--- # Deprecation # =========== - name: Drop deprecated directories and files ansible.builtin.file: path: "{{ item }}" state: absent with_items: - "/etc/pip_check_requirements_upgrades-py3" - "/var/lib/pipreqcheck/virtualenv-py3" - "/etc/cron.d/check_pip_requirements-py3" - name: Drop deprecated packages ansible.builtin.apt: name: - ntp - ntpdate state: absent purge: true # Main implementation # =================== - name: Enable use of proxy for retrieving system packages via apt ansible.builtin.template: src: "apt_proxy.j2" dest: "/etc/apt/apt.conf.d/00proxy" owner: root group: root mode: "0644" when: apt_proxy is defined - name: Disable use of proxy for retrieving system packages via apt ansible.builtin.file: path: "/etc/apt/apt.conf.d/00proxy" state: absent when: apt_proxy is undefined - name: Deploy pam-auth-update configuration file for enabling pam_umask ansible.builtin.copy: src: "pam_umask" dest: "/usr/share/pam-configs/umask" owner: root group: root mode: "0644" register: pam_umask notify: - Update PAM configuration - name: Update PAM configuration # noqa no-handler # [no-handler] Tasks that run when changed should likely be handlers # In order to have consistent behaviour during the first and # subsequent playbook runs, make sure the PAM configuration is # updated immediatelly. This way any files created by commands etc # should end-up with correct permissions straight away. ansible.builtin.command: "/usr/sbin/pam-auth-update --package" when: pam_umask.changed changed_when: true # Always results in change due to task logic. - name: Set login UMASK ansible.builtin.lineinfile: dest: "/etc/login.defs" state: present backrefs: true regexp: '^UMASK(\s+)' line: 'UMASK\g<1>027' - name: Set home directory mask ansible.builtin.lineinfile: dest: "/etc/adduser.conf" state: present backrefs: true regexp: '^\s*#?\s*DIR_MODE=' line: 'DIR_MODE=0750' - name: Deploy bash profile configuration for fancier prompts ansible.builtin.template: src: "bash_prompt.sh.j2" dest: "/etc/profile.d/bash_prompt.sh" owner: root group: root mode: "0644" - name: Deploy profile configuration that allows for user-specific profile.d files ansible.builtin.copy: src: "user_profile_d.sh" dest: "/etc/profile.d/z99-user_profile_d.sh" owner: root group: root mode: "0644" - name: Replace default and skeleton bashrc ansible.builtin.copy: src: "{{ item.key }}" dest: "{{ item.value }}" owner: root group: root mode: "0644" with_dict: bashrc: "/etc/bash.bashrc" skel_bashrc: "/etc/skel/.bashrc" - name: Calculate stock checksum for bashrc root account ansible.builtin.stat: path: "/root/.bashrc" register: root_bashrc_stat - name: Replace stock bashrc for root account with skeleton one ansible.builtin.copy: src: "skel_bashrc" dest: "/root/.bashrc" owner: root group: root mode: "0640" # Checksums: bookworm when: | root_bashrc_stat.stat.checksum == "1a422a148ad225aa5ba33f8dafd2b7cfcdbd701f" - name: Install sudo ansible.builtin.apt: name: sudo state: present - name: Install ssl-cert package ansible.builtin.apt: name: ssl-cert state: present - name: Install common packages ansible.builtin.apt: name: "{{ common_packages }}" state: "present" - name: Disable electric-indent-mode for Emacs by default for all users ansible.builtin.copy: src: "01disable-electric-indent-mode.el" dest: "/etc/emacs/site-start.d/01disable-electric-indent-mode.el" owner: root group: root mode: "0644" when: "['emacs24', 'emacs24-nox', 'emacs25', 'emacs25-nox', 'emacs', 'emacs-nox'] | intersect(common_packages) | length > 0" - name: Set-up operating system groups ansible.builtin.group: name: "{{ item.name }}" gid: "{{ item.gid | default(omit) }}" state: present with_items: "{{ os_groups }}" - name: Set-up operating system user groups ansible.builtin.group: name: "{{ item.name }}" gid: "{{ item.uid | default(omit) }}" state: present with_items: "{{ os_users }}" - name: Set-up operating system users ansible.builtin.user: name: "{{ item.name }}" uid: "{{ item.uid | default(omit) }}" group: "{{ item.name }}" groups: "{{ ','.join(item.additional_groups | default([])) }}" append: true shell: /bin/bash state: present password: "{{ item.password | default('!') }}" update_password: on_create with_items: "{{ os_users }}" - name: Set-up authorised keys ansible.posix.authorized_key: user: "{{ item.0.name }}" key: "{{ item.1 }}" with_subelements: - "{{ os_users | selectattr('authorized_keys', 'defined') | list }}" - authorized_keys - name: Disable remote logins for root ansible.builtin.lineinfile: dest: "/etc/ssh/sshd_config" state: present regexp: "^PermitRootLogin" line: "PermitRootLogin no" notify: - Restart SSH - name: Disable remote login authentication via password ansible.builtin.lineinfile: dest: "/etc/ssh/sshd_config" state: present regexp: "^PasswordAuthentication" line: "PasswordAuthentication no" notify: - Restart SSH - name: Deploy CA certificates ansible.builtin.copy: content: "{{ item.value }}" dest: "/usr/local/share/ca-certificates/{{ item.key }}.crt" owner: root group: root mode: "0644" with_dict: "{{ ca_certificates }}" register: deploy_ca_certificates_result - name: Update CA certificate cache # noqa no-handler # [no-handler] Tasks that run when changed should likely be handlers # CA certificate cache must be updated immediatelly in order for # applications depending on deployed CA certificates can use them to # validate server/client certificates. ansible.builtin.command: "/usr/sbin/update-ca-certificates --fresh" when: deploy_ca_certificates_result.changed changed_when: true # Always results in change due to task logic. - name: Set-up file diversions for custom files that overrride package-provided ones ansible.builtin.command: "dpkg-divert --divert '{{ item }}.original' --rename '{{ item }}'" register: "dpkg_divert" changed_when: "'Adding' in dpkg_divert.stdout" with_items: - "/usr/sbin/ferm" notify: - Restart ferm - name: Deploy the patched ferm binary that disables use of legacy iptables ansible.builtin.copy: src: ferm_binary dest: /usr/sbin/ferm owner: root group: root mode: "0755" notify: - Restart ferm - name: Install ferm (for firewall management) ansible.builtin.apt: name: ferm state: present - name: Configure ferm init script coniguration file ansible.builtin.copy: src: "ferm_default" dest: "/etc/default/ferm" owner: root group: root mode: "0644" notify: - Restart ferm - name: Create directory for storing ferm configuration files ansible.builtin.file: dest: "/etc/ferm/conf.d/" state: directory owner: root group: root mode: "0750" - name: Deploy main ferm configuration file ansible.builtin.copy: src: "ferm.conf" dest: "/etc/ferm/ferm.conf" owner: root group: root mode: "0640" notify: - Restart ferm - name: Verify maintenance_allowed_sources parameter ansible.builtin.fail: msg: "Items in maintenance_allowed_sources must IPv4/IPv6 addresses or subnets: {{ item }}" when: "not (item is ansible.utils.ipv4_address or item is ansible.utils.ipv6_address)" with_items: "{{ maintenance_allowed_sources }}" - name: Deploy ferm base rules ansible.builtin.template: src: "00-base.conf.j2" dest: "/etc/ferm/conf.d/00-base.conf" owner: root group: root mode: "0640" notify: - Restart ferm - name: Enable and start ferm ansible.builtin.service: name: ferm state: started enabled: true - name: Deploy script for flushing legacy iptables rules ansible.builtin.copy: src: "legacy_iptables_rules.sh" dest: "/usr/local/sbin/drop_legacy_iptables_rules.sh" owner: root group: root mode: "0755" - name: Drop legacy iptables rules ansible.builtin.command: "/usr/local/sbin/drop_legacy_iptables_rules.sh remove" register: legacy_iptables_rules changed_when: "'Removed legacy iptables for families' in legacy_iptables_rules.stdout" notify: - Restart ferm - name: Deploy script for validating server certificates ansible.builtin.copy: src: "check_certificate.sh" dest: "/usr/local/bin/check_certificate.sh" owner: root group: root mode: "0755" - name: Set-up directory for holding configuration for certificate validation script ansible.builtin.file: path: "/etc/check_certificate" state: "directory" owner: root group: root mode: "0755" - name: Deploy crontab entry for checking certificates ansible.builtin.cron: name: "check_certificate" cron_file: "check_certificate" hour: "0" minute: "0" job: "/usr/local/bin/check_certificate.sh -q expiration" state: present user: nobody - name: Install apticron (for checking available upgrades) ansible.builtin.apt: name: apticron state: present # It would be too much hassle to detect changed state, so just ignore it. - name: Preventively run apticron to avoid issues with locking ansible.builtin.command: /usr/sbin/apticron --cron changed_when: false # Implementation for checking pip requirements files via via pip-tools. - name: Install packages required for running pip requirements checks ansible.builtin.apt: name: - python3-setuptools - virtualenv state: present - name: Create dedicated group for user running pip requirements checks ansible.builtin.group: name: "pipreqcheck" gid: "{{ pipreqcheck_gid | default(omit) }}" state: present - name: Create user for running pip requirements checks ansible.builtin.user: name: "pipreqcheck" uid: "{{ pipreqcheck_uid | default(omit) }}" group: "pipreqcheck" home: "/var/lib/pipreqcheck" state: present - name: Retrieve system Python interpreter version ansible.builtin.command: argv: - "/usr/bin/python3" - "-c" - "import sys; print(sys.version.split(' ')[0])" changed_when: false register: python_interpreter_version - name: Retrieve virtual environment Python interpreter version (if initialised) ansible.builtin.command: argv: - "/var/lib/pipreqcheck/virtualenv/bin/python" - "-c" - "import sys; print(sys.version.split(' ')[0])" become: true become_user: "pipreqcheck" # Virtual environment perhaps does not exist. failed_when: false changed_when: false register: virtualenv_python_version - name: Retrieve virtual environment prompt ansible.builtin.command: argv: - "bash" - "-c" - "source '/var/lib/pipreqcheck/virtualenv/bin/activate'; printenv PS1" become: true become_user: "pipreqcheck" failed_when: false changed_when: false register: current_virtualenv_prompt - name: Remove virtual environment in case of mismatches ansible.builtin.file: path: "/var/lib/pipreqcheck/virtualenv" state: absent when: | virtualenv_python_version.rc != 0 or virtualenv_python_version.stdout.strip() != python_interpreter_version.stdout.strip() or current_virtualenv_prompt.stdout != "(pipreqcheck) " - name: Create directory for Python virtual environment used for installing/running pip-tools ansible.builtin.file: path: "{{ item }}" state: directory owner: pipreqcheck group: pipreqcheck mode: "0750" with_items: - "/var/lib/pipreqcheck" - "/var/lib/pipreqcheck/virtualenv" - name: Create Python virtual environment used for installing/running pip-tools ansible.builtin.command: "/usr/bin/virtualenv --python '{{ item.python_path }}' --prompt '{{ item.virtualenv_prompt }}' '{{ item.virtualenv_path }}'" args: creates: "{{ item.creates }}" become: true become_user: "pipreqcheck" with_items: - name: pipreqcheck virtualenv_path: "/var/lib/pipreqcheck/virtualenv" virtualenv_prompt: "pipreqcheck" python_path: "/usr/bin/python3" creates: "/var/lib/pipreqcheck/virtualenv/bin/python3" - name: Create directory for storing pip requirements files ansible.builtin.file: path: "{{ item }}" state: "directory" owner: root group: pipreqcheck mode: "0750" with_items: - "/etc/pip_check_requirements_upgrades" - name: Set-up directory for storing pip requirements file for pip-tools virtual environment itself ansible.builtin.file: path: "{{ item }}" state: "directory" owner: root group: pipreqcheck mode: "0750" with_items: - "/etc/pip_check_requirements_upgrades/pipreqcheck" - name: Deploy .in file for pip requirements in pip-tools virtual environment ansible.builtin.template: src: "pipreqcheck_requirements.in.j2" dest: "{{ item.path }}" owner: root group: pipreqcheck mode: "0640" with_items: - path: "/etc/pip_check_requirements_upgrades/pipreqcheck/requirements.in" requirements: "{{ pip_check_requirements_in }}" - name: Deploy requirements file for pipreqcheck virtual environment ansible.builtin.template: src: "pipreqcheck_requirements.txt.j2" dest: "{{ item.file }}" owner: root group: pipreqcheck mode: "0640" with_items: - file: "/etc/pip_check_requirements_upgrades/pipreqcheck/requirements.txt" requirements: "{{ pip_check_requirements }}" - name: Install requirements in the pipreqcheck virtual environment ansible.builtin.pip: requirements: "{{ item.requirements }}" virtualenv: "{{ item.virtualenv }}" become: true become_user: pipreqcheck with_items: - virtualenv: "~pipreqcheck/virtualenv" requirements: "/etc/pip_check_requirements_upgrades/pipreqcheck/requirements.txt" - name: Synchronise pip-tools virtual environment via deployed requirements file ansible.builtin.shell: "source ~pipreqcheck/virtualenv/bin/activate && pip-sync /etc/pip_check_requirements_upgrades/pipreqcheck/requirements.txt" args: executable: /bin/bash become: true become_user: "pipreqcheck" register: pipreqcheck_pip_sync changed_when: "pipreqcheck_pip_sync.stdout != 'Everything up-to-date'" - name: Deploy script for checking available upgrades ansible.builtin.copy: src: "pip_check_requirements_upgrades.sh" dest: "/usr/local/bin/pip_check_requirements_upgrades.sh" owner: root group: root mode: "0755" - name: Deploy crontab entry for checking pip requirements ansible.builtin.copy: src: "cron_check_pip_requirements" dest: "/etc/cron.d/check_pip_requirements" owner: root group: root mode: "0644" - name: Install NTP packages ansible.builtin.apt: name: - ntpsec - ntpsec-ntpdate state: present when: ntp_pools | length > 0 - name: Remove NTP packages ansible.builtin.apt: name: - ntpsec - ntpsec-ntpdate state: absent purge: true when: ntp_pools | length == 0 - name: Deploy NTP configuration ansible.builtin.template: src: "ntp.conf.j2" dest: "/etc/ntpsec/ntp.conf" owner: root group: root mode: "0644" when: ntp_pools | length > 0 notify: - Restart NTP server - name: Explicitly run all handlers ansible.builtin.include_tasks: ../handlers/main.yml when: "run_handlers | default(False) | bool()" tags: - handlers