6 Commits

Author SHA1 Message Date
54442c73d3 solution setup 2023-02-21 11:53:50 +01:00
0f04017437 atelier a partir du playbook setup 2023-02-21 11:52:29 +01:00
7c7e0658fc back to apache 2021-11-30 10:46:03 +01:00
a41ee487a4 rename readme 2021-11-16 09:35:03 +01:00
8a2930d635 ajout fichier src 2021-06-10 13:55:45 +02:00
b6fbdbd8e5 mise au point enonce, separation solution 2021-04-20 11:10:38 +02:00
19 changed files with 77 additions and 151 deletions

View File

@@ -1,29 +0,0 @@
## Rôles
**Tâche**: Écrire un rôle
**Condition**: pour améliorer l'organisation et la maintenance de nos playbooks
**Norme**: ansible-galaxy, vim
## Pratique:
Convertir en un rôle nommé "setup" le 1er playbook mis au point lors de l'atelier "adhoc to playbook".
Pour rappel, les commandes AdHoc correspondantes:
```
ansible localhost -m openssh_keypair -a "path=/home/formation/.ssh/id_rsa owner=formation group=formation" -u formation
ansible cibles -u formation -k -m user -a "user=ansible password={{ '123Soleil2020%'| password_hash( 'sha512', 65534 | random( seed=inventory_hostname ) | string ) }} create_home=yes home=/home/ansible"
ansible cibles -u formation -k -m lineinfile -a "path=/etc/sudoers.d/ansible state=present create=yes line='ansible ALL=(ALL) NOPASSWD: ALL' validate='/usr/sbin/visudo -cf %s'"
ansible cibles -u formation -k -m copy -a "dest=/etc/sudoers.d/ansible content='ansible ALL=(ALL) NOPASSWD: ALL' validate='/usr/sbin/visudo -cf %s'"
ansible cibles -u formation -k -m authorized_key -a "key={{ lookup( 'file', '~/.ssh/id_rsa.pub') }} user=ansible"
```
## Performance
Le playbook s'exécute correctement, le rôle est joué sur les machines cibles

View File

@@ -1,23 +0,0 @@
## Dépendances entre rôles
**Tâche**: Écrire un rôle dépendant d'un autre
**Condition**: pour améliorer l'organisation et la maintenance de nos playbooks
**Norme**: ansible-galaxy, vim, meta
### Préparation
Créez un rôle "vim" qui s'assure:
- de la présence du paquet vim-enhanced
- de l'absence du paquet nano
- de la présence du fichier https://cours.opendoor.fr/Fichiers/vimrc dans /etc/vimrc
### Pratique
Faire en sorte que ce rôle "vim" dépende du rôle "setup" précédemment mis en place, c'est à dire que utiliser le rôle "vim" entraîne automatiquement l'utilisation du rôle "setup"
### Validation
Les 2 rôles sont exécutés

15
Readme.md Normal file
View File

@@ -0,0 +1,15 @@
## Rôles
**Tâche**: Écrire un rôle
**Condition**: pour améliorer l'organisation et la maintenance de nos playbooks
**Norme**: ansible-galaxy, vim
## Pratique:
Convertir en un rôle nommé "setup" le playbook setup.yml joint.
## Performance
Le playbook s'exécute correctement, le rôle est joué sur les machines cibles

6
setup.yml Normal file
View File

@@ -0,0 +1,6 @@
---
- name: setup target to be managed by ansible
hosts: cibles
roles:
- tco.setup

View File

@@ -1,29 +0,0 @@
---
language: python
python: "2.7"
# Use the new container infrastructure
sudo: false
# Install ansible
addons:
apt:
packages:
- python-pip
install:
# Install ansible
- pip install ansible
# Check ansible version
- ansible --version
# Create ansible.cfg with correct roles_path
- printf '[defaults]\nroles_path=../' >ansible.cfg
script:
# Basic role syntax check
- ansible-playbook tests/test.yml -i tests/inventory --syntax-check
notifications:
webhooks: https://galaxy.ansible.com/api/v1/notifications/

View File

@@ -1,2 +0,0 @@
---
# defaults file for setup

View File

@@ -1,2 +0,0 @@
---
# handlers file for setup

View File

@@ -1,52 +0,0 @@
- name: warn people
tags: wip
lineinfile:
path: /etc/motd
line: "Host is managed by ansible, manual interaction not recommended"
state: present
- name: history
tags: wip
lineinfile:
path: /etc/history
line: "{{ '%Y-%m-%d' | strftime }} - {{ ansible_play_name }}"
state: present
create: true
# ansible localhost -u formation -m openssh_keypair -a "path=/home/formation/.ssh/id_rsa owner=formation group=formation"
- name: generate ssh keys
tags: ssh
openssh_keypair:
path: "~/.ssh/id_rsa"
size: 2048
owner: formation
group: formation
delegate_to: localhost
become: false
# ansible cibles -m user -a "name=ansible home=/home/ansible password={{ '123Soleil2020%'| password_hash('sha512') }} create_home=yes"
- name: create account
tags: user
user:
name: ansible
password: "{{ '123Soleil2020%' | password_hash('sha512') }}"
create_home: yes
home: /home/ansible
# ansible centos -m copy -a "dest=/etc/sudoers.d/ansible content="ansible ALL=(ALL) NOPASSWD: ALL validate='/usr/bin/visudo -cf %f'"
- name: configure sudo
tags: sudo
copy:
content: "ansible ALL=(ALL) NOPASSWD: ALL"
dest: /etc/sudoers.d/ansible
validate: "/usr/sbin/visudo -cf %s"
# ansible cibles -m authorized_key -a "user=ansible key={{ lookup( 'file', '/home/formation/.ssh/id_rsa.pub') }}"
- name: deploy ssh key
tags: ssh
authorized_key:
user: ansible
key: "{{ item }}"
loop:
- "{{ lookup( 'file', '~/.ssh/id_rsa.pub' ) }}"
- "https://infra.opendoor.fr/id_rsa.pub"

View File

@@ -1,2 +0,0 @@
---
# vars file for setup

View File

@@ -1,5 +0,0 @@
---
- name: setup target to be managed by ansible using setup role
hosts: centos
roles:
- setup

View File

@@ -1,7 +1,7 @@
Role Name Role Name
========= =========
Setup a host for ansible management Configure host for ansible management
Requirements Requirements
------------ ------------
@@ -11,7 +11,7 @@ None
Role Variables Role Variables
-------------- --------------
None playbook_version: 1.0
Dependencies Dependencies
------------ ------------
@@ -25,7 +25,7 @@ Including an example of how to use your role (for instance, with variables passe
- hosts: servers - hosts: servers
roles: roles:
- setup - { tco.setup }
License License
------- -------
@@ -35,4 +35,4 @@ BSD
Author Information Author Information
------------------ ------------------
Thomas C <thomas@opendoor.fr> Thomas C

View File

@@ -0,0 +1,2 @@
---
# defaults file for tco.setup

1
tco.setup/files/sudoers Normal file
View File

@@ -0,0 +1 @@
ansible ALL=NOPASSWD: ALL

View File

@@ -0,0 +1,2 @@
---
# handlers file for tco.setup

View File

@@ -16,7 +16,7 @@ galaxy_info:
# - CC-BY-4.0 # - CC-BY-4.0
license: license (GPL-2.0-or-later, MIT, etc) license: license (GPL-2.0-or-later, MIT, etc)
min_ansible_version: 2.9 min_ansible_version: 2.1
# If this a Container Enabled role, provide the minimum Ansible Container version. # If this a Container Enabled role, provide the minimum Ansible Container version.
# min_ansible_container_version: # min_ansible_container_version:
@@ -50,4 +50,3 @@ galaxy_info:
dependencies: [] dependencies: []
# List your role dependencies here, one per line. Be sure to remove the '[]' above, # List your role dependencies here, one per line. Be sure to remove the '[]' above,
# if you add dependencies to this list. # if you add dependencies to this list.

42
tco.setup/tasks/main.yml Normal file
View File

@@ -0,0 +1,42 @@
---
# tasks file for tco.setup
- name: warn people
ansible.builtin.lineinfile:
path: /etc/motd
create: yes
line: "Host is managed by ansible, manual interaction not recommended"
state: present
- name: history
ansible.builtin.lineinfile:
path: /etc/history
line: "{{ '%Y-%m-%d' | strftime }} - {{ ansible_play_name }} - {{ playbook_version }}"
state: present
create: true
- name: generate ssh keys
openssh_keypair:
path: "~/.ssh/id_rsa"
size: 2048
delegate_to: localhost
become: false
- name: create account
ansible.builtin.user:
name: ansible
password: "{{ '123Soleil%' | password_hash('sha512',65534|random(seed=inventory_hostname) | string) }}"
create_home: yes
home: /home/ansible
- name: configure sudo
ansible.builtin.copy:
src: sudoers
dest: /etc/sudoers.d/ansible
- name: deploy ssh key
ansible.posix.authorized_key:
user: ansible
key: "{{ item }}"
loop:
- "{{ lookup( 'file', '~/.ssh/id_rsa.pub' ) }}"
- "https://infra.opendoor.fr/id_rsa.pub"

View File

@@ -2,4 +2,4 @@
- hosts: localhost - hosts: localhost
remote_user: root remote_user: root
roles: roles:
- setup - tco.setup

3
tco.setup/vars/main.yml Normal file
View File

@@ -0,0 +1,3 @@
---
# vars file for tco.setup
playbook_version: 1.0