Compare commits

...

21 commits

Author SHA1 Message Date
d7834bb0fe Merge branch 'renich/varios' into 'master'
Many updates and fixes

See merge request strepsirrhini/lemur!30
2024-06-18 01:48:39 +00:00
e622f7c97c Many updates and fixes 2024-06-18 01:48:39 +00:00
e64b31a675 Merge branch 'imcsk8/28.0.3-bump' into 'master'
Aumenté la versión de nextcloud a 28.0.3

See merge request strepsirrhini/lemur!28
2024-05-15 23:39:39 +00:00
3168555e32 Aumenté la versión de nextcloud a 28.0.3 2024-05-15 17:38:21 -06:00
47d2df4a36 Merge branch 'imcsk8/remove-collabora-repo' into 'master'
Removí el repositorio de collabora online

See merge request strepsirrhini/lemur!27
2024-05-15 23:33:14 +00:00
7d8110bf9b Removí el repositorio de collabora online 2024-05-15 17:32:25 -06:00
92ecac3c19 Merge branch 'imcsk8/fix-talk-add' into 'master'
Actualización de parámetros de app talk de nextclud a versión 28.0.3

See merge request strepsirrhini/lemur!26
2024-05-15 23:19:31 +00:00
5aef02a3a4 Merge branch 'imcsk8/update-collabora' into 'master'
Cambié repo de collabora por repo de GobMx

See merge request strepsirrhini/lemur!25
2024-05-15 23:18:10 +00:00
5ae17c2ecf Actualización de parámetros de app talk de nextclud a versión 28.0.3 2024-05-14 19:24:21 -06:00
c31890a835 Cambié repo de collabora por repo de GobMx 2024-05-14 18:42:06 -06:00
cbbf36645a Merge branch 'imcsk8/signaling-packages' into 'master'
Agregué instalación de singnaling por paquete RPM

See merge request strepsirrhini/lemur!23
2024-05-14 22:08:16 +00:00
bb2d301173 Merge branch 'KBrown/redhat-pre-tasks-incompatibilidades-con-fedora' into imcsk8/signaling-packages 2024-05-14 15:40:16 -06:00
dd6962f4f8
Merge branch 'imcsk8/signaling-packages' of git.softwarelibre.mx:strepsirrhini/lemur into imcsk8/signaling-packages 2024-05-14 00:21:04 -06:00
9d91b56716
La unit de Systemd se llama signaling; estaba como signaling-server 2024-05-14 00:16:08 -06:00
583c0ef7a3
Excepciones para Fedora de Remi y otros repos de CentOS 2024-05-14 00:05:51 -06:00
b1a9472663 Moví instalación de repo de libreoffice a signaling-server 2024-05-13 22:49:53 -06:00
a514935792
Me sobraba una línea de una tarea repetida 2024-05-13 21:56:28 -06:00
41fff7b1e3 Agregué instalación de paquete RPM de signaling 2024-05-13 20:37:32 -06:00
3a7ffc8274 Moví instalación de repositorio de libreoffice a common 2024-05-13 20:37:15 -06:00
874f1b2efa Merge branch 'sandino/coolwsd-rewrite' into 'master'
Sandino/coolwsd rewrite

See merge request strepsirrhini/lemur!19
2024-04-23 01:29:32 +00:00
a747224547
Regla de rewrite para workaround de /browser/dist 2024-03-27 05:59:24 -06:00
20 changed files with 371 additions and 192 deletions

View file

@ -7,7 +7,8 @@ files/backups/*
# variable3s
vars/main.*.yaml
!vars/main.ejemplo.yaml
!vars/main.example.yaml
!vars/main.test.yaml
# misc
*~

View file

@ -32,7 +32,6 @@
roles:
- name: redis
# Este es el collabora
- hosts: coolwsd
vars_files:
- "vars/{{ ansible_facts['os_family'] }}.yaml"
@ -51,8 +50,8 @@
- hosts: turn
vars_files:
- vars/main.example.yaml
- "vars/{{ ansible_facts['os_family'] }}.yaml"
- vars/main.example.yaml
roles:
- name: turn
- name: nats-server

View file

@ -1,7 +1,7 @@
- hosts: localhost
vars_files:
- vars/main.test.yaml
- "vars/{{ ansible_facts['os_family'] }}.yaml"
- vars/main.test.yaml
vars:
services:
- nginx
@ -11,38 +11,37 @@
- name: certificates
- hosts: all
serial: 1
vars_files:
- vars/main.test.yaml
- "vars/{{ ansible_facts['os_family'] }}.yaml"
- vars/main.test.yaml
roles:
- name: common
- hosts: postgresql
vars_files:
- vars/main.test.yaml
- "vars/{{ ansible_facts['os_family'] }}.yaml"
- vars/main.test.yaml
roles:
- name: postgresql
- hosts: redis
vars_files:
- vars/main.test.yaml
- "vars/{{ ansible_facts['os_family'] }}.yaml"
- vars/main.test.yaml
roles:
- name: redis
- hosts: coolwsd
vars_files:
- vars/main.test.yaml
- "vars/{{ ansible_facts['os_family'] }}.yaml"
- vars/main.test.yaml
roles:
- name: coolwsd
- hosts: nextcloud
vars_files:
- vars/main.test.yaml
- "vars/{{ ansible_facts['os_family'] }}.yaml"
- vars/main.test.yaml
roles:
- name: nextcloud
- name: coolwsd-nginx
@ -50,11 +49,10 @@
- hosts: turn
vars_files:
- vars/main.test.yaml
- "vars/{{ ansible_facts['os_family'] }}.yaml"
- vars/main.test.yaml
roles:
- name: turn
- name: nats-server
- name: signaling-server
- name: janus

View file

@ -1,12 +1,29 @@
[redis]
<your server fqdn>
[postgresql]
<your server fqdn>
# If your FQDNs are resolvable, then you don't need the ansible_host= part. If they're not, you need to change the IPs and add all
# these entries to the /etc/hosts file of the deployment server (a.k.a. where the ansible-playbooks reside).
#
# For example:
#
# /etc/hosts:
# # Loopback entries; do not change.
# For historical reasons, localhost precedes localhost.localdomain:
# 127.0.0.1 localhost localhost.localdomain localhost4 localhost4.localdomain4
# ::1 localhost localhost.localdomain localhost6 localhost6.localdomain6
#
# # my nextcloud
# 192.168.0.10 nx0.example.com nx0
# 192.168.0.11 db0.example.com db0
# 192.168.0.12 rds0.example.com rds0
# 192.168.0.13 cl0.example.com cl0
[nextcloud]
<your server fqdn>
nx0.example.com ansible_host=192.168.0.10
[postgresql]
db0.example.com ansible_host=192.168.0.11
[redis]
rds0.example.com ansible_host=192.168.0.12
[coolwsd]
<your server fqdn>
cl0.example.com ansible_host=192.168.0.13

View file

@ -1,25 +1,42 @@
[redis]
<your server fqdn>
[postgresql]
<your server fqdn>
# If your FQDNs are resolvable, then you don't need the ansible_host= part. If they're not, you need to change the IPs and add all
# these entries to the /etc/hosts file of the deployment server (a.k.a. where the ansible-playbooks reside).
#
# For example:
#
# /etc/hosts:
# # Loopback entries; do not change.
# For historical reasons, localhost precedes localhost.localdomain:
# 127.0.0.1 localhost localhost.localdomain localhost4 localhost4.localdomain4
# ::1 localhost localhost.localdomain localhost6 localhost6.localdomain6
#
# # my nextcloud
# 192.168.0.10 nx0.example.com nx0
# 192.168.0.11 db0.example.com db0
# 192.168.0.12 rds0.example.com rds0
# 192.168.0.13 cl0.example.com cl0
# 192.168.0.14 turn0.example.com turn0
[nextcloud]
<your server fqdn>
nx0.example.com ansible_host=192.168.0.10
[postgresql]
db0.example.com ansible_host=192.168.0.11
[redis]
rds0.example.com ansible_host=192.168.0.12
[coolwsd]
<your server fqdn>
cl0.example.com ansible_host=192.168.0.13
# Uncomment this if you're going to use HA with Nextcloud Talk
# Nextcloud Talk
[turn]
<turn server fqdn>
turn0.example.com ansible_host=192.168.0.14
[nats]
<nats server fqdn> ansible_host=<nats server IP>
turn0.example.com ansible_host=192.168.0.14
[signaling]
<signaling spreed server fqdn> ansible_host=<signaling server IP>
turn0.example.com ansible_host=192.168.0.14
[janus]
<janus server fqdn> ansible_host=<janus server IP>
turn0.example.com ansible_host=192.168.0.14

View file

@ -1,24 +1,23 @@
[nextcloud]
nx0-test.libreoffice.gob.mx ansible_host=10.201.15.250
nx0.test.virt.g02.org ansible_host=192.168.0.41
[postgresql]
db0-test.libreoffice.gob.mx ansible_host=10.201.15.220
db0.test.virt.g02.org ansible_host=192.168.0.40
[redis]
rds0-test.libreoffice.gob.mx ansible_host=10.201.15.24
rds0.test.virt.g02.org ansible_host=192.168.0.39
[coolwsd]
clwsd0-test.libreoffice.gob.mx ansible_host=10.201.15.132
cl0.test.virt.g02.org ansible_host=192.168.0.42
[turn]
turn1.softwarelibre.mx
turn0.test.virt.g02.org ansible_host=192.168.0.43
[nats]
nats1.softwarelibre.mx ansible_host=10.201.15.199
turn0.test.virt.g02.org ansible_host=192.168.0.43
[signaling]
signaling1.softwarelibre.mx ansible_host=10.201.15.199
turn0.test.virt.g02.org ansible_host=192.168.0.43
[janus]
janus1.softwarelibre.mx ansible_host=10.201.15.199
turn0.test.virt.g02.org ansible_host=192.168.0.43

View file

@ -24,3 +24,17 @@
include_tasks: redhat_tasks.yaml
when: ansible_facts['os_family'] == 'RedHat'
- name: "Set hostname"
ansible.builtin.hostname:
name: "{{ inventory_hostname }}"
use: systemd
- name: "Build hosts file"
lineinfile:
dest: /etc/hosts
regexp: '.*{{ item }}$'
line: "{{ hostvars[item]['ansible_default_ipv4']['address'] }} {{ hostvars[item]['ansible_fqdn'] }} {{ hostvars[item]['ansible_hostname'] }}"
state: present
when: hostvars[item].ansible_default_ipv4.address is defined
loop: "{{ groups['all'] }}"

View file

@ -37,6 +37,7 @@
# static files
location ^~ /browser {
rewrite ^/browser/([0-9]+(\.[0-9]+)+)/(.*)$ /browser/dist/$3 last;
proxy_pass http://{{ coolwsd_host }}:9980;
proxy_set_header Host $http_host;
}

View file

@ -1,35 +1,45 @@
---
# tasks file for coolwsd
# tasks file for coolwsd
#TODO: Esta parte hay que sacarla de nuestros propios repos
- name: Import Collabora key
ansible.builtin.rpm_key:
state: present
key: https://www.collaboraoffice.com/repos/CollaboraOnline/CODE-centos8/repodata/repomd.xml.key
- name: Import GobMx key
ansible.builtin.rpm_key:
state: present
key: https://repos.libreoffice.gob.mx/centos/libreoffice.gob.mx.gpg
- name: Add Collabora repository for Red Hat distros
yum_repository:
name: CollaboraOnline
description: Collabora Online
baseurl: https://www.collaboraoffice.com/repos/CollaboraOnline/CODE-centos8
- name: Install libreoffice.gob.mx CentOS repo
get_url:
url: https://repos.libreoffice.gob.mx/centos/libreoffice.gob.mx.repo
dest: /etc/yum.repos.d/libreoffice.gob.mx.repo
mode: '0644'
owner: root
group: root
- name: Install Collabora Online Packages
package:
name:
- coolwsd
- CODE-brand
state: latest
- name: Install Collabora Online Packages
package:
name:
- coolwsd
state: latest
- name: Copy collabora configuration files
template:
src: templates/coolwsd.xml.j2
dest: /etc/coolwsd/coolwsd.xml
- name: Copy collabora configuration files
template:
src: templates/coolwsd.xml.j2
dest: /etc/coolwsd/coolwsd.xml
- name: Enable Libre Office Web services
systemd:
name: coolwsd
enabled: yes
state: restarted
tags:
- nextcloud_collabora
- name: Enable Libre Office Web services
systemd:
name: coolwsd
enabled: yes
state: restarted
tags:
- nextcloud_collabora
- name: Open up required firewall ports
block:
- name: Open ports for CODE service
ansible.posix.firewalld:
port: 9980/tcp
permanent: yes
immediate: true
state: enabled
when: code_firewalld_enabled | bool

View file

@ -4,14 +4,6 @@
name: '*'
state: latest
- name: Install libreoffice.gob.mx repo
get_url:
url: https://repos.libreoffice.gob.mx/fedora/libreoffice.gob.mx.repo
dest: /etc/yum.repos.d/libreoffice.gob.mx.repo
mode: '0644'
owner: root
group: root
- name: Install required packages
ansible.builtin.package:
name:

View file

@ -20,7 +20,7 @@
ansible.builtin.shell:
cmd: |
/usr/bin/php "{{ nextcloud_occ }}" talk:turn:delete {{ turn_fqdn }}:3478 udp,tcp
/usr/bin/php "{{ nextcloud_occ }}" talk:turn:add --secret={{ turn_static_auth_secret }} -- {{ turn_fqdn }}:3478 udp,tcp
/usr/bin/php "{{ nextcloud_occ }}" talk:turn:add --secret={{ turn_static_auth_secret }} -- turn,turns {{ turn_fqdn }}:3478 udp,tcp
become: true
become_user: "{{ web_user }}"

View file

@ -3,6 +3,7 @@
package:
state: latest
name:
- bzip2
- nginx
- php-cli
- php-curl
@ -18,6 +19,8 @@
- php-json
- php-ldap
- php-mbstring
- php-memcache
- php-opcache
- php-openssl
- php-pcre
- php-pdo
@ -36,7 +39,6 @@
- python3-pyOpenSSL
- sudo
- tar
- bzip2
- name: Create nextcloud nginx configuration directory
ansible.builtin.file:
@ -137,6 +139,24 @@
enabled: yes
state: restarted
- name: Open up required firewall ports
block:
- name: Open ports for HTTP service
ansible.posix.firewalld:
service: http
permanent: yes
immediate: true
state: enabled
- name: Open ports for HTTPS service
ansible.posix.firewalld:
service: https
permanent: yes
immediate: true
state: enabled
when: nextcloud_firewalld_enabled | bool
- name: Remove config_is_read_only setting from config.php
lineinfile:
path: "{{ nextcloud_path }}/config/config.php"

View file

@ -75,3 +75,13 @@
tags:
- database
- name: Open up required firewall ports
block:
- name: Open ports for PostgreSQL service
ansible.posix.firewalld:
service: postgresql
permanent: yes
immediate: true
state: enabled
when: postgresql_firewalld_enabled | bool

View file

@ -1,54 +1,31 @@
---
# tasks file for pre
- name: Update the /etc/hosts file with node host name
tags: etchostsupdate
become: yes
become_user: root
lineinfile:
path: "/etc/hosts"
regexp: ".*\t{{ ansible_hostname }}"
#TODO: crear una variable que tenga la IP del balanceador
line: "{{ nextcloud_host_ip }}\t{{ nextcloud_fqdn }} {{ nextcloud_hostname }}"
state: present
backup: yes
register: etchostsupdate
- name: Create fact directory
file:
path: /etc/ansible/facts.d/
state: directory
# - name: Update the /etc/hosts file with node domain name
# tags: etchostsupdate_domain
# become: yes
# become_user: root
# lineinfile:
# path: "/etc/hosts"
# line: "{{ nextcloud_host }}\t{{ nextcloud_fqdn }}"
# state: present
# backup: yes
- name: Create nextcloud custom facts
copy:
src: nextcloud.fact
dest: /etc/ansible/facts.d/nextcloud.fact
mode: 0775
force: yes
tags:
- check_facts
- name: Create fact directory
file:
path: /etc/ansible/facts.d/
state: directory
- name: Check if nextcloud is unpacked
stat:
path: /var/www/html/config/config.sample.php
register: nextcloud_is_unpacked
- name: Create nextcloud custom facts
copy:
src: nextcloud.fact
dest: /etc/ansible/facts.d/nextcloud.fact
mode: 0775
force: yes
tags:
- check_facts
- name: Reload facts
setup:
tags:
- check_facts
- name: Check if nextcloud is unpacked
stat:
path: /var/www/html/config/config.sample.php
register: nextcloud_is_unpacked
- name: Reload facts
setup:
tags:
- check_facts
- name: Pre tasks for Red Hat distros
include_tasks: redhat_pre_tasks.yaml
when:
ansible_facts['os_family'] == "RedHat"
- name: Pre tasks for Red Hat distros
include_tasks: redhat_pre_tasks.yaml
when:
ansible_facts['os_family'] == "RedHat"

View file

@ -1,5 +1,8 @@
- name: Enable The CRB Repository
ansible.builtin.command: /usr/bin/dnf config-manager --set-enabled crb
when:
- ansible_os_family == 'RedHat'
- ansible_distribution != 'Fedora'
#- name: "Install Remi repo GPG key"
# rpm_key:
@ -25,6 +28,9 @@
ansible.builtin.rpm_key:
state: present
key: "https://rpms.remirepo.net/enterprise/{{ansible_distribution_major_version}}/RPM-GPG-KEY-remi"
when:
- ansible_os_family == 'RedHat'
- ansible_distribution != 'Fedora'
- name: Remi::Install REMI repository
dnf:
@ -50,6 +56,9 @@
- name: Remi::Reset PHP module
ansible.builtin.command: /usr/bin/dnf -y module reset php
when:
- ansible_os_family == 'RedHat'
- ansible_distribution != 'Fedora'
- name: Remi::Install PHP {{ php_version }} module
ansible.builtin.command: /usr/bin/dnf -y module install php:remi-{{ php_version }}

View file

@ -33,3 +33,13 @@
tags:
- check_redis
- name: Open up required firewall ports
block:
- name: Open ports for Redis service
ansible.posix.firewalld:
service: redis
permanent: yes
immediate: true
state: enabled
when: redis_firewalld_enabled | bool

View file

@ -3,4 +3,4 @@
ansible.builtin.systemd:
state: restarted
daemon_reload: yes
name: signaling-server
name: signaling

View file

@ -4,29 +4,21 @@
state: latest
name: '*'
- name: Install libreoffice.gob.mx repo
get_url:
url: https://repos.libreoffice.gob.mx/fedora/libreoffice.gob.mx.repo
dest: /etc/yum.repos.d/libreoffice.gob.mx.repo
mode: '0644'
owner: root
group: root
- name: Install required packages
ansible.builtin.package:
state: latest
name:
- certbot
- openssl
- name: Install signaling-server
block:
# TODO: Empaquetar signaling y proveerlo en Fedora
- name: Download signaling
get_url:
url: https://repos.libreoffice.gob.mx/signaling/signaling-latest.tar.gz
dest: /usr/src/signaling-latest.tar.gz
checksum: "{{ signaling_checksum }}"
- name: Unpack signaling-server
ansible.builtin.unarchive:
src: /usr/src/signaling-latest.tar.gz
dest: /
remote_src: yes
owner: root
group: root
- nextcloud-spreed-signaling
- name: Generate singaling hashkey and blockkey
block:
@ -48,24 +40,6 @@
register: signaling_apikey
failed_when: signaling_apikey.stdout | length != 32
- name: Configure signaling-server
block:
- name: Create signaling-server system user
ansible.builtin.user:
name: signaling
system: yes
shell: /sbin/nologin
home: /var/lib/signaling
state: present
- name: Create configuration directory
ansible.builtin.file:
path: /etc/signaling
state: directory
mode: '0750'
owner: root
group: signaling
- name: Setup configuration file
ansible.builtin.template:
src: signaling-server.conf.j2
@ -75,15 +49,6 @@
mode: '0640'
notify: Systemd daemon-reload and restart
- name: Put signaling-server systemd service in place
ansible.builtin.copy:
src: signaling-server.service
dest: /etc/systemd/system/signaling-server.service
owner: root
group: root
mode: '0644'
notify: Systemd daemon-reload and restart
- name: Open up required firewall ports
block:
- name: Open up TCP port 80 for LetsEncrypt
@ -151,6 +116,6 @@
- name: Start and enable signaling
ansible.builtin.service:
name: signaling-server
name: signaling
enabled: yes

View file

@ -0,0 +1,133 @@
---
# NextCloud
# The nexctloud_checksum changes with every release to get this string go to:
# https://download.nextcloud.com/server/releases/ and download the *.sha256 file
# for the proper version
## version
nextcloud_version: 29.0.2
nextcloud_checksum: "sha256:2d49d297dc340092021057823e8e78a312bc00f56de7d8677ac790590918ab17"
nextcloud_url: https://download.nextcloud.com/server/releases/nextcloud-{{ nextcloud_version }}.tar.bz2
php_version: 8.3
## credentials
nextcloud_admin_user: admin
nextcloud_admin_password: UnaContraseñaBienDifícil.
## domain
nextcloud_fqdn: nx0.example.com
nextcloud_host_ip: "{{ hostvars['cs9-nc-nx0.test.virt.g02.org']['ansible_default_ipv4']['address'] }}"
nextcloud_hostname: nx0
## db
db_host: db0.example.com
nextcloud_db: nextcloud
nextcloud_db_user: nextcloud
nextcloud_db_user_password: Unacontraseñabien.
postgresql_firewalld_enabled: true
## LDAP
ldap_enabled: false
ldap_agent_password: cIBI4mLESN1nSrAPr7pX3350NPXkD3vExjr27X1ju
ldap_server_host: id0.example.com
ldapBase: "cn=users,cn=accounts,dc=softwarelibre,dc=mx"
ldapBaseGroups: "cn=users,cn=accounts,dc=softwarelibre,dc=mx"
ldapBaseUsers: "cn=users,cn=accounts,dc=softwarelibre,dc=mx"
ldapAgentName: "cn=Directory Manager"
ldapAgentPassword: "{{ ldap_agent_password }}"
ldapHost: "{{ ldap_server_host }}"
hasMemberOfFilterSupport: 1
ldapEmailAttribute: mail
ldapLoginFilter: "(&(&(|(objectclass=posixAccount)))(|(uid=%uid)(|(mailPrimaryAddress=%uid)(mail=%uid))))"
ldapPort: 389
ldapUserFilter: "(&(|(objectclass=posixAccount)))"
ldapUserFilterObjectclass: posixAccount
ldapConfigurationActive: 1
## occ
nextcloud_occ: "{{ nextcloud_path }}/occ"
## S3
nextcloud_s3_enabled: true
nextcloud_s3_hostname: fqdn_or_ip # change me
nextcloud_s3_key: usuario # change me
nextcloud_s3_secret: password_muy_difícil # change me
nextcloud_s3_bucket: contenedor # change me
## security
## Set this to true for production
nextcloud_config_is_read_only: true
nextcloud_firewalld_enabled: true
# Redis
redis_host: rds0.example.com
redis_user: nextcloud
redis_password: ParángariCutirimiNoMeAcuerdoCuaro
redis_url: "https://{{ redis_host }}"
redis_path: /etc/redis
redis_firewalld_enabled: true
# SSL
key_size: 4096
key_type: RSA # Others include DSA, ECC, Ed25519, Ed448, X25519, X448
country_name: MX
organization_name: Mi Organización bien chida, LTD
generate_self_signed_cert: true
# Colabora Online (coolwsd)
coolwsd_host: cl0.example.com
code_enable_ssl: false
code_enable_ssl_termination: true
code_ssl_key: ""
code_ssl_cert: ""
code_ssl_ca: ""
code_firewalld_enabled: true
## The only way to make notify_push work without a signed cert is to use plain http
notify_push_nextcloud_url: http://localhost
# reverse proxy
reverse_proxy_ip: "{{ hostvars['cs9-nc-nx0.test.virt.g02.org']['ansible_default_ipv4']['address'] }}"
# turn
turn_fqdn: turn0.example.com
turn_firewalld_enabled: false
turn_letsencrypt_certificate_enabled: true
turn_static_auth_secret: OtroSecretoBienSuperDifícilDeAdivinar
# nats
nats_fqdn: turn0.example.com
nats_firewalld_enabled: false
nats_letsencrypt_certificate_enabled: false
# signaling
signaling_fqdn: turn0.example.com
signaling_debug: false
signaling_firewalld_enabled: false
signaling_letsencrypt_certificate_enabled: true
signaling_connections_per_host: 16
signaling_backend_name: nextcloud
signaling_checksum: sha256:fb505651bab4f91f6c60d2308541e1bf695f4177aa4f92e01bc1c8982bd3db76
# janus
janus_firewalld_enabled: false
janus_letsencrypt_certificate_enabled: false
janus_stun_server_ip: "{{ hostvars[inventory_hostname]['ansible_default_ipv4']['address'] }}"
janus_turn_server_ip: "{{ hostvars[inventory_hostname]['ansible_default_ipv4']['address'] }}"
# nextcloud spreed (talk)
nextcloud_talk_turn_server: "{{ turn_fqdn }}"
nextcloud_talk_signaling_server: "https://{{ turn_fqdn }}:8443"
nextcloud_talk_signaling_server_secret: ElMegaSecretoDeSignalingQueNadieSabe.
nextcloud_talk_stun_server: "{{ turn_fqdn }}"

View file

@ -1,26 +1,30 @@
---
# NextCloud
# The nexctloud_checksum changes with every release to get this string go to:
# https://download.nextcloud.com/server/releases/ and download the *.sha256 file
# for the proper version
## version
nextcloud_version: 26.0.0
nextcloud_url: https://repos.libreoffice.gob.mx/nextcloud/nextcloud-{{nextcloud_version}}.tar.bz2
nextcloud_checksum: "sha256:f163150363aee9366ecb5cd5259bf6756ed4f073cea78b5fa515cada7a0d0c3d"
php_version: 8.2
nextcloud_version: 29.0.2
nextcloud_checksum: "sha256:2d49d297dc340092021057823e8e78a312bc00f56de7d8677ac790590918ab17"
nextcloud_url: https://download.nextcloud.com/server/releases/nextcloud-{{ nextcloud_version }}.tar.bz2
php_version: 8.3
## credentials
nextcloud_admin_user: el_admin
nextcloud_admin_password: Una contraseña bien difícil.
nextcloud_admin_user: admin
nextcloud_admin_password: UnaContraseñaBienDifícil.
## domain
nextcloud_fqdn: nextcloud.midominio.tld
nextcloud_host_ip: 10.0.5.33
nextcloud_hostname: nextcloud
nextcloud_fqdn: cs9-nc-nx0.test.virt.g02.org
nextcloud_host_ip: "{{ hostvars['cs9-nc-nx0.test.virt.g02.org']['ansible_default_ipv4']['address'] }}"
nextcloud_hostname: cs9-nc-nx0
## db
db_host: 10.0.5.43
db_host: cs9-nc-db0.test.virt.g02.org
nextcloud_db: nextcloud
nextcloud_db_user: nextcloud
nextcloud_db_user_password: Una contraseña bien, pero bien difícil.
nextcloud_db_user_password: Unacontraseñabien.
postgresql_firewalld_enabled: true
## LDAP
ldap_enabled: false
@ -45,7 +49,7 @@ ldapConfigurationActive: 1
nextcloud_occ: "{{ nextcloud_path }}/occ"
## S3
nextcloud_s3_enabled: true
nextcloud_s3_enabled: false
nextcloud_s3_hostname: dirección_ip_o_hostname # cámbiame
nextcloud_s3_key: usuario # cámbiame
nextcloud_s3_secret: password_muy_difícil # cámbiame
@ -54,14 +58,16 @@ nextcloud_s3_bucket: contenedor # cámbiame
## security
## Set this to true for production
nextcloud_config_is_read_only: true
nextcloud_firewalld_enabled: true
# Redis
redis_host: 10.0.5.53
redis_host: cs9-nc-rds0.test.virt.g02.org
redis_user: nextcloud
redis_password: ParángariCutirimiNoMeAcuerdoCuaro
redis_url: "https://{{ redis_host }}"
redis_path: /etc/redis
redis_firewalld_enabled: true
# SSL
@ -73,39 +79,40 @@ generate_self_signed_cert: true
# Colabora Online (coolwsd)
coolwsd_host: 10.0.5.64
coolwsd_host: cs9-nc-cl0.test.virt.g02.org
code_enable_ssl: false
code_enable_ssl_termination: true
code_ssl_key: ""
code_ssl_cert: ""
code_ssl_ca: ""
code_firewalld_enabled: true
## The only way to make notify_push work without a signed cert is to use plain http
notify_push_nextcloud_url: http://localhost
# reverse proxy
reverse_proxy_ip: 10.0.5.1
reverse_proxy_ip: "{{ hostvars['cs9-nc-nx0.test.virt.g02.org']['ansible_default_ipv4']['address'] }}"
# turn
turn_fqdn: turn0.midominio.tld
turn_fqdn: f40-nc-turn0.test.virt.g02.org
turn_firewalld_enabled: false
turn_letsencrypt_certificate_enabled: true
turn_letsencrypt_certificate_enabled: false
turn_static_auth_secret: OtroSecretoBienSuperDifícilDeAdivinar
# nats
nats_fqdn: turn0.midominio.tld
nats_fqdn: f40-nc-turn0.test.virt.g02.org
nats_firewalld_enabled: false
nats_letsencrypt_certificate_enabled: false
# signaling
signaling_fqdn: turn0.midominio.tld
signaling_fqdn: f40-nc-turn0.test.virt.g02.org
signaling_debug: false
signaling_firewalld_enabled: false
signaling_letsencrypt_certificate_enabled: true
signaling_letsencrypt_certificate_enabled: false
signaling_connections_per_host: 16
signaling_backend_name: nextcloud
signaling_checksum: sha256:fb505651bab4f91f6c60d2308541e1bf695f4177aa4f92e01bc1c8982bd3db76