Skip to content
GitLab
Projects
Groups
Snippets
/
Help
Help
Support
Community forum
Keyboard shortcuts
?
Submit feedback
Sign in
Toggle navigation
Menu
Open sidebar
Arch Linux
infrastructure
Commits
39beaa61
Commit
39beaa61
authored
Mar 08, 2018
by
Phillip Smith (fukawi2)
Browse files
add ansible template comment to template files
parent
b1744e69
Changes
82
Hide whitespace changes
Inline
Side-by-side
roles/dbscripts/templates/gen_rsyncd.conf.pl
View file @
39beaa61
#!/usr/bin/env perl
#!/usr/bin/env perl
#
# {{ ansible_managed }}
#
use
strict
;
use
strict
;
use
warnings
;
use
warnings
;
use
DBI
;
use
DBI
;
...
...
roles/dbscripts/templates/nginx.d.conf.j2
View file @
39beaa61
#
# {{ ansible_managed }}
#
server {
server {
listen 80;
listen 80;
listen [::]:80;
listen [::]:80;
...
...
roles/dbscripts/templates/rsyncd.conf.proto.j2
View file @
39beaa61
# DO NOT CHANGE rsync.conf, CHANGE rsync.conf.proto INSTEAD!
#
# {{ ansible_managed }}
#
# DO NOT CHANGE rsync.conf, CHANGE rsync.conf.proto INSTEAD!
# Hosts are managed by archweb, talk to someone that has permission to
# Hosts are managed by archweb, talk to someone that has permission to
# play with mirrors to get new IP addresses added.
# play with mirrors to get new IP addresses added.
...
...
roles/dovecot/templates/dovecot.conf.j2
View file @
39beaa61
#
# {{ ansible_managed }}
#
auth_mechanisms = plain login
auth_mechanisms = plain login
disable_plaintext_auth = yes
disable_plaintext_auth = yes
mail_location = mdbox:~/.mdbox
mail_location = mdbox:~/.mdbox
...
...
roles/dovecot/templates/letsencrypt.hook.d.j2
View file @
39beaa61
#!/bin/sh
#!/bin/sh
#
# {{ ansible_managed }}
#
test
"
$1
"
=
renew
||
exit
0
test
"
$1
"
=
renew
||
exit
0
check_domain
=
"{{ mail_domain }}"
check_domain
=
"{{ mail_domain }}"
...
...
roles/flyspray/templates/flyspray.conf.php.j2
View file @
39beaa61
; <?php die( 'Do not access this page directly.' ); ?>
; <?php die( 'Do not access this page directly.' ); ?>
#
# {{ ansible_managed }}
#
[general]
[general]
cookiesalt="{{ flyspray_cookie_salt }}"
cookiesalt="{{ flyspray_cookie_salt }}"
...
...
roles/flyspray/templates/nginx.d.conf.j2
View file @
39beaa61
#
# {{ ansible_managed }}
#
upstream flyspray {
upstream flyspray {
server unix:///run/php-fpm/flyspray.socket;
server unix:///run/php-fpm/flyspray.socket;
}
}
...
...
roles/flyspray/templates/php-fpm.conf.j2
View file @
39beaa61
#
# {{ ansible_managed }}
#
[global]
[global]
error_log = syslog
error_log = syslog
daemonize = no
daemonize = no
...
...
roles/grafana/templates/nginx.d.conf.j2
View file @
39beaa61
#
# {{ ansible_managed }}
#
upstream grafana {
upstream grafana {
server localhost:3000;
server localhost:3000;
}
}
...
...
roles/kanboard/templates/nginx.d.conf.j2
View file @
39beaa61
#
# {{ ansible_managed }}
#
upstream kanboard {
upstream kanboard {
server unix:///run/php-fpm/kanboard.socket;
server unix:///run/php-fpm/kanboard.socket;
}
}
...
...
roles/mailman/templates/nginx.d.conf.j2
View file @
39beaa61
#
# {{ ansible_managed }}
#
server {
server {
listen 80;
listen 80;
listen [::]:80;
listen [::]:80;
...
...
roles/mariadb/templates/client.cnf.j2
View file @
39beaa61
#
# {{ ansible_managed }}
#
[client]
[client]
user=root
user=root
password={{ mariadb_users.root }}
password={{ mariadb_users.root }}
roles/mariadb/templates/server.cnf.j2
View file @
39beaa61
#
# {{ ansible_managed }}
#
[client]
[client]
port = 3306
port = 3306
socket = /run/mysqld/mysqld.sock
socket = /run/mysqld/mysqld.sock
...
...
roles/mariadb/templates/zabbix_agentd.my.cnf.j2
View file @
39beaa61
#
# {{ ansible_managed }}
#
[client]
[client]
user={{zabbix_agent_mysql_user}}
user={{zabbix_agent_mysql_user}}
password={{mariadb_users.zabbix_agent}}
password={{mariadb_users.zabbix_agent}}
roles/matrix/templates/nginx.d.conf.j2
View file @
39beaa61
#
# {{ ansible_managed }}
#
upstream matrix {
upstream matrix {
server 127.0.0.1:8008;
server 127.0.0.1:8008;
}
}
...
...
roles/nginx/templates/letsencrypt.conf
View file @
39beaa61
#
# {{ ansible_managed }}
#
location
/.
well
-
known
/
acme
-
challenge
{
location
/.
well
-
known
/
acme
-
challenge
{
root
{{
letsencrypt_validation_dir
}};
root
{{
letsencrypt_validation_dir
}};
default_type
"text/plain"
;
default_type
"text/plain"
;
...
...
roles/nginx/templates/nginx-hostname-vhost.conf.j2
View file @
39beaa61
#
# {{ ansible_managed }}
#
server {
server {
listen 80 default_server;
listen 80 default_server;
listen [::]:80 default_server;
listen [::]:80 default_server;
...
...
roles/nginx/templates/nginx.conf.j2
View file @
39beaa61
#
# {{ ansible_managed }}
#
worker_processes auto;
worker_processes auto;
load_module /usr/lib/nginx/modules/ngx_http_brotli_filter_module.so;
load_module /usr/lib/nginx/modules/ngx_http_brotli_filter_module.so;
...
...
roles/nginx/templates/sslsettings.conf
View file @
39beaa61
#
# {{ ansible_managed }}
#
# https://mozilla.github.io/server-side-tls/ssl-config-generator/?server=nginx-1.10.1&openssl=1.0.2&hsts=yes&profile=intermediate
# https://mozilla.github.io/server-side-tls/ssl-config-generator/?server=nginx-1.10.1&openssl=1.0.2&hsts=yes&profile=intermediate
ssl_ciphers
'ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS'
;
ssl_ciphers
'ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS'
;
...
...
roles/patchwork/templates/nginx.d.conf.j2
View file @
39beaa61
#
# {{ ansible_managed }}
#
upstream patchwork {
upstream patchwork {
server unix:///run/uwsgi/patchwork.sock;
server unix:///run/uwsgi/patchwork.sock;
}
}
...
...
Prev
1
2
3
4
5
Next
Write
Preview
Supports
Markdown
0%
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment