cleanup
This commit is contained in:
parent
72d07aac36
commit
69cf0a1d4b
24 changed files with 15 additions and 178 deletions
|
@ -6,7 +6,19 @@
|
|||
|
||||
- name: Start services
|
||||
hosts: max
|
||||
pre_tasks:
|
||||
- name: Create base service directory
|
||||
file:
|
||||
path: "{{ base_service_dir }}"
|
||||
state: directory
|
||||
- name: Delete externally managed environment file
|
||||
shell:
|
||||
cmd: "rm /usr/lib/python*/EXTERNALLY-MANAGED"
|
||||
register: rm
|
||||
changed_when: "rm.rc == 0"
|
||||
failed_when: "false"
|
||||
roles:
|
||||
- {role: 'setup-apt', tags: 'setup-apt'}
|
||||
- {role: 'watchtower', tags: 'watchtower'}
|
||||
- {role: 'forgejo', tags: 'forgejo'}
|
||||
- {role: 'syncthing', tags: 'syncthing'}
|
||||
|
|
|
@ -1,3 +1,3 @@
|
|||
- name: cloudinit-wait
|
||||
src: https://git.pim.kunis.nl/pim/ansible-role-cloudinit-wait
|
||||
- name: setup-apt
|
||||
src: https://github.com/sunscrapers/ansible-role-apt.git
|
||||
scm: git
|
||||
|
|
|
@ -1,17 +0,0 @@
|
|||
- name: APT upgrade
|
||||
apt:
|
||||
autoremove: true
|
||||
upgrade: yes
|
||||
state: latest
|
||||
update_cache: yes
|
||||
cache_valid_time: 86400 # One day
|
||||
- name: Create base service directory
|
||||
file:
|
||||
path: "{{ base_service_dir }}"
|
||||
state: directory
|
||||
- name: Delete externally managed environment file
|
||||
shell:
|
||||
cmd: "rm /usr/lib/python*/EXTERNALLY-MANAGED"
|
||||
register: rm
|
||||
changed_when: "rm.rc == 0"
|
||||
failed_when: "false"
|
|
@ -1,4 +1,2 @@
|
|||
dependencies:
|
||||
- role: common
|
||||
- role: docker
|
||||
|
||||
- role: traefik
|
||||
|
|
|
@ -1,16 +0,0 @@
|
|||
- name: Install firewalld
|
||||
apt:
|
||||
pkg:
|
||||
- firewalld
|
||||
state: latest
|
||||
update_cache: true
|
||||
- name: Allow SSH
|
||||
firewalld:
|
||||
service: ssh
|
||||
permanent: yes
|
||||
state: enabled
|
||||
- name: Start firewalld
|
||||
systemd:
|
||||
enabled: true
|
||||
name: sshd
|
||||
state: started
|
|
@ -1,4 +1,2 @@
|
|||
dependencies:
|
||||
- role: common
|
||||
- role: docker
|
||||
- role: traefik
|
||||
|
|
|
@ -1,4 +1,2 @@
|
|||
dependencies:
|
||||
- role: common
|
||||
- role: docker
|
||||
- role: traefik
|
||||
|
|
|
@ -1,4 +1,2 @@
|
|||
dependencies:
|
||||
- role: common
|
||||
- role: docker
|
||||
- role: traefik
|
||||
|
|
|
@ -1,4 +1,2 @@
|
|||
dependencies:
|
||||
- role: common
|
||||
- role: docker
|
||||
|
|
@ -1,4 +1,2 @@
|
|||
dependencies:
|
||||
- role: common
|
||||
- role: docker
|
||||
- role: traefik
|
||||
|
|
|
@ -1,4 +1,2 @@
|
|||
dependencies:
|
||||
- role: common
|
||||
- role: docker
|
||||
|
|
@ -1,4 +1,2 @@
|
|||
dependencies:
|
||||
- role: common
|
||||
- role: docker
|
||||
- role: traefik
|
||||
|
|
|
@ -1,4 +1,2 @@
|
|||
dependencies:
|
||||
- role: common
|
||||
- role: docker
|
||||
- role: traefik
|
||||
|
|
|
@ -1,3 +1,2 @@
|
|||
dependencies:
|
||||
- role: common
|
||||
- role: docker
|
||||
|
|
|
@ -1,4 +1,2 @@
|
|||
dependencies:
|
||||
- role: common
|
||||
- role: docker
|
||||
- role: traefik
|
||||
|
|
|
@ -1,4 +1,2 @@
|
|||
dependencies:
|
||||
- role: common
|
||||
- role: docker
|
||||
- role: traefik
|
||||
|
|
|
@ -1,54 +0,0 @@
|
|||
# This is the ssh client system-wide configuration file. See
|
||||
# ssh_config(5) for more information. This file provides defaults for
|
||||
# users, and the values can be changed in per-user configuration files
|
||||
# or on the command line.
|
||||
|
||||
# Configuration data is parsed as follows:
|
||||
# 1. command line options
|
||||
# 2. user-specific file
|
||||
# 3. system-wide file
|
||||
# Any configuration value is only changed the first time it is set.
|
||||
# Thus, host-specific definitions should be at the beginning of the
|
||||
# configuration file, and defaults at the end.
|
||||
|
||||
# Site-wide defaults for some commonly used options. For a comprehensive
|
||||
# list of available options, their meanings and defaults, please see the
|
||||
# ssh_config(5) man page.
|
||||
|
||||
Include /etc/ssh/ssh_config.d/*.conf
|
||||
|
||||
Host *
|
||||
# ForwardAgent no
|
||||
# ForwardX11 no
|
||||
# ForwardX11Trusted yes
|
||||
# PasswordAuthentication yes
|
||||
# HostbasedAuthentication no
|
||||
# GSSAPIAuthentication no
|
||||
# GSSAPIDelegateCredentials no
|
||||
# GSSAPIKeyExchange no
|
||||
# GSSAPITrustDNS no
|
||||
# BatchMode no
|
||||
# CheckHostIP yes
|
||||
# AddressFamily any
|
||||
# ConnectTimeout 0
|
||||
# StrictHostKeyChecking ask
|
||||
# IdentityFile ~/.ssh/id_rsa
|
||||
# IdentityFile ~/.ssh/id_dsa
|
||||
# IdentityFile ~/.ssh/id_ecdsa
|
||||
# IdentityFile ~/.ssh/id_ed25519
|
||||
# Port 22
|
||||
# Ciphers aes128-ctr,aes192-ctr,aes256-ctr,aes128-cbc,3des-cbc
|
||||
# MACs hmac-md5,hmac-sha1,umac-64@openssh.com
|
||||
# EscapeChar ~
|
||||
# Tunnel no
|
||||
# TunnelDevice any:any
|
||||
# PermitLocalCommand no
|
||||
# VisualHostKey no
|
||||
# ProxyCommand ssh -q -W %h:%p gateway.example.com
|
||||
# RekeyLimit 1G 1h
|
||||
# UserKnownHostsFile ~/.ssh/known_hosts.d/%k
|
||||
SendEnv LANG LC_*
|
||||
|
||||
# set HashKnownHosts to no to make known_hosts human readable and reviewable.
|
||||
# HashKnownHosts yes
|
||||
# GSSAPIAuthentication yes
|
|
@ -1,41 +0,0 @@
|
|||
Include /etc/ssh/sshd_config.d/*.conf
|
||||
|
||||
HostKey /etc/ssh/ssh_host_ed25519_key
|
||||
|
||||
# Ciphers and keying
|
||||
HostKeyAlgorithms ssh-ed25519
|
||||
CASignatureAlgorithms ssh-ed25519
|
||||
HostbasedAcceptedKeyTypes ssh-ed25519
|
||||
HostKeyAlgorithms ssh-ed25519
|
||||
KexAlgorithms curve25519-sha256,curve25519-sha256@libssh.org
|
||||
Ciphers chacha20-poly1305@openssh.com
|
||||
MACs hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com
|
||||
|
||||
# To disable tunneled clear text passwords, change to no here!
|
||||
PasswordAuthentication no
|
||||
PermitEmptyPasswords no
|
||||
|
||||
# Change to yes to enable challenge-response passwords (beware issues with
|
||||
# some PAM modules and threads)
|
||||
KbdInteractiveAuthentication no
|
||||
|
||||
# Set this to 'yes' to enable PAM authentication, account processing,
|
||||
# and session processing. If this is enabled, PAM authentication will
|
||||
# be allowed through the KbdInteractiveAuthentication and
|
||||
# PasswordAuthentication. Depending on your PAM configuration,
|
||||
# PAM authentication via KbdInteractiveAuthentication may bypass
|
||||
# the setting of "PermitRootLogin without-password".
|
||||
# If you just want the PAM account and session checks to run without
|
||||
# PAM authentication, then enable this but set PasswordAuthentication
|
||||
# and KbdInteractiveAuthentication to 'no'.
|
||||
UsePAM yes
|
||||
|
||||
X11Forwarding yes
|
||||
PrintMotd no
|
||||
|
||||
# Allow client to pass locale environment variables
|
||||
AcceptEnv LANG LC_*
|
||||
|
||||
# override default of no subsystems
|
||||
Subsystem sftp /usr/lib/openssh/sftp-server
|
||||
|
|
@ -1,2 +0,0 @@
|
|||
dependencies:
|
||||
- role: common
|
|
@ -1,16 +0,0 @@
|
|||
- name: Copy sshd config
|
||||
copy:
|
||||
src: "{{ role_path }}/files/sshd_config"
|
||||
dest: /etc/ssh/sshd_config
|
||||
register: sshd_config
|
||||
- name: Copy ssh config
|
||||
copy:
|
||||
src: "{{ role_path }}/files/ssh_config"
|
||||
dest: /etc/ssh/ssh_config
|
||||
register: ssh_config
|
||||
- name: Restart SSH service
|
||||
systemd:
|
||||
enabled: true
|
||||
name: sshd
|
||||
state: reloaded
|
||||
when: sshd_config.changed
|
|
@ -1,4 +1,2 @@
|
|||
dependencies:
|
||||
- role: common
|
||||
- role: docker
|
||||
- role: traefik
|
||||
|
|
|
@ -1,3 +1,2 @@
|
|||
dependencies:
|
||||
- role: common
|
||||
- role: docker
|
||||
|
|
|
@ -1,3 +1,2 @@
|
|||
dependencies:
|
||||
- role: common
|
||||
- role: docker
|
||||
|
|
|
@ -1,4 +1,2 @@
|
|||
dependencies:
|
||||
- role: common
|
||||
- role: docker
|
||||
|
Reference in a new issue