mirror of
https://github.com/kevinveenbirkenbach/computer-playbook.git
synced 2025-06-25 11:45:32 +02:00
Compare commits
3 Commits
2c964cfbee
...
5151a21575
Author | SHA1 | Date | |
---|---|---|---|
5151a21575 | |||
ccfc23f3fe | |||
b77f116bdf |
@ -23,6 +23,7 @@ For optimal personal security, we **strongly recommend** the following:
|
|||||||
|
|
||||||
Following these guidelines will significantly enhance your personal security—but remember, no system is completely immune to risk.
|
Following these guidelines will significantly enhance your personal security—but remember, no system is completely immune to risk.
|
||||||
|
|
||||||
|
A tutorial how to setup secure password management you will find [here](https://blog.veen.world/blog/2025/04/04/%f0%9f%9b%a1%ef%b8%8f-keepassxc-cymais-cloud-the-ultimate-guide-to-cross-device-password-security/)
|
||||||
---
|
---
|
||||||
|
|
||||||
## For Administrators
|
## For Administrators
|
||||||
|
@ -623,9 +623,11 @@ defaults_applications:
|
|||||||
|
|
||||||
## PgAdmin
|
## PgAdmin
|
||||||
pgadmin:
|
pgadmin:
|
||||||
version: "latest"
|
version: "latest"
|
||||||
default_email: "{{ users.administrator.email }}" # Initial login email address
|
users:
|
||||||
default_password: "{{ users.administrator.initial_password }}" # Initial login password – should be overridden in inventory for security
|
administrator:
|
||||||
|
email: "{{ users.administrator.email }}" # Initial login email address
|
||||||
|
password: "{{ users.administrator.initial_password }}" # Initial login password – should be overridden in inventory for security
|
||||||
oauth2_proxy:
|
oauth2_proxy:
|
||||||
enabled: true # Enable OAuth2 proxy for authentication
|
enabled: true # Enable OAuth2 proxy for authentication
|
||||||
application: "application"
|
application: "application"
|
||||||
|
@ -1,4 +1,6 @@
|
|||||||
collections:
|
collections:
|
||||||
- name: kewlfft.aur
|
- name: kewlfft.aur
|
||||||
pacman:
|
pacman:
|
||||||
- ansible
|
- ansible
|
||||||
|
pip:
|
||||||
|
- passlib
|
@ -12,6 +12,10 @@ The role ensures consistent deployments, full automation, and secure configurati
|
|||||||
|
|
||||||
To automate the deployment of **secure, extensible, and production-ready Nextcloud instances** using Docker and Ansible.
|
To automate the deployment of **secure, extensible, and production-ready Nextcloud instances** using Docker and Ansible.
|
||||||
|
|
||||||
|
## User Guide
|
||||||
|
|
||||||
|
The Nextcloud User Guide you will find [here](https://docs.nextcloud.com/server/latest/user_manual/en/).
|
||||||
|
|
||||||
## Features
|
## Features
|
||||||
|
|
||||||
- Dockerized Nextcloud (PHP-FPM, Nginx, Cron, Redis)
|
- Dockerized Nextcloud (PHP-FPM, Nginx, Cron, Redis)
|
||||||
|
9
roles/docker-oauth2-proxy/Setup.md
Normal file
9
roles/docker-oauth2-proxy/Setup.md
Normal file
@ -0,0 +1,9 @@
|
|||||||
|
# Setup
|
||||||
|
|
||||||
|
## Cookie Secret
|
||||||
|
|
||||||
|
To generate a cookie secret execute:
|
||||||
|
|
||||||
|
```bash
|
||||||
|
ansible-vault encrypt_string "$(openssl rand -hex 16)"
|
||||||
|
```
|
@ -1,5 +1,5 @@
|
|||||||
# Configuration @see https://hub.docker.com/r/dpage/pgadmin4
|
# Configuration @see https://www.pgadmin.org/docs/pgadmin4/latest/container_deployment.html
|
||||||
|
|
||||||
PGADMIN_DEFAULT_EMAIL={{ applications.pgadmin.default_email }}
|
PGADMIN_DEFAULT_EMAIL={{ applications[application_id].users.administrator.email }}
|
||||||
PGADMIN_DEFAULT_PASSWORD={{ applications.pgadmin.default_password }}
|
PGADMIN_DEFAULT_PASSWORD={{ applications.[application_id].users.administrator.password }}
|
||||||
PGADMIN_DISABLE_POSTFIX=True
|
PGADMIN_DISABLE_POSTFIX=True
|
@ -1,7 +1,7 @@
|
|||||||
# Configuration @see https://hub.docker.com/_/phpmyadmin
|
# Configuration @see https://hub.docker.com/_/phpmyadmin
|
||||||
|
|
||||||
PMA_HOST= central-mariadb
|
PMA_HOST= central-mariadb
|
||||||
{% if applications.phpmyadmin.autologin | bool %}
|
{% if applications.[application_id].autologin | bool %}
|
||||||
PMA_USER= root
|
PMA_USER= root
|
||||||
PMA_PASSWORD= "{{central_mariadb_root_password}}"
|
PMA_PASSWORD= "{{central_mariadb_root_password}}"
|
||||||
{% endif %}
|
{% endif %}
|
@ -8,18 +8,21 @@
|
|||||||
# Wildcard certificate should not be used
|
# Wildcard certificate should not be used
|
||||||
# OR: The domain is not a first-level subdomain of the primary domain
|
# OR: The domain is not a first-level subdomain of the primary domain
|
||||||
|
|
||||||
|
# The following should not work, checkout the Setup.md instructions.
|
||||||
|
# @see https://chatgpt.com/share/67efa9f0-1cdc-800f-8bce-62b00fc3e6a2
|
||||||
- name: "recieve wildcard certificate *{{ primary_domain }} for {{domain}}"
|
- name: "recieve wildcard certificate *{{ primary_domain }} for {{domain}}"
|
||||||
command: >-
|
command: >-
|
||||||
certbot certonly --agree-tos --email {{ users.administrator.email }}
|
certbot certonly --agree-tos --email {{ users.administrator.email }}
|
||||||
--non-interactive --webroot -w /var/lib/letsencrypt/ -d {{ primary_domain }} -d *.{{ primary_domain }}
|
--non-interactive --webroot -w /var/lib/letsencrypt/ -d {{ primary_domain }} -d *.{{ primary_domain }}
|
||||||
{{ '--test-cert' if mode_test | bool else '' }}
|
{{ '--test-cert' if mode_test | bool else '' }}
|
||||||
when:
|
when:
|
||||||
- enable_wildcard_certificate | bool
|
- enable_wildcard_certificate | bool
|
||||||
# Wildcard certificate is enabled
|
# Wildcard certificate is enabled
|
||||||
- domain.split('.') | length == (primary_domain.split('.') | length + 1) and domain.endswith(primary_domain)
|
- domain.split('.') | length == (primary_domain.split('.') | length + 1) and domain.endswith(primary_domain)
|
||||||
# AND: The domain is a direct first-level subdomain of the primary domain
|
# AND: The domain is a direct first-level subdomain of the primary domain
|
||||||
- run_once_recieve_certificate is not defined
|
- run_once_recieve_certificate is not defined
|
||||||
# Ensure this task runs only once for the wildcard certificate
|
# Ensure this task runs only once for the wildcard certificate
|
||||||
|
ignore_errors: true
|
||||||
|
|
||||||
- name: "Cleanup dedicated cert for {{ domain }}"
|
- name: "Cleanup dedicated cert for {{ domain }}"
|
||||||
command: >-
|
command: >-
|
||||||
|
Loading…
x
Reference in New Issue
Block a user