Ansible Role for User Management
The vars/main.yml
file should contain your user passwords.
---
admin_password: some_password
deploy_password: another_password
You should not save these in plaintext, however.
Rather than save SSL contents in plaintext, we can instead (with Ansible 1.5), use Ansible Vault. This will let you encrypt any YAML file contents.
ansible-vault create vars/main.yml
This will ask you for a password, which you'll need to later use the variable file (so Ansible can read its contents).
You can encrypt an already-existing existing file as well:
ansible-vault encrypt vars/main.yml
You'll be brought into the file to edit. This defaults to vim. When you save the file, the file's contents will be encrypted.
In order to go back and edit the file later, you can go back into via the ansible-vault
command again:
ansible-vault edit vars/main.yml
You'll be prompted for the password to get back into the file for editing.
This admin_password
and deploy_password
variables I defined in vars/main.yml
are used inside of the tasks/main.yml
file to set the user passwords.
Setup a main playbook which uses the roles:
---
- hosts: web
roles:
- server
- user
- ssl
- nginx
- php
Then you can run it. Note we need to use the --ask-vault-pass
so that Ansible can decrypt the encrypted variable file:
ansible-playbook sfh.yml -s -k -u vagrant --ask-vault-pass
The above command is what I use when testing in Vagrant:
ansible-playbook
- run a playbooksfh.yml
- use thesfh.yml
file-s
- Use "sudo" for running commands-k
- Use password authentication (I don't have an SSH keys setup in this case). Since user Vagrant has passwordless sudo abilities, this technically isn't needed to run commands, but we need to tell Ansible not to assume that we're using key-based authentication-u vagrant
- Use user "vagrant" when running commands--ask-vault-pass
- Ask the Vault password so Ansible can read encrypted files
Linux passwords are encrypted using SHA-512. Ansible's documentation on generated encrypted passwords point out the command mkpasswd --method=SHA-512
. This asks for a password and returns the encrypted version of it after encrypting it used the SHA-512 method.
On Ubuntu 14.04, the mkpasswd
command comes with package whois
:
sudo apt-get install -y whois
After installing whois
, you can use the mkpasswd
command.
mkpasswd --method=SHA-512
Password: <enter your password here>
$6$hCDK.2eB3VXD4$fz95AiqRvc7DHbFWYMbTiRWJza5SCHclueFkISsivF3u6dDkHQmIds1uNrVb5Fk6.6WEes6iQ25GuJx0Fteos/
This generated hash should be what you set as your admin_password
and deploy_password
values.