computer-playbook/roles/user-administrator
Kevin Veen-Birkenbach a10dd402b8
refactor: improve service handling and introduce MODE_ASSERT
- Improved get_service_name filter plugin (clearer suffix handling, consistent var names).
- Added MODE_ASSERT flag to optionally execute validation/assertion tasks.
- Fixed systemd unit handling: consistent use of %I instead of %i, correct escaping of instance names.
- Unified on_failure behavior and alarm composer scripts.
- Cleaned up redundant logging, handlers, and debug config.
- Strengthened sys-service template resolution with assert (only active when MODE_ASSERT).
- Simplified timer and suffix handling with get_service_name filter.
- Hardened sensitive tasks with no_log.
- Added conditional asserts across roles (Keycloak, DNS, Mailu, Discourse, etc.).

These changes improve consistency, safety, and validation across the automation stack.

Conversation: https://chatgpt.com/share/68a4ae28-483c-800f-b2f7-f64c7124c274
2025-08-19 19:02:52 +02:00
..
2023-08-22 22:53:44 +02:00
2025-03-17 05:10:43 +01:00

Administrator User

Description

This role creates a dedicated administrator user for local administrative tasks. The administrator account is configured to require a password when executing sudo, ensuring secure privilege escalation. For security reasons, it is recommended to use this dedicated administrator user instead of the default root account. The role also sets up SSH-related configuration by copying an authorized_keys file from inventory data.

Overview

Optimized for secure system management, this role performs the following:

  • Creates an administrator user with a home directory.
  • Configures proper permissions for the administrators home directory and associated scripts.
  • Sets up an SSH authorized_keys file from inventory data (if available), leveraging SSH best practices.
  • Grants sudo privileges to the administrator user with password authentication using a dedicated sudoers file.

Purpose

The primary purpose of this role is to provide a secure and dedicated administrator account solely for running local administration tasks. This approach minimizes security risks associated with using the root account and enforces best practices in user privilege management.

Features

  • User Creation: Establishes an administrator user with a home directory and generated SSH keys.
  • Home Directory Configuration: Sets secure permissions on the administrators home directory and script folder.
  • SSH Authorized Keys: Copies a preconfigured authorized_keys file for additional security.
  • Sudo Privileges: Deploys a dedicated sudoers configuration to grant the administrator user sudo rights with password prompt.
  • Modular Integration: Integrates with common routines and roles to further enhance system security.