[mod] nginx-connector-roles:conf formatting

This commit is contained in:
roydfalk 2024-07-09 09:19:57 +02:00
parent 71f0549191
commit 75caf79a51
7 changed files with 14 additions and 14 deletions

View file

@ -53,7 +53,7 @@ server {
{% if (var_authelia_and_nginx_tls_mode == "force") %} {% if (var_authelia_and_nginx_tls_mode == "force") %}
return 301 https://$http_host$request_uri; return 301 https://$http_host$request_uri;
{% else %} {% else %}
{{ authelia_common() }} {{ authelia_common() }}
{% endif %} {% endif %}
} }
@ -68,6 +68,6 @@ server {
ssl_certificate /etc/ssl/fullchains/{{var_authelia_and_nginx_domain}}.pem; ssl_certificate /etc/ssl/fullchains/{{var_authelia_and_nginx_domain}}.pem;
include /etc/nginx/ssl-hardening.conf; include /etc/nginx/ssl-hardening.conf;
{{ authelia_common() }} {{ authelia_common() }}
} }
{% endif %} {% endif %}

View file

@ -51,7 +51,7 @@ server {
{% if (var_dokuwki_and_nginx_tls_mode == "force") %} {% if (var_dokuwki_and_nginx_tls_mode == "force") %}
return 301 https://$http_host$request_uri; return 301 https://$http_host$request_uri;
{% else %} {% else %}
{{ dokuwki_common() }} {{ dokuwki_common() }}
{% endif %} {% endif %}
} }
@ -66,6 +66,6 @@ server {
ssl_certificate /etc/ssl/fullchains/{{var_dokuwki_and_nginx_domain}}.pem; ssl_certificate /etc/ssl/fullchains/{{var_dokuwki_and_nginx_domain}}.pem;
include /etc/nginx/ssl-hardening.conf; include /etc/nginx/ssl-hardening.conf;
{{ dokuwki_common() }} {{ dokuwki_common() }}
} }
{% endif %} {% endif %}

View file

@ -10,7 +10,7 @@ server {
{% if (var_element_and_nginx_tls_mode == "force") %} {% if (var_element_and_nginx_tls_mode == "force") %}
return 301 https://$http_host$request_uri; return 301 https://$http_host$request_uri;
{% else %} {% else %}
{{ element_common() }} {{ element_common() }}
{% endif %} {% endif %}
} }
{% if (var_element_and_nginx_tls_mode != "disable") %} {% if (var_element_and_nginx_tls_mode != "disable") %}
@ -25,6 +25,6 @@ server {
ssl_certificate_key /etc/ssl/private/{{var_element_and_nginx_domain}}.pem; ssl_certificate_key /etc/ssl/private/{{var_element_and_nginx_domain}}.pem;
include /etc/nginx/ssl-hardening.conf; include /etc/nginx/ssl-hardening.conf;
{{ element_common() }} {{ element_common() }}
} }
{% endif %} {% endif %}

View file

@ -79,7 +79,7 @@ server {
access_log /var/log/nginx/gitlab_access.log; access_log /var/log/nginx/gitlab_access.log;
error_log /var/log/nginx/gitlab_error.log; error_log /var/log/nginx/gitlab_error.log;
{{ gitlab_common() }} {{ gitlab_common() }}
{% endif %} {% endif %}
} }
@ -98,6 +98,6 @@ server {
access_log /var/log/nginx/gitlab_access.log gitlab_ssl_access; access_log /var/log/nginx/gitlab_access.log gitlab_ssl_access;
error_log /var/log/nginx/gitlab_error.log; error_log /var/log/nginx/gitlab_error.log;
{{ gitlab_common() }} {{ gitlab_common() }}
} }
{% endif %} {% endif %}

View file

@ -32,7 +32,7 @@ server {
{% if (var_element_and_nginx_tls_mode == "force") %} {% if (var_element_and_nginx_tls_mode == "force") %}
return 301 https://$http_host$request_uri; return 301 https://$http_host$request_uri;
{% else %} {% else %}
{{ hedgedoc_common() }} {{ hedgedoc_common() }}
{% endif %} {% endif %}
} }
@ -47,5 +47,5 @@ server {
ssl_certificate /etc/ssl/fullchains/{{var_hedgedoc_and_nginx_domain}}.pem; ssl_certificate /etc/ssl/fullchains/{{var_hedgedoc_and_nginx_domain}}.pem;
include /etc/nginx/ssl-hardening.conf; include /etc/nginx/ssl-hardening.conf;
{{ hedgedoc_common() }} {{ hedgedoc_common() }}
} }

View file

@ -20,7 +20,7 @@ server {
{% if (var_synapse_and_nginx_tls_mode == "force") %} {% if (var_synapse_and_nginx_tls_mode == "force") %}
return 301 https://$http_host$request_uri; return 301 https://$http_host$request_uri;
{% else %} {% else %}
{{ synapse_common() }} {{ synapse_common() }}
{% endif %} {% endif %}
} }
@ -39,6 +39,6 @@ server {
ssl_certificate /etc/ssl/fullchains/{{var_synapse_and_nginx_domain}}.pem; ssl_certificate /etc/ssl/fullchains/{{var_synapse_and_nginx_domain}}.pem;
include /etc/nginx/ssl-hardening.conf; include /etc/nginx/ssl-hardening.conf;
{{ synapse_common() }} {{ synapse_common() }}
} }
{% endif %} {% endif %}

View file

@ -14,7 +14,7 @@ server {
{% if (var_vikunja_and_nginx_tls_mode == "force") %} {% if (var_vikunja_and_nginx_tls_mode == "force") %}
return 301 https://$http_host$request_uri; return 301 https://$http_host$request_uri;
{% else %} {% else %}
{{ vikunja_common() }} {{ vikunja_common() }}
{% endif %} {% endif %}
} }
@ -29,6 +29,6 @@ server {
ssl_certificate /etc/ssl/fullchains/{{var_vikunja_and_nginx_domain}}.pem; ssl_certificate /etc/ssl/fullchains/{{var_vikunja_and_nginx_domain}}.pem;
include /etc/nginx/ssl-hardening.conf; include /etc/nginx/ssl-hardening.conf;
{{ vikunja_common() }} {{ vikunja_common() }}
} }
{% endif %} {% endif %}