Changelog

This project adheres to Semantic Versioning and human-readable changelog.

This file contains only general overview of the changes in the DebOps project. The detailed changelog can be seen using git log command.

You can read information about required changes between releases in the Upgrade notes documentation.

debops stable-1.0 - unreleased

Added

General

  • A new Ansible module, dpkg_divert, can be used to divert the configuration files out of the way to preserve them and avoid issues with package upgrades. The module is available in the debops.ansible_plugins role.

debops.cron role

  • The execution time of the hourly, daily, weekly and monthly cron jobs will be randomized on a per-host basis to avoid large job execution spikes every morning. See the role documentation for more details.

Fixed

debops.dovecot role

  • Use the supported option name (ssl_protocols instead of ssl_min_protocol) on Ubuntu Bionic installations.

debops v1.0.13 - 2019-11-13

Added

debops.nginx role

  • The try_files option in the PHP location blocks can be overridden using the item.php_try_files parameter.

debops.postconf role

  • The role will install the libsasl2-modules APT package when Postfix auth capability is enabled, to allow for the SASL authentication to work.

debops.slapd role

  • The Access Control List rules can now be tested using the slapacl(8) command via a generated test suite script.
  • Enable Referential Integrity overlay for most of the LDAP attributes that use the Distinguished Names as values.
  • New "SMS Gateway" LDAP role grants read-only access to the mobile attribute by SMS gateways. This is needed for implementing 2-factor authentication via SMS messages.

Changed

General

  • The default Ansible callback plugin used by DebOps is changed to yaml, which gives a cleaner look for various outputs and error messages. The callback plugin will be active by default in new DebOps project directories; in existing directories users can add:

    [ansible defaults]
    stdout_callback = yaml
    

    in the .debops.cfg configuration file.

  • Add the iputils-ping package in the Dockerfile for the ping command to be available in the Docker environment.

  • The DebOps files inside of the Docker container will be owned by the ansible unprivileged UNIX account to make runtime modification possible.

LDAP

  • The ldap/init-directory.yml playbook has been updated to use the new ou=Roles,dc=example,dc=org LDAP subtree, which will contain various organizationalRole objects. After updating the OpenLDAP Access Control List using the debops.slapd role, you can use the playbook on an existing installation to create the missing objects.

    The cn=UNIX Administrators and cn=UNIX SSH users LDAP objects will be created in the ou=Groups,dc=example,dc=org LDAP subtree. On existing installations, these objects need to be moved manually to the new subtree, otherwise the playbook will try to create them and fail due to duplicate UID/GID numbers which are enforced to be unique. You can move the objects using an LDAP client, for example Apache Directory Studio.

    The ou=System Groups,dc=example=dc,org subtree will not be created anymore. On existing installations this subtree will be left intact and can be safely removed after migration.

debops.php role

  • The listen.backlog PHP-FPM option will be set to 511 by default. It is also exposed as the php__fpm_listen_backlog default variable and can be modified by the item.listen_backlog pool parameter.

debops.postconf role

  • Support for the 465 TCP port for message submission over Implicit TLS is no longer deprecated (status changed by the RFC 8314 document) and will be enabled by default with the auth capability.

debops.postfix role

  • The default primary group of the lookup tables has been changed to postfix, default mode for new lookup tables will be set to 0640. This change helps secure lookup tables that utilize remote databases with authentication.
  • Postfix lookup tables can now use shared connection configuration defined in a YAML dictionary to minimize data duplication. See the postfix__lookup_tables documentation for more details.

debops.postscreen role

  • Explicitly set the Postfix configuration state to ensure that it works from dependent role configuration stored on the Ansible Controller.

debops.slapd role

  • The employeeNumber attribute in the ou=People,dc=example,dc=org LDAP subtree will be constrained to digits only, and the LDAP directory will enforce its uniqueness in the subtree. This allows the attribute to be used for correlation of personal LDAP objects to RDBMS-based databases.

  • The mail attribute is changed from unique for objects in the ou=People,dc=example,dc=org LDAP subtree to globally unique, due to its use for authentication purposes. The attribute will be indexed by default.

  • The default ACL rules have been overhauled to add support for the ou=Roles,dc=example,dc=org subtree and use of the organizationalRole LDAP objects for authorization. The old set of rules is still active to ensure that the existing environments work as expected.

    If you use a modified ACL configuration, you should include the new rules as well to ensure that changes in the debops.ldap support are working correctly.

  • You can now hide specific LDAP objects from unprivileged users by adding them to a special cn=Hidden Objects,ou=Groups,dc=example,dc=org LDAP group. The required ACL rule will be enabled by default; the objects used to control visibility will be created by the ldap/init-directory.yml playbook.

  • Access to the carLicense, homePhone and homePostalAddress attributes has been restricted to privileged accounts only (administrators, entry owner). The values cannot be seen by unprivileged and anonymous users.

  • Write access to the ou=SUDOers,dc=example,dc=org LDAP subtree has been restricted to the members of the "UNIX Administrators" LDAP group.

Removed

debops.ldap role

  • The use of the params option in the ldap_attrs and ldap_entry Ansible modules is deprecated due to their insecure nature. As a consequence, the debops.ldap role has been updated to not use this option and the ldap__admin_auth_params variable has been removed.

Fixed

debops.hashicorp role

  • Fix support for the Python 3.x environment in the local fact template.

debops.nginx role

  • Fix an issue in the php.conf.j2 server template when an item.location parameter is specified, overridding the default set of location blocks defined in the default.conf.j template. If the / location is not specified in the item.location dictionary, a default one will be included by the role.

debops.owncloud role

  • Fix a "variable is undefined" issue when the service/owncloud.yml Ansible playbook is executed with the role::nginx Ansible tag.

debops.postconf role

  • Disable the smtpd_helo_restrictions option on the submission and smtps TCP ports when the authentication and MX lookups are enabled. This should fix an issue where SMTP client sends the host's IP address as its HELO/EHLO response, which might not be configurable by the user.

debops.rsyslog role

  • On hosts with unprivileged rsyslog service, ensure that the /var/log/ directory permissions are correct even when owner and group are already set correctly.

debops v1.0.12 - 2019-10-25

Added

debops.system_users role

  • Add separate group and account variables for use via role dependency.

Changed

debops-contrib.dropbear_initramfs role

  • Better default value for dropbear_initramfs__network_device by detecting the default network interface using Ansible facts instead of the previously hard-coded eth0.

Security

debops.nginx role

  • Mitigation for the CVE-2019-11043 vulnerability has been applied in the nginx php and php5 configuration templates. The mitigation is based on the suggested workaround from the PHP Bug Tracker.

debops.owncloud role

debops v1.0.11 - 2019-10-14

Added

LDAP

  • The ldap/get-uuid.yml Ansible playbook can be used to convert LDAP Distinguished Names to UUIDs to look up the password files if needed.

debops.ifupdown role

  • Ensure that the /run/network/ directory exists, in case that the system is not configured by ifupdown package initially, e.g. recent Ubuntu releases.

debops.pki role

  • Newly created PKI realms will have a new public/full.pem file which contains the full X.509 certificate chain, including the Root CA certificate, which might be required by some applications that rely on TLS.

    Existing PKI realms will not be modified, but Ansible roles that use the PKI infrastructure might expect the new files to be present. It is advisable to recreate the PKI realms when possible, or create the missing files manually.

debops.slapd role

  • The lastbind overlay will be enabled by default. This overlay records the timestamp of the last successful bind operation of a given LDAP object, which can be used to, for example, check the date of the last successful login of a given user account.
  • Add support for nextcloud LDAP schema which provides attributes needed to define disk quotas for Nextcloud user accounts.

debops.unbound role

  • The role will configure the unbound daemon to allow non-recursive access to DNS queries when a host is managed by Ansible locally, with assumption that it's an Ansible Controller host. This change unblocks use of the dig +trace and similar commands.

Changed

debops.dokuwiki role

  • Don't install the php-mcrypt package, it's not required by base DokuWiki installation.

debops.gitlab role

  • The GitLab project has changed its codebase structure, because of that the Gitlab CE git repository has been moved to a new location, https://gitlab.com/gitlab-org/gitlab-foss/. The role has been updated accordingly. Existing installations should work fine after the new codebase is cloned, but if unsure, users should check the change first in a development environment.

    More details can be found in GitLab blog posts here and here, as well as the Frequently Asked Questions page.

debops.ldap role

  • The role will reset the LDAP host attributes defined in the ldap__device_attributes variable on first configuration in case that the host has been reinstalled and some of their values changed (for example different IP addresses). This should avoid leaving the outdated attributes in the host LDAP object.

debops.slapd role

  • The number of rounds in SHA-512 password hashes has been increased from 5000 (default) to 100001. Existing password hashes will be unaffected.

debops v1.0.10 - 2019-09-28

Added

LDAP

  • The ldap/init-directory.yml Ansible playbook will create the LDAP obejects cn=LDAP Replicators and cn=Password Reset Agents to allow other Ansible roles to utilize them without the need for the system administrator to define them by hand.

debops.saslauthd role

  • The role can now be used to authenticate users of different services against the LDAP directory via integration with the debops.ldap role and its framework. Multiple LDAP profiles can be used to provide different access control for different services.

debops.slapd role

  • Add support for eduPerson LDAP schema with updated schema file included in the role.
  • The role will configure SASL authentication in the OpenLDAP service using the debops.saslauthd Ansible role. Both humans and machines can authenticate to the OpenLDAP directory using their respective LDAP objects.

debops.unbound role

  • Add support for local-zone and local-data configuration options.

Changed

Updates of upstream application versions

  • In the debops.owncloud role, the default Nextcloud version has been updated to 15.0, because the 14.0 release has reached End of Life.

debops.dovecot role

  • Various improvements in SSL cipher and Diffie-Hellman parameter configuration.

debops.owncloud role

  • The nginx server configuration has been updated to include latest changes in upstream Nextcloud documentation.

Fixed

General

  • Fixed wrong constant name in the debops script.

debops.ferm role

  • The dmz firewall configuration will use the dport parameter instead of port, otherwise filtering rules will not work as expected.

debops.icinga_db role

  • Fix the role fact script execution in Python 2.7 environment.

debops v1.0.9 - 2019-09-08

Added

General

  • Add more entries to be ignored by default by the git command in the DebOps project directories:
    • debops: ignore DebOps monorepo cloned or symlinked into the project directory.
    • roles and playbooks: ignore roles and playbooks in development; production code should be put in the ansible/roles/ and the ansible/playbooks/ directories respectively.
  • The debops-init script now also creates the .gitattributes file for use with git-crypt. It is commented out by default.
  • The debops-defaults command will check what pagers (view, less, more) are available and use the best one automatically.

debops.apt_install role

  • The open-vm-tools APT package will be installed by default in VMware virtual machines.

debops.root_account role

  • The root_account.fact script now checks if the root account has the ~/.ssh/authorized_keys file present and not empty.

Changed

Continuous Integration

  • The $VAGRANT_HOSTNAME variable can be used to override the dynamically generated hostname of the Vagrant master virtual machine.

General

  • External commands used in the DebOps scripts have been defined as constants to allow easier changes of the command location in various operating systems, for example Guix.

debops.apt_preferences role

debops.dhcpd role

  • The mode of the dhcpd configuration files is changed from 0644 to 0640 to ensure that the DNS update keys are not world-readable.

debops.owncloud role

  • Updates in the dependent configuration for the debops.nginx role - use of internal Nextcloud maintenance page and updated location regex patterns, as well as configuration of the memory limit for PHP processes via the debops.php role.

debops.slapd role

  • Enable substring index for the sudoUser attribute from the sudo LDAP schema. Existing installations should be updated manually via the LDAP client, by setting the value of the sudoUser index to eq,sub.
  • Add indexes for the authorizedService and host attributes from the ldapns LDAP schema and the gid attribute from the posixGroupId LDAP schema. This should improve performance in UNIX environments connected to the LDAP directory.

Fixed

debops.dnsmasq role

  • On Ubuntu hosts, the role will fix the configuration installed by the lxd package to use bind-dynamic option instead of bind-interfaces. This allows the dnsmasq service to start correctly.

debops.nfs_server role

debops.unattended_upgrades role

  • Ensure that the reboot time generated by the role is in the correct format.

debops v1.0.8 - 2019-08-24

Added

General

  • The distro Python package has been added as the DebOps dependency. The package is used by the debops-init script to detect the operating system used on the Ansible Controller, and is a replacement for the deprecated platform.linux_distribution() function.

debops.dhparam role

debops.unattended_upgrades role

  • Devuan-based hosts will automatically install security updates by default.

Changed

General

  • The debops-defaults script now supports Ansible roles with multiple defaults/main/*.yml files.

debops.apt role

  • The APT source URLs for Devuan distribution have been updated.

Fixed

General

  • Ansible local fact scripts in multiple roles have been updated to work correctly in a Python 3.x environment.
  • Fixed deprecation warning on Ansible 2.8 in the debops-task script.
  • Fixed issues with debops-defaults script encoding output to stdin of a different process vs output to a pipe.

debops.ansible_plugins role

  • The ldap_attrs Ansible module has been fixed to work correctly in a Python 3.x environment.

debops.dnsmasq role

  • Don't open the 67/tcp port for BOOTP protocol, its definition has been removed from the /etc/services file in Debian Buster.

debops.ldap role

debops v1.0.7 - 2019-08-09

Changed

General

  • Small code cleanup in the debops-init and setup.py scripts.

LDAP

  • Change the regexp pattern used to create the LDAP BaseDN value.

debops.dokuwiki role

  • Make git-based installation steps resilient by retrying failed repository clones in case of timeouts.

debops.redis_server role

  • Change the default mode of runtime directories from 2755 to 755 to avoid warning messages from systemd about mismatched directory mode.

debops.reprepro role

  • Don't set Components or UDebComponents options if they are not explicitly defined in the configuration.

debops.samba role

  • Change the default value of the map to guest option from bad user to never which should help resolve issues when users connect to the Samba server with incorrect credentials.

Fixed

Docker

  • Set the $USER variable in Docker container environment. This variable is required by some DebOps roles but is not set by default by Docker.

User management

  • Remove the append parameter from tasks in the debops.system_users and the debops.users roles that don't use it to avoid clashes with the local parameter.

debops.lvm role

  • Make sure logical volumes will only be shrinked when volume item defines force: yes.

debops.nsswitch role

  • Don't restart systemd-logind service when the playbook is run against localhost, to avoid breaking existing user sessions, which might require a reboot to fix.

debops.root_account role

  • Include missing "group' and "host" authorized keys variables in the authorized_key task.

debops.sshd role

  • Don't stop the playbook if the host SSH keys don't exist yet (OpenSSH service was not installed on localhost before).
  • Make sure that the /run/sshd directory exists on first install, otherwise the configuration test breaks.
  • Fix off-by-one error in role tasks that manage the /etc/ssh/moduli file contents.

debops.sysctl role

  • Don't use special configuration for containers to determine what kernel parameters can be modified. The role will rely on its own Ansible local facts for that.

debops v1.0.6 - 2019-07-26

Changed

Continuous Integration

  • The Travis-CI tests will be done using Python 3.7 only. Python 2.7 support will be dropped in 2020, it's time to prepare.

General

  • Add the become: True parameter to the bootstrap playbooks to improve usability.

debops.docker role

  • Use correct dockerd path in the systemd service unit on Debian Buster.

debops.mariadb_server role

  • The role will no longer set a custom MariaDB root password, because the mysql_user Ansible 2.8 module breaks access to the MariaDB database via the UNIX root account by removing the unix_socket plugin access and not setting the mysql_native_password plugin. A password for the UNIX root account is not needed in the recent MariaDB releases in Debian, therefore this shouldn't impact the usage.

    The mysql_user Ansible module lacks a way to control the authentication plugin for a given MariaDB account, therefore it's not advisable to mess with the root access to the database.

debops.netbox role

  • The role has been updated to NetBox version v2.6.1. Redis service is now required for NetBox; it can be installed separately via the debops.redis_server Ansible role.

    This change was backported because without it, the NetBox installation using DebOps stable-1.0 branch is broken.

debops.nginx role

  • Change the default names of the PHP status and ping pages to /status.php and /ping.php to make them compatible with the default PHP security.limit_extensions configuration.

debops.php role

  • Expand the list of APT packages preferred from the Sury repository when it is enabled.

debops.reprepro role

  • Update Debian codenames and suites after Debian Buster release.

Fixed

debops.icinga role

  • Don't include the /etc/icinga2/repository.d/ directory in Icinga 2.8.0+ configuration.

debops.ldap role

  • Ensure that when LDAP SRV record lookup returns NODATA, role falls back to the static FQDN. This might happen when wildcard DNS records are configured on a given domain.

debops.libvirtd role

  • Fix Ansible local fact script execution on Python 3.

debops v1.0.5 - 2019-07-12

Changed

debops.apt role

  • The Debian and Raspbian suites have been updated to reflect the release of Debian Buster. Congratulations!

debops.dovecot role

  • Expose the configuration of the Sieve directory and configuration file via role default variables.

debops.netbase role

  • Do not try to manage the hostname in LXC, Docker or OpenVZ containers by default. We assume that these containers are unprivileged and their hostname cannot be changed from the inside of the container.

debops.nslcd role

  • Remove comments from the PAM configuration file to stop the pam-auth-update script from complaining about them.

debops.sudo role

  • Configure the sudo LDAP support before installing the sudo-ldap APT package to ensure that access to the root account is available.

Fixed

debops.elasticsearch role

  • Divert the sysctl configuration file that comes with the Elasticsearch .deb package to fix use of the sysctl --system command inside containers. The configuration will be applied by the debops.sysctl role instead.

debops.ldap role

  • Avoid gathering MAC addresses from network interfaces that do not have them, for example interfaces with multiple IPv4 addresses.

debops.redis_server role

  • Fix deployment of Redis Server without a password set.

debops.sudo role

  • Allow the dpkg command to remove the sudo APT package even if the root password is not set (required for installing the sudo-ldap APT package).

debops v1.0.4 - 2019-06-25

Added

LDAP

  • The ldap/init-directory.yml Ansible playbook will create an LDAP group object for SSH users, equivalent to the sshusers group created by the debops.system_groups role. LDAP accounts in this group will be able to access SSH service from any host. Existing installations might need to be updated manually to fix UID/GID or LDAP DN conflicts.

Fixed

General

  • The role dependencies defined in the meta/main.yml files in roles published in the Ansible Galaxy Collection will have their debops. prefix removed to make the roles usable.

debops.core role

  • Fix Python 3.x compatibility in the core.fact script.

debops.dnsmasq role

  • Fix configuration of external boot servers in the dnsmasq service, and work around the issue with ipaddr filter in Ansible 2.8 in the debops.dnsmasq role.

debops v1.0.3 - 2019-06-21

Fixed

debops.apt_install role

  • The role will not disable needrestart kernel hints if the needrestart APT package installation is disabled. This fixes an issue with the /etc/needrestart/conf.d/ directory not being present on the host.

debops.gitlab_runner role

  • Fix typo in the configuration template.

debops.postgresql_server role

  • Fix usage of the Ansible --check mode with the role::postgresql_server:config tag to allow checking configuration changes before applying them.

Removed

debops.lxc role

  • Implement a workaround for the issue of the ipaddr Ansible filter incorrectly interpreting index numbers specified as strings in Ansible v2.8.x, used in the /etc/default/lxc-net.j2 template.

debops v1.0.2 - 2019-05-31

Fixed

User management

  • Fix idempotency issue with yadm updating repositories on newer OS releases with changed git output. The roles will also work without yadm installed when user accounts have dotfiles enabled explicitly.

debops.nginx role

  • Allow empty item.name parameter which tells the role to not include a server_name option in a nginx server configuration.

debops v1.0.1 - 2019-05-23

Changed

debops.nsswitch role

  • Don't restart the systemd-logind service on /etc/nsswitch.conf file changes if DebOps is running against localhost, to avoid breaking the existing user session.

debops.system_users role

  • Use a custom script to get current Ansible user information because the getent Ansible module does not work on Apple macOS.

debops v1.0.0 - 2019-05-22

Added

New DebOps roles

  • The debops.docker_registry role provides support for Docker Registry. The role can be used as standalone or as a backend for the GitLab Container Registry service, with debops.gitlab role.
  • The debops.ldap role sets up the system-wide LDAP configuration on a host, and is used as the API to the LDAP directory by other Ansible roles, playbooks, and users via Ansible inventory. The role is included in the common.yml playbook, but is disabled by default.
  • The debops.nslcd role can be used to configure LDAP lookups for NSS and PAM services on a Linux host.
  • The debops.pam_access role manages PAM access control files located in the /etc/security/ directory. The role is designed to allow other Ansible roles to easily manage their own PAM access rules.
  • The debops.yadm role installs the Yet Another Dotfiles Manager script and ensures that additional shells are available. It can also mirror dotfiles locally. The role is included in the common playbook.
  • The debops.system_users role replaces the debops.bootstrap role and is used to manage the local system administrator accounts. It is included in the common.yml playbook as well as the bootstrap playbooks.

General

  • The DebOps project has been registered in the IANA Private Enterprise Numbers registry, with PEN number 53622. The project documentation contains an OID registry to track custom LDAP schemas, among other things.
  • Support for Ansible Collections managed by the Mazer Content Manager has been implemented in the repository. Ansible Collections will be usable after June 2019, when support for them is enabled in the Ansible Galaxy service.

LDAP

  • A new bootstrap-ldap.yml Ansible playbook can be used to bootstrap Debian/Ubuntu hosts with LDAP support enabled by default. The playbook will configure only the services required for secure LDAP access (PKI, SSH, PAM/NSS), the rest should be configured using the common playbook.

debops.ansible_plugins role

  • A new ldap_attrs Ansible module has been added to the role. It's a replacement for the ldap_attr core Ansible module, that's more in line with the ldap_entry module. Used by the debops.slapd and debops.ldap roles to manage the LDAP directory contents.

debops.apt role

  • Systems with the End of Life Debian releases (wheezy) installed will be configured to use the Debian Archive repository as the main APT sources instead of the normal Debian repository mirrors. These releases have been moved out of the main repositories and are not fully available through normal means. The periodic updates of the APT archive repositories on these systems will be disabled via the debops.unattended_upgrades role, since the EOL releases no longer receive updates.

    The Debian LTS release (jessie) APT repository sources will use only the main and security repositories, without updates or backports. See the information about the Debian LTS support for more details.

debops.lxc role

  • Users can now disable default route advertisement in the lxc-net DHCP service. This is useful in cases where LXC containers have multiple network interfaces and the default route should go through a different gateway than the LXC host.
  • The lxc-new-unprivileged script will add missing network interface stanzas in the container's /etc/network/interfaces file, by default with DHCP configuration. This will happen only on the initialization of the new container, when a given LXC container has multiple network interfaces defined in its configuration file.

debops.nginx role

  • The role will automatically generate configuration which redirects short hostnames or subdomains to their FQDN equivalents. This allows HTTP clients to reach websites by specifying their short names via DNS suffixes from /etc/resolv.conf file, or using *.local domain names managed by Avahi/mDNS to redirect HTTP clients to the correct FQDNs.

debops.resources role

  • Some lists can now configure ACL entries on the destination files or directories using the item.acl parameter. Take a look to ACL support section to have the list of compatibles variables.
  • New resources__commands variables can be used to define simple shell commands or scripts that will be executed at the end of the debops.resources role. Useful to start new services, but it shouldn't be used as a replacement for a fully-fledged Ansible roles.

debops.sudo role

  • The role is now integrated with the debops.ldap Ansible role and can configure the sudo service to read sudoers configuration from the LDAP directory.

debops.users role

  • The role can now configure UNIX accounts with access restricted to SFTP operations (SFTPonly) with the new item.chroot parameter. This is a replacement for the debops.sftpusers role.

Changed

Updates of upstream application versions

  • The debops.gitlab role will install GitLab 11.10 on supported platforms (Debian Buster, Ubuntu Bionic), existing installations will be upgraded.
  • In the debops.phpipam role, the relevant inventory variables have been renamed, check the Upgrade notes for details. The role now uses the upstream phpIPAM repository and it installs version 1.3.2.
  • In the debops.php role, because of the PHP 7.0 release status changed to End of life at the beginning of 2019, Ondřej Surý APT repository with PHP 7.2 packages will be enabled by default on Debian Jessie and Stretch as well as Ubuntu Trusty and Xenial. Existing debops.php installations shouldn't be affected, but the role will not try to upgrade the PHP version either. Users should consider upgrading the packages manually or reinstalling services from scratch with the newer version used by default.
  • In the debops.rstudio_server role, the supported version has been updated to v1.2.1335. The role no longer installs libssl1.0.0 from Debian Jessie on Debian Stretch, since the current version of the RStudio Server works in the default Stretch environment. The downloaded .deb package will be verified using the RStudio Inc. GPG signing key before installation.
  • In the debops.docker_gen role, the docker-gen version that this role installs by default has been updated to version 0.7.4. This release notably adds IPv6 and docker network support.

General

  • The debops.cron role will be applied much earlier in the common.yml playbook because the debops.pki role depends on presence of the cron daemon on the host.
  • Bash scripts and shell/command Ansible modules now use relative bash interpreter instead of an absolute /bin/bash. This should help make the DebOps roles more portable, and prepare the project for the merged /bin and /usr/bin directories in a future Debian release.

Mail Transport Agents

  • The /etc/mailname configuration file will contain the DNS domain of a host instead of the FQDN address. This will result in the mail senders that don't specify the domain part to have the DNS domain, instead of the full host address, added by the Mail Transport Agent. This configuration should work better in clustered environments, where there is a central mail hub/MX that receives the mail and redirects it.

debops.gitlab role

  • The GitLab playbook will import the debops.docker_registry playbook to ensure that configuration related to Docker Registry defined in the GitLab service is properly applied during installation/management.

debops.lxc role

  • The lxc-prepare-ssh script will read the public SSH keys from specific files (root key file, and the $SUDO_USER key file) and will not accept any custom files to read from, to avoid possible security issues. Each public SSH key listed in the key files is validated before being added to the container's root account.

    The lxc-new-unprivileged script will similarly not accept any custom files as initial LXC container configuration to fix any potential security holes when used via sudo. The default LXC configuration file used by the script can be configured in /etc/lxc/lxc.conf configuration file.

debops.mariadb_server role

  • The MariaDB user root is no longer dropped. This user is used for database maintenance and authenticates using the unix_auth plugin. However, DebOps still maintains and sets a password for the root UNIX account, stored in the /root/.my.cnf config file.

debops.netbase role

  • The role will be disabled by default in Docker containers. In this environment, the /etc/hosts file is managed by Docker and cannot be modified from inside of the container.

debops.owncloud role

  • The role will not perform any tasks related to occ command if the automatic setup is disabled in the owncloud__autosetup variable. In this mode, the occ tasks cannot be performed by the role because the ownCloud/Nextcloud installation is not finished. The users are expected to perform necessary tasks themselves if they decide to opt-out from the automatic configuration.

debops.php role

  • The PHP version detection has been redesigned to use the apt-cache madison command to find the available versions. The role will now check the current version of the php APT package to select the available stable PHP version. This unfortunately breaks support for the php5 packages, but the php5.6 packages from Ondřej Surý APT repository work fine.

  • The role will install the composer command from the upstream GitHub repository on older OS releases, including Debian Stretch (current Stable release). This is due to incompatibility of the composer APT package included in Debian Stretch and PHP 7.3.

    The custom composer command installation tasks have been removed from the debops.roundcube and debops.librenms roles, since debops.php will take care of the installation.

debops.root_account role

  • If the debops.ldap Ansible role has been applied on a host, the debops.root_account role will use the UID/GID ranges defined by it, which include UIDs/GIDs used in the LDAP directory, to define subUID/subGID range of the root account. This allows usage of the LDAP directory as a source of UNIX accounts and groups in unprivileged containers. Existing systems will not be changed.
  • Management of the root dotfiles has been removed from the debops.users role and is now done in the debops.root_account role, using the yadm script. Users might need to clean out the existing dotfiles if they were managed as symlinks, otherwise yadm script will not be able to correctly deploy the new dotfiles.

debops.slapd role

  • The role has been redesigned from the ground up, with support for N-Way Multi-Master replication, custom LDAP schemas, Password Policy and other functionality. The role uses custom ldap_attrs Ansible module included in the debops.ansible_plugins role for OpenLDAP management.

    The OpenLDAP configuration will definitely break on existing installations. It's best to set up a new OpenLDAP server (or replicated cluster) and import the LDAP directory to it afterwards. See role documentation for more details.

debops.sshd role

  • The access control based on UNIX groups defined in the /etc/ssh/sshd_config file has been removed. Instead, the OpenSSH server uses the PAM access control configuration, managed by the debops.pam_access Ansible role, to control access by users/groups/origins. OpenSSH service uses its own access control file, separate from the global /etc/security/access.conf file.

  • The role will enable client address resolving using DNS by setting the UseDNS yes option in OpenSSH server configuration. This parameter is disabled by default in Debian and upstream, however it is required for the domain-based access control rules to work as expected.

  • When the LDAP support is configured on a host by the debops.ldap role, the debops.sshd role will use the resulting infrastructure to connect to the LDAP directory and create the sshd LDAP account object for each host, used for lookups of the SSH keys in the directory. The SSH host public keys will be automatically added or updated in the LDAP device object to allow for centralized generation of the ~/.ssh/known_hosts files based on the data stored in LDAP.

    The role will no longer create a separate sshd-lookup UNIX account to perform LDAP lookups; the existing sshd UNIX account will be used instead. The ldapsearch command used for lookups will default to LDAP over TLS connections instead of LDAPS.

debops.system_groups role

  • If the LDAP support is enabled on a host via the debops.ldap role, the UNIX system groups created by the debops.system_groups role by default will use a _ prefix to make them separate from any LDAP-based groups of the same name. Existing installations should be unaffected, as long as the updated debops.system_groups role was applied before the debops.ldap role.

debops.unattended_upgrades role

  • The packages from the stable-updates APT repository section will be automatically upgraded by default, the same as the packages from Debian Security repository. This should cover important non-security related upgrades, such as timezone changes, antivirus database changes, and similar.
  • If automatic reboots are enabled, VMs will not reboot all at the same time to avoid high load on the hypervisor host. Instead they will reboot at a particular minute in a 15 minute time window. For each host, a random but random-but-idempotent time is chosen. For hypervisor hosts good presets cannot be picked. You should ensure that hosts don’t reboot at the same time by defining different reboot times in inventory groups.

debops.users role

  • The management of the user dotfiles in the debops.users role has been redesigned and now uses the yadm script to perform the actual deployment. See debops.yadm for details about installing the script and creating local dotfile mirrors. The users__accounts variable documentation contains examples of new dotfile definitions.

  • The role now uses the libuser library via the Ansible group and user modules to manage local groups and accounts. This should avoid issues with groups and accounts created in the LDAP user/group ranges.

    The libuser library by default creates home directories with 0700 permissions, which is probably too restrictive. Because of that, the role will automatically change the home directory permissions to 0751 (defined in the users__default_home_mode variable). This also affects existing UNIX accounts managed by the role; the mode can be overriden using the item.home_mode parameter.

  • The users__*_resources variables have been reimplemented as the item.resources parameter of the users__*_accounts variables. This removes the unnecessary split between user account definitions and definitions of their files/directories.

Removed

Roles removed from DebOps

  • The debops.sftpusers Ansible role has been removed. Its functionality is now implemented by the debops.users role, custom bind mounts can be defined using the debops.mount role.
  • The debops.bootstrap Ansible role has been removed. Its replacement is the debops.system_users which is used to manage system administrator accounts, via the common.yml playbook and the bootstrap playbooks.

debops.auth role

  • The /etc/ldap/ldap.conf file configuration, nslcd service configuration and related variables have been removed from the debops.auth role. This functionality is now available in the debops.ldap and debops.nslcd roles, which manage the client-side LDAP support.

debops.rstudio_server role

  • The role will no longer install the historical libssl1.0.0 APT package on Debian Stretch to support older RStudio Server releases. You should remove it on the existing installations after RStudio Server is upgraded to the newest release.

Fixed

debops.authorized_keys role

  • Set the group for authorized_keys files to the primary group of the user instead of the group with the same name as the user. This is important because otherwise the readonly mode of the role does not work when the primary group of a user has a different name then the username.

debops.lvm role

  • Make sure a file system is created by default when the mount parameter is defined in the lvm__logical_volumes.
  • Stop and disable lvm2-lvmetad.socket systemd unit when disabling lvm__global_use_lvmetad to avoid warning message when invoking LVM commands.

debops.redis_server role

  • Use the redis.conf file to lookup passwords via the redis-password script. This file has the redis-auth UNIX group and any accounts in this group should now be able to look up the Redis passwords correctly.

debops.slapd role

  • The role will check if the X.509 certificate and the private key used for TLS communication were correctly configured in the OpenLDAP server. This fixes an issue where configuration of the private key and certificate was not performed at all, without any actual changes in the service, with subsequent task exiting with an error due to misconfiguration.

Security

debops.php role

  • Ondřej Surý created new APT signing keys for his Debian APT repository with PHP packages, due to security concerns. The debops.php role will remove the old APT GPG key and add the new one automatically.

debops v0.8.1 - 2019-02-02

Added

New DebOps roles

  • The debops.redis_server and debops.redis_sentinel roles, that replace the existing debops.redis Ansible role. The new roles support multiple Redis and Sentinel instances on a single host.
  • The debops.freeradius role can be used to manage FreeRADIUS service, used in network management.
  • The debops.dhcp_probe role can be used to install and configure dhcp_probe service, which passively detects rogue DHCP servers.
  • The debops.mount role allows configuration of /etc/fstab entries for local devices, bind mounts and can be used to create or modify directories, to permit access to resources by different applications. The role is included by default in the common.yml playbook.

Continuous Integration

  • Ansible roles included in DebOps are now checked using ansible-lint tool. All existing issues found by the script have been fixed.
  • The hosts managed by the DebOps Vagrant environment will now use Avahi to detect multiple cluster nodes and generate host records in the /etc/hosts database on these nodes. This allows usage of real DNS FQDNs and hostnames in the test environment without reliance on an external DHCP/DNS services.

General

  • DebOps roles are now tagged with skip::<role_name> Ansible tags. You can use these tags to skip roles without any side-effects; for example "<role_name>/env" sub-roles will still run so that roles that depend on them will work as expected.
  • You can use the make versions command in the root of the DebOps monorepo to check currently "pinned" and upstream versions of third-party software installed and managed by DebOps, usually via git repositories. This requires the uscan command from the Debian devscripts APT package to be present.

debops.ifupdown role

  • The role will now generate configuration for the debops.sysctl role and use it in the playbook as a dependency, to configure kernel parameters related to packet forwarding on managed network interfaces. This functionality replaces centralized configuration of packet forwarding on all network interfaces done by the debops.ferm role.

debops.lxc role

  • New lxc-hwaddr-static script can be used to easily generate random but predictable MAC addresses for LXC containers.

    The script can be run manually or executed as a "pre-start" LXC hook to configure static MAC addresses automatically - this usage is enabled by default via common LXC container configuration.

  • The lxc_ssh.py Ansible connection plugin is now included by default in DebOps. This connection plugin can be used to manage remote LXC containers with Ansible via SSH and the lxc-attach command. This requires connection to the LXC host and the LXC container via the root account directly, which is supported by the DebOps playbooks and roles.

  • The role can now manage LXC containers, again. This time the functionality is implemented using the lxc_container Ansible module instead of a series of shell tasks. By default unprivileged LXC containers will be created, but users can change all parameters supported by the module.

  • The role will now configure a lxcbr0 bridge with internal DNS/DHCP server for LXC containers, using the lxc-net service. With this change, use of the debops.ifupdown role to prepare a default bridge for LXC containers is not required anymore.

debops.netbase role

  • When a large number of hosts is defined for the /etc/hosts database, the role will switch to generating the file using the template Ansible module instead of managing individual lines using the lineinfile module, to make the operation faster. As a result, custom modifications done by other tools in the host database will not be preserved.
  • The role can now configure the hostname in the /etc/hostname file, as well as the local domain configuration in /etc/hosts database.

debops.php role

  • The role will install the composer APT package on Debian Stretch, Ubuntu Xenial and their respective newer OS releases.

debops.root_account role

  • The role will reserve a set of UID/GID ranges for subordinate UIDs/GIDs owned by the root account (they are not reserved by default). This can be used to create unprivileged LXC containers owned by root. See the release notes for potential issues on existing systems.
  • You can now configure the state and contents of the /root/.ssh/authorized_keys file using the debops.root_account role, with support for global, per inventory group and per host SSH keys.

debops.users role

  • The role can now configure ACL entries of the user home directories using the item.home_acl parameter. This can be used for more elaborate access restrictions.

Changed

Continuous Integration

  • The test suite will now check POSIX shell scripts along with Bash scripts for any issues via the shellcheck linter. Outstanding issues found in existing scripts have been fixed.

General

  • The debops.root_account role will be executed earlier in the common.yml Ansible playbook to ensure that the root UID/GID ranges are reserved without issues on the initial host configuration.
  • Various filter and lookup Ansible plugins have been migrated from the playbook directory to the debops.ansible_plugins role. This role can be used as hard dependency in other Ansible roles that rely on these plugins.
  • The order of the roles in the common playbook has been changed; the debops.users role will be applied before the debops.resources role to allow for resources owned by UNIX accounts/groups other than root.
  • The debops Python package has dropped the hard dependency on Ansible. This allows DebOps to be installed in a separate environment than Ansible, allowing for example to mix Homebrew Ansible with DebOps from PyPI on macOS. The installation instructions have also been updated to reflect the change.
  • The debops-init script will now generate new Ansible inventory files using the hostname as well as a host FQDN to better promote the use of DNS records in Ansible inventory.

debops.dnsmasq role

  • The role has been redesigned from the ground up with new configuration pipeline, support for multiple subdomains and better default configuration. See the debops.dnsmasq role documentation as well as the Upgrade notes for more details.

debops.docker role

  • If the Docker host uses a local nameserver, for example dnsmasq or unbound, Docker containers might have misconfigured DNS nameserver in /etc/resolv.conf pointing to 127.0.0.1. In these cases, the debops.docker role will configure Docker to use the upstream nameservers from the host, managed by the resolvconf APT package.

    If no upstream nameservers are available, the role will not configure any nameserver and search parameters, which will tell Docker to use the Google nameservers.

debops.gitlab role

  • The role will now install GitLab 10.8 by default, on Debian Stretch and Ubuntu Xenial. The 11.x release now requires Ruby 2.4+, therefore it will only be installed on newer OS releases (Debian Buster, Ubuntu Bionic).

  • The role has been updated to use Ansible local facts managed by the debops.redis_server Ansible role. Redis Server support has been removed from the GitLab playbook and needs to be explicitly enabled in the inventory for GitLab to be installed correctly. This will allow to select between local Server or Sentinel instance, to support clustered environments.

    Check the Upgrade notes for issues with upgrading Redis Server support on existing GitLab hosts.

debops.grub role

  • The GRUB configuration has been redesigned, role now uses merged variables to make configuration via Ansible inventory or dependent role variables easier. The GRUB configuration is now stored in the /etc/default/grub.d/ directory to allow for easier integration with other software. See the debops.grub documentation for more details.
  • The user password storage path in secret/ directory has been changed to use the inventory_hostname variable instead of the ansible_fqdn variable. This change will force regeneration of password hashes in existing installations, but shouldn't affect host access (passwords stay the same).

debops.gunicorn role

  • The role depends on debops.python now to install the required packages. Please update your custom playbooks accordingly.

debops.ipxe role

  • The role will no longer install non-free firmware by default. This is done to solve the connectivity issues with cdimage.debian.org host.

debops.librenms role

  • The default dashboard in LibreNMS is changed from the pages/front/default.php to pages/front/tiles.php which allows for better customization.

debops.lxc role

  • The role will configure the default subUIDs and subGIDs for unprivileged LXC containers based on the configured subordinate UID/GID ranges for the root account.
  • The lxc-prepare-ssh script will now install SSH public keys from the user account that is running the script via sudo instead of the system's root account, which is usually what you want to do if other people manage their own LXC containers on a host.
  • The LXC configuration managed by the role will use the systemd lxc@.service instances to manage the containers instead of using the lxc-* commands directly. This allows the containers to be shut down properly without hitting a timeout and forced killing of container processes.

debops.owncloud role

  • The role will now use Ansible facts managed by the debops.redis_server role to configure Redis support.
  • Drop support for Nextcloud 12.0 which is EOF. Add support for Nextcloud 14.0 and 15.0 and make Nextcloud 14.0 the default Nextcloud version.

debops.netbase role

  • The hostname and domain configuration during bootstrapping is now done by the debops.netbase Ansible role. The default for this role is to remove the 127.0.1.1 host entry from the /etc/hosts file to ensure that domain resolution relies on DNS.

    If you are using local domain configured in /etc/hosts file, you should define the netbase__domain variable in the Ansible inventory with your desired domain.

  • The role is redesigned to use list variables instead of YAML dictionaries for the /etc/hosts database. This allows for adding the host IPv4 and/or IPv6 addresses defined by Ansible facts when the custom local domain is enabled. See netbase__hosts for details. The role has also been included in the common.yml playbook to ensure that the host database is up to date as soon as possible.

debops.resources role

  • Changed behaviour of used groups for templating. Now all groups the host is in, will be used to search for template files. Read the documentation about resources__templates for more details on templating with debops.

Fixed

debops.grub role

  • The role should now correctly revert custom patch to allow user authentication in /etc/grub.d/10_linux script, when the user list is empty.

debops.kmod role

  • The role should now work correctly in Ansible --check mode before the Ansible local fact script is installed.

debops.sysctl role

  • The role should correctly handle nested lists in role dependent variables, which are now flattened before being passed to the configuration filter.

Removed

Roles removed from DebOps

  • The old debops.redis Ansible role has been removed. It has been replaced by the debops.redis_server and debops.redis_sentinel Ansible roles. The new roles use their own Ansible inventory groups, therefore they will need to be explicitly enabled to affect existing hosts.

    You can use the debops.debops_legacy Ansible role to clean up old configuration files, directories and diversions of debops.redis role from remote hosts.

General

  • The ldap_entry and ldap_attr Ansible modules have been removed. They are now included in Ansible core, there's no need to keep a separate copy in the playbook.

debops.core role

  • The ansible_local.root.flags and ansible_local.root.uuid local facts have been removed. They are replaced by ansible_local.tags and ansible_local.uuid local facts, respectively.

debops.dhcpd role

debops.ferm role

  • Automated configuration of packet forwarding with FORWARD chain rules and sysctl configuration has been removed from the role. Per-interface packet forwarding is now configurable using the debops.ifupdown role, and you can still use the debops.ferm and debops.sysctl roles to design custom forwarding configuration.

    Support for this mechanism has also been removed from related roles like debops.libvirtd and debops.lxc.

debops.netbase role

  • The hostname and domain configuration has been removed from the debops.bootstrap role. This functionality is now handled by the debops.netbase role, which has been included in the bootstrap playbook. The relevant inventory variables have been renamed, check the Upgrade notes for details.

debops.resources role

  • The resources__group_name variable has been removed in favor of using all the groups the current hosts is in. This change has been reflected in the updated variable resources__group_templates.

debops v0.8.0 - 2018-08-06

Added

New DebOps roles

  • The debops.netbase role: manage local host and network database in /etc/hosts and /etc/networks files.
  • The debops.sudo role: install and manage sudo configuration on a host. The role is included in the common.yml playbook.
  • The debops.system_groups role: configure UNIX system groups used on DebOps hosts. The role is included in the common.yml playbook.
  • The debops.debops_legacy role: clean up legacy files, directories, APT packages or dpkg-divert diversions created by DebOps but no longer used. This role needs to be executed manually, it's not included in the main playbook.
  • The debops.python role: manage Python environment, with support for multiple Python versions used at the same time. The role is included in the common.yml playbook.
  • Icinga 2 support has been implemented with debops.icinga, debops.icinga_db and debops.icinga_web Ansible roles.

General

  • The DebOps installation now depends on the dnspython Python library. This allows usage of the dig Ansible lookup plugin in DebOps roles to gather data via DNS SRV records.
  • The DebOps installation now depends on the future Python library which provides compatibility between Python 2.7 and Python 3.x environments. It is currently used in the custom Ansible filter plugin provided by DebOps, but its use will be extended to other scripts in the future to make the code more readable.

debops.dhparam role

  • The role will set up a systemd timer to regenerate Diffie-Hellman parameters periodically if it's available. The timer will use random delay time, up to 12h, to help with mass DHparam generation in multiple LXC containers/VMs.

debops.nginx role

  • A default set of SSL ciphers can be specified using the nginx_default_ssl_ciphers variable. This disables the ssl_ciphers option in the nginx configuration and forces the server to use the defaults provided by the OS.

debops.ntp role

  • The OpenNTPD service will now properly integrate the ifupdown hook script with systemd. During boot, NTP daemon will be started once network interfaces are configured and will not restart multiple times on each network interface change.

debops.resources role

  • The role can now generate custom files using templates, based on a directory structure. See resources__templates for more details.

debops.sudo role

  • You can now manage configuration files located in the /etc/sudoers.d/ directory using sudo__*_sudoers inventory variables, with multiple level of conditional options.

debops.users role

  • Selected UNIX accounts can now be configured to linger when not logged in via the item.linger parameter. This allows these accounts to maintain long-running services when not logged in via their own private systemd instances.

Changed

General

  • Some of the existing DebOps Policies and Guidelines have been reorganized and the concept of DebOps Enhancement Proposals (DEPs) is introduced, inspired by the Python Enhancement Proposals.
  • The debops script can now parse multiple playbook names specified in any order instead of just looking at the first argument passed to it.

debops.apt_install role

  • The editor alternative symlink configuration has been moved from the debops.console role to the debops.apt_install role which also installs vim by default.

debops.apt_mark role

  • The configuration of automatic removal of APT packages installed via Recommends: or Suggests: dependencies has been moved from the debops.apt role to the debops.apt_mark role which more closely reflects its intended purpose. Variable names and their default values changed; see the Upgrade notes for more details.

debops.core role

  • The role will add any new administrator accounts to the list of existing admin accounts instead of replacing them in the Ansible local fact script. This should allow for multiple administrators to easily coexist and run the DebOps playbooks/roles from their own accounts without issues.

debops.gitlab role

  • Redesign the GitLab version management to read the versions of various components from the GitLab repository files instead of managing them manually in a YAML dictionary. The new gitlab__release variable is used to specify desired GitLab version to install/manage.
  • The gitaly service will be installed using the git UNIX account instead of root. Existing installations might require additional manual cleanup; see the Upgrade notes for details.
  • The role now supports installation of GitLab 10.7.
  • The usage of gitlab__fqdn variable is revamped a bit - it's now used as the main variable that defines the GitLab installation FQDN. You might need to update the Ansible inventory if you changed the value of the gitlab_domain variable used previously for this purpose.

debops.ifupdown role

  • The debops.kmod role is added as a dependency. The debops.ifupdown role will generate modprobe configuration based on the type of configured network interfaces (bridges, VLANs, bonding) and the kernel modules will be automatically loaded if missing.

debops.lxc role

  • Redesign system-wide LXC configuration to use list of YAML dictionaries merged together instead of custom Jinja templates.
  • Add lxc-prepare-ssh script on the LXC hosts that can be used to install OpenSSH and add the user's SSH authorized keys inside of the LXC containers. This is a new way to prepare the LXC containers for Ansible/DebOps management that doesn't require custom LXC template scripts and can be used with different LXC container types.

debops.mariadb_server role

  • The MariaDB/MySQL server and client will now use the utf8mb4 encoding by default instead of the utf8 which is an internal MySQL character encoding. This might impact existing databases, see the Upgrade notes for details.

debops.nodejs role

  • The NPM version installed by the role from GitHub is changed from v5.4.2 to latest which seems to be an equivalent of a stable branch.

  • Recent versions of NPM require NodeJS 6.0.0+ and don't work with other releases. Because of that the newest NPM release is not installable on hosts that use NodeJS packages from older OS releases.

    The debops.nodejs role will install NPM v5.10.0 version in this case to allow NPM to work correctly - on Debian Jessie, Stretch and Ubuntu Xenial. Otherwise, a NPM from the latest branch will be installed, as before.

  • Instead of NodeJS 6.x release, the role will now install NodeJS 8.x release upstream APT packages by default. This is due to the NodeJS 6.x release switching to a Maintenance LTS mode. NodeJS 8.x will be supported as a LTS release until April 2019.

  • The role will install upstream NodeSource APT packages by default. This is due to no security support in Debian Stable, therefore an upstream packages should be considered more secure. The upstream NodeJS packages include a compatible NPM release, therefore it won't be separately installed from GitHub.

    The existing installations shouldn't be affected, since the role will select OS/upstream package versions based on existing Ansible local facts.

debops.owncloud role

  • Support Nextcloud 13 and partially ownCloud 10. Nextcloud 11 and ownCloud 9.1 are EOL, you should update. The role can help you with the update to ensure that everything works smoothly with the new versions. Currently, the role can not do the update for you.

debops.sshd role

  • The role will now check the debops.system_groups Ansible local facts to define what UNIX groups are allowed to connect to the host via the SSH service.

debops.unattended_upgrades role

  • On hosts without a domain set, the role enabled all upgrades, not just security updates. This will not happen anymore, the security updates are enabled everywhere by default, you need to enable all upgrades specifically via the unattended_upgrades__release variable.

Removed

debops.apt_install role

  • Don't install the sudo package by default, this is now done via a separate debops.sudo role to easily support switching to the sudo-ldap APT package.

debops.auth role

  • Remove configuration of UNIX system groups and accounts in the admins UNIX group. This is now done by the debops.system_groups Ansible role.

debops.console role

  • Remove support for copying custom files from the role. This functionality is covered better by the debops.resources role.
  • Remove support for managing entries in the /etc/hosts database. This is now covered by the debops.netbase Ansible role.

debops.bootstrap role

  • The sudo configuration has been removed from the debops.bootstrap role. The bootstrap.yml playbook now includes the debops.sudo role which configures sudo service.
  • The UNIX system group management has been removed from the role, the bootstrap.yml playbook now uses the debops.system_groups role to create the UNIX groups used by DebOps during bootstrapping.
  • Remove management of Python packages from the role. The bootstrap.yml playbook uses the debops.python role to configure Python support on the host.

debops.lxc role

  • Remove support for direct LXC container management from the role. This functionality is better suited for other tools like lxc-* set of commands, or the Ansible lxc_container module which should be used in custom playbooks. The 'debops.lxc' role focus should be configuration of LXC support on a host.
  • Remove custom LXC template support. The LXC containers can be created by the normal templates provided by the lxc package, and then configured using DebOps roles as usual.

debops.postgresql_server role

  • The tasks that modified the default template1 database and its schema have been removed to make the PostgreSQL installation more compatible with applications packaged in Debian that rely on the PostgreSQL service. See the relevant commit for more details. Existing installations shouldn't be affected.

debops v0.7.2 - 2018-03-28

Fixed

General

  • Add missing python-ldap dependency as an APT package in the Dockerfile.

debops v0.7.1 - 2018-03-28

Added

New DebOps roles

  • The debops.ansible role: install Ansible on a Debian/Ubuntu host using Ansible. The debops.debops role now uses the new role to install Ansible instead of doing it directly.
  • The debops.apt_mark role: set install state of APT packages (manual/auto) or specify that particular packages should be held in their current state. The role is included in the common.yml playbook.
  • The debops.kmod role: manage kernel module configuration and module loading at boot time. This role replaces the debops-contrib.kernel_module role.
  • The debops-contrib.etckeeper role has been integrated into DebOps as debops.etckeeper. The new role is included in the common.yml playbook.

debops.ifupdown role

  • The role has new tasks that manage custom hooks in other services. First hook is The filter-dhcp-options hook which can be used to selectively apply DHCP options per network interface.

Changed

Continuous Integration

  • The test suite used on Travis-CI now checks the syntax of the YAML files, as well as Python and shell scripts included in the repository. The syntax is checked using the yamllint, pycodestyle and shellcheck scripts, respectively. Tests can also be invoked separately via the make command.

debops.etherpad role

  • The role can now autodetect and use a PostgreSQL database as a backend database for Etherpad.

debops.ferm role

  • The role should now correctly detect what Internet Protocols are available on a host (IPv4, IPv6) and configure firewall only for the protocols that are present.

debops.lxc role

  • The role will now generate the lxc-debops LXC template script from different templates, based on an OS release. This change should help fix the issues with LXC container creation on Debian Stretch.

debops.pki role

  • The X.509 certificate included in the default domain PKI realm will now have a SubjectAltName wildcard entry for the host's FQDN. This should allow for easy usage of services related to a particular host in the cluster over encrypted connections, for example host monitoring, service discovery, etc. which can be now published in the DNS zone at *.host.example.org resource records.
  • The role now supports Let's Encrypt ACMEv2 API via the acme-tiny Python script. The existing PKI realms will need to be re-created or updated for the new API to work, new PKI realms should work out of the box. Check the Upgrade notes for more details.

debops.proc_hidepid role

  • The role now uses a static GID 70 for the procadmins group to synchronize the access permissions on a host and inside the LXC containers. You will need to remount the filesystems, restart services and LXC containers that rely on this functionality.

debops.sysctl role

  • The configuration of the kernel parameters has been redesigned, instead of being based on YAML dictionaries, is now based on YAML lists of dictionaries and can be easily changed via Ansible inventory. You will need to update your inventory for the new changes to take effect, refer to the role documentation for details.

Fixed

General

  • The debops command will now generate the ansible.cfg configuration file with correct path to the Ansible roles provided with the DebOps Python package.

debops.nginx role

  • Fix a long standing bug in the role with Ansible failing during welcome page template generation with Jinja2 >= 2.9.4. It was related to non-backwards compatible change in Jinja that modified how variables are processed in a loop.

Removed

Roles removed from DebOps

  • The debops-contrib.kernel_module Ansible role has been removed; it was replaced by the new debops.kmod Ansible role.

debops.ferm role

  • The ferm-forward hook script in the /etc/network/if-pre-up.d/ directory has been removed (existing instances will be cleaned up). Recent changes in the debops.ferm role broke idempotency with the debops.ifupdown role, and it was determined that the functionality provided by the hook is no longer needed, recent OS releases should deal with it adequately.

debops v0.7.0 - 2018-02-11

Added

New DebOps roles

  • New Ansible roles have been imported from the debops-contrib organization: apparmor, bitcoind, btrfs, dropbear_initramfs, etckeeper, firejail, foodsoft, fuse, homeassistant, kernel_module, kodi, neurodebian, snapshot_snapper, tor, volkszaehler, x2go_server. They are not yet included in the main playbook and still need to be renamed to fit with the rest of the debops.* roles.
  • The debops.sysfs role: configuration of the Linux kernel attributes through the /sys filesystem. The role is not enabled by default.
  • The debops.locales role: configure localization and internationalization on a given host or set of hosts.
  • The debops.machine role: manage the /etc/machine-info file, the /etc/issue file and a dynamic MOTD.
  • The debops.proc_hidepid role: configure the /proc hidepid= options.
  • The debops.roundcube role: manage RoundCube Webmail application.
  • The debops.prosody role: configure an xmpp server on a given host.
  • The debops.sysnews role: manage System News bulletin for UNIX accounts.

Continuous Integration

  • DebOps roles and playbooks can now be tested using local or remote GitLab CI instance, with Vagrant, KVM and LXC technologies and some custom scripts.

General

  • You can now use Vagrant to create an Ansible Controller based on Debian Stretch and use it to manage itself or other hosts over the network.
  • You can now build an Ansible Controller with DebOps support as a Docker container. Official Docker image is also available, automatically rebuilt on every commit.
  • You can now install DebOps on Arch Linux using an included PKGBUILD file.
  • Add new playbook, agent.yml. This playbook is executed at the end of the main playbook, and contains applications or services which act as "agents" of other services. They may contact their parent applications to report about the state of the host they are executed on, therefore the agents are installed and configured at the end of the main playbook.
  • DebOps roles and playbooks will be included in the Python packages released on PyPI. This will allow for easier installation of DebOps via pip (no need to download the roles and playbooks separately) as well as simple stable releases. The DebOps monorepo can still be installed separately.

debops.libvirtd role

  • The role can now detect if nested KVM is enabled in a particular virtual machine and install KVM support.

debops.nodejs role

  • The debops.nodejs role can now install Yarn package manager using its upstream APT repository (not enabled by default).

Changed

Continuous Integration

  • The project repository is tested using pycodestyle for compliance with Python's PEP8 Style Guide.

General

  • The debops-update script will now install or update the DebOps monorepo instead of separate debops-playbooks and DebOps roles git repositories. Existing installations shouldn't be affected.

  • The debops script will now include the DebOps monorepo roles and playbooks in the generated ansible.cfg configuration. The monorepo roles and playbooks are preferred over the old debops-playbooks ones.

    The script is backwards compatible and should work correctly with or without the debops-playbooks repository and roles installed.

  • Improved Python 3 support in the DebOps scripts and throughout the playbooks/roles. DebOps should now be compatible with both Python versions.

debops.gitlab_runner role

  • The GitLab Runner playbook is moved to the agent.yml playbook; it will be executed at the end of the main playbook and should that way include correct information about installed services.

debops.gunicorn role

  • Update the role to work correctly on Debian Stretch and newer releases. The support for multiple gunicorn instances using custom Debian scripts has been removed in Debian Stretch, therefore the role replaces it with its own setup based on systemd instances.

debops.nodejs role

  • The npm package has been removed from Debian Stable. The role will now install NPM using the GitHub source, unless upstream NodeJS is enabled, which includes its own NPM version.

Removed

General

  • Remove the ipaddr.py Ansible filter plugin, it is now included in the Ansible core distribution.

debops.console role

  • Remove the locales configuration from the 'debops.console' role, this functionality has been moved to the new 'debops.locales' role. You will need to update the Ansible inventory variables to reflect the changes.
  • Remove management of the /etc/issue and /etc/motd files from the debops.console role. That functionality is now available in the debops.machine role. You will need to update the Ansible inventory variables to reflect the changes.
  • Management of the /proc hidepid= option has been moved to a new role, debops.proc_hidepid. You will need to update the Ansible inventory variables to reflect the changes.
  • Management of the System News using the sysnews Debian package has been removed from the role; it's now available as a separate debops.sysnews Ansible role. You will need to update the Ansible inventory variables related to System News due to this changes.

debops v0.6.0 - 2017-10-21

Added

General

  • Various repositories that comprise the DebOps project have been merged into a single monorepo which will be used as the main development repository. Check the git log for information about older releases of DebOps roles and/or playbooks.