Now installs a LE SSL cert via certbot by default
All checks were successful
Ansible Lint |Total|New|Outstanding|Fixed|Trend |:-:|:-:|:-:|:-:|:-: |4803|45|4758|26|:-1: Reference build: <a href="https://jenkins.evolix.org/job/gitea/job/ansible-roles/job/hedgedoc/2//ansiblelint">Evolix » ansible-roles » hedgedoc #2</a>
gitea/ansible-roles/pipeline/head This commit looks good

This commit is contained in:
Mathieu Gauthier-Pilote 2023-05-04 13:37:36 -04:00
parent f7f906b0f7
commit 6dc36ac2ba
5 changed files with 67 additions and 16 deletions

View file

@ -2,11 +2,12 @@
# defaults file for mastodon # defaults file for mastodon
system_dep: "['apt-transport-https', 'postgresql', 'python3-psycopg2', 'nginx', 'git', 'wget', 'certbot']" system_dep: "['apt-transport-https', 'postgresql', 'python3-psycopg2', 'nginx', 'git', 'wget', 'certbot']"
git_url: 'https://github.com/hedgedoc/hedgedoc.git' git_url: 'https://github.com/hedgedoc/hedgedoc.git'
git_version: '1.9.6' git_version: '1.9.7'
node_version: 'node_16.x' node_version: 'node_16.x' # Node 18 is NOT supported as of May 2023; See https://docs.hedgedoc.org/setup/manual-setup/
node_port: '3000' node_port: '3000'
service: 'example' service: 'example'
domains: ['example.domain.org'] domains: ['example.domain.org']
certbot_admin_email: 'mgauthier@evolix.ca'
db_host: 'localhost' db_host: 'localhost'
db_user: "{{ service }}" db_user: "{{ service }}"

View file

@ -4,10 +4,14 @@
- name: Install main system dependencies - name: Install main system dependencies
apt: apt:
name: "{{ system_dep }}" name: "{{ system_dep }}"
update_cache: yes
- name: Install node-gyp from yarn - name: Install node-gyp from npm
shell: npm install --global node-gyp shell: npm install --global node-gyp
- name: Enable yarn (via corepack)
shell: "corepack enable; yarn set version classic"
- name: Add UNIX account - name: Add UNIX account
user: user:
name: "{{ service }}" name: "{{ service }}"
@ -34,6 +38,10 @@
version: "{{ git_version | default(omit) }}" version: "{{ git_version | default(omit) }}"
update: yes update: yes
umask: '0022' umask: '0022'
# - name: Set cache dir for yarn
# shell: yarn config set cache-folder /var/tmp/cache/yarn
# args:
# chdir: "~/"
- name: Run setup - name: Run setup
shell: "bin/setup" shell: "bin/setup"
args: args:
@ -70,7 +78,12 @@
- name: Start service - name: Start service
service: service:
name: "{{ service }}.service" name: "{{ service }}.service"
state: started state: restarted
- name: Template nginx snippet for Let's Encrypt/Certbot
template:
src: "letsencrypt.conf.j2"
dest: "/etc/nginx/snippets/letsencrypt.conf"
- name: Check if SSL certificate is present and register result - name: Check if SSL certificate is present and register result
stat: stat:
@ -81,7 +94,7 @@
block: block:
- name: Template vhost without SSL for successfull LE challengce - name: Template vhost without SSL for successfull LE challengce
template: template:
src: "vhost.j2" src: "vhost.conf.j2"
dest: "/etc/nginx/sites-available/{{ service }}" dest: "/etc/nginx/sites-available/{{ service }}"
- name: Enable temporary nginx vhost for LE - name: Enable temporary nginx vhost for LE
file: file:
@ -97,9 +110,18 @@
path: /var/lib/letsencrypt path: /var/lib/letsencrypt
state: directory state: directory
mode: '0755' mode: '0755'
# - name: Generate certificate with certbot - name: Generate certificate with certbot
# shell: certbot certonly --webroot --webroot-path /var/lib/letsencrypt -d {{ domains |first }} shell: certbot certonly --webroot --webroot-path /var/lib/letsencrypt --non-interactive --agree-tos --email {{ certbot_admin_email }} -d {{ domains |first }}
when: ssl.stat.exists == false - name: Create the ssl dir if needed
file:
path: /etc/nginx/ssl
state: directory
mode: '0750'
- name: Template ssl bloc for nginx vhost
template:
src: "ssl.conf.j2"
dest: "/etc/nginx/ssl/{{ domains |first }}.conf"
when: ssl.stat.exists != true
- name: (Re)check if SSL certificate is present and register result - name: (Re)check if SSL certificate is present and register result
stat: stat:
@ -108,7 +130,7 @@
- name: (Re)template conf file for nginx vhost with SSL - name: (Re)template conf file for nginx vhost with SSL
template: template:
src: "vhost.j2" src: "vhost.conf.j2"
dest: "/etc/nginx/sites-available/{{ service }}" dest: "/etc/nginx/sites-available/{{ service }}"
- name: Enable nginx vhost for hedgedoc - name: Enable nginx vhost for hedgedoc

View file

@ -0,0 +1,5 @@
location ~ /.well-known/acme-challenge {
alias /var/lib/letsencrypt/;
try_files $uri =404;
allow all;
}

View file

@ -0,0 +1,22 @@
##
# Certificates
# you need a certificate to run in production. see https://letsencrypt.org/
##
ssl_certificate /etc/letsencrypt/live/{{ domains | first }}/fullchain.pem;
ssl_certificate_key /etc/letsencrypt/live/{{ domains | first }}/privkey.pem;
##
# Security hardening (as of Nov 15, 2020)
# based on Mozilla Guideline v5.6
##
ssl_protocols TLSv1.2 TLSv1.3;
ssl_prefer_server_ciphers on;
ssl_ciphers ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256; # add ECDHE-RSA-AES256-SHA if you want compatibility with Android 4
ssl_session_timeout 1d; # defaults to 5m
ssl_session_cache shared:SSL:10m; # estimated to 40k sessions
ssl_session_tickets off;
ssl_stapling on;
ssl_stapling_verify on;
# HSTS (https://hstspreload.org), requires to be copied in 'location' sections that have add_header directives
#add_header Strict-Transport-Security "max-age=63072000; includeSubDomains";

View file

@ -8,8 +8,8 @@ server {
listen [::]:80; listen [::]:80;
server_name {{ domains |first }}; server_name {{ domains |first }};
# For Let's Encrypt # For certbot
location /.well-known/acme-challenge/ { allow all; } include /etc/nginx/snippets/letsencrypt.conf;
{% if ssl.stat.exists %} {% if ssl.stat.exists %}
location / { return 301 https://$host$request_uri; } location / { return 301 https://$host$request_uri; }
@ -20,13 +20,14 @@ server {
server { server {
listen 443 ssl http2; listen 443 ssl http2;
listen [::]:443 ssl http2; listen [::]:443 ssl http2;
server_name {{ domains |first }}; server_name {{ domains |first }};
# For Let's Encrypt access_log /var/log/nginx/{{ service }}.access.log;
location /.well-known/acme-challenge/ { allow all; } error_log /var/log/nginx/{{ service }}.error.log;
ssl_certificate /etc/letsencrypt/live/{{ domains |first }}/fullchain.pem;
ssl_certificate_key /etc/letsencrypt/live/{{ domains |first }}/privkey.pem; include /etc/nginx/snippets/letsencrypt.conf;
ssl_trusted_certificate /etc/letsencrypt/live/{{ domains |first }}/chain.pem; include /etc/nginx/ssl/{{ domains | first }}.conf;
location / { location / {
proxy_pass http://127.0.0.1:{{ node_port }}; proxy_pass http://127.0.0.1:{{ node_port }};