Commit 39beaa61 authored by Phillip Smith (fukawi2)'s avatar Phillip Smith (fukawi2)
Browse files

add ansible template comment to template files

parent b1744e69
#!/usr/bin/env perl #!/usr/bin/env perl
#
# {{ ansible_managed }}
#
use strict; use strict;
use warnings; use warnings;
use DBI; use DBI;
......
#
# {{ ansible_managed }}
#
server { server {
listen 80; listen 80;
listen [::]:80; listen [::]:80;
......
#
# {{ ansible_managed }}
#
# DO NOT CHANGE rsync.conf, CHANGE rsync.conf.proto INSTEAD! # DO NOT CHANGE rsync.conf, CHANGE rsync.conf.proto INSTEAD!
# Hosts are managed by archweb, talk to someone that has permission to # Hosts are managed by archweb, talk to someone that has permission to
# play with mirrors to get new IP addresses added. # play with mirrors to get new IP addresses added.
......
#
# {{ ansible_managed }}
#
auth_mechanisms = plain login auth_mechanisms = plain login
disable_plaintext_auth = yes disable_plaintext_auth = yes
mail_location = mdbox:~/.mdbox mail_location = mdbox:~/.mdbox
......
#!/bin/sh #!/bin/sh
#
# {{ ansible_managed }}
#
test "$1" = renew || exit 0 test "$1" = renew || exit 0
check_domain="{{ mail_domain }}" check_domain="{{ mail_domain }}"
......
; <?php die( 'Do not access this page directly.' ); ?> ; <?php die( 'Do not access this page directly.' ); ?>
#
# {{ ansible_managed }}
#
[general] [general]
cookiesalt="{{ flyspray_cookie_salt }}" cookiesalt="{{ flyspray_cookie_salt }}"
......
#
# {{ ansible_managed }}
#
upstream flyspray { upstream flyspray {
server unix:///run/php-fpm/flyspray.socket; server unix:///run/php-fpm/flyspray.socket;
} }
......
#
# {{ ansible_managed }}
#
[global] [global]
error_log = syslog error_log = syslog
daemonize = no daemonize = no
......
#
# {{ ansible_managed }}
#
upstream grafana { upstream grafana {
server localhost:3000; server localhost:3000;
} }
......
#
# {{ ansible_managed }}
#
upstream kanboard { upstream kanboard {
server unix:///run/php-fpm/kanboard.socket; server unix:///run/php-fpm/kanboard.socket;
} }
......
#
# {{ ansible_managed }}
#
server { server {
listen 80; listen 80;
listen [::]:80; listen [::]:80;
......
#
# {{ ansible_managed }}
#
[client] [client]
user=root user=root
password={{ mariadb_users.root }} password={{ mariadb_users.root }}
#
# {{ ansible_managed }}
#
[client] [client]
port = 3306 port = 3306
socket = /run/mysqld/mysqld.sock socket = /run/mysqld/mysqld.sock
......
#
# {{ ansible_managed }}
#
[client] [client]
user={{zabbix_agent_mysql_user}} user={{zabbix_agent_mysql_user}}
password={{mariadb_users.zabbix_agent}} password={{mariadb_users.zabbix_agent}}
#
# {{ ansible_managed }}
#
upstream matrix { upstream matrix {
server 127.0.0.1:8008; server 127.0.0.1:8008;
} }
......
#
# {{ ansible_managed }}
#
location /.well-known/acme-challenge { location /.well-known/acme-challenge {
root {{ letsencrypt_validation_dir }}; root {{ letsencrypt_validation_dir }};
default_type "text/plain"; default_type "text/plain";
......
#
# {{ ansible_managed }}
#
server { server {
listen 80 default_server; listen 80 default_server;
listen [::]:80 default_server; listen [::]:80 default_server;
......
#
# {{ ansible_managed }}
#
worker_processes auto; worker_processes auto;
load_module /usr/lib/nginx/modules/ngx_http_brotli_filter_module.so; load_module /usr/lib/nginx/modules/ngx_http_brotli_filter_module.so;
......
#
# {{ ansible_managed }}
#
# https://mozilla.github.io/server-side-tls/ssl-config-generator/?server=nginx-1.10.1&openssl=1.0.2&hsts=yes&profile=intermediate # https://mozilla.github.io/server-side-tls/ssl-config-generator/?server=nginx-1.10.1&openssl=1.0.2&hsts=yes&profile=intermediate
ssl_ciphers 'ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS'; ssl_ciphers 'ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS';
......
#
# {{ ansible_managed }}
#
upstream patchwork { upstream patchwork {
server unix:///run/uwsgi/patchwork.sock; server unix:///run/uwsgi/patchwork.sock;
} }
......
Supports Markdown
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment