A tool to detect what exists on a system and generate Ansible configuration of it
Find a file
Miguel Jacq b5d2b99174
All checks were successful
Lint / test (push) Successful in 30s
Trivy / test (push) Successful in 23s
CI / test (push) Successful in 5m14s
Add diff mode
2025-12-18 14:59:51 +11:00
.forgejo/workflows Debian packaging 2025-12-15 13:33:56 +11:00
debian Add diff mode 2025-12-18 14:59:51 +11:00
enroll Add diff mode 2025-12-18 14:59:51 +11:00
tests Remote mode and dangerous flag, other tweaks 2025-12-17 17:02:16 +11:00
.gitignore Initial commit 2025-12-14 20:53:22 +11:00
.pre-commit-config.yaml Add files param to bandit pre-commit 2025-12-18 13:45:59 +11:00
CHANGELOG.md Add diff mode 2025-12-18 14:59:51 +11:00
Dockerfile.debbuild Add --sops mode to encrypt harvest and manifest data at rest (especially useful if using --dangerous) 2025-12-17 18:51:40 +11:00
enroll.svg Fix end of file/whitespace per pre-commit 2025-12-18 13:50:00 +11:00
LICENSE Initial commit 2025-12-14 20:53:22 +11:00
poetry.lock Remote mode and dangerous flag, other tweaks 2025-12-17 17:02:16 +11:00
pyproject.toml Add diff mode 2025-12-18 14:59:51 +11:00
README.md Add diff mode 2025-12-18 14:59:51 +11:00
release.sh use no-cache 2025-12-15 15:05:09 +11:00
tests.sh Fix end of file/whitespace per pre-commit 2025-12-18 13:50:00 +11:00

Enroll

Enroll logo

enroll inspects a Linux machine (currently Debian-only) and generates Ansible roles/playbooks (and optionally inventory) for what it finds.

It aims to be optimistic and noninteractive:

  • Detects packages that have been installed.
  • Detects Debian package ownership of /etc files using dpkgs local database.
  • Captures config that has changed from packaged defaults (dpkg conffile hashes + package md5sums when available).
  • Also captures service-relevant custom/unowned files under /etc/<service>/... (e.g. drop-in config includes).
  • Defensively excludes likely secrets (path denylist + content sniff + size caps).
  • Captures non-system users and their SSH public keys.
  • Captures miscellaneous /etc files it cant attribute to a package and installs them in an etc_custom role.
  • Avoids trying to start systemd services that were detected as inactive during harvest.

Mental model

enroll works in two phases:

  1. Harvest: collect host facts + relevant files into a harvest bundle (state.json + harvested artifacts)
  2. Manifest: turn that harvest into Ansible roles/playbooks (and optionally inventory)

Additionally:

  • Diff: compare two harvests and report what changed (packages/services/users/files) since the previous snapshot.

Output modes: single-site vs multi-site (--fqdn)

enroll manifest (and enroll single-shot) support two distinct output styles.

Single-site mode (default: no --fqdn)

Use when enrolling one server (or generating a “golden” role set you intend to reuse).

Characteristics

  • Roles are more self-contained.
  • Raw config files live in the roles files/.
  • Template variables live in the roles defaults/main.yml.

Multi-site mode (--fqdn)

Use when enrolling several existing servers quickly, especially if they differ.

Characteristics

  • Roles are shared, host-specific state lives in inventory.
  • Host inventory drives what gets managed (files/packages/services).
  • Non-templated raw files live per-host under inventory/host_vars/<fqdn>/<role>/.files/....

Rule of thumb

  • “Make this one server reproducible/provisionable” → start with single-site
  • “Get multiple already-running servers under management quickly” → use multi-site

Subcommands

enroll harvest

Harvest state about a host and write a harvest bundle.

What it captures (high level)

  • Detected services + service-relevant packages
  • “Manual” packages
  • Changed-from-default config (plus related custom/unowned files under service dirs)
  • Non-system users + SSH public keys
  • Misc /etc that cant be attributed to a package (etc_custom role)

Common flags

  • Remote harvesting:
    • --remote-host, --remote-user, --remote-port
    • --no-sudo (if you dont want/need sudo)
  • Sensitive-data behaviour:
    • default: tries to avoid likely secrets
    • --dangerous: disables secret-safety checks (see “Sensitive data” below)
  • Encrypt bundles at rest:
    • --sops <FINGERPRINT...>: writes a single encrypted harvest.tar.gz.sops instead of a plaintext directory

enroll manifest

Generate Ansible output from an existing harvest bundle.

Inputs

  • --harvest /path/to/harvest (directory) or --harvest /path/to/harvest.tar.gz.sops (if using --sops)

Output

  • In plaintext mode: an Ansible repo-like directory structure (roles/playbooks, and inventory in multi-site mode).
  • In --sops mode: a single encrypted file manifest.tar.gz.sops containing the generated output.

Common flags

  • --fqdn <host>: enables multi-site output style

enroll single-shot

Convenience wrapper that runs harvest → manifest in one command.

Use this when you want “get me something workable ASAP”.

Supports the same general flags as harvest/manifest, including --fqdn, remote harvest flags, and --sops.


enroll diff

Compare two harvest bundles and report what changed.

What it reports

  • Packages added/removed
  • Services enabled added/removed, plus key state changes
  • Users added/removed, plus field changes (uid/gid/home/shell/groups, etc.)
  • Managed files added/removed/changed (metadata + content hash changes where available)

Inputs

  • --old <harvest> and --new <harvest> (directories or state.json paths)
  • --sops when comparing SOPS-encrypted harvest bundles

Output formats

  • --format json (default for webhooks)
  • --format markdown / --format text (human-oriented)

Notifications

  • Webhook:
    • --webhook <url>
    • --webhook-format json|markdown|text
    • --webhook-header 'Header-Name: value' (repeatable)
  • Email (optional):
    • --email-to <addr> (plus optional SMTP/sendmail-related flags, depending on your install)

Sensitive data

By default, enroll does not assume how you handle secrets in Ansible. It will attempt to avoid harvesting likely sensitive data (private keys, passwords, tokens, etc.). This can mean it skips some config files you may ultimately want to manage.

If you opt in to collecting everything:

--dangerous

WARNING: disables “likely secret” safety checks. This can copy private keys, TLS key material, API tokens, database passwords, and other credentials into the harvest output in plaintext.

If you intend to keep harvests/manifests long-term (especially in git), strongly consider encrypting them at rest.

Encrypt bundles at rest with --sops

--sops encrypts the harvest and/or manifest outputs into a single .tar.gz.sops file (GPG). This is for storage-at-rest, not for direct “Ansible SOPS inventory” workflows.

⚠️ Important: manifest --sops produces one encrypted file. You must decrypt + extract it before running ansible-playbook.


JinjaTurtle integration (both modes)

If JinjaTurtle is installed, enroll can generate Jinja2 templates for ini/json/xml/toml-style config.

  • Templates live in roles/<role>/templates/...
  • Variables live in:
    • single-site: roles/<role>/defaults/main.yml
    • multi-site: inventory/host_vars/<fqdn>/<role>.yml

You can force it on with --jinjaturtle or disable with --no-jinjaturtle.


How multi-site avoids “shared role breaks a host”

In multi-site mode, roles are data-driven. The role tasks are generic (“deploy the files listed for this host”, “install the packages listed for this host”, “apply systemd enable/start state listed for this host”). Host inventory decides what applies per-host, avoiding the classic “host2 adds config, host1 breaks” failure mode.


Install

Ubuntu/Debian apt repository

sudo mkdir -p /usr/share/keyrings
curl -fsSL https://mig5.net/static/mig5.asc | sudo gpg --dearmor -o /usr/share/keyrings/mig5.gpg
echo "deb [arch=amd64 signed-by=/usr/share/keyrings/mig5.gpg] https://apt.mig5.net $(lsb_release -cs) main" | sudo tee /etc/apt/sources.list.d/mig5.list
sudo apt update
sudo apt install enroll

AppImage

Download it from my Releases page, then:

chmod +x Enroll.AppImage
./Enroll.AppImage

Pip/PipX

pip install enroll

Poetry (dev)

poetry install
poetry run enroll --help

Found a bug / have a suggestion?

My Forgejo doesnt currently support federation, so I havent opened registration/login for issues.

Instead, email me (see pyproject.toml) or contact me on the Fediverse:

https://goto.mig5.net/@mig5


Examples

Harvest

Local harvest

enroll harvest --out /tmp/enroll-harvest

Remote harvest over SSH

enroll harvest --remote-host myhost.example.com --remote-user myuser --out /tmp/enroll-harvest

--dangerous

enroll harvest --out /tmp/enroll-harvest --dangerous

Remote + dangerous:

enroll harvest --remote-host myhost.example.com --remote-user myuser --dangerous

--sops (encrypt at rest)

# Encrypted harvest bundle (writes /tmp/enroll-harvest/harvest.tar.gz.sops)
enroll harvest --out /tmp/enroll-harvest --dangerous --sops <FINGERPRINT(s)>

Manifest

Single-site (default: no --fqdn)

enroll manifest --harvest /tmp/enroll-harvest --out /tmp/enroll-ansible

Multi-site (--fqdn)

enroll manifest --harvest /tmp/enroll-harvest --out /tmp/enroll-ansible --fqdn "$(hostname -f)"

Manifest with --sops

# Generate encrypted manifest bundle (writes /tmp/enroll-ansible/manifest.tar.gz.sops)
enroll manifest --harvest /tmp/enroll-harvest/harvest.tar.gz.sops --out /tmp/enroll-ansible --sops <FINGERPRINT(s)>

# Decrypt/extract the manifest bundle, then run Ansible from inside ./manifest/
cd /tmp/enroll-ansible
sops -d manifest.tar.gz.sops | tar -xzvf -
cd manifest

Single-shot

enroll single-shot --harvest /tmp/enroll-harvest --out /tmp/enroll-ansible --fqdn "$(hostname -f)"

Remote single-shot (run harvest over SSH, then manifest locally):

enroll single-shot --remote-host myhost.example.com --remote-user myuser   --harvest /tmp/enroll-harvest --out /tmp/enroll-ansible --fqdn "myhost.example.com"

Diff

Compare two harvest directories

enroll diff --old /path/to/harvestA --new /path/to/harvestB --format json

Diff + webhook notify

enroll diff   --old /path/to/golden/harvest   --new /path/to/new/harvest   --webhook https://nr.mig5.net/forms/webhooks/xxxx   --webhook-format json   --webhook-header 'X-Enroll-Secret: xxxx'

diff mode also supports email sending and text or markdown format, as well as --exit-code mode to trigger a return code of 2 (useful for crons or CI)


Run Ansible

Single-site

ansible-playbook -i "localhost," -c local /tmp/enroll-ansible/playbook.yml

Multi-site (--fqdn)

ansible-playbook /tmp/enroll-ansible/playbooks/"$(hostname -f)".yml