diff --git a/ci/homeassistant.jenkinsfile b/ci/homeassistant.jenkinsfile index a9e03d0..65806e1 100644 --- a/ci/homeassistant.jenkinsfile +++ b/ci/homeassistant.jenkinsfile @@ -2,11 +2,8 @@ @Library('cfgpol')_ applyConfigPolicy( - 'home-assistant:hassdb', + null, [ - 'Home Assistant DB': [ - 'hassdb.yml' - ], 'Home Assistant': [ 'homeassistant.yml' ] diff --git a/roles/websites/proxy-nextcloud/templates/nextcloud.httpd.conf.j2 b/roles/websites/proxy-nextcloud/templates/nextcloud.httpd.conf.j2 index b17ca14..6db1d97 100644 --- a/roles/websites/proxy-nextcloud/templates/nextcloud.httpd.conf.j2 +++ b/roles/websites/proxy-nextcloud/templates/nextcloud.httpd.conf.j2 @@ -8,6 +8,7 @@ SSLCertificateKeyFile /etc/pki/tls/private/pyrocufflink.net.key SSLProxyEngine On ProxyRequests Off +ProxyPreserveHost On ProxyPass / https://cloud0.pyrocufflink.blue/ ProxyPassReverse / https://cloud0.pyrocufflink.blue/ diff --git a/vars/applyConfigPolicy.groovy b/vars/applyConfigPolicy.groovy index d134996..c16c15d 100644 --- a/vars/applyConfigPolicy.groovy +++ b/vars/applyConfigPolicy.groovy @@ -1,4 +1,5 @@ import groovy.transform.Field +import org.jenkinsci.plugins.pipeline.modeldefinition.Utils @Field def DOCKER_ARGS = '''\ @@ -52,15 +53,20 @@ def stageKinit() { def stageRemountRW(limit) { - stage('Remount R/W') { - ansiblePlaybook \ - playbook: 'remount.yml', - limit: limit, - become: true, - vaultCredentialsId: 'ansible-vault', - extraVars: [ - remount_state: 'rw', - ] + def STAGE_NAME = 'Remount R/W' + stage(STAGE_NAME) { + if (limit) { + ansiblePlaybook \ + playbook: 'remount.yml', + limit: limit, + become: true, + vaultCredentialsId: 'ansible-vault', + extraVars: [ + remount_state: 'rw', + ] + } else { + Utils.markStageSkippedForConditional(STAGE_NAME) + } } } @@ -80,13 +86,18 @@ def generateStages(stages) { } def stageRemountRO(limit) { - stage('Remount R/O') { - ansiblePlaybook \ - playbook: 'remount.yml', - limit: limit + ':!rw-root', - become: true, - vaultCredentialsId: 'ansible-vault', - extras: '--diff' + def STAGE_NAME = 'Remount R/W' + stage(STAGE_NAME) { + if (limit) { + ansiblePlaybook \ + playbook: 'remount.yml', + limit: limit + ':!rw-root', + become: true, + vaultCredentialsId: 'ansible-vault', + extras: '--diff' + } else { + Utils.markStageSkippedForConditional(STAGE_NAME) + } } }