Merge branch 'master' of ssh://git-ssh.notandy.de:2222/ansible-roles/nginx

This commit is contained in:
nd 2019-04-27 21:47:37 +02:00
commit 0e8c531d0b
No known key found for this signature in database
GPG key ID: 21B5CD4DEE3670E9
6 changed files with 19 additions and 6 deletions

View file

@ -3,7 +3,9 @@ resolver:
- 8.8.4.4 - 8.8.4.4
nginx: nginx:
php: False monitoring: true
force_ssl: True serverpki: true
php: false
force_ssl: true
upstreams: {} upstreams: {}
vhosts: {} vhosts: {}

View file

@ -1,4 +1,4 @@
--- ---
dependencies: dependencies:
- { role: monitoring } - { role: monitoring, when: nginx.monitoring }
- { role: pki-server } - { role: pki-server, when: nginx.serverpki }

View file

@ -73,6 +73,7 @@
owner: root owner: root
group: root group: root
mode: 0644 mode: 0644
when: nginx.monitoring
- name: copy nginx status config - name: copy nginx status config
copy: copy:

View file

@ -18,6 +18,8 @@
- php-net-ftp - php-net-ftp
- php-exif - php-exif
- php-gmp - php-gmp
- php-zip
- php-curl
# database pdos # database pdos
- php-pdo-sqlite - php-pdo-sqlite
- php-pdo-pgsql - php-pdo-pgsql

View file

@ -1,7 +1,10 @@
{% if nginx.serverpki %}
# certs sent to the client in SERVER HELLO are concatenated in ssl_certificate # certs sent to the client in SERVER HELLO are concatenated in ssl_certificate
ssl_certificate /etc/ssl/{{ inventory_hostname }}.crt; ssl_certificate /etc/ssl/{{ inventory_hostname }}.crt;
ssl_certificate_key /etc/ssl/private/{{ inventory_hostname }}.key; ssl_certificate_key /etc/ssl/private/{{ inventory_hostname }}.key;
## verify chain of trust of OCSP response using Root CA and Intermediate certs {% endif %}
# verify chain of trust of OCSP response using Root CA and Intermediate certs
ssl_trusted_certificate /etc/ssl/certs/ca-certificates.crt; ssl_trusted_certificate /etc/ssl/certs/ca-certificates.crt;
# Diffie-Hellman parameter for DHE ciphersuites, recommended 2048 bits # Diffie-Hellman parameter for DHE ciphersuites, recommended 2048 bits

View file

@ -18,7 +18,7 @@ server {
{% endif %} {% endif %}
{% for header in vhost.add_headers|default([]) %} {% for header in vhost.add_headers|default([]) %}
add_header {{ header }} {{ vhost.add_headers[header] }}; add_header {{ header }} "{{ vhost.add_headers[header] }}";
{% endfor %} {% endfor %}
{% for c in vhost.custom|default([]) %} {% for c in vhost.custom|default([]) %}
@ -38,6 +38,11 @@ server {
proxy_set_header X-Forwarded-Ssl $https; proxy_set_header X-Forwarded-Ssl $https;
proxy_set_header X-Url-Scheme $scheme; proxy_set_header X-Url-Scheme $scheme;
# Websockets
proxy_http_version 1.1;
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection "upgrade";
# hide downstream headers for security reasons # hide downstream headers for security reasons
proxy_hide_header X-Powered-By; proxy_hide_header X-Powered-By;
proxy_hide_header Server; proxy_hide_header Server;