From 26354d1a86125b4a2cdc73eb3a614748ff30b28c Mon Sep 17 00:00:00 2001 From: Tom Alexander Date: Fri, 2 Dec 2022 20:39:52 -0500 Subject: [PATCH] Start a jail_nat_dhcp role for the nat_dhcp jail. --- ansible/environments/jail/host_vars/nat_dhcp | 0 ansible/environments/jail/hosts | 2 ++ ansible/playbook.yaml | 8 ++++- ansible/roles/blank/tasks/common.yaml | 1 + ansible/roles/jail_nat_dhcp/tasks/common.yaml | 15 ++++++++++ .../roles/jail_nat_dhcp/tasks/freebsd.yaml | 5 ++++ ansible/roles/jail_nat_dhcp/tasks/linux.yaml | 21 ++++++++++++++ ansible/roles/jail_nat_dhcp/tasks/main.yaml | 2 ++ .../roles/jail_nat_dhcp/tasks/peruser.yaml | 29 +++++++++++++++++++ .../jail_nat_dhcp/tasks/peruser_freebsd.yaml | 0 .../jail_nat_dhcp/tasks/peruser_linux.yaml | 0 ansible/run.bash | 2 ++ 12 files changed, 84 insertions(+), 1 deletion(-) create mode 100644 ansible/environments/jail/host_vars/nat_dhcp create mode 100644 ansible/environments/jail/hosts create mode 100644 ansible/roles/jail_nat_dhcp/tasks/common.yaml create mode 100644 ansible/roles/jail_nat_dhcp/tasks/freebsd.yaml create mode 100644 ansible/roles/jail_nat_dhcp/tasks/linux.yaml create mode 100644 ansible/roles/jail_nat_dhcp/tasks/main.yaml create mode 100644 ansible/roles/jail_nat_dhcp/tasks/peruser.yaml create mode 100644 ansible/roles/jail_nat_dhcp/tasks/peruser_freebsd.yaml create mode 100644 ansible/roles/jail_nat_dhcp/tasks/peruser_linux.yaml diff --git a/ansible/environments/jail/host_vars/nat_dhcp b/ansible/environments/jail/host_vars/nat_dhcp new file mode 100644 index 0000000..e69de29 diff --git a/ansible/environments/jail/hosts b/ansible/environments/jail/hosts new file mode 100644 index 0000000..af5f04e --- /dev/null +++ b/ansible/environments/jail/hosts @@ -0,0 +1,2 @@ +[jail] +nat_dhcp ansible_connection=jail diff --git a/ansible/playbook.yaml b/ansible/playbook.yaml index 2fb843d..623a887 100644 --- a/ansible/playbook.yaml +++ b/ansible/playbook.yaml @@ -1,4 +1,4 @@ -- hosts: all +- hosts: all:!jail vars: ansible_become: True roles: @@ -32,3 +32,9 @@ - media - kubernetes - google_cloud_sdk + +- hosts: nat_dhcp + vars: + ansible_become: True + roles: + - jail_nat_dhcp diff --git a/ansible/roles/blank/tasks/common.yaml b/ansible/roles/blank/tasks/common.yaml index d7c1735..fef1101 100644 --- a/ansible/roles/blank/tasks/common.yaml +++ b/ansible/roles/blank/tasks/common.yaml @@ -9,6 +9,7 @@ apply: become: yes become_user: "{{ initialize_user }}" + when: users is defined loop: "{{ users | dict2items | community.general.json_query('[?value.initialize==`true`].key') }}" loop_control: loop_var: initialize_user diff --git a/ansible/roles/jail_nat_dhcp/tasks/common.yaml b/ansible/roles/jail_nat_dhcp/tasks/common.yaml new file mode 100644 index 0000000..fef1101 --- /dev/null +++ b/ansible/roles/jail_nat_dhcp/tasks/common.yaml @@ -0,0 +1,15 @@ +- import_tasks: tasks/freebsd.yaml + when: 'os_flavor == "freebsd"' + +- import_tasks: tasks/linux.yaml + when: 'os_flavor == "linux"' + +- include_tasks: + file: tasks/peruser.yaml + apply: + become: yes + become_user: "{{ initialize_user }}" + when: users is defined + loop: "{{ users | dict2items | community.general.json_query('[?value.initialize==`true`].key') }}" + loop_control: + loop_var: initialize_user diff --git a/ansible/roles/jail_nat_dhcp/tasks/freebsd.yaml b/ansible/roles/jail_nat_dhcp/tasks/freebsd.yaml new file mode 100644 index 0000000..b417174 --- /dev/null +++ b/ansible/roles/jail_nat_dhcp/tasks/freebsd.yaml @@ -0,0 +1,5 @@ +# - name: Install packages +# package: +# name: +# - foo +# state: present diff --git a/ansible/roles/jail_nat_dhcp/tasks/linux.yaml b/ansible/roles/jail_nat_dhcp/tasks/linux.yaml new file mode 100644 index 0000000..429ad91 --- /dev/null +++ b/ansible/roles/jail_nat_dhcp/tasks/linux.yaml @@ -0,0 +1,21 @@ +# - name: Build aur packages +# register: buildaur +# become_user: "{{ build_user.name }}" +# command: "aurutils-sync --no-view {{ item }}" +# args: +# creates: "/var/cache/pacman/custom/{{ item }}-*.pkg.tar.*" +# loop: +# - foo + +# - name: Update cache +# when: buildaur.changed +# pacman: +# name: [] +# state: present +# update_cache: true + +# - name: Install packages +# package: +# name: +# - foo +# state: present diff --git a/ansible/roles/jail_nat_dhcp/tasks/main.yaml b/ansible/roles/jail_nat_dhcp/tasks/main.yaml new file mode 100644 index 0000000..6805b9d --- /dev/null +++ b/ansible/roles/jail_nat_dhcp/tasks/main.yaml @@ -0,0 +1,2 @@ +- import_tasks: tasks/common.yaml + # when: foo is defined diff --git a/ansible/roles/jail_nat_dhcp/tasks/peruser.yaml b/ansible/roles/jail_nat_dhcp/tasks/peruser.yaml new file mode 100644 index 0000000..111e886 --- /dev/null +++ b/ansible/roles/jail_nat_dhcp/tasks/peruser.yaml @@ -0,0 +1,29 @@ +- include_role: + name: per_user + +# - name: Create directories +# file: +# name: "{{ account_homedir.stdout }}/{{ item }}" +# state: directory +# mode: 0700 +# owner: "{{ account_name.stdout }}" +# group: "{{ group_name.stdout }}" +# loop: +# - ".config/foo" + +# - name: Copy files +# copy: +# src: "files/{{ item.src }}" +# dest: "{{ account_homedir.stdout }}/{{ item.dest }}" +# mode: 0600 +# owner: "{{ account_name.stdout }}" +# group: "{{ group_name.stdout }}" +# loop: +# - src: foo.conf +# dest: .config/foo/foo.conf + +- import_tasks: tasks/peruser_freebsd.yaml + when: 'os_flavor == "freebsd"' + +- import_tasks: tasks/peruser_linux.yaml + when: 'os_flavor == "linux"' diff --git a/ansible/roles/jail_nat_dhcp/tasks/peruser_freebsd.yaml b/ansible/roles/jail_nat_dhcp/tasks/peruser_freebsd.yaml new file mode 100644 index 0000000..e69de29 diff --git a/ansible/roles/jail_nat_dhcp/tasks/peruser_linux.yaml b/ansible/roles/jail_nat_dhcp/tasks/peruser_linux.yaml new file mode 100644 index 0000000..e69de29 diff --git a/ansible/run.bash b/ansible/run.bash index 39403f3..8e33196 100755 --- a/ansible/run.bash +++ b/ansible/run.bash @@ -22,6 +22,8 @@ elif [ "$target" = "odolinux" ]; then ansible-playbook -v -i environments/laptop playbook.yaml --diff --limit odolinux "${@}" elif [ "$target" = "odofreebsd" ]; then ansible-playbook -v -i environments/laptop playbook.yaml --diff --limit odofreebsd "${@}" +elif [ "$target" = "jail_nat_dhcp" ]; then + ansible-playbook -v -i environments/jail playbook.yaml --diff --limit nat_dhcp "${@}" else die 1 "Unrecognized target" fi