Skip to content

Instantly share code, notes, and snippets.

@hack13
Last active June 17, 2018 14:39
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save hack13/78efae34b7d5e9dd2fc3171604ad5c64 to your computer and use it in GitHub Desktop.
Save hack13/78efae34b7d5e9dd2fc3171604ad5c64 to your computer and use it in GitHub Desktop.
OpenSim Playbook [In Progress]
- hosts: opensim
remote_user: user
become: yes
become_user: root
tasks:
- name: Disable SELinux
selinux:
state: disabled
- name: Add MariaDB 10.3 Repo
yum_repository:
name: mariadb
description: mariadb 10.3 official repo
baseurl: http://yum.mariadb.org/10.3/centos7-amd64
gpgkey: https://yum.mariadb.org/RPM-GPG-KEY-MariaDB
gpgcheck: yes
enabled: yes
- name: Import Mono-Project Key
rpm_key:
state: present
key: https://keyserver.ubuntu.com/pks/lookup?op=get&search=0x3FA7E0328081BFF6A14DA29AA6A19B38D3D831EF
- name: Add Mono-Project Repo
yum_repository:
name: mono-centos7-stable
description: official mono project repo
baseurl: https://download.mono-project.com/repo/centos7-stable/
gpgkey: https://download.mono-project.com/repo/xamarin.gpg
gpgcheck: yes
enabled: yes
- name: Refresh repos and upgrade all packages
yum:
name: '*'
state: latest
- name: Install MariaDB Server
yum:
name: MariaDB-server, MariaDB-client
state: latest
- name: Install Mono
yum:
name: mono-complete
state: latest
- name: Install firewalld
yum:
name: firewalld
state: latest
- name: Create opensim user group
group:
name: opensim
state: present
- name: Create robust account
user:
name: robust
shell: /bin/bash
comment: Robust Service Account
uid: 1090
group: opensim
- name: Create simulators account
user:
name: simulators
shell: /bin/bash
comment: Simulators Service Account
uid: 1091
group: opensim
- name: Configuring firewall rules for server (1/5)
firewalld:
service: https
permanent: true
state: enabled
- name: Configuring firewall rules for server (2/5)
firewalld:
service: http
permanent: true
state: enabled
- name: Configuring firewall rules for server (3/5)
firewalld:
service: ssh
permanent: true
state: enabled
- name: Configuring firewall rules for server (4/5)
firewalld:
port: 9000-9010/udp
permanent: true
state: enabled
- name: Configuring firewall rules for server (5/5)
firewalld:
port: 9000-9010/tcp
permanent: true
state: enabled
- name: Restart firewalld
systemd:
state: restarted
name: firewalld
- name: Ensure firewalld is enabled at boot
systemd:
name: firewalld.service
enabled: True
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment