parent
506f80c79f
commit
4ecfa49aaa
34 changed files with 1197 additions and 0 deletions
@ -0,0 +1,10 @@ |
||||
--- |
||||
|
||||
- name: Deploy Website |
||||
remote_user: root |
||||
hosts: all |
||||
vars: |
||||
ansible_ssh_common_args: -oControlMaster=auto -oControlPersist=60s -oUserKnownHostsFile=/dev/null -oStrictHostKeyChecking=no -i/home/minion/.ssh/id_rsa_ansible |
||||
site: "{{ lookup('file', lookup('env', 'MARKDOWNSITE_CONFIG') ) | from_yaml }}" |
||||
roles: |
||||
- deploy-website |
||||
@ -0,0 +1,9 @@ |
||||
--- |
||||
|
||||
- name: Deploy Website |
||||
remote_user: root |
||||
hosts: all |
||||
vars: |
||||
ansible_ssh_common_args: -oControlMaster=auto -oControlPersist=60s -oUserKnownHostsFile=/dev/null -oStrictHostKeyChecking=no -i/home/minion/.ssh/id_rsa_ansible |
||||
roles: |
||||
- purge-website |
||||
@ -0,0 +1,29 @@ |
||||
--- |
||||
- name: Install /etc/nginx/sites-enabled/{{ site.domain }} |
||||
template: |
||||
src: "{{ role_path }}/templates/sites-available-config.j2" |
||||
dest: "/etc/nginx/sites-enabled/{{ site.domain }}" |
||||
owner: root |
||||
group: root |
||||
mode: '0644' |
||||
ignore_errors: yes # Custom config with chattr +i, don't fail on error. |
||||
|
||||
- name: Remove any prexisting /var/www/{{ site.domain }}. |
||||
file: |
||||
path: "/var/www/{{ site.domain }}" |
||||
state: absent |
||||
|
||||
- name: Ensure /var/www/{{ site.domain }} is populated. |
||||
copy: |
||||
src: "{{ site.www_dir }}" |
||||
dest: "/var/www/{{ site.domain }}" |
||||
mode: '0644' |
||||
directory_mode: '0755' |
||||
owner: 'www-data' |
||||
group: 'www-data' |
||||
|
||||
- name: Reload nginx to begin serving the website. |
||||
systemd: |
||||
name: nginx |
||||
state: reloaded |
||||
|
||||
@ -0,0 +1,22 @@ |
||||
$HTTP["host"] =~ "^{% raw %}{{ site.domain }}{% endraw %}$" { |
||||
$SERVER["socket"] == ":443" { |
||||
# SSL Settings |
||||
ssl.engine = "enable" |
||||
ssl.pemfile = "/etc/letsencrypt/live/{{ domain.hosted }}/cert.pem" |
||||
ssl.ca-file = "/etc/letsencrypt/live/{{ domain.hosted }}/fullchain.pem" |
||||
ssl.privkey = "/etc/letsencrypt/live/{{ domain.hosted }}/privkey.pem" |
||||
|
||||
# Docroot & Logs. |
||||
server.document-root = "/var/www/{% raw %}{{ site.domain }}{% endraw %}/html" |
||||
server.errorlog = "/var/log/lighttpd/{% raw %}{{ site.domain }}{% endraw %}.error.log" |
||||
accesslog.filename = "/var/log/lighttpd/{% raw %}{{ site.domain }}{% endraw %}.access.log" |
||||
|
||||
# Pass to Markdown::CGI if there is no static file to serve. |
||||
magnet.attract-physical-path-to = ( "/etc/lighttpd/rewrite.lua" ) |
||||
} |
||||
|
||||
# Redirect http -> https |
||||
$SERVER["socket"] == ":80" { |
||||
url.redirect = ( "^/(.*)" => "https://{% raw %}{{ site.domain }}{% endraw %}/$1" ) |
||||
} |
||||
} |
||||
@ -0,0 +1,3 @@ |
||||
--- |
||||
domain: {{ site.domain }} |
||||
|
||||
@ -0,0 +1,36 @@ |
||||
server { |
||||
server_name {{ site.domain }}; |
||||
root /var/www/{{ site.domain }}/html; |
||||
index index.html; |
||||
|
||||
error_log /var/log/nginx/{{ site.domain }}symkat.com.error.log warn; |
||||
access_log /var/log/nginx/{{ site.domain }}symkat.com.access.log combined; |
||||
|
||||
listen 443 ssl; |
||||
ssl_certificate /etc/letsencrypt/live/{{ site.domain }}/fullchain.pem; |
||||
ssl_certificate_key /etc/letsencrypt/live/{{ site.domain }}/privkey.pem; |
||||
|
||||
ssl_session_cache shared:le_nginx_SSL:10m; |
||||
ssl_session_timeout 1440m; |
||||
ssl_session_tickets off; |
||||
|
||||
ssl_protocols TLSv1.2 TLSv1.3; |
||||
ssl_prefer_server_ciphers off; |
||||
|
||||
ssl_ciphers "ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384"; |
||||
|
||||
ssl_dhparam /etc/nginx/ssl-dhparams.pem; |
||||
|
||||
} |
||||
|
||||
server { |
||||
if ($host = {{ site.domain }}) { |
||||
return 301 https://$host$request_uri; |
||||
} |
||||
|
||||
listen 80; |
||||
server_name {{ site.domain }} |
||||
return 404; |
||||
} |
||||
|
||||
|
||||
@ -0,0 +1,15 @@ |
||||
--- |
||||
- name: "Remove /etc/lighttpd/conf.d/{{ domain }}." |
||||
file: |
||||
path: "/etc/lighttpd/conf.d/{{ domain }}" |
||||
state: absent |
||||
|
||||
- name: "Remove any prexisting /var/www/{{ domain }}." |
||||
file: |
||||
path: "/var/www/{{ domain }}" |
||||
state: absent |
||||
|
||||
- name: "Reload lighttpd to stop serving {{ domain }}." |
||||
systemd: |
||||
name: lighttpd |
||||
state: reloaded |
||||
@ -0,0 +1,24 @@ |
||||
[Unit] |
||||
Description=MJB Worker Service |
||||
After=postgresql.target |
||||
|
||||
[Service] |
||||
User=manager |
||||
Group=manager |
||||
|
||||
Environment="PERL5LIB=/home/manager/perl5/lib/perl5" |
||||
Environment="PERL_MB_OPT=--install_base \"/home/manager/perl5\"" |
||||
Environment="PERL_MM_OPT=INSTALL_BASE=/home/manager/perl5" |
||||
Environment="PERL_LOCAL_LIB_ROOT=/home/manager/perl5" |
||||
Environment="PATH=/home/manager/perl5/bin:/usr/local/bin:/usr/bin:/bin:/usr/local/games:/usr/games" |
||||
|
||||
ExecStart=/home/manager/mjb/Web/script/mjb minion worker |
||||
WorkingDirectory=/home/manager/mjb/Web |
||||
SyslogIdentifier=mjb.worker |
||||
Restart=on-failure |
||||
Type=simple |
||||
KillMode=process |
||||
|
||||
[Install] |
||||
WantedBy=multi-user.target |
||||
|
||||
@ -0,0 +1,71 @@ |
||||
- name: Install packages |
||||
apt: |
||||
name: [ 'gnupg2', 'curl' ] |
||||
|
||||
- name: Add the ansible key. |
||||
apt_key: |
||||
keyserver: keyserver.ubuntu.com |
||||
id: 93C4A3FD7BB9C367 |
||||
|
||||
- name: Install ansible.list for apt. |
||||
copy: |
||||
dest: /etc/apt/sources.list.d/ansible.list |
||||
content: "deb http://ppa.launchpad.net/ansible/ansible/ubuntu focal main" |
||||
owner: root |
||||
group: root |
||||
mode: 0755 |
||||
|
||||
- name: Reload apt with new source |
||||
apt: |
||||
name: "*" |
||||
state: latest |
||||
update_cache: yes |
||||
|
||||
- name: Install packages |
||||
apt: |
||||
name: [ |
||||
'ansible', |
||||
'ansible-core', |
||||
'podman', |
||||
] |
||||
state: present |
||||
|
||||
- name: Install ansible roles for deployment |
||||
copy: |
||||
src: "{{ role_path }}/files/ansible/" |
||||
dest: "/etc/ansible" |
||||
mode: '0644' |
||||
directory_mode: '0755' |
||||
owner: 'root' |
||||
group: 'root' |
||||
|
||||
- name: "Delete /etc/ansible/hosts." |
||||
file: |
||||
path: /etc/ansible/hosts |
||||
state: absent |
||||
|
||||
- name: "Create /etc/ansible/hosts." |
||||
copy: |
||||
dest: /etc/ansible/hosts |
||||
content: "[webservers]" |
||||
owner: root |
||||
group: root |
||||
mode: 0644 |
||||
|
||||
- name: "Add hosts to /etc/ansible/hosts" |
||||
lineinfile: |
||||
path: /etc/ansible/hosts |
||||
line: "{{ item }}" |
||||
owner: root |
||||
group: root |
||||
mode: '0644' |
||||
with_items: "{{ deploy_addresses }}" |
||||
|
||||
- name: "Install SSH Key for manager to use ansible" |
||||
copy: |
||||
dest: /home/manager/.ssh/id_rsa |
||||
src: "{{ inventory_dir }}/files/ssh/id_rsa" |
||||
owner: manager |
||||
group: manager |
||||
mode: 0600 |
||||
|
||||
@ -0,0 +1,28 @@ |
||||
--- |
||||
- name: Update all packages to their latest version |
||||
apt: |
||||
name: "*" |
||||
state: latest |
||||
update_cache: yes |
||||
|
||||
- name: Support running MJB::Web |
||||
include_role: |
||||
name: mjb-role-webapp |
||||
|
||||
- name: Support using ansible locally |
||||
include_tasks: |
||||
file: ansible.yml |
||||
|
||||
- name: Install mjb.worker.service file. |
||||
copy: |
||||
dest: /etc/systemd/system/mjb.worker.service |
||||
src: "{{ role_path }}/files/mjb.worker.service" |
||||
owner: root |
||||
group: root |
||||
mode: 0644 |
||||
|
||||
- name: Start & enable mjb.worker |
||||
service: |
||||
name: mjb.worker |
||||
state: started |
||||
enabled: true |
||||
@ -0,0 +1,24 @@ |
||||
[Unit] |
||||
Description=MJB Certbot Service |
||||
After=postgresql.target |
||||
|
||||
[Service] |
||||
User=manager |
||||
Group=manager |
||||
|
||||
Environment="PERL5LIB=/home/manager/perl5/lib/perl5" |
||||
Environment="PERL_MB_OPT=--install_base \"/home/manager/perl5\"" |
||||
Environment="PERL_MM_OPT=INSTALL_BASE=/home/manager/perl5" |
||||
Environment="PERL_LOCAL_LIB_ROOT=/home/manager/perl5" |
||||
Environment="PATH=/home/manager/perl5/bin:/usr/local/bin:/usr/bin:/bin:/usr/local/games:/usr/games" |
||||
|
||||
ExecStart=/home/manager/mjb/Web/script/mjb minion worker -q certbot |
||||
WorkingDirectory=/home/manager/mjb/Web |
||||
SyslogIdentifier=mjb.worker |
||||
Restart=on-failure |
||||
Type=simple |
||||
KillMode=process |
||||
|
||||
[Install] |
||||
WantedBy=multi-user.target |
||||
|
||||
@ -0,0 +1,75 @@ |
||||
- name: Update all packages to their latest version |
||||
apt: |
||||
name: "*" |
||||
state: latest |
||||
update_cache: yes |
||||
|
||||
- name: Install packages for webserver support |
||||
apt: |
||||
name: [ |
||||
'certbot', |
||||
'rsync', |
||||
] |
||||
state: present |
||||
|
||||
- name: Support running MJB::Web |
||||
include_role: |
||||
name: mjb-role-webapp |
||||
|
||||
- name: Allow manager to have sudo access for certbot |
||||
lineinfile: |
||||
dest: /etc/sudoers |
||||
state: present |
||||
regexp: '^manager' |
||||
line: 'manager ALL=(ALL) NOPASSWD: ALL' |
||||
validate: 'visudo -cf %s' |
||||
|
||||
- name: Install mjb.certbot.service file. |
||||
copy: |
||||
dest: /etc/systemd/system/mjb.certbot.service |
||||
src: "{{ role_path }}/files/mjb.certbot.service" |
||||
owner: root |
||||
group: root |
||||
mode: 0644 |
||||
|
||||
- name: Start & enable mjb.certbot |
||||
service: |
||||
name: mjb.certbot |
||||
state: started |
||||
enabled: true |
||||
|
||||
- name: "Ensure /usr/bin/letsencrypt-cert-push" |
||||
copy: |
||||
dest: /usr/bin/letsencrypt-cert-push |
||||
content: "#!/bin/bash" |
||||
owner: root |
||||
group: root |
||||
mode: 0755 |
||||
|
||||
- name: "Populatge rsync entires for letsencrypt-cert-push" |
||||
lineinfile: |
||||
path: /usr/bin/letsencrypt-cert-push |
||||
line: "rsync -rLptgoD -e \"ssh -o StrictHostKeyChecking=no\" /etc/letsencrypt/live root@{{ item }}:/etc/letsencrypt" |
||||
with_items: "{{ deploy_addresses }}" |
||||
|
||||
- name: Create keypair for syncing |
||||
openssh_keypair: |
||||
path: "/root/.ssh/id_rsa" |
||||
type: rsa |
||||
size: 4096 |
||||
owner: root |
||||
group: root |
||||
state: present |
||||
force: no |
||||
|
||||
- name: Get private key from host |
||||
fetch: |
||||
src: /root/.ssh/id_rsa |
||||
dest: "{{ inventory_dir }}/files/ssh/id_rsa" |
||||
flat: true |
||||
|
||||
- name: Get public key from host |
||||
fetch: |
||||
src: /root/.ssh/id_rsa.pub |
||||
dest: "{{ inventory_dir }}/files/ssh/id_rsa.pub" |
||||
flat: true |
||||
@ -0,0 +1,24 @@ |
||||
[Unit] |
||||
Description=MJB Web Service |
||||
After=postgresql.target |
||||
|
||||
[Service] |
||||
User=manager |
||||
Group=manager |
||||
|
||||
Environment="PERL5LIB=/home/manager/perl5/lib/perl5" |
||||
Environment="PERL_MB_OPT=--install_base \"/home/manager/perl5\"" |
||||
Environment="PERL_MM_OPT=INSTALL_BASE=/home/manager/perl5" |
||||
Environment="PERL_LOCAL_LIB_ROOT=/home/manager/perl5" |
||||
Environment="PATH=/home/manager/perl5/bin:/usr/local/bin:/usr/bin:/bin:/usr/local/games:/usr/games" |
||||
|
||||
ExecStart=/home/manager/perl5/bin/hypnotoad -f script/mjb |
||||
WorkingDirectory=/home/manager/mjb/Web |
||||
SyslogIdentifier=mjb-web |
||||
Restart=on-failure |
||||
Type=simple |
||||
KillMode=process |
||||
|
||||
[Install] |
||||
WantedBy=multi-user.target |
||||
|
||||
@ -0,0 +1,9 @@ |
||||
- name: Restart nginx |
||||
service: |
||||
name: nginx |
||||
state: restarted |
||||
|
||||
- name: Restart postgres |
||||
service: |
||||
name: postgres |
||||
state: restarted |
||||
@ -0,0 +1,38 @@ |
||||
--- |
||||
- name: Update all packages to their latest version |
||||
apt: |
||||
name: "*" |
||||
state: latest |
||||
update_cache: yes |
||||
|
||||
- name: Support running MJB::Web |
||||
include_role: |
||||
name: mjb-role-webapp |
||||
|
||||
- name: Install mjb-web.service file. |
||||
copy: |
||||
dest: /etc/systemd/system/mjb-web.service |
||||
src: "{{ role_path }}/files/mjb-web.service" |
||||
owner: root |
||||
group: root |
||||
mode: 0644 |
||||
|
||||
- name: "Install SSH Key for Gitea Store IO" |
||||
copy: |
||||
dest: /home/manager/.ssh/id_rsa |
||||
src: "{{ inventory_dir }}/files/ssh/id_rsa" |
||||
owner: manager |
||||
group: manager |
||||
mode: 0600 |
||||
|
||||
- name: Start & enable mjb-web |
||||
service: |
||||
name: mjb-web |
||||
state: started |
||||
enabled: true |
||||
|
||||
- name: Support an nginx web server for MJB::Web |
||||
include_tasks: |
||||
file: webserver.yml |
||||
|
||||
# Need to import the database TODO: Make the store server do this instead. |
||||
@ -0,0 +1,32 @@ |
||||
- name: Install packages for webserver support |
||||
apt: |
||||
name: [ |
||||
'nginx', |
||||
'certbot', |
||||
'python3-certbot-nginx', |
||||
] |
||||
state: present |
||||
|
||||
- name: Start & enable nginx |
||||
service: |
||||
name: nginx |
||||
state: started |
||||
enabled: true |
||||
|
||||
- name: "Install /etc/nginx/sites-enabled/{{ domain_name }}" |
||||
template: |
||||
src: "{{ role_path }}/templates/nginx-domain.j2" |
||||
dest: "/etc/nginx/sites-enabled/{{ domain_name }}" |
||||
force: no |
||||
owner: root |
||||
group: root |
||||
mode: 0644 |
||||
notify: |
||||
- Restart nginx |
||||
|
||||
- name: Setup SSL Certificates |
||||
shell: certbot run --nginx -d {{ domain_name }} {{ '-d www.' + domain_name if redirect_www }} --agree-tos --register-unsafely-without-email |
||||
args: |
||||
creates: /etc/letsencrypt/live/{{ domain_name }}/cert.pem |
||||
notify: |
||||
- Restart nginx |
||||
@ -0,0 +1,24 @@ |
||||
upstream myapp { |
||||
server 127.0.0.1:8080; |
||||
} |
||||
|
||||
server { |
||||
server_name {{ domain_name }}; |
||||
|
||||
location / { |
||||
proxy_pass http://myapp; |
||||
proxy_http_version 1.1; |
||||
proxy_set_header Upgrade $http_upgrade; |
||||
proxy_set_header Connection "upgrade"; |
||||
proxy_set_header Host $host; |
||||
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; |
||||
proxy_set_header X-Forwarded-Proto $scheme; |
||||
} |
||||
|
||||
} |
||||
|
||||
server { |
||||
server_name www.{{ domain_name }}; |
||||
return 301 $scheme://{{ domain_name }}$request_uri; |
||||
} |
||||
|
||||
Binary file not shown.
@ -0,0 +1,90 @@ |
||||
[Unit] |
||||
Description=Gitea (Git with a cup of tea) |
||||
After=syslog.target |
||||
After=network.target |
||||
### |
||||
# Don't forget to add the database service dependencies |
||||
### |
||||
# |
||||
#Wants=mysql.service |
||||
#After=mysql.service |
||||
# |
||||
#Wants=mariadb.service |
||||
#After=mariadb.service |
||||
# |
||||
#Wants=postgresql.service |
||||
#After=postgresql.service |
||||
# |
||||
#Wants=memcached.service |
||||
#After=memcached.service |
||||
# |
||||
#Wants=redis.service |
||||
#After=redis.service |
||||
# |
||||
### |
||||
# If using socket activation for main http/s |
||||
### |
||||
# |
||||
#After=gitea.main.socket |
||||
#Requires=gitea.main.socket |
||||
# |
||||
### |
||||
# (You can also provide gitea an http fallback and/or ssh socket too) |
||||
# |
||||
# An example of /etc/systemd/system/gitea.main.socket |
||||
### |
||||
## |
||||
## [Unit] |
||||
## Description=Gitea Web Socket |
||||
## PartOf=gitea.service |
||||
## |
||||
## [Socket] |
||||
## Service=gitea.service |
||||
## ListenStream=<some_port> |
||||
## NoDelay=true |
||||
## |
||||
## [Install] |
||||
## WantedBy=sockets.target |
||||
## |
||||
### |
||||
|
||||
[Service] |
||||
# Modify these two values and uncomment them if you have |
||||
# repos with lots of files and get an HTTP error 500 because |
||||
# of that |
||||
### |
||||
#LimitMEMLOCK=infinity |
||||
#LimitNOFILE=65535 |
||||
RestartSec=2s |
||||
Type=simple |
||||
User=git |
||||
Group=git |
||||
WorkingDirectory=/var/lib/gitea/ |
||||
# If using Unix socket: tells systemd to create the /run/gitea folder, which will contain the gitea.sock file |
||||
# (manually creating /run/gitea doesn't work, because it would not persist across reboots) |
||||
#RuntimeDirectory=gitea |
||||
ExecStart=/usr/local/bin/gitea web --config /etc/gitea/app.ini |
||||
Restart=always |
||||
Environment=USER=git HOME=/home/git GITEA_WORK_DIR=/var/lib/gitea |
||||
# If you install Git to directory prefix other than default PATH (which happens |
||||
# for example if you install other versions of Git side-to-side with |
||||
# distribution version), uncomment below line and add that prefix to PATH |
||||
# Don't forget to place git-lfs binary on the PATH below if you want to enable |
||||
# Git LFS support |
||||
#Environment=PATH=/path/to/git/bin:/bin:/sbin:/usr/bin:/usr/sbin |
||||
# If you want to bind Gitea to a port below 1024, uncomment |
||||
# the two values below, or use socket activation to pass Gitea its ports as above |
||||
### |
||||
#CapabilityBoundingSet=CAP_NET_BIND_SERVICE |
||||
#AmbientCapabilities=CAP_NET_BIND_SERVICE |
||||
### |
||||
# In some cases, when using CapabilityBoundingSet and AmbientCapabilities option, you may want to |
||||
# set the following value to false to allow capabilities to be applied on gitea process. The following |
||||
# value if set to true sandboxes gitea service and prevent any processes from running with privileges |
||||
# in the host user namespace. |
||||
### |
||||
#PrivateUsers=false |
||||
### |
||||
|
||||
[Install] |
||||
WantedBy=multi-user.target |
||||
@ -0,0 +1,9 @@ |
||||
- name: Restart nginx |
||||
service: |
||||
name: nginx |
||||
state: restarted |
||||
|
||||
- name: Restart postgresql |
||||
service: |
||||
name: postgresql |
||||
state: restarted |
||||
@ -0,0 +1,60 @@ |
||||
- name: Install packages to support postgres |
||||
apt: |
||||
name: [ |
||||
'libssl-dev', |
||||
'libpq-dev', |
||||
'libz-dev', |
||||
'libexpat1-dev', |
||||
'postgresql-client', |
||||
'postgresql-contrib', |
||||
'postgresql', |
||||
'python3-psycopg2', |
||||
] |
||||
state: present |
||||
|
||||
- name: Start & enable postgres |
||||
service: |
||||
name: postgresql |
||||
state: started |
||||
enabled: true |
||||
|
||||
- name: Create database users |
||||
postgresql_user: |
||||
name: "{{ item.value.user }}" |
||||
password: "{{ item.value.pass }}" |
||||
state: present |
||||
become_user: postgres |
||||
become: true |
||||
with_dict: "{{ databases }}" |
||||
|
||||
- name: Create databases |
||||
postgresql_db: |
||||
name: "{{ item.value.name }}" |
||||
owner: "{{ item.value.user }}" |
||||
state: present |
||||
become_user: postgres |
||||
become: true |
||||
with_dict: "{{ databases }}" |
||||
|
||||
- name: Add auth lines to pgsql hba config |
||||
postgresql_pg_hba: |
||||
dest: /etc/postgresql/13/main/pg_hba.conf |
||||
contype: host |
||||
source: "{{ item }}/32" |
||||
method: md5 |
||||
create: true |
||||
with_items: "{{ database.allow_addresses }}" |
||||
notify: Restart postgresql |
||||
|
||||
- name: "Bind PSQL to localhost and {{ database.bind }}" |
||||
lineinfile: |
||||
path: /etc/postgresql/13/main/postgresql.conf |
||||
regexp: '^listen_addresses ' |
||||
insertafter: '^#listen_addresses' |
||||
line: "listen_addresses = 'localhost,{{ database.bind_address }}'" |
||||
notify: Restart postgresql |
||||
|
||||
- name: "Restart PSQL if notified." |
||||
meta: flush_handlers |
||||
|
||||
|
||||
@ -0,0 +1,98 @@ |
||||
- name: Create gitea user |
||||
user: |
||||
name: git |
||||
shell: /bin/bash |
||||
password_lock: yes |
||||
comment: Git Version Control |
||||
|
||||
- name: Create /var/lib/gitea |
||||
file: |
||||
state: directory |
||||
path: /var/lib/gitea |
||||
owner: git |
||||
group: git |
||||
mode: 0750 |
||||
|
||||
- name: Create /var/lib/gitea/custom |
||||
file: |
||||
state: directory |
||||
path: /var/lib/gitea/custom |
||||
owner: git |
||||
group: git |
||||
mode: 0750 |
||||
|
||||
- name: Create /var/lib/gitea/data |
||||
file: |
||||
state: directory |
||||
path: /var/lib/gitea/data |
||||
owner: git |
||||
group: git |
||||
mode: 0750 |
||||
|
||||
- name: Create /var/lib/gitea/log |
||||
file: |
||||
state: directory |
||||
path: /var/lib/gitea |
||||
owner: git |
||||
group: git |
||||
mode: 0750 |
||||
|
||||
- name: Create /etc/gitea |
||||
file: |
||||
state: directory |
||||
path: /etc/gitea |
||||
owner: root |
||||
group: git |
||||
mode: 0770 |
||||
|
||||
- name: Install /usr/local/bin/gitea |
||||
copy: |
||||
dest: /usr/local/bin/gitea |
||||
src: "{{ role_path }}/files/gitea-1.17.1-linux-amd64" |
||||
owner: root |
||||
group: root |
||||
mode: 0755 |
||||
|
||||
- name: Install /etc/systemd/system/gitea.service |
||||
copy: |
||||
dest: /etc/systemd/system/gitea.service |
||||
src: "{{ role_path }}/files/gitea.service" |
||||
owner: root |
||||
group: root |
||||
mode: 0744 |
||||
|
||||
#- name: Generate internal token secret for gitea |
||||
# shell: /usr/local/bin/gitea generate secret INTERNAL_TOKEN |
||||
# register: internal_token |
||||
# |
||||
#- name: Generate jwt token secret for gitea |
||||
# shell: /usr/local/bin/gitea generate secret JWT_SECRET |
||||
# register: jwt_token |
||||
|
||||
- name: "Install /etc/gitea/app.ini" |
||||
template: |
||||
src: "{{ role_path }}/templates/app.ini.j2" |
||||
dest: "/etc/gitea/app.ini" |
||||
force: no |
||||
owner: root |
||||
group: git |
||||
mode: 0640 |
||||
|
||||
- name: Enable Gitea |
||||
service: |
||||
name: gitea |
||||
state: started |
||||
enabled: true |
||||
|
||||
- name: Create admin user for gitea |
||||
shell: gitea -c /etc/gitea/app.ini admin user create --admin --username {{ gitea.user }} --password {{ gitea.pass }} --email {{ gitea.email }} > /home/git/.first |
||||
environment: |
||||
GITEA_WORK_DIR: /var/lib/gitea/ |
||||
args: |
||||
creates: /home/git/.first |
||||
become: true |
||||
become_user: git |
||||
|
||||
|
||||
|
||||
|
||||
@ -0,0 +1,40 @@ |
||||
--- |
||||
- name: Update all packages to their latest version |
||||
apt: |
||||
name: "*" |
||||
state: latest |
||||
update_cache: yes |
||||
|
||||
- name: Install packages |
||||
apt: |
||||
name: [ |
||||
'git', |
||||
] |
||||
state: present |
||||
|
||||
- name: Setup the databases |
||||
include_tasks: database.yml |
||||
|
||||
- name: Support running MJB::Web |
||||
include_role: |
||||
name: mjb-role-webapp |
||||
|
||||
- name: Populate the MJB Database |
||||
shell: /home/manager/mjb/Web/script/mjb dbc < /home/manager/mjb/DB/etc/schema.sql > /home/manager/mjb/DB/etc/schema.log 2>&1 |
||||
args: |
||||
creates: /home/manager/mjb/DB/etc/schema.log |
||||
environment: |
||||
PATH: '/home/manager/perl5/bin:/usr/local/bin:/usr/bin:/bin' |
||||
PERL5LIB: '/home/manager/perl5/lib/perl5' |
||||
PERL_MB_OPT: '--install_base "/home/manager/perl5"' |
||||
PERL_MM_OPT: 'INSTALL_BASE=/home/manager/perl5' |
||||
PERL_LOCAL_LIB_ROOT: '/home/manager/perl5' |
||||
become: true |
||||
become_user: manager |
||||
|
||||
- name: Setup the webserver |
||||
include_tasks: webserver.yml |
||||
|
||||
- name: Setup the gitea service |
||||
include_tasks: gitea.yml |
||||
|
||||
@ -0,0 +1,32 @@ |
||||
- name: Install packages for webserver support |
||||
apt: |
||||
name: [ |
||||
'nginx', |
||||
'certbot', |
||||
'python3-certbot-nginx', |
||||
] |
||||
state: present |
||||
|
||||
- name: Start & enable nginx |
||||
service: |
||||
name: nginx |
||||
state: started |
||||
enabled: true |
||||
|
||||
- name: "Install /etc/nginx/sites-enabled/{{ domain_name }}" |
||||
template: |
||||
src: "{{ role_path }}/templates/nginx-domain.j2" |
||||
dest: "/etc/nginx/sites-enabled/{{ domain_name }}" |
||||
force: no |
||||
owner: root |
||||
group: root |
||||
mode: 0644 |
||||
notify: |
||||
- Restart nginx |
||||
|
||||
- name: Setup SSL Certificates |
||||
shell: certbot run --nginx -d {{ domain_name }} --agree-tos --register-unsafely-without-email |
||||
args: |
||||
creates: /etc/letsencrypt/live/{{ domain_name }}/cert.pem |
||||
notify: |
||||
- Restart nginx |
||||
@ -0,0 +1,82 @@ |
||||
APP_NAME = Gitea: Git with a cup of tea |
||||
RUN_USER = git |
||||
RUN_MODE = prod |
||||
|
||||
[database] |
||||
DB_TYPE = postgres |
||||
HOST = 127.0.0.1:5432 |
||||
NAME = {{ databases.gitea.name }} |
||||
USER = {{ databases.gitea.user }} |
||||
PASSWD = {{ databases.gitea.pass }} |
||||
SCHEMA = |
||||
SSL_MODE = disable |
||||
CHARSET = utf8 |
||||
PATH = /var/lib/gitea/data/gitea.db |
||||
LOG_SQL = false |
||||
|
||||
[repository] |
||||
ROOT = /var/lib/gitea/data/gitea-repositories |
||||
ENABLE_PUSH_CREATE_USER = true |
||||
ENABLE_PUSH_CREATE_ORG = true |
||||
|
||||
|
||||
[server] |
||||
SSH_DOMAIN = {{ domain_name }} |
||||
DOMAIN = {{ domain_name }} |
||||
HTTP_PORT = 3000 |
||||
ROOT_URL = https://{{ domain_name }}/ |
||||
DISABLE_SSH = false |
||||
SSH_PORT = 22 |
||||
LFS_START_SERVER = true |
||||
LFS_JWT_SECRET = {{ gitea.jwt_token }} |
||||
OFFLINE_MODE = true |
||||
|
||||
[lfs] |
||||
PATH = /var/lib/gitea/data/lfs |
||||
|
||||
[mailer] |
||||
ENABLED = true |
||||
HOST = {{ smtp.host }} |
||||
FROM = {{ smtp.from }} |
||||
USER = {{ smtp.user }} |
||||
PASSWD = {{ smtp.pass }} |
||||
|
||||
[service] |
||||
REGISTER_EMAIL_CONFIRM = false |
||||
ENABLE_NOTIFY_MAIL = true |
||||
DISABLE_REGISTRATION = true |
||||
ALLOW_ONLY_EXTERNAL_REGISTRATION = false |
||||
ENABLE_CAPTCHA = false |
||||
REQUIRE_SIGNIN_VIEW = false |
||||
DEFAULT_KEEP_EMAIL_PRIVATE = false |
||||
DEFAULT_ALLOW_CREATE_ORGANIZATION = true |
||||
DEFAULT_ENABLE_TIMETRACKING = true |
||||
NO_REPLY_ADDRESS = {{ domain_name }} |
||||
|
||||
[picture] |
||||
DISABLE_GRAVATAR = true |
||||
ENABLE_FEDERATED_AVATAR = false |
||||
|
||||
[openid] |
||||
ENABLE_OPENID_SIGNIN = false |
||||
ENABLE_OPENID_SIGNUP = true |
||||
|
||||
[session] |
||||
PROVIDER = file |
||||
|
||||
[log] |
||||
MODE = console |
||||
LEVEL = info |
||||
ROOT_PATH = /var/lib/gitea/log |
||||
ROUTER = console |
||||
|
||||
[repository.pull-request] |
||||
DEFAULT_MERGE_STYLE = merge |
||||
|
||||
[repository.signing] |
||||
DEFAULT_TRUST_MODEL = committer |
||||
|
||||
[security] |
||||
INSTALL_LOCK = true |
||||
INTERNAL_TOKEN = {{ gitea.internal_token }} |
||||
PASSWORD_HASH_ALGO = pbkdf2 |
||||
@ -0,0 +1,12 @@ |
||||
server { |
||||
listen 80; |
||||
server_name {{ domain_name }}; |
||||
|
||||
location / { |
||||
proxy_pass http://localhost:3000; |
||||
proxy_set_header Host $host; |
||||
proxy_set_header X-Real-IP $remote_addr; |
||||
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; |
||||
proxy_set_header X-Forwarded-Proto $scheme; |
||||
} |
||||
} |
||||
@ -0,0 +1,4 @@ |
||||
- name: Restart nginx |
||||
service: |
||||
name: nginx |
||||
state: restarted |
||||
@ -0,0 +1,44 @@ |
||||
- name: Update all packages to their latest version |
||||
apt: |
||||
name: "*" |
||||
state: latest |
||||
update_cache: yes |
||||
|
||||
- name: Install packages for webserver support |
||||
apt: |
||||
name: [ |
||||
'nginx', |
||||
'rsync', # for letsencrypt-cert-push |
||||
] |
||||
state: present |
||||
|
||||
- name: "Install /etc/nginx/sites-available/default" |
||||
template: |
||||
src: "{{ role_path }}/templates/default.j2" |
||||
dest: "/etc/nginx/sites-available/default" |
||||
owner: root |
||||
group: root |
||||
mode: 0644 |
||||
notify: Restart nginx |
||||
|
||||
- name: Generate /etc/nginx/ssl-dhparams.pem |
||||
shell: openssl dhparam -out /etc/nginx/ssl-dhparams.pem 4096 |
||||
args: |
||||
creates: /etc/nginx/ssl-dhparams.pem |
||||
|
||||
- name: Start & enable nginx |
||||
service: |
||||
name: nginx |
||||
state: started |
||||
enabled: true |
||||
|
||||
- name: Get public key contents |
||||
set_fact: |
||||
public_key: "{{ lookup('file', inventory_dir + '/files/ssh/id_rsa.pub' ) }}" |
||||
|
||||
- name: "Install ssh public key for builder/certbot" |
||||
lineinfile: |
||||
path: "/root/.ssh/authorized_keys" |
||||
line: "{{ public_key }}" |
||||
search_string: "{{ public_key }}" |
||||
state: present |
||||
@ -0,0 +1,20 @@ |
||||
server { |
||||
listen 80 default_server; |
||||
listen [::]:80 default_server; |
||||
|
||||
root /var/www/html; |
||||
|
||||
# Add index.php to the list if you are using PHP |
||||
index index.html index.htm index.nginx-debian.html; |
||||
|
||||
server_name _; |
||||
|
||||
# certbot passthrough |
||||
location /.well-known/acme-challenge { |
||||
proxy_pass http://{{ certbot_domain }}; |
||||
} |
||||
|
||||
location / { |
||||
try_files $uri $uri/ =404; |
||||
} |
||||
} |
||||
@ -0,0 +1,7 @@ |
||||
- name: Setup environment for manager user |
||||
include_tasks: |
||||
file: manager_user.yml |
||||
|
||||
- name: Setup the web application |
||||
include_tasks: |
||||
file: webapp.yml |
||||
@ -0,0 +1,77 @@ |
||||
- name: Install packages |
||||
apt: |
||||
name: [ |
||||
'git', |
||||
'build-essential', |
||||
'libssl-dev', |
||||
'libz-dev', |
||||
'cpanminus', |
||||
'vim', |
||||
'curl', |
||||
'ack', |
||||
'tree', |
||||
'perl-doc', |
||||
] |
||||
state: present |
||||
|
||||
- name: Create manager user |
||||
user: |
||||
name: manager |
||||
shell: /bin/bash |
||||
comment: Manager User Account |
||||
|
||||
- name: Create ~manager/.ssh |
||||
file: |
||||
state: directory |
||||
path: /home/manager/.ssh |
||||
owner: manager |
||||
group: manager |
||||
mode: 0700 |
||||
|
||||
- name: Create ~manager/.ssh/authorized_keys from ~root |
||||
copy: |
||||
dest: /home/manager/.ssh/authorized_keys |
||||
src: /root/.ssh/authorized_keys |
||||
remote_src: true |
||||
owner: manager |
||||
group: manager |
||||
mode: 0600 |
||||
|
||||
- name: Create ~manager/.ssh/config |
||||
copy: |
||||
dest: /home/manager/.ssh/config |
||||
content: "host *.{{ service_domain }}\n StrictHostKeyChecking no\n" |
||||
owner: manager |
||||
group: manager |
||||
mode: 0600 |
||||
|
||||
- name: Create ~manager/.gitconfig |
||||
copy: |
||||
dest: /home/manager/.gitconfig |
||||
content: "[user]\n\temail = manager@{{ service_domain }}\n\tname = Manager Bot\n" |
||||
owner: manager |
||||
group: manager |
||||
mode: 0600 |
||||
|
||||
- name: Ensure that local::lib is used when logging in |
||||
lineinfile: |
||||
path: /home/manager/.bashrc |
||||
regexp: '^eval \$\(perl' |
||||
line: eval $(perl -Mlocal::lib) |
||||
|
||||
- name: Install Dist::Zilla |
||||
shell: cpanm Dist::Zilla |
||||
args: |
||||
creates: /home/manager/perl5/lib/perl5/Dist/Zilla.pm |
||||
environment: |
||||
PATH: '/home/manager/perl5/bin:/usr/local/bin:/usr/bin:/bin' |
||||
PERL5LIB: '/home/manager/perl5/lib/perl5' |
||||
PERL_MB_OPT: '--install_base "/home/manager/perl5"' |
||||
PERL_MM_OPT: 'INSTALL_BASE=/home/manager/perl5' |
||||
PERL_LOCAL_LIB_ROOT: '/home/manager/perl5' |
||||
become: true |
||||
become_user: manager |
||||
register: result |
||||
until: result is success |
||||
retries: 5 |
||||
|
||||
@ -0,0 +1,96 @@ |
||||
- name: Install packages to support postgres |
||||
apt: |
||||
name: [ |
||||
'libpq-dev', |
||||
'postgresql-client', |
||||
'postgresql-contrib', |
||||
] |
||||
state: present |
||||
|
||||
- name: Install /etc/mjb.yml |
||||
template: |
||||
src: "{{ role_path }}/templates/mjb.yml.j2" |
||||
dest: /etc/mjb.yml |
||||
owner: root |
||||
group: root |
||||
mode: 0644 |
||||
|
||||
- name: "Git clone from {{ repo }}" |
||||
git: |
||||
repo: "{{ repo }}" |
||||
dest: /home/manager/mjb |
||||
accept_hostkey: true |
||||
become: true |
||||
become_user: manager |
||||
|
||||
- name: Build MJB::Backend::Jekyll |
||||
shell: dzil build > build.log 2>&1 |
||||
args: |
||||
chdir: /home/manager/mjb/libs/MJB-Backend-Jekyll |
||||
creates: /home/manager/mjb/libs/MJB-Backend-Jekyll/build.log |
||||
environment: |
||||
PATH: '/home/manager/perl5/bin:/usr/local/bin:/usr/bin:/bin' |
||||
PERL5LIB: '/home/manager/perl5/lib/perl5' |
||||
PERL_MB_OPT: '--install_base "/home/manager/perl5"' |
||||
PERL_MM_OPT: 'INSTALL_BASE=/home/manager/perl5' |
||||
PERL_LOCAL_LIB_ROOT: '/home/manager/perl5' |
||||
become: true |
||||
become_user: manager |
||||
|
||||
- name: Install MJB::Backend::Jekyll |
||||
shell: cpanm MJB-Backend-Jekyll-*.tar.gz |
||||
args: |
||||
chdir: /home/manager/mjb/libs/MJB-Backend-Jekyll |
||||
creates: /home/manager/perl5/lib/perl5/MJB/Backend/Jekyll.pm |
||||
environment: |
||||
PATH: '/home/manager/perl5/bin:/usr/local/bin:/usr/bin:/bin' |
||||
PERL5LIB: '/home/manager/perl5/lib/perl5' |
||||
PERL_MB_OPT: '--install_base "/home/manager/perl5"' |
||||
PERL_MM_OPT: 'INSTALL_BASE=/home/manager/perl5' |
||||
PERL_LOCAL_LIB_ROOT: '/home/manager/perl5' |
||||
become: true |
||||
become_user: manager |
||||
|
||||
- name: Build MJB::DB |
||||
shell: dzil build > build.log 2>&1 |
||||
args: |
||||
chdir: /home/manager/mjb/DB |
||||
creates: /home/manager/mjb/DB/build.log |
||||
environment: |
||||
PATH: '/home/manager/perl5/bin:/usr/local/bin:/usr/bin:/bin' |
||||
PERL5LIB: '/home/manager/perl5/lib/perl5' |
||||
PERL_MB_OPT: '--install_base "/home/manager/perl5"' |
||||
PERL_MM_OPT: 'INSTALL_BASE=/home/manager/perl5' |
||||
PERL_LOCAL_LIB_ROOT: '/home/manager/perl5' |
||||
become: true |
||||
become_user: manager |
||||
|
||||
- name: Install MJB::DB |
||||
shell: cpanm MJB-DB-*.tar.gz |
||||
args: |
||||
chdir: /home/manager/mjb/DB |
||||
creates: /home/manager/perl5/lib/perl5/MJB/DB.pm |
||||
environment: |
||||
PATH: '/home/manager/perl5/bin:/usr/local/bin:/usr/bin:/bin' |
||||
PERL5LIB: '/home/manager/perl5/lib/perl5' |
||||
PERL_MB_OPT: '--install_base "/home/manager/perl5"' |
||||
PERL_MM_OPT: 'INSTALL_BASE=/home/manager/perl5' |
||||
PERL_LOCAL_LIB_ROOT: '/home/manager/perl5' |
||||
become: true |
||||
become_user: manager |
||||
|
||||
- name: Install MJB::Web Dependencies |
||||
shell: cpanm --installdeps . > build.log 2>&1 |
||||
args: |
||||
chdir: /home/manager/mjb/Web |
||||
creates: /home/manager/mjb/Web/build.log |
||||
environment: |
||||
PATH: '/home/manager/perl5/bin:/usr/local/bin:/usr/bin:/bin' |
||||
PERL5LIB: '/home/manager/perl5/lib/perl5' |
||||
PERL_MB_OPT: '--install_base "/home/manager/perl5"' |
||||
PERL_MM_OPT: 'INSTALL_BASE=/home/manager/perl5' |
||||
PERL_LOCAL_LIB_ROOT: '/home/manager/perl5' |
||||
|
||||
become: true |
||||
become_user: manager |
||||
|
||||
@ -0,0 +1,14 @@ |
||||
--- |
||||
customer_domain: {{ customer_domain_name }} |
||||
|
||||
jekyll_init_repo: {{ mjb_web.jekyll_init_repo }} |
||||
store_repo_base: {{ mjb_web.store_repo_base }} |
||||
|
||||
database: |
||||
mjb: postgresql://{{ databases.mjb.user }}:{{ databases.mjb.pass }}@{{ databases.mjb.host }}/{{ databases.mjb.name }} |
||||
minion: postgresql://{{ databases.minion.user }}:{{ databases.minion.pass }}@{{ databases.minion.host }}/{{ databases.minion.name }} |
||||
|
||||
secrets: |
||||
{% for secret in secrets %} |
||||
- {{ secret }} |
||||
{% endfor %} |
||||
@ -0,0 +1,39 @@ |
||||
- name: Configure Store Server |
||||
remote_user: root |
||||
hosts: store |
||||
vars: |
||||
ansible_ssh_common_args: -oControlMaster=auto -oControlPersist=60s -oUserKnownHostsFile=/dev/null -oStrictHostKeyChecking=no |
||||
roles: |
||||
- mjb-profile-store |
||||
|
||||
- name: Configure Certbot Server |
||||
remote_user: root |
||||
hosts: certbot |
||||
vars: |
||||
ansible_ssh_common_args: -oControlMaster=auto -oControlPersist=60s -oUserKnownHostsFile=/dev/null -oStrictHostKeyChecking=no |
||||
roles: |
||||
- mjb-profile-certbot |
||||
|
||||
- name: Configure Build Servers |
||||
remote_user: root |
||||
hosts: buildservers |
||||
vars: |
||||
ansible_ssh_common_args: -oControlMaster=auto -oControlPersist=60s -oUserKnownHostsFile=/dev/null -oStrictHostKeyChecking=no |
||||
roles: |
||||
- mjb-profile-buildserver |
||||
|
||||
- name: Configure The Panel Server |
||||
remote_user: root |
||||
hosts: panel |
||||
vars: |
||||
ansible_ssh_common_args: -oControlMaster=auto -oControlPersist=60s -oUserKnownHostsFile=/dev/null -oStrictHostKeyChecking=no |
||||
roles: |
||||
- mjb-profile-panel |
||||
|
||||
- name: Configure Web Servers |
||||
remote_user: root |
||||
hosts: webservers |
||||
vars: |
||||
ansible_ssh_common_args: -oControlMaster=auto -oControlPersist=60s -oUserKnownHostsFile=/dev/null -oStrictHostKeyChecking=no |
||||
roles: |
||||
- mjb-profile-webserver |
||||
Loading…
Reference in new issue