mirror of
https://github.com/kevinveenbirkenbach/computer-playbook.git
synced 2024-11-22 12:41:05 +01:00
Compare commits
No commits in common. "e2ee58e6a5c4394826a2f67f295a13ceccf987ec" and "29f134005fa02b57067fba01bf148d276c954c30" have entirely different histories.
e2ee58e6a5
...
29f134005f
@ -93,3 +93,12 @@ Kevin Veen-Birkenbach
|
||||
## License
|
||||
|
||||
This project is licensed under the GNU Affero General Public License v3.0. The full license text is available in the `LICENSE` file of this repository.
|
||||
|
||||
## todo
|
||||
- implement: https://archlinux.org/packages/extra/x86_64/signal-desktop/
|
||||
|
||||
## See
|
||||
- https://www.middlewareinventory.com/blog/run-ansible-playbook-locally/
|
||||
- https://stackoverflow.com/questions/30533372/run-an-ansible-task-only-when-the-hostname-contains-a-string
|
||||
- https://archived.forum.manjaro.org/t/running-android-applications-on-arch-using-anbox/53332
|
||||
- https://www.reddit.com/r/ManjaroLinux/comments/cbkblb/guide_run_android_apps_on_manjaro_super_simple/
|
||||
|
14
playbook.yml
14
playbook.yml
@ -20,19 +20,19 @@
|
||||
hosts: wireguard_server
|
||||
become: true
|
||||
roles:
|
||||
- wireguard
|
||||
- application-wireguard
|
||||
|
||||
- name: setup wireguard client behind firewall\nat
|
||||
hosts: wireguard_behind_firewall
|
||||
become: true
|
||||
roles:
|
||||
- client-wireguard-behind-firewall
|
||||
- client_application-wireguard-behind-firewall
|
||||
|
||||
- name: setup wireguard client
|
||||
hosts: wireguard_client
|
||||
become: true
|
||||
roles:
|
||||
- client-wireguard
|
||||
- client_application-wireguard
|
||||
|
||||
# Native Webserver Roles
|
||||
- name: setup homepages
|
||||
@ -260,7 +260,7 @@
|
||||
hosts: gnome
|
||||
become: true
|
||||
roles:
|
||||
- desktop-gnome
|
||||
- system-gnome
|
||||
|
||||
- name: setup msi rgb keyboard
|
||||
hosts: msi_perkeyrgb
|
||||
@ -272,7 +272,7 @@
|
||||
hosts: ssh
|
||||
become: false
|
||||
roles:
|
||||
- client-ssh
|
||||
- application-ssh
|
||||
|
||||
- name: setup swapfile hosts
|
||||
hosts: swapfile
|
||||
@ -302,13 +302,13 @@
|
||||
hosts: torbrowser
|
||||
become: true
|
||||
roles:
|
||||
- desktop-torbrowser
|
||||
- application-torbrowser
|
||||
|
||||
- name: setup nextcloud
|
||||
hosts: nextcloud_client
|
||||
become: true
|
||||
roles:
|
||||
- client-nextcloud
|
||||
- application-nextcloud
|
||||
|
||||
- name: setup docker
|
||||
hosts: docker
|
||||
|
@ -1,2 +1,2 @@
|
||||
dependencies:
|
||||
- client-git
|
||||
- git-client
|
@ -1,4 +1,4 @@
|
||||
# desktop-virtual-box
|
||||
# application-virtual-box
|
||||
|
||||
```bash
|
||||
sudo pacman -S virtualbox "$(pacman -Qsq "^linux" | grep "^linux[0-9]*[-rt]*$" | awk '{print $1"-virtualbox-host-modules"}' ORS=' ')" &&
|
@ -1,5 +1,5 @@
|
||||
# This file is created by
|
||||
# https://github.com/kevinveenbirkenbach/computer-playbook/tree/main/roles/wireguard
|
||||
# https://github.com/kevinveenbirkenbach/computer-playbook/tree/main/roles/application-wireguard
|
||||
|
||||
net.ipv6.conf.all.disable_ipv6 = 0
|
||||
net.ipv6.conf.default.disable_ipv6 = 0
|
@ -1,5 +1,6 @@
|
||||
- name: "reload cleanup-backups.service"
|
||||
systemd:
|
||||
name: cleanup-backups.service
|
||||
state: reloaded
|
||||
enabled: yes
|
||||
daemon_reload: yes
|
||||
|
@ -1,6 +1,7 @@
|
||||
- name: "reload cleanup-disc-space.service"
|
||||
systemd:
|
||||
name: cleanup-disc-space.service
|
||||
state: reloaded
|
||||
enabled: yes
|
||||
daemon_reload: yes
|
||||
- name: "restart cleanup-disc-space.timer"
|
||||
|
@ -1,2 +0,0 @@
|
||||
# Client SSH
|
||||
Setups SSH on the client side
|
@ -1,2 +0,0 @@
|
||||
dependencies:
|
||||
- client-wireguard
|
@ -1,2 +0,0 @@
|
||||
dependencies:
|
||||
- wireguard
|
@ -0,0 +1,2 @@
|
||||
dependencies:
|
||||
- client_application-wireguard
|
2
roles/client_application-wireguard/meta/main.yml
Normal file
2
roles/client_application-wireguard/meta/main.yml
Normal file
@ -0,0 +1,2 @@
|
||||
dependencies:
|
||||
- application-wireguard
|
@ -1,2 +1,2 @@
|
||||
dependencies:
|
||||
- client-git
|
||||
- git-client
|
@ -1,3 +1,3 @@
|
||||
dependencies:
|
||||
- desktop-libreoffice
|
||||
- application-libreoffice
|
||||
- collection-video-conference
|
@ -1,3 +0,0 @@
|
||||
dependencies:
|
||||
- client-git
|
||||
- desktop-caffeine
|
@ -82,9 +82,9 @@ docker-compose -p akaunting up -d --force-recreate
|
||||
|
||||
# recover all volumes
|
||||
cd {{path_administrator_scripts}}backup-docker-to-local &&
|
||||
bash recover-docker-from-local.sh akaunting_akaunting-modules ${machine_id:0:64} "$backup_version" &&
|
||||
bash recover-docker-from-local.sh akaunting_akaunting-data ${machine_id:0:64} "$backup_version" &&
|
||||
bash recover-docker-from-local.sh akaunting_akaunting-db ${machine_id:0:64} "$backup_version" akaunting-db "$akaunting_db_password" akaunting
|
||||
bash docker-volume-recover.sh akaunting_akaunting-modules ${machine_id:0:64} "$backup_version" &&
|
||||
bash docker-volume-recover.sh akaunting_akaunting-data ${machine_id:0:64} "$backup_version" &&
|
||||
bash docker-volume-recover.sh akaunting_akaunting-db ${machine_id:0:64} "$backup_version" akaunting-db "$akaunting_db_password" akaunting
|
||||
|
||||
```
|
||||
|
||||
|
@ -61,7 +61,7 @@ cd {{path_docker_compose_files}}nextcloud &&
|
||||
docker-compose down &&
|
||||
docker-compose exec -i database mysql -u nextcloud -pPASSWORT nextcloud < "/Backups/$(sha256sum /etc/machine-id | head -c 64)/backup-docker-to-local/latest/nextcloud_database/sql/backup.sql" &&
|
||||
cd {{path_administrator_scripts}}backup-docker-to-local &&
|
||||
bash ./recover-docker-from-local.sh "nextcloud_data" "$(sha256sum /etc/machine-id | head -c 64)"
|
||||
bash ./docker-volume-recover.sh "nextcloud_data" "$(sha256sum /etc/machine-id | head -c 64)"
|
||||
```
|
||||
|
||||
## database
|
||||
|
@ -1,6 +1,7 @@
|
||||
- name: "reload heal-docker.service"
|
||||
systemd:
|
||||
name: heal-docker.service
|
||||
state: reloaded
|
||||
enabled: yes
|
||||
daemon_reload: yes
|
||||
- name: "restart heal-docker.timer"
|
||||
|
@ -1,6 +1,7 @@
|
||||
- name: "reload health-btrfs.service"
|
||||
systemd:
|
||||
name: health-btrfs.service
|
||||
state: reloaded
|
||||
enabled: yes
|
||||
daemon_reload: yes
|
||||
- name: "restart health-btrfs.timer"
|
||||
|
@ -1,6 +1,7 @@
|
||||
- name: "reload health-disc-space.service"
|
||||
systemd:
|
||||
name: health-disc-space.service
|
||||
state: reloaded
|
||||
enabled: yes
|
||||
daemon_reload: yes
|
||||
- name: "restart health-disc-space.timer"
|
||||
|
@ -1,6 +1,7 @@
|
||||
- name: "reload health-docker.service"
|
||||
systemd:
|
||||
name: health-docker.service
|
||||
state: reloaded
|
||||
enabled: yes
|
||||
daemon_reload: yes
|
||||
- name: "restart health-docker.timer"
|
||||
|
@ -1,6 +1,7 @@
|
||||
- name: "reload health-journalctl.service"
|
||||
systemd:
|
||||
name: health-journalctl.service
|
||||
state: reloaded
|
||||
enabled: yes
|
||||
daemon_reload: yes
|
||||
- name: "restart health-journalctl.timer"
|
||||
|
@ -1,3 +1,3 @@
|
||||
# desktop-gnome
|
||||
# system-gnome
|
||||
## further information
|
||||
- https://askubuntu.com/questions/1029376/how-do-i-enable-and-disable-gnome-extensions-from-the-command-line
|
3
roles/system-gnome/meta/main.yml
Normal file
3
roles/system-gnome/meta/main.yml
Normal file
@ -0,0 +1,3 @@
|
||||
dependencies:
|
||||
- git-client
|
||||
- application-caffeine
|
@ -1,2 +1,2 @@
|
||||
dependencies:
|
||||
- client-git
|
||||
- git-client
|
@ -7,12 +7,12 @@
|
||||
- name: "Update with pacman"
|
||||
include_role:
|
||||
name: update-pacman
|
||||
when: ansible_distribution == 'Archlinux'
|
||||
when: ansible_distribution == 'Archlinux' and docker_compose_directory_stat.stat.exists
|
||||
|
||||
- name: "Update with apt"
|
||||
include_role:
|
||||
name: update-apt
|
||||
when: ansible_distribution == "Debian"
|
||||
when: ansible_distribution == "Debian" and docker_compose_directory_stat.stat.exists
|
||||
|
||||
- name: "Update Docker Images"
|
||||
include_role:
|
||||
|
Loading…
Reference in New Issue
Block a user