matrix-docker-ansible-deploy/roles/matrix-awx/tasks/customise_website_access_export.yml

230 lines
7.4 KiB
YAML
Raw Normal View History

2021-02-20 10:19:17 +01:00
- name: Enable index.html creation if user doesn't wish to customise base domain
delegate_to: 127.0.0.1
lineinfile:
path: '/var/lib/awx/projects/clients/{{ member_id }}/{{ subscription_id }}/matrix_vars.yml'
regexp: "^#? *{{ item.key | regex_escape() }}:"
line: "{{ item.key }}: {{ item.value }}"
insertafter: '# Base Domain Settings'
with_dict:
'matrix_nginx_proxy_base_domain_homepage_enabled': 'true'
when: customise_base_domain_website|bool == false
- name: Disable index.html creation to allow multi-file site if user does wish to customise base domain
delegate_to: 127.0.0.1
lineinfile:
path: '/var/lib/awx/projects/clients/{{ member_id }}/{{ subscription_id }}/matrix_vars.yml'
regexp: "^#? *{{ item.key | regex_escape() }}:"
line: "{{ item.key }}: {{ item.value }}"
insertafter: '# Base Domain Settings'
with_dict:
'matrix_nginx_proxy_base_domain_homepage_enabled': 'false'
when: customise_base_domain_website|bool == true
2021-03-16 08:56:29 +01:00
2021-02-28 15:21:40 +01:00
- name: Record custom 'Customise Website + Access Export' variables locally on AWX
2021-02-20 10:19:17 +01:00
delegate_to: 127.0.0.1
lineinfile:
path: '/var/lib/awx/projects/clients/{{ member_id }}/{{ subscription_id }}/matrix_vars.yml'
regexp: "^#? *{{ item.key | regex_escape() }}:"
line: "{{ item.key }}: {{ item.value }}"
2021-02-28 15:21:40 +01:00
insertafter: '# Custom Settings'
2021-02-20 10:19:17 +01:00
with_dict:
'customise_base_domain_website': '{{ customise_base_domain_website }}'
2021-02-28 15:21:40 +01:00
'sftp_auth_method': '"{{ sftp_auth_method }}"'
'sftp_password': '"{{ sftp_password }}"'
'sftp_public_key': '"{{ sftp_public_key }}"'
2021-03-16 08:56:29 +01:00
2021-02-20 10:19:17 +01:00
- name: Copy new 'matrix_vars.yml' to target machine
copy:
src: '/var/lib/awx/projects/clients/{{ member_id }}/{{ subscription_id }}/matrix_vars.yml'
dest: '/matrix/awx/matrix_vars.yml'
mode: '0660'
- name: Reload vars in matrix_vars.yml
include_vars:
file: '/var/lib/awx/projects/clients/{{ member_id }}/{{ subscription_id }}/matrix_vars.yml'
2021-02-28 15:21:40 +01:00
no_log: True
2021-02-20 10:19:17 +01:00
2021-02-28 15:21:40 +01:00
- name: Save new 'Customise Website + Access Export' survey.json to the AWX tower, template
2021-02-20 10:19:17 +01:00
delegate_to: 127.0.0.1
template:
2021-02-28 15:21:40 +01:00
src: './roles/matrix-awx/surveys/configure_website_access_export.json.j2'
dest: '/var/lib/awx/projects/clients/{{ member_id }}/{{ subscription_id }}/configure_website_access_export.json'
2021-02-20 10:19:17 +01:00
2021-02-28 15:21:40 +01:00
- name: Copy new 'Customise Website + Access Export' survey.json to target machine
2021-02-20 10:19:17 +01:00
copy:
2021-02-28 15:21:40 +01:00
src: '/var/lib/awx/projects/clients/{{ member_id }}/{{ subscription_id }}/configure_website_access_export.json'
dest: '/matrix/awx/configure_website_access_export.json'
2021-02-20 10:19:17 +01:00
mode: '0660'
- name: Collect AWX admin token the hard way!
delegate_to: 127.0.0.1
shell: |
curl -sku {{ tower_username }}:{{ tower_password }} -H "Content-Type: application/json" -X POST -d '{"description":"Tower CLI", "application":null, "scope":"write"}' https://{{ tower_host }}/api/v2/users/1/personal_tokens/ | jq '.token' | sed -r 's/\"//g'
register: tower_token
no_log: True
2021-02-28 15:21:40 +01:00
- name: Recreate 'Customise Base Domain Export' job template
2021-02-20 10:19:17 +01:00
delegate_to: 127.0.0.1
awx.awx.tower_job_template:
2021-02-28 15:21:40 +01:00
name: "{{ matrix_domain }} - 1 - Configure Website + Access Export"
description: "Configure base domain website settings and access the servers export."
2021-02-20 10:19:17 +01:00
extra_vars: "{{ lookup('file', '/var/lib/awx/projects/clients/{{ member_id }}/{{ subscription_id }}/extra_vars.json') }}"
job_type: run
job_tags: "start,setup-nginx-proxy"
inventory: "{{ member_id }}"
project: "{{ member_id }} - Matrix Docker Ansible Deploy"
playbook: setup.yml
credential: "{{ member_id }} - AWX SSH Key"
survey_enabled: true
2021-02-28 15:21:40 +01:00
survey_spec: "{{ lookup('file', '/var/lib/awx/projects/clients/{{ member_id }}/{{ subscription_id }}/configure_website_access_export.json') }}"
2021-02-20 10:19:17 +01:00
become_enabled: yes
state: present
verbosity: 1
tower_host: "https://{{ tower_host }}"
tower_oauthtoken: "{{ tower_token.stdout }}"
validate_certs: yes
- name: Ensure group "sftp" exists
group:
name: sftp
state: present
2021-02-28 15:21:40 +01:00
- name: If user doesn't define a sftp_password, create a disabled 'sftp' account
2021-02-20 10:19:17 +01:00
user:
name: sftp
2021-02-28 15:21:40 +01:00
comment: SFTP user to set custom web files and access servers export
2021-02-20 10:19:17 +01:00
shell: /bin/false
2021-02-28 15:21:40 +01:00
home: /home/sftp
2021-02-20 10:19:17 +01:00
group: sftp
2021-02-28 15:21:40 +01:00
password: '*'
2021-02-20 10:19:17 +01:00
update_password: always
2021-02-28 15:21:40 +01:00
when: sftp_password|length == 0
2021-02-20 10:19:17 +01:00
2021-02-28 15:21:40 +01:00
- name: If user defines sftp_password, enable account and set password on 'stfp' account
user:
name: sftp
comment: SFTP user to set custom web files and access servers export
shell: /bin/false
home: /home/sftp
group: sftp
password: "{{ sftp_password | password_hash('sha512') }}"
update_password: always
when: sftp_password|length > 0
2021-02-20 10:19:17 +01:00
- name: adding existing user 'sftp' to group matrix
user:
name: sftp
groups: matrix
append: yes
- name: Create the ro /chroot directory with sticky bit if it doesn't exist. (/chroot/website has matrix:matrix permissions and is mounted to nginx container)
file:
path: /chroot
state: directory
owner: root
group: root
mode: '1755'
2021-02-28 15:21:40 +01:00
- name: Ensure /chroot/website location exists.
2021-02-20 10:19:17 +01:00
file:
path: /chroot/website
state: directory
owner: matrix
group: matrix
mode: '0574'
2021-02-28 15:21:40 +01:00
- name: Ensure /chroot/export location exists
2021-02-20 10:19:17 +01:00
file:
2021-02-28 15:21:40 +01:00
path: /chroot/export
2021-02-20 10:19:17 +01:00
state: directory
owner: sftp
group: sftp
mode: '0700'
2021-02-28 15:21:40 +01:00
- name: Ensure /home/sftp/.ssh location exists
file:
path: /home/sftp/.ssh
state: directory
owner: sftp
group: sftp
mode: '0700'
- name: Ensure /home/sftp/authorized_keys exists
file:
path: /home/sftp/.ssh/authorized_keys
state: touch
owner: sftp
group: sftp
mode: '0644'
- name: Clear authorized_keys file
shell: echo "" > /home/sftp/.ssh/authorized_keys
2021-02-20 10:19:17 +01:00
2021-02-28 15:21:40 +01:00
- name: Insert public SSH key into authorized_keys file
lineinfile:
path: /home/sftp/.ssh/authorized_keys
line: "{{ sftp_public_key }}"
owner: sftp
group: sftp
mode: '0644'
when: (sftp_public_key | length > 0) and (sftp_auth_method == "SSH Key")
2021-03-16 08:56:29 +01:00
2021-02-28 15:21:40 +01:00
- name: Alter SSH Subsystem State 1
lineinfile:
path: /etc/ssh/sshd_config
line: "Subsystem sftp /usr/lib/openssh/sftp-server"
state: absent
- name: Alter SSH Subsystem State 2
lineinfile:
path: /etc/ssh/sshd_config
insertafter: "^# override default of no subsystems"
line: "Subsystem sftp internal-sftp"
- name: Add SSH Match User section for disabled auth
blockinfile:
path: /etc/ssh/sshd_config
state: absent
block: |
Match User sftp
ChrootDirectory /chroot
PermitTunnel no
X11Forwarding no
AllowTcpForwarding no
PasswordAuthentication yes
AuthorizedKeysFile /home/sftp/.ssh/authorized_keys
when: sftp_auth_method == "Disabled"
- name: Add SSH Match User section for password auth
blockinfile:
path: /etc/ssh/sshd_config
state: present
block: |
Match User sftp
ChrootDirectory /chroot
PermitTunnel no
X11Forwarding no
AllowTcpForwarding no
PasswordAuthentication yes
when: sftp_auth_method == "Password"
- name: Add SSH Match User section for publickey auth
blockinfile:
path: /etc/ssh/sshd_config
state: present
block: |
Match User sftp
ChrootDirectory /chroot
PermitTunnel no
X11Forwarding no
AllowTcpForwarding no
AuthorizedKeysFile /home/sftp/.ssh/authorized_keys
when: sftp_auth_method == "SSH Key"
- name: Restart service ssh.service
2021-02-20 10:19:17 +01:00
service:
2021-02-28 15:21:40 +01:00
name: ssh.service
state: restarted