Prepare ansible role for AlmaLinux 10

* Moved from docker to podman
* Refactored certificate generation
This commit is contained in:
2025-07-20 17:58:55 +03:00
parent 740968eac9
commit e2842db808
14 changed files with 289 additions and 238 deletions

View File

@@ -1,6 +1,5 @@
[defaults] [defaults]
hostfile = hosts.ini hostfile = hosts.ini
log_path = ansible-log.log
host_key_checking = false host_key_checking = false
interpreter_python = /usr/bin/python3 interpreter_python = /usr/bin/python3
forks = 30 forks = 30

View File

@@ -1,27 +1,48 @@
--- ---
- name: Create configs - name: Create server configs
block: block:
- name: Copy server.conf - name: Copy server.conf
ansible.builtin.template: ansible.builtin.template:
src: templates/server.conf.j2 src: templates/server.conf.j2
dest: "{{ rproxy_dir }}/sites/{{ rproxy_service_name }}.conf" dest: "{{ rproxy_dir }}/sites/{{ rproxy_service_name }}.conf"
- name: Copy server certificate cnf - name: Generate certificates for {{ rproxy_service_name }}
ansible.builtin.template: block:
src: templates/server.cnf.j2 - name: "Generate {{ rproxy_service_name }}.key"
dest: '{{ rproxy_dir }}/certs/{{ rproxy_service_name }}.cnf' community.crypto.openssl_privatekey:
path: "{{ rproxy_dir }}/certs/{{ rproxy_service_name }}.key"
size: "2048"
- name: Generate server key - name: "Generate {{ rproxy_service_name }}.csr"
ansible.builtin.shell: community.crypto.openssl_csr:
cmd: 'openssl genrsa -out {{ rproxy_dir }}/certs/{{ rproxy_service_name }}.key 2048' path: "{{ rproxy_dir }}/certs/{{ rproxy_service_name }}.csr"
privatekey_path: "{{ rproxy_dir }}/certs/{{ rproxy_service_name }}.key"
country_name: "RU"
state_or_province_name: "RU"
locality_name: "MSK"
organization_name: "{{ ansible_domain }}"
organizational_unit_name: "IT"
common_name: "{{ rproxy_service_name }}.{{ ansible_facts['domain'] }}"
email_address: "admin@{{ ansible_domain }}"
subject_alt_name: "DNS:{{ rproxy_service_name }}.{{ ansible_facts['domain'] }},DNS:{{ ansible_facts['hostname'] }}.{{ ansible_facts['domain'] }},IP:{{ ansible_facts['default_ipv4']['address'] }}"
key_usage:
- digitalSignature
- nonRepudiation
- keyEncipherment
- dataEncipherment
extended_key_usage:
- serverAuth
- name: Generate server csr - name: "Generate {{ rproxy_service_name }}.crt"
ansible.builtin.shell: community.crypto.x509_certificate:
cmd: 'openssl req -key {{ rproxy_dir }}/certs/{{ rproxy_service_name }}.key -new -out {{ rproxy_dir }}/certs/{{ rproxy_service_name }}.csr -config {{ rproxy_dir }}/certs/{{ rproxy_service_name }}.cnf' csr_path: "{{ rproxy_dir }}/certs/{{ rproxy_service_name }}.csr"
path: "{{ rproxy_dir }}/certs/{{ rproxy_service_name }}.crt"
- name: Sign server certificate privatekey_path: "{{ rproxy_dir }}/certs/{{ rproxy_service_name }}.key"
ansible.builtin.shell: provider: ownca
cmd: 'openssl x509 -req -CA {{ rproxy_dir }}/certs/RootCA.crt -CAkey {{ rproxy_dir }}/certs/RootCA.key -in {{ rproxy_dir }}/certs/{{ rproxy_service_name }}.csr -out {{ rproxy_dir }}/certs/{{ rproxy_service_name }}.crt -CAcreateserial -extfile {{ rproxy_dir }}/certs/{{ rproxy_service_name }}.cnf -days 365 -extensions v3_x509' ownca_create_subject_key_identifier: always_create
ownca_path: "{{ rproxy_dir }}/certs/RootCA.crt"
ownca_privatekey_path: "{{ rproxy_dir }}/certs/RootCA.key"
ownca_not_after: "+365d"
- name: Create fullchain certificate - name: Create fullchain certificate
ansible.builtin.shell: ansible.builtin.shell:
@@ -32,13 +53,40 @@
path: "{{ rproxy_dir }}/certs/{{ rproxy_service_name }}.csr" path: "{{ rproxy_dir }}/certs/{{ rproxy_service_name }}.csr"
state: absent state: absent
- name: Delete cnf
ansible.builtin.file:
path: "{{ rproxy_dir }}/certs/{{ rproxy_service_name }}.cnf"
state: absent
- name: Restart rproxy - name: Restart rproxy
community.docker.docker_compose: block:
project_src: "{{ rproxy_dir }}" - name: Restart container
build: false containers.podman.podman_container:
restarted: true name: rproxy
image: "nginx:{{ rproxy_version }}"
state: started
restart: true
ports:
- "443:443"
- "80:80"
- "9000:9000"
volumes:
- '{{ rproxy_dir }}/nginx.conf:/etc/nginx/nginx.conf:z,rw'
- '{{ rproxy_dir }}/sites:/etc/nginx/sites:z,rw'
- '{{ rproxy_dir }}/certs:/etc/nginx/certs:z,rw'
- '{{ repo_data_dir }}:/repo:z,rw'
- "/etc/localtime:/etc/localtime:ro"
privileged: true
security_opt:
- "label=disable"
log_driver: journald
generate_systemd:
path: /etc/systemd/system/
restart_policy: always
stop_timeout: 120
names: true
- name: Daemon reload
ansible.builtin.shell:
cmd: systemctl daemon-reload
- name: Enable rproxy service
ansible.builtin.systemd:
name: "container-rproxy.service"
state: started
enabled: yes

View File

@@ -1,33 +0,0 @@
---
- name: Install python3.11
ansible.builtin.yum:
name:
- python3.11
- python3.11-setuptools
- python3.11-pip
update_cache: yes
- name: Change default python3 to v3.11
ansible.builtin.alternatives:
name: python3
path: /usr/bin/python3.11
- name: Upgrade pip
ansible.builtin.pip:
name: pip
state: latest
executable: pip3
- name: Install docker
ansible.builtin.pip:
name:
- docker
- docker-compose
- name: Enable docker (RHEL)
ansible.builtin.systemd:
name: docker
state: restarted
enabled: true
daemon_reload: true
when: ansible_facts['os_family'] == "RedHat"

View File

@@ -1,5 +1,5 @@
--- ---
- name: Create docker repository - name: Prepare for image repository
block: block:
- name: Remove dockerrepo dir - name: Remove dockerrepo dir
ansible.builtin.file: ansible.builtin.file:
@@ -21,27 +21,43 @@
path: "{{ dockerrepo_dir }}/certs" path: "{{ dockerrepo_dir }}/certs"
state: directory state: directory
- name: Copy docker-compose - name: Create certificates for image repository
ansible.builtin.template: block:
src: templates/docker-compose.dockerrepo.yml.j2 - name: "Generate dockerrepo.key"
dest: "{{ dockerrepo_dir }}/docker-compose.yml" community.crypto.openssl_privatekey:
path: "{{ dockerrepo_dir }}/certs/dockerrepo.key"
size: "2048"
- name: Copy dockerrepo certificate cnf - name: "Generate server.csr"
ansible.builtin.template: community.crypto.openssl_csr:
src: templates/dockerrepo.cnf.j2 path: "{{ dockerrepo_dir }}/certs/dockerrepo.csr"
dest: '{{ dockerrepo_dir }}/certs/dockerrepo.cnf' privatekey_path: "{{ dockerrepo_dir }}/certs/dockerrepo.key"
country_name: "RU"
state_or_province_name: "RU"
locality_name: "MSK"
organization_name: "{{ ansible_domain }}"
organizational_unit_name: "IT"
common_name: "{{ ansible_facts['hostname'] }}.{{ ansible_facts['domain'] }}"
email_address: "admin@{{ ansible_domain }}"
subject_alt_name: "DNS:{{ ansible_facts['hostname'] }}.{{ ansible_facts['domain'] }},DNS:imagerepo.{{ ansible_facts['domain'] }},IP:{{ ansible_facts['default_ipv4']['address'] }}"
key_usage:
- digitalSignature
- nonRepudiation
- keyEncipherment
- dataEncipherment
extended_key_usage:
- serverAuth
- name: Generate dockerrepo certificate key - name: "Generate server.crt"
ansible.builtin.shell: community.crypto.x509_certificate:
cmd: 'openssl genrsa -out {{ dockerrepo_dir }}/certs/dockerrepo.key 2048' csr_path: "{{ dockerrepo_dir }}/certs/dockerrepo.csr"
path: "{{ dockerrepo_dir }}/certs/dockerrepo.crt"
- name: Generate dockerrepo csr privatekey_path: "{{ dockerrepo_dir }}/certs/dockerrepo.key"
ansible.builtin.shell: provider: ownca
cmd: 'openssl req -key {{ dockerrepo_dir }}/certs/dockerrepo.key -new -out {{ dockerrepo_dir }}/certs/dockerrepo.csr -config {{ dockerrepo_dir }}/certs/dockerrepo.cnf' ownca_create_subject_key_identifier: always_create
ownca_path: "{{ rproxy_dir }}/certs/RootCA.crt"
- name: Sign dockerrepo certificate ownca_privatekey_path: "{{ rproxy_dir }}/certs/RootCA.key"
ansible.builtin.shell: ownca_not_after: "+365d"
cmd: 'openssl x509 -req -CA {{ rproxy_dir }}/certs/RootCA.crt -CAkey {{ rproxy_dir }}/certs/RootCA.key -in {{ dockerrepo_dir }}/certs/dockerrepo.csr -out {{ dockerrepo_dir }}/certs/dockerrepo.crt -CAcreateserial -extfile {{ dockerrepo_dir }}/certs/dockerrepo.cnf -days 365 -extensions v3_x509'
- name: Create fullchain certificate - name: Create fullchain certificate
ansible.builtin.shell: ansible.builtin.shell:
@@ -52,13 +68,48 @@
path: "{{ dockerrepo_dir }}/certs/dockerrepo.csr" path: "{{ dockerrepo_dir }}/certs/dockerrepo.csr"
state: absent state: absent
- name: Delete cnf - name: Start image repository
ansible.builtin.file: block:
path: "{{ dockerrepo_dir }}/certs/dockerrepo.cnf" - name: Pull repo image
containers.podman.podman_image:
name: registry:latest
state: present
- name: Delete image repository container if exists
containers.podman.podman_container:
name: registry
state: absent state: absent
- name: Restart rproxy - name: Start registry
community.docker.docker_compose: containers.podman.podman_container:
project_src: "{{ dockerrepo_dir }}" name: registry
build: false image: registry:latest
restarted: true state: started
ports:
- "5000:5000"
environment:
- REGISTRY_HTTP_TLS_CERTIFICATE=/certs/dockerrepo.crt
- REGISTRY_HTTP_TLS_KEY=/certs/dockerrepo.key
volumes:
- "{{ dockerrepo_data_dir }}:/var/lib/registry:z,rw"
- "{{ dockerrepo_dir }}/certs:/certs:z,rw"
- "/etc/localtime:/etc/localtime:ro"
privileged: true
security_opt:
- "label=disable"
log_driver: journald
generate_systemd:
path: /etc/systemd/system/
restart_policy: always
stop_timeout: 120
names: true
- name: Daemon reload
ansible.builtin.shell:
cmd: systemctl daemon-reload
- name: Enable registry service
ansible.builtin.systemd:
name: "container-registry.service"
state: started
enabled: yes

View File

@@ -1,7 +1,7 @@
--- ---
- name: Docker install - name: Podman install
ansible.builtin.include_tasks: ansible.builtin.include_tasks:
file: docker.yml file: podman.yml
apply: apply:
tags: install tags: install
tags: tags:

View File

@@ -0,0 +1,17 @@
---
- name: Install podman
ansible.builtin.yum:
name:
- podman
- podman-compose
- podman-docker
- podman-remote
- podman-tui
- buildah
update_cache: yes
- name: Enable Podman
ansible.builtin.systemd:
name: podman
state: started
enabled: yes

View File

@@ -1,5 +1,5 @@
--- ---
- name: Create https repository - name: Prepare for https repository
block: block:
- name: Create repo dir - name: Create repo dir
ansible.builtin.file: ansible.builtin.file:
@@ -12,22 +12,43 @@
src: files/repo.conf src: files/repo.conf
dest: "{{ rproxy_dir }}/sites/repo.conf" dest: "{{ rproxy_dir }}/sites/repo.conf"
- name: Copy repo certificate cnf - name: Create https certificates for repository
ansible.builtin.template: block:
src: templates/repo.cnf.j2 - name: "Generate repo.key"
dest: '{{ rproxy_dir }}/certs/repo.cnf' community.crypto.openssl_privatekey:
path: "{{ rproxy_dir }}/certs/repo.key"
size: "2048"
- name: Generate repo certificate key - name: "Generate server.csr"
ansible.builtin.shell: community.crypto.openssl_csr:
cmd: 'openssl genrsa -out {{ rproxy_dir }}/certs/repo.key 2048' path: "{{ rproxy_dir }}/certs/repo.csr"
privatekey_path: "{{ rproxy_dir }}/certs/repo.key"
country_name: "RU"
state_or_province_name: "RU"
locality_name: "MSK"
organization_name: "{{ ansible_domain }}"
organizational_unit_name: "IT"
common_name: "{{ ansible_facts['hostname'] }}.{{ ansible_facts['domain'] }}"
email_address: "admin@{{ ansible_domain }}"
subject_alt_name: "DNS:{{ ansible_facts['hostname'] }}.{{ ansible_facts['domain'] }},DNS:repo.{{ ansible_facts['domain'] }},IP:{{ ansible_facts['default_ipv4']['address'] }}"
key_usage:
- digitalSignature
- nonRepudiation
- keyEncipherment
- dataEncipherment
extended_key_usage:
- serverAuth
- name: Generate server csr - name: "Generate server.crt"
ansible.builtin.shell: community.crypto.x509_certificate:
cmd: 'openssl req -key {{ rproxy_dir }}/certs/repo.key -new -out {{ rproxy_dir }}/certs/repo.csr -config {{ rproxy_dir }}/certs/repo.cnf' csr_path: "{{ rproxy_dir }}/certs/repo.csr"
path: "{{ rproxy_dir }}/certs/repo.crt"
- name: Sign server certificate privatekey_path: "{{ rproxy_dir }}/certs/repo.key"
ansible.builtin.shell: provider: ownca
cmd: 'openssl x509 -req -CA {{ rproxy_dir }}/certs/RootCA.crt -CAkey {{ rproxy_dir }}/certs/RootCA.key -in {{ rproxy_dir }}/certs/repo.csr -out {{ rproxy_dir }}/certs/repo.crt -CAcreateserial -extfile {{ rproxy_dir }}/certs/repo.cnf -days 365 -extensions v3_x509' ownca_create_subject_key_identifier: always_create
ownca_path: "{{ rproxy_dir }}/certs/RootCA.crt"
ownca_privatekey_path: "{{ rproxy_dir }}/certs/RootCA.key"
ownca_not_after: "+365d"
- name: Create fullchain certificate - name: Create fullchain certificate
ansible.builtin.shell: ansible.builtin.shell:
@@ -38,13 +59,40 @@
path: "{{ rproxy_dir }}/certs/repo.csr" path: "{{ rproxy_dir }}/certs/repo.csr"
state: absent state: absent
- name: Delete cnf
ansible.builtin.file:
path: "{{ rproxy_dir }}/certs/repo.cnf"
state: absent
- name: Restart rproxy - name: Restart rproxy
community.docker.docker_compose: block:
project_src: "{{ rproxy_dir }}" - name: Restart container
build: false containers.podman.podman_container:
restarted: true name: rproxy
image: "nginx:{{ rproxy_version }}"
state: started
restart: true
ports:
- "443:443"
- "80:80"
- "9000:9000"
volumes:
- '{{ rproxy_dir }}/nginx.conf:/etc/nginx/nginx.conf:z,rw'
- '{{ rproxy_dir }}/sites:/etc/nginx/sites:z,rw'
- '{{ rproxy_dir }}/certs:/etc/nginx/certs:z,rw'
- '{{ repo_data_dir }}:/repo:z,rw'
- "/etc/localtime:/etc/localtime:ro"
privileged: true
security_opt:
- "label=disable"
log_driver: journald
generate_systemd:
path: /etc/systemd/system/
restart_policy: always
stop_timeout: 120
names: true
- name: Daemon reload
ansible.builtin.shell:
cmd: systemctl daemon-reload
- name: Enable rproxy service
ansible.builtin.systemd:
name: "container-rproxy.service"
state: started
enabled: yes

View File

@@ -1,5 +1,5 @@
--- ---
- name: Install rproxy - name: Prepare dirs for rproxy
block: block:
- name: Remove rproxy dir - name: Remove rproxy dir
ansible.builtin.file: ansible.builtin.file:
@@ -21,11 +21,6 @@
path: "{{ rproxy_dir }}/certs" path: "{{ rproxy_dir }}/certs"
state: directory state: directory
- name: Copy docker-compose
ansible.builtin.template:
src: templates/docker-compose.rproxy.yml.j2
dest: "{{ rproxy_dir }}/docker-compose.yml"
- name: Copy nginx.conf - name: Copy nginx.conf
ansible.builtin.copy: ansible.builtin.copy:
src: files/nginx.conf src: files/nginx.conf
@@ -41,6 +36,49 @@
src: files/RootCA.key src: files/RootCA.key
dest: '{{ rproxy_dir }}/certs/RootCA.key' dest: '{{ rproxy_dir }}/certs/RootCA.key'
- name: Install rproxy
block:
- name: Pull rproxy image
containers.podman.podman_image:
name: "nginx:{{ rproxy_version }}"
state: present
- name: Delete rproxy container if exists
containers.podman.podman_container:
name: rproxy
state: absent
- name: Start rproxy - name: Start rproxy
community.docker.docker_compose: containers.podman.podman_container:
project_src: "{{ rproxy_dir }}" name: rproxy
image: "nginx:{{ rproxy_version }}"
state: started
ports:
- "443:443"
- "80:80"
- "9000:9000"
volumes:
- '{{ rproxy_dir }}/nginx.conf:/etc/nginx/nginx.conf:z,rw'
- '{{ rproxy_dir }}/sites:/etc/nginx/sites:z,rw'
- '{{ rproxy_dir }}/certs:/etc/nginx/certs:z,rw'
- '{{ repo_data_dir }}:/repo:z,rw'
- "/etc/localtime:/etc/localtime:ro"
privileged: true
security_opt:
- "label=disable"
log_driver: journald
generate_systemd:
path: /etc/systemd/system/
restart_policy: always
stop_timeout: 120
names: true
- name: Daemon reload
ansible.builtin.shell:
cmd: systemctl daemon-reload
- name: Enable rproxy service
ansible.builtin.systemd:
name: "container-rproxy.service"
state: started
enabled: yes

View File

@@ -1,15 +0,0 @@
version: '3.3'
services:
nginx:
image: registry:latest
container_name: dockerrepo
restart: always
environment:
- REGISTRY_HTTP_TLS_CERTIFICATE=/certs/dockerrepo.crt
- REGISTRY_HTTP_TLS_KEY=/certs/dockerrepo.key
volumes:
- '{{ dockerrepo_data_dir }}:/var/lib/registry'
- '{{ dockerrepo_dir }}/certs:/certs'
ports:
- 5000:5000

View File

@@ -1,16 +0,0 @@
version: '3.3'
services:
nginx:
image: nginx:latest
container_name: rproxy
restart: always
volumes:
- '{{ rproxy_dir }}/nginx.conf:/etc/nginx/nginx.conf'
- '{{ rproxy_dir }}/sites:/etc/nginx/sites'
- '{{ rproxy_dir }}/certs:/etc/nginx/certs'
- '{{ repo_data_dir }}:/repo'
ports:
- 443:443
- 80:80
- 9000:9000

View File

@@ -1,29 +0,0 @@
[ req ]
prompt = no
distinguished_name = dockerrepo.{{ ansible_domain }}
req_extensions = v3_req
x509_extensions = v3_x509
[ dockerrepo.{{ ansible_domain }} ]
countryName = RU
stateOrProvinceName = RU
localityName = MSK
organizationName = {{ ansible_domain }}
organizationalUnitName = IT
commonName = dockerrepo.{{ ansible_domain }}
emailAddress = admin@{{ ansible_domain }}
[ v3_req ]
basicConstraints = CA:false
keyUsage = digitalSignature, keyEncipherment
subjectAltName = @sans
[ v3_x509 ]
basicConstraints = CA:false
keyUsage = digitalSignature, keyEncipherment
subjectAltName = @sans
[ sans ]
DNS.1 = dockerrepo.{{ ansible_domain }}
IP.1 = {{ {{ ansible_facts['default_ipv4']['address'] }} }}

View File

@@ -1,29 +0,0 @@
[ req ]
prompt = no
distinguished_name = repo.{{ ansible_domain }}
req_extensions = v3_req
x509_extensions = v3_x509
[ repo.{{ ansible_domain }} ]
countryName = RU
stateOrProvinceName = RU
localityName = MSK
organizationName = {{ ansible_domain }}
organizationalUnitName = IT
commonName = repo.{{ ansible_domain }}
emailAddress = admin@{{ ansible_domain }}
[ v3_req ]
basicConstraints = CA:false
keyUsage = digitalSignature, keyEncipherment
subjectAltName = @sans
[ v3_x509 ]
basicConstraints = CA:false
keyUsage = digitalSignature, keyEncipherment
subjectAltName = @sans
[ sans ]
DNS.1 = repo.{{ ansible_domain }}
IP.1 = {{ {{ ansible_facts['default_ipv4']['address'] }} }}

View File

@@ -1,29 +0,0 @@
[ req ]
prompt = no
distinguished_name = {{ rproxy_service_name }}.{{ ansible_domain }}
req_extensions = v3_req
x509_extensions = v3_x509
[ {{ rproxy_service_name }}.{{ ansible_domain }} ]
countryName = RU
stateOrProvinceName = RU
localityName = MSK
organizationName = {{ ansible_domain }}
organizationalUnitName = IT
commonName = {{ rproxy_service_name }}.{{ ansible_domain }}
emailAddress = admin@{{ ansible_domain }}
[ v3_req ]
basicConstraints = CA:false
keyUsage = digitalSignature, keyEncipherment
subjectAltName = @sans
[ v3_x509 ]
basicConstraints = CA:false
keyUsage = digitalSignature, keyEncipherment
subjectAltName = @sans
[ sans ]
DNS.1 = {{ rproxy_service_name }}.{{ ansible_domain }}
IP.1 = {{ rproxy_service_address }}

View File

@@ -1,5 +1,6 @@
ansible_python_interpreter: /usr/bin/python3 ansible_python_interpreter: /usr/bin/python3
rproxy_dir: /opt/rproxy rproxy_dir: /opt/rproxy
rproxy_version: 1.29
repo_data_dir: /opt/data/repo repo_data_dir: /opt/data/repo
dockerrepo_dir: /opt/dockerrepo dockerrepo_dir: /opt/dockerrepo
dockerrepo_data_dir: /opt/data/dockerrepo dockerrepo_data_dir: /opt/data/dockerrepo