Some checks failed
CI / lint-and-test (pull_request) Failing after 1m20s
CI / ansible-validation (pull_request) Successful in 6m40s
CI / secret-scanning (pull_request) Successful in 2m36s
CI / dependency-scan (pull_request) Successful in 6m12s
CI / sast-scan (pull_request) Successful in 6m48s
CI / license-check (pull_request) Successful in 1m16s
CI / vault-check (pull_request) Failing after 6m13s
CI / playbook-test (pull_request) Successful in 6m34s
CI / container-scan (pull_request) Successful in 6m57s
CI / sonar-analysis (pull_request) Failing after 1m10s
CI / workflow-summary (pull_request) Successful in 1m11s
- Add roles/pote: Python/venv deployment role with PostgreSQL, cron jobs - Add playbooks/app/: Proxmox app stack provisioning and configuration - Add roles/app_setup: Generic app deployment role (Node.js/systemd) - Add roles/base_os: Base OS hardening role - Enhance roles/proxmox_vm: Split LXC/KVM tasks, improve error handling - Add IP uniqueness validation: Preflight check for duplicate IPs within projects - Add Proxmox-side IP conflict detection: Check existing LXC net0 configs - Update inventories/production/group_vars/all/main.yml: Add pote project config - Add vault.example.yml: Template for POTE secrets (git key, DB, SMTP) - Update .gitignore: Exclude deploy keys, backup files, and other secrets - Update documentation: README, role docs, execution flow guides Security: - All secrets stored in encrypted vault.yml (never committed in plaintext) - Deploy keys excluded via .gitignore - IP conflict guardrails prevent accidental duplicate IP assignments
85 lines
2.0 KiB
YAML
85 lines
2.0 KiB
YAML
---
|
|
# Role: app_setup
|
|
# Purpose: create app layout, env file, deploy script, and systemd units.
|
|
|
|
- name: Ensure app root directory exists
|
|
ansible.builtin.file:
|
|
path: "{{ app_root }}"
|
|
state: directory
|
|
owner: "{{ app_owner }}"
|
|
group: "{{ app_group }}"
|
|
mode: "0755"
|
|
|
|
- name: Ensure backend directory exists
|
|
ansible.builtin.file:
|
|
path: "{{ app_backend_dir }}"
|
|
state: directory
|
|
owner: "{{ app_owner }}"
|
|
group: "{{ app_group }}"
|
|
mode: "0755"
|
|
when: app_enable_backend | bool
|
|
|
|
- name: Ensure frontend directory exists
|
|
ansible.builtin.file:
|
|
path: "{{ app_frontend_dir }}"
|
|
state: directory
|
|
owner: "{{ app_owner }}"
|
|
group: "{{ app_group }}"
|
|
mode: "0755"
|
|
when: app_enable_frontend | bool
|
|
|
|
- name: Deploy environment file for this env
|
|
ansible.builtin.template:
|
|
src: env.j2
|
|
dest: "{{ app_root }}/.env.{{ app_env }}"
|
|
owner: "{{ app_owner }}"
|
|
group: "{{ app_group }}"
|
|
mode: "0640"
|
|
|
|
- name: Deploy deploy script
|
|
ansible.builtin.template:
|
|
src: deploy_app.sh.j2
|
|
dest: /usr/local/bin/deploy_app.sh
|
|
owner: root
|
|
group: root
|
|
mode: "0755"
|
|
|
|
- name: Deploy systemd unit for backend
|
|
ansible.builtin.template:
|
|
src: app-backend.service.j2
|
|
dest: /etc/systemd/system/app-backend.service
|
|
owner: root
|
|
group: root
|
|
mode: "0644"
|
|
notify: Reload systemd
|
|
when: app_enable_backend | bool
|
|
|
|
- name: Deploy systemd unit for frontend
|
|
ansible.builtin.template:
|
|
src: app-frontend.service.j2
|
|
dest: /etc/systemd/system/app-frontend.service
|
|
owner: root
|
|
group: root
|
|
mode: "0644"
|
|
notify: Reload systemd
|
|
when: app_enable_frontend | bool
|
|
|
|
- name: Ensure systemd is reloaded before enabling services
|
|
ansible.builtin.meta: flush_handlers
|
|
|
|
- name: Enable and start backend service
|
|
ansible.builtin.systemd:
|
|
name: app-backend.service
|
|
enabled: true
|
|
state: started
|
|
when: app_enable_backend | bool
|
|
|
|
- name: Enable and start frontend service
|
|
ansible.builtin.systemd:
|
|
name: app-frontend.service
|
|
enabled: true
|
|
state: started
|
|
when: app_enable_frontend | bool
|
|
|
|
|