[mod] nginx-connector-roles:conf formatting
This commit is contained in:
parent
75caf79a51
commit
3d02e0f4fb
10 changed files with 25 additions and 111 deletions
|
@ -50,14 +50,14 @@ server {
|
||||||
listen 80;
|
listen 80;
|
||||||
listen [::]:80;
|
listen [::]:80;
|
||||||
|
|
||||||
{% if (var_authelia_and_nginx_tls_mode == "force") %}
|
{% if (var_authelia_and_nginx_tls_mode == 'force') %}
|
||||||
return 301 https://$http_host$request_uri;
|
return 301 https://$http_host$request_uri;
|
||||||
{% else %}
|
{% else %}
|
||||||
{{ authelia_common() }}
|
{{ authelia_common() }}
|
||||||
{% endif %}
|
{% endif %}
|
||||||
}
|
}
|
||||||
|
|
||||||
{% if (var_element_and_nginx_tls_mode != "disable") %}
|
{% if (var_element_and_nginx_tls_mode != 'disable') %}
|
||||||
server {
|
server {
|
||||||
server_name {{var_authelia_and_nginx_domain}};
|
server_name {{var_authelia_and_nginx_domain}};
|
||||||
|
|
||||||
|
|
|
@ -48,14 +48,14 @@ server {
|
||||||
listen 80;
|
listen 80;
|
||||||
listen [::]:80;
|
listen [::]:80;
|
||||||
|
|
||||||
{% if (var_dokuwki_and_nginx_tls_mode == "force") %}
|
{% if (var_dokuwki_and_nginx_tls_mode == 'force') %}
|
||||||
return 301 https://$http_host$request_uri;
|
return 301 https://$http_host$request_uri;
|
||||||
{% else %}
|
{% else %}
|
||||||
{{ dokuwki_common() }}
|
{{ dokuwki_common() }}
|
||||||
{% endif %}
|
{% endif %}
|
||||||
}
|
}
|
||||||
|
|
||||||
{% if (var_element_and_nginx_tls_mode != "disable") %}
|
{% if (var_element_and_nginx_tls_mode != 'disable') %}
|
||||||
server {
|
server {
|
||||||
server_name {{var_dokuwki_and_nginx_domain}};
|
server_name {{var_dokuwki_and_nginx_domain}};
|
||||||
|
|
||||||
|
|
|
@ -1,15 +1,5 @@
|
||||||
{
|
{
|
||||||
"var_element_and_nginx_domain": "element.example.org",
|
"var_element_and_nginx_domain": "element.example.org",
|
||||||
"var_element_and_nginx_path": "/opt/element",
|
"var_element_and_nginx_path": "/opt/element",
|
||||||
"var_element_and_nginx_element_version": "v1.11.47",
|
"var_element_and_nginx_tls_mode": "enable"
|
||||||
"var_element_and_nginx_element_matrix_baseurl": "https://matrix.example.org",
|
|
||||||
"var_element_and_nginx_element_server_name": "example"
|
|
||||||
"var_element_and_nginx_tls_mode": "disable",
|
|
||||||
"var_element_and_nginx_tls_cert_kind": "none",
|
|
||||||
"var_element_and_nginx_tls_cert_data_existing_key_path": "/tmp/key.pem",
|
|
||||||
"var_element_and_nginx_tls_cert_data_existing_cert_path": "/tmp/cert.pem",
|
|
||||||
"var_element_and_nginx_tls_cert_data_existing_fullchain_path": "/tmp/fullchain.pem",
|
|
||||||
"var_element_and_nginx_tls_cert_data_acme_inwx_acme_account_email": "REPLACE_ME",
|
|
||||||
"var_element_and_nginx_tls_cert_data_acme_inwx_inwx_account_username": "REPLACE_ME",
|
|
||||||
"var_element_and_nginx_tls_cert_data_acme_inwx_inwx_account_password": "REPLACE_ME"
|
|
||||||
}
|
}
|
||||||
|
|
|
@ -1,32 +0,0 @@
|
||||||
{
|
|
||||||
"dependencies": [
|
|
||||||
{
|
|
||||||
"role": "element",
|
|
||||||
"var_element_version": "{{var_element_and_nginx_element_version}}",
|
|
||||||
"var_element_path": "{{var_element_and_nginx_path}}",
|
|
||||||
"var_element_matrix_baseurl": "{{var_element_and_nginx_element_matrix_baseurl}}",
|
|
||||||
"var_element_server_name": "{{var_element_and_nginx_element_server_name}}"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"when": "var_element_and_nginx_tls_cert_kind == 'existing'",
|
|
||||||
"role": "tlscert_existing",
|
|
||||||
"var_tlscert_existing_domain": "{{var_element_and_nginx_domain}}",
|
|
||||||
"var_tlscert_existing_key_path": "{{var_element_and_nginx_tls_cert_data_existing_key_path}}",
|
|
||||||
"var_tlscert_existing_cert_path": "{{var_element_and_nginx_tls_cert_data_existing_cert_path}}",
|
|
||||||
"var_tlscert_existing_fullchain_path": "{{var_element_and_nginx_tls_cert_data_existing_fullchain_path}}"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"when": "var_element_and_nginx_tls_cert_kind == 'selfsigned'",
|
|
||||||
"role": "tlscert_selfsigned",
|
|
||||||
"var_tlscert_selfsigned": "{{var_element_and_nginx_domain}}"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"when": "var_element_and_nginx_tls_cert_kind == 'acme_inwx'",
|
|
||||||
"role": "tlscert_acme_inwx",
|
|
||||||
"var_tlscert_acme_inwx_domain": "{{var_element_and_nginx_domain}}",
|
|
||||||
"var_tlscert_acme_inwx_acme_account_email": "{{var_element_and_nginx_tls_cert_data_acme_inwx_acme_account_email}}",
|
|
||||||
"var_tlscert_acme_inwx_inwx_account_username": "{{var_element_and_nginx_tls_cert_data_acme_inwx_inwx_account_username}}",
|
|
||||||
"var_tlscert_acme_inwx_inwx_account_password": "{{var_element_and_nginx_tls_cert_data_acme_inwx_inwx_account_password}}"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
|
@ -1,28 +1,29 @@
|
||||||
{% macro element_common() %}
|
{% macro element_common() %}
|
||||||
root {{var_element_and_nginx_path}};
|
root {{var_element_and_nginx_path}};
|
||||||
{% endmacro %}
|
{% endmacro %}
|
||||||
|
|
||||||
server {
|
server {
|
||||||
server_name {{var_element_and_nginx_domain}};
|
server_name {{var_element_and_nginx_domain}};
|
||||||
|
|
||||||
listen 80;
|
listen 80;
|
||||||
listen [::]:80;
|
listen [::]:80;
|
||||||
|
|
||||||
{% if (var_element_and_nginx_tls_mode == "force") %}
|
{% if (var_element_and_nginx_tls_mode == 'force') %}
|
||||||
return 301 https://$http_host$request_uri;
|
return 301 https://$http_host$request_uri;
|
||||||
{% else %}
|
{% else %}
|
||||||
{{ element_common() }}
|
{{ element_common() }}
|
||||||
{% endif %}
|
{% endif %}
|
||||||
}
|
}
|
||||||
{% if (var_element_and_nginx_tls_mode != "disable") %}
|
|
||||||
|
|
||||||
|
{% if (var_element_and_nginx_tls_mode != 'disable') %}
|
||||||
server {
|
server {
|
||||||
server_name {{var_element_and_nginx_domain}};
|
server_name {{var_element_and_nginx_domain}};
|
||||||
|
|
||||||
listen 443 ssl;
|
listen 443 ssl;
|
||||||
listen [::]:443 ssl;
|
listen [::]:443 ssl;
|
||||||
|
|
||||||
ssl_certificate /etc/ssl/fullchains/{{var_element_and_nginx_domain}}.pem;
|
|
||||||
ssl_certificate_key /etc/ssl/private/{{var_element_and_nginx_domain}}.pem;
|
ssl_certificate_key /etc/ssl/private/{{var_element_and_nginx_domain}}.pem;
|
||||||
|
ssl_certificate /etc/ssl/fullchains/{{var_element_and_nginx_domain}}.pem;
|
||||||
include /etc/nginx/ssl-hardening.conf;
|
include /etc/nginx/ssl-hardening.conf;
|
||||||
|
|
||||||
{{ element_common() }}
|
{{ element_common() }}
|
||||||
|
|
|
@ -1,64 +1,19 @@
|
||||||
{
|
{
|
||||||
"domain": {
|
"domain": {
|
||||||
"type": "string",
|
"mandatory": false,
|
||||||
"mandatory": false
|
"type": "string"
|
||||||
},
|
},
|
||||||
"path": {
|
"path": {
|
||||||
"type": "string",
|
"mandatory": false,
|
||||||
"mandatory": false
|
"type": "string"
|
||||||
},
|
|
||||||
"element_version": {
|
|
||||||
"type": "string",
|
|
||||||
"mandatory": false
|
|
||||||
},
|
|
||||||
"element_matrix_baseurl": {
|
|
||||||
"type": "string",
|
|
||||||
"mandatory": false
|
|
||||||
},
|
|
||||||
"element_server_name": {
|
|
||||||
"type": "string",
|
|
||||||
"mandatory": false
|
|
||||||
},
|
},
|
||||||
"tls_mode": {
|
"tls_mode": {
|
||||||
|
"mandatory": false,
|
||||||
"type": "string",
|
"type": "string",
|
||||||
"options": [
|
"options": [
|
||||||
"disable",
|
"disable",
|
||||||
"enable",
|
"enable",
|
||||||
"force"
|
"force"
|
||||||
],
|
]
|
||||||
"mandatory": false
|
|
||||||
},
|
|
||||||
"tls_cert_kind": {
|
|
||||||
"type": "string",
|
|
||||||
"options": [
|
|
||||||
"none",
|
|
||||||
"selfsigned",
|
|
||||||
"acme_inwx"
|
|
||||||
],
|
|
||||||
"mandatory": false
|
|
||||||
},
|
|
||||||
"tls_cert_data_existing_key_path": {
|
|
||||||
"type": "string",
|
|
||||||
"mandatory": false
|
|
||||||
},
|
|
||||||
"tls_cert_data_existing_cert_path": {
|
|
||||||
"type": "string",
|
|
||||||
"mandatory": false
|
|
||||||
},
|
|
||||||
"tls_cert_data_existing_fullchain_path": {
|
|
||||||
"type": "string",
|
|
||||||
"mandatory": false
|
|
||||||
},
|
|
||||||
"tls_cert_data_acme_inwx_acme_account_email": {
|
|
||||||
"type": "string",
|
|
||||||
"mandatory": false
|
|
||||||
},
|
|
||||||
"tls_cert_data_acme_inwx_inwx_account_username": {
|
|
||||||
"type": "string",
|
|
||||||
"mandatory": false
|
|
||||||
},
|
|
||||||
"tls_cert_data_acme_inwx_inwx_account_password": {
|
|
||||||
"type": "string",
|
|
||||||
"mandatory": false
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -73,7 +73,7 @@ server {
|
||||||
listen 80;
|
listen 80;
|
||||||
listen [::]:80 ipv6only=on;
|
listen [::]:80 ipv6only=on;
|
||||||
|
|
||||||
{% if var_gitlab_and_nginx_tls_mode == 'force' %}
|
{% if (var_gitlab_and_nginx_tls_mode == 'force') %}
|
||||||
return 301 https://$http_host$request_uri;
|
return 301 https://$http_host$request_uri;
|
||||||
{% else %}
|
{% else %}
|
||||||
access_log /var/log/nginx/gitlab_access.log;
|
access_log /var/log/nginx/gitlab_access.log;
|
||||||
|
@ -83,7 +83,7 @@ server {
|
||||||
{% endif %}
|
{% endif %}
|
||||||
}
|
}
|
||||||
|
|
||||||
{% if var_gitlab_and_nginx_tls_mode != 'disable' %}
|
{% if (var_gitlab_and_nginx_tls_mode != 'disable') %}
|
||||||
server {
|
server {
|
||||||
server_name {{var_gitlab_and_nginx_domain}};
|
server_name {{var_gitlab_and_nginx_domain}};
|
||||||
server_tokens off;
|
server_tokens off;
|
||||||
|
|
|
@ -29,14 +29,14 @@ server {
|
||||||
listen 80;
|
listen 80;
|
||||||
listen [::]:80;
|
listen [::]:80;
|
||||||
|
|
||||||
{% if (var_element_and_nginx_tls_mode == "force") %}
|
{% if (var_element_and_nginx_tls_mode == 'force') %}
|
||||||
return 301 https://$http_host$request_uri;
|
return 301 https://$http_host$request_uri;
|
||||||
{% else %}
|
{% else %}
|
||||||
{{ hedgedoc_common() }}
|
{{ hedgedoc_common() }}
|
||||||
{% endif %}
|
{% endif %}
|
||||||
}
|
}
|
||||||
|
|
||||||
{% if (var_element_and_nginx_tls_mode != "disable") %}
|
{% if (var_element_and_nginx_tls_mode != 'disable') %}
|
||||||
server {
|
server {
|
||||||
server_name {{var_hedgedoc_and_nginx_domain}};
|
server_name {{var_hedgedoc_and_nginx_domain}};
|
||||||
|
|
||||||
|
|
|
@ -17,14 +17,14 @@ server {
|
||||||
listen 80;
|
listen 80;
|
||||||
listen [::]:80;
|
listen [::]:80;
|
||||||
|
|
||||||
{% if (var_synapse_and_nginx_tls_mode == "force") %}
|
{% if (var_synapse_and_nginx_tls_mode == 'force') %}
|
||||||
return 301 https://$http_host$request_uri;
|
return 301 https://$http_host$request_uri;
|
||||||
{% else %}
|
{% else %}
|
||||||
{{ synapse_common() }}
|
{{ synapse_common() }}
|
||||||
{% endif %}
|
{% endif %}
|
||||||
}
|
}
|
||||||
|
|
||||||
{% if (var_element_and_nginx_tls_mode != "disable") %}
|
{% if (var_element_and_nginx_tls_mode != 'disable') %}
|
||||||
server {
|
server {
|
||||||
server_name {{var_synapse_and_nginx_domain}};
|
server_name {{var_synapse_and_nginx_domain}};
|
||||||
|
|
||||||
|
|
|
@ -11,14 +11,14 @@ server {
|
||||||
listen 80;
|
listen 80;
|
||||||
listen [::]:80;
|
listen [::]:80;
|
||||||
|
|
||||||
{% if (var_vikunja_and_nginx_tls_mode == "force") %}
|
{% if (var_vikunja_and_nginx_tls_mode == 'force') %}
|
||||||
return 301 https://$http_host$request_uri;
|
return 301 https://$http_host$request_uri;
|
||||||
{% else %}
|
{% else %}
|
||||||
{{ vikunja_common() }}
|
{{ vikunja_common() }}
|
||||||
{% endif %}
|
{% endif %}
|
||||||
}
|
}
|
||||||
|
|
||||||
{% if (var_vikunja_and_nginx_tls_mode != "disable") %}
|
{% if (var_vikunja_and_nginx_tls_mode != 'disable') %}
|
||||||
server {
|
server {
|
||||||
server_name {{var_vikunja_and_nginx_domain}};
|
server_name {{var_vikunja_and_nginx_domain}};
|
||||||
|
|
||||||
|
|
Loading…
Add table
Reference in a new issue