Compare commits
1 Commits
03a57d2531
...
2fc770ab0c
Author | SHA1 | Date | |
---|---|---|---|
2fc770ab0c |
@ -1,3 +1,6 @@
|
|||||||
[defaults]
|
[defaults]
|
||||||
inventory = ./environments/development
|
inventory = ./environments/development
|
||||||
interpreter_python = /usr/bin/python3
|
interpreter_python = /usr/bin/python3
|
||||||
|
|
||||||
|
[connection]
|
||||||
|
pipelining = true
|
||||||
|
@ -17,7 +17,7 @@ proxy:
|
|||||||
- domain: "{{ bitwarden_domain }}"
|
- domain: "{{ bitwarden_domain }}"
|
||||||
proxy_pass: "http://127.0.0.1:8080"
|
proxy_pass: "http://127.0.0.1:8080"
|
||||||
- domain: "{{ gitea_domain }}"
|
- domain: "{{ gitea_domain }}"
|
||||||
proxy_pass: "http://127.0.0.1:3080"
|
proxy_pass: "http://127.0.0.1:3000"
|
||||||
|
|
||||||
# docker
|
# docker
|
||||||
docker_users:
|
docker_users:
|
||||||
@ -34,8 +34,4 @@ bitwarden_install_key: 1yB3Z2gRI0KnnH90C6p
|
|||||||
# gitea
|
# gitea
|
||||||
gitea_domain: "git.{{ base_domain }}"
|
gitea_domain: "git.{{ base_domain }}"
|
||||||
gitea_version: 1
|
gitea_version: 1
|
||||||
gitea_dbversion: latest
|
|
||||||
gitea_dbpass: password
|
gitea_dbpass: password
|
||||||
gitea_ports:
|
|
||||||
- "222:22"
|
|
||||||
- "3080:3000"
|
|
||||||
|
@ -5,7 +5,8 @@
|
|||||||
- host_vars/proxy.yml
|
- host_vars/proxy.yml
|
||||||
roles:
|
roles:
|
||||||
- base
|
- base
|
||||||
|
- postgresql
|
||||||
- proxy
|
- proxy
|
||||||
- docker
|
- docker
|
||||||
- bitwarden
|
|
||||||
- gitea
|
- gitea
|
||||||
|
- bitwarden
|
||||||
|
1
roles/.gitignore
vendored
1
roles/.gitignore
vendored
@ -10,6 +10,7 @@
|
|||||||
!minecraft*/
|
!minecraft*/
|
||||||
!nextcloud*/
|
!nextcloud*/
|
||||||
!nginx*/
|
!nginx*/
|
||||||
|
!postgresql*/
|
||||||
!prometheus*/
|
!prometheus*/
|
||||||
!proxy*/
|
!proxy*/
|
||||||
!rsnapshot*/
|
!rsnapshot*/
|
||||||
|
@ -13,3 +13,10 @@
|
|||||||
loop:
|
loop:
|
||||||
- aptitude
|
- aptitude
|
||||||
- python3-docker
|
- python3-docker
|
||||||
|
- python3-psycopg2
|
||||||
|
|
||||||
|
- name: Create Ansible's temporary remote directory
|
||||||
|
file:
|
||||||
|
path: "~/.ansible/tmp"
|
||||||
|
state: directory
|
||||||
|
mode: 0700
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
bitwarden_name: bitwarden
|
bitwarden_name: bitwarden
|
||||||
bitwarden_root: "/opt/{{ bitwarden_name }}"
|
bitwarden_root: "{{ docker_root }}/{{ bitwarden_name }}"
|
||||||
bitwarden_database: "{{ bitwarden_name }}"
|
bitwarden_database: "{{ bitwarden_name }}"
|
||||||
bitwarden_standalone: false
|
bitwarden_standalone: false
|
||||||
bitwarden_production: false
|
bitwarden_production: false
|
||||||
|
@ -1,7 +1,16 @@
|
|||||||
|
- name: Stop Bitwarden for rebuild
|
||||||
|
service:
|
||||||
|
name: "{{ bitwarden_name }}"
|
||||||
|
state: stopped
|
||||||
|
listen: rebuild_bitwarden
|
||||||
|
|
||||||
- name: Rebuild Bitwarden
|
- name: Rebuild Bitwarden
|
||||||
shell: "{{ bitwarden_root }}/bitwarden.sh rebuild"
|
shell: "{{ bitwarden_root }}/bitwarden.sh rebuild"
|
||||||
listen: rebuild_bitwarden
|
listen: rebuild_bitwarden
|
||||||
|
|
||||||
- name: Start Bitwarden
|
- name: Start Bitwarden after rebuild
|
||||||
shell: "{{ bitwarden_root }}/bitwarden.sh start"
|
service:
|
||||||
listen: start_bitwarden
|
name: "{{ bitwarden_name }}"
|
||||||
|
state: started
|
||||||
|
enabled: true
|
||||||
|
listen: rebuild_bitwarden
|
||||||
|
@ -25,16 +25,13 @@
|
|||||||
shell: "{{ bitwarden_root }}/bw_wrapper"
|
shell: "{{ bitwarden_root }}/bw_wrapper"
|
||||||
args:
|
args:
|
||||||
creates: "{{ bitwarden_root }}/bwdata/config.yml"
|
creates: "{{ bitwarden_root }}/bwdata/config.yml"
|
||||||
notify: start_bitwarden
|
|
||||||
|
|
||||||
- name: Install docker-compose override
|
- name: Install docker-compose override
|
||||||
template:
|
template:
|
||||||
src: compose.override.yml.j2
|
src: compose.override.yml.j2
|
||||||
dest: "{{ bitwarden_root }}/bwdata/docker/docker-compose.override.yml"
|
dest: "{{ bitwarden_root }}/bwdata/docker/docker-compose.override.yml"
|
||||||
when: traefik_version is defined
|
when: traefik_version is defined
|
||||||
notify:
|
notify: rebuild_bitwarden
|
||||||
- rebuild_bitwarden
|
|
||||||
- start_bitwarden
|
|
||||||
|
|
||||||
- name: Disable bitwarden-nginx HTTP on 80
|
- name: Disable bitwarden-nginx HTTP on 80
|
||||||
replace:
|
replace:
|
||||||
@ -42,9 +39,7 @@
|
|||||||
regexp: "^http_port: 80$"
|
regexp: "^http_port: 80$"
|
||||||
replace: "http_port: 8080"
|
replace: "http_port: 8080"
|
||||||
when: not bitwarden_standalone
|
when: not bitwarden_standalone
|
||||||
notify:
|
notify: rebuild_bitwarden
|
||||||
- rebuild_bitwarden
|
|
||||||
- start_bitwarden
|
|
||||||
|
|
||||||
- name: Disable bitwarden-nginx HTTPS on 443
|
- name: Disable bitwarden-nginx HTTPS on 443
|
||||||
replace:
|
replace:
|
||||||
@ -52,9 +47,7 @@
|
|||||||
regexp: "^https_port: 443$"
|
regexp: "^https_port: 443$"
|
||||||
replace: "https_port: 8443"
|
replace: "https_port: 8443"
|
||||||
when: not bitwarden_standalone
|
when: not bitwarden_standalone
|
||||||
notify:
|
notify: rebuild_bitwarden
|
||||||
- rebuild_bitwarden
|
|
||||||
- start_bitwarden
|
|
||||||
|
|
||||||
- name: Disable Bitwarden managed Lets Encrypt
|
- name: Disable Bitwarden managed Lets Encrypt
|
||||||
replace:
|
replace:
|
||||||
@ -62,9 +55,7 @@
|
|||||||
regexp: "^ssl_managed_lets_encrypt: true$"
|
regexp: "^ssl_managed_lets_encrypt: true$"
|
||||||
replace: "ssl_managed_lets_encrypt: false"
|
replace: "ssl_managed_lets_encrypt: false"
|
||||||
when: not bitwarden_standalone or not bitwarden_production
|
when: not bitwarden_standalone or not bitwarden_production
|
||||||
notify:
|
notify: rebuild_bitwarden
|
||||||
- rebuild_bitwarden
|
|
||||||
- start_bitwarden
|
|
||||||
|
|
||||||
- name: Disable Bitwarden managed SSL
|
- name: Disable Bitwarden managed SSL
|
||||||
replace:
|
replace:
|
||||||
@ -72,6 +63,17 @@
|
|||||||
regexp: "^ssl: true$"
|
regexp: "^ssl: true$"
|
||||||
replace: "ssl: false"
|
replace: "ssl: false"
|
||||||
when: not bitwarden_standalone
|
when: not bitwarden_standalone
|
||||||
notify:
|
notify: rebuild_bitwarden
|
||||||
- rebuild_bitwarden
|
|
||||||
- start_bitwarden
|
- name: Install Bitwarden systemd service
|
||||||
|
template:
|
||||||
|
src: bitwarden.service.j2
|
||||||
|
dest: "/etc/systemd/system/{{ bitwarden_name }}.service"
|
||||||
|
register: bitwarden_systemd
|
||||||
|
notify: rebuild_bitwarden
|
||||||
|
|
||||||
|
- name: Reload systemd manager configuration
|
||||||
|
systemd:
|
||||||
|
daemon_reload: true
|
||||||
|
when: bitwarden_systemd.changed
|
||||||
|
notify: rebuild_bitwarden
|
||||||
|
13
roles/bitwarden/templates/bitwarden.service.j2
Normal file
13
roles/bitwarden/templates/bitwarden.service.j2
Normal file
@ -0,0 +1,13 @@
|
|||||||
|
[Unit]
|
||||||
|
Description=Bitwarden Password Manager Server
|
||||||
|
PartOf=docker.service
|
||||||
|
After=docker.service
|
||||||
|
|
||||||
|
[Service]
|
||||||
|
Type=oneshot
|
||||||
|
RemainAfterExit=true
|
||||||
|
ExecStart={{ bitwarden_root }}/bitwarden.sh start
|
||||||
|
ExecStop={{ bitwarden_root }}/bitwarden.sh stop
|
||||||
|
|
||||||
|
[Install]
|
||||||
|
WantedBy=multi-user.target
|
3
roles/docker/defaults/main.yml
Normal file
3
roles/docker/defaults/main.yml
Normal file
@ -0,0 +1,3 @@
|
|||||||
|
docker_root: /var/lib/docker-compose
|
||||||
|
docker_compose: /usr/bin/docker-compose
|
||||||
|
docker_compose_service: compose
|
@ -4,6 +4,22 @@
|
|||||||
state: present
|
state: present
|
||||||
update_cache: true
|
update_cache: true
|
||||||
|
|
||||||
|
- name: Create docker-compose root
|
||||||
|
file:
|
||||||
|
path: "{{ docker_root }}"
|
||||||
|
state: directory
|
||||||
|
|
||||||
|
- name: Install docker-compose systemd service
|
||||||
|
template:
|
||||||
|
src: docker-compose.service.j2
|
||||||
|
dest: "/etc/systemd/system/{{ docker_compose_service }}@.service"
|
||||||
|
register: compose_systemd
|
||||||
|
|
||||||
|
- name: Reload systemd manager configuration
|
||||||
|
systemd:
|
||||||
|
daemon_reload: true
|
||||||
|
when: compose_systemd.changed
|
||||||
|
|
||||||
- name: Add users to docker group
|
- name: Add users to docker group
|
||||||
user:
|
user:
|
||||||
name: "{{ item }}"
|
name: "{{ item }}"
|
||||||
|
14
roles/docker/templates/docker-compose.service.j2
Normal file
14
roles/docker/templates/docker-compose.service.j2
Normal file
@ -0,0 +1,14 @@
|
|||||||
|
[Unit]
|
||||||
|
Description=%i docker-compose service
|
||||||
|
PartOf=docker.service
|
||||||
|
After=docker.service
|
||||||
|
|
||||||
|
[Service]
|
||||||
|
Type=oneshot
|
||||||
|
RemainAfterExit=true
|
||||||
|
WorkingDirectory={{ docker_root }}/%i
|
||||||
|
ExecStart={{ docker_compose }} up -d --remove-orphans
|
||||||
|
ExecStop={{ docker_compose }} down
|
||||||
|
|
||||||
|
[Install]
|
||||||
|
WantedBy=multi-user.target
|
@ -1,11 +1,16 @@
|
|||||||
# container settings
|
# container settings
|
||||||
gitea_name: gitea
|
gitea_name: gitea
|
||||||
gitea_dbname: "{{ gitea_name }}-db"
|
gitea_sshport: "127.0.0.1:222"
|
||||||
gitea_ports: "222:22"
|
gitea_webport: "127.0.0.1:3000"
|
||||||
|
gitea_volume: "{{ gitea_name }}"
|
||||||
|
gitea_rooturl: "http://{{ gitea_domain }}"
|
||||||
|
gitea_signup: true
|
||||||
|
|
||||||
# database settings
|
# database settings
|
||||||
gitea_dbuser: "{{ gitea_dbname }}"
|
gitea_dbtype: postgres
|
||||||
|
gitea_dbhost: host.docker.internal
|
||||||
|
gitea_dbname: "{{ gitea_name }}"
|
||||||
|
gitea_dbuser: "{{ gitea_name }}"
|
||||||
|
|
||||||
# host
|
# host
|
||||||
gitea_root: "/opt/{{ gitea_name }}/data"
|
gitea_root: "{{ docker_root }}/{{ gitea_name }}"
|
||||||
gitea_dbroot: "/opt/{{ gitea_name }}/database"
|
|
||||||
|
@ -1,85 +1,34 @@
|
|||||||
- name: Create Gitea Network
|
- name: Create Gitea directory
|
||||||
docker_network:
|
file:
|
||||||
name: "{{ gitea_name }}"
|
path: "{{ gitea_root }}"
|
||||||
|
state: directory
|
||||||
|
|
||||||
- name: Start Gitea's database container
|
- name: Create gitea database
|
||||||
docker_container:
|
postgresql_db:
|
||||||
name: "{{ gitea_dbname }}"
|
name: "{{ gitea_dbname }}"
|
||||||
image: mariadb:{{ gitea_dbversion }}
|
become: true
|
||||||
state: started
|
become_user: postgres
|
||||||
restart_policy: always
|
|
||||||
volumes: "{{ gitea_dbroot }}:/var/lib/mysql"
|
|
||||||
container_default_behavior: "no_defaults"
|
|
||||||
networks_cli_compatible: true
|
|
||||||
networks:
|
|
||||||
- name: "{{ gitea_name }}"
|
|
||||||
env:
|
|
||||||
MYSQL_RANDOM_ROOT_PASSWORD: "true"
|
|
||||||
MYSQL_DATABASE: "{{ gitea_dbname }}"
|
|
||||||
MYSQL_USER: "{{ gitea_dbuser }}"
|
|
||||||
MYSQL_PASSWORD: "{{ gitea_dbpass }}"
|
|
||||||
|
|
||||||
- name: Start Gitea container (traefik routing)
|
- name: Create gitea database user
|
||||||
docker_container:
|
postgresql_user:
|
||||||
name: "{{ gitea_name }}"
|
db: "{{ gitea_dbname }}"
|
||||||
image: gitea/gitea:{{ gitea_version }}
|
name: "{{ gitea_dbuser }}"
|
||||||
state: started
|
password: "{{ gitea_dbpass }}"
|
||||||
restart_policy: always
|
become: true
|
||||||
container_default_behavior: "no_defaults"
|
become_user: postgres
|
||||||
networks_cli_compatible: true
|
|
||||||
ports: "{{ gitea_ports }}"
|
|
||||||
networks:
|
|
||||||
- name: "{{ gitea_name }}"
|
|
||||||
- name: traefik
|
|
||||||
volumes:
|
|
||||||
- "{{ gitea_root }}:/data"
|
|
||||||
- /etc/timezone:/etc/timezone:ro
|
|
||||||
- /etc/localtime:/etc/localtime:ro
|
|
||||||
env:
|
|
||||||
USER_UID: "1000"
|
|
||||||
USER_GID: "1000"
|
|
||||||
DB_TYPE: mysql
|
|
||||||
DB_HOST: "{{ gitea_dbname }}"
|
|
||||||
DB_NAME: "{{ gitea_dbname }}"
|
|
||||||
DB_USER: "{{ gitea_dbuser }}"
|
|
||||||
DB_PASSWD: "{{ gitea_dbpass }}"
|
|
||||||
ROOT_URL: "https://{{ gitea_domain }}/"
|
|
||||||
SSH_DOMAIN: "{{ gitea_domain }}"
|
|
||||||
DOMAIN: "{{ gitea_domain }}"
|
|
||||||
labels:
|
|
||||||
traefik.http.routers.gitea.rule: "Host(`{{ gitea_domain }}`)"
|
|
||||||
traefik.http.routers.gitea.entrypoints: websecure
|
|
||||||
traefik.http.routers.gitea.tls.certresolver: letsencrypt
|
|
||||||
traefik.http.routers.gitea.middlewares: "securehttps@file"
|
|
||||||
traefik.http.services.gitea.loadbalancer.server.port: "3000"
|
|
||||||
traefik.docker.network: traefik
|
|
||||||
traefik.enable: "true"
|
|
||||||
when: traefik_version is defined
|
|
||||||
|
|
||||||
- name: Start Gitea container
|
- name: Install Gitea's docker-compose file
|
||||||
docker_container:
|
template:
|
||||||
name: "{{ gitea_name }}"
|
src: docker-compose.yml.j2
|
||||||
image: gitea/gitea:{{ gitea_version }}
|
dest: "{{ gitea_root }}/docker-compose.yml"
|
||||||
|
|
||||||
|
- name: Install Gitea's docker-compose variables
|
||||||
|
template:
|
||||||
|
src: compose-env.j2
|
||||||
|
dest: "{{ gitea_root }}/.env"
|
||||||
|
|
||||||
|
- name: Start and enable Gitea service
|
||||||
|
service:
|
||||||
|
name: "{{ docker_compose_service }}@{{ gitea_name }}"
|
||||||
state: started
|
state: started
|
||||||
restart_policy: always
|
enabled: true
|
||||||
container_default_behavior: "no_defaults"
|
|
||||||
networks_cli_compatible: true
|
|
||||||
ports: "{{ gitea_ports }}"
|
|
||||||
networks:
|
|
||||||
- name: "{{ gitea_name }}"
|
|
||||||
volumes:
|
|
||||||
- "{{ gitea_root }}:/data"
|
|
||||||
- /etc/timezone:/etc/timezone:ro
|
|
||||||
- /etc/localtime:/etc/localtime:ro
|
|
||||||
env:
|
|
||||||
USER_UID: "1000"
|
|
||||||
USER_GID: "1000"
|
|
||||||
DB_TYPE: mysql
|
|
||||||
DB_HOST: "{{ gitea_dbname }}"
|
|
||||||
DB_NAME: "{{ gitea_dbname }}"
|
|
||||||
DB_USER: "{{ gitea_dbuser }}"
|
|
||||||
DB_PASSWD: "{{ gitea_dbpass }}"
|
|
||||||
ROOT_URL: "https://{{ gitea_domain }}/"
|
|
||||||
SSH_DOMAIN: "{{ gitea_domain }}"
|
|
||||||
DOMAIN: "{{ gitea_domain }}"
|
|
||||||
when: traefik_version is not defined
|
|
||||||
|
17
roles/gitea/templates/compose-env.j2
Normal file
17
roles/gitea/templates/compose-env.j2
Normal file
@ -0,0 +1,17 @@
|
|||||||
|
# {{ ansible_managed }}
|
||||||
|
gitea_version={{ gitea_version }}
|
||||||
|
gitea_name={{ gitea_name }}
|
||||||
|
gitea_domain={{ gitea_domain }}
|
||||||
|
gitea_rooturl={{ gitea_rooturl }}
|
||||||
|
gitea_webport={{ gitea_webport }}
|
||||||
|
gitea_sshport={{ gitea_sshport }}
|
||||||
|
gitea_dbtype={{ gitea_dbtype }}
|
||||||
|
gitea_dbhost={{ gitea_dbhost }}
|
||||||
|
gitea_dbname={{ gitea_dbname }}
|
||||||
|
gitea_dbuser={{ gitea_dbuser }}
|
||||||
|
gitea_dbpass={{ gitea_dbpass }}
|
||||||
|
{% if not gitea_signup %}
|
||||||
|
gitea_disable_registration=true
|
||||||
|
{% else %}
|
||||||
|
gitea_disable_registration=false
|
||||||
|
{% endif %}
|
30
roles/gitea/templates/docker-compose.yml.j2
Normal file
30
roles/gitea/templates/docker-compose.yml.j2
Normal file
@ -0,0 +1,30 @@
|
|||||||
|
version: '3.7'
|
||||||
|
|
||||||
|
services:
|
||||||
|
gitea:
|
||||||
|
image: "gitea/gitea:${gitea_version}"
|
||||||
|
container_name: "${gitea_name}"
|
||||||
|
ports:
|
||||||
|
- "${gitea_sshport}:22"
|
||||||
|
- "${gitea_webport}:3000"
|
||||||
|
extra_hosts:
|
||||||
|
- "host.docker.internal:host-gateway"
|
||||||
|
environment:
|
||||||
|
- USER_UID=1000
|
||||||
|
- USER_GID=1000
|
||||||
|
- GITEA__server__ROOT_URL=${gitea_rooturl}
|
||||||
|
- GITEA__server__DOMAIN=${gitea_domain}
|
||||||
|
- GITEA__server__SSH_DOMAIN=${gitea_domain}
|
||||||
|
- GITEA__database__DB_TYPE=${gitea_dbtype}
|
||||||
|
- GITEA__database__HOST=${gitea_dbhost}
|
||||||
|
- GITEA__database__NAME=${gitea_dbname}
|
||||||
|
- GITEA__database__USER=${gitea_dbuser}
|
||||||
|
- GITEA__database__PASSWD=${gitea_dbpass}
|
||||||
|
- GITEA__service__DISABLE_REGISTRATION=${gitea_disable_registration}
|
||||||
|
volumes:
|
||||||
|
- {{ gitea_volume }}:/data
|
||||||
|
- /etc/timezone:/etc/timezone:ro
|
||||||
|
- /etc/localtime:/etc/localtime:ro
|
||||||
|
|
||||||
|
volumes:
|
||||||
|
{{ gitea_volume }}:
|
2
roles/postgresql/defaults/main.yml
Normal file
2
roles/postgresql/defaults/main.yml
Normal file
@ -0,0 +1,2 @@
|
|||||||
|
postgresql_config: /etc/postgresql/13/main/pg_hba.conf
|
||||||
|
postgresql_listen: "*"
|
34
roles/postgresql/tasks/main.yml
Normal file
34
roles/postgresql/tasks/main.yml
Normal file
@ -0,0 +1,34 @@
|
|||||||
|
- name: Install PostgreSQL
|
||||||
|
apt:
|
||||||
|
name: postgresql
|
||||||
|
state: present
|
||||||
|
|
||||||
|
- name: Trust connections to PostgreSQL from Docker
|
||||||
|
postgresql_pg_hba:
|
||||||
|
dest: "{{ postgresql_config }}"
|
||||||
|
contype: host
|
||||||
|
databases: all
|
||||||
|
users: all
|
||||||
|
address: "172.16.0.0/12"
|
||||||
|
method: trust
|
||||||
|
register: postgresql_hba
|
||||||
|
|
||||||
|
- name: Change PostgreSQL listen addresses
|
||||||
|
postgresql_set:
|
||||||
|
name: listen_addresses
|
||||||
|
value: "{{ postgresql_listen }}"
|
||||||
|
become: true
|
||||||
|
become_user: postgres
|
||||||
|
register: postgresql_config
|
||||||
|
|
||||||
|
- name: Reload PostgreSQL
|
||||||
|
service:
|
||||||
|
name: postgresql
|
||||||
|
state: reloaded
|
||||||
|
when: postgresql_hba.changed and not postgresql_config.changed
|
||||||
|
|
||||||
|
- name: Restart PostgreSQL
|
||||||
|
service:
|
||||||
|
name: postgresql
|
||||||
|
state: restarted
|
||||||
|
when: postgresql_config.changed
|
@ -62,6 +62,7 @@
|
|||||||
file:
|
file:
|
||||||
path: /etc/letsencrypt/renewal-hooks/post
|
path: /etc/letsencrypt/renewal-hooks/post
|
||||||
state: directory
|
state: directory
|
||||||
|
when: proxy.production is defined and proxy.production
|
||||||
|
|
||||||
- name: Install nginx post renewal hook
|
- name: Install nginx post renewal hook
|
||||||
copy:
|
copy:
|
||||||
|
@ -1,3 +1,10 @@
|
|||||||
|
server {
|
||||||
|
listen 80;
|
||||||
|
|
||||||
|
server_name {{ item.domain }};
|
||||||
|
return 301 https://{{ item.domain }}$request_uri;
|
||||||
|
}
|
||||||
|
|
||||||
server {
|
server {
|
||||||
listen 443 ssl;
|
listen 443 ssl;
|
||||||
server_name {{ item.domain }};
|
server_name {{ item.domain }};
|
||||||
|
Loading…
Reference in New Issue
Block a user