213 lines
6.6 KiB
YAML
213 lines
6.6 KiB
YAML
---
|
|
# timezone
|
|
timezone: 'Europe/Rome'
|
|
default_locale_lang: "en_US.UTF-8"
|
|
default_deb_locale_messages: "C.UTF-8"
|
|
default_el_locale_messages: "en_US.UTF-8"
|
|
locales_list:
|
|
- {name: '{{ default_locale_lang }}'}
|
|
- {name: 'en_US.UTF-8'}
|
|
- {name: 'en_US'}
|
|
- {name: 'it_IT.UTF-8'}
|
|
- {name: 'it_IT'}
|
|
|
|
domain_name: '{{ ansible_domain }}'
|
|
|
|
sysctl_custom_file: /etc/sysctl.d/90-custom-values.conf
|
|
sysctl_opts_reload: yes
|
|
sysctl_custom_file_state: present
|
|
|
|
# Only name and value are mandatory. The others have defaults
|
|
sysctl_custom_options: []
|
|
# - name: 'net.nf_conntrack_max'
|
|
# value: '32768'
|
|
# sysctlfile: '{{ sysctl_custom_file }}'
|
|
# sysctl_reload: '{{ sysctl_opts_reload }}'
|
|
# sysctlfile_state: '{{ sysctl_custom_file_state }}'
|
|
|
|
ubuntu_configure_additional_interfaces: true
|
|
ubuntu_second_int_name: "enp8s0"
|
|
ubuntu_netplan_interfaces:
|
|
- name: "{{ ubuntu_second_int_name }}"
|
|
dhcp4: true
|
|
mtu: "{{ ansible_enp8s0.mtu }}"
|
|
disable_ipv6: false
|
|
ipv6_sysctl_value: 1
|
|
ipv6_sysctl_file: /etc/sysctl.d/10-ipv6-disable.conf
|
|
#
|
|
# Define the following variables to manage additional disks and mount points, even static nfs ones
|
|
additional_disks: false
|
|
disks_and_mountpoints_list: []
|
|
# - { mountpoint: '/data', device: 'xvda3', fstype: 'xfs', opts: 'noatime', state: 'mounted', create_filesystem: True }
|
|
|
|
ansible_python3_debs:
|
|
- python3-lxml
|
|
|
|
ansible_python3_el:
|
|
- python3-lxml
|
|
|
|
idmap_verbosity: 0
|
|
idmap_conf_options:
|
|
- { section: 'General', option: 'Domain', value: '{{ domain_name }}', state: 'present' }
|
|
- { section: 'General', option: 'Verbosity', value: '{{ idmap_verbosity }}', state: 'present' }
|
|
|
|
# autofs mount points
|
|
autofs_client_mountpoint: false
|
|
autofs_conf_options:
|
|
- { section: 'autofs', option: 'master_map_name', value: '/etc/auto.master', state: 'present' }
|
|
- { section: 'autofs', option: 'timeout', value: '300', state: 'present' }
|
|
- { section: 'autofs', option: 'negative_timeout', value: '60', state: 'present' }
|
|
- { section: 'autofs', option: 'mount_nfs_default_protocol', value: '4', state: 'present' }
|
|
- { section: 'autofs', option: 'logging', value: 'none', state: 'present' }
|
|
- { section: 'amd', option: 'dismount_interval', value: '300', state: 'present' }
|
|
|
|
autofs_packages_deb:
|
|
- autofs
|
|
|
|
autofs_packages_el:
|
|
- autofs
|
|
|
|
# path: without the initial /
|
|
autofs_maps: []
|
|
# - { map_name: 'data', mountpoint_prefix: '/', path: 'data', nfs_server: 'nfs.example.com', remote_export: '/export', is_home: False }
|
|
|
|
nfs_server_enabled: false
|
|
nfs_server_ganesha_enabled: '{{ nfs_server_enabled }}'
|
|
|
|
nfs_server_kernel_el_pkgs:
|
|
- nfs-utils
|
|
- nfs4-acl-tools
|
|
|
|
nfs_server_kernel_deb_pkgs:
|
|
- nfs-kernel-server
|
|
- nfs4-acl-tools
|
|
- nfstrace
|
|
- nfswatch
|
|
|
|
nfs_server_exports: []
|
|
# name, id, path, options, clients
|
|
# (*) indicate an optional parameter
|
|
# - name: export_filename
|
|
# id: 1
|
|
# path: /export
|
|
# options: 'rw,sync,fsid=1,root_squash,no_wdelay'
|
|
# clients:
|
|
# - host1
|
|
# - hostN
|
|
|
|
nfs_ganesha_conf_files:
|
|
- ganesha.conf
|
|
|
|
nfs_server_ganesha_el_repos:
|
|
- centos-release-nfs-ganesha28
|
|
- centos-release-ceph-nautilus
|
|
nfs_server_ganesha_el_pkgs:
|
|
- nfs-utils
|
|
- nfs4-acl-tools
|
|
- nfs-ganesha
|
|
- nfs-ganesha-vfs
|
|
- librados2
|
|
|
|
nfs_server_ganesha_deb_pkgs:
|
|
- 'nfs-ganesha'
|
|
- 'nfs-ganesha-vfs'
|
|
- 'nfs-ganesha-xfs'
|
|
|
|
#Protocols = 3,4,9P;
|
|
nfs_server_ganesha_server_protocols: '4'
|
|
nfs_server_ganesha_path_pseudo: False
|
|
nfs_server_ganesha_mdcache: False
|
|
nfs_server_ganesha_mdcache_hwmark: 100000
|
|
nfs_server_ganesha_exports: []
|
|
# name, id, path, pseudo_path, access_type (RW, RO), protocols (global), squash (true,false), disable_actl (true,false), sectype, fsal (VFS, XFS), clients
|
|
# (*) indicate an optional parameter
|
|
# - name: export_filename
|
|
# id: 1
|
|
# path: /export
|
|
# pseudo: /nfs_export
|
|
# access_type(*): 'RW'
|
|
# protocols(*): '{{ nfs_server_ganesha_server_protocols }}'
|
|
# squash(*): 'root_squash'
|
|
# disable_acl(*): 'false'
|
|
# sectype(*): 'sys'
|
|
# nfs_commit(*): 'false'
|
|
# delegations(*): 'none'
|
|
# fsal: 'VFS'
|
|
# clients:
|
|
# - host1
|
|
# - hostN
|
|
|
|
# tmpreaper
|
|
tmpreaper_install: false
|
|
tmpreaper_use_ctime: true
|
|
tmpreaper_protect_extra: ''
|
|
tmpreaper_dirs: '/tmp/.'
|
|
tmpreaper_extra_dirs: ''
|
|
tmpreaper_delay: '256'
|
|
tmpreaper_additional_options: ''
|
|
tmpreaper_time: '7d'
|
|
|
|
#
|
|
enable_env_proxy: False
|
|
env_proxy_http_host: 'localhost'
|
|
env_proxy_http_port: '3128'
|
|
env_proxy_http_protocol: 'http'
|
|
env_proxy_https_protocol: '{{ env_proxy_http_protocol }}'
|
|
env_proxy_http_url: '{{ env_proxy_http_protocol }}://{{ env_proxy_http_host }}:{{ env_proxy_http_port }}'
|
|
env_proxy_https_url: '{{ env_proxy_http_url }}'
|
|
env_proxy_protocols:
|
|
- 'http_proxy'
|
|
- 'https_proxy'
|
|
- 'ftp_proxy'
|
|
- 'HTTP_PROXY'
|
|
- 'HTTPS_PROXY'
|
|
- 'FTP_PROXY'
|
|
env_proxy_use_authentication: False
|
|
env_proxy_username: ''
|
|
env_proxy_password: ''
|
|
no_proxy_targets:
|
|
- '::1'
|
|
- '127.0.0.1'
|
|
- 'localhost'
|
|
|
|
# A generic PKI directory where the local certificates will be stored
|
|
pki_dir: /etc/pki
|
|
pki_subdirs:
|
|
- certs
|
|
- keys
|
|
pki_install_a_custom_ca: false
|
|
self_signed_cert: "{{ pki_dir }}/selfsigned/cert"
|
|
self_signed_fullchain: "{{ pki_dir }}/selfsigned/fullchain"
|
|
self_signed_key: "{{ pki_dir }}/selfsigned/privkey"
|
|
self_signed_subject: "/CN={{ ansible_fqdn }} self signed"
|
|
|
|
mkcert_create_certificate: false
|
|
mkcert_cert_name: "{{ ansible_fqdn}}.pem"
|
|
mkcert_cert_dest_path: "{{ pki_dir }}/certs/{{ mkcert_cert_name }}"
|
|
mkcert_key_name: "{{ ansible_fqdn}}-key.pem"
|
|
mkcert_key_dest_path: "{{ pki_dir }}/keys/{{ mkcert_key_name }}"
|
|
mkcert_dsn_and_ip_list: "{{ ansible_fqdn }} {{ ansible_default_ipv4.address }}"
|
|
mkcert_ca_host: localhost
|
|
|
|
trusted_ca_el_anchors_path: '/etc/pki/ca-trust/source/anchors'
|
|
trusted_ca_deb_path: '/usr/local/share/ca-certificates'
|
|
# it shoudn't be needed
|
|
trusted_ca_letsencrypt_install: false
|
|
trusted_ca_letsencrypt_ca_certificates_url: https://letsencrypt.org/certs
|
|
trusted_ca_letsencrypt_ca_files:
|
|
- { ca_src: 'isrgrootx1.pem', ca: 'isrgrootx1.crt', name: 'isrg-root-x1' }
|
|
- { ca_src: 'isrg-root-x2.pem', ca: 'isrg-root-x2.crt', name: 'isrg-root-x2-not-cross' }
|
|
- { ca_src: 'lets-encrypt-e1.pem', ca: 'lets-encrypt-e1.crt', name: 'lets-encrypt-e1' }
|
|
- { ca_src: 'lets-encrypt-e2.pem', ca: 'lets-encrypt-e2.crt', name: 'lets-encrypt-e2' }
|
|
- { ca_src: 'lets-encrypt-r3.pem', ca: 'lets-encrypt-r3.crt', name: 'lets-encrypt-r3-not-cross' }
|
|
- { ca_src: 'lets-encrypt-r4.pem', ca: 'lets-encrypt-r4.crt', name: 'lets-encrypt-r4-not-cross' }
|
|
|
|
expired_ca_letsencrypt_ca_files:
|
|
- isrg-root-x2-cross-signed.pem
|
|
- lets-encrypt-r3-cross-signed.pem
|
|
- lets-encrypt-x3-cross-signed.pem
|
|
- letsencryptauthorityx3.pem
|
|
|
|
trusted_ca_additional_ca_files: []
|
|
# - { ca_url: 'https://example.com/foo-ca.pem', ca: 'foo-ca.pem', name: 'foo-ca' }
|