Some checks failed
CI / lint-and-test (pull_request) Successful in 1m21s
CI / ansible-validation (pull_request) Successful in 9m3s
CI / secret-scanning (pull_request) Successful in 3m19s
CI / dependency-scan (pull_request) Successful in 7m13s
CI / sast-scan (pull_request) Successful in 6m38s
CI / license-check (pull_request) Successful in 1m16s
CI / vault-check (pull_request) Failing after 6m40s
CI / playbook-test (pull_request) Successful in 9m28s
CI / container-scan (pull_request) Successful in 7m59s
CI / sonar-analysis (pull_request) Failing after 1m11s
CI / workflow-summary (pull_request) Successful in 1m11s
- Add roles/pote: Python/venv deployment role with PostgreSQL, cron jobs - Add playbooks/app/: Proxmox app stack provisioning and configuration - Add roles/app_setup: Generic app deployment role (Node.js/systemd) - Add roles/base_os: Base OS hardening role - Enhance roles/proxmox_vm: Split LXC/KVM tasks, improve error handling - Add IP uniqueness validation: Preflight check for duplicate IPs within projects - Add Proxmox-side IP conflict detection: Check existing LXC net0 configs - Update inventories/production/group_vars/all/main.yml: Add pote project config - Add vault.example.yml: Template for POTE secrets (git key, DB, SMTP) - Update .gitignore: Exclude deploy keys, backup files, and other secrets - Update documentation: README, role docs, execution flow guides Security: - All secrets stored in encrypted vault.yml (never committed in plaintext) - Deploy keys excluded via .gitignore - IP conflict guardrails prevent accidental duplicate IP assignments
52 lines
1.7 KiB
YAML
52 lines
1.7 KiB
YAML
---
|
|
# Playbook: app/ssh_client_config.yml
|
|
# Purpose: Ensure ~/.ssh/config has convenient host aliases for project envs.
|
|
# Targets: localhost
|
|
# Tags: app, ssh-config
|
|
#
|
|
# Example:
|
|
# ssh projectA-dev
|
|
# ssh projectA-qa
|
|
# ssh projectA-prod
|
|
|
|
- name: Configure SSH client aliases for app projects
|
|
hosts: localhost
|
|
connection: local
|
|
gather_facts: false
|
|
vars:
|
|
manage_ssh_config: "{{ manage_ssh_config | default(false) }}"
|
|
ssh_config_path: "{{ lookup('ansible.builtin.env', 'HOME') + '/.ssh/config' }}"
|
|
selected_projects: >-
|
|
{{
|
|
(app_projects | dict2items | map(attribute='key') | list)
|
|
if (app_project is not defined or app_project | length == 0)
|
|
else [app_project]
|
|
}}
|
|
|
|
tasks:
|
|
- name: Skip if SSH config management disabled
|
|
ansible.builtin.meta: end_play
|
|
when: not manage_ssh_config | bool
|
|
|
|
- name: Ensure ~/.ssh directory exists
|
|
ansible.builtin.file:
|
|
path: "{{ lookup('ansible.builtin.env', 'HOME') + '/.ssh' }}"
|
|
state: directory
|
|
mode: "0700"
|
|
|
|
- name: Add SSH config entries for each project/env
|
|
community.general.ssh_config:
|
|
user_ssh_config_file: "{{ ssh_config_path }}"
|
|
host: "{{ app_projects[item.0].envs[item.1].name | default(item.0 ~ '-' ~ item.1) }}"
|
|
hostname: "{{ (app_projects[item.0].envs[item.1].ip | string).split('/')[0] }}"
|
|
user: "{{ appuser_name | default('appuser') }}"
|
|
identity_file: "{{ ssh_identity_file | default(omit) }}"
|
|
state: present
|
|
loop: "{{ selected_projects | product(['dev', 'qa', 'prod']) | list }}"
|
|
when:
|
|
- app_projects[item.0] is defined
|
|
- app_projects[item.0].envs[item.1] is defined
|
|
- (app_projects[item.0].envs[item.1].ip | default('')) | length > 0
|
|
|
|
|