modified preseed.cfg to initialize network protection

This commit is contained in:
Tanguy MAZE
2018-12-19 16:17:02 +01:00
parent dedc241daf
commit ed49a5e8f0
7 changed files with 51 additions and 72 deletions

View File

@@ -1,2 +0,0 @@
{{ ansible_nodename }} ansible_host={{ ansible_default_ipv4.address }} ansible_port=2230 ansible_user=tanguy
roger-skyline-1 ansible_host=192.168.99.2 ansible_port=2230 ansible_user=tanguy

View File

@@ -1,42 +0,0 @@
- name: "Initialise network config, packages & user tanguy"
hosts: {{ ansible_nodename }}
become: yes
become_user: root
become_method: su
tasks:
- name: "Create iptables directory"
file:
path: "/etc/iptables"
state: "directory"
- name: "Upload firewall config"
copy:
src: "files/firewall.conf"
dest: "/etc/iptables/rules.v4"
owner: "root"
group: "root"
- name: "Set up networking"
copy:
src: "files/interfaces"
dest: "/etc/network/"
owner: "root"
group: "root"
- name: "Restart networking service"
service:
name: "networking"
state: "restarted"
- name: "Upload ssh config"
copy:
src: "files/sshd_config"
dest: "/etc/ssh/"
owner: "root"
group: "root"
tags: [ "ssh" ]
- name: "Upload public key for tanguy"
authorized_key:
user: "tanguy"
state: "present"
key: "{{ lookup('file', '~/.ssh/id_rsa.pub') }}"
- name: "Restart ssh service"
service:
name: "ssh"
state: "restarted"

View File

@@ -6,7 +6,7 @@
# By: tmaze <tmaze@student.42.fr> +#+ +:+ +#+ #
# +#+#+#+#+#+ +#+ #
# Created: 2018/12/15 12:46:55 by tmaze #+# #+# #
# Updated: 2018/12/17 15:09:33 by tmaze ### ########.fr #
# Updated: 2018/12/19 14:00:53 by tmaze ### ########.fr #
# #
#******************************************************************************#
@@ -85,23 +85,24 @@ d-i grub-installer/bootdev string /dev/sda
d-i preseed/late_command string wget -O/target/etc/network/interfaces http://{{ ansible_default_ipv4.address }}:3000/files/interfaces;\
wget -O/target/etc/ssh/sshd_config http://{{ ansible_default_ipv4.address }}:3000/files/sshd_config_1;\
mkdir /target/etc/iptables;\
touch /target/etc/iptables/rules.v4;\
wget -O/target/etc/iptables/rules.v4 http://{{ ansible_default_ipv4.address }}:3000/files/firewall.conf;\
touch /target/etc/cron.d/update_script;\
wget -O/target/etc/cron.d/update_script http://{{ ansible_default_ipv4.address }}:3000/files/update_script;\
touch /target/etc/cron.d/check_crontab;\
wget -O/target/etc/cron.d/check_crontab http://{{ ansible_default_ipv4.address }}:3000/files/check_crontab;\
touch /target/usr/sbin/update_script.sh;\
chmod 755 /target/usr/sbin/update_script.sh;\
wget -O/target/usr/sbin/update_script.sh http://{{ ansible_default_ipv4.address }}:3000/files/update_script.sh;\
touch /target/usr/sbin/check_crontab.sh;\
chmod 755 /target/usr/sbin/check_crontab.sh;\
wget -O/target/usr/sbin/check_crontab.sh http://{{ ansible_default_ipv4.address }}:3000/files/check_crontab.sh;\
touch /target/etc/fail2ban/jail.local;\
wget -O/target/etc/fail2ban/jail.local http://{{ ansible_default_ipv4.address }}:3000/files/jail.local;\
wget -O/target/etc/hosts http://{{ ansible_default_ipv4.address }}:3000/files/hosts;\
echo "roger-skyline-1" > /target/etc/hostname;
mkdir /target/etc/iptables;\
touch /target/etc/iptables/rules.v4;\
wget -O/target/etc/iptables/rules.v4 http://{{ ansible_default_ipv4.address }}:3000/files/firewall.conf;\
touch /target/etc/cron.d/update_script;\
wget -O/target/etc/cron.d/update_script http://{{ ansible_default_ipv4.address }}:3000/files/update_script;\
touch /target/etc/cron.d/check_crontab;\
wget -O/target/etc/cron.d/check_crontab http://{{ ansible_default_ipv4.address }}:3000/files/check_crontab;\
touch /target/usr/sbin/update_script.sh;\
wget -O/target/usr/sbin/update_script.sh http://{{ ansible_default_ipv4.address }}:3000/files/update_script.sh;\
chmod 755 /target/usr/sbin/update_script.sh;\
touch /target/usr/sbin/check_crontab.sh;\
wget -O/target/usr/sbin/check_crontab.sh http://{{ ansible_default_ipv4.address }}:3000/files/check_crontab.sh;\
chmod 755 /target/usr/sbin/check_crontab.sh;\
sh /target/usr/sbin/check_crontab.sh;\
touch /target/etc/fail2ban/jail.local;\
wget -O/target/etc/fail2ban/jail.local http://{{ ansible_default_ipv4.address }}:3000/files/jail.local;\
wget -O/target/etc/hosts http://{{ ansible_default_ipv4.address }}:3000/files/hosts;\
echo "roger-skyline-1" > /target/etc/hostname;
# don't wait for confirm, just reboot when finished
d-i finish-install/reboot_in_progress note