[Look for a tester] ansible role added #662
mhkarimi1383/master
into master
@ -0,0 +1 @@ |
|||||
|
roles/nginx/files/ssl/* |
@ -0,0 +1,31 @@ |
|||||
|
# Ansible Playbook to install uptime kuma using docker |
||||
|
|
||||
|
This playbook comes with three roles |
||||
|
|
||||
|
1. docker (to install docker) |
||||
|
2. nginx (to install nginx using docker with ssl) |
||||
|
3. uptime kuma (to install uptime kuma using docker) |
||||
|
|
||||
|
To see more info see docker-compose, tasks and config files |
||||
|
I will try to make this readme better |
||||
|
|
||||
|
## To run it |
||||
|
1. install ansible see [here](https://docs.ansible.com/ansible/latest/installation_guide/intro_installation.html) |
||||
|
2. run `ansible-galaxy install -r ansible-requirements.yml` to get requirements |
||||
|
3. prepare inventory hosts |
||||
|
4. put your certificates in files section in nginx role with this structure below: |
||||
|
``` |
||||
|
ansible -> roles -> nginx -> ssl -> <uptime kuma domain>.fullchain.pem |
||||
|
ansible -> roles -> nginx -> ssl -> <uptime kuma domain>.privkey.pem |
||||
|
``` |
||||
|
5. to run playbook |
||||
|
```bash |
||||
|
ansible-playbook ./playbook.yml -i <your inventory path> -e "kuma_domain=<uptime kuma domain>" -e "kuma_image_os=<alpine or debian>" -e "kuma_image_version=<version>" |
||||
|
``` |
||||
|
you can use other ansible playbook options too |
||||
|
|
||||
|
> Note: Replace `<uptime kuma domain>` with your desired domain for uptime kuma |
||||
|
> replace `<version>` with a version from https://github.com/louislam/uptime-kuma/releases |
||||
|
> replace `<alpine or debian>` with one of options |
||||
|
> `-e "kuma_image_os=<alpine or debian>" -e "kuma_image_version=<version>"` is not required and you can remove this part or change only one of them (kuma_image_os is debian & kuma_image_version is 1 by default) |
||||
|
> If you are not using root user as your ansible_user use -bK option to become root |
@ -0,0 +1,6 @@ |
|||||
|
roles: |
||||
|
- src: geerlingguy.docker |
||||
|
- src: geerlingguy.pip |
||||
|
|
||||
|
collections: |
||||
|
- name: community.docker |
@ -0,0 +1,14 @@ |
|||||
|
- name: install uptime kuma with nginx connected |
||||
|
hosts: all |
||||
|
|
||||
|
vars: |
||||
|
pip_install_packages: |
||||
|
- name: docker |
||||
|
docker_compose_version: "v2.0.1" |
||||
|
|||||
|
|
||||
|
roles: |
||||
|
- {role: geerlingguy.docker, tags: ["docker"]} |
||||
|
- {role: geerlingguy.pip, tags: ["docker"]} |
||||
|
- {role: kuma, tags: ["kuma"]} |
||||
|
- {role: nginx, tags: ["nginx"]} |
||||
|
|
@ -0,0 +1,22 @@ |
|||||
|
- name: Ensure Volumes & Files directories exists |
||||
|
file: |
||||
|
dest: "{{item}}" |
||||
|
state: directory |
||||
|
loop: |
||||
|
- /compose |
||||
|
- /compose/volumes |
||||
|
- /compose/volumes/nginx |
||||
|
- /compose/volumes/nginx/log/{{ kuma_domain }} |
||||
|
|
||||
|
- name: Ensure nginx config directory exist |
||||
|
copy: |
||||
|
src: ssl |
||||
|
dest: /compose/volumes/nginx/ssl |
||||
|
mode: 'preserve' |
||||
|
group: root |
||||
|
owner: root |
||||
|
|
||||
|
- name: Ensure config files are updated |
||||
|
template: |
||||
|
src: "nginx.conf" |
||||
|
dest: /compose/volumes/nginx/nginx.conf |
@ -0,0 +1,88 @@ |
|||||
![]()
Review
You can generate initial self-signed certs using Ansible Openssl module: Ex:
![]()
Review
You can generate initial self-signed certs using Ansible Openssl module: Ex:
![]()
Review
This should be:
Since the service gets a hostname assigned by Docker Network. ![]()
Review
This should be:
Since the service gets a hostname assigned by Docker Network. ![]()
Review
Suggest creating a folder:
Which will contain:
That way you have less custom stuff in the nginx.conf ![]()
Review
Suggest creating a folder:
Which will contain:
That way you have less custom stuff in the nginx.conf |
|||||
|
user nginx; |
||||
![]()
Review
You can generate initial self-signed certs using Ansible Openssl module: Ex:
![]()
Review
This should be:
Since the service gets a hostname assigned by Docker Network. ![]()
Review
Suggest creating a folder:
Which will contain:
That way you have less custom stuff in the nginx.conf |
|||||
|
worker_processes auto; |
||||
![]()
Review
You can generate initial self-signed certs using Ansible Openssl module: Ex:
![]()
Review
This should be:
Since the service gets a hostname assigned by Docker Network. ![]()
Review
Suggest creating a folder:
Which will contain:
That way you have less custom stuff in the nginx.conf |
|||||
|
|
||||
![]()
Review
You can generate initial self-signed certs using Ansible Openssl module: Ex:
![]()
Review
This should be:
Since the service gets a hostname assigned by Docker Network. ![]()
Review
Suggest creating a folder:
Which will contain:
That way you have less custom stuff in the nginx.conf |
|||||
|
pid /var/run/nginx.pid; |
||||
![]()
Review
You can generate initial self-signed certs using Ansible Openssl module: Ex:
![]()
Review
This should be:
Since the service gets a hostname assigned by Docker Network. ![]()
Review
Suggest creating a folder:
Which will contain:
That way you have less custom stuff in the nginx.conf |
|||||
|
error_log /var/log/nginx/error.log; |
||||
![]()
Review
You can generate initial self-signed certs using Ansible Openssl module: Ex:
![]()
Review
This should be:
Since the service gets a hostname assigned by Docker Network. ![]()
Review
Suggest creating a folder:
Which will contain:
That way you have less custom stuff in the nginx.conf |
|||||
|
|
||||
![]()
Review
You can generate initial self-signed certs using Ansible Openssl module: Ex:
![]()
Review
This should be:
Since the service gets a hostname assigned by Docker Network. ![]()
Review
Suggest creating a folder:
Which will contain:
That way you have less custom stuff in the nginx.conf |
|||||
|
events { |
||||
![]()
Review
You can generate initial self-signed certs using Ansible Openssl module: Ex:
![]()
Review
This should be:
Since the service gets a hostname assigned by Docker Network. ![]()
Review
Suggest creating a folder:
Which will contain:
That way you have less custom stuff in the nginx.conf |
|||||
|
worker_connections 2048; |
||||
![]()
Review
You can generate initial self-signed certs using Ansible Openssl module: Ex:
![]()
Review
This should be:
Since the service gets a hostname assigned by Docker Network. ![]()
Review
Suggest creating a folder:
Which will contain:
That way you have less custom stuff in the nginx.conf |
|||||
|
} |
||||
![]()
Review
You can generate initial self-signed certs using Ansible Openssl module: Ex:
![]()
Review
This should be:
Since the service gets a hostname assigned by Docker Network. ![]()
Review
Suggest creating a folder:
Which will contain:
That way you have less custom stuff in the nginx.conf |
|||||
|
|
||||
![]()
Review
You can generate initial self-signed certs using Ansible Openssl module: Ex:
![]()
Review
This should be:
Since the service gets a hostname assigned by Docker Network. ![]()
Review
Suggest creating a folder:
Which will contain:
That way you have less custom stuff in the nginx.conf |
|||||
|
http { |
||||
![]()
Review
You can generate initial self-signed certs using Ansible Openssl module: Ex:
![]()
Review
This should be:
Since the service gets a hostname assigned by Docker Network. ![]()
Review
Suggest creating a folder:
Which will contain:
That way you have less custom stuff in the nginx.conf |
|||||
|
sendfile on; |
||||
![]()
Review
You can generate initial self-signed certs using Ansible Openssl module: Ex:
![]()
Review
This should be:
Since the service gets a hostname assigned by Docker Network. ![]()
Review
Suggest creating a folder:
Which will contain:
That way you have less custom stuff in the nginx.conf |
|||||
|
tcp_nopush on; |
||||
![]()
Review
You can generate initial self-signed certs using Ansible Openssl module: Ex:
![]()
Review
This should be:
Since the service gets a hostname assigned by Docker Network. ![]()
Review
Suggest creating a folder:
Which will contain:
That way you have less custom stuff in the nginx.conf |
|||||
|
tcp_nodelay on; |
||||
![]()
Review
You can generate initial self-signed certs using Ansible Openssl module: Ex:
![]()
Review
This should be:
Since the service gets a hostname assigned by Docker Network. ![]()
Review
Suggest creating a folder:
Which will contain:
That way you have less custom stuff in the nginx.conf |
|||||
|
keepalive_timeout 65; |
||||
![]()
Review
You can generate initial self-signed certs using Ansible Openssl module: Ex:
![]()
Review
This should be:
Since the service gets a hostname assigned by Docker Network. ![]()
Review
Suggest creating a folder:
Which will contain:
That way you have less custom stuff in the nginx.conf |
|||||
|
types_hash_max_size 2048; |
||||
![]()
Review
You can generate initial self-signed certs using Ansible Openssl module: Ex:
![]()
Review
This should be:
Since the service gets a hostname assigned by Docker Network. ![]()
Review
Suggest creating a folder:
Which will contain:
That way you have less custom stuff in the nginx.conf |
|||||
|
server_tokens off; |
||||
![]()
Review
You can generate initial self-signed certs using Ansible Openssl module: Ex:
![]()
Review
This should be:
Since the service gets a hostname assigned by Docker Network. ![]()
Review
Suggest creating a folder:
Which will contain:
That way you have less custom stuff in the nginx.conf |
|||||
|
|
||||
![]()
Review
You can generate initial self-signed certs using Ansible Openssl module: Ex:
![]()
Review
This should be:
Since the service gets a hostname assigned by Docker Network. ![]()
Review
Suggest creating a folder:
Which will contain:
That way you have less custom stuff in the nginx.conf |
|||||
|
default_type application/octet-stream; |
||||
![]()
Review
You can generate initial self-signed certs using Ansible Openssl module: Ex:
![]()
Review
This should be:
Since the service gets a hostname assigned by Docker Network. ![]()
Review
Suggest creating a folder:
Which will contain:
That way you have less custom stuff in the nginx.conf |
|||||
|
|
||||
![]()
Review
You can generate initial self-signed certs using Ansible Openssl module: Ex:
![]()
Review
This should be:
Since the service gets a hostname assigned by Docker Network. ![]()
Review
Suggest creating a folder:
Which will contain:
That way you have less custom stuff in the nginx.conf |
|||||
|
### SSL Settings for all servers (https://ssl-config.mozilla.org/#server=nginx&server-version=1.17.2&config=intermediate) |
||||
![]()
Review
You can generate initial self-signed certs using Ansible Openssl module: Ex:
![]()
Review
![]()
Review
This should be:
Since the service gets a hostname assigned by Docker Network. ![]()
Review
Suggest creating a folder:
Which will contain:
That way you have less custom stuff in the nginx.conf |
|||||
|
# certs sent to the client in SERVER HELLO are concatenated in ssl_certificate |
||||
![]()
Review
You can generate initial self-signed certs using Ansible Openssl module: Ex:
![]()
Review
This should be:
Since the service gets a hostname assigned by Docker Network. ![]()
Review
Suggest creating a folder:
Which will contain:
That way you have less custom stuff in the nginx.conf |
|||||
|
ssl_certificate /etc/nginx/ssl/{{ kuma_domain }}.fullchain.pem; |
||||
![]()
Review
You can generate initial self-signed certs using Ansible Openssl module: Ex:
![]()
Review
This should be:
Since the service gets a hostname assigned by Docker Network. ![]()
Review
Suggest creating a folder:
Which will contain:
That way you have less custom stuff in the nginx.conf |
|||||
|
ssl_certificate_key /etc/nginx/ssl/{{ kuma_domain }}.privkey.pem; |
||||
![]()
Review
You can generate initial self-signed certs using Ansible Openssl module: Ex:
![]()
Review
This should be:
Since the service gets a hostname assigned by Docker Network. ![]()
Review
Suggest creating a folder:
Which will contain:
That way you have less custom stuff in the nginx.conf |
|||||
|
ssl_session_timeout 1d; |
||||
![]()
Review
You can generate initial self-signed certs using Ansible Openssl module: Ex:
![]()
Review
This should be:
Since the service gets a hostname assigned by Docker Network. ![]()
Review
Suggest creating a folder:
Which will contain:
That way you have less custom stuff in the nginx.conf |
|||||
|
ssl_session_cache shared:MozSSL:10m; # about 40000 sessions |
||||
![]()
Review
You can generate initial self-signed certs using Ansible Openssl module: Ex:
![]()
Review
This should be:
Since the service gets a hostname assigned by Docker Network. ![]()
Review
Suggest creating a folder:
Which will contain:
That way you have less custom stuff in the nginx.conf |
|||||
|
ssl_session_tickets off; |
||||
![]()
Review
You can generate initial self-signed certs using Ansible Openssl module: Ex:
![]()
Review
This should be:
Since the service gets a hostname assigned by Docker Network. ![]()
Review
Suggest creating a folder:
Which will contain:
That way you have less custom stuff in the nginx.conf |
|||||
|
|
||||
![]()
Review
You can generate initial self-signed certs using Ansible Openssl module: Ex:
![]()
Review
This should be:
Since the service gets a hostname assigned by Docker Network. ![]()
Review
Suggest creating a folder:
Which will contain:
That way you have less custom stuff in the nginx.conf |
|||||
|
# intermediate configuration |
||||
![]()
Review
You can generate initial self-signed certs using Ansible Openssl module: Ex:
![]()
Review
This should be:
Since the service gets a hostname assigned by Docker Network. ![]()
Review
Suggest creating a folder:
Which will contain:
That way you have less custom stuff in the nginx.conf |
|||||
|
ssl_protocols TLSv1.2 TLSv1.3; |
||||
![]()
Review
You can generate initial self-signed certs using Ansible Openssl module: Ex:
![]()
Review
This should be:
Since the service gets a hostname assigned by Docker Network. ![]()
Review
Suggest creating a folder:
Which will contain:
That way you have less custom stuff in the nginx.conf |
|||||
|
ssl_ciphers ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384; |
||||
![]()
Review
You can generate initial self-signed certs using Ansible Openssl module: Ex:
![]()
Review
This should be:
Since the service gets a hostname assigned by Docker Network. ![]()
Review
Suggest creating a folder:
Which will contain:
That way you have less custom stuff in the nginx.conf |
|||||
|
ssl_prefer_server_ciphers off; |
||||
![]()
Review
You can generate initial self-signed certs using Ansible Openssl module: Ex:
![]()
Review
This should be:
Since the service gets a hostname assigned by Docker Network. ![]()
Review
Suggest creating a folder:
Which will contain:
That way you have less custom stuff in the nginx.conf |
|||||
|
|
||||
![]()
Review
You can generate initial self-signed certs using Ansible Openssl module: Ex:
![]()
Review
This should be:
Since the service gets a hostname assigned by Docker Network. ![]()
Review
Suggest creating a folder:
Which will contain:
That way you have less custom stuff in the nginx.conf |
|||||
|
# curl https://ssl-config.mozilla.org/ffdhe2048.txt > /etc/nginx/ssl/dhparam.pem (TODO: check if it's secure to use others DH parameters!) |
||||
![]()
Review
You can generate initial self-signed certs using Ansible Openssl module: Ex:
![]()
Review
This should be:
Since the service gets a hostname assigned by Docker Network. ![]()
Review
Suggest creating a folder:
Which will contain:
That way you have less custom stuff in the nginx.conf |
|||||
|
# openssl dhparam -out /etc/nginx/ssl/dhparam.pem 4096 |
||||
![]()
Review
You can generate initial self-signed certs using Ansible Openssl module: Ex:
![]()
Review
This should be:
Since the service gets a hostname assigned by Docker Network. ![]()
Review
Suggest creating a folder:
Which will contain:
That way you have less custom stuff in the nginx.conf |
|||||
|
ssl_dhparam /etc/nginx/ssl/dhparam.pem; |
||||
![]()
Review
You can generate initial self-signed certs using Ansible Openssl module: Ex:
![]()
Review
This should be:
Since the service gets a hostname assigned by Docker Network. ![]()
Review
Suggest creating a folder:
Which will contain:
That way you have less custom stuff in the nginx.conf |
|||||
|
|
||||
![]()
Review
You can generate initial self-signed certs using Ansible Openssl module: Ex:
![]()
Review
This should be:
Since the service gets a hostname assigned by Docker Network. ![]()
Review
Suggest creating a folder:
Which will contain:
That way you have less custom stuff in the nginx.conf |
|||||
|
# HSTS (ngx_http_headers_module is required) (63072000 seconds) |
||||
![]()
Review
You can generate initial self-signed certs using Ansible Openssl module: Ex:
![]()
Review
This should be:
Since the service gets a hostname assigned by Docker Network. ![]()
Review
Suggest creating a folder:
Which will contain:
That way you have less custom stuff in the nginx.conf |
|||||
|
add_header Strict-Transport-Security "max-age=63072000" always; |
||||
![]()
Review
You can generate initial self-signed certs using Ansible Openssl module: Ex:
![]()
Review
This should be:
Since the service gets a hostname assigned by Docker Network. ![]()
Review
Suggest creating a folder:
Which will contain:
That way you have less custom stuff in the nginx.conf |
|||||
|
|
||||
![]()
Review
You can generate initial self-signed certs using Ansible Openssl module: Ex:
![]()
Review
This should be:
Since the service gets a hostname assigned by Docker Network. ![]()
Review
Suggest creating a folder:
Which will contain:
That way you have less custom stuff in the nginx.conf |
|||||
|
# OCSP stapling |
||||
![]()
Review
You can generate initial self-signed certs using Ansible Openssl module: Ex:
![]()
Review
This should be:
Since the service gets a hostname assigned by Docker Network. ![]()
Review
Suggest creating a folder:
Which will contain:
That way you have less custom stuff in the nginx.conf |
|||||
|
ssl_stapling on; |
||||
![]()
Review
You can generate initial self-signed certs using Ansible Openssl module: Ex:
![]()
Review
This should be:
Since the service gets a hostname assigned by Docker Network. ![]()
Review
Suggest creating a folder:
Which will contain:
That way you have less custom stuff in the nginx.conf |
|||||
|
ssl_stapling_verify on; |
||||
![]()
Review
You can generate initial self-signed certs using Ansible Openssl module: Ex:
![]()
Review
This should be:
Since the service gets a hostname assigned by Docker Network. ![]()
Review
Suggest creating a folder:
Which will contain:
That way you have less custom stuff in the nginx.conf |
|||||
|
|
||||
![]()
Review
You can generate initial self-signed certs using Ansible Openssl module: Ex:
![]()
Review
This should be:
Since the service gets a hostname assigned by Docker Network. ![]()
Review
Suggest creating a folder:
Which will contain:
That way you have less custom stuff in the nginx.conf |
|||||
|
log_format main '$remote_addr - $remote_user [$time_local] "$request_method $scheme://$host$request_uri $server_protocol" $status $body_bytes_sent ' |
||||
![]()
Review
You can generate initial self-signed certs using Ansible Openssl module: Ex:
![]()
Review
This should be:
Since the service gets a hostname assigned by Docker Network. ![]()
Review
Suggest creating a folder:
Which will contain:
That way you have less custom stuff in the nginx.conf |
|||||
|
'"$http_referer" "$http_user_agent" $request_time $upstream_response_time UPA:$upstream_addr BYS:$bytes_sent BYR:$request_length'; |
||||
![]()
Review
You can generate initial self-signed certs using Ansible Openssl module: Ex:
![]()
Review
This should be:
Since the service gets a hostname assigned by Docker Network. ![]()
Review
Suggest creating a folder:
Which will contain:
That way you have less custom stuff in the nginx.conf |
|||||
|
access_log /var/log/nginx/access.log main; |
||||
![]()
Review
You can generate initial self-signed certs using Ansible Openssl module: Ex:
![]()
Review
This should be:
Since the service gets a hostname assigned by Docker Network. ![]()
Review
Suggest creating a folder:
Which will contain:
That way you have less custom stuff in the nginx.conf |
|||||
|
|
||||
![]()
Review
You can generate initial self-signed certs using Ansible Openssl module: Ex:
![]()
Review
This should be:
Since the service gets a hostname assigned by Docker Network. ![]()
Review
Suggest creating a folder:
Which will contain:
That way you have less custom stuff in the nginx.conf |
|||||
|
### Set additional headers to be send to upstream |
||||
![]()
Review
You can generate initial self-signed certs using Ansible Openssl module: Ex:
![]()
Review
This should be:
Since the service gets a hostname assigned by Docker Network. ![]()
Review
Suggest creating a folder:
Which will contain:
That way you have less custom stuff in the nginx.conf |
|||||
|
proxy_set_header Host $http_host; |
||||
![]()
Review
You can generate initial self-signed certs using Ansible Openssl module: Ex:
![]()
Review
This should be:
Since the service gets a hostname assigned by Docker Network. ![]()
Review
Suggest creating a folder:
Which will contain:
That way you have less custom stuff in the nginx.conf |
|||||
|
proxy_set_header X-Real-IP $remote_addr; |
||||
![]()
Review
You can generate initial self-signed certs using Ansible Openssl module: Ex:
![]()
Review
This should be:
Since the service gets a hostname assigned by Docker Network. ![]()
Review
Suggest creating a folder:
Which will contain:
That way you have less custom stuff in the nginx.conf |
|||||
|
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; |
||||
![]()
Review
You can generate initial self-signed certs using Ansible Openssl module: Ex:
![]()
Review
This should be:
Since the service gets a hostname assigned by Docker Network. ![]()
Review
Suggest creating a folder:
Which will contain:
That way you have less custom stuff in the nginx.conf |
|||||
|
proxy_set_header X-Forwarded-Proto $scheme; |
||||
![]()
Review
You can generate initial self-signed certs using Ansible Openssl module: Ex:
![]()
Review
This should be:
Since the service gets a hostname assigned by Docker Network. ![]()
Review
Suggest creating a folder:
Which will contain:
That way you have less custom stuff in the nginx.conf |
|||||
|
|
||||
![]()
Review
You can generate initial self-signed certs using Ansible Openssl module: Ex:
![]()
Review
This should be:
Since the service gets a hostname assigned by Docker Network. ![]()
Review
Suggest creating a folder:
Which will contain:
That way you have less custom stuff in the nginx.conf |
|||||
|
# Remove Headers that gonna be sent to client |
||||
![]()
Review
You can generate initial self-signed certs using Ansible Openssl module: Ex:
![]()
Review
![]()
Review
This should be:
Since the service gets a hostname assigned by Docker Network. ![]()
Review
Suggest creating a folder:
Which will contain:
That way you have less custom stuff in the nginx.conf |
|||||
|
proxy_hide_header X-Powered-By; |
||||
![]()
Review
You can generate initial self-signed certs using Ansible Openssl module: Ex:
![]()
Review
This should be:
Since the service gets a hostname assigned by Docker Network. ![]()
Review
Suggest creating a folder:
Which will contain:
That way you have less custom stuff in the nginx.conf |
|||||
|
proxy_hide_header Server; |
||||
![]()
Review
You can generate initial self-signed certs using Ansible Openssl module: Ex:
![]()
Review
This should be:
Since the service gets a hostname assigned by Docker Network. ![]()
Review
Suggest creating a folder:
Which will contain:
That way you have less custom stuff in the nginx.conf |
|||||
|
|
||||
![]()
Review
You can generate initial self-signed certs using Ansible Openssl module: Ex:
![]()
Review
This should be:
Since the service gets a hostname assigned by Docker Network. ![]()
Review
Suggest creating a folder:
Which will contain:
That way you have less custom stuff in the nginx.conf |
|||||
|
# Redirect HTTP request to HTTPS |
||||
![]()
Review
You can generate initial self-signed certs using Ansible Openssl module: Ex:
![]()
Review
This should be:
Since the service gets a hostname assigned by Docker Network. ![]()
Review
Suggest creating a folder:
Which will contain:
That way you have less custom stuff in the nginx.conf |
|||||
|
server { |
||||
![]()
Review
You can generate initial self-signed certs using Ansible Openssl module: Ex:
![]()
Review
This should be:
Since the service gets a hostname assigned by Docker Network. ![]()
Review
Suggest creating a folder:
Which will contain:
That way you have less custom stuff in the nginx.conf |
|||||
|
listen 80 default_server; |
||||
![]()
Review
You can generate initial self-signed certs using Ansible Openssl module: Ex:
![]()
Review
This should be:
Since the service gets a hostname assigned by Docker Network. ![]()
Review
Suggest creating a folder:
Which will contain:
That way you have less custom stuff in the nginx.conf |
|||||
|
server_name {{ kuma_domain }}; |
||||
![]()
Review
You can generate initial self-signed certs using Ansible Openssl module: Ex:
![]()
Review
This should be:
Since the service gets a hostname assigned by Docker Network. ![]()
Review
Suggest creating a folder:
Which will contain:
That way you have less custom stuff in the nginx.conf |
|||||
|
return 302 https://$host$request_uri; |
||||
![]()
Review
You can generate initial self-signed certs using Ansible Openssl module: Ex:
![]()
Review
This should be:
Since the service gets a hostname assigned by Docker Network. ![]()
Review
Suggest creating a folder:
Which will contain:
That way you have less custom stuff in the nginx.conf |
|||||
|
} |
||||
![]()
Review
You can generate initial self-signed certs using Ansible Openssl module: Ex:
![]()
Review
This should be:
Since the service gets a hostname assigned by Docker Network. ![]()
Review
Suggest creating a folder:
Which will contain:
That way you have less custom stuff in the nginx.conf |
|||||
|
|
||||
![]()
Review
You can generate initial self-signed certs using Ansible Openssl module: Ex:
![]()
Review
This should be:
Since the service gets a hostname assigned by Docker Network. ![]()
Review
Suggest creating a folder:
Which will contain:
That way you have less custom stuff in the nginx.conf |
|||||
|
server { |
||||
![]()
Review
You can generate initial self-signed certs using Ansible Openssl module: Ex:
![]()
Review
This should be:
Since the service gets a hostname assigned by Docker Network. ![]()
Review
Suggest creating a folder:
Which will contain:
That way you have less custom stuff in the nginx.conf |
|||||
|
server_name {{ kuma_domain }}; |
||||
![]()
Review
You can generate initial self-signed certs using Ansible Openssl module: Ex:
![]()
Review
This should be:
Since the service gets a hostname assigned by Docker Network. ![]()
Review
Suggest creating a folder:
Which will contain:
That way you have less custom stuff in the nginx.conf |
|||||
|
listen 443 ssl http2 default_server; |
||||
![]()
Review
You can generate initial self-signed certs using Ansible Openssl module: Ex:
![]()
Review
This should be:
Since the service gets a hostname assigned by Docker Network. ![]()
Review
Suggest creating a folder:
Which will contain:
That way you have less custom stuff in the nginx.conf |
|||||
|
|
||||
![]()
Review
You can generate initial self-signed certs using Ansible Openssl module: Ex:
![]()
Review
This should be:
Since the service gets a hostname assigned by Docker Network. ![]()
Review
Suggest creating a folder:
Which will contain:
That way you have less custom stuff in the nginx.conf |
|||||
|
access_log /var/log/nginx/{{ kuma_domain }}.access.log main; |
||||
![]()
Review
You can generate initial self-signed certs using Ansible Openssl module: Ex:
![]()
Review
This should be:
Since the service gets a hostname assigned by Docker Network. ![]()
Review
Suggest creating a folder:
Which will contain:
That way you have less custom stuff in the nginx.conf |
|||||
|
error_log /var/log/nginx/{{ kuma_domain }}.error.log; |
||||
![]()
Review
You can generate initial self-signed certs using Ansible Openssl module: Ex:
![]()
Review
This should be:
Since the service gets a hostname assigned by Docker Network. ![]()
Review
Suggest creating a folder:
Which will contain:
That way you have less custom stuff in the nginx.conf |
|||||
|
|
||||
![]()
Review
You can generate initial self-signed certs using Ansible Openssl module: Ex:
![]()
Review
This should be:
Since the service gets a hostname assigned by Docker Network. ![]()
Review
Suggest creating a folder:
Which will contain:
That way you have less custom stuff in the nginx.conf |
|||||
|
location / { |
||||
![]()
Review
You can generate initial self-signed certs using Ansible Openssl module: Ex:
![]()
Review
This should be:
Since the service gets a hostname assigned by Docker Network. ![]()
Review
Suggest creating a folder:
Which will contain:
That way you have less custom stuff in the nginx.conf |
|||||
|
# rewrite ^/(.*)/$ /$1 permanent; |
||||
![]()
Review
You can generate initial self-signed certs using Ansible Openssl module: Ex:
![]()
Review
This should be:
Since the service gets a hostname assigned by Docker Network. ![]()
Review
Suggest creating a folder:
Which will contain:
That way you have less custom stuff in the nginx.conf |
|||||
|
### redirect urls with trailing slash to non-trailing slash |
||||
![]()
Review
You can generate initial self-signed certs using Ansible Openssl module: Ex:
![]()
Review
This should be:
Since the service gets a hostname assigned by Docker Network. ![]()
Review
Suggest creating a folder:
Which will contain:
That way you have less custom stuff in the nginx.conf |
|||||
|
# https://serverfault.dev/questions/597302/removing-the-trailing-slash-from-a-url-with-nginx |
||||
![]()
Review
You can generate initial self-signed certs using Ansible Openssl module: Ex:
![]()
Review
This should be:
Since the service gets a hostname assigned by Docker Network. ![]()
Review
Suggest creating a folder:
Which will contain:
That way you have less custom stuff in the nginx.conf |
|||||
|
# location ~ (?<no_slash>.+)/$ { |
||||
![]()
Review
You can generate initial self-signed certs using Ansible Openssl module: Ex:
![]()
Review
This should be:
Since the service gets a hostname assigned by Docker Network. ![]()
Review
Suggest creating a folder:
Which will contain:
That way you have less custom stuff in the nginx.conf |
|||||
|
# return 302 https://$host$no_slash; |
||||
![]()
Review
You can generate initial self-signed certs using Ansible Openssl module: Ex:
![]()
Review
This should be:
Since the service gets a hostname assigned by Docker Network. ![]()
Review
Suggest creating a folder:
Which will contain:
That way you have less custom stuff in the nginx.conf |
|||||
|
# } |
||||
![]()
Review
You can generate initial self-signed certs using Ansible Openssl module: Ex:
![]()
Review
This should be:
Since the service gets a hostname assigned by Docker Network. ![]()
Review
Suggest creating a folder:
Which will contain:
That way you have less custom stuff in the nginx.conf |
|||||
|
proxy_set_header X-Real-IP $remote_addr; |
||||
![]()
Review
You can generate initial self-signed certs using Ansible Openssl module: Ex:
![]()
Review
This should be:
Since the service gets a hostname assigned by Docker Network. ![]()
Review
Suggest creating a folder:
Which will contain:
That way you have less custom stuff in the nginx.conf |
|||||
|
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; |
||||
![]()
Review
You can generate initial self-signed certs using Ansible Openssl module: Ex:
![]()
Review
This should be:
Since the service gets a hostname assigned by Docker Network. ![]()
Review
Suggest creating a folder:
Which will contain:
That way you have less custom stuff in the nginx.conf |
|||||
|
proxy_pass http://uptime-kuma:3001/; |
||||
![]()
Review
You can generate initial self-signed certs using Ansible Openssl module: Ex:
![]()
Review
This should be:
Since the service gets a hostname assigned by Docker Network. ![]()
Review
Suggest creating a folder:
Which will contain:
That way you have less custom stuff in the nginx.conf |
|||||
|
proxy_http_version 1.1; |
||||
![]()
Review
You can generate initial self-signed certs using Ansible Openssl module: Ex:
![]()
Review
This should be:
Since the service gets a hostname assigned by Docker Network. ![]()
Review
Suggest creating a folder:
Which will contain:
That way you have less custom stuff in the nginx.conf |
|||||
|
proxy_set_header Upgrade $http_upgrade; |
||||
![]()
Review
You can generate initial self-signed certs using Ansible Openssl module: Ex:
![]()
Review
This should be:
Since the service gets a hostname assigned by Docker Network. ![]()
Review
Suggest creating a folder:
Which will contain:
That way you have less custom stuff in the nginx.conf |
|||||
|
proxy_set_header Connection "upgrade"; |
||||
![]()
Review
You can generate initial self-signed certs using Ansible Openssl module: Ex:
![]()
Review
This should be:
Since the service gets a hostname assigned by Docker Network. ![]()
Review
Suggest creating a folder:
Which will contain:
That way you have less custom stuff in the nginx.conf |
|||||
|
} |
||||
![]()
Review
You can generate initial self-signed certs using Ansible Openssl module: Ex:
![]()
Review
This should be:
Since the service gets a hostname assigned by Docker Network. ![]()
Review
Suggest creating a folder:
Which will contain:
That way you have less custom stuff in the nginx.conf |
|||||
|
} |
||||
![]()
Review
You can generate initial self-signed certs using Ansible Openssl module: Ex:
![]()
Review
This should be:
Since the service gets a hostname assigned by Docker Network. ![]()
Review
Suggest creating a folder:
Which will contain:
That way you have less custom stuff in the nginx.conf |
|||||
|
} |
||||
![]()
Review
You can generate initial self-signed certs using Ansible Openssl module: Ex:
![]()
Review
This should be:
Since the service gets a hostname assigned by Docker Network. ![]()
Review
Suggest creating a folder:
Which will contain:
That way you have less custom stuff in the nginx.conf |
@ -0,0 +1,3 @@ |
|||||
|
--- |
||||
|
kuma_image_version: '1' |
||||
|
kuma_image_os: 'debian' |
@ -0,0 +1,23 @@ |
|||||
|
- name: Ensure Volumes & Files directories exists |
||||
|
file: |
||||
|
dest: "{{item}}" |
||||
|
state: directory |
||||
|
loop: |
||||
|
- /compose |
||||
|
- /compose/kuma |
||||
|
- /compose/volumes |
||||
|
- /compose/volumes/kuma |
||||
|
|
||||
|
- name: Ensure docker-compose file has been updated |
||||
|
template: |
||||
|
src: "{{item}}" |
||||
|
dest: /compose/kuma/ |
||||
|
loop: |
||||
|
- docker-compose.yml |
||||
|
|
||||
|
- name: Ensure uptime-kuma is up |
||||
|
community.docker.docker_compose: |
||||
|
state: present |
||||
|
project_src: /compose/kuma |
||||
|
pull: yes |
||||
|
|
@ -0,0 +1,29 @@ |
|||||
![]()
Review
Replace with ![]()
Review
Replace with ![]()
Review
![]()
Review
![]()
Review
This should point to ![]()
Review
This should point to ![]()
Review
Still valid comment ![]()
Review
Still valid comment ![]()
Review
There's not need to use
![]()
Review
There's not need to use
|
|||||
|
version: '3.3' |
||||
![]()
Review
Replace with ![]()
Review
![]()
Review
This should point to ![]()
Review
Still valid comment ![]()
Review
There's not need to use
|
|||||
|
services: |
||||
![]()
Review
Replace with ![]()
Review
![]()
Review
This should point to ![]()
Review
Still valid comment ![]()
Review
There's not need to use
|
|||||
|
uptime-kuma: |
||||
![]()
Review
Replace with ![]()
Review
![]()
Review
This should point to ![]()
Review
Still valid comment ![]()
Review
There's not need to use
![]()
Review
This whole compose file should be merge with the NGINX one. No need to run 2 compose instances if NGINX is only managing traffic for |
|||||
|
restart: always |
||||
![]()
Review
Replace with ![]()
Review
![]()
Review
This should point to ![]()
Review
Still valid comment ![]()
Review
There's not need to use
|
|||||
|
networks: |
||||
![]()
Review
Replace with ![]()
Review
![]()
Review
This should point to ![]()
Review
Still valid comment ![]()
Review
There's not need to use
|
|||||
|
- uptime-kuma |
||||
![]()
Review
Replace with ![]()
Review
![]()
Review
This should point to ![]()
Review
Still valid comment ![]()
Review
There's not need to use
|
|||||
|
expose: |
||||
![]()
Review
Replace with ![]()
Review
![]()
Review
This should point to ![]()
Review
Still valid comment ![]()
Review
There's not need to use
|
|||||
|
- 3001 |
||||
![]()
Review
Replace with ![]()
Review
![]()
Review
This should point to ![]()
Review
Still valid comment ![]()
Review
There's not need to use
|
|||||
|
volumes: |
||||
![]()
Review
Replace with ![]()
Review
![]()
Review
This should point to ![]()
Review
Still valid comment ![]()
Review
There's not need to use
|
|||||
|
- '/compose/volumes/uptime-kuma:/app/data' |
||||
![]()
Review
Replace with ![]()
Review
![]()
Review
This should point to ![]()
Review
Still valid comment ![]()
Review
There's not need to use
|
|||||
|
container_name: uptime-kuma |
||||
![]()
Review
Replace with ![]()
Review
![]()
Review
This should point to ![]()
Review
Still valid comment ![]()
Review
There's not need to use
|
|||||
|
image: 'louislam/uptime-kuma:{{kuma_image_version}}-{{kuma_image_os}}' |
||||
![]()
Review
Replace with ![]()
Review
![]()
Review
This should point to ![]()
Review
Still valid comment ![]()
Review
There's not need to use
|
|||||
|
|
||||
![]()
Review
Replace with ![]()
Review
![]()
Review
This should point to ![]()
Review
Still valid comment ![]()
Review
There's not need to use
|
|||||
|
nginx: |
||||
![]()
Review
Replace with ![]()
Review
![]()
Review
This should point to ![]()
Review
Still valid comment ![]()
Review
There's not need to use
|
|||||
|
ports: |
||||
![]()
Review
Replace with ![]()
Review
![]()
Review
This should point to ![]()
Review
Still valid comment ![]()
Review
There's not need to use
|
|||||
|
- 443:443 |
||||
![]()
Review
Replace with ![]()
Review
![]()
Review
This should point to ![]()
Review
Still valid comment ![]()
Review
There's not need to use
|
|||||
|
- 80:80 |
||||
![]()
Review
Replace with ![]()
Review
![]()
Review
This should point to ![]()
Review
Still valid comment ![]()
Review
There's not need to use
|
|||||
|
networks: |
||||
![]()
Review
Replace with ![]()
Review
![]()
Review
This should point to ![]()
Review
Still valid comment ![]()
Review
There's not need to use
|
|||||
|
- uptime-kuma |
||||
![]()
Review
Replace with ![]()
Review
![]()
Review
This should point to ![]()
Review
Still valid comment ![]()
Review
There's not need to use
|
|||||
|
depends_on: |
||||
![]()
Review
Replace with ![]()
Review
![]()
Review
This should point to ![]()
Review
Still valid comment ![]()
Review
There's not need to use
|
|||||
|
- uptime-kuma |
||||
![]()
Review
Replace with ![]()
Review
![]()
Review
This should point to ![]()
Review
Still valid comment ![]()
Review
There's not need to use
|
|||||
|
restart: always |
||||
![]()
Review
Replace with ![]()
Review
![]()
Review
This should point to ![]()
Review
Still valid comment ![]()
Review
There's not need to use
|
|||||
|
image: nginx:stable-alpine |
||||
![]()
Review
Replace with ![]()
Review
![]()
Review
This should point to ![]()
Review
Still valid comment ![]()
Review
There's not need to use
|
|||||
|
volumes: |
||||
![]()
Review
Replace with ![]()
Review
![]()
Review
This should point to ![]()
Review
Still valid comment ![]()
Review
There's not need to use
|
|||||
|
- '/compose/volumes/nginx/:/etc/nginx/' |
||||
![]()
Review
Replace with ![]()
Review
![]()
Review
This should point to ![]()
Review
Still valid comment ![]()
Review
There's not need to use
|
|||||
|
- '/compose/volumes/nginx/log/{{ kuma_domain }}:/var/log/nginx/{{ kuma_domain }}/' |
||||
![]()
Review
Replace with ![]()
Review
![]()
Review
This should point to ![]()
Review
Still valid comment ![]()
Review
There's not need to use
|
|||||
|
|
||||
![]()
Review
Replace with ![]()
Review
![]()
Review
This should point to ![]()
Review
Still valid comment ![]()
Review
There's not need to use
|
|||||
|
networks: |
||||
![]()
Review
Replace with ![]()
Review
![]()
Review
This should point to ![]()
Review
Still valid comment ![]()
Review
There's not need to use
|
|||||
|
uptime-kuma: |
||||
![]()
Review
Replace with ![]()
Review
![]()
Review
This should point to ![]()
Review
Still valid comment ![]()
Review
There's not need to use
|
docker-compose 2.0.1 is not installable via PIP. They migrated from Python to Golang for v2.x.x