[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[taler-ansible-taler-exchange] branch master updated: enable SSL properl
From: |
gnunet |
Subject: |
[taler-ansible-taler-exchange] branch master updated: enable SSL properly |
Date: |
Sun, 22 Dec 2024 20:06:53 +0100 |
This is an automated email from the git hooks/post-receive script.
grothoff pushed a commit to branch master
in repository ansible-taler-exchange.
The following commit(s) were added to refs/heads/master by this push:
new b07f3f3 enable SSL properly
b07f3f3 is described below
commit b07f3f380128a6e113d72a634356c0f15106dafb
Author: Christian Grothoff <christian@grothoff.org>
AuthorDate: Sun Dec 22 20:06:50 2024 +0100
enable SSL properly
---
roles/auditor/tasks/main.yml | 2 +-
.../templates/etc/nginx/sites-available/auditor-nginx.conf.j2 | 4 ++--
roles/challenger/tasks/main.yml | 6 +++---
.../etc/nginx/sites-available/email-challenger-nginx.conf.j2 | 4 ++--
.../etc/nginx/sites-available/postal-challenger-nginx.conf.j2 | 4 ++--
.../etc/nginx/sites-available/sms-challenger-nginx.conf.j2 | 4 ++--
roles/exchange/tasks/main.yml | 2 +-
.../templates/etc/nginx/sites-available/exchange-nginx.conf.j2 | 4 ++--
roles/monitoring/tasks/main.yml | 2 +-
.../templates/etc/nginx/sites-available/monitoring-nginx.conf.j2 | 4 ++--
10 files changed, 18 insertions(+), 18 deletions(-)
diff --git a/roles/auditor/tasks/main.yml b/roles/auditor/tasks/main.yml
index 7c058f4..c581b03 100644
--- a/roles/auditor/tasks/main.yml
+++ b/roles/auditor/tasks/main.yml
@@ -65,7 +65,7 @@
certbot_create_if_missing: true
certbot_create_extra_args:
certbot_hsts: false
- certbot_testmode: true
+ certbot_testmode: false
certbot_admin_email: "admin@{{ DOMAIN_NAME }}"
certbot_keep_updated: true
certbot_script: letsencrypt
diff --git
a/roles/auditor/templates/etc/nginx/sites-available/auditor-nginx.conf.j2
b/roles/auditor/templates/etc/nginx/sites-available/auditor-nginx.conf.j2
index 451b128..b2d7230 100644
--- a/roles/auditor/templates/etc/nginx/sites-available/auditor-nginx.conf.j2
+++ b/roles/auditor/templates/etc/nginx/sites-available/auditor-nginx.conf.j2
@@ -1,7 +1,7 @@
server {
- listen 443;
- listen [::]:443;
+ listen 443 ssl;
+ listen [::]:443 ssl;
# Do not identify as nginx
server_tokens off;
diff --git a/roles/challenger/tasks/main.yml b/roles/challenger/tasks/main.yml
index c700073..d4afa77 100644
--- a/roles/challenger/tasks/main.yml
+++ b/roles/challenger/tasks/main.yml
@@ -302,7 +302,7 @@
certbot_create_if_missing: true
certbot_create_extra_args:
certbot_hsts: false
- certbot_testmode: true
+ certbot_testmode: false
certbot_admin_email: "admin@{{ DOMAIN_NAME }}"
certbot_keep_updated: true
certbot_script: letsencrypt
@@ -325,7 +325,7 @@
certbot_create_if_missing: true
certbot_create_extra_args:
certbot_hsts: false
- certbot_testmode: true
+ certbot_testmode: false
certbot_admin_email: "admin@{{ DOMAIN_NAME }}"
certbot_keep_updated: true
certbot_script: letsencrypt
@@ -349,7 +349,7 @@
certbot_create_if_missing: true
certbot_create_extra_args:
certbot_hsts: false
- certbot_testmode: true
+ certbot_testmode: false
certbot_admin_postal: "admin@{{ DOMAIN_NAME }}"
certbot_keep_updated: true
certbot_script: letsencrypt
diff --git
a/roles/challenger/templates/etc/nginx/sites-available/email-challenger-nginx.conf.j2
b/roles/challenger/templates/etc/nginx/sites-available/email-challenger-nginx.conf.j2
index 1944cd2..9b8d444 100644
---
a/roles/challenger/templates/etc/nginx/sites-available/email-challenger-nginx.conf.j2
+++
b/roles/challenger/templates/etc/nginx/sites-available/email-challenger-nginx.conf.j2
@@ -1,7 +1,7 @@
server {
- listen 443;
- listen [::]:443;
+ listen 443 ssl;
+ listen [::]:443 ssl;
# Do not identify as nginx
server_tokens off;
diff --git
a/roles/challenger/templates/etc/nginx/sites-available/postal-challenger-nginx.conf.j2
b/roles/challenger/templates/etc/nginx/sites-available/postal-challenger-nginx.conf.j2
index ccd7f19..6a032e3 100644
---
a/roles/challenger/templates/etc/nginx/sites-available/postal-challenger-nginx.conf.j2
+++
b/roles/challenger/templates/etc/nginx/sites-available/postal-challenger-nginx.conf.j2
@@ -1,7 +1,7 @@
server {
- listen 443;
- listen [::]:443;
+ listen 443 ssl;
+ listen [::]:443 ssl;
# Do not identify as nginx
server_tokens off;
diff --git
a/roles/challenger/templates/etc/nginx/sites-available/sms-challenger-nginx.conf.j2
b/roles/challenger/templates/etc/nginx/sites-available/sms-challenger-nginx.conf.j2
index aff062f..00f0488 100644
---
a/roles/challenger/templates/etc/nginx/sites-available/sms-challenger-nginx.conf.j2
+++
b/roles/challenger/templates/etc/nginx/sites-available/sms-challenger-nginx.conf.j2
@@ -1,7 +1,7 @@
server {
- listen 443;
- listen [::]:443;
+ listen 443 ssl;
+ listen [::]:443 ssl;
# Do not identify as nginx
server_tokens off;
diff --git a/roles/exchange/tasks/main.yml b/roles/exchange/tasks/main.yml
index 1bf4441..f937f13 100644
--- a/roles/exchange/tasks/main.yml
+++ b/roles/exchange/tasks/main.yml
@@ -49,7 +49,7 @@
certbot_create_if_missing: true
certbot_create_extra_args:
certbot_hsts: false
- certbot_testmode: true
+ certbot_testmode: false
certbot_admin_email: "admin@{{ DOMAIN_NAME }}"
certbot_keep_updated: true
certbot_script: letsencrypt
diff --git
a/roles/exchange/templates/etc/nginx/sites-available/exchange-nginx.conf.j2
b/roles/exchange/templates/etc/nginx/sites-available/exchange-nginx.conf.j2
index f8f98cb..8d6515a 100644
--- a/roles/exchange/templates/etc/nginx/sites-available/exchange-nginx.conf.j2
+++ b/roles/exchange/templates/etc/nginx/sites-available/exchange-nginx.conf.j2
@@ -1,7 +1,7 @@
server {
- listen 443;
- listen [::]:443;
+ listen 443 ssl;
+ listen [::]:443 ssl;
# Do not identify as nginx
server_tokens off;
diff --git a/roles/monitoring/tasks/main.yml b/roles/monitoring/tasks/main.yml
index 674f664..7fc766d 100644
--- a/roles/monitoring/tasks/main.yml
+++ b/roles/monitoring/tasks/main.yml
@@ -62,7 +62,7 @@
certbot_create_if_missing: true
certbot_create_extra_args:
certbot_hsts: false
- certbot_testmode: true
+ certbot_testmode: false
certbot_admin_email: "admin@{{ DOMAIN_NAME }}"
certbot_keep_updated: true
certbot_script: letsencrypt
diff --git
a/roles/monitoring/templates/etc/nginx/sites-available/monitoring-nginx.conf.j2
b/roles/monitoring/templates/etc/nginx/sites-available/monitoring-nginx.conf.j2
index ff067df..5b3746f 100644
---
a/roles/monitoring/templates/etc/nginx/sites-available/monitoring-nginx.conf.j2
+++
b/roles/monitoring/templates/etc/nginx/sites-available/monitoring-nginx.conf.j2
@@ -1,7 +1,7 @@
server {
- listen 443;
- listen [::]:443;
+ listen 443 ssl;
+ listen [::]:443 ssl;
# Do not identify as nginx
server_tokens off;
--
To stop receiving notification emails like this one, please contact
gnunet@gnunet.org.
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- [taler-ansible-taler-exchange] branch master updated: enable SSL properly,
gnunet <=