pleasing erdnaxe and yamllint
parent
a8bf67f18e
commit
afbc9f2b58
|
@ -2,6 +2,5 @@
|
||||||
extends: default
|
extends: default
|
||||||
|
|
||||||
rules:
|
rules:
|
||||||
line-length:
|
line-length: disable
|
||||||
level: warning
|
|
||||||
...
|
...
|
||||||
|
|
2
all.yml
2
all.yml
|
@ -10,7 +10,7 @@
|
||||||
# Common configuration
|
# Common configuration
|
||||||
- import_playbook: plays/mail.yml
|
- import_playbook: plays/mail.yml
|
||||||
- import_playbook: plays/nfs.yml
|
- import_playbook: plays/nfs.yml
|
||||||
#- import_playbook: plays/logs.yml TODO: rsyncd
|
# - import_playbook: plays/logs.yml TODO: rsyncd
|
||||||
- import_playbook: plays/backup.yml # import borgbackup_client/server.yml
|
- import_playbook: plays/backup.yml # import borgbackup_client/server.yml
|
||||||
# - import_playbook: plays/network-interfaces.yml TODO: check this paybook
|
# - import_playbook: plays/network-interfaces.yml TODO: check this paybook
|
||||||
- import_playbook: plays/monitoring.yml
|
- import_playbook: plays/monitoring.yml
|
||||||
|
|
|
@ -1,10 +1,10 @@
|
||||||
---
|
---
|
||||||
glob_home_nounou:
|
glob_home_nounou:
|
||||||
mounts:
|
mounts:
|
||||||
- ip: 172.16.10.1
|
- ip: 172.16.10.1
|
||||||
mountpoint: /pool/home
|
mountpoint: /pool/home
|
||||||
target: /home_nounou
|
target: /home_nounou
|
||||||
name: home_nounou
|
name: home_nounou
|
||||||
owner: root
|
owner: root
|
||||||
group: _user
|
group: _user
|
||||||
mode: '0750'
|
mode: '0750'
|
||||||
|
|
|
@ -1,3 +1,4 @@
|
||||||
|
---
|
||||||
glob_network_interfaces:
|
glob_network_interfaces:
|
||||||
vlan:
|
vlan:
|
||||||
- name: srv
|
- name: srv
|
||||||
|
|
|
@ -1,10 +1,10 @@
|
||||||
---
|
---
|
||||||
glob_home_nounou:
|
glob_home_nounou:
|
||||||
mounts:
|
mounts:
|
||||||
- ip: "{{ query('ldap', 'ip', 'gulp', 'cachan-adm') | ipv4 | first }}"
|
- ip: "{{ query('ldap', 'ip', 'gulp', 'cachan-adm') | ipv4 | first }}"
|
||||||
mountpoint: /rpool/home
|
mountpoint: /rpool/home
|
||||||
target: /home_nounou
|
target: /home_nounou
|
||||||
name: home_nounou
|
name: home_nounou
|
||||||
owner: root
|
owner: root
|
||||||
group: _user
|
group: _user
|
||||||
mode: '0750'
|
mode: '0750'
|
||||||
|
|
|
@ -1,3 +1,4 @@
|
||||||
|
---
|
||||||
glob_network_interfaces:
|
glob_network_interfaces:
|
||||||
vlan:
|
vlan:
|
||||||
- name: cachan_srv
|
- name: cachan_srv
|
||||||
|
|
|
@ -1,13 +1,13 @@
|
||||||
---
|
---
|
||||||
glob_dhcp:
|
glob_dhcp:
|
||||||
global_options:
|
global_options:
|
||||||
- { key: "interface-mtu", value: "1500" }
|
- {key: "interface-mtu", value: "1500"}
|
||||||
global_parameters: []
|
global_parameters: []
|
||||||
|
|
||||||
glob_service_dhcp:
|
glob_service_dhcp:
|
||||||
name: dhcp
|
name: dhcp
|
||||||
install_dir: /var/local/services/dhcp
|
install_dir: /var/local/services/dhcp
|
||||||
generated: yes
|
generated: true
|
||||||
cron:
|
cron:
|
||||||
frequency: "*/2 * * * *"
|
frequency: "*/2 * * * *"
|
||||||
options: -q
|
options: -q
|
||||||
|
|
|
@ -1,3 +1,4 @@
|
||||||
|
---
|
||||||
glob_dovecot:
|
glob_dovecot:
|
||||||
ldap:
|
ldap:
|
||||||
uri: "ldap://{{ query('ldap', 'ip', 're2o-ldap', 'adm') | ipv4 | first }}/"
|
uri: "ldap://{{ query('ldap', 'ip', 're2o-ldap', 'adm') | ipv4 | first }}/"
|
||||||
|
|
|
@ -1,2 +1,3 @@
|
||||||
|
---
|
||||||
glob_ethercalc:
|
glob_ethercalc:
|
||||||
ip: "{{ query('ldap', 'ip', ansible_hostname, 'adm') | ipv4 | first }}"
|
ip: "{{ query('ldap', 'ip', ansible_hostname, 'adm') | ipv4 | first }}"
|
||||||
|
|
|
@ -1,3 +1,4 @@
|
||||||
|
---
|
||||||
glob_etherpad:
|
glob_etherpad:
|
||||||
instances:
|
instances:
|
||||||
- name: etherpad-lite
|
- name: etherpad-lite
|
||||||
|
|
|
@ -1,3 +1,4 @@
|
||||||
|
---
|
||||||
glob_service_firewall:
|
glob_service_firewall:
|
||||||
name: firewall
|
name: firewall
|
||||||
install_dir: /var/local/services/firewall
|
install_dir: /var/local/services/firewall
|
||||||
|
|
|
@ -1,3 +1,4 @@
|
||||||
|
---
|
||||||
glob_framadate:
|
glob_framadate:
|
||||||
contact: contact@crans.org
|
contact: contact@crans.org
|
||||||
automatic_response: no-reply@crans.org
|
automatic_response: no-reply@crans.org
|
||||||
|
@ -8,4 +9,3 @@ glob_framadate:
|
||||||
admin_username: framadate
|
admin_username: framadate
|
||||||
admin_password: "{{ vault.framadate_password }}"
|
admin_password: "{{ vault.framadate_password }}"
|
||||||
db_password: "{{ vault.framadate_password_db }}"
|
db_password: "{{ vault.framadate_password_db }}"
|
||||||
|
|
||||||
|
|
|
@ -1,3 +1,4 @@
|
||||||
|
---
|
||||||
glob_horde:
|
glob_horde:
|
||||||
secret: '{{ vault.horde_secret }}'
|
secret: '{{ vault.horde_secret }}'
|
||||||
imap: imap.adm.crans.org
|
imap: imap.adm.crans.org
|
||||||
|
@ -13,10 +14,10 @@ glob_horde:
|
||||||
- "'erdnaxe'"
|
- "'erdnaxe'"
|
||||||
redirection: https://wiki.crans.org/VieCrans/PagesDeDeconnexion/ERR_CHOOSE_WEBMAIL
|
redirection: https://wiki.crans.org/VieCrans/PagesDeDeconnexion/ERR_CHOOSE_WEBMAIL
|
||||||
src_hostname: horde.crans.org
|
src_hostname: horde.crans.org
|
||||||
dest_hostname : webmail.crans.org
|
dest_hostname: webmail.crans.org
|
||||||
admin_src_hostname : horde.adm.crans.org
|
admin_src_hostname: horde.adm.crans.org
|
||||||
admin_dest_hostname : webmail.adm.crans.org
|
admin_dest_hostname: webmail.adm.crans.org
|
||||||
zone_ipv4 : 172.16.10.0/24
|
zone_ipv4: 172.16.10.0/24
|
||||||
zone_ipv6 : fd00:0:0:10::/64
|
zone_ipv6: fd00:0:0:10::/64
|
||||||
ipv4: "{{ query('ldap', 'ip', ansible_hostname, 'adm') | ipv4 | first }}"
|
ipv4: "{{ query('ldap', 'ip', ansible_hostname, 'adm') | ipv4 | first }}"
|
||||||
ipv6: "{{ query('ldap', 'ip', ansible_hostname, 'adm') | ipv6 | first }}"
|
ipv6: "{{ query('ldap', 'ip', ansible_hostname, 'adm') | ipv6 | first }}"
|
||||||
|
|
|
@ -8,7 +8,7 @@ glob_keepalived:
|
||||||
VI_ALL:
|
VI_ALL:
|
||||||
password: "{{ vault.keepalived.password }}"
|
password: "{{ vault.keepalived.password }}"
|
||||||
id: 60
|
id: 60
|
||||||
ipv6: yes
|
ipv6: true
|
||||||
notify: /var/local/services/keepalived/keepalived.py
|
notify: /var/local/services/keepalived/keepalived.py
|
||||||
zones:
|
zones:
|
||||||
- vlan: via
|
- vlan: via
|
||||||
|
|
|
@ -1,3 +1,4 @@
|
||||||
|
---
|
||||||
glob_ftpsync:
|
glob_ftpsync:
|
||||||
root: /mirror/pub
|
root: /mirror/pub
|
||||||
mirror:
|
mirror:
|
||||||
|
|
|
@ -1,3 +1,4 @@
|
||||||
|
---
|
||||||
glob_postgres:
|
glob_postgres:
|
||||||
subnets:
|
subnets:
|
||||||
- 172.16.10.0/24
|
- 172.16.10.0/24
|
||||||
|
|
|
@ -17,7 +17,7 @@ glob_freeradius:
|
||||||
ipv6: 2001:bc8:273e::1
|
ipv6: 2001:bc8:273e::1
|
||||||
secret: '{{ vault.radius_secret.federez }}'
|
secret: '{{ vault.radius_secret.federez }}'
|
||||||
server: radius-wifi
|
server: radius-wifi
|
||||||
|
|
||||||
loc_certbot:
|
loc_certbot:
|
||||||
- mail: root@crans.org
|
- mail: root@crans.org
|
||||||
certname: crans.org
|
certname: crans.org
|
||||||
|
|
|
@ -1 +1,2 @@
|
||||||
|
---
|
||||||
glob_radvd: {}
|
glob_radvd: {}
|
||||||
|
|
|
@ -17,8 +17,8 @@ glob_re2o:
|
||||||
uri: "ldap://re2o-ldap.adm.crans.org/"
|
uri: "ldap://re2o-ldap.adm.crans.org/"
|
||||||
dn: "cn=admin,dc=crans,dc=org"
|
dn: "cn=admin,dc=crans,dc=org"
|
||||||
database:
|
database:
|
||||||
password: "{{ vault.re2o_db_password }}"
|
password: "{{ vault.re2o_db_password }}"
|
||||||
uri: "172.16.10.1"
|
uri: "172.16.10.1"
|
||||||
optional_apps:
|
optional_apps:
|
||||||
- api
|
- api
|
||||||
- captcha
|
- captcha
|
||||||
|
|
|
@ -3,8 +3,8 @@ glob_re2o_front:
|
||||||
server_names:
|
server_names:
|
||||||
- "{{ query('ldap', 'ip', 'c3po', 'adm') | ipv4 | first }}"
|
- "{{ query('ldap', 'ip', 'c3po', 'adm') | ipv4 | first }}"
|
||||||
- "[{{ query('ldap', 'ip', 'c3po', 'adm') | ipv6 | first }}]"
|
- "[{{ query('ldap', 'ip', 'c3po', 'adm') | ipv6 | first }}]"
|
||||||
# - "{{ query('ldap', 'ip', 're2o', 'adm') | ipv4 | first }}"
|
# - "{{ query('ldap', 'ip', 're2o', 'adm') | ipv4 | first }}"
|
||||||
# - "[{{ query('ldap', 'ip', 're2o', 'adm') | ipv6 | first }}]"
|
# - "[{{ query('ldap', 'ip', 're2o', 'adm') | ipv6 | first }}]"
|
||||||
- re2o.adm.crans.org
|
- re2o.adm.crans.org
|
||||||
- intranet.adm.crans.org
|
- intranet.adm.crans.org
|
||||||
- re2o.crans.org
|
- re2o.crans.org
|
||||||
|
|
|
@ -1,3 +1,4 @@
|
||||||
|
---
|
||||||
loc_certbot:
|
loc_certbot:
|
||||||
- mail: root@crans.org
|
- mail: root@crans.org
|
||||||
certname: crans.org
|
certname: crans.org
|
||||||
|
|
|
@ -1,3 +1,4 @@
|
||||||
|
---
|
||||||
glob_roundcube:
|
glob_roundcube:
|
||||||
name: Crans
|
name: Crans
|
||||||
imap_server: owl.adm.crans.org
|
imap_server: owl.adm.crans.org
|
||||||
|
|
|
@ -9,4 +9,3 @@ glob_rsyncd:
|
||||||
path: /pool/mirror/pub/videolan
|
path: /pool/mirror/pub/videolan
|
||||||
comment: VideoLAN repository
|
comment: VideoLAN repository
|
||||||
hosts_allow: "*"
|
hosts_allow: "*"
|
||||||
|
|
||||||
|
|
|
@ -1,3 +1,4 @@
|
||||||
|
---
|
||||||
glob_ntp_client:
|
glob_ntp_client:
|
||||||
servers:
|
servers:
|
||||||
- ntp.adm.crans.org
|
- ntp.adm.crans.org
|
||||||
|
|
|
@ -1,3 +1,4 @@
|
||||||
|
---
|
||||||
glob_sssd:
|
glob_sssd:
|
||||||
primary:
|
primary:
|
||||||
domain: tealc.adm.crans.org
|
domain: tealc.adm.crans.org
|
||||||
|
|
|
@ -1,3 +1,4 @@
|
||||||
|
---
|
||||||
glob_thelounge:
|
glob_thelounge:
|
||||||
public: "false"
|
public: "false"
|
||||||
host: "undefined"
|
host: "undefined"
|
||||||
|
|
|
@ -1,2 +1,3 @@
|
||||||
|
---
|
||||||
interfaces:
|
interfaces:
|
||||||
adm: eth0
|
adm: eth0
|
||||||
|
|
|
@ -1,3 +1,4 @@
|
||||||
|
---
|
||||||
interfaces:
|
interfaces:
|
||||||
adm: eth0
|
adm: eth0
|
||||||
srv_nat: eth1
|
srv_nat: eth1
|
||||||
|
|
|
@ -6,5 +6,5 @@ loc_slapd:
|
||||||
|
|
||||||
loc_postgres:
|
loc_postgres:
|
||||||
version: 11
|
version: 11
|
||||||
replica: yes
|
replica: true
|
||||||
addresses: "['daniel.adm.crans.org'] + {{ query('ldap', 'ip', 'daniel', 'adm') | ipaddr('address') }}"
|
addresses: "['daniel.adm.crans.org'] + {{ query('ldap', 'ip', 'daniel', 'adm') | ipaddr('address') }}"
|
||||||
|
|
|
@ -22,7 +22,7 @@ loc_prometheus:
|
||||||
- job_name: servers
|
- job_name: servers
|
||||||
file_sd_configs:
|
file_sd_configs:
|
||||||
- files:
|
- files:
|
||||||
- '/etc/prometheus/targets_node.json'
|
- '/etc/prometheus/targets_node.json'
|
||||||
relabel_configs:
|
relabel_configs:
|
||||||
- source_labels: [__address__]
|
- source_labels: [__address__]
|
||||||
target_label: __param_target
|
target_label: __param_target
|
||||||
|
@ -41,7 +41,7 @@ loc_prometheus:
|
||||||
- job_name: ups_snmp
|
- job_name: ups_snmp
|
||||||
file_sd_configs:
|
file_sd_configs:
|
||||||
- files:
|
- files:
|
||||||
- '/etc/prometheus/targets_ups_snmp.json'
|
- '/etc/prometheus/targets_ups_snmp.json'
|
||||||
metrics_path: /snmp
|
metrics_path: /snmp
|
||||||
params:
|
params:
|
||||||
module: [eatonups]
|
module: [eatonups]
|
||||||
|
@ -60,7 +60,7 @@ loc_prometheus:
|
||||||
- job_name: unifi_snmp
|
- job_name: unifi_snmp
|
||||||
file_sd_configs:
|
file_sd_configs:
|
||||||
- files:
|
- files:
|
||||||
- '/etc/prometheus/targets_unifi_snmp.json'
|
- '/etc/prometheus/targets_unifi_snmp.json'
|
||||||
metrics_path: /snmp
|
metrics_path: /snmp
|
||||||
params:
|
params:
|
||||||
module: [ubiquiti_unifi]
|
module: [ubiquiti_unifi]
|
||||||
|
@ -79,7 +79,7 @@ loc_prometheus:
|
||||||
- job_name: nginx
|
- job_name: nginx
|
||||||
file_sd_configs:
|
file_sd_configs:
|
||||||
- files:
|
- files:
|
||||||
- '/etc/prometheus/targets_nginx.json'
|
- '/etc/prometheus/targets_nginx.json'
|
||||||
relabel_configs:
|
relabel_configs:
|
||||||
- source_labels: [__address__]
|
- source_labels: [__address__]
|
||||||
target_label: instance
|
target_label: instance
|
||||||
|
|
|
@ -17,7 +17,7 @@ loc_postgres:
|
||||||
- fd00:0:0:3010::/64
|
- fd00:0:0:3010::/64
|
||||||
version: 11
|
version: 11
|
||||||
hosts:
|
hosts:
|
||||||
- { db: re2o, user: re2o }
|
- {db: re2o, user: re2o}
|
||||||
addresses: "['gulp.cachan-adm.crans.org'] + {{ query('ldap', 'ip', 'gulp', 'cachan-adm') | ipaddr('address') }}"
|
addresses: "['gulp.cachan-adm.crans.org'] + {{ query('ldap', 'ip', 'gulp', 'cachan-adm') | ipaddr('address') }}"
|
||||||
backup:
|
backup:
|
||||||
dir: /var/local/db-backup
|
dir: /var/local/db-backup
|
||||||
|
|
|
@ -42,20 +42,20 @@ loc_inspircd:
|
||||||
nick: PEB
|
nick: PEB
|
||||||
email: root@crans.org
|
email: root@crans.org
|
||||||
bind:
|
bind:
|
||||||
- address: 185.230.79.11
|
- address: 185.230.79.11
|
||||||
type: clients
|
type: clients
|
||||||
clair: 6667
|
clair: 6667
|
||||||
ssl: 6697
|
ssl: 6697
|
||||||
- address: 2a0c:700:2::ff:fe01:2902
|
- address: 2a0c:700:2::ff:fe01:2902
|
||||||
type: clients
|
type: clients
|
||||||
clair: 6667
|
clair: 6667
|
||||||
ssl: 6697
|
ssl: 6697
|
||||||
- address : 172.16.10.129
|
- address: 172.16.10.129
|
||||||
type: clients
|
type: clients
|
||||||
clair: 6667
|
clair: 6667
|
||||||
- address: 127.0.0.1
|
- address: 127.0.0.1
|
||||||
type: servers
|
type: servers
|
||||||
clair: 6668
|
clair: 6668
|
||||||
connect:
|
connect:
|
||||||
- name: zamok
|
- name: zamok
|
||||||
allows:
|
allows:
|
||||||
|
@ -79,7 +79,7 @@ loc_inspircd:
|
||||||
ipv6: fd00::10:ff:fe01:2110/128
|
ipv6: fd00::10:ff:fe01:2110/128
|
||||||
threshold: 10
|
threshold: 10
|
||||||
commandrate: 10000
|
commandrate: 10000
|
||||||
modes: yes
|
modes: true
|
||||||
dns: 185.230.79.62
|
dns: 185.230.79.62
|
||||||
services:
|
services:
|
||||||
name: services.irc.crans.org
|
name: services.irc.crans.org
|
||||||
|
@ -87,8 +87,6 @@ loc_inspircd:
|
||||||
recvpass: "{{ vault.irc_anope_recvpass }}"
|
recvpass: "{{ vault.irc_anope_recvpass }}"
|
||||||
sendpass: "{{ vault.irc_anope_sendpass }}"
|
sendpass: "{{ vault.irc_anope_sendpass }}"
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
loc_anope:
|
loc_anope:
|
||||||
recvpass: "{{ vault.irc_anope_recvpass }}"
|
recvpass: "{{ vault.irc_anope_recvpass }}"
|
||||||
sendpass: "{{ vault.irc_anope_sendpass }}"
|
sendpass: "{{ vault.irc_anope_sendpass }}"
|
||||||
|
|
|
@ -6,5 +6,5 @@ loc_slapd:
|
||||||
|
|
||||||
loc_postgres:
|
loc_postgres:
|
||||||
version: 11
|
version: 11
|
||||||
replica: yes
|
replica: true
|
||||||
addresses: "['jack.adm.crans.org'] + {{ query('ldap', 'ip', 'jack', 'adm') | ipaddr('address') }}"
|
addresses: "['jack.adm.crans.org'] + {{ query('ldap', 'ip', 'jack', 'adm') | ipaddr('address') }}"
|
||||||
|
|
|
@ -1,3 +1,4 @@
|
||||||
|
---
|
||||||
interfaces:
|
interfaces:
|
||||||
adm: eth0
|
adm: eth0
|
||||||
srv_nat: eth1
|
srv_nat: eth1
|
||||||
|
@ -10,7 +11,7 @@ loc_prometheus:
|
||||||
- job_name: servers
|
- job_name: servers
|
||||||
file_sd_configs:
|
file_sd_configs:
|
||||||
- files:
|
- files:
|
||||||
- '/etc/prometheus/targets_node.json'
|
- '/etc/prometheus/targets_node.json'
|
||||||
relabel_configs:
|
relabel_configs:
|
||||||
- source_labels: [__address__]
|
- source_labels: [__address__]
|
||||||
target_label: __param_target
|
target_label: __param_target
|
||||||
|
@ -27,7 +28,7 @@ loc_prometheus:
|
||||||
- job_name: nginx
|
- job_name: nginx
|
||||||
file_sd_configs:
|
file_sd_configs:
|
||||||
- files:
|
- files:
|
||||||
- '/etc/prometheus/targets_nginx.json'
|
- '/etc/prometheus/targets_nginx.json'
|
||||||
relabel_configs:
|
relabel_configs:
|
||||||
- source_labels: [__address__]
|
- source_labels: [__address__]
|
||||||
target_label: instance
|
target_label: instance
|
||||||
|
@ -63,7 +64,7 @@ loc_prometheus:
|
||||||
- job_name: blackbox
|
- job_name: blackbox
|
||||||
file_sd_configs:
|
file_sd_configs:
|
||||||
- files:
|
- files:
|
||||||
- '/etc/prometheus/targets_blackbox.json'
|
- '/etc/prometheus/targets_blackbox.json'
|
||||||
metrics_path: /probe
|
metrics_path: /probe
|
||||||
params:
|
params:
|
||||||
module: [http_2xx] # Look for a HTTP 200 response.
|
module: [http_2xx] # Look for a HTTP 200 response.
|
||||||
|
@ -89,22 +90,3 @@ loc_prometheus:
|
||||||
- source_labels: [instance]
|
- source_labels: [instance]
|
||||||
target_label: __address__
|
target_label: __address__
|
||||||
replacement: '$1:3903'
|
replacement: '$1:3903'
|
||||||
|
|
||||||
|
|
||||||
# apache:
|
|
||||||
# targets:
|
|
||||||
# config:
|
|
||||||
# - job_name: apache
|
|
||||||
# file_sd_configs:
|
|
||||||
# - files:
|
|
||||||
# - '/etc/prometheus/targets_apache.json'
|
|
||||||
# relabel_configs:
|
|
||||||
# - source_labels: [__address__]
|
|
||||||
# target_label: instance
|
|
||||||
# - source_labels: [instance]
|
|
||||||
# target_label: __address__
|
|
||||||
# replacement: '$1:9117'
|
|
||||||
|
|
||||||
# bird_targets:
|
|
||||||
# - routeur-sam.adm.crans.org
|
|
||||||
|
|
||||||
|
|
|
@ -8,4 +8,3 @@ loc_ldap:
|
||||||
base_dn: "cn=admin,dc=crans,dc=org"
|
base_dn: "cn=admin,dc=crans,dc=org"
|
||||||
password: "{{ vault.ldap_master_password }}"
|
password: "{{ vault.ldap_master_password }}"
|
||||||
uri: "ldap://172.16.10.157"
|
uri: "ldap://172.16.10.157"
|
||||||
|
|
||||||
|
|
|
@ -30,8 +30,8 @@ loc_re2o:
|
||||||
uri: "ldap://{{ query('ldap', 'ip', 're2o-ldap', 'cachan-adm') | ipv4 | first }}/"
|
uri: "ldap://{{ query('ldap', 'ip', 're2o-ldap', 'cachan-adm') | ipv4 | first }}/"
|
||||||
dn: "cn=admin,dc=crans,dc=org"
|
dn: "cn=admin,dc=crans,dc=org"
|
||||||
database:
|
database:
|
||||||
password: "{{ vault.re2o_db_password }}"
|
password: "{{ vault.re2o_db_password }}"
|
||||||
uri: "{{ query('ldap', 'ip', 'gulp', 'cachan-adm') | ipv4 | first }}"
|
uri: "{{ query('ldap', 'ip', 'gulp', 'cachan-adm') | ipv4 | first }}"
|
||||||
|
|
||||||
loc_nginx:
|
loc_nginx:
|
||||||
real_ip_from:
|
real_ip_from:
|
||||||
|
|
|
@ -1,9 +1,9 @@
|
||||||
---
|
---
|
||||||
loc_dhcp:
|
loc_dhcp:
|
||||||
authoritative: True
|
authoritative: true
|
||||||
subnets:
|
subnets:
|
||||||
- network: "185.230.78.0/24"
|
- network: "185.230.78.0/24"
|
||||||
deny_unknown: True
|
deny_unknown: true
|
||||||
vlan: "adh"
|
vlan: "adh"
|
||||||
default_lease_time: "600"
|
default_lease_time: "600"
|
||||||
max_lease_time: "7200"
|
max_lease_time: "7200"
|
||||||
|
|
|
@ -1,3 +1,4 @@
|
||||||
|
---
|
||||||
loc_radvd:
|
loc_radvd:
|
||||||
subnets:
|
subnets:
|
||||||
- name: adh
|
- name: adh
|
||||||
|
|
|
@ -1,9 +1,9 @@
|
||||||
---
|
---
|
||||||
loc_dhcp:
|
loc_dhcp:
|
||||||
authoritative: True
|
authoritative: true
|
||||||
subnets:
|
subnets:
|
||||||
- network: "185.230.76.0/26"
|
- network: "185.230.76.0/26"
|
||||||
deny_unknown: True
|
deny_unknown: true
|
||||||
vlan: "cachan_adh"
|
vlan: "cachan_adh"
|
||||||
default_lease_time: "600"
|
default_lease_time: "600"
|
||||||
max_lease_time: "7200"
|
max_lease_time: "7200"
|
||||||
|
@ -14,7 +14,7 @@ loc_dhcp:
|
||||||
options: []
|
options: []
|
||||||
lease_file: "/var/local/services/dhcp/generated/dhcp.cachan-adh.crans.org.list"
|
lease_file: "/var/local/services/dhcp/generated/dhcp.cachan-adh.crans.org.list"
|
||||||
- network: "100.64.0.0/16"
|
- network: "100.64.0.0/16"
|
||||||
deny_unknown: True
|
deny_unknown: true
|
||||||
vlan: "adh_nat"
|
vlan: "adh_nat"
|
||||||
default_lease_time: "600"
|
default_lease_time: "600"
|
||||||
max_lease_time: "7200"
|
max_lease_time: "7200"
|
||||||
|
@ -25,7 +25,7 @@ loc_dhcp:
|
||||||
options: []
|
options: []
|
||||||
lease_file: "/var/local/services/dhcp/generated/dhcp.adh-nat.crans.org.list"
|
lease_file: "/var/local/services/dhcp/generated/dhcp.adh-nat.crans.org.list"
|
||||||
- network: "172.16.32.0/22"
|
- network: "172.16.32.0/22"
|
||||||
deny_unknown: True
|
deny_unknown: true
|
||||||
vlan: "infra"
|
vlan: "infra"
|
||||||
default_lease_time: "600"
|
default_lease_time: "600"
|
||||||
max_lease_time: "7200"
|
max_lease_time: "7200"
|
||||||
|
|
|
@ -19,7 +19,7 @@ loc_re2o:
|
||||||
uri: "ldap://{{ query('ldap', 'ip', 're2o-ldap', 'cachan-adm') | ipv4 | first }}/"
|
uri: "ldap://{{ query('ldap', 'ip', 're2o-ldap', 'cachan-adm') | ipv4 | first }}/"
|
||||||
dn: "cn=admin,dc=crans,dc=org"
|
dn: "cn=admin,dc=crans,dc=org"
|
||||||
database:
|
database:
|
||||||
password: "{{ vault.re2o_db_password }}"
|
password: "{{ vault.re2o_db_password }}"
|
||||||
uri: "{{ query('ldap', 'ip', 'gulp', 'cachan-adm') | ipv4 | first }}"
|
uri: "{{ query('ldap', 'ip', 'gulp', 'cachan-adm') | ipv4 | first }}"
|
||||||
|
|
||||||
optional_apps: []
|
optional_apps: []
|
||||||
|
|
|
@ -18,7 +18,7 @@ loc_radvd:
|
||||||
- 2a0c:700:254::ff:fe00:99fe
|
- 2a0c:700:254::ff:fe00:99fe
|
||||||
- name: infra
|
- name: infra
|
||||||
prefix: fd00:0:0:11::/64
|
prefix: fd00:0:0:11::/64
|
||||||
no_gateway: yes
|
no_gateway: true
|
||||||
dnssl: infra.crans.org
|
dnssl: infra.crans.org
|
||||||
dns:
|
dns:
|
||||||
- fd00::11:0:ff:fe00:9911
|
- fd00::11:0:ff:fe00:9911
|
||||||
|
|
|
@ -8,4 +8,3 @@ interfaces:
|
||||||
infra: ens1
|
infra: ens1
|
||||||
zayo: ens2
|
zayo: ens2
|
||||||
federez: enp1s3
|
federez: enp1s3
|
||||||
|
|
||||||
|
|
|
@ -1,9 +1,9 @@
|
||||||
---
|
---
|
||||||
loc_dhcp:
|
loc_dhcp:
|
||||||
authoritative: True
|
authoritative: true
|
||||||
subnets:
|
subnets:
|
||||||
- network: "185.230.78.0/24"
|
- network: "185.230.78.0/24"
|
||||||
deny_unknown: True
|
deny_unknown: true
|
||||||
vlan: "adh"
|
vlan: "adh"
|
||||||
default_lease_time: "600"
|
default_lease_time: "600"
|
||||||
max_lease_time: "7200"
|
max_lease_time: "7200"
|
||||||
|
|
|
@ -1,3 +1,4 @@
|
||||||
|
---
|
||||||
loc_radvd:
|
loc_radvd:
|
||||||
subnets:
|
subnets:
|
||||||
- name: adh
|
- name: adh
|
||||||
|
|
|
@ -1,9 +1,9 @@
|
||||||
---
|
---
|
||||||
loc_dhcp:
|
loc_dhcp:
|
||||||
authoritative: True
|
authoritative: true
|
||||||
subnets:
|
subnets:
|
||||||
- network: "185.230.78.0/24"
|
- network: "185.230.78.0/24"
|
||||||
deny_unknown: True
|
deny_unknown: true
|
||||||
vlan: "adh"
|
vlan: "adh"
|
||||||
default_lease_time: "600"
|
default_lease_time: "600"
|
||||||
max_lease_time: "7200"
|
max_lease_time: "7200"
|
||||||
|
|
|
@ -1,3 +1,4 @@
|
||||||
|
---
|
||||||
loc_radvd:
|
loc_radvd:
|
||||||
subnets:
|
subnets:
|
||||||
- name: adh
|
- name: adh
|
||||||
|
|
|
@ -6,5 +6,5 @@ loc_slapd:
|
||||||
|
|
||||||
loc_postgres:
|
loc_postgres:
|
||||||
version: 11
|
version: 11
|
||||||
replica: yes
|
replica: true
|
||||||
addresses: "['sam.adm.crans.org'] + {{ query('ldap', 'ip', 'sam', 'adm') | ipaddr('address') }}"
|
addresses: "['sam.adm.crans.org'] + {{ query('ldap', 'ip', 'sam', 'adm') | ipaddr('address') }}"
|
||||||
|
|
|
@ -73,7 +73,7 @@ loc_nginx:
|
||||||
servers:
|
servers:
|
||||||
- server_name:
|
- server_name:
|
||||||
- "wiki2.crans.org"
|
- "wiki2.crans.org"
|
||||||
ssl : "crans.org"
|
ssl: "crans.org"
|
||||||
access_log: "/var/log/nginx/wiki.log combined"
|
access_log: "/var/log/nginx/wiki.log combined"
|
||||||
error_log: "/var/log/nginx/wiki.error.log"
|
error_log: "/var/log/nginx/wiki.error.log"
|
||||||
additional_params:
|
additional_params:
|
||||||
|
|
|
@ -1,29 +1,30 @@
|
||||||
|
---
|
||||||
loc_postgres:
|
loc_postgres:
|
||||||
version: 11
|
version: 11
|
||||||
hosts:
|
hosts:
|
||||||
- db: etherpad
|
- db: etherpad
|
||||||
user: crans
|
user: crans
|
||||||
map: { name: etherpad, system: etherpad, pg: crans }
|
map: {name: etherpad, system: etherpad, pg: crans}
|
||||||
- db: etherpad_tmp
|
- db: etherpad_tmp
|
||||||
user: crans
|
user: crans
|
||||||
map: { name: etherpad_tmp, system: etherpad, pg: crans }
|
map: {name: etherpad_tmp, system: etherpad, pg: crans}
|
||||||
- db: horde5
|
- db: horde5
|
||||||
user: www-data
|
user: www-data
|
||||||
map: { name: horde, system: www-data, pg: www-data }
|
map: {name: horde, system: www-data, pg: www-data}
|
||||||
- db: roundcube
|
- db: roundcube
|
||||||
user: roundcube
|
user: roundcube
|
||||||
map: { name: webmail, system: www-data, pg: roundcube }
|
map: {name: webmail, system: www-data, pg: roundcube}
|
||||||
- { db: owncloud, user: owncloud }
|
- {db: owncloud, user: owncloud}
|
||||||
- { db: cas, user: cas }
|
- {db: cas, user: cas}
|
||||||
- { db: hedgedoc, user: hedgedoc }
|
- {db: hedgedoc, user: hedgedoc}
|
||||||
- { db: sqlgrey, user: sqlgrey, method: ident }
|
- {db: sqlgrey, user: sqlgrey, method: ident}
|
||||||
- { db: re2o, user: re2o }
|
- {db: re2o, user: re2o}
|
||||||
- { db: re2o_test, user: re2o }
|
- {db: re2o_test, user: re2o}
|
||||||
- { db: constellation-dev, user: constellation-dev }
|
- {db: constellation-dev, user: constellation-dev}
|
||||||
- { db: mailman3, user: mailman3 }
|
- {db: mailman3, user: mailman3}
|
||||||
- { db: mailman3web, user: mailman3web }
|
- {db: mailman3web, user: mailman3web}
|
||||||
- { db: all, user: all, subnets: ['127.0.0.1/32','::1/128'], local: yes }
|
- {db: all, user: all, subnets: ['127.0.0.1/32', '::1/128'], local: true}
|
||||||
- { db: replication, user: replication, local: yes }
|
- {db: replication, user: replication, local: true}
|
||||||
addresses: "['tealc.adm.crans.org'] + {{ query('ldap', 'ip', 'tealc', 'adm') | ipaddr('address') }}"
|
addresses: "['tealc.adm.crans.org'] + {{ query('ldap', 'ip', 'tealc', 'adm') | ipaddr('address') }}"
|
||||||
backup:
|
backup:
|
||||||
dir: /var/local/db-backup
|
dir: /var/local/db-backup
|
||||||
|
@ -78,7 +79,7 @@ loc_nginx:
|
||||||
locations:
|
locations:
|
||||||
- filter: "/"
|
- filter: "/"
|
||||||
params:
|
params:
|
||||||
- "autoindex on"
|
- "autoindex on"
|
||||||
- "autoindex_exact_size off"
|
- "autoindex_exact_size off"
|
||||||
- "add_before_body /.html/HEADER.html"
|
- "add_before_body /.html/HEADER.html"
|
||||||
- "add_after_body /.html/FOOTER.html"
|
- "add_after_body /.html/FOOTER.html"
|
||||||
|
|
|
@ -1,3 +1,4 @@
|
||||||
|
---
|
||||||
interfaces:
|
interfaces:
|
||||||
adm: ens18
|
adm: ens18
|
||||||
srv_nat: ens19
|
srv_nat: ens19
|
||||||
|
|
|
@ -40,8 +40,8 @@
|
||||||
- prometheus-nginx-exporter
|
- prometheus-nginx-exporter
|
||||||
|
|
||||||
# Monitor mailq with a special text exporter
|
# Monitor mailq with a special text exporter
|
||||||
#- hosts: redisdead.adm.crans.org
|
# - hosts: redisdead.adm.crans.org
|
||||||
# roles: ["prometheus-node-exporter-postfix"]
|
# roles: ["prometheus-node-exporter-postfix"]
|
||||||
|
|
||||||
# Monitor logs with mtail
|
# Monitor logs with mtail
|
||||||
- hosts: mtail
|
- hosts: mtail
|
||||||
|
|
|
@ -2,6 +2,6 @@
|
||||||
---
|
---
|
||||||
- hosts: crans_vm,!routeurs_vm
|
- hosts: crans_vm,!routeurs_vm
|
||||||
vars:
|
vars:
|
||||||
network_interfaces: "{{ glob_network_interfaces | default({}) | combine(loc_network_interfaces | default({})) }}"
|
network_interfaces: "{{ glob_network_interfaces | default({}) | combine(loc_network_interfaces | default({})) }}"
|
||||||
roles:
|
roles:
|
||||||
- network-interfaces
|
- network-interfaces
|
||||||
|
|
|
@ -8,5 +8,5 @@
|
||||||
adh: '{{ glob_adh | combine(loc_adh | default({}), recursive=True) }}'
|
adh: '{{ glob_adh | combine(loc_adh | default({}), recursive=True) }}'
|
||||||
roles:
|
roles:
|
||||||
- zamok-tools
|
- zamok-tools
|
||||||
# - postfix
|
# - postfix
|
||||||
- prometheus-node-exporter-postfix
|
- prometheus-node-exporter-postfix
|
||||||
|
|
|
@ -1,3 +1,4 @@
|
||||||
|
---
|
||||||
- name: Create base directory
|
- name: Create base directory
|
||||||
file:
|
file:
|
||||||
path: "{{ autoconfig.path }}/mail"
|
path: "{{ autoconfig.path }}/mail"
|
||||||
|
|
|
@ -11,9 +11,9 @@
|
||||||
|
|
||||||
- name: Create borgbackup user
|
- name: Create borgbackup user
|
||||||
user:
|
user:
|
||||||
create_home: yes
|
create_home: true
|
||||||
home: '/var/lib/borg/'
|
home: '/var/lib/borg/'
|
||||||
system: yes
|
system: true
|
||||||
state: present
|
state: present
|
||||||
update_password: always
|
update_password: always
|
||||||
name: borg
|
name: borg
|
||||||
|
|
|
@ -53,7 +53,7 @@
|
||||||
owner: root
|
owner: root
|
||||||
group: utmp
|
group: utmp
|
||||||
mode: '4755'
|
mode: '4755'
|
||||||
check_mode: no
|
check_mode: false
|
||||||
|
|
||||||
- name: Deploy screen tmpfile
|
- name: Deploy screen tmpfile
|
||||||
template:
|
template:
|
||||||
|
|
|
@ -17,7 +17,7 @@
|
||||||
git:
|
git:
|
||||||
repo: '{{ django_cas.repo }}'
|
repo: '{{ django_cas.repo }}'
|
||||||
dest: '{{ django_cas.path }}'
|
dest: '{{ django_cas.path }}'
|
||||||
force: yes
|
force: true
|
||||||
version: master
|
version: master
|
||||||
umask: '002'
|
umask: '002'
|
||||||
|
|
||||||
|
|
|
@ -2,4 +2,4 @@
|
||||||
- name: Restart dovecot
|
- name: Restart dovecot
|
||||||
service:
|
service:
|
||||||
name: dovecot
|
name: dovecot
|
||||||
state: restarted
|
state: restarted
|
||||||
|
|
|
@ -1,3 +1,4 @@
|
||||||
|
---
|
||||||
- name: Install dovecot
|
- name: Install dovecot
|
||||||
apt:
|
apt:
|
||||||
update_cache: true
|
update_cache: true
|
||||||
|
@ -23,4 +24,4 @@
|
||||||
- conf.d/10-ssl.conf
|
- conf.d/10-ssl.conf
|
||||||
- conf.d/auth-system.conf.ext
|
- conf.d/auth-system.conf.ext
|
||||||
- dovecot-ldap.conf.ext
|
- dovecot-ldap.conf.ext
|
||||||
notify: Restart dovecot
|
notify: Restart dovecot
|
||||||
|
|
|
@ -4,5 +4,3 @@
|
||||||
name: "{{ item.name }}"
|
name: "{{ item.name }}"
|
||||||
state: restarted
|
state: restarted
|
||||||
loop: "{{ etherpad.instances }}"
|
loop: "{{ etherpad.instances }}"
|
||||||
|
|
||||||
|
|
||||||
|
|
|
@ -10,7 +10,7 @@
|
||||||
- php-mbstring
|
- php-mbstring
|
||||||
- php-mysql
|
- php-mysql
|
||||||
- composer
|
- composer
|
||||||
- python3-passlib # Necessary for htpasswd module
|
- python3-passlib # Necessary for htpasswd module
|
||||||
- python3-pymysql
|
- python3-pymysql
|
||||||
- mariadb-server
|
- mariadb-server
|
||||||
register: apt_result
|
register: apt_result
|
||||||
|
|
|
@ -44,21 +44,21 @@
|
||||||
src: /var/www/re2o/freeradius_utils/auth.py
|
src: /var/www/re2o/freeradius_utils/auth.py
|
||||||
dest: /etc/freeradius/3.0/auth.py
|
dest: /etc/freeradius/3.0/auth.py
|
||||||
state: link
|
state: link
|
||||||
force: yes
|
force: true
|
||||||
notify: Restart freeradius
|
notify: Restart freeradius
|
||||||
|
|
||||||
- name: Ensure ${certdir}/letsencrypt directory exists
|
- name: Ensure ${certdir}/letsencrypt directory exists
|
||||||
file:
|
file:
|
||||||
path: /etc/freeradius/3.0/certs/letsencrypt
|
path: /etc/freeradius/3.0/certs/letsencrypt
|
||||||
state: directory
|
state: directory
|
||||||
recurse: yes
|
recurse: true
|
||||||
|
|
||||||
- name: Symlink radius certificates
|
- name: Symlink radius certificates
|
||||||
file:
|
file:
|
||||||
src: /etc/letsencrypt/live/crans.org/{{ item }}
|
src: /etc/letsencrypt/live/crans.org/{{ item }}
|
||||||
dest: /etc/freeradius/3.0/certs/letsencrypt/{{ item }}
|
dest: /etc/freeradius/3.0/certs/letsencrypt/{{ item }}
|
||||||
state: link
|
state: link
|
||||||
force: yes
|
force: true
|
||||||
loop:
|
loop:
|
||||||
- fullchain.pem
|
- fullchain.pem
|
||||||
- privkey.pem
|
- privkey.pem
|
||||||
|
@ -68,7 +68,7 @@
|
||||||
path: /etc/letsencrypt/{{ item }}
|
path: /etc/letsencrypt/{{ item }}
|
||||||
group: freerad
|
group: freerad
|
||||||
mode: '0755'
|
mode: '0755'
|
||||||
recurse: yes
|
recurse: true
|
||||||
loop:
|
loop:
|
||||||
- live
|
- live
|
||||||
- archive
|
- archive
|
||||||
|
|
|
@ -75,8 +75,8 @@
|
||||||
- name: Enable systemd unit
|
- name: Enable systemd unit
|
||||||
systemd:
|
systemd:
|
||||||
name: galene
|
name: galene
|
||||||
enabled: yes
|
enabled: true
|
||||||
daemon_reload: yes
|
daemon_reload: true
|
||||||
state: started
|
state: started
|
||||||
|
|
||||||
- name: Indicate role in motd
|
- name: Indicate role in motd
|
||||||
|
|
|
@ -1,6 +1,4 @@
|
||||||
---
|
---
|
||||||
#- name: Install InspIRCd
|
|
||||||
|
|
||||||
- name: Deploy InspIRCd configuration
|
- name: Deploy InspIRCd configuration
|
||||||
template:
|
template:
|
||||||
src: "inspircd/{{ item.dest }}.j2"
|
src: "inspircd/{{ item.dest }}.j2"
|
||||||
|
@ -9,12 +7,12 @@
|
||||||
owner: irc
|
owner: irc
|
||||||
group: irc
|
group: irc
|
||||||
loop:
|
loop:
|
||||||
- { dest: inspircd.conf, mode: "0644" }
|
- {dest: inspircd.conf, mode: "0644"}
|
||||||
- { dest: links.conf, mode: "0600" }
|
- {dest: links.conf, mode: "0600"}
|
||||||
- { dest: power.conf, mode: "0600" }
|
- {dest: power.conf, mode: "0600"}
|
||||||
- { dest: opers.conf, mode: "0600" }
|
- {dest: opers.conf, mode: "0600"}
|
||||||
- { dest: modules.conf, mode: "0600" }
|
- {dest: modules.conf, mode: "0600"}
|
||||||
- { dest: inspircd.motd, mode: "0644" }
|
- {dest: inspircd.motd, mode: "0644"}
|
||||||
notify: Reload InspIRCd
|
notify: Reload InspIRCd
|
||||||
|
|
||||||
- name: Deploy certificate refresh CRON
|
- name: Deploy certificate refresh CRON
|
||||||
|
|
|
@ -56,4 +56,4 @@
|
||||||
name: keepalived
|
name: keepalived
|
||||||
daemon-reload: true
|
daemon-reload: true
|
||||||
state: started
|
state: started
|
||||||
enabled: yes
|
enabled: true
|
||||||
|
|
|
@ -1,11 +1,11 @@
|
||||||
---
|
---
|
||||||
#- name: Install linx
|
# - name: Install linx
|
||||||
|
|
||||||
- name: Create linx user
|
- name: Create linx user
|
||||||
user:
|
user:
|
||||||
create_home: yes
|
create_home: true
|
||||||
home: /var/lib/linx
|
home: /var/lib/linx
|
||||||
system: yes
|
system: true
|
||||||
state: present
|
state: present
|
||||||
password: "!"
|
password: "!"
|
||||||
update_password: always
|
update_password: always
|
||||||
|
|
|
@ -16,11 +16,10 @@
|
||||||
- name: Disable and mask rpcbind.service
|
- name: Disable and mask rpcbind.service
|
||||||
systemd:
|
systemd:
|
||||||
name: rpcbind.service
|
name: rpcbind.service
|
||||||
enabled: no
|
enabled: false
|
||||||
masked: yes
|
masked: true
|
||||||
|
|
||||||
- name:
|
- name:
|
||||||
systemd:
|
systemd:
|
||||||
name: rpcbind.socket
|
name: rpcbind.socket
|
||||||
masked: yes
|
masked: true
|
||||||
|
|
||||||
|
|
|
@ -12,7 +12,7 @@
|
||||||
path: /etc/default/ntp
|
path: /etc/default/ntp
|
||||||
regexp: '^NTPD_OPTS'
|
regexp: '^NTPD_OPTS'
|
||||||
line: NTPD_OPTS='-g -x'
|
line: NTPD_OPTS='-g -x'
|
||||||
check_mode: no
|
check_mode: false
|
||||||
|
|
||||||
- name: Configure NTP
|
- name: Configure NTP
|
||||||
template:
|
template:
|
||||||
|
|
|
@ -4,7 +4,7 @@
|
||||||
apt:
|
apt:
|
||||||
update_cache: true
|
update_cache: true
|
||||||
name:
|
name:
|
||||||
- gpg
|
- gpg
|
||||||
register: apt_result
|
register: apt_result
|
||||||
retries: 3
|
retries: 3
|
||||||
until: apt_result is succeeded
|
until: apt_result is succeeded
|
||||||
|
|
|
@ -1,3 +1,4 @@
|
||||||
|
---
|
||||||
- name: Install policyd-rate-limit
|
- name: Install policyd-rate-limit
|
||||||
apt:
|
apt:
|
||||||
update_cache: true
|
update_cache: true
|
||||||
|
@ -17,8 +18,8 @@
|
||||||
dest: "{{ item.dest }}"
|
dest: "{{ item.dest }}"
|
||||||
chmod: 0640
|
chmod: 0640
|
||||||
loop:
|
loop:
|
||||||
- { src: policyd/policyd-rate-limit.yaml.j2, dest: /etc/policyd-rate-limit.yaml }
|
- {src: policyd/policyd-rate-limit.yaml.j2, dest: /etc/policyd-rate-limit.yaml}
|
||||||
- { src: policyd/policyd.py.j2, dest: /usr/lib/python3/dist-packages/policyd_rate_limit }
|
- {src: policyd/policyd.py.j2, dest: /usr/lib/python3/dist-packages/policyd_rate_limit}
|
||||||
when: postfix.primary
|
when: postfix.primary
|
||||||
|
|
||||||
- name: Indicate role in motd
|
- name: Indicate role in motd
|
||||||
|
|
|
@ -46,8 +46,8 @@
|
||||||
owner: postgres
|
owner: postgres
|
||||||
group: postgres
|
group: postgres
|
||||||
loop:
|
loop:
|
||||||
- pg_hba.conf
|
- pg_hba.conf
|
||||||
- pg_ident.conf
|
- pg_ident.conf
|
||||||
notify:
|
notify:
|
||||||
- reload postgresql
|
- reload postgresql
|
||||||
when: 'not(postgres.replica | default(False))'
|
when: 'not(postgres.replica | default(False))'
|
||||||
|
|
|
@ -6,4 +6,4 @@
|
||||||
|
|
||||||
- name: systemctl daemon-reload
|
- name: systemctl daemon-reload
|
||||||
systemd:
|
systemd:
|
||||||
daemon_reload: yes
|
daemon_reload: true
|
||||||
|
|
|
@ -40,7 +40,7 @@
|
||||||
|
|
||||||
- name: systemctl daemon-reload
|
- name: systemctl daemon-reload
|
||||||
systemd:
|
systemd:
|
||||||
daemon_reload: yes
|
daemon_reload: true
|
||||||
when: override.changed
|
when: override.changed
|
||||||
|
|
||||||
- name: Activate prometheus-node-exporter service
|
- name: Activate prometheus-node-exporter service
|
||||||
|
|
|
@ -99,11 +99,11 @@
|
||||||
|
|
||||||
- name: Enable LDAPS
|
- name: Enable LDAPS
|
||||||
lineinfile:
|
lineinfile:
|
||||||
path: /etc/default/slapd
|
path: /etc/default/slapd
|
||||||
regexp: '^SLAPD_SERVICES='
|
regexp: '^SLAPD_SERVICES='
|
||||||
line: 'SLAPD_SERVICES="ldap:/// ldaps:/// ldapi:///"'
|
line: 'SLAPD_SERVICES="ldap:/// ldaps:/// ldapi:///"'
|
||||||
notify: Restart slapd
|
notify: Restart slapd
|
||||||
check_mode: no
|
check_mode: false
|
||||||
|
|
||||||
- name: Touch installation marker
|
- name: Touch installation marker
|
||||||
when: not installation.stat.exists
|
when: not installation.stat.exists
|
||||||
|
|
|
@ -21,15 +21,15 @@
|
||||||
owner: openldap
|
owner: openldap
|
||||||
group: openldap
|
group: openldap
|
||||||
loop:
|
loop:
|
||||||
- { dest: slapd.conf, mode: "0600" }
|
- {dest: slapd.conf, mode: "0600"}
|
||||||
- { dest: ldap.key, mode: "0600" }
|
- {dest: ldap.key, mode: "0600"}
|
||||||
- { dest: ldap.pem, mode: "0644" }
|
- {dest: ldap.pem, mode: "0644"}
|
||||||
notify: Restart slapd
|
notify: Restart slapd
|
||||||
|
|
||||||
- name: Deploy ldap services
|
- name: Deploy ldap services
|
||||||
lineinfile:
|
lineinfile:
|
||||||
path: /etc/default/slapd
|
path: /etc/default/slapd
|
||||||
regexp: '^SLAPD_SERVICES='
|
regexp: '^SLAPD_SERVICES='
|
||||||
line: 'SLAPD_SERVICES="ldaps://{{ slapd.ip }}/ ldapi:///"'
|
line: 'SLAPD_SERVICES="ldaps://{{ slapd.ip }}/ ldapi:///"'
|
||||||
notify: Restart slapd
|
notify: Restart slapd
|
||||||
check_mode: no
|
check_mode: false
|
||||||
|
|
|
@ -3,13 +3,13 @@
|
||||||
unarchive:
|
unarchive:
|
||||||
src: https://github.com/statping/statping/releases/download/v0.90.74/statping-linux-amd64.tar.gz
|
src: https://github.com/statping/statping/releases/download/v0.90.74/statping-linux-amd64.tar.gz
|
||||||
dest: /usr/local/bin/
|
dest: /usr/local/bin/
|
||||||
remote_src: yes
|
remote_src: true
|
||||||
|
|
||||||
- name: Create statping user
|
- name: Create statping user
|
||||||
user:
|
user:
|
||||||
create_home: yes
|
create_home: true
|
||||||
home: /var/lib/statping
|
home: /var/lib/statping
|
||||||
system: yes
|
system: true
|
||||||
state: present
|
state: present
|
||||||
password: "!"
|
password: "!"
|
||||||
update_password: always
|
update_password: always
|
||||||
|
|
|
@ -15,7 +15,7 @@
|
||||||
update_cache: true
|
update_cache: true
|
||||||
name:
|
name:
|
||||||
- apache2
|
- apache2
|
||||||
- bat # Rajouté par shirenn le 10/11/2021
|
- bat # Rajouté par shirenn le 10/11/2021
|
||||||
- bitlbee # Demande du 06/09/2017 17:40 sur #crans
|
- bitlbee # Demande du 06/09/2017 17:40 sur #crans
|
||||||
- byobu
|
- byobu
|
||||||
- cabal-install
|
- cabal-install
|
||||||
|
|
Loading…
Reference in New Issue