /api/v1/roles/?format=api&page=903
{ "count": 37374, "next": "http://galaxy.ansible.com/api/v1/roles/?format=api&page=904", "previous": "http://galaxy.ansible.com/api/v1/roles/?format=api&page=902", "results": [ { "id": 10434, "upstream_id": 8932, "created": "2023-05-08T20:48:22.984184Z", "modified": "2023-10-29T18:45:19.550472Z", "imported": "2016-03-30T15:02:32.789712-04:00", "github_user": "freedomofpress", "username": "freedomofpress", "github_repo": "ansible-role-elk", "github_branch": "master", "commit": "32bd4bd9c773c64d07fa6dbefc783d42fb23d861", "commit_message": "Updates ufw var name \"dst\" -> \"dest\"\n\nFor consistency, using the same format for both source and destination\nIP addresses and ports.", "name": "elk", "description": "Stands up ELK stack for log aggregation.", "summary_fields": { "dependencies": [ { "id": 8785, "name": "freedomofpress.generate-ssl-cert" } ], "namespace": { "id": 1388, "name": "freedomofpress", "avatar_url": "https://avatars1.githubusercontent.com/u/5388147?v=4" }, "provider_namespace": { "id": 4828, "name": "freedomofpress", "pulp_href": "/api/pulp/api/v3/pulp_ansible/namespaces/4828/" }, "repository": { "name": "ansible-role-elk", "original_name": "ansible-role-elk" }, "tags": [ "logging", "metrics", "monitoring", "security", "visualization" ], "versions": [] }, "download_count": 165 }, { "id": 10435, "upstream_id": 8785, "created": "2023-05-08T20:48:23.707243Z", "modified": "2023-10-29T18:45:19.554363Z", "imported": "2016-03-23T16:16:15.836199-04:00", "github_user": "freedomofpress", "username": "freedomofpress", "github_repo": "ansible-role-generate-ssl-cert", "github_branch": "master", "commit": "5c736e3ffceb5ee0cd38160aded8a8d5c871fd08", "commit_message": "Adds galaxy_tags to meta/main.yml\n\nRequired for inclusion in galaxy.", "name": "generate-ssl-cert", "description": "Generate self-signed OpenSSL certificates.", "summary_fields": { "dependencies": [], "namespace": { "id": 1388, "name": "freedomofpress", "avatar_url": "https://avatars1.githubusercontent.com/u/5388147?v=4" }, "provider_namespace": { "id": 4828, "name": "freedomofpress", "pulp_href": "/api/pulp/api/v3/pulp_ansible/namespaces/4828/" }, "repository": { "name": "ansible-role-generate-ssl-cert", "original_name": "ansible-role-generate-ssl-cert" }, "tags": [ "encryption", "logging", "security", "system" ], "versions": [] }, "download_count": 266 }, { "id": 10436, "upstream_id": 8451, "created": "2023-05-08T20:48:23.767733Z", "modified": "2023-10-29T18:45:19.557996Z", "imported": "2017-11-06T10:34:01.350740-05:00", "github_user": "freedomofpress", "username": "freedomofpress", "github_repo": "ansible-role-grsecurity", "github_branch": "master", "commit": "4a1d159a7bfd7b15caecfd7c42934b81c2863e50", "commit_message": "Merge pull request #110 from freedomofpress/fix-fetching-in-build-role\n\nFixes fetch logic in build role", "name": "grsecurity", "description": "Build and install roles for grsecurity Linux kernel patches", "summary_fields": { "dependencies": [], "namespace": { "id": 1388, "name": "freedomofpress", "avatar_url": "https://avatars1.githubusercontent.com/u/5388147?v=4" }, "provider_namespace": { "id": 4828, "name": "freedomofpress", "pulp_href": "/api/pulp/api/v3/pulp_ansible/namespaces/4828/" }, "repository": { "name": "ansible-role-grsecurity", "original_name": "ansible-role-grsecurity" }, "tags": [ "cloud", "packaging", "system" ], "versions": [] }, "download_count": 86 }, { "id": 10437, "upstream_id": 22820, "created": "2023-05-08T20:48:23.830493Z", "modified": "2023-10-29T18:45:19.569737Z", "imported": "2017-12-14T12:18:11.966743-05:00", "github_user": "freedomofpress", "username": "freedomofpress", "github_repo": "ansible-role-grsecurity-install", "github_branch": "master", "commit": "e5274ec95c20826e9bde3cb555108a489f2eabba", "commit_message": "Merge pull request #5 from freedomofpress/add-meta-role-info\n\nAdds meta/main.yml file", "name": "grsecurity-install", "description": "Installs grsecurity-patched Linux kernel images", "summary_fields": { "dependencies": [], "namespace": { "id": 1388, "name": "freedomofpress", "avatar_url": "https://avatars1.githubusercontent.com/u/5388147?v=4" }, "provider_namespace": { "id": 4828, "name": "freedomofpress", "pulp_href": "/api/pulp/api/v3/pulp_ansible/namespaces/4828/" }, "repository": { "name": "ansible-role-grsecurity-install", "original_name": "ansible-role-grsecurity-install" }, "tags": [ "kernel", "linux", "packaging", "system" ], "versions": [] }, "download_count": 55 }, { "id": 10438, "upstream_id": 8452, "created": "2023-05-08T20:48:23.893140Z", "modified": "2023-10-29T18:45:19.579093Z", "imported": "2016-03-11T16:43:33.167338-05:00", "github_user": "freedomofpress", "username": "freedomofpress", "github_repo": "ansible-role-jitsi-meet", "github_branch": "master", "commit": "b6102cabb6c536f3e91c89de34781a116646e682", "commit_message": "Merge pull request #16 from freedomofpress/support-check-mode\n\nAdds support for --check mode", "name": "jitsi-meet", "description": "Installs Jitsi Meet videoconferencing software", "summary_fields": { "dependencies": [], "namespace": { "id": 1388, "name": "freedomofpress", "avatar_url": "https://avatars1.githubusercontent.com/u/5388147?v=4" }, "provider_namespace": { "id": 4828, "name": "freedomofpress", "pulp_href": "/api/pulp/api/v3/pulp_ansible/namespaces/4828/" }, "repository": { "name": "ansible-role-jitsi-meet", "original_name": "ansible-role-jitsi-meet" }, "tags": [ "system" ], "versions": [] }, "download_count": 170 }, { "id": 10439, "upstream_id": 21740, "created": "2023-05-08T20:48:23.962695Z", "modified": "2023-10-29T18:45:19.587653Z", "imported": "2017-11-06T10:34:13.099010-05:00", "github_user": "freedomofpress", "username": "freedomofpress", "github_repo": "ansible-role-ossec", "github_branch": "master", "commit": "6c926df96b6f22a5ba117c0d165fc7eeed939284", "commit_message": "Merge pull request #6 from freedomofpress/cert-host\n\nUpdate the authd SSL cert to use a better common name", "name": "ossec", "description": "Ansible role for configuring OSSEC manager and clients", "summary_fields": { "dependencies": [], "namespace": { "id": 1388, "name": "freedomofpress", "avatar_url": "https://avatars1.githubusercontent.com/u/5388147?v=4" }, "provider_namespace": { "id": 4828, "name": "freedomofpress", "pulp_href": "/api/pulp/api/v3/pulp_ansible/namespaces/4828/" }, "repository": { "name": "ansible-role-ossec", "original_name": "ansible-role-ossec" }, "tags": [], "versions": [] }, "download_count": 78 }, { "id": 10440, "upstream_id": 8453, "created": "2023-05-08T20:48:24.035845Z", "modified": "2023-10-29T18:45:19.591446Z", "imported": "2016-03-11T16:43:43.919067-05:00", "github_user": "freedomofpress", "username": "freedomofpress", "github_repo": "ansible-role-paxctld", "github_branch": "master", "commit": "0115ee47fef85bc06925dd6ddfbf8a3441a15983", "commit_message": "Adds example playbook\n\nSame content as what's in the README. Would be nice to hook up tests for\nthis, but unit testing is hard, since it depends so heavily on\nintegration with a grsecurity-patched machine.", "name": "paxctld", "description": "Installs paxctld", "summary_fields": { "dependencies": [], "namespace": { "id": 1388, "name": "freedomofpress", "avatar_url": "https://avatars1.githubusercontent.com/u/5388147?v=4" }, "provider_namespace": { "id": 4828, "name": "freedomofpress", "pulp_href": "/api/pulp/api/v3/pulp_ansible/namespaces/4828/" }, "repository": { "name": "ansible-role-paxctld", "original_name": "ansible-role-paxctld" }, "tags": [ "system" ], "versions": [] }, "download_count": 75 }, { "id": 10441, "upstream_id": 8454, "created": "2023-05-08T20:48:24.101386Z", "modified": "2023-10-29T18:45:19.594931Z", "imported": "2016-04-21T20:07:21.544719-04:00", "github_user": "freedomofpress", "username": "freedomofpress", "github_repo": "ansible-role-riemann", "github_branch": "master", "commit": "c3abd81f0b10749b09924e0db039fb41e4543342", "commit_message": "Creates gitignore file\n\nIgnores the molecule and vagrant directories, which are a side-effect of\nrunning the test suite.", "name": "riemann", "description": "Configures Riemann for alerting on Logstash events.", "summary_fields": { "dependencies": [], "namespace": { "id": 1388, "name": "freedomofpress", "avatar_url": "https://avatars1.githubusercontent.com/u/5388147?v=4" }, "provider_namespace": { "id": 4828, "name": "freedomofpress", "pulp_href": "/api/pulp/api/v3/pulp_ansible/namespaces/4828/" }, "repository": { "name": "ansible-role-riemann", "original_name": "ansible-role-riemann" }, "tags": [ "alerting", "logging", "metrics", "monitoring", "riemann", "security", "visualization" ], "versions": [] }, "download_count": 84 }, { "id": 10442, "upstream_id": 21741, "created": "2023-05-08T20:48:24.165250Z", "modified": "2023-10-29T18:45:19.598529Z", "imported": "2017-11-06T10:34:14.926027-05:00", "github_user": "freedomofpress", "username": "freedomofpress", "github_repo": "ansible-role-semaphor", "github_branch": "master", "commit": "9ed5c3f1e93a5f8d52a88a52739152543f404839", "commit_message": "Merge pull request #7 from freedomofpress/bump-version-to-1.8\n\nBump version to 1.8", "name": "semaphor", "description": "Installs the Semaphor encrypted chat client by SpiderOak.", "summary_fields": { "dependencies": [], "namespace": { "id": 1388, "name": "freedomofpress", "avatar_url": "https://avatars1.githubusercontent.com/u/5388147?v=4" }, "provider_namespace": { "id": 4828, "name": "freedomofpress", "pulp_href": "/api/pulp/api/v3/pulp_ansible/namespaces/4828/" }, "repository": { "name": "ansible-role-semaphor", "original_name": "ansible-role-semaphor" }, "tags": [ "chat", "communication", "desktop", "encryption", "privacy", "workstation" ], "versions": [] }, "download_count": 46 }, { "id": 10443, "upstream_id": 21742, "created": "2023-05-08T20:48:24.226896Z", "modified": "2023-10-29T18:45:19.602440Z", "imported": "2017-11-06T10:34:15.681175-05:00", "github_user": "freedomofpress", "username": "freedomofpress", "github_repo": "ansible-role-signal-desktop", "github_branch": "master", "commit": "1fb90d73d2d1d81ce05d831e5a5f253e62f528bf", "commit_message": "Adds become=yes where appropriate\n\nWhich is everywhere. Ansible best practices are not clear here—I tend to\nprefer explicit management of become within a role, whereas other admins\nmay prefer to set it at the play level. Since the Signal Desktop role is\nc", "name": "signal-desktop", "description": "Installs Signal Desktop on Linux hosts.", "summary_fields": { "dependencies": [], "namespace": { "id": 1388, "name": "freedomofpress", "avatar_url": "https://avatars1.githubusercontent.com/u/5388147?v=4" }, "provider_namespace": { "id": 4828, "name": "freedomofpress", "pulp_href": "/api/pulp/api/v3/pulp_ansible/namespaces/4828/" }, "repository": { "name": "ansible-role-signal-desktop", "original_name": "ansible-role-signal-desktop" }, "tags": [ "chat", "communications", "desktop", "encryption", "im", "secure", "signal", "workstation" ], "versions": [] }, "download_count": 110 } ] }