Skip to content
GitLab
Explore
Sign in
Primary navigation
Search or go to…
Project
E
envsetup
Manage
Activity
Members
Plan
Redmine
Code
Repository
Branches
Commits
Tags
Repository graph
Compare revisions
Deploy
Releases
Container Registry
Model registry
Analyze
Contributor analytics
Repository analytics
Model experiments
Help
Help
Support
GitLab documentation
Compare GitLab plans
Community forum
Contribute to GitLab
Provide feedback
Keyboard shortcuts
?
Snippets
Groups
Projects
Show more breadcrumbs
mediaserver
envsetup
Commits
43d52161
Commit
43d52161
authored
5 years ago
by
Nicolas KAROLAK
Browse files
Options
Downloads
Patches
Plain Diff
remove default saddr
parent
6f83cc9d
No related branches found
Branches containing commit
No related tags found
Tags containing commit
No related merge requests found
Changes
3
Hide whitespace changes
Inline
Side-by-side
Showing
3 changed files
roles/celerity/defaults/main.yml
+1
-2
1 addition, 2 deletions
roles/celerity/defaults/main.yml
roles/mirismanager/defaults/main.yml
+46
-0
46 additions, 0 deletions
roles/mirismanager/defaults/main.yml
roles/postgres/defaults/main.yml
+1
-2
1 addition, 2 deletions
roles/postgres/defaults/main.yml
with
48 additions
and
4 deletions
roles/celerity/defaults/main.yml
+
1
−
2
View file @
43d52161
...
...
@@ -33,8 +33,7 @@ celerity_f2b_jail:
celerity_firewall_enabled
:
true
celerity_ferm_rules_filename
:
celerity
celerity_ferm_input_rules
:
-
saddr
:
"
{{
groups['worker']
|
map('extract',
hostvars,
['ansible_default_ipv4',
'address'])
|
list
}}"
proto
:
-
proto
:
-
tcp
dport
:
-
6200
...
...
This diff is collapsed.
Click to expand it.
roles/mirismanager/defaults/main.yml
0 → 100644
+
46
−
0
View file @
43d52161
---
manager_packages
:
-
ubicast-skyreach
-
ubicast-skyreach-runtime
manager_testing
:
false
manager_mail
:
dev-mediaserver@ubicast.eu
manager_hostname
:
"
{{
envsetup_cm_server_name
}}"
manager_default_email_sender
:
"
noreply@{{
manager_hostname
}}"
manager_email_sender
:
"
{{
envsetup_email_sender
|
default(manager_default_email_sender,
true)
}}"
manager_proxy_http
:
"
{{
envsetup_proxy_http
}}"
manager_fail2ban_enabled
:
"
{{
envsetup_fail2ban_enabled
|
d(true)
}}"
manager_f2b_filter
:
name
:
manager
content
:
|
[INCLUDES]
before = common.conf
[Definition]
failregex = INFO Wrong credentials given to login\. IP: <HOST>, username: \S+\.$
INFO Wrong crendentials given to login\. IP: <HOST>, username: \S+\.$
ignoreregex =
manager_f2b_jail
:
name
:
manager
content
:
|
[manager]
logpath = /home/skyreach/.skyreach/logs/skyreach.log
enabled = {% if manager_fail2ban_enabled | bool %}true{% else %}false{% endif %}
manager_firewall_enabled
:
true
manager_ferm_rules_filename
:
manager
manager_ferm_input_rules
:
-
proto
:
-
tcp
dport
:
-
80
-
443
-
proto
:
-
tcp
dport
:
-
3142
manager_ferm_output_rules
:
[]
manager_ferm_global_settings
:
...
This diff is collapsed.
Click to expand it.
roles/postgres/defaults/main.yml
+
1
−
2
View file @
43d52161
...
...
@@ -7,8 +7,7 @@ postgres_pwd: "{{ envsetup_db_pg_root_pwd }}"
postgres_firewall_enabled
:
true
postgres_ferm_rules_filename
:
postgres
postgres_ferm_input_rules
:
-
saddr
:
"
{{
groups['server']
|
union(groups['manager'])
|
map('extract',
hostvars,
['ansible_default_ipv4',
'address'])
|
list
}}"
proto
:
-
proto
:
-
tcp
dport
:
-
5432
...
...
This diff is collapsed.
Click to expand it.
Preview
0%
Loading
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Save comment
Cancel
Please
register
or
sign in
to comment