From d50c25cdcc71279f79735ec03c330662e9bf2897 Mon Sep 17 00:00:00 2001 From: Alexandre Iooss Date: Sat, 11 Apr 2020 13:04:49 +0200 Subject: [PATCH] Add OwnCloud role --- roles/owncloud/tasks/main.yml | 38 +++++++ roles/owncloud/templates/nginx/owncloud.j2 | 101 ++++++++++++++++++ .../templates/update-motd.d/05-service.j2 | 3 + 3 files changed, 142 insertions(+) create mode 100644 roles/owncloud/tasks/main.yml create mode 100644 roles/owncloud/templates/nginx/owncloud.j2 create mode 100755 roles/owncloud/templates/update-motd.d/05-service.j2 diff --git a/roles/owncloud/tasks/main.yml b/roles/owncloud/tasks/main.yml new file mode 100644 index 00000000..9c97d047 --- /dev/null +++ b/roles/owncloud/tasks/main.yml @@ -0,0 +1,38 @@ +--- +# Add the key +- name: Configure the apt key + apt_key: + url: https://download.owncloud.org/download/repositories/production/Debian_10/Release.key + id: 47AE7F72479BC94B + state: present + register: apt_key_result + retries: 3 + until: apt_key_result is succeeded + loop: + +# Add the repository into source list +- name: Configure owncloud repository + apt_repository: + repo: "deb http://download.owncloud.org/download/repositories/production/Debian_10.0/ /" + state: present + +- name: Install OwnCloud + apt: + update_cache: true + name: + - nginx + - owncloud-files + register: apt_result + retries: 3 + until: apt_result is succeeded + +- name: Copy NGINX site + template: + src: nginx/owncloud.j2 + dest: /etc/nginx/sites-available/owncloud + +- name: Indicate role in motd + template: + src: update-motd.d/05-service.j2 + dest: /etc/update-motd.d/05-owncloud + mode: 0755 diff --git a/roles/owncloud/templates/nginx/owncloud.j2 b/roles/owncloud/templates/nginx/owncloud.j2 new file mode 100644 index 00000000..63bf3bce --- /dev/null +++ b/roles/owncloud/templates/nginx/owncloud.j2 @@ -0,0 +1,101 @@ +# {{ ansible_managed }} + +upstream php-handler { + server unix:/var/run/php/php7.0-fpm.sock; +} + +server { + listen owncloud.adm.crans.org:80; + server_name owncloud.crans.org owncloud.adm.example.com; + + # Add headers to serve security related headers + # Before enabling Strict-Transport-Security headers please read into this topic first. + add_header Strict-Transport-Security "max-age=15552000; includeSubDomains"; + add_header X-Content-Type-Options nosniff; + add_header X-Frame-Options "SAMEORIGIN"; + add_header X-XSS-Protection "1; mode=block"; + add_header X-Robots-Tag none; + add_header X-Download-Options noopen; + add_header X-Permitted-Cross-Domain-Policies none; + + # Path to the root of your installation + root /var/www/owncloud/; + + location = /robots.txt { + allow all; + log_not_found off; + access_log off; + } + + location = /.well-known/carddav { + return 301 $scheme://$host/remote.php/dav; + } + location = /.well-known/caldav { + return 301 $scheme://$host/remote.php/dav; + } + + location /.well-known/acme-challenge { } + + # set max upload size + client_max_body_size 10G; + fastcgi_buffers 64 4K; + + # Disable gzip to avoid the removal of the ETag header + gzip off; + + error_page 403 /core/templates/403.php; + error_page 404 /core/templates/404.php; + + location / { + rewrite ^ /index.php$uri; + } + + location ~ ^/(?:build|tests|config|lib|3rdparty|templates|data)/ { + return 404; + } + location ~ ^/(?:\.|autotest|occ|issue|indie|db_|console) { + return 404; + } + + location ~ ^/(?:index|remote|public|cron|core/ajax/update|status|ocs/v[12]|updater/.+|ocs-provider/.+|core/templates/40[34])\.php(?:$|/) { + fastcgi_split_path_info ^(.+\.php)(/.*)$; + include fastcgi_params; + fastcgi_param SCRIPT_FILENAME $document_root$fastcgi_script_name; + fastcgi_param PATH_INFO $fastcgi_path_info; + fastcgi_param HTTPS on; + fastcgi_param modHeadersAvailable true; #Avoid sending the security headers twice + fastcgi_param front_controller_active true; + fastcgi_pass php-handler; + fastcgi_intercept_errors on; + fastcgi_request_buffering off; #Available since nginx 1.7.11 + } + + location ~ ^/(?:updater|ocs-provider)(?:$|/) { + try_files $uri $uri/ =404; + index index.php; + } + + # Adding the cache control header for js and css files + # Make sure it is BELOW the PHP block + location ~* \.(?:css|js)$ { + try_files $uri /index.php$uri$is_args$args; + add_header Cache-Control "public, max-age=7200"; + # Add headers to serve security related headers (It is intended to have those duplicated to the ones above) + # Before enabling Strict-Transport-Security headers please read into this topic first. + #add_header Strict-Transport-Security "max-age=15552000; includeSubDomains"; + add_header X-Content-Type-Options nosniff; + add_header X-Frame-Options "SAMEORIGIN"; + add_header X-XSS-Protection "1; mode=block"; + add_header X-Robots-Tag none; + add_header X-Download-Options noopen; + add_header X-Permitted-Cross-Domain-Policies none; + # Optional: Don't log access to assets + access_log off; + } + + location ~* \.(?:svg|gif|png|html|ttf|woff|ico|jpg|jpeg)$ { + try_files $uri /index.php$uri$is_args$args; + # Optional: Don't log access to other assets + access_log off; + } +} diff --git a/roles/owncloud/templates/update-motd.d/05-service.j2 b/roles/owncloud/templates/update-motd.d/05-service.j2 new file mode 100755 index 00000000..e4043602 --- /dev/null +++ b/roles/owncloud/templates/update-motd.d/05-service.j2 @@ -0,0 +1,3 @@ +#!/usr/bin/tail +3 +# {{ ansible_managed }} +> OwnCloud a été déployé sur cette machine. Voir /var/www/owncloud/.