Page MenuHomeDevCentral

No OneTemporary

diff --git a/roles/core/letsencrypt-renew/files/letsencrypt-renewal b/roles/core/letsencrypt-renew/files/letsencrypt-renewal
index 0e84b12..aa39e42 100755
--- a/roles/core/letsencrypt-renew/files/letsencrypt-renewal
+++ b/roles/core/letsencrypt-renew/files/letsencrypt-renewal
@@ -1,15 +1,31 @@
#!/bin/sh
+# -------------------------------------------------------------
+# Let's encrypt
+# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
+# Project: Nasqueron
+# Created: 2016-08-24
+# License: Trivial work, not eligible to copyright
+# Source file: roles/core/letsencrypt-renew/files/letsencrypt-renewal
+# -------------------------------------------------------------
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+# </auto-generated>
+
nginx_test() {
nginx_output="$(nginx -t 2>&1)"
nginx_returncode="$?"
if [ "$nginx_returncode" -eq 0 ] && [ -n "$(echo "${nginx_output}" | grep warn)" ]; then
return 2;
else
return "$nginx_returncode";
fi;
}
letsencrypt renew && nginx_test && service nginx restart
diff --git a/roles/core/letsencrypt-renew/files/letsencrypt.service b/roles/core/letsencrypt-renew/files/letsencrypt.service
index d93ef57..757bf4f 100644
--- a/roles/core/letsencrypt-renew/files/letsencrypt.service
+++ b/roles/core/letsencrypt-renew/files/letsencrypt.service
@@ -1,6 +1,22 @@
+# -------------------------------------------------------------
+# Let's encrypt
+# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
+# Project: Nasqueron
+# Created: 2016-08-24
+# License: Trivial work, not eligible to copyright
+# Source file: roles/core/letsencrypt-renew/files/letsencrypt.service
+# -------------------------------------------------------------
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+# </auto-generated>
+
[Unit]
Description=Renew Let's encrypt certificates.
[Service]
Type=simple
ExecStart=letsencrypt-renewal
diff --git a/roles/core/letsencrypt-renew/files/letsencrypt.timer b/roles/core/letsencrypt-renew/files/letsencrypt.timer
index d85d763..a98b662 100644
--- a/roles/core/letsencrypt-renew/files/letsencrypt.timer
+++ b/roles/core/letsencrypt-renew/files/letsencrypt.timer
@@ -1,7 +1,23 @@
+# -------------------------------------------------------------
+# Let's encrypt
+# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
+# Project: Nasqueron
+# Created: 2016-08-24
+# License: Trivial work, not eligible to copyright
+# Source file: roles/core/letsencrypt-renew/files/letsencrypt.timer
+# -------------------------------------------------------------
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+# </auto-generated>
+
[Unit]
Description=Runs letsencrypt-renewal every month
[Timer]
OnCalendar=*-*-26 12:15:00
Persistent=yes
Unit=letsencrypt.service
diff --git a/roles/core/motd/files/motd b/roles/core/motd/files/motd
index 49b7a26..378a5e5 100644
--- a/roles/core/motd/files/motd
+++ b/roles/core/motd/files/motd
@@ -1,6 +1,23 @@
#!/bin/sh
+
+# -------------------------------------------------------------
+# MOTD
+# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
+# Project: Nasqueron
+# Created: 2017-01-10
+# License: Trivial work, not eligible to copyright
+# Source file: roles/core/motd/files/motd
+# -------------------------------------------------------------
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+# </auto-generated>
+
if [ -f /etc/motd ]; then
cat /etc/motd
else
echo "No MOTD."
fi
diff --git a/roles/core/network/files/eglide_ipv6 b/roles/core/network/files/eglide_ipv6
index e98ab0c..63360a6 100644
--- a/roles/core/network/files/eglide_ipv6
+++ b/roles/core/network/files/eglide_ipv6
@@ -1,37 +1,45 @@
#!/bin/sh
# -------------------------------------------------------------
# IPv6 connectivity
# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
# Project: Eglide
# Created: 2016-06-15
# License: Trivial work, not eligible to copyright
+# Source file: roles/core/network/files/eglide_ipv6
# -------------------------------------------------------------
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+# </auto-generated>
IFCONFIG=/sbin/ifconfig
ROUTE=/sbin/route
# -------------------------------------------------------------
# Hurricane Electric tunnel
# nasqueron-3.tunnel.tserv10.par1.ipv6.he.net
# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
$IFCONFIG sit0 up
$IFCONFIG sit0 inet6 tunnel ::216.66.84.42
$IFCONFIG sit1 up
$IFCONFIG sit1 inet6 add 2001:470:1f12:896::2/64
$ROUTE -A inet6 add ::/0 dev sit1
# -------------------------------------------------------------
# Canonical IP
# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
$IFCONFIG sit1 inet6 add 2001:470:1f13:896::c0de:15:11fe/64
# -------------------------------------------------------------
# Additional IP addresses
# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
{% for n in range (1, 26) %}
$IFCONFIG sit1 inet6 add 2001:470:1f13:896::{{ '%x' | format(n) }}/64
{% endfor %}
diff --git a/roles/core/rc/files/rc.local b/roles/core/rc/files/rc.local
index 374f22a..06a4359 100644
--- a/roles/core/rc/files/rc.local
+++ b/roles/core/rc/files/rc.local
@@ -1,24 +1,32 @@
#!/bin/sh -e
# -------------------------------------------------------------
# rc.local
# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
# Project: Nasqueron
# Created: 2016-06-15
# License: Trivial work, not eligible to copyright
+# Source file: roles/core/rc/files/rc.local
# -------------------------------------------------------------
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+# </auto-generated>
# -------------------------------------------------------------
# IPv6
# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
/usr/sbin/ipv6-setup-tunnel
# -------------------------------------------------------------
# Return value
#
# Should be 0 on success, not 0 on failure. Current rc process
# requires this value to be set accordingly.
# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
exit 0
diff --git a/roles/core/rsyslog/files/default.conf b/roles/core/rsyslog/files/default.conf
index 528af29..ed664a6 100644
--- a/roles/core/rsyslog/files/default.conf
+++ b/roles/core/rsyslog/files/default.conf
@@ -1,68 +1,80 @@
-# Default rules for rsyslog.
-#
-# For more information see rsyslog.conf(5) and /etc/rsyslog.conf
+# -------------------------------------------------------------
+# Default rules for rsyslog
+# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
+# Project: Nasqueron
+# Created: 2016-09-11
+# License: Trivial work, not eligible to copyright
+# Source file: roles/core/rsyslog/files/default.conf
+# -------------------------------------------------------------
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+# </auto-generated>
#
# First some standard log files. Log by facility.
#
auth,authpriv.* /var/log/auth.log
*.*;auth,authpriv.none -/var/log/syslog
#cron.* /var/log/cron.log
#daemon.* -/var/log/daemon.log
kern.* -/var/log/kern.log
#lpr.* -/var/log/lpr.log
mail.* -/var/log/mail.log
#user.* -/var/log/user.log
#
# Logging for the mail system. Split it up so that
# it is easy to write scripts to parse these files.
#
#mail.info -/var/log/mail.info
#mail.warn -/var/log/mail.warn
mail.err /var/log/mail.err
#
# Logging for INN news system.
#
news.crit /var/log/news/news.crit
news.err /var/log/news/news.err
news.notice -/var/log/news/news.notice
#
# Some "catch-all" log files.
#
#*.=debug;\
# auth,authpriv.none;\
# news.none;mail.none -/var/log/debug
#*.=info;*.=notice;*.=warn;\
# auth,authpriv.none;\
# cron,daemon.none;\
# mail,news.none -/var/log/messages
#
# Emergencies are sent to everybody logged in.
#
*.emerg :omusrmsg:*
#
# I like to have messages displayed on the console, but only on a virtual
# console I usually leave idle.
#
#daemon,mail.*;\
# news.=crit;news.=err;news.=notice;\
# *.=debug;*.=info;\
# *.=notice;*.=warn /dev/tty8
# The named pipe /dev/xconsole is for the `xconsole' utility. To use it,
# you must invoke `xconsole' with the `-file' option:
#
# $ xconsole -file /dev/xconsole [...]
#
# NOTE: adjust the list below, or you'll go crazy if you have a reasonably
# busy site..
#
#daemon.*;mail.*;\
# news.err;\
# *.=debug;*.=info;\
# *.=notice;*.=warn |/dev/xconsole
diff --git a/roles/mailserver/certificates/files/update-smtp-certificates b/roles/mailserver/certificates/files/update-smtp-certificates
index a94aa20..fe38c91 100755
--- a/roles/mailserver/certificates/files/update-smtp-certificates
+++ b/roles/mailserver/certificates/files/update-smtp-certificates
@@ -1,23 +1,31 @@
#!/bin/sh
# -------------------------------------------------------------
# Deploy mail certificate to SMTP server
# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
# Project: Nasqueron
# Created: 2016-11-03
# License: Trivial work, not eligible to copyright
+# Source file: roles/mailserver/certificates/files/update-smtp-certificates
# -------------------------------------------------------------
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+# </auto-generated>
: ${CONTAINER_NAME='mailserver'}
: ${CERT_DIR='/data/letsencrypt/etc/live/mail.nasqueron.org-0001'}
: ${CONTAINER_DIR="/var/lib/lxc/$CONTAINER_NAME/rootfs"}
cp $CERT_DIR/fullchain.pem $CONTAINER_DIR/etc/ssl/certs/mailserver.crt
cp $CERT_DIR/privkey.pem $CONTAINER_DIR/etc/ssl/private/mailserver.key
# Mail servers can read the certificate as root before dropping privileges
chown 0:0 $CONTAINER_DIR/etc/ssl/private/mailserver.key
chmod 400 $CONTAINER_DIR/etc/ssl/private/mailserver.key
lxc-attach -n $CONTAINER_NAME -- service postfix restart
lxc-attach -n $CONTAINER_NAME -- service dovecot restart
diff --git a/roles/mailserver/dkim/files/bin/get-dkim-dns-entries b/roles/mailserver/dkim/files/bin/get-dkim-dns-entries
index d68de4a..078fb1e 100755
--- a/roles/mailserver/dkim/files/bin/get-dkim-dns-entries
+++ b/roles/mailserver/dkim/files/bin/get-dkim-dns-entries
@@ -1,22 +1,38 @@
#!/bin/sh
+# -------------------------------------------------------------
+# Nasqueron mail services
+# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
+# Project: Nasqueron
+# Created: 2017-01-14
+# License: Trivial work, not eligible to copyright
+# Source file: roles/mailserver/dkim/files/bin/get-dkim-dns-entries
+# -------------------------------------------------------------
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+# </auto-generated>
+
# Parses arguments
if [ $# -eq 0 ]
then
echo "Usage: `basename $0` <domain>"
exit 1
fi
DOMAIN=$1
DIR=/etc/opendkim/keys/$DOMAIN
if [ ! -d "$DIR" ]
then
echo "Directory not found: $DIR"
exit 2
fi
for f in $DIR/*.txt
do
get-dkim-dns-entry $f
done
diff --git a/roles/mailserver/dkim/files/bin/get-dkim-dns-entry.php b/roles/mailserver/dkim/files/bin/get-dkim-dns-entry.php
index bbac53d..fba39f7 100755
--- a/roles/mailserver/dkim/files/bin/get-dkim-dns-entry.php
+++ b/roles/mailserver/dkim/files/bin/get-dkim-dns-entry.php
@@ -1,57 +1,73 @@
#!/usr/bin/env php
<?php
+/* -------------------------------------------------------------
+ Nasqueron mail services
+ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
+ Project: Nasqueron
+ Created: 2017-01-14
+ License: Trivial work, not eligible to copyright
+ Source file: roles/mailserver/dkim/files/bin/get-dkim-dns-entry.php
+ -------------------------------------------------------------
+
+ <auto-generated>
+ This file is managed by our rOPS SaltStack repository.
+
+ Changes to this file may cause incorrect behavior
+ and will be lost if the state is redeployed.
+ </auto-generated>
+ */
///
/// Parse arguments
///
if ($argc < 2) {
fwrite(STDERR, "Usage: $argv[0] $file\n");
exit(1);
}
$file = $argv[1];
if (!file_exists($file)) {
fwrite(STDERR, "File not found: $file\n");
exit(2);
}
///
/// Reads file
///
function to_one_line ($string) {
return str_replace(["\r", "\n"], "", trim($string));
}
function to_one_line_from_bind ($string) {
$toReturn = "";
foreach (explode('"', $string) as $fragment) {
if (trim($fragment) !== "") {
$toReturn .= $fragment;
}
}
return $toReturn;
}
function get_dns_record ($content) {
$record = to_one_line($content);
if (!preg_match("/(.*)\._domainkey/", $record, $matches)) {
throw new Exception("Can't parse file.");
}
$subdomain = $matches[0];
if (!preg_match("/\s+IN\s+TXT\s+\((.*)\)/", $record, $matches)) {
throw new Exception("Can't parse file.");
}
$value = to_one_line_from_bind($matches[1]);
return "$subdomain TXT $value";
}
try {
echo get_dns_record(file_get_contents($file)), "\n";
} catch (Exception $ex) {
fwrite(STDERR, $ex->getMessage());
}
diff --git a/roles/mailserver/dkim/files/bin/get-dkim-key-table b/roles/mailserver/dkim/files/bin/get-dkim-key-table
index 5774725..e590549 100755
--- a/roles/mailserver/dkim/files/bin/get-dkim-key-table
+++ b/roles/mailserver/dkim/files/bin/get-dkim-key-table
@@ -1,11 +1,28 @@
#!/bin/sh
+
+# -------------------------------------------------------------
+# Nasqueron mail services
+# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
+# Project: Nasqueron
+# Created: 2017-01-14
+# License: Trivial work, not eligible to copyright
+# Source file: roles/mailserver/dkim/files/bin/get-dkim-key-table
+# -------------------------------------------------------------
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+# </auto-generated>
+
for d in /etc/opendkim/keys/*
do
DOMAIN=`basename $d`
for f in $d/*.private
do
SELECTOR=`basename $f .private`
echo "$SELECTOR._domainkey.$DOMAIN $DOMAIN:$SELECTOR:$f"
done
done
diff --git a/roles/mailserver/dkim/files/bin/get-dkim-signing-table b/roles/mailserver/dkim/files/bin/get-dkim-signing-table
index 3899f99..85be50e 100755
--- a/roles/mailserver/dkim/files/bin/get-dkim-signing-table
+++ b/roles/mailserver/dkim/files/bin/get-dkim-signing-table
@@ -1,11 +1,28 @@
#!/bin/sh
+
+# -------------------------------------------------------------
+# Nasqueron mail services
+# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
+# Project: Nasqueron
+# Created: 2017-01-14
+# License: Trivial work, not eligible to copyright
+# Source file: roles/mailserver/dkim/files/bin/get-dkim-signing-table
+# -------------------------------------------------------------
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+# </auto-generated>
+
for d in /etc/opendkim/keys/*
do
DOMAIN=`basename $d`
for f in $d/*.private
do
SELECTOR=`basename $f .private`
echo "$DOMAIN $SELECTOR._domainkey.$DOMAIN"
done
done
diff --git a/roles/mailserver/dkim/files/etc/Makefile b/roles/mailserver/dkim/files/etc/Makefile
index b455f14..027e3dc 100644
--- a/roles/mailserver/dkim/files/etc/Makefile
+++ b/roles/mailserver/dkim/files/etc/Makefile
@@ -1,12 +1,28 @@
+# -------------------------------------------------------------
+# Nasqueron mail services
+# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
+# Project: Nasqueron
+# Created: 2017-01-14
+# License: Trivial work, not eligible to copyright
+# Source file: roles/mailserver/dkim/files/etc/Makefile
+# -------------------------------------------------------------
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+# </auto-generated>
+
RM=rm -f
all: KeyTable SigningTable
clean:
${RM} KeyTable SigningTable
KeyTable:
get-dkim-key-table > KeyTable
SigningTable:
get-dkim-signing-table > SigningTable
diff --git a/roles/mailserver/systemd-unit/files/lxc-container-mailserver-start b/roles/mailserver/systemd-unit/files/lxc-container-mailserver-start
index 19a0146..b3f924c 100755
--- a/roles/mailserver/systemd-unit/files/lxc-container-mailserver-start
+++ b/roles/mailserver/systemd-unit/files/lxc-container-mailserver-start
@@ -1,31 +1,48 @@
#!/bin/sh
+
+# -------------------------------------------------------------
+# Nasqueron mail services
+# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
+# Project: Nasqueron
+# Created: 2015-12-16
+# License: Trivial work, not eligible to copyright
+# Source file: roles/mailserver/systemd-unit/files/lxc-container-mailserver-start
+# -------------------------------------------------------------
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+# </auto-generated>
+
#Let systemd launch a lxc mail container through /usr/lib/systemd/system/lxc-container-mailserver.service
#Start a lxc container, and create iptable rules
IPTABLES="/usr/sbin/iptables"
LXC_START="/usr/bin/lxc-start"
CONTAINER_NAME="mailserver"
HOST_INTERFACE="ens192"
DOCKER_INTERFACE="docker0"
HOST_IP="212.129.32.223"
CONTAINER_IP="10.0.3.8"
PORTS="25 110 143 465 587"
DOCKER_PORTS="25 143 465 587"
NGINX_PORT="21080"
$LXC_START -n $CONTAINER_NAME -d
#Web rules
for PORT in $PORTS
do
$IPTABLES -t nat -I PREROUTING -i $HOST_INTERFACE -p TCP -d $HOST_IP/32 --dport $PORT -j DNAT --to-destination $CONTAINER_IP:$PORT
done
#Need 80 port for main nginx
$IPTABLES -t nat -I PREROUTING -i $HOST_INTERFACE -p TCP -d $HOST_IP/32 --dport $NGINX_PORT -j DNAT --to-destination $CONTAINER_IP:80
#Docker rules
for PORT in $DOCKER_PORTS
do
$IPTABLES -t nat -I PREROUTING -i $DOCKER_INTERFACE -p TCP -d $HOST_IP/32 --dport $PORT -j DNAT --to-destination $CONTAINER_IP:$PORT
done
diff --git a/roles/mailserver/systemd-unit/files/lxc-container-mailserver-stop b/roles/mailserver/systemd-unit/files/lxc-container-mailserver-stop
index 8b3080f..eb5a291 100755
--- a/roles/mailserver/systemd-unit/files/lxc-container-mailserver-stop
+++ b/roles/mailserver/systemd-unit/files/lxc-container-mailserver-stop
@@ -1,32 +1,49 @@
#!/bin/sh
+
+# -------------------------------------------------------------
+# Nasqueron mail services
+# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
+# Project: Nasqueron
+# Created: 2015-12-16
+# License: Trivial work, not eligible to copyright
+# Source file: roles/mailserver/systemd-unit/files/lxc-container-mailserver-stop
+# -------------------------------------------------------------
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+# </auto-generated>
+
#Let systemd stop the lxc mail container through /usr/lib/systemd/system/lxc-container-mailserver.service
#Stop the lxc container, and create iptable rules
IPTABLES="/usr/sbin/iptables"
LXC_STOP="/usr/bin/lxc-stop"
CONTAINER_NAME="mailserver"
HOST_INTERFACE="ens192"
DOCKER_INTERFACE="docker0"
HOST_IP="212.129.32.223"
CONTAINER_IP="10.0.3.8"
PORTS="25 110 143 465 587"
DOCKER_PORTS="25 143 465 587"
NGINX_PORT="21080"
#Web rules
for PORT in $PORTS
do
$IPTABLES -t nat -D PREROUTING -i $HOST_INTERFACE -p TCP -d $HOST_IP/32 --dport $PORT -j DNAT --to-destination $CONTAINER_IP:$PORT
done
#Need 80 port for main nginx
$IPTABLES -t nat -D PREROUTING -i $HOST_INTERFACE -p TCP -d $HOST_IP/32 --dport $NGINX_PORT -j DNAT --to-destination $CONTAINER_IP:80
#Docker rules
for PORT in $DOCKER_PORTS
do
$IPTABLES -t nat -D PREROUTING -i $DOCKER_INTERFACE -p TCP -d $HOST_IP/32 --dport $PORT -j DNAT --to-destination $CONTAINER_IP:$PORT
done
$LXC_STOP -n $CONTAINER_NAME
diff --git a/roles/mailserver/systemd-unit/files/lxc-container-mailserver.service b/roles/mailserver/systemd-unit/files/lxc-container-mailserver.service
index a79d0c6..c579a33 100644
--- a/roles/mailserver/systemd-unit/files/lxc-container-mailserver.service
+++ b/roles/mailserver/systemd-unit/files/lxc-container-mailserver.service
@@ -1,11 +1,27 @@
+# -------------------------------------------------------------
+# Nasqueron mail services
+# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
+# Project: Nasqueron
+# Created: 2015-12-16
+# License: Trivial work, not eligible to copyright
+# Source file: roles/mailserver/systemd-unit/files/lxc-container-mailserver.service
+# -------------------------------------------------------------
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+# </auto-generated>
+
[Unit]
Description=LXC mail server container
[Service]
Type=simple
RemainAfterExit=yes
ExecStart=/usr/lib/systemd/system/lxc-container-mailserver-start
ExecStop=/usr/lib/systemd/system/lxc-container-mailserver-stop
[Install]
WantedBy=multi-user.target
diff --git a/roles/mumble/certificates/files/update-mumble-certificates b/roles/mumble/certificates/files/update-mumble-certificates
index 167482a..7e5a1f9 100755
--- a/roles/mumble/certificates/files/update-mumble-certificates
+++ b/roles/mumble/certificates/files/update-mumble-certificates
@@ -1,23 +1,31 @@
#!/bin/sh
# -------------------------------------------------------------
# Deploy Mumble certificate on Murmur
# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
# Project: Nasqueron
# Created: 2016-11-03
# License: Trivial work, not eligible to copyright
+# Source file: roles/mumble/certificates/files/update-mumble-certificates
# -------------------------------------------------------------
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+# </auto-generated>
: ${JAIL_HOSTNAME='mumble.nasqueron.org'}
: ${CERT_DIR="/usr/local/etc/letsencrypt/live/$JAIL_HOSTNAME"}
: ${JAIL_DIR="/usr/local/jails/$JAIL_HOSTNAME"}
: ${JAIL_ID=`jls | grep $JAIL_HOSTNAME | awk '{print $1}'`}
cp $CERT_DIR/fullchain.pem $JAIL_DIR/usr/local/etc/ssl/nasqueron.org/mumble.crt
cp $CERT_DIR/privkey.pem $JAIL_DIR/usr/local/etc/ssl/nasqueron.org/mumble.key
# murmur has uid 338
chown 338:0 $JAIL_DIR/usr/local/etc/ssl/nasqueron.org/mumble.key
chmod 400 $JAIL_DIR/usr/local/etc/ssl/nasqueron.org/mumble.key
jexec $JAIL_ID service murmur restart
diff --git a/roles/paas-docker/centos-cbs-repos/files/virt7-testing.repo b/roles/paas-docker/centos-cbs-repos/files/virt7-testing.repo
index f86b964..ab5a039 100644
--- a/roles/paas-docker/centos-cbs-repos/files/virt7-testing.repo
+++ b/roles/paas-docker/centos-cbs-repos/files/virt7-testing.repo
@@ -1,11 +1,27 @@
+# -------------------------------------------------------------
+# PaaS Docker
+# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
+# Project: Nasqueron
+# Created: 2016-02-17
+# License: Trivial work, not eligible to copyright
+# Source file: roles/paas-docker/centos-cbs-repos/files/virt7-testing.repo
+# -------------------------------------------------------------
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+# </auto-generated>
+
[virt7-common-testing]
name=virt7-common-testing
baseurl=http://cbs.centos.org/repos/virt7-common-testing/x86_64/os/
enabled=1
gpgcheck=0
[virt7-docker-common-testing]
name=virt7-docker-common-testing
baseurl=http://cbs.centos.org/repos/virt7-docker-common-testing/x86_64/os/
enabled=1
gpgcheck=0
diff --git a/roles/paas-docker/systemd-unit/files/docker-containers.service b/roles/paas-docker/systemd-unit/files/docker-containers.service
index ee96225..ab508ed 100644
--- a/roles/paas-docker/systemd-unit/files/docker-containers.service
+++ b/roles/paas-docker/systemd-unit/files/docker-containers.service
@@ -1,5 +1,21 @@
+# -------------------------------------------------------------
+# PaaS Docker
+# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
+# Project: Nasqueron
+# Created: 2015-12-29
+# License: Trivial work, not eligible to copyright
+# Source file: roles/paas-docker/systemd-unit/files/docker-containers.service
+# -------------------------------------------------------------
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+# </auto-generated>
+
[Service]
Type=simple
RemainAfterExit=yes
ExecStart=docker_start
ExecStop=docker_stop
diff --git a/roles/paas-docker/systemd-unit/files/docker_start b/roles/paas-docker/systemd-unit/files/docker_start
index 86fad99..ff93d4a 100644
--- a/roles/paas-docker/systemd-unit/files/docker_start
+++ b/roles/paas-docker/systemd-unit/files/docker_start
@@ -1,3 +1,19 @@
#!/bin/sh
-get-containers-list | xargs docker start
+# -------------------------------------------------------------
+# PaaS Docker
+# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
+# Project: Nasqueron
+# Created: 2015-12-29
+# License: Trivial work, not eligible to copyright
+# Source file: roles/paas-docker/systemd-unit/files/docker_start
+# -------------------------------------------------------------
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+# </auto-generated>
+
+get-containers-list | xargs docker start
diff --git a/roles/paas-docker/systemd-unit/files/docker_stop b/roles/paas-docker/systemd-unit/files/docker_stop
index 2f12f53..4e0cb6f 100644
--- a/roles/paas-docker/systemd-unit/files/docker_stop
+++ b/roles/paas-docker/systemd-unit/files/docker_stop
@@ -1,3 +1,20 @@
#!/bin/sh
+
+# -------------------------------------------------------------
+# PaaS Docker
+# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
+# Project: Nasqueron
+# Created: 2015-12-29
+# License: Trivial work, not eligible to copyright
+# Source file: roles/paas-docker/systemd-unit/files/docker_stop
+# -------------------------------------------------------------
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+# </auto-generated>
+
get-containers --reverse | xargs docker stop
diff --git a/roles/paas-docker/systemd-unit/files/get-containers-list b/roles/paas-docker/systemd-unit/files/get-containers-list
index 886c34b..f93da6d 100755
--- a/roles/paas-docker/systemd-unit/files/get-containers-list
+++ b/roles/paas-docker/systemd-unit/files/get-containers-list
@@ -1,38 +1,55 @@
#!/usr/bin/env bash
+
+# -------------------------------------------------------------
+# PaaS Docker
+# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
+# Project: Nasqueron
+# Created: 2017-01-30
+# License: Trivial work, not eligible to copyright
+# Source file: roles/paas-docker/systemd-unit/files/get-containers-list
+# -------------------------------------------------------------
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+# </auto-generated>
+
## Read /etc/containers.conf and recover docker’s names into an array.
## get-containers-list [--reverse]
file='/etc/containers.conf'
if [[ ! -f "$file" ]]; then
echo "$file : does not exists "
exit 1
elif [[ ! -r "$file" ]]; then
echo "$file : can not read "
fi
#Get names in an array
# 21:42 <geirha> since bash 4, you can use mapfile instead of that while read loop. mapfile -t array < "$file"
mapfile -t array < "$file"
#Test argument to know in wich order return names
if [[ $1 == "--reverse" ]]; then
for ((i="${#array[*]}"; i > 0; i--)) ; do
echo "${array[i]}"
done
elif [[ -z "$1" ]] ; then
for ((i=0; i < "${#array[*]}"; i++)) ; do
echo "${array[i]}"
done
else
echo "$1 is not a valid argument"
fi
diff --git a/roles/phabricator/arcanist/files/arc b/roles/phabricator/arcanist/files/arc
index 2eb931e..4e9b48b 100755
--- a/roles/phabricator/arcanist/files/arc
+++ b/roles/phabricator/arcanist/files/arc
@@ -1,65 +1,73 @@
#!/bin/sh
# -------------------------------------------------------------
# Phabricator — Arcanist Docker container wrapper
# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
# Author: Sébastien Santoro aka Dereckson
# Project: Nasqueron
# Created: 2016-01-01
# Description: Wrapper to run Arcanist as a Docker container
# License: Trivial work, not eligible to copyright
# Image: nasqueron/arcanist
+# Source file: roles/phabricator/arcanist/files/arc
# -------------------------------------------------------------
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+# </auto-generated>
# -------------------------------------------------------------
# Parse arguments
# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
if [ -t 0 ]; then
# If a stdin entry is available
# launch the container in the
# interactive mode
FLAGS=-it
fi
# Logs are default disabled
PRINT_LOG=0
if [ "$1" = "shell" ]; then
# Launch commands
# in the container bash shell
shift
COMMAND=bash
else
# Launch arc
mkdir -p ~/.arc
COMMAND=arc
if [ "$1" = "call-conduit" ]; then
# Enable log printing
PRINT_LOG=1
# Set a random name for the container
INSTANCE="arc-"`openssl rand -hex 21`
FLAGS="-i -a=stdin --name=$INSTANCE"
fi
fi
if [ -d ~/.arc/ssh ]; then
VOLUME_SSH="-v $HOME/.arc/ssh:/root/.ssh"
else
VOLUME_SSH=""
fi
# -------------------------------------------------------------
# Run container
# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
if [ $PRINT_LOG -eq 0 ]; then
docker run $FLAGS --rm -v ~/.arc:/opt/config -v $PWD:/opt/workspace $VOLUME_SSH nasqueron/arcanist $COMMAND $*
else
docker run $FLAGS -v ~/.arc:/opt/config -v $PWD:/opt/workspace $VOLUME_SSH nasqueron/arcanist $COMMAND $* > /dev/null
sleep 3
docker logs $INSTANCE
docker rm $INSTANCE >/dev/null
fi
diff --git a/roles/phabricator/containers/files/run-aphlict b/roles/phabricator/containers/files/run-aphlict
index ed33f42..dccc890 100755
--- a/roles/phabricator/containers/files/run-aphlict
+++ b/roles/phabricator/containers/files/run-aphlict
@@ -1,25 +1,33 @@
#!/bin/sh
# -------------------------------------------------------------
# Phabricator — Aphlict notifications server
# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
# Author: Sébastien Santoro aka Dereckson
# Project: Nasqueron
# Created: 2016-03-28
# Description: Node application to get real time notifications
# through websockets for Phabricator instances.
# License: Trivial work, not eligible to copyright
# Image: nasqueron/aphlict
+# Source file: roles/phabricator/containers/files/run-aphlict
# -------------------------------------------------------------
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+# </auto-generated>
# -------------------------------------------------------------
# Container parameters
# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
INSTANCE_NAME=aphlict
# -------------------------------------------------------------
# Container launch
# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
docker run -dt --name $INSTANCE_NAME -p 22280:22280 -p 22281:22281 nasqueron/aphlict
diff --git a/roles/phabricator/containers/files/run-devcentral b/roles/phabricator/containers/files/run-devcentral
index 1e74dd7..9d7950f 100755
--- a/roles/phabricator/containers/files/run-devcentral
+++ b/roles/phabricator/containers/files/run-devcentral
@@ -1,90 +1,98 @@
#!/bin/sh
# -------------------------------------------------------------
# Phabricator — Nasqueron instance
# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
# Author: Sébastien Santoro aka Dereckson
# Project: Nasqueron
# Created: 2015-04-22
# Description: Phabricator instance for Nasqueron
# License: Trivial work, not eligible to copyright
# Image: nasqueron/phabricator
+# Source file: roles/phabricator/containers/files/run-devcentral
# -------------------------------------------------------------
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+# </auto-generated>
# -------------------------------------------------------------
# Container parameters
# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
INSTANCE_NAME=devcentral
PORT=31080
DOMAIN=$INSTANCE_NAME.nasqueron.org
DATA_DIRECTORY=/data/$INSTANCE_NAME
MYSQL_INSTANCE=acquisitariat
# -------------------------------------------------------------
# Phabricator parameters
# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
PHABRICATOR_URL=http://$DOMAIN
PHABRICATOR_TITLE="Nasqueron DevCentral"
PHABRICATOR_ALT_FILE_DOMAIN="https://phabricator-files-for-devcentral-nasqueron.spacetechnology.net"
# -------------------------------------------------------------
# Deployment of our Phabricator code parameters
# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
REPO_LOGIN=git
REPO_HOST=bitbucket.org
PHABRICATOR_PROD_REPO="ssh://git@bitbucket.org/nasqueron/devcentral-phabricator"
PHABRICATOR_PROD_BRANCH=production
# -------------------------------------------------------------
# Ensure container isn't already running
# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
docker-container-status $INSTANCE_NAME > /dev/null
if [ "$?" -lt 2 ]; then
echo "Container is already running."
echo "To force relaunch, try docker stop $INSTANCE_NAME ; docker rm $INSTANCE_NAME ; $0"
exit 1
fi
# -------------------------------------------------------------
# Container launch
# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
docker run -t -d \
--link $MYSQL_INSTANCE:mysql \
-v $DATA_DIRECTORY/repo:/var/repo \
-v $DATA_DIRECTORY/conf:/opt/phabricator/conf \
-p $PORT:80 \
-e PHABRICATOR_URL=$PHABRICATOR_URL \
-e PHABRICATOR_TITLE="$PHABRICATOR_TITLE" \
-e PHABRICATOR_ALT_FILE_DOMAIN="$PHABRICATOR_ALT_FILE_DOMAIN" \
-e PHABRICATOR_PROD_REPO=$PHABRICATOR_PROD_REPO \
-e PHABRICATOR_PROD_BRANCH=$PHABRICATOR_PROD_BRANCH \
-e PHABRICATOR_USE_MAILGUN=1 \
-e PHABRICATOR_DOMAIN=$DOMAIN \
-e PHABRICATOR_BOT=xessife \
--name $INSTANCE_NAME nasqueron/phabricator
# -------------------------------------------------------------
# DevCentral specific branch deployment
#
# Deploys our version
# As we change static resources, restart php-fpm is a good idea:
# if someone asks the page while we were pulling our version,
# the old celerity map would be kept by APCu.
# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
docker exec $INSTANCE_NAME sh -c 'mkdir -p /root/.ssh && \
cp /opt/phabricator/conf/deploy-keys/* /root/.ssh'
docker exec $INSTANCE_NAME ssh -o StrictHostKeyChecking=no ${REPO_LOGIN}@${REPO_HOST}
docker exec $INSTANCE_NAME sh -c 'cd /opt/phabricator && \
git remote add private "$PHABRICATOR_PROD_REPO" && \
git fetch --all && \
git checkout $PHABRICATOR_PROD_BRANCH && \
sv restart php-fpm && sv restart phd'
echo "Deployment done at `date`."
exit 0
diff --git a/roles/phabricator/containers/files/run-wolfphab b/roles/phabricator/containers/files/run-wolfphab
index 24a6c92..87b64b8 100755
--- a/roles/phabricator/containers/files/run-wolfphab
+++ b/roles/phabricator/containers/files/run-wolfphab
@@ -1,73 +1,81 @@
#!/bin/sh
# -------------------------------------------------------------
# Phabricator — Wolfplex instance
# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
# Author: Sébastien Santoro aka Dereckson
# Project: Nasqueron
# Created: 2015-10-25
# Description: Phabricator instance for Nasqueron
# License: Trivial work, not eligible to copyright
# Image: nasqueron/phabricator
+# Source file: roles/phabricator/containers/files/run-wolfphab
# -------------------------------------------------------------
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+# </auto-generated>
# -------------------------------------------------------------
# Container parameters
# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
INSTANCE_NAME=wolfphab
PORT=35080
DOMAIN=phabricator.wolfplex.be
DATA_DIRECTORY=/data/$INSTANCE_NAME
MYSQL_INSTANCE=acquisitariat
MYSQL_NAMESPACE=wolfphab
# -------------------------------------------------------------
# Phabricator parameters
# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
PHABRICATOR_URL=https://$DOMAIN
PHABRICATOR_TITLE="Wolfplex Phabricator"
PHABRICATOR_ALT_FILE_DOMAIN="https://phabricator-files-for-wolfplex.nasqueron.org"
# -------------------------------------------------------------
# Ensure container isn't already running
# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
docker-container-status $INSTANCE_NAME > /dev/null
if [ "$?" -lt 2 ]; then
echo "Container is already running."
echo "To force relaunch, try docker stop $INSTANCE_NAME ; docker rm $INSTANCE_NAME ; $0"
exit 1
fi
# -------------------------------------------------------------
# Container launch
# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
docker run -t -d \
--link $MYSQL_INSTANCE:mysql \
-v $DATA_DIRECTORY/repo:/var/repo \
-v $DATA_DIRECTORY/conf:/opt/phabricator/conf \
-p $PORT:80 \
-e PHABRICATOR_URL=$PHABRICATOR_URL \
-e PHABRICATOR_TITLE="$PHABRICATOR_TITLE" \
-e PHABRICATOR_ALT_FILE_DOMAIN="$PHABRICATOR_ALT_FILE_DOMAIN" \
-e PHABRICATOR_STORAGE_NAMESPACE="$MYSQL_NAMESPACE" \
--name $INSTANCE_NAME nasqueron/phabricator
docker exec $INSTANCE_NAME sh -c 'cd /opt/phabricator && \
bin/config set mysql.host mysql && \
bin/config set mysql.pass $MYSQL_ENV_MYSQL_ROOT_PASSWORD && \
bin/config set storage.default-namespace $PHABRICATOR_STORAGE_NAMESPACE && \
bin/config set phabricator.base-uri $PHABRICATOR_URL && \
bin/config set security.alternate-file-domain "$PHABRICATOR_ALT_FILE_DOMAIN" && \
bin/config set mailgun.domain $DOMAIN && \
rm -f /etc/nginx/sites-enabled/default && \
chown -R app /var/repo'
# Fixes bug phd doesn't run at the very first container launch
docker exec $INSTANCE_NAME sv restart phd
echo "Deployment done at `date`."
exit 0
diff --git a/roles/saltmaster/sudo/files/salt b/roles/saltmaster/sudo/files/salt
index 136f84a..2157ace 100644
--- a/roles/saltmaster/sudo/files/salt
+++ b/roles/saltmaster/sudo/files/salt
@@ -1,4 +1,20 @@
+# -------------------------------------------------------------
+# SaltStack deployment
+# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
+# Project: Nasqueron
+# Created: 2016-04-10
+# License: Trivial work, not eligible to copyright
+# Source file: roles/saltmaster/sudo/files/salt
+# -------------------------------------------------------------
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+# </auto-generated>
+
Cmnd_Alias SALT = /usr/local/bin/salt, /usr/local/bin/salt-api, /usr/local/bin/salt-call, /usr/local/bin/salt-cloud, /usr/local/bin/salt-cp, /usr/local/bin/salt-key, /usr/local/bin/salt-master, /usr/local/bin/salt-minion, /usr/local/bin/salt-proxy, /usr/local/bin/salt-run, /usr/local/bin/salt-ssh, /usr/local/bin/salt-syndic, /usr/local/etc/rc.d/salt_master
%salt ALL=(salt) NOPASSWD: SALT
diff --git a/roles/shellserver/PHP7/files/php.ini b/roles/shellserver/PHP7/files/php.ini
index ea2145a..54fb530 100644
--- a/roles/shellserver/PHP7/files/php.ini
+++ b/roles/shellserver/PHP7/files/php.ini
@@ -1,15 +1,23 @@
# -------------------------------------------------------------
# PHP 7 configuration file
# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
# Author: Sébastien Santoro aka Dereckson
# Created: 2016-02-10
# Licence: Trivial work, not eligible to copyright
# Keywords: PHP 7, php.ini
+# Source file: roles/shellserver/PHP7/files/php.ini
# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+# </auto-generated>
# -------------------------------------------------------------
# Security
# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
# Allows CGI use through SuEXEC invoke
cgi.force_redirect = 0;
diff --git a/roles/shellserver/database/files/my.cnf b/roles/shellserver/database/files/my.cnf
index cf929d5..9a50a40 100644
--- a/roles/shellserver/database/files/my.cnf
+++ b/roles/shellserver/database/files/my.cnf
@@ -1,30 +1,42 @@
+# -------------------------------------------------------------
+# MySQL configuration
+# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
+# Project: Eglide
+# Created: 2017-01-23
+# License: Trivial work, not eligible to copyright
+# Source file: roles/shellserver/database/files/my.cnf
+# -------------------------------------------------------------
#
-# Eglide MySQL configuration
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+# </auto-generated>
[client]
port = 3306
socket = /var/run/mysqld/mysqld.sock
[mysqld_safe]
pid-file = /var/run/mysqld/mysqld.pid
socket = /var/run/mysqld/mysqld.sock
nice = 0
[mysqld]
user = mysql
pid-file = /var/run/mysqld/mysqld.pid
socket = /var/run/mysqld/mysqld.sock
port = 3306
basedir = /usr
datadir = /var/lib/mysql
tmpdir = /tmp
lc-messages-dir = /usr/share/mysql
explicit_defaults_for_timestamp
sql_mode =STRICT_ALL_TABLES
ft_stopword_file=/opt/stopwords.txt
ft_min_word_len =3
ft_boolean_syntax=' |-><()~*:""&^'
max_connections = 50
diff --git a/roles/shellserver/odderon/files/build.sh b/roles/shellserver/odderon/files/build.sh
index d975643..9d36d9d 100644
--- a/roles/shellserver/odderon/files/build.sh
+++ b/roles/shellserver/odderon/files/build.sh
@@ -1,16 +1,24 @@
# -------------------------------------------------------------
# Salt — Deploy Odderon (darkbot)
# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
# Project: Nasqueron
# Created: 2017-01-25
# Authors: David Seikel, Dereckson
# License: Trivial work, not eligible to copyright
+# Source file: roles/shellserver/odderon/files/build.sh
# -------------------------------------------------------------
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+# </auto-generated>
PREFIX=/opt/odderon
test ! -r build/configure && sh bootstrap.sh
cd build
sh configure -C --prefix=$PREFIX "$@"
make
diff --git a/roles/shellserver/odderon/files/odderon.service b/roles/shellserver/odderon/files/odderon.service
index 5e9eba9..41ade84 100644
--- a/roles/shellserver/odderon/files/odderon.service
+++ b/roles/shellserver/odderon/files/odderon.service
@@ -1,14 +1,29 @@
+# -------------------------------------------------------------
+# Odderon
+# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
+# Project: Nasqueron
+# Created: 2017-01-26
+# License: Trivial work, not eligible to copyright
+# Source file: roles/shellserver/odderon/files/odderon.service
+# -------------------------------------------------------------
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+# </auto-generated>
[Unit]
Description=Odderon darkbot
[Service]
User=odderon
Type=Simple
WorkingDirectory=/opt/odderon
ExecStart=/opt/odderon/bin/darkbot
ExecReload= kill -HUP `cat /opt/odderon/darkbot.pid`
PIDFile=/opt/odderon/darkbot.pid
[Install]
WantedBy=multi-user.target
diff --git a/roles/shellserver/odderon/files/odderon.sudoers b/roles/shellserver/odderon/files/odderon.sudoers
index 4498d71..40f0da5 100644
--- a/roles/shellserver/odderon/files/odderon.sudoers
+++ b/roles/shellserver/odderon/files/odderon.sudoers
@@ -1,6 +1,22 @@
+# -------------------------------------------------------------
+# Odderon
+# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
+# Project: Nasqueron
+# Created: 2017-01-24
+# License: Trivial work, not eligible to copyright
+# Source file: roles/shellserver/odderon/files/odderon.sudoers
+# -------------------------------------------------------------
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+# </auto-generated>
+
%nasqueron-irc ALL=(odderon) NOPASSWD: ALL
# Service management
{% for command in ["start", "stop", "restart", "reload"] %}
%nasqueron-irc ALL= NOPASSWD: /bin/systemctl {{ command }} odderon
{% endfor %}
diff --git a/roles/shellserver/user-session/files/csh.logout b/roles/shellserver/user-session/files/csh.logout
index d134a42..70ce27f 100644
--- a/roles/shellserver/user-session/files/csh.logout
+++ b/roles/shellserver/user-session/files/csh.logout
@@ -1,13 +1,21 @@
# -------------------------------------------------------------
# System-wide .logout file for csh(1)
# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
# Author: Sébastien Santoro aka Dereckson
# Created: 2015-12-30
# Licence: Trivial work, not eligible to copyright
+# Source file: roles/shellserver/user-session/files/csh.logout
# -------------------------------------------------------------
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+# </auto-generated>
# -------------------------------------------------------------
# Cleans up whom-diff files
# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
whom-diff --clean
diff --git a/roles/shellserver/user-session/files/whom b/roles/shellserver/user-session/files/whom
index 7a08853..9a8ce1a 100755
--- a/roles/shellserver/user-session/files/whom
+++ b/roles/shellserver/user-session/files/whom
@@ -1,12 +1,20 @@
#!/bin/sh
# -------------------------------------------------------------
# Clean alternative to who
# Prints the usernames of connected users by alphabetical order
# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
# Author: Sébastien Santoro aka Dereckson
# Created: 2015-12-30
# Licence: Trivial work, not eligible to copyright
+# Source file: roles/shellserver/user-session/files/whom
# -------------------------------------------------------------
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+# </auto-generated>
who | awk '{print $1}' | sort | uniq
diff --git a/roles/shellserver/user-session/files/whom-diff b/roles/shellserver/user-session/files/whom-diff
index c59a2fe..93e34f7 100755
--- a/roles/shellserver/user-session/files/whom-diff
+++ b/roles/shellserver/user-session/files/whom-diff
@@ -1,69 +1,77 @@
#!/bin/sh
# -------------------------------------------------------------
# whom-diff
#
# Computes the diff between two `whom` invoke.
# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
# Author: Sébastien Santoro aka Dereckson
# Created: 2015-12-30
# Licence: BSD-2-Clause
+# Source file: roles/shellserver/user-session/files/whom-diff
# -------------------------------------------------------------
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+# </auto-generated>
# -------------------------------------------------------------
# Determines session identifier and directory
# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
if [ "$SESSION_ID" = "" ]; then
SESSION_ID=`who am I | md5 | cut -c1-8`
fi
DIR=/var/tmp/whom/$USER/$SESSION_ID
# -------------------------------------------------------------
# -s / --session
# Prints the session identifier
# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
if [ "$1" = "--session" ] || [ "$1" = "-s" ]; then
echo $SESSION_ID
exit 0
fi
# -------------------------------------------------------------
# Default mode
#  Prints the diff between current `whom` and previous output
# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
if [ $# -eq 0 ]; then
# Creates working directory if needed
if [ ! -d $DIR ]; then
mkdir -p $DIR
touch $DIR/old
fi
# Let's diff
cd $DIR
whom > current
diff old current | tail -n +2
mv current old
exit 0
fi
# -------------------------------------------------------------
# -c / --clean
# Cleans directory
# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
if [ "$1" = "--clean" ] || [ "$1" = "-c" ]; then
rm -rf $DIR
exit $?
fi
# -------------------------------------------------------------
# Usage
# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
>&2 echo "Usage: $0 [--setup|--clean|-s|-c]"
exit 1
diff --git a/roles/shellserver/userland-software/files/install-eggdrop b/roles/shellserver/userland-software/files/install-eggdrop
index a35ddd1..48fd017 100644
--- a/roles/shellserver/userland-software/files/install-eggdrop
+++ b/roles/shellserver/userland-software/files/install-eggdrop
@@ -1,50 +1,58 @@
#!/bin/sh
# -------------------------------------------------------------
# Install an eggdrop
# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
# Project: Eglide
# Created: 2016-11-06
# License: Trivial work, not eligible to copyright
+# Source file: roles/shellserver/userland-software/files/install-eggdrop
# -------------------------------------------------------------
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+# </auto-generated>
# -------------------------------------------------------------
# TCL and eggdrop versions
# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
EGGDROP_VERSION_MAJOR=1.6
EGGDROP_VERSION=1.6.21
TCL_VERSION=8.6
# -------------------------------------------------------------
# Fetch, extract
# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
wget ftp://ftp.eggheads.org/pub/eggdrop/source/${EGGDROP_VERSION_MAJOR}/eggdrop${EGGDROP_VERSION}.tar.gz
tar xzf eggdrop${EGGDROP_VERSION}.tar.gz
cd eggdrop${EGGDROP_VERSION}
# -------------------------------------------------------------
# Configure step
#
# This is the tricky part, as we need to provide path to TCL
# header and library files, heavily OS/distro/arch dependant.
# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
if [ -f /etc/debian_version ]; then
ARCH=`dpkg-architecture -qDEB_HOST_MULTIARCH`
CFLAGS="-std=gnu89" ./configure --with-tclinc=/usr/include/tcl${TCL_VERSION}/tcl.h --with-tcllib=/usr/lib/$ARCH/libtcl${TCL_VERSION}.so
elif [ `uname` = "FreeBSD" ]; then
TCL_VERSION_LIB=`echo $TCL_VERSION | tr -d .`
./configure --with-tclinc=/usr/local/include/tcl${TCL_VERSION}/tcl.h -with-tcllib=/usr/local/lib/libtcl${TCL_VERSION_LIB}.so
else
./configure
fi
# -------------------------------------------------------------
# Build, install
# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
make config
make
make install
diff --git a/roles/shellserver/users/files/ssh_keys/amj b/roles/shellserver/users/files/ssh_keys/amj
index 19afd27..cb3a371 100644
--- a/roles/shellserver/users/files/ssh_keys/amj
+++ b/roles/shellserver/users/files/ssh_keys/amj
@@ -1,4 +1,25 @@
+# -------------------------------------------------------------
+# OpenSSH authorized_keys
+# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
+# Project: Eglide
+# License: Trivial work, not eligible to copyright
+# Source file: roles/shellserver/users/files/ssh_keys/amj
+# -------------------------------------------------------------
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+#
+# To add a new key or revoke a key, submit a Git commit:
+# https://agora.nasqueron.org/How_to_contribute_code
+#
+# You can also ask Nasqueron operations to do that for you:
+# https://devcentral.nasqueron.org/maniphest/task/edit/form/3/
+# </auto-generated>
+
ssh-rsa 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 am@gentam
ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAACAQCTQ7Tt/wm+eDc6bTbWX2HHQbdMJVS40mlEfit6usDGKb9PUDtV2pn1KumnsevFge3OArnCLDqp0pmIuMy8loMjyyFeMMsrMNvE4i1Zl/xXcss3siwlqzMDozGBpxC3jMielUnm64BMCtnURfFZsIZfnpZoG6jsfLKWUSKJro9SNrxQptnSH5xkvEOF7gZS8HTkEvjE1sgfIEabZrYIIo5nLrz9yxmuiHIOqx1uyhJGw1dr4pJSGAMcYGGOpfy8uOy80+46MUW8ZtpSTspaTiHnUgs7gSPyCThrgdiNjiAj+mAeUKYytQDt5MQxp0FbUvv34bCJ9Q8G7hXVqBaXO7N/wyyiJ2WL8BbfZhoKM0vmn/oaYmomdlWF08YmkJyeqvf0N9/s6gyzjdj7Aqihi/02YiOqdL5m5WZAREiqIGo/HtlpCoShiqtNn545mD+KwanMdJbJp8ALn7yjJJEKpXVCcUaZOPR7kTF4fZ0eUTuVH3SeyCf3z3OpZ55MeGOkjKfVRkHS6FJ9Uhkjxi0K/2apROB/XCtS0Bv3AjOxt7f7HvabmYzx3J/43JLFKK5BkmqTBGUTowKU/40kxbWug1MAnSzbmDEucZ/eu34SE4R2oXarLrflH9kAIZ6+cftMpAAOKd5VVHeVJKnl4MTSU4C67iwsVpVoJ+mQOPHsf5Ekuw== am@debian-am
ssh-rsa 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 amj@dwabyam
ssh-rsa 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 amj@thinbiam
diff --git a/roles/shellserver/users/files/ssh_keys/chan b/roles/shellserver/users/files/ssh_keys/chan
index 21cf12c..07f3bc4 100644
--- a/roles/shellserver/users/files/ssh_keys/chan
+++ b/roles/shellserver/users/files/ssh_keys/chan
@@ -1 +1,22 @@
+# -------------------------------------------------------------
+# OpenSSH authorized_keys
+# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
+# Project: Eglide
+# License: Trivial work, not eligible to copyright
+# Source file: roles/shellserver/users/files/ssh_keys/chan
+# -------------------------------------------------------------
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+#
+# To add a new key or revoke a key, submit a Git commit:
+# https://agora.nasqueron.org/How_to_contribute_code
+#
+# You can also ask Nasqueron operations to do that for you:
+# https://devcentral.nasqueron.org/maniphest/task/edit/form/3/
+# </auto-generated>
+
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIHvDcmKHfTrCBRpjJxYyIELMRknrMpDXfcKDhfXqmB09 chan@Calculon
diff --git a/roles/shellserver/users/files/ssh_keys/dereckson b/roles/shellserver/users/files/ssh_keys/dereckson
index 030f173..5fbcd10 100644
--- a/roles/shellserver/users/files/ssh_keys/dereckson
+++ b/roles/shellserver/users/files/ssh_keys/dereckson
@@ -1,4 +1,25 @@
+# -------------------------------------------------------------
+# OpenSSH authorized_keys
+# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
+# Project: Eglide
+# License: Trivial work, not eligible to copyright
+# Source file: roles/shellserver/users/files/ssh_keys/dereckson
+# -------------------------------------------------------------
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+#
+# To add a new key or revoke a key, submit a Git commit:
+# https://agora.nasqueron.org/How_to_contribute_code
+#
+# You can also ask Nasqueron operations to do that for you:
+# https://devcentral.nasqueron.org/maniphest/task/edit/form/3/
+# </auto-generated>
+
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIMKBin4bpJpIkWVVjmYbivtNmWo3KgBLmx0/KXaw8QUl dereckson@ysul.nasqueron.org
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIL5FbV1PjQmAX2fpgBKg8FnnInnVVSd9NH4PPUFlhaVO dereckson@xyrogh
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIIURiX8gBIv91sxutRQeESip7Ympmqe6miepoNDvXpZ9 dereckson@orin.dereckson.drake
diff --git a/roles/shellserver/users/files/ssh_keys/erol b/roles/shellserver/users/files/ssh_keys/erol
index 763adc2..7f41a46 100644
--- a/roles/shellserver/users/files/ssh_keys/erol
+++ b/roles/shellserver/users/files/ssh_keys/erol
@@ -1 +1,22 @@
+# -------------------------------------------------------------
+# OpenSSH authorized_keys
+# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
+# Project: Eglide
+# License: Trivial work, not eligible to copyright
+# Source file: roles/shellserver/users/files/ssh_keys/erol
+# -------------------------------------------------------------
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+#
+# To add a new key or revoke a key, submit a Git commit:
+# https://agora.nasqueron.org/How_to_contribute_code
+#
+# You can also ask Nasqueron operations to do that for you:
+# https://devcentral.nasqueron.org/maniphest/task/edit/form/3/
+# </auto-generated>
+
ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDdHrSRJGwaGFTpoZIvkoWTMpnXgke77emVicMT8b37kcUepeD91pA3UPQ7UOEQl/Af3Ly7ePneymZ6NjAkM06oPeIjxE6Nz+i6p7rVIZhCb9qz+hdKgt4wSEQLWponegFNdCUs6HvMjDGlsI0kajHgIakXiKAwNyxhQzpBoGranO9c2PdAq2HGq7Kcq8ApC1kdKG0W3dT4PWborzmt1jWna2yosEn+TTHj5wi2p/E9BsCbmfokBO3xn491lr1P4shh4zg7Mv3SPD3j4/mZb9EMwD8cl4y9ZIoMEbL8p4s8J7Joqs3gK9hmMN5ZCNUFrNrJu3TCRZre2k7cV3+U3IXT erol@fedai
diff --git a/roles/shellserver/users/files/ssh_keys/kazuya b/roles/shellserver/users/files/ssh_keys/kazuya
index 0d9afba..23b346c 100644
--- a/roles/shellserver/users/files/ssh_keys/kazuya
+++ b/roles/shellserver/users/files/ssh_keys/kazuya
@@ -1 +1,22 @@
+# -------------------------------------------------------------
+# OpenSSH authorized_keys
+# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
+# Project: Eglide
+# License: Trivial work, not eligible to copyright
+# Source file: roles/shellserver/users/files/ssh_keys/kazuya
+# -------------------------------------------------------------
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+#
+# To add a new key or revoke a key, submit a Git commit:
+# https://agora.nasqueron.org/How_to_contribute_code
+#
+# You can also ask Nasqueron operations to do that for you:
+# https://devcentral.nasqueron.org/maniphest/task/edit/form/3/
+# </auto-generated>
+
ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCtCcRQ6HVKD5mj602UJkpI/TMGVt1R0yYx1HxP6SWJb6FM2E4wzkxtf0sp2cxW/9Lz/0OsQV8fSSo/qfUhQXfRcL+rxsM+iixD0WMffMC8CrqsYS+VV32HR2sIm8J7yyMweJrfYneErdFisGmMgOFw8vBGX01XfdwGqbSflf3Tal7L3R0g65rclGsg7JckWE6RQMXnvGwXQxv4QahaNtZK74AlyeFgsXYlv14UeaGE4Pz+rkgZKoC4tvAOBQMNxWtCPMcydJOacoCZO7Jcxv0jMUo0y26mulQ6vbz5hqAPS612c47gh8VNDDkQaznQMeiSyIlnvDEkHmzvC8Z3UAeJ eglide
diff --git a/roles/shellserver/users/files/ssh_keys/kumkum b/roles/shellserver/users/files/ssh_keys/kumkum
index 75d7c6d..8d8b552 100644
--- a/roles/shellserver/users/files/ssh_keys/kumkum
+++ b/roles/shellserver/users/files/ssh_keys/kumkum
@@ -1 +1,22 @@
+# -------------------------------------------------------------
+# OpenSSH authorized_keys
+# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
+# Project: Eglide
+# License: Trivial work, not eligible to copyright
+# Source file: roles/shellserver/users/files/ssh_keys/kumkum
+# -------------------------------------------------------------
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+#
+# To add a new key or revoke a key, submit a Git commit:
+# https://agora.nasqueron.org/How_to_contribute_code
+#
+# You can also ask Nasqueron operations to do that for you:
+# https://devcentral.nasqueron.org/maniphest/task/edit/form/3/
+# </auto-generated>
+
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIL4vFNpxnqorIN6UoJDzkh3Ya69JDEOY9f7N5y2U6xYK kumkum@kumkum-E200HA
diff --git a/roles/shellserver/users/files/ssh_keys/rashk0 b/roles/shellserver/users/files/ssh_keys/rashk0
index 7b16455..611a1d1 100644
--- a/roles/shellserver/users/files/ssh_keys/rashk0
+++ b/roles/shellserver/users/files/ssh_keys/rashk0
@@ -1 +1,22 @@
+# -------------------------------------------------------------
+# OpenSSH authorized_keys
+# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
+# Project: Eglide
+# License: Trivial work, not eligible to copyright
+# Source file: roles/shellserver/users/files/ssh_keys/rashk0
+# -------------------------------------------------------------
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+#
+# To add a new key or revoke a key, submit a Git commit:
+# https://agora.nasqueron.org/How_to_contribute_code
+#
+# You can also ask Nasqueron operations to do that for you:
+# https://devcentral.nasqueron.org/maniphest/task/edit/form/3/
+# </auto-generated>
+
ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDJJKU6dVl19vQFPMUWS2iGRzBV1uD9YEaMijBkY2oPYjwhFXc1fouGGr17kkSK9D0c4pr9A6jk/gH9GWE5SpwaZY94VK5QfdvHpyA1hLevdUc4mwuIbsMp893kr0e9Miys1/v+UdFhUq0n3rWiER3oo9rJjx3qloBqSfD18y3sCFTyM1AheVMp7E71kgViG7wWtHrkmnrBo3V5ENc2snTCQy7lF7eQ5a6D45a5n2KYV94YrMvGDbfYUnw8IJHNN6XB1KBK6mksbm2p6fc3ow0UJDOK3bfJNUkp9tfRJV/EeYxGPYJRE60Ng2Dqc3zZaH7FDgbBLoK0UwGURQozNSQT campari@Beta
diff --git a/roles/shellserver/users/files/ssh_keys/ringa b/roles/shellserver/users/files/ssh_keys/ringa
index 03a657c..0c1565b 100644
--- a/roles/shellserver/users/files/ssh_keys/ringa
+++ b/roles/shellserver/users/files/ssh_keys/ringa
@@ -1 +1,22 @@
+# -------------------------------------------------------------
+# OpenSSH authorized_keys
+# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
+# Project: Eglide
+# License: Trivial work, not eligible to copyright
+# Source file: roles/shellserver/users/files/ssh_keys/ringa
+# -------------------------------------------------------------
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+#
+# To add a new key or revoke a key, submit a Git commit:
+# https://agora.nasqueron.org/How_to_contribute_code
+#
+# You can also ask Nasqueron operations to do that for you:
+# https://devcentral.nasqueron.org/maniphest/task/edit/form/3/
+# </auto-generated>
+
ssh-rsa AAAAB3NzaC1yc2EAAAABJQAAAQEAiTobf2i/IveVlpdntX9M6p9rOe60HuODq5FslTIFxA/RwKQbJKafCQZ3ci+Pt9BKAKtBGSJANNfbxxN7VRB+iO6UZUh2Qjb012CfigC5g1r9MEryqh8LBP27NqTkCqjMZrwUa6pYMBG1/ydbOA0BIr3C72QfpXC/qCSvXNgQzL7DGSR7cgjhGvMDn5ewJuxsvXAcajMLEORxeYooONG9ELGRUMFI4WcX6gmiYcrMVsMF+7ByshIngV5v9esWadi+RdTWUVOYt2yVS7hkYHZwUX/bN1AOfkRiuD1w3DFFiHhSoquCwaOOZjKxAw6VOrV6O/toLGe0kXXfRFzeB29/1w== rsa-key-20170111
diff --git a/roles/shellserver/users/files/ssh_keys/rix b/roles/shellserver/users/files/ssh_keys/rix
index 3e73f78..ffc9c54 100644
--- a/roles/shellserver/users/files/ssh_keys/rix
+++ b/roles/shellserver/users/files/ssh_keys/rix
@@ -1 +1,22 @@
+# -------------------------------------------------------------
+# OpenSSH authorized_keys
+# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
+# Project: Eglide
+# License: Trivial work, not eligible to copyright
+# Source file: roles/shellserver/users/files/ssh_keys/rix
+# -------------------------------------------------------------
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+#
+# To add a new key or revoke a key, submit a Git commit:
+# https://agora.nasqueron.org/How_to_contribute_code
+#
+# You can also ask Nasqueron operations to do that for you:
+# https://devcentral.nasqueron.org/maniphest/task/edit/form/3/
+# </auto-generated>
+
ssh-rsa AAAAB3NzaC1yc2EAAAABJQAAAQEAjFnOi4rwBVdw69U9y1xgWXrfNNgxEXAmbXthzHae07COwN190xoWv8VeogKxfMdxE2Tj4E0BDFt2i7Jbk9BploFdNXG46lrnoszmgRsuRx5jERfvMyOPvCAQHbL0N53AL6zH9wXF/51a5bJJ3n4wkmO1nDj9WqrDNk0in+knICiPHQX4TxwRXqBuf61gQMxwy8Aoy1WCCfCeAesZxjdFM47C6X3PPHVaXvF6x6iX8OzIHqoVT18yQAQxbET+PWMtlmNFJFx76+Sov4eQm/d2KeRg0aqw49gKLpigYnHfd2uitmSQixBNl5jyvDMoR92vZmZnScmqA9cXQikQ9HCW6Q== rsa-key-20170110
diff --git a/roles/shellserver/users/files/ssh_keys/sandlayth b/roles/shellserver/users/files/ssh_keys/sandlayth
index 3b5e028..f617e8f 100644
--- a/roles/shellserver/users/files/ssh_keys/sandlayth
+++ b/roles/shellserver/users/files/ssh_keys/sandlayth
@@ -1 +1,22 @@
+# -------------------------------------------------------------
+# OpenSSH authorized_keys
+# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
+# Project: Eglide
+# License: Trivial work, not eligible to copyright
+# Source file: roles/shellserver/users/files/ssh_keys/sandlayth
+# -------------------------------------------------------------
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+#
+# To add a new key or revoke a key, submit a Git commit:
+# https://agora.nasqueron.org/How_to_contribute_code
+#
+# You can also ask Nasqueron operations to do that for you:
+# https://devcentral.nasqueron.org/maniphest/task/edit/form/3/
+# </auto-generated>
+
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIL4H4SF3NZ0/o5uTYhIUKUEzP7hlZ0mGqMxs6wt/dhQs kalix@arch-laptop
diff --git a/roles/shellserver/users/files/ssh_keys/shark b/roles/shellserver/users/files/ssh_keys/shark
index b002f51..c24dc77 100644
--- a/roles/shellserver/users/files/ssh_keys/shark
+++ b/roles/shellserver/users/files/ssh_keys/shark
@@ -1 +1,22 @@
+# -------------------------------------------------------------
+# OpenSSH authorized_keys
+# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
+# Project: Eglide
+# License: Trivial work, not eligible to copyright
+# Source file: roles/shellserver/users/files/ssh_keys/shark
+# -------------------------------------------------------------
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+#
+# To add a new key or revoke a key, submit a Git commit:
+# https://agora.nasqueron.org/How_to_contribute_code
+#
+# You can also ask Nasqueron operations to do that for you:
+# https://devcentral.nasqueron.org/maniphest/task/edit/form/3/
+# </auto-generated>
+
ssh-rsa AAAAB3NzaC1yc2EAAAABJQAAAQEAjKehL1PdhcpLNiGdWLuVCUpNawUhQoxon3nmhZm/B+oU2nwygqvx9YU3LFzTEDNXWtU0aH2UVgC5bkRyVdmVKjX878luoluYwhKJFrYoEd9zS+EPDNmNYSoKntDbZoB17iacVEUM4Kg3RAzwStw3L8OO9DlB9NdXUzS8/9wlSy43ddoRRy83FvnvhRNXWScUIQyBolxqyoVvXdLZ2t0PnCdU3Bz2Wkcg24XjwDOR0R0A3780b+VGcsjXtjYxK6xCpNo9l2DqLAfpw+BFusWy6au5U15vfHgR91Lbcd1xtfvJAElI97fR6DGf+HSrtYZe+9gMU1nofibdiNWSJ/Vn+Q== rsa-key-20161212
diff --git a/roles/shellserver/users/files/ssh_keys/tomjerr b/roles/shellserver/users/files/ssh_keys/tomjerr
index 8d1f5be..304ce41 100644
--- a/roles/shellserver/users/files/ssh_keys/tomjerr
+++ b/roles/shellserver/users/files/ssh_keys/tomjerr
@@ -1 +1,22 @@
+# -------------------------------------------------------------
+# OpenSSH authorized_keys
+# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
+# Project: Eglide
+# License: Trivial work, not eligible to copyright
+# Source file: roles/shellserver/users/files/ssh_keys/tomjerr
+# -------------------------------------------------------------
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+#
+# To add a new key or revoke a key, submit a Git commit:
+# https://agora.nasqueron.org/How_to_contribute_code
+#
+# You can also ask Nasqueron operations to do that for you:
+# https://devcentral.nasqueron.org/maniphest/task/edit/form/3/
+# </auto-generated>
+
ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDlBO0oLUHYkMBIRregybPFAa0z2C7o2OsIugNZO628Z28hrtxNl+sxTues5TqEV0GEfSWxDf6Ce+d0wWIi7BunL+8pjc59hPbNczCNpgFCXtzgoJptMJ/ikQL0C1xA4dv1KiwYWAYWh45+R/KwW/ab2cfpXGA8G5l1/4ILK73lzIsy4MQEbxAKcsqHKnQqqoDIVP+9t5fsqgqHzBqGWw0l2J5lF1WWIWiNa7ZxuzIr8SHo8/2UYGHIVads25zccpU1dTyUoZ/czfNfTdvYCVgLLQZRw9NgTyKVyL+yNLIUkqykc94ogsw2KZbBNMcUuBnVVL9Kcdyo7rmMzMLdXCjh tomjerr
diff --git a/roles/shellserver/users/files/ssh_keys/xray b/roles/shellserver/users/files/ssh_keys/xray
index dc597b1..331067c 100644
--- a/roles/shellserver/users/files/ssh_keys/xray
+++ b/roles/shellserver/users/files/ssh_keys/xray
@@ -1 +1,22 @@
+# -------------------------------------------------------------
+# OpenSSH authorized_keys
+# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
+# Project: Eglide
+# License: Trivial work, not eligible to copyright
+# Source file: roles/shellserver/users/files/ssh_keys/xray
+# -------------------------------------------------------------
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+#
+# To add a new key or revoke a key, submit a Git commit:
+# https://agora.nasqueron.org/How_to_contribute_code
+#
+# You can also ask Nasqueron operations to do that for you:
+# https://devcentral.nasqueron.org/maniphest/task/edit/form/3/
+# </auto-generated>
+
ssh-rsa AAAAB3NzaC1yc2EAAAABJQAAAQEAzSj3sQYbrBBdceBRUAbuzCS9vZWycVV0OSZ0ofoWx/dOTIalhc3O+aett7J34GqwDgpcTEkEpa/MrlO/2TOGOFIsPlvbZW4fXXFADCbOWkRRNuYW5rv/Sg6ZliGtw4cj0dKEkn9+L/JAuGwKV5KJNTPcp5w8hZyQYczZ8KhcyNVv7mfzLnId03wPnuTTe+AmCTOitbVb3gxjdXDYeS46PkbV8m/23KpcdLigo3ClDwE/SIoA+YddaAbpWDMEwhnWyKmLGI6xkFcqSY1NT0eYnL2waZMEnfluxt+D0V0IT5NeOmQcTuVWPvjFdSKbKepPhdrFmzGNtytfZWoFOPiG+Q== rsa-key-20170119
diff --git a/roles/shellserver/vhosts/files/vhosts b/roles/shellserver/vhosts/files/vhosts
index 2b0810e..3e7f53a 100644
--- a/roles/shellserver/vhosts/files/vhosts
+++ b/roles/shellserver/vhosts/files/vhosts
@@ -1,6 +1,23 @@
#!/bin/sh
+
+# -------------------------------------------------------------
+# List IP and reverse DNS
+# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
+# Project: Eglide
+# Created: 2017-01-10
+# License: Trivial work, not eligible to copyright
+# Source file: roles/shellserver/vhosts/files/vhosts
+# -------------------------------------------------------------
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+# </auto-generated>
+
if [ -f /etc/vhosts ]; then
cat /etc/vhosts
else
echo "No vhosts data file found. Please create /etc/vhosts file."
fi
diff --git a/roles/shellserver/web-hosting/files/eglide/nginx/includes/letsencrypt.conf b/roles/shellserver/web-hosting/files/eglide/nginx/includes/letsencrypt.conf
index 334f0d6..b33c88b 100644
--- a/roles/shellserver/web-hosting/files/eglide/nginx/includes/letsencrypt.conf
+++ b/roles/shellserver/web-hosting/files/eglide/nginx/includes/letsencrypt.conf
@@ -1,14 +1,22 @@
# -------------------------------------------------------------
# Configuration for Let's encrypt nginx
# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
# Author: Sébastien Santoro aka Dereckson
# Created: 2016-01-05
# Description: Get SSL certificates from Let's encrypt
+# Source file: roles/shellserver/web-hosting/files/eglide/nginx/includes/letsencrypt.conf
# -------------------------------------------------------------
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+# </auto-generated>
location /.well-known/acme-challenge {
allow all;
default_type text/plain;
root /var/letsencrypt-auto;
}
diff --git a/roles/shellserver/web-hosting/files/eglide/nginx/nginx.conf b/roles/shellserver/web-hosting/files/eglide/nginx/nginx.conf
index aaf464a..e9cf354 100644
--- a/roles/shellserver/web-hosting/files/eglide/nginx/nginx.conf
+++ b/roles/shellserver/web-hosting/files/eglide/nginx/nginx.conf
@@ -1,38 +1,46 @@
# -------------------------------------------------------------
# Eglide — nginx configuration
# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
# Project: Eglide
# Created: 2016-07-26
# License: Trivial work, not eligible to copyright
+# Source file: roles/shellserver/web-hosting/files/eglide/nginx/nginx.conf
# -------------------------------------------------------------
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+# </auto-generated>
# -------------------------------------------------------------
# Server configuration
# -------------------------------------------------------------
worker_processes 1;
events {
worker_connections 1024;
}
# -------------------------------------------------------------
# HTTP configuration
# -------------------------------------------------------------
http {
include mime.types;
default_type text/plain;
server_names_hash_bucket_size 128;
log_format main '$remote_addr - $remote_user [$time_local] "$request" '
'$status $body_bytes_sent "$http_referer" '
'"$http_user_agent" "$http_x_forwarded_for"';
sendfile on;
keepalive_timeout 65;
gzip on;
include vhosts/*.conf;
}
diff --git a/roles/shellserver/web-hosting/files/eglide/nginx/vhosts/000.conf b/roles/shellserver/web-hosting/files/eglide/nginx/vhosts/000.conf
index 6d3904b..acb718c 100644
--- a/roles/shellserver/web-hosting/files/eglide/nginx/vhosts/000.conf
+++ b/roles/shellserver/web-hosting/files/eglide/nginx/vhosts/000.conf
@@ -1,33 +1,41 @@
# -------------------------------------------------------------
# Eglide — nginx configuration
# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
# Project: Eglide
# Created: 2016-07-26
# License: Trivial work, not eligible to copyright
+# Source file: roles/shellserver/web-hosting/files/eglide/nginx/vhosts/000.conf
# -------------------------------------------------------------
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+# </auto-generated>
# -------------------------------------------------------------
# Default vhost as a catchall when Host: header value doesn't
# match any server name, ie the domain is unknown.
# -------------------------------------------------------------
server {
listen 80;
listen [2001:470:1f12:9e1::2]:80;
listen [2001:470:1f13:9e1:0:c0ff:ee:1]:80;
server_name _;
root /var/wwwroot/unknown_domains;
access_log /var/log/www/unknown_domains-access.log main;
error_log /var/log/www/unknown_domains-error.log;
error_page 404 @unknowndomains;
location / {
return 404;
}
location @unknowndomains {
rewrite ^(.*)$ /unknown.html break;
}
}
diff --git a/roles/shellserver/web-hosting/files/eglide/nginx/vhosts/001-eglide.org.conf b/roles/shellserver/web-hosting/files/eglide/nginx/vhosts/001-eglide.org.conf
index a8ae5f5..ccc5858 100644
--- a/roles/shellserver/web-hosting/files/eglide/nginx/vhosts/001-eglide.org.conf
+++ b/roles/shellserver/web-hosting/files/eglide/nginx/vhosts/001-eglide.org.conf
@@ -1,58 +1,66 @@
# -------------------------------------------------------------
# Eglide — nginx configuration
# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
# Project: Eglide
# Created: 2016-07-26
# License: Trivial work, not eligible to copyright
+# Source file: roles/shellserver/web-hosting/files/eglide/nginx/vhosts/001-eglide.org.conf
# -------------------------------------------------------------
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+# </auto-generated>
# -------------------------------------------------------------
# Main vhost receives special responsibilities like serving
# user directories.
# -------------------------------------------------------------
server {
listen 80;
listen [::]:80;
server_name localhost eglide eglide.org eglide.nasqueron.org www.eglide.org [2001:470:1f12:896::2] [2001:470:1f13:896:0:c0de:15:11fe];
root /var/www/html;
access_log /var/log/www/eglide.org/www-access.log main;
error_log /var/log/www/eglide.org/www-error.log;
###
### SSL
###
include includes/letsencrypt.conf;
# Once the first certificate has been generated, we'll enabl this snippet:
#
# SSL - include ssl_params;
# SSL - ssl_certificate /usr/local/etc/letsencrypt/live/eglide.org/fullchain.pem;
# SSL - ssl_certificate_key /usr/local/etc/letsencrypt/live/eglide.org/privkey.pem;
###
### Main site
###
location / {
index index.html index.htm default.html default.htm;
}
error_page 500 502 503 504 /50x.html;
###
### public_html user directories
###
set $userdir public_html;
location ~ ^/~(.+?)(/.*)?$ {
alias /home/$1/$userdir$2;
index index.html index.htm;
autoindex on;
}
}
diff --git a/roles/shellserver/web-hosting/files/eglide/wwwroot-unknown/unknown.html b/roles/shellserver/web-hosting/files/eglide/wwwroot-unknown/unknown.html
index b190434..4c4c195 100644
--- a/roles/shellserver/web-hosting/files/eglide/wwwroot-unknown/unknown.html
+++ b/roles/shellserver/web-hosting/files/eglide/wwwroot-unknown/unknown.html
@@ -1,17 +1,34 @@
<!doctype html>
+<!--
+ -------------------------------------------------------------
+ Nginx configuration
+ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
+ Project: Nasqueron
+ Created: 2016-11-08
+ License: Trivial work, not eligible to copyright
+ Source file: roles/shellserver/web-hosting/files/eglide/wwwroot-unknown/unknown.html
+ -------------------------------------------------------------
+
+ <auto-generated>
+ This file is managed by our rOPS SaltStack repository.
+
+ Changes to this file may cause incorrect behavior
+ and will be lost if the state is redeployed.
+ </auto-generated>
+-->
<html class="no-js" lang="en">
<head>
<meta charset="utf-8"/>
<meta http-equiv="x-ua-compatible" content="ie=edge">
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<title>Eglide</title>
</head>
<body>
<h1>Eglide :: Unknown domain</h1>
<h2>HTTP 404 Not Found</h2>
<p>Eglide allows users to create accounts to host tmux/screen + irssi/weechat or bots for IRC purpose.</p>
<p>It also offers a small HTML web presence.</p>
<p>The domain you seek redirects to one of our IPs, but it hasn't been declared in our webserver.</p>
<p>Contact the domain owner for assistance.</p>
</body>
</html>

File Metadata

Mime Type
text/x-diff
Expires
Thu, Sep 18, 14:19 (16 h, 48 m)
Storage Engine
blob
Storage Format
Raw Data
Storage Handle
2990964
Default Alt Text
(86 KB)

Event Timeline