Compare commits
2 Commits
bee1722cea
...
transcaffe
Author | SHA1 | Date | |
---|---|---|---|
fb13bd55bf
|
|||
c31e13a975
|
@ -1,32 +0,0 @@
|
|||||||
---
|
|
||||||
|
|
||||||
mariadb_version: "10.6.11"
|
|
||||||
mariadb_base_path: /var/lib/mariadb
|
|
||||||
mariadb_data_path: "{{ mariadb_base_path }}/{{ mariadb_version }}"
|
|
||||||
|
|
||||||
mariadb_root_password: ~
|
|
||||||
mariadb_database: ~
|
|
||||||
mariadb_username: ~
|
|
||||||
mariadb_password: ~
|
|
||||||
|
|
||||||
mariadb_container_base_environment:
|
|
||||||
MARIADB_ROOT_PASSWORD: "{{ mariadb_root_password }}"
|
|
||||||
mariadb_container_extra_environment: {}
|
|
||||||
|
|
||||||
mariadb_container_name: mariadb
|
|
||||||
mariadb_container_image_name: docker.io/mariadb
|
|
||||||
mariadb_container_image_tag: ~
|
|
||||||
mariadb_container_image: "{{ mariadb_container_image_name }}:{{ mariadb_container_image_tag | default(mariadb_version, true) }}"
|
|
||||||
mariadb_container_base_volumes:
|
|
||||||
- "{{ mariadb_data_path }}:{{ mariadb_container_data_path }}:z"
|
|
||||||
mariadb_container_extra_volumes: []
|
|
||||||
mariadb_container_base_labels:
|
|
||||||
version: "{{ mariadb_version }}"
|
|
||||||
mariadb_container_extra_labels: {}
|
|
||||||
mariadb_container_restart_policy: "unless-stopped"
|
|
||||||
mariadb_container_environment: >-2
|
|
||||||
{{ mariadb_container_base_environment
|
|
||||||
| combine(mariadb_container_database_environment
|
|
||||||
if (mariadb_database and mariadb_username and mariadb_password)
|
|
||||||
else {}, recursive=True)
|
|
||||||
| combine(mariadb_container_extra_environment) }}
|
|
@ -1,20 +0,0 @@
|
|||||||
---
|
|
||||||
- name: Ensure mariaDB container image is present on host
|
|
||||||
community.docker.docker_image:
|
|
||||||
name: "{{ mariadb_container_image }}"
|
|
||||||
state: present
|
|
||||||
source: pull
|
|
||||||
|
|
||||||
- name: Ensure mariaDB {{ mariadb_version }} is running as '{{ mariadb_container_name }}'
|
|
||||||
community.docker.docker_container:
|
|
||||||
name: "{{ mariadb_container_name }}"
|
|
||||||
image: "{{ mariadb_container_image }}"
|
|
||||||
env: "{{ mariadb_container_environment }}"
|
|
||||||
ports: "{{ mariadb_container_ports }}"
|
|
||||||
labels: "{{ mariadb_container_labels }}"
|
|
||||||
volumes: "{{ mariadb_container_volumes }}"
|
|
||||||
networks: "{{ mariadb_container_networks | default(omit, true) }}"
|
|
||||||
etc_hosts: "{{ mariadb_container_etc_hosts | default(omit, true) }}"
|
|
||||||
purge_networks: "{{ mariadb_container_purge_networks | default(omit, true) }}"
|
|
||||||
restart_policy: "{{ mariadb_container_restart_policy }}"
|
|
||||||
state: started
|
|
@ -1,10 +0,0 @@
|
|||||||
---
|
|
||||||
|
|
||||||
mariadb_container_database_environment:
|
|
||||||
MARIADB_DATABASE: "{{ mariadb_database }}"
|
|
||||||
MARIADB_USER: "{{ mariadb_username }}"
|
|
||||||
MARIADB_PASSWORD: "{{ mariadb_password }}"
|
|
||||||
|
|
||||||
mariadb_container_data_path: /var/lib/mysql
|
|
||||||
mariadb_container_volumes: "{{ mariadb_container_base_volumes + mariadb_container_extra_volumes }}"
|
|
||||||
mariadb_container_labels: "{{ mariadb_container_base_labels | combine(mariadb_container_extra_labels, recursive=True) }}"
|
|
41
roles/nscd/defaults/main.yml
Normal file
41
roles/nscd/defaults/main.yml
Normal file
@ -0,0 +1,41 @@
|
|||||||
|
---
|
||||||
|
|
||||||
|
nscd_config_file: /etc/nscd.conf
|
||||||
|
|
||||||
|
nscd_config_password_enable_cache: true
|
||||||
|
nscd_config_password_positive_ttl_seconds: 300
|
||||||
|
nscd_config_password_negative_ttl_seconds: 10
|
||||||
|
nscd_config_password_suggested_size: 221
|
||||||
|
nscd_config_password_check_files: true
|
||||||
|
nscd_config_password_persistent: true
|
||||||
|
nscd_config_password_shared: true
|
||||||
|
nscd_config_password_max_db_size_bytes: 33554432
|
||||||
|
nscd_config_password_auto_propagate: yes
|
||||||
|
|
||||||
|
nscd_config_group_enable_cache: true
|
||||||
|
nscd_config_group_positive_ttl_seconds: 900
|
||||||
|
nscd_config_group_negative_ttl_seconds: 30
|
||||||
|
nscd_config_group_suggested_size: 221
|
||||||
|
nscd_config_group_check_files: true
|
||||||
|
nscd_config_group_persistent: true
|
||||||
|
nscd_config_group_shared: true
|
||||||
|
nscd_config_group_max_db_size_bytes: 33554432
|
||||||
|
nscd_config_group_auto_propagate: yes
|
||||||
|
|
||||||
|
nscd_config_hosts_enable_cache: true
|
||||||
|
nscd_config_hosts_positive_ttl_seconds: 1800
|
||||||
|
nscd_config_hosts_negative_ttl_seconds: 60
|
||||||
|
nscd_config_hosts_suggested_size: 221
|
||||||
|
nscd_config_hosts_check_files: true
|
||||||
|
nscd_config_hosts_persistent: true
|
||||||
|
nscd_config_hosts_shared: true
|
||||||
|
nscd_config_hosts_max_db_size_bytes: 33554432
|
||||||
|
|
||||||
|
nscd_config_services_enable_cache: true
|
||||||
|
nscd_config_services_positive_ttl_seconds: 28800
|
||||||
|
nscd_config_services_negative_ttl_seconds: 20
|
||||||
|
nscd_config_services_suggested_size: 221
|
||||||
|
nscd_config_services_check_files: true
|
||||||
|
nscd_config_services_persistent: true
|
||||||
|
nscd_config_services_shared: true
|
||||||
|
nscd_config_services_max_db_size_bytes: 33554432
|
27
roles/nscd/tasks/main.yml
Normal file
27
roles/nscd/tasks/main.yml
Normal file
@ -0,0 +1,27 @@
|
|||||||
|
---
|
||||||
|
|
||||||
|
- name: Make sure nscd is installed
|
||||||
|
apt:
|
||||||
|
name: "{{ nscd_apt_package_name }}"
|
||||||
|
state: present
|
||||||
|
when: ansible_facts['pkg_mgr'] == 'apt'
|
||||||
|
|
||||||
|
- name: Ensure nscd is configured
|
||||||
|
template:
|
||||||
|
src: nscd.conf.j2
|
||||||
|
dest: "{{ nscd_config_file }}"
|
||||||
|
owner: root
|
||||||
|
group: root
|
||||||
|
mode: "0640"
|
||||||
|
|
||||||
|
- name: Ensure systemd service is enabled
|
||||||
|
systemd:
|
||||||
|
service: "{{ nscd_systemd_service_name }}"
|
||||||
|
enabled: true
|
||||||
|
when: ansible_facts['service_mgr'] == 'systemd'
|
||||||
|
|
||||||
|
- name: Ensure systemd service is started
|
||||||
|
systemd:
|
||||||
|
service: "{{ nscd_systemd_service_name }}"
|
||||||
|
state: started
|
||||||
|
when: ansible_facts['service_mgr'] == 'systemd'
|
41
roles/nscd/templates/nscd.conf.j2
Normal file
41
roles/nscd/templates/nscd.conf.j2
Normal file
@ -0,0 +1,41 @@
|
|||||||
|
#logfile /var/log/nscd.log
|
||||||
|
#threads 4
|
||||||
|
#max-threads 32
|
||||||
|
|
||||||
|
enable-cache passwd {{ nscd_config_passwd_auto_propagate | ternary('yes', 'no') }}
|
||||||
|
positive-time-to-live passwd {{ nscd_config_passwd_positive_ttl_seconds }}
|
||||||
|
negative-time-to-live passwd {{ nscd_config_passwd_negative_ttl_seconds }}
|
||||||
|
suggested-size passwd {{ nscd_config_passwd_suggested_size }}
|
||||||
|
check-files passwd {{ nscd_config_passwd_check_files | ternary('yes', 'no') }}
|
||||||
|
persistent passwd {{ nscd_config_passwd_persistent | ternary('yes', 'no') }}
|
||||||
|
shared passwd {{ nscd_config_passwd_shared | ternary('yes', 'no') }}
|
||||||
|
max-db-size passwd {{ nscd_config_passwd_max_db_size_bytes }}
|
||||||
|
auto-propagate passwd {{ nscd_config_passwd_auto_propagate | ternary('yes', 'no') }}
|
||||||
|
|
||||||
|
enable-cache group {{ nscd_config_group_auto_propagate | ternary('yes', 'no') }}
|
||||||
|
positive-time-to-live group {{ nscd_config_group_positive_ttl_seconds }}
|
||||||
|
negative-time-to-live group {{ nscd_config_group_negative_ttl_seconds }}
|
||||||
|
suggested-size group {{ nscd_config_group_suggested_size }}
|
||||||
|
check-files group {{ nscd_config_group_check_files | ternary('yes', 'no') }}
|
||||||
|
persistent group {{ nscd_config_group_persistent | ternary('yes', 'no') }}
|
||||||
|
shared group {{ nscd_config_group_shared | ternary('yes', 'no') }}
|
||||||
|
max-db-size group {{ nscd_config_group_max_db_size_bytes }}
|
||||||
|
auto-propagate group {{ nscd_config_group_auto_propagate | ternary('yes', 'no') }}
|
||||||
|
|
||||||
|
enable-cache hosts {{ nscd_config_hosts_auto_propagate | ternary('yes', 'no') }}
|
||||||
|
positive-time-to-live hosts {{ nscd_config_hosts_positive_ttl_seconds }}
|
||||||
|
negative-time-to-live hosts {{ nscd_config_hosts_negative_ttl_seconds }}
|
||||||
|
suggested-size hosts {{ nscd_config_hosts_suggested_size }}
|
||||||
|
check-files hosts {{ nscd_config_hosts_check_files | ternary('yes', 'no') }}
|
||||||
|
persistent hosts {{ nscd_config_hosts_persistent | ternary('yes', 'no') }}
|
||||||
|
shared hosts {{ nscd_config_hosts_shared | ternary('yes', 'no') }}
|
||||||
|
max-db-size hosts {{ nscd_config_hosts_max_db_size_bytes }}
|
||||||
|
|
||||||
|
enable-cache services {{ nscd_config_services_auto_propagate | ternary('yes', 'no') }}
|
||||||
|
positive-time-to-live services {{ nscd_config_services_positive_ttl_seconds }}
|
||||||
|
negative-time-to-live services {{ nscd_config_services_negative_ttl_seconds }}
|
||||||
|
suggested-size services {{ nscd_config_services_suggested_size }}
|
||||||
|
check-files services {{ nscd_config_services_check_files | ternary('yes', 'no') }}
|
||||||
|
persistent services {{ nscd_config_services_persistent | ternary('yes', 'no') }}
|
||||||
|
shared services {{ nscd_config_services_shared | ternary('yes', 'no') }}
|
||||||
|
max-db-size services {{ nscd_config_services_max_db_size_bytes }}
|
4
roles/nscd/vars/main.yml
Normal file
4
roles/nscd/vars/main.yml
Normal file
@ -0,0 +1,4 @@
|
|||||||
|
---
|
||||||
|
|
||||||
|
nscd_apt_package_name: nscd
|
||||||
|
nscd_systemd_service_name: nscd.service
|
20
roles/nslcd/defaults/main.yml
Normal file
20
roles/nslcd/defaults/main.yml
Normal file
@ -0,0 +1,20 @@
|
|||||||
|
---
|
||||||
|
|
||||||
|
nslcd_config_uid: nslcd
|
||||||
|
nslcd_config_gid: nslcd
|
||||||
|
|
||||||
|
nslcd_config_ldap_uri: ldaps://127.0.0.1
|
||||||
|
nslcd_config_ldap_base: ~
|
||||||
|
nslcd_config_ldap_scope: sub
|
||||||
|
nslcd_config_ldap_version: 3
|
||||||
|
nslcd_config_ldap_bind_dn: ~
|
||||||
|
nslcd_config_ldap_bind_pw: ~
|
||||||
|
nslcd_config_ldap_root_pw_mod_dn: ~
|
||||||
|
nslcd_config_ldap_ssl: on
|
||||||
|
nslcd_config_ldap_tls_reqcert: always
|
||||||
|
nslcd_config_ldap_tls_cacertfile: /etc/ssl/certs/ca-certificates.crt
|
||||||
|
|
||||||
|
nslcd_config_pam_authz_search: >-2
|
||||||
|
(&(objectClass=posixAccount)(uid=$username)(|
|
||||||
|
(host=$hostname)(host=$fqdn)
|
||||||
|
))
|
27
roles/nslcd/tasks/main.yml
Normal file
27
roles/nslcd/tasks/main.yml
Normal file
@ -0,0 +1,27 @@
|
|||||||
|
---
|
||||||
|
|
||||||
|
- name: Ensure nslcd is installed
|
||||||
|
apt:
|
||||||
|
name: "{{ nslcd_apt_package_name }}"
|
||||||
|
state: present
|
||||||
|
when: ansible_facts['pkg_mgr'] == 'apt'
|
||||||
|
|
||||||
|
- name: Ensure config is templated
|
||||||
|
template:
|
||||||
|
src: nslcd.conf.j2
|
||||||
|
dest: /etc/nslcd.conf
|
||||||
|
owner: root
|
||||||
|
group: root
|
||||||
|
mode: "0640"
|
||||||
|
|
||||||
|
- name: Ensure systemd service is enabled
|
||||||
|
systemd:
|
||||||
|
service: "{{ nslcd_systemd_service_name }}"
|
||||||
|
enabled: true
|
||||||
|
when: ansible_facts['service_mgr'] == 'systemd'
|
||||||
|
|
||||||
|
- name: Ensure systemd service is running
|
||||||
|
systemd:
|
||||||
|
service: "{{ nslcd_systemd_service_name }}"
|
||||||
|
state: started
|
||||||
|
when: ansible_facts['service_mgr'] == 'systemd'
|
17
roles/nslcd/templates/nslcd.conf.j2
Normal file
17
roles/nslcd/templates/nslcd.conf.j2
Normal file
@ -0,0 +1,17 @@
|
|||||||
|
uid {{ nslcd_config_uid }}
|
||||||
|
gid {{ nslcd_config_gid }}
|
||||||
|
|
||||||
|
uri {{ nslcd_config_ldap_uri }}
|
||||||
|
base {{ nslcd_config_ldap_base }}
|
||||||
|
binddn {{ nslcd_config_ldap_bind_dn }}
|
||||||
|
bindpw {{ nslcd_config_ldap_bind_pw }}
|
||||||
|
ldap_version {{ nslcd_config_ldap_version }}
|
||||||
|
|
||||||
|
rootpwmoddn {{ nslcd_config_ldap_root_pw_mod_dn }}
|
||||||
|
|
||||||
|
ssl {{ nslcd_config_ldap_ssl }}
|
||||||
|
tls_reqcert {{ nslcd_config_ldap_tls_reqcert }}
|
||||||
|
tls_cacertfile {{ nslcd_config_ldap_tls_cacertfile }}
|
||||||
|
|
||||||
|
scope {{ nslcd_config_ldap_scope }}
|
||||||
|
pam_authz_search {{ nslcd_config_ldap_pam_authz_search }}
|
0
roles/nslcd/vars/main.yml
Normal file
0
roles/nslcd/vars/main.yml
Normal file
Reference in New Issue
Block a user