forked from data.coop/ansible
Vagrant-based testing environment (#111)
Co-authored-by: Sam A. <samsapti@noreply@git.data.coop> Co-committed-by: Sam A. <samsapti@noreply@git.data.coop>
This commit is contained in:
parent
124d8660db
commit
5a63e8e1a8
35
Vagrantfile
vendored
35
Vagrantfile
vendored
|
@ -1,24 +1,35 @@
|
||||||
Vagrant.require_version ">= 1.7.0"
|
Vagrant.require_version ">= 2.0.0"
|
||||||
|
PORT = 19022
|
||||||
|
|
||||||
|
def provisioned?(vm="default", provider="virtualbox")
|
||||||
|
File.exist?(".vagrant/machines/#{vm}/#{provider}/action_provision")
|
||||||
|
end
|
||||||
|
|
||||||
Vagrant.configure(2) do |config|
|
Vagrant.configure(2) do |config|
|
||||||
|
config.vm.network :private_network, ip: "192.168.56.10"
|
||||||
|
config.vm.network :forwarded_port, guest: PORT, host: PORT
|
||||||
|
|
||||||
config.vm.define "datacoop" do |datacoop|
|
config.vm.box = "ubuntu/focal64"
|
||||||
datacoop.vm.box = "ubuntu/bionic64"
|
config.vm.hostname = "datacoop"
|
||||||
datacoop.vm.hostname = "datacoop"
|
|
||||||
datacoop.vm.provider "virtualbox" do |v|
|
config.vm.provider :virtualbox do |v|
|
||||||
v.memory = 4096
|
v.memory = 4096
|
||||||
end
|
end
|
||||||
datacoop.vm.network "private_network", ip: "192.168.0.42"
|
|
||||||
datacoop.vm.provision "ansible" do |ansible|
|
config.vm.provision :ansible do |ansible|
|
||||||
ansible.verbose = "v"
|
|
||||||
ansible.compatibility_mode = "2.0"
|
ansible.compatibility_mode = "2.0"
|
||||||
ansible.playbook = "playbook.yml"
|
ansible.playbook = "playbook.yml"
|
||||||
ansible.ask_vault_pass = true
|
ansible.ask_vault_pass = true
|
||||||
ansible.host_vars = {
|
ansible.verbose = "v"
|
||||||
"datacoop" => {"ansible_python_interpreter" => "/usr/bin/python3.6"}
|
ansible.extra_vars = {
|
||||||
|
base_domain: "datacoop.devel"
|
||||||
}
|
}
|
||||||
ansible.groups = {
|
|
||||||
"all" => ["datacoop"]
|
# If the VM is already provisioned, we need to use the new port
|
||||||
|
if provisioned?
|
||||||
|
config.ssh.guest_port = PORT
|
||||||
|
ansible.extra_vars = {
|
||||||
|
ansible_port: PORT
|
||||||
}
|
}
|
||||||
end
|
end
|
||||||
end
|
end
|
||||||
|
|
|
@ -1,19 +1,22 @@
|
||||||
---
|
---
|
||||||
- hosts: all
|
- hosts: all
|
||||||
gather_facts: False
|
gather_facts: true
|
||||||
become: true
|
become: true
|
||||||
vars:
|
vars:
|
||||||
base_domain: data.coop
|
base_domain: data.coop
|
||||||
letsencrypt_email: admin@data.coop
|
letsencrypt_email: admin@data.coop
|
||||||
ldap_dn: "dc=data,dc=coop"
|
ldap_dn: "dc=data,dc=coop"
|
||||||
|
|
||||||
|
vagrant: "{{ ansible_virtualization_role == 'guest' }}"
|
||||||
|
letsencrypt_enabled: "{{ not vagrant }}"
|
||||||
|
|
||||||
services:
|
services:
|
||||||
- nginx-proxy
|
- nginx-proxy
|
||||||
|
- postfix
|
||||||
- openldap
|
- openldap
|
||||||
- nextcloud
|
- nextcloud
|
||||||
- passit
|
- passit
|
||||||
- gitea
|
- gitea
|
||||||
- postfix
|
|
||||||
- matrix_riot
|
- matrix_riot
|
||||||
- privatebin
|
- privatebin
|
||||||
- codimd
|
- codimd
|
||||||
|
|
|
@ -28,9 +28,8 @@
|
||||||
args:
|
args:
|
||||||
creates: "{{ docker_registry.volume_folder }}/auth/htpasswd"
|
creates: "{{ docker_registry.volume_folder }}/auth/htpasswd"
|
||||||
|
|
||||||
- name: log in to local registry
|
- name: log in to registry
|
||||||
docker_login:
|
docker_login:
|
||||||
registry: "{{ docker_registry.domain }}"
|
registry: "docker.data.coop"
|
||||||
username: "docker"
|
username: "docker"
|
||||||
password: "{{ docker_password }}"
|
password: "{{ docker_password }}"
|
||||||
config_path: "{{ docker_registry.volume_folder }}/auth/config.json"
|
|
||||||
|
|
|
@ -28,7 +28,7 @@
|
||||||
dest: "{{ mailu.volume_folder }}/certs/cert.pem"
|
dest: "{{ mailu.volume_folder }}/certs/cert.pem"
|
||||||
state: hard
|
state: hard
|
||||||
force: yes
|
force: yes
|
||||||
|
when: letsencrypt_enabled
|
||||||
|
|
||||||
- name: hard link to Let's Encrypt TLS key
|
- name: hard link to Let's Encrypt TLS key
|
||||||
file:
|
file:
|
||||||
|
@ -36,6 +36,7 @@
|
||||||
dest: "{{ mailu.volume_folder }}/certs/key.pem"
|
dest: "{{ mailu.volume_folder }}/certs/key.pem"
|
||||||
state: hard
|
state: hard
|
||||||
force: yes
|
force: yes
|
||||||
|
when: letsencrypt_enabled
|
||||||
|
|
||||||
- name: run mail server containers
|
- name: run mail server containers
|
||||||
docker_compose:
|
docker_compose:
|
||||||
|
|
|
@ -44,4 +44,5 @@
|
||||||
- /var/run/docker.sock:/var/run/docker.sock:ro
|
- /var/run/docker.sock:/var/run/docker.sock:ro
|
||||||
env:
|
env:
|
||||||
NGINX_PROXY_CONTAINER: nginx-proxy
|
NGINX_PROXY_CONTAINER: nginx-proxy
|
||||||
|
when: letsencrypt_enabled
|
||||||
|
|
||||||
|
|
|
@ -9,8 +9,11 @@
|
||||||
- apparmor
|
- apparmor
|
||||||
- haveged
|
- haveged
|
||||||
- mosh
|
- mosh
|
||||||
- ufw
|
|
||||||
- srvadmin-all # Dell OpenManage
|
- name: Install Dell OpenManage
|
||||||
|
apt:
|
||||||
|
name: srvadmin-all
|
||||||
|
when: not vagrant
|
||||||
|
|
||||||
- name: Install necessary packages via pip
|
- name: Install necessary packages via pip
|
||||||
pip:
|
pip:
|
||||||
|
|
|
@ -1,15 +1,15 @@
|
||||||
---
|
---
|
||||||
- name: import dell apt signing key
|
- name: Import dell apt signing key
|
||||||
apt_key:
|
apt_key:
|
||||||
id: "1285491434D8786F"
|
id: "1285491434D8786F"
|
||||||
keyserver: "keyserver.ubuntu.com"
|
keyserver: "keyserver.ubuntu.com"
|
||||||
|
|
||||||
- name: "configure dell apt repo"
|
- name: Configure dell apt repo
|
||||||
apt_repository:
|
apt_repository:
|
||||||
repo: "deb https://linux.dell.com/repo/community/openmanage/10101/focal focal main"
|
repo: "deb https://linux.dell.com/repo/community/openmanage/10101/focal focal main"
|
||||||
state: "present"
|
state: present
|
||||||
|
|
||||||
- name: "restrict dell apt repo"
|
- name: Restrict dell apt repo"
|
||||||
copy:
|
copy:
|
||||||
dest: "/etc/apt/preferences.d/dell"
|
dest: "/etc/apt/preferences.d/dell"
|
||||||
content: |
|
content: |
|
||||||
|
@ -17,7 +17,3 @@
|
||||||
Package: *
|
Package: *
|
||||||
Pin: origin "linux.dell.com"
|
Pin: origin "linux.dell.com"
|
||||||
Pin-Priority: 400
|
Pin-Priority: 400
|
||||||
|
|
||||||
- name: update apt cache
|
|
||||||
apt:
|
|
||||||
update_cache: yes
|
|
|
@ -1,12 +1,19 @@
|
||||||
---
|
---
|
||||||
- import_tasks: custom-apt-repos.yml
|
- import_tasks: ssh-port.yml
|
||||||
tags: [setup-custom-apt]
|
tags: [change-ssh-port]
|
||||||
|
|
||||||
|
- import_tasks: dell-apt-repo.yml
|
||||||
|
tags: [setup-dell-apt-repo]
|
||||||
|
when: not vagrant
|
||||||
|
|
||||||
- import_tasks: upgrade.yml
|
- import_tasks: upgrade.yml
|
||||||
tags: [do-full-system-upgrade]
|
tags: [do-full-system-upgrade]
|
||||||
|
|
||||||
- import_tasks: base.yml
|
- import_tasks: base.yml
|
||||||
tags: [install-base-packages]
|
tags: [install-base-packages]
|
||||||
|
|
||||||
- import_tasks: users.yml
|
- import_tasks: users.yml
|
||||||
tags: [setup-users]
|
tags: [setup-users]
|
||||||
|
|
||||||
- import_tasks: firewall.yml
|
- import_tasks: firewall.yml
|
||||||
tags: [setup-firewall]
|
tags: [setup-firewall]
|
||||||
|
|
||||||
|
|
20
roles/ubuntu_base/tasks/ssh-port.yml
Normal file
20
roles/ubuntu_base/tasks/ssh-port.yml
Normal file
|
@ -0,0 +1,20 @@
|
||||||
|
---
|
||||||
|
- name: Change SSH port on host
|
||||||
|
lineinfile:
|
||||||
|
dest: "/etc/ssh/sshd_config"
|
||||||
|
regexp: "^#?Port "
|
||||||
|
line: "Port 19022"
|
||||||
|
register: ssh_changed
|
||||||
|
|
||||||
|
- name: Restart sshd
|
||||||
|
service:
|
||||||
|
name: sshd
|
||||||
|
state: restarted
|
||||||
|
when: ssh_changed is defined and
|
||||||
|
ssh_changed.changed
|
||||||
|
|
||||||
|
- name: Change Ansible port to 19022
|
||||||
|
set_fact:
|
||||||
|
ansible_port: 19022
|
||||||
|
when: ssh_changed is defined and
|
||||||
|
ssh_changed.changed
|
Loading…
Reference in a new issue