87 lines
2.6 KiB
YAML
Raw Normal View History

---
# Enable and disable services.
2021-02-20 11:10:36 -06:00
## Cron ##
- name: General | Software | Services | Enable CROND
service:
name: "{{ crond }}"
pattern: "{{ crond_pattern }}"
state: started
enabled: yes
## SSHFS ##
2021-02-15 09:22:26 -06:00
2021-07-13 19:09:45 -05:00
- name: General | Software | Services | Enable SSHFS (FreeBSD)
service:
name: fusefs
pattern: fusefs
state: started
enabled: yes
when: ansible_system == "FreeBSD"
2021-02-15 09:22:26 -06:00
## CUPS ##
- name: General | Software | Services | Disable CUPS Daemon
service:
name: "{{ cups }}"
pattern: "{{ cups_pattern }}"
state: stopped
enabled: no
- name: General | Software | Services | Disable CUPS-Browse Daemon
service:
name: "{{ cups_browse }}"
pattern: "{{ cups_browse_pattern }}"
state: stopped
2021-02-15 08:40:32 -06:00
enabled: no
2021-02-15 09:22:26 -06:00
## SSHD ##
2021-02-15 08:40:32 -06:00
2021-02-15 10:34:06 -06:00
- name: General | Software | Services | Configure SSHD
2021-02-15 09:22:26 -06:00
lineinfile:
path: "{{ sshd_config }}"
regexp: '{{ item.key }}'
line: '{{ item.value }} # MANAGED BY ANSIBLE'
state: present
create: no
backup: yes
loop:
2021-02-20 10:54:19 -06:00
- { "key": '^[\#]?AllowUsers', "value": 'AllowUsers ling'}
- { "key": '^[\#]?PermitRootLogin', "value": 'PermitRootLogin no'}
2021-02-15 09:22:26 -06:00
- { "key": '^[\#]?AllowTcpForwarding', "value": 'AllowTcpForwarding no'}
2021-02-20 10:54:19 -06:00
- { "key": '^[\#]?ClientAliveInterval', "value": 'ClientAliveInterval 60'}
2021-02-15 09:22:26 -06:00
- { "key": '^[\#]?ClientAliveCountMax', "value": 'ClientAliveCountMax 2'}
- { "key": '^[\#]?Compression', "value": 'Compression no'}
- { "key": '^[\#]?LogLevel', "value": 'LogLevel verbose'}
- { "key": '^[\#]?MaxAuthTries', "value": 'MaxAuthTries 3'}
- { "key": '^[\#]?MaxSessions', "value": 'MaxSessions 2'}
#- { "key": '^[\#]?Port', "value": 'Port '}
- { "key": '^[\#]?TCPKeepAlive', "value": 'TCPKeepAlive no'}
- { "key": '^[\#]?X11Forwarding', "value": 'X11Forwarding no'}
- { "key": '^[\#]?AllowAgentForwarding', "value": 'AllowAgentForwarding no'}
2021-02-20 10:54:19 -06:00
- { "key": '^[\#]?PermitEmptyPasswords', "value": 'PermitEmptyPasswords no'}
2021-02-15 09:22:26 -06:00
2021-02-20 10:03:04 -06:00
- name: General | Software | Services | Configure SSHD
lineinfile:
path: "{{ sshd_config }}"
regexp: '{{ item.key }}'
line: '{{ item.value }} # MANAGED BY ANSIBLE'
state: present
create: no
backup: yes
loop:
2021-02-20 10:54:19 -06:00
- { "key": '^[\#]?AllowUsers', "value": 'AllowUsers root ling'}
- { "key": '^[\#]?PermitRootLogin', "value": 'PermitRootLogin yes'}
2021-02-20 10:54:19 -06:00
- { "key": '^[\#]?MaxSessions', "value": 'MaxSessions 5'}
when: "'pve' in ansible_kernel"
2021-02-20 10:03:04 -06:00
2021-02-15 10:34:06 -06:00
- name: General | Software | Services | Enable SSHD
2021-02-15 09:22:26 -06:00
service:
name: "{{ sshd }}"
pattern: "{{ sshd_pattern }}"
state: reloaded
2021-02-15 09:22:26 -06:00
enabled: yes