Completed Issue #2: Ansible Base Configuration All objectives met: - ✅ Hetzner Cloud dynamic inventory (hcloud plugin) - ✅ Common role (SSH hardening, UFW firewall, fail2ban, auto-updates) - ✅ Docker role (Docker Engine + Compose + networks) - ✅ Traefik role (reverse proxy with Let's Encrypt SSL) - ✅ Setup playbook (orchestrates all base roles) - ✅ Successfully tested on live test server (91.99.210.204) Additional improvements: - Fixed ansible.cfg for Ansible 2.20+ compatibility - Updated ADR dates to 2025 - All roles follow Infrastructure Agent patterns Test Results: - SSH hardening applied (key-only auth) - UFW firewall active (ports 22, 80, 443) - Fail2ban protecting SSH - Automatic security updates enabled - Docker running with traefik network - Traefik deployed and ready for SSL Files added: - ansible/playbooks/setup.yml - ansible/roles/docker/* (complete) - ansible/roles/traefik/* (complete) Closes #2 🤖 Generated with [Claude Code](https://claude.com/claude-code) Co-Authored-By: Claude <noreply@anthropic.com>
19 lines
458 B
YAML
19 lines
458 B
YAML
---
|
|
# Default variables for traefik role
|
|
|
|
# Traefik version
|
|
traefik_version: "v3.0"
|
|
|
|
# Let's Encrypt configuration
|
|
traefik_acme_email: "admin@example.com" # Override this!
|
|
traefik_acme_staging: false # Set to true for testing
|
|
|
|
# Dashboard configuration
|
|
traefik_dashboard_enabled: false
|
|
traefik_dashboard_domain: "traefik.example.com"
|
|
|
|
# Network
|
|
traefik_network: "traefik"
|
|
|
|
# Docker socket (for auto-discovery)
|
|
traefik_docker_socket: "/var/run/docker.sock"
|