1
0
Fork 0
mirror of https://github.com/iiab/iiab.git synced 2025-02-12 19:22:24 +00:00

35 tasks/*.yml writing to iiab_state.yml

This commit is contained in:
root 2020-01-12 17:06:24 -05:00
parent 85bd6ec55b
commit bd915fcdae
30 changed files with 90 additions and 113 deletions

View file

@ -81,4 +81,3 @@
dest: "{{ iiab_state_file }}"
regexp: '^awstats_installed'
line: 'awstats_installed: True'
state: present

View file

@ -69,4 +69,3 @@
dest: "{{ iiab_state_file }}"
regexp: '^azuracast_installed'
line: 'azuracast_installed: True'
state: present

View file

@ -60,4 +60,3 @@
dest: "{{ iiab_state_file }}"
regexp: '^bluetooth_installed'
line: 'bluetooth_installed: True'
state: present

View file

@ -107,4 +107,3 @@
dest: "{{ iiab_state_file }}"
regexp: '^calibreweb_installed'
line: 'calibreweb_installed: True'
state: present

View file

@ -82,6 +82,5 @@
- name: "Add 'calibre_installed: True' to {{ iiab_state_file }}" # /etc/iiab/iiab_state.yml
lineinfile:
dest: "{{ iiab_state_file }}"
regexp: '^calibreweb_installed'
regexp: '^calibre_installed'
line: 'calibre_installed: True'
state: present

View file

@ -93,7 +93,6 @@
dest: "{{ iiab_state_file }}"
regexp: '^captiveportal_installed'
line: 'captiveportal_installed: True'
state: present
#- name: Restart dnsmasq
# systemd:
@ -114,4 +113,3 @@
name: dnsmasq
state: started
when: dnsmasq_enabled | bool

View file

@ -7,13 +7,6 @@
tags:
- download
- name: "Add 'cups_installed: True' to {{ iiab_state_file }}" # /etc/iiab/iiab_state.yml
lineinfile:
dest: "{{ iiab_state_file }}"
regexp: '^cups_installed'
line: 'cups_installed: True'
state: present
- name: Install our own /etc/cups/cupsd.conf from template, to permit local LAN admin
template:
src: cupsd.conf
@ -24,12 +17,15 @@
src: cups.conf
dest: "/etc/{{ apache_config_dir }}/"
- name: Create symlink cups.conf from sites-enabled to sites-available (debuntu)
file:
src: /etc/apache2/sites-available/cups.conf
dest: /etc/apache2/sites-enabled/cups.conf
state: link
when: cups_enabled and is_debuntu
- name: "Add 'cups_installed: True' to {{ iiab_state_file }}" # /etc/iiab/iiab_state.yml
lineinfile:
dest: "{{ iiab_state_file }}"
regexp: '^cups_installed'
line: 'cups_installed: True'
- name: Enable http://box/cups via Apache (MIGHT NOT WORK?)
command: a2ensite cups.conf
when: cups_enabled
- name: Enable & Start services 'cups' and 'cups-browsed' (OS's other than Fedora 18)
service:

View file

@ -129,4 +129,3 @@
dest: "{{ iiab_state_file }}"
regexp: '^gitea_installed'
line: 'gitea_installed: True'
state: present

View file

@ -107,9 +107,9 @@
- name: Create Apache's pid dir /var/run/{{ apache_user }}
file:
path: "/var/run/{{ apache_user }}"
mode: 0755
owner: root
group: root
mode: '0755'
state: directory
- name: 'Create group: admin'
@ -127,9 +127,9 @@
- name: Create Apache dir /var/log/{{ apache_service }}
file:
path: "/var/log/{{ apache_service }}"
mode: 0755
owner: "{{ apache_user }}"
group: "{{ apache_user }}"
mode: '0755'
state: directory
- name: Enable Apache systemd service ({{ apache_service }})
@ -141,7 +141,13 @@
- name: Create /library/www/html/info directory for http://box/info offline docs
file:
path: "{{ doc_root }}/info"
mode: 0755
owner: "{{ apache_user }}"
group: "{{ apache_user }}"
mode: '0755'
state: directory
- name: "Add 'apache_installed: True' to {{ iiab_state_file }}" # /etc/iiab/iiab_state.yml
lineinfile:
dest: "{{ iiab_state_file }}"
regexp: '^apache_installed'
line: 'apache_installed: True'

View file

@ -50,4 +50,3 @@
dest: "{{ iiab_state_file }}"
regexp: '^internetarchive_installed'
line: 'internetarchive_installed: True'
state: present

View file

@ -81,3 +81,10 @@
path: /usr/local/kalite/venv/local/lib/python2.7/site-packages/kalite/packages/dist/ifcfg/parser.py
regexp: 'a-zA-Z0-9'
replace: 'a-zA-Z0-9\-'
# SHOULD REALLY BE HERE...but for now this runs in kalite/tasks/setup.yml
# - name: "Add 'kalite_installed: True' to {{ iiab_state_file }}" # /etc/iiab/iiab_state.yml
# lineinfile:
# dest: "{{ iiab_state_file }}"
# regexp: '^kalite_installed'
# line: 'kalite_installed: True'

View file

@ -3,9 +3,9 @@
- name: Create {{ kalite_root }} directory
file:
path: "{{ kalite_root }}/httpsrv/static" # /library/ka-lite
owner: root
group: root
mode: 0755
# owner: root
# group: root
# mode: 0755
state: directory
- name: Run the setup using 'kalite manage'
@ -15,9 +15,9 @@
async: 1800
poll: 10
# CAN WE MOVE THIS TO THE END OF kalite/tasks/install.yml (HENCE ITS FILENAME!)
- name: "Add 'kalite_installed: True' to {{ iiab_state_file }}" # /etc/iiab/iiab_state.yml
lineinfile:
dest: "{{ iiab_state_file }}"
regexp: '^kalite_installed'
line: 'kalite_installed: True'
state: present

View file

@ -88,4 +88,3 @@
dest: "{{ iiab_state_file }}"
regexp: '^kiwix_installed'
line: 'kiwix_installed: True'
state: present

View file

@ -118,4 +118,3 @@
dest: "{{ iiab_state_file }}"
regexp: '^kolibri_installed'
line: 'kolibri_installed: True'
state: present

View file

@ -90,4 +90,3 @@
dest: "{{ iiab_state_file }}"
regexp: '^mediawiki_installed'
line: 'mediawiki_installed: True'
state: present

View file

@ -9,12 +9,10 @@
- name: Create /library/games
file:
state: directory
path: "{{ item }}"
owner: root
group: root
mode: 0755
with_items:
- /library/games
path: /library/games
# owner: root
# group: root
# mode: 0755
# rpi only
- include_tasks: rpi_minetest_install.yml
@ -37,7 +35,7 @@
recurse: yes
owner: "{{ minetest_runas_user }}"
group: "{{ minetest_runas_group }}"
mode: 0755
# mode: 0755
when: minetest_default_game == "carbone-ng"
# Install games
@ -76,5 +74,3 @@
dest: "{{ iiab_state_file }}"
regexp: '^minetest_installed'
line: 'minetest_installed: True'
state: present

View file

@ -133,4 +133,3 @@
dest: "{{ iiab_state_file }}"
regexp: '^mongodb_installed'
line: 'mongodb_installed: True'
state: present

View file

@ -57,3 +57,9 @@
value: '"Monit is a background service monitor which can correct problems, send email, restart services."'
- option: enabled
value: "{{ monit_enabled }}"
- name: "Add 'monit_installed: True' to {{ iiab_state_file }}" # /etc/iiab/iiab_state.yml
lineinfile:
dest: "{{ iiab_state_file }}"
regexp: '^monit_installed'
line: 'monit_installed: True'

View file

@ -35,4 +35,3 @@
dest: "{{ iiab_state_file }}"
regexp: '^mosquitto_installed'
line: 'mosquitto_installed: True'
state: present

View file

@ -45,4 +45,3 @@
dest: "{{ iiab_state_file }}"
regexp: '^munin_installed'
line: 'munin_installed: True'
state: present

View file

@ -11,7 +11,7 @@
dest: /etc/dansguardian/dansguardian.conf
owner: dansguardian
group: dansguardian
mode: 0640
mode: '0640'
when: ansible_distribution == "Fedora"
- name: Install /etc/dansguardian/dansguardian.conf from template (debuntu)
@ -20,7 +20,7 @@
dest: /etc/dansguardian/dansguardian.conf
owner: dansguardian
group: dansguardian
mode: 0640
mode: '0640'
when: is_debuntu | bool
- name: Install /etc/dansguardian/dansguardian.conf from template (CentOS)
@ -29,7 +29,7 @@
dest: /etc/dansguardian/dansguardian.conf
owner: dansguardian
group: vscan
mode: 0640
mode: '0640'
when: ansible_distribution == "CentOS"
- name: Create directory /var/log/dansguardian (OS's other than CentOS)
@ -37,7 +37,7 @@
path: /var/log/dansguardian
owner: dansguardian
group: dansguardian
mode: 0750
mode: '0750'
state: directory
when: ansible_distribution != "CentOS"
@ -46,7 +46,7 @@
path: /var/log/dansguardian
owner: dansguardian
group: vscan
mode: 0750
mode: '0750'
state: directory
when: ansible_distribution == "CentOS"
@ -55,4 +55,3 @@
dest: "{{ iiab_state_file }}"
regexp: '^dansguardian_installed'
line: 'dansguardian_installed: True'
state: present

View file

@ -3,16 +3,12 @@
name: isc-dhcp-server
state: present
when: is_debuntu | bool
tags:
- download
- name: Install dhcp package (not debuntu)
package:
name: dhcp
state: present
when: not is_debuntu
tags:
- download
- name: Create non-privileged user 'dhcpd' (debuntu)
user:
@ -37,13 +33,11 @@
- name: Install systemd unit file to /etc/systemd/system/dhcpd.service
template:
src: "{{ item.src }}"
dest: "{{ item.dest }}"
owner: root
group: root
mode: "{{ item.mode }}"
with_items:
- { src: 'roles/network/templates/dhcp/dhcpd.service', dest: '/etc/systemd/system/dhcpd.service', mode: '0644' }
src: roles/network/templates/dhcp/dhcpd.service
dest: /etc/systemd/system/dhcpd.service
# owner: root
# group: root
# mode: '0644'
- name: Create file /var/lib/dhcpd/dhcpd.leases (redhat)
command: touch /var/lib/dhcpd/dhcpd.leases
@ -56,8 +50,8 @@
path: /var/lib/dhcpd/dhcpd.leases
owner: dhcpd
group: dhcpd
mode: 0644
state: file
mode: '0644'
# state: file
when: is_redhat | bool
- name: "Add 'dhcpd_installed: True' to {{ iiab_state_file }}" # /etc/iiab/iiab_state.yml
@ -65,4 +59,3 @@
dest: "{{ iiab_state_file }}"
regexp: '^dhcpd_installed'
line: 'dhcpd_installed: True'
state: present

View file

@ -5,8 +5,6 @@
- bind9utils
state: present
when: is_debuntu | bool
tags:
- download
- name: "Install named packages: bind, bind-utils (OS's other than debuntu)"
package:
@ -15,8 +13,6 @@
- bind-utils
state: present
when: not is_debuntu
tags:
- download
# or we have to change the serial number in the config files.
- name: Stop named before copying files (if first_run and debuntu)
@ -30,7 +26,7 @@
path: "{{ item }}"
owner: "{{ dns_user }}"
group: root
mode: 0755
mode: '0755'
state: directory
with_items:
- /var/named-iiab
@ -72,7 +68,7 @@
template:
src: "roles/network/templates/named/{{ dns_service }}.service"
dest: "/etc/systemd/system/{{ dns_service }}.service"
mode: 0644
mode: '0644'
- name: "Install /etc/{{ apache_config_dir }}/dns-jail.conf from template: dns-jail redirect requires the named.blackhole, disabling recursion (if dns_jail_enabled)"
# in named-iiab.conf, and the redirection of 404 error documents to /
@ -81,31 +77,19 @@
dest: "/etc/{{ apache_config_dir }}/"
when: dns_jail_enabled | bool
- name: Create symlink dns-jail.conf from sites-enabled to sites-available (if debuntu and dns_jail_enabled)
file:
src: "/etc/{{ apache_config_dir }}/dns-jail.conf"
path: "/etc/{{ apache_service }}/sites-enabled/dns-jail.conf"
state: link
when: is_debuntu and dns_jail_enabled
- name: Remove symlink /etc/{{ apache_service }}/sites-enabled/dns-jail.conf (if debuntu and not dns_jail_enabled)
file:
path: "/etc/{{ apache_service }}/sites-enabled/dns-jail.conf"
state: absent
when: is_debuntu and not dns_jail_enabled
- name: Remove symlink /etc/{{ apache_config_dir }}/dns-jail.conf (if not debuntu and not dns_jail_enabled)
file:
path: "/etc/{{ apache_config_dir }}/dns-jail.conf"
state: absent
when: not is_debuntu and not dns_jail_enabled
- name: "Add 'named_installed: True' to {{ iiab_state_file }}" # /etc/iiab/iiab_state.yml
lineinfile:
dest: "{{ iiab_state_file }}"
regexp: '^named_installed'
line: 'named_installed: True'
state: present
- name: Enable dns-jail.conf via Apache
command: a2ensite dns-jail.conf
when: dns_jail_enabled | bool
- name: Disable dns-jail.conf via Apache
command: a2dissite: dns-jail.conf
when: not dns_jail_enabled
- name: Start named systemd service
systemd:

View file

@ -4,8 +4,6 @@
- "{{ proxy }}"
- cadaver
state: present
tags:
- download
- name: "Bigger hammer for Ubuntu, run: /etc/init.d/squid stop"
command: /etc/init.d/squid stop
@ -68,7 +66,7 @@
path: /library/cache
owner: "{{ proxy_user }}"
group: "{{ proxy_user }}"
mode: 0750
mode: '0750'
state: directory
- name: Create Squid directory /var/log/{{ proxy }}
@ -76,7 +74,7 @@
path: "/var/log/{{ proxy }}"
owner: "{{ proxy_user }}"
group: "{{ proxy_user }}"
mode: 0750
mode: '0750'
state: directory
- include_tasks: roles/network/tasks/dansguardian.yml
@ -87,7 +85,6 @@
dest: "{{ iiab_state_file }}"
regexp: '^squid_installed'
line: 'squid_installed: True'
state: present
# {{ proxy }} is normally "squid", but is "squid3" on raspbian-8 & debian-8
- name: Add '{{ proxy }}' variable values to {{ iiab_ini_file }}

View file

@ -3,39 +3,39 @@
backup: yes
src: roles/network/templates/wondershaper/wondershaper.service
dest: /etc/systemd/system/wondershaper.service
mode: 0644
# mode: '0644'
- name: Install /usr/bin/wondershaper from template
template:
backup: yes
src: roles/network/templates/wondershaper/wondershaper.j2
dest: /usr/bin/wondershaper
owner: root
group: root
mode: 0744
# owner: root
# group: root
# mode: '0744'
- name: Create conf.d directory
file:
path: /etc/conf.d
owner: root
group: root
mode: 0755
# owner: root
# group: root
# mode: '0755'
state: directory
- name: Install /etc/conf.d/wondershaper.conf from template
template:
src: roles/network/templates/wondershaper/wondershaper.conf
dest: /etc/conf.d/wondershaper.conf
owner: root
group: root
mode: 0600
# owner: root
# group: root
mode: '0600'
- name: Create fact (link) for /etc/conf.d/wondershaper.conf
- name: Create fact (symlink) /etc/ansible/facts.d/wondershaper.fact -> /etc/conf.d/wondershaper.conf
file:
src: /etc/conf.d/wondershaper.conf
dest: /etc/ansible/facts.d/wondershaper.fact
owner: root
group: root
# owner: root
# group: root
state: link
- name: "Add 'wondershaper_installed: True' to {{ iiab_state_file }}" # /etc/iiab/iiab_state.yml
@ -43,7 +43,6 @@
dest: "{{ iiab_state_file }}"
regexp: '^wondershaper_installed'
line: 'wondershaper_installed: True'
state: present
- name: Add 'wondershaper' variable values to {{ iiab_ini_file }}
ini_file:

View file

@ -34,3 +34,9 @@
path: /var/log/uwsgi/app
state: directory
owner: "{{ apache_user }}"
- name: "Add 'nginx_installed: True' to {{ iiab_state_file }}" # /etc/iiab/iiab_state.yml
lineinfile:
dest: "{{ iiab_state_file }}"
regexp: '^nginx_installed'
line: 'nginx_installed: True'

View file

@ -35,7 +35,6 @@
dest: "{{ iiab_state_file }}"
regexp: '^samba_installed'
line: 'samba_installed: True'
state: present
- name: Enable & Start Samba systemd service
service:

View file

@ -220,4 +220,3 @@
dest: "{{ iiab_state_file }}"
regexp: '^sugarizer_installed'
line: 'sugarizer_installed: True'
state: present

View file

@ -49,3 +49,9 @@
with_items:
- teamviewer*
when: teamviewer_install and xo_model == "none" and ansible_distribution_version >= "22"
- name: "Add 'teamviewer_installed: True' to {{ iiab_state_file }}" # /etc/iiab/iiab_state.yml
lineinfile:
dest: "{{ iiab_state_file }}"
regexp: '^teamviewer_installed'
line: 'teamviewer_installed: True'

View file

@ -95,4 +95,3 @@
dest: "{{ iiab_state_file }}"
regexp: '^wordpress_installed'
line: 'wordpress_installed: True'
state: present