forked from jakub/ansible
Compare commits
58 Commits
595c0624d6
...
checkmk
| Author | SHA1 | Date | |
|---|---|---|---|
| 32b81131db | |||
| dc54737878 | |||
| 9002c65487 | |||
| 3920664747 | |||
| 02bfde0fac | |||
| 534f002f5b | |||
| e6c7b06d73 | |||
| 0d1a9f8138 | |||
| 3d09af19d0 | |||
| 2c61021830 | |||
| 172d758bac | |||
| 18e10f6aed | |||
| 65775107d4 | |||
| 388be8ed4c | |||
| ab15e3c889 | |||
| e25e6eebcf | |||
| f1607fad65 | |||
| 75f2f20531 | |||
| 8e5c1377eb | |||
| 5ac5e82b16 | |||
| b95bdf0b3a | |||
| 3464fe007a | |||
| 62d64b0411 | |||
| 1bad80c04d | |||
| f46ab32d7c | |||
| bd775c5163 | |||
| ad318c50fd | |||
| fdc61bd22e | |||
| 3238ad0a5e | |||
| b1a849824f | |||
| 11a48e4ccb | |||
| e42363aaec | |||
| 79ee0ecd46 | |||
| 8fd180ab11 | |||
| 07bc4693e3 | |||
| 8ea60d9e15 | |||
| 4eb25cb78b | |||
| 4de04d0d3a | |||
| f4262bcb27 | |||
| 5c69d3a03f | |||
| 547c9fadc5 | |||
| c07181291c | |||
| 1a0ce36efe | |||
| 8b57f27ec6 | |||
| 085e7177f4 | |||
| 3099a0b2b8 | |||
| 3d89bc523e | |||
| 61d288f92a | |||
| 61beedd023 | |||
| bb37cdaa53 | |||
| b805b506b4 | |||
| 9fad4e4d1a | |||
| a632da2a62 | |||
| cf21ad70c1 | |||
| 1deb268d73 | |||
| 8373252ae9 | |||
| 13a48cd734 | |||
| b497723769 |
39
homarr.yml
Normal file
39
homarr.yml
Normal file
@@ -0,0 +1,39 @@
|
|||||||
|
- name: Update Homarr
|
||||||
|
hosts: linux_servers
|
||||||
|
become: true
|
||||||
|
gather_facts: false
|
||||||
|
|
||||||
|
vars:
|
||||||
|
homarr_project: homarr
|
||||||
|
homarr_compose_file: /data/compose/homarr/docker-compose-homarr.yml
|
||||||
|
homarr_service: homarr
|
||||||
|
homarr_port: 7575
|
||||||
|
|
||||||
|
tasks:
|
||||||
|
- name: Pull latest Homarr image
|
||||||
|
community.docker.docker_compose_v2:
|
||||||
|
project_src: "{{ homarr_compose_file | dirname }}"
|
||||||
|
files:
|
||||||
|
- "{{ homarr_compose_file | basename }}"
|
||||||
|
pull: always
|
||||||
|
|
||||||
|
- name: Recreate Homarr service
|
||||||
|
community.docker.docker_compose_v2:
|
||||||
|
project_src: "{{ homarr_compose_file | dirname }}"
|
||||||
|
files:
|
||||||
|
- "{{ homarr_compose_file | basename }}"
|
||||||
|
services:
|
||||||
|
- "{{ homarr_service }}"
|
||||||
|
state: present
|
||||||
|
recreate: always
|
||||||
|
|
||||||
|
- name: Wait for Homarr port
|
||||||
|
ansible.builtin.wait_for:
|
||||||
|
host: 127.0.0.1
|
||||||
|
port: "{{ homarr_port }}"
|
||||||
|
timeout: 60
|
||||||
|
|
||||||
|
- name: Check Homarr HTTP endpoint
|
||||||
|
ansible.builtin.uri:
|
||||||
|
url: "http://127.0.0.1:{{ homarr_port }}/"
|
||||||
|
status_code: 200
|
||||||
111
initial_setup.yml
Normal file
111
initial_setup.yml
Normal file
@@ -0,0 +1,111 @@
|
|||||||
|
---
|
||||||
|
- name: Baseline user setup
|
||||||
|
hosts: all
|
||||||
|
become: true
|
||||||
|
|
||||||
|
vars:
|
||||||
|
users:
|
||||||
|
- name: automation
|
||||||
|
shell: /bin/bash
|
||||||
|
groups: []
|
||||||
|
sudo_nopasswd: true
|
||||||
|
ssh_keys:
|
||||||
|
- "ssh-ed25519 AAAAC3..."
|
||||||
|
|
||||||
|
- name: hellsos
|
||||||
|
shell: /bin/bash
|
||||||
|
groups: []
|
||||||
|
sudo_nopasswd: true
|
||||||
|
ssh_keys:
|
||||||
|
- "ssh-ed25519 AAAAC3..."
|
||||||
|
|
||||||
|
- name: jim
|
||||||
|
shell: /bin/bash
|
||||||
|
groups: []
|
||||||
|
sudo_nopasswd: true
|
||||||
|
ssh_keys:
|
||||||
|
- "ssh-ed25519 AAAAC3..."
|
||||||
|
|
||||||
|
tasks:
|
||||||
|
|
||||||
|
- name: Pick sudo group per distro
|
||||||
|
set_fact:
|
||||||
|
sudo_group: >-
|
||||||
|
{{ 'wheel'
|
||||||
|
if ansible_facts.os_family in
|
||||||
|
['RedHat','Rocky','AlmaLinux','Fedora','OracleLinux','Suse']
|
||||||
|
else 'sudo' }}
|
||||||
|
|
||||||
|
- name: Ensure user exists
|
||||||
|
ansible.builtin.user:
|
||||||
|
name: "{{ item.name }}"
|
||||||
|
shell: "{{ item.shell }}"
|
||||||
|
groups: "{{ sudo_group }}"
|
||||||
|
append: true
|
||||||
|
create_home: true
|
||||||
|
loop: "{{ users }}"
|
||||||
|
|
||||||
|
- name: Enforce authorized SSH keys
|
||||||
|
ansible.builtin.authorized_key:
|
||||||
|
user: "{{ item.name }}"
|
||||||
|
key: "{{ item.ssh_keys | join('\n') }}"
|
||||||
|
exclusive: true
|
||||||
|
loop: "{{ users }}"
|
||||||
|
|
||||||
|
- name: Grant passwordless sudo
|
||||||
|
ansible.builtin.copy:
|
||||||
|
dest: "/etc/sudoers.d/{{ item.name }}"
|
||||||
|
mode: '0440'
|
||||||
|
content: "{{ item.name }} ALL=(ALL) NOPASSWD:ALL\n"
|
||||||
|
validate: 'visudo -cf %s'
|
||||||
|
loop: "{{ users }}"
|
||||||
|
when: item.sudo_nopasswd
|
||||||
|
|
||||||
|
# ==============================
|
||||||
|
# SECOND PLAY: SSH HARDENING
|
||||||
|
# ==============================
|
||||||
|
|
||||||
|
- name: SSH Hardening
|
||||||
|
hosts: all
|
||||||
|
become: true
|
||||||
|
tags: never,hardening
|
||||||
|
|
||||||
|
tasks:
|
||||||
|
|
||||||
|
- name: Detect if system is Proxmox
|
||||||
|
ansible.builtin.stat:
|
||||||
|
path: /usr/bin/pveversion
|
||||||
|
register: proxmox_check
|
||||||
|
|
||||||
|
- name: Ensure sshd_config.d directory exists
|
||||||
|
ansible.builtin.file:
|
||||||
|
path: /etc/ssh/sshd_config.d
|
||||||
|
state: directory
|
||||||
|
|
||||||
|
- name: Deploy SSH hardening config
|
||||||
|
ansible.builtin.copy:
|
||||||
|
dest: /etc/ssh/sshd_config.d/99-ansible-hardening.conf
|
||||||
|
mode: '0644'
|
||||||
|
content: |
|
||||||
|
PasswordAuthentication no
|
||||||
|
ChallengeResponseAuthentication no
|
||||||
|
PubkeyAuthentication yes
|
||||||
|
AuthenticationMethods publickey
|
||||||
|
UsePAM yes
|
||||||
|
|
||||||
|
{% if not proxmox_check.stat.exists %}
|
||||||
|
PermitRootLogin no
|
||||||
|
{% else %}
|
||||||
|
PermitRootLogin prohibit-password
|
||||||
|
{% endif %}
|
||||||
|
validate: 'sshd -t -f %s'
|
||||||
|
notify: Restart SSH
|
||||||
|
|
||||||
|
handlers:
|
||||||
|
- name: Restart SSH
|
||||||
|
ansible.builtin.service:
|
||||||
|
name: "{{ 'sshd'
|
||||||
|
if ansible_facts.os_family in
|
||||||
|
['RedHat','Rocky','AlmaLinux','Fedora','OracleLinux','Suse']
|
||||||
|
else 'ssh' }}"
|
||||||
|
state: restarted
|
||||||
@@ -1,5 +1,9 @@
|
|||||||
[linux_servers]
|
[linux_servers]
|
||||||
jimbuntu ansible_host=192.168.19.4
|
jimbuntu ansible_host=192.168.19.4
|
||||||
jim_storage ansible_host=192.168.19.7
|
jim_storage ansible_host=192.168.19.7
|
||||||
portainer2 ansible_host=192.168.52.9
|
portainer2_hellsos ansible_host=192.168.52.9
|
||||||
portainernode ansible_host=192.168.52.21
|
portainernode_hellsos ansible_host=192.168.52.21
|
||||||
|
portainernode2_jim ansible_host=192.168.19.8
|
||||||
|
|
||||||
|
[local]
|
||||||
|
localhost ansible_connection=local
|
||||||
@@ -1,2 +1,16 @@
|
|||||||
[mikrotiks]
|
[mikrotik_routers]
|
||||||
storage ansible_host=192.168.19.3 ansible_ssh_common_args='-o StrictHostKeyChecking=no'
|
jim_main ansible_host=192.168.19.2
|
||||||
|
jim_gw2 ansible_host=192.168.19.3
|
||||||
|
hellsos ansible_host=192.168.40.1
|
||||||
|
ewolet ansible_host=192.168.90.1
|
||||||
|
Poli ansible_host=192.168.2.1
|
||||||
|
Schmid ansible_host=192.168.177.1
|
||||||
|
#Volf ansible_host=192.168.88.1
|
||||||
|
fencl_home ansible_host=192.168.68.1
|
||||||
|
fencl_tata ansible_host=192.168.69.1
|
||||||
|
|
||||||
|
|
||||||
|
[mikrotik_routers:vars]
|
||||||
|
ansible_connection=network_cli
|
||||||
|
ansible_network_os=community.routeros.routeros
|
||||||
|
ansible_command_timeout=15
|
||||||
@@ -7,7 +7,7 @@
|
|||||||
|
|
||||||
- name: Ensure output directory exists
|
- name: Ensure output directory exists
|
||||||
ansible.builtin.file:
|
ansible.builtin.file:
|
||||||
path: output
|
path: /opt/mikrotik_backups
|
||||||
state: directory
|
state: directory
|
||||||
mode: '0755'
|
mode: '0755'
|
||||||
delegate_to: localhost
|
delegate_to: localhost
|
||||||
@@ -33,7 +33,7 @@
|
|||||||
current_date: "{{ date_output.stdout }}"
|
current_date: "{{ date_output.stdout }}"
|
||||||
|
|
||||||
- name: Export router config
|
- name: Export router config
|
||||||
shell: timeout 15 ssh -o StrictHostKeyChecking=no {{ ansible_user }}@{{ ansible_host }} -p {{ ansible_port }} "/export"
|
shell: timeout 15 ssh -o StrictHostKeyChecking=no {{ ansible_user }}@{{ ansible_host }} -p {{ ansible_port }} "/export show-sensitive"
|
||||||
register: export_output
|
register: export_output
|
||||||
delegate_to: localhost
|
delegate_to: localhost
|
||||||
when: system_identity.rc == 0
|
when: system_identity.rc == 0
|
||||||
@@ -42,7 +42,7 @@
|
|||||||
- name: Save export to local file
|
- name: Save export to local file
|
||||||
ansible.builtin.copy:
|
ansible.builtin.copy:
|
||||||
content: "{{ export_output.stdout }}"
|
content: "{{ export_output.stdout }}"
|
||||||
dest: "output/{{ router_name }}-{{ current_date }}.config"
|
dest: "/opt/mikrotik_backups/{{ router_name }}-{{ current_date }}.config"
|
||||||
delegate_to: localhost
|
delegate_to: localhost
|
||||||
when: export_output.rc == 0
|
when: export_output.rc == 0
|
||||||
|
|
||||||
@@ -52,7 +52,7 @@
|
|||||||
when: system_identity.rc == 0
|
when: system_identity.rc == 0
|
||||||
|
|
||||||
- name: Download binary backup
|
- name: Download binary backup
|
||||||
shell: timeout 15 scp -o StrictHostKeyChecking=no -P {{ ansible_port }} {{ ansible_user }}@{{ ansible_host }}:{{ router_name }}-{{ current_date }}-backup.backup output/
|
shell: timeout 15 scp -o StrictHostKeyChecking=no -P {{ ansible_port }} {{ ansible_user }}@{{ ansible_host }}:{{ router_name }}-{{ current_date }}-backup.backup /opt/mikrotik_backups/
|
||||||
delegate_to: localhost
|
delegate_to: localhost
|
||||||
when: system_identity.rc == 0
|
when: system_identity.rc == 0
|
||||||
|
|
||||||
|
|||||||
251
mikrotikbackup_clean.yml
Normal file
251
mikrotikbackup_clean.yml
Normal file
@@ -0,0 +1,251 @@
|
|||||||
|
---
|
||||||
|
- name: Backup and/or Upgrade MikroTik
|
||||||
|
hosts: mikrotik_routers
|
||||||
|
gather_facts: no
|
||||||
|
serial: 10
|
||||||
|
|
||||||
|
vars:
|
||||||
|
backup_dir: /opt/mikrotik_backups/
|
||||||
|
checkmk_url: "http://192.168.19.8:8080/cmk/check_mk/api/1.0/domain-types/host_service_passive_check/actions/set/invoke"
|
||||||
|
checkmk_user: "apitoken"
|
||||||
|
checkmk_token: "YXBpdG9rZW46TkVXX1NFQ1JFVA=="
|
||||||
|
checkmk_service_description: "MikroTik Backup/Upgrade"
|
||||||
|
|
||||||
|
tasks:
|
||||||
|
|
||||||
|
# ----------------------------
|
||||||
|
# Identity + timestamp
|
||||||
|
# ----------------------------
|
||||||
|
- name: Get router identity
|
||||||
|
community.routeros.command:
|
||||||
|
commands: /system identity print
|
||||||
|
register: identity_raw
|
||||||
|
|
||||||
|
- name: Parse router name
|
||||||
|
set_fact:
|
||||||
|
router_name: "{{ identity_raw.stdout[0].split(': ')[1] | trim }}"
|
||||||
|
|
||||||
|
- name: Get timestamp
|
||||||
|
command: date +%Y-%m-%d_%H-%M-%S
|
||||||
|
register: date_out
|
||||||
|
delegate_to: localhost
|
||||||
|
changed_when: false
|
||||||
|
|
||||||
|
- name: Set timestamp
|
||||||
|
set_fact:
|
||||||
|
ts: "{{ date_out.stdout }}"
|
||||||
|
|
||||||
|
# ----------------------------
|
||||||
|
# Backup
|
||||||
|
# ----------------------------
|
||||||
|
- name: Ensure backup directory exists
|
||||||
|
file:
|
||||||
|
path: "{{ backup_dir }}"
|
||||||
|
state: directory
|
||||||
|
mode: "0755"
|
||||||
|
delegate_to: localhost
|
||||||
|
|
||||||
|
- name: Export router config
|
||||||
|
community.routeros.command:
|
||||||
|
commands: /export terse show-sensitive
|
||||||
|
register: export_cfg
|
||||||
|
|
||||||
|
- name: Save export locally
|
||||||
|
copy:
|
||||||
|
content: "{{ export_cfg.stdout[0] }}"
|
||||||
|
dest: "{{ backup_dir }}/{{ router_name }}-{{ ts }}.rsc"
|
||||||
|
mode: "0600"
|
||||||
|
delegate_to: localhost
|
||||||
|
|
||||||
|
- name: Mark backup success
|
||||||
|
set_fact:
|
||||||
|
backup_file: "{{ backup_dir }}/{{ router_name }}-{{ ts }}.rsc"
|
||||||
|
|
||||||
|
# ----------------------------
|
||||||
|
# Update check
|
||||||
|
# ----------------------------
|
||||||
|
- name: Trigger update check
|
||||||
|
community.routeros.command:
|
||||||
|
commands: /system package update check-for-updates once
|
||||||
|
|
||||||
|
- name: Wait for MikroTik
|
||||||
|
pause:
|
||||||
|
seconds: 5
|
||||||
|
|
||||||
|
- name: Get update info
|
||||||
|
community.routeros.command:
|
||||||
|
commands: /system package update print
|
||||||
|
register: update_info
|
||||||
|
|
||||||
|
# ----------------------------
|
||||||
|
# Parsing
|
||||||
|
# ----------------------------
|
||||||
|
- name: Extract installed version
|
||||||
|
set_fact:
|
||||||
|
installed_version: >-
|
||||||
|
{{
|
||||||
|
update_info.stdout[0]
|
||||||
|
| regex_search('installed-version:\s*(\S+)', '\1')
|
||||||
|
| first
|
||||||
|
| default('unknown')
|
||||||
|
| trim
|
||||||
|
}}
|
||||||
|
|
||||||
|
- name: Extract latest version
|
||||||
|
set_fact:
|
||||||
|
latest_version: >-
|
||||||
|
{{
|
||||||
|
update_info.stdout[0]
|
||||||
|
| regex_search('latest-version:\s*(\S+)', '\1')
|
||||||
|
| first
|
||||||
|
| default('unknown')
|
||||||
|
| trim
|
||||||
|
}}
|
||||||
|
|
||||||
|
- name: Extract status
|
||||||
|
set_fact:
|
||||||
|
update_status: >-
|
||||||
|
{{
|
||||||
|
update_info.stdout[0]
|
||||||
|
| regex_search('status:\s*(.+)', '\1')
|
||||||
|
| first
|
||||||
|
| default('unknown')
|
||||||
|
| trim
|
||||||
|
}}
|
||||||
|
|
||||||
|
- name: Extract channel
|
||||||
|
set_fact:
|
||||||
|
update_channel: >-
|
||||||
|
{{
|
||||||
|
update_info.stdout[0]
|
||||||
|
| regex_search('channel:\s*(\S+)', '\1')
|
||||||
|
| first
|
||||||
|
| default('unknown')
|
||||||
|
| trim
|
||||||
|
}}
|
||||||
|
|
||||||
|
- name: Debug parsed values
|
||||||
|
debug:
|
||||||
|
msg: >
|
||||||
|
router={{ router_name }}
|
||||||
|
channel={{ update_channel }}
|
||||||
|
installed={{ installed_version }}
|
||||||
|
latest={{ latest_version }}
|
||||||
|
status={{ update_status }}
|
||||||
|
|
||||||
|
# ----------------------------
|
||||||
|
# Logic
|
||||||
|
# ----------------------------
|
||||||
|
- name: Detect update failure
|
||||||
|
set_fact:
|
||||||
|
update_failed: "{{ 'error' in (update_status | lower) or 'failed' in (update_status | lower) }}"
|
||||||
|
|
||||||
|
- name: Decide upgrade
|
||||||
|
set_fact:
|
||||||
|
upgrade_needed: >-
|
||||||
|
{{
|
||||||
|
not update_failed | bool and
|
||||||
|
installed_version != 'unknown' and
|
||||||
|
latest_version != 'unknown' and
|
||||||
|
installed_version != latest_version
|
||||||
|
}}
|
||||||
|
|
||||||
|
- name: Show decision
|
||||||
|
debug:
|
||||||
|
msg: "Router={{ router_name }} installed={{ installed_version }} latest={{ latest_version }} upgrade_needed={{ upgrade_needed }}"
|
||||||
|
|
||||||
|
- name: Skip upgrade (already up to date)
|
||||||
|
debug:
|
||||||
|
msg: "Router {{ router_name }} is already up to date ({{ installed_version }})"
|
||||||
|
when: not upgrade_needed | bool
|
||||||
|
|
||||||
|
# ----------------------------
|
||||||
|
# Upgrade
|
||||||
|
# ----------------------------
|
||||||
|
- name: Install update
|
||||||
|
community.routeros.command:
|
||||||
|
commands: /system package update install
|
||||||
|
when: upgrade_needed | bool
|
||||||
|
register: upgrade_result
|
||||||
|
|
||||||
|
- name: Wait for reboot
|
||||||
|
wait_for_connection:
|
||||||
|
delay: 180
|
||||||
|
timeout: 600
|
||||||
|
sleep: 10
|
||||||
|
when:
|
||||||
|
- upgrade_needed | bool
|
||||||
|
- upgrade_result is succeeded
|
||||||
|
|
||||||
|
- name: Confirm version after upgrade
|
||||||
|
community.routeros.command:
|
||||||
|
commands: /system resource print
|
||||||
|
register: post_upgrade_info
|
||||||
|
when: upgrade_needed | bool
|
||||||
|
|
||||||
|
- name: Parse new version
|
||||||
|
set_fact:
|
||||||
|
post_upgrade_version: >-
|
||||||
|
{{
|
||||||
|
post_upgrade_info.stdout[0]
|
||||||
|
| regex_search('version:\s*(\S+)', '\1')
|
||||||
|
| first
|
||||||
|
| default('unknown')
|
||||||
|
| trim
|
||||||
|
}}
|
||||||
|
when: upgrade_needed | bool
|
||||||
|
|
||||||
|
# ----------------------------
|
||||||
|
# Checkmk
|
||||||
|
# ----------------------------
|
||||||
|
- name: Result when no upgrade needed
|
||||||
|
set_fact:
|
||||||
|
cmk_state: "{{ 2 if update_failed | bool else 0 }}"
|
||||||
|
cmk_output: >-
|
||||||
|
{{ 'CRIT' if update_failed | bool else 'OK' }} -
|
||||||
|
router={{ router_name }}
|
||||||
|
installed={{ installed_version }}
|
||||||
|
latest={{ latest_version }}
|
||||||
|
status="{{ update_status }}"
|
||||||
|
upgrade_needed=no
|
||||||
|
when: not upgrade_needed | bool
|
||||||
|
|
||||||
|
- name: Result when upgrade happened
|
||||||
|
set_fact:
|
||||||
|
cmk_state: "{{ 0 if post_upgrade_version == latest_version else 2 }}"
|
||||||
|
cmk_output: >-
|
||||||
|
{{ 'OK' if post_upgrade_version == latest_version else 'CRIT' }} -
|
||||||
|
router={{ router_name }}
|
||||||
|
upgraded_from={{ installed_version }}
|
||||||
|
upgraded_to={{ post_upgrade_version }}
|
||||||
|
latest={{ latest_version }}
|
||||||
|
when: upgrade_needed | bool
|
||||||
|
|
||||||
|
- name: Send result to Checkmk
|
||||||
|
delegate_to: localhost
|
||||||
|
uri:
|
||||||
|
url: "{{ checkmk_url }}"
|
||||||
|
method: POST
|
||||||
|
url_username: "{{ checkmk_user }}"
|
||||||
|
url_password: "{{ checkmk_token }}"
|
||||||
|
force_basic_auth: yes
|
||||||
|
headers:
|
||||||
|
Content-Type: "application/json"
|
||||||
|
Accept: "application/json"
|
||||||
|
body_format: json
|
||||||
|
body:
|
||||||
|
host_name: "mikrotiks"
|
||||||
|
service_description: "{{ checkmk_service_description }}"
|
||||||
|
state: "{{ cmk_state | int }}"
|
||||||
|
output: "{{ cmk_output }}"
|
||||||
|
failed_when: false
|
||||||
|
register: cmk_result
|
||||||
|
|
||||||
|
- name: Debug Checkmk response
|
||||||
|
debug:
|
||||||
|
msg: "status={{ cmk_result.status }} body={{ cmk_result.json | default(cmk_result.msg) }}"
|
||||||
|
|
||||||
|
- name: Show Checkmk output
|
||||||
|
debug:
|
||||||
|
var: cmk_output
|
||||||
|
|
||||||
2
requirements.yml
Normal file
2
requirements.yml
Normal file
@@ -0,0 +1,2 @@
|
|||||||
|
collections:
|
||||||
|
- name: community.routeros
|
||||||
57
test_sms.yml
Normal file
57
test_sms.yml
Normal file
@@ -0,0 +1,57 @@
|
|||||||
|
---
|
||||||
|
- name: Send and verify SMS delivery via internet-master.cz
|
||||||
|
hosts: localhost
|
||||||
|
gather_facts: false
|
||||||
|
vars:
|
||||||
|
sms_number: "601358865"
|
||||||
|
sms_username: "mikrotik"
|
||||||
|
sms_password_send: "jdkotzHJIOPWhjtr32D"
|
||||||
|
sms_password_recv: "jdkotzHJIOPWhjtr32D"
|
||||||
|
sms_wait_seconds: 120 # Wait 2 minutes for delivery
|
||||||
|
|
||||||
|
tasks:
|
||||||
|
- name: Generate random test string
|
||||||
|
set_fact:
|
||||||
|
random_string: "mikrotik_{{ lookup('password', '/dev/null length=8 chars=ascii_letters') }}"
|
||||||
|
|
||||||
|
- name: Send SMS message
|
||||||
|
uri:
|
||||||
|
url: "https://sms.internet-master.cz/send/?number={{ sms_number }}&message=@mikrotik@{{ random_string | urlencode }}&type=class-1&username={{ sms_username }}&password={{ sms_password_send }}"
|
||||||
|
method: GET
|
||||||
|
return_content: true
|
||||||
|
register: send_result
|
||||||
|
|
||||||
|
- name: Show send API response
|
||||||
|
debug:
|
||||||
|
var: send_result.content
|
||||||
|
|
||||||
|
- name: Wait for SMS to be delivered
|
||||||
|
pause:
|
||||||
|
seconds: "{{ sms_wait_seconds }}"
|
||||||
|
|
||||||
|
- name: Fetch received messages
|
||||||
|
uri:
|
||||||
|
url: "https://sms.internet-master.cz/receive/?username={{ sms_username }}&password={{ sms_password_recv }}"
|
||||||
|
method: GET
|
||||||
|
return_content: true
|
||||||
|
register: recv_result
|
||||||
|
|
||||||
|
- name: Parse received JSON
|
||||||
|
set_fact:
|
||||||
|
inbox: "{{ recv_result.json.inbox | default([]) }}"
|
||||||
|
|
||||||
|
- name: Check if random string message was received
|
||||||
|
set_fact:
|
||||||
|
message_found: "{{ inbox | selectattr('message', 'equalto', random_string) | list | length > 0 }}"
|
||||||
|
|
||||||
|
- name: Report result
|
||||||
|
debug:
|
||||||
|
msg: >
|
||||||
|
SMS with message '{{ random_string }}' was {{
|
||||||
|
'delivered ✅' if message_found else 'NOT delivered ❌'
|
||||||
|
}}.
|
||||||
|
|
||||||
|
- name: Fail if not delivered
|
||||||
|
fail:
|
||||||
|
msg: "Message '{{ random_string }}' not found in received inbox!"
|
||||||
|
when: not message_found
|
||||||
99
update.yml
99
update.yml
@@ -1,34 +1,91 @@
|
|||||||
|
---
|
||||||
- name: Update system (APT + Flatpak)
|
- name: Update system (APT + Flatpak)
|
||||||
hosts: all
|
hosts: all
|
||||||
|
become: yes
|
||||||
|
gather_facts: yes
|
||||||
|
serial: 5
|
||||||
|
|
||||||
become: true
|
|
||||||
become_user: root
|
|
||||||
become_method: sudo
|
|
||||||
tasks:
|
tasks:
|
||||||
- name: Update APT cache
|
|
||||||
|
- name: Ensure SSH is reachable (skip host if not)
|
||||||
|
delegate_to: localhost
|
||||||
|
wait_for:
|
||||||
|
host: "{{ ansible_host | default(inventory_hostname) }}"
|
||||||
|
port: 22
|
||||||
|
timeout: 5
|
||||||
|
register: ssh_check
|
||||||
|
ignore_errors: yes
|
||||||
|
|
||||||
|
- meta: end_host
|
||||||
|
when: ssh_check is failed
|
||||||
|
|
||||||
|
- name: Ping with retries (handle intermittent flaps)
|
||||||
|
ping:
|
||||||
|
register: ping_result
|
||||||
|
retries: 5
|
||||||
|
delay: 5
|
||||||
|
until: ping_result is success
|
||||||
|
|
||||||
|
- name: Wait for apt lock to be released
|
||||||
|
shell: |
|
||||||
|
while fuser /var/lib/dpkg/lock-frontend >/dev/null 2>&1; do
|
||||||
|
echo "Waiting for apt lock..."
|
||||||
|
sleep 5
|
||||||
|
done
|
||||||
|
changed_when: false
|
||||||
|
|
||||||
|
- name: Update apt cache
|
||||||
apt:
|
apt:
|
||||||
update_cache: yes
|
update_cache: yes
|
||||||
|
|
||||||
- name: Upgrade all APT packages
|
- name: Perform full upgrade
|
||||||
apt:
|
apt:
|
||||||
upgrade: dist
|
upgrade: full
|
||||||
|
autoremove: yes
|
||||||
|
autoclean: yes
|
||||||
|
register: apt_upgrade
|
||||||
|
retries: 3
|
||||||
|
delay: 10
|
||||||
|
until: apt_upgrade is succeeded
|
||||||
|
|
||||||
- name: Check if flatpak binary exists
|
- name: Fix broken packages
|
||||||
stat:
|
command: apt-get -f install -y
|
||||||
path: /usr/bin/flatpak
|
register: fix_result
|
||||||
register: flatpak_bin
|
failed_when: false
|
||||||
|
changed_when: "'Setting up' in fix_result.stdout"
|
||||||
|
|
||||||
|
- name: Check if Flatpak is installed
|
||||||
|
command: which flatpak
|
||||||
|
register: flatpak_check
|
||||||
|
changed_when: false
|
||||||
|
failed_when: false
|
||||||
|
|
||||||
- name: Update system Flatpaks
|
- name: Update system Flatpaks
|
||||||
shell: timeout 300 flatpak update -y
|
command: flatpak update -y --noninteractive --system
|
||||||
register: flatpak_sys
|
when: flatpak_check.rc == 0
|
||||||
failed_when: flatpak_sys.rc != 0 and flatpak_sys.rc != 124
|
failed_when: false
|
||||||
when: flatpak_bin.stat.exists
|
|
||||||
|
|
||||||
- name: Update user Flatpaks
|
- name: Update user Flatpaks
|
||||||
become_user: jakub
|
command: flatpak update -y --noninteractive --user
|
||||||
environment:
|
become: false
|
||||||
XDG_RUNTIME_DIR: /run/user/1000
|
when: flatpak_check.rc == 0
|
||||||
shell: timeout 300 flatpak update -y
|
failed_when: false
|
||||||
register: flatpak_user
|
|
||||||
failed_when: flatpak_user.rc != 0 and flatpak_user.rc != 124
|
- name: Remove unused Flatpaks
|
||||||
when: flatpak_bin.stat.exists
|
command: flatpak uninstall -y --noninteractive --unused
|
||||||
|
when: flatpak_check.rc == 0
|
||||||
|
failed_when: false
|
||||||
|
|
||||||
|
- name: Update snap packages
|
||||||
|
command: snap refresh
|
||||||
|
failed_when: false
|
||||||
|
|
||||||
|
- name: Check if reboot is required
|
||||||
|
stat:
|
||||||
|
path: /var/run/reboot-required
|
||||||
|
register: reboot_required
|
||||||
|
|
||||||
|
- name: Notify if reboot required
|
||||||
|
debug:
|
||||||
|
msg: "Reboot required on {{ inventory_hostname }}"
|
||||||
|
when: reboot_required.stat.exists
|
||||||
@@ -1,15 +1,12 @@
|
|||||||
# users-ssh-nopasswd.yml
|
---
|
||||||
- name: Ensure users, SSH keys, and passwordless sudo
|
- name: Ensure users, SSH keys, and passwordless sudo
|
||||||
hosts: all
|
hosts: all
|
||||||
become: true
|
become: true
|
||||||
become_user: root
|
|
||||||
become_method: sudo
|
|
||||||
|
|
||||||
vars:
|
vars:
|
||||||
users:
|
users:
|
||||||
- name: automation
|
- name: automation
|
||||||
shell: /bin/bash
|
shell: /bin/bash
|
||||||
# optional extra groups besides sudo/wheel
|
|
||||||
groups: []
|
groups: []
|
||||||
sudo_nopasswd: true
|
sudo_nopasswd: true
|
||||||
keys:
|
keys:
|
||||||
@@ -30,33 +27,43 @@
|
|||||||
- "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIPFS4fsqMjMMu/Bi/884bw7yJBqvWusDRESvanH6Owco jakub@jimbuntu"
|
- "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIPFS4fsqMjMMu/Bi/884bw7yJBqvWusDRESvanH6Owco jakub@jimbuntu"
|
||||||
|
|
||||||
tasks:
|
tasks:
|
||||||
|
|
||||||
- name: Pick sudo group per distro
|
- name: Pick sudo group per distro
|
||||||
ansible.builtin.set_fact:
|
ansible.builtin.set_fact:
|
||||||
sudo_group: "{{ 'wheel' if ansible_facts.os_family in ['RedHat','Rocky','AlmaLinux','Fedora','OracleLinux','Suse'] else 'sudo' }}"
|
sudo_group: >-
|
||||||
|
{{ 'wheel'
|
||||||
|
if ansible_facts.os_family in
|
||||||
|
['RedHat','Rocky','AlmaLinux','Fedora','OracleLinux','Suse']
|
||||||
|
else 'sudo' }}
|
||||||
|
|
||||||
- name: Ensure user exists (creates home)
|
- name: Ensure user exists (creates home)
|
||||||
ansible.builtin.user:
|
ansible.builtin.user:
|
||||||
name: "{{ item.name }}"
|
name: "{{ item.name }}"
|
||||||
shell: "{{ item.shell | default('/bin/bash') }}"
|
shell: "{{ item.shell | default(omit) }}"
|
||||||
groups: >-
|
groups: >-
|
||||||
{{ (
|
{{ (
|
||||||
(item.groups | default([]))
|
(item.groups | default([]))
|
||||||
+ ([sudo_group] if item.sudo_nopasswd | default(false) else [])
|
+ ([sudo_group] if item.sudo_nopasswd | default(false) else [])
|
||||||
) | unique | join(',') if
|
) | unique | join(',')
|
||||||
((item.groups | default([])) | length > 0) or (item.sudo_nopasswd | default(false))
|
if (
|
||||||
else omit }}
|
(item.groups | default([]) | length > 0)
|
||||||
|
or item.sudo_nopasswd | default(false)
|
||||||
|
)
|
||||||
|
else omit }}
|
||||||
append: true
|
append: true
|
||||||
create_home: true
|
create_home: true
|
||||||
state: present
|
state: present
|
||||||
loop: "{{ users }}"
|
loop: "{{ users }}"
|
||||||
|
|
||||||
- name: Install authorized SSH keys
|
- name: Enforce authorized SSH keys
|
||||||
ansible.builtin.authorized_key:
|
ansible.builtin.authorized_key:
|
||||||
user: "{{ item.0.name }}"
|
user: "{{ item.name }}"
|
||||||
key: "{{ item.1 }}"
|
key: "{{ item.keys | join('\n') }}"
|
||||||
state: present
|
state: present
|
||||||
manage_dir: true
|
manage_dir: true
|
||||||
loop: "{{ users | subelements('keys', skip_missing=True) }}"
|
exclusive: true
|
||||||
|
loop: "{{ users }}"
|
||||||
|
when: item.keys is defined
|
||||||
|
|
||||||
- name: Grant passwordless sudo via sudoers.d
|
- name: Grant passwordless sudo via sudoers.d
|
||||||
ansible.builtin.copy:
|
ansible.builtin.copy:
|
||||||
@@ -64,7 +71,9 @@
|
|||||||
owner: root
|
owner: root
|
||||||
group: root
|
group: root
|
||||||
mode: '0440'
|
mode: '0440'
|
||||||
content: "{{ item.name }} ALL=(ALL) NOPASSWD:ALL"
|
content: |
|
||||||
|
# Managed by Ansible
|
||||||
|
{{ item.name }} ALL=(ALL) NOPASSWD:ALL
|
||||||
validate: 'visudo -cf %s'
|
validate: 'visudo -cf %s'
|
||||||
when: item.sudo_nopasswd | default(false)
|
when: item.sudo_nopasswd | default(false)
|
||||||
loop: "{{ users }}"
|
loop: "{{ users }}"
|
||||||
Reference in New Issue
Block a user