From be8701c13800eb84fc4afb118c16738abee55850 Mon Sep 17 00:00:00 2001 From: bnewbold Date: Fri, 25 Mar 2016 11:49:45 -0700 Subject: import basics from NSA's commission repo --- roles/common/README | 4 + roles/common/defaults/main.yml | 36 ++++++++ roles/common/handlers/main.yml | 11 +++ roles/common/tasks/extras.yml | 12 +++ roles/common/tasks/main.yml | 90 ++++++++++++++++++ roles/common/tasks/ntp.yml | 16 ++++ roles/common/tasks/security.yml | 26 ++++++ roles/common/tasks/users.yml | 6 ++ roles/common/templates/apticron.conf.j2 | 101 +++++++++++++++++++++ roles/common/templates/etc_fail2ban_jail.local.j2 | 25 +++++ roles/common/templates/etc_ssh_ssh_config.j2 | 61 +++++++++++++ roles/common/templates/etc_ssh_sshd_config.j2 | 95 +++++++++++++++++++ roles/common/templates/ntp.conf.j2 | 63 +++++++++++++ roles/common/templates/sudoers.j2 | 1 + roles/debian_jessie/defaults/main.yml | 2 + roles/debian_jessie/tasks/main.yml | 10 ++ .../templates/etc_apt_apt_confd_20auto_upgrades.j2 | 4 + .../etc_apt_apt_confd_50unattended_upgrades.j2 | 94 +++++++++++++++++++ .../templates/etc_apt_sources_list.j2 | 15 +++ roles/nginx/files/nginx_default_404.html | 4 + roles/nginx/files/nginx_default_50x.html | 4 + roles/nginx/files/nginx_default_favicon.png | 0 roles/nginx/files/nginx_default_index.html | 4 + roles/nginx/files/nginx_default_robots.txt | 3 + roles/nginx/handlers/main.yml | 7 ++ roles/nginx/tasks/main.yml | 24 +++++ roles/nullmailer/defaults/main.yml | 5 + roles/nullmailer/handlers/main.yml | 5 + roles/nullmailer/tasks/main.yml | 33 +++++++ .../templates/etc_nullmailer_adminaddr.j2 | 1 + .../templates/etc_nullmailer_defaultdomain.j2 | 1 + .../nullmailer/templates/etc_nullmailer_remotes.j2 | 2 + roles/nullmailer/templates/mailname.j2 | 1 + 33 files changed, 766 insertions(+) create mode 100644 roles/common/README create mode 100644 roles/common/defaults/main.yml create mode 100644 roles/common/handlers/main.yml create mode 100644 roles/common/tasks/extras.yml create mode 100644 roles/common/tasks/main.yml create mode 100644 roles/common/tasks/ntp.yml create mode 100644 roles/common/tasks/security.yml create mode 100644 roles/common/tasks/users.yml create mode 100644 roles/common/templates/apticron.conf.j2 create mode 100644 roles/common/templates/etc_fail2ban_jail.local.j2 create mode 100644 roles/common/templates/etc_ssh_ssh_config.j2 create mode 100644 roles/common/templates/etc_ssh_sshd_config.j2 create mode 100644 roles/common/templates/ntp.conf.j2 create mode 100644 roles/common/templates/sudoers.j2 create mode 100644 roles/debian_jessie/defaults/main.yml create mode 100644 roles/debian_jessie/tasks/main.yml create mode 100644 roles/debian_jessie/templates/etc_apt_apt_confd_20auto_upgrades.j2 create mode 100644 roles/debian_jessie/templates/etc_apt_apt_confd_50unattended_upgrades.j2 create mode 100644 roles/debian_jessie/templates/etc_apt_sources_list.j2 create mode 100644 roles/nginx/files/nginx_default_404.html create mode 100644 roles/nginx/files/nginx_default_50x.html create mode 100644 roles/nginx/files/nginx_default_favicon.png create mode 100644 roles/nginx/files/nginx_default_index.html create mode 100644 roles/nginx/files/nginx_default_robots.txt create mode 100644 roles/nginx/handlers/main.yml create mode 100644 roles/nginx/tasks/main.yml create mode 100644 roles/nullmailer/defaults/main.yml create mode 100644 roles/nullmailer/handlers/main.yml create mode 100644 roles/nullmailer/tasks/main.yml create mode 100644 roles/nullmailer/templates/etc_nullmailer_adminaddr.j2 create mode 100644 roles/nullmailer/templates/etc_nullmailer_defaultdomain.j2 create mode 100644 roles/nullmailer/templates/etc_nullmailer_remotes.j2 create mode 100644 roles/nullmailer/templates/mailname.j2 (limited to 'roles') diff --git a/roles/common/README b/roles/common/README new file mode 100644 index 0000000..b43cb11 --- /dev/null +++ b/roles/common/README @@ -0,0 +1,4 @@ +Many of the files in here originally came from the 'jessie' branch of +sovereign: + + https://github.com/sovereign/sovereign diff --git a/roles/common/defaults/main.yml b/roles/common/defaults/main.yml new file mode 100644 index 0000000..22287b0 --- /dev/null +++ b/roles/common/defaults/main.yml @@ -0,0 +1,36 @@ +--- +############################################################################### +# DO NOT EDIT. Set your variables in `vars/*.yml` instead. +# This is a reference of all the variables. +############################################################################### + +common_timezone: 'Etc/UTC' +# domain: (required) +# main_user_name: (required) +# admin_email: (required) +main_user_shell: "/bin/bash" +friendly_networks: + - "" + +# ssh +ssh_kex_algorithms: "diffie-hellman-group-exchange-sha256" +ssh_ciphers: "aes256-ctr,aes192-ctr,aes128-ctr" +ssh_macs: "hmac-sha2-512,hmac-sha2-256,hmac-ripemd160" +sshd_allow_passwd: "no" +sshd_print_motd: "yes" +sshd_allow_root: "without-password" +sshd_forward_x11: "yes" + +# ntp +ntp_servers: + # use nearby ntp servers by default + - 0.pool.ntp.org + - 1.pool.ntp.org + - 2.pool.ntp.org + - 3.pool.ntp.org + # use servers tailored to the server location + # See http://www.pool.ntp.org/en/use.html + # - 0.north-america.pool.ntp.org + # - 1.north-america.pool.ntp.org + # - 2.north-america.pool.ntp.org + # - 3.north-america.pool.ntp.org diff --git a/roles/common/handlers/main.yml b/roles/common/handlers/main.yml new file mode 100644 index 0000000..3ca3bcf --- /dev/null +++ b/roles/common/handlers/main.yml @@ -0,0 +1,11 @@ +--- +# Defines handlers applicable across all machines in the infrastructure. + +- name: restart ntp + service: name=ntp state=restarted + +- name: restart fail2ban + service: name=fail2ban state=restarted + +- name: restart ssh + service: name=ssh state=restarted diff --git a/roles/common/tasks/extras.yml b/roles/common/tasks/extras.yml new file mode 100644 index 0000000..9a4bd2f --- /dev/null +++ b/roles/common/tasks/extras.yml @@ -0,0 +1,12 @@ +--- +- name: Install extras that Everybody wants + apt: pkg={{ item }} state=installed + with_items: + - build-essential + - cowsay + - figlet + - ipython + - ipython3 + tags: + - dependencies + diff --git a/roles/common/tasks/main.yml b/roles/common/tasks/main.yml new file mode 100644 index 0000000..d4c2347 --- /dev/null +++ b/roles/common/tasks/main.yml @@ -0,0 +1,90 @@ +--- + +- name: Update apt cache + apt: update_cache=yes cache_valid_time=3600 + tags: + - dependencies + +- name: Upgrade all safe packages + apt: upgrade=safe + tags: + - dependencies + +- name: Install necessities and nice-to-haves + apt: pkg={{ item }} state=installed + with_items: + - apt-transport-https + - apticron + - aptitude + - bzip2 + - ca-certificates + - curl + - debian-goodies + - dialog + - dnsutils + - etckeeper + # fail2ban in security + - file + - git + - htop + - iftop + - ifupdown + - iotop + - iproute + - iputils-ping + - isc-dhcp-client + - less + - libui-dialog-perl + - locales + - locales-all + - lsof + - lvm2 + - man-db + - manpages-dev + - molly-guard + - mosh + - mtr-tiny + - netbase + - netcat + - net-tools + - ngrep + - openssh-server + - openssl + - pv + - python + - python-software-properties + # rkhunter in security + - screen + - sudo + - tcpdump + - unzip + - unattended-upgrades + - vim-nox + - wget + tags: + - dependencies + +- name: timezone - configure /etc/timezone + copy: + content: "{{ common_timezone | regex_replace('$', '\n') }}" + dest: /etc/timezone + owner: root + group: root + mode: 0644 + register: common_timezone_config + +- name: timezone - Set localtime to UTC + file: src=/usr/share/zoneinfo/Etc/UTC dest=/etc/localtime + when: common_timezone_config.changed + +- name: timezone - reconfigure tzdata + command: dpkg-reconfigure --frontend noninteractive tzdata + when: common_timezone_config.changed + +- name: Apticron email configuration + template: src=apticron.conf.j2 dest=/etc/apticron/apticron.conf + +#- include: users.yml tags=users +- include: security.yml tags=security +- include: ntp.yml tags=ntp +- include: extras.yml tags=extras diff --git a/roles/common/tasks/ntp.yml b/roles/common/tasks/ntp.yml new file mode 100644 index 0000000..c1489fd --- /dev/null +++ b/roles/common/tasks/ntp.yml @@ -0,0 +1,16 @@ +--- +# Defines tasks applicable for NTP (Network Time Protocol) + +- name: Install ntp + apt: pkg=ntp state=installed + tags: + - dependencies + +- name: Configure ntp + template: src=ntp.conf.j2 dest=/etc/ntp.conf + notify: + - restart ntp + +- name: Ensure ntpd is running and enabled + service: name=ntp state=started enabled=yes + diff --git a/roles/common/tasks/security.yml b/roles/common/tasks/security.yml new file mode 100644 index 0000000..c00b941 --- /dev/null +++ b/roles/common/tasks/security.yml @@ -0,0 +1,26 @@ +--- +- name: Install security-related packages + apt: pkg={{ item }} state=installed + with_items: + - fail2ban + - whois + - lynis + - rkhunter + - debsums + tags: + - dependencies + +- name: Copy fail2ban configuration into place + template: src=etc_fail2ban_jail.local.j2 dest=/etc/fail2ban/jail.local + notify: restart fail2ban + +- name: Ensure fail2ban is started + service: name=fail2ban state=started enabled=yes + +- name: Update sshd (server) config for PFS and more secure defaults + template: src=etc_ssh_sshd_config.j2 dest=/etc/ssh/sshd_config + notify: restart ssh + +- name: Update ssh (client) config for more secure defaults + template: src=etc_ssh_ssh_config.j2 dest=/etc/ssh/ssh_config + diff --git a/roles/common/tasks/users.yml b/roles/common/tasks/users.yml new file mode 100644 index 0000000..8171bd6 --- /dev/null +++ b/roles/common/tasks/users.yml @@ -0,0 +1,6 @@ +--- +- name: Create main user account + user: name={{ main_user_name }} state=present shell={{ main_user_shell }} groups=sudo + +- name: Give main user account sudo power + template: src=roles/common/templates/sudoers.j2 dest=/etc/sudoers.d/sudoers owner=root group=root mode=0440 validate='visudo -cf %s' diff --git a/roles/common/templates/apticron.conf.j2 b/roles/common/templates/apticron.conf.j2 new file mode 100644 index 0000000..512a682 --- /dev/null +++ b/roles/common/templates/apticron.conf.j2 @@ -0,0 +1,101 @@ +# apticron.conf +# {{ ansible_managed }} +# +# set EMAIL to a space separated list of addresses which will be notified of +# impending updates +# +EMAIL="{{ admin_email }}" + +# +# Set DIFF_ONLY to "1" to only output the difference of the current run +# compared to the last run (ie. only new upgrades since the last run). If there +# are no differences, no output/email will be generated. By default, apticron +# will output everything that needs to be upgraded. +# +# DIFF_ONLY="1" + +# +# Set LISTCHANGES_PROFILE if you would like apticron to invoke apt-listchanges +# with the --profile option. You should add a corresponding profile to +# /etc/apt/listchanges.conf +# +# LISTCHANGES_PROFILE="apticron" + +# +# From hostname manpage: "Displays all FQDNs of the machine. This option +# enumerates all configured network addresses on all configured network inter‐ +# faces, and translates them to DNS domain names. Addresses that cannot be +# translated (i.e. because they do not have an appro‐ priate reverse DNS +# entry) are skipped. Note that different addresses may resolve to the same +# name, therefore the output may contain duplicate entries. Do not make any +# assumptions about the order of the output." +# +# ALL_FQDNS="1" + +# +# Set SYSTEM if you would like apticron to use something other than the output +# of "hostname -f" for the system name in the mails it generates. This option +# overrides the ALL_FQDNS above. +# +# SYSTEM="foobar.example.com" + +# +# Set IPADDRESSNUM if you would like to configure the maximal number of IP +# addresses apticron displays. The default is to display 1 address of each +# family type (inet, inet6), if available. +# +# IPADDRESSNUM="1" + +# +# Set IPADDRESSES to a whitespace separated list of reachable addresses for +# this system. By default, apticron will try to work these out using the +# "ip" command +# +# IPADDRESSES="192.0.2.1 2001:db8:1:2:3::1" + +# +# Set NOTIFY_HOLDS="0" if you don't want to be notified about new versions of +# packages on hold in your system. The default behavior is downloading and +# listing them as any other package. +# +# NOTIFY_HOLDS="0" + +# +# Set NOTIFY_NEW="0" if you don't want to be notified about packages which +# are not installed in your system. Yes, it's possible! There are some issues +# related to systems which have mixed stable/unstable sources. In these cases +# apt-get will consider for example that packages with "Priority: +# required"/"Essential: yes" in unstable but not in stable should be installed, +# so they will be listed in dist-upgrade output. Please take a look at +# http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=531002#44 +# +NOTIFY_NEW="0" + +# +# Set NOTIFY_NO_UPDATES="0" if you don't want to be notified when there is no +# new versions. Set to 1 could assure you that apticron works well. +# +NOTIFY_NO_UPDATE="0" + +# +# Set CUSTOM_SUBJECT if you want to replace the default subject used in +# the notification e-mails. This may help filtering/sorting client-side e-mail. +# If you want to use internal vars please use single quotes here. Ex: +# $CUSTOM_SUBJECT='[apticron] $SYSTEM: $NUM_PACKAGES package update(s)' +# +# CUSTOM_SUBJECT="" + +# Set CUSTOM_NO_UPDATES_SUBJECT if you want to replace the default subject used +# in the no update notification e-mails. This may help filtering/sorting +# client-side e-mail. +# If you want to use internal vars please use single quotes here. Ex: +# $CUSTOM_NO_UPDATES_SUBJECT='[apticron] $SYSTEM: no updates' +# +# CUSTOM_NO_UPDATES_SUBJECT="" + +# +# Set CUSTOM_FROM if you want to replace the default sender by changing the +# 'From:' field used in the notification e-mails. Your default sender will +# be something like root@eschaton. +# +# CUSTOM_FROM="" diff --git a/roles/common/templates/etc_fail2ban_jail.local.j2 b/roles/common/templates/etc_fail2ban_jail.local.j2 new file mode 100644 index 0000000..35c161c --- /dev/null +++ b/roles/common/templates/etc_fail2ban_jail.local.j2 @@ -0,0 +1,25 @@ +# {{ ansible_managed }} + +[DEFAULT] +ignoreip = 127.0.0.1 {{ ansible_default_ipv4.address }} {{ ' '.join(friendly_networks) }} +bantime = 10800 +destemail = {{ admin_email }} +banaction = iptables-multiport +action = %(action_)s + +# JAILS +[ssh] +enabled = true +maxretry = 8 + +[pam-generic] +enabled = true +banaction = iptables-allports + +[ssh-ddos] +enabled = true + +[postfix] +enabled = true +maxretry = 3 + diff --git a/roles/common/templates/etc_ssh_ssh_config.j2 b/roles/common/templates/etc_ssh_ssh_config.j2 new file mode 100644 index 0000000..db15675 --- /dev/null +++ b/roles/common/templates/etc_ssh_ssh_config.j2 @@ -0,0 +1,61 @@ +# {{ ansible_managed }} + +# This is the ssh client system-wide configuration file. See +# ssh_config(5) for more information. This file provides defaults for +# users, and the values can be changed in per-user configuration files +# or on the command line. + +# Configuration data is parsed as follows: +# 1. command line options +# 2. user-specific file +# 3. system-wide file +# Any configuration value is only changed the first time it is set. +# Thus, host-specific definitions should be at the beginning of the +# configuration file, and defaults at the end. + +# Site-wide defaults for some commonly used options. For a comprehensive +# list of available options, their meanings and defaults, please see the +# ssh_config(5) man page. + +Host * +# ForwardAgent no +# ForwardX11 no +# ForwardX11Trusted yes +# RhostsRSAAuthentication no +# RSAAuthentication yes +# PasswordAuthentication yes +# HostbasedAuthentication no +# GSSAPIAuthentication no +# GSSAPIDelegateCredentials no +# GSSAPIKeyExchange no +# GSSAPITrustDNS no +# BatchMode no +# CheckHostIP yes +# AddressFamily any +# ConnectTimeout 0 +# StrictHostKeyChecking ask +# IdentityFile ~/.ssh/identity +# IdentityFile ~/.ssh/id_rsa +# IdentityFile ~/.ssh/id_dsa +# Port 22 +# Protocol 2,1 +# Cipher 3des +# Ciphers aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc +# MACs hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-ripemd160 +# EscapeChar ~ +# Tunnel no +# TunnelDevice any:any +# PermitLocalCommand no +# VisualHostKey no +# ProxyCommand ssh -q -W %h:%p gateway.example.com +# RekeyLimit 1G 1h + SendEnv LANG LC_* + HashKnownHosts yes + GSSAPIAuthentication yes + GSSAPIDelegateCredentials no + + Ciphers {{ ssh_ciphers }} + KexAlgorithms {{ ssh_kex_algorithms }} + MACs {{ ssh_macs }} + #PasswordAuthentication no + UseRoaming no diff --git a/roles/common/templates/etc_ssh_sshd_config.j2 b/roles/common/templates/etc_ssh_sshd_config.j2 new file mode 100644 index 0000000..d9978e0 --- /dev/null +++ b/roles/common/templates/etc_ssh_sshd_config.j2 @@ -0,0 +1,95 @@ +# {{ ansible_managed }} +# See the sshd_config(5) manpage for details + +# What ports, IPs and protocols we listen for +Port 22 +# Use these options to restrict which interfaces/protocols sshd will bind to +#ListenAddress :: +#ListenAddress 0.0.0.0 +Protocol 2 +# HostKeys for protocol version 2 +HostKey /etc/ssh/ssh_host_rsa_key +#HostKey /etc/ssh/ssh_host_dsa_key +#HostKey /etc/ssh/ssh_host_ecdsa_key +HostKey /etc/ssh/ssh_host_ed25519_key +#Privilege Separation is turned on for security +UsePrivilegeSeparation yes + +KexAlgorithms {{ ssh_kex_algorithms }} +Ciphers {{ ssh_ciphers }} +MACs {{ ssh_macs }} + +# Lifetime and size of ephemeral version 1 server key +KeyRegenerationInterval 3600 +#ServerKeyBits 768 +ServerKeyBits 1024 + +# Logging +SyslogFacility AUTH +LogLevel INFO + +# Authentication: +LoginGraceTime 120 +PermitRootLogin {{ sshd_allow_root }} +StrictModes yes + +RSAAuthentication yes +PubkeyAuthentication yes +#AuthorizedKeysFile %h/.ssh/authorized_keys + +# Don't read the user's ~/.rhosts and ~/.shosts files +IgnoreRhosts yes +# For this to work you will also need host keys in /etc/ssh_known_hosts +RhostsRSAAuthentication no +# similar for protocol version 2 +HostbasedAuthentication no +# Uncomment if you don't trust ~/.ssh/known_hosts for RhostsRSAAuthentication +#IgnoreUserKnownHosts yes + +# To enable empty passwords, change to yes (NOT RECOMMENDED) +PermitEmptyPasswords no + +# Change to yes to enable challenge-response passwords (beware issues with +# some PAM modules and threads) +# ChallengeResponseAuthentication no +ChallengeResponseAuthentication yes + +# Change to no to disable tunnelled clear text passwords +PasswordAuthentication {{ sshd_allow_passwd }} + +# Kerberos options +#KerberosAuthentication no +#KerberosGetAFSToken no +#KerberosOrLocalPasswd yes +#KerberosTicketCleanup yes + +# GSSAPI options +#GSSAPIAuthentication no +#GSSAPICleanupCredentials yes + +X11Forwarding {{ sshd_forward_x11 }} +X11DisplayOffset 10 +PrintMotd {{ sshd_print_motd }} +PrintLastLog yes +TCPKeepAlive yes +#UseLogin no + +#MaxStartups 10:30:60 +#Banner /etc/issue.net + +# Allow client to pass locale environment variables +AcceptEnv LANG LC_* + +Subsystem sftp /usr/lib/openssh/sftp-server + +# Set this to 'yes' to enable PAM authentication, account processing, +# and session processing. If this is enabled, PAM authentication will +# be allowed through the ChallengeResponseAuthentication and +# PasswordAuthentication. Depending on your PAM configuration, +# PAM authentication via ChallengeResponseAuthentication may bypass +# the setting of "PermitRootLogin without-password". +# If you just want the PAM account and session checks to run without +# PAM authentication, then enable this but set PasswordAuthentication +# and ChallengeResponseAuthentication to 'no'. +UsePAM yes + diff --git a/roles/common/templates/ntp.conf.j2 b/roles/common/templates/ntp.conf.j2 new file mode 100644 index 0000000..903f08a --- /dev/null +++ b/roles/common/templates/ntp.conf.j2 @@ -0,0 +1,63 @@ +# /etc/ntp.conf, configuration for ntpd; see ntp.conf(5) for help +# {{ ansible_managed }} + +driftfile /var/lib/ntp/ntp.drift + + +# Enable this if you want statistics to be logged. +#statsdir /var/log/ntpstats/ + +statistics loopstats peerstats clockstats +filegen loopstats file loopstats type day enable +filegen peerstats file peerstats type day enable +filegen clockstats file clockstats type day enable + + +# You do need to talk to an NTP server or two (or three). +#server ntp.your-provider.example + +# pool.ntp.org maps to about 1000 low-stratum NTP servers. Your server will +# pick a different set every time it starts up. Please consider joining the +# pool: +#server 0.debian.pool.ntp.org iburst +#server 1.debian.pool.ntp.org iburst +#server 2.debian.pool.ntp.org iburst +#server 3.debian.pool.ntp.org iburst + +# Use servers configured via Ansible +{% for server in ntp_servers %} +server {{ server }} iburst +{% endfor %} + +# fallback +server tick.usno.navy.mil + +# Access control configuration; see /usr/share/doc/ntp-doc/html/accopt.html for +# details. The web page +# might also be helpful. +# +# Note that "restrict" applies to both servers and clients, so a configuration +# that might be intended to block requests from certain clients could also end +# up blocking replies from your own upstream servers. + +# By default, exchange time with everybody, but don't allow configuration. +restrict -4 default kod notrap nomodify nopeer noquery +restrict -6 default kod notrap nomodify nopeer noquery + +# Local users may interrogate the ntp server more closely. +restrict 127.0.0.1 +restrict ::1 + +# Clients from this (example!) subnet have unlimited access, but only if +# cryptographically authenticated. +#restrict 192.168.123.0 mask 255.255.255.0 notrust + + +# If you want to provide time to your local subnet, change the next line. +# (Again, the address is an example only.) +#broadcast 192.168.123.255 + +# If you want to listen to time broadcasts on your local subnet, de-comment the +# next lines. Please do this only if you trust everybody on the network! +#disable auth +#broadcastclient diff --git a/roles/common/templates/sudoers.j2 b/roles/common/templates/sudoers.j2 new file mode 100644 index 0000000..18172d8 --- /dev/null +++ b/roles/common/templates/sudoers.j2 @@ -0,0 +1 @@ +{{ main_user_name }} ALL=(ALL) NOPASSWD: ALL diff --git a/roles/debian_jessie/defaults/main.yml b/roles/debian_jessie/defaults/main.yml new file mode 100644 index 0000000..3703452 --- /dev/null +++ b/roles/debian_jessie/defaults/main.yml @@ -0,0 +1,2 @@ + +admin_email: "root" diff --git a/roles/debian_jessie/tasks/main.yml b/roles/debian_jessie/tasks/main.yml new file mode 100644 index 0000000..145b58d --- /dev/null +++ b/roles/debian_jessie/tasks/main.yml @@ -0,0 +1,10 @@ + +- name: Configure sources.list for jessie + template: src=etc_apt_sources_list.j2 dest=/etc/apt/sources.list + +- name: Enable automatic upgrades + template: src=etc_apt_apt_confd_20auto_upgrades.j2 dest=/etc/apt/apt.conf.d/20auto-upgrades + +- name: Configure unattended upgrades for jessie + template: src=etc_apt_apt_confd_50unattended_upgrades.j2 dest=/etc/apt/apt.conf.d/50unattended-upgrades + diff --git a/roles/debian_jessie/templates/etc_apt_apt_confd_20auto_upgrades.j2 b/roles/debian_jessie/templates/etc_apt_apt_confd_20auto_upgrades.j2 new file mode 100644 index 0000000..c75a5d7 --- /dev/null +++ b/roles/debian_jessie/templates/etc_apt_apt_confd_20auto_upgrades.j2 @@ -0,0 +1,4 @@ +# {{ ansible_managed }} + +APT::Periodic::Update-Package-Lists "1"; +APT::Periodic::Unattended-Upgrade "1"; diff --git a/roles/debian_jessie/templates/etc_apt_apt_confd_50unattended_upgrades.j2 b/roles/debian_jessie/templates/etc_apt_apt_confd_50unattended_upgrades.j2 new file mode 100644 index 0000000..8567429 --- /dev/null +++ b/roles/debian_jessie/templates/etc_apt_apt_confd_50unattended_upgrades.j2 @@ -0,0 +1,94 @@ +// Unattended-Upgrade::Origins-Pattern controls which packages are +// upgraded. +// +// {{ ansible_managed }} +// +// Lines below have the format format is "keyword=value,...". A +// package will be upgraded only if the values in its metadata match +// all the supplied keywords in a line. (In other words, omitted +// keywords are wild cards.) The keywords originate from the Release +// file, but several aliases are accepted. The accepted keywords are: +// a,archive,suite (eg, "stable") +// c,component (eg, "main", "crontrib", "non-free") +// l,label (eg, "Debian", "Debian-Security") +// o,origin (eg, "Debian", "Unofficial Multimedia Packages") +// n,codename (eg, "jessie", "jessie-updates") +// site (eg, "http.debian.net") +// The available values on the system are printed by the command +// "apt-cache policy", and can be debugged by running +// "unattended-upgrades -d" and looking at the log file. +// +// Within lines unattended-upgrades allows 2 macros whose values are +// derived from /etc/debian_version: +// ${distro_id} Installed origin. +// ${distro_codename} Installed codename (eg, "jessie") +Unattended-Upgrade::Origins-Pattern { + // Codename based matching: + // This will follow the migration of a release through different + // archives (e.g. from testing to stable and later oldstable). + "o=Debian,n=jessie"; + "o=Debian,n=jessie-updates"; +// "o=Debian,n=jessie-proposed-updates"; + "o=Debian,n=jessie,l=Debian-Security"; + + // Archive or Suite based matching: + // Note that this will silently match a different release after + // migration to the specified archive (e.g. testing becomes the + // new stable). +// "o=Debian,a=stable"; +// "o=Debian,a=stable-updates"; +// "o=Debian,a=proposed-updates"; + "origin=Debian,codename=${distro_codename},label=Debian-Security"; +}; + +// List of packages to not update (regexp are supported) +Unattended-Upgrade::Package-Blacklist { + "vim"; + "libc6"; + "libc6-dev"; + "libc6-i686"; +}; + +// This option allows you to control if on a unclean dpkg exit +// unattended-upgrades will automatically run +// dpkg --force-confold --configure -a +// The default is true, to ensure updates keep getting installed +//Unattended-Upgrade::AutoFixInterruptedDpkg "false"; + +// Split the upgrade into the smallest possible chunks so that +// they can be interrupted with SIGUSR1. This makes the upgrade +// a bit slower but it has the benefit that shutdown while a upgrade +// is running is possible (with a small delay) +Unattended-Upgrade::MinimalSteps "true"; + +// Install all unattended-upgrades when the machine is shuting down +// instead of doing it in the background while the machine is running +// This will (obviously) make shutdown slower +//Unattended-Upgrade::InstallOnShutdown "true"; + +// Send email to this address for problems or packages upgrades +// If empty or unset then no email is sent, make sure that you +// have a working mail setup on your system. A package that provides +// 'mailx' must be installed. E.g. "user@example.com" +Unattended-Upgrade::Mail "{{ admin_email }}"; + +// Set this value to "true" to get emails only on errors. Default +// is to always send a mail if Unattended-Upgrade::Mail is set +Unattended-Upgrade::MailOnlyOnError "true"; + +// Do automatic removal of new unused dependencies after the upgrade +// (equivalent to apt-get autoremove) +//Unattended-Upgrade::Remove-Unused-Dependencies "false"; + +// Automatically reboot *WITHOUT CONFIRMATION* if +// the file /var/run/reboot-required is found after the upgrade +Unattended-Upgrade::Automatic-Reboot "false"; + +// If automatic reboot is enabled and needed, reboot at the specific +// time instead of immediately +// Default: "now" +//Unattended-Upgrade::Automatic-Reboot-Time "02:00"; + +// Use apt bandwidth limit feature, this example limits the download +// speed to 70kb/sec +//Acquire::http::Dl-Limit "70"; diff --git a/roles/debian_jessie/templates/etc_apt_sources_list.j2 b/roles/debian_jessie/templates/etc_apt_sources_list.j2 new file mode 100644 index 0000000..b45f1b7 --- /dev/null +++ b/roles/debian_jessie/templates/etc_apt_sources_list.j2 @@ -0,0 +1,15 @@ +# {{ ansible_managed }} + +deb http://http.debian.net/debian/ jessie main +deb-src http://http.debian.net/debian/ jessie main + +deb http://security.debian.org/ jessie/updates main +deb-src http://security.debian.org/ jessie/updates main + +# jessie-updates, previously known as 'volatile' +deb http://http.debian.net/debian/ jessie-updates main +deb-src http://http.debian.net/debian/ jessie-updates main + +# jessie-backports, previously on backports.debian.org +deb http://http.debian.net/debian/ jessie-backports main +deb-src http://http.debian.net/debian/ jessie-backports main diff --git a/roles/nginx/files/nginx_default_404.html b/roles/nginx/files/nginx_default_404.html new file mode 100644 index 0000000..5c918f2 --- /dev/null +++ b/roles/nginx/files/nginx_default_404.html @@ -0,0 +1,4 @@ + +404: Not Found +404: Not Found + diff --git a/roles/nginx/files/nginx_default_50x.html b/roles/nginx/files/nginx_default_50x.html new file mode 100644 index 0000000..9af1842 --- /dev/null +++ b/roles/nginx/files/nginx_default_50x.html @@ -0,0 +1,4 @@ + +50x: Server Error +50x: Server Error + diff --git a/roles/nginx/files/nginx_default_favicon.png b/roles/nginx/files/nginx_default_favicon.png new file mode 100644 index 0000000..e69de29 diff --git a/roles/nginx/files/nginx_default_index.html b/roles/nginx/files/nginx_default_index.html new file mode 100644 index 0000000..6d805dc --- /dev/null +++ b/roles/nginx/files/nginx_default_index.html @@ -0,0 +1,4 @@ + +Index +You probably shouldn't be seeing this, but hello anyways! + diff --git a/roles/nginx/files/nginx_default_robots.txt b/roles/nginx/files/nginx_default_robots.txt new file mode 100644 index 0000000..e8d19f5 --- /dev/null +++ b/roles/nginx/files/nginx_default_robots.txt @@ -0,0 +1,3 @@ +# Disallow all bots for this server +User-agent: * +Disallow: / diff --git a/roles/nginx/handlers/main.yml b/roles/nginx/handlers/main.yml new file mode 100644 index 0000000..c63e4a3 --- /dev/null +++ b/roles/nginx/handlers/main.yml @@ -0,0 +1,7 @@ +--- +- name: test nginx + command: nginx -t + notify: reload nginx + +- name: restart nginx + service: name=nginx state=restarted enabled=yes diff --git a/roles/nginx/tasks/main.yml b/roles/nginx/tasks/main.yml new file mode 100644 index 0000000..8b32f07 --- /dev/null +++ b/roles/nginx/tasks/main.yml @@ -0,0 +1,24 @@ +--- +- name: Install nginx + apt: name=nginx state=present + +- name: Copy nginx configuration for wordpress + template: src=default.conf dest=/etc/nginx/conf.d/default.conf + notify: restart nginx + +mkdir -p /srv/http/default + +- name: Setup default nginx pages + copy: + src: "{{item.src}}" + dest: "/srv/http/default/www/{{item.dest}}" + owner: www-data + group: www-data + force: no + tags: + - nginx + with_items: + - {src: "static_files/nginx_default_404.html", dest: "404.html"} + - {src: "static_files/nginx_default_50x.html", dest: "50x.html"} + - {src: "static_files/nginx_default_favicon.png", dest: "favicon.png"} + - {src: "static_files/nginx_default_index.html", dest: "index.html"} diff --git a/roles/nullmailer/defaults/main.yml b/roles/nullmailer/defaults/main.yml new file mode 100644 index 0000000..8ce958d --- /dev/null +++ b/roles/nullmailer/defaults/main.yml @@ -0,0 +1,5 @@ + +# REQUIRED nullmailer_smtp_host +# REQUIRED nullmailer_smtp_user +# REQUIRED nullmailer_smtp_pass +email_domain: "{{ ansible_domain }}" diff --git a/roles/nullmailer/handlers/main.yml b/roles/nullmailer/handlers/main.yml new file mode 100644 index 0000000..d25367d --- /dev/null +++ b/roles/nullmailer/handlers/main.yml @@ -0,0 +1,5 @@ +--- +- name: reload nullmailer + service: + name: nullmailer + state: reloaded \ No newline at end of file diff --git a/roles/nullmailer/tasks/main.yml b/roles/nullmailer/tasks/main.yml new file mode 100644 index 0000000..d694173 --- /dev/null +++ b/roles/nullmailer/tasks/main.yml @@ -0,0 +1,33 @@ +--- +- name: Install nullmailer and mailx + apt: name={{ item }} state=installed + with_items: + - nullmailer + - heirloom-mailx + tags: + - dependencies + +- name: Enable and run nullmailer service + service: + name: nullmailer + enabled: yes + state: restarted + +- name: Configure nullmailer - adminaddr + template: src=etc_nullmailer_adminaddr.j2 dest=/etc/nullmailer/adminaddr + when: admin_email is defined + +- name: Configure nullmailer - defaultdomain + template: src=etc_nullmailer_defaultdomain.j2 dest=/etc/nullmailer/defaultdomain + when: email_domain is defined + +- name: Configure nullmailer - remotes + template: src=etc_nullmailer_remotes.j2 dest=/etc/nullmailer/remotes + when: nullmailer_smtp_pass is defined + notify: reload nullmailer + +- name: Create mailname + template: src=mailname.j2 dest=/etc/mailname mode=0644 + when: email_domain is defined + notify: reload nullmailer + diff --git a/roles/nullmailer/templates/etc_nullmailer_adminaddr.j2 b/roles/nullmailer/templates/etc_nullmailer_adminaddr.j2 new file mode 100644 index 0000000..aac956b --- /dev/null +++ b/roles/nullmailer/templates/etc_nullmailer_adminaddr.j2 @@ -0,0 +1 @@ +{{ admin_email }} diff --git a/roles/nullmailer/templates/etc_nullmailer_defaultdomain.j2 b/roles/nullmailer/templates/etc_nullmailer_defaultdomain.j2 new file mode 100644 index 0000000..f1e1018 --- /dev/null +++ b/roles/nullmailer/templates/etc_nullmailer_defaultdomain.j2 @@ -0,0 +1 @@ +{{ email_domain }} diff --git a/roles/nullmailer/templates/etc_nullmailer_remotes.j2 b/roles/nullmailer/templates/etc_nullmailer_remotes.j2 new file mode 100644 index 0000000..0e4f1ae --- /dev/null +++ b/roles/nullmailer/templates/etc_nullmailer_remotes.j2 @@ -0,0 +1,2 @@ +# {{ ansible_managed }} +{{ nullmailer_smtp_host }} smtp --port=465 --ssl --user={{ nullmailer_smtp_user }} --pass={{ nullmailer_smtp_pass }} diff --git a/roles/nullmailer/templates/mailname.j2 b/roles/nullmailer/templates/mailname.j2 new file mode 100644 index 0000000..b305ac1 --- /dev/null +++ b/roles/nullmailer/templates/mailname.j2 @@ -0,0 +1 @@ +{{ ansible_fqdn }} \ No newline at end of file -- cgit v1.2.3