Compare commits
2 Commits
ac92286b5b
...
d42dfc8c5c
Author | SHA1 | Date | |
---|---|---|---|
d42dfc8c5c | |||
e7a8c8aa1c |
@ -25,10 +25,15 @@ webserver:
|
|||||||
### Traefik ###
|
### Traefik ###
|
||||||
###############
|
###############
|
||||||
#TRAEFIK_VERSION: latest
|
#TRAEFIK_VERSION: latest
|
||||||
|
#TRAEFIK_ROOT_DOMAIN: local.freeitathens.org
|
||||||
#TRAEFIK_DOMAIN: traefik.local.freeitathens.org
|
#TRAEFIK_DOMAIN: traefik.local.freeitathens.org
|
||||||
#TRAEFIK_DASHBOARD: true
|
#TRAEFIK_DASHBOARD: true
|
||||||
#TRAEFIK_EXPOSED_DEFAULT: false
|
#TRAEFIK_EXPOSED_DEFAULT: false
|
||||||
|
#TRAEFIK_WEB_ENABLED: true
|
||||||
TRAEFIK_DEBUG: true
|
TRAEFIK_DEBUG: true
|
||||||
|
TRAEFIK_ACME_PROVIDER: dreamhost
|
||||||
|
TRAEFIK_ACME_CASERVER: https://acme-v02.api.letsencrypt.org/directory
|
||||||
|
TRAEFIK_ACME_EMAIL: frita@example.org
|
||||||
|
|
||||||
#################
|
#################
|
||||||
### WordPress ###
|
### WordPress ###
|
||||||
|
@ -4,5 +4,6 @@
|
|||||||
vars_files:
|
vars_files:
|
||||||
- vars/webserver.yml
|
- vars/webserver.yml
|
||||||
roles:
|
roles:
|
||||||
|
- common
|
||||||
- docker
|
- docker
|
||||||
- webserver
|
- webserver
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
#!/bin/bash
|
#!/bin/bash
|
||||||
|
|
||||||
# Finds the SSH private key under ./.vagrant and connects to
|
# Finds the SSH private key under ./.vagrant and connects to
|
||||||
# the Vagrant box port forwarding localhost ports: 8443, 80, 443
|
# the Vagrant box, port forwarding localhost ports: 8443, 80, 443
|
||||||
PRIVATE_KEY="$(find .vagrant -name "private_key")"
|
PRIVATE_KEY="$(find .vagrant -name "private_key")"
|
||||||
HOST_IP="$(vagrant ssh -c "hostname -I | cut -d' ' -f2" 2>/dev/null)"
|
HOST_IP="$(vagrant ssh -c "hostname -I | cut -d' ' -f2" 2>/dev/null)"
|
||||||
|
MATCH_PATTERN="ssh -fNT -i ${PRIVATE_KEY}.*vagrant@"
|
||||||
|
|
||||||
if [ "$(pgrep -afc "$PRIVATE_KEY")" -eq 0 ]; then
|
function ssh_connect {
|
||||||
set -x
|
|
||||||
sudo ssh -fNT -i "$PRIVATE_KEY" \
|
sudo ssh -fNT -i "$PRIVATE_KEY" \
|
||||||
-L 8443:localhost:8443 \
|
-L 8443:localhost:8443 \
|
||||||
-L 80:localhost:80 \
|
-L 80:localhost:80 \
|
||||||
@ -14,10 +14,13 @@ if [ "$(pgrep -afc "$PRIVATE_KEY")" -eq 0 ]; then
|
|||||||
-o UserKnownHostsFile=/dev/null \
|
-o UserKnownHostsFile=/dev/null \
|
||||||
-o StrictHostKeyChecking=no \
|
-o StrictHostKeyChecking=no \
|
||||||
vagrant@"${HOST_IP::-1}" 2>/dev/null
|
vagrant@"${HOST_IP::-1}" 2>/dev/null
|
||||||
set +x
|
}
|
||||||
|
|
||||||
|
set -x
|
||||||
|
if [ "$(pgrep -afc "$MATCH_PATTERN")" -eq 0 ]; then
|
||||||
|
ssh_connect
|
||||||
else
|
else
|
||||||
echo "ERROR: SSH process already running"
|
pgrep -f "$MATCH_PATTERN" | xargs sudo kill -9
|
||||||
pgrep -af "$PRIVATE_KEY"
|
ssh_connect
|
||||||
echo -e "\nKill process:\n\tsudo kill -9 \"\$(pgrep -f \"$PRIVATE_KEY\")\""
|
|
||||||
exit 1
|
|
||||||
fi
|
fi
|
||||||
|
set +x
|
||||||
|
30
roles/common/tasks/main.yml
Normal file
30
roles/common/tasks/main.yml
Normal file
@ -0,0 +1,30 @@
|
|||||||
|
- name: Create Ansible's temporary remote directory
|
||||||
|
ansible.builtin.file:
|
||||||
|
path: "~/.ansible/tmp"
|
||||||
|
state: directory
|
||||||
|
mode: 0700
|
||||||
|
|
||||||
|
- name: Install the Uncomplicated Firewall
|
||||||
|
ansible.builtin.apt:
|
||||||
|
name: ufw
|
||||||
|
state: present
|
||||||
|
update_cache: true
|
||||||
|
|
||||||
|
- name: Deny incoming traffic by default
|
||||||
|
community.general.ufw:
|
||||||
|
default: deny
|
||||||
|
direction: incoming
|
||||||
|
|
||||||
|
- name: Allow outgoing traffic by default
|
||||||
|
community.general.ufw:
|
||||||
|
default: allow
|
||||||
|
direction: outgoing
|
||||||
|
|
||||||
|
- name: Allow OpenSSH with rate limiting
|
||||||
|
community.general.ufw:
|
||||||
|
name: ssh
|
||||||
|
rule: limit
|
||||||
|
|
||||||
|
- name: Enable firewall
|
||||||
|
community.general.ufw:
|
||||||
|
state: enabled
|
@ -2,7 +2,6 @@
|
|||||||
ansible.builtin.apt:
|
ansible.builtin.apt:
|
||||||
name: ['docker.io', 'docker-compose']
|
name: ['docker.io', 'docker-compose']
|
||||||
state: present
|
state: present
|
||||||
update_cache: true
|
|
||||||
|
|
||||||
- name: Create docker-compose root
|
- name: Create docker-compose root
|
||||||
ansible.builtin.file:
|
ansible.builtin.file:
|
||||||
|
@ -1 +1,4 @@
|
|||||||
webserver_root: "{{ docker_compose_root }}/webserver"
|
webserver_root: "{{ docker_compose_root }}/webserver"
|
||||||
|
mariadb_trust:
|
||||||
|
- "172.16.0.0/12"
|
||||||
|
- "192.168.0.0/16"
|
||||||
|
@ -17,11 +17,16 @@ services:
|
|||||||
- --providers.docker=true
|
- --providers.docker=true
|
||||||
- --providers.docker.exposedbydefault=${TRAEFIK_EXPOSED_DEFAULT:-false}
|
- --providers.docker.exposedbydefault=${TRAEFIK_EXPOSED_DEFAULT:-false}
|
||||||
- --entrypoints.web.address=:80
|
- --entrypoints.web.address=:80
|
||||||
|
- --entrypoints.websecure.address=:443
|
||||||
|
- --entrypoints.local.address=:8443
|
||||||
- --entrypoints.web.http.redirections.entrypoint.to=websecure
|
- --entrypoints.web.http.redirections.entrypoint.to=websecure
|
||||||
- --entrypoints.web.http.redirections.entrypoint.scheme=https
|
- --entrypoints.web.http.redirections.entrypoint.scheme=https
|
||||||
- --entrypoints.web.http.redirections.entrypoint.permanent=true
|
- --entrypoints.web.http.redirections.entrypoint.permanent=true
|
||||||
- --entrypoints.websecure.address=:443
|
- --certificatesresolvers.letsencrypt.acme.email=${TRAEFIK_ACME_EMAIL}
|
||||||
- --entrypoints.local.address=:8443
|
- --certificatesresolvers.letsencrypt.acme.storage=acme.json
|
||||||
|
- --certificatesresolvers.letsencrypt.acme.dnschallenge.provider=${TRAEFIK_ACME_PROVIDER}
|
||||||
|
- --certificatesresolvers.letsencrypt.acme.dnschallenge.delaybeforecheck=0
|
||||||
|
- --certificatesresolvers.letsencrypt.acme.caserver=${TRAEFIK_ACME_CASERVER:-https://acme-staging-v02.api.letsencrypt.org/directory}
|
||||||
ports:
|
ports:
|
||||||
- 80:80
|
- 80:80
|
||||||
- 443:443
|
- 443:443
|
||||||
@ -33,7 +38,9 @@ services:
|
|||||||
traefik.http.routers.api.entrypoints: local
|
traefik.http.routers.api.entrypoints: local
|
||||||
traefik.http.routers.api.service: api@internal
|
traefik.http.routers.api.service: api@internal
|
||||||
traefik.http.routers.api.tls: true
|
traefik.http.routers.api.tls: true
|
||||||
traefik.enable: true
|
traefik.http.routers.api.tls.domains[0].main: ${TRAEFIK_ROOT_DOMAIN:-local.freeitathens.org}
|
||||||
|
traefik.http.routers.api.tls.domains[0].sans: "*.${TRAEFIK_ROOT_DOMAIN:-local.freeitathens.org}"
|
||||||
|
traefik.enable: ${TRAEFIK_WEB_ENABLED:-true}
|
||||||
networks:
|
networks:
|
||||||
- traefik
|
- traefik
|
||||||
|
|
||||||
@ -48,10 +55,13 @@ services:
|
|||||||
labels:
|
labels:
|
||||||
traefik.http.routers.wordpress.rule: Host(`${WORDPRESS_DOMAIN:-www.local.freeitathens.org}`)
|
traefik.http.routers.wordpress.rule: Host(`${WORDPRESS_DOMAIN:-www.local.freeitathens.org}`)
|
||||||
traefik.http.routers.wordpress.entrypoints: websecure
|
traefik.http.routers.wordpress.entrypoints: websecure
|
||||||
traefik.http.routers.wordpress.tls.certresolver: letsencrypt
|
traefik.http.routers.wordpress.tls: true
|
||||||
|
traefik.http.services.wordpress.loadbalancer.server.port: 80
|
||||||
traefik.docker.network: traefik
|
traefik.docker.network: traefik
|
||||||
traefik.enable: true
|
traefik.enable: ${WORDPRESS_WEB_ENABLED:-true}
|
||||||
volumes:
|
volumes:
|
||||||
- wordpress:/var/www/html
|
- wordpress:/var/www/html
|
||||||
|
networks:
|
||||||
|
- traefik
|
||||||
extra_hosts:
|
extra_hosts:
|
||||||
- host.docker.internal:host-gateway
|
- host.docker.internal:host-gateway
|
||||||
|
@ -3,3 +3,9 @@
|
|||||||
args:
|
args:
|
||||||
chdir: "{{ webserver_root }}"
|
chdir: "{{ webserver_root }}"
|
||||||
listen: composeup_webserver
|
listen: composeup_webserver
|
||||||
|
|
||||||
|
- name: Restart MariaDB
|
||||||
|
ansible.builtin.service:
|
||||||
|
name: mariadb
|
||||||
|
state: restarted
|
||||||
|
listen: restart_mariadb
|
||||||
|
@ -3,6 +3,13 @@
|
|||||||
name: mariadb-server
|
name: mariadb-server
|
||||||
state: present
|
state: present
|
||||||
|
|
||||||
|
- name: Change the bind-address to allow Docker
|
||||||
|
ansible.builtin.lineinfile:
|
||||||
|
path: /etc/mysql/mariadb.conf.d/50-server.cnf
|
||||||
|
regex: "^bind-address"
|
||||||
|
line: "bind-address = 0.0.0.0"
|
||||||
|
notify: restart_mariadb
|
||||||
|
|
||||||
- name: Install MySQL Support for Python 3
|
- name: Install MySQL Support for Python 3
|
||||||
ansible.builtin.apt:
|
ansible.builtin.apt:
|
||||||
name: python3-pymysql
|
name: python3-pymysql
|
||||||
@ -20,8 +27,9 @@
|
|||||||
community.mysql.mysql_user:
|
community.mysql.mysql_user:
|
||||||
name: "{{ item.name }}"
|
name: "{{ item.name }}"
|
||||||
password: "{{ item.pass }}"
|
password: "{{ item.pass }}"
|
||||||
priv: "{{ item.name }}.*:ALL,GRANT"
|
host: '%'
|
||||||
state: present
|
state: present
|
||||||
|
priv: "{{ item.name }}.*:ALL"
|
||||||
login_unix_socket: /var/run/mysqld/mysqld.sock
|
login_unix_socket: /var/run/mysqld/mysqld.sock
|
||||||
loop: "{{ databases }}"
|
loop: "{{ databases }}"
|
||||||
no_log: "{{ item.pass is defined }}"
|
no_log: "{{ item.pass is defined }}"
|
||||||
@ -45,3 +53,20 @@
|
|||||||
dest: "{{ webserver_root }}/.env"
|
dest: "{{ webserver_root }}/.env"
|
||||||
mode: 0600
|
mode: 0600
|
||||||
notify: composeup_webserver
|
notify: composeup_webserver
|
||||||
|
|
||||||
|
- name: Allow MariaDB database connections
|
||||||
|
community.general.ufw:
|
||||||
|
rule: allow
|
||||||
|
port: 3306
|
||||||
|
proto: tcp
|
||||||
|
src: "{{ item }}"
|
||||||
|
loop: "{{ mariadb_trust }}"
|
||||||
|
|
||||||
|
- name: Add HTTP and HTTPS firewall rule
|
||||||
|
community.general.ufw:
|
||||||
|
rule: allow
|
||||||
|
port: "{{ item }}"
|
||||||
|
proto: tcp
|
||||||
|
loop:
|
||||||
|
- "80"
|
||||||
|
- "443"
|
||||||
|
@ -2,5 +2,6 @@
|
|||||||
hosts: all
|
hosts: all
|
||||||
become: true
|
become: true
|
||||||
roles:
|
roles:
|
||||||
|
- common
|
||||||
- docker
|
- docker
|
||||||
- webserver
|
- webserver
|
||||||
|
Loading…
x
Reference in New Issue
Block a user