Page Menu
Home
DevCentral
Search
Configure Global Search
Log In
Files
F11724367
No One
Temporary
Actions
View File
Edit File
Delete File
View Transforms
Subscribe
Mute Notifications
Award Token
Flag For Later
Size
86 KB
Referenced Files
None
Subscribers
None
View Options
diff --git a/roles/core/letsencrypt-renew/files/letsencrypt-renewal b/roles/core/letsencrypt-renew/files/letsencrypt-renewal
index 0e84b12..aa39e42 100755
--- a/roles/core/letsencrypt-renew/files/letsencrypt-renewal
+++ b/roles/core/letsencrypt-renew/files/letsencrypt-renewal
@@ -1,15 +1,31 @@
#!/bin/sh
+# -------------------------------------------------------------
+# Let's encrypt
+# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
+# Project: Nasqueron
+# Created: 2016-08-24
+# License: Trivial work, not eligible to copyright
+# Source file: roles/core/letsencrypt-renew/files/letsencrypt-renewal
+# -------------------------------------------------------------
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+# </auto-generated>
+
nginx_test() {
nginx_output="$(nginx -t 2>&1)"
nginx_returncode="$?"
if [ "$nginx_returncode" -eq 0 ] && [ -n "$(echo "${nginx_output}" | grep warn)" ]; then
return 2;
else
return "$nginx_returncode";
fi;
}
letsencrypt renew && nginx_test && service nginx restart
diff --git a/roles/core/letsencrypt-renew/files/letsencrypt.service b/roles/core/letsencrypt-renew/files/letsencrypt.service
index d93ef57..757bf4f 100644
--- a/roles/core/letsencrypt-renew/files/letsencrypt.service
+++ b/roles/core/letsencrypt-renew/files/letsencrypt.service
@@ -1,6 +1,22 @@
+# -------------------------------------------------------------
+# Let's encrypt
+# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
+# Project: Nasqueron
+# Created: 2016-08-24
+# License: Trivial work, not eligible to copyright
+# Source file: roles/core/letsencrypt-renew/files/letsencrypt.service
+# -------------------------------------------------------------
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+# </auto-generated>
+
[Unit]
Description=Renew Let's encrypt certificates.
[Service]
Type=simple
ExecStart=letsencrypt-renewal
diff --git a/roles/core/letsencrypt-renew/files/letsencrypt.timer b/roles/core/letsencrypt-renew/files/letsencrypt.timer
index d85d763..a98b662 100644
--- a/roles/core/letsencrypt-renew/files/letsencrypt.timer
+++ b/roles/core/letsencrypt-renew/files/letsencrypt.timer
@@ -1,7 +1,23 @@
+# -------------------------------------------------------------
+# Let's encrypt
+# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
+# Project: Nasqueron
+# Created: 2016-08-24
+# License: Trivial work, not eligible to copyright
+# Source file: roles/core/letsencrypt-renew/files/letsencrypt.timer
+# -------------------------------------------------------------
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+# </auto-generated>
+
[Unit]
Description=Runs letsencrypt-renewal every month
[Timer]
OnCalendar=*-*-26 12:15:00
Persistent=yes
Unit=letsencrypt.service
diff --git a/roles/core/motd/files/motd b/roles/core/motd/files/motd
index 49b7a26..378a5e5 100644
--- a/roles/core/motd/files/motd
+++ b/roles/core/motd/files/motd
@@ -1,6 +1,23 @@
#!/bin/sh
+
+# -------------------------------------------------------------
+# MOTD
+# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
+# Project: Nasqueron
+# Created: 2017-01-10
+# License: Trivial work, not eligible to copyright
+# Source file: roles/core/motd/files/motd
+# -------------------------------------------------------------
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+# </auto-generated>
+
if [ -f /etc/motd ]; then
cat /etc/motd
else
echo "No MOTD."
fi
diff --git a/roles/core/network/files/eglide_ipv6 b/roles/core/network/files/eglide_ipv6
index e98ab0c..63360a6 100644
--- a/roles/core/network/files/eglide_ipv6
+++ b/roles/core/network/files/eglide_ipv6
@@ -1,37 +1,45 @@
#!/bin/sh
# -------------------------------------------------------------
# IPv6 connectivity
# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
# Project: Eglide
# Created: 2016-06-15
# License: Trivial work, not eligible to copyright
+# Source file: roles/core/network/files/eglide_ipv6
# -------------------------------------------------------------
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+# </auto-generated>
IFCONFIG=/sbin/ifconfig
ROUTE=/sbin/route
# -------------------------------------------------------------
# Hurricane Electric tunnel
# nasqueron-3.tunnel.tserv10.par1.ipv6.he.net
# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
$IFCONFIG sit0 up
$IFCONFIG sit0 inet6 tunnel ::216.66.84.42
$IFCONFIG sit1 up
$IFCONFIG sit1 inet6 add 2001:470:1f12:896::2/64
$ROUTE -A inet6 add ::/0 dev sit1
# -------------------------------------------------------------
# Canonical IP
# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
$IFCONFIG sit1 inet6 add 2001:470:1f13:896::c0de:15:11fe/64
# -------------------------------------------------------------
# Additional IP addresses
# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
{% for n in range (1, 26) %}
$IFCONFIG sit1 inet6 add 2001:470:1f13:896::{{ '%x' | format(n) }}/64
{% endfor %}
diff --git a/roles/core/rc/files/rc.local b/roles/core/rc/files/rc.local
index 374f22a..06a4359 100644
--- a/roles/core/rc/files/rc.local
+++ b/roles/core/rc/files/rc.local
@@ -1,24 +1,32 @@
#!/bin/sh -e
# -------------------------------------------------------------
# rc.local
# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
# Project: Nasqueron
# Created: 2016-06-15
# License: Trivial work, not eligible to copyright
+# Source file: roles/core/rc/files/rc.local
# -------------------------------------------------------------
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+# </auto-generated>
# -------------------------------------------------------------
# IPv6
# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
/usr/sbin/ipv6-setup-tunnel
# -------------------------------------------------------------
# Return value
#
# Should be 0 on success, not 0 on failure. Current rc process
# requires this value to be set accordingly.
# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
exit 0
diff --git a/roles/core/rsyslog/files/default.conf b/roles/core/rsyslog/files/default.conf
index 528af29..ed664a6 100644
--- a/roles/core/rsyslog/files/default.conf
+++ b/roles/core/rsyslog/files/default.conf
@@ -1,68 +1,80 @@
-# Default rules for rsyslog.
-#
-# For more information see rsyslog.conf(5) and /etc/rsyslog.conf
+# -------------------------------------------------------------
+# Default rules for rsyslog
+# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
+# Project: Nasqueron
+# Created: 2016-09-11
+# License: Trivial work, not eligible to copyright
+# Source file: roles/core/rsyslog/files/default.conf
+# -------------------------------------------------------------
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+# </auto-generated>
#
# First some standard log files. Log by facility.
#
auth,authpriv.* /var/log/auth.log
*.*;auth,authpriv.none -/var/log/syslog
#cron.* /var/log/cron.log
#daemon.* -/var/log/daemon.log
kern.* -/var/log/kern.log
#lpr.* -/var/log/lpr.log
mail.* -/var/log/mail.log
#user.* -/var/log/user.log
#
# Logging for the mail system. Split it up so that
# it is easy to write scripts to parse these files.
#
#mail.info -/var/log/mail.info
#mail.warn -/var/log/mail.warn
mail.err /var/log/mail.err
#
# Logging for INN news system.
#
news.crit /var/log/news/news.crit
news.err /var/log/news/news.err
news.notice -/var/log/news/news.notice
#
# Some "catch-all" log files.
#
#*.=debug;\
# auth,authpriv.none;\
# news.none;mail.none -/var/log/debug
#*.=info;*.=notice;*.=warn;\
# auth,authpriv.none;\
# cron,daemon.none;\
# mail,news.none -/var/log/messages
#
# Emergencies are sent to everybody logged in.
#
*.emerg :omusrmsg:*
#
# I like to have messages displayed on the console, but only on a virtual
# console I usually leave idle.
#
#daemon,mail.*;\
# news.=crit;news.=err;news.=notice;\
# *.=debug;*.=info;\
# *.=notice;*.=warn /dev/tty8
# The named pipe /dev/xconsole is for the `xconsole' utility. To use it,
# you must invoke `xconsole' with the `-file' option:
#
# $ xconsole -file /dev/xconsole [...]
#
# NOTE: adjust the list below, or you'll go crazy if you have a reasonably
# busy site..
#
#daemon.*;mail.*;\
# news.err;\
# *.=debug;*.=info;\
# *.=notice;*.=warn |/dev/xconsole
diff --git a/roles/mailserver/certificates/files/update-smtp-certificates b/roles/mailserver/certificates/files/update-smtp-certificates
index a94aa20..fe38c91 100755
--- a/roles/mailserver/certificates/files/update-smtp-certificates
+++ b/roles/mailserver/certificates/files/update-smtp-certificates
@@ -1,23 +1,31 @@
#!/bin/sh
# -------------------------------------------------------------
# Deploy mail certificate to SMTP server
# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
# Project: Nasqueron
# Created: 2016-11-03
# License: Trivial work, not eligible to copyright
+# Source file: roles/mailserver/certificates/files/update-smtp-certificates
# -------------------------------------------------------------
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+# </auto-generated>
: ${CONTAINER_NAME='mailserver'}
: ${CERT_DIR='/data/letsencrypt/etc/live/mail.nasqueron.org-0001'}
: ${CONTAINER_DIR="/var/lib/lxc/$CONTAINER_NAME/rootfs"}
cp $CERT_DIR/fullchain.pem $CONTAINER_DIR/etc/ssl/certs/mailserver.crt
cp $CERT_DIR/privkey.pem $CONTAINER_DIR/etc/ssl/private/mailserver.key
# Mail servers can read the certificate as root before dropping privileges
chown 0:0 $CONTAINER_DIR/etc/ssl/private/mailserver.key
chmod 400 $CONTAINER_DIR/etc/ssl/private/mailserver.key
lxc-attach -n $CONTAINER_NAME -- service postfix restart
lxc-attach -n $CONTAINER_NAME -- service dovecot restart
diff --git a/roles/mailserver/dkim/files/bin/get-dkim-dns-entries b/roles/mailserver/dkim/files/bin/get-dkim-dns-entries
index d68de4a..078fb1e 100755
--- a/roles/mailserver/dkim/files/bin/get-dkim-dns-entries
+++ b/roles/mailserver/dkim/files/bin/get-dkim-dns-entries
@@ -1,22 +1,38 @@
#!/bin/sh
+# -------------------------------------------------------------
+# Nasqueron mail services
+# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
+# Project: Nasqueron
+# Created: 2017-01-14
+# License: Trivial work, not eligible to copyright
+# Source file: roles/mailserver/dkim/files/bin/get-dkim-dns-entries
+# -------------------------------------------------------------
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+# </auto-generated>
+
# Parses arguments
if [ $# -eq 0 ]
then
echo "Usage: `basename $0` <domain>"
exit 1
fi
DOMAIN=$1
DIR=/etc/opendkim/keys/$DOMAIN
if [ ! -d "$DIR" ]
then
echo "Directory not found: $DIR"
exit 2
fi
for f in $DIR/*.txt
do
get-dkim-dns-entry $f
done
diff --git a/roles/mailserver/dkim/files/bin/get-dkim-dns-entry.php b/roles/mailserver/dkim/files/bin/get-dkim-dns-entry.php
index bbac53d..fba39f7 100755
--- a/roles/mailserver/dkim/files/bin/get-dkim-dns-entry.php
+++ b/roles/mailserver/dkim/files/bin/get-dkim-dns-entry.php
@@ -1,57 +1,73 @@
#!/usr/bin/env php
<?php
+/* -------------------------------------------------------------
+ Nasqueron mail services
+ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
+ Project: Nasqueron
+ Created: 2017-01-14
+ License: Trivial work, not eligible to copyright
+ Source file: roles/mailserver/dkim/files/bin/get-dkim-dns-entry.php
+ -------------------------------------------------------------
+
+ <auto-generated>
+ This file is managed by our rOPS SaltStack repository.
+
+ Changes to this file may cause incorrect behavior
+ and will be lost if the state is redeployed.
+ </auto-generated>
+ */
///
/// Parse arguments
///
if ($argc < 2) {
fwrite(STDERR, "Usage: $argv[0] $file\n");
exit(1);
}
$file = $argv[1];
if (!file_exists($file)) {
fwrite(STDERR, "File not found: $file\n");
exit(2);
}
///
/// Reads file
///
function to_one_line ($string) {
return str_replace(["\r", "\n"], "", trim($string));
}
function to_one_line_from_bind ($string) {
$toReturn = "";
foreach (explode('"', $string) as $fragment) {
if (trim($fragment) !== "") {
$toReturn .= $fragment;
}
}
return $toReturn;
}
function get_dns_record ($content) {
$record = to_one_line($content);
if (!preg_match("/(.*)\._domainkey/", $record, $matches)) {
throw new Exception("Can't parse file.");
}
$subdomain = $matches[0];
if (!preg_match("/\s+IN\s+TXT\s+\((.*)\)/", $record, $matches)) {
throw new Exception("Can't parse file.");
}
$value = to_one_line_from_bind($matches[1]);
return "$subdomain TXT $value";
}
try {
echo get_dns_record(file_get_contents($file)), "\n";
} catch (Exception $ex) {
fwrite(STDERR, $ex->getMessage());
}
diff --git a/roles/mailserver/dkim/files/bin/get-dkim-key-table b/roles/mailserver/dkim/files/bin/get-dkim-key-table
index 5774725..e590549 100755
--- a/roles/mailserver/dkim/files/bin/get-dkim-key-table
+++ b/roles/mailserver/dkim/files/bin/get-dkim-key-table
@@ -1,11 +1,28 @@
#!/bin/sh
+
+# -------------------------------------------------------------
+# Nasqueron mail services
+# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
+# Project: Nasqueron
+# Created: 2017-01-14
+# License: Trivial work, not eligible to copyright
+# Source file: roles/mailserver/dkim/files/bin/get-dkim-key-table
+# -------------------------------------------------------------
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+# </auto-generated>
+
for d in /etc/opendkim/keys/*
do
DOMAIN=`basename $d`
for f in $d/*.private
do
SELECTOR=`basename $f .private`
echo "$SELECTOR._domainkey.$DOMAIN $DOMAIN:$SELECTOR:$f"
done
done
diff --git a/roles/mailserver/dkim/files/bin/get-dkim-signing-table b/roles/mailserver/dkim/files/bin/get-dkim-signing-table
index 3899f99..85be50e 100755
--- a/roles/mailserver/dkim/files/bin/get-dkim-signing-table
+++ b/roles/mailserver/dkim/files/bin/get-dkim-signing-table
@@ -1,11 +1,28 @@
#!/bin/sh
+
+# -------------------------------------------------------------
+# Nasqueron mail services
+# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
+# Project: Nasqueron
+# Created: 2017-01-14
+# License: Trivial work, not eligible to copyright
+# Source file: roles/mailserver/dkim/files/bin/get-dkim-signing-table
+# -------------------------------------------------------------
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+# </auto-generated>
+
for d in /etc/opendkim/keys/*
do
DOMAIN=`basename $d`
for f in $d/*.private
do
SELECTOR=`basename $f .private`
echo "$DOMAIN $SELECTOR._domainkey.$DOMAIN"
done
done
diff --git a/roles/mailserver/dkim/files/etc/Makefile b/roles/mailserver/dkim/files/etc/Makefile
index b455f14..027e3dc 100644
--- a/roles/mailserver/dkim/files/etc/Makefile
+++ b/roles/mailserver/dkim/files/etc/Makefile
@@ -1,12 +1,28 @@
+# -------------------------------------------------------------
+# Nasqueron mail services
+# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
+# Project: Nasqueron
+# Created: 2017-01-14
+# License: Trivial work, not eligible to copyright
+# Source file: roles/mailserver/dkim/files/etc/Makefile
+# -------------------------------------------------------------
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+# </auto-generated>
+
RM=rm -f
all: KeyTable SigningTable
clean:
${RM} KeyTable SigningTable
KeyTable:
get-dkim-key-table > KeyTable
SigningTable:
get-dkim-signing-table > SigningTable
diff --git a/roles/mailserver/systemd-unit/files/lxc-container-mailserver-start b/roles/mailserver/systemd-unit/files/lxc-container-mailserver-start
index 19a0146..b3f924c 100755
--- a/roles/mailserver/systemd-unit/files/lxc-container-mailserver-start
+++ b/roles/mailserver/systemd-unit/files/lxc-container-mailserver-start
@@ -1,31 +1,48 @@
#!/bin/sh
+
+# -------------------------------------------------------------
+# Nasqueron mail services
+# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
+# Project: Nasqueron
+# Created: 2015-12-16
+# License: Trivial work, not eligible to copyright
+# Source file: roles/mailserver/systemd-unit/files/lxc-container-mailserver-start
+# -------------------------------------------------------------
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+# </auto-generated>
+
#Let systemd launch a lxc mail container through /usr/lib/systemd/system/lxc-container-mailserver.service
#Start a lxc container, and create iptable rules
IPTABLES="/usr/sbin/iptables"
LXC_START="/usr/bin/lxc-start"
CONTAINER_NAME="mailserver"
HOST_INTERFACE="ens192"
DOCKER_INTERFACE="docker0"
HOST_IP="212.129.32.223"
CONTAINER_IP="10.0.3.8"
PORTS="25 110 143 465 587"
DOCKER_PORTS="25 143 465 587"
NGINX_PORT="21080"
$LXC_START -n $CONTAINER_NAME -d
#Web rules
for PORT in $PORTS
do
$IPTABLES -t nat -I PREROUTING -i $HOST_INTERFACE -p TCP -d $HOST_IP/32 --dport $PORT -j DNAT --to-destination $CONTAINER_IP:$PORT
done
#Need 80 port for main nginx
$IPTABLES -t nat -I PREROUTING -i $HOST_INTERFACE -p TCP -d $HOST_IP/32 --dport $NGINX_PORT -j DNAT --to-destination $CONTAINER_IP:80
#Docker rules
for PORT in $DOCKER_PORTS
do
$IPTABLES -t nat -I PREROUTING -i $DOCKER_INTERFACE -p TCP -d $HOST_IP/32 --dport $PORT -j DNAT --to-destination $CONTAINER_IP:$PORT
done
diff --git a/roles/mailserver/systemd-unit/files/lxc-container-mailserver-stop b/roles/mailserver/systemd-unit/files/lxc-container-mailserver-stop
index 8b3080f..eb5a291 100755
--- a/roles/mailserver/systemd-unit/files/lxc-container-mailserver-stop
+++ b/roles/mailserver/systemd-unit/files/lxc-container-mailserver-stop
@@ -1,32 +1,49 @@
#!/bin/sh
+
+# -------------------------------------------------------------
+# Nasqueron mail services
+# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
+# Project: Nasqueron
+# Created: 2015-12-16
+# License: Trivial work, not eligible to copyright
+# Source file: roles/mailserver/systemd-unit/files/lxc-container-mailserver-stop
+# -------------------------------------------------------------
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+# </auto-generated>
+
#Let systemd stop the lxc mail container through /usr/lib/systemd/system/lxc-container-mailserver.service
#Stop the lxc container, and create iptable rules
IPTABLES="/usr/sbin/iptables"
LXC_STOP="/usr/bin/lxc-stop"
CONTAINER_NAME="mailserver"
HOST_INTERFACE="ens192"
DOCKER_INTERFACE="docker0"
HOST_IP="212.129.32.223"
CONTAINER_IP="10.0.3.8"
PORTS="25 110 143 465 587"
DOCKER_PORTS="25 143 465 587"
NGINX_PORT="21080"
#Web rules
for PORT in $PORTS
do
$IPTABLES -t nat -D PREROUTING -i $HOST_INTERFACE -p TCP -d $HOST_IP/32 --dport $PORT -j DNAT --to-destination $CONTAINER_IP:$PORT
done
#Need 80 port for main nginx
$IPTABLES -t nat -D PREROUTING -i $HOST_INTERFACE -p TCP -d $HOST_IP/32 --dport $NGINX_PORT -j DNAT --to-destination $CONTAINER_IP:80
#Docker rules
for PORT in $DOCKER_PORTS
do
$IPTABLES -t nat -D PREROUTING -i $DOCKER_INTERFACE -p TCP -d $HOST_IP/32 --dport $PORT -j DNAT --to-destination $CONTAINER_IP:$PORT
done
$LXC_STOP -n $CONTAINER_NAME
diff --git a/roles/mailserver/systemd-unit/files/lxc-container-mailserver.service b/roles/mailserver/systemd-unit/files/lxc-container-mailserver.service
index a79d0c6..c579a33 100644
--- a/roles/mailserver/systemd-unit/files/lxc-container-mailserver.service
+++ b/roles/mailserver/systemd-unit/files/lxc-container-mailserver.service
@@ -1,11 +1,27 @@
+# -------------------------------------------------------------
+# Nasqueron mail services
+# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
+# Project: Nasqueron
+# Created: 2015-12-16
+# License: Trivial work, not eligible to copyright
+# Source file: roles/mailserver/systemd-unit/files/lxc-container-mailserver.service
+# -------------------------------------------------------------
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+# </auto-generated>
+
[Unit]
Description=LXC mail server container
[Service]
Type=simple
RemainAfterExit=yes
ExecStart=/usr/lib/systemd/system/lxc-container-mailserver-start
ExecStop=/usr/lib/systemd/system/lxc-container-mailserver-stop
[Install]
WantedBy=multi-user.target
diff --git a/roles/mumble/certificates/files/update-mumble-certificates b/roles/mumble/certificates/files/update-mumble-certificates
index 167482a..7e5a1f9 100755
--- a/roles/mumble/certificates/files/update-mumble-certificates
+++ b/roles/mumble/certificates/files/update-mumble-certificates
@@ -1,23 +1,31 @@
#!/bin/sh
# -------------------------------------------------------------
# Deploy Mumble certificate on Murmur
# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
# Project: Nasqueron
# Created: 2016-11-03
# License: Trivial work, not eligible to copyright
+# Source file: roles/mumble/certificates/files/update-mumble-certificates
# -------------------------------------------------------------
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+# </auto-generated>
: ${JAIL_HOSTNAME='mumble.nasqueron.org'}
: ${CERT_DIR="/usr/local/etc/letsencrypt/live/$JAIL_HOSTNAME"}
: ${JAIL_DIR="/usr/local/jails/$JAIL_HOSTNAME"}
: ${JAIL_ID=`jls | grep $JAIL_HOSTNAME | awk '{print $1}'`}
cp $CERT_DIR/fullchain.pem $JAIL_DIR/usr/local/etc/ssl/nasqueron.org/mumble.crt
cp $CERT_DIR/privkey.pem $JAIL_DIR/usr/local/etc/ssl/nasqueron.org/mumble.key
# murmur has uid 338
chown 338:0 $JAIL_DIR/usr/local/etc/ssl/nasqueron.org/mumble.key
chmod 400 $JAIL_DIR/usr/local/etc/ssl/nasqueron.org/mumble.key
jexec $JAIL_ID service murmur restart
diff --git a/roles/paas-docker/centos-cbs-repos/files/virt7-testing.repo b/roles/paas-docker/centos-cbs-repos/files/virt7-testing.repo
index f86b964..ab5a039 100644
--- a/roles/paas-docker/centos-cbs-repos/files/virt7-testing.repo
+++ b/roles/paas-docker/centos-cbs-repos/files/virt7-testing.repo
@@ -1,11 +1,27 @@
+# -------------------------------------------------------------
+# PaaS Docker
+# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
+# Project: Nasqueron
+# Created: 2016-02-17
+# License: Trivial work, not eligible to copyright
+# Source file: roles/paas-docker/centos-cbs-repos/files/virt7-testing.repo
+# -------------------------------------------------------------
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+# </auto-generated>
+
[virt7-common-testing]
name=virt7-common-testing
baseurl=http://cbs.centos.org/repos/virt7-common-testing/x86_64/os/
enabled=1
gpgcheck=0
[virt7-docker-common-testing]
name=virt7-docker-common-testing
baseurl=http://cbs.centos.org/repos/virt7-docker-common-testing/x86_64/os/
enabled=1
gpgcheck=0
diff --git a/roles/paas-docker/systemd-unit/files/docker-containers.service b/roles/paas-docker/systemd-unit/files/docker-containers.service
index ee96225..ab508ed 100644
--- a/roles/paas-docker/systemd-unit/files/docker-containers.service
+++ b/roles/paas-docker/systemd-unit/files/docker-containers.service
@@ -1,5 +1,21 @@
+# -------------------------------------------------------------
+# PaaS Docker
+# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
+# Project: Nasqueron
+# Created: 2015-12-29
+# License: Trivial work, not eligible to copyright
+# Source file: roles/paas-docker/systemd-unit/files/docker-containers.service
+# -------------------------------------------------------------
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+# </auto-generated>
+
[Service]
Type=simple
RemainAfterExit=yes
ExecStart=docker_start
ExecStop=docker_stop
diff --git a/roles/paas-docker/systemd-unit/files/docker_start b/roles/paas-docker/systemd-unit/files/docker_start
index 86fad99..ff93d4a 100644
--- a/roles/paas-docker/systemd-unit/files/docker_start
+++ b/roles/paas-docker/systemd-unit/files/docker_start
@@ -1,3 +1,19 @@
#!/bin/sh
-get-containers-list | xargs docker start
+# -------------------------------------------------------------
+# PaaS Docker
+# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
+# Project: Nasqueron
+# Created: 2015-12-29
+# License: Trivial work, not eligible to copyright
+# Source file: roles/paas-docker/systemd-unit/files/docker_start
+# -------------------------------------------------------------
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+# </auto-generated>
+
+get-containers-list | xargs docker start
diff --git a/roles/paas-docker/systemd-unit/files/docker_stop b/roles/paas-docker/systemd-unit/files/docker_stop
index 2f12f53..4e0cb6f 100644
--- a/roles/paas-docker/systemd-unit/files/docker_stop
+++ b/roles/paas-docker/systemd-unit/files/docker_stop
@@ -1,3 +1,20 @@
#!/bin/sh
+
+# -------------------------------------------------------------
+# PaaS Docker
+# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
+# Project: Nasqueron
+# Created: 2015-12-29
+# License: Trivial work, not eligible to copyright
+# Source file: roles/paas-docker/systemd-unit/files/docker_stop
+# -------------------------------------------------------------
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+# </auto-generated>
+
get-containers --reverse | xargs docker stop
diff --git a/roles/paas-docker/systemd-unit/files/get-containers-list b/roles/paas-docker/systemd-unit/files/get-containers-list
index 886c34b..f93da6d 100755
--- a/roles/paas-docker/systemd-unit/files/get-containers-list
+++ b/roles/paas-docker/systemd-unit/files/get-containers-list
@@ -1,38 +1,55 @@
#!/usr/bin/env bash
+
+# -------------------------------------------------------------
+# PaaS Docker
+# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
+# Project: Nasqueron
+# Created: 2017-01-30
+# License: Trivial work, not eligible to copyright
+# Source file: roles/paas-docker/systemd-unit/files/get-containers-list
+# -------------------------------------------------------------
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+# </auto-generated>
+
## Read /etc/containers.conf and recover docker’s names into an array.
## get-containers-list [--reverse]
file='/etc/containers.conf'
if [[ ! -f "$file" ]]; then
echo "$file : does not exists "
exit 1
elif [[ ! -r "$file" ]]; then
echo "$file : can not read "
fi
#Get names in an array
# 21:42 <geirha> since bash 4, you can use mapfile instead of that while read loop. mapfile -t array < "$file"
mapfile -t array < "$file"
#Test argument to know in wich order return names
if [[ $1 == "--reverse" ]]; then
for ((i="${#array[*]}"; i > 0; i--)) ; do
echo "${array[i]}"
done
elif [[ -z "$1" ]] ; then
for ((i=0; i < "${#array[*]}"; i++)) ; do
echo "${array[i]}"
done
else
echo "$1 is not a valid argument"
fi
diff --git a/roles/phabricator/arcanist/files/arc b/roles/phabricator/arcanist/files/arc
index 2eb931e..4e9b48b 100755
--- a/roles/phabricator/arcanist/files/arc
+++ b/roles/phabricator/arcanist/files/arc
@@ -1,65 +1,73 @@
#!/bin/sh
# -------------------------------------------------------------
# Phabricator — Arcanist Docker container wrapper
# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
# Author: Sébastien Santoro aka Dereckson
# Project: Nasqueron
# Created: 2016-01-01
# Description: Wrapper to run Arcanist as a Docker container
# License: Trivial work, not eligible to copyright
# Image: nasqueron/arcanist
+# Source file: roles/phabricator/arcanist/files/arc
# -------------------------------------------------------------
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+# </auto-generated>
# -------------------------------------------------------------
# Parse arguments
# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
if [ -t 0 ]; then
# If a stdin entry is available
# launch the container in the
# interactive mode
FLAGS=-it
fi
# Logs are default disabled
PRINT_LOG=0
if [ "$1" = "shell" ]; then
# Launch commands
# in the container bash shell
shift
COMMAND=bash
else
# Launch arc
mkdir -p ~/.arc
COMMAND=arc
if [ "$1" = "call-conduit" ]; then
# Enable log printing
PRINT_LOG=1
# Set a random name for the container
INSTANCE="arc-"`openssl rand -hex 21`
FLAGS="-i -a=stdin --name=$INSTANCE"
fi
fi
if [ -d ~/.arc/ssh ]; then
VOLUME_SSH="-v $HOME/.arc/ssh:/root/.ssh"
else
VOLUME_SSH=""
fi
# -------------------------------------------------------------
# Run container
# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
if [ $PRINT_LOG -eq 0 ]; then
docker run $FLAGS --rm -v ~/.arc:/opt/config -v $PWD:/opt/workspace $VOLUME_SSH nasqueron/arcanist $COMMAND $*
else
docker run $FLAGS -v ~/.arc:/opt/config -v $PWD:/opt/workspace $VOLUME_SSH nasqueron/arcanist $COMMAND $* > /dev/null
sleep 3
docker logs $INSTANCE
docker rm $INSTANCE >/dev/null
fi
diff --git a/roles/phabricator/containers/files/run-aphlict b/roles/phabricator/containers/files/run-aphlict
index ed33f42..dccc890 100755
--- a/roles/phabricator/containers/files/run-aphlict
+++ b/roles/phabricator/containers/files/run-aphlict
@@ -1,25 +1,33 @@
#!/bin/sh
# -------------------------------------------------------------
# Phabricator — Aphlict notifications server
# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
# Author: Sébastien Santoro aka Dereckson
# Project: Nasqueron
# Created: 2016-03-28
# Description: Node application to get real time notifications
# through websockets for Phabricator instances.
# License: Trivial work, not eligible to copyright
# Image: nasqueron/aphlict
+# Source file: roles/phabricator/containers/files/run-aphlict
# -------------------------------------------------------------
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+# </auto-generated>
# -------------------------------------------------------------
# Container parameters
# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
INSTANCE_NAME=aphlict
# -------------------------------------------------------------
# Container launch
# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
docker run -dt --name $INSTANCE_NAME -p 22280:22280 -p 22281:22281 nasqueron/aphlict
diff --git a/roles/phabricator/containers/files/run-devcentral b/roles/phabricator/containers/files/run-devcentral
index 1e74dd7..9d7950f 100755
--- a/roles/phabricator/containers/files/run-devcentral
+++ b/roles/phabricator/containers/files/run-devcentral
@@ -1,90 +1,98 @@
#!/bin/sh
# -------------------------------------------------------------
# Phabricator — Nasqueron instance
# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
# Author: Sébastien Santoro aka Dereckson
# Project: Nasqueron
# Created: 2015-04-22
# Description: Phabricator instance for Nasqueron
# License: Trivial work, not eligible to copyright
# Image: nasqueron/phabricator
+# Source file: roles/phabricator/containers/files/run-devcentral
# -------------------------------------------------------------
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+# </auto-generated>
# -------------------------------------------------------------
# Container parameters
# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
INSTANCE_NAME=devcentral
PORT=31080
DOMAIN=$INSTANCE_NAME.nasqueron.org
DATA_DIRECTORY=/data/$INSTANCE_NAME
MYSQL_INSTANCE=acquisitariat
# -------------------------------------------------------------
# Phabricator parameters
# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
PHABRICATOR_URL=http://$DOMAIN
PHABRICATOR_TITLE="Nasqueron DevCentral"
PHABRICATOR_ALT_FILE_DOMAIN="https://phabricator-files-for-devcentral-nasqueron.spacetechnology.net"
# -------------------------------------------------------------
# Deployment of our Phabricator code parameters
# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
REPO_LOGIN=git
REPO_HOST=bitbucket.org
PHABRICATOR_PROD_REPO="ssh://git@bitbucket.org/nasqueron/devcentral-phabricator"
PHABRICATOR_PROD_BRANCH=production
# -------------------------------------------------------------
# Ensure container isn't already running
# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
docker-container-status $INSTANCE_NAME > /dev/null
if [ "$?" -lt 2 ]; then
echo "Container is already running."
echo "To force relaunch, try docker stop $INSTANCE_NAME ; docker rm $INSTANCE_NAME ; $0"
exit 1
fi
# -------------------------------------------------------------
# Container launch
# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
docker run -t -d \
--link $MYSQL_INSTANCE:mysql \
-v $DATA_DIRECTORY/repo:/var/repo \
-v $DATA_DIRECTORY/conf:/opt/phabricator/conf \
-p $PORT:80 \
-e PHABRICATOR_URL=$PHABRICATOR_URL \
-e PHABRICATOR_TITLE="$PHABRICATOR_TITLE" \
-e PHABRICATOR_ALT_FILE_DOMAIN="$PHABRICATOR_ALT_FILE_DOMAIN" \
-e PHABRICATOR_PROD_REPO=$PHABRICATOR_PROD_REPO \
-e PHABRICATOR_PROD_BRANCH=$PHABRICATOR_PROD_BRANCH \
-e PHABRICATOR_USE_MAILGUN=1 \
-e PHABRICATOR_DOMAIN=$DOMAIN \
-e PHABRICATOR_BOT=xessife \
--name $INSTANCE_NAME nasqueron/phabricator
# -------------------------------------------------------------
# DevCentral specific branch deployment
#
# Deploys our version
# As we change static resources, restart php-fpm is a good idea:
# if someone asks the page while we were pulling our version,
# the old celerity map would be kept by APCu.
# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
docker exec $INSTANCE_NAME sh -c 'mkdir -p /root/.ssh && \
cp /opt/phabricator/conf/deploy-keys/* /root/.ssh'
docker exec $INSTANCE_NAME ssh -o StrictHostKeyChecking=no ${REPO_LOGIN}@${REPO_HOST}
docker exec $INSTANCE_NAME sh -c 'cd /opt/phabricator && \
git remote add private "$PHABRICATOR_PROD_REPO" && \
git fetch --all && \
git checkout $PHABRICATOR_PROD_BRANCH && \
sv restart php-fpm && sv restart phd'
echo "Deployment done at `date`."
exit 0
diff --git a/roles/phabricator/containers/files/run-wolfphab b/roles/phabricator/containers/files/run-wolfphab
index 24a6c92..87b64b8 100755
--- a/roles/phabricator/containers/files/run-wolfphab
+++ b/roles/phabricator/containers/files/run-wolfphab
@@ -1,73 +1,81 @@
#!/bin/sh
# -------------------------------------------------------------
# Phabricator — Wolfplex instance
# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
# Author: Sébastien Santoro aka Dereckson
# Project: Nasqueron
# Created: 2015-10-25
# Description: Phabricator instance for Nasqueron
# License: Trivial work, not eligible to copyright
# Image: nasqueron/phabricator
+# Source file: roles/phabricator/containers/files/run-wolfphab
# -------------------------------------------------------------
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+# </auto-generated>
# -------------------------------------------------------------
# Container parameters
# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
INSTANCE_NAME=wolfphab
PORT=35080
DOMAIN=phabricator.wolfplex.be
DATA_DIRECTORY=/data/$INSTANCE_NAME
MYSQL_INSTANCE=acquisitariat
MYSQL_NAMESPACE=wolfphab
# -------------------------------------------------------------
# Phabricator parameters
# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
PHABRICATOR_URL=https://$DOMAIN
PHABRICATOR_TITLE="Wolfplex Phabricator"
PHABRICATOR_ALT_FILE_DOMAIN="https://phabricator-files-for-wolfplex.nasqueron.org"
# -------------------------------------------------------------
# Ensure container isn't already running
# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
docker-container-status $INSTANCE_NAME > /dev/null
if [ "$?" -lt 2 ]; then
echo "Container is already running."
echo "To force relaunch, try docker stop $INSTANCE_NAME ; docker rm $INSTANCE_NAME ; $0"
exit 1
fi
# -------------------------------------------------------------
# Container launch
# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
docker run -t -d \
--link $MYSQL_INSTANCE:mysql \
-v $DATA_DIRECTORY/repo:/var/repo \
-v $DATA_DIRECTORY/conf:/opt/phabricator/conf \
-p $PORT:80 \
-e PHABRICATOR_URL=$PHABRICATOR_URL \
-e PHABRICATOR_TITLE="$PHABRICATOR_TITLE" \
-e PHABRICATOR_ALT_FILE_DOMAIN="$PHABRICATOR_ALT_FILE_DOMAIN" \
-e PHABRICATOR_STORAGE_NAMESPACE="$MYSQL_NAMESPACE" \
--name $INSTANCE_NAME nasqueron/phabricator
docker exec $INSTANCE_NAME sh -c 'cd /opt/phabricator && \
bin/config set mysql.host mysql && \
bin/config set mysql.pass $MYSQL_ENV_MYSQL_ROOT_PASSWORD && \
bin/config set storage.default-namespace $PHABRICATOR_STORAGE_NAMESPACE && \
bin/config set phabricator.base-uri $PHABRICATOR_URL && \
bin/config set security.alternate-file-domain "$PHABRICATOR_ALT_FILE_DOMAIN" && \
bin/config set mailgun.domain $DOMAIN && \
rm -f /etc/nginx/sites-enabled/default && \
chown -R app /var/repo'
# Fixes bug phd doesn't run at the very first container launch
docker exec $INSTANCE_NAME sv restart phd
echo "Deployment done at `date`."
exit 0
diff --git a/roles/saltmaster/sudo/files/salt b/roles/saltmaster/sudo/files/salt
index 136f84a..2157ace 100644
--- a/roles/saltmaster/sudo/files/salt
+++ b/roles/saltmaster/sudo/files/salt
@@ -1,4 +1,20 @@
+# -------------------------------------------------------------
+# SaltStack deployment
+# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
+# Project: Nasqueron
+# Created: 2016-04-10
+# License: Trivial work, not eligible to copyright
+# Source file: roles/saltmaster/sudo/files/salt
+# -------------------------------------------------------------
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+# </auto-generated>
+
Cmnd_Alias SALT = /usr/local/bin/salt, /usr/local/bin/salt-api, /usr/local/bin/salt-call, /usr/local/bin/salt-cloud, /usr/local/bin/salt-cp, /usr/local/bin/salt-key, /usr/local/bin/salt-master, /usr/local/bin/salt-minion, /usr/local/bin/salt-proxy, /usr/local/bin/salt-run, /usr/local/bin/salt-ssh, /usr/local/bin/salt-syndic, /usr/local/etc/rc.d/salt_master
%salt ALL=(salt) NOPASSWD: SALT
diff --git a/roles/shellserver/PHP7/files/php.ini b/roles/shellserver/PHP7/files/php.ini
index ea2145a..54fb530 100644
--- a/roles/shellserver/PHP7/files/php.ini
+++ b/roles/shellserver/PHP7/files/php.ini
@@ -1,15 +1,23 @@
# -------------------------------------------------------------
# PHP 7 configuration file
# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
# Author: Sébastien Santoro aka Dereckson
# Created: 2016-02-10
# Licence: Trivial work, not eligible to copyright
# Keywords: PHP 7, php.ini
+# Source file: roles/shellserver/PHP7/files/php.ini
# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+# </auto-generated>
# -------------------------------------------------------------
# Security
# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
# Allows CGI use through SuEXEC invoke
cgi.force_redirect = 0;
diff --git a/roles/shellserver/database/files/my.cnf b/roles/shellserver/database/files/my.cnf
index cf929d5..9a50a40 100644
--- a/roles/shellserver/database/files/my.cnf
+++ b/roles/shellserver/database/files/my.cnf
@@ -1,30 +1,42 @@
+# -------------------------------------------------------------
+# MySQL configuration
+# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
+# Project: Eglide
+# Created: 2017-01-23
+# License: Trivial work, not eligible to copyright
+# Source file: roles/shellserver/database/files/my.cnf
+# -------------------------------------------------------------
#
-# Eglide MySQL configuration
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+# </auto-generated>
[client]
port = 3306
socket = /var/run/mysqld/mysqld.sock
[mysqld_safe]
pid-file = /var/run/mysqld/mysqld.pid
socket = /var/run/mysqld/mysqld.sock
nice = 0
[mysqld]
user = mysql
pid-file = /var/run/mysqld/mysqld.pid
socket = /var/run/mysqld/mysqld.sock
port = 3306
basedir = /usr
datadir = /var/lib/mysql
tmpdir = /tmp
lc-messages-dir = /usr/share/mysql
explicit_defaults_for_timestamp
sql_mode =STRICT_ALL_TABLES
ft_stopword_file=/opt/stopwords.txt
ft_min_word_len =3
ft_boolean_syntax=' |-><()~*:""&^'
max_connections = 50
diff --git a/roles/shellserver/odderon/files/build.sh b/roles/shellserver/odderon/files/build.sh
index d975643..9d36d9d 100644
--- a/roles/shellserver/odderon/files/build.sh
+++ b/roles/shellserver/odderon/files/build.sh
@@ -1,16 +1,24 @@
# -------------------------------------------------------------
# Salt — Deploy Odderon (darkbot)
# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
# Project: Nasqueron
# Created: 2017-01-25
# Authors: David Seikel, Dereckson
# License: Trivial work, not eligible to copyright
+# Source file: roles/shellserver/odderon/files/build.sh
# -------------------------------------------------------------
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+# </auto-generated>
PREFIX=/opt/odderon
test ! -r build/configure && sh bootstrap.sh
cd build
sh configure -C --prefix=$PREFIX "$@"
make
diff --git a/roles/shellserver/odderon/files/odderon.service b/roles/shellserver/odderon/files/odderon.service
index 5e9eba9..41ade84 100644
--- a/roles/shellserver/odderon/files/odderon.service
+++ b/roles/shellserver/odderon/files/odderon.service
@@ -1,14 +1,29 @@
+# -------------------------------------------------------------
+# Odderon
+# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
+# Project: Nasqueron
+# Created: 2017-01-26
+# License: Trivial work, not eligible to copyright
+# Source file: roles/shellserver/odderon/files/odderon.service
+# -------------------------------------------------------------
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+# </auto-generated>
[Unit]
Description=Odderon darkbot
[Service]
User=odderon
Type=Simple
WorkingDirectory=/opt/odderon
ExecStart=/opt/odderon/bin/darkbot
ExecReload= kill -HUP `cat /opt/odderon/darkbot.pid`
PIDFile=/opt/odderon/darkbot.pid
[Install]
WantedBy=multi-user.target
diff --git a/roles/shellserver/odderon/files/odderon.sudoers b/roles/shellserver/odderon/files/odderon.sudoers
index 4498d71..40f0da5 100644
--- a/roles/shellserver/odderon/files/odderon.sudoers
+++ b/roles/shellserver/odderon/files/odderon.sudoers
@@ -1,6 +1,22 @@
+# -------------------------------------------------------------
+# Odderon
+# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
+# Project: Nasqueron
+# Created: 2017-01-24
+# License: Trivial work, not eligible to copyright
+# Source file: roles/shellserver/odderon/files/odderon.sudoers
+# -------------------------------------------------------------
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+# </auto-generated>
+
%nasqueron-irc ALL=(odderon) NOPASSWD: ALL
# Service management
{% for command in ["start", "stop", "restart", "reload"] %}
%nasqueron-irc ALL= NOPASSWD: /bin/systemctl {{ command }} odderon
{% endfor %}
diff --git a/roles/shellserver/user-session/files/csh.logout b/roles/shellserver/user-session/files/csh.logout
index d134a42..70ce27f 100644
--- a/roles/shellserver/user-session/files/csh.logout
+++ b/roles/shellserver/user-session/files/csh.logout
@@ -1,13 +1,21 @@
# -------------------------------------------------------------
# System-wide .logout file for csh(1)
# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
# Author: Sébastien Santoro aka Dereckson
# Created: 2015-12-30
# Licence: Trivial work, not eligible to copyright
+# Source file: roles/shellserver/user-session/files/csh.logout
# -------------------------------------------------------------
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+# </auto-generated>
# -------------------------------------------------------------
# Cleans up whom-diff files
# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
whom-diff --clean
diff --git a/roles/shellserver/user-session/files/whom b/roles/shellserver/user-session/files/whom
index 7a08853..9a8ce1a 100755
--- a/roles/shellserver/user-session/files/whom
+++ b/roles/shellserver/user-session/files/whom
@@ -1,12 +1,20 @@
#!/bin/sh
# -------------------------------------------------------------
# Clean alternative to who
# Prints the usernames of connected users by alphabetical order
# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
# Author: Sébastien Santoro aka Dereckson
# Created: 2015-12-30
# Licence: Trivial work, not eligible to copyright
+# Source file: roles/shellserver/user-session/files/whom
# -------------------------------------------------------------
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+# </auto-generated>
who | awk '{print $1}' | sort | uniq
diff --git a/roles/shellserver/user-session/files/whom-diff b/roles/shellserver/user-session/files/whom-diff
index c59a2fe..93e34f7 100755
--- a/roles/shellserver/user-session/files/whom-diff
+++ b/roles/shellserver/user-session/files/whom-diff
@@ -1,69 +1,77 @@
#!/bin/sh
# -------------------------------------------------------------
# whom-diff
#
# Computes the diff between two `whom` invoke.
# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
# Author: Sébastien Santoro aka Dereckson
# Created: 2015-12-30
# Licence: BSD-2-Clause
+# Source file: roles/shellserver/user-session/files/whom-diff
# -------------------------------------------------------------
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+# </auto-generated>
# -------------------------------------------------------------
# Determines session identifier and directory
# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
if [ "$SESSION_ID" = "" ]; then
SESSION_ID=`who am I | md5 | cut -c1-8`
fi
DIR=/var/tmp/whom/$USER/$SESSION_ID
# -------------------------------------------------------------
# -s / --session
# Prints the session identifier
# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
if [ "$1" = "--session" ] || [ "$1" = "-s" ]; then
echo $SESSION_ID
exit 0
fi
# -------------------------------------------------------------
# Default mode
# Prints the diff between current `whom` and previous output
# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
if [ $# -eq 0 ]; then
# Creates working directory if needed
if [ ! -d $DIR ]; then
mkdir -p $DIR
touch $DIR/old
fi
# Let's diff
cd $DIR
whom > current
diff old current | tail -n +2
mv current old
exit 0
fi
# -------------------------------------------------------------
# -c / --clean
# Cleans directory
# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
if [ "$1" = "--clean" ] || [ "$1" = "-c" ]; then
rm -rf $DIR
exit $?
fi
# -------------------------------------------------------------
# Usage
# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
>&2 echo "Usage: $0 [--setup|--clean|-s|-c]"
exit 1
diff --git a/roles/shellserver/userland-software/files/install-eggdrop b/roles/shellserver/userland-software/files/install-eggdrop
index a35ddd1..48fd017 100644
--- a/roles/shellserver/userland-software/files/install-eggdrop
+++ b/roles/shellserver/userland-software/files/install-eggdrop
@@ -1,50 +1,58 @@
#!/bin/sh
# -------------------------------------------------------------
# Install an eggdrop
# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
# Project: Eglide
# Created: 2016-11-06
# License: Trivial work, not eligible to copyright
+# Source file: roles/shellserver/userland-software/files/install-eggdrop
# -------------------------------------------------------------
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+# </auto-generated>
# -------------------------------------------------------------
# TCL and eggdrop versions
# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
EGGDROP_VERSION_MAJOR=1.6
EGGDROP_VERSION=1.6.21
TCL_VERSION=8.6
# -------------------------------------------------------------
# Fetch, extract
# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
wget ftp://ftp.eggheads.org/pub/eggdrop/source/${EGGDROP_VERSION_MAJOR}/eggdrop${EGGDROP_VERSION}.tar.gz
tar xzf eggdrop${EGGDROP_VERSION}.tar.gz
cd eggdrop${EGGDROP_VERSION}
# -------------------------------------------------------------
# Configure step
#
# This is the tricky part, as we need to provide path to TCL
# header and library files, heavily OS/distro/arch dependant.
# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
if [ -f /etc/debian_version ]; then
ARCH=`dpkg-architecture -qDEB_HOST_MULTIARCH`
CFLAGS="-std=gnu89" ./configure --with-tclinc=/usr/include/tcl${TCL_VERSION}/tcl.h --with-tcllib=/usr/lib/$ARCH/libtcl${TCL_VERSION}.so
elif [ `uname` = "FreeBSD" ]; then
TCL_VERSION_LIB=`echo $TCL_VERSION | tr -d .`
./configure --with-tclinc=/usr/local/include/tcl${TCL_VERSION}/tcl.h -with-tcllib=/usr/local/lib/libtcl${TCL_VERSION_LIB}.so
else
./configure
fi
# -------------------------------------------------------------
# Build, install
# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
make config
make
make install
diff --git a/roles/shellserver/users/files/ssh_keys/amj b/roles/shellserver/users/files/ssh_keys/amj
index 19afd27..cb3a371 100644
--- a/roles/shellserver/users/files/ssh_keys/amj
+++ b/roles/shellserver/users/files/ssh_keys/amj
@@ -1,4 +1,25 @@
+# -------------------------------------------------------------
+# OpenSSH authorized_keys
+# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
+# Project: Eglide
+# License: Trivial work, not eligible to copyright
+# Source file: roles/shellserver/users/files/ssh_keys/amj
+# -------------------------------------------------------------
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+#
+# To add a new key or revoke a key, submit a Git commit:
+# https://agora.nasqueron.org/How_to_contribute_code
+#
+# You can also ask Nasqueron operations to do that for you:
+# https://devcentral.nasqueron.org/maniphest/task/edit/form/3/
+# </auto-generated>
+
ssh-rsa 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 am@gentam
ssh-rsa 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 am@debian-am
ssh-rsa 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 amj@dwabyam
ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAACAQDCCKtSulhB9uva1RYOtwcLMcO+1V5oGti50OXntqG0OZfEauz/oLTQpt+nkKYNUN6MazL+9ienYQ8ZZPgZbOs9WGh0acxBcPM5Dw5b0ZWEJ8h9Dk2M7P144aeRS/HuHVvc/JyI3+gYHgqWGe5ycEzlrFeegX7/Zr76eaFDQPGMnsJCFZVga24TiSPiEBTuyszq0/emsLJe41zFY4J6Y2kbaWuJYbiAvA0mZAD+g6+ltEa6vdUOF1BI2kTPFeKXc2dCnbaJAz00I437zUGdaU4533iyLHygxLPjAsjxO8q4f163VR7Rd2jibvRUW2EXgVoY1mJjkNwi2XLQCCwgG/6G8IuQaMjPAx0v7bf+vAJ3x+esJtVFNa55sgU7uHWPaRAwtovspCFBpTRIsp6J5f+1WLqWQVBVBZHdR+5PC2H5Zwb5Hq33Jn8ksQoPMCWcbIbjgF78a/B4LgtsJpA2x8cGJi6p1DEKT5bC6ROGMxqPwA8pFgI3+0X5ukZvTMDH7BjiXkbdyCaFfwo7UofRrPHIUyPAYh/XD7rUddc/6rjVBzmkXTeyYvevOOlmTxM5BDJZI/w6Gc2/XQchCDoWT9ttw7VWX19fHaHtx8KE/I8JaSS5hW77Kl3PzWJxewOAcJMh9HNza3jBgqZFTHktPCPUBZbsjD27YWJcYPrhzpQErQ== amj@thinbiam
diff --git a/roles/shellserver/users/files/ssh_keys/chan b/roles/shellserver/users/files/ssh_keys/chan
index 21cf12c..07f3bc4 100644
--- a/roles/shellserver/users/files/ssh_keys/chan
+++ b/roles/shellserver/users/files/ssh_keys/chan
@@ -1 +1,22 @@
+# -------------------------------------------------------------
+# OpenSSH authorized_keys
+# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
+# Project: Eglide
+# License: Trivial work, not eligible to copyright
+# Source file: roles/shellserver/users/files/ssh_keys/chan
+# -------------------------------------------------------------
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+#
+# To add a new key or revoke a key, submit a Git commit:
+# https://agora.nasqueron.org/How_to_contribute_code
+#
+# You can also ask Nasqueron operations to do that for you:
+# https://devcentral.nasqueron.org/maniphest/task/edit/form/3/
+# </auto-generated>
+
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIHvDcmKHfTrCBRpjJxYyIELMRknrMpDXfcKDhfXqmB09 chan@Calculon
diff --git a/roles/shellserver/users/files/ssh_keys/dereckson b/roles/shellserver/users/files/ssh_keys/dereckson
index 030f173..5fbcd10 100644
--- a/roles/shellserver/users/files/ssh_keys/dereckson
+++ b/roles/shellserver/users/files/ssh_keys/dereckson
@@ -1,4 +1,25 @@
+# -------------------------------------------------------------
+# OpenSSH authorized_keys
+# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
+# Project: Eglide
+# License: Trivial work, not eligible to copyright
+# Source file: roles/shellserver/users/files/ssh_keys/dereckson
+# -------------------------------------------------------------
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+#
+# To add a new key or revoke a key, submit a Git commit:
+# https://agora.nasqueron.org/How_to_contribute_code
+#
+# You can also ask Nasqueron operations to do that for you:
+# https://devcentral.nasqueron.org/maniphest/task/edit/form/3/
+# </auto-generated>
+
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIMKBin4bpJpIkWVVjmYbivtNmWo3KgBLmx0/KXaw8QUl dereckson@ysul.nasqueron.org
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIL5FbV1PjQmAX2fpgBKg8FnnInnVVSd9NH4PPUFlhaVO dereckson@xyrogh
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIIURiX8gBIv91sxutRQeESip7Ympmqe6miepoNDvXpZ9 dereckson@orin.dereckson.drake
diff --git a/roles/shellserver/users/files/ssh_keys/erol b/roles/shellserver/users/files/ssh_keys/erol
index 763adc2..7f41a46 100644
--- a/roles/shellserver/users/files/ssh_keys/erol
+++ b/roles/shellserver/users/files/ssh_keys/erol
@@ -1 +1,22 @@
+# -------------------------------------------------------------
+# OpenSSH authorized_keys
+# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
+# Project: Eglide
+# License: Trivial work, not eligible to copyright
+# Source file: roles/shellserver/users/files/ssh_keys/erol
+# -------------------------------------------------------------
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+#
+# To add a new key or revoke a key, submit a Git commit:
+# https://agora.nasqueron.org/How_to_contribute_code
+#
+# You can also ask Nasqueron operations to do that for you:
+# https://devcentral.nasqueron.org/maniphest/task/edit/form/3/
+# </auto-generated>
+
ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDdHrSRJGwaGFTpoZIvkoWTMpnXgke77emVicMT8b37kcUepeD91pA3UPQ7UOEQl/Af3Ly7ePneymZ6NjAkM06oPeIjxE6Nz+i6p7rVIZhCb9qz+hdKgt4wSEQLWponegFNdCUs6HvMjDGlsI0kajHgIakXiKAwNyxhQzpBoGranO9c2PdAq2HGq7Kcq8ApC1kdKG0W3dT4PWborzmt1jWna2yosEn+TTHj5wi2p/E9BsCbmfokBO3xn491lr1P4shh4zg7Mv3SPD3j4/mZb9EMwD8cl4y9ZIoMEbL8p4s8J7Joqs3gK9hmMN5ZCNUFrNrJu3TCRZre2k7cV3+U3IXT erol@fedai
diff --git a/roles/shellserver/users/files/ssh_keys/kazuya b/roles/shellserver/users/files/ssh_keys/kazuya
index 0d9afba..23b346c 100644
--- a/roles/shellserver/users/files/ssh_keys/kazuya
+++ b/roles/shellserver/users/files/ssh_keys/kazuya
@@ -1 +1,22 @@
+# -------------------------------------------------------------
+# OpenSSH authorized_keys
+# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
+# Project: Eglide
+# License: Trivial work, not eligible to copyright
+# Source file: roles/shellserver/users/files/ssh_keys/kazuya
+# -------------------------------------------------------------
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+#
+# To add a new key or revoke a key, submit a Git commit:
+# https://agora.nasqueron.org/How_to_contribute_code
+#
+# You can also ask Nasqueron operations to do that for you:
+# https://devcentral.nasqueron.org/maniphest/task/edit/form/3/
+# </auto-generated>
+
ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCtCcRQ6HVKD5mj602UJkpI/TMGVt1R0yYx1HxP6SWJb6FM2E4wzkxtf0sp2cxW/9Lz/0OsQV8fSSo/qfUhQXfRcL+rxsM+iixD0WMffMC8CrqsYS+VV32HR2sIm8J7yyMweJrfYneErdFisGmMgOFw8vBGX01XfdwGqbSflf3Tal7L3R0g65rclGsg7JckWE6RQMXnvGwXQxv4QahaNtZK74AlyeFgsXYlv14UeaGE4Pz+rkgZKoC4tvAOBQMNxWtCPMcydJOacoCZO7Jcxv0jMUo0y26mulQ6vbz5hqAPS612c47gh8VNDDkQaznQMeiSyIlnvDEkHmzvC8Z3UAeJ eglide
diff --git a/roles/shellserver/users/files/ssh_keys/kumkum b/roles/shellserver/users/files/ssh_keys/kumkum
index 75d7c6d..8d8b552 100644
--- a/roles/shellserver/users/files/ssh_keys/kumkum
+++ b/roles/shellserver/users/files/ssh_keys/kumkum
@@ -1 +1,22 @@
+# -------------------------------------------------------------
+# OpenSSH authorized_keys
+# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
+# Project: Eglide
+# License: Trivial work, not eligible to copyright
+# Source file: roles/shellserver/users/files/ssh_keys/kumkum
+# -------------------------------------------------------------
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+#
+# To add a new key or revoke a key, submit a Git commit:
+# https://agora.nasqueron.org/How_to_contribute_code
+#
+# You can also ask Nasqueron operations to do that for you:
+# https://devcentral.nasqueron.org/maniphest/task/edit/form/3/
+# </auto-generated>
+
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIL4vFNpxnqorIN6UoJDzkh3Ya69JDEOY9f7N5y2U6xYK kumkum@kumkum-E200HA
diff --git a/roles/shellserver/users/files/ssh_keys/rashk0 b/roles/shellserver/users/files/ssh_keys/rashk0
index 7b16455..611a1d1 100644
--- a/roles/shellserver/users/files/ssh_keys/rashk0
+++ b/roles/shellserver/users/files/ssh_keys/rashk0
@@ -1 +1,22 @@
+# -------------------------------------------------------------
+# OpenSSH authorized_keys
+# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
+# Project: Eglide
+# License: Trivial work, not eligible to copyright
+# Source file: roles/shellserver/users/files/ssh_keys/rashk0
+# -------------------------------------------------------------
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+#
+# To add a new key or revoke a key, submit a Git commit:
+# https://agora.nasqueron.org/How_to_contribute_code
+#
+# You can also ask Nasqueron operations to do that for you:
+# https://devcentral.nasqueron.org/maniphest/task/edit/form/3/
+# </auto-generated>
+
ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDJJKU6dVl19vQFPMUWS2iGRzBV1uD9YEaMijBkY2oPYjwhFXc1fouGGr17kkSK9D0c4pr9A6jk/gH9GWE5SpwaZY94VK5QfdvHpyA1hLevdUc4mwuIbsMp893kr0e9Miys1/v+UdFhUq0n3rWiER3oo9rJjx3qloBqSfD18y3sCFTyM1AheVMp7E71kgViG7wWtHrkmnrBo3V5ENc2snTCQy7lF7eQ5a6D45a5n2KYV94YrMvGDbfYUnw8IJHNN6XB1KBK6mksbm2p6fc3ow0UJDOK3bfJNUkp9tfRJV/EeYxGPYJRE60Ng2Dqc3zZaH7FDgbBLoK0UwGURQozNSQT campari@Beta
diff --git a/roles/shellserver/users/files/ssh_keys/ringa b/roles/shellserver/users/files/ssh_keys/ringa
index 03a657c..0c1565b 100644
--- a/roles/shellserver/users/files/ssh_keys/ringa
+++ b/roles/shellserver/users/files/ssh_keys/ringa
@@ -1 +1,22 @@
+# -------------------------------------------------------------
+# OpenSSH authorized_keys
+# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
+# Project: Eglide
+# License: Trivial work, not eligible to copyright
+# Source file: roles/shellserver/users/files/ssh_keys/ringa
+# -------------------------------------------------------------
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+#
+# To add a new key or revoke a key, submit a Git commit:
+# https://agora.nasqueron.org/How_to_contribute_code
+#
+# You can also ask Nasqueron operations to do that for you:
+# https://devcentral.nasqueron.org/maniphest/task/edit/form/3/
+# </auto-generated>
+
ssh-rsa AAAAB3NzaC1yc2EAAAABJQAAAQEAiTobf2i/IveVlpdntX9M6p9rOe60HuODq5FslTIFxA/RwKQbJKafCQZ3ci+Pt9BKAKtBGSJANNfbxxN7VRB+iO6UZUh2Qjb012CfigC5g1r9MEryqh8LBP27NqTkCqjMZrwUa6pYMBG1/ydbOA0BIr3C72QfpXC/qCSvXNgQzL7DGSR7cgjhGvMDn5ewJuxsvXAcajMLEORxeYooONG9ELGRUMFI4WcX6gmiYcrMVsMF+7ByshIngV5v9esWadi+RdTWUVOYt2yVS7hkYHZwUX/bN1AOfkRiuD1w3DFFiHhSoquCwaOOZjKxAw6VOrV6O/toLGe0kXXfRFzeB29/1w== rsa-key-20170111
diff --git a/roles/shellserver/users/files/ssh_keys/rix b/roles/shellserver/users/files/ssh_keys/rix
index 3e73f78..ffc9c54 100644
--- a/roles/shellserver/users/files/ssh_keys/rix
+++ b/roles/shellserver/users/files/ssh_keys/rix
@@ -1 +1,22 @@
+# -------------------------------------------------------------
+# OpenSSH authorized_keys
+# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
+# Project: Eglide
+# License: Trivial work, not eligible to copyright
+# Source file: roles/shellserver/users/files/ssh_keys/rix
+# -------------------------------------------------------------
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+#
+# To add a new key or revoke a key, submit a Git commit:
+# https://agora.nasqueron.org/How_to_contribute_code
+#
+# You can also ask Nasqueron operations to do that for you:
+# https://devcentral.nasqueron.org/maniphest/task/edit/form/3/
+# </auto-generated>
+
ssh-rsa AAAAB3NzaC1yc2EAAAABJQAAAQEAjFnOi4rwBVdw69U9y1xgWXrfNNgxEXAmbXthzHae07COwN190xoWv8VeogKxfMdxE2Tj4E0BDFt2i7Jbk9BploFdNXG46lrnoszmgRsuRx5jERfvMyOPvCAQHbL0N53AL6zH9wXF/51a5bJJ3n4wkmO1nDj9WqrDNk0in+knICiPHQX4TxwRXqBuf61gQMxwy8Aoy1WCCfCeAesZxjdFM47C6X3PPHVaXvF6x6iX8OzIHqoVT18yQAQxbET+PWMtlmNFJFx76+Sov4eQm/d2KeRg0aqw49gKLpigYnHfd2uitmSQixBNl5jyvDMoR92vZmZnScmqA9cXQikQ9HCW6Q== rsa-key-20170110
diff --git a/roles/shellserver/users/files/ssh_keys/sandlayth b/roles/shellserver/users/files/ssh_keys/sandlayth
index 3b5e028..f617e8f 100644
--- a/roles/shellserver/users/files/ssh_keys/sandlayth
+++ b/roles/shellserver/users/files/ssh_keys/sandlayth
@@ -1 +1,22 @@
+# -------------------------------------------------------------
+# OpenSSH authorized_keys
+# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
+# Project: Eglide
+# License: Trivial work, not eligible to copyright
+# Source file: roles/shellserver/users/files/ssh_keys/sandlayth
+# -------------------------------------------------------------
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+#
+# To add a new key or revoke a key, submit a Git commit:
+# https://agora.nasqueron.org/How_to_contribute_code
+#
+# You can also ask Nasqueron operations to do that for you:
+# https://devcentral.nasqueron.org/maniphest/task/edit/form/3/
+# </auto-generated>
+
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIL4H4SF3NZ0/o5uTYhIUKUEzP7hlZ0mGqMxs6wt/dhQs kalix@arch-laptop
diff --git a/roles/shellserver/users/files/ssh_keys/shark b/roles/shellserver/users/files/ssh_keys/shark
index b002f51..c24dc77 100644
--- a/roles/shellserver/users/files/ssh_keys/shark
+++ b/roles/shellserver/users/files/ssh_keys/shark
@@ -1 +1,22 @@
+# -------------------------------------------------------------
+# OpenSSH authorized_keys
+# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
+# Project: Eglide
+# License: Trivial work, not eligible to copyright
+# Source file: roles/shellserver/users/files/ssh_keys/shark
+# -------------------------------------------------------------
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+#
+# To add a new key or revoke a key, submit a Git commit:
+# https://agora.nasqueron.org/How_to_contribute_code
+#
+# You can also ask Nasqueron operations to do that for you:
+# https://devcentral.nasqueron.org/maniphest/task/edit/form/3/
+# </auto-generated>
+
ssh-rsa AAAAB3NzaC1yc2EAAAABJQAAAQEAjKehL1PdhcpLNiGdWLuVCUpNawUhQoxon3nmhZm/B+oU2nwygqvx9YU3LFzTEDNXWtU0aH2UVgC5bkRyVdmVKjX878luoluYwhKJFrYoEd9zS+EPDNmNYSoKntDbZoB17iacVEUM4Kg3RAzwStw3L8OO9DlB9NdXUzS8/9wlSy43ddoRRy83FvnvhRNXWScUIQyBolxqyoVvXdLZ2t0PnCdU3Bz2Wkcg24XjwDOR0R0A3780b+VGcsjXtjYxK6xCpNo9l2DqLAfpw+BFusWy6au5U15vfHgR91Lbcd1xtfvJAElI97fR6DGf+HSrtYZe+9gMU1nofibdiNWSJ/Vn+Q== rsa-key-20161212
diff --git a/roles/shellserver/users/files/ssh_keys/tomjerr b/roles/shellserver/users/files/ssh_keys/tomjerr
index 8d1f5be..304ce41 100644
--- a/roles/shellserver/users/files/ssh_keys/tomjerr
+++ b/roles/shellserver/users/files/ssh_keys/tomjerr
@@ -1 +1,22 @@
+# -------------------------------------------------------------
+# OpenSSH authorized_keys
+# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
+# Project: Eglide
+# License: Trivial work, not eligible to copyright
+# Source file: roles/shellserver/users/files/ssh_keys/tomjerr
+# -------------------------------------------------------------
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+#
+# To add a new key or revoke a key, submit a Git commit:
+# https://agora.nasqueron.org/How_to_contribute_code
+#
+# You can also ask Nasqueron operations to do that for you:
+# https://devcentral.nasqueron.org/maniphest/task/edit/form/3/
+# </auto-generated>
+
ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDlBO0oLUHYkMBIRregybPFAa0z2C7o2OsIugNZO628Z28hrtxNl+sxTues5TqEV0GEfSWxDf6Ce+d0wWIi7BunL+8pjc59hPbNczCNpgFCXtzgoJptMJ/ikQL0C1xA4dv1KiwYWAYWh45+R/KwW/ab2cfpXGA8G5l1/4ILK73lzIsy4MQEbxAKcsqHKnQqqoDIVP+9t5fsqgqHzBqGWw0l2J5lF1WWIWiNa7ZxuzIr8SHo8/2UYGHIVads25zccpU1dTyUoZ/czfNfTdvYCVgLLQZRw9NgTyKVyL+yNLIUkqykc94ogsw2KZbBNMcUuBnVVL9Kcdyo7rmMzMLdXCjh tomjerr
diff --git a/roles/shellserver/users/files/ssh_keys/xray b/roles/shellserver/users/files/ssh_keys/xray
index dc597b1..331067c 100644
--- a/roles/shellserver/users/files/ssh_keys/xray
+++ b/roles/shellserver/users/files/ssh_keys/xray
@@ -1 +1,22 @@
+# -------------------------------------------------------------
+# OpenSSH authorized_keys
+# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
+# Project: Eglide
+# License: Trivial work, not eligible to copyright
+# Source file: roles/shellserver/users/files/ssh_keys/xray
+# -------------------------------------------------------------
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+#
+# To add a new key or revoke a key, submit a Git commit:
+# https://agora.nasqueron.org/How_to_contribute_code
+#
+# You can also ask Nasqueron operations to do that for you:
+# https://devcentral.nasqueron.org/maniphest/task/edit/form/3/
+# </auto-generated>
+
ssh-rsa AAAAB3NzaC1yc2EAAAABJQAAAQEAzSj3sQYbrBBdceBRUAbuzCS9vZWycVV0OSZ0ofoWx/dOTIalhc3O+aett7J34GqwDgpcTEkEpa/MrlO/2TOGOFIsPlvbZW4fXXFADCbOWkRRNuYW5rv/Sg6ZliGtw4cj0dKEkn9+L/JAuGwKV5KJNTPcp5w8hZyQYczZ8KhcyNVv7mfzLnId03wPnuTTe+AmCTOitbVb3gxjdXDYeS46PkbV8m/23KpcdLigo3ClDwE/SIoA+YddaAbpWDMEwhnWyKmLGI6xkFcqSY1NT0eYnL2waZMEnfluxt+D0V0IT5NeOmQcTuVWPvjFdSKbKepPhdrFmzGNtytfZWoFOPiG+Q== rsa-key-20170119
diff --git a/roles/shellserver/vhosts/files/vhosts b/roles/shellserver/vhosts/files/vhosts
index 2b0810e..3e7f53a 100644
--- a/roles/shellserver/vhosts/files/vhosts
+++ b/roles/shellserver/vhosts/files/vhosts
@@ -1,6 +1,23 @@
#!/bin/sh
+
+# -------------------------------------------------------------
+# List IP and reverse DNS
+# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
+# Project: Eglide
+# Created: 2017-01-10
+# License: Trivial work, not eligible to copyright
+# Source file: roles/shellserver/vhosts/files/vhosts
+# -------------------------------------------------------------
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+# </auto-generated>
+
if [ -f /etc/vhosts ]; then
cat /etc/vhosts
else
echo "No vhosts data file found. Please create /etc/vhosts file."
fi
diff --git a/roles/shellserver/web-hosting/files/eglide/nginx/includes/letsencrypt.conf b/roles/shellserver/web-hosting/files/eglide/nginx/includes/letsencrypt.conf
index 334f0d6..b33c88b 100644
--- a/roles/shellserver/web-hosting/files/eglide/nginx/includes/letsencrypt.conf
+++ b/roles/shellserver/web-hosting/files/eglide/nginx/includes/letsencrypt.conf
@@ -1,14 +1,22 @@
# -------------------------------------------------------------
# Configuration for Let's encrypt nginx
# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
# Author: Sébastien Santoro aka Dereckson
# Created: 2016-01-05
# Description: Get SSL certificates from Let's encrypt
+# Source file: roles/shellserver/web-hosting/files/eglide/nginx/includes/letsencrypt.conf
# -------------------------------------------------------------
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+# </auto-generated>
location /.well-known/acme-challenge {
allow all;
default_type text/plain;
root /var/letsencrypt-auto;
}
diff --git a/roles/shellserver/web-hosting/files/eglide/nginx/nginx.conf b/roles/shellserver/web-hosting/files/eglide/nginx/nginx.conf
index aaf464a..e9cf354 100644
--- a/roles/shellserver/web-hosting/files/eglide/nginx/nginx.conf
+++ b/roles/shellserver/web-hosting/files/eglide/nginx/nginx.conf
@@ -1,38 +1,46 @@
# -------------------------------------------------------------
# Eglide — nginx configuration
# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
# Project: Eglide
# Created: 2016-07-26
# License: Trivial work, not eligible to copyright
+# Source file: roles/shellserver/web-hosting/files/eglide/nginx/nginx.conf
# -------------------------------------------------------------
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+# </auto-generated>
# -------------------------------------------------------------
# Server configuration
# -------------------------------------------------------------
worker_processes 1;
events {
worker_connections 1024;
}
# -------------------------------------------------------------
# HTTP configuration
# -------------------------------------------------------------
http {
include mime.types;
default_type text/plain;
server_names_hash_bucket_size 128;
log_format main '$remote_addr - $remote_user [$time_local] "$request" '
'$status $body_bytes_sent "$http_referer" '
'"$http_user_agent" "$http_x_forwarded_for"';
sendfile on;
keepalive_timeout 65;
gzip on;
include vhosts/*.conf;
}
diff --git a/roles/shellserver/web-hosting/files/eglide/nginx/vhosts/000.conf b/roles/shellserver/web-hosting/files/eglide/nginx/vhosts/000.conf
index 6d3904b..acb718c 100644
--- a/roles/shellserver/web-hosting/files/eglide/nginx/vhosts/000.conf
+++ b/roles/shellserver/web-hosting/files/eglide/nginx/vhosts/000.conf
@@ -1,33 +1,41 @@
# -------------------------------------------------------------
# Eglide — nginx configuration
# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
# Project: Eglide
# Created: 2016-07-26
# License: Trivial work, not eligible to copyright
+# Source file: roles/shellserver/web-hosting/files/eglide/nginx/vhosts/000.conf
# -------------------------------------------------------------
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+# </auto-generated>
# -------------------------------------------------------------
# Default vhost as a catchall when Host: header value doesn't
# match any server name, ie the domain is unknown.
# -------------------------------------------------------------
server {
listen 80;
listen [2001:470:1f12:9e1::2]:80;
listen [2001:470:1f13:9e1:0:c0ff:ee:1]:80;
server_name _;
root /var/wwwroot/unknown_domains;
access_log /var/log/www/unknown_domains-access.log main;
error_log /var/log/www/unknown_domains-error.log;
error_page 404 @unknowndomains;
location / {
return 404;
}
location @unknowndomains {
rewrite ^(.*)$ /unknown.html break;
}
}
diff --git a/roles/shellserver/web-hosting/files/eglide/nginx/vhosts/001-eglide.org.conf b/roles/shellserver/web-hosting/files/eglide/nginx/vhosts/001-eglide.org.conf
index a8ae5f5..ccc5858 100644
--- a/roles/shellserver/web-hosting/files/eglide/nginx/vhosts/001-eglide.org.conf
+++ b/roles/shellserver/web-hosting/files/eglide/nginx/vhosts/001-eglide.org.conf
@@ -1,58 +1,66 @@
# -------------------------------------------------------------
# Eglide — nginx configuration
# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
# Project: Eglide
# Created: 2016-07-26
# License: Trivial work, not eligible to copyright
+# Source file: roles/shellserver/web-hosting/files/eglide/nginx/vhosts/001-eglide.org.conf
# -------------------------------------------------------------
+#
+# <auto-generated>
+# This file is managed by our rOPS SaltStack repository.
+#
+# Changes to this file may cause incorrect behavior
+# and will be lost if the state is redeployed.
+# </auto-generated>
# -------------------------------------------------------------
# Main vhost receives special responsibilities like serving
# user directories.
# -------------------------------------------------------------
server {
listen 80;
listen [::]:80;
server_name localhost eglide eglide.org eglide.nasqueron.org www.eglide.org [2001:470:1f12:896::2] [2001:470:1f13:896:0:c0de:15:11fe];
root /var/www/html;
access_log /var/log/www/eglide.org/www-access.log main;
error_log /var/log/www/eglide.org/www-error.log;
###
### SSL
###
include includes/letsencrypt.conf;
# Once the first certificate has been generated, we'll enabl this snippet:
#
# SSL - include ssl_params;
# SSL - ssl_certificate /usr/local/etc/letsencrypt/live/eglide.org/fullchain.pem;
# SSL - ssl_certificate_key /usr/local/etc/letsencrypt/live/eglide.org/privkey.pem;
###
### Main site
###
location / {
index index.html index.htm default.html default.htm;
}
error_page 500 502 503 504 /50x.html;
###
### public_html user directories
###
set $userdir public_html;
location ~ ^/~(.+?)(/.*)?$ {
alias /home/$1/$userdir$2;
index index.html index.htm;
autoindex on;
}
}
diff --git a/roles/shellserver/web-hosting/files/eglide/wwwroot-unknown/unknown.html b/roles/shellserver/web-hosting/files/eglide/wwwroot-unknown/unknown.html
index b190434..4c4c195 100644
--- a/roles/shellserver/web-hosting/files/eglide/wwwroot-unknown/unknown.html
+++ b/roles/shellserver/web-hosting/files/eglide/wwwroot-unknown/unknown.html
@@ -1,17 +1,34 @@
<!doctype html>
+<!--
+ -------------------------------------------------------------
+ Nginx configuration
+ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
+ Project: Nasqueron
+ Created: 2016-11-08
+ License: Trivial work, not eligible to copyright
+ Source file: roles/shellserver/web-hosting/files/eglide/wwwroot-unknown/unknown.html
+ -------------------------------------------------------------
+
+ <auto-generated>
+ This file is managed by our rOPS SaltStack repository.
+
+ Changes to this file may cause incorrect behavior
+ and will be lost if the state is redeployed.
+ </auto-generated>
+-->
<html class="no-js" lang="en">
<head>
<meta charset="utf-8"/>
<meta http-equiv="x-ua-compatible" content="ie=edge">
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<title>Eglide</title>
</head>
<body>
<h1>Eglide :: Unknown domain</h1>
<h2>HTTP 404 Not Found</h2>
<p>Eglide allows users to create accounts to host tmux/screen + irssi/weechat or bots for IRC purpose.</p>
<p>It also offers a small HTML web presence.</p>
<p>The domain you seek redirects to one of our IPs, but it hasn't been declared in our webserver.</p>
<p>Contact the domain owner for assistance.</p>
</body>
</html>
File Metadata
Details
Attached
Mime Type
text/x-diff
Expires
Thu, Sep 18, 14:19 (16 h, 48 m)
Storage Engine
blob
Storage Format
Raw Data
Storage Handle
2990964
Default Alt Text
(86 KB)
Attached To
Mode
rOPS Nasqueron Operations
Attached
Detach File
Event Timeline
Log In to Comment