- Timestamp:
- Jun 7, 2017, 3:03:17 AM (8 years ago)
- Location:
- branches/3.3/ansible
- Files:
-
- 18 added
- 2 deleted
- 10 edited
Legend:
- Unmodified
- Added
- Removed
-
branches/3.3/ansible/handlers/main.yml
r3656 r3667 2 2 - name: restart httpd 3 3 service: name=httpd state=restarted 4 5 - name: reload httpd 6 service: name=httpd state=reloaded 7 8 - name: restart docker 9 service: name=docker state=restarted -
branches/3.3/ansible/inventory
r3657 r3667 37 37 www.mondorescue.org 38 38 39 [pb] 40 www.mondorescue.org 41 42 [docker] 43 www.mondorescue.org 44 45 [mageia-docker] 46 www.mondorescue.org 47 39 48 [system] 40 49 www.mondorescue.org -
branches/3.3/ansible/roles/rsync/tasks/main.yml
r3657 r3667 6 6 7 7 - name: Configure rsync 8 copy: src=templates/rsyncd.conf dest=/etc/rsyncd.conf owner=root group=root mode=0600 backup=yes8 template: src=templates/rsyncd.conf dest=/etc/rsyncd.conf owner=root group=root mode=0600 backup=yes 9 9 notify: 10 10 - restart rsync -
branches/3.3/ansible/roles/shorewall/defaults/main.yml
r3657 r3667 41 41 - { action: ACCEPT, source: net, destination: fw, protocol: tcp, destination_port: 20 } 42 42 - { action: ACCEPT, source: net, destination: fw, protocol: tcp, destination_port: 21 } 43 # Incoming SMTP 44 - { action: ACCEPT, source: "net:{{ smtp }}", destination: fw, protocol: tcp, destination_port: 25 } 43 45 # Incoming NTP 44 46 - { action: ACCEPT, source: net, destination: fw, protocol: tcp, destination_port: 123 } … … 60 62 - { action: ACCEPT, source: fw, destination: net, protocol: tcp, destination_port: 9999 } 61 63 # Outgoing SMTP 62 - { action: ACCEPT, source: fw, destination: net:{{ smtp }}, protocol: tcp, destination_port: 25 } 64 - { action: ACCEPT, source: fw, destination: "net:{{ smtp }}", protocol: tcp, destination_port: 25 } 65 # Outgoing SSH 66 - { action: ACCEPT, source: fw, destination: net, protocol: tcp, destination_port: 22 } 63 67 # Outgoing PING 64 68 - { action: ACCEPT, source: fw, destination: net, protocol: icmp, destination_port: 8 } -
branches/3.3/ansible/roles/smtp/handlers/main.yml
r3655 r3667 4 4 notify: 5 5 - restart postfix 6 - redo postalias 6 7 7 8 - name: restart postfix 8 9 service: name=postfix state=restarted 10 11 - name: redo postalias 12 command: /usr/sbin/postalias /etc/postfix/aliases -
branches/3.3/ansible/roles/system/tasks/main.yml
r3657 r3667 2 2 3 3 - name: Check that IP address is setup 4 copy: src=templates/ifcfg-enp2s0f0 dest=/etc/sysconfig/network-scripts/ifcfg-enp2s0f0 owner=root group=root mode=0600 backup=yes4 template: src=templates/ifcfg-enp2s0f0 dest=/etc/sysconfig/network-scripts/ifcfg-enp2s0f0 owner=root group=root mode=0600 backup=yes 5 5 tags: system 6 6 7 7 - name: Check that GW is setup 8 copy: src=templates/network dest=/etc/sysconfig/network owner=root group=root mode=0600 backup=yes8 template: src=templates/network dest=/etc/sysconfig/network owner=root group=root mode=0600 backup=yes 9 9 tags: system 10 10 … … 28 28 tags: system 29 29 30 - name: Ensure the fwadmin groupexists31 group: name= fwadminstate=present30 - name: Ensure the groups exists 31 group: name={{ item }} state=present 32 32 tags: system 33 with_items: 34 - fwadmin 35 - bruno 33 36 34 - name: Ensure the fwadmin accountexists35 user: name= fwadmin state=present group=fwadmin home=/home/fwadminmove_home=yes37 - name: Ensure the accounts exists 38 user: name={{ item }} state=present group={{ item }} home=/home/{{ item }} move_home=yes 36 39 tags: system 40 with_items: 41 - fwadmin 42 - bruno 37 43 38 - name: Copy public for fwadmin access 39 lineinfile: destfile=/home/{{ item }}/.ssh/authorized_keys state=present line='{{ sshkey }}' owner={{item }} group={{item }} mode=0600 backup=yes 44 - name: Copy special keys for remote access (git...) 45 copy: src=/users/bruno/prj/musique-ancienne.org/mondorescue.org/{{ item.f }} dest=/home/bruno/{{ item.f }} mode={{ item.m }} backup=yes owner=bruno group=bruno 46 with_items: 47 - { f: .ssh, m: 700 } 48 - { f: .ssh/id_rsa, m: 600 } 49 - { f: .ssh/id_rsa.pub, m: 644 } 50 51 - name: Copy public keys for access 52 lineinfile: destfile=/home/{{ item }}/.ssh/authorized_keys state=present line='{{ sshkey }}' mode=0600 backup=yes owner={{ item }} group={{ item }} 40 53 with_items: 41 54 - fwadmin … … 52 65 53 66 - name: Check that sshutout is configured 54 copy: src=templates/sshutout.conf dest=/etc/sshtout.conf owner=root group=root mode=0600 backup=yes67 template: src=templates/sshutout.conf dest=/etc/sshutout.conf owner=root group=root mode=0600 backup=yes 55 68 notify: 56 69 - restart sshutout -
branches/3.3/ansible/roles/system/templates/ifcfg-enp2s0f0
r3657 r3667 1 1 DEVICE=enp2s0f0 2 2 BOOTPROTO=static 3 IPADDR={{ ip_int } 3 IPADDR={{ ip_int }} 4 4 NETMASK={{ netmask_int }} 5 5 ONBOOT=yes -
branches/3.3/ansible/roles/system/templates/sshutout.conf
r3657 r3667 56 56 57 57 #whitelist = 58 whitelist = {{ hyperlinux }} , hpecore.net58 whitelist = {{ hyperlinux }} 59 59 60 60 # Enabled by default, this parameter automatically whitelists -
branches/3.3/ansible/roles/urpmi/tasks/main.yml
r3657 r3667 18 18 - { pkg: rsyslog } 19 19 - { pkg: rsyslog-journald } 20 - { pkg: mlocate } -
branches/3.3/ansible/site.yml
r3657 r3667 10 10 - include: git.yml 11 11 - include: rsync.yml 12 - include: docker.yml 13 - include: pb.yml 14 - include: mageia-docker.yml
Note:
See TracChangeset
for help on using the changeset viewer.