forked from infra/ansible
hackmd: new role (not finished yet)
This commit is contained in:
parent
37137ae18c
commit
344139e75c
@ -7,6 +7,11 @@ gogs_dbname: gogs
|
||||
gogs_dbuser: gogs
|
||||
gogs_dbpass: UbRoiq4fuRL3MvxghPww
|
||||
|
||||
hackmd_domain: pad.binary-kitchen.de
|
||||
hackmd_dbname: hackmd
|
||||
hackmd_dbuser: hackmd
|
||||
hackmd_dbpass: oepaich3haob7AoY
|
||||
|
||||
ldap_ca: /etc/ldap/ssl/BKCA.crt
|
||||
ldap_uri: ldaps://ldap.binary.kitchen/
|
||||
ldap_host: ldap.binary.kitchen
|
||||
|
1
hosts
1
hosts
@ -16,3 +16,4 @@ boron.binary-kitchen.net
|
||||
carbon.binary-kitchen.net
|
||||
nitrogen.binary-kitchen.net
|
||||
oxygen.binary-kitchen.net
|
||||
fluorine.binary-kitchen.net
|
||||
|
3
roles/hackmd/defaults/main.yml
Normal file
3
roles/hackmd/defaults/main.yml
Normal file
@ -0,0 +1,3 @@
|
||||
---
|
||||
|
||||
hackmd_version: 1.1.0-ce
|
10
roles/hackmd/handlers/main.yml
Normal file
10
roles/hackmd/handlers/main.yml
Normal file
@ -0,0 +1,10 @@
|
||||
---
|
||||
|
||||
- name: Restart hackmd
|
||||
service: name=hackmd state=restarted
|
||||
|
||||
- name: Restart nginx
|
||||
service: name=nginx state=restarted
|
||||
|
||||
- name: Reload systemd
|
||||
command: systemctl daemon-reload
|
5
roles/hackmd/meta_/main.yml
Normal file
5
roles/hackmd/meta_/main.yml
Normal file
@ -0,0 +1,5 @@
|
||||
---
|
||||
|
||||
dependencies:
|
||||
- { role: certmgr }
|
||||
- { role: nginx, nginx_ssl: True }
|
76
roles/hackmd/tasks/main.yml
Normal file
76
roles/hackmd/tasks/main.yml
Normal file
@ -0,0 +1,76 @@
|
||||
---
|
||||
|
||||
- name: Create user
|
||||
user: name=hackmd
|
||||
|
||||
- name: Enable https for apt
|
||||
apt: name=apt-transport-https
|
||||
|
||||
- name: Enable nodesource apt-key
|
||||
apt_key: url='https://deb.nodesource.com/gpgkey/nodesource.gpg.key'
|
||||
|
||||
- name: Enable nodesource repository
|
||||
apt_repository: repo='deb https://deb.nodesource.com/node_8.x stretch main'
|
||||
|
||||
- name: Install packages
|
||||
apt: name={{ item }}
|
||||
with_items:
|
||||
- build-essential
|
||||
- git
|
||||
- nodejs
|
||||
- postgresql
|
||||
- python-psycopg2
|
||||
|
||||
- name: Unpack hackmd
|
||||
unarchive: src=https://github.com/hackmdio/hackmd/archive/{{hackmd_version}}.tar.gz dest=/opt owner=hackmd remote_src=yes creates=/opt/hackmd-{{hackmd_version}}
|
||||
register: hackmd_unarchive
|
||||
|
||||
- name: Setup hackmd
|
||||
command: bin/setup chdir=/opt/hackmd-{{hackmd_version}} creates=/opt/hackmd-{{hackmd_version}}/config.json
|
||||
become: true
|
||||
become_user: hackmd
|
||||
|
||||
- name: Configure hackmd
|
||||
template: src=config.json.j2 dest=/opt/hackmd-{{hackmd_version}}/config.json owner=hackmd
|
||||
notify: Restart hackmd
|
||||
register: hackmd_config
|
||||
|
||||
- name: Build hackmd frontend
|
||||
command: /usr/bin/npm run build chdir=/opt/hackmd-{{hackmd_version}}
|
||||
become: true
|
||||
become_user: hackmd
|
||||
when: hackmd_unarchive.changed or hackmd_config.changed
|
||||
|
||||
- name: Configure PostgreSQL database
|
||||
postgresql_db: name={{ hackmd_dbname }}
|
||||
become: true
|
||||
become_user: postgres
|
||||
|
||||
- name: Configure PostgreSQL user
|
||||
postgresql_user: db={{ hackmd_dbname }} name={{ hackmd_dbuser }} password={{ hackmd_dbpass }} priv=ALL state=present
|
||||
become: true
|
||||
become_user: postgres
|
||||
|
||||
- name: Ensure certificates are available
|
||||
command: openssl req -x509 -nodes -newkey rsa:2048 -keyout /etc/nginx/ssl/{{ hackmd_domain }}.key -out /etc/nginx/ssl/{{ hackmd_domain }}.crt -days 730 -subj "/CN={{ hackmd_domain }}" creates=/etc/nginx/ssl/{{ hackmd_domain }}.crt
|
||||
notify: Restart nginx
|
||||
|
||||
- name: Configure certificate manager for hackmd
|
||||
template: src=certs.j2 dest=/etc/acme/domains.d/{{ hackmd_domain }}.conf
|
||||
|
||||
- name: Configure vhost
|
||||
template: src=vhost.j2 dest=/etc/nginx/sites-available/hackmd
|
||||
notify: Restart nginx
|
||||
|
||||
- name: Enable vhost
|
||||
file: src=/etc/nginx/sites-available/hackmd dest=/etc/nginx/sites-enabled/hackmd state=link
|
||||
notify: Restart nginx
|
||||
|
||||
- name: Systemd unit for hackmd
|
||||
template: src=hackmd.service.j2 dest=/etc/systemd/system/hackmd.service
|
||||
notify:
|
||||
- Reload systemd
|
||||
- Restart hackmd
|
||||
|
||||
- name: Start the hackmd service
|
||||
service: name=hackmd state=started enabled=yes
|
15
roles/hackmd/templates/certs.j2
Normal file
15
roles/hackmd/templates/certs.j2
Normal file
@ -0,0 +1,15 @@
|
||||
---
|
||||
|
||||
{{ hackmd_domain }}:
|
||||
- path: /etc/nginx/ssl/{{ hackmd_domain }}.key
|
||||
user: root
|
||||
group: root
|
||||
perm: '400'
|
||||
format: key
|
||||
action: '/usr/sbin/service nginx restart'
|
||||
- path: /etc/nginx/ssl/{{ hackmd_domain }}.crt
|
||||
user: root
|
||||
group: root
|
||||
perm: '400'
|
||||
format: crt,ca
|
||||
action: '/usr/sbin/service nginx restart'
|
41
roles/hackmd/templates/config.json.j2
Normal file
41
roles/hackmd/templates/config.json.j2
Normal file
@ -0,0 +1,41 @@
|
||||
{
|
||||
"production": {
|
||||
"_domain": "{{ hackmd_domain }}",
|
||||
"_hsts": {
|
||||
"enable": true,
|
||||
"maxAgeSeconds": "31536000",
|
||||
"includeSubdomains": true,
|
||||
"preload": true
|
||||
},
|
||||
"csp": {
|
||||
"enable": true,
|
||||
"directives": {
|
||||
},
|
||||
"upgradeInsecureRequests": "auto",
|
||||
"addDefaults": true,
|
||||
"addDisqus": true,
|
||||
"addGoogleAnalytics": true
|
||||
},
|
||||
"db": {
|
||||
"username": "{{ hackmd_dbuser }}",
|
||||
"password": "{{ hackmd_dbpass }}",
|
||||
"database": "{{ hackmd_dbname }}",
|
||||
"host": "localhost",
|
||||
"port": "5432",
|
||||
"dialect": "postgres"
|
||||
},
|
||||
"ldap": {
|
||||
"url": "{{ ldap_uri }}",
|
||||
"bindDn": "{{ ldap_binddn }}",
|
||||
"bindCredentials": "{{ ldap_bindpw }}",
|
||||
"searchBase": "{{ ldap_base }}",
|
||||
"searchFilter": "(uid={{ '{{' }}username{{ '}}' }})",
|
||||
"searchAttributes": ["cn"],
|
||||
"usernameField": "cn",
|
||||
"useridField": "uid",
|
||||
"tlsOptions": {
|
||||
"changeme": "See https://nodejs.org/api/tls.html#tls_tls_connect_options_callback"
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
13
roles/hackmd/templates/hackmd.service.j2
Normal file
13
roles/hackmd/templates/hackmd.service.j2
Normal file
@ -0,0 +1,13 @@
|
||||
[Unit]
|
||||
Description=HackMD
|
||||
After=network.target
|
||||
|
||||
[Service]
|
||||
Environment=NODE_ENV=production
|
||||
Type=simple
|
||||
User=hackmd
|
||||
ExecStart=/usr/bin/node /opt/hackmd-{{hackmd_version}}/app.js
|
||||
Restart=on-failure
|
||||
|
||||
[Install]
|
||||
WantedBy=multi-user.target
|
32
roles/hackmd/templates/vhost.j2
Normal file
32
roles/hackmd/templates/vhost.j2
Normal file
@ -0,0 +1,32 @@
|
||||
server {
|
||||
listen 80;
|
||||
listen [::]:80;
|
||||
|
||||
server_name {{ hackmd_domain }};
|
||||
|
||||
location /.well-known/acme-challenge {
|
||||
default_type "text/plain";
|
||||
alias /var/www/acme-challenge;
|
||||
}
|
||||
|
||||
location / {
|
||||
return 301 https://{{ hackmd_domain }}$request_uri;
|
||||
}
|
||||
}
|
||||
|
||||
server {
|
||||
listen 443 ssl http2;
|
||||
listen [::]:443 ssl http2;
|
||||
|
||||
server_name {{ hackmd_domain }};
|
||||
|
||||
ssl_certificate_key /etc/nginx/ssl/{{ hackmd_domain }}.key;
|
||||
ssl_certificate /etc/nginx/ssl/{{ hackmd_domain }}.crt;
|
||||
|
||||
|
||||
location / {
|
||||
proxy_set_header X-Real-IP $remote_addr;
|
||||
proxy_pass http://localhost:3000;
|
||||
}
|
||||
|
||||
}
|
Loading…
Reference in New Issue
Block a user