Compare commits
1 commit
Author | SHA1 | Date | |
---|---|---|---|
9a02a326a9 |
23 changed files with 27 additions and 71 deletions
|
@ -72,11 +72,6 @@
|
|||
- role: terminals/kitty
|
||||
tags: kitty
|
||||
|
||||
# Install Ptyxis terminal
|
||||
- role: terminals/ptyxis
|
||||
when: ansible_distribution != "Ubuntu"
|
||||
tags: ptyxis
|
||||
|
||||
# Install fonts
|
||||
- role: fonts
|
||||
tags: fonts
|
||||
|
|
|
@ -1,8 +1,8 @@
|
|||
---
|
||||
- name: Install script for toolbox/distrobox name retrieval
|
||||
- name: Install script for toolbox name retrieval
|
||||
ansible.builtin.copy:
|
||||
src: files/boxname.sh
|
||||
dest: ~/.local/bin/boxname
|
||||
src: files/toolbox_name.sh
|
||||
dest: ~/.local/bin/toolbox_name
|
||||
mode: 0700
|
||||
|
||||
- name: Install script for paste.sr.ht
|
||||
|
|
|
@ -9,7 +9,6 @@
|
|||
loop:
|
||||
- ~/.local/bin
|
||||
- ~/.local/share
|
||||
- ~/.local/share/applications
|
||||
- ~/.ssh
|
||||
|
||||
- name: Create empty file for tokens
|
||||
|
|
|
@ -15,7 +15,6 @@
|
|||
immediate: true
|
||||
permanent: true
|
||||
state: enabled
|
||||
when: ansible_facts.services['firewalld'] is defined
|
||||
tags: firewall
|
||||
|
||||
- name: Enable cups
|
||||
|
|
|
@ -1 +0,0 @@
|
|||
install_generic.yml
|
|
@ -3,7 +3,6 @@
|
|||
community.general.copr:
|
||||
name: varlad/helix
|
||||
state: enabled
|
||||
when: ansible_distribution not in ("AlmaLinux")
|
||||
become: true
|
||||
|
||||
- name: Install the Helix
|
||||
|
|
|
@ -1 +1 @@
|
|||
install_generic.yml
|
||||
install_suse.yml
|
|
@ -38,5 +38,4 @@
|
|||
cmd: bash /home/{{ target_user }}/.local/bin/code-update.sh
|
||||
creates: /opt/VSCode-linux-x64
|
||||
become: true
|
||||
when: false
|
||||
tags: install
|
||||
|
|
3
roles/fail2ban/tasks/main.yml
Normal file
3
roles/fail2ban/tasks/main.yml
Normal file
|
@ -0,0 +1,3 @@
|
|||
---
|
||||
# TODO
|
||||
# Consider moving it to the firewall…
|
|
@ -1,6 +0,0 @@
|
|||
---
|
||||
- name: Install the required packages
|
||||
ansible.builtin.package:
|
||||
name: flatpak
|
||||
state: present
|
||||
become: true
|
|
@ -1,8 +1,4 @@
|
|||
---
|
||||
- name: Packages
|
||||
ansible.builtin.include_tasks: install.yml
|
||||
tags: install
|
||||
|
||||
- name: Enable Flathub
|
||||
community.general.flatpak_remote:
|
||||
name: flathub
|
||||
|
|
2
roles/lang/rust/tasks/main.yml
Normal file
2
roles/lang/rust/tasks/main.yml
Normal file
|
@ -0,0 +1,2 @@
|
|||
---
|
||||
# TODO
|
|
@ -80,7 +80,6 @@
|
|||
loop:
|
||||
- http
|
||||
- https
|
||||
when: ansible_facts.services['firewalld'] is defined
|
||||
tags: firewall
|
||||
|
||||
- name: Enable nginx
|
||||
|
|
|
@ -1,6 +0,0 @@
|
|||
[google-chrome]
|
||||
name=google-chrome
|
||||
baseurl=http://dl.google.com/linux/chrome/rpm/stable/x86_64
|
||||
enabled=1
|
||||
gpgcheck=1
|
||||
gpgkey=https://dl.google.com/linux/linux_signing_key.pub
|
|
@ -29,23 +29,5 @@
|
|||
community.general.copr:
|
||||
name: mfocko/mfocko
|
||||
state: enabled
|
||||
chroot: "epel-{{ ansible_distribution_major_version }}-{{ ansible_architecture }}"
|
||||
chroot: "epel-9-{{ ansible_architecture }}"
|
||||
become: true
|
||||
|
||||
- name: Install RPMFusion RPMs with GPG keys
|
||||
ansible.builtin.dnf:
|
||||
name:
|
||||
- "https://mirrors.rpmfusion.org/free/el/rpmfusion-free-release-{{ ansible_distribution_major_version }}.noarch.rpm"
|
||||
- "https://mirrors.rpmfusion.org/nonfree/el/rpmfusion-nonfree-release-{{ ansible_distribution_major_version }}.noarch.rpm"
|
||||
disable_gpg_check: true
|
||||
state: present
|
||||
tags: os-el-rpmfusion
|
||||
|
||||
- name: Install Google Chrome repository
|
||||
ansible.builtin.copy:
|
||||
src: files/google-chrome.repo
|
||||
dest: /etc/yum.repos.d/google-chrome.repo
|
||||
mode: 0640
|
||||
owner: root
|
||||
group: root
|
||||
tags: os-el-chrome
|
||||
|
|
2
roles/postgresql/tasks/main.yml
Normal file
2
roles/postgresql/tasks/main.yml
Normal file
|
@ -0,0 +1,2 @@
|
|||
---
|
||||
# TODO
|
|
@ -38,11 +38,18 @@ style = "cyan"
|
|||
[git_status]
|
||||
format = "[[(*$conflicted$untracked$modified$staged$renamed$deleted)](218) ($ahead_behind$stashed)]($style)"
|
||||
style = "cyan"
|
||||
conflicted = ""
|
||||
untracked = ""
|
||||
modified = ""
|
||||
staged = ""
|
||||
renamed = ""
|
||||
deleted = ""
|
||||
stashed = "≡"
|
||||
|
||||
[custom.toolbox]
|
||||
when = "ls /run/.containerenv"
|
||||
symbol = " "
|
||||
command = "~/.local/bin/boxname"
|
||||
symbol = " "
|
||||
command = "~/.local/bin/toolbox_name.sh"
|
||||
format = "in [$symbol($output )]($style)"
|
||||
style = "bold purple"
|
||||
|
||||
|
|
|
@ -1,18 +1,13 @@
|
|||
---
|
||||
- name: SSH family packages for co-Ubuntu
|
||||
ansible.builtin.set_fact:
|
||||
ssh_packages: [openssh, openssh-clients, openssh-server]
|
||||
when: ansible_distribution not in ("Ubuntu", "Archlinux")
|
||||
|
||||
- name: SSH family packages for Ubuntu
|
||||
ansible.builtin.set_fact:
|
||||
ssh_packages: [openssh-client, openssh-server]
|
||||
when: ansible_distribution == "Ubuntu"
|
||||
|
||||
- name: SSH family package for archLinux
|
||||
- name: SSH family packages for co-Ubuntu
|
||||
ansible.builtin.set_fact:
|
||||
ssh_packages: [openssh]
|
||||
when: ansible_distribution == "Archlinux"
|
||||
ssh_packages: [openssh, openssh-clients, openssh-server]
|
||||
when: ansible_distribution != "Ubuntu"
|
||||
|
||||
- name: Install the SSH family
|
||||
ansible.builtin.package:
|
||||
|
|
|
@ -41,7 +41,6 @@
|
|||
immediate: true
|
||||
permanent: true
|
||||
state: enabled
|
||||
when: ansible_facts.services['firewalld'] is defined
|
||||
notify: "Restart SSH server"
|
||||
tags: firewall
|
||||
|
||||
|
@ -50,7 +49,6 @@
|
|||
service: ssh
|
||||
permanent: true
|
||||
state: disabled
|
||||
when: ansible_facts.services['firewalld'] is defined
|
||||
tags: firewall
|
||||
|
||||
- name: Set trusted CA
|
||||
|
|
|
@ -1,6 +0,0 @@
|
|||
---
|
||||
- name: Install Ptyxis
|
||||
community.general.flatpak:
|
||||
name: "https://nightly.gnome.org/repo/appstream/org.gnome.Ptyxis.Devel.flatpakref"
|
||||
state: present
|
||||
become: true
|
|
@ -41,7 +41,7 @@
|
|||
gateway: "{{ wg_gateway }}"
|
||||
peers: "{{ wg_peers }}"
|
||||
ansible.builtin.template:
|
||||
src: "templates/wg.conf"
|
||||
src: "{{ wg_ifname }}.conf"
|
||||
dest: "/etc/wireguard/{{ wg_ifname }}.conf"
|
||||
owner: root
|
||||
group: root
|
||||
|
@ -49,7 +49,7 @@
|
|||
|
||||
- name: Set up the DNS on AlmaLinux
|
||||
ansible.builtin.include_tasks: "dns_{{ ansible_distribution }}.yml"
|
||||
when: wg_domain and ansible_distribution == "AlmaLinux"
|
||||
when: domain and ansible_distribution == "AlmaLinux"
|
||||
|
||||
- name: Enable and start the wireguard connection
|
||||
ansible.builtin.service:
|
||||
|
|
Loading…
Reference in a new issue