System config for the desktop
This repository has been archived on 2024-02-16. You can view files and clone it, but cannot push or open issues or pull requests.
Go to file
Hoang Nguyen 4d1dd6cd7a
cron: add other implementations of crond
Supports cronie, fcron and busybox's crond.
2022-10-30 00:35:50 +07:00
filter_plugins Some beginning works for component customization 2022-10-01 21:15:29 +07:00
group_vars Small changes here and there 2022-10-16 17:41:04 +07:00
requirements cron: add other implementations of crond 2022-10-30 00:35:50 +07:00
roles cron: add other implementations of crond 2022-10-30 00:35:50 +07:00
.gitignore Tons of cool things 2022-06-20 01:29:26 +07:00
ansible.cfg README: move TODO section out 2022-09-03 17:30:52 +07:00
inventory Some beginning works for component customization 2022-10-01 21:15:29 +07:00
LICENSE Big chunk of changes 2022-02-12 00:56:39 +07:00
README.md cron: add other implementations of crond 2022-10-30 00:35:50 +07:00
setup.yml Small changes here and there 2022-10-16 17:41:04 +07:00
TODO.md Small changes here and there 2022-10-16 17:41:04 +07:00
Vagrantfile Yep yep 2022-04-17 19:02:21 +07:00

Sysconfig

This is an Ansible playbook to deploy my system configurations for desktop usage.

🧰 Usage

  • Have a fresh installation of Alpine (after running setup-alpine and reboot)

  • Install ansible-core and git

  • Clone this repository

  • Install needed external modules (e.g. apk, pamd, mount):

    ansible-galaxy collection install -r requirements/collections.yml
    
  • Create an encrypted file to store your user password:

    mkdir -p host_vars/YOUR_HOSTNAME
    touch host_vars/YOUR_HOSTNAME/secrets.yml
    ansible-vault encrypt host_vars/YOUR_HOSTNAME/secrets.yml
    ansible-vault edit host_vars/YOUR_HOSTNAME/secrets.yml
    

    The file should look like this: vault_password: <strong_&_secure_password>

  • Customize the variables in group_vars/all.yml.

    Some variables only accept a list of defined values. They are listed in requirements/accepted_variables.yml.

  • Run the playbook:

    ansible-playbook setup.yml
    
  • Reboot and login as the newly created normal user

  • Proceed with dotfiles-ansible playbook

✔️ Testing

# Start the VM
vagrant up

# ssh into the VM (OpenSSH is required)
# Alternatively run 'vagrant ssh-config' to get the machine's IP address
# and manually ssh into it, e.g. 'dbclient -y vagrant@<ip_address>'
vagrant ssh

# Run the playbook as root
$ cd /vagrant
$ sudo ansible-playbook -v setup.yml

🖊️ Notes

  • This playbook assumes that the person running it is me 😃. It might do specific tasks that you don't like. Use with your own risks.

  • The playbook assumes it's only run once, so it doesn't take into account conflicted services when switching options in later runs.

  • The playbook is intended to be run as root. It is separated from dotfiles-ansible, which should only be run as a normal user.

📄 License

MIT