progress
This commit is contained in:
47
Jenkinsfile
vendored
47
Jenkinsfile
vendored
@@ -4,6 +4,14 @@ pipeline {
|
|||||||
string(name: "target_host", defaultValue: "", trim: true, description: "Target host")
|
string(name: "target_host", defaultValue: "", trim: true, description: "Target host")
|
||||||
string(name: "username", defaultValue: "", trim: true, description: "Ansible user")
|
string(name: "username", defaultValue: "", trim: true, description: "Ansible user")
|
||||||
password(name: "password", defaultValue: "", description: "Ansible password")
|
password(name: "password", defaultValue: "", description: "Ansible password")
|
||||||
|
booleanParam(name: "rproxy_install", defaultValue: true, description: "Install Rproxy")
|
||||||
|
base64File(name: "rootca", description: "RootCA (only for 'Install Rproxy')")
|
||||||
|
base64File(name: "rootca_key", description: "RootCA key (only for 'Install Rproxy')")
|
||||||
|
booleanParam(name: "config_add", defaultValue: true, description: "Add config")
|
||||||
|
string(name: "rproxy_service_name", defaultValue: "", trim: true, description: "Service name (for 'Add config' job only)")
|
||||||
|
string(name: "rproxy_service_port", defaultValue: "", trim: true, description: "Service port (for 'Add config' job only)")
|
||||||
|
string(name: "rproxy_service_address", defaultValue: "", trim: true, description: "Service address (for 'Add config' job only)")
|
||||||
|
|
||||||
}
|
}
|
||||||
stages {
|
stages {
|
||||||
stage('Download') {
|
stage('Download') {
|
||||||
@@ -11,11 +19,46 @@ pipeline {
|
|||||||
git branch: 'dev', url:'${git_url}/Ansible/rproxy.git', credentialsId: 'git'
|
git branch: 'dev', url:'${git_url}/Ansible/rproxy.git', credentialsId: 'git'
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
stage('Run') {
|
stage('Save certs') {
|
||||||
|
when {
|
||||||
|
expression {
|
||||||
|
return params.rproxy_install
|
||||||
|
}
|
||||||
|
}
|
||||||
|
steps {
|
||||||
|
sh 'mkdir roles/rproxy/files/certs'
|
||||||
|
withFileParameter('rootca') {
|
||||||
|
sh 'mv ${rootca} roles/rproxy/files/certs/RootCA.crt'
|
||||||
|
}
|
||||||
|
withFileParameter('rootca_key') {
|
||||||
|
sh 'mv ${rootca_key} roles/rproxy/files/certs/RootCA.key'
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
stage('Install Rproxy') {
|
||||||
|
when {
|
||||||
|
expression {
|
||||||
|
return params.rproxy_install
|
||||||
|
}
|
||||||
|
}
|
||||||
steps {
|
steps {
|
||||||
script {
|
script {
|
||||||
wrap([$class: 'MaskPasswordsBuildWrapper', varPasswordPairs: [[password: params.password]]]) {
|
wrap([$class: 'MaskPasswordsBuildWrapper', varPasswordPairs: [[password: params.password]]]) {
|
||||||
sh 'ansible-playbook rproxy.yml -i ${target_host}, -u ${username} -e "ansible_password=${password}"'
|
sh 'ansible-playbook rproxy.yml -i ${target_host}, -t install -u ${username} -e "ansible_password=${password} rproxy_service_name=${rproxy_service_name} rproxy_service_port=${rproxy_service_port} rproxy_service_address=${rproxy_service_address}"'
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
stage('Add config') {
|
||||||
|
when {
|
||||||
|
expression {
|
||||||
|
return params.config_add
|
||||||
|
}
|
||||||
|
}
|
||||||
|
steps {
|
||||||
|
script {
|
||||||
|
wrap([$class: 'MaskPasswordsBuildWrapper', varPasswordPairs: [[password: params.password]]]) {
|
||||||
|
sh 'ansible-playbook rproxy.yml -i ${target_host}, -t add_config -u ${username} -e "ansible_password=${password} rproxy_service_name=${rproxy_service_name} rproxy_service_port=${rproxy_service_port} rproxy_service_address=${rproxy_service_address}"'
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,4 +1,3 @@
|
|||||||
load_module modules/ngx_http_headers_more_filter_module.so;
|
|
||||||
user nginx;
|
user nginx;
|
||||||
worker_processes auto;
|
worker_processes auto;
|
||||||
|
|
||||||
@@ -20,14 +19,8 @@ http {
|
|||||||
'"$http_user_agent" "$http_x_forwarded_for"';
|
'"$http_user_agent" "$http_x_forwarded_for"';
|
||||||
|
|
||||||
access_log /var/log/nginx/access.log main;
|
access_log /var/log/nginx/access.log main;
|
||||||
|
|
||||||
sendfile on;
|
sendfile on;
|
||||||
#tcp_nopush on;
|
|
||||||
|
|
||||||
keepalive_timeout 65;
|
keepalive_timeout 65;
|
||||||
|
|
||||||
#gzip on;
|
|
||||||
|
|
||||||
include /etc/nginx/sites/*.conf;
|
include /etc/nginx/sites/*.conf;
|
||||||
server_tokens off;
|
server_tokens off;
|
||||||
}
|
}
|
||||||
@@ -3,44 +3,97 @@
|
|||||||
ansible.builtin.shell:
|
ansible.builtin.shell:
|
||||||
cmd: hostname -d
|
cmd: hostname -d
|
||||||
register: domain
|
register: domain
|
||||||
|
tags:
|
||||||
|
- install
|
||||||
|
- add_config
|
||||||
|
|
||||||
- name: Install dependencies
|
- name: Install rproxy
|
||||||
ansible.builtin.apt:
|
block:
|
||||||
name:
|
- name: Install dependencies
|
||||||
- docker.io
|
ansible.builtin.apt:
|
||||||
- docker-compose
|
name:
|
||||||
update_cache: yes
|
- docker.io
|
||||||
|
- docker-compose
|
||||||
|
update_cache: yes
|
||||||
|
|
||||||
- name: Remove rproxy dir
|
- name: Remove rproxy dir
|
||||||
ansible.builtin.file:
|
ansible.builtin.file:
|
||||||
path: "{{ rproxy_dir }}"
|
path: "{{ rproxy_dir }}"
|
||||||
state: absent
|
state: absent
|
||||||
|
|
||||||
- name: Create rproxy dir
|
- name: Create rproxy dir
|
||||||
ansible.builtin.file:
|
ansible.builtin.file:
|
||||||
path: "{{ rproxy_dir }}"
|
path: "{{ rproxy_dir }}"
|
||||||
state: directory
|
state: directory
|
||||||
|
|
||||||
- name: Create sites dir
|
- name: Create sites dir
|
||||||
ansible.builtin.file:
|
ansible.builtin.file:
|
||||||
path: "{{ rproxy_dir }}/sites"
|
path: "{{ rproxy_dir }}/sites"
|
||||||
state: directory
|
state: directory
|
||||||
|
|
||||||
- name: Copy docker-compose
|
- name: Create certs dir
|
||||||
ansible.builtin.template:
|
ansible.builtin.file:
|
||||||
src: templates/docker-compose.yml.j2
|
path: "{{ rproxy_dir }}/certs"
|
||||||
dest: "{{ rproxy_dir }}/docker-compose.yml"
|
state: directory
|
||||||
|
|
||||||
- name: Copy nginx.conf
|
- name: Copy docker-compose
|
||||||
ansible.builtin.copy:
|
ansible.builtin.template:
|
||||||
src: files/nginx.conf
|
src: templates/docker-compose.yml.j2
|
||||||
dest: "{{ rproxy_dir }}/nginx.conf"
|
dest: "{{ rproxy_dir }}/docker-compose.yml"
|
||||||
|
|
||||||
- name: Copy server.conf
|
- name: Copy nginx.conf
|
||||||
ansible.builtin.template:
|
ansible.builtin.copy:
|
||||||
src: templates/server.conf.j2
|
src: files/nginx.conf
|
||||||
dest: "{{ rproxy_dir }}/sites/server.conf"
|
dest: "{{ rproxy_dir }}/nginx.conf"
|
||||||
|
|
||||||
|
- name: Copy RootCA certificate
|
||||||
|
ansible.builtin.copy:
|
||||||
|
src: files/RootCA.crt
|
||||||
|
dest: '{{ rproxy_dir }}/certs/RootCA.crt'
|
||||||
|
|
||||||
|
- name: Copy RootCA key
|
||||||
|
ansible.builtin.copy:
|
||||||
|
src: files/RootCA.key
|
||||||
|
dest: '{{ rproxy_dir }}/certs/RootCA.key'
|
||||||
|
|
||||||
|
- name: Copy server certificate cnf
|
||||||
|
ansible.builtin.template:
|
||||||
|
src: templates/server.cnf.j2
|
||||||
|
dest: '{{ rproxy_dir }}/certs/server.cnf'
|
||||||
|
|
||||||
|
- name: Generate server key
|
||||||
|
ansible.builtin.shell:
|
||||||
|
cmd: 'openssl genrsa -out {{ rproxy_dir }}/certs/{{ domain.stdout }}.key 2048'
|
||||||
|
|
||||||
|
- name: Generate server csr
|
||||||
|
ansible.builtin.shell:
|
||||||
|
cmd: 'openssl req -key {{ rproxy_dir }}/certs/{{ domain.stdout }}.key -new -out {{ rproxy_dir }}/certs/{{ domain.stdout }}.csr -config {{ rproxy_dir }}/certs/server.cnf'
|
||||||
|
|
||||||
|
- name: Sign server certificate
|
||||||
|
ansible.builtin.shell:
|
||||||
|
cmd: 'openssl x509 -req -CA {{ rproxy_dir }}/certs/RootCA.crt -CAkey {{ rproxy_dir }}/certs/RootCA.key -in {{ rproxy_dir }}/certs/{{ domain.stdout }}.csr -out {{ rproxy_dir }}/certs/{{ domain.stdout }}.crt -CAcreateserial'
|
||||||
|
|
||||||
|
- name: Delete csr
|
||||||
|
ansible.builtin.file:
|
||||||
|
path: "{{ rproxy_dir }}/certs/{{ domain.stdout }}.csr"
|
||||||
|
state: absent
|
||||||
|
|
||||||
|
- name: Start rproxy
|
||||||
|
community.docker.docker_compose:
|
||||||
|
project_src: "{{ rproxy_dir }}"
|
||||||
|
tags: install
|
||||||
|
|
||||||
|
- name: Create configs
|
||||||
|
block:
|
||||||
|
- name: Copy server.conf
|
||||||
|
ansible.builtin.template:
|
||||||
|
src: templates/server.conf.j2
|
||||||
|
dest: "{{ rproxy_dir }}/sites/{{ rproxy_service_name }}.conf"
|
||||||
|
|
||||||
|
- name: Restart rproxy
|
||||||
|
community.docker.docker_compose:
|
||||||
|
project_src: "{{ rproxy_dir }}"
|
||||||
|
build: false
|
||||||
|
restarted: true
|
||||||
|
tags: add_config
|
||||||
|
|
||||||
- name: Start rproxy
|
|
||||||
community.docker.docker_compose:
|
|
||||||
project_src: "{{ rproxy_dir }}"
|
|
||||||
@@ -8,9 +8,7 @@ services:
|
|||||||
volumes:
|
volumes:
|
||||||
- {{ rproxy_dir }}/nginx.conf:/etc/nginx/nginx.conf
|
- {{ rproxy_dir }}/nginx.conf:/etc/nginx/nginx.conf
|
||||||
- {{ rproxy_dir }}/sites:/etc/nginx/sites
|
- {{ rproxy_dir }}/sites:/etc/nginx/sites
|
||||||
- {{ rproxy_dir }}/sites/default.conf:/etc/nginx/conf.d/default.conf
|
- {{ rproxy_dir }}/certs:/etc/nginx/certs
|
||||||
- {{ rproxy_dir }}/{{ domain.stdout }}.crt:/etc/nginx/{{ domain.stdout }}.crt
|
|
||||||
- {{ rproxy_dir }}/{{ domain.stdout }}.key:/etc/nginx/{{ domain.stdout }}.key
|
|
||||||
ports:
|
ports:
|
||||||
- 443:443
|
- 443:443
|
||||||
- 80:80
|
- 80:80
|
||||||
23
roles/rproxy/templates/server.cnf.j2
Normal file
23
roles/rproxy/templates/server.cnf.j2
Normal file
@@ -0,0 +1,23 @@
|
|||||||
|
[ req ]
|
||||||
|
prompt = no
|
||||||
|
days = 365
|
||||||
|
distinguished_name = {{ domain.stdout }}
|
||||||
|
req_extensions = v3_req
|
||||||
|
|
||||||
|
|
||||||
|
[ olsson.ul ]
|
||||||
|
countryName = RU
|
||||||
|
stateOrProvinceName = RU
|
||||||
|
localityName = MSK
|
||||||
|
organizationName = {{ domain.stdout }}
|
||||||
|
organizationalUnitName = IT
|
||||||
|
commonName = {{ domain.stdout }}
|
||||||
|
emailAddress = admin@{{ domain.stdout }}
|
||||||
|
|
||||||
|
[ v3_req ]
|
||||||
|
basicConstraints = CA:false
|
||||||
|
extendedKeyUsage = serverAuth
|
||||||
|
subjectAltName = @sans
|
||||||
|
|
||||||
|
[ sans ]
|
||||||
|
DNS.0 = *.{{ domain.stdout }}
|
||||||
@@ -1,32 +1,35 @@
|
|||||||
{% for rproxy_service in rproxy_service_list %}
|
upstream {{ rproxy_service_name }}.{{ domain.stdout }} {
|
||||||
|
server {{ rproxy_service_address }}:{{ rproxy_service_port }};
|
||||||
|
}
|
||||||
|
|
||||||
server {
|
server {
|
||||||
listen 80;
|
listen 80;
|
||||||
server_name {{ rproxy_service }}.{{ domain.stdout }};
|
server_name {{ rproxy_service_name }}.{{ domain.stdout }};
|
||||||
access_log /var/log/nginx/{{ rproxy_service }}.access.log;
|
access_log /var/log/nginx/{{ rproxy_service_name }}.access.log;
|
||||||
error_log /var/log/nginx/{{ rproxy_service }}.error.log;
|
error_log /var/log/nginx/{{ rproxy_service_name }}.error.log;
|
||||||
return 301 https://$server_name$request_uri;
|
return 301 https://$server_name$request_uri;
|
||||||
}
|
}
|
||||||
|
|
||||||
server {
|
server {
|
||||||
listen 443 ssl;
|
listen 443 ssl;
|
||||||
server_name {{ rproxy_service }}.{{ domain.stdout }};
|
server_name {{ rproxy_service_name }}.{{ domain.stdout }};
|
||||||
access_log /var/log/nginx/{{ rproxy_service }}.access.log;
|
access_log /var/log/nginx/{{ rproxy_service_name }}.access.log;
|
||||||
error_log /var/log/nginx/{{ rproxy_service }}.error.log;
|
error_log /var/log/nginx/{{ rproxy_service_name }}.error.log;
|
||||||
ssl_certificate /etc/nginx/{{ domain.stdout }}.crt;
|
ssl_certificate /etc/nginx/certs/{{ domain.stdout }}.crt;
|
||||||
ssl_certificate_key /etc/nginx/{{ domain.stdout }}.key;
|
ssl_certificate_key /etc/nginx/certs/{{ domain.stdout }}.key;
|
||||||
ssl_protocols TLSv1.2;
|
ssl_protocols TLSv1.2;
|
||||||
ssl_ciphers EECDH:+AES256:-3DES:!RSA+AES:!RSA+3DES:!NULL:!RC4;
|
ssl_ciphers EECDH:+AES256:-3DES:!RSA+AES:!RSA+3DES:!NULL:!RC4;
|
||||||
ssl_prefer_server_ciphers on;
|
ssl_prefer_server_ciphers on;
|
||||||
proxy_connect_timeout 600s;
|
proxy_connect_timeout 600s;
|
||||||
fastcgi_request_buffering off;
|
fastcgi_request_buffering off;
|
||||||
fastcgi_buffers 64 4K;
|
fastcgi_buffers 64 4K;
|
||||||
|
|
||||||
location / {
|
location / {
|
||||||
proxy_pass_header Server;
|
proxy_pass_header Server;
|
||||||
proxy_set_header Host $host;
|
proxy_set_header Host $host;
|
||||||
proxy_set_header X-Real-IP $remote_addr;
|
proxy_set_header X-Real-IP $remote_addr;
|
||||||
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||||
proxy_set_header X-Forwarded-Proto $scheme;
|
proxy_set_header X-Forwarded-Proto $scheme;
|
||||||
proxy_pass https://{{ rproxy_service }}.{{ domain.stdout }}/;
|
proxy_pass https://{{ rproxy_service_name }}.{{ domain.stdout }}/;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
{% endfor %}
|
|
||||||
11
rproxy.yml
11
rproxy.yml
@@ -5,7 +5,16 @@
|
|||||||
vars:
|
vars:
|
||||||
ansible_python_interpreter: /usr/bin/python3
|
ansible_python_interpreter: /usr/bin/python3
|
||||||
rproxy_dir: /opt/rproxy
|
rproxy_dir: /opt/rproxy
|
||||||
rproxy_service_list: [jenkins]
|
|
||||||
|
|
||||||
|
vars_prompt:
|
||||||
|
- name: rproxy_service_name
|
||||||
|
prompt: Enter service for rproxy
|
||||||
|
|
||||||
|
- name: rproxy_service_port
|
||||||
|
prompt: Enter service for rproxy
|
||||||
|
|
||||||
|
- name: rproxy_service_address
|
||||||
|
prompt: Enter service for rproxy
|
||||||
|
|
||||||
roles:
|
roles:
|
||||||
- rproxy
|
- rproxy
|
||||||
|
|||||||
Reference in New Issue
Block a user