ansible-base/roles/nginx/tasks/main.json

67 lines
1.2 KiB
JSON
Raw Normal View History

2023-11-20 02:07:08 +01:00
[
{
"name": "install packages",
"become": true,
"ansible.builtin.apt": {
2024-03-20 00:05:42 +01:00
"update_cache": true,
2023-11-20 02:07:08 +01:00
"pkg": [
2024-04-24 19:33:35 +02:00
"nginx",
"openssl"
2023-11-20 02:07:08 +01:00
]
}
},
{
"name": "generate dhparams file",
2024-06-01 16:06:35 +02:00
"become": true,
"ansible.builtin.command": "openssl dhparam -out /etc/nginx/dhparam 4096",
"args": {
"creates": "/etc/nginx/dhparam"
}
},
{
"name": "place hardening config",
"become": true,
"ansible.builtin.copy": {
"src": "ssl-hardening.conf",
"dest": "/etc/nginx/ssl-hardening.conf"
}
},
{
"name": "Check wether enabling UFW would be considered a changed",
"check_mode": true,
"community.general.ufw": {
"state": "enabled",
2024-06-01 16:17:11 +02:00
},
"register": "ufw_enable_check"
},
{
2024-06-01 16:17:11 +02:00
"when": "not ufw_enable_check.changed",
"name": "Allow port 80 in ufw",
2024-06-01 16:17:11 +02:00
"become": true,
"community.general.ufw": {
"rule": "allow",
"port": "80",
"proto": "tcp"
2024-06-01 16:17:11 +02:00
}
},
{
2024-06-01 16:17:11 +02:00
"when": "not ufw_enable_check.changed",
"name": "Allow port 443 in ufw",
2024-06-01 16:17:11 +02:00
"become": true,
"community.general.ufw": {
"rule": "allow",
"port": "443",
"proto": "tcp"
2024-06-01 16:17:11 +02:00
}
},
2023-11-20 02:07:08 +01:00
{
"name": "restart service",
"become": true,
"ansible.builtin.systemd_service": {
"state": "restarted",
"name": "nginx"
}
}
]