refs #8025 Roles merged, passwords moved to global vars, rename .yaml to .yml
This commit is contained in:
parent
c7299d8499
commit
9868439750
|
@ -3,7 +3,7 @@ roles_path = ./roles
|
|||
inventory = ./hosts
|
||||
gathering = smart
|
||||
interpreter_python = auto_silent
|
||||
remote_user = root
|
||||
remote_user = awx-user
|
||||
host_key_checking = False
|
||||
|
||||
[privilege_escalation]
|
||||
|
|
|
@ -1,7 +0,0 @@
|
|||
awx_pub_key: ssh-rsa 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 awx@awx.verdnatura.es
|
||||
resolv:
|
||||
domain: verdnatura.es
|
||||
search: verdnatura.es
|
||||
resolvers:
|
||||
- '10.0.0.4'
|
||||
- '10.0.0.5'
|
|
@ -0,0 +1,42 @@
|
|||
awx_pub_key: ssh-rsa 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 awx@awx.verdnatura.es
|
||||
resolv:
|
||||
domain: verdnatura.es
|
||||
search: verdnatura.es
|
||||
resolvers:
|
||||
- '10.0.0.4'
|
||||
- '10.0.0.5'
|
||||
nslcd_password: !vault |
|
||||
$ANSIBLE_VAULT;1.1;AES256
|
||||
30343461633538323832316231383362626636653864353535346461353937313131336135396162
|
||||
3866623238353638323961363239373236393339333134380a313561363030306165393965396234
|
||||
65316535626434333331633438613639633163643765633064363833303461363834653864646464
|
||||
3133313233353730620a343536316266393637623563313563613332646630643632366439343764
|
||||
30383935303161646339393361393130613266663337373364626635646430326465
|
||||
rndc_key: !vault |
|
||||
$ANSIBLE_VAULT;1.1;AES256
|
||||
36386562613235363931396632656535383336313537636431643338353438313231623839313031
|
||||
3830616135393732353265666664353963393366343461630a633365396165653761353762383739
|
||||
66303862376465626435633964313237643230653463353662343831646464633639383336323863
|
||||
6139333234386565620a653438613165626131653834633931343766343162653932373161653362
|
||||
38303139333536656263656163623333313234393666353766363565633732366165
|
||||
radius_ldap_password: !vault |
|
||||
$ANSIBLE_VAULT;1.1;AES256
|
||||
31643037313539376337363739616361363339616235623433656131306539373030373731643934
|
||||
3432656465343430366366646237326137656134346562360a306538303762313261616632643135
|
||||
39316439653932396134646432633262326631363765643564306565636363356335653539656531
|
||||
6234636463376364620a636133346337306437643939376531633564633737333133363065633031
|
||||
61643731646163323636343837373761303930323961653663343135303731623133
|
||||
radius_client_password: !vault |
|
||||
$ANSIBLE_VAULT;1.1;AES256
|
||||
62313333666335316231396365653635356639626563613738363137383434343437393833393934
|
||||
6439646632303536393438306234323862363532393733630a356136393539363161346631623161
|
||||
37636365653331333735353166646164613732303035613231353237343139623137396364643637
|
||||
3261656465336435630a666466643734373830633933613266663631343730386530633839386239
|
||||
62623434663130363637303035363434313566376661356362663238666166343534
|
||||
awx_smtp_password: !vault |
|
||||
$ANSIBLE_VAULT;1.1;AES256
|
||||
62393936623766653737356136353765336265636136616330306537393638646663326663346138
|
||||
3631616362363163393036613564623864383365633634660a366563363836363061623566393361
|
||||
37633364633631333130346332613235303762316435313535613664323830656363353237373561
|
||||
3866653365636431630a303262666662376662623862663461633361333037643863353135343836
|
||||
61383730366664353730616331666139376234313562383163613736353231666533
|
|
@ -2,4 +2,4 @@
|
|||
tasks:
|
||||
- name: Upgrade system
|
||||
import_role:
|
||||
name: linux-upgrade
|
||||
name: debian-upgrade
|
|
@ -0,0 +1,21 @@
|
|||
- name: restart-timesyncd
|
||||
service:
|
||||
name: systemd-timesyncd
|
||||
state: restarted
|
||||
- name: restart-exim
|
||||
service:
|
||||
name: exim4
|
||||
state: restarted
|
||||
- name: restart-ssh
|
||||
service:
|
||||
name: ssh
|
||||
state: restarted
|
||||
- name: restart-fail2ban
|
||||
service:
|
||||
name: fail2ban
|
||||
state: restarted
|
||||
- name: restart-nrpe
|
||||
service:
|
||||
name: nagios-nrpe-server
|
||||
state: restarted
|
||||
|
|
@ -1,4 +1,4 @@
|
|||
- name: Install packages
|
||||
- name: Install Bacula FD packages
|
||||
apt:
|
||||
name: bacula-fd
|
||||
state: present
|
||||
|
@ -14,7 +14,7 @@
|
|||
group: bacula
|
||||
mode: '0640'
|
||||
backup: true
|
||||
- name: Restart service
|
||||
- name: Restart Bacula FD service
|
||||
service:
|
||||
name: bacula-fd
|
||||
state: restarted
|
|
@ -1,11 +1,11 @@
|
|||
- name: Install packages
|
||||
- name: Install fail2ban packages
|
||||
apt:
|
||||
name: fail2ban
|
||||
state: present
|
||||
loop:
|
||||
- fail2ban
|
||||
- rsyslog
|
||||
- name: Configure service
|
||||
- name: Configure fail2ban service
|
||||
template:
|
||||
src: jail.local.j2
|
||||
dest: /etc/fail2ban/jail.local
|
|
@ -0,0 +1,10 @@
|
|||
- name: Install base packages
|
||||
apt:
|
||||
name: "{{ item }}"
|
||||
state: present
|
||||
with_items:
|
||||
- htop
|
||||
- psmisc
|
||||
- bash-completion
|
||||
- screen
|
||||
- aptitude
|
|
@ -1,22 +0,0 @@
|
|||
- name: Install base packages
|
||||
apt:
|
||||
name: "{{ item }}"
|
||||
state: present
|
||||
with_items:
|
||||
- htop
|
||||
- psmisc
|
||||
- bash-completion
|
||||
- screen
|
||||
- aptitude
|
||||
- include_role:
|
||||
name: linux-sudoers
|
||||
- include_role:
|
||||
name: linux-motd
|
||||
- include_role:
|
||||
name: linux-profile
|
||||
- include_role:
|
||||
name: linux-vim
|
||||
- include_role:
|
||||
name: linux-locale
|
||||
- include_role:
|
||||
name: linux-nrpe
|
|
@ -0,0 +1,8 @@
|
|||
- import_tasks: install.yml
|
||||
- import_tasks: sudoers.yml
|
||||
- import_tasks: motd.yml
|
||||
- import_tasks: profile.yml
|
||||
- import_tasks: vim.yml
|
||||
- import_tasks: locale.yml
|
||||
- import_tasks: tzdata.yml
|
||||
- import_tasks: nrpe.yml
|
|
@ -1,7 +1,7 @@
|
|||
- name: Copy MOTD configuration file
|
||||
copy:
|
||||
src: 90-vn
|
||||
dest: "/etc/update-motd.d/"
|
||||
src: motd
|
||||
dest: /etc/update-motd.d/90-vn
|
||||
mode: '755'
|
||||
owner: root
|
||||
group: root
|
|
@ -1,19 +1,19 @@
|
|||
- name: Install packages
|
||||
- name: Install NRPE packages
|
||||
apt:
|
||||
name: "{{ item }}"
|
||||
state: present
|
||||
loop:
|
||||
- nagios-nrpe-server
|
||||
- nagios-plugins-contrib
|
||||
- name: Set generic configuration
|
||||
- name: Set NRPE generic configuration
|
||||
copy:
|
||||
src: 90-vn.cfg
|
||||
src: nrpe.cfg
|
||||
dest: /etc/nagios/nrpe.d/90-vn.cfg
|
||||
owner: root
|
||||
group: root
|
||||
mode: '0644'
|
||||
notify: restart-nrpe
|
||||
- name: Create local configuration file
|
||||
- name: Create NRPE local configuration file
|
||||
file:
|
||||
path: /etc/nagios/nrpe.d/99-local.cfg
|
||||
state: touch
|
|
@ -1,7 +1,7 @@
|
|||
- name: Copy profile configuration file
|
||||
copy:
|
||||
src: vn.sh
|
||||
dest: "/etc/profile.d/"
|
||||
src: profile.sh
|
||||
dest: "/etc/profile.d/vn.sh"
|
||||
mode: '644'
|
||||
owner: root
|
||||
group: root
|
|
@ -1,4 +1,4 @@
|
|||
- name: Install packages
|
||||
- name: Install exim packages
|
||||
apt:
|
||||
name: exim4
|
||||
state: present
|
|
@ -4,8 +4,8 @@
|
|||
state: present
|
||||
- name: Copy sudoers configuration file
|
||||
copy:
|
||||
src: vn
|
||||
dest: "/etc/sudoers.d/"
|
||||
src: sudoers
|
||||
dest: "/etc/sudoers.d/vn"
|
||||
mode: u=rw,g=r
|
||||
owner: root
|
||||
group: root
|
|
@ -1,2 +1,2 @@
|
|||
- name: Configure the time zone
|
||||
script: set_timezone.sh
|
||||
script: set-timezone.sh
|
|
@ -0,0 +1,12 @@
|
|||
- name: Download vn-host Debian package
|
||||
get_url:
|
||||
url: "{{ vn_host.url }}/{{ vn_host.package }}"
|
||||
dest: "/tmp/{{ vn_host.package }}"
|
||||
mode: '0644'
|
||||
- name: Install package
|
||||
apt:
|
||||
deb: "/tmp/{{ vn_host.package }}"
|
||||
- name: Delete package
|
||||
file:
|
||||
path: "/tmp/{{ vn_host.package }}"
|
||||
state: absent
|
|
@ -1,10 +1,10 @@
|
|||
Director {
|
||||
Name = bacula-dir
|
||||
Password = "$FDPASSWD"
|
||||
Password = "{{ FDPASSWD }}"
|
||||
}
|
||||
Director {
|
||||
Name = bacula-mon
|
||||
Password = "$FDMPASSWD"
|
||||
Password = "{{ FDMPASSWD }}"
|
||||
Monitor = yes
|
||||
}
|
||||
FileDaemon {
|
|
@ -3,3 +3,6 @@ fail2ban:
|
|||
bantime: 600
|
||||
maxretry: 4
|
||||
ignore: 127.0.0.0/8 10.0.0.0/16
|
||||
vn_host:
|
||||
url: http://apt.verdnatura.es/pool/main/v/vn-host
|
||||
package: vn-host_2.0.2_all.deb
|
|
@ -8,7 +8,7 @@ idle_timelimit 60
|
|||
|
||||
base dc=verdnatura,dc=es
|
||||
binddn cn=nss,ou=admins,dc=verdnatura,dc=es
|
||||
bindpw passwordblablabla
|
||||
bindpw password
|
||||
pagesize 500
|
||||
|
||||
filter group (&(objectClass=posixGroup)(cn=sysadmin))
|
|
@ -19,7 +19,7 @@
|
|||
state: present
|
||||
with_items:
|
||||
- regexp: "^bindpw"
|
||||
line: "bindpw {{ bindpw_password }}"
|
||||
line: "bindpw {{ nslcd_password }}"
|
||||
- name: Configure nsswitch to use NSLCD
|
||||
lineinfile:
|
||||
dest: /etc/nsswitch.conf
|
|
@ -1,3 +0,0 @@
|
|||
- include_role:
|
||||
name: linux-auth
|
||||
when: false
|
|
@ -0,0 +1,2 @@
|
|||
- include_tasks: auth.yml
|
||||
when: false
|
|
@ -0,0 +1,4 @@
|
|||
- name: Install QEMU guest agent
|
||||
apt:
|
||||
name: qemu-guest-agent
|
||||
state: present
|
|
@ -1,7 +1,3 @@
|
|||
- name: Install QEMU guest agent
|
||||
apt:
|
||||
name: qemu-guest-agent
|
||||
state: present
|
||||
- name: Configure udev hotplug rules
|
||||
copy:
|
||||
src: 80-hotplug-cpu-mem.rules
|
|
@ -0,0 +1,3 @@
|
|||
- import_tasks: agent.yml
|
||||
- import_tasks: hotplug.yml
|
||||
- import_tasks: autofs.yml
|
|
@ -0,0 +1 @@
|
|||
homes_path: /mnt/homes
|
|
@ -1,156 +0,0 @@
|
|||
# ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||||
# Install and configure FREERADIUS TOTP
|
||||
# ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||||
|
||||
# ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||||
# install packages if there are not present in the system
|
||||
- name: install packagesfor freeradiusotp if is not in the system
|
||||
apt:
|
||||
name: "{{ item }}"
|
||||
state: present
|
||||
with_items:
|
||||
- freeradius
|
||||
- freeradius-ldap
|
||||
- libpam-google-authenticator
|
||||
- python3-qrcode
|
||||
- zip
|
||||
- mutt
|
||||
# ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||||
|
||||
# ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||||
# config symbolic files to enable modules
|
||||
- name: create a symbolic link
|
||||
ansible.builtin.file:
|
||||
src: "{{ item.src }}"
|
||||
dest: "{{ item.dest }}"
|
||||
owner: freerad
|
||||
group: freerad
|
||||
state: link
|
||||
force: yes
|
||||
loop:
|
||||
# - { src: '"{{ freeradius_mods_enabled_folder }}"ldap', dest: '"{{ freeradius_mods_available_folder }}"ldap' }
|
||||
# - { src: '"{{ freeradius_mods_enabled_folder }}"pam', dest: '"{{ freeradius_mods_available_folder }}"pam' }
|
||||
- { src: '{{ freeradius_mods_available_folder }}ldap', dest: '{{ freeradius_mods_enabled_folder }}ldap' }
|
||||
- { src: '{{ freeradius_mods_available_folder }}pam', dest: '{{ freeradius_mods_enabled_folder }}pam' }
|
||||
# ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||||
|
||||
# ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||||
# config default file /etc/freeradius/3.0/sites-enabled/default
|
||||
- name: config default file
|
||||
ansible.builtin.template:
|
||||
src: default.j2
|
||||
dest: "{{ freeradius_default_config }}"
|
||||
owner: freerad
|
||||
group: freerad
|
||||
mode: '0640'
|
||||
backup: yes
|
||||
# ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||||
|
||||
# ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||||
# config default file /etc/freeradius/3.0/mods-available/ldap
|
||||
#- name: config ldap file
|
||||
# ansible.builtin.template:
|
||||
# src: ldap.j2
|
||||
# dest: "{{ freeradius_mod_ldap }}"
|
||||
# owner: freerad
|
||||
# group: freerad
|
||||
# mode: '0640'
|
||||
# backup: yes
|
||||
# paso1 - copy
|
||||
- name: copy file ldap
|
||||
copy:
|
||||
src: ldap
|
||||
dest: "{{ freeradius_mod_ldap }}"
|
||||
owner: freerad
|
||||
group: freerad
|
||||
mode: '0640'
|
||||
backup: yes
|
||||
# paso2 - lineinfile password with vault
|
||||
- name: add password with ansible vault to file ldap
|
||||
lineinfile:
|
||||
dest: "{{ freeradius_mod_ldap }}"
|
||||
regexp: "{{item.regexp}}"
|
||||
line: "{{item.line}}"
|
||||
state: present
|
||||
with_items:
|
||||
- regexp: "^ password ="
|
||||
line: " password = {{ bindradiusldap_password }}"
|
||||
# ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||||
|
||||
# ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||||
# config default file /etc/freeradius/3.0/dictionary
|
||||
- name: config dictionary file
|
||||
ansible.builtin.template:
|
||||
src: dictionary.j2
|
||||
dest: "{{ freeradius_dictionary_config }}"
|
||||
owner: freerad
|
||||
group: freerad
|
||||
mode: '0640'
|
||||
backup: yes
|
||||
# ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||||
|
||||
# ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||||
# config default file /etc/freeradius/3.0/clients.conf
|
||||
- name: config clients.conf file
|
||||
ansible.builtin.template:
|
||||
src: clients.j2
|
||||
dest: "{{ freeradius_clients_config }}"
|
||||
owner: freerad
|
||||
group: freerad
|
||||
mode: '0640'
|
||||
backup: yes
|
||||
# ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||||
|
||||
# ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||||
# config default file /etc/freeradius/3.0/policy.d/filter
|
||||
- name: config filter file
|
||||
ansible.builtin.template:
|
||||
src: filter.j2
|
||||
dest: "{{ freeradius_filter_config }}"
|
||||
owner: freerad
|
||||
group: freerad
|
||||
mode: '0640'
|
||||
backup: yes
|
||||
# ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||||
|
||||
# ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||||
# config default file /etc/freeradius/3.0/radiusd.conf
|
||||
- name: config radius.conf file
|
||||
ansible.builtin.template:
|
||||
src: radiusd.j2
|
||||
dest: "{{ freeradius_base_config }}"
|
||||
owner: freerad
|
||||
group: freerad
|
||||
mode: '0640'
|
||||
backup: yes
|
||||
notify: restart freeradius
|
||||
# ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||||
|
||||
# ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||||
# config default file /etc/pam.d/radiusd
|
||||
- name: config pam radiusd file
|
||||
ansible.builtin.template:
|
||||
src: radiusdpam.j2
|
||||
dest: "{{ freeradius_pam_config }}"
|
||||
owner: root
|
||||
group: root
|
||||
mode: '0644'
|
||||
# ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||||
|
||||
# ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||||
# config default file /lib/systemd/system/freeradius.service
|
||||
- name: config freeradius systemd service file
|
||||
ansible.builtin.template:
|
||||
src: freeradiusservice.j2
|
||||
dest: "{{ freeradius_service_config }}"
|
||||
owner: root
|
||||
group: root
|
||||
mode: '0644'
|
||||
# ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||||
|
||||
# ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||||
# force systemd to reread configs
|
||||
- name: Just force systemd to reread configs (2.4 and above)
|
||||
ansible.builtin.systemd_service:
|
||||
daemon_reload: true
|
||||
# ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|
@ -0,0 +1,97 @@
|
|||
- name: Install packagesfor freeradiusotp
|
||||
apt:
|
||||
name: "{{ item }}"
|
||||
state: present
|
||||
with_items:
|
||||
- freeradius
|
||||
- freeradius-ldap
|
||||
- libpam-google-authenticator
|
||||
- python3-qrcode
|
||||
- zip
|
||||
- mutt
|
||||
- name: Create a symbolic link
|
||||
ansible.builtin.file:
|
||||
src: "{{ item.src }}"
|
||||
dest: "{{ item.dest }}"
|
||||
owner: freerad
|
||||
group: freerad
|
||||
state: link
|
||||
force: yes
|
||||
loop:
|
||||
- { src: '{{ freeradius_mods_available_folder }}ldap', dest: '{{ freeradius_mods_enabled_folder }}ldap' }
|
||||
- { src: '{{ freeradius_mods_available_folder }}pam', dest: '{{ freeradius_mods_enabled_folder }}pam' }
|
||||
- name: config default file
|
||||
ansible.builtin.template:
|
||||
src: default.j2
|
||||
dest: "{{ freeradius_default_config }}"
|
||||
owner: freerad
|
||||
group: freerad
|
||||
mode: '0640'
|
||||
backup: yes
|
||||
- name: Copy LDAP file
|
||||
copy:
|
||||
src: ldap
|
||||
dest: "{{ freeradius_mod_ldap }}"
|
||||
owner: freerad
|
||||
group: freerad
|
||||
mode: '0640'
|
||||
backup: yes
|
||||
- name: Add password to LDAP file
|
||||
lineinfile:
|
||||
dest: "{{ freeradius_mod_ldap }}"
|
||||
regexp: "{{item.regexp}}"
|
||||
line: "{{item.line}}"
|
||||
state: present
|
||||
with_items:
|
||||
- regexp: "^ password ="
|
||||
line: " password = {{ radius_ldap_password }}"
|
||||
- name: Config dictionary file
|
||||
ansible.builtin.template:
|
||||
src: dictionary.j2
|
||||
dest: "{{ freeradius_dictionary_config }}"
|
||||
owner: freerad
|
||||
group: freerad
|
||||
mode: '0640'
|
||||
backup: yes
|
||||
- name: Config clients.conf file
|
||||
ansible.builtin.template:
|
||||
src: clients.j2
|
||||
dest: "{{ freeradius_clients_config }}"
|
||||
owner: freerad
|
||||
group: freerad
|
||||
mode: '0640'
|
||||
backup: yes
|
||||
- name: Config filter file
|
||||
ansible.builtin.template:
|
||||
src: filter.j2
|
||||
dest: "{{ freeradius_filter_config }}"
|
||||
owner: freerad
|
||||
group: freerad
|
||||
mode: '0640'
|
||||
backup: yes
|
||||
- name: Config radius.conf file
|
||||
ansible.builtin.template:
|
||||
src: radiusd.j2
|
||||
dest: "{{ freeradius_base_config }}"
|
||||
owner: freerad
|
||||
group: freerad
|
||||
mode: '0640'
|
||||
backup: yes
|
||||
notify: restart freeradius
|
||||
- name: Config pam radiusd file
|
||||
ansible.builtin.template:
|
||||
src: radiusdpam.j2
|
||||
dest: "{{ freeradius_pam_config }}"
|
||||
owner: root
|
||||
group: root
|
||||
mode: '0644'
|
||||
- name: Config freeradius systemd service file
|
||||
ansible.builtin.template:
|
||||
src: freeradiusservice.j2
|
||||
dest: "{{ freeradius_service_config }}"
|
||||
owner: root
|
||||
group: root
|
||||
mode: '0644'
|
||||
- name: Just force systemd to reread configs (2.4 and above)
|
||||
ansible.builtin.systemd_service:
|
||||
daemon_reload: true
|
|
@ -1,4 +1,4 @@
|
|||
client opnsense {
|
||||
ipaddr = 0.0.0.0/0
|
||||
secret = {{ bindradiusclient_password }}
|
||||
secret = {{ radius_client_password }}
|
||||
}
|
|
@ -1,5 +1,3 @@
|
|||
---
|
||||
# vars file
|
||||
freeradius_base_folder: /etc/freeradius/3.0/
|
||||
freeradius_mods_available_folder: "{{ freeradius_base_folder }}mods-available/"
|
||||
freeradius_mods_enabled_folder: "{{ freeradius_base_folder }}mods-enabled/"
|
||||
|
@ -11,19 +9,5 @@ freeradius_clients_config: "{{ freeradius_base_folder }}clients.conf"
|
|||
freeradius_mod_ldap: "{{ freeradius_mods_available_folder }}ldap"
|
||||
freeradius_filter_config: "{{ freeradius_base_folder }}policy.d/filter"
|
||||
freeradius_daemon: freeradius
|
||||
bindradiusldap_password: !vault |
|
||||
$ANSIBLE_VAULT;1.1;AES256
|
||||
31643037313539376337363739616361363339616235623433656131306539373030373731643934
|
||||
3432656465343430366366646237326137656134346562360a306538303762313261616632643135
|
||||
39316439653932396134646432633262326631363765643564306565636363356335653539656531
|
||||
6234636463376364620a636133346337306437643939376531633564633737333133363065633031
|
||||
61643731646163323636343837373761303930323961653663343135303731623133
|
||||
bindradiusclient_password: !vault |
|
||||
$ANSIBLE_VAULT;1.1;AES256
|
||||
62313333666335316231396365653635356639626563613738363137383434343437393833393934
|
||||
6439646632303536393438306234323862363532393733630a356136393539363161346631623161
|
||||
37636365653331333735353166646164613732303035613231353237343139623137396364643637
|
||||
3261656465336435630a666466643734373830633933613266663631343730386530633839386239
|
||||
62623434663130363637303035363434313566376661356362663238666166343534
|
||||
freeradius_pam_config: /etc/pam.d/radiusd
|
||||
freeradius_service_config: /lib/systemd/system/freeradius.service
|
||||
|
|
|
@ -1,7 +0,0 @@
|
|||
bindpw_password: !vault |
|
||||
$ANSIBLE_VAULT;1.1;AES256
|
||||
30343461633538323832316231383362626636653864353535346461353937313131336135396162
|
||||
3866623238353638323961363239373236393339333134380a313561363030306165393965396234
|
||||
65316535626434333331633438613639633163643765633064363833303461363834653864646464
|
||||
3133313233353730620a343536316266393637623563313563613332646630643632366439343764
|
||||
30383935303161646339393361393130613266663337373364626635646430326465
|
|
@ -1,38 +0,0 @@
|
|||
- name: Install packages for autofs
|
||||
apt:
|
||||
name: "{{ item }}"
|
||||
state: present
|
||||
with_items:
|
||||
- nfs-common
|
||||
- autofs
|
||||
- libnfs-utils
|
||||
- autofs-ldap
|
||||
- name: Create homes directory
|
||||
ansible.builtin.file:
|
||||
path: "{{ path_mnt_homes }}"
|
||||
state: directory
|
||||
mode: '0755'
|
||||
- name: Configure nsswitch
|
||||
lineinfile:
|
||||
path: /etc/nsswitch.conf
|
||||
line: "automount: files"
|
||||
notify: restart nslcd
|
||||
- name: Add file homes.autofs configured to autofs
|
||||
copy:
|
||||
src: homes.autofs
|
||||
dest: /etc/auto.master.d/homes.autofs
|
||||
owner: root
|
||||
group: root
|
||||
mode: '0644'
|
||||
- name: Add file /etc/auto.homes configured to the systemd
|
||||
copy:
|
||||
src: auto.homes
|
||||
dest: /etc/auto.homes
|
||||
owner: root
|
||||
group: root
|
||||
mode: '0644'
|
||||
notify: restart autofs
|
||||
- name: Service autofs service
|
||||
service:
|
||||
name: autofs
|
||||
enabled: yes
|
|
@ -1 +0,0 @@
|
|||
path_mnt_homes: /mnt/homes
|
|
@ -1,4 +0,0 @@
|
|||
- name: restart-fail2ban
|
||||
service:
|
||||
name: fail2ban
|
||||
state: restarted
|
|
@ -1,4 +0,0 @@
|
|||
- name: restart-nrpe
|
||||
service:
|
||||
name: nagios-nrpe-server
|
||||
state: restarted
|
|
@ -1,4 +0,0 @@
|
|||
- name: restart systemd-timesyncd
|
||||
service:
|
||||
name: systemd-timesyncd
|
||||
state: restarted
|
|
@ -1,4 +0,0 @@
|
|||
- name: restart-exim
|
||||
service:
|
||||
name: exim4
|
||||
state: restarted
|
|
@ -1,4 +0,0 @@
|
|||
- name: Restart SSH service
|
||||
service:
|
||||
name: ssh
|
||||
state: restarted
|
|
@ -1,12 +0,0 @@
|
|||
- name: Download vn-host Debian package
|
||||
get_url:
|
||||
url: "{{ repo_url }}"
|
||||
dest: "{{ package_path }}"
|
||||
mode: '0644'
|
||||
- name: Install package
|
||||
apt:
|
||||
deb: "{{ package_path }}"
|
||||
- name: Delete package
|
||||
file:
|
||||
path: "{{ package_path }}"
|
||||
state: absent
|
|
@ -1,2 +0,0 @@
|
|||
repo_url: http://apt.verdnatura.es/pool/main/v/vn-host/vn-host_2.0.2_all.deb
|
||||
package_path: /tmp/vn-host_2.0.2_all.deb
|
|
@ -1,7 +1,7 @@
|
|||
- name: Add or modify DNS records A to some IP
|
||||
community.general.nsupdate:
|
||||
key_name: "rndc-key"
|
||||
key_secret: "{{ bind9secretkey_password }}"
|
||||
key_secret: "{{ rndc_key }}"
|
||||
key_algorithm: "hmac-md5"
|
||||
server: "ns1.verdnatura.es"
|
||||
zone: "{{ zone_record }}"
|
|
@ -1,7 +0,0 @@
|
|||
bind9secretkey_password: !vault |
|
||||
$ANSIBLE_VAULT;1.1;AES256
|
||||
36386562613235363931396632656535383336313537636431643338353438313231623839313031
|
||||
3830616135393732353265666664353963393366343461630a633365396165653761353762383739
|
||||
66303862376465626435633964313237643230653463353662343831646464633639383336323863
|
||||
6139333234386565620a653438613165626131653834633931343766343162653932373161653362
|
||||
38303139333536656263656163623333313234393666353766363565633732366165
|
|
@ -3,7 +3,7 @@
|
|||
host: smtp.verdnatura.es
|
||||
port: 465
|
||||
username: awx@verdnatura.es
|
||||
password: "{{ bindsecretawx_password }}"
|
||||
password: "{{ awx_smtp_password }}"
|
||||
to: sysadmin@verdnatura.es
|
||||
subject: Ansible-test
|
||||
body: System {{ ansible_hostname }} has been send successfully mail.
|
|
@ -1,7 +0,0 @@
|
|||
bindsecretawx_password: !vault |
|
||||
$ANSIBLE_VAULT;1.1;AES256
|
||||
62393936623766653737356136353765336265636136616330306537393638646663326663346138
|
||||
3631616362363163393036613564623864383365633634660a366563363836363061623566393361
|
||||
37633364633631333130346332613235303762316435313535613664323830656363353237373561
|
||||
3866653365636431630a303262666662376662623862663461633361333037643863353135343836
|
||||
61383730366664353730616331666139376234313562383163613736353231666533
|
Loading…
Reference in New Issue