reorganize
This commit is contained in:
parent
de9c0019fa
commit
c2521842a0
15 changed files with 90 additions and 94 deletions
|
@ -8,24 +8,6 @@
|
|||
cmd: ifup -a
|
||||
|
||||
pre_tasks:
|
||||
- name: Start libvirtd
|
||||
systemd:
|
||||
name: libvirtd
|
||||
enabled: true
|
||||
state: started
|
||||
|
||||
- name: Add root to libvirt group
|
||||
user:
|
||||
name: root
|
||||
groups: libvirt
|
||||
append: yes
|
||||
|
||||
- name: Disable apparmor
|
||||
systemd:
|
||||
name: apparmor
|
||||
enabled: false
|
||||
state: stopped
|
||||
|
||||
- name: Copy interfaces configuration
|
||||
copy:
|
||||
src: dmz.conf
|
||||
|
@ -39,8 +21,10 @@
|
|||
mode: og=rwx
|
||||
|
||||
roles:
|
||||
- {role: setup-apt, tags: setup-apt}
|
||||
- {role: setup_apt, tags: setup_apt}
|
||||
- {role: libvirt, tags: libvirt}
|
||||
- {role: postgresql, tags: postgresql}
|
||||
- {role: githubixx.ansible_role_wireguard, tags: wireguard}
|
||||
- {role: wireguard, tags: wireguard}
|
||||
- {role: ssh_ca, tags: ssh_ca}
|
||||
- {role: backupng, tags: backupng}
|
||||
- {role: ssh, tags: ssh}
|
||||
- {role: borg, tags: borg}
|
||||
|
|
7
ansible/inventory/host_vars/atlas/apt.yml
Normal file
7
ansible/inventory/host_vars/atlas/apt.yml
Normal file
|
@ -0,0 +1,7 @@
|
|||
apt_install_packages:
|
||||
- qemu-kvm
|
||||
- libvirt-daemon-system
|
||||
- postgresql
|
||||
- python3-psycopg2
|
||||
- sudo
|
||||
- bridge-utils
|
|
@ -1,34 +1,3 @@
|
|||
backup_share_user: "backup-share"
|
||||
backup_control_user: "backup-control"
|
||||
user_ca: "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIGKOClnK6/Hj8INjEgULY/lD2FM/nbiJHqaSXtEw4+Fj User Certificate Authority for DMZ"
|
||||
storage_pools: [iso, disk, init]
|
||||
wireguard_addresses:
|
||||
- "10.42.0.1/32"
|
||||
wireguard_endpoint: "atlas.hyp"
|
||||
wireguard_private_key: !vault |
|
||||
$ANSIBLE_VAULT;1.1;AES256
|
||||
65666463346536363662353234666662376330396365656361636530663032366436653336383134
|
||||
6463636362636530316434626561623866306165313638330a633761626361393963303933313738
|
||||
30336535333761393663396534373363333465306232343238666538383039636138393661373839
|
||||
3935626664326237310a386337306364663463663764376631336431363062656137376635366361
|
||||
35393135626261626565333261316363633838353833666163666132363462636431626234383864
|
||||
3039633631356339663234656233343635653236356235623532
|
||||
wireguard_unmanaged_peers:
|
||||
pim:
|
||||
public_key: "xQ1hkwpIf5x7Wkx1leQHXx3RK8fjGWt2ZmG9XUN3V08="
|
||||
allowed_ips: "10.42.0.2/32"
|
||||
niels:
|
||||
public_key: "WJO/DQUJyDp4rFW291F2Ai51lotU2IC+OATu+5P3Jio="
|
||||
allowed_ips: "10.42.0.3/32"
|
||||
|
||||
apt_install_packages:
|
||||
- qemu-kvm
|
||||
- libvirt-daemon-system
|
||||
- postgresql
|
||||
- python3-psycopg2
|
||||
- sudo
|
||||
- bridge-utils
|
||||
|
||||
ssh_ca_dir: /root/ssh_ca
|
||||
ssh_ca_key_pairs:
|
||||
- name: dmz_user
|
18
ansible/inventory/host_vars/atlas/wireguard.yml
Normal file
18
ansible/inventory/host_vars/atlas/wireguard.yml
Normal file
|
@ -0,0 +1,18 @@
|
|||
wireguard_addresses:
|
||||
- "10.42.0.1/32"
|
||||
wireguard_endpoint: "atlas.hyp"
|
||||
wireguard_private_key: !vault |
|
||||
$ANSIBLE_VAULT;1.1;AES256
|
||||
65666463346536363662353234666662376330396365656361636530663032366436653336383134
|
||||
6463636362636530316434626561623866306165313638330a633761626361393963303933313738
|
||||
30336535333761393663396534373363333465306232343238666538383039636138393661373839
|
||||
3935626664326237310a386337306364663463663764376631336431363062656137376635366361
|
||||
35393135626261626565333261316363633838353833666163666132363462636431626234383864
|
||||
3039633631356339663234656233343635653236356235623532
|
||||
wireguard_unmanaged_peers:
|
||||
pim:
|
||||
public_key: "xQ1hkwpIf5x7Wkx1leQHXx3RK8fjGWt2ZmG9XUN3V08="
|
||||
allowed_ips: "10.42.0.2/32"
|
||||
niels:
|
||||
public_key: "WJO/DQUJyDp4rFW291F2Ai51lotU2IC+OATu+5P3Jio="
|
||||
allowed_ips: "10.42.0.3/32"
|
|
@ -1,6 +1,8 @@
|
|||
- name: setup-apt
|
||||
- name: setup_apt
|
||||
src: https://github.com/sunscrapers/ansible-role-apt.git
|
||||
scm: git
|
||||
- name: ssh_ca
|
||||
src: https://git.pim.kunis.nl/pim/ansible-role-ssh-ca
|
||||
scm: git
|
||||
- name: wireguard
|
||||
src: githubixx.ansible_role_wireguard
|
||||
|
|
40
ansible/roles/borg/tasks/main.yml
Normal file
40
ansible/roles/borg/tasks/main.yml
Normal file
|
@ -0,0 +1,40 @@
|
|||
- name: Install Borg
|
||||
apt:
|
||||
pkg:
|
||||
- borgbackup
|
||||
- borgmatic
|
||||
|
||||
- name: Copy Borgmatic script
|
||||
template:
|
||||
src: "{{ role_path }}/files/backup.yml"
|
||||
dest: /root/backup.yml
|
||||
|
||||
- name: Copy start_vms.sh
|
||||
copy:
|
||||
src: "{{ role_path }}/files/start_vms.sh"
|
||||
dest: /root/start_vms.sh
|
||||
mode: preserve
|
||||
|
||||
- name: Copy stop_vms.sh
|
||||
copy:
|
||||
src: "{{ role_path }}/files/stop_vms.sh"
|
||||
dest: /root/stop_vms.sh
|
||||
mode: preserve
|
||||
|
||||
- name: Copy systemd backup unit
|
||||
copy:
|
||||
src: "{{ role_path }}/files/backup.service"
|
||||
dest: /etc/systemd/system/backup.service
|
||||
notify: systemd daemon reload
|
||||
|
||||
- name: Copy systemd backup timer
|
||||
copy:
|
||||
src: "{{ role_path }}/files/backup.timer"
|
||||
dest: /etc/systemd/system/backup.timer
|
||||
notify: systemd daemon reload
|
||||
|
||||
- name: Enable backup timer
|
||||
systemd:
|
||||
name: backup.timer
|
||||
enabled: true
|
||||
state: started
|
17
ansible/roles/libvirt/tasks/main.yml
Normal file
17
ansible/roles/libvirt/tasks/main.yml
Normal file
|
@ -0,0 +1,17 @@
|
|||
- name: Start libvirtd
|
||||
systemd:
|
||||
name: libvirtd
|
||||
enabled: true
|
||||
state: started
|
||||
|
||||
- name: Add root to libvirt group
|
||||
user:
|
||||
name: root
|
||||
groups: libvirt
|
||||
append: yes
|
||||
|
||||
- name: Disable apparmor
|
||||
systemd:
|
||||
name: apparmor
|
||||
enabled: false
|
||||
state: stopped
|
|
@ -29,47 +29,6 @@
|
|||
src: "{{ role_path }}/files/ssh_user_certificate.conf"
|
||||
dest: /etc/ssh/ssh_config.d/user_certificate.conf
|
||||
|
||||
- name: Install Borg
|
||||
apt:
|
||||
pkg:
|
||||
- borgbackup
|
||||
- borgmatic
|
||||
|
||||
- name: Copy Borgmatic script
|
||||
template:
|
||||
src: "{{ role_path }}/files/backup.yml"
|
||||
dest: /root/backup.yml
|
||||
|
||||
- name: Copy start_vms.sh
|
||||
copy:
|
||||
src: "{{ role_path }}/files/start_vms.sh"
|
||||
dest: /root/start_vms.sh
|
||||
mode: preserve
|
||||
|
||||
- name: Copy stop_vms.sh
|
||||
copy:
|
||||
src: "{{ role_path }}/files/stop_vms.sh"
|
||||
dest: /root/stop_vms.sh
|
||||
mode: preserve
|
||||
|
||||
- name: Copy systemd backup unit
|
||||
copy:
|
||||
src: "{{ role_path }}/files/backup.service"
|
||||
dest: /etc/systemd/system/backup.service
|
||||
notify: systemd daemon reload
|
||||
|
||||
- name: Copy systemd backup timer
|
||||
copy:
|
||||
src: "{{ role_path }}/files/backup.timer"
|
||||
dest: /etc/systemd/system/backup.timer
|
||||
notify: systemd daemon reload
|
||||
|
||||
- name: Enable backup timer
|
||||
systemd:
|
||||
name: backup.timer
|
||||
enabled: true
|
||||
state: started
|
||||
|
||||
- name: Add SSH host CA known host
|
||||
known_hosts:
|
||||
key: '@cert-authority *.dmz ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIAX2IhgHNxC6JTvLu9cej+iWuG+uJFMXn4AiRro9533x Host Certficate Authority for DMZ'
|
Reference in a new issue