--- # Deploy common Crans configuration and tools - hosts: all vars: # Debian mirror on adm debian_mirror: http://mirror.adm.crans.org/debian # Backup password backuppc_rsyncd_passwd: "{{ vault_backuppc_rsyncd_passwd }}" roles: - debian-apt-sources - common-tools - rsync-client # Plug LDAP on all servers - hosts: all vars: # LDAP binding ldap_base: 'dc=crans,dc=org' ldap_master_ipv4: '10.231.136.19' ldap_local_replica_uri: - "ldpa://10.231.136.38" - "ldpa://10.231.136.4" ldap_master_uri: "ldap://{{ ldap_master_ipv4 }}" ldap_user_tree: "cn=Utilisateurs,{{ ldap_base }}" ldap_nslcd_bind_dn: "cn=nslcd,ou=service-users,{{ ldap_base }}" ldap_nslcd_passwd: "{{ vault_ldap_nslcd_passwd }}" # Group permissions ssh_allow_groups: ssh nounou apprenti cableur root # Scripts will tell users to go there to manage their account intranet_url: 'https://intranet.crans.org/' # SSH keys for root account to use when LDAP is broken ssh_pub_keys: "{{ vault_ssh_pub_keys }}" roles: - ldap-client # Document servers - hosts: voyager.adm.crans.org # test only on voyager for now vars: moinmoin_user: "{{ vault_moinmoin_user }}" moinmoin_password: "{{ vault_moinmoin_password }}" moinmoin_base_url: https://wiki.crans.org/CransTechnique/LesServeurs roles: - moinmoin-server # Deploy LDAP replica - hosts: odlyd.adm.crans.org,soyouz.adm.crans.org,fy.adm.crans.org,thot.adm.crans.org roles: [] # TODO # Playbook to deploy NFS - hosts: crans,!odlyd.adm.crans.org roles: [] # TODO