chore: rename reverseproxy role to traffic
in case we get a nginx role oa in the future
This commit is contained in:
parent
24b4f291a3
commit
69bc95b992
12 changed files with 19 additions and 19 deletions
38
roles/traefik/README.md
Normal file
38
roles/traefik/README.md
Normal file
|
|
@ -0,0 +1,38 @@
|
|||
Role Name
|
||||
=========
|
||||
|
||||
A brief description of the role goes here.
|
||||
|
||||
Requirements
|
||||
------------
|
||||
|
||||
Any pre-requisites that may not be covered by Ansible itself or the role should be mentioned here. For instance, if the role uses the EC2 module, it may be a good idea to mention in this section that the boto package is required.
|
||||
|
||||
Role Variables
|
||||
--------------
|
||||
|
||||
A description of the settable variables for this role should go here, including any variables that are in defaults/main.yml, vars/main.yml, and any variables that can/should be set via parameters to the role. Any variables that are read from other roles and/or the global scope (ie. hostvars, group vars, etc.) should be mentioned here as well.
|
||||
|
||||
Dependencies
|
||||
------------
|
||||
|
||||
A list of other roles hosted on Galaxy should go here, plus any details in regards to parameters that may need to be set for other roles, or variables that are used from other roles.
|
||||
|
||||
Example Playbook
|
||||
----------------
|
||||
|
||||
Including an example of how to use your role (for instance, with variables passed in as parameters) is always nice for users too:
|
||||
|
||||
- hosts: servers
|
||||
roles:
|
||||
- { role: username.rolename, x: 42 }
|
||||
|
||||
License
|
||||
-------
|
||||
|
||||
BSD
|
||||
|
||||
Author Information
|
||||
------------------
|
||||
|
||||
An optional section for the role authors to include contact information, or a website (HTML is not allowed).
|
||||
69
roles/traefik/defaults/main.yml
Normal file
69
roles/traefik/defaults/main.yml
Normal file
|
|
@ -0,0 +1,69 @@
|
|||
#SPDX-License-Identifier: MIT-0
|
||||
---
|
||||
# defaults file for traefik
|
||||
|
||||
# Base directory configuration (inherited from base role or defined here)
|
||||
docker_compose_base_dir: /etc/docker/compose
|
||||
docker_volume_base_dir: /srv/data
|
||||
|
||||
# Service-specific configuration
|
||||
service_name: traefik
|
||||
docker_compose_dir: "{{ docker_compose_base_dir }}/{{ service_name }}"
|
||||
docker_volume_dir: "{{ docker_volume_base_dir }}/{{ service_name }}"
|
||||
|
||||
# Deployment mode: 'dmz' or 'backend'
|
||||
# - dmz: Public-facing reverse proxy that routes to backend servers using file provider
|
||||
# - backend: Application server with docker provider for local container discovery
|
||||
traefik_mode: "backend"
|
||||
|
||||
# SSL configuration
|
||||
use_ssl: true
|
||||
ssl_email: "admin@example.com"
|
||||
ssl_cert_resolver: "dns" # Certificate resolver name
|
||||
|
||||
# Certificate mode: 'acme' for Let's Encrypt with DNS challenge or 'selfsigned' for self-signed certs
|
||||
cert_mode: "selfsigned" # Use selfsigned for vagrant, acme for production
|
||||
|
||||
# ACME DNS Challenge with RFC2136 (TSIG) configuration
|
||||
acme_dns_zone: "" # e.g., "digitalboard._acme.digitalboard.ch."
|
||||
acme_dns_nameserver: "" # e.g., "192.168.1.1:53"
|
||||
acme_tsig_algorithm: "hmac-sha256"
|
||||
acme_tsig_key: "" # TSIG key name
|
||||
acme_tsig_secret: "" # TSIG secret
|
||||
acme_propagation_timeout: "120"
|
||||
acme_polling_interval: "2"
|
||||
acme_ttl: "60"
|
||||
|
||||
# Self-signed certificate configuration (for vagrant/testing)
|
||||
selfsigned_cert_dir: "{{ docker_volume_dir }}/certs"
|
||||
selfsigned_cert_days: 365
|
||||
selfsigned_common_name: "*.local.test"
|
||||
|
||||
# Dashboard
|
||||
enable_dashboard: false
|
||||
|
||||
# Access log configuration
|
||||
enable_access_logs: true
|
||||
access_log_format: "common"
|
||||
log_level: "INFO"
|
||||
|
||||
# Network name
|
||||
traefik_network: "proxy"
|
||||
|
||||
# Services to expose (defined by application roles via host_vars or group_vars)
|
||||
# Each backend server should define this variable with their services
|
||||
# traefik_services:
|
||||
# - name: httpbin
|
||||
# domain: httpbin.example.com
|
||||
# port: 8080
|
||||
# protocol: http # http or https
|
||||
# entrypoints: [websecure] # optional, defaults based on SSL config
|
||||
|
||||
# DMZ mode: Explicit backend server mapping
|
||||
# Define which backend servers this DMZ proxy should route to
|
||||
# If empty or undefined, routes to all servers in backend_servers group
|
||||
backend_servers_to_proxy: []
|
||||
# Example:
|
||||
# backend_servers_to_proxy:
|
||||
# - backend1
|
||||
# - backend2
|
||||
8
roles/traefik/handlers/main.yml
Normal file
8
roles/traefik/handlers/main.yml
Normal file
|
|
@ -0,0 +1,8 @@
|
|||
#SPDX-License-Identifier: MIT-0
|
||||
---
|
||||
# handlers file for traefik
|
||||
|
||||
- name: restart traefik
|
||||
community.docker.docker_compose_v2:
|
||||
project_src: "{{ docker_compose_dir }}"
|
||||
state: restarted
|
||||
34
roles/traefik/meta/main.yml
Normal file
34
roles/traefik/meta/main.yml
Normal file
|
|
@ -0,0 +1,34 @@
|
|||
#SPDX-License-Identifier: MIT-0
|
||||
galaxy_info:
|
||||
author: your name
|
||||
description: your role description
|
||||
company: your company (optional)
|
||||
|
||||
# If the issue tracker for your role is not on github, uncomment the
|
||||
# next line and provide a value
|
||||
# issue_tracker_url: http://example.com/issue/tracker
|
||||
|
||||
# Choose a valid license ID from https://spdx.org - some suggested licenses:
|
||||
# - BSD-3-Clause (default)
|
||||
# - MIT
|
||||
# - GPL-2.0-or-later
|
||||
# - GPL-3.0-only
|
||||
# - Apache-2.0
|
||||
# - CC-BY-4.0
|
||||
license: license (GPL-2.0-or-later, MIT, etc)
|
||||
|
||||
min_ansible_version: 2.1
|
||||
|
||||
# If this a Container Enabled role, provide the minimum Ansible Container version.
|
||||
# min_ansible_container_version:
|
||||
|
||||
galaxy_tags: []
|
||||
# List tags for your role here, one per line. A tag is a keyword that describes
|
||||
# and categorizes the role. Users find roles by searching for tags. Be sure to
|
||||
# remove the '[]' above, if you add tags to this list.
|
||||
#
|
||||
# NOTE: A tag is limited to a single word comprised of alphanumeric characters.
|
||||
# Maximum 20 tags per role.
|
||||
|
||||
dependencies:
|
||||
- digitalboard.core.base
|
||||
78
roles/traefik/tasks/main.yml
Normal file
78
roles/traefik/tasks/main.yml
Normal file
|
|
@ -0,0 +1,78 @@
|
|||
#SPDX-License-Identifier: MIT-0
|
||||
---
|
||||
# tasks file for traefik
|
||||
|
||||
- name: Determine which backend servers to proxy (DMZ mode)
|
||||
set_fact:
|
||||
_backend_servers: "{{ backend_servers_to_proxy if backend_servers_to_proxy | length > 0 else groups['backend_servers'] | default([]) }}"
|
||||
when: traefik_mode == 'dmz'
|
||||
|
||||
- name: Build service registry from backend servers (DMZ mode)
|
||||
set_fact:
|
||||
proxied_services: "{{ proxied_services | default([]) + hostvars[item].traefik_services | default([]) | map('combine', {'backend_host': hostvars[item].ansible_host | default(item)}) | list }}"
|
||||
loop: "{{ _backend_servers | default([]) }}"
|
||||
when: traefik_mode == 'dmz'
|
||||
|
||||
- name: Debug service registry
|
||||
debug:
|
||||
var: proxied_services
|
||||
when:
|
||||
- traefik_mode == 'dmz'
|
||||
- proxied_services is defined
|
||||
|
||||
- name: Create docker compose directory
|
||||
file:
|
||||
path: "{{ docker_compose_dir }}"
|
||||
state: directory
|
||||
mode: '0755'
|
||||
|
||||
- name: Create docker volume directory
|
||||
file:
|
||||
path: "{{ docker_volume_dir }}"
|
||||
state: directory
|
||||
mode: '0755'
|
||||
|
||||
- name: Create traefik config directory
|
||||
file:
|
||||
path: "{{ docker_volume_dir }}/config"
|
||||
state: directory
|
||||
mode: '0755'
|
||||
when: traefik_mode == 'dmz'
|
||||
|
||||
- name: Create letsencrypt directory
|
||||
file:
|
||||
path: "{{ docker_volume_dir }}/letsencrypt"
|
||||
state: directory
|
||||
mode: '0755'
|
||||
when: cert_mode == 'acme'
|
||||
|
||||
- name: Create traefik Docker network
|
||||
community.docker.docker_network:
|
||||
name: "{{ traefik_network }}"
|
||||
state: present
|
||||
|
||||
- name: Generate traefik static configuration
|
||||
template:
|
||||
src: traefik.yml.j2
|
||||
dest: "{{ docker_volume_dir }}/traefik.yml"
|
||||
mode: '0644'
|
||||
notify: restart traefik
|
||||
|
||||
- name: Generate traefik dynamic configuration for DMZ services
|
||||
template:
|
||||
src: services.yml.j2
|
||||
dest: "{{ docker_volume_dir }}/config/services.yml"
|
||||
mode: '0644'
|
||||
notify: restart traefik
|
||||
when: traefik_mode == 'dmz'
|
||||
|
||||
- name: Create docker-compose file for traefik
|
||||
template:
|
||||
src: docker-compose.yml.j2
|
||||
dest: "{{ docker_compose_dir }}/docker-compose.yml"
|
||||
mode: '0644'
|
||||
|
||||
- name: Start traefik container
|
||||
community.docker.docker_compose_v2:
|
||||
project_src: "{{ docker_compose_dir }}"
|
||||
state: present
|
||||
39
roles/traefik/templates/docker-compose.yml.j2
Normal file
39
roles/traefik/templates/docker-compose.yml.j2
Normal file
|
|
@ -0,0 +1,39 @@
|
|||
services:
|
||||
traefik:
|
||||
image: traefik:latest
|
||||
container_name: traefik
|
||||
restart: always
|
||||
{% if cert_mode == 'acme' %}
|
||||
environment:
|
||||
RFC2136_NAMESERVER: "{{ acme_dns_nameserver }}"
|
||||
RFC2136_TSIG_ALGORITHM: "{{ acme_tsig_algorithm }}"
|
||||
RFC2136_TSIG_KEY: "{{ acme_tsig_key }}"
|
||||
RFC2136_TSIG_SECRET: "{{ acme_tsig_secret }}"
|
||||
RFC2136_PROPAGATION_TIMEOUT: "{{ acme_propagation_timeout }}"
|
||||
RFC2136_POLLING_INTERVAL: "{{ acme_polling_interval }}"
|
||||
RFC2136_TTL: "{{ acme_ttl }}"
|
||||
{% endif %}
|
||||
ports:
|
||||
- "80:80"
|
||||
- "443:443"
|
||||
{% if enable_dashboard %}
|
||||
- "8080:8080"
|
||||
{% endif %}
|
||||
volumes:
|
||||
- {{ docker_volume_dir }}/traefik.yml:/traefik.yml:ro
|
||||
{% if cert_mode == 'acme' %}
|
||||
- {{ docker_volume_dir }}/letsencrypt:/letsencrypt
|
||||
{% endif %}
|
||||
{% if traefik_mode == 'dmz' %}
|
||||
- {{ docker_volume_dir }}/config:/config:ro
|
||||
{% endif %}
|
||||
{% if traefik_mode == 'backend' %}
|
||||
- /var/run/docker.sock:/var/run/docker.sock:ro
|
||||
{% endif %}
|
||||
networks:
|
||||
- {{ traefik_network }}
|
||||
|
||||
networks:
|
||||
{{ traefik_network }}:
|
||||
name: {{ traefik_network }}
|
||||
external: true
|
||||
47
roles/traefik/templates/middlewares.yml.j2
Normal file
47
roles/traefik/templates/middlewares.yml.j2
Normal file
|
|
@ -0,0 +1,47 @@
|
|||
{% if enable_dashboard %}
|
||||
api:
|
||||
dashboard: true
|
||||
insecure: true
|
||||
{% endif %}
|
||||
|
||||
{% if enable_access_logs %}
|
||||
accessLog:
|
||||
format: {{ access_log_format }}
|
||||
{% endif %}
|
||||
|
||||
entryPoints:
|
||||
web:
|
||||
address: ":80"
|
||||
{% if use_ssl %}
|
||||
http:
|
||||
redirections:
|
||||
entryPoint:
|
||||
to: websecure
|
||||
scheme: https
|
||||
{% endif %}
|
||||
websecure:
|
||||
address: ":443"
|
||||
|
||||
providers:
|
||||
{% if use_static_services | default(false) %}
|
||||
file:
|
||||
filename: /etc/traefik/services.yml
|
||||
watch: true
|
||||
{% endif %}
|
||||
{% if use_docker_provider | default(true) %}
|
||||
docker:
|
||||
endpoint: "unix:///var/run/docker.sock"
|
||||
exposedByDefault: false
|
||||
{% endif %}
|
||||
|
||||
certificatesResolvers:
|
||||
letsencrypt:
|
||||
acme:
|
||||
email: admin@digitalboard.ch
|
||||
storage: /letsencrypt/acme.json
|
||||
httpChallenge:
|
||||
entryPoint: web
|
||||
|
||||
global:
|
||||
checkNewVersion: false
|
||||
sendAnonymousUsage: false
|
||||
35
roles/traefik/templates/services.yml.j2
Normal file
35
roles/traefik/templates/services.yml.j2
Normal file
|
|
@ -0,0 +1,35 @@
|
|||
http:
|
||||
routers:
|
||||
{% for service in proxied_services %}
|
||||
{{ service.name }}:
|
||||
rule: "Host(`{{ service.domain }}`)"
|
||||
service: {{ service.name }}-service
|
||||
entryPoints:
|
||||
- {{ 'websecure' if use_ssl else 'web' }}
|
||||
{% if use_ssl %}
|
||||
tls:
|
||||
{% if cert_mode == 'acme' %}
|
||||
certResolver: {{ ssl_cert_resolver }}
|
||||
{% else %}
|
||||
{}
|
||||
{% endif %}
|
||||
{% endif %}
|
||||
{% endfor %}
|
||||
|
||||
services:
|
||||
{% for service in proxied_services %}
|
||||
{{ service.name }}-service:
|
||||
loadBalancer:
|
||||
passHostHeader: true
|
||||
servers:
|
||||
- url: "{{ service.protocol }}://{{ service.backend_host }}:{{ service.port }}"
|
||||
{% if service.protocol == 'https' and cert_mode == 'selfsigned' %}
|
||||
serversTransport: insecure-transport
|
||||
{% endif %}
|
||||
{% endfor %}
|
||||
|
||||
{% if cert_mode == 'selfsigned' %}
|
||||
serversTransports:
|
||||
insecure-transport:
|
||||
insecureSkipVerify: true
|
||||
{% endif %}
|
||||
62
roles/traefik/templates/traefik.yml.j2
Normal file
62
roles/traefik/templates/traefik.yml.j2
Normal file
|
|
@ -0,0 +1,62 @@
|
|||
log:
|
||||
level: {{ log_level }}
|
||||
|
||||
{% if enable_dashboard %}
|
||||
api:
|
||||
dashboard: true
|
||||
insecure: true
|
||||
{% endif %}
|
||||
|
||||
{% if enable_access_logs %}
|
||||
accessLog:
|
||||
format: {{ access_log_format }}
|
||||
{% endif %}
|
||||
|
||||
entryPoints:
|
||||
web:
|
||||
address: ":80"
|
||||
{% if use_ssl %}
|
||||
http:
|
||||
redirections:
|
||||
entryPoint:
|
||||
to: websecure
|
||||
scheme: https
|
||||
{% endif %}
|
||||
websecure:
|
||||
address: ":443"
|
||||
|
||||
providers:
|
||||
{% if traefik_mode == 'dmz' %}
|
||||
file:
|
||||
directory: /config
|
||||
watch: true
|
||||
{% endif %}
|
||||
{% if traefik_mode == 'backend' %}
|
||||
docker:
|
||||
endpoint: "unix:///var/run/docker.sock"
|
||||
network: {{ traefik_network }}
|
||||
exposedByDefault: false
|
||||
{% endif %}
|
||||
|
||||
{% if use_ssl and cert_mode == 'acme' %}
|
||||
certificatesResolvers:
|
||||
{{ ssl_cert_resolver }}:
|
||||
acme:
|
||||
email: {{ ssl_email }}
|
||||
storage: /letsencrypt/acme.json
|
||||
dnsChallenge:
|
||||
provider: rfc2136
|
||||
resolvers:
|
||||
- "{{ acme_dns_nameserver }}"
|
||||
{% endif %}
|
||||
|
||||
{% if use_ssl %}
|
||||
tls:
|
||||
options:
|
||||
default:
|
||||
minVersion: VersionTLS12
|
||||
{% endif %}
|
||||
|
||||
global:
|
||||
checkNewVersion: false
|
||||
sendAnonymousUsage: false
|
||||
3
roles/traefik/tests/inventory
Normal file
3
roles/traefik/tests/inventory
Normal file
|
|
@ -0,0 +1,3 @@
|
|||
#SPDX-License-Identifier: MIT-0
|
||||
localhost
|
||||
|
||||
6
roles/traefik/tests/test.yml
Normal file
6
roles/traefik/tests/test.yml
Normal file
|
|
@ -0,0 +1,6 @@
|
|||
#SPDX-License-Identifier: MIT-0
|
||||
---
|
||||
- hosts: localhost
|
||||
remote_user: root
|
||||
roles:
|
||||
- traefik
|
||||
3
roles/traefik/vars/main.yml
Normal file
3
roles/traefik/vars/main.yml
Normal file
|
|
@ -0,0 +1,3 @@
|
|||
#SPDX-License-Identifier: MIT-0
|
||||
---
|
||||
# vars file for traefik
|
||||
Loading…
Add table
Add a link
Reference in a new issue