diff options
author | Elizabeth Hunt <elizabeth.hunt@simponic.xyz> | 2025-01-02 19:24:55 -0500 |
---|---|---|
committer | Elizabeth Hunt <elizabeth.hunt@simponic.xyz> | 2025-01-02 19:25:04 -0500 |
commit | 43415bdd561f593169ee7e4e12b8e25f39321469 (patch) | |
tree | 624298a5bcd341b26b5a2293f71737a83276d154 | |
parent | b19321bab542de35564127dc77781af44252bcb9 (diff) | |
download | oldinfra-43415bdd561f593169ee7e4e12b8e25f39321469.tar.gz oldinfra-43415bdd561f593169ee7e4e12b8e25f39321469.zip |
add httpsms
-rw-r--r-- | roles/private/files/johan/http.httpsms.internal.simponic.xyz.conf | 13 | ||||
-rw-r--r-- | roles/private/files/johan/https.httpsms.internal.simponic.xyz.conf | 45 | ||||
-rw-r--r-- | roles/private/tasks/main.yml | 2 | ||||
-rw-r--r-- | roles/webservers/tasks/main.yml | 2 |
4 files changed, 60 insertions, 2 deletions
diff --git a/roles/private/files/johan/http.httpsms.internal.simponic.xyz.conf b/roles/private/files/johan/http.httpsms.internal.simponic.xyz.conf new file mode 100644 index 0000000..eb07c2b --- /dev/null +++ b/roles/private/files/johan/http.httpsms.internal.simponic.xyz.conf @@ -0,0 +1,13 @@ +server { + listen 80; + server_name httpsms.internal.simponic.xyz; + + location /.well-known/acme-challenge { + root /var/www/letsencrypt; + try_files $uri $uri/ =404; + } + + location / { + rewrite ^ https://httpsms.internal.simponic.xyz$request_uri? permanent; + } +} diff --git a/roles/private/files/johan/https.httpsms.internal.simponic.xyz.conf b/roles/private/files/johan/https.httpsms.internal.simponic.xyz.conf new file mode 100644 index 0000000..c92b032 --- /dev/null +++ b/roles/private/files/johan/https.httpsms.internal.simponic.xyz.conf @@ -0,0 +1,45 @@ +server { + listen 443 ssl; + server_name httpsms.internal.simponic.xyz; + + ssl_certificate /etc/letsencrypt/live/httpsms.internal.simponic.xyz/fullchain.pem; + ssl_certificate_key /etc/letsencrypt/live/httpsms.internal.simponic.xyz/privkey.pem; + ssl_trusted_certificate /etc/letsencrypt/live/httpsms.internal.simponic.xyz/fullchain.pem; + + ssl_session_cache shared:SSL:50m; + ssl_session_timeout 5m; + ssl_stapling on; + ssl_stapling_verify on; + + ssl_protocols TLSv1 TLSv1.1 TLSv1.2; + ssl_ciphers "ECDHE-RSA-AES256-GCM-SHA384:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA256:ECDHE-RSA-AES256-SHA:ECDHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES128-SHA256:DHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES256-GCM-SHA384:AES128-GCM-SHA256:AES256-SHA256:AES128-SHA256:AES256-SHA:AES128-SHA:DES-CBC3-SHA:HIGH:!aNULL:!eNULL:!EXPORT:!DES:!MD5:!PSK:!RC4"; + + ssl_dhparam /etc/nginx/dhparams.pem; + ssl_prefer_server_ciphers on; + + location / { + proxy_pass http://127.0.0.1:33221; + proxy_http_version 1.1; + proxy_set_header Upgrade $http_upgrade; + proxy_set_header Connection "upgrade"; + proxy_set_header Host $server_name; + proxy_buffering off; + proxy_set_header X-Real-IP $remote_addr; + proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; + proxy_set_header X-Forwarded-Proto $http_x_forwarded_proto; + add_header Strict-Transport-Security "max-age=15552000; includeSubDomains" always; + } + + location /api/ { + proxy_pass http://127.0.0.1:33222/; + proxy_http_version 1.1; + proxy_set_header Upgrade $http_upgrade; + proxy_set_header Connection "upgrade"; + proxy_set_header Host $server_name; + proxy_buffering off; + proxy_set_header X-Real-IP $remote_addr; + proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; + proxy_set_header X-Forwarded-Proto $http_x_forwarded_proto; + add_header Strict-Transport-Security "max-age=15552000; includeSubDomains" always; + } +} diff --git a/roles/private/tasks/main.yml b/roles/private/tasks/main.yml index a099852..26c273a 100644 --- a/roles/private/tasks/main.yml +++ b/roles/private/tasks/main.yml @@ -95,4 +95,4 @@ cron: name: "letsencrypt_renewal" special_time: "daily" - job: "REQUESTS_CA_BUNDLE=/usr/local/share/ca-certificates/{{ step_bootstrap_ca_url }}.crt letsencrypt renew --force-renewal --non-interactive && systemctl reload nginx" + job: "REQUESTS_CA_BUNDLE=/usr/local/share/ca-certificates/{{ step_bootstrap_ca_url }}.crt letsencrypt renew --force-renewal --non-interactive ; systemctl restart nginx" diff --git a/roles/webservers/tasks/main.yml b/roles/webservers/tasks/main.yml index 6c6fef4..858f6a9 100644 --- a/roles/webservers/tasks/main.yml +++ b/roles/webservers/tasks/main.yml @@ -115,7 +115,7 @@ day: "{{ '%02d' | format(1 + (item.stdout | hash('md5') | int(0, 16) % 27)) }}" hour: "{{ (item.stdout | hash('md5') | int(0, 16) % 24 ) }}" minute: "{{ (item.stdout | hash('md5') | int(0, 16) % 60 ) }}" - job: "letsencrypt renew --cert-name {{ item.stdout }} -n --webroot -w /var/www/letsencrypt -m {{ letsencrypt_email }} --agree-tos && service nginx reload" + job: "letsencrypt renew --cert-name {{ item.stdout }} -n --webroot -w /var/www/letsencrypt -m {{ letsencrypt_email }} --agree-tos ; service nginx restart" loop: "{{ extracted_domains.results }}" when: item.stdout != "" |