Enable Watchtower for all services #123
47
Vagrantfile
vendored
47
Vagrantfile
vendored
|
@ -1,24 +1,35 @@
|
||||||
Vagrant.require_version ">= 1.7.0"
|
Vagrant.require_version ">= 2.0.0"
|
||||||
|
PORT = 19022
|
||||||
|
|
||||||
|
def provisioned?(vm="default", provider="virtualbox")
|
||||||
|
File.exist?(".vagrant/machines/#{vm}/#{provider}/action_provision")
|
||||||
|
end
|
||||||
|
|
||||||
Vagrant.configure(2) do |config|
|
Vagrant.configure(2) do |config|
|
||||||
|
config.vm.network :private_network, ip: "192.168.56.10"
|
||||||
|
config.vm.network :forwarded_port, guest: PORT, host: PORT
|
||||||
|
|
||||||
config.vm.define "datacoop" do |datacoop|
|
config.vm.box = "ubuntu/focal64"
|
||||||
datacoop.vm.box = "ubuntu/bionic64"
|
config.vm.hostname = "datacoop"
|
||||||
datacoop.vm.hostname = "datacoop"
|
|
||||||
datacoop.vm.provider "virtualbox" do |v|
|
config.vm.provider :virtualbox do |v|
|
||||||
v.memory = 4096
|
v.memory = 4096
|
||||||
end
|
end
|
||||||
datacoop.vm.network "private_network", ip: "192.168.0.42"
|
|
||||||
datacoop.vm.provision "ansible" do |ansible|
|
config.vm.provision :ansible do |ansible|
|
||||||
ansible.verbose = "v"
|
ansible.compatibility_mode = "2.0"
|
||||||
ansible.compatibility_mode = "2.0"
|
ansible.playbook = "playbook.yml"
|
||||||
ansible.playbook = "playbook.yml"
|
ansible.ask_vault_pass = true
|
||||||
ansible.ask_vault_pass = true
|
ansible.verbose = "v"
|
||||||
ansible.host_vars = {
|
ansible.extra_vars = {
|
||||||
"datacoop" => {"ansible_python_interpreter" => "/usr/bin/python3.6"}
|
base_domain: "datacoop.devel"
|
||||||
}
|
}
|
||||||
ansible.groups = {
|
|
||||||
"all" => ["datacoop"]
|
# If the VM is already provisioned, we need to use the new port
|
||||||
|
if provisioned?
|
||||||
|
config.ssh.guest_port = PORT
|
||||||
|
ansible.extra_vars = {
|
||||||
|
ansible_port: PORT
|
||||||
}
|
}
|
||||||
end
|
end
|
||||||
end
|
end
|
||||||
|
|
12
playbook.yml
12
playbook.yml
|
@ -1,22 +1,28 @@
|
||||||
---
|
---
|
||||||
- hosts: all
|
- hosts: all
|
||||||
gather_facts: False
|
gather_facts: true
|
||||||
become: true
|
become: true
|
||||||
vars:
|
vars:
|
||||||
base_domain: data.coop
|
base_domain: data.coop
|
||||||
letsencrypt_email: admin@data.coop
|
letsencrypt_email: admin@data.coop
|
||||||
ldap_dn: "dc=data,dc=coop"
|
ldap_dn: "dc=data,dc=coop"
|
||||||
|
|
||||||
|
vagrant: "{{ ansible_virtualization_role == 'guest' }}"
|
||||||
|
letsencrypt_enabled: "{{ not vagrant }}"
|
||||||
|
|
||||||
services:
|
services:
|
||||||
- nginx-proxy
|
- nginx-proxy
|
||||||
|
- postfix
|
||||||
- openldap
|
- openldap
|
||||||
|
- keycloak
|
||||||
|
- restic-backup
|
||||||
- nextcloud
|
- nextcloud
|
||||||
- passit
|
- passit
|
||||||
- gitea
|
- gitea
|
||||||
- postfix
|
|
||||||
- matrix_riot
|
- matrix_riot
|
||||||
- privatebin
|
- privatebin
|
||||||
- codimd
|
- codimd
|
||||||
|
- hedgedoc
|
||||||
- netdata
|
- netdata
|
||||||
- docker_registry
|
- docker_registry
|
||||||
- drone
|
- drone
|
||||||
|
@ -36,6 +42,6 @@
|
||||||
- import_role:
|
- import_role:
|
||||||
name: ubuntu_base
|
name: ubuntu_base
|
||||||
tags:
|
tags:
|
||||||
- base_only
|
- base_only
|
||||||
- import_role:
|
- import_role:
|
||||||
name: docker
|
name: docker
|
||||||
|
|
|
@ -30,6 +30,6 @@
|
||||||
|
|
||||||
- name: log in to registry
|
- name: log in to registry
|
||||||
docker_login:
|
docker_login:
|
||||||
registry: "{{ docker_registry.domain }}"
|
registry: "docker.data.coop"
|
||||||
username: "docker"
|
username: "docker"
|
||||||
password: "{{ docker_password }}"
|
password: "{{ docker_password }}"
|
||||||
|
|
|
@ -28,7 +28,7 @@
|
||||||
dest: "{{ mailu.volume_folder }}/certs/cert.pem"
|
dest: "{{ mailu.volume_folder }}/certs/cert.pem"
|
||||||
state: hard
|
state: hard
|
||||||
force: yes
|
force: yes
|
||||||
|
when: letsencrypt_enabled
|
||||||
|
|
||||||
- name: hard link to Let's Encrypt TLS key
|
- name: hard link to Let's Encrypt TLS key
|
||||||
file:
|
file:
|
||||||
|
@ -36,6 +36,7 @@
|
||||||
dest: "{{ mailu.volume_folder }}/certs/key.pem"
|
dest: "{{ mailu.volume_folder }}/certs/key.pem"
|
||||||
state: hard
|
state: hard
|
||||||
force: yes
|
force: yes
|
||||||
|
when: letsencrypt_enabled
|
||||||
|
|
||||||
- name: run mail server containers
|
- name: run mail server containers
|
||||||
docker_compose:
|
docker_compose:
|
||||||
|
|
|
@ -8,7 +8,7 @@
|
||||||
version: "3"
|
version: "3"
|
||||||
services:
|
services:
|
||||||
backend:
|
backend:
|
||||||
image: docker.data.coop/member.data.coop:latest
|
image: docker.data.coop/membersystem:latest
|
||||||
restart: always
|
restart: always
|
||||||
user: $UID:$GID
|
user: $UID:$GID
|
||||||
tty: true
|
tty: true
|
||||||
|
|
|
@ -44,4 +44,5 @@
|
||||||
- /var/run/docker.sock:/var/run/docker.sock:ro
|
- /var/run/docker.sock:/var/run/docker.sock:ro
|
||||||
env:
|
env:
|
||||||
NGINX_PROXY_CONTAINER: nginx-proxy
|
NGINX_PROXY_CONTAINER: nginx-proxy
|
||||||
|
when: letsencrypt_enabled
|
||||||
|
|
||||||
|
|
|
@ -1,8 +1,9 @@
|
||||||
---
|
---
|
||||||
- name: setup restic backup
|
- name: Setup restic backup
|
||||||
|
when: not vagrant
|
||||||
docker_compose:
|
docker_compose:
|
||||||
project_name: restic_backup
|
project_name: restic_backup
|
||||||
pull: yes
|
pull: true
|
||||||
definition:
|
definition:
|
||||||
version: '3.6'
|
version: '3.6'
|
||||||
services:
|
services:
|
||||||
|
|
|
@ -4,13 +4,16 @@
|
||||||
name: "{{ packages }}"
|
name: "{{ packages }}"
|
||||||
vars:
|
vars:
|
||||||
packages:
|
packages:
|
||||||
- aptitude
|
- aptitude
|
||||||
- python3-pip
|
- python3-pip
|
||||||
- apparmor
|
- apparmor
|
||||||
- haveged
|
- haveged
|
||||||
- mosh
|
- mosh
|
||||||
- ufw
|
|
||||||
- srvadmin-all # Dell OpenManage
|
- name: Install Dell OpenManage
|
||||||
|
apt:
|
||||||
|
name: srvadmin-all
|
||||||
|
when: not vagrant
|
||||||
|
|
||||||
- name: Install necessary packages via pip
|
- name: Install necessary packages via pip
|
||||||
pip:
|
pip:
|
||||||
|
|
|
@ -1,15 +1,15 @@
|
||||||
---
|
---
|
||||||
- name: import dell apt signing key
|
- name: Import dell apt signing key
|
||||||
apt_key:
|
apt_key:
|
||||||
id: "1285491434D8786F"
|
id: "1285491434D8786F"
|
||||||
keyserver: "keyserver.ubuntu.com"
|
keyserver: "keyserver.ubuntu.com"
|
||||||
|
|
||||||
- name: "configure dell apt repo"
|
- name: Configure dell apt repo
|
||||||
apt_repository:
|
apt_repository:
|
||||||
repo: "deb https://linux.dell.com/repo/community/openmanage/10101/focal focal main"
|
repo: "deb https://linux.dell.com/repo/community/openmanage/10101/focal focal main"
|
||||||
state: "present"
|
state: present
|
||||||
|
|
||||||
- name: "restrict dell apt repo"
|
- name: Restrict dell apt repo"
|
||||||
copy:
|
copy:
|
||||||
dest: "/etc/apt/preferences.d/dell"
|
dest: "/etc/apt/preferences.d/dell"
|
||||||
content: |
|
content: |
|
||||||
|
@ -17,7 +17,3 @@
|
||||||
Package: *
|
Package: *
|
||||||
Pin: origin "linux.dell.com"
|
Pin: origin "linux.dell.com"
|
||||||
Pin-Priority: 400
|
Pin-Priority: 400
|
||||||
|
|
||||||
- name: update apt cache
|
|
||||||
apt:
|
|
||||||
update_cache: yes
|
|
|
@ -1,12 +1,19 @@
|
||||||
---
|
---
|
||||||
- import_tasks: custom-apt-repos.yml
|
- import_tasks: ssh-port.yml
|
||||||
tags: [setup-custom-apt]
|
tags: [change-ssh-port]
|
||||||
|
|
||||||
|
- import_tasks: dell-apt-repo.yml
|
||||||
|
tags: [setup-dell-apt-repo]
|
||||||
|
when: not vagrant
|
||||||
|
|
||||||
- import_tasks: upgrade.yml
|
- import_tasks: upgrade.yml
|
||||||
tags: [do-full-system-upgrade]
|
tags: [do-full-system-upgrade]
|
||||||
|
|
||||||
- import_tasks: base.yml
|
- import_tasks: base.yml
|
||||||
tags: [install-base-packages]
|
tags: [install-base-packages]
|
||||||
|
|
||||||
- import_tasks: users.yml
|
- import_tasks: users.yml
|
||||||
tags: [setup-users]
|
tags: [setup-users]
|
||||||
|
|
||||||
- import_tasks: firewall.yml
|
- import_tasks: firewall.yml
|
||||||
tags: [setup-firewall]
|
tags: [setup-firewall]
|
||||||
|
|
||||||
|
|
20
roles/ubuntu_base/tasks/ssh-port.yml
Normal file
20
roles/ubuntu_base/tasks/ssh-port.yml
Normal file
|
@ -0,0 +1,20 @@
|
||||||
|
---
|
||||||
|
- name: Change SSH port on host
|
||||||
|
lineinfile:
|
||||||
|
dest: "/etc/ssh/sshd_config"
|
||||||
|
regexp: "^#?Port "
|
||||||
|
line: "Port 19022"
|
||||||
|
register: ssh_changed
|
||||||
|
|
||||||
|
- name: Restart sshd
|
||||||
|
service:
|
||||||
|
name: sshd
|
||||||
|
state: restarted
|
||||||
|
when: ssh_changed is defined and
|
||||||
|
ssh_changed.changed
|
||||||
|
|
||||||
|
- name: Change Ansible port to 19022
|
||||||
|
set_fact:
|
||||||
|
ansible_port: 19022
|
||||||
|
when: ssh_changed is defined and
|
||||||
|
ssh_changed.changed
|
Loading…
Reference in a new issue