From 945aa9e6f634a078937fdf21d09f32e77f4c1a7b Mon Sep 17 00:00:00 2001 From: clarkzjw Date: Fri, 13 Jan 2023 16:44:02 -0800 Subject: reorganize folders --- clarkzjw.ca/config/atlas/README.md | 34 ----------- clarkzjw.ca/config/atlas/ansible.cfg | 14 ----- clarkzjw.ca/config/atlas/ansible/README.md | 34 +++++++++++ clarkzjw.ca/config/atlas/ansible/ansible.cfg | 14 +++++ clarkzjw.ca/config/atlas/ansible/init.yaml | 10 ++++ .../config/atlas/ansible/inventory/hosts.yaml | 3 + clarkzjw.ca/config/atlas/ansible/requirements.yaml | 6 ++ clarkzjw.ca/config/atlas/ansible/role.yaml | 3 + .../ansible/roles/debian_init/defaults/main.yaml | 0 .../ansible/roles/debian_init/tasks/main.yaml | 66 ++++++++++++++++++++++ .../atlas/ansible/roles/init/tasks/main.yaml | 56 ++++++++++++++++++ .../atlas/ansible/roles/samba/defaults/main.yaml | 3 + .../atlas/ansible/roles/samba/tasks/main.yaml | 53 +++++++++++++++++ .../ansible/roles/samba/templates/smb.conf.j2 | 33 +++++++++++ clarkzjw.ca/config/atlas/ansible/samba.yaml | 7 +++ clarkzjw.ca/config/atlas/ansible/setup.yaml | 7 +++ clarkzjw.ca/config/atlas/init.yaml | 10 ---- clarkzjw.ca/config/atlas/inventory/hosts.yaml | 3 - clarkzjw.ca/config/atlas/requirements.yaml | 6 -- clarkzjw.ca/config/atlas/role.yaml | 3 - .../atlas/roles/debian_init/defaults/main.yaml | 0 .../config/atlas/roles/debian_init/tasks/main.yaml | 66 ---------------------- .../config/atlas/roles/init/tasks/main.yaml | 56 ------------------ .../config/atlas/roles/samba/defaults/main.yaml | 3 - .../config/atlas/roles/samba/tasks/main.yaml | 53 ----------------- .../config/atlas/roles/samba/templates/smb.conf.j2 | 33 ----------- clarkzjw.ca/config/atlas/samba.yaml | 7 --- clarkzjw.ca/config/atlas/setup.yaml | 7 --- 28 files changed, 295 insertions(+), 295 deletions(-) delete mode 100644 clarkzjw.ca/config/atlas/README.md delete mode 100644 clarkzjw.ca/config/atlas/ansible.cfg create mode 100644 clarkzjw.ca/config/atlas/ansible/README.md create mode 100644 clarkzjw.ca/config/atlas/ansible/ansible.cfg create mode 100644 clarkzjw.ca/config/atlas/ansible/init.yaml create mode 100644 clarkzjw.ca/config/atlas/ansible/inventory/hosts.yaml create mode 100644 clarkzjw.ca/config/atlas/ansible/requirements.yaml create mode 100644 clarkzjw.ca/config/atlas/ansible/role.yaml create mode 100644 clarkzjw.ca/config/atlas/ansible/roles/debian_init/defaults/main.yaml create mode 100644 clarkzjw.ca/config/atlas/ansible/roles/debian_init/tasks/main.yaml create mode 100644 clarkzjw.ca/config/atlas/ansible/roles/init/tasks/main.yaml create mode 100644 clarkzjw.ca/config/atlas/ansible/roles/samba/defaults/main.yaml create mode 100644 clarkzjw.ca/config/atlas/ansible/roles/samba/tasks/main.yaml create mode 100644 clarkzjw.ca/config/atlas/ansible/roles/samba/templates/smb.conf.j2 create mode 100644 clarkzjw.ca/config/atlas/ansible/samba.yaml create mode 100644 clarkzjw.ca/config/atlas/ansible/setup.yaml delete mode 100644 clarkzjw.ca/config/atlas/init.yaml delete mode 100644 clarkzjw.ca/config/atlas/inventory/hosts.yaml delete mode 100644 clarkzjw.ca/config/atlas/requirements.yaml delete mode 100644 clarkzjw.ca/config/atlas/role.yaml delete mode 100644 clarkzjw.ca/config/atlas/roles/debian_init/defaults/main.yaml delete mode 100644 clarkzjw.ca/config/atlas/roles/debian_init/tasks/main.yaml delete mode 100644 clarkzjw.ca/config/atlas/roles/init/tasks/main.yaml delete mode 100644 clarkzjw.ca/config/atlas/roles/samba/defaults/main.yaml delete mode 100644 clarkzjw.ca/config/atlas/roles/samba/tasks/main.yaml delete mode 100644 clarkzjw.ca/config/atlas/roles/samba/templates/smb.conf.j2 delete mode 100644 clarkzjw.ca/config/atlas/samba.yaml delete mode 100644 clarkzjw.ca/config/atlas/setup.yaml diff --git a/clarkzjw.ca/config/atlas/README.md b/clarkzjw.ca/config/atlas/README.md deleted file mode 100644 index 55f8989..0000000 --- a/clarkzjw.ca/config/atlas/README.md +++ /dev/null @@ -1,34 +0,0 @@ -# Atlas - -Hostname: atlas -Usage: HomeLab Main NAS - -## Step - -### Init - -```bash -ansible-playbook init.yaml -K -k -``` - -Login and exec `sudo tailscale up` and authorize Tailscale in the admin panel. - -### Setup -```bash -ansible-playbook setup.yaml -``` - -### Import zfs pool -```bash -zpool status -zpool import pool1 - -... -zpool export pool1 -``` - -### Setup Samba -```bash -source admin-rc -ansible-playbook samba.yaml -``` diff --git a/clarkzjw.ca/config/atlas/ansible.cfg b/clarkzjw.ca/config/atlas/ansible.cfg deleted file mode 100644 index e0f6c28..0000000 --- a/clarkzjw.ca/config/atlas/ansible.cfg +++ /dev/null @@ -1,14 +0,0 @@ -[defaults] -host_key_checking = False -transport = ssh -remote_user = clarkzjw -roles_path = roles -inventory = inventory -force_color = True -interpreter_python = auto_silent - -[connection] -pipelining = True - -[privilege_escalation] -become = True diff --git a/clarkzjw.ca/config/atlas/ansible/README.md b/clarkzjw.ca/config/atlas/ansible/README.md new file mode 100644 index 0000000..55f8989 --- /dev/null +++ b/clarkzjw.ca/config/atlas/ansible/README.md @@ -0,0 +1,34 @@ +# Atlas + +Hostname: atlas +Usage: HomeLab Main NAS + +## Step + +### Init + +```bash +ansible-playbook init.yaml -K -k +``` + +Login and exec `sudo tailscale up` and authorize Tailscale in the admin panel. + +### Setup +```bash +ansible-playbook setup.yaml +``` + +### Import zfs pool +```bash +zpool status +zpool import pool1 + +... +zpool export pool1 +``` + +### Setup Samba +```bash +source admin-rc +ansible-playbook samba.yaml +``` diff --git a/clarkzjw.ca/config/atlas/ansible/ansible.cfg b/clarkzjw.ca/config/atlas/ansible/ansible.cfg new file mode 100644 index 0000000..e0f6c28 --- /dev/null +++ b/clarkzjw.ca/config/atlas/ansible/ansible.cfg @@ -0,0 +1,14 @@ +[defaults] +host_key_checking = False +transport = ssh +remote_user = clarkzjw +roles_path = roles +inventory = inventory +force_color = True +interpreter_python = auto_silent + +[connection] +pipelining = True + +[privilege_escalation] +become = True diff --git a/clarkzjw.ca/config/atlas/ansible/init.yaml b/clarkzjw.ca/config/atlas/ansible/init.yaml new file mode 100644 index 0000000..3dfbc09 --- /dev/null +++ b/clarkzjw.ca/config/atlas/ansible/init.yaml @@ -0,0 +1,10 @@ +--- +- name: Init + hosts: atlas + remote_user: root + gather_facts: true + vars: + ansible_ssh_common_args: "-J pve" + + roles: + - role: init diff --git a/clarkzjw.ca/config/atlas/ansible/inventory/hosts.yaml b/clarkzjw.ca/config/atlas/ansible/inventory/hosts.yaml new file mode 100644 index 0000000..bee48c4 --- /dev/null +++ b/clarkzjw.ca/config/atlas/ansible/inventory/hosts.yaml @@ -0,0 +1,3 @@ +all: + hosts: + atlas: diff --git a/clarkzjw.ca/config/atlas/ansible/requirements.yaml b/clarkzjw.ca/config/atlas/ansible/requirements.yaml new file mode 100644 index 0000000..33f6117 --- /dev/null +++ b/clarkzjw.ca/config/atlas/ansible/requirements.yaml @@ -0,0 +1,6 @@ +--- +collections: + - name: community.general + version: 4.7.0 + - name: ansible.posix + version: 1.3.0 diff --git a/clarkzjw.ca/config/atlas/ansible/role.yaml b/clarkzjw.ca/config/atlas/ansible/role.yaml new file mode 100644 index 0000000..ab3fca5 --- /dev/null +++ b/clarkzjw.ca/config/atlas/ansible/role.yaml @@ -0,0 +1,3 @@ +- hosts: "{{ target }}" + roles: + - role: "{{ role }}" diff --git a/clarkzjw.ca/config/atlas/ansible/roles/debian_init/defaults/main.yaml b/clarkzjw.ca/config/atlas/ansible/roles/debian_init/defaults/main.yaml new file mode 100644 index 0000000..e69de29 diff --git a/clarkzjw.ca/config/atlas/ansible/roles/debian_init/tasks/main.yaml b/clarkzjw.ca/config/atlas/ansible/roles/debian_init/tasks/main.yaml new file mode 100644 index 0000000..e53d3eb --- /dev/null +++ b/clarkzjw.ca/config/atlas/ansible/roles/debian_init/tasks/main.yaml @@ -0,0 +1,66 @@ +- name: Disable unattended-upgrades + systemd: + name: unattended-upgrades + state: stopped + enabled: false + +- name: Install packages + apt: + name: + - apt-transport-https + - build-essential + - ca-certificates + - cifs-utils + - vnstat + - postfix + - lsb-release + - python3 + - python3-dev + - python3-pip + - unzip + - gnupg + - rsync + - sudo + - htop + - curl + - tree + - zip + - vim + - zsh + - git + update_cache: true + +- name: Enable bullseye-backport + apt_repository: + repo: deb https://deb.debian.org/debian {{ ansible_distribution_release | lower }}-backports main contrib non-free + state: present + +# Check https://wiki.debian.org/ZFS for additional information +- name: Install ZFS + apt: + name: + - linux-headers-amd64 + - linux-headers-{{ ansible_kernel }} + - zfsutils-linux + - zfs-dkms + update_cache: true + fail_on_autoremove: yes + default_release: "{{ ansible_distribution_release | lower }}-backports" + +- name: Load zfs kernel module + modprobe: + name: zfs + state: present + +- name: Clean unneeded packages + apt: + autoremove: true + purge: true + +- name: Remove useless packages from the cache + apt: + autoclean: yes + +- name: Run the equivalent of "apt-get clean" as a separate step + apt: + clean: yes diff --git a/clarkzjw.ca/config/atlas/ansible/roles/init/tasks/main.yaml b/clarkzjw.ca/config/atlas/ansible/roles/init/tasks/main.yaml new file mode 100644 index 0000000..29cf529 --- /dev/null +++ b/clarkzjw.ca/config/atlas/ansible/roles/init/tasks/main.yaml @@ -0,0 +1,56 @@ +- name: Make sure we have a 'wheel' group + group: + name: wheel + state: present + +- name: Allow 'wheel' group to have passwordless sudo + lineinfile: + dest: /etc/sudoers + state: present + regexp: '^%wheel' + line: '%wheel ALL=(ALL) NOPASSWD: ALL' + validate: visudo -cf %s + +- name: Add sudoers users to wheel group + user: + name: clarkzjw + groups: wheel + append: yes + +- name: Set authorized keys taken from url + authorized_key: + user: clarkzjw + state: present + key: https://github.com/clarkzjw.keys + +- name: Add Tailscale GPG apt Key + apt_key: + url: https://pkgs.tailscale.com/stable/debian/bullseye.noarmor.gpg + keyring: /usr/share/keyrings/tailscale-archive-keyring.gpg + state: present + +- name: Add Tailscale Repository + get_url: + url: https://pkgs.tailscale.com/stable/debian/bullseye.tailscale-keyring.list + dest: /etc/apt/sources.list.d/tailscale.list + +- name: Install Tailscale + apt: + name: + - tailscale + update_cache: true + +- name: Disable Root Login + lineinfile: + dest: /etc/ssh/sshd_config + regexp: '^PermitRootLogin yes' + line: "PermitRootLogin no" + state: present + backup: yes + +- name: Restart SSHD + systemd: + name: ssh + enabled: true + state: restarted + daemon_reload: true diff --git a/clarkzjw.ca/config/atlas/ansible/roles/samba/defaults/main.yaml b/clarkzjw.ca/config/atlas/ansible/roles/samba/defaults/main.yaml new file mode 100644 index 0000000..88c23b1 --- /dev/null +++ b/clarkzjw.ca/config/atlas/ansible/roles/samba/defaults/main.yaml @@ -0,0 +1,3 @@ +samba_users: +- username: clarkzjw + password: "{{ lookup('env', 'SAMBA_PASSWORD') }}" \ No newline at end of file diff --git a/clarkzjw.ca/config/atlas/ansible/roles/samba/tasks/main.yaml b/clarkzjw.ca/config/atlas/ansible/roles/samba/tasks/main.yaml new file mode 100644 index 0000000..80950dc --- /dev/null +++ b/clarkzjw.ca/config/atlas/ansible/roles/samba/tasks/main.yaml @@ -0,0 +1,53 @@ +- name: Install Samba + apt: + name: + - samba + - smbclient + - cifs-utils + update_cache: true + +- name: Disable Samba NetBIOS server nmbd + systemd: + name: nmbd + state: stopped + enabled: false + +- name: render samba config file + template: + src: smb.conf.j2 + dest: "/etc/samba/smb.conf" + mode: 0644 + +# https://stackoverflow.com/questions/44762488/non-interactive-samba-user-creation-via-ansible +- name: shell - create samba users + shell: > + set -e -o pipefail + && (pdbedit --user={{ item.username }} 2>&1 > /dev/null) + || (echo '{{ item.password }}'; echo '{{ item.password }}') + | smbpasswd -s -a {{ item.username }} + args: + executable: /bin/bash + register: samba_create_users + changed_when: "'Added user' in samba_create_users.stdout" + loop: "{{ samba_users }}" + no_log: true + +- name: shell - set samba passwords correctly + shell: > + set -e -o pipefail + && (smbclient -U {{ item.username }}%{{ item.password }} -L 127.0.0.1 2>&1 > /dev/null) + || (echo '{{ item.password }}'; echo '{{ item.password }}') + | smbpasswd {{ item.username }} + args: + executable: /bin/bash + register: samba_verify_users + changed_when: "'New SMB password' in samba_verify_users.stdout" + loop: "{{ samba_users }}" + no_log: true + +- name: Restart SMB service + systemd: + name: smbd + state: restarted + enabled: true + daemon_reload: true diff --git a/clarkzjw.ca/config/atlas/ansible/roles/samba/templates/smb.conf.j2 b/clarkzjw.ca/config/atlas/ansible/roles/samba/templates/smb.conf.j2 new file mode 100644 index 0000000..06e2567 --- /dev/null +++ b/clarkzjw.ca/config/atlas/ansible/roles/samba/templates/smb.conf.j2 @@ -0,0 +1,33 @@ +[global] + workgroup = WORKGROUP + interfaces = 192.168.1.0/24 tailscale0 + bind interfaces only = yes + log file = /var/log/samba/log.%m + max log size = 1000 + logging = file + panic action = /usr/share/samba/panic-action %d + server role = standalone server + obey pam restrictions = yes + unix password sync = yes + passwd program = /usr/bin/passwd %u + passwd chat = *Enter\snew\s*\spassword:* %n\n *Retype\snew\s*\spassword:* %n\n *password\supdated\ssuccessfully* . + pam password change = yes + map to guest = bad user + +[homes] + comment = Home Directories + browseable = no + read only = yes + create mask = 0700 + directory mask = 0700 + valid users = %S + +[pool1] + comment = NAS Share + path = /pool1/clarkzjw + writable = yes + guest ok = no + valid users = @clarkzjw + force create mode = 770 + force directory mode = 770 + inherit permissions = yes diff --git a/clarkzjw.ca/config/atlas/ansible/samba.yaml b/clarkzjw.ca/config/atlas/ansible/samba.yaml new file mode 100644 index 0000000..f363afc --- /dev/null +++ b/clarkzjw.ca/config/atlas/ansible/samba.yaml @@ -0,0 +1,7 @@ +- name: Setup Samba + hosts: atlas + remote_user: clarkzjw + gather_facts: true + + roles: + - role: samba diff --git a/clarkzjw.ca/config/atlas/ansible/setup.yaml b/clarkzjw.ca/config/atlas/ansible/setup.yaml new file mode 100644 index 0000000..0dbbd4a --- /dev/null +++ b/clarkzjw.ca/config/atlas/ansible/setup.yaml @@ -0,0 +1,7 @@ +- name: Install ZFS and setup Debian + hosts: atlas + remote_user: clarkzjw + gather_facts: true + + roles: + - role: debian_init diff --git a/clarkzjw.ca/config/atlas/init.yaml b/clarkzjw.ca/config/atlas/init.yaml deleted file mode 100644 index 3dfbc09..0000000 --- a/clarkzjw.ca/config/atlas/init.yaml +++ /dev/null @@ -1,10 +0,0 @@ ---- -- name: Init - hosts: atlas - remote_user: root - gather_facts: true - vars: - ansible_ssh_common_args: "-J pve" - - roles: - - role: init diff --git a/clarkzjw.ca/config/atlas/inventory/hosts.yaml b/clarkzjw.ca/config/atlas/inventory/hosts.yaml deleted file mode 100644 index bee48c4..0000000 --- a/clarkzjw.ca/config/atlas/inventory/hosts.yaml +++ /dev/null @@ -1,3 +0,0 @@ -all: - hosts: - atlas: diff --git a/clarkzjw.ca/config/atlas/requirements.yaml b/clarkzjw.ca/config/atlas/requirements.yaml deleted file mode 100644 index 33f6117..0000000 --- a/clarkzjw.ca/config/atlas/requirements.yaml +++ /dev/null @@ -1,6 +0,0 @@ ---- -collections: - - name: community.general - version: 4.7.0 - - name: ansible.posix - version: 1.3.0 diff --git a/clarkzjw.ca/config/atlas/role.yaml b/clarkzjw.ca/config/atlas/role.yaml deleted file mode 100644 index ab3fca5..0000000 --- a/clarkzjw.ca/config/atlas/role.yaml +++ /dev/null @@ -1,3 +0,0 @@ -- hosts: "{{ target }}" - roles: - - role: "{{ role }}" diff --git a/clarkzjw.ca/config/atlas/roles/debian_init/defaults/main.yaml b/clarkzjw.ca/config/atlas/roles/debian_init/defaults/main.yaml deleted file mode 100644 index e69de29..0000000 diff --git a/clarkzjw.ca/config/atlas/roles/debian_init/tasks/main.yaml b/clarkzjw.ca/config/atlas/roles/debian_init/tasks/main.yaml deleted file mode 100644 index e53d3eb..0000000 --- a/clarkzjw.ca/config/atlas/roles/debian_init/tasks/main.yaml +++ /dev/null @@ -1,66 +0,0 @@ -- name: Disable unattended-upgrades - systemd: - name: unattended-upgrades - state: stopped - enabled: false - -- name: Install packages - apt: - name: - - apt-transport-https - - build-essential - - ca-certificates - - cifs-utils - - vnstat - - postfix - - lsb-release - - python3 - - python3-dev - - python3-pip - - unzip - - gnupg - - rsync - - sudo - - htop - - curl - - tree - - zip - - vim - - zsh - - git - update_cache: true - -- name: Enable bullseye-backport - apt_repository: - repo: deb https://deb.debian.org/debian {{ ansible_distribution_release | lower }}-backports main contrib non-free - state: present - -# Check https://wiki.debian.org/ZFS for additional information -- name: Install ZFS - apt: - name: - - linux-headers-amd64 - - linux-headers-{{ ansible_kernel }} - - zfsutils-linux - - zfs-dkms - update_cache: true - fail_on_autoremove: yes - default_release: "{{ ansible_distribution_release | lower }}-backports" - -- name: Load zfs kernel module - modprobe: - name: zfs - state: present - -- name: Clean unneeded packages - apt: - autoremove: true - purge: true - -- name: Remove useless packages from the cache - apt: - autoclean: yes - -- name: Run the equivalent of "apt-get clean" as a separate step - apt: - clean: yes diff --git a/clarkzjw.ca/config/atlas/roles/init/tasks/main.yaml b/clarkzjw.ca/config/atlas/roles/init/tasks/main.yaml deleted file mode 100644 index 29cf529..0000000 --- a/clarkzjw.ca/config/atlas/roles/init/tasks/main.yaml +++ /dev/null @@ -1,56 +0,0 @@ -- name: Make sure we have a 'wheel' group - group: - name: wheel - state: present - -- name: Allow 'wheel' group to have passwordless sudo - lineinfile: - dest: /etc/sudoers - state: present - regexp: '^%wheel' - line: '%wheel ALL=(ALL) NOPASSWD: ALL' - validate: visudo -cf %s - -- name: Add sudoers users to wheel group - user: - name: clarkzjw - groups: wheel - append: yes - -- name: Set authorized keys taken from url - authorized_key: - user: clarkzjw - state: present - key: https://github.com/clarkzjw.keys - -- name: Add Tailscale GPG apt Key - apt_key: - url: https://pkgs.tailscale.com/stable/debian/bullseye.noarmor.gpg - keyring: /usr/share/keyrings/tailscale-archive-keyring.gpg - state: present - -- name: Add Tailscale Repository - get_url: - url: https://pkgs.tailscale.com/stable/debian/bullseye.tailscale-keyring.list - dest: /etc/apt/sources.list.d/tailscale.list - -- name: Install Tailscale - apt: - name: - - tailscale - update_cache: true - -- name: Disable Root Login - lineinfile: - dest: /etc/ssh/sshd_config - regexp: '^PermitRootLogin yes' - line: "PermitRootLogin no" - state: present - backup: yes - -- name: Restart SSHD - systemd: - name: ssh - enabled: true - state: restarted - daemon_reload: true diff --git a/clarkzjw.ca/config/atlas/roles/samba/defaults/main.yaml b/clarkzjw.ca/config/atlas/roles/samba/defaults/main.yaml deleted file mode 100644 index 88c23b1..0000000 --- a/clarkzjw.ca/config/atlas/roles/samba/defaults/main.yaml +++ /dev/null @@ -1,3 +0,0 @@ -samba_users: -- username: clarkzjw - password: "{{ lookup('env', 'SAMBA_PASSWORD') }}" \ No newline at end of file diff --git a/clarkzjw.ca/config/atlas/roles/samba/tasks/main.yaml b/clarkzjw.ca/config/atlas/roles/samba/tasks/main.yaml deleted file mode 100644 index 80950dc..0000000 --- a/clarkzjw.ca/config/atlas/roles/samba/tasks/main.yaml +++ /dev/null @@ -1,53 +0,0 @@ -- name: Install Samba - apt: - name: - - samba - - smbclient - - cifs-utils - update_cache: true - -- name: Disable Samba NetBIOS server nmbd - systemd: - name: nmbd - state: stopped - enabled: false - -- name: render samba config file - template: - src: smb.conf.j2 - dest: "/etc/samba/smb.conf" - mode: 0644 - -# https://stackoverflow.com/questions/44762488/non-interactive-samba-user-creation-via-ansible -- name: shell - create samba users - shell: > - set -e -o pipefail - && (pdbedit --user={{ item.username }} 2>&1 > /dev/null) - || (echo '{{ item.password }}'; echo '{{ item.password }}') - | smbpasswd -s -a {{ item.username }} - args: - executable: /bin/bash - register: samba_create_users - changed_when: "'Added user' in samba_create_users.stdout" - loop: "{{ samba_users }}" - no_log: true - -- name: shell - set samba passwords correctly - shell: > - set -e -o pipefail - && (smbclient -U {{ item.username }}%{{ item.password }} -L 127.0.0.1 2>&1 > /dev/null) - || (echo '{{ item.password }}'; echo '{{ item.password }}') - | smbpasswd {{ item.username }} - args: - executable: /bin/bash - register: samba_verify_users - changed_when: "'New SMB password' in samba_verify_users.stdout" - loop: "{{ samba_users }}" - no_log: true - -- name: Restart SMB service - systemd: - name: smbd - state: restarted - enabled: true - daemon_reload: true diff --git a/clarkzjw.ca/config/atlas/roles/samba/templates/smb.conf.j2 b/clarkzjw.ca/config/atlas/roles/samba/templates/smb.conf.j2 deleted file mode 100644 index 06e2567..0000000 --- a/clarkzjw.ca/config/atlas/roles/samba/templates/smb.conf.j2 +++ /dev/null @@ -1,33 +0,0 @@ -[global] - workgroup = WORKGROUP - interfaces = 192.168.1.0/24 tailscale0 - bind interfaces only = yes - log file = /var/log/samba/log.%m - max log size = 1000 - logging = file - panic action = /usr/share/samba/panic-action %d - server role = standalone server - obey pam restrictions = yes - unix password sync = yes - passwd program = /usr/bin/passwd %u - passwd chat = *Enter\snew\s*\spassword:* %n\n *Retype\snew\s*\spassword:* %n\n *password\supdated\ssuccessfully* . - pam password change = yes - map to guest = bad user - -[homes] - comment = Home Directories - browseable = no - read only = yes - create mask = 0700 - directory mask = 0700 - valid users = %S - -[pool1] - comment = NAS Share - path = /pool1/clarkzjw - writable = yes - guest ok = no - valid users = @clarkzjw - force create mode = 770 - force directory mode = 770 - inherit permissions = yes diff --git a/clarkzjw.ca/config/atlas/samba.yaml b/clarkzjw.ca/config/atlas/samba.yaml deleted file mode 100644 index f363afc..0000000 --- a/clarkzjw.ca/config/atlas/samba.yaml +++ /dev/null @@ -1,7 +0,0 @@ -- name: Setup Samba - hosts: atlas - remote_user: clarkzjw - gather_facts: true - - roles: - - role: samba diff --git a/clarkzjw.ca/config/atlas/setup.yaml b/clarkzjw.ca/config/atlas/setup.yaml deleted file mode 100644 index 0dbbd4a..0000000 --- a/clarkzjw.ca/config/atlas/setup.yaml +++ /dev/null @@ -1,7 +0,0 @@ -- name: Install ZFS and setup Debian - hosts: atlas - remote_user: clarkzjw - gather_facts: true - - roles: - - role: debian_init -- cgit v1.2.3