Compare commits
8 Commits
8c4684a450
...
f57b1f1b3e
Author | SHA1 | Date | |
---|---|---|---|
f57b1f1b3e | |||
f1ac6f269b | |||
50cb4cfc75 | |||
aef3070586 | |||
89bbc6c070 | |||
361125e4a5 | |||
b592afcd38 | |||
145dccac2d |
@ -1,6 +1,7 @@
|
||||
[defaults]
|
||||
# Explicitely redefined some defaults to make play execution work
|
||||
roles_path = ./roles
|
||||
lookup_plugins = ./lookup_plugins
|
||||
vars_plugins = ./vars_plugins
|
||||
|
||||
inventory = ./hosts
|
||||
|
20
group_vars/all/network_interfaces.yml
Normal file
20
group_vars/all/network_interfaces.yml
Normal file
@ -0,0 +1,20 @@
|
||||
glob_network_interfaces:
|
||||
vlan:
|
||||
- name: srv
|
||||
id: 1
|
||||
gateway: "185.230.76.62"
|
||||
dns: "{{ query('ldap', 'ip', 'routeur-templier', 'srv') | ipv4 | first }}"
|
||||
gateway_v6: "2a0c:700:3012::ff:fe02:112"
|
||||
- name: adm
|
||||
id: 42
|
||||
dns: "{{ query('ldap', 'ip', 'routeur-templier', 'adm') | ipv4 | first }}"
|
||||
- name: srv_nat
|
||||
id: 43
|
||||
gateway: "{{ query('ldap', 'ip', 'routeur-templier', 'srv-nat') | ipv4 | first }}"
|
||||
dns: "{{ query('ldap', 'ip', 'routeur-templier', 'srv-nat') | ipv4 | first }}"
|
||||
gateway_v6: "{{ query('ldap', 'ip', 'routeur-templier', 'srv-nat') | ipv6 | first }}"
|
||||
|
||||
|
||||
# Deploy only adm by default
|
||||
interfaces:
|
||||
adm: eth0
|
8
group_vars/all/nullmailer.yml
Normal file
8
group_vars/all/nullmailer.yml
Normal file
@ -0,0 +1,8 @@
|
||||
---
|
||||
glob_nullmailer:
|
||||
root: root@ynerant.fr
|
||||
smtp_server: smtp.adm.ynerant.fr
|
||||
defaulthost: ynerant.fr
|
||||
allmailfrom: root@ynerant.fr
|
||||
username: noreply@ynerant.fr
|
||||
password: "{{ vault.mailu_password }}"
|
@ -5,3 +5,6 @@ glob_apt:
|
||||
extra_repositories: []
|
||||
pin:
|
||||
bullseye: []
|
||||
|
||||
glob_root:
|
||||
passwd_hash: '{{ vault.root_passwd_hash }}'
|
||||
|
4
host_vars/dns.adm.ynerant.fr.yml
Normal file
4
host_vars/dns.adm.ynerant.fr.yml
Normal file
@ -0,0 +1,4 @@
|
||||
---
|
||||
interfaces:
|
||||
adm: eth0
|
||||
srv_nat: eth1
|
4
host_vars/docker.adm.ynerant.fr.yml
Normal file
4
host_vars/docker.adm.ynerant.fr.yml
Normal file
@ -0,0 +1,4 @@
|
||||
---
|
||||
interfaces:
|
||||
adm: eth0
|
||||
srv_nat: eth1
|
4
host_vars/gitea.adm.ynerant.fr.yml
Normal file
4
host_vars/gitea.adm.ynerant.fr.yml
Normal file
@ -0,0 +1,4 @@
|
||||
---
|
||||
interfaces:
|
||||
adm: eth0
|
||||
srv_nat: eth1
|
4
host_vars/mailu.adm.ynerant.fr.yml
Normal file
4
host_vars/mailu.adm.ynerant.fr.yml
Normal file
@ -0,0 +1,4 @@
|
||||
---
|
||||
interfaces:
|
||||
adm: eth0
|
||||
srv_nat: eth1
|
4
host_vars/nextcloud.adm.ynerant.fr.yml
Normal file
4
host_vars/nextcloud.adm.ynerant.fr.yml
Normal file
@ -0,0 +1,4 @@
|
||||
---
|
||||
interfaces:
|
||||
adm: eth0
|
||||
srv_nat: eth1
|
4
host_vars/proxy.adm.ynerant.fr.yml
Normal file
4
host_vars/proxy.adm.ynerant.fr.yml
Normal file
@ -0,0 +1,4 @@
|
||||
---
|
||||
interfaces:
|
||||
adm: eth0
|
||||
srv_nat: eth1
|
3
host_vars/psql.adm.ynerant.fr.yml
Normal file
3
host_vars/psql.adm.ynerant.fr.yml
Normal file
@ -0,0 +1,3 @@
|
||||
---
|
||||
interfaces:
|
||||
adm: eth0
|
5
host_vars/routeur-templier.adm.ynerant.fr.yml
Normal file
5
host_vars/routeur-templier.adm.ynerant.fr.yml
Normal file
@ -0,0 +1,5 @@
|
||||
---
|
||||
interfaces:
|
||||
adm: ens18
|
||||
srv: ens19
|
||||
srv_nat: ens20
|
35
hosts
35
hosts
@ -1,6 +1,15 @@
|
||||
[archlinux:children]
|
||||
perso
|
||||
|
||||
[babel]
|
||||
babel0.adm.ynerant.fr
|
||||
babel1.adm.ynerant.fr
|
||||
babel2.adm.ynerant.fr
|
||||
babel3.adm.ynerant.fr
|
||||
babel4.adm.ynerant.fr
|
||||
babel5.adm.ynerant.fr
|
||||
babel6.adm.ynerant.fr
|
||||
|
||||
[certbot]
|
||||
proxy.adm.ynerant.fr
|
||||
|
||||
@ -18,9 +27,15 @@ ynerant-pc.fil.sand.auro.re
|
||||
ynerant-thinkpad.wifi.sand.auro.re
|
||||
localhost
|
||||
|
||||
[postfix]
|
||||
mailu.adm.ynerant.fr
|
||||
|
||||
[reverseproxy]
|
||||
proxy.adm.ynerant.fr
|
||||
|
||||
[routeur]
|
||||
routeur-templier.adm.ynerant.fr
|
||||
|
||||
[server:children]
|
||||
virtu
|
||||
vm
|
||||
@ -33,14 +48,20 @@ templier.adm.ynerant.fr
|
||||
templier.adm.ynerant.fr
|
||||
|
||||
[vm]
|
||||
routeur-templier.adm.ynerant.fr
|
||||
proxy.adm.ynerant.fr
|
||||
dns.adm.ynerant.fr
|
||||
mailu.adm.ynerant.fr
|
||||
psql.adm.ynerant.fr
|
||||
synapse.adm.ynerant.fr
|
||||
docker.adm.ynerant.fr
|
||||
# candilib.adm.ynerant.fr
|
||||
docker.adm.ynerant.fr
|
||||
dns.adm.ynerant.fr
|
||||
gitea.adm.ynerant.fr
|
||||
mailu.adm.ynerant.fr
|
||||
nextcloud.adm.ynerant.fr
|
||||
psql.adm.ynerant.fr
|
||||
proxy.adm.ynerant.fr
|
||||
re6st.adm.ynerant.fr
|
||||
routeur-templier.adm.ynerant.fr
|
||||
synapse.adm.ynerant.fr
|
||||
|
||||
[vm:children]
|
||||
babel
|
||||
|
||||
[all:vars]
|
||||
# Force remote to use Python 3
|
||||
|
BIN
lookup_plugins/__pycache__/ldap.cpython-39.pyc
Normal file
BIN
lookup_plugins/__pycache__/ldap.cpython-39.pyc
Normal file
Binary file not shown.
206
lookup_plugins/ldap.py
Normal file
206
lookup_plugins/ldap.py
Normal file
@ -0,0 +1,206 @@
|
||||
"""
|
||||
To use this lookup plugin, you need to pass ldap:
|
||||
ssh -L 1636:172.16.10.1:636 172.16.10.1
|
||||
"""
|
||||
|
||||
import ipaddress
|
||||
|
||||
from ansible.errors import AnsibleError, AnsibleParserError
|
||||
from ansible.plugins.lookup import LookupBase
|
||||
from ansible.utils.display import Display
|
||||
|
||||
try:
|
||||
import ldap
|
||||
except ImportError:
|
||||
raise AnsibleError("You need to install python3-ldap")
|
||||
|
||||
display = Display()
|
||||
|
||||
def decode_object(object):
|
||||
return {attribute: [value.decode('utf-8') for value in object[attribute]] for attribute in object}
|
||||
|
||||
class LookupModule(LookupBase):
|
||||
|
||||
def __init__(self, **kwargs):
|
||||
self.base = ldap.initialize('ldaps://localhost:1636/')
|
||||
self.base.set_option(ldap.OPT_X_TLS_REQUIRE_CERT, ldap.OPT_X_TLS_ALLOW)
|
||||
self.base.set_option(ldap.OPT_X_TLS_NEWCTX, 0)
|
||||
self.base_dn = 'dc=ynerant,dc=fr'
|
||||
|
||||
def query(self, base, scope, filter='(objectClass=*)', attr=None):
|
||||
"""
|
||||
Make a LDAP query
|
||||
query('ldap', 'query', BASE, SCOPE[, FILTER[, ATTR]])
|
||||
BASE: base dn
|
||||
SCOPE: 'base', 'one' or 'sub'
|
||||
FILTER: ldap filter (optional)
|
||||
ATTR: list of attributes (optional)
|
||||
"""
|
||||
scope = { 'base': ldap.SCOPE_BASE, 'one': ldap.SCOPE_ONELEVEL, 'sub': ldap.SCOPE_SUBTREE }[scope]
|
||||
query_id = self.base.search(f"{base}", scope, filter, attr)
|
||||
result = self.base.result(query_id)[1]
|
||||
result = { dn: decode_object(entry) for dn, entry in result }
|
||||
return result
|
||||
|
||||
def ip(self, host, vlan):
|
||||
"""
|
||||
Retrieve IP addresses of an interface of a device
|
||||
query('ldap', 'ip', HOST, VLAN)
|
||||
"""
|
||||
if isinstance(vlan, int):
|
||||
network_query_id = self.base.search(f"ou=networks,{self.base_dn}", ldap.SCOPE_ONELEVEL, f"description={vlan}")
|
||||
network_result = self.base.result(network_query_id)
|
||||
vlan = network_result[1][0][1]['cn'][0].decode('utf-8')
|
||||
if vlan == 'srv':
|
||||
query_id = self.base.search(f"cn={host}.ynerant.fr,cn={host},ou=hosts,{self.base_dn}", ldap.SCOPE_BASE)
|
||||
else:
|
||||
query_id = self.base.search(f"cn={host}.{vlan}.ynerant.fr,cn={host},ou=hosts,{self.base_dn}", ldap.SCOPE_BASE)
|
||||
result = self.base.result(query_id)
|
||||
result = result[1][0][1]
|
||||
result = [res.decode('utf-8') for res in result['ipHostNumber']]
|
||||
return result
|
||||
|
||||
def all_ip(self, host):
|
||||
"""
|
||||
Retrieve all IP addresses of a device
|
||||
query('ldap', 'all_ip', HOST)
|
||||
"""
|
||||
interfaces_query_id = self.base.search(f"cn={host},ou=hosts,{self.base_dn}", ldap.SCOPE_ONELEVEL)
|
||||
interfaces_result = self.base.result(interfaces_query_id)
|
||||
result = []
|
||||
for dn, interface in interfaces_result[1]:
|
||||
for ip in interface['ipHostNumber']:
|
||||
result.append(ip.decode('utf-8'))
|
||||
return result
|
||||
|
||||
def cn(self, host, vlan):
|
||||
"""
|
||||
Retrieve aliases of an interface of a device
|
||||
query('ldap', 'cn', HOST, VLAN)
|
||||
"""
|
||||
if isinstance(vlan, int):
|
||||
network_query_id = self.base.search(f"ou=networks,{self.base_dn}", ldap.SCOPE_ONELEVEL, f"description={vlan}")
|
||||
network_result = self.base.result(network_query_id)
|
||||
vlan = network_result[1][0][1]['cn'][0].decode('utf-8')
|
||||
if vlan == 'srv':
|
||||
query_id = self.base.search(f"cn={host}.ynerant.fr,cn={host},ou=hosts,{self.base_dn}", ldap.SCOPE_BASE)
|
||||
else:
|
||||
query_id = self.base.search(f"cn={host}.{vlan}.ynerant.fr,cn={host},ou=hosts,{self.base_dn}", ldap.SCOPE_BASE)
|
||||
result = self.base.result(query_id)
|
||||
result = result[1][0][1]
|
||||
result = [res.decode('utf-8') for res in result['cn']]
|
||||
return result
|
||||
|
||||
def all_cn(self, host):
|
||||
"""
|
||||
Retrieve all aliases addresses of a device
|
||||
query('ldap', 'all_cn', HOST)
|
||||
"""
|
||||
interfaces_query_id = self.base.search(f"cn={host},ou=hosts,{self.base_dn}", ldap.SCOPE_ONELEVEL)
|
||||
interfaces_result = self.base.result(interfaces_query_id)
|
||||
result = []
|
||||
for dn, interface in interfaces_result[1]:
|
||||
for cn in interface['cn']:
|
||||
result.append(cn.decode('utf-8'))
|
||||
return result
|
||||
|
||||
def ssh_keys(self, host):
|
||||
"""
|
||||
Retrieve SSH keys of a host
|
||||
query('ldap', 'ssh_keys', HOST)
|
||||
"""
|
||||
host_query_id = self.base.search(f"cn={host},ou=hosts,{self.base_dn}", ldap.SCOPE_BASE)
|
||||
host_result = self.base.result(host_query_id)[1][0][1]
|
||||
result = []
|
||||
if 'description' not in host_result:
|
||||
return result
|
||||
for description in host_result['description']:
|
||||
description = description.decode('utf-8')
|
||||
key, value = description.split(':', 1)
|
||||
if key in {'ecdsa-sha2-nistp256', 'ssh-ed25519', 'ssh-dss', 'ssh-rsa'}:
|
||||
result.append(f'{key} {value}')
|
||||
return result
|
||||
|
||||
def subnet_ipv4(self, subnet):
|
||||
"""
|
||||
Retrieve used IP addresses on a subnet
|
||||
query('ldap', 'subnet_ipv4', SUBNET)
|
||||
"""
|
||||
network_query_id = self.base.search(f"cn={subnet},ou=networks,{self.base_dn}", ldap.SCOPE_BASE)
|
||||
network_result = self.base.result(network_query_id)
|
||||
network = network_result[1][0][1]
|
||||
network, hostmask = network['ipNetworkNumber'][0].decode('utf-8'), network['ipNetmaskNumber'][0].decode('utf-8')
|
||||
subnet = ipaddress.IPv4Network(f"{network}/{hostmask}")
|
||||
query_id = self.base.search(f"ou=hosts,{self.base_dn}", ldap.SCOPE_SUBTREE, "objectClass=ipHost")
|
||||
result = self.base.result(query_id)
|
||||
result = [ip.decode('utf-8') for dn, entry in result[1] for ip in entry['ipHostNumber'] if ipaddress.ip_address(ip.decode('utf-8')) in subnet]
|
||||
return result
|
||||
|
||||
def run(self, terms, variables=None, **kwargs):
|
||||
if terms[0] == 'query':
|
||||
result = self.query(*terms[1:])
|
||||
elif terms[0] == 'ip':
|
||||
result = self.ip(*terms[1:])
|
||||
elif terms[0] == 'all_ip':
|
||||
result = self.all_ip(*terms[1:])
|
||||
elif terms[0] == 'cn':
|
||||
result = self.cn(*terms[1:])
|
||||
elif terms[0] == 'all_cn':
|
||||
result = self.all_cn(*terms[1:])
|
||||
elif terms[0] == 'subnet_ipv4':
|
||||
result = self.subnet_ipv4(*terms[1:])
|
||||
elif terms[0] == 'ssh_keys':
|
||||
result = self.ssh_keys(*terms[1:])
|
||||
elif terms[0] == 'group':
|
||||
query_id = self.base.search(f"ou=group,{self.base_dn}", ldap.SCOPE_SUBTREE, "objectClass=posixGroup")
|
||||
result = self.base.result(query_id)
|
||||
result = result[1]
|
||||
# query interface attribute
|
||||
# query('ldap', 'hosts', HOST, VLAN, ATTR)
|
||||
# HOST: device name
|
||||
# VLAN: vlan name
|
||||
# ATTR: attribute
|
||||
elif terms[0] == 'hosts':
|
||||
host = terms[1]
|
||||
vlan = terms[2]
|
||||
attr = terms[3]
|
||||
if isinstance(vlan, int):
|
||||
network_query_id = self.base.search(f"ou=networks,{self.base_dn}", ldap.SCOPE_ONELEVEL, f"description={vlan}")
|
||||
network_result = self.base.result(network_query_id)
|
||||
vlan = network_result[1][0][1]['cn'][0].decode('utf-8')
|
||||
if vlan == 'srv':
|
||||
query_id = self.base.search(f"cn={host}.ynerant.fr,cn={host},ou=hosts,{self.base_dn}", ldap.SCOPE_BASE)
|
||||
else:
|
||||
query_id = self.base.search(f"cn={host}.{vlan}.ynerant.fr,cn={host},ou=hosts,{self.base_dn}", ldap.SCOPE_BASE)
|
||||
result = self.base.result(query_id)
|
||||
result = result[1][0][1]
|
||||
result = [res.decode('utf-8') for res in result[attr]]
|
||||
elif terms[0] == 'network':
|
||||
network = terms[1]
|
||||
query_id = self.base.search(f"cn={network},ou=networks,{self.base_dn}", ldap.SCOPE_BASE, "objectClass=ipNetwork")
|
||||
result = self.base.result(query_id)
|
||||
result = result[1][0][1]
|
||||
return str(ipaddress.ip_network('{}/{}'.format(result['ipNetworkNumber'][0].decode('utf-8'), result['ipNetmaskNumber'][0].decode('utf-8'))))
|
||||
elif terms[0] == 'zones':
|
||||
query_id = self.base.search(f"ou=networks,{self.base_dn}", ldap.SCOPE_ONELEVEL, "objectClass=ipNetwork")
|
||||
result = self.base.result(query_id)
|
||||
res = []
|
||||
for _, network in result[1]:
|
||||
network = network['cn'][0].decode('utf-8')
|
||||
if network == 'srv':
|
||||
res.append('ynerant.fr')
|
||||
else:
|
||||
res.append(f"{network}.ynerant.fr")
|
||||
result = res
|
||||
elif terms[0] == 'vlanid':
|
||||
network = terms[1]
|
||||
query_id = self.base.search(f"cn={network},ou=networks,{self.base_dn}", ldap.SCOPE_BASE, "objectClass=ipNetwork")
|
||||
result = self.base.result(query_id)
|
||||
result = result[1][0][1]
|
||||
return int(result['description'][0])
|
||||
elif terms[0] == 'role':
|
||||
role = terms[1]
|
||||
query_id = self.base.search(f"ou=hosts,{self.base_dn}", ldap.SCOPE_ONELEVEL, f"description=role:{role}")
|
||||
result = self.base.result(query_id)
|
||||
result = [cn.decode('utf-8') for res in result[1] for cn in res[1]['cn']]
|
||||
return result
|
@ -1,14 +1,18 @@
|
||||
#!/usr/bin/env ansible-playbook
|
||||
---
|
||||
|
||||
- import_playbook: root.yml
|
||||
- import_playbook: network_interfaces.yml
|
||||
- import_playbook: apt.yml
|
||||
- import_playbook: ntp.yml
|
||||
- import_playbook: ldap-client.yml
|
||||
- import_playbook: home.yml
|
||||
- import_playbook: nullmailer.yml
|
||||
|
||||
- hosts: debian
|
||||
roles:
|
||||
- sudo
|
||||
- qemu-guest-agent
|
||||
|
||||
- hosts: all
|
||||
roles:
|
||||
|
7
plays/network_interfaces.yml
Executable file
7
plays/network_interfaces.yml
Executable file
@ -0,0 +1,7 @@
|
||||
#!/usr/bin/env ansible-playbook
|
||||
---
|
||||
- hosts: vm
|
||||
vars:
|
||||
network_interfaces: "{{ glob_network_interfaces | default({}) | combine(loc_network_interfaces | default({})) }}"
|
||||
roles:
|
||||
- network-interfaces
|
7
plays/nullmailer.yml
Executable file
7
plays/nullmailer.yml
Executable file
@ -0,0 +1,7 @@
|
||||
#!/usr/bin/env ansible-playbook
|
||||
---
|
||||
- hosts: debian,!postfix
|
||||
vars:
|
||||
nullmailer: "{{ glob_nullmailer | default({}) | combine(loc_nullmailer | default({})) }}"
|
||||
roles:
|
||||
- nullmailer
|
7
plays/root.yml
Executable file
7
plays/root.yml
Executable file
@ -0,0 +1,7 @@
|
||||
#!/usr/bin/env ansible-playbook
|
||||
---
|
||||
- hosts: debian
|
||||
vars:
|
||||
root: "{{ glob_root | default({}) | combine(loc_root | default({})) }}"
|
||||
roles:
|
||||
- root
|
@ -13,9 +13,11 @@
|
||||
- sl
|
||||
- htop
|
||||
- patch
|
||||
- sudo
|
||||
- tmux
|
||||
- traceroute
|
||||
- tree
|
||||
- vim
|
||||
register: pkg_result
|
||||
retries: 3
|
||||
until: pkg_result is succeeded
|
||||
|
28
roles/network-interfaces/tasks/main.yml
Normal file
28
roles/network-interfaces/tasks/main.yml
Normal file
@ -0,0 +1,28 @@
|
||||
---
|
||||
- name: Install vlan support
|
||||
apt:
|
||||
update_cache: true
|
||||
name: vlan
|
||||
state: present
|
||||
register: apt_result
|
||||
retries: 3
|
||||
until: apt_result is succeeded
|
||||
|
||||
- name: Deploy default interfaces config
|
||||
template:
|
||||
src: network/interfaces.j2
|
||||
dest: /etc/network/interfaces
|
||||
mode: 0644
|
||||
|
||||
- name: Remove cloud-init interface configuration
|
||||
file:
|
||||
path: /etc/network/interfaces.d/50-cloud-init
|
||||
state: absent
|
||||
|
||||
- name: Deploy interfaces config
|
||||
template:
|
||||
src: "network/interfaces.d/ifalias.j2"
|
||||
dest: "/etc/network/interfaces.d/{{ '%02d' | format(item.id) }}-{{ item.name | replace('_', '-') }}"
|
||||
mode: 0644
|
||||
when: item.name in interfaces
|
||||
loop: "{{ network_interfaces.vlan }}"
|
@ -0,0 +1,55 @@
|
||||
{{ ansible_header | comment }}
|
||||
|
||||
{% set vlan_name = (item.name | replace('_', '-')) %}
|
||||
{% set subnet_network = (query('ldap', 'network', vlan_name) | ipaddr('network')) %}
|
||||
{% set subnet_netmask = (query('ldap', 'network', vlan_name) | ipaddr('netmask')) %}
|
||||
{% set ips = query('ldap', 'ip', ansible_hostname, vlan_name) %}
|
||||
{% if (ips | ipv4 | length) > 0 %}
|
||||
auto {{ interfaces[item.name] }}
|
||||
iface {{ interfaces[item.name] }} inet static
|
||||
{% for ip in (ips | ipv4) %}
|
||||
address {{ ip }}
|
||||
{% endfor %}
|
||||
network {{ subnet_network }}
|
||||
netmask {{ subnet_netmask }}
|
||||
{% if item.gateway is defined and item.gateway not in (ips | ipv4) %}
|
||||
gateway {{ item.gateway }}
|
||||
{% endif %}
|
||||
{% if item.metric is defined %}
|
||||
metric {{ item.metric }}
|
||||
{% endif %}
|
||||
{% if item.dns is defined %}
|
||||
dns-nameservers {{ item.dns }}
|
||||
{% endif %}
|
||||
{% if vlan_name == 'srv' %}
|
||||
dns-search ynerant.fr
|
||||
{% else %}
|
||||
dns-search {{ vlan_name }}.ynerant.fr
|
||||
{% endif %}
|
||||
up /sbin/ip link set $IFACE alias {{ vlan_name }}
|
||||
{% if ansible_local.interfaces.sup_if_4 is defined %}
|
||||
{% if interfaces[item.name] in ansible_local.interfaces.sup_if_4 %}
|
||||
{% for line in ansible_local.interfaces.sup_if_4[interfaces[item.name]] %}
|
||||
{{ line }}
|
||||
{% endfor %}
|
||||
{% endif %}
|
||||
{% endif %}
|
||||
{% endif %}
|
||||
|
||||
{% if (ips | ipv6 | length) > 0 %}
|
||||
iface {{ interfaces[item.name] }} inet6 static
|
||||
{% for ip in (ips | ipv6) %}
|
||||
address {{ ip }}/64
|
||||
{% endfor %}
|
||||
{% if item.gateway_v6 is defined and item.gateway_v6 not in (ips | ipv6) %}
|
||||
gateway {{ item.gateway_v6 }}
|
||||
{% endif %}
|
||||
accept_ra 0
|
||||
{% if ansible_local.interfaces.sup_if_6 is defined %}
|
||||
{% if interfaces[item.name] in ansible_local.interfaces.sup_if_6 %}
|
||||
{% for line in ansible_local.interfaces.sup_if_6[interfaces[item.name]] %}
|
||||
{{ line }}
|
||||
{% endfor %}
|
||||
{% endif %}
|
||||
{% endif %}
|
||||
{% endif %}
|
10
roles/network-interfaces/templates/network/interfaces.j2
Normal file
10
roles/network-interfaces/templates/network/interfaces.j2
Normal file
@ -0,0 +1,10 @@
|
||||
{{ ansible_header | comment }}
|
||||
|
||||
# This file describes the network interfaces available on your system
|
||||
# and how to activate them. For more information, see interfaces(5).
|
||||
|
||||
source /etc/network/interfaces.d/*
|
||||
|
||||
# The loopback network interface
|
||||
auto lo
|
||||
iface lo inet loopback
|
34
roles/nullmailer/tasks/main.yml
Normal file
34
roles/nullmailer/tasks/main.yml
Normal file
@ -0,0 +1,34 @@
|
||||
---
|
||||
- name: Install nullmailer
|
||||
apt:
|
||||
update_cache: true
|
||||
name:
|
||||
- nullmailer
|
||||
- bsd-mailx
|
||||
register: apt_result
|
||||
retries: 3
|
||||
until: apt_result is succeeded
|
||||
|
||||
- name: Set nullmailer remotes
|
||||
copy:
|
||||
content: "{{ nullmailer.smtp_server }} smtp --auth-login --user={{ nullmailer.username }} --pass='{{ nullmailer.password }}'\n"
|
||||
dest: /etc/nullmailer/remotes
|
||||
mode: 0644
|
||||
|
||||
- name: Set nullmailer adminaddr
|
||||
copy:
|
||||
content: "{{ nullmailer.root }}\n"
|
||||
dest: /etc/nullmailer/adminaddr
|
||||
mode: 0644
|
||||
|
||||
- name: Set nullmailer defaulthost
|
||||
copy:
|
||||
content: "{{ nullmailer.defaulthost }}\n"
|
||||
dest: /etc/nullmailer/defaulthost
|
||||
mode: 0644
|
||||
|
||||
- name: Set nullmailer allmailfrom
|
||||
copy:
|
||||
content: "{{ nullmailer.allmailfrom }}\n"
|
||||
dest: /etc/nullmailer/allmailfrom
|
||||
mode: 0644
|
19
roles/qemu-guest-agent/tasks/main.yml
Normal file
19
roles/qemu-guest-agent/tasks/main.yml
Normal file
@ -0,0 +1,19 @@
|
||||
---
|
||||
- name: Install qemu guest agent
|
||||
apt:
|
||||
update_cache: true
|
||||
install_recommends: false
|
||||
name:
|
||||
- qemu-guest-agent
|
||||
register: apt_result
|
||||
retries: 3
|
||||
until: apt_result is succeeded
|
||||
|
||||
- name: Remove cloud-init
|
||||
apt:
|
||||
name: cloud-init
|
||||
state: absent
|
||||
purge: true
|
||||
register: apt_result
|
||||
retries: 3
|
||||
until: apt_result is succeeded
|
6
roles/root/tasks/main.yml
Normal file
6
roles/root/tasks/main.yml
Normal file
@ -0,0 +1,6 @@
|
||||
---
|
||||
- name: Deploys root password hash
|
||||
replace:
|
||||
path: /etc/shadow
|
||||
regexp: '^root:[^:]*:'
|
||||
replace: 'root:{{ root.passwd_hash }}:'
|
Loading…
x
Reference in New Issue
Block a user