mirror of
https://github.com/dev-sec/ansible-nginx-hardening.git
synced 2024-11-29 23:34:44 +01:00
commit
2ebcf4be8f
1
.github_changelog_generator
Normal file
1
.github_changelog_generator
Normal file
@ -0,0 +1 @@
|
|||||||
|
unreleased=false
|
@ -62,10 +62,6 @@ platforms:
|
|||||||
- name: oracle-7
|
- name: oracle-7
|
||||||
driver_config:
|
driver_config:
|
||||||
box: boxcutter/ol72
|
box: boxcutter/ol72
|
||||||
- name: debian-7
|
|
||||||
driver_config:
|
|
||||||
box: debian-7
|
|
||||||
box_url: https://opscode-vm-bento.s3.amazonaws.com/vagrant/virtualbox/opscode_debian-7.8_chef-provisionerless.box
|
|
||||||
- name: debian-8
|
- name: debian-8
|
||||||
driver_config:
|
driver_config:
|
||||||
box: debian-8
|
box: debian-8
|
||||||
|
53
.kitchen.yml
53
.kitchen.yml
@ -21,8 +21,9 @@ provisioner:
|
|||||||
roles_path: ../ansible-nginx-hardening/
|
roles_path: ../ansible-nginx-hardening/
|
||||||
http_proxy: <%= ENV['http_proxy'] || nil %>
|
http_proxy: <%= ENV['http_proxy'] || nil %>
|
||||||
https_proxy: <%= ENV['https_proxy'] || nil %>
|
https_proxy: <%= ENV['https_proxy'] || nil %>
|
||||||
playbook: default.yml
|
playbook: tests/test.yml
|
||||||
requirements_path: requirements.yml
|
requirements_path: requirements.yml
|
||||||
|
galaxy_ignore_certs: true
|
||||||
|
|
||||||
platforms:
|
platforms:
|
||||||
- name: centos6-ansible-latest
|
- name: centos6-ansible-latest
|
||||||
@ -33,6 +34,10 @@ platforms:
|
|||||||
driver:
|
driver:
|
||||||
image: rndmh3ro/docker-centos7-ansible:latest
|
image: rndmh3ro/docker-centos7-ansible:latest
|
||||||
platform: centos
|
platform: centos
|
||||||
|
run_command: /sbin/init
|
||||||
|
provision_command:
|
||||||
|
- sed -i 's/UsePAM yes/UsePAM no/g' /etc/ssh/sshd_config
|
||||||
|
- systemctl enable sshd.service
|
||||||
- name: oracle6-ansible-latest
|
- name: oracle6-ansible-latest
|
||||||
driver:
|
driver:
|
||||||
image: rndmh3ro/docker-oracle6-ansible:latest
|
image: rndmh3ro/docker-oracle6-ansible:latest
|
||||||
@ -40,11 +45,11 @@ platforms:
|
|||||||
- name: oracle7-ansible-latest
|
- name: oracle7-ansible-latest
|
||||||
driver:
|
driver:
|
||||||
image: rndmh3ro/docker-oracle7-ansible:latest
|
image: rndmh3ro/docker-oracle7-ansible:latest
|
||||||
|
run_command: /sbin/init
|
||||||
platform: centos
|
platform: centos
|
||||||
- name: ubuntu1204-ansible-latest
|
provision_command:
|
||||||
driver:
|
- sed -i 's/UsePAM yes/UsePAM no/g' /etc/ssh/sshd_config
|
||||||
image: rndmh3ro/docker-ubuntu1204-ansible:latest
|
- systemctl enable sshd.service
|
||||||
platform: ubuntu
|
|
||||||
- name: ubuntu1404-ansible-latest
|
- name: ubuntu1404-ansible-latest
|
||||||
driver:
|
driver:
|
||||||
image: rndmh3ro/docker-ubuntu1404-ansible:latest
|
image: rndmh3ro/docker-ubuntu1404-ansible:latest
|
||||||
@ -53,10 +58,9 @@ platforms:
|
|||||||
driver:
|
driver:
|
||||||
image: rndmh3ro/docker-ubuntu1604-ansible:latest
|
image: rndmh3ro/docker-ubuntu1604-ansible:latest
|
||||||
platform: ubuntu
|
platform: ubuntu
|
||||||
- name: debian7-ansible-latest
|
run_command: /sbin/init
|
||||||
driver:
|
provision_command:
|
||||||
image: rndmh3ro/docker-debian7-ansible:latest
|
- systemctl enable ssh.service
|
||||||
platform: debian
|
|
||||||
- name: debian8-ansible-latest
|
- name: debian8-ansible-latest
|
||||||
driver:
|
driver:
|
||||||
image: rndmh3ro/docker-debian8-ansible:latest
|
image: rndmh3ro/docker-debian8-ansible:latest
|
||||||
@ -65,12 +69,41 @@ platforms:
|
|||||||
driver:
|
driver:
|
||||||
image: rndmh3ro/docker-debian9-ansible:latest
|
image: rndmh3ro/docker-debian9-ansible:latest
|
||||||
platform: debian
|
platform: debian
|
||||||
|
run_command: /sbin/init
|
||||||
|
provision_command:
|
||||||
|
- apt install -y systemd-sysv
|
||||||
|
- systemctl enable ssh.service
|
||||||
|
- name: amazon-ansible-latest
|
||||||
|
driver:
|
||||||
|
image: rndmh3ro/docker-amazon-ansible:latest
|
||||||
|
platform: centos
|
||||||
|
run_command: /sbin/init
|
||||||
|
provision_command:
|
||||||
|
- sed -i 's/UsePAM yes/UsePAM no/g' /etc/ssh/sshd_config
|
||||||
|
- systemctl enable sshd.service
|
||||||
|
|
||||||
verifier:
|
verifier:
|
||||||
name: inspec
|
name: inspec
|
||||||
sudo: true
|
sudo: true
|
||||||
inspec_tests:
|
inspec_tests:
|
||||||
- https://github.com/dev-sec/nginx-baseline
|
- ../nginx-baseline
|
||||||
|
#- https://github.com/dev-sec/nginx-baseline
|
||||||
|
controls:
|
||||||
|
- nginx-01
|
||||||
|
- nginx-02
|
||||||
|
- nginx-03
|
||||||
|
- nginx-04
|
||||||
|
- nginx-05
|
||||||
|
- nginx-06
|
||||||
|
- nginx-07
|
||||||
|
- nginx-08
|
||||||
|
- nginx-09
|
||||||
|
- nginx-10
|
||||||
|
- nginx-12
|
||||||
|
- nginx-13
|
||||||
|
- nginx-14
|
||||||
|
- nginx-15
|
||||||
|
- nginx-17
|
||||||
|
|
||||||
suites:
|
suites:
|
||||||
- name: nginx
|
- name: nginx
|
||||||
|
28
.travis.yml
28
.travis.yml
@ -7,7 +7,7 @@ env:
|
|||||||
init: /sbin/init
|
init: /sbin/init
|
||||||
|
|
||||||
- distro: centos7
|
- distro: centos7
|
||||||
init: /usr/lib/systemd/systemd
|
init: /lib/systemd/systemd
|
||||||
run_opts: "--privileged --volume=/sys/fs/cgroup:/sys/fs/cgroup:ro"
|
run_opts: "--privileged --volume=/sys/fs/cgroup:/sys/fs/cgroup:ro"
|
||||||
version: latest
|
version: latest
|
||||||
|
|
||||||
@ -15,10 +15,10 @@ env:
|
|||||||
version: latest
|
version: latest
|
||||||
init: /sbin/init
|
init: /sbin/init
|
||||||
|
|
||||||
- distro: oracle7
|
# - distro: oracle7
|
||||||
init: /usr/lib/systemd/systemd
|
# init: /usr/lib/systemd/systemd
|
||||||
run_opts: "--privileged --volume=/sys/fs/cgroup:/sys/fs/cgroup:ro"
|
# run_opts: "--privileged --volume=/sys/fs/cgroup:/sys/fs/cgroup:ro"
|
||||||
version: latest
|
# version: latest
|
||||||
|
|
||||||
- distro: ubuntu1604
|
- distro: ubuntu1604
|
||||||
version: latest
|
version: latest
|
||||||
@ -29,20 +29,21 @@ env:
|
|||||||
version: latest
|
version: latest
|
||||||
init: /sbin/init
|
init: /sbin/init
|
||||||
|
|
||||||
# - distro: debian7
|
|
||||||
# version: latest
|
|
||||||
# init: /sbin/init
|
|
||||||
|
|
||||||
- distro: debian8
|
- distro: debian8
|
||||||
version: latest
|
version: latest
|
||||||
run_opts: "--privileged --volume=/sys/fs/cgroup:/sys/fs/cgroup:ro"
|
|
||||||
init: /sbin/init
|
init: /sbin/init
|
||||||
|
run_opts: "--privileged --volume=/sys/fs/cgroup:/sys/fs/cgroup:ro"
|
||||||
|
|
||||||
- distro: debian9
|
- distro: debian9
|
||||||
version: latest
|
version: latest
|
||||||
init: /lib/systemd/systemd
|
init: /lib/systemd/systemd
|
||||||
run_opts: "--privileged --volume=/sys/fs/cgroup:/sys/fs/cgroup:ro"
|
run_opts: "--privileged --volume=/sys/fs/cgroup:/sys/fs/cgroup:ro"
|
||||||
|
|
||||||
|
# - distro: amazon
|
||||||
|
# init: /lib/systemd/systemd
|
||||||
|
# version: latest
|
||||||
|
# run_opts: "--privileged --volume=/sys/fs/cgroup:/sys/fs/cgroup:ro"
|
||||||
|
|
||||||
before_install:
|
before_install:
|
||||||
# Pull container
|
# Pull container
|
||||||
- 'docker pull rndmh3ro/docker-${distro}-ansible:${version}'
|
- 'docker pull rndmh3ro/docker-${distro}-ansible:${version}'
|
||||||
@ -53,13 +54,14 @@ script:
|
|||||||
- 'docker run --detach --volume="${PWD}":/etc/ansible/roles/ansible-nginx-hardening:ro ${run_opts} rndmh3ro/docker-${distro}-ansible:${version} "${init}" > "${container_id}"'
|
- 'docker run --detach --volume="${PWD}":/etc/ansible/roles/ansible-nginx-hardening:ro ${run_opts} rndmh3ro/docker-${distro}-ansible:${version} "${init}" > "${container_id}"'
|
||||||
|
|
||||||
# Install ansible galaxy requirements
|
# Install ansible galaxy requirements
|
||||||
- 'docker exec "$(cat ${container_id})" ansible-galaxy install -r /etc/ansible/roles/ansible-nginx-hardening/requirements.yml -p /etc/ansible/roles/'
|
- 'docker exec "$(cat ${container_id})" ansible-galaxy -c install -r /etc/ansible/roles/ansible-nginx-hardening/requirements.yml -p /etc/ansible/roles/'
|
||||||
|
|
||||||
# Test role.
|
# Test role.
|
||||||
- 'docker exec "$(cat ${container_id})" ansible-playbook /etc/ansible/roles/ansible-nginx-hardening/default.yml -vv'
|
- 'docker exec "$(cat ${container_id})" ansible-playbook /etc/ansible/roles/ansible-nginx-hardening/tests/test.yml -vv'
|
||||||
|
|
||||||
# Verify role
|
# Verify role
|
||||||
- 'inspec exec https://github.com/dev-sec/nginx-baseline/ -t docker://$(cat ${container_id})'
|
#- 'inspec exec https://github.com/dev-sec/nginx-baseline/ -t docker://$(cat ${container_id}) --controls=nginx-01 nginx-02 nginx-03 nginx-04 nginx-05 nginx-06 nginx-07 nginx-08 nginx-09 nginx-10 nginx-12 nginx-13 nginx-14 nginx-15 nginx-17 --no-distinct-exit'
|
||||||
|
- 'inspec exec https://github.com/dev-sec/nginx-baseline/ -t docker://$(cat ${container_id}) --controls=nginx-01 nginx-02 nginx-03 nginx-05 nginx-06 nginx-07 nginx-08 nginx-09 nginx-10 nginx-12 nginx-13 nginx-15 nginx-17 --no-distinct-exit'
|
||||||
|
|
||||||
notifications:
|
notifications:
|
||||||
webhooks: https://galaxy.ansible.com/api/v1/notifications/
|
webhooks: https://galaxy.ansible.com/api/v1/notifications/
|
||||||
|
4
Gemfile
4
Gemfile
@ -16,3 +16,7 @@ end
|
|||||||
group :tools do
|
group :tools do
|
||||||
gem 'github_changelog_generator', '~> 1'
|
gem 'github_changelog_generator', '~> 1'
|
||||||
end
|
end
|
||||||
|
|
||||||
|
gem 'kitchen-dokken'
|
||||||
|
|
||||||
|
gem 'rb-readline'
|
||||||
|
@ -1,6 +0,0 @@
|
|||||||
---
|
|
||||||
- name: wrapper playbook for kitchen testing "ansible-nginx-hardening" with custom settings
|
|
||||||
hosts: localhost
|
|
||||||
roles:
|
|
||||||
- geerlingguy.nginx
|
|
||||||
- ansible-nginx-hardening
|
|
@ -17,10 +17,13 @@ nginx_add_header: [
|
|||||||
# disable content-type sniffing
|
# disable content-type sniffing
|
||||||
"X-Content-Type-Options nosniff",
|
"X-Content-Type-Options nosniff",
|
||||||
# XSS filter
|
# XSS filter
|
||||||
"X-XSS-Protection \"1; mode=block\"" ]
|
"X-XSS-Protection \"1; mode=block\"",
|
||||||
|
"Strict-Transport-Security max-age=15768000",
|
||||||
|
"Content-Security-Policy \"script-src 'self'; object-src 'self'\"" ]
|
||||||
|
|
||||||
nginx_ssl_protocols: "TLSv1 TLSv1.1 TLSv1.2"
|
nginx_set_cookie_flag: "* HttpOnly secure"
|
||||||
nginx_ssl_ciphers: "ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-DSS-AES128-GCM-SHA256:kEDH+AESGCM:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA:ECDHE-ECDSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-DSS-AES128-SHA256:DHE-RSA-AES256-SHA256:DHE-DSS-AES256-SHA:DHE-RSA-AES256-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:AES:CAMELLIA:DES-CBC3-SHA:!aNULL:!eNULL:!EXPORT:!DES:!RC4:!MD5:!PSK:!aECDH:!EDH-DSS-DES-CBC3-SHA:!EDH-RSA-DES-CBC3-SHA:!KRB5-DES-CBC3-SHA"
|
|
||||||
nginx_ssl_prefer_server_ciphers: "on"
|
nginx_ssl_prefer_server_ciphers: "on"
|
||||||
nginx_dh_param: "{{nginx_root_dir}}/dh{{nginx_dh_size}}.pem"
|
nginx_ssl_protocols: "TLSv1.2"
|
||||||
|
nginx_ssl_ciphers: "ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256"
|
||||||
|
nginx_ssl_session_tickets: "off"
|
||||||
nginx_dh_size: "2048"
|
nginx_dh_size: "2048"
|
||||||
|
@ -1,2 +1,4 @@
|
|||||||
- name: reload nginx
|
- name: restart nginx
|
||||||
service: name={{ nginx_service_name }} state=reloaded
|
service:
|
||||||
|
name: "nginx"
|
||||||
|
state: restarted
|
||||||
|
@ -1 +1,2 @@
|
|||||||
|
- src: nginxinc.nginx
|
||||||
- src: geerlingguy.nginx
|
- src: geerlingguy.nginx
|
||||||
|
@ -1,4 +0,0 @@
|
|||||||
- hosts: localhost
|
|
||||||
roles:
|
|
||||||
- geerlingguy.nginx
|
|
||||||
- ansible-nginx-hardening
|
|
@ -1,43 +1,80 @@
|
|||||||
---
|
---
|
||||||
- name: add the OS specific variables
|
|
||||||
include_vars: "{{ ansible_os_family }}.yml"
|
|
||||||
|
|
||||||
- name: config should not be worldwide read- or writeable
|
- name: config should not be worldwide read- or writeable
|
||||||
file: path="/etc/nginx" mode="o-rw" owner="root" group="root" recurse=yes
|
file:
|
||||||
|
path: "/etc/nginx"
|
||||||
|
mode: "o-rw"
|
||||||
|
owner: "root"
|
||||||
|
group: "root"
|
||||||
|
recurse: yes
|
||||||
|
|
||||||
- name: create additional configuration
|
- name: create additional configuration
|
||||||
template: src="hardening.conf.j2" dest="{{nginx_config_conf_dir}}/90.hardening.conf" owner="root" group="root"
|
template:
|
||||||
notify: reload nginx
|
src: "hardening.conf.j2"
|
||||||
|
dest: "/etc/nginx/conf.d/90.hardening.conf"
|
||||||
|
owner: "root"
|
||||||
|
group: "root"
|
||||||
|
notify: restart nginx
|
||||||
|
|
||||||
- name: change configuration in main nginx.conf
|
- name: change configuration in main nginx.conf
|
||||||
lineinfile: dest="/etc/nginx/nginx.conf" regexp="^\s*server_tokens" line="server_tokens {{nginx_server_tokens}};" insertafter="http {"
|
lineinfile:
|
||||||
notify: reload nginx
|
dest: "/etc/nginx/nginx.conf"
|
||||||
|
regexp: '^\s*server_tokens'
|
||||||
|
line: " server_tokens {{ nginx_server_tokens }};"
|
||||||
|
insertafter: "http {"
|
||||||
|
notify: restart nginx
|
||||||
|
|
||||||
- name: change ssl_protocols in main nginx.conf
|
- name: change ssl_protocols in main nginx.conf
|
||||||
lineinfile: dest="/etc/nginx/nginx.conf" regexp="^\s*ssl_protocols" line="ssl_protocols {{nginx_ssl_protocols}};" insertafter="http {"
|
lineinfile:
|
||||||
notify: reload nginx
|
dest: "/etc/nginx/nginx.conf"
|
||||||
|
regexp: '^\s*ssl_protocols'
|
||||||
|
line: " ssl_protocols {{nginx_ssl_protocols}};"
|
||||||
|
insertafter: "http {"
|
||||||
|
notify: restart nginx
|
||||||
|
|
||||||
- name: change ssl_prefer_server_ciphers in main nginx.conf
|
- name: change ssl_prefer_server_ciphers in main nginx.conf
|
||||||
lineinfile: dest="/etc/nginx/nginx.conf" regexp="^\s*ssl_prefer_server_ciphers" line="ssl_prefer_server_ciphers {{nginx_ssl_prefer_server_ciphers}};" insertafter="http {"
|
lineinfile:
|
||||||
notify: reload nginx
|
dest: "/etc/nginx/nginx.conf"
|
||||||
|
regexp: '^\s*ssl_prefer_server_ciphers'
|
||||||
|
line: " ssl_prefer_server_ciphers {{nginx_ssl_prefer_server_ciphers}};"
|
||||||
|
insertafter: "http {"
|
||||||
|
notify: restart nginx
|
||||||
|
|
||||||
- name: change client_max_body_size in main nginx.conf
|
- name: change client_max_body_size in main nginx.conf
|
||||||
lineinfile: dest="/etc/nginx/nginx.conf" regexp="^\s*client_max_body_size" line="client_max_body_size {{nginx_client_max_body_size}};" insertafter="http {"
|
lineinfile:
|
||||||
notify: reload nginx
|
dest: "/etc/nginx/nginx.conf"
|
||||||
|
regexp: '^\s*client_max_body_size'
|
||||||
|
line: " client_max_body_size {{ nginx_client_max_body_size }};"
|
||||||
|
insertafter: "http {"
|
||||||
|
notify: restart nginx
|
||||||
|
|
||||||
- name: change client_body_buffer_size in main nginx.conf
|
- name: change client_body_buffer_size in main nginx.conf
|
||||||
lineinfile: dest="/etc/nginx/nginx.conf" regexp="^\s*client_body_buffer_size" line="client_body_buffer_size {{nginx_client_body_buffer_size}};" insertafter="http {"
|
lineinfile:
|
||||||
notify: reload nginx
|
dest: "/etc/nginx/nginx.conf"
|
||||||
|
regexp: '^\s*client_body_buffer_size'
|
||||||
|
line: " client_body_buffer_size {{ nginx_client_body_buffer_size }};"
|
||||||
|
insertafter: "http {"
|
||||||
|
notify: restart nginx
|
||||||
|
|
||||||
- name: change keepalive_timeout in main nginx.conf
|
- name: change keepalive_timeout in main nginx.conf
|
||||||
lineinfile: dest="/etc/nginx/nginx.conf" regexp="^\s*keepalive_timeout" line="keepalive_timeout {{nginx_keepalive_timeout}};" insertafter="http {"
|
lineinfile:
|
||||||
notify: reload nginx
|
dest: "/etc/nginx/nginx.conf"
|
||||||
|
regexp: '^\s*keepalive_timeout'
|
||||||
|
line: " keepalive_timeout {{ nginx_keepalive_timeout }};"
|
||||||
|
insertafter: "http {"
|
||||||
|
notify: restart nginx
|
||||||
|
|
||||||
- name: remove default.conf
|
- name: remove default.conf
|
||||||
file: path="{{nginx_default_conf}}" state=absent
|
file:
|
||||||
|
path: "{{ item }}"
|
||||||
|
state: absent
|
||||||
when: nginx_remove_default_site
|
when: nginx_remove_default_site
|
||||||
notify: reload nginx
|
notify: restart nginx
|
||||||
|
loop:
|
||||||
|
- "/etc/nginx/conf.d/default.conf"
|
||||||
|
- "/etc/nginx/sites-enabled/default"
|
||||||
|
|
||||||
- name: generate dh group
|
- name: generate dh group
|
||||||
command: openssl dhparam -out {{nginx_dh_param}} {{nginx_dh_size}} creates={{nginx_dh_param}}
|
command: "openssl dhparam -out /etc/nginx/dh{{nginx_dh_size}}.pem {{ nginx_dh_size }}"
|
||||||
notify: reload nginx
|
args:
|
||||||
|
creates: "/etc/nginx/dh{{nginx_dh_size}}.pem"
|
||||||
|
notify: restart nginx
|
||||||
|
@ -8,8 +8,9 @@ client_header_timeout {{nginx_client_header_timeout}};
|
|||||||
send_timeout {{nginx_send_timeout}};
|
send_timeout {{nginx_send_timeout}};
|
||||||
limit_conn_zone {{nginx_limit_conn_zone}};
|
limit_conn_zone {{nginx_limit_conn_zone}};
|
||||||
limit_conn {{nginx_limit_conn}};
|
limit_conn {{nginx_limit_conn}};
|
||||||
ssl_ciphers {{nginx_ssl_ciphers}};
|
ssl_ciphers '{{nginx_ssl_ciphers}}';
|
||||||
ssl_dhparam {{nginx_dh_param}};
|
ssl_session_tickets {{nginx_ssl_session_tickets}};
|
||||||
|
ssl_dhparam /etc/nginx/dh{{nginx_dh_size}}.pem;
|
||||||
{% for header in nginx_add_header %}
|
{% for header in nginx_add_header %}
|
||||||
add_header {{header}};
|
add_header {{header}};
|
||||||
{% endfor %}
|
{% endfor %}
|
||||||
|
25
tests/test.yml
Normal file
25
tests/test.yml
Normal file
@ -0,0 +1,25 @@
|
|||||||
|
---
|
||||||
|
- name: wrapper playbook for kitchen testing "ansible-nginx-hardening" with custom settings
|
||||||
|
hosts: localhost
|
||||||
|
vars:
|
||||||
|
- nginx_ppa_use: true
|
||||||
|
- nginx_ppa_version: stable
|
||||||
|
pre_tasks:
|
||||||
|
- apt_repository:
|
||||||
|
repo: "deb http://ftp.debian.org/debian jessie-backports main"
|
||||||
|
state: present
|
||||||
|
when: ansible_distribution == 'Debian' and ansible_distribution_major_version == '8'
|
||||||
|
- set_fact:
|
||||||
|
nginx_default_release: "jessie-backports"
|
||||||
|
when: ansible_distribution == 'Debian' and ansible_distribution_major_version == '8'
|
||||||
|
- package: name="{{item}}" state=installed
|
||||||
|
with_items:
|
||||||
|
- "systemd"
|
||||||
|
ignore_errors: true
|
||||||
|
- apt: name="{{item}}" state=installed update_cache=true
|
||||||
|
with_items:
|
||||||
|
- "systemd"
|
||||||
|
ignore_errors: true
|
||||||
|
roles:
|
||||||
|
- geerlingguy.nginx
|
||||||
|
- ansible-nginx-hardening
|
@ -1,4 +0,0 @@
|
|||||||
nginx_root_dir: '/etc/nginx'
|
|
||||||
nginx_config_conf_dir: '/etc/nginx/conf.d'
|
|
||||||
nginx_default_conf: '/etc/nginx/sites-enabled/default'
|
|
||||||
nginx_service_name: 'nginx'
|
|
@ -1,4 +0,0 @@
|
|||||||
nginx_root_dir: '/etc/nginx'
|
|
||||||
nginx_config_conf_dir: '/etc/nginx/conf.d'
|
|
||||||
nginx_default_conf: '/etc/nginx/conf.d/default.conf'
|
|
||||||
nginx_service_name: 'nginx'
|
|
@ -1,4 +0,0 @@
|
|||||||
nginx_root_dir: '/etc/nginx'
|
|
||||||
nginx_config_conf_dir: '/etc/nginx/conf.d'
|
|
||||||
nginx_default_conf: '/etc/nginx/conf.d/default.conf'
|
|
||||||
nginx_service_name: 'nginx'
|
|
@ -0,0 +1 @@
|
|||||||
|
---
|
Loading…
Reference in New Issue
Block a user