From 73c3a1602993aede986e678b0798b1c9c47d138f Mon Sep 17 00:00:00 2001 From: Jean-Marie Mineau Date: Tue, 29 Jun 2021 01:59:26 +0200 Subject: [PATCH] add cron script to clean the cache every day --- roles/apt_cacher_ng/tasks/main.yml | 11 ++++++++++- .../apt_cacher_ng/templates/clear-apt-cache_cron.j2 | 5 +++++ roles/apt_cacher_ng/templates/security.conf | 12 ------------ 3 files changed, 15 insertions(+), 13 deletions(-) create mode 100644 roles/apt_cacher_ng/templates/clear-apt-cache_cron.j2 delete mode 100644 roles/apt_cacher_ng/templates/security.conf diff --git a/roles/apt_cacher_ng/tasks/main.yml b/roles/apt_cacher_ng/tasks/main.yml index 0235352..d07061e 100644 --- a/roles/apt_cacher_ng/tasks/main.yml +++ b/roles/apt_cacher_ng/tasks/main.yml @@ -18,7 +18,7 @@ mode: '644' notify: Restart apt-cacher-ng -- name: Create config files +- name: Set admin auth template: src: "security.conf.j2" dest: "/etc/apt-cacher-ng/security.conf" @@ -28,6 +28,15 @@ notify: Restart apt-cacher-ng no_log: true +# This is uggly, and overkill +- name: Set cron job to clear the cache + template: + src: "clear-apt-cache_cron.j2" + dest: "/etc/cron.daily/clear-apt-cache" + owner: root + group: root + mode: '755' + - name: Edit the clients allowed to use the proxy lineinfile: path: /etc/hosts.allow diff --git a/roles/apt_cacher_ng/templates/clear-apt-cache_cron.j2 b/roles/apt_cacher_ng/templates/clear-apt-cache_cron.j2 new file mode 100644 index 0000000..0aab81a --- /dev/null +++ b/roles/apt_cacher_ng/templates/clear-apt-cache_cron.j2 @@ -0,0 +1,5 @@ +{{ ansible_managed | comment }} + +systemctl stop apt-cacher-ng +rm -rf /var/chache/apt-cacher-ng/ +systemctl start apt-cacher-ng diff --git a/roles/apt_cacher_ng/templates/security.conf b/roles/apt_cacher_ng/templates/security.conf deleted file mode 100644 index 8b7a5b1..0000000 --- a/roles/apt_cacher_ng/templates/security.conf +++ /dev/null @@ -1,12 +0,0 @@ -{{ ansible_managed | comment }} - -# This file contains confidential data and should be protected with file -# permissions from being read by untrusted users. -# -# NOTE: permissions are fixated with dpkg-statoverride on Debian systems. -# Read its manual page for details. - -# Basic authentication with username and password, required to -# visit pages with administrative functionality. Format: username:password - -AdminAuth: {{ apt_proxy_admin_user }}:{{ apt_proxy_admin_mdp }}