ansible lint additions, .yamllint.yml configuratuion
This commit is contained in:
2
.yamllint.yml
Normal file
2
.yamllint.yml
Normal file
@@ -0,0 +1,2 @@
|
|||||||
|
rules:
|
||||||
|
braces: disable
|
||||||
2
Makefile
2
Makefile
@@ -75,4 +75,4 @@ lint-ci: ${SKIP_FILE}
|
|||||||
@printf "Running yamllint...\n"
|
@printf "Running yamllint...\n"
|
||||||
@yamllint ${YAML_FILES}
|
@yamllint ${YAML_FILES}
|
||||||
@. ${SKIP_FILE}; printf "Running ansible-lint with SKIP_LIST: [%s]...\n" "$$ANSIBLE_LINT_SKIP_LIST"
|
@. ${SKIP_FILE}; printf "Running ansible-lint with SKIP_LIST: [%s]...\n" "$$ANSIBLE_LINT_SKIP_LIST"
|
||||||
@. ${SKIP_FILE}; ansible-lint -x $$ANSIBLE_LINT_SKIP_LIST ${YAML_FILES}
|
@. ${SKIP_FILE}; ansible-lint -x $$ANSIBLE_LINT_SKIP_LIST ansible/
|
||||||
|
|||||||
@@ -1,19 +1,17 @@
|
|||||||
---
|
---
|
||||||
- hosts: all
|
- hosts: all
|
||||||
vars_files:
|
vars_files:
|
||||||
- vars/vault.yml
|
- vars/vault.yml
|
||||||
roles:
|
roles:
|
||||||
- role: common
|
- role: common
|
||||||
- role: git
|
- role: git
|
||||||
- role: ddns
|
- role: ddns
|
||||||
- role: ssl
|
- role: ssl
|
||||||
- role: pihole
|
- role: pihole
|
||||||
- role: http
|
- role: http
|
||||||
- role: drone
|
- role: drone
|
||||||
- role: hass
|
- role: hass
|
||||||
- role: nfs
|
- role: motion
|
||||||
tags: nfs
|
tags: motion
|
||||||
- role: motion
|
- role: partkeepr
|
||||||
tags: motion
|
tags: partkeepr
|
||||||
- role: partkeepr
|
|
||||||
tags: partkeepr
|
|
||||||
|
|||||||
@@ -1,12 +1,12 @@
|
|||||||
---
|
---
|
||||||
- name: restart_sshd
|
- name: restart_sshd
|
||||||
become: true
|
become: true
|
||||||
service:
|
ansible.builtin.service:
|
||||||
name: sshd
|
name: sshd
|
||||||
state: restarted
|
state: restarted
|
||||||
|
|
||||||
- name: restart_fail2ban
|
- name: restart_fail2ban
|
||||||
become: true
|
become: true
|
||||||
service:
|
ansible.builtin.service:
|
||||||
name: fail2ban
|
name: fail2ban
|
||||||
state: restarted
|
state: restarted
|
||||||
|
|||||||
@@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
- name: install common dependencies
|
- name: install common dependencies
|
||||||
become: true
|
become: true
|
||||||
pacman:
|
community.general.pacman:
|
||||||
name: "{{ deps }}"
|
name: "{{ deps }}"
|
||||||
state: present
|
state: present
|
||||||
tags: deps
|
tags: deps
|
||||||
|
|||||||
@@ -1,20 +1,20 @@
|
|||||||
---
|
---
|
||||||
- name: ensure sshd disallows passwords
|
- name: ensure sshd disallows passwords
|
||||||
become: true
|
become: true
|
||||||
lineinfile:
|
ansible.builtin.lineinfile:
|
||||||
path: /etc/ssh/sshd_config
|
path: /etc/ssh/sshd_config
|
||||||
regexp: "{{ item.re }}"
|
regexp: "{{ item.re }}"
|
||||||
line: "{{ item.li }}"
|
line: "{{ item.li }}"
|
||||||
loop:
|
loop:
|
||||||
- {re: '^[# ]*PasswordAuthentication ', li: 'PasswordAuthentication no'}
|
- { re: "^[# ]*PasswordAuthentication ", li: "PasswordAuthentication no" }
|
||||||
- {re: '^[# ]*PermitEmptyPasswords ', li: 'PermitEmptyPasswords no'}
|
- { re: "^[# ]*PermitEmptyPasswords ", li: "PermitEmptyPasswords no" }
|
||||||
- {re: '^[# ]*PermitRootLogin ', li: 'PermitRootLogin no'}
|
- { re: "^[# ]*PermitRootLogin ", li: "PermitRootLogin no" }
|
||||||
notify: restart_sshd
|
notify: restart_sshd
|
||||||
tags: security
|
tags: security
|
||||||
|
|
||||||
- name: setup fail2ban jails
|
- name: setup fail2ban jails
|
||||||
become: true
|
become: true
|
||||||
copy:
|
ansible.builtin.copy:
|
||||||
src: files/fail2ban/jails/{{ item }}
|
src: files/fail2ban/jails/{{ item }}
|
||||||
dest: /etc/fail2ban/jail.d/{{ item }}
|
dest: /etc/fail2ban/jail.d/{{ item }}
|
||||||
mode: 0644
|
mode: 0644
|
||||||
@@ -24,9 +24,9 @@
|
|||||||
|
|
||||||
- name: adjust fail2ban sshd filter
|
- name: adjust fail2ban sshd filter
|
||||||
become: true
|
become: true
|
||||||
lineinfile:
|
ansible.builtin.lineinfile:
|
||||||
path: /etc/fail2ban/filter.d/sshd.conf
|
path: /etc/fail2ban/filter.d/sshd.conf
|
||||||
regexp: '^[#]*filter ='
|
regexp: "^[#]*filter ="
|
||||||
line: 'filter = sshd[mode=extra]'
|
line: "filter = sshd[mode=extra]"
|
||||||
notify: restart_fail2ban
|
notify: restart_fail2ban
|
||||||
tags: security
|
tags: security
|
||||||
|
|||||||
@@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
- name: ensure desired services are started and enabled
|
- name: ensure desired services are started and enabled
|
||||||
become: true
|
become: true
|
||||||
service:
|
ansible.builtin.service:
|
||||||
name: "{{ item }}"
|
name: "{{ item }}"
|
||||||
state: started
|
state: started
|
||||||
enabled: true
|
enabled: true
|
||||||
|
|||||||
@@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
- name: create drone-ci server container
|
- name: create drone-ci server container
|
||||||
diff: false
|
diff: false
|
||||||
docker_container:
|
community.general.docker_container:
|
||||||
name: drone
|
name: drone
|
||||||
image: drone/drone:latest
|
image: drone/drone:latest
|
||||||
recreate: true
|
recreate: true
|
||||||
@@ -11,7 +11,7 @@
|
|||||||
env:
|
env:
|
||||||
DRONE_GITHUB_CLIENT_ID: "{{ drone_gh_client_id }}"
|
DRONE_GITHUB_CLIENT_ID: "{{ drone_gh_client_id }}"
|
||||||
DRONE_GITHUB_CLIENT_SECRET: "{{ drone_gh_client_sec }}"
|
DRONE_GITHUB_CLIENT_SECRET: "{{ drone_gh_client_sec }}"
|
||||||
DRONE_GIT_ALWAYS_AUTH: 'true'
|
DRONE_GIT_ALWAYS_AUTH: "true"
|
||||||
DRONE_RPC_SECRET: "{{ drone_rpc_secret }}"
|
DRONE_RPC_SECRET: "{{ drone_rpc_secret }}"
|
||||||
DRONE_SERVER_HOST: "{{ ci_server_name }}"
|
DRONE_SERVER_HOST: "{{ ci_server_name }}"
|
||||||
DRONE_SERVER_PROTO: "{{ drone_server_proto }}"
|
DRONE_SERVER_PROTO: "{{ drone_server_proto }}"
|
||||||
@@ -24,7 +24,7 @@
|
|||||||
|
|
||||||
- name: create drone-ci worker container
|
- name: create drone-ci worker container
|
||||||
diff: false
|
diff: false
|
||||||
docker_container:
|
community.general.docker_container:
|
||||||
name: drone-runner
|
name: drone-runner
|
||||||
image: drone/drone-runner-docker:latest
|
image: drone/drone-runner-docker:latest
|
||||||
recreate: true
|
recreate: true
|
||||||
|
|||||||
@@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
- name: start-gitdaemon
|
- name: start-gitdaemon
|
||||||
become: true
|
become: true
|
||||||
systemd:
|
ansible.builtin.systemd:
|
||||||
name: git-daemon.service
|
name: git-daemon.service
|
||||||
state: started
|
state: started
|
||||||
enabled: true
|
enabled: true
|
||||||
|
|||||||
@@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
- name: create the git daemon systemd service
|
- name: create the git daemon systemd service
|
||||||
become: true
|
become: true
|
||||||
template:
|
ansible.builtin.template:
|
||||||
src: "templates/{{ item }}.j2"
|
src: "templates/{{ item }}.j2"
|
||||||
dest: "/etc/systemd/system/{{ item }}"
|
dest: "/etc/systemd/system/{{ item }}"
|
||||||
mode: 0644
|
mode: 0644
|
||||||
|
|||||||
@@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
- name: create git user
|
- name: create git user
|
||||||
become: true
|
become: true
|
||||||
user:
|
ansible.builtin.user:
|
||||||
name: "{{ git_user }}"
|
name: "{{ git_user }}"
|
||||||
comment: Git user for SSH remotes
|
comment: Git user for SSH remotes
|
||||||
shell: /usr/bin/git-shell
|
shell: /usr/bin/git-shell
|
||||||
@@ -12,7 +12,7 @@
|
|||||||
- name: create git's .ssh directory
|
- name: create git's .ssh directory
|
||||||
become: true
|
become: true
|
||||||
become_user: git
|
become_user: git
|
||||||
file:
|
ansible.builtin.file:
|
||||||
path: "{{ git_home }}/.ssh"
|
path: "{{ git_home }}/.ssh"
|
||||||
state: directory
|
state: directory
|
||||||
mode: 0700
|
mode: 0700
|
||||||
@@ -20,7 +20,7 @@
|
|||||||
|
|
||||||
- name: check git authorized_keys exists
|
- name: check git authorized_keys exists
|
||||||
become: true
|
become: true
|
||||||
stat:
|
ansible.builtin.stat:
|
||||||
path: "{{ git_home }}/.ssh/authorized_keys"
|
path: "{{ git_home }}/.ssh/authorized_keys"
|
||||||
register: git_authfile
|
register: git_authfile
|
||||||
tags: git
|
tags: git
|
||||||
@@ -28,7 +28,7 @@
|
|||||||
- name: touch git authorized_keys
|
- name: touch git authorized_keys
|
||||||
become: true
|
become: true
|
||||||
become_user: git
|
become_user: git
|
||||||
file:
|
ansible.builtin.file:
|
||||||
path: "{{ git_home }}/.ssh/authorized_keys"
|
path: "{{ git_home }}/.ssh/authorized_keys"
|
||||||
state: touch
|
state: touch
|
||||||
mode: 0600
|
mode: 0600
|
||||||
|
|||||||
Binary file not shown.
@@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
- name: create home-assistant host directory volumes
|
- name: create home-assistant host directory volumes
|
||||||
become: true
|
become: true
|
||||||
file:
|
ansible.builtin.file:
|
||||||
path: "{{ item }}"
|
path: "{{ item }}"
|
||||||
state: directory
|
state: directory
|
||||||
mode: 0640
|
mode: 0640
|
||||||
@@ -13,7 +13,7 @@
|
|||||||
|
|
||||||
- name: copy configuration and automations
|
- name: copy configuration and automations
|
||||||
become: true
|
become: true
|
||||||
copy:
|
ansible.builtin.copy:
|
||||||
src: "files/{{ item }}"
|
src: "files/{{ item }}"
|
||||||
dest: "/var/lib/private/hass/{{ item }}"
|
dest: "/var/lib/private/hass/{{ item }}"
|
||||||
mode: 0644
|
mode: 0644
|
||||||
@@ -24,7 +24,7 @@
|
|||||||
|
|
||||||
- name: create home-assistant server container
|
- name: create home-assistant server container
|
||||||
diff: false
|
diff: false
|
||||||
docker_container:
|
community.general.docker_container:
|
||||||
name: hass
|
name: hass
|
||||||
image: ghcr.io/home-assistant/home-assistant:stable
|
image: ghcr.io/home-assistant/home-assistant:stable
|
||||||
recreate: true
|
recreate: true
|
||||||
|
|||||||
@@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
- name: restart_nginx
|
- name: restart_nginx
|
||||||
become: true
|
become: true
|
||||||
service:
|
ansible.builtin.service:
|
||||||
name: nginx
|
name: nginx
|
||||||
state: restarted
|
state: restarted
|
||||||
|
|||||||
@@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
- name: setup nginx base configuration
|
- name: setup nginx base configuration
|
||||||
become: true
|
become: true
|
||||||
copy:
|
ansible.builtin.copy:
|
||||||
src: files/nginx/nginx.conf
|
src: files/nginx/nginx.conf
|
||||||
dest: /etc/nginx/nginx.conf
|
dest: /etc/nginx/nginx.conf
|
||||||
mode: 0644
|
mode: 0644
|
||||||
@@ -10,7 +10,7 @@
|
|||||||
|
|
||||||
- name: setup nginx directories
|
- name: setup nginx directories
|
||||||
become: true
|
become: true
|
||||||
file:
|
ansible.builtin.file:
|
||||||
path: "/etc/nginx/{{ item }}"
|
path: "/etc/nginx/{{ item }}"
|
||||||
state: directory
|
state: directory
|
||||||
mode: 0755
|
mode: 0755
|
||||||
@@ -19,13 +19,14 @@
|
|||||||
- sites-available
|
- sites-available
|
||||||
tags: http
|
tags: http
|
||||||
|
|
||||||
- name: ensure http/s directories exist
|
- name: ensure http and letsencrypt directories exist
|
||||||
become: true
|
become: true
|
||||||
file:
|
ansible.builtin.file:
|
||||||
path: "{{ item }}"
|
path: "{{ item }}"
|
||||||
state: directory
|
state: directory
|
||||||
owner: http
|
owner: http
|
||||||
group: http
|
group: http
|
||||||
|
mode: 0644
|
||||||
loop:
|
loop:
|
||||||
- /srv/http
|
- /srv/http
|
||||||
- /srv/http/letsencrypt
|
- /srv/http/letsencrypt
|
||||||
@@ -33,16 +34,17 @@
|
|||||||
|
|
||||||
- name: chown http user home
|
- name: chown http user home
|
||||||
become: true
|
become: true
|
||||||
file:
|
ansible.builtin.file:
|
||||||
path: /srv/http
|
path: /srv/http
|
||||||
owner: http
|
owner: http
|
||||||
group: http
|
group: http
|
||||||
|
mode: 0644
|
||||||
recurse: true
|
recurse: true
|
||||||
tags: http
|
tags: http
|
||||||
|
|
||||||
- name: template nginx http sites-available
|
- name: template nginx http sites-available
|
||||||
become: true
|
become: true
|
||||||
template:
|
ansible.builtin.template:
|
||||||
src: "templates/nginx/sites/{{ item }}.j2"
|
src: "templates/nginx/sites/{{ item }}.j2"
|
||||||
dest: "/etc/nginx/sites-available/{{ item }}"
|
dest: "/etc/nginx/sites-available/{{ item }}"
|
||||||
mode: 0644
|
mode: 0644
|
||||||
@@ -58,14 +60,14 @@
|
|||||||
|
|
||||||
- name: remove pihole from sites-enabled if there
|
- name: remove pihole from sites-enabled if there
|
||||||
become: true
|
become: true
|
||||||
file:
|
ansible.builtin.file:
|
||||||
path: "/etc/nginx/sites-enabled/pi.hole.conf"
|
path: "/etc/nginx/sites-enabled/pi.hole.conf"
|
||||||
state: absent
|
state: absent
|
||||||
tags: http
|
tags: http
|
||||||
|
|
||||||
- name: enable desired nginx http sites
|
- name: enable desired nginx http sites
|
||||||
become: true
|
become: true
|
||||||
file:
|
ansible.builtin.file:
|
||||||
src: "/etc/nginx/sites-available/{{ item }}"
|
src: "/etc/nginx/sites-available/{{ item }}"
|
||||||
dest: "/etc/nginx/sites-enabled/{{ item }}"
|
dest: "/etc/nginx/sites-enabled/{{ item }}"
|
||||||
state: link
|
state: link
|
||||||
@@ -81,5 +83,6 @@
|
|||||||
|
|
||||||
- name: validate nginx configurations
|
- name: validate nginx configurations
|
||||||
become: true
|
become: true
|
||||||
shell: nginx -t
|
ansible.builtin.command: nginx -t
|
||||||
|
changed_when: false
|
||||||
tags: http
|
tags: http
|
||||||
|
|||||||
@@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
- name: template nginx https sites-available
|
- name: template nginx https sites-available
|
||||||
become: true
|
become: true
|
||||||
template:
|
ansible.builtin.template:
|
||||||
src: "templates/nginx/sites/{{ item }}.j2"
|
src: "templates/nginx/sites/{{ item }}.j2"
|
||||||
dest: "/etc/nginx/sites-available/{{ item }}"
|
dest: "/etc/nginx/sites-available/{{ item }}"
|
||||||
mode: 0644
|
mode: 0644
|
||||||
@@ -13,7 +13,7 @@
|
|||||||
|
|
||||||
- name: enable desired nginx https sites
|
- name: enable desired nginx https sites
|
||||||
become: true
|
become: true
|
||||||
file:
|
ansible.builtin.file:
|
||||||
src: "/etc/nginx/sites-available/{{ item }}"
|
src: "/etc/nginx/sites-available/{{ item }}"
|
||||||
dest: "/etc/nginx/sites-enabled/{{ item }}"
|
dest: "/etc/nginx/sites-enabled/{{ item }}"
|
||||||
state: link
|
state: link
|
||||||
|
|||||||
@@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
- name: create nginx/conf directory
|
- name: create nginx/conf directory
|
||||||
become: true
|
become: true
|
||||||
file:
|
ansible.builtin.file:
|
||||||
path: "{{ item }}"
|
path: "{{ item }}"
|
||||||
state: directory
|
state: directory
|
||||||
owner: root
|
owner: root
|
||||||
@@ -14,7 +14,7 @@
|
|||||||
|
|
||||||
- name: create modsec_includes.conf
|
- name: create modsec_includes.conf
|
||||||
become: true
|
become: true
|
||||||
copy:
|
ansible.builtin.copy:
|
||||||
src: files/nginx/modsec_includes.conf
|
src: files/nginx/modsec_includes.conf
|
||||||
dest: "{{ nginx_path }}/modsec_includes.conf"
|
dest: "{{ nginx_path }}/modsec_includes.conf"
|
||||||
mode: 0644
|
mode: 0644
|
||||||
@@ -23,7 +23,7 @@
|
|||||||
|
|
||||||
- name: clone coreruleset and modsecurity
|
- name: clone coreruleset and modsecurity
|
||||||
become: true
|
become: true
|
||||||
git:
|
ansible.builtin.git:
|
||||||
repo: "{{ item.src }}"
|
repo: "{{ item.src }}"
|
||||||
dest: "{{ item.dest }}"
|
dest: "{{ item.dest }}"
|
||||||
update: true
|
update: true
|
||||||
@@ -35,7 +35,7 @@
|
|||||||
|
|
||||||
- name: setup modsec and coreruleset configs
|
- name: setup modsec and coreruleset configs
|
||||||
become: true
|
become: true
|
||||||
copy:
|
ansible.builtin.copy:
|
||||||
src: "{{ item.src }}"
|
src: "{{ item.src }}"
|
||||||
dest: "{{ item.dest }}"
|
dest: "{{ item.dest }}"
|
||||||
force: true
|
force: true
|
||||||
@@ -47,7 +47,7 @@
|
|||||||
|
|
||||||
- name: setup coreruleset rules
|
- name: setup coreruleset rules
|
||||||
become: true
|
become: true
|
||||||
copy:
|
ansible.builtin.copy:
|
||||||
src: "{{ crs_rules_path }}/{{ item.name }}.conf"
|
src: "{{ crs_rules_path }}/{{ item.name }}.conf"
|
||||||
dest: "{{ modsec_rules_path }}/{{ item.name }}.conf"
|
dest: "{{ modsec_rules_path }}/{{ item.name }}.conf"
|
||||||
force: true
|
force: true
|
||||||
@@ -60,7 +60,7 @@
|
|||||||
|
|
||||||
- name: setup coreruleset data
|
- name: setup coreruleset data
|
||||||
become: true
|
become: true
|
||||||
copy:
|
ansible.builtin.copy:
|
||||||
src: "{{ crs_rules_path }}/{{ item }}.data"
|
src: "{{ crs_rules_path }}/{{ item }}.data"
|
||||||
dest: "{{ modsec_rules_path }}/{{ item }}.data"
|
dest: "{{ modsec_rules_path }}/{{ item }}.data"
|
||||||
force: true
|
force: true
|
||||||
@@ -72,7 +72,7 @@
|
|||||||
|
|
||||||
- name: whitelist local ip addresses
|
- name: whitelist local ip addresses
|
||||||
become: true
|
become: true
|
||||||
lineinfile:
|
ansible.builtin.lineinfile:
|
||||||
path: "{{ modsec_crs_before_rule_conf }}"
|
path: "{{ modsec_crs_before_rule_conf }}"
|
||||||
regexp: "{{ modsec_whitelist_local_re }}"
|
regexp: "{{ modsec_whitelist_local_re }}"
|
||||||
line: "{{ modsec_whitelist_local }}"
|
line: "{{ modsec_whitelist_local }}"
|
||||||
@@ -82,9 +82,9 @@
|
|||||||
|
|
||||||
- name: activate mod-security
|
- name: activate mod-security
|
||||||
become: true
|
become: true
|
||||||
lineinfile:
|
ansible.builtin.lineinfile:
|
||||||
path: /etc/nginx/modsecurity.conf
|
path: /etc/nginx/modsecurity.conf
|
||||||
regexp: '^SecRuleEngine'
|
regexp: "^SecRuleEngine"
|
||||||
line: 'SecRuleEngine On'
|
line: "SecRuleEngine On"
|
||||||
notify: restart_nginx
|
notify: restart_nginx
|
||||||
tags: modsec
|
tags: modsec
|
||||||
|
|||||||
@@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
- name: touch nginx logs, enable jail
|
- name: touch nginx logs, enable jail
|
||||||
become: true
|
become: true
|
||||||
file:
|
ansible.builtin.file:
|
||||||
path: "/var/log/nginx/{{ item }}.log"
|
path: "/var/log/nginx/{{ item }}.log"
|
||||||
state: touch
|
state: touch
|
||||||
mode: 0644
|
mode: 0644
|
||||||
|
|||||||
@@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
- name: restart_motion
|
- name: restart_motion
|
||||||
become: true
|
become: true
|
||||||
service:
|
ansible.builtin.service:
|
||||||
name: motion
|
name: motion
|
||||||
state: restarted
|
state: restarted
|
||||||
|
|||||||
@@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
- name: install shinobi dependencies
|
- name: install shinobi dependencies
|
||||||
become: true
|
become: true
|
||||||
pacman:
|
community.general.pacman:
|
||||||
name: "{{ deps }}"
|
name: "{{ deps }}"
|
||||||
state: present
|
state: present
|
||||||
tags:
|
tags:
|
||||||
|
|||||||
@@ -1,14 +1,14 @@
|
|||||||
---
|
---
|
||||||
- name: create shinobi user
|
- name: create shinobi user
|
||||||
become: true
|
become: true
|
||||||
user:
|
ansible.builtin.user:
|
||||||
name: "{{ motion_user }}"
|
name: "{{ motion_user }}"
|
||||||
shell: /bin/nologin
|
shell: /bin/nologin
|
||||||
tags: motion
|
tags: motion
|
||||||
|
|
||||||
- name: mount shinob videos folder
|
- name: mount shinob videos folder
|
||||||
become: true
|
become: true
|
||||||
file:
|
ansible.builtin.file:
|
||||||
path: /mnt/shinobi
|
path: /mnt/shinobi
|
||||||
state: directory
|
state: directory
|
||||||
owner: "{{ motion_user }}"
|
owner: "{{ motion_user }}"
|
||||||
@@ -18,7 +18,7 @@
|
|||||||
|
|
||||||
- name: mount smb via cifs
|
- name: mount smb via cifs
|
||||||
become: true
|
become: true
|
||||||
mount:
|
ansible.posix.mount:
|
||||||
path: /mnt/shinobi
|
path: /mnt/shinobi
|
||||||
src: "//{{ motion_hostname }}/share/GardenCamera"
|
src: "//{{ motion_hostname }}/share/GardenCamera"
|
||||||
fstype: cifs
|
fstype: cifs
|
||||||
@@ -29,13 +29,13 @@
|
|||||||
|
|
||||||
- name: create shinobi data volume
|
- name: create shinobi data volume
|
||||||
become: true
|
become: true
|
||||||
docker_volume:
|
community.general.docker_volume:
|
||||||
name: shinobi_data
|
name: shinobi_data
|
||||||
tags: motion
|
tags: motion
|
||||||
|
|
||||||
- name: create shinobi server container
|
- name: create shinobi server container
|
||||||
diff: false
|
diff: false
|
||||||
docker_container:
|
community.general.docker_container:
|
||||||
name: shinobi
|
name: shinobi
|
||||||
image: migoller/shinobidocker:latest
|
image: migoller/shinobidocker:latest
|
||||||
recreate: true
|
recreate: true
|
||||||
|
|||||||
@@ -1,10 +0,0 @@
|
|||||||
---
|
|
||||||
deps: [
|
|
||||||
nfs-utils,
|
|
||||||
samba
|
|
||||||
]
|
|
||||||
|
|
||||||
nfs_root: /srv/nfs
|
|
||||||
|
|
||||||
nfs_user: nfs
|
|
||||||
nfs_group: nfsshare
|
|
||||||
@@ -1 +0,0 @@
|
|||||||
/srv/nfs/ 192.168.1.0/24(rw,sync,all_squash,anonuid=2021,anongid=2021,insecure,no_subtree_check)
|
|
||||||
@@ -1,223 +0,0 @@
|
|||||||
# This is the main Samba configuration file. You should read the
|
|
||||||
# smb.conf(5) manual page in order to understand the options listed
|
|
||||||
# here. Samba has a huge number of configurable options (perhaps too
|
|
||||||
# many!) most of which are not shown in this example
|
|
||||||
#
|
|
||||||
# For a step to step guide on installing, configuring and using samba,
|
|
||||||
# read the Samba-HOWTO-Collection. This may be obtained from:
|
|
||||||
# http://www.samba.org/samba/docs/Samba-HOWTO-Collection.pdf
|
|
||||||
#
|
|
||||||
# Many working examples of smb.conf files can be found in the
|
|
||||||
# Samba-Guide which is generated daily and can be downloaded from:
|
|
||||||
# http://www.samba.org/samba/docs/Samba-Guide.pdf
|
|
||||||
#
|
|
||||||
# Any line which starts with a ; (semi-colon) or a # (hash)
|
|
||||||
# is a comment and is ignored. In this example we will use a #
|
|
||||||
# for commentry and a ; for parts of the config file that you
|
|
||||||
# may wish to enable
|
|
||||||
#
|
|
||||||
# NOTE: Whenever you modify this file you should run the command "testparm"
|
|
||||||
# to check that you have not made any basic syntactic errors.
|
|
||||||
#
|
|
||||||
#======================= Global Settings =====================================
|
|
||||||
[global]
|
|
||||||
|
|
||||||
# workgroup = NT-Domain-Name or Workgroup-Name, eg: MIDEARTH
|
|
||||||
workgroup = WORKGROUP
|
|
||||||
|
|
||||||
# server string is the equivalent of the NT Description field
|
|
||||||
server string = NFS Storage
|
|
||||||
|
|
||||||
# Server role. Defines in which mode Samba will operate. Possible
|
|
||||||
# values are "standalone server", "member server", "classic primary
|
|
||||||
# domain controller", "classic backup domain controller", "active
|
|
||||||
# directory domain controller".
|
|
||||||
#
|
|
||||||
# Most people will want "standalone server" or "member server".
|
|
||||||
# Running as "active directory domain controller" will require first
|
|
||||||
# running "samba-tool domain provision" to wipe databases and create a
|
|
||||||
# new domain.
|
|
||||||
server role = standalone server
|
|
||||||
|
|
||||||
# This option is important for security. It allows you to restrict
|
|
||||||
# connections to machines which are on your local network. The
|
|
||||||
# following example restricts access to two C class networks and
|
|
||||||
# the "loopback" interface. For more examples of the syntax see
|
|
||||||
# the smb.conf man page
|
|
||||||
; hosts allow = 192.168.1. 192.168.2. 127.
|
|
||||||
|
|
||||||
# Uncomment this if you want a guest account, you must add this to /etc/passwd
|
|
||||||
# otherwise the user "nobody" is used
|
|
||||||
guest account = nfs
|
|
||||||
|
|
||||||
# this tells Samba to use a separate log file for each machine
|
|
||||||
# that connects
|
|
||||||
log file = /var/log/samba/%m.log
|
|
||||||
|
|
||||||
# Put a capping on the size of the log files (in Kb).
|
|
||||||
max log size = 50
|
|
||||||
|
|
||||||
# Specifies the Kerberos or Active Directory realm the host is part of
|
|
||||||
; realm = MY_REALM
|
|
||||||
|
|
||||||
# Backend to store user information in. New installations should
|
|
||||||
# use either tdbsam or ldapsam. smbpasswd is available for backwards
|
|
||||||
# compatibility. tdbsam requires no further configuration.
|
|
||||||
; passdb backend = tdbsam
|
|
||||||
|
|
||||||
# Using the following line enables you to customise your configuration
|
|
||||||
# on a per machine basis. The %m gets replaced with the netbios name
|
|
||||||
# of the machine that is connecting.
|
|
||||||
# Note: Consider carefully the location in the configuration file of
|
|
||||||
# this line. The included file is read at that point.
|
|
||||||
; include = /usr/local/samba/lib/smb.conf.%m
|
|
||||||
|
|
||||||
# Configure Samba to use multiple interfaces
|
|
||||||
# If you have multiple network interfaces then you must list them
|
|
||||||
# here. See the man page for details.
|
|
||||||
interfaces = 192.168.1.0/24
|
|
||||||
|
|
||||||
# Where to store roving profiles (only for Win95 and WinNT)
|
|
||||||
# %L substitutes for this servers netbios name, %U is username
|
|
||||||
# You must uncomment the [Profiles] share below
|
|
||||||
; logon path = \\%L\Profiles\%U
|
|
||||||
|
|
||||||
# Windows Internet Name Serving Support Section:
|
|
||||||
# WINS Support - Tells the NMBD component of Samba to enable it's WINS Server
|
|
||||||
; wins support = yes
|
|
||||||
|
|
||||||
# WINS Server - Tells the NMBD components of Samba to be a WINS Client
|
|
||||||
# Note: Samba can be either a WINS Server, or a WINS Client, but NOT both
|
|
||||||
; wins server = w.x.y.z
|
|
||||||
|
|
||||||
# WINS Proxy - Tells Samba to answer name resolution queries on
|
|
||||||
# behalf of a non WINS capable client, for this to work there must be
|
|
||||||
# at least one WINS Server on the network. The default is NO.
|
|
||||||
; wins proxy = yes
|
|
||||||
|
|
||||||
# DNS Proxy - tells Samba whether or not to try to resolve NetBIOS names
|
|
||||||
# via DNS nslookups. The default is NO.
|
|
||||||
dns proxy = no
|
|
||||||
|
|
||||||
# These scripts are used on a domain controller or stand-alone
|
|
||||||
# machine to add or delete corresponding unix accounts
|
|
||||||
; add user script = /usr/sbin/useradd %u
|
|
||||||
; add group script = /usr/sbin/groupadd %g
|
|
||||||
; add machine script = /usr/sbin/adduser -n -g machines -c Machine -d /dev/null -s /bin/false %u
|
|
||||||
; delete user script = /usr/sbin/userdel %u
|
|
||||||
; delete user from group script = /usr/sbin/deluser %u %g
|
|
||||||
; delete group script = /usr/sbin/groupdel %g
|
|
||||||
|
|
||||||
|
|
||||||
#============================ Share Definitions ==============================
|
|
||||||
[homes]
|
|
||||||
comment = Home Directories
|
|
||||||
browseable = no
|
|
||||||
writable = no
|
|
||||||
|
|
||||||
# Un-comment the following and create the netlogon directory for Domain Logons
|
|
||||||
; [netlogon]
|
|
||||||
; comment = Network Logon Service
|
|
||||||
; path = /usr/local/samba/lib/netlogon
|
|
||||||
; guest ok = yes
|
|
||||||
; writable = no
|
|
||||||
; share modes = no
|
|
||||||
|
|
||||||
|
|
||||||
# Un-comment the following to provide a specific roving profile share
|
|
||||||
# the default is to use the user's home directory
|
|
||||||
;[Profiles]
|
|
||||||
; path = /usr/local/samba/profiles
|
|
||||||
; browseable = no
|
|
||||||
; guest ok = yes
|
|
||||||
|
|
||||||
|
|
||||||
# NOTE: If you have a BSD-style print system there is no need to
|
|
||||||
# specifically define each individual printer
|
|
||||||
;[printers]
|
|
||||||
; comment = All Printers
|
|
||||||
; path = /usr/spool/samba
|
|
||||||
; browseable = no
|
|
||||||
;# Set public = yes to allow user 'guest account' to print
|
|
||||||
; guest ok = no
|
|
||||||
; writable = no
|
|
||||||
; printable = no
|
|
||||||
|
|
||||||
# This one is useful for people to share files
|
|
||||||
;[tmp]
|
|
||||||
; comment = Temporary file space
|
|
||||||
; path = /tmp
|
|
||||||
; read only = no
|
|
||||||
; public = yes
|
|
||||||
|
|
||||||
# A publicly accessible directory, but read only, except for people in
|
|
||||||
# the "staff" group
|
|
||||||
;[public]
|
|
||||||
; comment = NFS Store
|
|
||||||
; path = /srv/nfs
|
|
||||||
; public = yes
|
|
||||||
; writable = yes
|
|
||||||
; printable = no
|
|
||||||
; write list = @staff
|
|
||||||
|
|
||||||
# Other examples.
|
|
||||||
#
|
|
||||||
# A private printer, usable only by fred. Spool data will be placed in fred's
|
|
||||||
# home directory. Note that fred must have write access to the spool directory,
|
|
||||||
# wherever it is.
|
|
||||||
;[fredsprn]
|
|
||||||
; comment = Fred's Printer
|
|
||||||
; valid users = fred
|
|
||||||
; path = /homes/fred
|
|
||||||
; printer = freds_printer
|
|
||||||
; public = no
|
|
||||||
; writable = no
|
|
||||||
; printable = yes
|
|
||||||
|
|
||||||
# A private directory, usable only by fred. Note that fred requires write
|
|
||||||
# access to the directory.
|
|
||||||
;[fredsdir]
|
|
||||||
; comment = Fred's Service
|
|
||||||
; path = /usr/somewhere/private
|
|
||||||
; valid users = fred
|
|
||||||
; public = no
|
|
||||||
; writable = yes
|
|
||||||
; printable = no
|
|
||||||
|
|
||||||
# a service which has a different directory for each machine that connects
|
|
||||||
# this allows you to tailor configurations to incoming machines. You could
|
|
||||||
# also use the %U option to tailor it by user name.
|
|
||||||
# The %m gets replaced with the machine name that is connecting.
|
|
||||||
;[pchome]
|
|
||||||
; comment = PC Directories
|
|
||||||
; path = /usr/pc/%m
|
|
||||||
; public = no
|
|
||||||
; writable = yes
|
|
||||||
|
|
||||||
# A publicly accessible directory, read/write to all users. Note that all files
|
|
||||||
# created in the directory by users will be owned by the default user, so
|
|
||||||
# any user with access can delete any other user's files. Obviously this
|
|
||||||
# directory must be writable by the default user. Another user could of course
|
|
||||||
# be specified, in which case all files would be owned by that user instead.
|
|
||||||
[public]
|
|
||||||
path = /srv/nfs
|
|
||||||
public = yes
|
|
||||||
only guest = yes
|
|
||||||
writable = yes
|
|
||||||
printable = no
|
|
||||||
|
|
||||||
# The following two entries demonstrate how to share a directory so that two
|
|
||||||
# users can place files there that will be owned by the specific users. In this
|
|
||||||
# setup, the directory should be writable by both users and should have the
|
|
||||||
# sticky bit set on it to prevent abuse. Obviously this could be extended to
|
|
||||||
# as many users as required.
|
|
||||||
;[myshare]
|
|
||||||
; comment = Mary's and Fred's stuff
|
|
||||||
; path = /usr/somewhere/shared
|
|
||||||
; valid users = mary fred
|
|
||||||
; public = no
|
|
||||||
; writable = yes
|
|
||||||
; printable = no
|
|
||||||
; create mask = 0765
|
|
||||||
|
|
||||||
|
|
||||||
@@ -1,11 +0,0 @@
|
|||||||
---
|
|
||||||
- name: restart_nfs
|
|
||||||
become: true
|
|
||||||
service:
|
|
||||||
name: nfs-server.service
|
|
||||||
state: restarted
|
|
||||||
enabled: true
|
|
||||||
|
|
||||||
- name: reload_exports
|
|
||||||
become: true
|
|
||||||
command: exportfs -arv
|
|
||||||
@@ -1,7 +0,0 @@
|
|||||||
---
|
|
||||||
- name: install nfs dependencies
|
|
||||||
become: true
|
|
||||||
pacman:
|
|
||||||
name: "{{ deps }}"
|
|
||||||
state: present
|
|
||||||
tags: deps
|
|
||||||
@@ -1,5 +0,0 @@
|
|||||||
---
|
|
||||||
- import_tasks: deps.yml
|
|
||||||
- import_tasks: user.yml
|
|
||||||
- import_tasks: nfs.yml
|
|
||||||
- import_tasks: samba.yml
|
|
||||||
@@ -1,32 +0,0 @@
|
|||||||
---
|
|
||||||
- name: create nfs folder/ensure ownership
|
|
||||||
become: true
|
|
||||||
file:
|
|
||||||
path: "{{ nfs_root }}"
|
|
||||||
state: directory
|
|
||||||
owner: "{{ nfs_user }}"
|
|
||||||
group: "{{ nfs_group }}"
|
|
||||||
mode: 0777
|
|
||||||
recurse: true
|
|
||||||
|
|
||||||
- name: enable and start nfs server
|
|
||||||
become: true
|
|
||||||
service:
|
|
||||||
name: nfs-server.service
|
|
||||||
state: started
|
|
||||||
enabled: true
|
|
||||||
|
|
||||||
- name: enable and start nfs idmap service
|
|
||||||
become: true
|
|
||||||
service:
|
|
||||||
name: nfs-idmapd.service
|
|
||||||
state: started
|
|
||||||
enabled: true
|
|
||||||
|
|
||||||
- name: create exports
|
|
||||||
become: true
|
|
||||||
copy:
|
|
||||||
src: files/exports
|
|
||||||
dest: /etc/exports
|
|
||||||
mode: 0644
|
|
||||||
notify: reload_exports
|
|
||||||
@@ -1,21 +0,0 @@
|
|||||||
---
|
|
||||||
- name: copy samba smb.conf
|
|
||||||
become: true
|
|
||||||
copy:
|
|
||||||
src: files/smb.conf
|
|
||||||
dest: /etc/samba/smb.conf
|
|
||||||
mode: 0644
|
|
||||||
|
|
||||||
- name: start and enable samba service
|
|
||||||
become: true
|
|
||||||
service:
|
|
||||||
name: smb.service
|
|
||||||
state: started
|
|
||||||
enabled: true
|
|
||||||
|
|
||||||
- name: start and enabme samba name service
|
|
||||||
become: true
|
|
||||||
service:
|
|
||||||
name: nmb.service
|
|
||||||
state: started
|
|
||||||
enabled: true
|
|
||||||
@@ -1,17 +0,0 @@
|
|||||||
---
|
|
||||||
- name: create nfs group
|
|
||||||
become: true
|
|
||||||
group:
|
|
||||||
name: "{{ nfs_group }}"
|
|
||||||
gid: 2021
|
|
||||||
state: present
|
|
||||||
|
|
||||||
- name: create nfs user
|
|
||||||
become: true
|
|
||||||
user:
|
|
||||||
name: "{{ nfs_user }}"
|
|
||||||
group: "{{ nfs_group }}"
|
|
||||||
uid: 2021
|
|
||||||
create_home: false
|
|
||||||
home: "{{ nfs_root }}"
|
|
||||||
shell: /bin/sh
|
|
||||||
@@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
- name: create required partkeepr volumes
|
- name: create required partkeepr volumes
|
||||||
docker_volume:
|
community.general.docker_volume:
|
||||||
name: "{{ item }}"
|
name: "{{ item }}"
|
||||||
with_items:
|
with_items:
|
||||||
- partkeepr-web-vol
|
- partkeepr-web-vol
|
||||||
@@ -9,12 +9,12 @@
|
|||||||
- partkeepr-db-vol
|
- partkeepr-db-vol
|
||||||
|
|
||||||
- name: create partkeepr network
|
- name: create partkeepr network
|
||||||
docker_network:
|
community.general.docker_network:
|
||||||
name: "partkeepr"
|
name: "partkeepr"
|
||||||
|
|
||||||
- name: create partkeepr-db container
|
- name: create partkeepr-db container
|
||||||
diff: false
|
diff: false
|
||||||
docker_container:
|
community.general.docker_container:
|
||||||
name: partkeepr-db
|
name: partkeepr-db
|
||||||
image: mariadb:10.0
|
image: mariadb:10.0
|
||||||
recreate: false
|
recreate: false
|
||||||
@@ -24,7 +24,7 @@
|
|||||||
networks:
|
networks:
|
||||||
- name: "partkeepr"
|
- name: "partkeepr"
|
||||||
env:
|
env:
|
||||||
MYSQL_RANDOM_ROOT_PASSWORD: 'yes'
|
MYSQL_RANDOM_ROOT_PASSWORD: "yes"
|
||||||
MYSQL_DATABASE: partkeepr
|
MYSQL_DATABASE: partkeepr
|
||||||
MYSQL_USER: partkeepr
|
MYSQL_USER: partkeepr
|
||||||
MYSQL_PASSWORD: partkeepr
|
MYSQL_PASSWORD: partkeepr
|
||||||
@@ -33,7 +33,7 @@
|
|||||||
|
|
||||||
- name: create partkeepr container
|
- name: create partkeepr container
|
||||||
diff: false
|
diff: false
|
||||||
docker_container:
|
community.general.docker_container:
|
||||||
name: partkeepr
|
name: partkeepr
|
||||||
image: mhubig/partkeepr:latest
|
image: mhubig/partkeepr:latest
|
||||||
recreate: false
|
recreate: false
|
||||||
@@ -49,7 +49,7 @@
|
|||||||
|
|
||||||
- name: create partkeepr-cron container
|
- name: create partkeepr-cron container
|
||||||
diff: false
|
diff: false
|
||||||
docker_container:
|
community.general.docker_container:
|
||||||
name: partkeepr-cron
|
name: partkeepr-cron
|
||||||
image: mhubig/partkeepr:latest
|
image: mhubig/partkeepr:latest
|
||||||
entrypoint: []
|
entrypoint: []
|
||||||
@@ -65,7 +65,7 @@
|
|||||||
|
|
||||||
- name: create partkeepr container
|
- name: create partkeepr container
|
||||||
diff: false
|
diff: false
|
||||||
docker_container:
|
community.general.docker_container:
|
||||||
name: partkeepr
|
name: partkeepr
|
||||||
image: mhubig/partkeepr:latest
|
image: mhubig/partkeepr:latest
|
||||||
recreate: false
|
recreate: false
|
||||||
|
|||||||
@@ -1,11 +1,11 @@
|
|||||||
---
|
---
|
||||||
- name: install pi-hole-server
|
- name: install pi-hole-server
|
||||||
command: yay -S --noconfirm pi-hole-server
|
ansible.builtin.command: yay -S --noconfirm pi-hole-server
|
||||||
args:
|
args:
|
||||||
creates: /bin/pihole
|
creates: /bin/pihole
|
||||||
|
|
||||||
- name: install pi-hole-server dependencies
|
- name: install pi-hole-server dependencies
|
||||||
become: true
|
become: true
|
||||||
pacman:
|
community.general.pacman:
|
||||||
name: "{{ deps }}"
|
name: "{{ deps }}"
|
||||||
state: present
|
state: present
|
||||||
|
|||||||
@@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
- name: replace pi.hole hostname
|
- name: replace pi.hole hostname
|
||||||
become: true
|
become: true
|
||||||
replace:
|
ansible.builtin.replace:
|
||||||
path: "{{ item }}"
|
path: "{{ item }}"
|
||||||
regexp: "pi\\.hole"
|
regexp: "pi\\.hole"
|
||||||
replace: "pi.bdebyl.net"
|
replace: "pi.bdebyl.net"
|
||||||
|
|||||||
@@ -1,14 +1,14 @@
|
|||||||
---
|
---
|
||||||
- name: stat dhparam
|
- name: stat dhparam
|
||||||
become: true
|
become: true
|
||||||
stat:
|
ansible.builtin.stat:
|
||||||
path: /etc/ssl/certs/dhparam.pem
|
path: /etc/ssl/certs/dhparam.pem
|
||||||
register: dhparam
|
register: dhparam
|
||||||
tags: ssl
|
tags: ssl
|
||||||
|
|
||||||
- name: generate openssl dhparam for nginx
|
- name: generate openssl dhparam for nginx
|
||||||
become: true
|
become: true
|
||||||
command: |
|
ansible.builtin.command: |
|
||||||
openssl dhparam -out /etc/ssl/certs/dhparam.pem 2048
|
openssl dhparam -out /etc/ssl/certs/dhparam.pem 2048
|
||||||
when: not dhparam.stat.exists
|
when: not dhparam.stat.exists
|
||||||
args:
|
args:
|
||||||
@@ -17,7 +17,7 @@
|
|||||||
|
|
||||||
- name: create ssl certificate for ci server
|
- name: create ssl certificate for ci server
|
||||||
become: true
|
become: true
|
||||||
command: |
|
ansible.builtin.command: |
|
||||||
certbot certonly --webroot --webroot-path=/srv/http/letsencrypt \
|
certbot certonly --webroot --webroot-path=/srv/http/letsencrypt \
|
||||||
-m {{ ssl_email }} --agree-tos \
|
-m {{ ssl_email }} --agree-tos \
|
||||||
-d {{ item }}
|
-d {{ item }}
|
||||||
|
|||||||
@@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
- name: renew certbot ssl certificates weekly
|
- name: renew certbot ssl certificates weekly
|
||||||
become: true
|
become: true
|
||||||
cron:
|
ansible.builtin.cron:
|
||||||
name: certbot_renew
|
name: certbot_renew
|
||||||
special_time: weekly
|
special_time: weekly
|
||||||
job: >-
|
job: >-
|
||||||
|
|||||||
Reference in New Issue
Block a user