From 815ecf311522bc3325929cd52dbe15ba1c0338dc Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Christian=20Fra=C3=9F?= Date: Thu, 4 Jul 2024 22:54:59 +0200 Subject: [PATCH] [add] role:gitea-and-nginx --- roles/gitea-and-nginx/defaults/main.json | 4 +++ roles/gitea-and-nginx/info.md | 3 ++ roles/gitea-and-nginx/tasks/main.json | 35 ++++++++++++++++++++++++ roles/gitea-and-nginx/templates/conf.j2 | 34 +++++++++++++++++++++++ roles/gitea-and-nginx/vardef.json | 15 ++++++++++ 5 files changed, 91 insertions(+) create mode 100644 roles/gitea-and-nginx/defaults/main.json create mode 100644 roles/gitea-and-nginx/info.md create mode 100644 roles/gitea-and-nginx/tasks/main.json create mode 100644 roles/gitea-and-nginx/templates/conf.j2 create mode 100644 roles/gitea-and-nginx/vardef.json diff --git a/roles/gitea-and-nginx/defaults/main.json b/roles/gitea-and-nginx/defaults/main.json new file mode 100644 index 0000000..b035d24 --- /dev/null +++ b/roles/gitea-and-nginx/defaults/main.json @@ -0,0 +1,4 @@ +{ + "var_gitea_and_nginx_domain": "gitea.example.org", + "var_gitea_and_nginx_tls_mode": "enable" +} diff --git a/roles/gitea-and-nginx/info.md b/roles/gitea-and-nginx/info.md new file mode 100644 index 0000000..9e7f61f --- /dev/null +++ b/roles/gitea-and-nginx/info.md @@ -0,0 +1,3 @@ +## Verweise + +- [Gitea-Dokumentation](https://docs.gitea.com/next/administration/reverse-proxies#nginx) diff --git a/roles/gitea-and-nginx/tasks/main.json b/roles/gitea-and-nginx/tasks/main.json new file mode 100644 index 0000000..02cdf8e --- /dev/null +++ b/roles/gitea-and-nginx/tasks/main.json @@ -0,0 +1,35 @@ +[ + { + "name": "deactivate default site", + "become": true, + "ansible.builtin.file": { + "state": "absent", + "dest": "/etc/nginx/sites-enabled/default" + } + }, + { + "name": "emplace configuration | data", + "become": true, + "ansible.builtin.template": { + "src": "conf.j2", + "dest": "/etc/nginx/sites-available/{{var_gitea_and_nginx_domain}}" + } + }, + { + "name": "emplace configuration | link", + "become": true, + "ansible.builtin.file": { + "state": "link", + "src": "/etc/nginx/sites-available/{{var_gitea_and_nginx_domain}}", + "dest": "/etc/nginx/sites-enabled/{{var_gitea_and_nginx_domain}}" + } + }, + { + "name": "restart nginx", + "become": true, + "ansible.builtin.systemd_service": { + "state": "restarted", + "name": "nginx" + } + } +] diff --git a/roles/gitea-and-nginx/templates/conf.j2 b/roles/gitea-and-nginx/templates/conf.j2 new file mode 100644 index 0000000..73cb4bd --- /dev/null +++ b/roles/gitea-and-nginx/templates/conf.j2 @@ -0,0 +1,34 @@ +{% macro gitea_common %} + location / { + proxy_pass http://localhost:3456; + client_max_body_size 20M; + } +{% endmacro %} + +server { + listen 80; + listen [::]:80; + + server_name {{var_gitea_and_nginx_domain}}; + +{% if var_gitea_and_nginx_tls_mode == 'force' %} + return 301 https://$http_host$request_uri; +{% else %} + {{ gitea_common() }} +{% endif %} +} + +{% if var_gitea_and_nginx_tls_mode != 'disable' %} +server { + listen 443 ssl; + listen [::]:443 ssl; + + server_name {{var_gitea_and_nginx_domain}}; + + ssl_certificate_key /etc/ssl/private/{{var_gitea_and_nginx_domain}}.pem; + ssl_certificate /etc/ssl/fullchains/{{var_gitea_and_nginx_domain}}.pem; + include /etc/nginx/ssl-hardening.conf; + + {{ gitea_common() }} +} +{% endif %} diff --git a/roles/gitea-and-nginx/vardef.json b/roles/gitea-and-nginx/vardef.json new file mode 100644 index 0000000..08f61a3 --- /dev/null +++ b/roles/gitea-and-nginx/vardef.json @@ -0,0 +1,15 @@ +{ + "domain": { + "mandatory": false, + "type": "string" + }, + "tls_mode": { + "mandatory": false, + "type": "string", + "options": [ + "disable", + "enable", + "force" + ] + } +}