2022-10-07 12:35:14 +02:00
2022-10-07 12:35:14 +02:00
2022-10-07 12:35:14 +02:00
2022-01-23 22:17:19 +01:00
2022-08-05 12:12:13 +02:00
2022-01-23 22:17:19 +01:00
2022-01-23 22:17:19 +01:00
2022-01-23 11:40:38 +00:00
2022-10-07 12:35:14 +02:00
2022-08-05 13:57:00 +02:00
2022-08-05 12:12:13 +02:00

Setup for Staff Laptops

This repository contains all instructions alongside an Ansible playbook to set up staff laptops.

Installation of the OS

Currently, we use Debian Bullseye. Installation media are available in the Berlin office or can be downloaded and flashed onto a USB drive.

Once the install is completed via the graphical installer (please encrypt your hard drive), reboot the computer and continue below. Make a physical note of both the user and the hard drive encryption passphrase that you can then hand to whoever will receive the computer so they memorise the passwords and subsequently destroy the physical note.

Package installation via Ansible

First, install Ansible and Git on the target machine by running:

sudo apt install -y ansible git

Next, clone this repository into your home directory by running:

git clone https://git.fsfe.org/fsfe-system-hackers/staff-laptop.git

Finally, execute the Ansible playbook on the target host by running:

cd staff-laptop                      # Navigate to repository
ansible-playbook -K -v playbook.yml  # When queried for 'BECOME password', enter user password

This installs all packages commonly used by FSFE staff. This operation will take a while. When it has completed successfully, reboot the computer.

Further configuration

Now that all the needed packages are installed, some further manual configuration is needed.

E-mails with Thunderbird

Matrix chat with Element

Password management with KeepassXC (personal) Passbolt (organisation)

File Sharing and Calendars with Nextcloud Desktop

Backups with Vorta

Description
An Ansible playbook to set up staff laptops
Readme GPL-3.0 258 KiB
Languages
Nix 100%