[mod] rename roles according to new guidelines
This commit is contained in:
parent
2747a5fe81
commit
1a7ea9558f
16 changed files with 64 additions and 64 deletions
4
ansible/roles/element-and-nginx/defaults/main.json
Normal file
4
ansible/roles/element-and-nginx/defaults/main.json
Normal file
|
@ -0,0 +1,4 @@
|
|||
{
|
||||
"var_element_and_nginx_domain": "element.example.org",
|
||||
"var_element_and_nginx_path": "/opt/element"
|
||||
}
|
|
@ -12,7 +12,7 @@
|
|||
"become": true,
|
||||
"ansible.builtin.template": {
|
||||
"src": "conf.j2",
|
||||
"dest": "/etc/nginx/sites-available/{{var_element_with_nginx_domain}}"
|
||||
"dest": "/etc/nginx/sites-available/{{var_element_and_nginx_domain}}"
|
||||
}
|
||||
},
|
||||
{
|
||||
|
@ -20,8 +20,8 @@
|
|||
"become": true,
|
||||
"ansible.builtin.file": {
|
||||
"state": "link",
|
||||
"src": "/etc/nginx/sites-available/{{var_element_with_nginx_domain}}",
|
||||
"dest": "/etc/nginx/sites-enabled/{{var_element_with_nginx_domain}}"
|
||||
"src": "/etc/nginx/sites-available/{{var_element_and_nginx_domain}}",
|
||||
"dest": "/etc/nginx/sites-enabled/{{var_element_and_nginx_domain}}"
|
||||
}
|
||||
},
|
||||
{
|
13
ansible/roles/element-and-nginx/templates/conf.j2
Normal file
13
ansible/roles/element-and-nginx/templates/conf.j2
Normal file
|
@ -0,0 +1,13 @@
|
|||
server {
|
||||
listen 80;
|
||||
listen [::]:80;
|
||||
listen 443 ssl;
|
||||
listen [::]:443 ssl;
|
||||
|
||||
server_name {{var_element_and_nginx_domain}};
|
||||
|
||||
ssl_certificate /etc/ssl/certs/{{var_element_and_nginx_domain}}.pem;
|
||||
ssl_certificate_key /etc/ssl/private/{{var_element_and_nginx_domain}}.pem;
|
||||
|
||||
root {{var_element_and_nginx_path}};
|
||||
}
|
|
@ -1,4 +0,0 @@
|
|||
{
|
||||
"var_element_with_nginx_domain": "element.example.org",
|
||||
"var_element_with_nginx_path": "/opt/element"
|
||||
}
|
|
@ -1,13 +0,0 @@
|
|||
server {
|
||||
listen 80;
|
||||
listen [::]:80;
|
||||
listen 443 ssl;
|
||||
listen [::]:443 ssl;
|
||||
|
||||
server_name {{var_element_with_nginx_domain}};
|
||||
|
||||
ssl_certificate /etc/ssl/certs/{{var_element_with_nginx_domain}}.pem;
|
||||
ssl_certificate_key /etc/ssl/private/{{var_element_with_nginx_domain}}.pem;
|
||||
|
||||
root {{var_element_with_nginx_path}};
|
||||
}
|
3
ansible/roles/synapse-and-lighttpd/defaults/main.json
Normal file
3
ansible/roles/synapse-and-lighttpd/defaults/main.json
Normal file
|
@ -0,0 +1,3 @@
|
|||
{
|
||||
"var_synapse_and_lighttpd_domain": "REPLACE_ME"
|
||||
}
|
|
@ -11,7 +11,7 @@
|
|||
"become": true,
|
||||
"ansible.builtin.template": {
|
||||
"src": "conf.j2",
|
||||
"dest": "/etc/lighttpd/conf-available/{{var_synapse_with_lighttpd_domain}}.conf"
|
||||
"dest": "/etc/lighttpd/conf-available/{{var_synapse_and_lighttpd_domain}}.conf"
|
||||
}
|
||||
},
|
||||
{
|
||||
|
@ -19,8 +19,8 @@
|
|||
"become": true,
|
||||
"ansible.builtin.file": {
|
||||
"state": "link",
|
||||
"src": "/etc/lighttpd/conf-available/{{var_synapse_with_lighttpd_domain}}.conf",
|
||||
"dest": "/etc/lighttpd/conf-enabled/{{var_synapse_with_lighttpd_domain}}.conf"
|
||||
"src": "/etc/lighttpd/conf-available/{{var_synapse_and_lighttpd_domain}}.conf",
|
||||
"dest": "/etc/lighttpd/conf-enabled/{{var_synapse_and_lighttpd_domain}}.conf"
|
||||
}
|
||||
},
|
||||
{
|
29
ansible/roles/synapse-and-lighttpd/templates/conf.j2
Normal file
29
ansible/roles/synapse-and-lighttpd/templates/conf.j2
Normal file
|
@ -0,0 +1,29 @@
|
|||
$HTTP["host"] == "{{var_synapse_and_lighttpd_domain}}" {
|
||||
server.name = "{{var_synapse_and_lighttpd_domain}}"
|
||||
|
||||
## alle Anfragen auf Port 443
|
||||
$SERVER["socket"] == ":443" {
|
||||
## mit dem SSL-Kram beglücken
|
||||
# ssl.engine = "enable"
|
||||
# ssl.pemfile = "/etc/ssl/certs/{{var_synapse_and_lighttpd_domain}}.pem"
|
||||
# ssl.privkey = "/etc/ssl/keys/{{var_synapse_and_lighttpd_domain}}.pem"
|
||||
# ssl.ca-file = "/etc/ssl/fullchains/{{var_synapse_and_lighttpd_domain}}.pem"
|
||||
# ssl.use-sslv2 = "disable"
|
||||
# ssl.use-sslv3 = "disable"
|
||||
}
|
||||
|
||||
## alle HTTP-Anfragen
|
||||
$SERVER["socket"] == ":80" {
|
||||
## auf HTTPS umleiten
|
||||
# url.redirect = ("^/(.*)$" => "https://{{var_synapse_and_lighttpd_domain}}/$1")
|
||||
}
|
||||
|
||||
proxy.server = (
|
||||
"" => (
|
||||
"" => (
|
||||
"host" => "localhost",
|
||||
"port" => 8008
|
||||
)
|
||||
)
|
||||
)
|
||||
}
|
3
ansible/roles/synapse-and-nginx/defaults/main.json
Normal file
3
ansible/roles/synapse-and-nginx/defaults/main.json
Normal file
|
@ -0,0 +1,3 @@
|
|||
{
|
||||
"var_synapse_and_nginx_domain": "REPLACE_ME"
|
||||
}
|
|
@ -12,7 +12,7 @@
|
|||
"become": true,
|
||||
"ansible.builtin.template": {
|
||||
"src": "conf.j2",
|
||||
"dest": "/etc/nginx/sites-available/{{var_synapse_with_nginx_domain}}"
|
||||
"dest": "/etc/nginx/sites-available/{{var_synapse_and_nginx_domain}}"
|
||||
}
|
||||
},
|
||||
{
|
||||
|
@ -20,8 +20,8 @@
|
|||
"become": true,
|
||||
"ansible.builtin.file": {
|
||||
"state": "link",
|
||||
"src": "/etc/nginx/sites-available/{{var_synapse_with_nginx_domain}}",
|
||||
"dest": "/etc/nginx/sites-enabled/{{var_synapse_with_nginx_domain}}"
|
||||
"src": "/etc/nginx/sites-available/{{var_synapse_and_nginx_domain}}",
|
||||
"dest": "/etc/nginx/sites-enabled/{{var_synapse_and_nginx_domain}}"
|
||||
}
|
||||
},
|
||||
{
|
|
@ -8,10 +8,10 @@ server {
|
|||
listen 8448 ssl http2 default_server;
|
||||
listen [::]:8448 ssl http2 default_server;
|
||||
|
||||
server_name {{var_synapse_with_nginx_domain}};
|
||||
server_name {{var_synapse_and_nginx_domain}};
|
||||
|
||||
ssl_certificate /etc/ssl/certs/{{var_synapse_with_nginx_domain}}.pem;
|
||||
ssl_certificate_key /etc/ssl/private/{{var_synapse_with_nginx_domain}}.pem;
|
||||
ssl_certificate /etc/ssl/certs/{{var_synapse_and_nginx_domain}}.pem;
|
||||
ssl_certificate_key /etc/ssl/private/{{var_synapse_and_nginx_domain}}.pem;
|
||||
|
||||
location ~ ^(/_matrix|/_synapse/client) {
|
||||
proxy_pass http://localhost:8008;
|
|
@ -1,3 +0,0 @@
|
|||
{
|
||||
"var_synapse_with_lighttpd_domain": "REPLACE_ME"
|
||||
}
|
|
@ -1,29 +0,0 @@
|
|||
$HTTP["host"] == "{{var_synapse_with_lighttpd_domain}}" {
|
||||
server.name = "{{var_synapse_with_lighttpd_domain}}"
|
||||
|
||||
## alle Anfragen auf Port 443
|
||||
$SERVER["socket"] == ":443" {
|
||||
## mit dem SSL-Kram beglücken
|
||||
# ssl.engine = "enable"
|
||||
# ssl.pemfile = "/etc/ssl/certs/{{var_synapse_with_lighttpd_domain}}.pem"
|
||||
# ssl.privkey = "/etc/ssl/keys/{{var_synapse_with_lighttpd_domain}}.pem"
|
||||
# ssl.ca-file = "/etc/ssl/fullchains/{{var_synapse_with_lighttpd_domain}}.pem"
|
||||
# ssl.use-sslv2 = "disable"
|
||||
# ssl.use-sslv3 = "disable"
|
||||
}
|
||||
|
||||
## alle HTTP-Anfragen
|
||||
$SERVER["socket"] == ":80" {
|
||||
## auf HTTPS umleiten
|
||||
# url.redirect = ("^/(.*)$" => "https://{{var_synapse_with_lighttpd_domain}}/$1")
|
||||
}
|
||||
|
||||
proxy.server = (
|
||||
"" => (
|
||||
"" => (
|
||||
"host" => "localhost",
|
||||
"port" => 8008
|
||||
)
|
||||
)
|
||||
)
|
||||
}
|
|
@ -1,3 +0,0 @@
|
|||
{
|
||||
"var_synapse_with_nginx_domain": "REPLACE_ME"
|
||||
}
|
Loading…
Add table
Reference in a new issue