From d73f54e7e56f689fa3dc69e5a54f078c9680c337 Mon Sep 17 00:00:00 2001 From: Emil Renner Berthing Date: Wed, 3 Oct 2018 15:31:49 +0200 Subject: debian: add basic Debian role --- roles/debian/files/06norecommends | 2 ++ roles/debian/files/sudoers | 27 +++++++++++++++++++++++++++ roles/debian/files/tmp.mount | 15 +++++++++++++++ 3 files changed, 44 insertions(+) create mode 100644 roles/debian/files/06norecommends create mode 100644 roles/debian/files/sudoers create mode 100644 roles/debian/files/tmp.mount (limited to 'roles/debian/files') diff --git a/roles/debian/files/06norecommends b/roles/debian/files/06norecommends new file mode 100644 index 0000000..a62feb1 --- /dev/null +++ b/roles/debian/files/06norecommends @@ -0,0 +1,2 @@ +APT::Install-Recommends "0"; +APT::Install-Suggests "0"; diff --git a/roles/debian/files/sudoers b/roles/debian/files/sudoers new file mode 100644 index 0000000..07f33a5 --- /dev/null +++ b/roles/debian/files/sudoers @@ -0,0 +1,27 @@ +# +# This file MUST be edited with the 'visudo' command as root. +# +# Please consider adding local content in /etc/sudoers.d/ instead of +# directly modifying this file. +# +# See the man page for details on how to write a sudoers file. +# +Defaults env_reset +Defaults mail_badpass +Defaults secure_path="/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin" + +# Host alias specification + +# User alias specification + +# Cmnd alias specification + +# User privilege specification +root ALL=(ALL:ALL) ALL + +# Allow members of group sudo to execute any command +%sudo ALL=(ALL:ALL) NOPASSWD: ALL + +# See sudoers(5) for more information on "#include" directives: + +#includedir /etc/sudoers.d diff --git a/roles/debian/files/tmp.mount b/roles/debian/files/tmp.mount new file mode 100644 index 0000000..25003f9 --- /dev/null +++ b/roles/debian/files/tmp.mount @@ -0,0 +1,15 @@ +[Unit] +Description=Temporary Directory (/tmp) +Documentation=man:hier(7) +Documentation=https://www.freedesktop.org/wiki/Software/systemd/APIFileSystems +ConditionPathIsSymbolicLink=!/tmp +DefaultDependencies=no +Conflicts=umount.target +Before=local-fs.target umount.target +After=swap.target + +[Mount] +What=tmpfs +Where=/tmp +Type=tmpfs +Options=mode=1777,strictatime,nosuid,nodev -- cgit v1.2.1