Prepare ansible role for AlmaLinux 10
* Moved from docker to podman * Refactored certificate generation
This commit is contained in:
@@ -1,6 +1,5 @@
|
|||||||
[defaults]
|
[defaults]
|
||||||
hostfile = hosts.ini
|
hostfile = hosts.ini
|
||||||
log_path = ansible-log.log
|
|
||||||
host_key_checking = false
|
host_key_checking = false
|
||||||
interpreter_python = /usr/bin/python3
|
interpreter_python = /usr/bin/python3
|
||||||
forks = 30
|
forks = 30
|
||||||
@@ -1,27 +1,48 @@
|
|||||||
---
|
---
|
||||||
- name: Create configs
|
- name: Create server configs
|
||||||
block:
|
block:
|
||||||
- name: Copy server.conf
|
- name: Copy server.conf
|
||||||
ansible.builtin.template:
|
ansible.builtin.template:
|
||||||
src: templates/server.conf.j2
|
src: templates/server.conf.j2
|
||||||
dest: "{{ rproxy_dir }}/sites/{{ rproxy_service_name }}.conf"
|
dest: "{{ rproxy_dir }}/sites/{{ rproxy_service_name }}.conf"
|
||||||
|
|
||||||
- name: Copy server certificate cnf
|
- name: Generate certificates for {{ rproxy_service_name }}
|
||||||
ansible.builtin.template:
|
block:
|
||||||
src: templates/server.cnf.j2
|
- name: "Generate {{ rproxy_service_name }}.key"
|
||||||
dest: '{{ rproxy_dir }}/certs/{{ rproxy_service_name }}.cnf'
|
community.crypto.openssl_privatekey:
|
||||||
|
path: "{{ rproxy_dir }}/certs/{{ rproxy_service_name }}.key"
|
||||||
|
size: "2048"
|
||||||
|
|
||||||
- name: Generate server key
|
- name: "Generate {{ rproxy_service_name }}.csr"
|
||||||
ansible.builtin.shell:
|
community.crypto.openssl_csr:
|
||||||
cmd: 'openssl genrsa -out {{ rproxy_dir }}/certs/{{ rproxy_service_name }}.key 2048'
|
path: "{{ rproxy_dir }}/certs/{{ rproxy_service_name }}.csr"
|
||||||
|
privatekey_path: "{{ rproxy_dir }}/certs/{{ rproxy_service_name }}.key"
|
||||||
|
country_name: "RU"
|
||||||
|
state_or_province_name: "RU"
|
||||||
|
locality_name: "MSK"
|
||||||
|
organization_name: "{{ ansible_domain }}"
|
||||||
|
organizational_unit_name: "IT"
|
||||||
|
common_name: "{{ rproxy_service_name }}.{{ ansible_facts['domain'] }}"
|
||||||
|
email_address: "admin@{{ ansible_domain }}"
|
||||||
|
subject_alt_name: "DNS:{{ rproxy_service_name }}.{{ ansible_facts['domain'] }},DNS:{{ ansible_facts['hostname'] }}.{{ ansible_facts['domain'] }},IP:{{ ansible_facts['default_ipv4']['address'] }}"
|
||||||
|
key_usage:
|
||||||
|
- digitalSignature
|
||||||
|
- nonRepudiation
|
||||||
|
- keyEncipherment
|
||||||
|
- dataEncipherment
|
||||||
|
extended_key_usage:
|
||||||
|
- serverAuth
|
||||||
|
|
||||||
- name: Generate server csr
|
- name: "Generate {{ rproxy_service_name }}.crt"
|
||||||
ansible.builtin.shell:
|
community.crypto.x509_certificate:
|
||||||
cmd: 'openssl req -key {{ rproxy_dir }}/certs/{{ rproxy_service_name }}.key -new -out {{ rproxy_dir }}/certs/{{ rproxy_service_name }}.csr -config {{ rproxy_dir }}/certs/{{ rproxy_service_name }}.cnf'
|
csr_path: "{{ rproxy_dir }}/certs/{{ rproxy_service_name }}.csr"
|
||||||
|
path: "{{ rproxy_dir }}/certs/{{ rproxy_service_name }}.crt"
|
||||||
- name: Sign server certificate
|
privatekey_path: "{{ rproxy_dir }}/certs/{{ rproxy_service_name }}.key"
|
||||||
ansible.builtin.shell:
|
provider: ownca
|
||||||
cmd: 'openssl x509 -req -CA {{ rproxy_dir }}/certs/RootCA.crt -CAkey {{ rproxy_dir }}/certs/RootCA.key -in {{ rproxy_dir }}/certs/{{ rproxy_service_name }}.csr -out {{ rproxy_dir }}/certs/{{ rproxy_service_name }}.crt -CAcreateserial -extfile {{ rproxy_dir }}/certs/{{ rproxy_service_name }}.cnf -days 365 -extensions v3_x509'
|
ownca_create_subject_key_identifier: always_create
|
||||||
|
ownca_path: "{{ rproxy_dir }}/certs/RootCA.crt"
|
||||||
|
ownca_privatekey_path: "{{ rproxy_dir }}/certs/RootCA.key"
|
||||||
|
ownca_not_after: "+365d"
|
||||||
|
|
||||||
- name: Create fullchain certificate
|
- name: Create fullchain certificate
|
||||||
ansible.builtin.shell:
|
ansible.builtin.shell:
|
||||||
@@ -32,13 +53,40 @@
|
|||||||
path: "{{ rproxy_dir }}/certs/{{ rproxy_service_name }}.csr"
|
path: "{{ rproxy_dir }}/certs/{{ rproxy_service_name }}.csr"
|
||||||
state: absent
|
state: absent
|
||||||
|
|
||||||
- name: Delete cnf
|
- name: Restart rproxy
|
||||||
ansible.builtin.file:
|
block:
|
||||||
path: "{{ rproxy_dir }}/certs/{{ rproxy_service_name }}.cnf"
|
- name: Restart container
|
||||||
state: absent
|
containers.podman.podman_container:
|
||||||
|
name: rproxy
|
||||||
|
image: "nginx:{{ rproxy_version }}"
|
||||||
|
state: started
|
||||||
|
restart: true
|
||||||
|
ports:
|
||||||
|
- "443:443"
|
||||||
|
- "80:80"
|
||||||
|
- "9000:9000"
|
||||||
|
volumes:
|
||||||
|
- '{{ rproxy_dir }}/nginx.conf:/etc/nginx/nginx.conf:z,rw'
|
||||||
|
- '{{ rproxy_dir }}/sites:/etc/nginx/sites:z,rw'
|
||||||
|
- '{{ rproxy_dir }}/certs:/etc/nginx/certs:z,rw'
|
||||||
|
- '{{ repo_data_dir }}:/repo:z,rw'
|
||||||
|
- "/etc/localtime:/etc/localtime:ro"
|
||||||
|
privileged: true
|
||||||
|
security_opt:
|
||||||
|
- "label=disable"
|
||||||
|
log_driver: journald
|
||||||
|
generate_systemd:
|
||||||
|
path: /etc/systemd/system/
|
||||||
|
restart_policy: always
|
||||||
|
stop_timeout: 120
|
||||||
|
names: true
|
||||||
|
|
||||||
- name: Restart rproxy
|
- name: Daemon reload
|
||||||
community.docker.docker_compose:
|
ansible.builtin.shell:
|
||||||
project_src: "{{ rproxy_dir }}"
|
cmd: systemctl daemon-reload
|
||||||
build: false
|
|
||||||
restarted: true
|
- name: Enable rproxy service
|
||||||
|
ansible.builtin.systemd:
|
||||||
|
name: "container-rproxy.service"
|
||||||
|
state: started
|
||||||
|
enabled: yes
|
||||||
|
|||||||
@@ -1,33 +0,0 @@
|
|||||||
---
|
|
||||||
- name: Install python3.11
|
|
||||||
ansible.builtin.yum:
|
|
||||||
name:
|
|
||||||
- python3.11
|
|
||||||
- python3.11-setuptools
|
|
||||||
- python3.11-pip
|
|
||||||
update_cache: yes
|
|
||||||
|
|
||||||
- name: Change default python3 to v3.11
|
|
||||||
ansible.builtin.alternatives:
|
|
||||||
name: python3
|
|
||||||
path: /usr/bin/python3.11
|
|
||||||
|
|
||||||
- name: Upgrade pip
|
|
||||||
ansible.builtin.pip:
|
|
||||||
name: pip
|
|
||||||
state: latest
|
|
||||||
executable: pip3
|
|
||||||
|
|
||||||
- name: Install docker
|
|
||||||
ansible.builtin.pip:
|
|
||||||
name:
|
|
||||||
- docker
|
|
||||||
- docker-compose
|
|
||||||
|
|
||||||
- name: Enable docker (RHEL)
|
|
||||||
ansible.builtin.systemd:
|
|
||||||
name: docker
|
|
||||||
state: restarted
|
|
||||||
enabled: true
|
|
||||||
daemon_reload: true
|
|
||||||
when: ansible_facts['os_family'] == "RedHat"
|
|
||||||
@@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
- name: Create docker repository
|
- name: Prepare for image repository
|
||||||
block:
|
block:
|
||||||
- name: Remove dockerrepo dir
|
- name: Remove dockerrepo dir
|
||||||
ansible.builtin.file:
|
ansible.builtin.file:
|
||||||
@@ -21,27 +21,43 @@
|
|||||||
path: "{{ dockerrepo_dir }}/certs"
|
path: "{{ dockerrepo_dir }}/certs"
|
||||||
state: directory
|
state: directory
|
||||||
|
|
||||||
- name: Copy docker-compose
|
- name: Create certificates for image repository
|
||||||
ansible.builtin.template:
|
block:
|
||||||
src: templates/docker-compose.dockerrepo.yml.j2
|
- name: "Generate dockerrepo.key"
|
||||||
dest: "{{ dockerrepo_dir }}/docker-compose.yml"
|
community.crypto.openssl_privatekey:
|
||||||
|
path: "{{ dockerrepo_dir }}/certs/dockerrepo.key"
|
||||||
|
size: "2048"
|
||||||
|
|
||||||
- name: Copy dockerrepo certificate cnf
|
- name: "Generate server.csr"
|
||||||
ansible.builtin.template:
|
community.crypto.openssl_csr:
|
||||||
src: templates/dockerrepo.cnf.j2
|
path: "{{ dockerrepo_dir }}/certs/dockerrepo.csr"
|
||||||
dest: '{{ dockerrepo_dir }}/certs/dockerrepo.cnf'
|
privatekey_path: "{{ dockerrepo_dir }}/certs/dockerrepo.key"
|
||||||
|
country_name: "RU"
|
||||||
|
state_or_province_name: "RU"
|
||||||
|
locality_name: "MSK"
|
||||||
|
organization_name: "{{ ansible_domain }}"
|
||||||
|
organizational_unit_name: "IT"
|
||||||
|
common_name: "{{ ansible_facts['hostname'] }}.{{ ansible_facts['domain'] }}"
|
||||||
|
email_address: "admin@{{ ansible_domain }}"
|
||||||
|
subject_alt_name: "DNS:{{ ansible_facts['hostname'] }}.{{ ansible_facts['domain'] }},DNS:imagerepo.{{ ansible_facts['domain'] }},IP:{{ ansible_facts['default_ipv4']['address'] }}"
|
||||||
|
key_usage:
|
||||||
|
- digitalSignature
|
||||||
|
- nonRepudiation
|
||||||
|
- keyEncipherment
|
||||||
|
- dataEncipherment
|
||||||
|
extended_key_usage:
|
||||||
|
- serverAuth
|
||||||
|
|
||||||
- name: Generate dockerrepo certificate key
|
- name: "Generate server.crt"
|
||||||
ansible.builtin.shell:
|
community.crypto.x509_certificate:
|
||||||
cmd: 'openssl genrsa -out {{ dockerrepo_dir }}/certs/dockerrepo.key 2048'
|
csr_path: "{{ dockerrepo_dir }}/certs/dockerrepo.csr"
|
||||||
|
path: "{{ dockerrepo_dir }}/certs/dockerrepo.crt"
|
||||||
- name: Generate dockerrepo csr
|
privatekey_path: "{{ dockerrepo_dir }}/certs/dockerrepo.key"
|
||||||
ansible.builtin.shell:
|
provider: ownca
|
||||||
cmd: 'openssl req -key {{ dockerrepo_dir }}/certs/dockerrepo.key -new -out {{ dockerrepo_dir }}/certs/dockerrepo.csr -config {{ dockerrepo_dir }}/certs/dockerrepo.cnf'
|
ownca_create_subject_key_identifier: always_create
|
||||||
|
ownca_path: "{{ rproxy_dir }}/certs/RootCA.crt"
|
||||||
- name: Sign dockerrepo certificate
|
ownca_privatekey_path: "{{ rproxy_dir }}/certs/RootCA.key"
|
||||||
ansible.builtin.shell:
|
ownca_not_after: "+365d"
|
||||||
cmd: 'openssl x509 -req -CA {{ rproxy_dir }}/certs/RootCA.crt -CAkey {{ rproxy_dir }}/certs/RootCA.key -in {{ dockerrepo_dir }}/certs/dockerrepo.csr -out {{ dockerrepo_dir }}/certs/dockerrepo.crt -CAcreateserial -extfile {{ dockerrepo_dir }}/certs/dockerrepo.cnf -days 365 -extensions v3_x509'
|
|
||||||
|
|
||||||
- name: Create fullchain certificate
|
- name: Create fullchain certificate
|
||||||
ansible.builtin.shell:
|
ansible.builtin.shell:
|
||||||
@@ -52,13 +68,48 @@
|
|||||||
path: "{{ dockerrepo_dir }}/certs/dockerrepo.csr"
|
path: "{{ dockerrepo_dir }}/certs/dockerrepo.csr"
|
||||||
state: absent
|
state: absent
|
||||||
|
|
||||||
- name: Delete cnf
|
- name: Start image repository
|
||||||
ansible.builtin.file:
|
block:
|
||||||
path: "{{ dockerrepo_dir }}/certs/dockerrepo.cnf"
|
- name: Pull repo image
|
||||||
|
containers.podman.podman_image:
|
||||||
|
name: registry:latest
|
||||||
|
state: present
|
||||||
|
|
||||||
|
- name: Delete image repository container if exists
|
||||||
|
containers.podman.podman_container:
|
||||||
|
name: registry
|
||||||
state: absent
|
state: absent
|
||||||
|
|
||||||
- name: Restart rproxy
|
- name: Start registry
|
||||||
community.docker.docker_compose:
|
containers.podman.podman_container:
|
||||||
project_src: "{{ dockerrepo_dir }}"
|
name: registry
|
||||||
build: false
|
image: registry:latest
|
||||||
restarted: true
|
state: started
|
||||||
|
ports:
|
||||||
|
- "5000:5000"
|
||||||
|
environment:
|
||||||
|
- REGISTRY_HTTP_TLS_CERTIFICATE=/certs/dockerrepo.crt
|
||||||
|
- REGISTRY_HTTP_TLS_KEY=/certs/dockerrepo.key
|
||||||
|
volumes:
|
||||||
|
- "{{ dockerrepo_data_dir }}:/var/lib/registry:z,rw"
|
||||||
|
- "{{ dockerrepo_dir }}/certs:/certs:z,rw"
|
||||||
|
- "/etc/localtime:/etc/localtime:ro"
|
||||||
|
privileged: true
|
||||||
|
security_opt:
|
||||||
|
- "label=disable"
|
||||||
|
log_driver: journald
|
||||||
|
generate_systemd:
|
||||||
|
path: /etc/systemd/system/
|
||||||
|
restart_policy: always
|
||||||
|
stop_timeout: 120
|
||||||
|
names: true
|
||||||
|
|
||||||
|
- name: Daemon reload
|
||||||
|
ansible.builtin.shell:
|
||||||
|
cmd: systemctl daemon-reload
|
||||||
|
|
||||||
|
- name: Enable registry service
|
||||||
|
ansible.builtin.systemd:
|
||||||
|
name: "container-registry.service"
|
||||||
|
state: started
|
||||||
|
enabled: yes
|
||||||
@@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
- name: Docker install
|
- name: Podman install
|
||||||
ansible.builtin.include_tasks:
|
ansible.builtin.include_tasks:
|
||||||
file: docker.yml
|
file: podman.yml
|
||||||
apply:
|
apply:
|
||||||
tags: install
|
tags: install
|
||||||
tags:
|
tags:
|
||||||
|
|||||||
17
roles/rproxy/tasks/podman.yml
Normal file
17
roles/rproxy/tasks/podman.yml
Normal file
@@ -0,0 +1,17 @@
|
|||||||
|
---
|
||||||
|
- name: Install podman
|
||||||
|
ansible.builtin.yum:
|
||||||
|
name:
|
||||||
|
- podman
|
||||||
|
- podman-compose
|
||||||
|
- podman-docker
|
||||||
|
- podman-remote
|
||||||
|
- podman-tui
|
||||||
|
- buildah
|
||||||
|
update_cache: yes
|
||||||
|
|
||||||
|
- name: Enable Podman
|
||||||
|
ansible.builtin.systemd:
|
||||||
|
name: podman
|
||||||
|
state: started
|
||||||
|
enabled: yes
|
||||||
@@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
- name: Create https repository
|
- name: Prepare for https repository
|
||||||
block:
|
block:
|
||||||
- name: Create repo dir
|
- name: Create repo dir
|
||||||
ansible.builtin.file:
|
ansible.builtin.file:
|
||||||
@@ -12,22 +12,43 @@
|
|||||||
src: files/repo.conf
|
src: files/repo.conf
|
||||||
dest: "{{ rproxy_dir }}/sites/repo.conf"
|
dest: "{{ rproxy_dir }}/sites/repo.conf"
|
||||||
|
|
||||||
- name: Copy repo certificate cnf
|
- name: Create https certificates for repository
|
||||||
ansible.builtin.template:
|
block:
|
||||||
src: templates/repo.cnf.j2
|
- name: "Generate repo.key"
|
||||||
dest: '{{ rproxy_dir }}/certs/repo.cnf'
|
community.crypto.openssl_privatekey:
|
||||||
|
path: "{{ rproxy_dir }}/certs/repo.key"
|
||||||
|
size: "2048"
|
||||||
|
|
||||||
- name: Generate repo certificate key
|
- name: "Generate server.csr"
|
||||||
ansible.builtin.shell:
|
community.crypto.openssl_csr:
|
||||||
cmd: 'openssl genrsa -out {{ rproxy_dir }}/certs/repo.key 2048'
|
path: "{{ rproxy_dir }}/certs/repo.csr"
|
||||||
|
privatekey_path: "{{ rproxy_dir }}/certs/repo.key"
|
||||||
|
country_name: "RU"
|
||||||
|
state_or_province_name: "RU"
|
||||||
|
locality_name: "MSK"
|
||||||
|
organization_name: "{{ ansible_domain }}"
|
||||||
|
organizational_unit_name: "IT"
|
||||||
|
common_name: "{{ ansible_facts['hostname'] }}.{{ ansible_facts['domain'] }}"
|
||||||
|
email_address: "admin@{{ ansible_domain }}"
|
||||||
|
subject_alt_name: "DNS:{{ ansible_facts['hostname'] }}.{{ ansible_facts['domain'] }},DNS:repo.{{ ansible_facts['domain'] }},IP:{{ ansible_facts['default_ipv4']['address'] }}"
|
||||||
|
key_usage:
|
||||||
|
- digitalSignature
|
||||||
|
- nonRepudiation
|
||||||
|
- keyEncipherment
|
||||||
|
- dataEncipherment
|
||||||
|
extended_key_usage:
|
||||||
|
- serverAuth
|
||||||
|
|
||||||
- name: Generate server csr
|
- name: "Generate server.crt"
|
||||||
ansible.builtin.shell:
|
community.crypto.x509_certificate:
|
||||||
cmd: 'openssl req -key {{ rproxy_dir }}/certs/repo.key -new -out {{ rproxy_dir }}/certs/repo.csr -config {{ rproxy_dir }}/certs/repo.cnf'
|
csr_path: "{{ rproxy_dir }}/certs/repo.csr"
|
||||||
|
path: "{{ rproxy_dir }}/certs/repo.crt"
|
||||||
- name: Sign server certificate
|
privatekey_path: "{{ rproxy_dir }}/certs/repo.key"
|
||||||
ansible.builtin.shell:
|
provider: ownca
|
||||||
cmd: 'openssl x509 -req -CA {{ rproxy_dir }}/certs/RootCA.crt -CAkey {{ rproxy_dir }}/certs/RootCA.key -in {{ rproxy_dir }}/certs/repo.csr -out {{ rproxy_dir }}/certs/repo.crt -CAcreateserial -extfile {{ rproxy_dir }}/certs/repo.cnf -days 365 -extensions v3_x509'
|
ownca_create_subject_key_identifier: always_create
|
||||||
|
ownca_path: "{{ rproxy_dir }}/certs/RootCA.crt"
|
||||||
|
ownca_privatekey_path: "{{ rproxy_dir }}/certs/RootCA.key"
|
||||||
|
ownca_not_after: "+365d"
|
||||||
|
|
||||||
- name: Create fullchain certificate
|
- name: Create fullchain certificate
|
||||||
ansible.builtin.shell:
|
ansible.builtin.shell:
|
||||||
@@ -38,13 +59,40 @@
|
|||||||
path: "{{ rproxy_dir }}/certs/repo.csr"
|
path: "{{ rproxy_dir }}/certs/repo.csr"
|
||||||
state: absent
|
state: absent
|
||||||
|
|
||||||
- name: Delete cnf
|
- name: Restart rproxy
|
||||||
ansible.builtin.file:
|
block:
|
||||||
path: "{{ rproxy_dir }}/certs/repo.cnf"
|
- name: Restart container
|
||||||
state: absent
|
containers.podman.podman_container:
|
||||||
|
name: rproxy
|
||||||
|
image: "nginx:{{ rproxy_version }}"
|
||||||
|
state: started
|
||||||
|
restart: true
|
||||||
|
ports:
|
||||||
|
- "443:443"
|
||||||
|
- "80:80"
|
||||||
|
- "9000:9000"
|
||||||
|
volumes:
|
||||||
|
- '{{ rproxy_dir }}/nginx.conf:/etc/nginx/nginx.conf:z,rw'
|
||||||
|
- '{{ rproxy_dir }}/sites:/etc/nginx/sites:z,rw'
|
||||||
|
- '{{ rproxy_dir }}/certs:/etc/nginx/certs:z,rw'
|
||||||
|
- '{{ repo_data_dir }}:/repo:z,rw'
|
||||||
|
- "/etc/localtime:/etc/localtime:ro"
|
||||||
|
privileged: true
|
||||||
|
security_opt:
|
||||||
|
- "label=disable"
|
||||||
|
log_driver: journald
|
||||||
|
generate_systemd:
|
||||||
|
path: /etc/systemd/system/
|
||||||
|
restart_policy: always
|
||||||
|
stop_timeout: 120
|
||||||
|
names: true
|
||||||
|
|
||||||
- name: Restart rproxy
|
- name: Daemon reload
|
||||||
community.docker.docker_compose:
|
ansible.builtin.shell:
|
||||||
project_src: "{{ rproxy_dir }}"
|
cmd: systemctl daemon-reload
|
||||||
build: false
|
|
||||||
restarted: true
|
- name: Enable rproxy service
|
||||||
|
ansible.builtin.systemd:
|
||||||
|
name: "container-rproxy.service"
|
||||||
|
state: started
|
||||||
|
enabled: yes
|
||||||
@@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
- name: Install rproxy
|
- name: Prepare dirs for rproxy
|
||||||
block:
|
block:
|
||||||
- name: Remove rproxy dir
|
- name: Remove rproxy dir
|
||||||
ansible.builtin.file:
|
ansible.builtin.file:
|
||||||
@@ -21,11 +21,6 @@
|
|||||||
path: "{{ rproxy_dir }}/certs"
|
path: "{{ rproxy_dir }}/certs"
|
||||||
state: directory
|
state: directory
|
||||||
|
|
||||||
- name: Copy docker-compose
|
|
||||||
ansible.builtin.template:
|
|
||||||
src: templates/docker-compose.rproxy.yml.j2
|
|
||||||
dest: "{{ rproxy_dir }}/docker-compose.yml"
|
|
||||||
|
|
||||||
- name: Copy nginx.conf
|
- name: Copy nginx.conf
|
||||||
ansible.builtin.copy:
|
ansible.builtin.copy:
|
||||||
src: files/nginx.conf
|
src: files/nginx.conf
|
||||||
@@ -41,6 +36,49 @@
|
|||||||
src: files/RootCA.key
|
src: files/RootCA.key
|
||||||
dest: '{{ rproxy_dir }}/certs/RootCA.key'
|
dest: '{{ rproxy_dir }}/certs/RootCA.key'
|
||||||
|
|
||||||
|
- name: Install rproxy
|
||||||
|
block:
|
||||||
|
- name: Pull rproxy image
|
||||||
|
containers.podman.podman_image:
|
||||||
|
name: "nginx:{{ rproxy_version }}"
|
||||||
|
state: present
|
||||||
|
|
||||||
|
- name: Delete rproxy container if exists
|
||||||
|
containers.podman.podman_container:
|
||||||
|
name: rproxy
|
||||||
|
state: absent
|
||||||
|
|
||||||
- name: Start rproxy
|
- name: Start rproxy
|
||||||
community.docker.docker_compose:
|
containers.podman.podman_container:
|
||||||
project_src: "{{ rproxy_dir }}"
|
name: rproxy
|
||||||
|
image: "nginx:{{ rproxy_version }}"
|
||||||
|
state: started
|
||||||
|
ports:
|
||||||
|
- "443:443"
|
||||||
|
- "80:80"
|
||||||
|
- "9000:9000"
|
||||||
|
volumes:
|
||||||
|
- '{{ rproxy_dir }}/nginx.conf:/etc/nginx/nginx.conf:z,rw'
|
||||||
|
- '{{ rproxy_dir }}/sites:/etc/nginx/sites:z,rw'
|
||||||
|
- '{{ rproxy_dir }}/certs:/etc/nginx/certs:z,rw'
|
||||||
|
- '{{ repo_data_dir }}:/repo:z,rw'
|
||||||
|
- "/etc/localtime:/etc/localtime:ro"
|
||||||
|
privileged: true
|
||||||
|
security_opt:
|
||||||
|
- "label=disable"
|
||||||
|
log_driver: journald
|
||||||
|
generate_systemd:
|
||||||
|
path: /etc/systemd/system/
|
||||||
|
restart_policy: always
|
||||||
|
stop_timeout: 120
|
||||||
|
names: true
|
||||||
|
|
||||||
|
- name: Daemon reload
|
||||||
|
ansible.builtin.shell:
|
||||||
|
cmd: systemctl daemon-reload
|
||||||
|
|
||||||
|
- name: Enable rproxy service
|
||||||
|
ansible.builtin.systemd:
|
||||||
|
name: "container-rproxy.service"
|
||||||
|
state: started
|
||||||
|
enabled: yes
|
||||||
@@ -1,15 +0,0 @@
|
|||||||
version: '3.3'
|
|
||||||
|
|
||||||
services:
|
|
||||||
nginx:
|
|
||||||
image: registry:latest
|
|
||||||
container_name: dockerrepo
|
|
||||||
restart: always
|
|
||||||
environment:
|
|
||||||
- REGISTRY_HTTP_TLS_CERTIFICATE=/certs/dockerrepo.crt
|
|
||||||
- REGISTRY_HTTP_TLS_KEY=/certs/dockerrepo.key
|
|
||||||
volumes:
|
|
||||||
- '{{ dockerrepo_data_dir }}:/var/lib/registry'
|
|
||||||
- '{{ dockerrepo_dir }}/certs:/certs'
|
|
||||||
ports:
|
|
||||||
- 5000:5000
|
|
||||||
@@ -1,16 +0,0 @@
|
|||||||
version: '3.3'
|
|
||||||
|
|
||||||
services:
|
|
||||||
nginx:
|
|
||||||
image: nginx:latest
|
|
||||||
container_name: rproxy
|
|
||||||
restart: always
|
|
||||||
volumes:
|
|
||||||
- '{{ rproxy_dir }}/nginx.conf:/etc/nginx/nginx.conf'
|
|
||||||
- '{{ rproxy_dir }}/sites:/etc/nginx/sites'
|
|
||||||
- '{{ rproxy_dir }}/certs:/etc/nginx/certs'
|
|
||||||
- '{{ repo_data_dir }}:/repo'
|
|
||||||
ports:
|
|
||||||
- 443:443
|
|
||||||
- 80:80
|
|
||||||
- 9000:9000
|
|
||||||
@@ -1,29 +0,0 @@
|
|||||||
[ req ]
|
|
||||||
prompt = no
|
|
||||||
distinguished_name = dockerrepo.{{ ansible_domain }}
|
|
||||||
req_extensions = v3_req
|
|
||||||
x509_extensions = v3_x509
|
|
||||||
|
|
||||||
|
|
||||||
[ dockerrepo.{{ ansible_domain }} ]
|
|
||||||
countryName = RU
|
|
||||||
stateOrProvinceName = RU
|
|
||||||
localityName = MSK
|
|
||||||
organizationName = {{ ansible_domain }}
|
|
||||||
organizationalUnitName = IT
|
|
||||||
commonName = dockerrepo.{{ ansible_domain }}
|
|
||||||
emailAddress = admin@{{ ansible_domain }}
|
|
||||||
|
|
||||||
[ v3_req ]
|
|
||||||
basicConstraints = CA:false
|
|
||||||
keyUsage = digitalSignature, keyEncipherment
|
|
||||||
subjectAltName = @sans
|
|
||||||
|
|
||||||
[ v3_x509 ]
|
|
||||||
basicConstraints = CA:false
|
|
||||||
keyUsage = digitalSignature, keyEncipherment
|
|
||||||
subjectAltName = @sans
|
|
||||||
|
|
||||||
[ sans ]
|
|
||||||
DNS.1 = dockerrepo.{{ ansible_domain }}
|
|
||||||
IP.1 = {{ {{ ansible_facts['default_ipv4']['address'] }} }}
|
|
||||||
@@ -1,29 +0,0 @@
|
|||||||
[ req ]
|
|
||||||
prompt = no
|
|
||||||
distinguished_name = repo.{{ ansible_domain }}
|
|
||||||
req_extensions = v3_req
|
|
||||||
x509_extensions = v3_x509
|
|
||||||
|
|
||||||
|
|
||||||
[ repo.{{ ansible_domain }} ]
|
|
||||||
countryName = RU
|
|
||||||
stateOrProvinceName = RU
|
|
||||||
localityName = MSK
|
|
||||||
organizationName = {{ ansible_domain }}
|
|
||||||
organizationalUnitName = IT
|
|
||||||
commonName = repo.{{ ansible_domain }}
|
|
||||||
emailAddress = admin@{{ ansible_domain }}
|
|
||||||
|
|
||||||
[ v3_req ]
|
|
||||||
basicConstraints = CA:false
|
|
||||||
keyUsage = digitalSignature, keyEncipherment
|
|
||||||
subjectAltName = @sans
|
|
||||||
|
|
||||||
[ v3_x509 ]
|
|
||||||
basicConstraints = CA:false
|
|
||||||
keyUsage = digitalSignature, keyEncipherment
|
|
||||||
subjectAltName = @sans
|
|
||||||
|
|
||||||
[ sans ]
|
|
||||||
DNS.1 = repo.{{ ansible_domain }}
|
|
||||||
IP.1 = {{ {{ ansible_facts['default_ipv4']['address'] }} }}
|
|
||||||
@@ -1,29 +0,0 @@
|
|||||||
[ req ]
|
|
||||||
prompt = no
|
|
||||||
distinguished_name = {{ rproxy_service_name }}.{{ ansible_domain }}
|
|
||||||
req_extensions = v3_req
|
|
||||||
x509_extensions = v3_x509
|
|
||||||
|
|
||||||
|
|
||||||
[ {{ rproxy_service_name }}.{{ ansible_domain }} ]
|
|
||||||
countryName = RU
|
|
||||||
stateOrProvinceName = RU
|
|
||||||
localityName = MSK
|
|
||||||
organizationName = {{ ansible_domain }}
|
|
||||||
organizationalUnitName = IT
|
|
||||||
commonName = {{ rproxy_service_name }}.{{ ansible_domain }}
|
|
||||||
emailAddress = admin@{{ ansible_domain }}
|
|
||||||
|
|
||||||
[ v3_req ]
|
|
||||||
basicConstraints = CA:false
|
|
||||||
keyUsage = digitalSignature, keyEncipherment
|
|
||||||
subjectAltName = @sans
|
|
||||||
|
|
||||||
[ v3_x509 ]
|
|
||||||
basicConstraints = CA:false
|
|
||||||
keyUsage = digitalSignature, keyEncipherment
|
|
||||||
subjectAltName = @sans
|
|
||||||
|
|
||||||
[ sans ]
|
|
||||||
DNS.1 = {{ rproxy_service_name }}.{{ ansible_domain }}
|
|
||||||
IP.1 = {{ rproxy_service_address }}
|
|
||||||
@@ -1,5 +1,6 @@
|
|||||||
ansible_python_interpreter: /usr/bin/python3
|
ansible_python_interpreter: /usr/bin/python3
|
||||||
rproxy_dir: /opt/rproxy
|
rproxy_dir: /opt/rproxy
|
||||||
|
rproxy_version: 1.29
|
||||||
repo_data_dir: /opt/data/repo
|
repo_data_dir: /opt/data/repo
|
||||||
dockerrepo_dir: /opt/dockerrepo
|
dockerrepo_dir: /opt/dockerrepo
|
||||||
dockerrepo_data_dir: /opt/data/dockerrepo
|
dockerrepo_data_dir: /opt/data/dockerrepo
|
||||||
Reference in New Issue
Block a user