commit
4cbcf57141
40
README.md
40
README.md
|
@ -17,34 +17,36 @@ usermod -a -G sudo tudattr
|
||||||
Backup for aya01 and raspberry are in a backblaze b2, which gets encrypted on the clientside by rclone.
|
Backup for aya01 and raspberry are in a backblaze b2, which gets encrypted on the clientside by rclone.
|
||||||
but first of all we need to create the buckets and provide ansible with the needed information.
|
but first of all we need to create the buckets and provide ansible with the needed information.
|
||||||
|
|
||||||
When creating your own rclone config the `password` and `password2` entries have to be passed though `rclone obscure` like this:
|
First we need to create a api key for backblaze, consists of an id and a key.
|
||||||
|
we use clone to sync to backblaze.
|
||||||
|
we can encrypt the data with rclone before sending it to backblaze.
|
||||||
|
to do this we need two buckets:
|
||||||
|
- b2
|
||||||
|
- crypt
|
||||||
|
on each device that should be backupped.
|
||||||
|
|
||||||
``` sh
|
we create these by running `rclone config` and creating one [remote] b2 config and a [secret] crypt config. The crypt config should have two passwords that we store in our secrets file.
|
||||||
echo "$PASSWORD" | rclone obscure -
|
|
||||||
```
|
|
||||||
|
|
||||||
`
|
`
|
||||||
## Vault
|
## Vault
|
||||||
- Create vault with: `ansible-vault create secrets.yml`
|
- Create vault with: `ansible-vault create secrets.yml`
|
||||||
- Create entry in vault with: `ansible-vault edit secrets.yml`
|
- Create entry in vault with: `ansible-vault edit secrets.yml`
|
||||||
- Add following entries:
|
- Add following entries: TODO
|
||||||
- `vault_pi_tudattr_password: <YOURPASSWORD>` (password you've setup on the device)
|
|
||||||
- `vault_aya01_tudattr_password: <YOURPASSWORD>` (password you've setup on the device)
|
|
||||||
- `vault_pihole_password: <YOURPASSWORD>` (arbitrary password you want to log in with)
|
|
||||||
- `vault_mysql_root_password: <YOURPASSWORD>` (arbitrary password, used internally)
|
|
||||||
- `vault_mysql_user_password: <YOURPASSWORD>` (arbitrary password, used internally)
|
|
||||||
- `vault_ddns_tudattrdev_password: <YOURPASSWORD>` (password needed for ddns, refer to [here](https://www.namecheap.com/support/knowledgebase/article.aspx/595/11/how-do-i-enable-dynamic-dns-for-a-domain/))
|
|
||||||
- `vault_ddns_borgland_password: <YOURPASSWORD>` (password needed for ddns, refer to [here](https://www.namecheap.com/support/knowledgebase/article.aspx/595/11/how-do-i-enable-dynamic-dns-for-a-domain/))
|
|
||||||
|
|
||||||
## Docker
|
## Docker
|
||||||
To add new docker containers to the docker role you need to add the following and replace `service` with the name of your service:
|
To add new docker containers to the docker role you need to add the following and replace `service` with the name of your service:
|
||||||
|
|
||||||
- Add relevent vars to `group_vars/all/vars.yaml`:
|
- Add relevent vars to `group_vars/all/vars.yaml`:
|
||||||
```yaml
|
```yaml
|
||||||
service_port: "19999" # Exposed port
|
service:
|
||||||
service_config: "{{ docker_dir }}/service/" # config folder or your dir
|
host: "service"
|
||||||
service_data: "{{ docker_data_dir }}/service/" # data folder or your dir (only works on aya01)
|
ports:
|
||||||
|
http: "19999"
|
||||||
|
volumes:
|
||||||
|
config: "{{ docker_dir }}/service/" # config folder or your dir
|
||||||
|
data: "{{ docker_data_dir }}/service/" # data folder or your dir (only works on aya01)
|
||||||
```
|
```
|
||||||
|
|
||||||
- Create necessary directories for service in the docker role `roles/docker/tasks/service.yaml`
|
- Create necessary directories for service in the docker role `roles/docker/tasks/service.yaml`
|
||||||
```yaml
|
```yaml
|
||||||
- name: Create service dirs
|
- name: Create service dirs
|
||||||
|
@ -52,11 +54,11 @@ service_data: "{{ docker_data_dir }}/service/" # data folder or your dir (only w
|
||||||
path: "{{ item }}"
|
path: "{{ item }}"
|
||||||
owner: 1000
|
owner: 1000
|
||||||
group: 1000
|
group: 1000
|
||||||
mode: '777'
|
mode: '775'
|
||||||
state: directory
|
state: directory
|
||||||
loop:
|
loop:
|
||||||
- "{{ service_config }}"
|
- "{{ service.volumes.config }}"
|
||||||
- "{{ service_data }}"
|
- "{{ service.volumes.data }}"
|
||||||
|
|
||||||
# optional:
|
# optional:
|
||||||
# - name: Place service config
|
# - name: Place service config
|
||||||
|
@ -90,8 +92,6 @@ service_data: "{{ docker_data_dir }}/service/" # data folder or your dir (only w
|
||||||
- "{{service_lib}}:/var/lib/service"
|
- "{{service_lib}}:/var/lib/service"
|
||||||
- "{{service_cache}}:/var/cache/service"
|
- "{{service_cache}}:/var/cache/service"
|
||||||
```
|
```
|
||||||
### Qbittorrent/Openvpn
|
|
||||||
You'll need to add a openvpn config to =./roles/docker/templates/aya01/qbittorrentvpn/config/=
|
|
||||||
|
|
||||||
## Server
|
## Server
|
||||||
- Install Debian (debian-11.5.0-amd64-netinst.iso) on remote system
|
- Install Debian (debian-11.5.0-amd64-netinst.iso) on remote system
|
||||||
|
|
|
@ -240,7 +240,13 @@ samba:
|
||||||
user: "smbuser"
|
user: "smbuser"
|
||||||
group: "smbshare"
|
group: "smbshare"
|
||||||
config: "templates/smb.conf"
|
config: "templates/smb.conf"
|
||||||
media_dir: "/media"
|
shares:
|
||||||
|
media:
|
||||||
|
name: "media"
|
||||||
|
path: "/media"
|
||||||
|
paperless:
|
||||||
|
name: "paperless"
|
||||||
|
path: "{{ paperless.data.consume }}"
|
||||||
|
|
||||||
|
|
||||||
#
|
#
|
||||||
|
@ -493,3 +499,32 @@ paperless:
|
||||||
redis:
|
redis:
|
||||||
host: "paperless-redis"
|
host: "paperless-redis"
|
||||||
data: "{{ docker_dir }}/paperless/redis/data"
|
data: "{{ docker_dir }}/paperless/redis/data"
|
||||||
|
|
||||||
|
#
|
||||||
|
# Homarr
|
||||||
|
#
|
||||||
|
|
||||||
|
homarr:
|
||||||
|
host: "homarr"
|
||||||
|
volumes:
|
||||||
|
configs: "{{docker_dir}}/homarr/configs"
|
||||||
|
icons: "{{docker_dir}}/homarr/icons"
|
||||||
|
|
||||||
|
#
|
||||||
|
# gitea
|
||||||
|
#
|
||||||
|
|
||||||
|
gitea:
|
||||||
|
host: "git"
|
||||||
|
url: "https://git.tudattr.dev"
|
||||||
|
volumes:
|
||||||
|
data: "{{ docker_data_dir }}/gitea/data"
|
||||||
|
config: "{{ docker_dir }}/gitea/config"
|
||||||
|
ports:
|
||||||
|
http: "3000"
|
||||||
|
ssh: "2222"
|
||||||
|
runner:
|
||||||
|
host: "gitea-runner-{{ host.hostname }}"
|
||||||
|
token: "{{ host.gitea.runner.token }}"
|
||||||
|
volumes:
|
||||||
|
data: "{{ docker_data_dir }}/gitea/runner/data/"
|
||||||
|
|
|
@ -47,3 +47,6 @@ host:
|
||||||
paperless:
|
paperless:
|
||||||
db:
|
db:
|
||||||
password: "{{ vault.aya01.paperless.db.password }}"
|
password: "{{ vault.aya01.paperless.db.password }}"
|
||||||
|
gitea:
|
||||||
|
runner:
|
||||||
|
token: "{{ vault.aya01.gitea.runner.token }}"
|
||||||
|
|
|
@ -5,6 +5,7 @@ ansible_ssh_private_key_file: '{{ pk_path }}'
|
||||||
ansible_become_pass: '{{ vault.mii.sudo }}'
|
ansible_become_pass: '{{ vault.mii.sudo }}'
|
||||||
|
|
||||||
host:
|
host:
|
||||||
|
hostname: "mii"
|
||||||
ip: "192.168.200.2"
|
ip: "192.168.200.2"
|
||||||
backblaze:
|
backblaze:
|
||||||
account: "{{ vault.mii.backblaze.account }}"
|
account: "{{ vault.mii.backblaze.account }}"
|
||||||
|
|
|
@ -5,15 +5,19 @@ ansible_ssh_private_key_file: '{{ pk_path }}'
|
||||||
ansible_become_pass: '{{ vault.naruto.sudo }}'
|
ansible_become_pass: '{{ vault.naruto.sudo }}'
|
||||||
|
|
||||||
host:
|
host:
|
||||||
|
hostname: "naruto"
|
||||||
ip: "{{ ansible_host }}"
|
ip: "{{ ansible_host }}"
|
||||||
backblaze:
|
backblaze:
|
||||||
account: "{{ vault.naruto.backblaze.account }}"
|
account: "{{ vault.naruto.backblaze.account }}"
|
||||||
key: "{{ vault.naruto.backblaze.key }}"
|
key: "{{ vault.naruto.backblaze.key }}"
|
||||||
remote: "remote:naruto-tudattr-dev"
|
remote: "remote:naruto-tudattr-dev"
|
||||||
# password: "{{}}"
|
password: "{{ vault.naruto.rclone.password }}"
|
||||||
# password2: "{{}}"
|
password2: "{{ vault.naruto.rclone.password2 }}"
|
||||||
# paths:
|
paths:
|
||||||
# - "{{}}"
|
- "{{ docker_compose_dir }}"
|
||||||
# - "{{}}"
|
- "{{ docker_dir }}"
|
||||||
fstab:
|
fstab:
|
||||||
mergerfs:
|
mergerfs:
|
||||||
|
gitea:
|
||||||
|
runner:
|
||||||
|
token: "{{ vault.naruto.gitea.runner.token }}"
|
||||||
|
|
|
@ -5,6 +5,7 @@ ansible_ssh_private_key_file: '{{ pk_path }}'
|
||||||
ansible_become_pass: '{{ vault.pi.sudo }}'
|
ansible_become_pass: '{{ vault.pi.sudo }}'
|
||||||
|
|
||||||
host:
|
host:
|
||||||
|
hostname: "pi"
|
||||||
ip: "{{ ansible_host }}"
|
ip: "{{ ansible_host }}"
|
||||||
backblaze:
|
backblaze:
|
||||||
account: "{{ vault.pi.backblaze.account }}"
|
account: "{{ vault.pi.backblaze.account }}"
|
||||||
|
@ -17,3 +18,6 @@ host:
|
||||||
- "{{ docker_dir }}"
|
- "{{ docker_dir }}"
|
||||||
fstab:
|
fstab:
|
||||||
mergerfs:
|
mergerfs:
|
||||||
|
gitea:
|
||||||
|
runner:
|
||||||
|
token: "{{ vault.pi.gitea.runner.token }}"
|
||||||
|
|
|
@ -3,9 +3,7 @@ aya01
|
||||||
|
|
||||||
[raspberry]
|
[raspberry]
|
||||||
pi
|
pi
|
||||||
|
naruto
|
||||||
|
|
||||||
[vps]
|
[vps]
|
||||||
mii
|
mii
|
||||||
|
|
||||||
[nas]
|
|
||||||
naruto
|
|
||||||
|
|
|
@ -5,9 +5,15 @@
|
||||||
state: stopped
|
state: stopped
|
||||||
become: true
|
become: true
|
||||||
|
|
||||||
|
# - name: Backing up for "{{ inventory_hostname }}"
|
||||||
|
# shell:
|
||||||
|
# cmd: "rclone sync {{ item }} secret:{{ item }} --transfers 16"
|
||||||
|
# loop: "{{ host.backblaze.paths }}"
|
||||||
|
# become: true
|
||||||
|
|
||||||
- name: Backing up for "{{ inventory_hostname }}"
|
- name: Backing up for "{{ inventory_hostname }}"
|
||||||
shell:
|
shell:
|
||||||
cmd: "rclone sync {{ item }} secret:{{ item }} --transfers 16"
|
cmd: "rclone sync {{ item }} secret:{{ item }} -L"
|
||||||
loop: "{{ host.backblaze.paths }}"
|
loop: "{{ host.backblaze.paths }}"
|
||||||
become: true
|
become: true
|
||||||
|
|
||||||
|
|
|
@ -86,3 +86,12 @@
|
||||||
- include_tasks: jellyfin.yml
|
- include_tasks: jellyfin.yml
|
||||||
tags:
|
tags:
|
||||||
- jellyfin
|
- jellyfin
|
||||||
|
|
||||||
|
- include_tasks: gitea.yml
|
||||||
|
tags:
|
||||||
|
- gitea
|
||||||
|
|
||||||
|
- include_tasks: gitea-runner.yml
|
||||||
|
tags:
|
||||||
|
- gitea-runner
|
||||||
|
|
||||||
|
|
|
@ -10,7 +10,7 @@
|
||||||
- name: Copy ddns-config
|
- name: Copy ddns-config
|
||||||
template:
|
template:
|
||||||
owner: 1000
|
owner: 1000
|
||||||
src: "templates/pi/ddns-updater/data/config.json"
|
src: "templates/{{host.hostname}}/ddns-updater/data/config.json"
|
||||||
dest: "{{ docker_dir }}/ddns-updater/data/config.json"
|
dest: "{{ docker_dir }}/ddns-updater/data/config.json"
|
||||||
mode: '400'
|
mode: '400'
|
||||||
|
|
||||||
|
|
|
@ -0,0 +1,11 @@
|
||||||
|
---
|
||||||
|
- name: Create gitea-runner directories
|
||||||
|
file:
|
||||||
|
path: "{{ item }}"
|
||||||
|
owner: "{{ puid }}"
|
||||||
|
group: "{{ pgid }}"
|
||||||
|
mode: '755'
|
||||||
|
state: directory
|
||||||
|
become: yes
|
||||||
|
loop:
|
||||||
|
- "{{ gitea.runner.volumes.data }}"
|
|
@ -0,0 +1,12 @@
|
||||||
|
---
|
||||||
|
- name: Create gitea directories
|
||||||
|
file:
|
||||||
|
path: "{{ item }}"
|
||||||
|
owner: "{{ puid }}"
|
||||||
|
group: "{{ pgid }}"
|
||||||
|
mode: '755'
|
||||||
|
state: directory
|
||||||
|
become: yes
|
||||||
|
loop:
|
||||||
|
- "{{ gitea.volumes.data }}"
|
||||||
|
- "{{ gitea.volumes.config }}"
|
|
@ -0,0 +1,11 @@
|
||||||
|
---
|
||||||
|
- name: Create gitlab-runner directories
|
||||||
|
file:
|
||||||
|
path: "{{ item }}"
|
||||||
|
owner: "{{ puid }}"
|
||||||
|
group: "{{ pgid }}"
|
||||||
|
mode: '755'
|
||||||
|
state: directory
|
||||||
|
become: yes
|
||||||
|
loop:
|
||||||
|
- "{{ gitlab.runner.volumes.config }}"
|
|
@ -0,0 +1,13 @@
|
||||||
|
---
|
||||||
|
|
||||||
|
- include_tasks: nginx-proxy-manager.yml
|
||||||
|
tags:
|
||||||
|
- nginx
|
||||||
|
|
||||||
|
- include_tasks: pihole.yml
|
||||||
|
tags:
|
||||||
|
- pihole
|
||||||
|
|
||||||
|
- include_tasks: gitea-runner.yml
|
||||||
|
tags:
|
||||||
|
- gitea-runner
|
|
@ -7,3 +7,8 @@
|
||||||
- include_tasks: pihole.yml
|
- include_tasks: pihole.yml
|
||||||
tags:
|
tags:
|
||||||
- pihole
|
- pihole
|
||||||
|
|
||||||
|
- include_tasks: gitea-runner.yml
|
||||||
|
tags:
|
||||||
|
- gitea-runner
|
||||||
|
|
||||||
|
|
|
@ -93,6 +93,8 @@ services:
|
||||||
- PUID={{puid}}
|
- PUID={{puid}}
|
||||||
- PGID={{pgid}}
|
- PGID={{pgid}}
|
||||||
- TZ={{timezone}}
|
- TZ={{timezone}}
|
||||||
|
ports:
|
||||||
|
- "{{kuma_port}}:3001"
|
||||||
volumes:
|
volumes:
|
||||||
- "{{ kuma_config }}:/app/data"
|
- "{{ kuma_config }}:/app/data"
|
||||||
|
|
||||||
|
@ -221,6 +223,8 @@ services:
|
||||||
- PUID={{ puid }}
|
- PUID={{ puid }}
|
||||||
- PGID={{ pgid}}
|
- PGID={{ pgid}}
|
||||||
- TZ={{ timezone }}
|
- TZ={{ timezone }}
|
||||||
|
ports:
|
||||||
|
- "{{ tautulli_port }}:8181"
|
||||||
volumes:
|
volumes:
|
||||||
- {{ tautulli_config}}:/config
|
- {{ tautulli_config}}:/config
|
||||||
|
|
||||||
|
@ -412,8 +416,6 @@ services:
|
||||||
- broker
|
- broker
|
||||||
networks:
|
networks:
|
||||||
- net
|
- net
|
||||||
ports:
|
|
||||||
- "{{ paperless.port }}:{{ paperless.port }}"
|
|
||||||
healthcheck:
|
healthcheck:
|
||||||
test: ["CMD", "curl", "-fs", "-S", "--max-time", "2", "http://localhost:{{ paperless.port }}"]
|
test: ["CMD", "curl", "-fs", "-S", "--max-time", "2", "http://localhost:{{ paperless.port }}"]
|
||||||
interval: 30s
|
interval: 30s
|
||||||
|
@ -435,6 +437,51 @@ services:
|
||||||
- "PAPERLESS_TIME_ZONE={{ timezone }}"
|
- "PAPERLESS_TIME_ZONE={{ timezone }}"
|
||||||
- "PAPERLESS_OCR_LANGUAGE=deu"
|
- "PAPERLESS_OCR_LANGUAGE=deu"
|
||||||
|
|
||||||
|
{{ homarr.host }}:
|
||||||
|
container_name: {{ homarr.host }}
|
||||||
|
image: ghcr.io/ajnart/homarr:latest
|
||||||
|
restart: unless-stopped
|
||||||
|
depends_on:
|
||||||
|
- pihole
|
||||||
|
networks:
|
||||||
|
- net
|
||||||
|
volumes:
|
||||||
|
- {{ homarr.volumes.configs }}:/app/data/configs
|
||||||
|
- {{ homarr.volumes.icons }}:/app/public/icons
|
||||||
|
|
||||||
|
|
||||||
|
{{ gitea.host }}:
|
||||||
|
container_name: {{ gitea.host }}
|
||||||
|
image: gitea/gitea:1.20.5-rootless
|
||||||
|
restart: unless-stopped
|
||||||
|
depends_on:
|
||||||
|
- pihole
|
||||||
|
networks:
|
||||||
|
- net
|
||||||
|
volumes:
|
||||||
|
- {{ gitea.volumes.data }}:/var/lib/gitea
|
||||||
|
- {{ gitea.volumes.config }}:/etc/gitea
|
||||||
|
- /etc/timezone:/etc/timezone:ro
|
||||||
|
- /etc/localtime:/etc/localtime:ro
|
||||||
|
ports:
|
||||||
|
- "{{ gitea.ports.http }}:3000"
|
||||||
|
- "{{ gitea.ports.ssh }}:2222"
|
||||||
|
|
||||||
|
|
||||||
|
{{ gitea.runner.host }}:
|
||||||
|
container_name: {{ gitea.runner.host }}
|
||||||
|
image: gitea/act_runner:nightly
|
||||||
|
restart: unless-stopped
|
||||||
|
depends_on:
|
||||||
|
- {{ gitea.host }}
|
||||||
|
networks:
|
||||||
|
- net
|
||||||
|
volumes:
|
||||||
|
- /var/run/docker.sock:/var/run/docker.sock
|
||||||
|
environment:
|
||||||
|
- "GITEA_INSTANCE_URL={{ gitea.url }}"
|
||||||
|
- "GITEA_RUNNER_REGISTRATION_TOKEN={{ gitea.runner.token }}"
|
||||||
|
|
||||||
networks:
|
networks:
|
||||||
zoneminder:
|
zoneminder:
|
||||||
driver: bridge
|
driver: bridge
|
||||||
|
|
|
@ -0,0 +1,40 @@
|
||||||
|
version: '3'
|
||||||
|
services:
|
||||||
|
nginx:
|
||||||
|
container_name: "{{nginx.host}}"
|
||||||
|
image: 'jc21/nginx-proxy-manager:latest'
|
||||||
|
restart: unless-stopped
|
||||||
|
networks:
|
||||||
|
net: {}
|
||||||
|
ports:
|
||||||
|
- '{{nginx.endpoints.http}}:80'
|
||||||
|
- '{{nginx.endpoints.https}}:443'
|
||||||
|
- '{{nginx.endpoints.admin}}:81'
|
||||||
|
volumes:
|
||||||
|
- "{{nginx.paths.data}}:/data"
|
||||||
|
- "{{nginx.paths.letsencrypt}}:/etc/letsencrypt"
|
||||||
|
- '/var/run/docker.sock:/var/run/docker.sock'
|
||||||
|
|
||||||
|
{{ gitea.runner.host }}:
|
||||||
|
container_name: {{ gitea.runner.host }}
|
||||||
|
image: gitea/act_runner:nightly
|
||||||
|
restart: unless-stopped
|
||||||
|
depends_on:
|
||||||
|
- nginx
|
||||||
|
networks:
|
||||||
|
- net
|
||||||
|
volumes:
|
||||||
|
- /var/run/docker.sock:/var/run/docker.sock
|
||||||
|
- {{ gitea.runner.volumes.data }}:/data
|
||||||
|
environment:
|
||||||
|
- "GITEA_INSTANCE_URL={{ gitea.url }}"
|
||||||
|
- "GITEA_RUNNER_REGISTRATION_TOKEN={{ gitea.runner.token }}"
|
||||||
|
|
||||||
|
networks:
|
||||||
|
net:
|
||||||
|
driver: bridge
|
||||||
|
ipam:
|
||||||
|
# driver: default
|
||||||
|
config:
|
||||||
|
- subnet: 172.16.69.0/24
|
||||||
|
gateway: 172.16.69.1
|
|
@ -43,6 +43,21 @@ services:
|
||||||
cap_add:
|
cap_add:
|
||||||
- NET_ADMIN
|
- NET_ADMIN
|
||||||
|
|
||||||
|
{{ gitea.runner.host }}:
|
||||||
|
container_name: {{ gitea.runner.host }}
|
||||||
|
image: gitea/act_runner:nightly
|
||||||
|
restart: unless-stopped
|
||||||
|
depends_on:
|
||||||
|
- nginx
|
||||||
|
networks:
|
||||||
|
- net
|
||||||
|
volumes:
|
||||||
|
- /var/run/docker.sock:/var/run/docker.sock
|
||||||
|
- {{ gitea.runner.volumes.data }}:/data
|
||||||
|
environment:
|
||||||
|
- "GITEA_INSTANCE_URL={{ gitea.url }}"
|
||||||
|
- "GITEA_RUNNER_REGISTRATION_TOKEN={{ gitea.runner.token }}"
|
||||||
|
|
||||||
networks:
|
networks:
|
||||||
net:
|
net:
|
||||||
driver: bridge
|
driver: bridge
|
||||||
|
|
|
@ -1,11 +0,0 @@
|
||||||
{
|
|
||||||
"settings": [
|
|
||||||
{
|
|
||||||
"provider": "namecheap",
|
|
||||||
"domain": "{{ local_domain }}",
|
|
||||||
"host": "{{ local_subdomains }}",
|
|
||||||
"password": "{{ vault_ddns_borgland_password }}",
|
|
||||||
"provider_ip": true
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
|
@ -20,10 +20,13 @@
|
||||||
|
|
||||||
- name: Change permission on share
|
- name: Change permission on share
|
||||||
file:
|
file:
|
||||||
path: "{{ samba.media_dir }}"
|
path: "{{ item }}"
|
||||||
group: "{{ samba.group }}"
|
group: "{{ samba.group }}"
|
||||||
mode: "2770"
|
mode: "2770"
|
||||||
become: true
|
become: true
|
||||||
|
loop:
|
||||||
|
- "{{ samba.shares.media.path }}"
|
||||||
|
- "{{ samba.shares.paperless.path }}"
|
||||||
|
|
||||||
- name: Add user "{{ samba.user }}"
|
- name: Add user "{{ samba.user }}"
|
||||||
user:
|
user:
|
||||||
|
|
|
@ -1,222 +1,14 @@
|
||||||
#======================= Global Settings =======================
|
[{{ samba.shares.media.name }}]
|
||||||
|
comment = {{ samba.shares.media.name }}
|
||||||
|
path = "{{ samba.shares.media.path }}"
|
||||||
|
writable = no
|
||||||
|
guest ok = no
|
||||||
|
valid users = "@{{samba.group}}"
|
||||||
|
|
||||||
[global]
|
[{{ samba.shares.paperless.name }}]
|
||||||
|
comment = {{ samba.shares.paperless.name }}
|
||||||
## Browsing/Identification ###
|
path = "{{ samba.shares.paperless.path }}"
|
||||||
|
|
||||||
# Change this to the workgroup/NT-domain name your Samba server will part of
|
|
||||||
workgroup = TUDATTR
|
|
||||||
|
|
||||||
#### Networking ####
|
|
||||||
|
|
||||||
# The specific set of interfaces / networks to bind to
|
|
||||||
# This can be either the interface name or an IP address/netmask;
|
|
||||||
# interface names are normally preferred
|
|
||||||
; interfaces = 127.0.0.0/8 eth0
|
|
||||||
|
|
||||||
# Only bind to the named interfaces and/or networks; you must use the
|
|
||||||
# 'interfaces' option above to use this.
|
|
||||||
# It is recommended that you enable this feature if your Samba machine is
|
|
||||||
# not protected by a firewall or is a firewall itself. However, this
|
|
||||||
# option cannot handle dynamic or non-broadcast interfaces correctly.
|
|
||||||
; bind interfaces only = yes
|
|
||||||
|
|
||||||
#### Debugging/Accounting ####
|
|
||||||
|
|
||||||
# This tells Samba to use a separate log file for each machine
|
|
||||||
# that connects
|
|
||||||
log file = /var/log/samba-%m.log
|
|
||||||
|
|
||||||
# Cap the size of the individual log files (in KiB).
|
|
||||||
max log size = 1000
|
|
||||||
|
|
||||||
# We want Samba to only log to /var/log/samba/log.{smbd,nmbd}.
|
|
||||||
# Append syslog@1 if you want important messages to be sent to syslog too.
|
|
||||||
logging = file
|
|
||||||
|
|
||||||
# Do something sensible when Samba crashes: mail the admin a backtrace
|
|
||||||
panic action = /usr/share/samba/panic-action %d
|
|
||||||
|
|
||||||
|
|
||||||
####### Authentication #######
|
|
||||||
|
|
||||||
# Server role. Defines in which mode Samba will operate. Possible
|
|
||||||
# values are "standalone server", "member server", "classic primary
|
|
||||||
# domain controller", "classic backup domain controller", "active
|
|
||||||
# directory domain controller".
|
|
||||||
#
|
|
||||||
# Most people will want "standalone server" or "member server".
|
|
||||||
# Running as "active directory domain controller" will require first
|
|
||||||
# running "samba-tool domain provision" to wipe databases and create a
|
|
||||||
# new domain.
|
|
||||||
server role = standalone server
|
|
||||||
|
|
||||||
obey pam restrictions = yes
|
|
||||||
|
|
||||||
# This boolean parameter controls whether Samba attempts to sync the Unix
|
|
||||||
# password with the SMB password when the encrypted SMB password in the
|
|
||||||
# passdb is changed.
|
|
||||||
unix password sync = yes
|
|
||||||
|
|
||||||
# For Unix password sync to work on a Debian GNU/Linux system, the following
|
|
||||||
# parameters must be set (thanks to Ian Kahan <<kahan@informatik.tu-muenchen.de> for
|
|
||||||
# sending the correct chat script for the passwd program in Debian Sarge).
|
|
||||||
passwd program = /usr/bin/passwd %u
|
|
||||||
passwd chat = *Enter\snew\s*\spassword:* %n\n *Retype\snew\s*\spassword:* %n\n *password\supdated\ssuccessfully* .
|
|
||||||
|
|
||||||
# This boolean controls whether PAM will be used for password changes
|
|
||||||
# when requested by an SMB client instead of the program listed in
|
|
||||||
# 'passwd program'. The default is 'no'.
|
|
||||||
pam password change = yes
|
|
||||||
|
|
||||||
# This option controls how unsuccessful authentication attempts are mapped
|
|
||||||
# to anonymous connections
|
|
||||||
map to guest = bad user
|
|
||||||
|
|
||||||
########## Domains ###########
|
|
||||||
|
|
||||||
#
|
|
||||||
# The following settings only takes effect if 'server role = classic
|
|
||||||
# primary domain controller', 'server role = classic backup domain controller'
|
|
||||||
# or 'domain logons' is set
|
|
||||||
#
|
|
||||||
|
|
||||||
# It specifies the location of the user's
|
|
||||||
# profile directory from the client point of view) The following
|
|
||||||
# required a [profiles] share to be setup on the samba server (see
|
|
||||||
# below)
|
|
||||||
; logon path = \\%N\profiles\%U
|
|
||||||
# Another common choice is storing the profile in the user's home directory
|
|
||||||
# (this is Samba's default)
|
|
||||||
# logon path = \\%N\%U\profile
|
|
||||||
|
|
||||||
# The following setting only takes effect if 'domain logons' is set
|
|
||||||
# It specifies the location of a user's home directory (from the client
|
|
||||||
# point of view)
|
|
||||||
; logon drive = H:
|
|
||||||
# logon home = \\%N\%U
|
|
||||||
|
|
||||||
# The following setting only takes effect if 'domain logons' is set
|
|
||||||
# It specifies the script to run during logon. The script must be stored
|
|
||||||
# in the [netlogon] share
|
|
||||||
# NOTE: Must be store in 'DOS' file format convention
|
|
||||||
; logon script = logon.cmd
|
|
||||||
|
|
||||||
# This allows Unix users to be created on the domain controller via the SAMR
|
|
||||||
# RPC pipe. The example command creates a user account with a disabled Unix
|
|
||||||
# password; please adapt to your needs
|
|
||||||
; add user script = /usr/sbin/adduser --quiet --disabled-password --gecos "" %u
|
|
||||||
|
|
||||||
# This allows machine accounts to be created on the domain controller via the
|
|
||||||
# SAMR RPC pipe.
|
|
||||||
# The following assumes a "machines" group exists on the system
|
|
||||||
; add machine script = /usr/sbin/useradd -g machines -c "%u machine account" -d /var/lib/samba -s /bin/false %u
|
|
||||||
|
|
||||||
# This allows Unix groups to be created on the domain controller via the SAMR
|
|
||||||
# RPC pipe.
|
|
||||||
; add group script = /usr/sbin/addgroup --force-badname %g
|
|
||||||
|
|
||||||
############ Misc ############
|
|
||||||
|
|
||||||
# Using the following line enables you to customise your configuration
|
|
||||||
# on a per machine basis. The %m gets replaced with the netbios name
|
|
||||||
# of the machine that is connecting
|
|
||||||
; include = /home/samba/etc/smb.conf.%m
|
|
||||||
|
|
||||||
# Some defaults for winbind (make sure you're not using the ranges
|
|
||||||
# for something else.)
|
|
||||||
; idmap config * : backend = tdb
|
|
||||||
; idmap config * : range = 3000-7999
|
|
||||||
; idmap config YOURDOMAINHERE : backend = tdb
|
|
||||||
; idmap config YOURDOMAINHERE : range = 100000-999999
|
|
||||||
; template shell = /bin/bash
|
|
||||||
|
|
||||||
# Setup usershare options to enable non-root users to share folders
|
|
||||||
# with the net usershare command.
|
|
||||||
|
|
||||||
# Maximum number of usershare. 0 means that usershare is disabled.
|
|
||||||
# usershare max shares = 100
|
|
||||||
|
|
||||||
# Allow users who've been granted usershare privileges to create
|
|
||||||
# public shares, not just authenticated ones
|
|
||||||
usershare allow guests = yes
|
|
||||||
|
|
||||||
#======================= Share Definitions =======================
|
|
||||||
|
|
||||||
[homes]
|
|
||||||
comment = Home Directories
|
|
||||||
browseable = no
|
|
||||||
|
|
||||||
# By default, the home directories are exported read-only. Change the
|
|
||||||
# next parameter to 'no' if you want to be able to write to them.
|
|
||||||
read only = yes
|
|
||||||
|
|
||||||
# File creation mask is set to 0700 for security reasons. If you want to
|
|
||||||
# create files with group=rw permissions, set next parameter to 0775.
|
|
||||||
create mask = 0700
|
|
||||||
|
|
||||||
# Directory creation mask is set to 0700 for security reasons. If you want to
|
|
||||||
# create dirs. with group=rw permissions, set next parameter to 0775.
|
|
||||||
directory mask = 0700
|
|
||||||
|
|
||||||
# By default, \\server\username shares can be connected to by anyone
|
|
||||||
# with access to the samba server.
|
|
||||||
# The following parameter makes sure that only "username" can connect
|
|
||||||
# to \\server\username
|
|
||||||
# This might need tweaking when using external authentication schemes
|
|
||||||
valid users = %S
|
|
||||||
|
|
||||||
# Un-comment the following and create the netlogon directory for Domain Logons
|
|
||||||
# (you need to configure Samba to act as a domain controller too.)
|
|
||||||
;[netlogon]
|
|
||||||
; comment = Network Logon Service
|
|
||||||
; path = /home/samba/netlogon
|
|
||||||
; guest ok = yes
|
|
||||||
; read only = yes
|
|
||||||
|
|
||||||
# Un-comment the following and create the profiles directory to store
|
|
||||||
# users profiles (see the "logon path" option above)
|
|
||||||
# (you need to configure Samba to act as a domain controller too.)
|
|
||||||
# The path below should be writable by all users so that their
|
|
||||||
# profile directory may be created the first time they log on
|
|
||||||
;[profiles]
|
|
||||||
; comment = Users profiles
|
|
||||||
; path = /home/samba/profiles
|
|
||||||
; guest ok = no
|
|
||||||
; browseable = no
|
|
||||||
; create mask = 0600
|
|
||||||
; directory mask = 0700
|
|
||||||
|
|
||||||
;[printers]
|
|
||||||
; comment = All Printers
|
|
||||||
; browseable = no
|
|
||||||
; path = /var/spool/samba
|
|
||||||
; printable = yes
|
|
||||||
; guest ok = no
|
|
||||||
; read only = yes
|
|
||||||
; create mask = 0700
|
|
||||||
|
|
||||||
# Windows clients look for this share name as a source of downloadable
|
|
||||||
# printer drivers
|
|
||||||
;[print$]
|
|
||||||
; comment = Printer Drivers
|
|
||||||
; path = /var/lib/samba/printers
|
|
||||||
; browseable = yes
|
|
||||||
; read only = yes
|
|
||||||
; guest ok = no
|
|
||||||
# Uncomment to allow remote administration of Windows print drivers.
|
|
||||||
# You may need to replace 'lpadmin' with the name of the group your
|
|
||||||
# admin users are members of.
|
|
||||||
# Please note that you also need to set appropriate Unix permissions
|
|
||||||
# to the drivers directory for these users to have write rights in it
|
|
||||||
; write list = root, @lpadmin
|
|
||||||
|
|
||||||
[media]
|
|
||||||
comment = Media
|
|
||||||
path = "{{ samba.media_dir }}"
|
|
||||||
writable = yes
|
writable = yes
|
||||||
guest ok = no
|
guest ok = no
|
||||||
valid users = "@{{samba.group}}"
|
valid users = "@{{samba.group}}"
|
||||||
force create mode = 770
|
create mask = 755
|
||||||
force directory mode = 770
|
|
||||||
inherit permissions = yes
|
|
||||||
|
|
Loading…
Reference in New Issue