Initial commit
This commit is contained in:
commit
3d0d6c61ec
10 changed files with 246 additions and 0 deletions
9
.gitignore
vendored
Normal file
9
.gitignore
vendored
Normal file
|
|
@ -0,0 +1,9 @@
|
||||||
|
playbooks/vars/*.yml
|
||||||
|
playbooks/vars/*.yaml
|
||||||
|
playbooks/group_vars/*.yml
|
||||||
|
playbooks/group_vars/*.yaml
|
||||||
|
playbooks/host_vars/*.yml
|
||||||
|
playbooks/host_vars/*.yaml
|
||||||
|
inventory
|
||||||
|
ansible_collections
|
||||||
|
roles
|
||||||
30
README.md
Normal file
30
README.md
Normal file
|
|
@ -0,0 +1,30 @@
|
||||||
|
# ansible-scripts-home
|
||||||
|
###### by Frédéric CAMPO <contact@hebergemoi.fr>
|
||||||
|
|
||||||
|
## TODO:
|
||||||
|
- Setup the default reverse proxy virtual host (template is ready default-reverse.j2)
|
||||||
|
- Idiotproofing the playbook (setting up default values everywhere)
|
||||||
|
|
||||||
|
## 1. Installation
|
||||||
|
From the repository folder :
|
||||||
|
```bash
|
||||||
|
ansible-galaxy install -r requirements.yaml
|
||||||
|
```
|
||||||
|
|
||||||
|
## 2. Create your hosts vars file.
|
||||||
|
Example file:
|
||||||
|
|
||||||
|
playbooks/host_vars/webserver.yml
|
||||||
|
```yaml
|
||||||
|
site:
|
||||||
|
(virtual host fqdn):
|
||||||
|
enabled: true
|
||||||
|
upstream: '127.0.0.1:8080'
|
||||||
|
tls: true
|
||||||
|
(other virtual host fqdn):
|
||||||
|
enabled: true
|
||||||
|
upstream: '127.0.0.1:12700'
|
||||||
|
tls: true
|
||||||
|
```
|
||||||
|
|
||||||
|
## 3. Launch the playbook
|
||||||
5
ansible.cfg
Normal file
5
ansible.cfg
Normal file
|
|
@ -0,0 +1,5 @@
|
||||||
|
[defaults]
|
||||||
|
inventory = inventory
|
||||||
|
collections_path = .
|
||||||
|
roles_path = ./roles
|
||||||
|
interpreter_python = auto_silent
|
||||||
41
playbooks/git.yml
Normal file
41
playbooks/git.yml
Normal file
|
|
@ -0,0 +1,41 @@
|
||||||
|
- name: Setup Forgejo
|
||||||
|
hosts: git
|
||||||
|
pre_tasks:
|
||||||
|
- name: Install dependencies
|
||||||
|
ansible.builtin.apt:
|
||||||
|
pkg:
|
||||||
|
- curl
|
||||||
|
- apt-transport-https
|
||||||
|
state: present
|
||||||
|
tasks:
|
||||||
|
- name: Configure Forgejo apt sources
|
||||||
|
ansible.builtin.blockinfile:
|
||||||
|
path: /etc/apt/sources.list.d/forgejo-stable.sources
|
||||||
|
create: true
|
||||||
|
block: |
|
||||||
|
Types: deb
|
||||||
|
URIs: https://code.forgejo.org/api/packages/apt/debian
|
||||||
|
Suites: lts
|
||||||
|
Components: main
|
||||||
|
Architectures: amd64
|
||||||
|
Signed-By: /etc/apt/keyrings/forgejo.asc
|
||||||
|
mode: '644'
|
||||||
|
|
||||||
|
- name: Create keyrings folder
|
||||||
|
ansible.builtin.file:
|
||||||
|
path: /etc/apt/keyrings
|
||||||
|
owner: root
|
||||||
|
state: directory
|
||||||
|
mode: '755'
|
||||||
|
|
||||||
|
- name: Adding forgejo gpg key to apt keyring
|
||||||
|
ansible.builtin.get_url:
|
||||||
|
url: https://code.forgejo.org/api/packages/apt/debian/repository.key
|
||||||
|
dest: /etc/apt/keyrings/forgejo.asc
|
||||||
|
mode: '644'
|
||||||
|
|
||||||
|
- name: Install forgejo
|
||||||
|
ansible.builtin.apt:
|
||||||
|
pkg:
|
||||||
|
- forgejo
|
||||||
|
state: present
|
||||||
81
playbooks/reverseproxy.yml
Normal file
81
playbooks/reverseproxy.yml
Normal file
|
|
@ -0,0 +1,81 @@
|
||||||
|
- name: Nginx reverse proxy configuration
|
||||||
|
hosts: reverseproxy
|
||||||
|
handlers:
|
||||||
|
- name: Restart nginx
|
||||||
|
ansible.builtin.service:
|
||||||
|
name: nginx
|
||||||
|
state: restarted
|
||||||
|
tasks:
|
||||||
|
- name: Makes sure the nginx package is installed
|
||||||
|
ansible.builtin.apt:
|
||||||
|
pkg:
|
||||||
|
- nginx-full
|
||||||
|
|
||||||
|
- name: Nginx security configuration template
|
||||||
|
ansible.builtin.template:
|
||||||
|
src: "templates/nginx/snippets/security-hardening.conf.j2"
|
||||||
|
dest: "/etc/nginx/snippets/security-hardening.conf"
|
||||||
|
mode: '0644'
|
||||||
|
notify: Restart nginx
|
||||||
|
|
||||||
|
- name: Nginx security headers configuration template
|
||||||
|
ansible.builtin.template:
|
||||||
|
src: "templates/nginx/snippets/security-headers.conf.j2"
|
||||||
|
dest: "/etc/nginx/snippets/security-headers.conf"
|
||||||
|
mode: '0644'
|
||||||
|
notify: Restart nginx
|
||||||
|
|
||||||
|
- name: Create dhparam files
|
||||||
|
community.crypto.openssl_dhparam:
|
||||||
|
path: "/etc/nginx/dhparam.pem"
|
||||||
|
size: 4096
|
||||||
|
|
||||||
|
- name: Certificates generation
|
||||||
|
ansible.builtin.include_role:
|
||||||
|
name: geerlingguy.certbot
|
||||||
|
loop: "{{ site | dict2items }}"
|
||||||
|
when: "{{ item.value.tls | default(False) }}"
|
||||||
|
vars:
|
||||||
|
certbot_admin_email: "{{ acme_account.email }}"
|
||||||
|
certbot_install_method: package
|
||||||
|
certbot_auto_renew: true
|
||||||
|
certbot_auto_renew_user: "root"
|
||||||
|
certbot_create_if_missing: true
|
||||||
|
certbot_testmode: "{{ acme_account.testing | default(False) }}"
|
||||||
|
certbot_certs:
|
||||||
|
- name: "{{ item.key }}"
|
||||||
|
domains:
|
||||||
|
- "{{ item.key }}"
|
||||||
|
|
||||||
|
- name: Nginx website configuration template
|
||||||
|
ansible.builtin.template:
|
||||||
|
src: "templates/nginx/sites-available/default-reverse.j2"
|
||||||
|
dest: "/etc/nginx/sites-available/{{ item.key }}"
|
||||||
|
mode: '0644'
|
||||||
|
loop: "{{ site | dict2items }}"
|
||||||
|
when: "item.value.enabled"
|
||||||
|
notify: Restart nginx
|
||||||
|
|
||||||
|
- name: Removing disabled websites from nginx configuration
|
||||||
|
ansible.builtin.file:
|
||||||
|
path: "/etc/nginx/sites-available/{{ item.key }}"
|
||||||
|
state: absent
|
||||||
|
loop: "{{ site | dict2items }}"
|
||||||
|
when: "not item.value.enabled"
|
||||||
|
|
||||||
|
- name: Disable websites in nginx configuration
|
||||||
|
ansible.builtin.file:
|
||||||
|
path: "/etc/nginx/sites-enabled/{{ item.key }}"
|
||||||
|
state: absent
|
||||||
|
loop: "{{ site | dict2items }}"
|
||||||
|
when: "not item.value.enabled"
|
||||||
|
notify: Restart nginx
|
||||||
|
|
||||||
|
- name: Enable websites in nginx configuration
|
||||||
|
ansible.builtin.file:
|
||||||
|
src: "/etc/nginx/sites-available/{{ item.key }}"
|
||||||
|
dest: "/etc/nginx/sites-enabled/{{ item.key }}"
|
||||||
|
state: link
|
||||||
|
loop: "{{ site | dict2items }}"
|
||||||
|
when: "item.value.enabled"
|
||||||
|
notify: Restart nginx
|
||||||
|
|
@ -0,0 +1,15 @@
|
||||||
|
# ANSIBLE MAINTAINED FILE - DO NOT EDIT MANUALLY
|
||||||
|
server {
|
||||||
|
listen 80 default_server;
|
||||||
|
listen [::]:80 default_server;
|
||||||
|
listen 443 ssl default_server;
|
||||||
|
listen [::]:443 ssl default_server;
|
||||||
|
|
||||||
|
server_name _;
|
||||||
|
|
||||||
|
# Self-signed or snakeoil cert just to complete the TLS handshake
|
||||||
|
ssl_certificate /etc/letsencrypt/live/{{ item.key }}/fullchain.pem;
|
||||||
|
ssl_certificate_key /etc/letsencrypt/live/{{ item.key }}/privkey.pem;
|
||||||
|
|
||||||
|
return 444;
|
||||||
|
}
|
||||||
41
playbooks/templates/nginx/sites-available/default-reverse.j2
Normal file
41
playbooks/templates/nginx/sites-available/default-reverse.j2
Normal file
|
|
@ -0,0 +1,41 @@
|
||||||
|
# ANSIBLE MAINTAINED FILE - DO NOT EDIT MANUALLY
|
||||||
|
upstream {{ item.key }} {
|
||||||
|
server {{ item.value.upstream }};
|
||||||
|
}
|
||||||
|
|
||||||
|
server {
|
||||||
|
server_name {{ item.key }};
|
||||||
|
listen 443 ssl;
|
||||||
|
listen [::]:443 ssl;
|
||||||
|
http2 on;
|
||||||
|
include /etc/nginx/snippets/security-hardening.conf;
|
||||||
|
ssl_certificate /etc/letsencrypt/live/{{ item.key }}/fullchain.pem;
|
||||||
|
ssl_certificate_key /etc/letsencrypt/live/{{ item.key }}/privkey.pem;
|
||||||
|
|
||||||
|
location / {
|
||||||
|
include /etc/nginx/snippets/security-headers.conf;
|
||||||
|
proxy_pass http://{{ item.key }};
|
||||||
|
proxy_set_header Connection $http_connection;
|
||||||
|
proxy_set_header Upgrade $http_upgrade;
|
||||||
|
proxy_set_header Host $host;
|
||||||
|
proxy_set_header X-Real-IP $remote_addr;
|
||||||
|
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||||
|
proxy_set_header X-Forwarded-Proto $scheme;
|
||||||
|
|
||||||
|
proxy_connect_timeout 15;
|
||||||
|
proxy_send_timeout 15;
|
||||||
|
limit_except GET POST {
|
||||||
|
deny all;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
server {
|
||||||
|
server_name {{ item.key }};
|
||||||
|
listen 80;
|
||||||
|
listen [::]:80;
|
||||||
|
|
||||||
|
return 301 https://$host$request_uri;
|
||||||
|
}
|
||||||
|
|
||||||
|
|
@ -0,0 +1,13 @@
|
||||||
|
# ANSIBLE MAINTAINED FILE - DO NOT EDIT MANUALLY
|
||||||
|
ssl_protocols TLSv1.3;
|
||||||
|
ssl_ecdh_curve X25519MLKEM768:X25519:prime256v1:secp384r1;
|
||||||
|
ssl_prefer_server_ciphers off;
|
||||||
|
ssl_dhparam /etc/nginx/dhparam.pem;
|
||||||
|
|
||||||
|
client_max_body_size 512m;
|
||||||
|
client_body_buffer_size 16k;
|
||||||
|
large_client_header_buffers 4 16k;
|
||||||
|
client_body_timeout 30s;
|
||||||
|
client_header_timeout 30s;
|
||||||
|
send_timeout 30s;
|
||||||
|
keepalive_timeout 65s;
|
||||||
|
|
@ -0,0 +1,7 @@
|
||||||
|
# ANSIBLE MAINTAINED FILE - DO NOT EDIT MANUALLY
|
||||||
|
add_header Strict-Transport-Security "max-age=63072000; includeSubDomains" always;
|
||||||
|
add_header X-Content-Type-Options "nosniff" always;
|
||||||
|
add_header X-Frame-Options "SAMEORIGIN" always;
|
||||||
|
add_header Content-Security-Policy "default-src 'none'; script-src 'self' 'nonce-{RANDOM}' 'unsafe-inline' 'unsafe-eval'; style-src 'self' 'unsafe-inline'; object-src 'none'; base-uri 'none'; frame-ancestors 'none'; img-src 'self' data:; font-src 'self'; connect-src 'self'; upgrade-insecure-requests" always;
|
||||||
|
add_header Referrer-Policy "strict-origin-when-cross-origin" always;
|
||||||
|
add_header Permissions-Policy "camera=(), microphone=(), geolocation=(), payment=(), usb=()" always;
|
||||||
4
requirements.yaml
Normal file
4
requirements.yaml
Normal file
|
|
@ -0,0 +1,4 @@
|
||||||
|
collections:
|
||||||
|
- community.general
|
||||||
|
roles:
|
||||||
|
- name: geerlingguy.certbot
|
||||||
Loading…
Add table
Add a link
Reference in a new issue