Compare commits
5 Commits
719dd8618b
...
solutionAp
| Author | SHA1 | Date | |
|---|---|---|---|
| 8ecd8acbd2 | |||
| fd95cee4b4 | |||
| f4420ee8e5 | |||
| 8a2930d635 | |||
| b6fbdbd8e5 |
29
0Readme.md
29
0Readme.md
@@ -1,29 +0,0 @@
|
|||||||
## Rôles
|
|
||||||
|
|
||||||
**Tâche**: Écrire un rôle
|
|
||||||
|
|
||||||
**Condition**: pour améliorer l'organisation et la maintenance de nos playbooks
|
|
||||||
|
|
||||||
**Norme**: ansible-galaxy, vim
|
|
||||||
|
|
||||||
## Pratique:
|
|
||||||
|
|
||||||
Convertir en un rôle nommé "setup" le 1er playbook mis au point lors de l'atelier "adhoc to playbook".
|
|
||||||
|
|
||||||
Pour rappel, les commandes AdHoc correspondantes:
|
|
||||||
|
|
||||||
```
|
|
||||||
ansible localhost -m openssh_keypair -a "path=/home/formation/.ssh/id_rsa owner=formation group=formation" -u formation
|
|
||||||
|
|
||||||
ansible cibles -u formation -k -m user -a "user=ansible password={{ '123Soleil2020%'| password_hash( 'sha512', 65534 | random( seed=inventory_hostname ) | string ) }} create_home=yes home=/home/ansible"
|
|
||||||
|
|
||||||
ansible cibles -u formation -k -m lineinfile -a "path=/etc/sudoers.d/ansible state=present create=yes line='ansible ALL=(ALL) NOPASSWD: ALL' validate='/usr/sbin/visudo -cf %s'"
|
|
||||||
|
|
||||||
ansible cibles -u formation -k -m copy -a "dest=/etc/sudoers.d/ansible content='ansible ALL=(ALL) NOPASSWD: ALL' validate='/usr/sbin/visudo -cf %s'"
|
|
||||||
|
|
||||||
ansible cibles -u formation -k -m authorized_key -a "key={{ lookup( 'file', '~/.ssh/id_rsa.pub') }} user=ansible"
|
|
||||||
```
|
|
||||||
|
|
||||||
## Performance
|
|
||||||
|
|
||||||
Le playbook s'exécute correctement, le rôle est joué sur les machines cibles
|
|
||||||
@@ -1,23 +0,0 @@
|
|||||||
## Dépendances entre rôles
|
|
||||||
|
|
||||||
**Tâche**: Écrire un rôle dépendant d'un autre
|
|
||||||
|
|
||||||
**Condition**: pour améliorer l'organisation et la maintenance de nos playbooks
|
|
||||||
|
|
||||||
**Norme**: ansible-galaxy, vim, meta
|
|
||||||
|
|
||||||
|
|
||||||
### Préparation
|
|
||||||
|
|
||||||
Créez un rôle "vim" qui s'assure:
|
|
||||||
- de la présence du paquet vim-enhanced
|
|
||||||
- de l'absence du paquet nano
|
|
||||||
- de la présence du fichier https://cours.opendoor.fr/Fichiers/vimrc dans /etc/vimrc
|
|
||||||
|
|
||||||
### Pratique
|
|
||||||
|
|
||||||
Faire en sorte que ce rôle "vim" dépende du rôle "setup" précédemment mis en place, c'est à dire que utiliser le rôle "vim" entraîne automatiquement l'utilisation du rôle "setup"
|
|
||||||
|
|
||||||
### Validation
|
|
||||||
|
|
||||||
Les 2 rôles sont exécutés
|
|
||||||
15
Readme.md
Normal file
15
Readme.md
Normal file
@@ -0,0 +1,15 @@
|
|||||||
|
## Rôles
|
||||||
|
|
||||||
|
**Tâche**: Écrire / Convertir un rôle
|
||||||
|
|
||||||
|
**Condition**: pour améliorer l'organisation et la maintenance de nos playbooks
|
||||||
|
|
||||||
|
**Norme**: ansible-galaxy, vim
|
||||||
|
|
||||||
|
## Pratique:
|
||||||
|
|
||||||
|
Convertir en un rôle nommé "sib.apache" le playbook apache.yml".
|
||||||
|
|
||||||
|
## Performance
|
||||||
|
|
||||||
|
Le playbook s'exécute correctement, le rôle est joué sur les machines cibles
|
||||||
5
apache.yml
Normal file
5
apache.yml
Normal file
@@ -0,0 +1,5 @@
|
|||||||
|
---
|
||||||
|
- hosts: centos
|
||||||
|
name: install apache
|
||||||
|
roles:
|
||||||
|
- sib.apache
|
||||||
@@ -1,38 +0,0 @@
|
|||||||
Role Name
|
|
||||||
=========
|
|
||||||
|
|
||||||
Setup a host for ansible management
|
|
||||||
|
|
||||||
Requirements
|
|
||||||
------------
|
|
||||||
|
|
||||||
None
|
|
||||||
|
|
||||||
Role Variables
|
|
||||||
--------------
|
|
||||||
|
|
||||||
None
|
|
||||||
|
|
||||||
Dependencies
|
|
||||||
------------
|
|
||||||
|
|
||||||
None
|
|
||||||
|
|
||||||
Example Playbook
|
|
||||||
----------------
|
|
||||||
|
|
||||||
Including an example of how to use your role (for instance, with variables passed in as parameters) is always nice for users too:
|
|
||||||
|
|
||||||
- hosts: servers
|
|
||||||
roles:
|
|
||||||
- setup
|
|
||||||
|
|
||||||
License
|
|
||||||
-------
|
|
||||||
|
|
||||||
BSD
|
|
||||||
|
|
||||||
Author Information
|
|
||||||
------------------
|
|
||||||
|
|
||||||
Thomas C <thomas@opendoor.fr>
|
|
||||||
@@ -1,2 +0,0 @@
|
|||||||
---
|
|
||||||
# defaults file for setup
|
|
||||||
@@ -1,2 +0,0 @@
|
|||||||
---
|
|
||||||
# handlers file for setup
|
|
||||||
@@ -1,52 +0,0 @@
|
|||||||
- name: warn people
|
|
||||||
tags: wip
|
|
||||||
lineinfile:
|
|
||||||
path: /etc/motd
|
|
||||||
line: "Host is managed by ansible, manual interaction not recommended"
|
|
||||||
state: present
|
|
||||||
|
|
||||||
- name: history
|
|
||||||
tags: wip
|
|
||||||
lineinfile:
|
|
||||||
path: /etc/history
|
|
||||||
line: "{{ '%Y-%m-%d' | strftime }} - {{ ansible_play_name }}"
|
|
||||||
state: present
|
|
||||||
create: true
|
|
||||||
|
|
||||||
# ansible localhost -u formation -m openssh_keypair -a "path=/home/formation/.ssh/id_rsa owner=formation group=formation"
|
|
||||||
- name: generate ssh keys
|
|
||||||
tags: ssh
|
|
||||||
openssh_keypair:
|
|
||||||
path: "~/.ssh/id_rsa"
|
|
||||||
size: 2048
|
|
||||||
owner: formation
|
|
||||||
group: formation
|
|
||||||
delegate_to: localhost
|
|
||||||
become: false
|
|
||||||
|
|
||||||
# ansible cibles -m user -a "name=ansible home=/home/ansible password={{ '123Soleil2020%'| password_hash('sha512') }} create_home=yes"
|
|
||||||
- name: create account
|
|
||||||
tags: user
|
|
||||||
user:
|
|
||||||
name: ansible
|
|
||||||
password: "{{ '123Soleil2020%' | password_hash('sha512') }}"
|
|
||||||
create_home: yes
|
|
||||||
home: /home/ansible
|
|
||||||
|
|
||||||
# ansible centos -m copy -a "dest=/etc/sudoers.d/ansible content="ansible ALL=(ALL) NOPASSWD: ALL validate='/usr/bin/visudo -cf %f'"
|
|
||||||
- name: configure sudo
|
|
||||||
tags: sudo
|
|
||||||
copy:
|
|
||||||
content: "ansible ALL=(ALL) NOPASSWD: ALL"
|
|
||||||
dest: /etc/sudoers.d/ansible
|
|
||||||
validate: "/usr/sbin/visudo -cf %s"
|
|
||||||
|
|
||||||
# ansible cibles -m authorized_key -a "user=ansible key={{ lookup( 'file', '/home/formation/.ssh/id_rsa.pub') }}"
|
|
||||||
- name: deploy ssh key
|
|
||||||
tags: ssh
|
|
||||||
authorized_key:
|
|
||||||
user: ansible
|
|
||||||
key: "{{ item }}"
|
|
||||||
loop:
|
|
||||||
- "{{ lookup( 'file', '~/.ssh/id_rsa.pub' ) }}"
|
|
||||||
- "https://infra.opendoor.fr/id_rsa.pub"
|
|
||||||
@@ -1,2 +0,0 @@
|
|||||||
---
|
|
||||||
# vars file for setup
|
|
||||||
@@ -1,5 +0,0 @@
|
|||||||
---
|
|
||||||
- name: setup target to be managed by ansible using setup role
|
|
||||||
hosts: centos
|
|
||||||
roles:
|
|
||||||
- setup
|
|
||||||
38
sib.apache/README.md
Normal file
38
sib.apache/README.md
Normal file
@@ -0,0 +1,38 @@
|
|||||||
|
Role Name
|
||||||
|
=========
|
||||||
|
|
||||||
|
A brief description of the role goes here.
|
||||||
|
|
||||||
|
Requirements
|
||||||
|
------------
|
||||||
|
|
||||||
|
Any pre-requisites that may not be covered by Ansible itself or the role should be mentioned here. For instance, if the role uses the EC2 module, it may be a good idea to mention in this section that the boto package is required.
|
||||||
|
|
||||||
|
Role Variables
|
||||||
|
--------------
|
||||||
|
|
||||||
|
A description of the settable variables for this role should go here, including any variables that are in defaults/main.yml, vars/main.yml, and any variables that can/should be set via parameters to the role. Any variables that are read from other roles and/or the global scope (ie. hostvars, group vars, etc.) should be mentioned here as well.
|
||||||
|
|
||||||
|
Dependencies
|
||||||
|
------------
|
||||||
|
|
||||||
|
A list of other roles hosted on Galaxy should go here, plus any details in regards to parameters that may need to be set for other roles, or variables that are used from other roles.
|
||||||
|
|
||||||
|
Example Playbook
|
||||||
|
----------------
|
||||||
|
|
||||||
|
Including an example of how to use your role (for instance, with variables passed in as parameters) is always nice for users too:
|
||||||
|
|
||||||
|
- hosts: servers
|
||||||
|
roles:
|
||||||
|
- { role: username.rolename, x: 42 }
|
||||||
|
|
||||||
|
License
|
||||||
|
-------
|
||||||
|
|
||||||
|
BSD
|
||||||
|
|
||||||
|
Author Information
|
||||||
|
------------------
|
||||||
|
|
||||||
|
An optional section for the role authors to include contact information, or a website (HTML is not allowed).
|
||||||
2
sib.apache/defaults/main.yml
Normal file
2
sib.apache/defaults/main.yml
Normal file
@@ -0,0 +1,2 @@
|
|||||||
|
---
|
||||||
|
# defaults file for sib.apache
|
||||||
6
sib.apache/handlers/main.yml
Normal file
6
sib.apache/handlers/main.yml
Normal file
@@ -0,0 +1,6 @@
|
|||||||
|
---
|
||||||
|
# handlers file for sib.apache
|
||||||
|
- name: restart httpd
|
||||||
|
service:
|
||||||
|
name: httpd
|
||||||
|
state: restarted
|
||||||
55
sib.apache/tasks/main.yml
Normal file
55
sib.apache/tasks/main.yml
Normal file
@@ -0,0 +1,55 @@
|
|||||||
|
---
|
||||||
|
# tasks file for sib.apache
|
||||||
|
- name: install apache
|
||||||
|
yum:
|
||||||
|
name: httpd
|
||||||
|
state: present
|
||||||
|
|
||||||
|
- name: conf httpd
|
||||||
|
template:
|
||||||
|
src: vhost.conf
|
||||||
|
dest: /etc/httpd/conf.d/vhost.conf
|
||||||
|
mode: 0640
|
||||||
|
owner: root
|
||||||
|
group: apache
|
||||||
|
notify: restart httpd
|
||||||
|
|
||||||
|
- name: activate apache
|
||||||
|
service:
|
||||||
|
name: httpd
|
||||||
|
enabled: yes
|
||||||
|
state: started
|
||||||
|
|
||||||
|
- name: setup firewall
|
||||||
|
block:
|
||||||
|
- name: install firewalld packages
|
||||||
|
yum:
|
||||||
|
name:
|
||||||
|
- python3-firewall
|
||||||
|
- firewalld
|
||||||
|
state: present
|
||||||
|
|
||||||
|
- name: enable firewalld service
|
||||||
|
service:
|
||||||
|
name: firewalld
|
||||||
|
enabled: true
|
||||||
|
state: started
|
||||||
|
|
||||||
|
- name: open firewall port
|
||||||
|
firewalld:
|
||||||
|
service: http
|
||||||
|
permanent: yes
|
||||||
|
immediate: yes
|
||||||
|
state: enabled
|
||||||
|
ignore_errors: true
|
||||||
|
|
||||||
|
- name: create documentroot
|
||||||
|
file:
|
||||||
|
name: /var/www/html/example.org/
|
||||||
|
state: directory
|
||||||
|
|
||||||
|
- name: copy index file
|
||||||
|
template:
|
||||||
|
src: index.txt
|
||||||
|
dest: /var/www/html/example.org/index.html
|
||||||
|
mode: 0644
|
||||||
1
sib.apache/templates/index.txt
Normal file
1
sib.apache/templates/index.txt
Normal file
@@ -0,0 +1 @@
|
|||||||
|
<h1>hello World</h1>
|
||||||
24
sib.apache/templates/vhost.conf
Normal file
24
sib.apache/templates/vhost.conf
Normal file
@@ -0,0 +1,24 @@
|
|||||||
|
<VirtualHost *:80>
|
||||||
|
ServerName example.fr
|
||||||
|
ServerAlias www.example.fr
|
||||||
|
ServerAlias {{ inventory_hostname }}
|
||||||
|
DocumentRoot /var/www/html/example.fr
|
||||||
|
CustomLog /var/log/httpd/example.fr_access.log combined
|
||||||
|
ErrorLog /var/log/httpd/example.fr_error.log
|
||||||
|
<Directory />
|
||||||
|
Options none
|
||||||
|
Allowoverride none
|
||||||
|
Require all denied
|
||||||
|
</Directory>
|
||||||
|
|
||||||
|
<Directory /var/www/html/example.fr>
|
||||||
|
Require all granted
|
||||||
|
</Directory>
|
||||||
|
<Directory /var/www/html/example.fr/Private>
|
||||||
|
Options indexes
|
||||||
|
AuthName "stop"
|
||||||
|
AuthType Basic
|
||||||
|
AuthUserFile /etc/httpd/passwd
|
||||||
|
require valid-user
|
||||||
|
</Directory>
|
||||||
|
</VirtualHost>
|
||||||
@@ -2,4 +2,4 @@
|
|||||||
- hosts: localhost
|
- hosts: localhost
|
||||||
remote_user: root
|
remote_user: root
|
||||||
roles:
|
roles:
|
||||||
- setup
|
- sib.apache
|
||||||
2
sib.apache/vars/main.yml
Normal file
2
sib.apache/vars/main.yml
Normal file
@@ -0,0 +1,2 @@
|
|||||||
|
---
|
||||||
|
# vars file for sib.apache
|
||||||
Reference in New Issue
Block a user