From a1572676a4fad48475a2757024f6db4234bdfe7d Mon Sep 17 00:00:00 2001 From: LinuxSquare Date: Thu, 1 May 2025 22:20:09 +0200 Subject: [PATCH] Reformat messages --- apps/ddupdater/init.ansible.yml | 10 +++++----- apps/generate-motd/init.ansible.yml | 6 +++--- apps/noveriablcgen/init.ansible.yml | 12 ++++++------ apps/nsm/init.ansible.yml | 10 +++++----- apps/pms-cli/init.ansible.yml | 10 +++++----- apps/raclette/init.ansible.yml | 12 ++++++------ build/init.ansible.yml | 6 +++--- directories.ansible.yml | 8 ++++---- haproxy/pkg.ansible.yml | 14 +++++++------- haproxy/service.ansible.yml | 2 +- migrations.ansible.yml | 4 ++-- mysql/directory.ansible.yml | 2 +- mysql/pkg.ansible.yml | 4 +--- mysql/secure.ansible.yml | 16 ++++++++-------- mysql/service.ansible.yml | 4 ++-- network/firewall.ansible.yml | 12 ++++++------ network/init.ansible.yml | 4 ++-- openssh/config.ansible.yml | 6 +++--- openssh/pkg.ansible.yml | 2 +- openssh/service.ansible.yml | 4 ++-- podman/directory.ansible.yml | 2 +- podman/pkg.ansible.yml | 2 +- podman/rootless.ansible.yml | 10 +++++----- podman/service.ansible.yml | 4 ++-- podman/user.ansible.yml | 6 +++--- system/ansible.ansible.yml | 4 ++-- system/base.ansible.yml | 20 ++++++++++---------- system/bootloader.ansible.yml | 18 +++++++++--------- system/disks.ansible.yml | 24 ++++++++++++------------ system/repositories.ansible.yml | 4 ++-- system/shell.ansible.yml | 6 +++--- system/user.ansible.yml | 6 +++--- 32 files changed, 126 insertions(+), 128 deletions(-) diff --git a/apps/ddupdater/init.ansible.yml b/apps/ddupdater/init.ansible.yml index 048d4be..357f0cd 100644 --- a/apps/ddupdater/init.ansible.yml +++ b/apps/ddupdater/init.ansible.yml @@ -2,19 +2,19 @@ vars_files: - ../../map.yml tasks: - - name: Create ddupdater app-dir + - name: "apps/ddupdater : Create ddupdater app-dir" file: state: directory path: "{{ app_dir }}/ddupdater" owner: root group: root mode: "0755" - - name: Clone ddupdater git repo + - name: "apps/ddupdater : Clone ddupdater git repo" git: repo: https://git.noveria.org/Tools/ddupdater.git dest: "{{ app_dir }}/ddupdater" force: true - - name: Symlink ddupdater + - name: "apps/ddupdater : Symlink to bin directory" file: state: link src: "{{ app_dir }}/ddupdater/ddupdater" @@ -22,7 +22,7 @@ owner: root group: root mode: "0755" - - name: ddupdater config + - name: "apps/ddupdater : Populate config" template: src: files/ddupdater_config.json.j2 dest: "{{ app_dir }}/ddupdater/config.json" @@ -33,7 +33,7 @@ USERNAME: "noveria" PASSWORD: "{{dyndns_password}}" DOMAIN: "play.noveria.org" - - name: ddupdater crontab + - name: "apps/ddupdater : Create ddupdater crontab" cron: name: "Check public ip and update ddns record every 5 minutes" state: present diff --git a/apps/generate-motd/init.ansible.yml b/apps/generate-motd/init.ansible.yml index 8936e06..1db03d1 100644 --- a/apps/generate-motd/init.ansible.yml +++ b/apps/generate-motd/init.ansible.yml @@ -2,19 +2,19 @@ vars_files: - ../../map.yml tasks: - - name: Create generate_motd app-dir + - name: "apps/generate-motd : Create generate_motd app-dir" file: state: directory path: "{{ app_dir }}/generate_motd" owner: root group: root mode: "0755" - - name: Clone generate-motd git repo + - name: "apps/generate-motd : Clone generate-motd git repo" git: repo: https://git.noveria.org/Tools/generate_motd.git dest: "{{ app_dir }}/generate_motd" force: true - - name: Symlink generate_motd + - name: "apps/generate-motd : Symlink to bin directory" file: state: link src: "{{ app_dir }}/generate_motd/generate_motd" diff --git a/apps/noveriablcgen/init.ansible.yml b/apps/noveriablcgen/init.ansible.yml index e90dbb1..6fda35b 100644 --- a/apps/noveriablcgen/init.ansible.yml +++ b/apps/noveriablcgen/init.ansible.yml @@ -1,19 +1,19 @@ - hosts: localhost vars_files: ../../map.yml tasks: - - name: Create noveriablcgen app-dir + - name: "apps/noveriablcgen : Create noveriablcgen app-dir" file: state: directory path: "{{ app_dir }}/noveriablcgen" owner: root group: root mode: "0755" - - name: Clone noveriablcgen git-repo + - name: "apps/noveriablcgen : Clone noveriablcgen git-repo" git: repo: https://git.noveria.org/Tools/noveriablcgen.git dest: "{{ app_dir }}/noveriablcgen" force: true - - name: Symlink noveriablcgen + - name: "apps/noveriablcgen : Symlink to bin directory" file: state: link src: "{{ app_dir }}/noveriablcgen/noveriablcgen" @@ -21,19 +21,19 @@ owner: root group: root mode: "0755" - - name: noveriablcgen etc dir + - name: "apps/noveriablcgen : Create noveriablcgen etc dir" file: state: directory path: "{{ etc_dir }}/noveriablcgen" owner: root group: root mode: "0755" - - name: Get ROOT_UUID + - name: "apps/noveriablcgen : Get ROOT_UUID" shell: | lsblk -o LABEL,UUID | grep ROOT | awk '{print $2}' register: root_uuid run_once: true - - name: Populate noveriablcgen config + - name: "apps/noveriablcgen : Populate noveriablcgen config" template: src: files/noveriablcgen_config.json.j2 dest: "{{ etc_dir }}/noveriablcgen/noveriablcgen.json" diff --git a/apps/nsm/init.ansible.yml b/apps/nsm/init.ansible.yml index dcd7816..8ad7e27 100644 --- a/apps/nsm/init.ansible.yml +++ b/apps/nsm/init.ansible.yml @@ -2,19 +2,19 @@ vars_files: - ../../map.yml tasks: - - name: Create nsm app-dir + - name: "apps/nsm : Create nsm app-dir" file: state: directory path: "{{ app_dir }}/nsm" owner: root group: root mode: "0755" - - name: Clone nsm git repo + - name: "apps/nsm : Clone nsm git repo" git: repo: https://git.noveria.org/Tools/nsm.git dest: "{{ app_dir }}/nsm" force: true - - name: Symlink nsm + - name: "apps/nsm : Symlink to bin directory" file: state: link src: "{{ app_dir }}/nsm/nsm" @@ -22,14 +22,14 @@ owner: root group: root mode: "0755" - - name: nsm Config dir + - name: "apps/nsm : Create nsm config dir" file: state: directory name: "{{ etc_dir }}/nsm" owner: root group: root mode: "0755" - - name: nsm config + - name: "apps/nsm : Populate nsm config" template: src: files/nsm.json dest: "{{ etc_dir }}/nsm/nsm.json" diff --git a/apps/pms-cli/init.ansible.yml b/apps/pms-cli/init.ansible.yml index 72da092..1eb4bb8 100644 --- a/apps/pms-cli/init.ansible.yml +++ b/apps/pms-cli/init.ansible.yml @@ -3,19 +3,19 @@ - ../../map.yml - ../../podman/map.yml tasks: - - name: Create pms-cli app-dir + - name: "apps/pms-cli : Create pms-cli app-dir" file: state: directory path: "{{ app_dir }}/pms-cli" owner: root group: root mode: "0755" - - name: Clone pms-cli git repo + - name: "apps/pms-cli : Clone pms-cli git repo" git: repo: https://git.noveria.org/Tools/pms-cli.git dest: "{{ app_dir }}/pms-cli" force: true - - name: Symlink pms-cli + - name: "apps/pms-cli : Symlink to bin directory" file: state: link src: "{{ app_dir }}/pms-cli/pms-cli" @@ -23,14 +23,14 @@ owner: root group: root mode: "0755" - - name: PMS-CLI Config dir + - name: "apps/pms-cli : Create pms-cli config dir" file: state: directory name: "{{ etc_dir }}/pms-cli" owner: root group: root mode: "0755" - - name: PMS-CLI Config + - name: "apps/pms-cli : Populate pms-cli Config" template: src: files/pms-cli.json.j2 dest: "{{ etc_dir }}/pms-cli/pms-cli.json" diff --git a/apps/raclette/init.ansible.yml b/apps/raclette/init.ansible.yml index 7f0a12c..c944c9c 100644 --- a/apps/raclette/init.ansible.yml +++ b/apps/raclette/init.ansible.yml @@ -2,19 +2,19 @@ vars_files: - ../../map.yml tasks: - - name: Create raclette app-dir + - name: "apps/raclette : Create raclette app-dir" file: state: directory path: "{{ app_dir }}/raclette" owner: root group: root mode: "0755" - - name: Clone raclette git-repo + - name: "apps/raclette : Clone raclette git-repo" git: repo: https://git.noveria.org/Tools/raclette.git dest: "{{ app_dir }}/raclette" force: true - - name: Symlink raclette-run + - name: "apps/raclette : Symlink raclette-run to bin directory" file: state: link src: "{{ app_dir }}/raclette/raclette-run" @@ -22,7 +22,7 @@ owner: root group: root mode: "0755" - - name: Symlink raclette-call + - name: "apps/raclette : Symlink raclette-call to bin directory" file: state: link src: "{{ app_dir }}/raclette/raclette-call" @@ -30,14 +30,14 @@ owner: root group: root mode: "0755" - - name: raclette etc dir + - name: "apps/raclette : Create raclette config dir" file: state: directory path: "{{ etc_dir }}/raclette" owner: root group: root mode: "0755" - - name: Populate raclette config + - name: "apps/raclette : Populate raclette config" template: src: files/raclette_config.json.j2 dest: "{{ etc_dir }}/raclette/raclette.json" diff --git a/build/init.ansible.yml b/build/init.ansible.yml index 5cc4b9c..3799a40 100644 --- a/build/init.ansible.yml +++ b/build/init.ansible.yml @@ -2,15 +2,15 @@ vars_files: - ../../map.yml tasks: - - name: Create repo-mgmt dir + - name: "build : Create repo-mgmt dir" file: state: directory path: /opt/podman/repo-mgmt owner: puser group: puser - mode: '0755' + mode: "0755" recurse: true - - name: Clone repo-mgmt + - name: "build : Clone repo-mgmt" git: repo: https://git.noveria.org/Novos/repo-mgmt.git dest: /opt/podman/repo-mgmt diff --git a/directories.ansible.yml b/directories.ansible.yml index 24ae42a..9f4e121 100644 --- a/directories.ansible.yml +++ b/directories.ansible.yml @@ -2,28 +2,28 @@ vars_files: - map.yml tasks: - - name: Create base directory + - name: "directories : Create base directory" file: path: "{{ dir }}" recurse: yes owner: root group: root state: directory - - name: Create bin directory + - name: "directories : Create bin directory" file: path: "{{ bin_dir }}" recurse: yes owner: root group: root state: directory - - name: Create etc directory + - name: "directories : Create etc directory" file: path: "{{ etc_dir }}" recurse: yes owner: root group: root state: directory - - name: Create apps directory + - name: "directories : Create apps directory" file: path: "{{ app_dir }}" recurse: yes diff --git a/haproxy/pkg.ansible.yml b/haproxy/pkg.ansible.yml index 569e8ba..9307e30 100644 --- a/haproxy/pkg.ansible.yml +++ b/haproxy/pkg.ansible.yml @@ -2,33 +2,33 @@ vars_files: - map.yml tasks: - - name: Install haproxy pkg + - name: "haproxy/pkg : Install haproxy pkg" package: state: present name: - haproxy - - name: Setup haproxy conf.d directory + - name: "haproxy/pkg : Setup haproxy conf.d directory" file: state: directory path: /etc/haproxy/conf.d owner: root group: root - mode: '0755' - - name: Populate haproxy config + mode: "0755" + - name: "haproxy/pkg : Populate haproxy config" template: src: files/haproxy_config.j2 dest: /etc/haproxy/haproxy.cfg owner: root group: root - mode: '0644' + mode: "0644" vars: IPV4: "{{ ansible_default_ipv4.address }}" - - name: Populate haproxy rc-script + - name: "haproxy/pkg : Populate haproxy rc-script" template: src: files/haproxy_rcscript.initd.j2 dest: /etc/init.d/haproxy owner: root group: root - mode: '0755' + mode: "0755" vars: CONF_DIR: "{{ conf_dir }}" diff --git a/haproxy/service.ansible.yml b/haproxy/service.ansible.yml index ba1329b..6873f13 100644 --- a/haproxy/service.ansible.yml +++ b/haproxy/service.ansible.yml @@ -1,6 +1,6 @@ - hosts: localhost tasks: - - name: Enable haproxy service + - name: "haproxy/service : Enable haproxy service" service: name: haproxy state: started diff --git a/migrations.ansible.yml b/migrations.ansible.yml index a26cf7a..2dc695a 100644 --- a/migrations.ansible.yml +++ b/migrations.ansible.yml @@ -1,12 +1,12 @@ - hosts: localhost tasks: - - name: Remove pterodactyl + - name: "migrations : Remove pterodactyl" package: state: absent name: - pterodactyl-panel-compose - pterodactyl-wings - - name: Remove Docker + - name: "migrations : Remove Docker" package: state: absent name: diff --git a/mysql/directory.ansible.yml b/mysql/directory.ansible.yml index e378714..a492f49 100644 --- a/mysql/directory.ansible.yml +++ b/mysql/directory.ansible.yml @@ -1,6 +1,6 @@ - hosts: localhost tasks: - - name: Create mysql directory + - name: "mysql/directory : Create mysql directory" file: path: /var/lib/mysql recurse: yes diff --git a/mysql/pkg.ansible.yml b/mysql/pkg.ansible.yml index 1a22931..95ebdd9 100644 --- a/mysql/pkg.ansible.yml +++ b/mysql/pkg.ansible.yml @@ -1,6 +1,6 @@ - hosts: localhost tasks: - - name: Install mariadb package + - name: "mysql/pkg : Install mariadb package" package: state: present name: @@ -8,5 +8,3 @@ - mariadb-client - mariadb-openrc - py3-mysqlclient - - \ No newline at end of file diff --git a/mysql/secure.ansible.yml b/mysql/secure.ansible.yml index 112b73d..0db4480 100644 --- a/mysql/secure.ansible.yml +++ b/mysql/secure.ansible.yml @@ -1,10 +1,10 @@ - hosts: localhost tasks: - - name: Test if mysql has been secured + - name: "mysql/secure : Test if mysql has been secured" stat: path: /var/lib/mysql/.secured register: MYSQL_SECURED_RESULT - - name: Set the root password + - name: "mysql/secure : Set the root password" mysql_user: user=root password="{{mysql_root_password}}" host="{{item}}" with_items: - 127.0.0.1 @@ -12,32 +12,32 @@ - localhost no_log: true when: not MYSQL_SECURED_RESULT.stat.exists - - name: Set root my.cnf + - name: "mysql/secure : Set root my.cnf" template: src: files/my.cnf.j2 dest: /root/.my.cnf owner: root group: root - mode: '0644' + mode: "0644" vars: MYSQL_ROOT_PASSWORD: "{{mysql_root_password}}" no_log: true - - name: Delete anonymous MySQL user + - name: "mysql/secure : Delete anonymous MySQL user" mysql_user: name="" host="{{item}}" state=absent with_items: - localhost - "{{ansible_nodename}}" no_log: true when: not MYSQL_SECURED_RESULT.stat.exists - - name: Delete Hostname based MySQL user + - name: "mysql/secure : Delete Hostname based MySQL user" mysql_user: user=root host="{{ansible_nodename}}" state=absent no_log: true when: not MYSQL_SECURED_RESULT.stat.exists - - name: Remove MySQL test database + - name: "mysql/secure : Remove MySQL test database" mysql_db: name=test state=absent no_log: true when: not MYSQL_SECURED_RESULT.stat.exists - - name: Create .secured lock file + - name: "mysql/secure : Create .secured lock file" file: state: touch path: /var/lib/mysql/.secured diff --git a/mysql/service.ansible.yml b/mysql/service.ansible.yml index 740b09f..8f46c80 100644 --- a/mysql/service.ansible.yml +++ b/mysql/service.ansible.yml @@ -1,11 +1,11 @@ - hosts: localhost tasks: - - name: Test if directory exists + - name: "mysql/service : Test if directory exists" stat: path: /var/lib/mysql/mysql register: MYSQL_DIRECTORY_RESULT ignore_errors: true - - name: MariaDB setup + - name: "mysql/service : Setup mariadb" shell: | /etc/init.d/mariadb setup when: not MYSQL_DIRECTORY_RESULT.stat.exists diff --git a/network/firewall.ansible.yml b/network/firewall.ansible.yml index 15ad7fe..72b1863 100644 --- a/network/firewall.ansible.yml +++ b/network/firewall.ansible.yml @@ -1,27 +1,27 @@ - hosts: localhost tasks: - - name: Install firewall packages + - name: "network/firewall : Install nftables packages" package: name: - nftables state: present - - name: Create firewall rules directory + - name: "network/firewall : Create nftables.d directory" file: state: directory path: /etc/nftables.d owner: root group: root - mode: '0755' - - name: Firewall rules + mode: "0755" + - name: "network/firewall : Firewall rules" template: src: files/firewall_rules.nft.j2 dest: /etc/nftables.d/noveria.nft owner: root group: root - mode: '0600' + mode: "0600" vars: ALLOWED_PORTS: [80, 443] - - name: Enable nftables service + - name: "network/firewall : Enable nftables service" service: name: nftables state: started diff --git a/network/init.ansible.yml b/network/init.ansible.yml index 9e67a8b..b698e07 100644 --- a/network/init.ansible.yml +++ b/network/init.ansible.yml @@ -2,14 +2,14 @@ - hosts: localhost tasks: - - name: Populate interfaces + - name: "network : Populate interfaces" template: src: files/network_interfaces dest: /etc/network/interfaces owner: root group: root mode: "0644" - - name: Enable networking service + - name: "network : Enable networking service" service: name: networking state: started diff --git a/openssh/config.ansible.yml b/openssh/config.ansible.yml index 246ba90..96c0100 100644 --- a/openssh/config.ansible.yml +++ b/openssh/config.ansible.yml @@ -1,20 +1,20 @@ - hosts: localhost tasks: - - name: Populate sshd_config + - name: "openssh/config : Populate sshd_config" template: src: files/openssh_sshd_config dest: /etc/ssh/sshd_config mode: "0644" owner: root group: root - - name: Configure root .ssh directory + - name: "openssh/config : Configure root .ssh directory" file: state: directory path: /root/.ssh mode: "0755" owner: root group: root - - name: Configure root authorized_keys + - name: "openssh/config : Configure root authorized_keys" template: src: files/openssh_authorized_keys dest: /root/.ssh/authorized_keys diff --git a/openssh/pkg.ansible.yml b/openssh/pkg.ansible.yml index 6c28129..9bf6ef3 100644 --- a/openssh/pkg.ansible.yml +++ b/openssh/pkg.ansible.yml @@ -1,6 +1,6 @@ - hosts: localhost tasks: - - name: Install openssh package + - name: "openssh/pkg : Install openssh-server package" package: state: present name: diff --git a/openssh/service.ansible.yml b/openssh/service.ansible.yml index 2f5600a..f41de60 100644 --- a/openssh/service.ansible.yml +++ b/openssh/service.ansible.yml @@ -1,11 +1,11 @@ - hosts: localhost tasks: - - name: Enable openssh service + - name: "openssh/service : Enable sshd service" service: name: sshd state: started enabled: true - - name: Require lo interface + - name: "openssh/service : Require networking service" lineinfile: state: present path: /etc/conf.d/sshd diff --git a/podman/directory.ansible.yml b/podman/directory.ansible.yml index 6637f3f..2646958 100644 --- a/podman/directory.ansible.yml +++ b/podman/directory.ansible.yml @@ -2,7 +2,7 @@ vars_files: - map.yml tasks: - - name: Create podman directory + - name: "podman/directory : Create podman directory" file: path: "{{ podman_dir }}" owner: puser diff --git a/podman/pkg.ansible.yml b/podman/pkg.ansible.yml index 907687b..6f44851 100644 --- a/podman/pkg.ansible.yml +++ b/podman/pkg.ansible.yml @@ -1,6 +1,6 @@ - hosts: localhost tasks: - - name: Install podman package + - name: "podman/pkg : Install required packages" package: state: present name: diff --git a/podman/rootless.ansible.yml b/podman/rootless.ansible.yml index d0c672d..f0cc36a 100644 --- a/podman/rootless.ansible.yml +++ b/podman/rootless.ansible.yml @@ -1,15 +1,15 @@ - hosts: localhost tasks: - - name: cgroup mode + - name: "podman/rootless : Set cgroup mode to unified" lineinfile: path: "/etc/rc.conf" regexp: "^rc_cgroup_mode.?=.?" line: rc_cgroup_mode="unified" - - name: cgroups service + - name: "podman/rootless : Enable cgroups service" service: name: cgroups enabled: true - - name: rootless modules + - name: "podman/rootless : Activate rootless modules" lineinfile: state: present path: /etc/modules @@ -18,13 +18,13 @@ tun fuse ip_tables - - name: subgid + - name: "podman/rootless : Set puser subgid" lineinfile: state: present path: /etc/subgid insertafter: EOF line: puser:100000:65536 - - name: subuid + - name: "podman/rootless : Set puser subuid" lineinfile: state: present path: /etc/subuid diff --git a/podman/service.ansible.yml b/podman/service.ansible.yml index 48363f3..4f31ab2 100644 --- a/podman/service.ansible.yml +++ b/podman/service.ansible.yml @@ -1,10 +1,10 @@ - hosts: localhost tasks: - - name: Enable podman service + - name: "podman/service : Enable podman service" service: name: podman enabled: true - - name: Podman unprivileged ports + - name: "podman/service : Podman unprivileged ports" template: src: files/files_unprivileged_ports dest: /etc/sysctl.d/podman.conf diff --git a/podman/user.ansible.yml b/podman/user.ansible.yml index 53dfb80..8b32a79 100644 --- a/podman/user.ansible.yml +++ b/podman/user.ansible.yml @@ -1,6 +1,6 @@ - hosts: localhost tasks: - - name: Create puser user + - name: "podman/user : Create puser user" user: uid: 2000 name: puser @@ -8,14 +8,14 @@ home: /home/puser password: "*" create_home: true - - name: puser .ssh dir + - name: "podman/user : Create puser .ssh dir" file: state: directory path: /home/puser/.ssh mode: "0755" owner: puser group: puser - - name: puser authorized_keys + - name: "podman/user : Add puser authorized_keys" template: src: ../openssh/files/openssh_authorized_keys dest: /home/puser/.ssh/authorized_keys diff --git a/system/ansible.ansible.yml b/system/ansible.ansible.yml index e954a4f..5f507cd 100644 --- a/system/ansible.ansible.yml +++ b/system/ansible.ansible.yml @@ -2,12 +2,12 @@ vars_files: - ../map.yml tasks: - - name: Install ansible packages + - name: "system/ansible : Install ansible packages" package: name: - ansible state: present - - name: Populate ansible config + - name: "system/ansible : Populate ansible config" template: src: files/ansible_config dest: /etc/ansible/ansible.cfg diff --git a/system/base.ansible.yml b/system/base.ansible.yml index 911f6a4..a62519c 100644 --- a/system/base.ansible.yml +++ b/system/base.ansible.yml @@ -2,7 +2,7 @@ vars_files: - ../map.yml tasks: - - name: Install base packages + - name: "system/base : Install base packages" package: state: present name: @@ -21,53 +21,53 @@ - screen - iproute2-ss - chrony - - name: Systemupdate script + - name: "system/base : Deploy systemupdate script" template: src: files/base_systemupdate dest: "{{ app_dir }}/systemupdate" owner: root group: root mode: "0755" - - name: Systemupdate bin-link + - name: "system/base : Create systemupdate symlink to bin" file: src: "{{ app_dir }}/systemupdate" dest: "{{ bin_dir }}/systemupdate" owner: root group: root state: link - - name: Enable modules Service + - name: "system/base : Enable modules Service" service: state: started name: modules enabled: true - - name: Tun permission service-file + - name: "system/base : Deploy tun permission service-file" template: src: files/base_tun-perm.initd dest: "/etc/init.d/tun-perm" owner: root group: root mode: "0755" - - name: Enable tun-perm service + - name: "system/base : Enable tun-perm service" service: state: started name: tun-perm enabled: true - - name: Enable sysctl service + - name: "system/base : Enable sysctl service" service: state: started name: sysctl enabled: true - - name: Enable syslog service + - name: "system/base : Enable syslog service" service: state: started name: syslog enabled: true - - name: Enable sysfs service + - name: "system/base : Enable sysfs service" service: state: started name: sysfs enabled: true - - name: Enable chrony-ntp service + - name: "system/base : Enable chrony-ntp service" service: state: started name: chronyd diff --git a/system/bootloader.ansible.yml b/system/bootloader.ansible.yml index 46d13d5..e0d13a4 100644 --- a/system/bootloader.ansible.yml +++ b/system/bootloader.ansible.yml @@ -2,7 +2,7 @@ vars_files: - ../map.yml tasks: - - name: Install bootloader pkgs + - name: "system/bootloader : Install grub, mkinitfs, efibootmgr" package: name: - grub @@ -11,22 +11,22 @@ - mkinitfs-doc - efibootmgr state: present - - name: Get current timestamp + - name: "system/bootloader : Get current timestamp" shell: | CURRENT_SUBVOLUME=$(LC_ALL=C btrfs sub show / | LC_ALL=C grep Name: | tr -d '[:space:]'); TIMESTAMP_FORMAT='[[:digit:]]{4}-[[:digit:]]{2}-[[:digit:]]{2}_[[:digit:]]{2}-[[:digit:]]{2}-[[:digit:]]{2}'; echo "$CURRENT_SUBVOLUME" | grep -Eo "$TIMESTAMP_FORMAT" register: CURRENT_SUBVOLUME_TIMESTAMP run_once: true - - name: Get current timestamp human + - name: "system/bootloader : Get current timestamp human" shell: | CURRENT_SUBVOLUME_TIMESTAMP='{{ CURRENT_SUBVOLUME_TIMESTAMP.stdout }}'; echo "${CURRENT_SUBVOLUME_TIMESTAMP:0:10} ${CURRENT_SUBVOLUME_TIMESTAMP:11:2}:${CURRENT_SUBVOLUME_TIMESTAMP:14:2}" register: CURRENT_SUBVOLUME_TIMESTAMP_HUMAN run_once: true - - name: Get current kernel version + - name: "system/bootloader : Get current kernel version" shell: | uname -r register: KERNEL_VERSION run_once: true - - name: mkinitfs config + - name: "system/bootloader : Add features to mkinitfs config" lineinfile: path: "/etc/mkinitfs/mkinitfs.conf" regexp: "^features.?=.?" @@ -34,7 +34,7 @@ owner: root group: root mode: "0644" - - name: os-release file + - name: "system/bootloader : Generate os-release file" template: src: files/bootloader_os-release.j2 dest: "/etc/os-release" @@ -44,14 +44,14 @@ vars: OS_VERSION: "{{ release_version }}" OS_RELEASE_INFO: '"Timestamp: {{ CURRENT_SUBVOLUME_TIMESTAMP_HUMAN.stdout }} | Kernel: {{ KERNEL_VERSION.stdout }}"' - - name: Motd Directory + - name: "system/bootloader : Create motd directory" file: name: /etc/motd.d owner: root group: root mode: "0755" state: directory - - name: Motd + - name: "system/bootloader : Place Noveria motd file in motd directory" template: src: files/bootloader_00_noveria.motd.j2 dest: /etc/motd.d/00_noveria.motd @@ -62,7 +62,7 @@ OS_NAME: "Novos {{ release_version }}" OS_RELEASE_INFO: "Timestamp: {{ CURRENT_SUBVOLUME_TIMESTAMP_HUMAN.stdout }} | Kernel: {{ KERNEL_VERSION.stdout }}" OS_ISSUE_URL: "https://git.noveria.org/Novos/ISO/issues" - - name: Issue + - name: "system/bootloader : Place issue file" template: src: files/bootloader_issue.j2 dest: /etc/issue diff --git a/system/disks.ansible.yml b/system/disks.ansible.yml index 6d280ae..4043253 100644 --- a/system/disks.ansible.yml +++ b/system/disks.ansible.yml @@ -2,43 +2,43 @@ vars_files: - ../map.yml tasks: - - name: Install Disks packages + - name: "system/disks : Install required filesystem packages" package: name: - btrfs-progs state: present - - name: Append btrfs module + - name: "system/disks : Append btrfs module" lineinfile: state: present path: /etc/modules insertafter: EOF line: btrfs - - name: Btrfs mount permission + - name: "system/disks : Set correct /btrfs permissions" file: path: "/btrfs" owner: root group: root - mode: '0755' + mode: "0755" state: directory - - name: Get ROOT_UUID + - name: "system/disks : Get ROOT_UUID" shell: | lsblk -o LABEL,UUID | grep ROOT | awk '{print $2}' register: root_uuid run_once: true - - name: Get ESP_UUID + - name: "system/disks : Get ESP_UUID" shell: | lsblk -o LABEL,UUID | grep EFI | awk '{print $2}' register: esp_uuid run_once: true - - name: Deploy fstab + - name: "system/disks : Deploy fstab" template: src: files/disks_fstab.j2 dest: /etc/fstab owner: root group: root - mode: '0644' + mode: "0644" vars: - ROOT_UUID: '{{ root_uuid.stdout }}' - ESP_UUID: '{{ esp_uuid.stdout }}' - TIMESTAMP: '{{ start_timestamp }}' - TMPFS_SIZE: '{{ tmpfs_size }}' + ROOT_UUID: "{{ root_uuid.stdout }}" + ESP_UUID: "{{ esp_uuid.stdout }}" + TIMESTAMP: "{{ start_timestamp }}" + TMPFS_SIZE: "{{ tmpfs_size }}" diff --git a/system/repositories.ansible.yml b/system/repositories.ansible.yml index db6eeaf..5a4732f 100644 --- a/system/repositories.ansible.yml +++ b/system/repositories.ansible.yml @@ -1,12 +1,12 @@ - hosts: localhost tasks: - - name: Add noveria repository + - name: "system/repositories : Add noveria repository" lineinfile: state: present path: "/etc/apk/repositories" insertafter: EOF line: https://alpine.noveria.org/v3.21/noveria - - name: Get noveria repo pubkey + - name: "system/repositories : Get noveria repo pubkey" get_url: url: "https://alpine.noveria.org/alpine@noveria.org.pub" dest: /etc/apk/keys diff --git a/system/shell.ansible.yml b/system/shell.ansible.yml index d576643..e762a54 100644 --- a/system/shell.ansible.yml +++ b/system/shell.ansible.yml @@ -2,19 +2,19 @@ vars_files: - ../map.yml tasks: - - name: Install shell base-packages + - name: "system/shell : Install packages" package: name: - zsh - alpine-zsh-config - bash state: present - - name: Populate shell profile + - name: "system/shell : Populate shell profile" template: src: files/shell_profile.j2 dest: /etc/profile owner: root group: root - mode: '0644' + mode: "0644" vars: CUSTOM_BIN: "{{ bin_dir }}" diff --git a/system/user.ansible.yml b/system/user.ansible.yml index adec49f..69cc8c8 100644 --- a/system/user.ansible.yml +++ b/system/user.ansible.yml @@ -2,14 +2,14 @@ vars_files: - ../map.yml tasks: - - name: Create Noveria user + - name: "system/user : Create noveria user" user: uid: 1000 name: noveria shell: /bin/false home: /home/noveria - password: '*' - - name: Edit root user + password: "*" + - name: "system/user : Edit root user" user: name: root shell: /bin/zsh