mirror of
https://github.com/geerlingguy/ansible-role-certbot.git
synced 2025-04-19 17:01:37 +02:00
Compare commits
139 Commits
Author | SHA1 | Date | |
---|---|---|---|
|
1749d0ace0 | ||
|
d2e42ea198 | ||
|
d5a1f4df3c | ||
|
de02f52275 | ||
|
6ab7f2db23 | ||
|
32d18724a6 | ||
|
11ac393df5 | ||
|
1278651f0d | ||
|
3d2fbc6202 | ||
|
4f1179392e | ||
|
b3ae28fb77 | ||
|
943abd882d | ||
|
2fde934223 | ||
|
851d2b9855 | ||
|
2d3cf2ad13 | ||
|
999372cc7e | ||
|
811fa11044 | ||
|
e5bfeaf936 | ||
|
9045ec5a59 | ||
|
98ea3238ed | ||
|
06ca208bb6 | ||
|
49e18182a7 | ||
|
48941fe2a0 | ||
|
6230e82ba9 | ||
|
0b414a9d74 | ||
|
78f4cb5ad5 | ||
|
d1cbcde4de | ||
|
03f4cc3a99 | ||
|
63638f4471 | ||
|
4be771f12a | ||
|
de52a1f4c8 | ||
|
cb3b03f435 | ||
|
5a23e85f1c | ||
|
08543f45b2 | ||
|
84642924df | ||
|
cfd9655ed0 | ||
|
47203f3b92 | ||
|
a3b34ef499 | ||
|
199f940604 | ||
|
1b04270982 | ||
|
a056da763e | ||
|
2deba31679 | ||
|
d30ddd946a | ||
|
3d55be0a54 | ||
|
3f133ad7ab | ||
|
c6297ddebb | ||
|
3fcd4e0258 | ||
|
eb4647ed9c | ||
|
31beafb338 | ||
|
1fc3a76d34 | ||
|
dd1f8bd22c | ||
|
de4cb90984 | ||
|
955ec8b17e | ||
|
a9a3ef77a3 | ||
|
e35a5d0fb9 | ||
|
854a36e048 | ||
|
2cad2addcd | ||
|
52a96f9bde | ||
|
7a7c1f8b06 | ||
|
40c4c1b433 | ||
|
bd58f8e72c | ||
|
123facdbab | ||
|
e1013946c5 | ||
|
b37af73500 | ||
|
23447ec217 | ||
|
50d8921ec2 | ||
|
2e13cb13cf | ||
|
e669ab0ac4 | ||
|
ca46eab49f | ||
|
5f476f829c | ||
|
34949a63d9 | ||
|
061509319f | ||
|
c7e5eec8cc | ||
|
23f593aaaf | ||
|
027af9b3b3 | ||
|
7317dbcabe | ||
|
5cfcc2d316 | ||
|
aaf3dbd40a | ||
|
96051f08f4 | ||
|
6647174286 | ||
|
3f8533436b | ||
|
d1d517c5a4 | ||
|
7ad49929dd | ||
|
6bb2ed6436 | ||
|
515e8af98b | ||
|
b17976752c | ||
|
02e1e4e148 | ||
|
fdba1c4352 | ||
|
3c05ff5029 | ||
|
25a661157e | ||
|
e93e175a7e | ||
|
e10cfdaedb | ||
|
e34a21f0eb | ||
|
4f22d025cd | ||
|
ea88bfa03c | ||
|
56ba6ad847 | ||
|
0ba7078e8c | ||
|
b96acd79ec | ||
|
9090d7d431 | ||
|
7c66dc3eed | ||
|
51ff0b14a3 | ||
|
8006878db7 | ||
|
eb5f51182b | ||
|
fe1716eced | ||
|
3624a21c45 | ||
|
2bca213421 | ||
|
f5bbfd2ec7 | ||
|
a9609e1da6 | ||
|
5ac9b8da7c | ||
|
50f9134287 | ||
|
b3a886e9ee | ||
|
09c8986636 | ||
|
60d805f41b | ||
|
6d26c0628d | ||
|
b158105fad | ||
|
21462d7da9 | ||
|
724a3ed920 | ||
|
57702b3544 | ||
|
6e17af0ac5 | ||
|
7a8b82d139 | ||
|
980c3ea31d | ||
|
6414a15183 | ||
|
a49d4e63a1 | ||
|
7efc6a50f5 | ||
|
8164566c4f | ||
|
00dc226101 | ||
|
be44ac2dcd | ||
|
09b5bd20e9 | ||
|
e130839734 | ||
|
6b519ffc4d | ||
|
260a85222e | ||
|
974fc81c9c | ||
|
a2348fdd64 | ||
|
d8beca4c1a | ||
|
53b02421c0 | ||
|
0611410c3b | ||
|
5da6dd18cd | ||
|
e14d6eb04a | ||
|
ce4dacf632 |
3
.ansible-lint
Normal file
3
.ansible-lint
Normal file
@ -0,0 +1,3 @@
|
|||||||
|
skip_list:
|
||||||
|
- 'yaml'
|
||||||
|
- 'role-name'
|
4
.github/FUNDING.yml
vendored
Normal file
4
.github/FUNDING.yml
vendored
Normal file
@ -0,0 +1,4 @@
|
|||||||
|
# These are supported funding model platforms
|
||||||
|
---
|
||||||
|
github: geerlingguy
|
||||||
|
patreon: geerlingguy
|
79
.github/workflows/ci.yml
vendored
Normal file
79
.github/workflows/ci.yml
vendored
Normal file
@ -0,0 +1,79 @@
|
|||||||
|
---
|
||||||
|
name: CI
|
||||||
|
'on':
|
||||||
|
pull_request:
|
||||||
|
push:
|
||||||
|
branches:
|
||||||
|
- master
|
||||||
|
schedule:
|
||||||
|
- cron: "30 2 * * 0"
|
||||||
|
|
||||||
|
defaults:
|
||||||
|
run:
|
||||||
|
working-directory: 'geerlingguy.certbot'
|
||||||
|
|
||||||
|
jobs:
|
||||||
|
|
||||||
|
lint:
|
||||||
|
name: Lint
|
||||||
|
runs-on: ubuntu-latest
|
||||||
|
steps:
|
||||||
|
- name: Check out the codebase.
|
||||||
|
uses: actions/checkout@v4
|
||||||
|
with:
|
||||||
|
path: 'geerlingguy.certbot'
|
||||||
|
|
||||||
|
- name: Set up Python 3.
|
||||||
|
uses: actions/setup-python@v5
|
||||||
|
with:
|
||||||
|
python-version: '3.x'
|
||||||
|
|
||||||
|
- name: Install test dependencies.
|
||||||
|
run: pip3 install yamllint
|
||||||
|
|
||||||
|
- name: Lint code.
|
||||||
|
run: |
|
||||||
|
yamllint .
|
||||||
|
|
||||||
|
molecule:
|
||||||
|
name: Molecule
|
||||||
|
runs-on: ubuntu-latest
|
||||||
|
strategy:
|
||||||
|
matrix:
|
||||||
|
include:
|
||||||
|
- distro: rockylinux9
|
||||||
|
playbook: converge.yml
|
||||||
|
experimental: false
|
||||||
|
- distro: ubuntu2404
|
||||||
|
playbook: converge.yml
|
||||||
|
experimental: false
|
||||||
|
- distro: debian12
|
||||||
|
playbook: converge.yml
|
||||||
|
experimental: false
|
||||||
|
|
||||||
|
- distro: rockylinux9
|
||||||
|
playbook: playbook-snap-install.yml
|
||||||
|
experimental: true
|
||||||
|
|
||||||
|
steps:
|
||||||
|
- name: Check out the codebase.
|
||||||
|
uses: actions/checkout@v4
|
||||||
|
with:
|
||||||
|
path: 'geerlingguy.certbot'
|
||||||
|
|
||||||
|
- name: Set up Python 3.
|
||||||
|
uses: actions/setup-python@v5
|
||||||
|
with:
|
||||||
|
python-version: '3.x'
|
||||||
|
|
||||||
|
- name: Install test dependencies.
|
||||||
|
run: pip3 install ansible molecule molecule-plugins[docker] docker
|
||||||
|
|
||||||
|
- name: Run Molecule tests.
|
||||||
|
run: molecule test
|
||||||
|
continue-on-error: ${{ matrix.experimental }}
|
||||||
|
env:
|
||||||
|
PY_COLORS: '1'
|
||||||
|
ANSIBLE_FORCE_COLOR: '1'
|
||||||
|
MOLECULE_DISTRO: ${{ matrix.distro }}
|
||||||
|
MOLECULE_PLAYBOOK: ${{ matrix.playbook }}
|
40
.github/workflows/release.yml
vendored
Normal file
40
.github/workflows/release.yml
vendored
Normal file
@ -0,0 +1,40 @@
|
|||||||
|
---
|
||||||
|
# This workflow requires a GALAXY_API_KEY secret present in the GitHub
|
||||||
|
# repository or organization.
|
||||||
|
#
|
||||||
|
# See: https://github.com/marketplace/actions/publish-ansible-role-to-galaxy
|
||||||
|
# See: https://github.com/ansible/galaxy/issues/46
|
||||||
|
|
||||||
|
name: Release
|
||||||
|
'on':
|
||||||
|
push:
|
||||||
|
tags:
|
||||||
|
- '*'
|
||||||
|
|
||||||
|
defaults:
|
||||||
|
run:
|
||||||
|
working-directory: 'geerlingguy.certbot'
|
||||||
|
|
||||||
|
jobs:
|
||||||
|
|
||||||
|
release:
|
||||||
|
name: Release
|
||||||
|
runs-on: ubuntu-latest
|
||||||
|
steps:
|
||||||
|
- name: Check out the codebase.
|
||||||
|
uses: actions/checkout@v4
|
||||||
|
with:
|
||||||
|
path: 'geerlingguy.certbot'
|
||||||
|
|
||||||
|
- name: Set up Python 3.
|
||||||
|
uses: actions/setup-python@v5
|
||||||
|
with:
|
||||||
|
python-version: '3.x'
|
||||||
|
|
||||||
|
- name: Install Ansible.
|
||||||
|
run: pip3 install ansible-core
|
||||||
|
|
||||||
|
- name: Trigger a new import on Galaxy.
|
||||||
|
run: >-
|
||||||
|
ansible-galaxy role import --api-key ${{ secrets.GALAXY_API_KEY }}
|
||||||
|
$(echo ${{ github.repository }} | cut -d/ -f1) $(echo ${{ github.repository }} | cut -d/ -f2)
|
34
.github/workflows/stale.yml
vendored
Normal file
34
.github/workflows/stale.yml
vendored
Normal file
@ -0,0 +1,34 @@
|
|||||||
|
---
|
||||||
|
name: Close inactive issues
|
||||||
|
'on':
|
||||||
|
schedule:
|
||||||
|
- cron: "55 12 * * 1" # semi-random time
|
||||||
|
|
||||||
|
jobs:
|
||||||
|
close-issues:
|
||||||
|
runs-on: ubuntu-latest
|
||||||
|
permissions:
|
||||||
|
issues: write
|
||||||
|
pull-requests: write
|
||||||
|
steps:
|
||||||
|
- uses: actions/stale@v8
|
||||||
|
with:
|
||||||
|
days-before-stale: 120
|
||||||
|
days-before-close: 60
|
||||||
|
exempt-issue-labels: bug,pinned,security,planned
|
||||||
|
exempt-pr-labels: bug,pinned,security,planned
|
||||||
|
stale-issue-label: "stale"
|
||||||
|
stale-pr-label: "stale"
|
||||||
|
stale-issue-message: |
|
||||||
|
This issue has been marked 'stale' due to lack of recent activity. If there is no further activity, the issue will be closed in another 30 days. Thank you for your contribution!
|
||||||
|
|
||||||
|
Please read [this blog post](https://www.jeffgeerling.com/blog/2020/enabling-stale-issue-bot-on-my-github-repositories) to see the reasons why I mark issues as stale.
|
||||||
|
close-issue-message: |
|
||||||
|
This issue has been closed due to inactivity. If you feel this is in error, please reopen the issue or file a new issue with the relevant details.
|
||||||
|
stale-pr-message: |
|
||||||
|
This pr has been marked 'stale' due to lack of recent activity. If there is no further activity, the issue will be closed in another 30 days. Thank you for your contribution!
|
||||||
|
|
||||||
|
Please read [this blog post](https://www.jeffgeerling.com/blog/2020/enabling-stale-issue-bot-on-my-github-repositories) to see the reasons why I mark issues as stale.
|
||||||
|
close-pr-message: |
|
||||||
|
This pr has been closed due to inactivity. If you feel this is in error, please reopen the issue or file a new issue with the relevant details.
|
||||||
|
repo-token: ${{ secrets.GITHUB_TOKEN }}
|
5
.gitignore
vendored
5
.gitignore
vendored
@ -1,2 +1,5 @@
|
|||||||
*.retry
|
*.retry
|
||||||
tests/test.sh
|
*/__pycache__
|
||||||
|
*.pyc
|
||||||
|
.cache
|
||||||
|
|
||||||
|
23
.travis.yml
23
.travis.yml
@ -1,23 +0,0 @@
|
|||||||
---
|
|
||||||
services: docker
|
|
||||||
|
|
||||||
env:
|
|
||||||
- distro: centos7
|
|
||||||
- distro: centos6
|
|
||||||
playbook: test-source-install.yml
|
|
||||||
- distro: ubuntu1604
|
|
||||||
- distro: ubuntu1404
|
|
||||||
playbook: test-source-install.yml
|
|
||||||
- distro: debian8
|
|
||||||
playbook: test-source-install.yml
|
|
||||||
|
|
||||||
script:
|
|
||||||
# Download test shim.
|
|
||||||
- wget -O ${PWD}/tests/test.sh https://gist.githubusercontent.com/geerlingguy/73ef1e5ee45d8694570f334be385e181/raw/
|
|
||||||
- chmod +x ${PWD}/tests/test.sh
|
|
||||||
|
|
||||||
# Run tests.
|
|
||||||
- ${PWD}/tests/test.sh
|
|
||||||
|
|
||||||
notifications:
|
|
||||||
webhooks: https://galaxy.ansible.com/api/v1/notifications/
|
|
13
.yamllint
Normal file
13
.yamllint
Normal file
@ -0,0 +1,13 @@
|
|||||||
|
---
|
||||||
|
extends: default
|
||||||
|
|
||||||
|
rules:
|
||||||
|
line-length:
|
||||||
|
max: 180
|
||||||
|
level: warning
|
||||||
|
indentation:
|
||||||
|
spaces: 2
|
||||||
|
indent-sequences: consistent
|
||||||
|
|
||||||
|
ignore: |
|
||||||
|
.github/workflows/stale.yml
|
67
README.md
67
README.md
@ -1,6 +1,6 @@
|
|||||||
# Ansible Role: Certbot (for Let's Encrypt)
|
# Ansible Role: Certbot (for Let's Encrypt)
|
||||||
|
|
||||||
[](https://travis-ci.org/geerlingguy/ansible-role-certbot)
|
[](https://github.com/geerlingguy/ansible-role-certbot/actions/workflows/ci.yml)
|
||||||
|
|
||||||
Installs and configures Certbot (for Let's Encrypt).
|
Installs and configures Certbot (for Let's Encrypt).
|
||||||
|
|
||||||
@ -12,26 +12,39 @@ Generally, installing from source (see section `Source Installation from Git`) l
|
|||||||
|
|
||||||
## Role Variables
|
## Role Variables
|
||||||
|
|
||||||
The variable `certbot_install_from_source` controls whether to install Certbot from Git or package management. The latter is the default, so the variable defaults to `no`.
|
certbot_install_method: package
|
||||||
|
|
||||||
|
Controls how Certbot is installed. Available options are 'package', 'snap', and 'source'.
|
||||||
|
|
||||||
certbot_auto_renew: true
|
certbot_auto_renew: true
|
||||||
certbot_auto_renew_user: "{{ ansible_user }}"
|
certbot_auto_renew_user: "{{ ansible_user | default(lookup('env', 'USER')) }}"
|
||||||
certbot_auto_renew_hour: 3
|
certbot_auto_renew_hour: "3"
|
||||||
certbot_auto_renew_minute: 30
|
certbot_auto_renew_minute: "30"
|
||||||
certbot_auto_renew_options: "--quiet --no-self-upgrade"
|
certbot_auto_renew_options: "--quiet"
|
||||||
|
|
||||||
By default, this role configures a cron job to run under the provided user account at the given hour and minute, every day. The defaults run `certbot renew` (or `certbot-auto renew`) via cron every day at 03:30:00 by the user you use in your Ansible playbook. It's preferred that you set a custom user/hour/minute so the renewal is during a low-traffic period and done by a non-root user account.
|
By default, this role configures a cron job to run under the provided user account at the given hour and minute, every day. The defaults run `certbot renew` (or `certbot-auto renew`) via cron every day at 03:30:00 by the user you use in your Ansible playbook. It's preferred that you set a custom user/hour/minute so the renewal is during a low-traffic period and done by a non-root user account.
|
||||||
|
|
||||||
### Automatic Certificate Generation
|
### Automatic Certificate Generation
|
||||||
|
|
||||||
Currently there is one built-in method for generating new certificates using this role: `standalone`. Other methods (e.g. using nginx or apache and a webroot) may be added in the future.
|
Currently the `standalone` and `webroot` method are supported for generating new certificates using this role.
|
||||||
|
|
||||||
**For a complete example**: see the fully functional test playbook in [tests/test-standalone-nginx-aws.yml](tests/test-standalone-nginx-aws.yml).
|
**For a complete example**: see the fully functional test playbook in [molecule/default/playbook-standalone-nginx-aws.yml](molecule/default/playbook-standalone-nginx-aws.yml).
|
||||||
|
|
||||||
|
certbot_create_if_missing: false
|
||||||
|
|
||||||
|
Set `certbot_create_if_missing` to `yes` or `True` to let this role generate certs.
|
||||||
|
|
||||||
certbot_create_if_missing: no
|
|
||||||
certbot_create_method: standalone
|
certbot_create_method: standalone
|
||||||
|
|
||||||
Set `certbot_create_if_missing` to `yes` or `True` to let this role generate certs. Set the method used for generating certs with the `certbot_create_method` variable—current allowed values include: `standalone`.
|
Set the method used for generating certs with the `certbot_create_method` variable — current allowed values are: `standalone` or `webroot`.
|
||||||
|
|
||||||
|
certbot_testmode: false
|
||||||
|
|
||||||
|
Enable test mode to only run a test request without actually creating certificates.
|
||||||
|
|
||||||
|
certbot_hsts: false
|
||||||
|
|
||||||
|
Enable (HTTP Strict Transport Security) for the certificate generation.
|
||||||
|
|
||||||
certbot_admin_email: email@example.com
|
certbot_admin_email: email@example.com
|
||||||
|
|
||||||
@ -39,17 +52,18 @@ The email address used to agree to Let's Encrypt's TOS and subscribe to cert-rel
|
|||||||
|
|
||||||
certbot_certs: []
|
certbot_certs: []
|
||||||
# - email: janedoe@example.com
|
# - email: janedoe@example.com
|
||||||
|
# webroot: "/var/www/html"
|
||||||
# domains:
|
# domains:
|
||||||
# - example1.com
|
# - example1.com
|
||||||
# - example2.com
|
# - example2.com
|
||||||
# - domains:
|
# - domains:
|
||||||
# - example3.com
|
# - example3.com
|
||||||
|
|
||||||
A list of domains (and other data) for which certs should be generated. You can add an `email` key to any list item to override the `certbot_admin_email`.
|
A list of domains (and other data) for which certs should be generated. You can add an `email` key to any list item to override the `certbot_admin_email`. When using the `webroot` creation method, a `webroot` item has to be provided, specifying which directory to use for the authentication. Make sure your webserver correctly delivers contents from this directory.
|
||||||
|
|
||||||
certbot_create_command: "{{ certbot_script }} certonly --standalone --noninteractive --agree-tos --email {{ cert_item.email | default(certbot_admin_email) }} -d {{ cert_item.domains | join(',') }}"
|
certbot_create_command: "{{ certbot_script }} certonly --standalone --noninteractive --agree-tos --email {{ cert_item.email | default(certbot_admin_email) }} -d {{ cert_item.domains | join(',') }}"
|
||||||
|
|
||||||
The `certbot_create_command` defines the command used to generate the cert.
|
The `certbot_create_command` defines the command used to generate the cert. See the full default command inside `defaults/main.yml` for a full example—and you can easily add in extra arguments that are not in the default command with the `certbot_create_extra_args` variable.
|
||||||
|
|
||||||
#### Standalone Certificate Generation
|
#### Standalone Certificate Generation
|
||||||
|
|
||||||
@ -60,21 +74,38 @@ Services that should be stopped while `certbot` runs it's own standalone server
|
|||||||
|
|
||||||
These services will only be stopped the first time a new cert is generated.
|
These services will only be stopped the first time a new cert is generated.
|
||||||
|
|
||||||
|
### Snap Installation
|
||||||
|
|
||||||
|
Beginning in December 2020, the Certbot maintainers decided to recommend installing Certbot from Snap rather than maintain scripts like `certbot-auto`.
|
||||||
|
|
||||||
|
Setting `certbot_install_method: snap` configures this role to install Certbot via Snap.
|
||||||
|
|
||||||
|
This install method is currently experimental and may or may not work across all Linux distributions.
|
||||||
|
|
||||||
|
#### Webroot Certificate Generation
|
||||||
|
|
||||||
|
When using the `webroot` creation method, a `webroot` item has to be provided for every `certbot_certs` item, specifying which directory to use for the authentication. Also, make sure your webserver correctly delivers contents from this directory.
|
||||||
|
|
||||||
### Source Installation from Git
|
### Source Installation from Git
|
||||||
|
|
||||||
You can install Certbot from it's Git source repository if desired. This might be useful in several cases, but especially when older distributions don't have Certbot packages available (e.g. CentOS < 7, Ubuntu < 16.10 and Debian < 8).
|
You can install Certbot from it's Git source repository if desired with `certbot_install_method: source`. This might be useful in several cases, but especially when older distributions don't have Certbot packages available (e.g. CentOS < 7, Ubuntu < 16.10 and Debian < 8).
|
||||||
|
|
||||||
certbot_install_from_source: no
|
|
||||||
certbot_repo: https://github.com/certbot/certbot.git
|
certbot_repo: https://github.com/certbot/certbot.git
|
||||||
certbot_version: master
|
certbot_version: master
|
||||||
certbot_keep_updated: yes
|
certbot_keep_updated: true
|
||||||
|
|
||||||
Certbot Git repository options. To install from source, set `certbot_install_from_source` to `yes`. This clones the configured `certbot_repo`, respecting the `certbot_version` setting. If `certbot_keep_updated` is set to `yes`, the repository is updated every time this role runs.
|
Certbot Git repository options. If installing from source, the configured `certbot_repo` is cloned, respecting the `certbot_version` setting. If `certbot_keep_updated` is set to `yes`, the repository is updated every time this role runs.
|
||||||
|
|
||||||
certbot_dir: /opt/certbot
|
certbot_dir: /opt/certbot
|
||||||
|
|
||||||
The directory inside which Certbot will be cloned.
|
The directory inside which Certbot will be cloned.
|
||||||
|
|
||||||
|
### Wildcard Certificates
|
||||||
|
|
||||||
|
Let's Encrypt supports [generating wildcard certificates](https://community.letsencrypt.org/t/acme-v2-and-wildcard-certificate-support-is-live/55579), but the process for generating and using them is slightly more involved. See comments in [this pull request](https://github.com/geerlingguy/ansible-role-certbot/pull/60#issuecomment-423919284) for an example of how to use this role to maintain wildcard certs.
|
||||||
|
|
||||||
|
Michael Porter also has a walkthrough of [Creating A Let’s Encrypt Wildcard Cert With Ansible](https://www.michaelpporter.com/2018/09/creating-a-wildcard-cert-with-ansible/), specifically with Cloudflare.
|
||||||
|
|
||||||
## Dependencies
|
## Dependencies
|
||||||
|
|
||||||
None.
|
None.
|
||||||
@ -85,8 +116,8 @@ None.
|
|||||||
|
|
||||||
vars:
|
vars:
|
||||||
certbot_auto_renew_user: your_username_here
|
certbot_auto_renew_user: your_username_here
|
||||||
certbot_auto_renew_minute: 20
|
certbot_auto_renew_minute: "20"
|
||||||
certbot_auto_renew_hour: 5
|
certbot_auto_renew_hour: "5"
|
||||||
|
|
||||||
roles:
|
roles:
|
||||||
- geerlingguy.certbot
|
- geerlingguy.certbot
|
||||||
|
@ -1,34 +1,70 @@
|
|||||||
---
|
---
|
||||||
# Certbot auto-renew cron job configuration (for certificate renewals).
|
# Certbot auto-renew cron job configuration (for certificate renewals).
|
||||||
certbot_auto_renew: true
|
certbot_auto_renew: true
|
||||||
certbot_auto_renew_user: "{{ ansible_user }}"
|
certbot_auto_renew_user: "{{ ansible_user | default(lookup('env', 'USER')) }}"
|
||||||
certbot_auto_renew_hour: 3
|
certbot_auto_renew_hour: "3"
|
||||||
certbot_auto_renew_minute: 30
|
certbot_auto_renew_minute: "30"
|
||||||
certbot_auto_renew_options: "--quiet --no-self-upgrade"
|
certbot_auto_renew_options: "--quiet"
|
||||||
|
|
||||||
|
certbot_testmode: false
|
||||||
|
certbot_hsts: false
|
||||||
|
|
||||||
|
|
||||||
# Parameters used when creating new Certbot certs.
|
# Parameters used when creating new Certbot certs.
|
||||||
certbot_create_if_missing: no
|
certbot_create_if_missing: false
|
||||||
certbot_create_method: standalone
|
certbot_create_method: standalone
|
||||||
|
certbot_create_extra_args: ""
|
||||||
certbot_admin_email: email@example.com
|
certbot_admin_email: email@example.com
|
||||||
|
certbot_expand: false
|
||||||
|
|
||||||
|
# Default webroot, overwritten by individual per-cert webroot directories
|
||||||
|
certbot_webroot: /var/www/letsencrypt
|
||||||
|
|
||||||
certbot_certs: []
|
certbot_certs: []
|
||||||
# - email: janedoe@example.com
|
# - name: example.com
|
||||||
# domains:
|
# email: janedoe@example.com
|
||||||
# - example1.com
|
# webroot: "/var/www/html/"
|
||||||
# - example2.com
|
# domains:
|
||||||
# - domains:
|
# - example1.com
|
||||||
# - example3.com
|
# - example2.com
|
||||||
certbot_create_command: "{{ certbot_script }} certonly --standalone --noninteractive --agree-tos --email {{ cert_item.email | default(certbot_admin_email) }} -d {{ cert_item.domains | join(',') }}"
|
# - domains:
|
||||||
|
# - example3.com
|
||||||
|
|
||||||
|
certbot_create_command: >-
|
||||||
|
{{ certbot_script }} certonly --{{ certbot_create_method }}
|
||||||
|
{{ '--hsts' if certbot_hsts else '' }}
|
||||||
|
{{ '--test-cert' if certbot_testmode else '' }}
|
||||||
|
--noninteractive --agree-tos
|
||||||
|
--email {{ cert_item.email | default(certbot_admin_email) }}
|
||||||
|
{{ '--expand' if certbot_expand else '' }}
|
||||||
|
{{ '--webroot-path ' if certbot_create_method == 'webroot' else '' }}
|
||||||
|
{{ cert_item.webroot | default(certbot_webroot) if certbot_create_method == 'webroot' else '' }}
|
||||||
|
{{ certbot_create_extra_args }}
|
||||||
|
--cert-name {{ cert_item_name }}
|
||||||
|
-d {{ cert_item.domains | join(',') }}
|
||||||
|
{{ '--expand' if certbot_expand else '' }}
|
||||||
|
{{ '--pre-hook /etc/letsencrypt/renewal-hooks/pre/stop_services'
|
||||||
|
if certbot_create_standalone_stop_services and certbot_create_method == 'standalone'
|
||||||
|
else '' }}
|
||||||
|
{{ '--post-hook /etc/letsencrypt/renewal-hooks/post/start_services'
|
||||||
|
if certbot_create_standalone_stop_services and certbot_create_method == 'standalone'
|
||||||
|
else '' }}
|
||||||
|
{{ "--deploy-hook '" ~ cert_item.deploy_hook ~ "'"
|
||||||
|
if 'deploy_hook' in cert_item
|
||||||
|
else '' }}
|
||||||
|
|
||||||
certbot_create_standalone_stop_services:
|
certbot_create_standalone_stop_services:
|
||||||
- nginx
|
- nginx
|
||||||
# - apache
|
# - apache
|
||||||
# - varnish
|
# - varnish
|
||||||
|
|
||||||
# To install from source (on older OSes or if you need a specific or newer
|
# Available options: 'package', 'snap', 'source'.
|
||||||
# version of Certbot), set this variable to `yes` and configure other options.
|
certbot_install_method: 'package'
|
||||||
certbot_install_from_source: no
|
|
||||||
|
# Source install configuration.
|
||||||
certbot_repo: https://github.com/certbot/certbot.git
|
certbot_repo: https://github.com/certbot/certbot.git
|
||||||
certbot_version: master
|
certbot_version: master
|
||||||
certbot_keep_updated: yes
|
certbot_keep_updated: true
|
||||||
|
|
||||||
# Where to put Certbot when installing from source.
|
# Where to put Certbot when installing from source.
|
||||||
certbot_dir: /opt/certbot
|
certbot_dir: /opt/certbot
|
||||||
|
@ -2,16 +2,13 @@
|
|||||||
dependencies: []
|
dependencies: []
|
||||||
|
|
||||||
galaxy_info:
|
galaxy_info:
|
||||||
|
role_name: certbot
|
||||||
author: geerlingguy
|
author: geerlingguy
|
||||||
description: "Installs and configures Certbot (for Let's Encrypt)."
|
description: "Installs and configures Certbot (for Let's Encrypt)."
|
||||||
company: "Midwestern Mac, LLC"
|
company: "Midwestern Mac, LLC"
|
||||||
license: "license (BSD, MIT)"
|
license: "license (BSD, MIT)"
|
||||||
min_ansible_version: 2.4
|
min_ansible_version: 2.10
|
||||||
platforms:
|
platforms:
|
||||||
- name: EL
|
|
||||||
versions:
|
|
||||||
- 6
|
|
||||||
- 7
|
|
||||||
- name: Fedora
|
- name: Fedora
|
||||||
versions:
|
versions:
|
||||||
- all
|
- all
|
||||||
|
@ -1,5 +1,10 @@
|
|||||||
---
|
---
|
||||||
- hosts: all
|
- name: Converge
|
||||||
|
hosts: all
|
||||||
|
# become: true
|
||||||
|
|
||||||
|
vars:
|
||||||
|
certbot_auto_renew_user: root
|
||||||
|
|
||||||
pre_tasks:
|
pre_tasks:
|
||||||
- name: Update apt cache.
|
- name: Update apt cache.
|
||||||
@ -8,15 +13,16 @@
|
|||||||
changed_when: false
|
changed_when: false
|
||||||
|
|
||||||
- name: Install dependencies (RedHat).
|
- name: Install dependencies (RedHat).
|
||||||
yum: name={{ item }} state=present
|
yum:
|
||||||
when: ansible_os_family == 'RedHat'
|
name:
|
||||||
with_items:
|
|
||||||
- cronie
|
- cronie
|
||||||
- epel-release
|
- epel-release
|
||||||
|
state: present
|
||||||
|
when: ansible_os_family == 'RedHat'
|
||||||
|
|
||||||
- name: Install cron (Debian).
|
- name: Install cron (Debian).
|
||||||
apt: name=cron state=present
|
apt: name=cron state=present
|
||||||
when: ansible_os_family == 'Debian'
|
when: ansible_os_family == 'Debian'
|
||||||
|
|
||||||
roles:
|
roles:
|
||||||
- role_under_test
|
- geerlingguy.certbot
|
21
molecule/default/molecule.yml
Normal file
21
molecule/default/molecule.yml
Normal file
@ -0,0 +1,21 @@
|
|||||||
|
---
|
||||||
|
role_name_check: 1
|
||||||
|
dependency:
|
||||||
|
name: galaxy
|
||||||
|
options:
|
||||||
|
ignore-errors: true
|
||||||
|
driver:
|
||||||
|
name: docker
|
||||||
|
platforms:
|
||||||
|
- name: instance
|
||||||
|
image: "geerlingguy/docker-${MOLECULE_DISTRO:-rockylinux9}-ansible:latest"
|
||||||
|
command: ${MOLECULE_DOCKER_COMMAND:-""}
|
||||||
|
volumes:
|
||||||
|
- /sys/fs/cgroup:/sys/fs/cgroup:rw
|
||||||
|
cgroupns_mode: host
|
||||||
|
privileged: true
|
||||||
|
pre_build_image: true
|
||||||
|
provisioner:
|
||||||
|
name: ansible
|
||||||
|
playbooks:
|
||||||
|
converge: ${MOLECULE_PLAYBOOK:-converge.yml}
|
@ -1,8 +1,11 @@
|
|||||||
---
|
---
|
||||||
- hosts: all
|
- name: Converge
|
||||||
|
hosts: all
|
||||||
|
#become: true
|
||||||
|
|
||||||
vars:
|
vars:
|
||||||
certbot_install_from_source: yes
|
certbot_install_method: 'snap'
|
||||||
|
certbot_auto_renew_user: root
|
||||||
|
|
||||||
pre_tasks:
|
pre_tasks:
|
||||||
- name: Update apt cache.
|
- name: Update apt cache.
|
||||||
@ -20,4 +23,4 @@
|
|||||||
|
|
||||||
roles:
|
roles:
|
||||||
- geerlingguy.git
|
- geerlingguy.git
|
||||||
- role_under_test
|
- geerlingguy.certbot
|
26
molecule/default/playbook-source-install.yml
Normal file
26
molecule/default/playbook-source-install.yml
Normal file
@ -0,0 +1,26 @@
|
|||||||
|
---
|
||||||
|
- name: Converge
|
||||||
|
hosts: all
|
||||||
|
#become: true
|
||||||
|
|
||||||
|
vars:
|
||||||
|
certbot_install_method: 'source'
|
||||||
|
certbot_auto_renew_user: root
|
||||||
|
|
||||||
|
pre_tasks:
|
||||||
|
- name: Update apt cache.
|
||||||
|
apt: update_cache=yes cache_valid_time=600
|
||||||
|
when: ansible_os_family == 'Debian'
|
||||||
|
changed_when: false
|
||||||
|
|
||||||
|
- name: Install cron (RedHat).
|
||||||
|
yum: name=cronie state=present
|
||||||
|
when: ansible_os_family == 'RedHat'
|
||||||
|
|
||||||
|
- name: Install cron (Debian).
|
||||||
|
apt: name=cron state=present
|
||||||
|
when: ansible_os_family == 'Debian'
|
||||||
|
|
||||||
|
roles:
|
||||||
|
- geerlingguy.git
|
||||||
|
- geerlingguy.certbot
|
@ -9,7 +9,7 @@
|
|||||||
# Play 1: Provision EC2 instance and A record.
|
# Play 1: Provision EC2 instance and A record.
|
||||||
- hosts: localhost
|
- hosts: localhost
|
||||||
connection: local
|
connection: local
|
||||||
gather_facts: no
|
gather_facts: false
|
||||||
|
|
||||||
tasks:
|
tasks:
|
||||||
- name: Configure EC2 Security Group.
|
- name: Configure EC2 Security Group.
|
||||||
@ -40,7 +40,8 @@
|
|||||||
region: "us-east-1"
|
region: "us-east-1"
|
||||||
name: certbot_test
|
name: certbot_test
|
||||||
key_material: "{{ item }}"
|
key_material: "{{ item }}"
|
||||||
with_file: ~/.ssh/id_rsa.pub
|
with_file:
|
||||||
|
- ~/.ssh/id_rsa.pub
|
||||||
|
|
||||||
- name: Provision EC2 instance.
|
- name: Provision EC2 instance.
|
||||||
ec2:
|
ec2:
|
||||||
@ -50,9 +51,10 @@
|
|||||||
Name: "certbot-standalone-nginx-test"
|
Name: "certbot-standalone-nginx-test"
|
||||||
group: ['default', 'certbot_test_http']
|
group: ['default', 'certbot_test_http']
|
||||||
instance_type: t2.micro
|
instance_type: t2.micro
|
||||||
image: ami-02e98f78 # CentOS Linux 7 x86_64 HVM EBS
|
# CentOS Linux 7 x86_64 HVM EBS
|
||||||
|
image: ami-02e98f78
|
||||||
region: "us-east-1"
|
region: "us-east-1"
|
||||||
wait: yes
|
wait: true
|
||||||
wait_timeout: 500
|
wait_timeout: 500
|
||||||
exact_count: 1
|
exact_count: 1
|
||||||
count_tag:
|
count_tag:
|
||||||
@ -68,28 +70,29 @@
|
|||||||
type: A
|
type: A
|
||||||
ttl: 300
|
ttl: 300
|
||||||
value: "{{ created_instance.tagged_instances.0.public_ip }}"
|
value: "{{ created_instance.tagged_instances.0.public_ip }}"
|
||||||
wait: yes
|
wait: true
|
||||||
overwrite: yes
|
overwrite: true
|
||||||
|
|
||||||
- name: Add EC2 instance to inventory groups.
|
- name: Add EC2 instance to inventory groups.
|
||||||
add_host:
|
add_host:
|
||||||
name: "certbot-test.servercheck.in"
|
name: "certbot-test.servercheck.in"
|
||||||
groups: "aws,aws_nginx"
|
groups: "aws,aws_nginx"
|
||||||
ansible_ssh_user: centos
|
ansible_ssh_user: centos
|
||||||
host_key_checking: False
|
host_key_checking: false
|
||||||
when: created_instance.tagged_instances.0.id is defined
|
when: created_instance.tagged_instances.0.id is defined
|
||||||
|
|
||||||
# Play 2: Configure EC2 instance with Certbot and Nginx.
|
# Play 2: Configure EC2 instance with Certbot and Nginx.
|
||||||
- hosts: aws_nginx
|
- hosts: aws_nginx
|
||||||
gather_facts: yes
|
gather_facts: true
|
||||||
become: yes
|
become: true
|
||||||
|
|
||||||
vars:
|
vars:
|
||||||
certbot_admin_email: https@servercheck.in
|
certbot_admin_email: https@servercheck.in
|
||||||
certbot_create_if_missing: yes
|
certbot_create_if_missing: true
|
||||||
certbot_create_standalone_stop_services: []
|
certbot_create_standalone_stop_services: []
|
||||||
certbot_certs:
|
certbot_certs:
|
||||||
- domains:
|
- name: certbot-test.servercheck.in
|
||||||
|
domains:
|
||||||
- certbot-test.servercheck.in
|
- certbot-test.servercheck.in
|
||||||
nginx_vhosts:
|
nginx_vhosts:
|
||||||
- listen: "443 ssl http2"
|
- listen: "443 ssl http2"
|
||||||
@ -107,7 +110,7 @@
|
|||||||
|
|
||||||
pre_tasks:
|
pre_tasks:
|
||||||
- name: Update apt cache.
|
- name: Update apt cache.
|
||||||
apt: update_cache=yes cache_valid_time=600
|
apt: update_cache=true cache_valid_time=600
|
||||||
when: ansible_os_family == 'Debian'
|
when: ansible_os_family == 'Debian'
|
||||||
changed_when: false
|
changed_when: false
|
||||||
|
|
||||||
@ -135,12 +138,12 @@
|
|||||||
url: https://certbot-test.servercheck.in/
|
url: https://certbot-test.servercheck.in/
|
||||||
status_code: 200
|
status_code: 200
|
||||||
delegate_to: localhost
|
delegate_to: localhost
|
||||||
become: no
|
become: false
|
||||||
|
|
||||||
# Play 3: Tear down EC2 instance and A record.
|
# Play 3: Tear down EC2 instance and A record.
|
||||||
- hosts: localhost
|
- hosts: localhost
|
||||||
connection: local
|
connection: local
|
||||||
gather_facts: no
|
gather_facts: false
|
||||||
|
|
||||||
tasks:
|
tasks:
|
||||||
- name: Destroy EC2 instance.
|
- name: Destroy EC2 instance.
|
||||||
@ -149,7 +152,7 @@
|
|||||||
instance_ids: ["{{ created_instance.tagged_instances.0.id }}"]
|
instance_ids: ["{{ created_instance.tagged_instances.0.id }}"]
|
||||||
region: "us-east-1"
|
region: "us-east-1"
|
||||||
state: absent
|
state: absent
|
||||||
wait: yes
|
wait: true
|
||||||
wait_timeout: 500
|
wait_timeout: 500
|
||||||
|
|
||||||
- name: Delete Security Group.
|
- name: Delete Security Group.
|
@ -1,23 +1,63 @@
|
|||||||
---
|
---
|
||||||
|
- name: Determine certificate name
|
||||||
|
set_fact:
|
||||||
|
cert_item_name: "{{ cert_item.name | default(cert_item.domains | first | replace('*.', '')) }}"
|
||||||
|
|
||||||
- name: Check if certificate already exists.
|
- name: Check if certificate already exists.
|
||||||
stat:
|
stat:
|
||||||
path: /etc/letsencrypt/live/{{ cert_item.domains | first }}/cert.pem
|
path: /etc/letsencrypt/live/{{ cert_item_name }}/cert.pem
|
||||||
register: letsencrypt_cert
|
register: letsencrypt_cert
|
||||||
|
|
||||||
- name: Stop services to allow certbot to generate a cert.
|
- name: Ensure pre and post hook folders exist.
|
||||||
service:
|
file:
|
||||||
name: "{{ item }}"
|
path: /etc/letsencrypt/renewal-hooks/{{ item }}
|
||||||
state: stopped
|
state: directory
|
||||||
when: not letsencrypt_cert.stat.exists
|
mode: 0755
|
||||||
with_items: "{{ certbot_create_standalone_stop_services }}"
|
owner: root
|
||||||
|
group: root
|
||||||
|
with_items:
|
||||||
|
- pre
|
||||||
|
- post
|
||||||
|
|
||||||
|
- name: Create pre hook to stop services.
|
||||||
|
template:
|
||||||
|
src: stop_services.j2
|
||||||
|
dest: /etc/letsencrypt/renewal-hooks/pre/stop_services
|
||||||
|
owner: root
|
||||||
|
group: root
|
||||||
|
mode: 0750
|
||||||
|
when:
|
||||||
|
- certbot_create_standalone_stop_services is defined
|
||||||
|
- certbot_create_standalone_stop_services
|
||||||
|
|
||||||
|
- name: Create post hook to start services.
|
||||||
|
template:
|
||||||
|
src: start_services.j2
|
||||||
|
dest: /etc/letsencrypt/renewal-hooks/post/start_services
|
||||||
|
owner: root
|
||||||
|
group: root
|
||||||
|
mode: 0750
|
||||||
|
when:
|
||||||
|
- certbot_create_standalone_stop_services is defined
|
||||||
|
- certbot_create_standalone_stop_services
|
||||||
|
|
||||||
|
- name: Check if domains have changed
|
||||||
|
block:
|
||||||
|
- name: Register certificate domains
|
||||||
|
shell: "{{ certbot_script }} certificates --cert-name {{ cert_item_name }} | grep Domains | cut -d':' -f2"
|
||||||
|
changed_when: false
|
||||||
|
register: letsencrypt_cert_domains_dirty
|
||||||
|
|
||||||
|
- name: Cleanup domain list
|
||||||
|
set_fact:
|
||||||
|
letsencrypt_cert_domains: "{{ letsencrypt_cert_domains_dirty.stdout | trim | split(' ') | map('trim') | select('!=', '') | list | sort }}"
|
||||||
|
|
||||||
|
- name: Determine if domains have changed
|
||||||
|
set_fact:
|
||||||
|
letsencrypt_cert_domains_changed: "{{ letsencrypt_cert_domains != (cert_item.domains | map('trim') | select('!=', '') | list | sort) }}"
|
||||||
|
|
||||||
|
when: letsencrypt_cert.stat.exists
|
||||||
|
|
||||||
- name: Generate new certificate if one doesn't exist.
|
- name: Generate new certificate if one doesn't exist.
|
||||||
shell: "{{ certbot_create_command }}"
|
command: "{{ certbot_create_command }}"
|
||||||
when: not letsencrypt_cert.stat.exists
|
when: not letsencrypt_cert.stat.exists or letsencrypt_cert_domains_changed | default(false)
|
||||||
|
|
||||||
- name: Start services after cert has been generated.
|
|
||||||
service:
|
|
||||||
name: "{{ item }}"
|
|
||||||
state: started
|
|
||||||
when: not letsencrypt_cert.stat.exists
|
|
||||||
with_items: "{{ certbot_create_standalone_stop_services }}"
|
|
||||||
|
35
tasks/create-cert-webroot.yml
Normal file
35
tasks/create-cert-webroot.yml
Normal file
@ -0,0 +1,35 @@
|
|||||||
|
---
|
||||||
|
- name: Determine certificate name
|
||||||
|
set_fact:
|
||||||
|
cert_item_name: "{{ cert_item.name | default(cert_item.domains | first | replace('*.', '')) }}"
|
||||||
|
|
||||||
|
- name: Check if certificate already exists.
|
||||||
|
stat:
|
||||||
|
path: /etc/letsencrypt/live/{{ cert_item_name }}/cert.pem
|
||||||
|
register: letsencrypt_cert
|
||||||
|
|
||||||
|
- name: Create webroot directory if it doesn't exist yet
|
||||||
|
file:
|
||||||
|
path: "{{ cert_item.webroot | default(certbot_webroot) }}"
|
||||||
|
state: directory
|
||||||
|
|
||||||
|
- name: Check if domains have changed
|
||||||
|
block:
|
||||||
|
- name: Register certificate domains
|
||||||
|
shell: "{{ certbot_script }} certificates --cert-name {{ cert_item_name }} | grep Domains | cut -d':' -f2"
|
||||||
|
changed_when: false
|
||||||
|
register: letsencrypt_cert_domains_dirty
|
||||||
|
|
||||||
|
- name: Cleanup domain list
|
||||||
|
set_fact:
|
||||||
|
letsencrypt_cert_domains: "{{ letsencrypt_cert_domains_dirty.stdout | trim | split(' ') | map('trim') | select('!=', '') | list | sort }}"
|
||||||
|
|
||||||
|
- name: Determine if domains have changed
|
||||||
|
set_fact:
|
||||||
|
letsencrypt_cert_domains_changed: "{{ letsencrypt_cert_domains != (cert_item.domains | map('trim') | select('!=', '') | list | sort) }}"
|
||||||
|
|
||||||
|
when: letsencrypt_cert.stat.exists
|
||||||
|
|
||||||
|
- name: Generate new certificate if one doesn't exist.
|
||||||
|
command: "{{ certbot_create_command }}"
|
||||||
|
when: not letsencrypt_cert.stat.exists or letsencrypt_cert_domains_changed | default(false)
|
@ -5,7 +5,7 @@
|
|||||||
dest: "{{ certbot_dir }}"
|
dest: "{{ certbot_dir }}"
|
||||||
version: "{{ certbot_version }}"
|
version: "{{ certbot_version }}"
|
||||||
update: "{{ certbot_keep_updated }}"
|
update: "{{ certbot_keep_updated }}"
|
||||||
force: yes
|
force: true
|
||||||
|
|
||||||
- name: Set Certbot script variable.
|
- name: Set Certbot script variable.
|
||||||
set_fact:
|
set_fact:
|
||||||
|
41
tasks/install-with-snap.yml
Normal file
41
tasks/install-with-snap.yml
Normal file
@ -0,0 +1,41 @@
|
|||||||
|
---
|
||||||
|
- name: Ensure snapd is installed.
|
||||||
|
package:
|
||||||
|
name: snapd
|
||||||
|
state: present
|
||||||
|
register: snapd_install
|
||||||
|
|
||||||
|
- name: Ensure snapd is enabled.
|
||||||
|
systemd:
|
||||||
|
name: snapd.socket
|
||||||
|
enabled: true
|
||||||
|
state: started
|
||||||
|
|
||||||
|
- name: Enable classic snap support.
|
||||||
|
file:
|
||||||
|
src: /var/lib/snapd/snap
|
||||||
|
dest: /snap
|
||||||
|
state: link
|
||||||
|
when: ansible_os_family != "Debian"
|
||||||
|
|
||||||
|
- name: Update snap after install.
|
||||||
|
shell: snap install core; snap refresh core
|
||||||
|
changed_when: true
|
||||||
|
failed_when: false
|
||||||
|
when: snapd_install is changed
|
||||||
|
|
||||||
|
- name: Install certbot via snap.
|
||||||
|
snap:
|
||||||
|
name: certbot
|
||||||
|
classic: true
|
||||||
|
|
||||||
|
- name: Symlink certbot into place.
|
||||||
|
file:
|
||||||
|
src: /snap/bin/certbot
|
||||||
|
dest: /usr/bin/certbot
|
||||||
|
state: link
|
||||||
|
ignore_errors: "{{ ansible_check_mode }}"
|
||||||
|
|
||||||
|
- name: Set Certbot script variable.
|
||||||
|
set_fact:
|
||||||
|
certbot_script: /usr/bin/certbot
|
@ -1,11 +1,17 @@
|
|||||||
---
|
---
|
||||||
- import_tasks: include-vars.yml
|
- import_tasks: include-vars.yml
|
||||||
|
|
||||||
|
- import_tasks: setup-RedHat.yml
|
||||||
|
when: ansible_os_family == 'RedHat'
|
||||||
|
|
||||||
- import_tasks: install-with-package.yml
|
- import_tasks: install-with-package.yml
|
||||||
when: not certbot_install_from_source
|
when: certbot_install_method == 'package'
|
||||||
|
|
||||||
|
- import_tasks: install-with-snap.yml
|
||||||
|
when: certbot_install_method == 'snap'
|
||||||
|
|
||||||
- import_tasks: install-from-source.yml
|
- import_tasks: install-from-source.yml
|
||||||
when: certbot_install_from_source
|
when: certbot_install_method == 'source'
|
||||||
|
|
||||||
- include_tasks: create-cert-standalone.yml
|
- include_tasks: create-cert-standalone.yml
|
||||||
with_items: "{{ certbot_certs }}"
|
with_items: "{{ certbot_certs }}"
|
||||||
@ -15,5 +21,13 @@
|
|||||||
loop_control:
|
loop_control:
|
||||||
loop_var: cert_item
|
loop_var: cert_item
|
||||||
|
|
||||||
|
- include_tasks: create-cert-webroot.yml
|
||||||
|
with_items: "{{ certbot_certs }}"
|
||||||
|
when:
|
||||||
|
- certbot_create_if_missing
|
||||||
|
- certbot_create_method == 'webroot'
|
||||||
|
loop_control:
|
||||||
|
loop_var: cert_item
|
||||||
|
|
||||||
- import_tasks: renew-cron.yml
|
- import_tasks: renew-cron.yml
|
||||||
when: certbot_auto_renew
|
when: certbot_auto_renew
|
||||||
|
11
tasks/setup-RedHat.yml
Normal file
11
tasks/setup-RedHat.yml
Normal file
@ -0,0 +1,11 @@
|
|||||||
|
---
|
||||||
|
# See: https://github.com/geerlingguy/ansible-role-certbot/issues/107
|
||||||
|
- name: Ensure dnf-plugins are installed on Rocky/AlmaLinux.
|
||||||
|
yum:
|
||||||
|
name: dnf-plugins-core
|
||||||
|
state: present
|
||||||
|
|
||||||
|
- name: Enable DNF module for Rocky/AlmaLinux.
|
||||||
|
shell: |
|
||||||
|
dnf config-manager --set-enabled crb
|
||||||
|
changed_when: false
|
15
templates/start_services.j2
Normal file
15
templates/start_services.j2
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
#!/bin/bash
|
||||||
|
# {{ ansible_managed }}
|
||||||
|
|
||||||
|
{% for item in certbot_create_standalone_stop_services %}
|
||||||
|
echo "starting service {{ item }}"
|
||||||
|
{% if ansible_service_mgr == 'systemd' %}
|
||||||
|
systemctl start {{ item }}
|
||||||
|
{% elif ansible_service_mgr == 'upstart' %}
|
||||||
|
initctl start {{ item }}
|
||||||
|
{% elif ansible_service_mgr == 'openrc' %}
|
||||||
|
rc-service {{ item }} start
|
||||||
|
{% else %}
|
||||||
|
service {{ item }} start
|
||||||
|
{% endif %}
|
||||||
|
{% endfor %}
|
15
templates/stop_services.j2
Normal file
15
templates/stop_services.j2
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
#!/bin/bash
|
||||||
|
# {{ ansible_managed }}
|
||||||
|
|
||||||
|
{% for item in certbot_create_standalone_stop_services %}
|
||||||
|
echo "stopping service {{ item }}"
|
||||||
|
{% if ansible_service_mgr == 'systemd' %}
|
||||||
|
systemctl stop {{ item }}
|
||||||
|
{% elif ansible_service_mgr == 'upstart' %}
|
||||||
|
initctl stop {{ item }}
|
||||||
|
{% elif ansible_service_mgr == 'openrc' %}
|
||||||
|
rc-service {{ item }} stop
|
||||||
|
{% else %}
|
||||||
|
service {{ item }} stop
|
||||||
|
{% endif %}
|
||||||
|
{% endfor %}
|
@ -1,11 +0,0 @@
|
|||||||
# Ansible Role tests
|
|
||||||
|
|
||||||
To run the test playbook(s) in this directory:
|
|
||||||
|
|
||||||
1. Install and start Docker.
|
|
||||||
1. Download the test shim (see .travis.yml file for the URL) into `tests/test.sh`:
|
|
||||||
- `wget -O tests/test.sh https://gist.githubusercontent.com/geerlingguy/73ef1e5ee45d8694570f334be385e181/raw/`
|
|
||||||
1. Make the test shim executable: `chmod +x tests/test.sh`.
|
|
||||||
1. Run (from the role root directory) `distro=[distro] playbook=[playbook] ./tests/test.sh`
|
|
||||||
|
|
||||||
If you don't want the container to be automatically deleted after the test playbook is run, add the following environment variables: `cleanup=false container_id=$(date +%s)`
|
|
@ -1 +1,2 @@
|
|||||||
|
---
|
||||||
certbot_package: letsencrypt
|
certbot_package: letsencrypt
|
||||||
|
Loading…
x
Reference in New Issue
Block a user