diff options
author | Christian Pointner <equinox@spreadspace.org> | 2022-07-21 02:32:05 +0200 |
---|---|---|
committer | Christian Pointner <equinox@spreadspace.org> | 2022-07-21 02:32:05 +0200 |
commit | 42bf77ee5763090d2c02f5d2d7a7a686ce09a5e8 (patch) | |
tree | 3b92e824064a5d4be16b73d1e98dcd53672e429c /dan/ele-calypso.yml | |
parent | ele-* playbook refactoring and ele-calypso base install (diff) |
add role for sachet
Diffstat (limited to 'dan/ele-calypso.yml')
-rw-r--r-- | dan/ele-calypso.yml | 79 |
1 files changed, 1 insertions, 78 deletions
diff --git a/dan/ele-calypso.yml b/dan/ele-calypso.yml index c6fe0cfa..0fcaa93a 100644 --- a/dan/ele-calypso.yml +++ b/dan/ele-calypso.yml @@ -17,82 +17,5 @@ - role: kubernetes/base - role: kubernetes/standalone/base - role: streaming/player - # post_tasks: - # - name: install smstools - # apt: - # name: smstools - # state: present - # - name: add user for sachet - # user: - # name: sachet - # system: yes - # home: /nonexistent - # create_home: no - # groups: smsd - # append: yes - - # - name: create sachet config directory - # file: - # path: /etc/sachet - # state: directory - - # - name: install sachet config file - # copy: - # dest: /etc/sachet/config.yml - # content: | - # providers: - # smstools: - # outgoing_dir: /var/spool/sms/outgoing - - # receivers: - # - name: equinox - # provider: smstools - # to: - # - '+436644800222' - - # - name: install systemd service unit for sachet - # copy: - # dest: /etc/systemd/system/sachet.service - # content: | - # [Unit] - # Description=Sachet SMS Daemon for Prometheus Alertmanager - - # [Service] - # Restart=on-failure - # User=sachet - # ExecStart=/usr/local/bin/sachet -config /etc/sachet/config.yml - - # # systemd hardening-options - # AmbientCapabilities= - # CapabilityBoundingSet= - # DeviceAllow=/dev/null rw - # DevicePolicy=strict - # LimitMEMLOCK=0 - # LimitNOFILE=8192 - # LockPersonality=true - # MemoryDenyWriteExecute=true - # NoNewPrivileges=true - # PrivateDevices=true - # PrivateTmp=true - # PrivateUsers=true - # ProtectControlGroups=true - # ProtectHome=true - # ProtectKernelModules=true - # ProtectKernelTunables=true - # ProtectSystem=full - # ReadWritePaths=/var/spool/sms/outgoing - # RemoveIPC=true - # RestrictNamespaces=true - # RestrictRealtime=true - # SystemCallArchitectures=native - - # [Install] - # WantedBy=multi-user.target - - # ## TODO: - # ## - configure smstools - # ## - build sachet using this branch: https://github.com/spreadspace/sachet/tree/topic/add-smstools - # ## - copy binary to /usr/local/bin/sachet - # ## - $ systemctl daemon-reload - # ## - $ systemctl enable --now sachet + - role: monitoring/sachet |