Compare commits
6 Commits
719dd8618b
...
solution_s
| Author | SHA1 | Date | |
|---|---|---|---|
| 54442c73d3 | |||
| 0f04017437 | |||
| 7c7e0658fc | |||
| a41ee487a4 | |||
| 8a2930d635 | |||
| b6fbdbd8e5 |
29
0Readme.md
29
0Readme.md
@@ -1,29 +0,0 @@
|
|||||||
## Rôles
|
|
||||||
|
|
||||||
**Tâche**: Écrire un rôle
|
|
||||||
|
|
||||||
**Condition**: pour améliorer l'organisation et la maintenance de nos playbooks
|
|
||||||
|
|
||||||
**Norme**: ansible-galaxy, vim
|
|
||||||
|
|
||||||
## Pratique:
|
|
||||||
|
|
||||||
Convertir en un rôle nommé "setup" le 1er playbook mis au point lors de l'atelier "adhoc to playbook".
|
|
||||||
|
|
||||||
Pour rappel, les commandes AdHoc correspondantes:
|
|
||||||
|
|
||||||
```
|
|
||||||
ansible localhost -m openssh_keypair -a "path=/home/formation/.ssh/id_rsa owner=formation group=formation" -u formation
|
|
||||||
|
|
||||||
ansible cibles -u formation -k -m user -a "user=ansible password={{ '123Soleil2020%'| password_hash( 'sha512', 65534 | random( seed=inventory_hostname ) | string ) }} create_home=yes home=/home/ansible"
|
|
||||||
|
|
||||||
ansible cibles -u formation -k -m lineinfile -a "path=/etc/sudoers.d/ansible state=present create=yes line='ansible ALL=(ALL) NOPASSWD: ALL' validate='/usr/sbin/visudo -cf %s'"
|
|
||||||
|
|
||||||
ansible cibles -u formation -k -m copy -a "dest=/etc/sudoers.d/ansible content='ansible ALL=(ALL) NOPASSWD: ALL' validate='/usr/sbin/visudo -cf %s'"
|
|
||||||
|
|
||||||
ansible cibles -u formation -k -m authorized_key -a "key={{ lookup( 'file', '~/.ssh/id_rsa.pub') }} user=ansible"
|
|
||||||
```
|
|
||||||
|
|
||||||
## Performance
|
|
||||||
|
|
||||||
Le playbook s'exécute correctement, le rôle est joué sur les machines cibles
|
|
||||||
@@ -1,23 +0,0 @@
|
|||||||
## Dépendances entre rôles
|
|
||||||
|
|
||||||
**Tâche**: Écrire un rôle dépendant d'un autre
|
|
||||||
|
|
||||||
**Condition**: pour améliorer l'organisation et la maintenance de nos playbooks
|
|
||||||
|
|
||||||
**Norme**: ansible-galaxy, vim, meta
|
|
||||||
|
|
||||||
|
|
||||||
### Préparation
|
|
||||||
|
|
||||||
Créez un rôle "vim" qui s'assure:
|
|
||||||
- de la présence du paquet vim-enhanced
|
|
||||||
- de l'absence du paquet nano
|
|
||||||
- de la présence du fichier https://cours.opendoor.fr/Fichiers/vimrc dans /etc/vimrc
|
|
||||||
|
|
||||||
### Pratique
|
|
||||||
|
|
||||||
Faire en sorte que ce rôle "vim" dépende du rôle "setup" précédemment mis en place, c'est à dire que utiliser le rôle "vim" entraîne automatiquement l'utilisation du rôle "setup"
|
|
||||||
|
|
||||||
### Validation
|
|
||||||
|
|
||||||
Les 2 rôles sont exécutés
|
|
||||||
15
Readme.md
Normal file
15
Readme.md
Normal file
@@ -0,0 +1,15 @@
|
|||||||
|
## Rôles
|
||||||
|
|
||||||
|
**Tâche**: Écrire un rôle
|
||||||
|
|
||||||
|
**Condition**: pour améliorer l'organisation et la maintenance de nos playbooks
|
||||||
|
|
||||||
|
**Norme**: ansible-galaxy, vim
|
||||||
|
|
||||||
|
## Pratique:
|
||||||
|
|
||||||
|
Convertir en un rôle nommé "setup" le playbook setup.yml joint.
|
||||||
|
|
||||||
|
## Performance
|
||||||
|
|
||||||
|
Le playbook s'exécute correctement, le rôle est joué sur les machines cibles
|
||||||
6
setup.yml
Normal file
6
setup.yml
Normal file
@@ -0,0 +1,6 @@
|
|||||||
|
|
||||||
|
---
|
||||||
|
- name: setup target to be managed by ansible
|
||||||
|
hosts: cibles
|
||||||
|
roles:
|
||||||
|
- tco.setup
|
||||||
@@ -1,29 +0,0 @@
|
|||||||
---
|
|
||||||
language: python
|
|
||||||
python: "2.7"
|
|
||||||
|
|
||||||
# Use the new container infrastructure
|
|
||||||
sudo: false
|
|
||||||
|
|
||||||
# Install ansible
|
|
||||||
addons:
|
|
||||||
apt:
|
|
||||||
packages:
|
|
||||||
- python-pip
|
|
||||||
|
|
||||||
install:
|
|
||||||
# Install ansible
|
|
||||||
- pip install ansible
|
|
||||||
|
|
||||||
# Check ansible version
|
|
||||||
- ansible --version
|
|
||||||
|
|
||||||
# Create ansible.cfg with correct roles_path
|
|
||||||
- printf '[defaults]\nroles_path=../' >ansible.cfg
|
|
||||||
|
|
||||||
script:
|
|
||||||
# Basic role syntax check
|
|
||||||
- ansible-playbook tests/test.yml -i tests/inventory --syntax-check
|
|
||||||
|
|
||||||
notifications:
|
|
||||||
webhooks: https://galaxy.ansible.com/api/v1/notifications/
|
|
||||||
@@ -1,2 +0,0 @@
|
|||||||
---
|
|
||||||
# defaults file for setup
|
|
||||||
@@ -1,2 +0,0 @@
|
|||||||
---
|
|
||||||
# handlers file for setup
|
|
||||||
@@ -1,52 +0,0 @@
|
|||||||
- name: warn people
|
|
||||||
tags: wip
|
|
||||||
lineinfile:
|
|
||||||
path: /etc/motd
|
|
||||||
line: "Host is managed by ansible, manual interaction not recommended"
|
|
||||||
state: present
|
|
||||||
|
|
||||||
- name: history
|
|
||||||
tags: wip
|
|
||||||
lineinfile:
|
|
||||||
path: /etc/history
|
|
||||||
line: "{{ '%Y-%m-%d' | strftime }} - {{ ansible_play_name }}"
|
|
||||||
state: present
|
|
||||||
create: true
|
|
||||||
|
|
||||||
# ansible localhost -u formation -m openssh_keypair -a "path=/home/formation/.ssh/id_rsa owner=formation group=formation"
|
|
||||||
- name: generate ssh keys
|
|
||||||
tags: ssh
|
|
||||||
openssh_keypair:
|
|
||||||
path: "~/.ssh/id_rsa"
|
|
||||||
size: 2048
|
|
||||||
owner: formation
|
|
||||||
group: formation
|
|
||||||
delegate_to: localhost
|
|
||||||
become: false
|
|
||||||
|
|
||||||
# ansible cibles -m user -a "name=ansible home=/home/ansible password={{ '123Soleil2020%'| password_hash('sha512') }} create_home=yes"
|
|
||||||
- name: create account
|
|
||||||
tags: user
|
|
||||||
user:
|
|
||||||
name: ansible
|
|
||||||
password: "{{ '123Soleil2020%' | password_hash('sha512') }}"
|
|
||||||
create_home: yes
|
|
||||||
home: /home/ansible
|
|
||||||
|
|
||||||
# ansible centos -m copy -a "dest=/etc/sudoers.d/ansible content="ansible ALL=(ALL) NOPASSWD: ALL validate='/usr/bin/visudo -cf %f'"
|
|
||||||
- name: configure sudo
|
|
||||||
tags: sudo
|
|
||||||
copy:
|
|
||||||
content: "ansible ALL=(ALL) NOPASSWD: ALL"
|
|
||||||
dest: /etc/sudoers.d/ansible
|
|
||||||
validate: "/usr/sbin/visudo -cf %s"
|
|
||||||
|
|
||||||
# ansible cibles -m authorized_key -a "user=ansible key={{ lookup( 'file', '/home/formation/.ssh/id_rsa.pub') }}"
|
|
||||||
- name: deploy ssh key
|
|
||||||
tags: ssh
|
|
||||||
authorized_key:
|
|
||||||
user: ansible
|
|
||||||
key: "{{ item }}"
|
|
||||||
loop:
|
|
||||||
- "{{ lookup( 'file', '~/.ssh/id_rsa.pub' ) }}"
|
|
||||||
- "https://infra.opendoor.fr/id_rsa.pub"
|
|
||||||
@@ -1,2 +0,0 @@
|
|||||||
---
|
|
||||||
# vars file for setup
|
|
||||||
@@ -1,5 +0,0 @@
|
|||||||
---
|
|
||||||
- name: setup target to be managed by ansible using setup role
|
|
||||||
hosts: centos
|
|
||||||
roles:
|
|
||||||
- setup
|
|
||||||
@@ -1,7 +1,7 @@
|
|||||||
Role Name
|
Role Name
|
||||||
=========
|
=========
|
||||||
|
|
||||||
Setup a host for ansible management
|
Configure host for ansible management
|
||||||
|
|
||||||
Requirements
|
Requirements
|
||||||
------------
|
------------
|
||||||
@@ -11,7 +11,7 @@ None
|
|||||||
Role Variables
|
Role Variables
|
||||||
--------------
|
--------------
|
||||||
|
|
||||||
None
|
playbook_version: 1.0
|
||||||
|
|
||||||
Dependencies
|
Dependencies
|
||||||
------------
|
------------
|
||||||
@@ -25,7 +25,7 @@ Including an example of how to use your role (for instance, with variables passe
|
|||||||
|
|
||||||
- hosts: servers
|
- hosts: servers
|
||||||
roles:
|
roles:
|
||||||
- setup
|
- { tco.setup }
|
||||||
|
|
||||||
License
|
License
|
||||||
-------
|
-------
|
||||||
@@ -35,4 +35,4 @@ BSD
|
|||||||
Author Information
|
Author Information
|
||||||
------------------
|
------------------
|
||||||
|
|
||||||
Thomas C <thomas@opendoor.fr>
|
Thomas C
|
||||||
2
tco.setup/defaults/main.yml
Normal file
2
tco.setup/defaults/main.yml
Normal file
@@ -0,0 +1,2 @@
|
|||||||
|
---
|
||||||
|
# defaults file for tco.setup
|
||||||
1
tco.setup/files/sudoers
Normal file
1
tco.setup/files/sudoers
Normal file
@@ -0,0 +1 @@
|
|||||||
|
ansible ALL=NOPASSWD: ALL
|
||||||
2
tco.setup/handlers/main.yml
Normal file
2
tco.setup/handlers/main.yml
Normal file
@@ -0,0 +1,2 @@
|
|||||||
|
---
|
||||||
|
# handlers file for tco.setup
|
||||||
@@ -16,7 +16,7 @@ galaxy_info:
|
|||||||
# - CC-BY-4.0
|
# - CC-BY-4.0
|
||||||
license: license (GPL-2.0-or-later, MIT, etc)
|
license: license (GPL-2.0-or-later, MIT, etc)
|
||||||
|
|
||||||
min_ansible_version: 2.9
|
min_ansible_version: 2.1
|
||||||
|
|
||||||
# If this a Container Enabled role, provide the minimum Ansible Container version.
|
# If this a Container Enabled role, provide the minimum Ansible Container version.
|
||||||
# min_ansible_container_version:
|
# min_ansible_container_version:
|
||||||
@@ -50,4 +50,3 @@ galaxy_info:
|
|||||||
dependencies: []
|
dependencies: []
|
||||||
# List your role dependencies here, one per line. Be sure to remove the '[]' above,
|
# List your role dependencies here, one per line. Be sure to remove the '[]' above,
|
||||||
# if you add dependencies to this list.
|
# if you add dependencies to this list.
|
||||||
|
|
||||||
42
tco.setup/tasks/main.yml
Normal file
42
tco.setup/tasks/main.yml
Normal file
@@ -0,0 +1,42 @@
|
|||||||
|
---
|
||||||
|
# tasks file for tco.setup
|
||||||
|
- name: warn people
|
||||||
|
ansible.builtin.lineinfile:
|
||||||
|
path: /etc/motd
|
||||||
|
create: yes
|
||||||
|
line: "Host is managed by ansible, manual interaction not recommended"
|
||||||
|
state: present
|
||||||
|
|
||||||
|
- name: history
|
||||||
|
ansible.builtin.lineinfile:
|
||||||
|
path: /etc/history
|
||||||
|
line: "{{ '%Y-%m-%d' | strftime }} - {{ ansible_play_name }} - {{ playbook_version }}"
|
||||||
|
state: present
|
||||||
|
create: true
|
||||||
|
|
||||||
|
- name: generate ssh keys
|
||||||
|
openssh_keypair:
|
||||||
|
path: "~/.ssh/id_rsa"
|
||||||
|
size: 2048
|
||||||
|
delegate_to: localhost
|
||||||
|
become: false
|
||||||
|
|
||||||
|
- name: create account
|
||||||
|
ansible.builtin.user:
|
||||||
|
name: ansible
|
||||||
|
password: "{{ '123Soleil%' | password_hash('sha512',65534|random(seed=inventory_hostname) | string) }}"
|
||||||
|
create_home: yes
|
||||||
|
home: /home/ansible
|
||||||
|
|
||||||
|
- name: configure sudo
|
||||||
|
ansible.builtin.copy:
|
||||||
|
src: sudoers
|
||||||
|
dest: /etc/sudoers.d/ansible
|
||||||
|
|
||||||
|
- name: deploy ssh key
|
||||||
|
ansible.posix.authorized_key:
|
||||||
|
user: ansible
|
||||||
|
key: "{{ item }}"
|
||||||
|
loop:
|
||||||
|
- "{{ lookup( 'file', '~/.ssh/id_rsa.pub' ) }}"
|
||||||
|
- "https://infra.opendoor.fr/id_rsa.pub"
|
||||||
@@ -2,4 +2,4 @@
|
|||||||
- hosts: localhost
|
- hosts: localhost
|
||||||
remote_user: root
|
remote_user: root
|
||||||
roles:
|
roles:
|
||||||
- setup
|
- tco.setup
|
||||||
3
tco.setup/vars/main.yml
Normal file
3
tco.setup/vars/main.yml
Normal file
@@ -0,0 +1,3 @@
|
|||||||
|
---
|
||||||
|
# vars file for tco.setup
|
||||||
|
playbook_version: 1.0
|
||||||
Reference in New Issue
Block a user