mirror of
https://github.com/trailofbits/algo.git
synced 2025-10-05 01:55:21 +02:00
* fix: Remove POSIX-incompatible 'local' keyword from install.sh The install.sh script uses #\!/usr/bin/env sh (POSIX shell) but was using the 'local' keyword in the tryGetMetadata function, which is a bash-specific feature. This caused shellcheck to fail with SC3043 warnings in CI. Fixed by removing 'local' keywords from variable declarations in the tryGetMetadata function. The variables are still function-scoped in practice since they're assigned at the beginning of the function. This resolves the CI failure introduced in PR #14788 (run #919). * ci: Make ansible-lint stricter and fix basic issues - Remove || true from ansible-lint CI job to enforce linting - Enable name[play] rule - all plays should be named - Enable yaml[new-line-at-end-of-file] rule - Move name[missing] from skip_list to warn_list (first step) - Add names to plays in main.yml and users.yml - Document future linting improvements in comments This makes the CI stricter while fixing the easy issues first. More comprehensive fixes for the 113 name[missing] warnings can be addressed in future PRs. * fix: Add name[missing] to skip_list temporarily The ansible-lint CI is failing because name[missing] was not properly added to skip_list. This causes 113 name[missing] errors to fail the CI. Adding it to skip_list for now to fix the CI. The rule can be moved to warn_list and eventually enabled once all tasks are properly named in future PRs. * fix: Fix ansible-lint critical errors - Fix schema[tasks] error in roles/local/tasks/prompts.yml by removing with_items loop - Add missing newline at end of requirements.yml - Replace ignore_errors with failed_when in reboot task - Add pipefail to shell command with pipes in strongswan openssl task These fixes address all critical ansible-lint errors that were causing CI failures.
120 lines
3.7 KiB
YAML
120 lines
3.7 KiB
YAML
---
|
|
- name: Manage VPN Users
|
|
hosts: localhost
|
|
gather_facts: false
|
|
tags: always
|
|
vars_files:
|
|
- config.cfg
|
|
|
|
tasks:
|
|
- block:
|
|
- name: Get list of installed config files
|
|
find:
|
|
paths: configs/
|
|
depth: 2
|
|
recurse: true
|
|
hidden: true
|
|
patterns: .config.yml
|
|
register: _configs_list
|
|
|
|
- name: Verify servers
|
|
assert:
|
|
that: _configs_list.matched > 0
|
|
msg: No servers found, nothing to update.
|
|
|
|
- name: Build list of installed servers
|
|
set_fact:
|
|
server_list: >-
|
|
[{% for i in _configs_list.files %}
|
|
{% set config = lookup('file', i.path) | from_yaml %}
|
|
{{ {'server': config.server, 'IP_subject_alt_name': config.IP_subject_alt_name} }}
|
|
{% endfor %}]
|
|
|
|
- name: Server address prompt
|
|
pause:
|
|
prompt: |
|
|
Select the server to update user list below:
|
|
{% for r in server_list %}
|
|
{{ loop.index }}. {{ r.server }} ({{ r.IP_subject_alt_name }})
|
|
{% endfor %}
|
|
register: _server
|
|
when: server is undefined
|
|
|
|
- block:
|
|
- name: Set facts based on the input
|
|
set_fact:
|
|
algo_server: >-
|
|
{% if server is defined %}{{ server }}
|
|
{%- elif _server.user_input %}{{ server_list[_server.user_input | int -1 ].server }}
|
|
{%- else %}omit{% endif %}
|
|
|
|
- name: Import host specific variables
|
|
include_vars:
|
|
file: configs/{{ algo_server }}/.config.yml
|
|
|
|
- when: ipsec_enabled
|
|
block:
|
|
- name: CA password prompt
|
|
pause:
|
|
prompt: Enter the password for the private CA key
|
|
echo: false
|
|
register: _ca_password
|
|
when: ca_password is undefined
|
|
|
|
- name: Set facts based on the input
|
|
set_fact:
|
|
CA_password: >-
|
|
{% if ca_password is defined %}{{ ca_password }}
|
|
{%- elif _ca_password.user_input %}{{ _ca_password.user_input }}
|
|
{%- else %}omit{% endif %}
|
|
|
|
- name: Local pre-tasks
|
|
import_tasks: playbooks/cloud-pre.yml
|
|
become: false
|
|
|
|
- name: Add the server to the vpn-host group
|
|
add_host:
|
|
name: "{{ algo_server }}"
|
|
groups: vpn-host
|
|
ansible_ssh_user: "{{ server_user|default('root') }}"
|
|
ansible_connection: "{% if algo_server == 'localhost' %}local{% else %}ssh{% endif %}"
|
|
ansible_python_interpreter: /usr/bin/python3
|
|
CA_password: "{{ CA_password|default(omit) }}"
|
|
rescue:
|
|
- include_tasks: playbooks/rescue.yml
|
|
|
|
- name: User management
|
|
hosts: vpn-host
|
|
gather_facts: true
|
|
become: true
|
|
vars_files:
|
|
- config.cfg
|
|
- configs/{{ inventory_hostname }}/.config.yml
|
|
|
|
tasks:
|
|
- block:
|
|
- import_role:
|
|
name: common
|
|
|
|
- import_role:
|
|
name: wireguard
|
|
when: wireguard_enabled
|
|
|
|
- import_role:
|
|
name: strongswan
|
|
when: ipsec_enabled
|
|
tags: ipsec
|
|
|
|
- import_role:
|
|
name: ssh_tunneling
|
|
when: algo_ssh_tunneling
|
|
|
|
- debug:
|
|
msg:
|
|
- "{{ congrats.common.split('\n') }}"
|
|
- " {{ congrats.p12_pass if algo_ssh_tunneling or ipsec_enabled else '' }}"
|
|
- " {{ congrats.ca_key_pass if algo_store_pki and ipsec_enabled else '' }}"
|
|
- " {{ congrats.ssh_access if algo_provider != 'local' else ''}}"
|
|
tags: always
|
|
rescue:
|
|
- include_tasks: playbooks/rescue.yml
|