70 lines
2 KiB
YAML
70 lines
2 KiB
YAML
---
|
|
- name: Copy nginx configuration files
|
|
become: true
|
|
ansible.builtin.template:
|
|
src: "{{ item.src }}"
|
|
dest: "{{ item.dest }}"
|
|
owner: root
|
|
group: root
|
|
mode: "0644"
|
|
loop:
|
|
- src: "templates/nginx/default.j2"
|
|
dest: "/etc/nginx/sites-available/default"
|
|
- src: "templates/nginx/forgejo.j2"
|
|
dest: "/etc/nginx/sites-available/forgejo"
|
|
- src: "templates/nginx/woodpecker.j2"
|
|
dest: "/etc/nginx/sites-available/woodpecker"
|
|
- src: "templates/nginx/glitchtip.j2"
|
|
dest: "/etc/nginx/sites-available/glitchtip"
|
|
- src: "templates/nginx/newsreader.j2"
|
|
dest: "/etc/nginx/sites-available/newsreader"
|
|
notify: restart nginx
|
|
|
|
- name: Create configuration links
|
|
become: true
|
|
ansible.builtin.file:
|
|
src: "{{ item.src }}"
|
|
dest: "{{ item.dest }}"
|
|
state: link
|
|
loop:
|
|
- src: "/etc/nginx/sites-available/default"
|
|
dest: "/etc/nginx/sites-enabled/default"
|
|
- src: "/etc/nginx/sites-available/forgejo"
|
|
dest: "/etc/nginx/sites-enabled/forgejo"
|
|
- src: "/etc/nginx/sites-available/woodpecker"
|
|
dest: "/etc/nginx/sites-enabled/woodpecker"
|
|
- src: "/etc/nginx/sites-available/glitchtip"
|
|
dest: "/etc/nginx/sites-enabled/glitchtip"
|
|
- src: "/etc/nginx/sites-available/newsreader"
|
|
dest: "/etc/nginx/sites-enabled/newsreader"
|
|
notify: restart nginx
|
|
|
|
# Run the folowing command to regenerate a certificate:
|
|
#
|
|
# sudo certbot certonly \
|
|
# --authenticator standalone \
|
|
# --pre-hook 'systemctl stop nginx' \
|
|
# --post-hook 'systemctl start nginx' \
|
|
# --cert-name fudiggity.nl \
|
|
# -d fudiggity.nl \
|
|
# -d rss.fudiggity.nl \
|
|
# -d .....
|
|
#
|
|
# This will also save its configuration.
|
|
#
|
|
- name: Copy letsencrypt configuration
|
|
become: true
|
|
ansible.builtin.template:
|
|
src: "templates/letsencrypt/cli.j2"
|
|
dest: "/etc/letsencrypt/cli.ini"
|
|
owner: root
|
|
group: root
|
|
mode: "0644"
|
|
notify: restart certbot
|
|
|
|
- name: Enable certbot periodic certificate renewal
|
|
become: true
|
|
ansible.builtin.systemd:
|
|
name: certbot.timer
|
|
state: started
|
|
enabled: true
|