Skip to content
GitLab
Projects
Groups
Snippets
/
Help
Help
Support
Community forum
Keyboard shortcuts
?
Submit feedback
Sign in
Toggle navigation
Menu
Open sidebar
Arch Linux
infrastructure
Commits
39beaa61
Commit
39beaa61
authored
Mar 08, 2018
by
Phillip Smith (fukawi2)
Browse files
add ansible template comment to template files
parent
b1744e69
Changes
82
Show whitespace changes
Inline
Side-by-side
roles/dbscripts/templates/gen_rsyncd.conf.pl
View file @
39beaa61
#!/usr/bin/env perl
#
# {{ ansible_managed }}
#
use
strict
;
use
warnings
;
use
DBI
;
...
...
roles/dbscripts/templates/nginx.d.conf.j2
View file @
39beaa61
#
# {{ ansible_managed }}
#
server {
listen 80;
listen [::]:80;
...
...
roles/dbscripts/templates/rsyncd.conf.proto.j2
View file @
39beaa61
#
# {{ ansible_managed }}
#
# DO NOT CHANGE rsync.conf, CHANGE rsync.conf.proto INSTEAD!
# Hosts are managed by archweb, talk to someone that has permission to
# play with mirrors to get new IP addresses added.
...
...
roles/dovecot/templates/dovecot.conf.j2
View file @
39beaa61
#
# {{ ansible_managed }}
#
auth_mechanisms = plain login
disable_plaintext_auth = yes
mail_location = mdbox:~/.mdbox
...
...
roles/dovecot/templates/letsencrypt.hook.d.j2
View file @
39beaa61
#!/bin/sh
#
# {{ ansible_managed }}
#
test
"
$1
"
=
renew
||
exit
0
check_domain
=
"{{ mail_domain }}"
...
...
roles/flyspray/templates/flyspray.conf.php.j2
View file @
39beaa61
; <?php die( 'Do not access this page directly.' ); ?>
#
# {{ ansible_managed }}
#
[general]
cookiesalt="{{ flyspray_cookie_salt }}"
...
...
roles/flyspray/templates/nginx.d.conf.j2
View file @
39beaa61
#
# {{ ansible_managed }}
#
upstream flyspray {
server unix:///run/php-fpm/flyspray.socket;
}
...
...
roles/flyspray/templates/php-fpm.conf.j2
View file @
39beaa61
#
# {{ ansible_managed }}
#
[global]
error_log = syslog
daemonize = no
...
...
roles/grafana/templates/nginx.d.conf.j2
View file @
39beaa61
#
# {{ ansible_managed }}
#
upstream grafana {
server localhost:3000;
}
...
...
roles/kanboard/templates/nginx.d.conf.j2
View file @
39beaa61
#
# {{ ansible_managed }}
#
upstream kanboard {
server unix:///run/php-fpm/kanboard.socket;
}
...
...
roles/mailman/templates/nginx.d.conf.j2
View file @
39beaa61
#
# {{ ansible_managed }}
#
server {
listen 80;
listen [::]:80;
...
...
roles/mariadb/templates/client.cnf.j2
View file @
39beaa61
#
# {{ ansible_managed }}
#
[client]
user=root
password={{ mariadb_users.root }}
roles/mariadb/templates/server.cnf.j2
View file @
39beaa61
#
# {{ ansible_managed }}
#
[client]
port = 3306
socket = /run/mysqld/mysqld.sock
...
...
roles/mariadb/templates/zabbix_agentd.my.cnf.j2
View file @
39beaa61
#
# {{ ansible_managed }}
#
[client]
user={{zabbix_agent_mysql_user}}
password={{mariadb_users.zabbix_agent}}
roles/matrix/templates/nginx.d.conf.j2
View file @
39beaa61
#
# {{ ansible_managed }}
#
upstream matrix {
server 127.0.0.1:8008;
}
...
...
roles/nginx/templates/letsencrypt.conf
View file @
39beaa61
#
# {{ ansible_managed }}
#
location
/.
well
-
known
/
acme
-
challenge
{
root
{{
letsencrypt_validation_dir
}};
default_type
"text/plain"
;
...
...
roles/nginx/templates/nginx-hostname-vhost.conf.j2
View file @
39beaa61
#
# {{ ansible_managed }}
#
server {
listen 80 default_server;
listen [::]:80 default_server;
...
...
roles/nginx/templates/nginx.conf.j2
View file @
39beaa61
#
# {{ ansible_managed }}
#
worker_processes auto;
load_module /usr/lib/nginx/modules/ngx_http_brotli_filter_module.so;
...
...
roles/nginx/templates/sslsettings.conf
View file @
39beaa61
#
# {{ ansible_managed }}
#
# https://mozilla.github.io/server-side-tls/ssl-config-generator/?server=nginx-1.10.1&openssl=1.0.2&hsts=yes&profile=intermediate
ssl_ciphers
'ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS'
;
...
...
roles/patchwork/templates/nginx.d.conf.j2
View file @
39beaa61
#
# {{ ansible_managed }}
#
upstream patchwork {
server unix:///run/uwsgi/patchwork.sock;
}
...
...
Prev
1
2
3
4
5
Next
Write
Preview
Supports
Markdown
0%
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment