51312b8250
As suggested in #63 (Github issue), splitting the playbook's logic into multiple roles will be beneficial for maintainability. This patch realizes this split. Still, some components affect others, so the roles are not really independent of one another. For example: - disabling mxisd (`matrix_mxisd_enabled: false`), causes Synapse and riot-web to reconfigure themselves with other (public) Identity servers. - enabling matrix-corporal (`matrix_corporal_enabled: true`) affects how reverse-proxying (by `matrix-nginx-proxy`) is done, in order to put matrix-corporal's gateway server in front of Synapse We may be able to move away from such dependencies in the future, at the expense of a more complicated manual configuration, but it's probably not worth sacrificing the convenience we have now. As part of this work, the way we do "start components" has been redone now to use a loop, as suggested in #65 (Github issue). This should make restarting faster and more reliable.
40 lines
1.5 KiB
YAML
40 lines
1.5 KiB
YAML
---
|
|
|
|
- set_fact:
|
|
matrix_ssl_certificate_csr_path: "{{ matrix_ssl_config_dir_path }}/live/{{ domain_name }}/csr.csr"
|
|
matrix_ssl_certificate_cert_path: "{{ matrix_ssl_config_dir_path }}/live/{{ domain_name }}/fullchain.pem"
|
|
matrix_ssl_certificate_cert_key_path: "{{ matrix_ssl_config_dir_path }}/live/{{ domain_name }}/privkey.pem"
|
|
|
|
- name: Check if SSL certificate file exists
|
|
stat:
|
|
path: "{{ matrix_ssl_certificate_cert_path }}"
|
|
register: matrix_ssl_certificate_cert_path_stat_result
|
|
|
|
# In order to do any sort of generation (below), we need to ensure the directory exists first
|
|
- name: Ensure SSL certificate directory exists
|
|
file:
|
|
path: "{{ matrix_ssl_certificate_csr_path|dirname }}"
|
|
state: directory
|
|
mode: 0750
|
|
owner: "{{ matrix_user_username }}"
|
|
group: "{{ matrix_user_username }}"
|
|
when: "not matrix_ssl_certificate_cert_path_stat_result.stat.exists"
|
|
|
|
# The proper way to do this is by using a sequence of
|
|
# `openssl_privatekey`, `openssl_csr` and `openssl_certificate`.
|
|
#
|
|
# Unfortunately, `openssl_csr` and `openssl_certificate` require `PyOpenSSL>=0.15` to work,
|
|
# which is not available on CentOS 7 (at least).
|
|
#
|
|
# We'll do it in a more manual way.
|
|
- name: Generate SSL certificate
|
|
command: |
|
|
openssl req -x509 \
|
|
-sha256 \
|
|
-newkey rsa:4096 \
|
|
-nodes \
|
|
-subj "/CN={{ domain_name }}" \
|
|
-keyout {{ matrix_ssl_certificate_cert_key_path }} \
|
|
-out {{ matrix_ssl_certificate_cert_path }} \
|
|
-days 3650
|
|
when: "not matrix_ssl_certificate_cert_path_stat_result.stat.exists" |