From dc28d22a908966f04e67019b3cee3f701f84e3d2 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Christian=20Fra=C3=9F?= Date: Wed, 3 Jul 2024 21:55:57 +0200 Subject: [PATCH] [mod] role:hedgedoc-and-nginx:tls mode --- roles/hedgedoc-and-nginx/defaults/main.json | 3 +- roles/hedgedoc-and-nginx/templates/conf.j2 | 38 +++++++++++++++------ roles/hedgedoc-and-nginx/vardef.json | 15 ++++++++ 3 files changed, 45 insertions(+), 11 deletions(-) create mode 100644 roles/hedgedoc-and-nginx/vardef.json diff --git a/roles/hedgedoc-and-nginx/defaults/main.json b/roles/hedgedoc-and-nginx/defaults/main.json index 840159e..aab8b85 100644 --- a/roles/hedgedoc-and-nginx/defaults/main.json +++ b/roles/hedgedoc-and-nginx/defaults/main.json @@ -1,3 +1,4 @@ { - "var_hedgedoc_and_nginx_domain": "hedgedoc.example.org" + "var_hedgedoc_and_nginx_domain": "hedgedoc.example.org", + "var_hedgedoc_and_nginx_tls_mode": "enable" } diff --git a/roles/hedgedoc-and-nginx/templates/conf.j2 b/roles/hedgedoc-and-nginx/templates/conf.j2 index 467a014..cb5480d 100644 --- a/roles/hedgedoc-and-nginx/templates/conf.j2 +++ b/roles/hedgedoc-and-nginx/templates/conf.j2 @@ -3,16 +3,7 @@ map $http_upgrade $connection_upgrade { '' close; } -server { - server_name {{var_hedgedoc_and_nginx_domain}}; - - listen [::]:443 ssl http2; - listen 443 ssl http2; - - ssl_certificate /etc/ssl/fullchains/{{var_hedgedoc_and_nginx_domain}}.pem; - ssl_certificate_key /etc/ssl/private/{{var_hedgedoc_and_nginx_domain}}.pem; - include /etc/nginx/ssl-hardening.conf; - +{% macro hedgedoc_common() %} location / { proxy_pass http://localhost:3000; proxy_set_header Host $host; @@ -30,4 +21,31 @@ server { proxy_set_header Upgrade $http_upgrade; proxy_set_header Connection $connection_upgrade; } +{% endmacro %} + +server { + server_name {{var_hedgedoc_and_nginx_domain}}; + + listen 80; + listen [::]:80; + +{% if (var_element_and_nginx_tls_mode == "force") %} + return 301 https://$http_host$request_uri; +{% else %} + {{ hedgedoc_common() }} +{% endif %} +} + +{% if (var_element_and_nginx_tls_mode != "disable") %} +server { + server_name {{var_hedgedoc_and_nginx_domain}}; + + listen [::]:443 ssl http2; + listen 443 ssl http2; + + ssl_certificate_key /etc/ssl/private/{{var_hedgedoc_and_nginx_domain}}.pem; + ssl_certificate /etc/ssl/fullchains/{{var_hedgedoc_and_nginx_domain}}.pem; + include /etc/nginx/ssl-hardening.conf; + + {{ hedgedoc_common() }} } diff --git a/roles/hedgedoc-and-nginx/vardef.json b/roles/hedgedoc-and-nginx/vardef.json new file mode 100644 index 0000000..e1e1a74 --- /dev/null +++ b/roles/hedgedoc-and-nginx/vardef.json @@ -0,0 +1,15 @@ +{ + "domain": { + "type": "string", + "mandatory": false + }, + "tls_mode": { + "type": "string", + "options": [ + "disable", + "enable", + "force" + ], + "mandatory": false + } +}