Skip to content
This repository was archived by the owner on Aug 21, 2022. It is now read-only.

Commit d4ec458

Browse files
committed
fix: prefer module_role_path instead of role_path
1 parent a611e2c commit d4ec458

File tree

6 files changed

+14
-14
lines changed

6 files changed

+14
-14
lines changed

__tests__/test-tf-generation.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -11,11 +11,11 @@
1111
with_items: "{{ app_config.domains }}"
1212
- block:
1313
- name: Generate Nginx Server Block Terraform file
14-
import_tasks: "{{ role_path }}/tasks/nginx_steps/generate-serverblock-tf.yml"
14+
import_tasks: "{{ module_role_path | default(role_path) }}/tasks/nginx_steps/generate-serverblock-tf.yml"
1515
- name: Generate htpasswd Terraform file
16-
import_tasks: "{{ role_path }}/tasks/nginx_steps/generate-htpasswd-tf.yml"
16+
import_tasks: "{{ module_role_path | default(role_path) }}/tasks/nginx_steps/generate-htpasswd-tf.yml"
1717
vars:
18-
role_path: ".."
18+
module_role_path: ".."
1919
nginx_usehttps: 1
2020
nginx_servername: "test_project"
2121
stackhead__acme_folder: ""
Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
- name: Generate htpasswd Terraform file
33
template:
4-
src: "{{ role_path }}/templates/terraform/htpasswd.tf.j2"
4+
src: "{{ module_role_path | default(role_path) }}/templates/terraform/htpasswd.tf.j2"
55
dest: "{{ stackhead__tf_project_folder }}/htpasswd.tf"
6-
force: true
6+
force: true
Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
- name: Generate nginx server block Terraform file
33
template:
4-
src: "{{ role_path }}/templates/terraform/nginx_server_block_docker.tf.j2"
4+
src: "{{ module_role_path | default(role_path) }}/templates/terraform/nginx_server_block_docker.tf.j2"
55
dest: "{{ stackhead__tf_project_folder }}/nginx_server_block.tf"
6-
force: true
6+
force: true

tasks/steps/deploy.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,10 +6,10 @@
66
when: item.security is defined and item.security.authentication is defined
77
with_items: "{{ app_config.domains }}"
88

9-
- include_tasks: "{{ role_path }}/tasks/nginx_steps/generate-htpasswd-tf.yml"
9+
- include_tasks: "{{ module_role_path | default(role_path) }}/tasks/nginx_steps/generate-htpasswd-tf.yml"
1010
when: auths_basic is defined and auths_basic | length > 0
1111

12-
- include_tasks: "{{ role_path }}/tasks/nginx_steps/generate-serverblock-tf.yml"
12+
- include_tasks: "{{ module_role_path | default(role_path) }}/tasks/nginx_steps/generate-serverblock-tf.yml"
1313

1414
# Generate SSL certificate configurations
1515
- include_tasks: "{{ stackhead__roles }}/stackhead_module_api/tasks/ssl-certificate.yml"

tasks/steps/setup.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,10 +2,10 @@
22
---
33
- name: Deploy additional h5bp Nginx files
44
synchronize:
5-
src: "{{ role_path }}/vendor/server-configs-nginx/h5bp"
5+
src: "{{ module_role_path | default(role_path) }}/vendor/server-configs-nginx/h5bp"
66
dest: /etc/nginx
77
- set_fact:
8-
nginx_conf_template: "{{ role_path }}/templates/nginx/nginx.conf.j2"
8+
nginx_conf_template: "{{ module_role_path | default(role_path) }}/templates/nginx/nginx.conf.j2"
99
- name: Setup Nginx
1010
vars:
1111
nginx_ppa_use: true

templates/terraform/nginx_server_block_docker.tf.j2

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -18,10 +18,10 @@ resource "nginx_server_block" "nginx-{{ project_name }}" {
1818
{%- for nginx_expose in domainConfig.expose if nginx_expose.external_port != 443 %}
1919
{% set port_index = all_ports|selectattr('service', 'equalto', nginx_expose.service)|selectattr('internal_port', 'equalto', nginx_expose.internal_port)|map(attribute='index')|first %}
2020
{% if nginx_expose.external_port == 80 %}
21-
{{ lookup('template', "{{ role_path }}/templates/nginx/serverblock.http.j2", template_vars=dict(domainConfig=ns.domainCfg)) }}
22-
{{ lookup('template', "{{ role_path }}/templates/nginx/serverblock.container-reverseproxy.j2", template_vars=dict(port_index=port_index,domainConfig=ns.domainCfg)) }}
21+
{{ lookup('template', "{{ module_role_path | default(role_path) }}/templates/nginx/serverblock.http.j2", template_vars=dict(domainConfig=ns.domainCfg)) }}
22+
{{ lookup('template', "{{ module_role_path | default(role_path) }}/templates/nginx/serverblock.container-reverseproxy.j2", template_vars=dict(port_index=port_index,domainConfig=ns.domainCfg)) }}
2323
{% else %}
24-
{{ lookup('template', "{{ role_path }}/templates/nginx/serverblock.container-reverseproxy.j2", template_vars=dict(port_index=port_index,port=nginx_expose.external_port,domainConfig=ns.domainCfg)) }}
24+
{{ lookup('template', "{{ module_role_path | default(role_path) }}/templates/nginx/serverblock.container-reverseproxy.j2", template_vars=dict(port_index=port_index,port=nginx_expose.external_port,domainConfig=ns.domainCfg)) }}
2525
{% endif %}
2626
{%- endfor %}
2727
{%- endfor %}

0 commit comments

Comments
 (0)