init
This commit is contained in:
8
ansible/ansible.cfg
Normal file
8
ansible/ansible.cfg
Normal file
@@ -0,0 +1,8 @@
|
|||||||
|
[defaults]
|
||||||
|
inventory = ./inventories/production/hosts.ini
|
||||||
|
|
||||||
|
[privilege_escalation]
|
||||||
|
become = True
|
||||||
|
become_method = sudo
|
||||||
|
become_user = root
|
||||||
|
become_ask_pass = False
|
||||||
8
ansible/gitea.yaml
Normal file
8
ansible/gitea.yaml
Normal file
@@ -0,0 +1,8 @@
|
|||||||
|
---
|
||||||
|
# file: gitea.yaml
|
||||||
|
- hosts: gitea
|
||||||
|
roles:
|
||||||
|
- common
|
||||||
|
- nginx
|
||||||
|
- gitea
|
||||||
|
|
||||||
1
ansible/inventories/production/group_vars/all.yaml
Normal file
1
ansible/inventories/production/group_vars/all.yaml
Normal file
@@ -0,0 +1 @@
|
|||||||
|
lego_version: "4.30.1"
|
||||||
@@ -0,0 +1 @@
|
|||||||
|
letsencrypt_email: "me@jthan.io"
|
||||||
@@ -0,0 +1 @@
|
|||||||
|
gitea_version: 1.25.3
|
||||||
2
ansible/inventories/production/hosts.ini
Normal file
2
ansible/inventories/production/hosts.ini
Normal file
@@ -0,0 +1,2 @@
|
|||||||
|
[gitea]
|
||||||
|
git.jthan.io
|
||||||
10
ansible/requirements.txt
Normal file
10
ansible/requirements.txt
Normal file
@@ -0,0 +1,10 @@
|
|||||||
|
ansible==13.1.0
|
||||||
|
ansible-core==2.20.1
|
||||||
|
cffi==2.0.0
|
||||||
|
cryptography==46.0.3
|
||||||
|
Jinja2==3.1.6
|
||||||
|
MarkupSafe==3.0.3
|
||||||
|
packaging==25.0
|
||||||
|
pycparser==2.23
|
||||||
|
PyYAML==6.0.3
|
||||||
|
resolvelib==1.2.1
|
||||||
16
ansible/roles/common/tasks/main.yaml
Normal file
16
ansible/roles/common/tasks/main.yaml
Normal file
@@ -0,0 +1,16 @@
|
|||||||
|
- name: Set the hostname per inventory
|
||||||
|
hostname:
|
||||||
|
name: "{{ inventory_hostname }}"
|
||||||
|
use: systemd
|
||||||
|
|
||||||
|
- name: Install firewalld
|
||||||
|
package:
|
||||||
|
name: firewalld
|
||||||
|
state: latest
|
||||||
|
|
||||||
|
- name: Start and enable firewalld
|
||||||
|
service:
|
||||||
|
name: firewalld
|
||||||
|
state: started
|
||||||
|
enabled: true
|
||||||
|
|
||||||
5
ansible/roles/gitea/handlers/main.yaml
Normal file
5
ansible/roles/gitea/handlers/main.yaml
Normal file
@@ -0,0 +1,5 @@
|
|||||||
|
- name: Restart gitea
|
||||||
|
service:
|
||||||
|
name: gitea
|
||||||
|
state: restarted
|
||||||
|
|
||||||
86
ansible/roles/gitea/tasks/main.yaml
Normal file
86
ansible/roles/gitea/tasks/main.yaml
Normal file
@@ -0,0 +1,86 @@
|
|||||||
|
- name: Download gitea
|
||||||
|
get_url:
|
||||||
|
url: https://dl.gitea.com/gitea/{{ gitea_version }}/gitea-{{ gitea_version }}-linux-amd64
|
||||||
|
dest: /usr/local/bin/gitea
|
||||||
|
mode: 0755
|
||||||
|
|
||||||
|
- name: Create a git group
|
||||||
|
group:
|
||||||
|
name: git
|
||||||
|
state: present
|
||||||
|
gid: 1050
|
||||||
|
|
||||||
|
- name: Create a git user
|
||||||
|
user:
|
||||||
|
name: git
|
||||||
|
uid: 1050
|
||||||
|
group: 1050
|
||||||
|
comment: "git user"
|
||||||
|
shell: /bin/bash
|
||||||
|
state: present
|
||||||
|
create_home: yes
|
||||||
|
|
||||||
|
- name: Create gitea data and logging directories
|
||||||
|
file:
|
||||||
|
path: "{{ item }}"
|
||||||
|
state: directory
|
||||||
|
mode: 0750
|
||||||
|
owner: git
|
||||||
|
group: git
|
||||||
|
loop:
|
||||||
|
- /var/lib/gitea
|
||||||
|
- /var/lib/gitea/custom
|
||||||
|
- /var/lib/gitea/log
|
||||||
|
- /var/lib/gitea/data
|
||||||
|
|
||||||
|
- name: Create gitea config directory
|
||||||
|
file:
|
||||||
|
path: "/etc/gitea"
|
||||||
|
state: directory
|
||||||
|
mode: 0770
|
||||||
|
owner: root
|
||||||
|
group: git
|
||||||
|
|
||||||
|
- name: Install gitea service
|
||||||
|
template:
|
||||||
|
src: templates/gitea.service.j2
|
||||||
|
dest: /etc/systemd/system/gitea.service
|
||||||
|
owner: root
|
||||||
|
group: root
|
||||||
|
mode: 0640
|
||||||
|
register: gitea_service
|
||||||
|
notify: Restart gitea
|
||||||
|
|
||||||
|
- name: systemctl daemon-reload to pickup gitea service changes
|
||||||
|
systemd_service:
|
||||||
|
daemon_reload: true
|
||||||
|
when: gitea_service.changed
|
||||||
|
notify: Restart gitea
|
||||||
|
|
||||||
|
- name: Check if gitea web installer wrote its config
|
||||||
|
stat:
|
||||||
|
path: /etc/gitea/app.ini"
|
||||||
|
register: gitea_config_check
|
||||||
|
|
||||||
|
- name: Start and enable gitea
|
||||||
|
service:
|
||||||
|
name: gitea
|
||||||
|
state: started
|
||||||
|
enabled: true
|
||||||
|
|
||||||
|
- name: Update gitea config directory permissions post install
|
||||||
|
file:
|
||||||
|
path: "/etc/gitea"
|
||||||
|
state: directory
|
||||||
|
mode: 0750
|
||||||
|
owner: root
|
||||||
|
group: git
|
||||||
|
when: gitea_config_check.stat.exists
|
||||||
|
|
||||||
|
- name: Update gitea config file permissions post install
|
||||||
|
file:
|
||||||
|
path: "/etc/gitea/app.ini"
|
||||||
|
mode: 0640
|
||||||
|
owner: root
|
||||||
|
group: git
|
||||||
|
when: gitea_config_check.stat.exists
|
||||||
85
ansible/roles/gitea/tasks/templates/gitea.service.j2
Normal file
85
ansible/roles/gitea/tasks/templates/gitea.service.j2
Normal file
@@ -0,0 +1,85 @@
|
|||||||
|
[Unit]
|
||||||
|
Description=Gitea (Git with a cup of tea)
|
||||||
|
After=network.target
|
||||||
|
###
|
||||||
|
# Don't forget to add the database service dependencies
|
||||||
|
###
|
||||||
|
#
|
||||||
|
#Wants=mysql.service
|
||||||
|
#After=mysql.service
|
||||||
|
#
|
||||||
|
#Wants=mariadb.service
|
||||||
|
#After=mariadb.service
|
||||||
|
#
|
||||||
|
#Wants=postgresql.service
|
||||||
|
#After=postgresql.service
|
||||||
|
#
|
||||||
|
#Wants=memcached.service
|
||||||
|
#After=memcached.service
|
||||||
|
#
|
||||||
|
#Wants=redis.service
|
||||||
|
#After=redis.service
|
||||||
|
#
|
||||||
|
###
|
||||||
|
# If using socket activation for main http/s
|
||||||
|
###
|
||||||
|
#
|
||||||
|
#After=gitea.main.socket
|
||||||
|
#Requires=gitea.main.socket
|
||||||
|
#
|
||||||
|
###
|
||||||
|
# (You can also provide gitea an http fallback and/or ssh socket too)
|
||||||
|
#
|
||||||
|
# An example of /etc/systemd/system/gitea.main.socket
|
||||||
|
###
|
||||||
|
##
|
||||||
|
## [Unit]
|
||||||
|
## Description=Gitea Web Socket
|
||||||
|
## PartOf=gitea.service
|
||||||
|
##
|
||||||
|
## [Socket]
|
||||||
|
## Service=gitea.service
|
||||||
|
## ListenStream=<some_port>
|
||||||
|
## NoDelay=true
|
||||||
|
##
|
||||||
|
## [Install]
|
||||||
|
## WantedBy=sockets.target
|
||||||
|
##
|
||||||
|
###
|
||||||
|
|
||||||
|
[Service]
|
||||||
|
# Uncomment the next line if you have repos with lots of files and get a HTTP 500 error because of that
|
||||||
|
# LimitNOFILE=524288:524288
|
||||||
|
RestartSec=2s
|
||||||
|
Type=simple
|
||||||
|
User=git
|
||||||
|
Group=git
|
||||||
|
WorkingDirectory=/var/lib/gitea/
|
||||||
|
# If using Unix socket: tells systemd to create the /run/gitea folder, which will contain the gitea.sock file
|
||||||
|
# (manually creating /run/gitea doesn't work, because it would not persist across reboots)
|
||||||
|
#RuntimeDirectory=gitea
|
||||||
|
ExecStart=/usr/local/bin/gitea web --config /etc/gitea/app.ini
|
||||||
|
Restart=always
|
||||||
|
Environment=USER=git HOME=/home/git GITEA_WORK_DIR=/var/lib/gitea
|
||||||
|
# If you install Git to directory prefix other than default PATH (which happens
|
||||||
|
# for example if you install other versions of Git side-to-side with
|
||||||
|
# distribution version), uncomment below line and add that prefix to PATH
|
||||||
|
# Don't forget to place git-lfs binary on the PATH below if you want to enable
|
||||||
|
# Git LFS support
|
||||||
|
#Environment=PATH=/path/to/git/bin:/bin:/sbin:/usr/bin:/usr/sbin
|
||||||
|
# If you want to bind Gitea to a port below 1024, uncomment
|
||||||
|
# the two values below, or use socket activation to pass Gitea its ports as above
|
||||||
|
###
|
||||||
|
#CapabilityBoundingSet=CAP_NET_BIND_SERVICE
|
||||||
|
#AmbientCapabilities=CAP_NET_BIND_SERVICE
|
||||||
|
###
|
||||||
|
# In some cases, when using CapabilityBoundingSet and AmbientCapabilities option, you may want to
|
||||||
|
# set the following value to false to allow capabilities to be applied on gitea process. The following
|
||||||
|
# value if set to true sandboxes gitea service and prevent any processes from running with privileges
|
||||||
|
# in the host user namespace.
|
||||||
|
###
|
||||||
|
#PrivateUsers=false
|
||||||
|
###
|
||||||
|
|
||||||
|
[Install]
|
||||||
|
WantedBy=multi-user.target
|
||||||
35
ansible/roles/lego/tasks/copy_certs.yaml
Normal file
35
ansible/roles/lego/tasks/copy_certs.yaml
Normal file
@@ -0,0 +1,35 @@
|
|||||||
|
- name: Find certificates to copy
|
||||||
|
find:
|
||||||
|
paths: /root/.lego/certificates
|
||||||
|
recurse: true
|
||||||
|
patterns:
|
||||||
|
- "*.crt"
|
||||||
|
register: certs_to_copy
|
||||||
|
|
||||||
|
- name: Copy certificates to nginx ssl directory
|
||||||
|
copy:
|
||||||
|
remote_src: true
|
||||||
|
src: "{{ item.path }}"
|
||||||
|
dest: /etc/nginx/ssl
|
||||||
|
owner: nginx
|
||||||
|
mode: 0600
|
||||||
|
with_items: "{{ certs_to_copy.files }}"
|
||||||
|
|
||||||
|
- name: Find keys to copy
|
||||||
|
find:
|
||||||
|
paths: /root/.lego/certificates
|
||||||
|
recurse: true
|
||||||
|
patterns:
|
||||||
|
- "*.key"
|
||||||
|
register: keys_to_copy
|
||||||
|
|
||||||
|
|
||||||
|
- name: Copy keys to nginx ssl directory
|
||||||
|
copy:
|
||||||
|
remote_src: true
|
||||||
|
src: "{{ item.path }}"
|
||||||
|
dest: /etc/nginx/ssl
|
||||||
|
owner: nginx
|
||||||
|
mode: 0600
|
||||||
|
with_items: "{{ keys_to_copy.files }}"
|
||||||
|
|
||||||
15
ansible/roles/lego/tasks/initial_cert.yaml
Normal file
15
ansible/roles/lego/tasks/initial_cert.yaml
Normal file
@@ -0,0 +1,15 @@
|
|||||||
|
- name: Stop nginx to generate initial lego cert
|
||||||
|
service:
|
||||||
|
name: nginx
|
||||||
|
state: stopped
|
||||||
|
|
||||||
|
- name: Generate initial cert
|
||||||
|
command:
|
||||||
|
cmd: /usr/local/bin/lego -a --email="{{ letsencrypt_email }}" --domains="{{ inventory_hostname | default(cert_domain) }}" --key-type {{ cert_key_type | default('rsa4096') }} --http run
|
||||||
|
chdir: /root
|
||||||
|
creates: "/root/.lego/certificates/{{ inventory_hostname | default(cert_domain) }}.crt"
|
||||||
|
|
||||||
|
- name: Start nginx after generating initial lego cert
|
||||||
|
service:
|
||||||
|
name: nginx
|
||||||
|
state: started
|
||||||
19
ansible/roles/lego/tasks/main.yaml
Normal file
19
ansible/roles/lego/tasks/main.yaml
Normal file
@@ -0,0 +1,19 @@
|
|||||||
|
- name: Download and untar lego
|
||||||
|
unarchive:
|
||||||
|
src: https://github.com/go-acme/lego/releases/download/v{{ lego_version }}/lego_v{{ lego_version }}_linux_amd64.tar.gz
|
||||||
|
dest: /usr/local/bin
|
||||||
|
remote_src: yes
|
||||||
|
|
||||||
|
- name: Check if certs exist
|
||||||
|
stat:
|
||||||
|
path: /root/.lego/certificates/{{ inventory_hostname | default(cert_domain) }}.crt
|
||||||
|
register: cert_check
|
||||||
|
|
||||||
|
- name: Generate an initial cert if not present
|
||||||
|
include_tasks:
|
||||||
|
file: initial_cert.yaml
|
||||||
|
when: not cert_check.stat.exists
|
||||||
|
|
||||||
|
- name: Copy certificates
|
||||||
|
include_tasks:
|
||||||
|
file: copy_certs.yaml
|
||||||
4
ansible/roles/nginx/handlers/main.yaml
Normal file
4
ansible/roles/nginx/handlers/main.yaml
Normal file
@@ -0,0 +1,4 @@
|
|||||||
|
- name: Restart nginx
|
||||||
|
service:
|
||||||
|
name: nginx
|
||||||
|
state: restarted
|
||||||
57
ansible/roles/nginx/tasks/main.yaml
Normal file
57
ansible/roles/nginx/tasks/main.yaml
Normal file
@@ -0,0 +1,57 @@
|
|||||||
|
- name: Install nginx
|
||||||
|
package:
|
||||||
|
name: nginx
|
||||||
|
state: latest
|
||||||
|
|
||||||
|
- name: Install nginx.conf
|
||||||
|
template:
|
||||||
|
src: templates/nginx.conf.j2
|
||||||
|
dest: /etc/nginx/nginx.conf
|
||||||
|
owner: nginx
|
||||||
|
group: nginx
|
||||||
|
mode: '0644'
|
||||||
|
notify: Restart nginx
|
||||||
|
|
||||||
|
- name: Create nginx ssl directory
|
||||||
|
file:
|
||||||
|
path: /etc/nginx/ssl
|
||||||
|
state: directory
|
||||||
|
mode: '0755'
|
||||||
|
|
||||||
|
- name: Generate dhparams
|
||||||
|
command:
|
||||||
|
cmd: openssl dhparam -out /etc/nginx/ssl/dhparam.pem 4096
|
||||||
|
creates: /etc/nginx/ssl/dhparam.pem
|
||||||
|
notify: Restart nginx
|
||||||
|
|
||||||
|
- name: Start and enable nginx
|
||||||
|
service:
|
||||||
|
name: nginx
|
||||||
|
state: started
|
||||||
|
enabled: true
|
||||||
|
|
||||||
|
- name: Permanently enable http service
|
||||||
|
ansible.posix.firewalld:
|
||||||
|
service: http
|
||||||
|
state: enabled
|
||||||
|
permanent: true
|
||||||
|
immediate: true
|
||||||
|
offline: true
|
||||||
|
|
||||||
|
- name: Permanently enable https service
|
||||||
|
ansible.posix.firewalld:
|
||||||
|
service: https
|
||||||
|
state: enabled
|
||||||
|
permanent: true
|
||||||
|
immediate: true
|
||||||
|
offline: true
|
||||||
|
|
||||||
|
- name: Create nginx vhosts
|
||||||
|
template:
|
||||||
|
src: templates/vhost.conf.j2
|
||||||
|
dest: /etc/nginx/conf.d/{{ inventory_hostname }}.conf
|
||||||
|
owner: nginx
|
||||||
|
group: nginx
|
||||||
|
mode: '0644'
|
||||||
|
notify: Restart nginx
|
||||||
|
|
||||||
18
ansible/roles/nginx/tasks/templates/nginx.conf.j2
Normal file
18
ansible/roles/nginx/tasks/templates/nginx.conf.j2
Normal file
@@ -0,0 +1,18 @@
|
|||||||
|
user nginx;
|
||||||
|
worker_processes 2;
|
||||||
|
error_log /var/log/nginx/main_error.log;
|
||||||
|
events {
|
||||||
|
worker_connections 1024;
|
||||||
|
}
|
||||||
|
http {
|
||||||
|
include mime.types;
|
||||||
|
default_type application/octet-stream;
|
||||||
|
log_format main '$remote_addr - $remote_user [$time_local] "$request" '
|
||||||
|
'$status $body_bytes_sent "$http_referer" '
|
||||||
|
'"$http_user_agent" "$http_x_forwarded_for"';
|
||||||
|
access_log /var/log/nginx/access.log;
|
||||||
|
error_log /var/log/nginx/http_error.log;
|
||||||
|
sendfile on;
|
||||||
|
keepalive_timeout 65;
|
||||||
|
include conf.d/*;
|
||||||
|
}
|
||||||
48
ansible/roles/nginx/tasks/templates/vhost.conf.j2
Normal file
48
ansible/roles/nginx/tasks/templates/vhost.conf.j2
Normal file
@@ -0,0 +1,48 @@
|
|||||||
|
server {
|
||||||
|
listen [::]:80 ipv6only=off default_server;
|
||||||
|
server_name {{ inventory_hostname }};
|
||||||
|
root /srv/http/{{ inventory_hostname }}/html;
|
||||||
|
|
||||||
|
# Allow lego to renew certs here using its own http server, we just proxy
|
||||||
|
location /.well-known/acme-challenge {
|
||||||
|
proxy_pass http://127.0.0.1:81;
|
||||||
|
proxy_set_header Host $host;
|
||||||
|
}
|
||||||
|
|
||||||
|
location / {
|
||||||
|
return 301 https://{{ inventory_hostname }}$request_uri;
|
||||||
|
index index.htm index.html;
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
server {
|
||||||
|
listen [::]:443 ssl ipv6only=off default_server;
|
||||||
|
http2 on;
|
||||||
|
ssl_certificate /etc/nginx/ssl/{{ inventory_hostname}}.crt;
|
||||||
|
ssl_certificate_key /etc/nginx/ssl/{{ inventory_hostname}}.key;
|
||||||
|
ssl_trusted_certificate /etc/nginx/ssl/{{ inventory_hostname}}.issuer.crt;
|
||||||
|
ssl_session_timeout 1d;
|
||||||
|
ssl_session_cache shared:SSL:50m;
|
||||||
|
ssl_session_tickets off;
|
||||||
|
ssl_protocols TLSv1.3;
|
||||||
|
ssl_ciphers 'ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-DSS-AES128-GCM-SHA256:kEDH+AESGCM:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA:ECDHE-ECDSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-DSS-AES128-SHA256:DHE-RSA-AES256-SHA256:DHE-DSS-AES256-SHA:DHE-RSA-AES256-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:AES:CAMELLIA:DES-CBC3-SHA:!aNULL:!eNULL:!EXPORT:!DES:!RC4:!MD5:!PSK:!aECDH:!EDH-DSS-DES-CBC3-SHA:!EDH-RSA-DES-CBC3-SHA:!KRB5-DES-CBC3-SHA';
|
||||||
|
ssl_dhparam /etc/nginx/ssl/dhparam.pem;
|
||||||
|
ssl_prefer_server_ciphers on;
|
||||||
|
add_header Strict-Transport-Security max-age=15768000;
|
||||||
|
ssl_stapling on;
|
||||||
|
ssl_stapling_verify on;
|
||||||
|
server_name {{ inventory_hostname }};
|
||||||
|
|
||||||
|
location / {
|
||||||
|
client_max_body_size 512M;
|
||||||
|
proxy_pass http://localhost:3000;
|
||||||
|
proxy_set_header Connection $http_connection;
|
||||||
|
proxy_set_header Upgrade $http_upgrade;
|
||||||
|
proxy_set_header Host $host;
|
||||||
|
proxy_set_header X-Real-IP $remote_addr;
|
||||||
|
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||||
|
proxy_set_header X-Forwarded-Proto $scheme;
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
4
ansible/site.yaml
Normal file
4
ansible/site.yaml
Normal file
@@ -0,0 +1,4 @@
|
|||||||
|
---
|
||||||
|
# file: site.yaml
|
||||||
|
- import_playbook: webservers.yaml
|
||||||
|
- import_playbook: gitea.yaml
|
||||||
7
ansible/webservers.yaml
Normal file
7
ansible/webservers.yaml
Normal file
@@ -0,0 +1,7 @@
|
|||||||
|
---
|
||||||
|
# file: webservers.yaml
|
||||||
|
- hosts: webservers
|
||||||
|
roles:
|
||||||
|
- common
|
||||||
|
- nginx
|
||||||
|
- lego
|
||||||
Reference in New Issue
Block a user