mirror of
https://github.com/MatteZ02/infra.git
synced 2025-07-07 11:30:50 +00:00
Compare commits
13 Commits
eec548f5c1
...
master
Author | SHA1 | Date | |
---|---|---|---|
a350ba76e5 | |||
2619c219fa | |||
bc1051e7e1 | |||
3f7a4ebf81 | |||
6d45a4ac67 | |||
3cb0dac47e | |||
605f8ce56f | |||
fb7d20fea3 | |||
c5a7a0cc98 | |||
81c90a377c | |||
4fd8d7b889 | |||
3efc266ffe | |||
31468b561f |
2
LICENSE
2
LICENSE
@ -1,6 +1,6 @@
|
|||||||
MIT License
|
MIT License
|
||||||
|
|
||||||
Copyright (c) 2024 Warén Group
|
Copyright (c) 2024-2025 Warén Group
|
||||||
|
|
||||||
Permission is hereby granted, free of charge, to any person obtaining a copy
|
Permission is hereby granted, free of charge, to any person obtaining a copy
|
||||||
of this software and associated documentation files (the "Software"), to deal
|
of this software and associated documentation files (the "Software"), to deal
|
||||||
|
155
files/certbot/auth-hooks/acme-dns.py
Normal file
155
files/certbot/auth-hooks/acme-dns.py
Normal file
@ -0,0 +1,155 @@
|
|||||||
|
#!/usr/bin/env python3
|
||||||
|
import json
|
||||||
|
import os
|
||||||
|
import requests
|
||||||
|
import sys
|
||||||
|
|
||||||
|
### EDIT THESE: Configuration values ###
|
||||||
|
|
||||||
|
# URL to acme-dns instance
|
||||||
|
ACMEDNS_URL = "https://acme-challenge.waren.io"
|
||||||
|
# Path for acme-dns credential storage
|
||||||
|
STORAGE_PATH = "/etc/letsencrypt/acmedns.json"
|
||||||
|
# Whitelist for address ranges to allow the updates from
|
||||||
|
# Example: ALLOW_FROM = ["192.168.10.0/24", "::1/128"]
|
||||||
|
ALLOW_FROM = []
|
||||||
|
# Force re-registration. Overwrites the already existing acme-dns accounts.
|
||||||
|
FORCE_REGISTER = False
|
||||||
|
|
||||||
|
### DO NOT EDIT BELOW THIS POINT ###
|
||||||
|
### HERE BE DRAGONS ###
|
||||||
|
|
||||||
|
DOMAIN = os.environ["CERTBOT_DOMAIN"]
|
||||||
|
if DOMAIN.startswith("*."):
|
||||||
|
DOMAIN = DOMAIN[2:]
|
||||||
|
VALIDATION_DOMAIN = "_acme-challenge."+DOMAIN
|
||||||
|
VALIDATION_TOKEN = os.environ["CERTBOT_VALIDATION"]
|
||||||
|
|
||||||
|
|
||||||
|
class AcmeDnsClient(object):
|
||||||
|
"""
|
||||||
|
Handles the communication with ACME-DNS API
|
||||||
|
"""
|
||||||
|
|
||||||
|
def __init__(self, acmedns_url):
|
||||||
|
self.acmedns_url = acmedns_url
|
||||||
|
|
||||||
|
def register_account(self, allowfrom):
|
||||||
|
"""Registers a new ACME-DNS account"""
|
||||||
|
|
||||||
|
if allowfrom:
|
||||||
|
# Include whitelisted networks to the registration call
|
||||||
|
reg_data = {"allowfrom": allowfrom}
|
||||||
|
res = requests.post(self.acmedns_url+"/register",
|
||||||
|
data=json.dumps(reg_data))
|
||||||
|
else:
|
||||||
|
res = requests.post(self.acmedns_url+"/register")
|
||||||
|
if res.status_code == 201:
|
||||||
|
# The request was successful
|
||||||
|
return res.json()
|
||||||
|
else:
|
||||||
|
# Encountered an error
|
||||||
|
msg = ("Encountered an error while trying to register a new acme-dns "
|
||||||
|
"account. HTTP status {}, Response body: {}")
|
||||||
|
print(msg.format(res.status_code, res.text))
|
||||||
|
sys.exit(1)
|
||||||
|
|
||||||
|
def update_txt_record(self, account, txt):
|
||||||
|
"""Updates the TXT challenge record to ACME-DNS subdomain."""
|
||||||
|
update = {"subdomain": account['subdomain'], "txt": txt}
|
||||||
|
headers = {"X-Api-User": account['username'],
|
||||||
|
"X-Api-Key": account['password'],
|
||||||
|
"Content-Type": "application/json"}
|
||||||
|
res = requests.post(self.acmedns_url+"/update",
|
||||||
|
headers=headers,
|
||||||
|
data=json.dumps(update))
|
||||||
|
if res.status_code == 200:
|
||||||
|
# Successful update
|
||||||
|
return
|
||||||
|
else:
|
||||||
|
msg = ("Encountered an error while trying to update TXT record in "
|
||||||
|
"acme-dns. \n"
|
||||||
|
"------- Request headers:\n{}\n"
|
||||||
|
"------- Request body:\n{}\n"
|
||||||
|
"------- Response HTTP status: {}\n"
|
||||||
|
"------- Response body: {}")
|
||||||
|
s_headers = json.dumps(headers, indent=2, sort_keys=True)
|
||||||
|
s_update = json.dumps(update, indent=2, sort_keys=True)
|
||||||
|
s_body = json.dumps(res.json(), indent=2, sort_keys=True)
|
||||||
|
print(msg.format(s_headers, s_update, res.status_code, s_body))
|
||||||
|
sys.exit(1)
|
||||||
|
|
||||||
|
class Storage(object):
|
||||||
|
def __init__(self, storagepath):
|
||||||
|
self.storagepath = storagepath
|
||||||
|
self._data = self.load()
|
||||||
|
|
||||||
|
def load(self):
|
||||||
|
"""Reads the storage content from the disk to a dict structure"""
|
||||||
|
data = dict()
|
||||||
|
filedata = ""
|
||||||
|
try:
|
||||||
|
with open(self.storagepath, 'r') as fh:
|
||||||
|
filedata = fh.read()
|
||||||
|
except IOError as e:
|
||||||
|
if os.path.isfile(self.storagepath):
|
||||||
|
# Only error out if file exists, but cannot be read
|
||||||
|
print("ERROR: Storage file exists but cannot be read")
|
||||||
|
sys.exit(1)
|
||||||
|
try:
|
||||||
|
data = json.loads(filedata)
|
||||||
|
except ValueError:
|
||||||
|
if len(filedata) > 0:
|
||||||
|
# Storage file is corrupted
|
||||||
|
print("ERROR: Storage JSON is corrupted")
|
||||||
|
sys.exit(1)
|
||||||
|
return data
|
||||||
|
|
||||||
|
def save(self):
|
||||||
|
"""Saves the storage content to disk"""
|
||||||
|
serialized = json.dumps(self._data)
|
||||||
|
try:
|
||||||
|
with os.fdopen(os.open(self.storagepath,
|
||||||
|
os.O_WRONLY | os.O_CREAT, 0o600), 'w') as fh:
|
||||||
|
fh.truncate()
|
||||||
|
fh.write(serialized)
|
||||||
|
except IOError as e:
|
||||||
|
print("ERROR: Could not write storage file.")
|
||||||
|
sys.exit(1)
|
||||||
|
|
||||||
|
def put(self, key, value):
|
||||||
|
"""Puts the configuration value to storage and sanitize it"""
|
||||||
|
# If wildcard domain, remove the wildcard part as this will use the
|
||||||
|
# same validation record name as the base domain
|
||||||
|
if key.startswith("*."):
|
||||||
|
key = key[2:]
|
||||||
|
self._data[key] = value
|
||||||
|
|
||||||
|
def fetch(self, key):
|
||||||
|
"""Gets configuration value from storage"""
|
||||||
|
try:
|
||||||
|
return self._data[key]
|
||||||
|
except KeyError:
|
||||||
|
return None
|
||||||
|
|
||||||
|
if __name__ == "__main__":
|
||||||
|
# Init
|
||||||
|
client = AcmeDnsClient(ACMEDNS_URL)
|
||||||
|
storage = Storage(STORAGE_PATH)
|
||||||
|
|
||||||
|
# Check if an account already exists in storage
|
||||||
|
account = storage.fetch(DOMAIN)
|
||||||
|
if FORCE_REGISTER or not account:
|
||||||
|
# Create and save the new account
|
||||||
|
account = client.register_account(ALLOW_FROM)
|
||||||
|
storage.put(DOMAIN, account)
|
||||||
|
storage.save()
|
||||||
|
|
||||||
|
# Display the notification for the user to update the main zone
|
||||||
|
msg = "Please add the following CNAME record to your main DNS zone:\n{}"
|
||||||
|
cname = "{} CNAME {}.".format(VALIDATION_DOMAIN, account["fulldomain"])
|
||||||
|
print(msg.format(cname))
|
||||||
|
|
||||||
|
# Update the TXT record in acme-dns instance
|
||||||
|
client.update_txt_record(account, VALIDATION_TOKEN)
|
||||||
|
|
1
files/minecraft/.dockerignore
Normal file
1
files/minecraft/.dockerignore
Normal file
@ -0,0 +1 @@
|
|||||||
|
*
|
4
files/minecraft/Dockerfile
Normal file
4
files/minecraft/Dockerfile
Normal file
@ -0,0 +1,4 @@
|
|||||||
|
FROM docker.io/library/openjdk:21
|
||||||
|
WORKDIR /usr/src/app
|
||||||
|
|
||||||
|
RUN microdnf install git
|
1
files/ssh/.dockerignore
Normal file
1
files/ssh/.dockerignore
Normal file
@ -0,0 +1 @@
|
|||||||
|
keys
|
22
files/ssh/Dockerfile
Normal file
22
files/ssh/Dockerfile
Normal file
@ -0,0 +1,22 @@
|
|||||||
|
FROM docker.io/library/debian:latest
|
||||||
|
|
||||||
|
RUN apt update && \
|
||||||
|
apt install -y openssh-server rsync git python3-pip python3-venv jq git curl lsb-release nano man
|
||||||
|
|
||||||
|
RUN apt-get clean && \
|
||||||
|
rm -rf /var/lib/apt/lists/*
|
||||||
|
|
||||||
|
RUN rm -rf /etc/ssh/ssh_host* && \
|
||||||
|
mkdir -p /run/sshd
|
||||||
|
|
||||||
|
COPY entrypoint.sh /
|
||||||
|
|
||||||
|
RUN chmod +x entrypoint.sh
|
||||||
|
|
||||||
|
COPY sshd_config /etc/ssh/sshd_config
|
||||||
|
|
||||||
|
RUN python3 -m venv /opt/ansible && \
|
||||||
|
/opt/ansible/bin/pip3 install ansible && \
|
||||||
|
/opt/ansible/bin/pip3 install cryptography dnspython hvac jmespath netaddr pexpect
|
||||||
|
|
||||||
|
CMD ./entrypoint.sh
|
18
files/ssh/entrypoint.sh
Normal file
18
files/ssh/entrypoint.sh
Normal file
@ -0,0 +1,18 @@
|
|||||||
|
#!/bin/bash
|
||||||
|
|
||||||
|
if [[ ! -f /etc/ssh/keys/ssh_host_rsa_key ]]
|
||||||
|
then
|
||||||
|
ssh-keygen -b 4096 -f /etc/ssh/keys/ssh_host_rsa_key -t rsa -N ""
|
||||||
|
fi
|
||||||
|
if [[ ! -f /etc/ssh/keys/ssh_host_ed25519_key ]]
|
||||||
|
then
|
||||||
|
ssh-keygen -b 4096 -f /etc/ssh/keys/ssh_host_ed25519_key -t ed25519 -N ""
|
||||||
|
fi
|
||||||
|
if [[ ! -f /etc/ssh/keys/authorized_keys ]]
|
||||||
|
then
|
||||||
|
touch /etc/ssh/keys/authorized_keys
|
||||||
|
fi
|
||||||
|
|
||||||
|
cat /etc/ssh/keys/authorized_keys > ~/.ssh/authorized_keys
|
||||||
|
|
||||||
|
/usr/sbin/sshd -D
|
2
files/ssh/keys/authorized_keys
Normal file
2
files/ssh/keys/authorized_keys
Normal file
@ -0,0 +1,2 @@
|
|||||||
|
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIPW5phGhwAG8dmT+sR0uF1gRc0X9xXZiiFxvKUEsPk1N cwchristerw
|
||||||
|
ssh-rsa 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 matte
|
24
files/ssh/sshd_config
Normal file
24
files/ssh/sshd_config
Normal file
@ -0,0 +1,24 @@
|
|||||||
|
Port 25590
|
||||||
|
HostKey /etc/ssh/keys/ssh_host_rsa_key
|
||||||
|
HostKey /etc/ssh/keys/ssh_host_ed25519_key
|
||||||
|
SyslogFacility AUTHPRIV
|
||||||
|
LogLevel VERBOSE
|
||||||
|
PermitRootLogin prohibit-password
|
||||||
|
MaxAuthTries 2
|
||||||
|
PubkeyAuthentication yes
|
||||||
|
AuthorizedKeysFile .ssh/authorized_keys
|
||||||
|
PermitEmptyPasswords no
|
||||||
|
PasswordAuthentication no
|
||||||
|
ChallengeResponseAuthentication no
|
||||||
|
UsePAM yes
|
||||||
|
AllowAgentForwarding no
|
||||||
|
AllowTcpForwarding yes
|
||||||
|
X11Forwarding no
|
||||||
|
TCPKeepAlive yes
|
||||||
|
Compression no
|
||||||
|
ClientAliveCountMax 2
|
||||||
|
UseDNS no
|
||||||
|
PermitTunnel yes
|
||||||
|
PermitOpen localhost:27017
|
||||||
|
PrintMotd no
|
||||||
|
Subsystem sftp /usr/lib/openssh/sftp-server
|
2
init.sh
2
init.sh
@ -33,7 +33,7 @@ python3 -m venv ~/.venv/ansible &> /dev/null
|
|||||||
~/.venv/ansible/bin/pip3 install cryptography dnspython hvac jmespath netaddr pexpect &> /dev/null
|
~/.venv/ansible/bin/pip3 install cryptography dnspython hvac jmespath netaddr pexpect &> /dev/null
|
||||||
~/.venv/ansible/bin/pip3 install ansible &> /dev/null
|
~/.venv/ansible/bin/pip3 install ansible &> /dev/null
|
||||||
|
|
||||||
~/.venv/ansible/bin/ansible-galaxy collection install ansible.posix containers.podman --upgrade &> /dev/null
|
~/.venv/ansible/bin/ansible-galaxy collection install community.general containers.podman --upgrade &> /dev/null
|
||||||
|
|
||||||
|
|
||||||
mkdir -p ~/.ansible &> /dev/null
|
mkdir -p ~/.ansible &> /dev/null
|
||||||
|
@ -29,11 +29,3 @@
|
|||||||
tags:
|
tags:
|
||||||
- deployer
|
- deployer
|
||||||
- never
|
- never
|
||||||
|
|
||||||
- name: "Backup"
|
|
||||||
import_tasks: tasks/backup.yml
|
|
||||||
vars:
|
|
||||||
ansible_python_interpreter: "{{ ansible_facts.user_dir }}/.venv/ansible/bin/python3"
|
|
||||||
tags:
|
|
||||||
- backup
|
|
||||||
- never
|
|
||||||
|
@ -1,19 +0,0 @@
|
|||||||
---
|
|
||||||
- name: "Backup - Minecraft - Stop"
|
|
||||||
containers.podman.podman_container:
|
|
||||||
name: minecraft
|
|
||||||
state: stopped
|
|
||||||
|
|
||||||
- name: "Backup - Minecraft - Save"
|
|
||||||
community.general.archive:
|
|
||||||
path:
|
|
||||||
- "~/data/minecraft"
|
|
||||||
exclude_path:
|
|
||||||
- "~/data/minecraft/plugins/dynmap/web/tiles"
|
|
||||||
dest: "~/data/backups/minecraft-{{ ansible_facts.date_time.date }}.zip"
|
|
||||||
format: zip
|
|
||||||
|
|
||||||
- name: "Backup - Minecraft - Start"
|
|
||||||
containers.podman.podman_container:
|
|
||||||
name: minecraft
|
|
||||||
state: started
|
|
@ -17,7 +17,7 @@
|
|||||||
- tls
|
- tls
|
||||||
|
|
||||||
- name: "Deployer - Certbot - Copy Certificates"
|
- name: "Deployer - Certbot - Copy Certificates"
|
||||||
copy:
|
ansible.builtin.copy:
|
||||||
src: "~/data/certbot/live/{{ cert }}/"
|
src: "~/data/certbot/live/{{ cert }}/"
|
||||||
dest: "~/data/certificates/{{ cert }}/"
|
dest: "~/data/certificates/{{ cert }}/"
|
||||||
follow: true
|
follow: true
|
||||||
@ -32,3 +32,58 @@
|
|||||||
tags:
|
tags:
|
||||||
- certbot
|
- certbot
|
||||||
- tls
|
- tls
|
||||||
|
|
||||||
|
# - name: "Deployer - Minecraft - Build Image"
|
||||||
|
# containers.podman.podman_image:
|
||||||
|
# name: arcadiamc/openjdk
|
||||||
|
# tag: latest
|
||||||
|
# path: "{{ ansible_facts.user_dir }}/data/minecraft"
|
||||||
|
# build:
|
||||||
|
# file: Dockerfile
|
||||||
|
# format: docker
|
||||||
|
# cache: off
|
||||||
|
# force: on
|
||||||
|
# tags:
|
||||||
|
# - minecraft
|
||||||
|
|
||||||
|
# - name: "Deployer - Minecraft - Create Container"
|
||||||
|
# containers.podman.podman_container:
|
||||||
|
# name: minecraft
|
||||||
|
# image: "arcadiamc/openjdk:latest"
|
||||||
|
# state: started
|
||||||
|
# recreate: on
|
||||||
|
# network: host
|
||||||
|
# volumes:
|
||||||
|
# - "{{ ansible_facts.user_dir }}/data/minecraft:/usr/src/app"
|
||||||
|
# workdir: /usr/src/app
|
||||||
|
# command: "java -Xms1G -Xmx8G -jar paper-1.21.4-232.jar"
|
||||||
|
# restart_policy: unless-stopped
|
||||||
|
# tags:
|
||||||
|
# - minecraft
|
||||||
|
|
||||||
|
# - name: "Deployer - SSH - Build Image"
|
||||||
|
# containers.podman.podman_image:
|
||||||
|
# name: matte/ssh
|
||||||
|
# tag: latest
|
||||||
|
# path: "{{ ansible_facts.user_dir }}/data/ssh"
|
||||||
|
# build:
|
||||||
|
# file: Dockerfile
|
||||||
|
# format: docker
|
||||||
|
# cache: off
|
||||||
|
# force: on
|
||||||
|
# tags:
|
||||||
|
# - ssh
|
||||||
|
|
||||||
|
# - name: "Deployer - SSH - Create Container"
|
||||||
|
# containers.podman.podman_container:
|
||||||
|
# name: ssh
|
||||||
|
# image: "matte/ssh:latest"
|
||||||
|
# state: started
|
||||||
|
# recreate: on
|
||||||
|
# network: host
|
||||||
|
# volumes:
|
||||||
|
# - "{{ ansible_facts.user_dir }}/data:/root/data"
|
||||||
|
# - "{{ ansible_facts.user_dir }}/data/ssh/keys:/etc/ssh/keys"
|
||||||
|
# restart_policy: unless-stopped
|
||||||
|
# tags:
|
||||||
|
# - ssh
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
- name: "Installer - Ansible - Python Library"
|
- name: "Installer - Ansible - Python Library"
|
||||||
pip:
|
ansible.builtin.pip:
|
||||||
name: ansible
|
name: ansible
|
||||||
state: latest
|
state: latest
|
||||||
extra_args: --upgrade
|
extra_args: --upgrade
|
||||||
@ -10,7 +10,7 @@
|
|||||||
- ansible
|
- ansible
|
||||||
|
|
||||||
- name: "Installer : Ansible : Create Folder"
|
- name: "Installer : Ansible : Create Folder"
|
||||||
file:
|
ansible.builtin.file:
|
||||||
path: ~/bin
|
path: ~/bin
|
||||||
state: directory
|
state: directory
|
||||||
tags:
|
tags:
|
||||||
@ -42,7 +42,7 @@
|
|||||||
- ansible
|
- ansible
|
||||||
|
|
||||||
- name: "Installer - Ansible - Dependencies / Python Libraries"
|
- name: "Installer - Ansible - Dependencies / Python Libraries"
|
||||||
pip:
|
ansible.builtin.pip:
|
||||||
name: "{{ library }}"
|
name: "{{ library }}"
|
||||||
state: latest
|
state: latest
|
||||||
extra_args: --upgrade
|
extra_args: --upgrade
|
||||||
@ -62,15 +62,15 @@
|
|||||||
loop_var: "library"
|
loop_var: "library"
|
||||||
|
|
||||||
- name: "Installer : Certbot : Auth Hook - Create Folder"
|
- name: "Installer : Certbot : Auth Hook - Create Folder"
|
||||||
file:
|
ansible.builtin.file:
|
||||||
path: ~/data/certbot/auth-hooks
|
path: ~/data/certbot/auth-hooks
|
||||||
state: directory
|
state: directory
|
||||||
tags:
|
tags:
|
||||||
- certbot
|
- certbot
|
||||||
|
|
||||||
- name: "Installer : Certbot : Auth Hook - Download"
|
- name: "Installer : Certbot : Auth Hook - Copy File"
|
||||||
get_url:
|
ansible.builtin.copy:
|
||||||
url: "https://git.waren.io/warengroup/acme-dns-auth/raw/branch/master/acme-dns-auth.py"
|
src: "./files/certbot/auth-hooks/acme-dns.py"
|
||||||
dest: "~/data/certbot/auth-hooks/acme-dns.py"
|
dest: "~/data/certbot/auth-hooks/acme-dns.py"
|
||||||
mode: '700'
|
mode: '700'
|
||||||
force: true
|
force: true
|
||||||
@ -104,7 +104,7 @@
|
|||||||
- certbot
|
- certbot
|
||||||
|
|
||||||
- name: "Installer : Schedule : Maintenance"
|
- name: "Installer : Schedule : Maintenance"
|
||||||
cron:
|
ansible.builtin.cron:
|
||||||
name: "Matte - Infra - Maintenance"
|
name: "Matte - Infra - Maintenance"
|
||||||
hour: "*/3"
|
hour: "*/3"
|
||||||
minute: "0"
|
minute: "0"
|
||||||
@ -113,7 +113,7 @@
|
|||||||
- cron
|
- cron
|
||||||
|
|
||||||
- name: "Installer : Schedule : Deployer"
|
- name: "Installer : Schedule : Deployer"
|
||||||
cron:
|
ansible.builtin.cron:
|
||||||
name: "Matte - Infra - Deployer"
|
name: "Matte - Infra - Deployer"
|
||||||
minute: "*/5"
|
minute: "*/5"
|
||||||
job: "~/.venv/ansible/bin/ansible-pull -U ssh://git@github.com/MatteZ02/infra -d ~/.ansible/pull/matte/infra --accept-host-key --private-key ~/.ssh/keys/matte/infra --vault-password-file ~/.ansible/vault/matte.yml tasks.yml -t deployer"
|
job: "~/.venv/ansible/bin/ansible-pull -U ssh://git@github.com/MatteZ02/infra -d ~/.ansible/pull/matte/infra --accept-host-key --private-key ~/.ssh/keys/matte/infra --vault-password-file ~/.ansible/vault/matte.yml tasks.yml -t deployer"
|
||||||
@ -121,10 +121,10 @@
|
|||||||
- cron
|
- cron
|
||||||
|
|
||||||
- name: "Installer : Schedule : Backup"
|
- name: "Installer : Schedule : Backup"
|
||||||
cron:
|
ansible.builtin.cron:
|
||||||
name: "Matte - Infra - Backup"
|
name: "Matte - Infra - Backup"
|
||||||
hour: "5"
|
hour: "3"
|
||||||
minute: "0"
|
minute: "30"
|
||||||
job: "~/.venv/ansible/bin/ansible-pull -U ssh://git@github.com/MatteZ02/infra -d ~/.ansible/pull/matte/infra --accept-host-key --private-key ~/.ssh/keys/matte/infra --vault-password-file ~/.ansible/vault/matte.yml tasks.yml -t backup"
|
job: "~/.venv/ansible/bin/ansible-pull -U ssh://git@github.com/MatteZ02/infra -d ~/.ansible/pull/matte/infra --accept-host-key --private-key ~/.ssh/keys/matte/infra --vault-password-file ~/.ansible/vault/matte.yml tasks.yml -t backup"
|
||||||
tags:
|
tags:
|
||||||
- cron
|
- cron
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
- name: "Installer - Ansible - Dependencies / Python Libraries"
|
- name: "Installer - Ansible - Dependencies / Python Libraries"
|
||||||
pip:
|
ansible.builtin.pip:
|
||||||
name: "{{ library }}"
|
name: "{{ library }}"
|
||||||
state: latest
|
state: latest
|
||||||
extra_args: --upgrade
|
extra_args: --upgrade
|
||||||
@ -20,7 +20,7 @@
|
|||||||
loop_var: "library"
|
loop_var: "library"
|
||||||
|
|
||||||
- name: "Maintenance : Ansible : Update"
|
- name: "Maintenance : Ansible : Update"
|
||||||
pip:
|
ansible.builtin.pip:
|
||||||
name: ansible
|
name: ansible
|
||||||
state: latest
|
state: latest
|
||||||
extra_args: --upgrade
|
extra_args: --upgrade
|
||||||
|
Reference in New Issue
Block a user