Initial commit
This commit is contained in:
11
roles/weareinteractive.apt/templates/etc/apt/apt.conf.d/00proxy.j2
Executable file
11
roles/weareinteractive.apt/templates/etc/apt/apt.conf.d/00proxy.j2
Executable file
@ -0,0 +1,11 @@
|
||||
// {{ ansible_managed }}
|
||||
|
||||
{% if apt_http_proxy_address is defined and apt_http_proxy_address %}
|
||||
Acquire::http::Proxy "{{ apt_http_proxy_address }}";
|
||||
{% endif %}
|
||||
{% if apt_https_proxy_address is defined and apt_https_proxy_address %}
|
||||
Acquire::https::Proxy "{{ apt_https_proxy_address }}";
|
||||
{% endif %}
|
||||
{% if apt_http_pipeline_depth is defined and apt_http_pipeline_depth %}
|
||||
Acquire::http::Pipeline-Depth "{{ apt_http_pipeline_depth }}";
|
||||
{% endif %}
|
12
roles/weareinteractive.apt/templates/etc/apt/apt.conf.d/10general.j2
Executable file
12
roles/weareinteractive.apt/templates/etc/apt/apt.conf.d/10general.j2
Executable file
@ -0,0 +1,12 @@
|
||||
// {{ ansible_managed }}
|
||||
|
||||
// Install Recommended packages by default
|
||||
APT::Install-Recommends "{{ apt_install_recommends | to_nice_json }}";
|
||||
|
||||
// Allow 'apt-get autoremove' to remove recommended packages
|
||||
APT::AutoRemove::RecommendsImportant "{{ "false" if apt_remove_recommends else "true" }}";
|
||||
|
||||
// Install Suggested packages by default
|
||||
APT::Install-Suggests "{{ apt_install_suggests | to_nice_json }}";
|
||||
|
||||
APT::Get::Show-Upgraded "true";
|
18
roles/weareinteractive.apt/templates/etc/apt/apt.conf.d/10periodic.j2
Executable file
18
roles/weareinteractive.apt/templates/etc/apt/apt.conf.d/10periodic.j2
Executable file
@ -0,0 +1,18 @@
|
||||
// {{ ansible_managed }}
|
||||
|
||||
// Enable the update/upgrade script (0=disable)
|
||||
APT::Periodic::Enable "{{ apt_periodic | int}}";
|
||||
|
||||
// Do “apt-get update” automatically every n-days (0=disable)
|
||||
APT::Periodic::Update-Package-Lists "{{ apt_update_package_lists }}";
|
||||
|
||||
// Do “apt-get upgrade –download-only” every n-days (0=disable)
|
||||
APT::Periodic::Download-Upgradeable-Packages "{{ apt_download_upgradeable_packages }}";
|
||||
|
||||
// Do “apt-get autoclean” every n-days (0=disable)
|
||||
APT::Periodic::AutocleanInterval "{{ apt_auto_clean_interval }}";
|
||||
|
||||
// Run the “unattended-upgrade” security upgrade script every n-days (0=disabled)
|
||||
// Requires the package “unattended-upgrades” and will write
|
||||
// a log in /var/log/unattended-upgrades
|
||||
APT::Periodic::Unattended-Upgrade "{{ apt_unattended_upgrades | int }}";
|
@ -0,0 +1,7 @@
|
||||
// {{ ansible_managed }}
|
||||
|
||||
DPkg {
|
||||
// Auto re-mounting of a readonly /
|
||||
Pre-Invoke { "mount -o remount,rw LABEL=ROOTFS /"; };
|
||||
Post-Invoke { "test ${NO_APT_REMOUNT:-no} = yes || mount -o remount,ro LABEL=ROOTFS / || true"; };
|
||||
};
|
@ -0,0 +1,7 @@
|
||||
// {{ ansible_managed }}
|
||||
|
||||
DPkg {
|
||||
// Auto re-mounting of a noexec /tmp since some packages desire exec
|
||||
Pre-Invoke { "mount -o remount,exec /tmp"; };
|
||||
Post-Invoke { "test ${NO_APT_REMOUNT:-no} = yes || mount -o remount,noexec /tmp || true"; };
|
||||
};
|
@ -0,0 +1,5 @@
|
||||
# {{ ansible_managed }}
|
||||
Aptitude::ProblemResolver {
|
||||
SolutionCost "{{ apt_aptitude_solution_cost | join(", ") }}";
|
||||
}
|
||||
|
@ -0,0 +1,76 @@
|
||||
// {{ ansible_managed }}
|
||||
|
||||
// Unattended-Upgrade::Origins-Pattern controls which packages are
|
||||
// upgraded. Replace Allowed-Origins
|
||||
Unattended-Upgrade::Origins-Pattern {
|
||||
{% for origin in apt_unattended_upgrades_origins %}
|
||||
"{{ origin }}";
|
||||
{% endfor %}
|
||||
};
|
||||
|
||||
// Automatically upgrade packages from these (origin:archive) pairs
|
||||
Unattended-Upgrade::Allowed-Origins {
|
||||
{% for allowed in apt_unattended_upgrades_allowed %}
|
||||
"{{ allowed }}";
|
||||
{% endfor %}
|
||||
};
|
||||
|
||||
// List of packages to not update (regexp are supported)
|
||||
Unattended-Upgrade::Package-Blacklist {
|
||||
{% for package in apt_unattended_upgrades_blacklist %}
|
||||
"{{ package }}";
|
||||
{% endfor %}
|
||||
};
|
||||
|
||||
// This option allows you to control if on a unclean dpkg exit
|
||||
// unattended-upgrades will automatically run
|
||||
// dpkg --force-confold --configure -a
|
||||
// The default is true, to ensure updates keep getting installed
|
||||
//Unattended-Upgrade::AutoFixInterruptedDpkg "false";
|
||||
|
||||
// Split the upgrade into the smallest possible chunks so that
|
||||
// they can be interrupted with SIGUSR1. This makes the upgrade
|
||||
// a bit slower but it has the benefit that shutdown while a upgrade
|
||||
// is running is possible (with a small delay)
|
||||
Unattended-Upgrade::MinimalSteps "{{ apt_unattended_upgrades_minimal_steps | to_nice_json }}";
|
||||
|
||||
// Install all unattended-upgrades when the machine is shuting down
|
||||
// instead of doing it in the background while the machine is running
|
||||
// This will (obviously) make shutdown slower
|
||||
//Unattended-Upgrade::InstallOnShutdown "true";
|
||||
|
||||
// Send email to this address for problems or packages upgrades
|
||||
// If empty or unset then no email is sent, make sure that you
|
||||
// have a working mail setup on your system. A package that provides
|
||||
// 'mailx' must be installed. E.g. "user@example.com"
|
||||
Unattended-Upgrade::Mail "{{ apt_mails | join(',') }}";
|
||||
|
||||
// Set this value to "true" to get emails only on errors. Default
|
||||
// is to always send a mail if Unattended-Upgrade::Mail is set
|
||||
Unattended-Upgrade::MailOnlyOnError "{{ apt_unattended_upgrades_notify_error_only | to_nice_json }}";
|
||||
|
||||
// Do automatic removal of new unused dependencies after the upgrade
|
||||
// (equivalent to apt-get autoremove)
|
||||
Unattended-Upgrade::Remove-Unused-Dependencies "{{ apt_unattended_upgrades_autoremove | to_nice_json }}";
|
||||
|
||||
// Automatically reboot *WITHOUT CONFIRMATION*
|
||||
// if the file /var/run/reboot-required is found after the upgrade
|
||||
Unattended-Upgrade::Automatic-Reboot "{{ apt_unattended_upgrades_automatic_reboot | to_nice_json }}";
|
||||
|
||||
// Automatically reboot even if there are users currently logged in.
|
||||
Unattended-Upgrade::Automatic-Reboot-WithUsers "{{ apt_unattended_upgrades_automatic_reboot_with_users | to_nice_json }}";
|
||||
|
||||
// If automatic reboot is enabled and needed, reboot at the specific
|
||||
// time instead of immediately
|
||||
// Default: "now"
|
||||
Unattended-Upgrade::Automatic-Reboot-Time "{{ apt_unattended_upgrades_automatic_reboot_time }}";
|
||||
|
||||
// Use apt bandwidth limit feature, this example limits the download
|
||||
// speed to 70kb/sec
|
||||
//Acquire::http::Dl-Limit "70";
|
||||
|
||||
// Enable logging to syslog. Default is False
|
||||
Unattended-Upgrade::SyslogEnable "{{ apt_unattended_upgrades_syslog_enable | to_nice_json }}";
|
||||
|
||||
// Specify syslog facility. Default is daemon
|
||||
Unattended-Upgrade::SyslogFacility "{{ apt_unattended_upgrades_syslog_facility }}";
|
@ -0,0 +1,5 @@
|
||||
# {{ ansible_managed }}
|
||||
|
||||
Package: {{ item.package | default('*') }}
|
||||
Pin: {{ item.pin }}
|
||||
Pin-Priority: {{ item.priority }}
|
Reference in New Issue
Block a user