[task-406] nginx

This commit is contained in:
fenris 2025-10-09 01:47:49 +02:00
parent 88a65ad919
commit 6294edaa59
5 changed files with 43 additions and 26 deletions

View file

@ -0,0 +1,24 @@
{
"nullable": false,
"type": "object",
"properties": {
"domain": {
"nullable": false,
"type": "string"
},
"tls_mode": {
"nullable": false,
"type": "string",
"options": [
"disable",
"enable",
"force"
],
"enum": "force"
}
},
"additionalProperties": false,
"required": [
"domain"
]
}

View file

@ -1,4 +1,5 @@
{ {
"var_authelia_and_nginx_domain": "authelia.example.org", "cfg_authelia_and_nginx_defaults": {
"var_authelia_and_nginx_tls_mode": "force" "tls_mode": "force"
}
} }

View file

@ -1,4 +1,11 @@
[ [
{
"name": "show vars",
"when": "switch_show_vars",
"ansible.builtin.debug": {
"var": "vars.cfg_authelia_and_nginx"
}
},
{ {
"name": "deactivate default site", "name": "deactivate default site",
"become": true, "become": true,
@ -12,7 +19,7 @@
"become": true, "become": true,
"ansible.builtin.template": { "ansible.builtin.template": {
"src": "conf.j2", "src": "conf.j2",
"dest": "/etc/nginx/sites-available/{{var_authelia_and_nginx_domain}}" "dest": "/etc/nginx/sites-available/{{cfg_authelia_and_nginx.domain}}"
} }
}, },
{ {
@ -20,8 +27,8 @@
"become": true, "become": true,
"ansible.builtin.file": { "ansible.builtin.file": {
"state": "link", "state": "link",
"src": "/etc/nginx/sites-available/{{var_authelia_and_nginx_domain}}", "src": "/etc/nginx/sites-available/{{cfg_authelia_and_nginx.domain}}",
"dest": "/etc/nginx/sites-enabled/{{var_authelia_and_nginx_domain}}" "dest": "/etc/nginx/sites-enabled/{{cfg_authelia_and_nginx.domain}}"
} }
}, },
{ {

View file

@ -45,27 +45,27 @@
{% endmacro %} {% endmacro %}
server { server {
server_name {{var_authelia_and_nginx_domain}}; server_name {{cfg_authelia_and_nginx.domain}};
listen 80; listen 80;
listen [::]:80; listen [::]:80;
{% if (var_authelia_and_nginx_tls_mode == 'force') %} {% if (cfg_authelia_and_nginx.tls_mode == 'force') %}
return 301 https://$http_host$request_uri; return 301 https://$http_host$request_uri;
{% else %} {% else %}
{{ authelia_common() }} {{ authelia_common() }}
{% endif %} {% endif %}
} }
{% if (var_authelia_and_nginx_tls_mode != 'disable') %} {% if (cfg_authelia_and_nginx.tls_mode != 'disable') %}
server { server {
server_name {{var_authelia_and_nginx_domain}}; server_name {{cfg_authelia_and_nginx.domain}};
listen [::]:443 ssl http2; listen [::]:443 ssl http2;
listen 443 ssl http2; listen 443 ssl http2;
ssl_certificate_key /etc/ssl/private/{{var_authelia_and_nginx_domain}}.pem; ssl_certificate_key /etc/ssl/private/{{cfg_authelia_and_nginx.domain}}.pem;
ssl_certificate /etc/ssl/fullchains/{{var_authelia_and_nginx_domain}}.pem; ssl_certificate /etc/ssl/fullchains/{{cfg_authelia_and_nginx.domain}}.pem;
include /etc/nginx/ssl-hardening.conf; include /etc/nginx/ssl-hardening.conf;
{{ authelia_common() }} {{ authelia_common() }}

View file

@ -1,15 +0,0 @@
{
"domain": {
"type": "string",
"mandatory": false
},
"tls_mode": {
"type": "string",
"options": [
"disable",
"enable",
"force"
],
"mandatory": false
}
}