gnunet-svn
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[taler-ansible-taler-exchange] branch master updated: enable SSL properl


From: gnunet
Subject: [taler-ansible-taler-exchange] branch master updated: enable SSL properly
Date: Sun, 22 Dec 2024 20:06:53 +0100

This is an automated email from the git hooks/post-receive script.

grothoff pushed a commit to branch master
in repository ansible-taler-exchange.

The following commit(s) were added to refs/heads/master by this push:
     new b07f3f3  enable SSL properly
b07f3f3 is described below

commit b07f3f380128a6e113d72a634356c0f15106dafb
Author: Christian Grothoff <christian@grothoff.org>
AuthorDate: Sun Dec 22 20:06:50 2024 +0100

    enable SSL properly
---
 roles/auditor/tasks/main.yml                                        | 2 +-
 .../templates/etc/nginx/sites-available/auditor-nginx.conf.j2       | 4 ++--
 roles/challenger/tasks/main.yml                                     | 6 +++---
 .../etc/nginx/sites-available/email-challenger-nginx.conf.j2        | 4 ++--
 .../etc/nginx/sites-available/postal-challenger-nginx.conf.j2       | 4 ++--
 .../etc/nginx/sites-available/sms-challenger-nginx.conf.j2          | 4 ++--
 roles/exchange/tasks/main.yml                                       | 2 +-
 .../templates/etc/nginx/sites-available/exchange-nginx.conf.j2      | 4 ++--
 roles/monitoring/tasks/main.yml                                     | 2 +-
 .../templates/etc/nginx/sites-available/monitoring-nginx.conf.j2    | 4 ++--
 10 files changed, 18 insertions(+), 18 deletions(-)

diff --git a/roles/auditor/tasks/main.yml b/roles/auditor/tasks/main.yml
index 7c058f4..c581b03 100644
--- a/roles/auditor/tasks/main.yml
+++ b/roles/auditor/tasks/main.yml
@@ -65,7 +65,7 @@
     certbot_create_if_missing: true
     certbot_create_extra_args:
     certbot_hsts: false
-    certbot_testmode: true
+    certbot_testmode: false
     certbot_admin_email: "admin@{{ DOMAIN_NAME }}"
     certbot_keep_updated: true
     certbot_script: letsencrypt
diff --git 
a/roles/auditor/templates/etc/nginx/sites-available/auditor-nginx.conf.j2 
b/roles/auditor/templates/etc/nginx/sites-available/auditor-nginx.conf.j2
index 451b128..b2d7230 100644
--- a/roles/auditor/templates/etc/nginx/sites-available/auditor-nginx.conf.j2
+++ b/roles/auditor/templates/etc/nginx/sites-available/auditor-nginx.conf.j2
@@ -1,7 +1,7 @@
 server {
 
-  listen 443;
-  listen [::]:443;
+  listen 443 ssl;
+  listen [::]:443 ssl;
 
   # Do not identify as nginx
   server_tokens off;
diff --git a/roles/challenger/tasks/main.yml b/roles/challenger/tasks/main.yml
index c700073..d4afa77 100644
--- a/roles/challenger/tasks/main.yml
+++ b/roles/challenger/tasks/main.yml
@@ -302,7 +302,7 @@
     certbot_create_if_missing: true
     certbot_create_extra_args:
     certbot_hsts: false
-    certbot_testmode: true
+    certbot_testmode: false
     certbot_admin_email: "admin@{{ DOMAIN_NAME }}"
     certbot_keep_updated: true
     certbot_script: letsencrypt
@@ -325,7 +325,7 @@
     certbot_create_if_missing: true
     certbot_create_extra_args:
     certbot_hsts: false
-    certbot_testmode: true
+    certbot_testmode: false
     certbot_admin_email: "admin@{{ DOMAIN_NAME }}"
     certbot_keep_updated: true
     certbot_script: letsencrypt
@@ -349,7 +349,7 @@
     certbot_create_if_missing: true
     certbot_create_extra_args:
     certbot_hsts: false
-    certbot_testmode: true
+    certbot_testmode: false
     certbot_admin_postal: "admin@{{ DOMAIN_NAME }}"
     certbot_keep_updated: true
     certbot_script: letsencrypt
diff --git 
a/roles/challenger/templates/etc/nginx/sites-available/email-challenger-nginx.conf.j2
 
b/roles/challenger/templates/etc/nginx/sites-available/email-challenger-nginx.conf.j2
index 1944cd2..9b8d444 100644
--- 
a/roles/challenger/templates/etc/nginx/sites-available/email-challenger-nginx.conf.j2
+++ 
b/roles/challenger/templates/etc/nginx/sites-available/email-challenger-nginx.conf.j2
@@ -1,7 +1,7 @@
 server {
 
-  listen 443;
-  listen [::]:443;
+  listen 443 ssl;
+  listen [::]:443 ssl;
 
   # Do not identify as nginx
   server_tokens off;
diff --git 
a/roles/challenger/templates/etc/nginx/sites-available/postal-challenger-nginx.conf.j2
 
b/roles/challenger/templates/etc/nginx/sites-available/postal-challenger-nginx.conf.j2
index ccd7f19..6a032e3 100644
--- 
a/roles/challenger/templates/etc/nginx/sites-available/postal-challenger-nginx.conf.j2
+++ 
b/roles/challenger/templates/etc/nginx/sites-available/postal-challenger-nginx.conf.j2
@@ -1,7 +1,7 @@
 server {
 
-  listen 443;
-  listen [::]:443;
+  listen 443 ssl;
+  listen [::]:443 ssl;
 
   # Do not identify as nginx
   server_tokens off;
diff --git 
a/roles/challenger/templates/etc/nginx/sites-available/sms-challenger-nginx.conf.j2
 
b/roles/challenger/templates/etc/nginx/sites-available/sms-challenger-nginx.conf.j2
index aff062f..00f0488 100644
--- 
a/roles/challenger/templates/etc/nginx/sites-available/sms-challenger-nginx.conf.j2
+++ 
b/roles/challenger/templates/etc/nginx/sites-available/sms-challenger-nginx.conf.j2
@@ -1,7 +1,7 @@
 server {
 
-  listen 443;
-  listen [::]:443;
+  listen 443 ssl;
+  listen [::]:443 ssl;
 
   # Do not identify as nginx
   server_tokens off;
diff --git a/roles/exchange/tasks/main.yml b/roles/exchange/tasks/main.yml
index 1bf4441..f937f13 100644
--- a/roles/exchange/tasks/main.yml
+++ b/roles/exchange/tasks/main.yml
@@ -49,7 +49,7 @@
     certbot_create_if_missing: true
     certbot_create_extra_args:
     certbot_hsts: false
-    certbot_testmode: true
+    certbot_testmode: false
     certbot_admin_email: "admin@{{ DOMAIN_NAME }}"
     certbot_keep_updated: true
     certbot_script: letsencrypt
diff --git 
a/roles/exchange/templates/etc/nginx/sites-available/exchange-nginx.conf.j2 
b/roles/exchange/templates/etc/nginx/sites-available/exchange-nginx.conf.j2
index f8f98cb..8d6515a 100644
--- a/roles/exchange/templates/etc/nginx/sites-available/exchange-nginx.conf.j2
+++ b/roles/exchange/templates/etc/nginx/sites-available/exchange-nginx.conf.j2
@@ -1,7 +1,7 @@
 server {
 
-  listen 443;
-  listen [::]:443;
+  listen 443 ssl;
+  listen [::]:443 ssl;
 
   # Do not identify as nginx
   server_tokens off;
diff --git a/roles/monitoring/tasks/main.yml b/roles/monitoring/tasks/main.yml
index 674f664..7fc766d 100644
--- a/roles/monitoring/tasks/main.yml
+++ b/roles/monitoring/tasks/main.yml
@@ -62,7 +62,7 @@
     certbot_create_if_missing: true
     certbot_create_extra_args:
     certbot_hsts: false
-    certbot_testmode: true
+    certbot_testmode: false
     certbot_admin_email: "admin@{{ DOMAIN_NAME }}"
     certbot_keep_updated: true
     certbot_script: letsencrypt
diff --git 
a/roles/monitoring/templates/etc/nginx/sites-available/monitoring-nginx.conf.j2 
b/roles/monitoring/templates/etc/nginx/sites-available/monitoring-nginx.conf.j2
index ff067df..5b3746f 100644
--- 
a/roles/monitoring/templates/etc/nginx/sites-available/monitoring-nginx.conf.j2
+++ 
b/roles/monitoring/templates/etc/nginx/sites-available/monitoring-nginx.conf.j2
@@ -1,7 +1,7 @@
 server {
 
-  listen 443;
-  listen [::]:443;
+  listen 443 ssl;
+  listen [::]:443 ssl;
 
   # Do not identify as nginx
   server_tokens off;

-- 
To stop receiving notification emails like this one, please contact
gnunet@gnunet.org.



reply via email to

[Prev in Thread] Current Thread [Next in Thread]