Skip to content

Commit 183b407

Browse files
authored
Merge pull request #891 from holta/dnsmasq-pr870-cleanup
PR870 cleanup for understandability (dnsmasq, Captive Portal)
2 parents dae2494 + a4a882c commit 183b407

File tree

4 files changed

+138
-101
lines changed

4 files changed

+138
-101
lines changed

roles/network/defaults/main.yml

Lines changed: 7 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,3 @@
1-
---
21
# Defaults for network detection
32
wireless_lan_present: False
43
strict_networking: False
@@ -19,14 +18,14 @@ discovered_lan_iface: "none"
1918
discovered_wired_iface: "none"
2019
discovered_wireless_iface: "none"
2120

22-
#Redhat
21+
# Red Hat
2322
#iiab_wired_lan_iface: "none"
2423
#iiab_wireless_lan_iface: "none"
2524
has_WAN: False
2625
has_ifcfg_gw: "none"
2726
has_wifi_gw: "none"
2827

29-
#Debian
28+
# Debian
3029
dhcpcd_result: ""
3130
wan_in_interfaces: False
3231
network_manager_active: False
@@ -39,7 +38,7 @@ gui_desired_network_role: Gateway
3938
wondershaper_dspeed: "4096"
4039
wondershaper_upspeed: "1024"
4140

42-
# WiFi
41+
# Wi-Fi
4342
host_ssid: IIAB
4443
hostapd_wait: 1
4544
host_wifi_mode: g
@@ -63,16 +62,18 @@ network_config_dir: /etc/network/interfaces.d
6362
dns_jail_enabled: False
6463
services_externally_visible: False
6564

66-
# following variables set for old apache,dhcpd,named usage
65+
# Following variables set for old Apache, dhcpd, named usage
6766
dhcpd_install: True
6867
dhcpd_enabled: True
6968
named_install: True
7069
named_enabled: True
7170
dnsmasq_enabled: False
7271
dnsmasq_install: False
72+
73+
# For @tim-moody's Nodogsplash approach to Captive Portal? High experimental as of June 2018: github.com/iiab/iiab/issues/608
7374
captive_portal_enabled: False
7475

75-
# for simple python captive portal
76+
# Simple python Captive Portal, that @m-anish & @jvonau are experimenting with in July 2018: github.com/iiab/iiab/pull/870
7677
py_captive_portal_install: True
7778
py_captive_portal_enabled: True
7879
py_captive_portal_port: "9090"
Lines changed: 18 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,10 @@
1-
- name: Create directory for captive portal script
2-
file: path=/opt/iiab/captive-portal state=directory
1+
- name: Create directory for Captive Portal script
2+
file:
3+
path: /opt/iiab/captive-portal
4+
state: directory
35
when: py_captive_portal_install
46

5-
- name: Copy captive portal script
7+
- name: Copy Captive Portal script
68
template:
79
src: roles/network/templates/captive_portal/captive_portal.py.j2
810
dest: /opt/iiab/captive-portal/captive_portal.py
@@ -11,7 +13,7 @@
1113
mode: 0740
1214
when: py_captive_portal_install
1315

14-
- name: Copy captive portal service file
16+
- name: Copy Captive Portal service file
1517
template:
1618
src: roles/network/templates/captive_portal/captive_portal.service.j2
1719
dest: /etc/systemd/system/captive_portal.service
@@ -21,17 +23,25 @@
2123
when: py_captive_portal_install
2224

2325
- name: Enable captive_portal after copying files
24-
service: name=captive_portal.service enabled=yes
26+
service:
27+
name: captive_portal.service
28+
enabled: yes
2529
when: py_captive_portal_install and py_captive_portal_enabled
2630

2731
- name: Start captive_portal after copying files
28-
service: name=captive_portal.service state=started
32+
service:
33+
name: captive_portal.service
34+
state: started
2935
when: py_captive_portal_install and py_captive_portal_enabled
3036

3137
- name: Disable captive_portal after copying files
32-
service: name=captive_portal.service enabled=no
38+
service:
39+
name: captive_portal.service
40+
enabled: no
3341
when: py_captive_portal_install and py_captive_portal_enabled
3442

3543
- name: Stop captive_portal after copying files
36-
service: name=captive_portal.service state=started
44+
service:
45+
name: captive_portal.service
46+
state: started
3747
when: py_captive_portal_install and py_captive_portal_enabled
Lines changed: 105 additions & 81 deletions
Original file line numberDiff line numberDiff line change
@@ -1,157 +1,181 @@
11
- name: Disable dhcpd service
2-
service: name=dhcpd
3-
enabled=no
2+
service:
3+
name: dhcpd
4+
enabled: no
45
when: not dhcpd_enabled and dhcpd_install
56

67
# service is restarted with NM dispatcher.d script
78
- name: Enable dhcpd service
8-
service: name=dhcpd
9-
enabled=yes
9+
service:
10+
name: dhcpd
11+
enabled: yes
1012
when: dhcpd_enabled and dhcpd_install
1113

1214
- name: Copy /etc/sysconfig/dhcpd file
13-
template: src={{ item.src }}
14-
dest={{ item.dest }}
15-
owner=root
16-
group=root
17-
mode={{ item.mode }}
15+
template:
16+
src: "{{ item.src }}"
17+
dest: "{{ item.dest }}"
18+
owner: root
19+
group: root
20+
mode: "{{ item.mode }}"
1821
with_items:
19-
- { src: 'dhcp/dhcpd-env.j2' , dest: '/etc/sysconfig/dhcpd' , mode: '0644' }
22+
- { src: 'dhcp/dhcpd-env.j2', dest: '/etc/sysconfig/dhcpd', mode: '0644' }
2023
- { src: 'dhcp/dhcpd-iiab.conf.j2', dest: '/etc/dhcpd-iiab.conf', mode: '0644' }
2124
when: dhcpd_enabled and dhcpd_install
2225

2326
- name: Copy named file
24-
template: src={{ item.src }}
25-
dest={{ item.dest }}
26-
owner=root
27-
group=root
28-
mode={{ item.mode }}
27+
template:
28+
src: "{{ item.src }}"
29+
dest: "{{ item.dest }}"
30+
owner: root
31+
group: root
32+
mode: "{{ item.mode }}"
2933
with_items:
30-
- { src: 'named/named-iiab.conf.j2' , dest: '/etc/named-iiab.conf' , mode: '0644' }
31-
- { src: 'named/school.local.zone.db' , dest: '/var/named-iiab/' , mode: '0644' }
32-
- { src: 'named/school.internal.zone.db' , dest: '/var/named-iiab/' , mode: '0644' }
34+
- { src: 'named/named-iiab.conf.j2', dest: '/etc/named-iiab.conf', mode: '0644' }
35+
- { src: 'named/school.local.zone.db', dest: '/var/named-iiab/', mode: '0644' }
36+
- { src: 'named/school.internal.zone.db', dest: '/var/named-iiab/', mode: '0644' }
3337

3438
- name: Enable named service
35-
service: name={{ dns_service }}
36-
enabled=yes
39+
service:
40+
name: "{{ dns_service }}"
41+
enabled: yes
3742
when: named_enabled and named_install
3843

3944
- name: Disable named service
40-
service: name={{ dns_service }}
41-
enabled=no
45+
service:
46+
name: "{{ dns_service }}"
47+
enabled: no
4248
when: not named_enabled and named_install
4349

4450
- name: Disable dnsmasq
45-
service: name=dnsmasq
46-
enabled=no
51+
service:
52+
name: dnsmasq
53+
enabled: no
4754
when: not dnsmasq_enabled and dnsmasq_install
4855

49-
- name: dnsmasq copy config file to /etc
50-
template: src=network/dnsmasq.conf.j2 dest=/etc/dnsmasq.conf
56+
- name: Copy dnsmasq.conf to /etc
57+
template:
58+
src: network/dnsmasq.conf.j2
59+
dest: /etc/dnsmasq.conf
5160
when: dnsmasq_enabled and dnsmasq_install
5261

5362
- name: Enable dnsmasq
54-
service: name=dnsmasq
55-
enabled=yes
63+
service:
64+
name: dnsmasq
65+
enabled: yes
5666
when: dnsmasq_enabled and dnsmasq_install
5767

5868
- name: Enable DansGuardian
59-
service: name=dansguardian
60-
enabled=yes
69+
service:
70+
name: dansguardian
71+
enabled: yes
6172
when: dansguardian_enabled and dansguardian_install
6273

6374
- name: Disable DansGuardian
64-
service: name=dansguardian
65-
enabled=no
75+
service:
76+
name: dansguardian
77+
enabled: no
6678
when: not dansguardian_enabled and dansguardian_install
6779

6880
- name: Create xs_httpcache flag
69-
lineinfile: dest=/etc/iiab/iiab.env
70-
regexp='^HTTPCACHE_ON=*'
71-
line='HTTPCACHE_ON=True'
72-
state=present
81+
lineinfile:
82+
dest: /etc/iiab/iiab.env
83+
regexp: '^HTTPCACHE_ON=*'
84+
line: 'HTTPCACHE_ON=True'
85+
state: present
7386
when: squid_enabled and squid_install
7487

7588
- name: Enable Squid service
76-
service: name={{ proxy }}
77-
enabled=yes
89+
service:
90+
name: "{{ proxy }}"
91+
enabled: yes
7892
when: squid_enabled and squid_install
7993

8094
- name: Copy init script and config file
81-
template: src={{ item.src }}
82-
dest={{ item.dest }}
83-
owner={{ item.owner }}
84-
group={{ item.group }}
85-
mode={{ item.mode }}
95+
template:
96+
src: "{{ item.src }}"
97+
dest: "{{ item.dest }}"
98+
owner: "{{ item.owner }}"
99+
group: "{{ item.group }}"
100+
mode: "{{ item.mode }}"
86101
with_items:
87-
- src: 'squid/squid-iiab.conf.j2'
88-
dest: '/etc/{{ proxy }}/squid-iiab.conf'
89-
owner: '{{ proxy_user }}'
90-
group: '{{ proxy_user }}'
91-
mode: '0644'
102+
- src: squid/squid-iiab.conf.j2
103+
dest: "/etc/{{ proxy }}/squid-iiab.conf"
104+
owner: "{{ proxy_user }}"
105+
group: "{{ proxy_user }}"
106+
mode: 0644
92107
when: squid_enabled and squid_install
93108

94109
- name: Point to Squid config file from startup file
95-
lineinfile: regexp='^CONFIG'
96-
line='CONFIG=/etc/{{ proxy }}/squid-iiab.conf'
97-
dest=/etc/init.d/{{ proxy }}
110+
lineinfile:
111+
regexp: '^CONFIG'
112+
line: "CONFIG=/etc/{{ proxy }}/squid-iiab.conf"
113+
dest: "/etc/init.d/{{ proxy }}"
98114
when: squid_enabled and squid_install and is_debuntu
99115

100116
- name: Disable Squid service
101-
service: name={{ proxy }}
102-
enabled=no
117+
service:
118+
name: "{{ proxy }}"
119+
enabled: no
103120
when: not squid_enabled and squid_install
104121

105122
- name: Remove xs_httpcache flag
106-
lineinfile: dest=/etc/iiab/iiab.env
107-
regexp='^HTTPCACHE_ON=*'
108-
line='HTTPCACHE_ON=False'
109-
state=present
123+
lineinfile:
124+
dest: /etc/iiab/iiab.env
125+
regexp: '^HTTPCACHE_ON=*'
126+
line: 'HTTPCACHE_ON=False'
127+
state: present
110128
when: not squid_enabled
111129

112130
- name: Enable Wondershaper service
113-
service: name=wondershaper
114-
enabled=yes
131+
service:
132+
name: wondershaper
133+
enabled: yes
115134
when: wondershaper_enabled and wondershaper_install
116135

117136
- name: Disable Wondershaper service
118-
service: name=wondershaper
119-
enabled=no
137+
service:
138+
name: wondershaper
139+
enabled: no
120140
when: not wondershaper_enabled and wondershaper_install
121141

122142
# check-LAN should be iptables.yml remove later
123143
- name: Grab clean copy of iiab-gen-iptables
124-
template: src={{ item.0 }}
125-
dest={{ item.1 }}
126-
owner='root'
127-
group='root'
128-
mode='0755'
144+
template:
145+
src: "{{ item.0 }}"
146+
dest: "{{ item.1 }}"
147+
owner: root
148+
group: root
149+
mode: 0755
129150
with_items:
130151
- { 0: 'gateway/iiab-gen-iptables', 1: '/usr/bin/iiab-gen-iptables' }
131152

132-
- name: Add 'squid' to service list
133-
ini_file: dest='{{ service_filelist }}'
134-
section=squid
135-
option='{{ item.option }}'
136-
value='{{ item.value }}'
153+
- name: Add 'squid' to list of services at /etc/iiab/iiab.ini
154+
ini_file:
155+
dest: "{{ service_filelist }}"
156+
section: squid
157+
option: "{{ item.option }}"
158+
value: "{{ item.value }}"
137159
with_items:
138160
- option: enabled
139161
value: "{{ squid_enabled }}"
140162

141-
- name: Add 'dansguardian' to service list
142-
ini_file: dest='{{ service_filelist }}'
143-
section=dansguardian
144-
option='{{ item.option }}'
145-
value='{{ item.value }}'
163+
- name: Add 'dansguardian' to list of services at /etc/iiab/iiab.ini
164+
ini_file:
165+
dest: "{{ service_filelist }}"
166+
section: dansguardian
167+
option: "{{ item.option }}"
168+
value: "{{ item.value }}"
146169
with_items:
147170
- option: enabled
148171
value: "{{ dansguardian_enabled }}"
149172

150-
- name: Add 'wondershaper' to service list
151-
ini_file: dest='{{ service_filelist }}'
152-
section=wondershaper
153-
option='{{ item.option }}'
154-
value='{{ item.value }}'
173+
- name: Add 'wondershaper' to list of services at /etc/iiab/iiab.ini
174+
ini_file:
175+
dest: "{{ service_filelist }}"
176+
section: wondershaper
177+
option: "{{ item.option }}"
178+
value: "{{ item.value }}"
155179
with_items:
156180
- option: enabled
157181
value: "{{ wondershaper_enabled }}"

0 commit comments

Comments
 (0)