From d1b0144e68cc2248319e3eefda0c62e6a3a6e45b Mon Sep 17 00:00:00 2001 From: vincent Date: Sun, 19 Jun 2022 12:38:23 +0200 Subject: [PATCH] split workstation and server playbook from https://git.ducamps.win/vincent/ansible --- .gitignore | 1 + ansible/ansible.cfg | 495 +++++++++++++++++++++++++++ ansible/group_vars/VMServer | 24 ++ ansible/group_vars/VPS | 74 ++++ ansible/group_vars/all/all | 20 ++ ansible/group_vars/all/server | 37 ++ ansible/group_vars/all/sssd | 5 + ansible/group_vars/database | 55 +++ ansible/group_vars/dhcp | 152 ++++++++ ansible/group_vars/homelab/homelab | 10 + ansible/group_vars/homelab/mount | 93 +++++ ansible/group_vars/rsyncd | 9 + ansible/group_vars/wireguard | 0 ansible/host_vars/VMAS-BUILD | 2 + ansible/host_vars/VMAS-HML | 2 + ansible/host_vars/VMDR | 2 + ansible/host_vars/corwin | 40 +++ ansible/host_vars/gerard | 3 + ansible/host_vars/oscar | 16 + ansible/makefile | 12 + ansible/playbooks/HashicorpStack.yml | 11 + ansible/playbooks/bootstrap.yml | 4 + ansible/playbooks/database.yml | 7 + ansible/playbooks/dhcpd.yml | 7 + ansible/playbooks/music-player.yml | 8 + ansible/playbooks/rsyncd.yml | 7 + ansible/playbooks/server.yml | 11 + ansible/playbooks/user_config.yml | 4 + ansible/playbooks/wireguard.yml | 5 + ansible/production | 20 ++ ansible/provisionning.yml | 15 + ansible/roles/.gitignore | 12 + ansible/roles/requirements.yml | 37 ++ ansible/site.yml | 9 + ansible/staging | 13 + 35 files changed, 1222 insertions(+) create mode 100644 .gitignore create mode 100644 ansible/ansible.cfg create mode 100644 ansible/group_vars/VMServer create mode 100644 ansible/group_vars/VPS create mode 100644 ansible/group_vars/all/all create mode 100644 ansible/group_vars/all/server create mode 100644 ansible/group_vars/all/sssd create mode 100644 ansible/group_vars/database create mode 100644 ansible/group_vars/dhcp create mode 100644 ansible/group_vars/homelab/homelab create mode 100644 ansible/group_vars/homelab/mount create mode 100644 ansible/group_vars/rsyncd create mode 100644 ansible/group_vars/wireguard create mode 100644 ansible/host_vars/VMAS-BUILD create mode 100644 ansible/host_vars/VMAS-HML create mode 100644 ansible/host_vars/VMDR create mode 100644 ansible/host_vars/corwin create mode 100644 ansible/host_vars/gerard create mode 100644 ansible/host_vars/oscar create mode 100644 ansible/makefile create mode 100644 ansible/playbooks/HashicorpStack.yml create mode 100644 ansible/playbooks/bootstrap.yml create mode 100644 ansible/playbooks/database.yml create mode 100644 ansible/playbooks/dhcpd.yml create mode 100644 ansible/playbooks/music-player.yml create mode 100644 ansible/playbooks/rsyncd.yml create mode 100644 ansible/playbooks/server.yml create mode 100644 ansible/playbooks/user_config.yml create mode 100644 ansible/playbooks/wireguard.yml create mode 100644 ansible/production create mode 100644 ansible/provisionning.yml create mode 100644 ansible/roles/.gitignore create mode 100644 ansible/roles/requirements.yml create mode 100644 ansible/site.yml create mode 100644 ansible/staging diff --git a/.gitignore b/.gitignore new file mode 100644 index 0000000..8d4bfcf --- /dev/null +++ b/.gitignore @@ -0,0 +1 @@ +nohup.out diff --git a/ansible/ansible.cfg b/ansible/ansible.cfg new file mode 100644 index 0000000..1992b9f --- /dev/null +++ b/ansible/ansible.cfg @@ -0,0 +1,495 @@ +# config file for ansible -- https://ansible.com/ +# =============================================== + +# nearly all parameters can be overridden in ansible-playbook +# or with command line flags. ansible will read ANSIBLE_CONFIG, +# ansible.cfg in the current working directory, .ansible.cfg in +# the home directory or /etc/ansible/ansible.cfg, whichever it +# finds first + +[defaults] +# some basic default values... + +#inventory = /etc/ansible/hosts +#library = /usr/share/my_modules/ +#module_utils = /usr/share/my_module_utils/ +#remote_tmp = ~/.ansible/tmp +#local_tmp = ~/.ansible/tmp +#plugin_filters_cfg = /etc/ansible/plugin_filters.yml +#forks = 5 +#poll_interval = 15 +#sudo_user = root +#ask_sudo_pass = True +#ask_pass = True +#transport = smart +#remote_port = 22 +#module_lang = C +#module_set_locale = False + +# plays will gather facts by default, which contain information about +# the remote system. +# +# smart - gather by default, but don't regather if already gathered +# implicit - gather by default, turn off with gather_facts: False +# explicit - do not gather by default, must say gather_facts: True +#gathering = implicit + +# This only affects the gathering done by a play's gather_facts directive, +# by default gathering retrieves all facts subsets +# all - gather all subsets +# network - gather min and network facts +# hardware - gather hardware facts (longest facts to retrieve) +# virtual - gather min and virtual facts +# facter - import facts from facter +# ohai - import facts from ohai +# You can combine them using comma (ex: network,virtual) +# You can negate them using ! (ex: !hardware,!facter,!ohai) +# A minimal set of facts is always gathered. +#gather_subset = all + +# some hardware related facts are collected +# with a maximum timeout of 10 seconds. This +# option lets you increase or decrease that +# timeout to something more suitable for the +# environment. +# gather_timeout = 10 + +# Ansible facts are available inside the ansible_facts.* dictionary +# namespace. This setting maintains the behaviour which was the default prior +# to 2.5, duplicating these variables into the main namespace, each with a +# prefix of 'ansible_'. +# This variable is set to True by default for backwards compatibility. It +# will be changed to a default of 'False' in a future release. +# ansible_facts. +# inject_facts_as_vars = True + +# additional paths to search for roles in, colon separated +roles_path = roles + +# uncomment this to disable SSH key host checking +host_key_checking = False + +# change the default callback, you can only have one 'stdout' type enabled at a time. +#stdout_callback = skippy + + +## Ansible ships with some plugins that require whitelisting, +## this is done to avoid running all of a type by default. +## These setting lists those that you want enabled for your system. +## Custom plugins should not need this unless plugin author specifies it. + +# enable callback plugins, they can output to stdout but cannot be 'stdout' type. +#callback_whitelist = timer, mail + +# Determine whether includes in tasks and handlers are "static" by +# default. As of 2.0, includes are dynamic by default. Setting these +# values to True will make includes behave more like they did in the +# 1.x versions. +#task_includes_static = False +#handler_includes_static = False + +# Controls if a missing handler for a notification event is an error or a warning +#error_on_missing_handler = True + +# change this for alternative sudo implementations +#sudo_exe = sudo + +# What flags to pass to sudo +# WARNING: leaving out the defaults might create unexpected behaviours +#sudo_flags = -H -S -n + +# SSH timeout +#timeout = 10 + +# default user to use for playbooks if user is not specified +# (/usr/bin/ansible will use current user as default) +#remote_user = root + +# logging is off by default unless this path is defined +# if so defined, consider logrotate +#log_path = /var/log/ansible.log + +# default module name for /usr/bin/ansible +#module_name = command + +# use this shell for commands executed under sudo +# you may need to change this to bin/bash in rare instances +# if sudo is constrained +#executable = /bin/sh + +# if inventory variables overlap, does the higher precedence one win +# or are hash values merged together? The default is 'replace' but +# this can also be set to 'merge'. +#hash_behaviour = merge + +# by default, variables from roles will be visible in the global variable +# scope. To prevent this, the following option can be enabled, and only +# tasks and handlers within the role will see the variables there +#private_role_vars = yes + +# list any Jinja2 extensions to enable here: +#jinja2_extensions = jinja2.ext.do,jinja2.ext.i18n + +# if set, always use this private key file for authentication, same as +# if passing --private-key to ansible or ansible-playbook +#private_key_file = /path/to/file + +# If set, configures the path to the Vault password file as an alternative to +# specifying --vault-password-file on the command line. +#vault_password_file = /path/to/vault_password_file + +# format of string {{ ansible_managed }} available within Jinja2 +# templates indicates to users editing templates files will be replaced. +# replacing {file}, {host} and {uid} and strftime codes with proper values. +#ansible_managed = Ansible managed: {file} modified on %Y-%m-%d %H:%M:%S by {uid} on {host} +# {file}, {host}, {uid}, and the timestamp can all interfere with idempotence +# in some situations so the default is a static string: +#ansible_managed = Ansible managed + +# by default, ansible-playbook will display "Skipping [host]" if it determines a task +# should not be run on a host. Set this to "False" if you don't want to see these "Skipping" +# messages. NOTE: the task header will still be shown regardless of whether or not the +# task is skipped. +#display_skipped_hosts = True + +# by default, if a task in a playbook does not include a name: field then +# ansible-playbook will construct a header that includes the task's action but +# not the task's args. This is a security feature because ansible cannot know +# if the *module* considers an argument to be no_log at the time that the +# header is printed. If your environment doesn't have a problem securing +# stdout from ansible-playbook (or you have manually specified no_log in your +# playbook on all of the tasks where you have secret information) then you can +# safely set this to True to get more informative messages. +#display_args_to_stdout = False + +# by default (as of 1.3), Ansible will raise errors when attempting to dereference +# Jinja2 variables that are not set in templates or action lines. Uncomment this line +# to revert the behavior to pre-1.3. +#error_on_undefined_vars = False + +# by default (as of 1.6), Ansible may display warnings based on the configuration of the +# system running ansible itself. This may include warnings about 3rd party packages or +# other conditions that should be resolved if possible. +# to disable these warnings, set the following value to False: +#system_warnings = True + +# by default (as of 1.4), Ansible may display deprecation warnings for language +# features that should no longer be used and will be removed in future versions. +# to disable these warnings, set the following value to False: +#deprecation_warnings = True + +# (as of 1.8), Ansible can optionally warn when usage of the shell and +# command module appear to be simplified by using a default Ansible module +# instead. These warnings can be silenced by adjusting the following +# setting or adding warn=yes or warn=no to the end of the command line +# parameter string. This will for example suggest using the git module +# instead of shelling out to the git command. +# command_warnings = False + + +# set plugin path directories here, separate with colons +#action_plugins = /usr/share/ansible/plugins/action +#cache_plugins = /usr/share/ansible/plugins/cache +#callback_plugins = /usr/share/ansible/plugins/callback +#connection_plugins = /usr/share/ansible/plugins/connection +#lookup_plugins = /usr/share/ansible/plugins/lookup +#inventory_plugins = /usr/share/ansible/plugins/inventory +#vars_plugins = /usr/share/ansible/plugins/vars +#filter_plugins = /usr/share/ansible/plugins/filter +#test_plugins = /usr/share/ansible/plugins/test +#terminal_plugins = /usr/share/ansible/plugins/terminal +#strategy_plugins = /usr/share/ansible/plugins/strategy + + +# by default, ansible will use the 'linear' strategy but you may want to try +# another one +#strategy = free + +# by default callbacks are not loaded for /bin/ansible, enable this if you +# want, for example, a notification or logging callback to also apply to +# /bin/ansible runs +#bin_ansible_callbacks = False + + +# don't like cows? that's unfortunate. +# set to 1 if you don't want cowsay support or export ANSIBLE_NOCOWS=1 +#nocows = 1 + +# set which cowsay stencil you'd like to use by default. When set to 'random', +# a random stencil will be selected for each task. The selection will be filtered +# against the `cow_whitelist` option below. +#cow_selection = default +#cow_selection = random + +# when using the 'random' option for cowsay, stencils will be restricted to this list. +# it should be formatted as a comma-separated list with no spaces between names. +# NOTE: line continuations here are for formatting purposes only, as the INI parser +# in python does not support them. +#cow_whitelist=bud-frogs,bunny,cheese,daemon,default,dragon,elephant-in-snake,elephant,eyes,\ +# hellokitty,kitty,luke-koala,meow,milk,moofasa,moose,ren,sheep,small,stegosaurus,\ +# stimpy,supermilker,three-eyes,turkey,turtle,tux,udder,vader-koala,vader,www + +# don't like colors either? +# set to 1 if you don't want colors, or export ANSIBLE_NOCOLOR=1 +#nocolor = 1 + +# if set to a persistent type (not 'memory', for example 'redis') fact values +# from previous runs in Ansible will be stored. This may be useful when +# wanting to use, for example, IP information from one group of servers +# without having to talk to them in the same playbook run to get their +# current IP information. +#fact_caching = memory + +#This option tells Ansible where to cache facts. The value is plugin dependent. +#For the jsonfile plugin, it should be a path to a local directory. +#For the redis plugin, the value is a host:port:database triplet: fact_caching_connection = localhost:6379:0 + +#fact_caching_connection=/tmp + + + +# retry files +# When a playbook fails by default a .retry file will be created in ~/ +# You can disable this feature by setting retry_files_enabled to False +# and you can change the location of the files by setting retry_files_save_path + +retry_files_enabled = False +#retry_files_save_path = ~/.ansible-retry + +# squash actions +# Ansible can optimise actions that call modules with list parameters +# when looping. Instead of calling the module once per with_ item, the +# module is called once with all items at once. Currently this only works +# under limited circumstances, and only with parameters named 'name'. +#squash_actions = apk,apt,dnf,homebrew,pacman,pkgng,yum,zypper + +# prevents logging of task data, off by default +#no_log = False + +# prevents logging of tasks, but only on the targets, data is still logged on the master/controller +#no_target_syslog = False + +# controls whether Ansible will raise an error or warning if a task has no +# choice but to create world readable temporary files to execute a module on +# the remote machine. This option is False by default for security. Users may +# turn this on to have behaviour more like Ansible prior to 2.1.x. See +# https://docs.ansible.com/ansible/become.html#becoming-an-unprivileged-user +# for more secure ways to fix this than enabling this option. +#allow_world_readable_tmpfiles = False + +# controls the compression level of variables sent to +# worker processes. At the default of 0, no compression +# is used. This value must be an integer from 0 to 9. +#var_compression_level = 9 + +# controls what compression method is used for new-style ansible modules when +# they are sent to the remote system. The compression types depend on having +# support compiled into both the controller's python and the client's python. +# The names should match with the python Zipfile compression types: +# * ZIP_STORED (no compression. available everywhere) +# * ZIP_DEFLATED (uses zlib, the default) +# These values may be set per host via the ansible_module_compression inventory +# variable +#module_compression = 'ZIP_DEFLATED' + +# This controls the cutoff point (in bytes) on --diff for files +# set to 0 for unlimited (RAM may suffer!). +#max_diff_size = 1048576 + +# This controls how ansible handles multiple --tags and --skip-tags arguments +# on the CLI. If this is True then multiple arguments are merged together. If +# it is False, then the last specified argument is used and the others are ignored. +# This option will be removed in 2.8. +#merge_multiple_cli_flags = True + +# Controls showing custom stats at the end, off by default +#show_custom_stats = True + +# Controls which files to ignore when using a directory as inventory with +# possibly multiple sources (both static and dynamic) +#inventory_ignore_extensions = ~, .orig, .bak, .ini, .cfg, .retry, .pyc, .pyo + +# This family of modules use an alternative execution path optimized for network appliances +# only update this setting if you know how this works, otherwise it can break module execution +#network_group_modules=eos, nxos, ios, iosxr, junos, vyos + +# When enabled, this option allows lookups (via variables like {{lookup('foo')}} or when used as +# a loop with `with_foo`) to return data that is not marked "unsafe". This means the data may contain +# jinja2 templating language which will be run through the templating engine. +# ENABLING THIS COULD BE A SECURITY RISK +#allow_unsafe_lookups = False + +# set default errors for all plays +#any_errors_fatal = False + +[inventory] +# enable inventory plugins, default: 'host_list', 'script', 'yaml', 'ini', 'auto' +#enable_plugins = host_list, virtualbox, yaml, constructed + +# ignore these extensions when parsing a directory as inventory source +#ignore_extensions = .pyc, .pyo, .swp, .bak, ~, .rpm, .md, .txt, ~, .orig, .ini, .cfg, .retry + +# ignore files matching these patterns when parsing a directory as inventory source +#ignore_patterns= + +# If 'true' unparsed inventory sources become fatal errors, they are warnings otherwise. +#unparsed_is_failed=False + +[privilege_escalation] +#become=True +#become_method=sudo +#become_user=root +#become_ask_pass=False + +[paramiko_connection] + +# uncomment this line to cause the paramiko connection plugin to not record new host +# keys encountered. Increases performance on new host additions. Setting works independently of the +# host key checking setting above. +#record_host_keys=False + +# by default, Ansible requests a pseudo-terminal for commands executed under sudo. Uncomment this +# line to disable this behaviour. +#pty=False + +# paramiko will default to looking for SSH keys initially when trying to +# authenticate to remote devices. This is a problem for some network devices +# that close the connection after a key failure. Uncomment this line to +# disable the Paramiko look for keys function +#look_for_keys = False + +# When using persistent connections with Paramiko, the connection runs in a +# background process. If the host doesn't already have a valid SSH key, by +# default Ansible will prompt to add the host key. This will cause connections +# running in background processes to fail. Uncomment this line to have +# Paramiko automatically add host keys. +#host_key_auto_add = True + +[ssh_connection] + +# ssh arguments to use +# Leaving off ControlPersist will result in poor performance, so use +# paramiko on older platforms rather than removing it, -C controls compression use +ssh_args = -o ForwardAgent=yes -C -o ControlMaster=auto -o ControlPersist=60s -o UserKnownHostsFile=/dev/null -o StrictHostKeyChecking=no + +# The base directory for the ControlPath sockets. +# This is the "%(directory)s" in the control_path option +# +# Example: +# control_path_dir = /tmp/.ansible/cp +#control_path_dir = ~/.ansible/cp + +# The path to use for the ControlPath sockets. This defaults to a hashed string of the hostname, +# port and username (empty string in the config). The hash mitigates a common problem users +# found with long hostames and the conventional %(directory)s/ansible-ssh-%%h-%%p-%%r format. +# In those cases, a "too long for Unix domain socket" ssh error would occur. +# +# Example: +# control_path = %(directory)s/%%h-%%r +#control_path = + +# Enabling pipelining reduces the number of SSH operations required to +# execute a module on the remote server. This can result in a significant +# performance improvement when enabled, however when using "sudo:" you must +# first disable 'requiretty' in /etc/sudoers +# +# By default, this option is disabled to preserve compatibility with +# sudoers configurations that have requiretty (the default on many distros). +# +#pipelining = False + +# Control the mechanism for transferring files (old) +# * smart = try sftp and then try scp [default] +# * True = use scp only +# * False = use sftp only +#scp_if_ssh = smart + +# Control the mechanism for transferring files (new) +# If set, this will override the scp_if_ssh option +# * sftp = use sftp to transfer files +# * scp = use scp to transfer files +# * piped = use 'dd' over SSH to transfer files +# * smart = try sftp, scp, and piped, in that order [default] +#transfer_method = smart + +# if False, sftp will not use batch mode to transfer files. This may cause some +# types of file transfer failures impossible to catch however, and should +# only be disabled if your sftp version has problems with batch mode +#sftp_batch_mode = False + +# The -tt argument is passed to ssh when pipelining is not enabled because sudo +# requires a tty by default. +#use_tty = True + +# Number of times to retry an SSH connection to a host, in case of UNREACHABLE. +# For each retry attempt, there is an exponential backoff, +# so after the first attempt there is 1s wait, then 2s, 4s etc. up to 30s (max). +#retries = 3 + +[persistent_connection] + +# Configures the persistent connection timeout value in seconds. This value is +# how long the persistent connection will remain idle before it is destroyed. +# If the connection doesn't receive a request before the timeout value +# expires, the connection is shutdown. The default value is 30 seconds. +#connect_timeout = 30 + +# Configures the persistent connection retry timeout. This value configures the +# the retry timeout that ansible-connection will wait to connect +# to the local domain socket. This value must be larger than the +# ssh timeout (timeout) and less than persistent connection idle timeout (connect_timeout). +# The default value is 15 seconds. +#connect_retry_timeout = 15 + +# The command timeout value defines the amount of time to wait for a command +# or RPC call before timing out. The value for the command timeout must +# be less than the value of the persistent connection idle timeout (connect_timeout) +# The default value is 10 second. +#command_timeout = 10 + +[accelerate] +#accelerate_port = 5099 +#accelerate_timeout = 30 +#accelerate_connect_timeout = 5.0 + +# The daemon timeout is measured in minutes. This time is measured +# from the last activity to the accelerate daemon. +#accelerate_daemon_timeout = 30 + +# If set to yes, accelerate_multi_key will allow multiple +# private keys to be uploaded to it, though each user must +# have access to the system via SSH to add a new key. The default +# is "no". +#accelerate_multi_key = yes + +[selinux] +# file systems that require special treatment when dealing with security context +# the default behaviour that copies the existing context or uses the user default +# needs to be changed to use the file system dependent context. +#special_context_filesystems=nfs,vboxsf,fuse,ramfs,9p + +# Set this to yes to allow libvirt_lxc connections to work without SELinux. +#libvirt_lxc_noseclabel = yes + +[colors] +#highlight = white +#verbose = blue +#warn = bright purple +#error = red +#debug = dark gray +#deprecate = purple +#skip = cyan +#unreachable = red +#ok = green +#changed = yellow +#diff_add = green +#diff_remove = red +#diff_lines = cyan + + +[diff] +# Always print diff when running ( same as always running with -D/--diff ) +# always = no + +# Set how many context lines to show in diff +# context = 3 diff --git a/ansible/group_vars/VMServer b/ansible/group_vars/VMServer new file mode 100644 index 0000000..2456e81 --- /dev/null +++ b/ansible/group_vars/VMServer @@ -0,0 +1,24 @@ +system_upgrade: true +nginx_error_log: "/var/log/nginx/error.log debug" + +hosts_entries: + - name: ducamps.win + ip: 127.0.0.1 + aliases: + - arch.ducamps.win + - www.ducamps.win + - file.ducamps.win + - supysonic.ducamps.win + - syno.ducamps.win + - vault.ducamps.win + - ww.ducamps.win + - hass.ducamps.win + - git.ducamps.win + +consul_bootstrap_expect: 1 +nomad_bootstrap_expect: 1 +nomad_datacenter: hml +consul_server: False +nomad_server: False +consul_retry_join_force: + - 192.168.1.40 diff --git a/ansible/group_vars/VPS b/ansible/group_vars/VPS new file mode 100644 index 0000000..2eba52d --- /dev/null +++ b/ansible/group_vars/VPS @@ -0,0 +1,74 @@ +# defaults file for ansible-arch-provissionning +partition_table: + - device: "/dev/sda" + label: gpt + settings: + - number: 1 + part_end: 64MB + flags: [boot, esp] + fstype: vfat + format: yes + - number: 2 + part_start: 512MB + part_end: 1524MB + flags: [] + fstype: swap + format: yes + - number: 3 + part_start: 1524MB + flags: [lvm] + fstype: ext4 + format: yes + #- device: "/dev/sdb" + #settings: + #- number: 1 + #name: home + #fstype: ext4 + #format: +mount_table: + - device: "/dev/sda" + settings: + - number: 3 + mountpath: /mnt + fstype: ext4 + - number: 1 + mountpath: /mnt/boot + fstype: vfat + +#need vfat boot partition with esp label +provissionning_UEFI_Enable: True +sssd_configure: False +nomad_datacenter: hetzner + +systemd_mounts: + diskstation_nomad: + share: diskstation.ducamps.win:/volume2/nomad + mount: /mnt/diskstation/nomad + type: nfs + options: + - " " + automount: true + hetzner_storage: + share: //u304977.your-storagebox.de/backup + mount: /mnt/hetzner/storagebox + type: cifs + options: + - credentials=/etc/creds/hetzner_credentials + - uid= 1024 + - gid= 10 + - vers=3.0 + - mfsymlinks + automount: true +credentials_files: + 1: + type: smb + path: /etc/creds/hetzner_credentials + username: u304977 + password: "{{ lookup('hashi_vault','secret=secrets/data/ansible/storage:hetzner') }}" + + + +systemd_mounts_enabled: + - diskstation_nomad + - hetzner_storage + diff --git a/ansible/group_vars/all/all b/ansible/group_vars/all/all new file mode 100644 index 0000000..4647e85 --- /dev/null +++ b/ansible/group_vars/all/all @@ -0,0 +1,20 @@ +##ansible_python_interpreter: /usr/bin/python2 +user: + name: vincent + uid: 1024 + mail: vincent@ducamps.win + +domain: + name: ducamps.win + +hass_public_key: ssh-rsa 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 + +system_arch_local_mirror: "https://arch.{{domain.name}}" + +privatekeytodeploy: + - user: "{{user.name}}" + keyfile: "/home/{{user.name}}/.ssh/id_gitea" + privatekey: "{{lookup('hashi_vault', 'secret=secrets/data/ansible/privatekey:gitea')}}" + - user: root + keyfile: /root/.ssh/id_gitea + privatekey: "{{lookup('hashi_vault', 'secret=secrets/data/ansible/privatekey:gitea')}}" diff --git a/ansible/group_vars/all/server b/ansible/group_vars/all/server new file mode 100644 index 0000000..cfb2def --- /dev/null +++ b/ansible/group_vars/all/server @@ -0,0 +1,37 @@ +consul_client_addr: "0.0.0.0" +consul_datacenter: "homelab" +consul_backup_location: "/mnt/diskstation/git/backup/consul" +consul_ansible_group: all +consul_bootstrap_expect: 2 +nomad_vault_enabled: true +nomad_vault_address: "http://active.vault.service.consul:8200" +nomad_vault_role: "nomad-cluster" +nomad_vault_token: "{{ lookup('hashi_vault','secret=secrets/data/ansible/hashistack:nomad_vault_token') }}" +nomad_bootstrap_expect: 2 +notification_mail: "{{inventory_hostname}}@{{ domain.name }}" +msmtp_mailhub: smtp.{{ domain.name }} +msmtp_auth_user: "{{ user.mail }}" +msmtp_auth_pass: "{{ lookup('hashi_vault','secret=secrets/data/ansible/other:email') }}" + +docker_users: "{{user.name}}" + +system_user: + - name: drone-deploy + home: /home/drone-deploy + shell: /bin/bash + +keystodeploy: + - name: juicessh with password + user: "{{user.name}}" + sshkey: ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAINN5V9WPPi2/HwAQuDeaJO3hUPf8HxNMHqVmkf1pDjWg JuiceSSH + - name: fixe-pc new + user: "{{user.name}}" + sshkey: ssh-rsa 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 vincent@fixe-pc-2020-03-01 + - name: zen-pc + user: "{{user.name}}" + sshkey: ssh-rsa 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 vincent@zen-pc + - name: drone + user: drone-deploy + sshkey: ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDUaK+pQlosmopbZfucll9UdqDOTaODOBwoxRwkJEk1i drone@oscar + + diff --git a/ansible/group_vars/all/sssd b/ansible/group_vars/all/sssd new file mode 100644 index 0000000..2f30f16 --- /dev/null +++ b/ansible/group_vars/all/sssd @@ -0,0 +1,5 @@ +sssd_configure: true +# sssd_configure is False by default - by default nothing is done by this role. +ldap_search_base: "dc=ducamps,dc=win" +ldap_uri: "ldaps://ldap.ducamps.win" +ldap_sudo_search_base: "ou=sudoers,dc=ducamps,dc=win" diff --git a/ansible/group_vars/database b/ansible/group_vars/database new file mode 100644 index 0000000..36c0e98 --- /dev/null +++ b/ansible/group_vars/database @@ -0,0 +1,55 @@ + +postgresql_users: + - name: root + role_attr_flags: SUPERUSER + password: "{{ lookup('hashi_vault', 'secret=secrets/data/ansible/database:root')}}" + - name: wikijs + password: "{{ lookup('hashi_vault', 'secret=secrets/data/ansible/database:wikijs')}}" + - name: ttrss + password: "{{ lookup('hashi_vault', 'secret=secrets/data/ansible/database:ttrss')}}" + - name: gitea + password: "{{ lookup('hashi_vault', 'secret=secrets/data/ansible/database:gitea')}}" + - name: supysonic + password: "{{ lookup('hashi_vault', 'secret=secrets/data/ansible/database:supysonic')}}" + - name: hass + password: "{{ lookup('hashi_vault', 'secret=secrets/data/ansible/database:hass')}}" + - name: nextcloud + password: "{{ lookup('hashi_vault', 'secret=secrets/data/ansible/database:nextcloud')}}" + - name: vaultwarden + password: "{{ lookup('hashi_vault', 'secret=secrets/data/ansible/database:vaultwarden')}}" + - name: drone + password: "{{ lookup('hashi_vault', 'secret=secrets/data/ansible/database:drone')}}" + +postgresql_databases: + - name: wikijs + lc_collate: fr_FR.UTF-8 + lc_ctype: en_US.UTF-8 + owner: wikijs + - name: ttrss + lc_collate: fr_FR.UTF-8 + lc_ctype: fr_FR.UTF-8 + owner: ttrss + - name: gitea + lc_collate: fr_FR.UTF-8 + lc_ctype: fr_FR.UTF-8 + owner: gitea + - name: supysonic + lc_collate: fr_FR.UTF-8 + lc_ctype: fr_FR.UTF-8 + owner: supysonic + - name: hass + lc_collate: fr_FR.UTF-8 + lc_ctype: fr_FR.UTF-8 + owner: hass + - name: nextcloud + lc_collate: fr_FR.UTF-8 + lc_ctype: fr_FR.UTF-8 + owner: nextcloud + - name: vaultwarden + lc_collate: fr_FR.UTF-8 + lc_ctype: fr_FR.UTF-8 + owner: vaultwarden + - name: drone + lc_collate: fr_FR.UTF-8 + lc_ctype: fr_FR.UTF-8 + owner: drone diff --git a/ansible/group_vars/dhcp b/ansible/group_vars/dhcp new file mode 100644 index 0000000..fce043e --- /dev/null +++ b/ansible/group_vars/dhcp @@ -0,0 +1,152 @@ +dhcpd_authoritative: True +dhcpd_lease_time: '72' +dhcpd_domain_name: "{{ domain.name }}" +dhcpd_nameservers: + - '192.168.1.40' + - '192.168.1.10' +dhcpd_keys: + - key: dhcp + algorithm: HMAC-MD5 + secret: "{{ lookup('hashi_vault','secret=secrets/data/ansible/other:dhcpd_key') }}" + +dhcpd_zones: + - zone: "{{ domain.name }}." + primary: "192.168.1.10" + key: "dhcp" + - zone: "1.168.192.in-addr.arpa." + primary: "192.168.1.10" + key: "dhcp" + +dhcpd_options: | + ddns-updates on; + ddns-update-style interim; + ignore client-updates; + update-static-leases on; + ddns-domainname "ducamps.win."; + ddns-rev-domainname "in-addr.arpa."; + + +dhcpd_subnets: + - subnet: '192.168.1.0' + netmask: '255.255.255.0' + options: | + option routers 192.168.1.1; + pools: + - range: '192.168.1.100 192.168.1.140' + +dhcpd_hosts: + - hostname: 'zen-pc' + address: '192.168.1.14' + ethernet: 'f0:d5:bf:f4:ce:d7' + + - hostname: 'fixe-pc' + address: '192.168.1.15' + ethernet: 'ee:35:20:fc:7b:04' + + - hostname: 'oscar' + address: '192.168.1.40' + ethernet: '84:39:be:12:05:69' + + - hostname: 'VMAS-HML' + address: '192.168.1.50' + ethernet: '52:54:00:02:74:ed' + + - hostname: 'VMAS-BUILD' + address: '192.168.1.53' + ethernet: '52:54:13:1e:93' + + + - hostname: 'xiaomi-chambre-gateway' + address: '192.168.1.61' + ethernet: '04:cf:8c:9c:f7:f0' + - hostname: 'xiaomi-ampoule-chambre' + address: '192.168.1.62' + ethernet: '44:23:7c:88:1f:ea' + - hostname: 'shelly-chambre-ecran' + address: '192.168.1.63' + ethernet: 'b4:e6:2d:7a:ea:77' + - hostname: 'shelly-salon-cadre' + address: '192.168.1.64' + ethernet: 'b4:e6:2d:7a:e6:1e' + - hostname: 'shelly-chambre-ventilo' + address: '192.168.1.65' + ethernet: 'e0:98:06:97:78:0b' + +keystodeploy: + - name: juicessh with password + user: "{{user.name}}" + sshkey: ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAINN5V9WPPi2/HwAQuDeaJO3hUPf8HxNMHqVmkf1pDjWg JuiceSSH + - name: fixe-pc new + user: "{{user.name}}" + sshkey: ssh-rsa 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 vincent@fixe-pc-2020-03-01 + - name: zen-pc + user: "{{user.name}}" + sshkey: ssh-rsa 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 vincent@zen-pc + +nomad_datacenter: homelab + + +systemd_mounts: + diskstation_nomad: + share: diskstation.ducamps.win:/volume2/nomad + mount: /mnt/diskstation/nomad + type: nfs + options: + - " " + automount: true + diskstation_git: + share: diskstation.ducamps.win:/volume2/git + mount: /mnt/diskstation/git + type: nfs + options: + - " " + automount: true + diskstation_music: + share: diskstation.ducamps.win:/volume2/music + mount: /mnt/diskstation/music + type: nfs + options: + - " " + automount: true + diskstation_nextcloud: + share: //diskstation.ducamps.win/nextcloud + mount: /mnt/diskstation/nextcloud + type: cifs + options: + - credentials=/etc/creds/.diskstation_credentials + - uid=33 + - gid=33 + - vers=3.0 + - dir_mode=0770 + - _netdev + automount: true + diskstation_CardDav: + share: diskstation.ducamps.win:/volume2/CardDav + mount: /mnt/diskstation/CardDav + type: nfs + options: + - " " + automount: true + diskstation_archMirror: + share: diskstation.ducamps.win:/volume2/archMirror + mount: /mnt/diskstation/archMirror + type: nfs + options: + - " " + automount: true + +credentials_files: + 1: + type: smb + path: /etc/creds/.diskstation_credentials + username: admin + password: "{{ lookup('hashi_vault','secret=secrets/data/ansible/storage:diskstation_admin') }}" + + +systemd_mounts_enabled: + - diskstation_nomad + - diskstation_git + - diskstation_music + - diskstation_nextcloud + - diskstation_CardDav + - diskstation_archMirror diff --git a/ansible/group_vars/homelab/homelab b/ansible/group_vars/homelab/homelab new file mode 100644 index 0000000..deb7ff6 --- /dev/null +++ b/ansible/group_vars/homelab/homelab @@ -0,0 +1,10 @@ +chisel_server: true +chisel_server_port: 9090 +chisel_server_backend: https://www.{{domain.name}} +chisel_server_auth: + user: chisel + pass: "{{ lookup('hashi_vault','secret=secrets/data/ansible/other:chisel_pass') }}" +arch_mirror_location: "/mnt/diskstation/archMirror" + +nomad_datacenter: homelab +nomad_allow_privileged: True diff --git a/ansible/group_vars/homelab/mount b/ansible/group_vars/homelab/mount new file mode 100644 index 0000000..04922dd --- /dev/null +++ b/ansible/group_vars/homelab/mount @@ -0,0 +1,93 @@ +systemd_mounts: + diskstation_git: + share: diskstation.ducamps.win:/volume2/git + mount: /mnt/diskstation/git + type: nfs + options: + - " " + automount: true + diskstation_CardDav: + share: diskstation.ducamps.win:/volume2/CardDav + mount: /mnt/diskstation/CardDav + type: nfs + options: + - " " + automount: true + backup_disk: + share: /dev/sdb1 + mount: /mnt/backup + type: ntfs-3g + options: + - "uid=1024 + - guid=100 + - vers=3.0" + automount: true + diskstation_home: + share: diskstation.ducamps.win:/volume2/homes/admin + mount: /mnt/diskstation/home + type: nfs + options: + - " " + automount: true + diskstation_photo: + share: diskstation.ducamps.win:/volume2/photo + mount: /mnt/diskstation/photo + type: nfs + options: + - " " + automount: true + diskstation_music: + share: diskstation.ducamps.win:/volume2/music + mount: /mnt/diskstation/music + type: nfs + options: + - " " + automount: true + diskstation_media: + share: diskstation.ducamps.win:/volume1/media + mount: /mnt/diskstation/media + type: nfs + options: + - " " + automount: true + diskstation_ebook: + share: diskstation.ducamps.win:/volume2/ebook + mount: /mnt/diskstation/ebook + type: nfs + options: + - " " + automount: true + diskstation_archMirror: + share: diskstation.ducamps.win:/volume2/archMirror + mount: /mnt/diskstation/archMirror + type: nfs + options: + - " " + automount: true + diskstation_nomad: + share: diskstation.ducamps.win:/volume2/nomad + mount: /mnt/diskstation/nomad + type: nfs + options: + - " " + automount: true + +systemd_mounts_enabled: + - diskstation_git + - diskstation_music + - backup_disk + - diskstation_photo + - diskstation_home + - diskstation_CardDav + - diskstation_media + - diskstation_ebook + - diskstation_archMirror + - diskstation_nomad + +credentials_files: + 1: + type: smb + path: /etc/creds/.diskstation_credentials + username: admin + password: "{{ lookup('hashi_vault','secret=secrets/data/ansible/storage:diskstation_admin') }}" + diff --git a/ansible/group_vars/rsyncd b/ansible/group_vars/rsyncd new file mode 100644 index 0000000..00e3ee4 --- /dev/null +++ b/ansible/group_vars/rsyncd @@ -0,0 +1,9 @@ + +rsynclocations: + - name: backup nas + location: /mnt/backup + readonly: "no" + +rsynchostalloawed: 192.168.1.10 + + diff --git a/ansible/group_vars/wireguard b/ansible/group_vars/wireguard new file mode 100644 index 0000000..e69de29 diff --git a/ansible/host_vars/VMAS-BUILD b/ansible/host_vars/VMAS-BUILD new file mode 100644 index 0000000..eec993a --- /dev/null +++ b/ansible/host_vars/VMAS-BUILD @@ -0,0 +1,2 @@ + +chainetv_repo_branch: dev \ No newline at end of file diff --git a/ansible/host_vars/VMAS-HML b/ansible/host_vars/VMAS-HML new file mode 100644 index 0000000..ed8158a --- /dev/null +++ b/ansible/host_vars/VMAS-HML @@ -0,0 +1,2 @@ + +chainetv_repo_branch: master \ No newline at end of file diff --git a/ansible/host_vars/VMDR b/ansible/host_vars/VMDR new file mode 100644 index 0000000..a3eab52 --- /dev/null +++ b/ansible/host_vars/VMDR @@ -0,0 +1,2 @@ + +wireguard_address: "10.0.0.100/24" diff --git a/ansible/host_vars/corwin b/ansible/host_vars/corwin new file mode 100644 index 0000000..ceac856 --- /dev/null +++ b/ansible/host_vars/corwin @@ -0,0 +1,40 @@ +--- +ansible_host: 65.108.221.233 + +wireguard_address: "10.0.0.1/24" +wireguard_endpoint: "65.108.221.233" +wireguard_persistent_keepalive: "30" +wireguard_allowed_ips: "10.0.0.0/24" + +wireguard_postup: + - iptables -A FORWARD -o %i -j ACCEPT + - iptables -A FORWARD -i %i -j ACCEPT + - iptables -t nat -A POSTROUTING -o enp1s0 -j MASQUERADE + +wireguard_postdown: + - iptables -D FORWARD -i %i -j ACCEPT + - iptables -D FORWARD -o %i -j ACCEPT + - iptables -t nat -D POSTROUTING -o enp1s0 -j MASQUERADE + +wireguard_unmanaged_peers: + phone: + public_key: ioG35kDFTtip+Acfq+je9qDHYbZij+J6+Pg3T6Z4N0w= + allowed_ips: 10.0.0.3/32 + persistent_keepalive: 0 + zen: + public_key: rYYljQw8InmM95pxCP9KyZ8R+kcicgnjr6E9qtkI1Ag= + allowed_ips: 10.0.0.4/32 + persistent_keepalive: 0 +consul_client_addr: "127.0.0.1 10.0.0.1" +consul_bind_address: "10.0.0.1" +consul_ui: True +consul_iface: "wg0" +nomad_bind_addr: "10.0.0.1" +nomad_host_networks: + - name: "private" + interface: wg0 + - name: "public" + interface: enp1s0 + - name: "default" + interface: wg0 +vault_listener_address: 10.0.0.1 diff --git a/ansible/host_vars/gerard b/ansible/host_vars/gerard new file mode 100644 index 0000000..58a46c1 --- /dev/null +++ b/ansible/host_vars/gerard @@ -0,0 +1,3 @@ +--- +ansible_host: "192.168.1.41" +ansible_python_interpreter: "/usr/bin/python3" diff --git a/ansible/host_vars/oscar b/ansible/host_vars/oscar new file mode 100644 index 0000000..bd22274 --- /dev/null +++ b/ansible/host_vars/oscar @@ -0,0 +1,16 @@ +--- +wireguard_address: "10.0.0.2/24" +wireguard_allowed_ips: "10.0.0.2/32,192.168.1.0/24" +perrsistent_keepalive: "30" +wireguard_endpoint: "" + +wireguard_postup: + - iptables -A FORWARD -i wg0 -j ACCEPT + - iptables -A FORWARD -o wg0 -j ACCEPT + - iptables -t nat -A POSTROUTING -o eno1 -j MASQUERADE + +wireguard_postdown: + - iptables -D FORWARD -i wg0 -j ACCEPT + - iptables -D FORWARD -o wg0 -j ACCEPT + - iptables -t nat -D POSTROUTING -o eno1 -j MASQUERADE +consul_snapshot: True diff --git a/ansible/makefile b/ansible/makefile new file mode 100644 index 0000000..776f1cf --- /dev/null +++ b/ansible/makefile @@ -0,0 +1,12 @@ + +requirements: + ansible-galaxy install -g -f -r roles/requirements.yml + +deploy_production: + ansible-playbook site.yml -i production + +deploy_staging: + ansible-playbook site.yml -i staging + +generate-token: + @echo export VAULT_TOKEN=`vault token create -policy=ansible -field="token" -period 6h` diff --git a/ansible/playbooks/HashicorpStack.yml b/ansible/playbooks/HashicorpStack.yml new file mode 100644 index 0000000..719b625 --- /dev/null +++ b/ansible/playbooks/HashicorpStack.yml @@ -0,0 +1,11 @@ +- hosts: all + roles: + - role: ansible-consul + become: true + - role: ansible-hashicorp-vault + when: ansible_architecture == 'x86_64' + become: true + - role: ansible-nomad + become: true + - role: docker + become: true diff --git a/ansible/playbooks/bootstrap.yml b/ansible/playbooks/bootstrap.yml new file mode 100644 index 0000000..6df5efb --- /dev/null +++ b/ansible/playbooks/bootstrap.yml @@ -0,0 +1,4 @@ +--- +- hosts: all + roles: + - ansible_bootstrap diff --git a/ansible/playbooks/database.yml b/ansible/playbooks/database.yml new file mode 100644 index 0000000..a40c318 --- /dev/null +++ b/ansible/playbooks/database.yml @@ -0,0 +1,7 @@ +--- +- hosts: database + vars: + # certbot_force: true + roles: + - role: ansible-role-postgresql + become: true diff --git a/ansible/playbooks/dhcpd.yml b/ansible/playbooks/dhcpd.yml new file mode 100644 index 0000000..3792b7a --- /dev/null +++ b/ansible/playbooks/dhcpd.yml @@ -0,0 +1,7 @@ +--- +- hosts: dhcp + vars: + + roles: + - role: ansible-dhcpd + become: true diff --git a/ansible/playbooks/music-player.yml b/ansible/playbooks/music-player.yml new file mode 100644 index 0000000..3c647ad --- /dev/null +++ b/ansible/playbooks/music-player.yml @@ -0,0 +1,8 @@ +--- +- hosts: music-player + roles: + - user_config + - cronie + - hass-client-control + - mpd + diff --git a/ansible/playbooks/rsyncd.yml b/ansible/playbooks/rsyncd.yml new file mode 100644 index 0000000..78997a6 --- /dev/null +++ b/ansible/playbooks/rsyncd.yml @@ -0,0 +1,7 @@ +--- +- hosts: rsyncd + vars: + # certbot_force: true + roles: + - role: rsyncd + become: true diff --git a/ansible/playbooks/server.yml b/ansible/playbooks/server.yml new file mode 100644 index 0000000..1373e0c --- /dev/null +++ b/ansible/playbooks/server.yml @@ -0,0 +1,11 @@ +--- +- hosts: + - homelab + - VPS + vars: + # certbot_force: true + roles: + - system + - autofs + - msmtp + - cronie diff --git a/ansible/playbooks/user_config.yml b/ansible/playbooks/user_config.yml new file mode 100644 index 0000000..ab89fbf --- /dev/null +++ b/ansible/playbooks/user_config.yml @@ -0,0 +1,4 @@ +- hosts: all + vars: + roles: + - user_config diff --git a/ansible/playbooks/wireguard.yml b/ansible/playbooks/wireguard.yml new file mode 100644 index 0000000..561e21b --- /dev/null +++ b/ansible/playbooks/wireguard.yml @@ -0,0 +1,5 @@ +--- +- hosts: wireguard + roles: + - role: ansible-role-wireguard + become: True diff --git a/ansible/production b/ansible/production new file mode 100644 index 0000000..f0b9943 --- /dev/null +++ b/ansible/production @@ -0,0 +1,20 @@ +[homelab] +oscar +gerard + +[VPS] +corwin + +[dhcp] +gerard + +[wireguard] +corwin +oscar + +[database] +oscar + +[rsyncd] +oscar + diff --git a/ansible/provisionning.yml b/ansible/provisionning.yml new file mode 100644 index 0000000..2173dde --- /dev/null +++ b/ansible/provisionning.yml @@ -0,0 +1,15 @@ +--- +- hosts: all + remote_user: root + roles: + - ansible-arch-provissionning + +- hosts: all + remote_user: root + vars: + ansible_password: "{{ lookup('hashi_vault','secret=secrets/data/ansible/user:root') }}" + roles: + - ansible_bootstrap + +- remote_user: "{{ user.name }}" + import_playbook: site.yml diff --git a/ansible/roles/.gitignore b/ansible/roles/.gitignore new file mode 100644 index 0000000..55852f7 --- /dev/null +++ b/ansible/roles/.gitignore @@ -0,0 +1,12 @@ +# Ignore everything in roles dir +/* +# Except: +# the .gitignore file +!.gitignore +# the requirements file +!requirements.yml +# Readme if you have one +!README.md +# and any specific role we want to version locally +!locally-versioned-role*/ + diff --git a/ansible/roles/requirements.yml b/ansible/roles/requirements.yml new file mode 100644 index 0000000..b9d9b12 --- /dev/null +++ b/ansible/roles/requirements.yml @@ -0,0 +1,37 @@ +--- +- src: ssh://git@git.ducamps.win:2222/ansible-roles/ansible-arch-provissionning.git + scm: git +- src: ssh://git@git.ducamps.win:2222/ansible-roles/ansible-role-postgresql.git + scm: git +- src: ssh://git@git.ducamps.win:2222/ansible-roles/ansible-role-sssd + scm: git +- src: ssh://git@git.ducamps.win:2222/ansible-roles/ansible_bootstrap.git + scm: git +- src: ssh://git@git.ducamps.win:2222/ansible-roles/autofs.git + scm: git +- src: ssh://git@git.ducamps.win:2222/ansible-roles/cronie.git + scm: git +- src: ssh://git@git.ducamps.win:2222/ansible-roles/docker.git + scm: git +- src: ssh://git@git.ducamps.win:2222/ansible-roles/hass-client-control.git + scm: git +- src: ssh://git@git.ducamps.win:2222/ansible-roles/msmtp.git + scm: git +- src: ssh://git@git.ducamps.win:2222/ansible-roles/rsyncd.git + scm: git +- src: ssh://git@git.ducamps.win:2222/ansible-roles/system.git + scm: git +- src: ssh://git@git.ducamps.win:2222/ansible-roles/user_config.git + scm: git +- src: https://github.com/githubixx/ansible-role-wireguard.git + scm: git +- src: ssh://git@git.ducamps.win:2222/ansible-roles/ansible-consul.git + scm: git +- src: ssh://git@git.ducamps.win:2222/ansible-roles/ansible-hashicorp-vault.git + scm: git +- src: ssh://git@git.ducamps.win:2222/ansible-roles/ansible-nomad.git + scm: git +- src: ssh://git@git.ducamps.win:2222/ansible-roles/mpd.git + scm: git +- src: ssh://git@git.ducamps.win:2222/ansible-roles/ansible-dhcpd.git + scm: git diff --git a/ansible/site.yml b/ansible/site.yml new file mode 100644 index 0000000..1af2f57 --- /dev/null +++ b/ansible/site.yml @@ -0,0 +1,9 @@ +--- +- import_playbook: playbooks/server.yml +- import_playbook: playbooks/wireguard.yml +- import_playbook: playbooks/HashicorpStack.yml +- import_playbook: playbooks/database.yml +- import_playbook: playbooks/rsyncd.yml +- import_playbook: playbooks/music-player.yml +- import_playbook: playbooks/dhcpd.yml +- import_playbook: playbooks/user_config.yml diff --git a/ansible/staging b/ansible/staging new file mode 100644 index 0000000..60fe04b --- /dev/null +++ b/ansible/staging @@ -0,0 +1,13 @@ +[VPS] +VMDR + +[dhcp] +VMAS-BUILD + +[VMServer] +VMAS-HML + + +[wireguard] +VMDR +