mirror of
https://github.com/iiab/iiab.git
synced 2025-02-13 19:52:06 +00:00
Merge pull request #1226 from holta/iiab-admin-cleaner
(1) iiab-admin role variables (2) alerts of pi & iiab-admin published passwords (3) introduce iiab_env_file (4) service_filelist | iiab_config_file -> iiab_ini_file
This commit is contained in:
commit
c95a0d496d
83 changed files with 356 additions and 306 deletions
|
@ -1,4 +1,4 @@
|
||||||
# Use these to tag a release at a point in time, for /etc/iiab/iiab.env
|
# Use these to tag a release at a point in time, for {{ iiab_env_file }}
|
||||||
iiab_base_ver: 6.7
|
iiab_base_ver: 6.7
|
||||||
iiab_revision: 0
|
iiab_revision: 0
|
||||||
|
|
||||||
|
|
|
@ -1,12 +1,12 @@
|
||||||
# workaround for fact that auto create does not work on ini_file
|
# workaround for fact that auto create does not work on iiab_ini_file (/etc/iiab/iiab.ini)
|
||||||
- name: Create /etc/iiab/iiab.ini (iiab_config_file)
|
- name: Create {{ iiab_ini_file }}
|
||||||
file:
|
file:
|
||||||
dest: "{{ iiab_config_file }}"
|
dest: "{{ iiab_ini_file }}"
|
||||||
state: touch
|
state: touch
|
||||||
|
|
||||||
- name: Add location section to config file
|
- name: Add location section to config file
|
||||||
ini_file:
|
ini_file:
|
||||||
dest: "{{ iiab_config_file }}"
|
dest: "{{ iiab_ini_file }}"
|
||||||
section: location
|
section: location
|
||||||
option: "{{ item.option }}"
|
option: "{{ item.option }}"
|
||||||
value: "{{ item.value }}"
|
value: "{{ item.value }}"
|
||||||
|
@ -16,9 +16,9 @@
|
||||||
- option: iiab_dir
|
- option: iiab_dir
|
||||||
value: "{{ iiab_dir }}"
|
value: "{{ iiab_dir }}"
|
||||||
|
|
||||||
- name: Add version section
|
- name: Add 'version' variable values to {{ iiab_ini_file }}
|
||||||
ini_file:
|
ini_file:
|
||||||
dest: "{{ iiab_config_file }}"
|
dest: "{{ iiab_ini_file }}"
|
||||||
section: version
|
section: version
|
||||||
option: "{{ item.option }}"
|
option: "{{ item.option }}"
|
||||||
value: "{{ item.value }}"
|
value: "{{ item.value }}"
|
||||||
|
|
|
@ -2,7 +2,7 @@
|
||||||
|
|
||||||
- name: ...IS BEGINNING ============================================
|
- name: ...IS BEGINNING ============================================
|
||||||
stat:
|
stat:
|
||||||
path: /etc/iiab/iiab.env
|
path: "{{ iiab_env_file }}"
|
||||||
register: NewInstall
|
register: NewInstall
|
||||||
|
|
||||||
- name: Setting first run flag
|
- name: Setting first run flag
|
||||||
|
@ -165,9 +165,9 @@
|
||||||
include_tasks: hostname.yml
|
include_tasks: hostname.yml
|
||||||
when: FQDN_changed
|
when: FQDN_changed
|
||||||
|
|
||||||
- name: Add 'runtime' section alongside list of services at /etc/iiab/iiab.ini
|
- name: Add 'runtime' variable values to {{ iiab_ini_file }}
|
||||||
ini_file:
|
ini_file:
|
||||||
dest: "{{ iiab_config_file }}"
|
dest: "{{ iiab_ini_file }}"
|
||||||
section: runtime
|
section: runtime
|
||||||
option: "{{ item.option }}"
|
option: "{{ item.option }}"
|
||||||
value: "{{ item.value }}"
|
value: "{{ item.value }}"
|
||||||
|
@ -209,13 +209,9 @@
|
||||||
- option: FQDN_changed
|
- option: FQDN_changed
|
||||||
value: "{{ FQDN_changed }}"
|
value: "{{ FQDN_changed }}"
|
||||||
|
|
||||||
#- name: Now changing FQDN
|
- name: Add 'runtime' variable 'is_VM' value if defined, to {{ iiab_ini_file }}
|
||||||
# include_tasks: hostname.yml
|
|
||||||
# when: FQDN_changed
|
|
||||||
|
|
||||||
- name: STAGE 0 HAS COMPLETED ======================================
|
|
||||||
ini_file:
|
ini_file:
|
||||||
dest: "{{ iiab_config_file }}"
|
dest: "{{ iiab_ini_file }}"
|
||||||
section: runtime
|
section: runtime
|
||||||
option: "{{ item.option }}"
|
option: "{{ item.option }}"
|
||||||
value: "{{ item.value }}"
|
value: "{{ item.value }}"
|
||||||
|
@ -223,3 +219,6 @@
|
||||||
- option: is_VM
|
- option: is_VM
|
||||||
value: "yes"
|
value: "yes"
|
||||||
when: is_VM is defined
|
when: is_VM is defined
|
||||||
|
|
||||||
|
- name: STAGE 0 HAS COMPLETED ======================================
|
||||||
|
meta: noop
|
||||||
|
|
|
@ -111,7 +111,7 @@
|
||||||
- name: Recording STAGE 1 HAS COMPLETED ============================
|
- name: Recording STAGE 1 HAS COMPLETED ============================
|
||||||
template:
|
template:
|
||||||
src: roles/1-prep/templates/iiab.env.j2
|
src: roles/1-prep/templates/iiab.env.j2
|
||||||
dest: /etc/iiab/iiab.env
|
dest: "{{ iiab_env_file }}"
|
||||||
owner: root
|
owner: root
|
||||||
group: root
|
group: root
|
||||||
mode: 0644
|
mode: 0644
|
||||||
|
|
|
@ -38,8 +38,8 @@ echo "/etc/resolv.conf"
|
||||||
cat /etc/resolv.conf
|
cat /etc/resolv.conf
|
||||||
echo
|
echo
|
||||||
echo "=========================================================="
|
echo "=========================================================="
|
||||||
echo "cat /etc/iiab/iiab.ini"
|
echo "cat {{ iiab_ini_file }}"
|
||||||
cat /etc/iiab/iiab.ini
|
cat {{ iiab_ini_file }}
|
||||||
echo
|
echo
|
||||||
echo "=========================================================="
|
echo "=========================================================="
|
||||||
echo "routing table"
|
echo "routing table"
|
||||||
|
|
|
@ -4,7 +4,7 @@
|
||||||
def get_iiab_env(name):
|
def get_iiab_env(name):
|
||||||
""" read iiab.env file for a value, return "" if does not exist"""
|
""" read iiab.env file for a value, return "" if does not exist"""
|
||||||
try:
|
try:
|
||||||
fd = open("/etc/iiab/iiab.env","r")
|
fd = open("{{ iiab_env_file }}","r")
|
||||||
for line in fd:
|
for line in fd:
|
||||||
line = line.lstrip()
|
line = line.lstrip()
|
||||||
line = line.rstrip('\n')
|
line = line.rstrip('\n')
|
||||||
|
|
|
@ -89,7 +89,7 @@
|
||||||
|
|
||||||
- name: Recording STAGE 2 HAS COMPLETED ==========================
|
- name: Recording STAGE 2 HAS COMPLETED ==========================
|
||||||
lineinfile:
|
lineinfile:
|
||||||
dest: /etc/iiab/iiab.env
|
dest: "{{ iiab_env_file }}"
|
||||||
regexp: '^STAGE=*'
|
regexp: '^STAGE=*'
|
||||||
line: 'STAGE=2'
|
line: 'STAGE=2'
|
||||||
state: present
|
state: present
|
||||||
|
|
|
@ -15,7 +15,7 @@ fi
|
||||||
if [[ $(grep -i raspbian /etc/*release) &&
|
if [[ $(grep -i raspbian /etc/*release) &&
|
||||||
#($(grep "hostapd_enabled = False" /etc/iiab/config_vars.yml) ||
|
#($(grep "hostapd_enabled = False" /etc/iiab/config_vars.yml) ||
|
||||||
#((! $(grep "hostapd_enabled = True" /etc/iiab/config_vars.yml)) &&
|
#((! $(grep "hostapd_enabled = True" /etc/iiab/config_vars.yml)) &&
|
||||||
! $(grep "^HOSTAPD_ENABLED=True" /etc/iiab/iiab.env) ]];
|
! $(grep "^HOSTAPD_ENABLED=True" {{ iiab_env_file }}) ]];
|
||||||
# NEGATED LOGIC HELPS FORCE PROMISCUOUS MODE EARLY IN INSTALL
|
# NEGATED LOGIC HELPS FORCE PROMISCUOUS MODE EARLY IN INSTALL
|
||||||
# (when network/tasks/main.yml hasn't yet populated iiab.env)
|
# (when network/tasks/main.yml hasn't yet populated iiab.env)
|
||||||
|
|
||||||
|
|
|
@ -3,7 +3,7 @@
|
||||||
- name: ...IS BEGINNING =====================================
|
- name: ...IS BEGINNING =====================================
|
||||||
command: echo
|
command: echo
|
||||||
|
|
||||||
- name: HTTPD
|
- name: HTTPD (APACHE)
|
||||||
include_role:
|
include_role:
|
||||||
name: httpd
|
name: httpd
|
||||||
# has no "when: XXXXX_install" flag
|
# has no "when: XXXXX_install" flag
|
||||||
|
@ -23,7 +23,7 @@
|
||||||
|
|
||||||
- name: Recording STAGE 3 HAS COMPLETED =====================
|
- name: Recording STAGE 3 HAS COMPLETED =====================
|
||||||
lineinfile:
|
lineinfile:
|
||||||
dest: /etc/iiab/iiab.env
|
dest: "{{ iiab_env_file }}"
|
||||||
regexp: '^STAGE=*'
|
regexp: '^STAGE=*'
|
||||||
line: 'STAGE=3'
|
line: 'STAGE=3'
|
||||||
state: present
|
state: present
|
||||||
|
|
|
@ -78,7 +78,7 @@
|
||||||
|
|
||||||
- name: Recording STAGE 4 HAS COMPLETED ==================
|
- name: Recording STAGE 4 HAS COMPLETED ==================
|
||||||
lineinfile:
|
lineinfile:
|
||||||
dest: /etc/iiab/iiab.env
|
dest: "{{ iiab_env_file }}"
|
||||||
regexp: '^STAGE=*'
|
regexp: '^STAGE=*'
|
||||||
line: 'STAGE=4'
|
line: 'STAGE=4'
|
||||||
state: present
|
state: present
|
||||||
|
|
|
@ -23,7 +23,7 @@
|
||||||
|
|
||||||
- name: Recording STAGE 5 HAS COMPLETED =====================
|
- name: Recording STAGE 5 HAS COMPLETED =====================
|
||||||
lineinfile:
|
lineinfile:
|
||||||
dest: /etc/iiab/iiab.env
|
dest: "{{ iiab_env_file }}"
|
||||||
regexp: '^STAGE=*'
|
regexp: '^STAGE=*'
|
||||||
line: 'STAGE=5'
|
line: 'STAGE=5'
|
||||||
state: present
|
state: present
|
||||||
|
|
|
@ -47,7 +47,7 @@
|
||||||
|
|
||||||
- name: Recording STAGE 6 HAS COMPLETED ====================
|
- name: Recording STAGE 6 HAS COMPLETED ====================
|
||||||
lineinfile:
|
lineinfile:
|
||||||
dest: /etc/iiab/iiab.env
|
dest: "{{ iiab_env_file }}"
|
||||||
regexp: '^STAGE=*'
|
regexp: '^STAGE=*'
|
||||||
line: 'STAGE=6'
|
line: 'STAGE=6'
|
||||||
state: present
|
state: present
|
||||||
|
|
|
@ -47,7 +47,7 @@
|
||||||
|
|
||||||
- name: Recording STAGE 7 HAS COMPLETED ========================
|
- name: Recording STAGE 7 HAS COMPLETED ========================
|
||||||
lineinfile:
|
lineinfile:
|
||||||
dest: /etc/iiab/iiab.env
|
dest: "{{ iiab_env_file }}"
|
||||||
regexp: '^STAGE=*'
|
regexp: '^STAGE=*'
|
||||||
line: 'STAGE=7'
|
line: 'STAGE=7'
|
||||||
state: present
|
state: present
|
||||||
|
|
|
@ -59,7 +59,7 @@
|
||||||
|
|
||||||
- name: Recording STAGE 8 HAS COMPLETED ======================
|
- name: Recording STAGE 8 HAS COMPLETED ======================
|
||||||
lineinfile:
|
lineinfile:
|
||||||
dest: /etc/iiab/iiab.env
|
dest: "{{ iiab_env_file }}"
|
||||||
regexp: '^STAGE=*'
|
regexp: '^STAGE=*'
|
||||||
line: 'STAGE=8'
|
line: 'STAGE=8'
|
||||||
state: present
|
state: present
|
||||||
|
|
|
@ -17,7 +17,7 @@
|
||||||
|
|
||||||
- name: Recording STAGE 9 HAS COMPLETED ====================
|
- name: Recording STAGE 9 HAS COMPLETED ====================
|
||||||
lineinfile:
|
lineinfile:
|
||||||
dest: /etc/iiab/iiab.env
|
dest: "{{ iiab_env_file }}"
|
||||||
regexp: '^STAGE=*'
|
regexp: '^STAGE=*'
|
||||||
line: 'STAGE=9'
|
line: 'STAGE=9'
|
||||||
state: present
|
state: present
|
||||||
|
|
|
@ -117,7 +117,7 @@
|
||||||
state=restarted
|
state=restarted
|
||||||
|
|
||||||
- name: add xs-activity-server to service list
|
- name: add xs-activity-server to service list
|
||||||
ini_file: dest='{{ service_filelist }}'
|
ini_file: dest='{{ iiab_ini_file }}'
|
||||||
section=activity-server
|
section=activity-server
|
||||||
option='{{ item.option }}'
|
option='{{ item.option }}'
|
||||||
value='{{ item.value }}'
|
value='{{ item.value }}'
|
||||||
|
|
|
@ -48,7 +48,7 @@
|
||||||
when: ajenti_enabled
|
when: ajenti_enabled
|
||||||
|
|
||||||
- name: Add ajenti to service list
|
- name: Add ajenti to service list
|
||||||
ini_file: dest='{{ service_filelist }}'
|
ini_file: dest='{{ iiab_ini_file }}'
|
||||||
section=ajenti
|
section=ajenti
|
||||||
option='{{ item.option }}'
|
option='{{ item.option }}'
|
||||||
value='{{ item.value }}'
|
value='{{ item.value }}'
|
||||||
|
|
|
@ -51,7 +51,7 @@
|
||||||
when: authserver_enabled
|
when: authserver_enabled
|
||||||
|
|
||||||
- name: add xs-authserver to service list
|
- name: add xs-authserver to service list
|
||||||
ini_file: dest='{{ service_filelist }}'
|
ini_file: dest='{{ iiab_ini_file }}'
|
||||||
section=xs-authserver
|
section=xs-authserver
|
||||||
option='{{ item.option }}'
|
option='{{ item.option }}'
|
||||||
value='{{ item.value }}'
|
value='{{ item.value }}'
|
||||||
|
|
|
@ -1,9 +1,9 @@
|
||||||
- include_tasks: install.yml
|
- include_tasks: install.yml
|
||||||
when: awstats_install
|
when: awstats_install
|
||||||
|
|
||||||
- name: Add 'awstats' to list of services at /etc/iiab/iiab.ini
|
- name: Add 'awstats' to list of services at {{ iiab_ini_file }}
|
||||||
ini_file:
|
ini_file:
|
||||||
dest: "{{ service_filelist }}"
|
dest: "{{ iiab_ini_file }}"
|
||||||
section: awstats
|
section: awstats
|
||||||
option: "{{ item.option }}"
|
option: "{{ item.option }}"
|
||||||
value: "{{ item.value }}"
|
value: "{{ item.value }}"
|
||||||
|
|
|
@ -122,9 +122,9 @@
|
||||||
name: "{{ apache_service }}" # httpd or apache2
|
name: "{{ apache_service }}" # httpd or apache2
|
||||||
state: restarted
|
state: restarted
|
||||||
|
|
||||||
- name: Add 'calibre-web' to list of services at /etc/iiab/iiab.ini
|
- name: Add 'calibre-web' to list of services at {{ iiab_ini_file }}
|
||||||
ini_file:
|
ini_file:
|
||||||
dest: "{{ service_filelist }}"
|
dest: "{{ iiab_ini_file }}"
|
||||||
section: calibre-web
|
section: calibre-web
|
||||||
option: "{{ item.option }}"
|
option: "{{ item.option }}"
|
||||||
value: "{{ item.value }}"
|
value: "{{ item.value }}"
|
||||||
|
|
|
@ -132,9 +132,9 @@
|
||||||
name: "{{ apache_service }}"
|
name: "{{ apache_service }}"
|
||||||
state: reloaded
|
state: reloaded
|
||||||
|
|
||||||
- name: Add 'calibre' to list of services at /etc/iiab/iiab.ini
|
- name: Add 'calibre' to list of services at {{ iiab_ini_file }}
|
||||||
ini_file:
|
ini_file:
|
||||||
dest: "{{ service_filelist }}"
|
dest: "{{ iiab_ini_file }}"
|
||||||
section: calibre
|
section: calibre
|
||||||
option: "{{ item.option }}"
|
option: "{{ item.option }}"
|
||||||
value: "{{ item.value }}"
|
value: "{{ item.value }}"
|
||||||
|
|
|
@ -64,9 +64,9 @@
|
||||||
enabled: no
|
enabled: no
|
||||||
when: not cups_enabled and is_F18
|
when: not cups_enabled and is_F18
|
||||||
|
|
||||||
- name: Add 'cups' to list of services at /etc/iiab/iiab.ini
|
- name: Add 'cups' to list of services at {{ iiab_ini_file }}
|
||||||
ini_file:
|
ini_file:
|
||||||
dest: "{{ service_filelist }}"
|
dest: "{{ iiab_ini_file }}"
|
||||||
section: cups
|
section: cups
|
||||||
option: "{{ item.option }}"
|
option: "{{ item.option }}"
|
||||||
value: "{{ item.value }}"
|
value: "{{ item.value }}"
|
||||||
|
|
|
@ -41,7 +41,7 @@
|
||||||
when: not docker_enabled
|
when: not docker_enabled
|
||||||
|
|
||||||
- name: add docker to service list
|
- name: add docker to service list
|
||||||
ini_file: dest='{{ service_filelist }}'
|
ini_file: dest='{{ iiab_ini_file }}'
|
||||||
section=docker
|
section=docker
|
||||||
option='{{ item.option }}'
|
option='{{ item.option }}'
|
||||||
value='{{ item.value }}'
|
value='{{ item.value }}'
|
||||||
|
|
|
@ -2,9 +2,9 @@
|
||||||
include_tasks: install.yml
|
include_tasks: install.yml
|
||||||
when: dokuwiki_install
|
when: dokuwiki_install
|
||||||
|
|
||||||
- name: Add 'dokuwiki' to list of services at /etc/iiab/iiab.ini
|
- name: Add 'dokuwiki' to list of services at {{ iiab_ini_file }}
|
||||||
ini_file:
|
ini_file:
|
||||||
dest: "{{ service_filelist }}"
|
dest: "{{ iiab_ini_file }}"
|
||||||
section: dokuwiki
|
section: dokuwiki
|
||||||
option: "{{ item.option }}"
|
option: "{{ item.option }}"
|
||||||
value: "{{ item.value }}"
|
value: "{{ item.value }}"
|
||||||
|
|
|
@ -138,9 +138,9 @@
|
||||||
state: absent
|
state: absent
|
||||||
when: not elgg_enabled and is_redhat
|
when: not elgg_enabled and is_redhat
|
||||||
|
|
||||||
- name: Add 'elgg' to list of services at /etc/iiab/iiab.ini
|
- name: Add 'elgg' to list of services at {{ iiab_ini_file }}
|
||||||
ini_file:
|
ini_file:
|
||||||
dest: "{{ service_filelist }}"
|
dest: "{{ iiab_ini_file }}"
|
||||||
section: elgg
|
section: elgg
|
||||||
option: "{{ item.option }}"
|
option: "{{ item.option }}"
|
||||||
value: "{{ item.value }}"
|
value: "{{ item.value }}"
|
||||||
|
|
|
@ -59,9 +59,9 @@
|
||||||
with_fileglob:
|
with_fileglob:
|
||||||
- html/services/*
|
- html/services/*
|
||||||
|
|
||||||
- name: Create symlink from assets to /etc/iiab/iiab.ini
|
- name: Create symlink from assets to {{ iiab_ini_file }}
|
||||||
file:
|
file:
|
||||||
src: "/etc/iiab/iiab.ini"
|
src: "{{ iiab_ini_file }}"
|
||||||
dest: "{{ doc_root }}/common/assets/iiab.ini"
|
dest: "{{ doc_root }}/common/assets/iiab.ini"
|
||||||
owner: root
|
owner: root
|
||||||
group: root
|
group: root
|
||||||
|
|
|
@ -3,7 +3,7 @@
|
||||||
# Pull down repo's entire wiki (and similar) to create offline docs
|
# Pull down repo's entire wiki (and similar) to create offline docs
|
||||||
|
|
||||||
set -e
|
set -e
|
||||||
source /etc/iiab/iiab.env
|
source {{ iiab_env_file }}
|
||||||
INPUT=/tmp/iiab-wiki
|
INPUT=/tmp/iiab-wiki
|
||||||
OUTPUT=/tmp/iiab-wiki.out
|
OUTPUT=/tmp/iiab-wiki.out
|
||||||
DESTPATH=/library/www/html/info
|
DESTPATH=/library/www/html/info
|
||||||
|
|
|
@ -80,7 +80,7 @@
|
||||||
line=allowsftp
|
line=allowsftp
|
||||||
|
|
||||||
- name: Add idmgr to service list
|
- name: Add idmgr to service list
|
||||||
ini_file: dest='{{ service_filelist }}'
|
ini_file: dest='{{ iiab_ini_file }}'
|
||||||
section=idmgr
|
section=idmgr
|
||||||
option='{{ item.option }}'
|
option='{{ item.option }}'
|
||||||
value='{{ item.value }}'
|
value='{{ item.value }}'
|
||||||
|
|
|
@ -1,5 +1,21 @@
|
||||||
---
|
# Must keep roles/0-init/defaults/main.yml sync'd ? (Seems no longer true as of 2018-10-15)
|
||||||
# must keep roles/0-once/defaults/main.yml sync'd
|
|
||||||
# The values here are defaults.
|
|
||||||
|
|
||||||
|
# Set iiab_admin_user_install: False if you don't want iiab_admin_user & wheel
|
||||||
|
# group auto-created in roles/iiab-admin/tasks/main.yml (hence disabling sudo-
|
||||||
|
# checks/warnings of published passwds like pi/raspberry & iiab-admin/g0adm1n).
|
||||||
|
iiab_admin_user_install: True
|
||||||
|
# If iiab_admin_user_install: False, set iiab_admin_user (below) to an existing
|
||||||
|
# Linux user that has sudo access, for login to Admin Console http://box/admin
|
||||||
|
|
||||||
|
# ODDLY THIS IS ALSO USED BY roles/usb-lib/tasks/main.yml TO SET GROUP PERM FOR /library/www/html/local_content (ISN'T {{ apache_user }} MORE APPROPRIATE?)
|
||||||
iiab_admin_user: iiab-admin
|
iiab_admin_user: iiab-admin
|
||||||
|
|
||||||
|
# For live checks/alerts of published pwds
|
||||||
|
iiab_admin_published_pwd: g0adm1n
|
||||||
|
|
||||||
|
# Password hash to override above, if Ansible creates above user:
|
||||||
|
iiab_admin_pwd_hash: $6$xsce51$D.IrrEeLBYIuJkGDmi27pZUGOwPFp98qpl3hxMwWV4hXigFGmdSvy3s/j7tn6OnyTTLmlV7SsN0lCUAFzxSop.
|
||||||
|
# Obtain a password hash - NEW MORE SECURE WAY:
|
||||||
|
# python3 -c 'import crypt; print(crypt.crypt("<plaintext>", crypt.mksalt(crypt.METHOD_SHA512)))'
|
||||||
|
# Obtain a password hash - OLD WAY:
|
||||||
|
# python -c 'import crypt; print crypt.crypt("<plaintext>", "$6$<salt>")'
|
||||||
|
|
|
@ -1,7 +1,7 @@
|
||||||
- name: Create iiab-admin user and password
|
- name: Create user {{ iiab_admin_user }} for Admin Console; set password from hardcoded hash if newly creating account
|
||||||
user:
|
user:
|
||||||
name: "{{ iiab_admin_user }}"
|
name: "{{ iiab_admin_user }}"
|
||||||
password: "{{ iiab_admin_passw_hash }}"
|
password: "{{ iiab_admin_pwd_hash }}"
|
||||||
update_password: on_create
|
update_password: on_create
|
||||||
shell: /bin/bash
|
shell: /bin/bash
|
||||||
|
|
||||||
|
@ -16,7 +16,7 @@
|
||||||
state: present
|
state: present
|
||||||
when: is_redhat
|
when: is_redhat
|
||||||
|
|
||||||
- name: Add user to wheel group
|
- name: 'Add user {{ iiab_admin_user }} to groups: wheel, sudo'
|
||||||
user:
|
user:
|
||||||
name: "{{ iiab_admin_user }}"
|
name: "{{ iiab_admin_user }}"
|
||||||
groups: wheel,sudo
|
groups: wheel,sudo
|
||||||
|
|
|
@ -1,15 +1,15 @@
|
||||||
- include_tasks: admin-user.yml
|
- include_tasks: admin-user.yml
|
||||||
tags:
|
tags:
|
||||||
- base
|
- base
|
||||||
when: admin_install
|
when: iiab_admin_user_install
|
||||||
|
|
||||||
- include_tasks: access.yml
|
- include_tasks: access.yml
|
||||||
tags:
|
tags:
|
||||||
- base
|
- base
|
||||||
|
|
||||||
- name: Add 'iiab-admin' to list at /etc/iiab/iiab.ini
|
- name: Add 'iiab-admin' to list at {{ iiab_ini_file }}
|
||||||
ini_file:
|
ini_file:
|
||||||
dest: "{{ service_filelist }}"
|
dest: "{{ iiab_ini_file }}"
|
||||||
section: iiab-admin
|
section: iiab-admin
|
||||||
option: "{{ item.option }}"
|
option: "{{ item.option }}"
|
||||||
value: "{{ item.value }}"
|
value: "{{ item.value }}"
|
||||||
|
|
|
@ -1,22 +1,32 @@
|
||||||
#!/bin/bash
|
#!/bin/bash
|
||||||
|
|
||||||
|
function check_user_pwd() {
|
||||||
|
# $meth (hashing method) is typically '6' which implies 5000 rounds
|
||||||
|
# of SHA-512 per /etc/login.defs -> /etc/pam.d/common-password
|
||||||
|
meth=$(sudo grep "^$1:" /etc/shadow | cut -d: -f2 | cut -d$ -f2)
|
||||||
|
salt=$(sudo grep "^$1:" /etc/shadow | cut -d: -f2 | cut -d$ -f3)
|
||||||
|
hash=$(sudo grep "^$1:" /etc/shadow | cut -d: -f2 | cut -d$ -f4)
|
||||||
|
[ $(python3 -c "import crypt; print(crypt.crypt('$2', '\$$meth\$$salt'))") == "\$$meth\$$salt\$$hash" ]
|
||||||
|
}
|
||||||
|
|
||||||
# credit to the folks at raspberry pi foundatioon
|
# credit to the folks at raspberry pi foundatioon
|
||||||
check_hash ()
|
check_hash () {
|
||||||
{
|
|
||||||
if ! id -u iiab-admin > /dev/null 2>&1 ; then return 0 ; fi
|
if ! id -u iiab-admin > /dev/null 2>&1 ; then return 0 ; fi
|
||||||
if grep -q "^PasswordAuthentication\s*no" /etc/ssh/sshd_config ; then return 0 ; fi
|
if grep -q "^PasswordAuthentication\s*no" /etc/ssh/sshd_config ; then return 0 ; fi
|
||||||
test -x /usr/bin/mkpasswd || return 0
|
#test -x /usr/bin/mkpasswd || return 0
|
||||||
SHADOW="$(sudo -n grep -E '^iiab-admin:' /etc/shadow 2>/dev/null)"
|
#SHADOW="$(sudo -n grep -E '^iiab-admin:' /etc/shadow 2>/dev/null)"
|
||||||
test -n "${SHADOW}" || return 0
|
#test -n "${SHADOW}" || return 0
|
||||||
if echo $SHADOW | grep -q "iiab-admin:!" ; then return 0 ; fi
|
#if echo $SHADOW | grep -q "iiab-admin:!" ; then return 0 ; fi
|
||||||
SHADOW_PW=$(echo $SHADOW | cut -d: -f2)
|
#SHADOW_PW=$(echo $SHADOW | cut -d: -f2)
|
||||||
if [ "$SHADOW_PW" != "\$6\$iiab51\$D.IrrEeLBYIuJkGDmi27pZUGOwPFp98qpl3hxMwWV4hXigFGmdSvy3s/j7tn6OnyTTLmlV7SsN0lCUAFzxSop." ]; then return 0 ; fi
|
#if [ "$SHADOW_PW" != "\$6\$iiab51\$D.IrrEeLBYIuJkGDmi27pZUGOwPFp98qpl3hxMwWV4hXigFGmdSvy3s/j7tn6OnyTTLmlV7SsN0lCUAFzxSop." ]; then return 0 ; fi
|
||||||
|
#if echo "${SHADOW}" | grep -q "${HASH}"; then
|
||||||
if echo "${SHADOW}" | grep -q "${HASH}"; then
|
if check_user_pwd "iiab-admin" "{{ iiab_admin_published_pwd }}"; then
|
||||||
zenity --warning --text="SSH is enabled and the default password for the 'iiab-admin' user has not been changed.\nThis is a security risk - please go to the iiab-console and use utilities-> change password to set a new password."
|
zenity --warning --text="SSH is enabled and the published password for user 'iiab-admin' is in use.\nTHIS IS A SECURITY RISK - please change its password using IIAB's Admin Console (http://box/admin) -> Utilities -> Change Password."
|
||||||
fi
|
fi
|
||||||
}
|
}
|
||||||
|
|
||||||
if service ssh status | grep -q running; then
|
#if service ssh status | grep -q running; then
|
||||||
check_hash
|
# check_hash
|
||||||
fi
|
#fi
|
||||||
|
systemctl is-active {{ sshd_service }} > /dev/null && check_hash
|
||||||
unset check_hash
|
unset check_hash
|
||||||
|
|
|
@ -1,19 +1,28 @@
|
||||||
#!/bin/bash
|
#!/bin/bash
|
||||||
# credit to the folks at raspberry pi foundatioon
|
|
||||||
check_hash ()
|
|
||||||
{
|
|
||||||
if ! id -u iiab-admin > /dev/null 2>&1 ; then return 0 ; fi
|
|
||||||
if grep -q "^PasswordAuthentication\s*no" /etc/ssh/sshd_config ; then return 0 ; fi
|
|
||||||
SHADOW="$(sudo -n grep -E '^iiab-admin:' /etc/shadow 2>/dev/null)"
|
|
||||||
test -n "${SHADOW}" || return 0
|
|
||||||
if echo $SHADOW | grep -q "iiab-admin:!" ; then return 0 ; fi
|
|
||||||
SHADOW_PW=$(echo $SHADOW | cut -d: -f2)
|
|
||||||
if [ "$SHADOW_PW" != '{{ iiab_admin_passw_hash }}' ]; then return 0 ; fi
|
|
||||||
|
|
||||||
echo
|
function check_user_pwd() {
|
||||||
echo "SSH is enabled and the default password for the 'iiab-admin' user is unchanged."
|
# $meth (hashing method) is typically '6' which implies 5000 rounds
|
||||||
echo "This is a security risk - please login as the 'iiab-admin' user and type 'passwd' to change password."
|
# of SHA-512 per /etc/login.defs -> /etc/pam.d/common-password
|
||||||
echo
|
meth=$(sudo grep "^$1:" /etc/shadow | cut -d: -f2 | cut -d$ -f2)
|
||||||
|
salt=$(sudo grep "^$1:" /etc/shadow | cut -d: -f2 | cut -d$ -f3)
|
||||||
|
hash=$(sudo grep "^$1:" /etc/shadow | cut -d: -f2 | cut -d$ -f4)
|
||||||
|
[ $(python3 -c "import crypt; print(crypt.crypt('$2', '\$$meth\$$salt'))") == "\$$meth\$$salt\$$hash" ]
|
||||||
|
}
|
||||||
|
|
||||||
|
# credit to the folks at raspberry pi foundatioon
|
||||||
|
check_hash () {
|
||||||
|
if ! id -u iiab-admin > /dev/null 2>&1 ; then return 0 ; fi
|
||||||
|
if grep -q "^PasswordAuthentication\s*no" /etc/ssh/sshd_config ; then return 0 ; fi
|
||||||
|
#SHADOW="$(sudo -n grep -E '^iiab-admin:' /etc/shadow 2>/dev/null)"
|
||||||
|
#test -n "${SHADOW}" || return 0
|
||||||
|
#if echo $SHADOW | grep -q "iiab-admin:!" ; then return 0 ; fi
|
||||||
|
#SHADOW_PW=$(echo $SHADOW | cut -d: -f2)
|
||||||
|
#if [ "$SHADOW_PW" != '{{ iiab_admin_pwd_hash }}' ]; then return 0 ; fi
|
||||||
|
if check_user_pwd "iiab-admin" "{{ iiab_admin_published_pwd }}"; then
|
||||||
|
echo -e "\nSSH is enabled and the published password for user 'iiab-admin' is in use."
|
||||||
|
echo -e "THIS IS A SECURITY RISK - please log in as user 'iiab-admin' and run 'passwd'"
|
||||||
|
echo -e "to change its password.\n"
|
||||||
|
fi
|
||||||
}
|
}
|
||||||
|
|
||||||
systemctl is-active {{ sshd_service }} > /dev/null && check_hash
|
systemctl is-active {{ sshd_service }} > /dev/null && check_hash
|
||||||
|
|
|
@ -36,9 +36,9 @@
|
||||||
|
|
||||||
- include_tasks: enable.yml
|
- include_tasks: enable.yml
|
||||||
|
|
||||||
- name: Add 'kalite' to list of services at /etc/iiab/iiab.ini
|
- name: Add 'kalite' to list of services at {{ iiab_ini_file }}
|
||||||
ini_file:
|
ini_file:
|
||||||
dest: "{{ service_filelist }}"
|
dest: "{{ iiab_ini_file }}"
|
||||||
section: kalite
|
section: kalite
|
||||||
option: "{{ item.option }}"
|
option: "{{ item.option }}"
|
||||||
value: "{{ item.value }}"
|
value: "{{ item.value }}"
|
||||||
|
|
|
@ -149,9 +149,9 @@
|
||||||
|
|
||||||
# 5. FINALIZE
|
# 5. FINALIZE
|
||||||
|
|
||||||
- name: Add 'kiwix' to list of services at /etc/iiab/iiab.ini
|
- name: Add 'kiwix' to list of services at {{ iiab_ini_file }}
|
||||||
ini_file:
|
ini_file:
|
||||||
dest: "{{ service_filelist }}"
|
dest: "{{ iiab_ini_file }}"
|
||||||
section: kiwix
|
section: kiwix
|
||||||
option: "{{ item.option }}"
|
option: "{{ item.option }}"
|
||||||
value: "{{ item.value }}"
|
value: "{{ item.value }}"
|
||||||
|
|
|
@ -29,13 +29,13 @@ if not IIAB_PATH in sys.path:
|
||||||
from iiab_env import get_iiab_env
|
from iiab_env import get_iiab_env
|
||||||
|
|
||||||
# Config Files
|
# Config Files
|
||||||
# iiab_config_file should be in /etc/iiab/iiab.env
|
# iiab_ini_file should be in {{ iiab_env_file }} (/etc/iiab/iiab.env) ?
|
||||||
iiab_config_file = "{{ iiab_config_file }}" # nominally /etc/iiab/iiab.ini
|
iiab_ini_file = "{{ iiab_ini_file }}" # nominally /etc/iiab/iiab.ini
|
||||||
# iiab_config_file = "/etc/iiab/iiab.ini" # comment out after testing
|
# iiab_ini_file = "/etc/iiab/iiab.ini" # comment out after testing
|
||||||
|
|
||||||
IIAB_INI = get_iiab_env('IIAB_INI') # future
|
IIAB_INI = get_iiab_env('IIAB_INI') # future
|
||||||
if IIAB_INI:
|
if IIAB_INI:
|
||||||
iiab_config_file = IIAB_INI
|
iiab_ini_file = IIAB_INI
|
||||||
|
|
||||||
# Variables that should be read from config file
|
# Variables that should be read from config file
|
||||||
# All of these variables will be read from config files and recomputed in init()
|
# All of these variables will be read from config files and recomputed in init()
|
||||||
|
@ -187,7 +187,7 @@ def init():
|
||||||
global kiwix_manage
|
global kiwix_manage
|
||||||
|
|
||||||
config = ConfigParser.SafeConfigParser()
|
config = ConfigParser.SafeConfigParser()
|
||||||
config.read(iiab_config_file)
|
config.read(iiab_ini_file)
|
||||||
iiab_base_path = config.get('location','iiab_base')
|
iiab_base_path = config.get('location','iiab_base')
|
||||||
zim_path = config.get('kiwix','iiab_zim_path')
|
zim_path = config.get('kiwix','iiab_zim_path')
|
||||||
kiwix_library_xml = config.get('kiwix','kiwix_library_xml')
|
kiwix_library_xml = config.get('kiwix','kiwix_library_xml')
|
||||||
|
|
|
@ -80,9 +80,9 @@
|
||||||
state: stopped
|
state: stopped
|
||||||
when: not kolibri_enabled
|
when: not kolibri_enabled
|
||||||
|
|
||||||
- name: Add 'kolibri' to list of services at /etc/iiab/iiab.ini
|
- name: Add 'kolibri' to list of services at {{ iiab_ini_file }}
|
||||||
ini_file:
|
ini_file:
|
||||||
dest: "{{ service_filelist }}"
|
dest: "{{ iiab_ini_file }}"
|
||||||
section: kolibri
|
section: kolibri
|
||||||
option: "{{ item.option }}"
|
option: "{{ item.option }}"
|
||||||
value: "{{ item.value }}"
|
value: "{{ item.value }}"
|
||||||
|
|
|
@ -85,9 +85,9 @@
|
||||||
name: "{{ apache_service }}"
|
name: "{{ apache_service }}"
|
||||||
state: restarted
|
state: restarted
|
||||||
|
|
||||||
- name: Add 'mediawiki' to list of services at /etc/iiab/iiab.ini
|
- name: Add 'mediawiki' to list of services at {{ iiab_ini_file }}
|
||||||
ini_file:
|
ini_file:
|
||||||
dest: "{{ service_filelist }}"
|
dest: "{{ iiab_ini_file }}"
|
||||||
section: mediawiki
|
section: mediawiki
|
||||||
option: "{{ item.option }}"
|
option: "{{ item.option }}"
|
||||||
value: "{{ item.value }}"
|
value: "{{ item.value }}"
|
||||||
|
|
|
@ -60,9 +60,9 @@
|
||||||
# state: stopped
|
# state: stopped
|
||||||
# when: not mongodb_enabled
|
# when: not mongodb_enabled
|
||||||
|
|
||||||
- name: Add 'mongodb' to list of services at /etc/iiab/iiab.ini
|
- name: Add 'mongodb' to list of services at {{ iiab_ini_file }}
|
||||||
ini_file:
|
ini_file:
|
||||||
dest: "{{ service_filelist }}"
|
dest: "{{ iiab_ini_file }}"
|
||||||
section: mongodb
|
section: mongodb
|
||||||
option: "{{ item.option }}"
|
option: "{{ item.option }}"
|
||||||
value: "{{ item.value }}"
|
value: "{{ item.value }}"
|
||||||
|
|
|
@ -45,9 +45,9 @@
|
||||||
#- name: Restart monit service
|
#- name: Restart monit service
|
||||||
# command: service monit restart
|
# command: service monit restart
|
||||||
|
|
||||||
- name: Add 'monit' to list of services at /etc/iiab/iiab.ini
|
- name: Add 'monit' to list of services at {{ iiab_ini_file }}
|
||||||
ini_file:
|
ini_file:
|
||||||
dest: "{{ service_filelist }}"
|
dest: "{{ iiab_ini_file }}"
|
||||||
section: monit
|
section: monit
|
||||||
option: "{{ item.option }}"
|
option: "{{ item.option }}"
|
||||||
value: "{{ item.value }}"
|
value: "{{ item.value }}"
|
||||||
|
|
|
@ -76,7 +76,7 @@
|
||||||
register: moodlepw
|
register: moodlepw
|
||||||
|
|
||||||
- name: add moodle to service list
|
- name: add moodle to service list
|
||||||
ini_file: dest='{{ service_filelist }}'
|
ini_file: dest='{{ iiab_ini_file }}'
|
||||||
section=moodle
|
section=moodle
|
||||||
option='{{ item.option }}'
|
option='{{ item.option }}'
|
||||||
value='{{ item.value }}'
|
value='{{ item.value }}'
|
||||||
|
|
|
@ -155,9 +155,9 @@
|
||||||
path: "{{ moodle_base }}/config.php"
|
path: "{{ moodle_base }}/config.php"
|
||||||
mode: 0644
|
mode: 0644
|
||||||
|
|
||||||
- name: Add 'moodle' to list of services at /etc/iiab/iiab.ini
|
- name: Add 'moodle' to list of services at {{ iiab_ini_file }}
|
||||||
ini_file:
|
ini_file:
|
||||||
dest: "{{ service_filelist }}"
|
dest: "{{ iiab_ini_file }}"
|
||||||
section: moodle
|
section: moodle
|
||||||
option: "{{ item.option }}"
|
option: "{{ item.option }}"
|
||||||
value: "{{ item.value }}"
|
value: "{{ item.value }}"
|
||||||
|
|
|
@ -84,9 +84,9 @@
|
||||||
- /usr/share/munin/plugins/mysql_threads
|
- /usr/share/munin/plugins/mysql_threads
|
||||||
when: mysql_enabled
|
when: mysql_enabled
|
||||||
|
|
||||||
- name: Add 'munin' to list of services at /etc/iiab/iiab.ini
|
- name: Add 'munin' to list of services at {{ iiab_ini_file }}
|
||||||
ini_file:
|
ini_file:
|
||||||
dest: "{{ service_filelist }}"
|
dest: "{{ iiab_ini_file }}"
|
||||||
section: munin
|
section: munin
|
||||||
option: "{{ item.option }}"
|
option: "{{ item.option }}"
|
||||||
value: "{{ item.value }}"
|
value: "{{ item.value }}"
|
||||||
|
|
|
@ -133,9 +133,9 @@
|
||||||
state: stopped
|
state: stopped
|
||||||
when: not mysql_enabled
|
when: not mysql_enabled
|
||||||
|
|
||||||
- name: Add 'mysql' to list of services at /etc/iiab/iiab.ini
|
- name: Add 'mysql' to list of services at {{ iiab_ini_file }}
|
||||||
ini_file:
|
ini_file:
|
||||||
dest: "{{ service_filelist }}"
|
dest: "{{ iiab_ini_file }}"
|
||||||
section: mysql
|
section: mysql
|
||||||
option: "{{ item.option }}"
|
option: "{{ item.option }}"
|
||||||
value: "{{ item.value }}"
|
value: "{{ item.value }}"
|
||||||
|
|
|
@ -172,9 +172,9 @@
|
||||||
iiab_wan_iface: "none"
|
iiab_wan_iface: "none"
|
||||||
when: adapter_count.stdout|int >= "5" and device_gw == "none" and gui_wan_iface == "unset" and gui_static_wan is defined
|
when: adapter_count.stdout|int >= "5" and device_gw == "none" and gui_wan_iface == "unset" and gui_static_wan is defined
|
||||||
|
|
||||||
- name: Record IIAB_WAN_DEVICE to /etc/iiab/iiab.env
|
- name: Record IIAB_WAN_DEVICE to {{ iiab_env_file }}
|
||||||
lineinfile:
|
lineinfile:
|
||||||
dest: /etc/iiab/iiab.env
|
dest: "{{ iiab_env_file }}"
|
||||||
regexp: '^IIAB_WAN_DEVICE=*'
|
regexp: '^IIAB_WAN_DEVICE=*'
|
||||||
line: 'IIAB_WAN_DEVICE="{{ iiab_wan_iface }}"'
|
line: 'IIAB_WAN_DEVICE="{{ iiab_wan_iface }}"'
|
||||||
state: present
|
state: present
|
||||||
|
@ -182,9 +182,9 @@
|
||||||
tags:
|
tags:
|
||||||
- network
|
- network
|
||||||
|
|
||||||
- name: Record IIAB_LAN_DEVICE to /etc/iiab/iiab.env
|
- name: Record IIAB_LAN_DEVICE to {{ iiab_env_file }}
|
||||||
lineinfile:
|
lineinfile:
|
||||||
dest: /etc/iiab/iiab.env
|
dest: "{{ iiab_env_file }}"
|
||||||
regexp: '^IIAB_LAN_DEVICE=*'
|
regexp: '^IIAB_LAN_DEVICE=*'
|
||||||
line: 'IIAB_LAN_DEVICE="{{ iiab_lan_iface }}"'
|
line: 'IIAB_LAN_DEVICE="{{ iiab_lan_iface }}"'
|
||||||
state: present
|
state: present
|
||||||
|
@ -192,9 +192,9 @@
|
||||||
tags:
|
tags:
|
||||||
- network
|
- network
|
||||||
|
|
||||||
- name: Add 'computed_network' variable values to /etc/iiab/iiab.ini
|
- name: Add 'computed_network' variable values to {{ iiab_ini_file }}
|
||||||
ini_file:
|
ini_file:
|
||||||
dest: "{{ iiab_config_file }}"
|
dest: "{{ iiab_ini_file }}"
|
||||||
section: computed_network
|
section: computed_network
|
||||||
option: "{{ item.option }}"
|
option: "{{ item.option }}"
|
||||||
value: "{{ item.value }}"
|
value: "{{ item.value }}"
|
||||||
|
|
|
@ -49,9 +49,9 @@
|
||||||
dhcp_service2: "dnsmasq disabled"
|
dhcp_service2: "dnsmasq disabled"
|
||||||
when: dnsmasq_install and iiab_network_mode == "Appliance"
|
when: dnsmasq_install and iiab_network_mode == "Appliance"
|
||||||
|
|
||||||
- name: Add 'network' variable values (from computed_services.yml) to /etc/iiab/iiab.ini
|
- name: Add 'network' variable values (from computed_services.yml) to {{ iiab_ini_file }}
|
||||||
ini_file:
|
ini_file:
|
||||||
dest: "{{ iiab_config_file }}"
|
dest: "{{ iiab_ini_file }}"
|
||||||
section: network
|
section: network
|
||||||
option: "{{ item.option }}"
|
option: "{{ item.option }}"
|
||||||
value: "{{ item.value }}"
|
value: "{{ item.value }}"
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
- name: iiab_wan_device
|
- name: iiab_wan_device
|
||||||
shell: grep IIAB_WAN_DEVICE /etc/iiab/iiab.env | awk -F "=" '{print $2}'
|
shell: grep IIAB_WAN_DEVICE {{ iiab_env_file }} | awk -F "=" '{print $2}'
|
||||||
when: iiab_stage|int > 4
|
when: iiab_stage|int > 4
|
||||||
register: prior_gw
|
register: prior_gw
|
||||||
|
|
||||||
|
@ -188,9 +188,9 @@
|
||||||
gui_wan_iface: "{{ device_gw }}"
|
gui_wan_iface: "{{ device_gw }}"
|
||||||
when: user_wan_iface == "auto" and device_gw != "none" and discovered_wan_iface == "none"
|
when: user_wan_iface == "auto" and device_gw != "none" and discovered_wan_iface == "none"
|
||||||
|
|
||||||
- name: Add 'detected_network' variable values to /etc/iiab/iiab.ini
|
- name: Add 'detected_network' variable values to {{ iiab_ini_file }}
|
||||||
ini_file:
|
ini_file:
|
||||||
dest: "{{ iiab_config_file }}"
|
dest: "{{ iiab_ini_file }}"
|
||||||
section: detected_network
|
section: detected_network
|
||||||
option: "{{ item.option }}"
|
option: "{{ item.option }}"
|
||||||
value: "{{ item.value }}"
|
value: "{{ item.value }}"
|
||||||
|
|
|
@ -79,7 +79,7 @@
|
||||||
|
|
||||||
- name: Create xs_httpcache flag
|
- name: Create xs_httpcache flag
|
||||||
lineinfile:
|
lineinfile:
|
||||||
dest: /etc/iiab/iiab.env
|
dest: "{{ iiab_env_file }}"
|
||||||
regexp: '^HTTPCACHE_ON=*'
|
regexp: '^HTTPCACHE_ON=*'
|
||||||
line: 'HTTPCACHE_ON=True'
|
line: 'HTTPCACHE_ON=True'
|
||||||
state: present
|
state: present
|
||||||
|
@ -121,7 +121,7 @@
|
||||||
|
|
||||||
- name: Remove xs_httpcache flag
|
- name: Remove xs_httpcache flag
|
||||||
lineinfile:
|
lineinfile:
|
||||||
dest: /etc/iiab/iiab.env
|
dest: "{{ iiab_env_file }}"
|
||||||
regexp: '^HTTPCACHE_ON=*'
|
regexp: '^HTTPCACHE_ON=*'
|
||||||
line: 'HTTPCACHE_ON=False'
|
line: 'HTTPCACHE_ON=False'
|
||||||
state: present
|
state: present
|
||||||
|
@ -150,9 +150,9 @@
|
||||||
with_items:
|
with_items:
|
||||||
- { 0: 'gateway/iiab-gen-iptables', 1: '/usr/bin/iiab-gen-iptables' }
|
- { 0: 'gateway/iiab-gen-iptables', 1: '/usr/bin/iiab-gen-iptables' }
|
||||||
|
|
||||||
- name: Add 'squid' to list of services at /etc/iiab/iiab.ini
|
- name: Add 'squid' to list of services at {{ iiab_ini_file }}
|
||||||
ini_file:
|
ini_file:
|
||||||
dest: "{{ service_filelist }}"
|
dest: "{{ iiab_ini_file }}"
|
||||||
section: squid
|
section: squid
|
||||||
option: "{{ item.option }}"
|
option: "{{ item.option }}"
|
||||||
value: "{{ item.value }}"
|
value: "{{ item.value }}"
|
||||||
|
@ -160,9 +160,9 @@
|
||||||
- option: enabled
|
- option: enabled
|
||||||
value: "{{ squid_enabled }}"
|
value: "{{ squid_enabled }}"
|
||||||
|
|
||||||
- name: Add 'dansguardian' to list of services at /etc/iiab/iiab.ini
|
- name: Add 'dansguardian' to list of services at {{ iiab_ini_file }}
|
||||||
ini_file:
|
ini_file:
|
||||||
dest: "{{ service_filelist }}"
|
dest: "{{ iiab_ini_file }}"
|
||||||
section: dansguardian
|
section: dansguardian
|
||||||
option: "{{ item.option }}"
|
option: "{{ item.option }}"
|
||||||
value: "{{ item.value }}"
|
value: "{{ item.value }}"
|
||||||
|
@ -170,9 +170,9 @@
|
||||||
- option: enabled
|
- option: enabled
|
||||||
value: "{{ dansguardian_enabled }}"
|
value: "{{ dansguardian_enabled }}"
|
||||||
|
|
||||||
- name: Add 'wondershaper' to list of services at /etc/iiab/iiab.ini
|
- name: Add 'wondershaper' to list of services at {{ iiab_ini_file }}
|
||||||
ini_file:
|
ini_file:
|
||||||
dest: "{{ service_filelist }}"
|
dest: "{{ iiab_ini_file }}"
|
||||||
section: wondershaper
|
section: wondershaper
|
||||||
option: "{{ item.option }}"
|
option: "{{ item.option }}"
|
||||||
value: "{{ item.value }}"
|
value: "{{ item.value }}"
|
||||||
|
|
|
@ -55,9 +55,9 @@
|
||||||
enabled: yes
|
enabled: yes
|
||||||
when: hostapd_enabled and iiab_wireless_lan_iface is defined and iiab_network_mode != "Appliance"
|
when: hostapd_enabled and iiab_wireless_lan_iface is defined and iiab_network_mode != "Appliance"
|
||||||
|
|
||||||
- name: Record HOSTAPD_ENABLED to /etc/iiab/iiab.env
|
- name: Record HOSTAPD_ENABLED to {{ iiab_env_file }}
|
||||||
lineinfile:
|
lineinfile:
|
||||||
dest: /etc/iiab/iiab.env
|
dest: "{{ iiab_env_file }}"
|
||||||
regexp: '^HOSTAPD_ENABLED=*'
|
regexp: '^HOSTAPD_ENABLED=*'
|
||||||
line: 'HOSTAPD_ENABLED={{ hostapd_enabled }}'
|
line: 'HOSTAPD_ENABLED={{ hostapd_enabled }}'
|
||||||
state: present
|
state: present
|
||||||
|
|
|
@ -11,7 +11,7 @@
|
||||||
no_net_restart: True # used below in (1) sysd-netd-debian.yml,
|
no_net_restart: True # used below in (1) sysd-netd-debian.yml,
|
||||||
# (2) debian.yml, (3) rpi_debian.yml
|
# (2) debian.yml, (3) rpi_debian.yml
|
||||||
when: discovered_wireless_iface == iiab_wan_iface and not reboot_to_AP
|
when: discovered_wireless_iface == iiab_wan_iface and not reboot_to_AP
|
||||||
# EITHER WAY: hostapd_enabled's state is RECORDED into /etc/iiab/iiab.env
|
# EITHER WAY: hostapd_enabled's state is RECORDED into {{ iiab_env_file }}
|
||||||
# in hostapd.yml for later use by...
|
# in hostapd.yml for later use by...
|
||||||
# /usr/libexec/iiab-startup.sh, iiab-hotspot-off & iiab-hotspot-on
|
# /usr/libexec/iiab-startup.sh, iiab-hotspot-off & iiab-hotspot-on
|
||||||
#
|
#
|
||||||
|
|
|
@ -83,9 +83,9 @@
|
||||||
when: dansguardian_install
|
when: dansguardian_install
|
||||||
|
|
||||||
# {{ proxy }} is normally "squid", but is "squid3" on raspbian-8 & debian-8
|
# {{ proxy }} is normally "squid", but is "squid3" on raspbian-8 & debian-8
|
||||||
- name: Add '{{ proxy }}' to list of services at /etc/iiab/iiab.ini
|
- name: Add '{{ proxy }}' to list of services at {{ iiab_ini_file }}
|
||||||
ini_file:
|
ini_file:
|
||||||
dest: "{{ service_filelist }}"
|
dest: "{{ iiab_ini_file }}"
|
||||||
section: "{{ proxy }}"
|
section: "{{ proxy }}"
|
||||||
option: "{{ item.option }}"
|
option: "{{ item.option }}"
|
||||||
value: "{{ item.value }}"
|
value: "{{ item.value }}"
|
||||||
|
@ -97,9 +97,9 @@
|
||||||
- option: enabled
|
- option: enabled
|
||||||
value: "{{ squid_enabled }}"
|
value: "{{ squid_enabled }}"
|
||||||
|
|
||||||
- name: Add 'dansguardian' variable values to /etc/iiab/iiab.ini
|
- name: Add 'dansguardian' variable values to {{ iiab_ini_file }}
|
||||||
ini_file:
|
ini_file:
|
||||||
dest: "{{ service_filelist }}"
|
dest: "{{ iiab_ini_file }}"
|
||||||
section: dansguardian
|
section: dansguardian
|
||||||
option: "{{ item.option }}"
|
option: "{{ item.option }}"
|
||||||
value: "{{ item.value }}"
|
value: "{{ item.value }}"
|
||||||
|
|
|
@ -38,9 +38,9 @@
|
||||||
group: root
|
group: root
|
||||||
state: link
|
state: link
|
||||||
|
|
||||||
- name: Add 'wondershaper' variable values to /etc/iiab/iiab.ini
|
- name: Add 'wondershaper' variable values to {{ iiab_ini_file }}
|
||||||
ini_file:
|
ini_file:
|
||||||
dest: "{{ service_filelist }}"
|
dest: "{{ iiab_ini_file }}"
|
||||||
section: wondershaper
|
section: wondershaper
|
||||||
option: "{{ item.option }}"
|
option: "{{ item.option }}"
|
||||||
value: "{{ item.value }}"
|
value: "{{ item.value }}"
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
#!/bin/bash -x
|
#!/bin/bash -x
|
||||||
source /etc/iiab/iiab.env
|
source {{ iiab_env_file }}
|
||||||
{% if is_debuntu %}
|
{% if is_debuntu %}
|
||||||
IPTABLES=/sbin/iptables
|
IPTABLES=/sbin/iptables
|
||||||
IPTABLES_DATA=/etc/iptables.up.rules
|
IPTABLES_DATA=/etc/iptables.up.rules
|
||||||
|
@ -9,7 +9,7 @@ IPTABLES_DATA=/etc/sysconfig/iptables
|
||||||
{% endif %}
|
{% endif %}
|
||||||
LANIF=$IIAB_LAN_DEVICE
|
LANIF=$IIAB_LAN_DEVICE
|
||||||
WANIF=$IIAB_WAN_DEVICE
|
WANIF=$IIAB_WAN_DEVICE
|
||||||
MODE=`grep iiab_network_mode_applied /etc/iiab/iiab.ini | gawk '{print $3}'`
|
MODE=`grep iiab_network_mode_applied {{ iiab_ini_file }} | gawk '{print $3}'`
|
||||||
|
|
||||||
clear_fw() {
|
clear_fw() {
|
||||||
$IPTABLES -F
|
$IPTABLES -F
|
||||||
|
|
|
@ -16,4 +16,4 @@ if grep -qi raspbian /etc/*release; then
|
||||||
ip link set dev wlan0 promisc on
|
ip link set dev wlan0 promisc on
|
||||||
fi
|
fi
|
||||||
|
|
||||||
sed -i -e "s/^HOSTAPD_ENABLED.*/HOSTAPD_ENABLED=False/" /etc/iiab/iiab.env
|
sed -i -e "s/^HOSTAPD_ENABLED.*/HOSTAPD_ENABLED=False/" {{ iiab_env_file }}
|
||||||
|
|
|
@ -17,6 +17,6 @@ if grep -qi raspbian /etc/*release; then
|
||||||
ip link set dev wlan0 promisc off
|
ip link set dev wlan0 promisc off
|
||||||
fi
|
fi
|
||||||
|
|
||||||
sed -i -e "s/^HOSTAPD_ENABLED.*/HOSTAPD_ENABLED=True/" /etc/iiab/iiab.env
|
sed -i -e "s/^HOSTAPD_ENABLED.*/HOSTAPD_ENABLED=True/" {{ iiab_env_file }}
|
||||||
|
|
||||||
echo -e "\nPlease consider rebooting now.\n"
|
echo -e "\nPlease consider rebooting now.\n"
|
||||||
|
|
|
@ -162,9 +162,9 @@
|
||||||
# following enables and disables
|
# following enables and disables
|
||||||
- include_tasks: nextcloud_enabled.yml
|
- include_tasks: nextcloud_enabled.yml
|
||||||
|
|
||||||
- name: Add 'nextcloud' to list of services at /etc/iiab/iiab.ini
|
- name: Add 'nextcloud' to list of services at {{ iiab_ini_file }}
|
||||||
ini_file:
|
ini_file:
|
||||||
dest: "{{ service_filelist }}"
|
dest: "{{ iiab_ini_file }}"
|
||||||
section: Nextcloud
|
section: Nextcloud
|
||||||
option: "{{ item.option }}"
|
option: "{{ item.option }}"
|
||||||
value: "{{ item.value }}"
|
value: "{{ item.value }}"
|
||||||
|
|
|
@ -52,9 +52,9 @@
|
||||||
state: stopped
|
state: stopped
|
||||||
when: not nodogsplash_enabled
|
when: not nodogsplash_enabled
|
||||||
|
|
||||||
- name: Add 'nodogsplash' to list of services at /etc/iiab/iiab.ini
|
- name: Add 'nodogsplash' to list of services at {{ iiab_ini_file }}
|
||||||
ini_file:
|
ini_file:
|
||||||
dest: "{{ service_filelist }}"
|
dest: "{{ iiab_ini_file }}"
|
||||||
section: nodogsplash
|
section: nodogsplash
|
||||||
option: "{{ item.option }}"
|
option: "{{ item.option }}"
|
||||||
value: "{{ item.value }}"
|
value: "{{ item.value }}"
|
||||||
|
|
|
@ -206,9 +206,9 @@
|
||||||
# when: not openvpn_enabled and not installing
|
# when: not openvpn_enabled and not installing
|
||||||
|
|
||||||
|
|
||||||
- name: Add 'openvpn' to list of services at /etc/iiab/iiab.ini
|
- name: Add 'openvpn' to list of services at {{ iiab_ini_file }}
|
||||||
ini_file:
|
ini_file:
|
||||||
dest: "{{ service_filelist }}"
|
dest: "{{ iiab_ini_file }}"
|
||||||
section: openvpn
|
section: openvpn
|
||||||
option: "{{ item.option }}"
|
option: "{{ item.option }}"
|
||||||
value: "{{ item.value }}"
|
value: "{{ item.value }}"
|
||||||
|
|
|
@ -19,10 +19,10 @@ if [ -f /etc/iiab/openvpn_handle ]; then
|
||||||
|
|
||||||
#else
|
#else
|
||||||
# # Option #3: Dangerous to invoke hypothetical variables :(
|
# # Option #3: Dangerous to invoke hypothetical variables :(
|
||||||
# source /etc/iiab/iiab.env
|
# source {{ iiab_env_file }}
|
||||||
# # Option #4: CAUSED FAILURES IN AUGUST 2018, invoking stale variable from /etc/iiab/iiab.ini, but safer now that relegated to #4 ?
|
# # Option #4: CAUSED FAILURES IN AUGUST 2018, invoking stale variable from {{ iiab_ini_file }}, but safer now that relegated to #4 ?
|
||||||
# if [ -z "$HANDLE" ]; then
|
# if [ -z "$HANDLE" ]; then
|
||||||
# HANDLE=`cat /etc/iiab/iiab.ini | gawk \
|
# HANDLE=`cat {{ iiab_ini_file }} | gawk \
|
||||||
# '{ if((toupper($1) == "HANDLE") && ($2 == "=")) { print $3;}}'`
|
# '{ if((toupper($1) == "HANDLE") && ($2 == "=")) { print $3;}}'`
|
||||||
# fi
|
# fi
|
||||||
fi
|
fi
|
||||||
|
|
|
@ -174,9 +174,9 @@
|
||||||
name: "{{ apache_service }}"
|
name: "{{ apache_service }}"
|
||||||
state: restarted
|
state: restarted
|
||||||
|
|
||||||
- name: Add 'osm' to list of services at /etc/iiab/iiab.ini
|
- name: Add 'osm' to list of services at {{ iiab_ini_file }}
|
||||||
ini_file:
|
ini_file:
|
||||||
dest: "{{ service_filelist }}"
|
dest: "{{ iiab_ini_file }}"
|
||||||
section: osm
|
section: osm
|
||||||
option: "{{ item.option }}"
|
option: "{{ item.option }}"
|
||||||
value: "{{ item.value }}"
|
value: "{{ item.value }}"
|
||||||
|
|
|
@ -106,7 +106,7 @@
|
||||||
when: owncloud_enabled
|
when: owncloud_enabled
|
||||||
|
|
||||||
- name: Add owncloud to service list
|
- name: Add owncloud to service list
|
||||||
ini_file: dest='{{ service_filelist }}'
|
ini_file: dest='{{ iiab_ini_file }}'
|
||||||
section=owncloud
|
section=owncloud
|
||||||
option='{{ item.option }}'
|
option='{{ item.option }}'
|
||||||
value='{{ item.value }}'
|
value='{{ item.value }}'
|
||||||
|
|
|
@ -193,9 +193,9 @@
|
||||||
name: "{{ apache_service }}"
|
name: "{{ apache_service }}"
|
||||||
state: reloaded
|
state: reloaded
|
||||||
|
|
||||||
- name: Add 'pathagar' to list of services at /etc/iiab/iiab.ini
|
- name: Add 'pathagar' to list of services at {{ iiab_ini_file }}
|
||||||
ini_file:
|
ini_file:
|
||||||
dest: "{{ service_filelist }}"
|
dest: "{{ iiab_ini_file }}"
|
||||||
section: pathagar
|
section: pathagar
|
||||||
option: "{{ item.option }}"
|
option: "{{ item.option }}"
|
||||||
value: "{{ item.value }}"
|
value: "{{ item.value }}"
|
||||||
|
|
|
@ -65,9 +65,9 @@
|
||||||
state: absent
|
state: absent
|
||||||
when: not phpmyadmin_enabled and is_debuntu
|
when: not phpmyadmin_enabled and is_debuntu
|
||||||
|
|
||||||
- name: Add 'phpmyadmin' to list of services at /etc/iiab/iiab.ini
|
- name: Add 'phpmyadmin' to list of services at {{ iiab_ini_file }}
|
||||||
ini_file:
|
ini_file:
|
||||||
dest: "{{ service_filelist }}"
|
dest: "{{ iiab_ini_file }}"
|
||||||
section: phpmyadmin
|
section: phpmyadmin
|
||||||
option: "{{ item.option }}"
|
option: "{{ item.option }}"
|
||||||
value: "{{ item.value }}"
|
value: "{{ item.value }}"
|
||||||
|
|
|
@ -93,9 +93,9 @@
|
||||||
enabled: no
|
enabled: no
|
||||||
when: not postgresql_enabled
|
when: not postgresql_enabled
|
||||||
|
|
||||||
- name: Add 'postgresql' to list of services at /etc/iiab/iiab.ini
|
- name: Add 'postgresql' to list of services at {{ iiab_ini_file }}
|
||||||
ini_file:
|
ini_file:
|
||||||
dest: "{{ service_filelist }}"
|
dest: "{{ iiab_ini_file }}"
|
||||||
section: postgresql
|
section: postgresql
|
||||||
option: "{{ item.option }}"
|
option: "{{ item.option }}"
|
||||||
value: "{{ item.value }}"
|
value: "{{ item.value }}"
|
||||||
|
|
|
@ -24,7 +24,7 @@
|
||||||
when: rachel_enabled and rachel_content_found
|
when: rachel_enabled and rachel_content_found
|
||||||
|
|
||||||
- name: Add rachel to service list
|
- name: Add rachel to service list
|
||||||
ini_file: dest='{{ service_filelist }}'
|
ini_file: dest='{{ iiab_ini_file }}'
|
||||||
section=rachel
|
section=rachel
|
||||||
option='{{ item.option }}'
|
option='{{ item.option }}'
|
||||||
value='{{ item.value }}'
|
value='{{ item.value }}'
|
||||||
|
|
|
@ -71,9 +71,9 @@
|
||||||
- samba
|
- samba
|
||||||
when : not samba_enabled
|
when : not samba_enabled
|
||||||
|
|
||||||
- name: Add 'samba' to list of services at /etc/iiab/iiab.ini
|
- name: Add 'samba' to list of services at {{ iiab_ini_file }}
|
||||||
ini_file:
|
ini_file:
|
||||||
dest: "{{ service_filelist }}"
|
dest: "{{ iiab_ini_file }}"
|
||||||
section: samba
|
section: samba
|
||||||
option: "{{ item.option }}"
|
option: "{{ item.option }}"
|
||||||
value: "{{ item.value }}"
|
value: "{{ item.value }}"
|
||||||
|
|
|
@ -56,7 +56,7 @@
|
||||||
when: not schooltool_enabled
|
when: not schooltool_enabled
|
||||||
|
|
||||||
- name: add schooltool to service list
|
- name: add schooltool to service list
|
||||||
ini_file: dest='{{ service_filelist }}'
|
ini_file: dest='{{ iiab_ini_file }}'
|
||||||
section=schooltool
|
section=schooltool
|
||||||
option='{{ item.option }}'
|
option='{{ item.option }}'
|
||||||
value='{{ item.value }}'
|
value='{{ item.value }}'
|
||||||
|
|
|
@ -41,7 +41,7 @@
|
||||||
- include_tasks: statistics-consolidation.yml
|
- include_tasks: statistics-consolidation.yml
|
||||||
|
|
||||||
- name: Add sugar-stats to service list
|
- name: Add sugar-stats to service list
|
||||||
ini_file: dest='{{ service_filelist }}'
|
ini_file: dest='{{ iiab_ini_file }}'
|
||||||
section=sugar_stats
|
section=sugar_stats
|
||||||
option='{{ item.option }}'
|
option='{{ item.option }}'
|
||||||
value='{{ item.value }}'
|
value='{{ item.value }}'
|
||||||
|
|
|
@ -228,9 +228,9 @@
|
||||||
# state: stopped
|
# state: stopped
|
||||||
# when: not sugarizer_enabled
|
# when: not sugarizer_enabled
|
||||||
|
|
||||||
- name: Add 'sugarizer' to list of services at /etc/iiab/iiab.ini
|
- name: Add 'sugarizer' to list of services at {{ iiab_ini_file }}
|
||||||
ini_file:
|
ini_file:
|
||||||
dest: "{{ service_filelist }}"
|
dest: "{{ iiab_ini_file }}"
|
||||||
section: sugarizer
|
section: sugarizer
|
||||||
option: "{{ item.option }}"
|
option: "{{ item.option }}"
|
||||||
value: "{{ item.value }}"
|
value: "{{ item.value }}"
|
||||||
|
|
|
@ -9,7 +9,7 @@
|
||||||
when: teamviewer_install
|
when: teamviewer_install
|
||||||
|
|
||||||
- name: Add teamviewer to service list
|
- name: Add teamviewer to service list
|
||||||
ini_file: dest='{{ service_filelist }}'
|
ini_file: dest='{{ iiab_ini_file }}'
|
||||||
section=teamviewer
|
section=teamviewer
|
||||||
option='{{ item.option }}'
|
option='{{ item.option }}'
|
||||||
value='{{ item.value }}'
|
value='{{ item.value }}'
|
||||||
|
|
|
@ -54,9 +54,9 @@
|
||||||
state: stopped
|
state: stopped
|
||||||
when: not transmission_enabled
|
when: not transmission_enabled
|
||||||
|
|
||||||
- name: Add transmission to list of services at /etc/iiab/iiab.ini
|
- name: Add transmission to list of services at {{ iiab_ini_file }}
|
||||||
ini_file:
|
ini_file:
|
||||||
dest: "{{ service_filelist }}"
|
dest: "{{ iiab_ini_file }}"
|
||||||
section: transmission
|
section: transmission
|
||||||
option: "{{ item.option }}"
|
option: "{{ item.option }}"
|
||||||
value: "{{ item.value }}"
|
value: "{{ item.value }}"
|
||||||
|
|
|
@ -3,7 +3,7 @@
|
||||||
dest: "{{ doc_root }}/local_content"
|
dest: "{{ doc_root }}/local_content"
|
||||||
state: directory
|
state: directory
|
||||||
owner: "{{ apache_user }}"
|
owner: "{{ apache_user }}"
|
||||||
group: "{{ iiab_admin_user }}"
|
group: "{{ iiab_admin_user }}" # ISN'T "{{ apache_user }}" MORE APPROPRIATE?
|
||||||
mode: 0775
|
mode: 0775
|
||||||
|
|
||||||
- name: Copy mount file to usbmount when enabled
|
- name: Copy mount file to usbmount when enabled
|
||||||
|
@ -55,7 +55,7 @@
|
||||||
|
|
||||||
- name: Put variable in iiab.env that enables display of content at root of USB
|
- name: Put variable in iiab.env that enables display of content at root of USB
|
||||||
lineinfile:
|
lineinfile:
|
||||||
dest: /etc/iiab/iiab.env
|
dest: "{{ iiab_env_file }}"
|
||||||
regexp: "^IIAB_USB_LIB_SHOW_ALL.*"
|
regexp: "^IIAB_USB_LIB_SHOW_ALL.*"
|
||||||
line: "IIAB_USB_LIB_SHOW_ALL={{ iiab_usb_lib_show_all }}"
|
line: "IIAB_USB_LIB_SHOW_ALL={{ iiab_usb_lib_show_all }}"
|
||||||
|
|
||||||
|
@ -87,7 +87,7 @@
|
||||||
|
|
||||||
- name: Add usb-lib to service list
|
- name: Add usb-lib to service list
|
||||||
ini_file:
|
ini_file:
|
||||||
dest: "{{ service_filelist }}"
|
dest: "{{ iiab_ini_file }}"
|
||||||
section: usb-lib
|
section: usb-lib
|
||||||
option: "{{ item.option }}"
|
option: "{{ item.option }}"
|
||||||
value: "{{ item.value }}"
|
value: "{{ item.value }}"
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
#!/bin/bash
|
#!/bin/bash
|
||||||
# turn on the flag which registers new USB sticks at root directory
|
# turn on the flag which registers new USB sticks at root directory
|
||||||
|
|
||||||
sed -i -e's/^IIAB_USB_LIB_SHOW_ALL.*/IIAB_USB_LIB_SHOW_ALL=False/' /etc/iiab/iiab.env
|
sed -i -e's/^IIAB_USB_LIB_SHOW_ALL.*/IIAB_USB_LIB_SHOW_ALL=False/' {{ iiab_env_file }}
|
||||||
|
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
#!/bin/bash
|
#!/bin/bash
|
||||||
# turn on the flag which registers new USB sticks at root directory
|
# turn on the flag which registers new USB sticks at root directory
|
||||||
|
|
||||||
sed -i -e's/^IIAB_USB_LIB_SHOW_ALL.*/IIAB_USB_LIB_SHOW_ALL=True/' /etc/iiab/iiab.env
|
sed -i -e's/^IIAB_USB_LIB_SHOW_ALL.*/IIAB_USB_LIB_SHOW_ALL=True/' {{ iiab_env_file }}
|
||||||
|
|
||||||
|
|
|
@ -9,7 +9,7 @@
|
||||||
#
|
#
|
||||||
# by Tim Moody tim@timmoody.com
|
# by Tim Moody tim@timmoody.com
|
||||||
|
|
||||||
source /etc/iiab/iiab.env
|
source {{ iiab_env_file }}
|
||||||
case $IIAB_USB_LIB_SHOW_ALL in
|
case $IIAB_USB_LIB_SHOW_ALL in
|
||||||
'True'|'true'|'TRUE')
|
'True'|'true'|'TRUE')
|
||||||
logger -p user.notice -t "70-usb-library" -- "Displaying root directory on $UM_MOUNTPOINT."
|
logger -p user.notice -t "70-usb-library" -- "Displaying root directory on $UM_MOUNTPOINT."
|
||||||
|
|
|
@ -29,9 +29,9 @@
|
||||||
enabled: yes
|
enabled: yes
|
||||||
state: started
|
state: started
|
||||||
|
|
||||||
- name: Add 'vnstat' to list of services at /etc/iiab/iiab.ini
|
- name: Add 'vnstat' to list of services at {{ iiab_ini_file }}
|
||||||
ini_file:
|
ini_file:
|
||||||
dest: "{{ service_filelist }}"
|
dest: "{{ iiab_ini_file }}"
|
||||||
section: vnstat
|
section: vnstat
|
||||||
option: "{{ item.option }}"
|
option: "{{ item.option }}"
|
||||||
value: "{{ item.value }}"
|
value: "{{ item.value }}"
|
||||||
|
|
|
@ -135,9 +135,9 @@
|
||||||
name: "{{ apache_service }}"
|
name: "{{ apache_service }}"
|
||||||
state: restarted
|
state: restarted
|
||||||
|
|
||||||
- name: Add 'wordpress' to list of services at /etc/iiab/iiab.ini
|
- name: Add 'wordpress' to list of services at {{ iiab_ini_file }}
|
||||||
ini_file:
|
ini_file:
|
||||||
dest: "{{ service_filelist }}"
|
dest: "{{ iiab_ini_file }}"
|
||||||
section: wordpress
|
section: wordpress
|
||||||
option: "{{ item.option }}"
|
option: "{{ item.option }}"
|
||||||
value: "{{ item.value }}"
|
value: "{{ item.value }}"
|
||||||
|
|
|
@ -82,7 +82,7 @@
|
||||||
when: xovis_enabled
|
when: xovis_enabled
|
||||||
|
|
||||||
- name: Add xovis to service list
|
- name: Add xovis to service list
|
||||||
ini_file: dest='{{ service_filelist }}'
|
ini_file: dest='{{ iiab_ini_file }}'
|
||||||
section=xovis
|
section=xovis
|
||||||
option='{{ item.option }}'
|
option='{{ item.option }}'
|
||||||
value='{{ item.value }}'
|
value='{{ item.value }}'
|
||||||
|
|
|
@ -5,11 +5,12 @@
|
||||||
|
|
||||||
# By convention we use True/False to indicate boolean constants.
|
# By convention we use True/False to indicate boolean constants.
|
||||||
|
|
||||||
# Installation Constants
|
# Configuration Files
|
||||||
content_base: "/library"
|
iiab_local_vars_file: /etc/iiab/local_vars.yml
|
||||||
#doc_base: "/var"
|
iiab_env_file: /etc/iiab/iiab.env
|
||||||
doc_base: "{{ content_base }}/www"
|
iiab_ini_file: /etc/iiab/iiab.ini
|
||||||
doc_root: "{{ doc_base }}/html"
|
#iiab_config_file: "{{ iiab_ini_file }}" # Legacy support / let's phase this out eventually
|
||||||
|
#service_filelist: "{{ iiab_ini_file }}" # Legacy support / let's phase this out eventually
|
||||||
|
|
||||||
iiab_base: /opt/iiab
|
iiab_base: /opt/iiab
|
||||||
iiab_dir: "{{ iiab_base }}/iiab"
|
iiab_dir: "{{ iiab_base }}/iiab"
|
||||||
|
@ -17,35 +18,32 @@ pip_packages_dir: "{{ iiab_base }}/pip-packages"
|
||||||
yum_packages_dir: "{{ iiab_base }}/yum-packages"
|
yum_packages_dir: "{{ iiab_base }}/yum-packages"
|
||||||
downloads_dir: "{{ iiab_base }}/downloads"
|
downloads_dir: "{{ iiab_base }}/downloads"
|
||||||
iiab_download_url: http://download.iiab.io/packages
|
iiab_download_url: http://download.iiab.io/packages
|
||||||
|
|
||||||
|
content_base: "/library"
|
||||||
|
doc_base: "{{ content_base }}/www"
|
||||||
|
doc_root: "{{ doc_base }}/html"
|
||||||
|
|
||||||
# Ansible's default timeout for "get_url:" downloads (10 seconds) often fails
|
# Ansible's default timeout for "get_url:" downloads (10 seconds) often fails
|
||||||
download_timeout: 200
|
download_timeout: 200
|
||||||
|
|
||||||
# Configuration File(s)
|
# Languages (for Apache)
|
||||||
iiab_config_file: /etc/iiab/iiab.ini
|
|
||||||
iiab_local_vars_file: /etc/iiab/local_vars.yml
|
|
||||||
service_filelist: "{{ iiab_config_file }}"
|
|
||||||
|
|
||||||
# The following variable may be useful in debugging
|
|
||||||
disregard_network: False # use cache or error out if cache does not exist
|
|
||||||
|
|
||||||
# Users and Passwords
|
|
||||||
|
|
||||||
iiab_admin_user: iiab-admin
|
|
||||||
# Obtain a password hash with:
|
|
||||||
# python -c 'import crypt; print crypt.crypt("<plaintext>", "$6$<salt>")'
|
|
||||||
iiab_admin_passw_hash: $6$xsce51$D.IrrEeLBYIuJkGDmi27pZUGOwPFp98qpl3hxMwWV4hXigFGmdSvy3s/j7tn6OnyTTLmlV7SsN0lCUAFzxSop.
|
|
||||||
admin_install: True
|
|
||||||
|
|
||||||
# Set admin_install: False if you don't want iiab_admin_user & wheel group
|
|
||||||
# auto-created in roles/iiab-admin/tasks/main.yml, thereby disabling sudo-based
|
|
||||||
# warnings on use of published passwords like pi/raspberry & iiab-admin/g0adm1n
|
|
||||||
|
|
||||||
# If admin_install: False, set iiab_admin_user (above) to an existing Linux
|
|
||||||
# user that has sudo access, so you can login to Admin Console http://box/admin
|
|
||||||
|
|
||||||
# Languages
|
|
||||||
default_language: en
|
default_language: en
|
||||||
language_priority: en es
|
language_priority: en es fr
|
||||||
|
|
||||||
|
# Set iiab_admin_user_install: False if you don't want iiab_admin_user & wheel
|
||||||
|
# group auto-created in roles/iiab-admin/tasks/main.yml (hence disabling sudo-
|
||||||
|
# checks/warnings of published passwds like pi/raspberry & iiab-admin/g0adm1n).
|
||||||
|
iiab_admin_user_install: True
|
||||||
|
# If iiab_admin_user_install: False, set iiab_admin_user (below) to an existing
|
||||||
|
# Linux user that has sudo access, for login to Admin Console http://box/admin
|
||||||
|
iiab_admin_user: iiab-admin
|
||||||
|
iiab_admin_published_pwd: g0adm1n # For live checks/alerts of published pwds
|
||||||
|
# Password hash to override above, if Ansible creates above user:
|
||||||
|
iiab_admin_pwd_hash: $6$xsce51$D.IrrEeLBYIuJkGDmi27pZUGOwPFp98qpl3hxMwWV4hXigFGmdSvy3s/j7tn6OnyTTLmlV7SsN0lCUAFzxSop.
|
||||||
|
# Obtain a password hash - NEW MORE SECURE WAY:
|
||||||
|
# python3 -c 'import crypt; print(crypt.crypt("<plaintext>", crypt.mksalt(crypt.METHOD_SHA512)))'
|
||||||
|
# Obtain a password hash - OLD WAY:
|
||||||
|
# python -c 'import crypt; print crypt.crypt("<plaintext>", "$6$<salt>")'
|
||||||
|
|
||||||
# Time Zone (php needs timezone to be set)
|
# Time Zone (php needs timezone to be set)
|
||||||
local_tz: "{{ ansible_date_time.tz }}"
|
local_tz: "{{ ansible_date_time.tz }}"
|
||||||
|
@ -53,10 +51,13 @@ local_tz: "{{ ansible_date_time.tz }}"
|
||||||
# Read https://github.com/iiab/iiab/wiki/IIAB-Networking
|
# Read https://github.com/iiab/iiab/wiki/IIAB-Networking
|
||||||
# Also readable offline @ http://box/info/IIAB-Networking.html
|
# Also readable offline @ http://box/info/IIAB-Networking.html
|
||||||
|
|
||||||
# NETWORK PARAMETERS FOLLOW ACROSS THE NEXT 65 LINES, as enabled by Ansible's
|
# NETWORK PARAMETERS FOLLOW ACROSS THE NEXT 100 LINES, as enabled by Ansible's
|
||||||
# NETWORK role (/opt/iiab/iiab/roles/network/*) in 4-SERVER-OPTIONS below.
|
# NETWORK role (/opt/iiab/iiab/roles/network/*) in 4-SERVER-OPTIONS below.
|
||||||
# SEE ALSO: /opt/iiab/iiab/roles/network/defaults/main.yml
|
# SEE ALSO: /opt/iiab/iiab/roles/network/defaults/main.yml
|
||||||
|
|
||||||
|
# The following variable may be useful in debugging
|
||||||
|
disregard_network: False # use cache or error out if cache does not exist
|
||||||
|
|
||||||
iiab_hostname: box
|
iiab_hostname: box
|
||||||
iiab_domain: lan
|
iiab_domain: lan
|
||||||
lan_ip: 172.18.96.1
|
lan_ip: 172.18.96.1
|
||||||
|
@ -149,17 +150,36 @@ wan_nameserver:
|
||||||
# exFAT is auto-enabled for all "debuntu" OS's as of Nov 2017, in roles/2-common/tasks/packages.yml#L35-L36
|
# exFAT is auto-enabled for all "debuntu" OS's as of Nov 2017, in roles/2-common/tasks/packages.yml#L35-L36
|
||||||
# exFAT_enabled: True
|
# exFAT_enabled: True
|
||||||
|
|
||||||
# Parameters by Aggregate Roles
|
# Parameters for Aggregate Roles
|
||||||
# Each Role must have the following variables which are either True or False:
|
# Each Role should have the following variables which are either True or False:
|
||||||
# <role-name>_install
|
# <role-name>_install
|
||||||
# <role-name>_enabled
|
# <role-name>_enabled
|
||||||
|
|
||||||
# Our past convention was to install everything in all aggregates
|
# Past convention had been to install everything in all aggregate roles (stages)
|
||||||
# And to enable everything in 1-PREP, 2-COMMON, and 3-BASE-SERVER
|
# And to enable everything in 1-PREP, 2-COMMON, and 3-BASE-SERVER
|
||||||
|
|
||||||
|
|
||||||
# 1-PREP
|
# 1-PREP
|
||||||
|
|
||||||
|
# sshd
|
||||||
|
sshd_enabled: True
|
||||||
|
|
||||||
|
# roles/iiab-admin runs here
|
||||||
|
# SEE IIAB-ADMIN VARIABLES NEAR TOP OF THIS FILE: e.g. iiab_admin_user_install,
|
||||||
|
# iiab_admin_user, iiab_admin_published_pwd, iiab_admin_pwd_hash
|
||||||
|
|
||||||
|
# OpenVPN
|
||||||
|
openvpn_install: True
|
||||||
|
openvpn_enabled: False
|
||||||
|
# For /etc/iiab/openvpn_handle
|
||||||
|
openvpn_handle: ""
|
||||||
|
# cron seems necessary on CentOS:
|
||||||
|
openvpn_cron_enabled: False
|
||||||
|
# General OpenVPN settings
|
||||||
|
openvpn_server: xscenet.net
|
||||||
|
openvpn_server_virtual_ip: 10.8.0.1
|
||||||
|
openvpn_server_port: 1194
|
||||||
|
|
||||||
# 2-COMMON
|
# 2-COMMON
|
||||||
|
|
||||||
# 3-BASE-SERVER
|
# 3-BASE-SERVER
|
||||||
|
@ -168,12 +188,10 @@ wan_nameserver:
|
||||||
|
|
||||||
# Make this False to disable http://box/common/services/power_off.php button:
|
# Make this False to disable http://box/common/services/power_off.php button:
|
||||||
apache_allow_sudo: True
|
apache_allow_sudo: True
|
||||||
|
# For schools that use WordPress and/or Moodle intensively, see iiab/iiab #1147
|
||||||
# For schools that use WordPress and/or Moodle intensively. See iiab/iiab #1147
|
|
||||||
# WARNING: Enabling this (might) cause excess use of RAM or other resources?
|
# WARNING: Enabling this (might) cause excess use of RAM or other resources?
|
||||||
apache_high_php_limits: False
|
apache_high_php_limits: False
|
||||||
|
# SEE ALSO VARIABLES NEAR TOP OF THIS FILE: default_language, language_priority
|
||||||
# roles/iiab-admin runs here
|
|
||||||
|
|
||||||
# MySQL MANDATORY - THESE SETTINGS HAVE NO EFFECT - SEE roles/1-prep/tasks/computed_vars.yml, roles/mysql/tasks/main.yml
|
# MySQL MANDATORY - THESE SETTINGS HAVE NO EFFECT - SEE roles/1-prep/tasks/computed_vars.yml, roles/mysql/tasks/main.yml
|
||||||
mysql_install: True
|
mysql_install: True
|
||||||
|
@ -184,23 +202,6 @@ mysql_root_password: fixmysql
|
||||||
|
|
||||||
# 4-SERVER-OPTIONS
|
# 4-SERVER-OPTIONS
|
||||||
|
|
||||||
# sshd
|
|
||||||
sshd_enabled: True
|
|
||||||
|
|
||||||
# OpenVPN
|
|
||||||
openvpn_install: True
|
|
||||||
openvpn_enabled: False
|
|
||||||
|
|
||||||
# For /etc/iiab/openvpn_handle
|
|
||||||
openvpn_handle: ""
|
|
||||||
|
|
||||||
# cron seems necessary on CentOS:
|
|
||||||
openvpn_cron_enabled: False
|
|
||||||
|
|
||||||
openvpn_server: xscenet.net
|
|
||||||
openvpn_server_virtual_ip: 10.8.0.1
|
|
||||||
openvpn_server_port: 1194
|
|
||||||
|
|
||||||
# roles/network runs here (MANY SETTINGS ABOVE)
|
# roles/network runs here (MANY SETTINGS ABOVE)
|
||||||
|
|
||||||
# Homepage
|
# Homepage
|
||||||
|
|
|
@ -8,20 +8,23 @@
|
||||||
# Ansible's default timeout for "get_url:" downloads (10 seconds) often fails
|
# Ansible's default timeout for "get_url:" downloads (10 seconds) often fails
|
||||||
download_timeout: 200
|
download_timeout: 200
|
||||||
|
|
||||||
# Users and Passwords
|
# Languages (for Apache)
|
||||||
|
default_language: en
|
||||||
|
language_priority: en es fr
|
||||||
|
|
||||||
|
# Set iiab_admin_user_install: False if you don't want iiab_admin_user & wheel
|
||||||
|
# group auto-created in roles/iiab-admin/tasks/main.yml (hence disabling sudo-
|
||||||
|
# checks/warnings of published passwds like pi/raspberry & iiab-admin/g0adm1n).
|
||||||
|
iiab_admin_user_install: True
|
||||||
|
# If iiab_admin_user_install: False, set iiab_admin_user (below) to an existing
|
||||||
|
# Linux user that has sudo access, for login to Admin Console http://box/admin
|
||||||
iiab_admin_user: iiab-admin
|
iiab_admin_user: iiab-admin
|
||||||
# Obtain a password hash with:
|
# Password hash to be used if Ansible creates the above user:
|
||||||
|
iiab_admin_pwd_hash: $6$xsce51$D.IrrEeLBYIuJkGDmi27pZUGOwPFp98qpl3hxMwWV4hXigFGmdSvy3s/j7tn6OnyTTLmlV7SsN0lCUAFzxSop.
|
||||||
|
# Obtain a password hash - NEW MORE SECURE WAY:
|
||||||
|
# python3 -c 'import crypt; print(crypt.crypt("<plaintext>", crypt.mksalt(crypt.METHOD_SHA512)))'
|
||||||
|
# Obtain a password hash - OLD WAY:
|
||||||
# python -c 'import crypt; print crypt.crypt("<plaintext>", "$6$<salt>")'
|
# python -c 'import crypt; print crypt.crypt("<plaintext>", "$6$<salt>")'
|
||||||
# iiab_admin_passw_hash:
|
|
||||||
admin_install: True
|
|
||||||
|
|
||||||
# Set admin_install: False if you don't want iiab_admin_user & wheel group
|
|
||||||
# auto-created in roles/iiab-admin/tasks/main.yml, thereby disabling sudo-based
|
|
||||||
# warnings on use of published passwords like pi/raspberry & iiab-admin/g0adm1n
|
|
||||||
|
|
||||||
# If admin_install: False, set iiab_admin_user (above) to an existing Linux
|
|
||||||
# user that has sudo access, so you can login to Admin Console http://box/admin
|
|
||||||
|
|
||||||
iiab_hostname: box
|
iiab_hostname: box
|
||||||
iiab_domain: lan
|
iiab_domain: lan
|
||||||
|
@ -73,32 +76,34 @@ dansguardian_enabled: True
|
||||||
|
|
||||||
# 1-PREP
|
# 1-PREP
|
||||||
|
|
||||||
|
# roles/sshd & roles/iiab-admin run here
|
||||||
|
# SEE IIAB-ADMIN VARIABLES NEAR TOP OF THIS FILE:
|
||||||
|
# e.g. iiab_admin_user_install, iiab_admin_user, iiab_admin_pwd_hash
|
||||||
|
|
||||||
|
# SECURITY WARNING: See http://wiki.laptop.org/go/IIAB/Security
|
||||||
|
openvpn_install: True
|
||||||
|
openvpn_enabled: False
|
||||||
|
# Set /etc/iiab/openvpn_handle in advance here:
|
||||||
|
openvpn_handle: ""
|
||||||
|
# The following seems necessary on CentOS:
|
||||||
|
# openvpn_cron_enabled: True
|
||||||
|
|
||||||
# 2-COMMON
|
# 2-COMMON
|
||||||
|
|
||||||
# 3-BASE-SERVER
|
# 3-BASE-SERVER
|
||||||
|
|
||||||
# Make this False to disable http://box/common/services/power_off.php button:
|
# Make this False to disable http://box/common/services/power_off.php button:
|
||||||
apache_allow_sudo: True
|
apache_allow_sudo: True
|
||||||
|
# For schools that use WordPress and/or Moodle intensively, see iiab/iiab #1147
|
||||||
# For schools that use WordPress and/or Moodle intensively. See iiab/iiab #1147
|
|
||||||
# WARNING: Enabling this (might) cause excess use of RAM or other resources?
|
# WARNING: Enabling this (might) cause excess use of RAM or other resources?
|
||||||
apache_high_php_limits: False
|
apache_high_php_limits: False
|
||||||
|
# SEE ALSO VARIABLES NEAR TOP OF THIS FILE: default_language, language_priority
|
||||||
|
|
||||||
# roles/mysql runs here (mandatory)
|
# roles/mysql runs here (mandatory)
|
||||||
|
|
||||||
|
|
||||||
# 4-SERVER-OPTIONS
|
# 4-SERVER-OPTIONS
|
||||||
|
|
||||||
# SECURITY WARNING: See http://wiki.laptop.org/go/IIAB/Security
|
|
||||||
openvpn_install: True
|
|
||||||
openvpn_enabled: False
|
|
||||||
|
|
||||||
# Set /etc/iiab/openvpn_handle in advance here:
|
|
||||||
openvpn_handle: ""
|
|
||||||
|
|
||||||
# The following seems necessary on CentOS:
|
|
||||||
# openvpn_cron_enabled: True
|
|
||||||
|
|
||||||
# roles/network runs here (MANY SETTINGS ABOVE)
|
# roles/network runs here (MANY SETTINGS ABOVE)
|
||||||
|
|
||||||
# PostgreSQL - auto-installed by Moodle and/or Pathagar - no need to touch!
|
# PostgreSQL - auto-installed by Moodle and/or Pathagar - no need to touch!
|
||||||
|
|
|
@ -8,20 +8,23 @@
|
||||||
# Ansible's default timeout for "get_url:" downloads (10 seconds) often fails
|
# Ansible's default timeout for "get_url:" downloads (10 seconds) often fails
|
||||||
download_timeout: 200
|
download_timeout: 200
|
||||||
|
|
||||||
# Users and Passwords
|
# Languages (for Apache)
|
||||||
|
default_language: en
|
||||||
|
language_priority: en es fr
|
||||||
|
|
||||||
|
# Set iiab_admin_user_install: False if you don't want iiab_admin_user & wheel
|
||||||
|
# group auto-created in roles/iiab-admin/tasks/main.yml (hence disabling sudo-
|
||||||
|
# checks/warnings of published passwds like pi/raspberry & iiab-admin/g0adm1n).
|
||||||
|
iiab_admin_user_install: True
|
||||||
|
# If iiab_admin_user_install: False, set iiab_admin_user (below) to an existing
|
||||||
|
# Linux user that has sudo access, for login to Admin Console http://box/admin
|
||||||
iiab_admin_user: iiab-admin
|
iiab_admin_user: iiab-admin
|
||||||
# Obtain a password hash with:
|
# Password hash to be used if Ansible creates the above user:
|
||||||
|
iiab_admin_pwd_hash: $6$xsce51$D.IrrEeLBYIuJkGDmi27pZUGOwPFp98qpl3hxMwWV4hXigFGmdSvy3s/j7tn6OnyTTLmlV7SsN0lCUAFzxSop.
|
||||||
|
# Obtain a password hash - NEW MORE SECURE WAY:
|
||||||
|
# python3 -c 'import crypt; print(crypt.crypt("<plaintext>", crypt.mksalt(crypt.METHOD_SHA512)))'
|
||||||
|
# Obtain a password hash - OLD WAY:
|
||||||
# python -c 'import crypt; print crypt.crypt("<plaintext>", "$6$<salt>")'
|
# python -c 'import crypt; print crypt.crypt("<plaintext>", "$6$<salt>")'
|
||||||
# iiab_admin_passw_hash:
|
|
||||||
admin_install: True
|
|
||||||
|
|
||||||
# Set admin_install: False if you don't want iiab_admin_user & wheel group
|
|
||||||
# auto-created in roles/iiab-admin/tasks/main.yml, thereby disabling sudo-based
|
|
||||||
# warnings on use of published passwords like pi/raspberry & iiab-admin/g0adm1n
|
|
||||||
|
|
||||||
# If admin_install: False, set iiab_admin_user (above) to an existing Linux
|
|
||||||
# user that has sudo access, so you can login to Admin Console http://box/admin
|
|
||||||
|
|
||||||
iiab_hostname: box
|
iiab_hostname: box
|
||||||
iiab_domain: lan
|
iiab_domain: lan
|
||||||
|
@ -73,32 +76,34 @@ dansguardian_enabled: False
|
||||||
|
|
||||||
# 1-PREP
|
# 1-PREP
|
||||||
|
|
||||||
|
# roles/sshd & roles/iiab-admin run here
|
||||||
|
# SEE IIAB-ADMIN VARIABLES NEAR TOP OF THIS FILE:
|
||||||
|
# e.g. iiab_admin_user_install, iiab_admin_user, iiab_admin_pwd_hash
|
||||||
|
|
||||||
|
# SECURITY WARNING: See http://wiki.laptop.org/go/IIAB/Security
|
||||||
|
openvpn_install: True
|
||||||
|
openvpn_enabled: False
|
||||||
|
# Set /etc/iiab/openvpn_handle in advance here:
|
||||||
|
openvpn_handle: ""
|
||||||
|
# The following seems necessary on CentOS:
|
||||||
|
# openvpn_cron_enabled: True
|
||||||
|
|
||||||
# 2-COMMON
|
# 2-COMMON
|
||||||
|
|
||||||
# 3-BASE-SERVER
|
# 3-BASE-SERVER
|
||||||
|
|
||||||
# Make this False to disable http://box/common/services/power_off.php button:
|
# Make this False to disable http://box/common/services/power_off.php button:
|
||||||
apache_allow_sudo: True
|
apache_allow_sudo: True
|
||||||
|
# For schools that use WordPress and/or Moodle intensively, see iiab/iiab #1147
|
||||||
# For schools that use WordPress and/or Moodle intensively. See iiab/iiab #1147
|
|
||||||
# WARNING: Enabling this (might) cause excess use of RAM or other resources?
|
# WARNING: Enabling this (might) cause excess use of RAM or other resources?
|
||||||
apache_high_php_limits: False
|
apache_high_php_limits: False
|
||||||
|
# SEE ALSO VARIABLES NEAR TOP OF THIS FILE: default_language, language_priority
|
||||||
|
|
||||||
# roles/mysql runs here (mandatory)
|
# roles/mysql runs here (mandatory)
|
||||||
|
|
||||||
|
|
||||||
# 4-SERVER-OPTIONS
|
# 4-SERVER-OPTIONS
|
||||||
|
|
||||||
# SECURITY WARNING: See http://wiki.laptop.org/go/IIAB/Security
|
|
||||||
openvpn_install: True
|
|
||||||
openvpn_enabled: False
|
|
||||||
|
|
||||||
# Set /etc/iiab/openvpn_handle in advance here:
|
|
||||||
openvpn_handle: ""
|
|
||||||
|
|
||||||
# The following seems necessary on CentOS:
|
|
||||||
# openvpn_cron_enabled: True
|
|
||||||
|
|
||||||
# roles/network runs here (MANY SETTINGS ABOVE)
|
# roles/network runs here (MANY SETTINGS ABOVE)
|
||||||
|
|
||||||
# PostgreSQL - auto-installed by Moodle and/or Pathagar - no need to touch!
|
# PostgreSQL - auto-installed by Moodle and/or Pathagar - no need to touch!
|
||||||
|
|
|
@ -8,20 +8,23 @@
|
||||||
# Ansible's default timeout for "get_url:" downloads (10 seconds) often fails
|
# Ansible's default timeout for "get_url:" downloads (10 seconds) often fails
|
||||||
download_timeout: 200
|
download_timeout: 200
|
||||||
|
|
||||||
# Users and Passwords
|
# Languages (for Apache)
|
||||||
|
default_language: en
|
||||||
|
language_priority: en es fr
|
||||||
|
|
||||||
|
# Set iiab_admin_user_install: False if you don't want iiab_admin_user & wheel
|
||||||
|
# group auto-created in roles/iiab-admin/tasks/main.yml (hence disabling sudo-
|
||||||
|
# checks/warnings of published passwds like pi/raspberry & iiab-admin/g0adm1n).
|
||||||
|
iiab_admin_user_install: True
|
||||||
|
# If iiab_admin_user_install: False, set iiab_admin_user (below) to an existing
|
||||||
|
# Linux user that has sudo access, for login to Admin Console http://box/admin
|
||||||
iiab_admin_user: iiab-admin
|
iiab_admin_user: iiab-admin
|
||||||
# Obtain a password hash with:
|
# Password hash to be used if Ansible creates the above user:
|
||||||
|
iiab_admin_pwd_hash: $6$xsce51$D.IrrEeLBYIuJkGDmi27pZUGOwPFp98qpl3hxMwWV4hXigFGmdSvy3s/j7tn6OnyTTLmlV7SsN0lCUAFzxSop.
|
||||||
|
# Obtain a password hash - NEW MORE SECURE WAY:
|
||||||
|
# python3 -c 'import crypt; print(crypt.crypt("<plaintext>", crypt.mksalt(crypt.METHOD_SHA512)))'
|
||||||
|
# Obtain a password hash - OLD WAY:
|
||||||
# python -c 'import crypt; print crypt.crypt("<plaintext>", "$6$<salt>")'
|
# python -c 'import crypt; print crypt.crypt("<plaintext>", "$6$<salt>")'
|
||||||
# iiab_admin_passw_hash:
|
|
||||||
admin_install: True
|
|
||||||
|
|
||||||
# Set admin_install: False if you don't want iiab_admin_user & wheel group
|
|
||||||
# auto-created in roles/iiab-admin/tasks/main.yml, thereby disabling sudo-based
|
|
||||||
# warnings on use of published passwords like pi/raspberry & iiab-admin/g0adm1n
|
|
||||||
|
|
||||||
# If admin_install: False, set iiab_admin_user (above) to an existing Linux
|
|
||||||
# user that has sudo access, so you can login to Admin Console http://box/admin
|
|
||||||
|
|
||||||
iiab_hostname: box
|
iiab_hostname: box
|
||||||
iiab_domain: lan
|
iiab_domain: lan
|
||||||
|
@ -73,32 +76,34 @@ dansguardian_enabled: False
|
||||||
|
|
||||||
# 1-PREP
|
# 1-PREP
|
||||||
|
|
||||||
|
# roles/sshd & roles/iiab-admin run here
|
||||||
|
# SEE IIAB-ADMIN VARIABLES NEAR TOP OF THIS FILE:
|
||||||
|
# e.g. iiab_admin_user_install, iiab_admin_user, iiab_admin_pwd_hash
|
||||||
|
|
||||||
|
# SECURITY WARNING: See http://wiki.laptop.org/go/IIAB/Security
|
||||||
|
openvpn_install: True
|
||||||
|
openvpn_enabled: False
|
||||||
|
# Set /etc/iiab/openvpn_handle in advance here:
|
||||||
|
openvpn_handle: ""
|
||||||
|
# The following seems necessary on CentOS:
|
||||||
|
# openvpn_cron_enabled: True
|
||||||
|
|
||||||
# 2-COMMON
|
# 2-COMMON
|
||||||
|
|
||||||
# 3-BASE-SERVER
|
# 3-BASE-SERVER
|
||||||
|
|
||||||
# Make this False to disable http://box/common/services/power_off.php button:
|
# Make this False to disable http://box/common/services/power_off.php button:
|
||||||
apache_allow_sudo: True
|
apache_allow_sudo: True
|
||||||
|
# For schools that use WordPress and/or Moodle intensively, see iiab/iiab #1147
|
||||||
# For schools that use WordPress and/or Moodle intensively. See iiab/iiab #1147
|
|
||||||
# WARNING: Enabling this (might) cause excess use of RAM or other resources?
|
# WARNING: Enabling this (might) cause excess use of RAM or other resources?
|
||||||
apache_high_php_limits: False
|
apache_high_php_limits: False
|
||||||
|
# SEE ALSO VARIABLES NEAR TOP OF THIS FILE: default_language, language_priority
|
||||||
|
|
||||||
# roles/mysql runs here (mandatory)
|
# roles/mysql runs here (mandatory)
|
||||||
|
|
||||||
|
|
||||||
# 4-SERVER-OPTIONS
|
# 4-SERVER-OPTIONS
|
||||||
|
|
||||||
# SECURITY WARNING: See http://wiki.laptop.org/go/IIAB/Security
|
|
||||||
openvpn_install: True
|
|
||||||
openvpn_enabled: False
|
|
||||||
|
|
||||||
# Set /etc/iiab/openvpn_handle in advance here:
|
|
||||||
openvpn_handle: ""
|
|
||||||
|
|
||||||
# The following seems necessary on CentOS:
|
|
||||||
# openvpn_cron_enabled: True
|
|
||||||
|
|
||||||
# roles/network runs here (MANY SETTINGS ABOVE)
|
# roles/network runs here (MANY SETTINGS ABOVE)
|
||||||
|
|
||||||
# PostgreSQL - auto-installed by Moodle and/or Pathagar - no need to touch!
|
# PostgreSQL - auto-installed by Moodle and/or Pathagar - no need to touch!
|
||||||
|
|
Loading…
Reference in a new issue