## Summary This PR adds comprehensive support for deploying the **POTE** application project via Ansible, along with improvements to IP conflict detection and a new app stack provisioning system for Proxmox-managed LXC containers. ## Key Features ### 🆕 New Roles - **`roles/pote`**: Python/venv deployment role for POTE (PostgreSQL, cron jobs, Alembic migrations) - **`roles/app_setup`**: Generic app deployment role (Node.js/systemd) - **`roles/base_os`**: Base OS hardening role ### 🛡️ Safety Improvements - IP uniqueness validation within projects - Proxmox-side IP conflict detection - Enhanced error messages for IP conflicts ### 📦 New Playbooks - `playbooks/app/site.yml`: End-to-end app stack deployment - `playbooks/app/provision_vms.yml`: Proxmox guest provisioning - `playbooks/app/configure_app.yml`: OS + application configuration ## Security - ✅ All secrets stored in encrypted vault.yml - ✅ Deploy keys excluded via .gitignore - ✅ No plaintext secrets committed ## Testing - ✅ POTE successfully deployed to dev/qa/prod environments - ✅ All components validated (Git, PostgreSQL, cron, migrations) Co-authored-by: ilia <ilia@levkin.ca> Reviewed-on: #3
66 lines
1.5 KiB
YAML
66 lines
1.5 KiB
YAML
---
|
|
# Role: base_os
|
|
# Purpose: baseline OS config for app guests.
|
|
|
|
- name: Ensure apt cache is up to date
|
|
ansible.builtin.apt:
|
|
update_cache: true
|
|
cache_valid_time: 3600
|
|
|
|
- name: Install baseline packages
|
|
ansible.builtin.apt:
|
|
name: "{{ base_os_packages }}"
|
|
state: present
|
|
|
|
- name: Ensure app user exists
|
|
ansible.builtin.user:
|
|
name: "{{ base_os_user }}"
|
|
shell: "{{ base_os_user_shell }}"
|
|
groups: "{{ base_os_user_groups }}"
|
|
append: true
|
|
create_home: true
|
|
state: present
|
|
|
|
- name: Ensure app user has authorized SSH key
|
|
ansible.posix.authorized_key:
|
|
user: "{{ base_os_user }}"
|
|
state: present
|
|
key: "{{ base_os_user_ssh_public_key }}"
|
|
when: base_os_user_ssh_public_key | length > 0
|
|
|
|
- name: Configure passwordless sudo for app user
|
|
ansible.builtin.copy:
|
|
dest: "/etc/sudoers.d/{{ base_os_user }}"
|
|
content: "{{ base_os_user }} ALL=(ALL) NOPASSWD:ALL\n"
|
|
owner: root
|
|
group: root
|
|
mode: "0440"
|
|
when: base_os_passwordless_sudo | bool
|
|
|
|
- name: Ensure UFW allows SSH
|
|
ansible.builtin.ufw:
|
|
rule: allow
|
|
port: "{{ base_os_allow_ssh_port }}"
|
|
proto: tcp
|
|
|
|
- name: Ensure UFW allows backend port
|
|
ansible.builtin.ufw:
|
|
rule: allow
|
|
port: "{{ base_os_backend_port }}"
|
|
proto: tcp
|
|
when: base_os_enable_backend | bool
|
|
|
|
- name: Ensure UFW allows frontend port
|
|
ansible.builtin.ufw:
|
|
rule: allow
|
|
port: "{{ base_os_frontend_port }}"
|
|
proto: tcp
|
|
when: base_os_enable_frontend | bool
|
|
|
|
- name: Enable UFW (deny incoming by default)
|
|
ansible.builtin.ufw:
|
|
state: enabled
|
|
policy: deny
|
|
|
|
|