vm-ansible/roles/realmd/tasks/main.yaml
Kristóf Torma 68613a253a
Some checks reported errors
continuous-integration/drone/push Build was killed
fix mistakes
2023-07-25 15:51:23 +02:00

130 lines
3.3 KiB
YAML

---
- name: "Use custom Ubuntu mirror"
ansible.builtin.replace:
path: /etc/apt/sources.list
regexp: 'https://tormakris.jfrog.io/artifactory/ubuntu-mirror'
replace: 'https://mirror.niif.hu'
backup: yes
- name: "Use custom Ubuntu mirror"
ansible.builtin.replace:
path: /etc/apt/sources.list
regexp: 'http://hu.archive.ubuntu.com'
replace: 'https://mirror.niif.hu'
backup: yes
- name: "Update machine"
ansible.builtin.apt:
update_cache: yes
upgrade: "yes"
autoclean: yes
autoremove: yes
- name: "Install realmd and dependencies"
ansible.builtin.apt:
update_cache: yes
state: present
name:
- realmd
- sssd
- sssd-tools
- libnss-sss
- libpam-sss
- adcli
- samba-common-bin
- oddjob
- oddjob-mkhomedir
- packagekit
- name: "Get join password from local environment variable"
ansible.builtin.set_fact:
join_passw: "{{ lookup('env', 'JOIN_PASSW') }}"
delegate_to: localhost
- name: Join to AD with realmd
ansible.builtin.shell:
cmd: echo {{ join_passw }} | realm join -v -U Administrator intra.tormakris.dev
ignore_errors: True
- name: Enable pam homedir create on first logon
ansible.builtin.command:
cmd: pam-auth-update --enable mkhomedir
- name: Check if ad_gpo_access_control is disabled
ansible.builtin.lineinfile:
state: absent
path: /etc/sssd/sssd.conf
regexp: "^ad_gpo_access_control"
check_mode: true
changed_when: false
register: checkadgpoac
- name: Set ad_gpo_access_control to disabled
ansible.builtin.lineinfile:
state: present
path: /etc/sssd/sssd.conf
line: "ad_gpo_access_control = disabled"
when: checkadgpoac.found == 0
- name: Check if ad_access_filter is set
ansible.builtin.lineinfile:
state: absent
path: /etc/sssd/sssd.conf
regexp: "^ad_access_filter"
check_mode: true
changed_when: false
register: checkadaf
- name: Set ad_gpo_access_control to disabled
ansible.builtin.lineinfile:
state: present
path: /etc/sssd/sssd.conf
line: "ad_access_filter = memberOf=CN=LinuxUsers,OU=Service Groups,DC=intra,DC=tormakris,DC=dev"
when: checkadaf.found == 0
- name: "Restart sssd"
ansible.builtin.service:
name: sssd
state: restarted
- name: Check if group is presend in sudoers
ansible.builtin.lineinfile:
state: absent
path: /etc/sudoers
regexp: "^%linuxadmins"
check_mode: true
changed_when: false
register: checksudoers
- name: Define group in sudoers
ansible.builtin.lineinfile:
state: present
path: /etc/ssh/sshd_config
line: "%linuxadmins@intra.tormakris.dev ALL=(ALL) NOPASSWD: ALL"
when: checksudoers.found == 0
- name: Create home for tormakris
ansible.builtin.command:
cmd: mkhomedir_helper tormakris@intra.tormakris.dev
- name: Remove home directory
ansible.builtin.file:
path: /home/tormakris@intra.tormakris.dev/tormakris
state: absent
recurse: yes
- name: Copy tormakris home
ansible.builtin.copy:
src: /home/tormakris/
dest: /home/tormakris@intra.tormakris.dev/
remote_src: yes
owner: tormakris@intra.tormakris.dev
group: domain users@intra.tormakris.dev
- name: "Update authorized_keys of tormakris"
ansible.posix.authorized_key:
user: tormakris@intra.tormakris.dev
state: present
key: https://static.tormakristof.eu/ssh.keys
...