Compare commits

...

50 Commits

Author SHA1 Message Date
Jeff Geerling
1749d0ace0
Merge pull request #230 from Hoeze/master
add --cert-name and --deploy-hook options
2025-03-25 09:19:31 -05:00
Florian R. Hölzlwimmer
d2e42ea198 remove duplicate 'certbot_create_extra_args' introduced in #227 2025-03-25 14:31:01 +01:00
Florian R. Hölzlwimmer
d5a1f4df3c move 'certbot_expand' back to original position in file 2025-03-25 14:27:35 +01:00
Florian R. Hölzlwimmer
de02f52275 Merge remote-tracking branch 'upstream/master' 2025-03-25 14:26:30 +01:00
Jeff Geerling
6ab7f2db23
Merge pull request #227 from almer-t/patch-1
Add missing default for certbot_create_extra_args
2025-03-24 16:11:24 -05:00
Florian R. Hölzlwimmer
32d18724a6 revert debian and ubuntu version changes in CI 2025-03-10 17:09:43 +01:00
Florian R. Hölzlwimmer
11ac393df5 merge upstream/master 2025-03-10 11:29:13 +01:00
Jeff Geerling
1278651f0d Update CI status badges. 2025-01-30 21:24:54 -06:00
Jeff Geerling
3d2fbc6202 Use more modern OS versions for testing. 2025-01-29 22:51:16 -06:00
Jeff Geerling
4f1179392e Don't use sudo inside molecule CI tests. 2025-01-29 21:39:13 -06:00
Florian R. Hölzlwimmer
b3ae28fb77 change certbot_expand default back to false 2025-01-29 15:45:25 +01:00
Florian R. Hölzlwimmer
943abd882d update to debian 11 2025-01-29 14:37:22 +01:00
Florian R. Hölzlwimmer
2fde934223 explicitly determine whether the domain list has changed 2025-01-29 14:22:03 +01:00
Florian R. Hölzlwimmer
851d2b9855 Fix escaping 2025-01-29 13:24:03 +01:00
Florian R. Hölzlwimmer
2d3cf2ad13 fix trailing space 2025-01-29 13:24:03 +01:00
Florian R. Hölzlwimmer
999372cc7e Update tests to include certificate name 2025-01-29 13:24:03 +01:00
Florian R. Hölzlwimmer
811fa11044 add --cert-name and --deploy-hook options 2025-01-29 13:24:03 +01:00
Jeff Geerling
e5bfeaf936 Attempt to get molecule CI tests running again. 2025-01-28 22:23:55 -06:00
Jeff Geerling
9045ec5a59
Merge pull request #208 from theS1LV3R/master
Allow for certificates to be expanded to include new domains
2025-01-28 22:10:40 -06:00
Jeff Geerling
98ea3238ed
Merge pull request #217 from rlenferink/fix-undefined-variable
[BUGFIX] Initialize 'certbot_create_extra_args' variable
2024-12-22 13:18:42 -06:00
Almer
06ca208bb6
Add missing default for certbot_create_extra_args 2024-11-02 11:40:20 +01:00
fliespl
49e18182a7
certbot expand in command 2024-09-20 22:46:37 +02:00
fliespl
48941fe2a0
handle certbot expand in webroot 2024-09-20 22:46:05 +02:00
fliespl
6230e82ba9
handle expand in standalone 2024-09-20 22:45:47 +02:00
fliespl
0b414a9d74
expand variable 2024-09-20 22:44:16 +02:00
Jeff Geerling
78f4cb5ad5 Use CRB not powertools on Alma and Rocky. 2024-07-30 23:24:23 -05:00
Jeff Geerling
d1cbcde4de Fixup CI versions. Drop all older RHEL releases which are broken. 2024-07-16 14:21:11 -05:00
Roy Lenferink
03f4cc3a99 Initialize 'certbot_create_extra_args' variable
This was introduced in 5a23e85f1cebfbc3999d896f25b99a8c2776f808 but no default was added, resulting in a 'undefined variable' error
2024-07-14 11:08:50 +02:00
theS1LV3R
63638f4471
Allow for certificates to be expanded to include new domains 2024-02-09 16:29:19 +01:00
Jeff Geerling
4be771f12a A wee bit of modernization. 2024-01-24 22:00:32 -06:00
Jeff Geerling
de52a1f4c8 Make local dev with molecule a little easier. 2024-01-24 21:48:33 -06:00
Jeff Geerling
cb3b03f435 PR #109 Follow-up: Document new variable inside other variable. 2024-01-04 19:38:53 -06:00
Jeff Geerling
5a23e85f1c
Merge pull request #109 from gagath/rsa-key-size
introduce certbot_create_extra_args (for custom RSA key size)
2024-01-04 19:35:27 -06:00
Jeff Geerling
08543f45b2 Stale bot is now Stale GitHub Action. 2023-07-10 17:47:30 -05:00
Jeff Geerling
84642924df Remove official support for RHEL. Rocky/Alma/Stream support is best-effort. 2023-06-23 10:56:00 -05:00
Jeff Geerling
cfd9655ed0
Merge pull request #192 from fapdash/patch-1
Run hooks only for standalone mode
2023-06-17 22:22:43 -05:00
Jeff Geerling
47203f3b92
Merge pull request #197 from markstos/no-self-upgrade
remove deprecated --no-self-upgrade flag
2023-06-17 22:21:03 -05:00
Jeff Geerling
a3b34ef499
Merge pull request #196 from Kaezon/fix-lint
fixed lint
2023-06-17 22:20:04 -05:00
Mark Stosberg
199f940604 remove deprecated --no-self-upgrade flag
Including it will generate warnings
2023-05-19 17:39:05 -04:00
Brett Costabile
1b04270982 fixed lint 2023-05-09 10:14:27 -04:00
Jeff Geerling
a056da763e Fix Molecule CI workflow since docker plugin has moved. 2023-04-20 17:27:06 -05:00
FAP
2deba31679
Check for both conditions (squash me) 2023-02-20 12:26:44 +01:00
FAP
d30ddd946a
Run hooks only for standalone mode
If the `certbot_create_method` is set to `webroot` the `stop_services` and `start_services` hook shouldn't be run.
2023-02-01 15:13:09 +01:00
Jeff Geerling
3d55be0a54 Fix Molecule CI workflow for Ubuntu 22.04 GitHub Actions. 2022-12-06 18:23:34 -06:00
Jeff Geerling
3f133ad7ab Remove deprecated warn arg from command and shell module invocations. 2022-11-26 22:51:08 -06:00
Jeff Geerling
c6297ddebb Add role_name_check skipping to all molecule test suites. 2022-06-01 22:20:31 -05:00
Romain Porte
3fcd4e0258 introduce certbot_create_extra_args 2022-02-20 07:05:41 +01:00
Jeff Geerling
eb4647ed9c
Merge pull request #166 from tobiashuste/fix-snap-initial-dry-run
Fix snap symlink task failing in initial dry-run
2022-01-19 08:48:29 -06:00
Jeff Geerling
31beafb338 Update release workflow for more consistency. 2021-12-27 11:34:47 -06:00
Tobias Huste
1fc3a76d34 Fix snap symlink task failing in initial dry-run
Due to the certbot package not being really installed on the initial
dry-run the symlink generation fails. The corresponding will be ignored
in check mode.
2021-11-24 11:11:03 +01:00
17 changed files with 137 additions and 131 deletions

57
.github/stale.yml vendored
View File

@ -1,57 +0,0 @@
# Configuration for probot-stale - https://github.com/probot/stale
# Number of days of inactivity before an Issue or Pull Request becomes stale
daysUntilStale: 90
# Number of days of inactivity before an Issue or Pull Request with the stale label is closed.
# Set to false to disable. If disabled, issues still need to be closed manually, but will remain marked as stale.
daysUntilClose: 30
# Only issues or pull requests with all of these labels are check if stale. Defaults to `[]` (disabled)
onlyLabels: []
# Issues or Pull Requests with these labels will never be considered stale. Set to `[]` to disable
exemptLabels:
- bug
- pinned
- security
- planned
# Set to true to ignore issues in a project (defaults to false)
exemptProjects: false
# Set to true to ignore issues in a milestone (defaults to false)
exemptMilestones: false
# Set to true to ignore issues with an assignee (defaults to false)
exemptAssignees: false
# Label to use when marking as stale
staleLabel: stale
# Limit the number of actions per hour, from 1-30. Default is 30
limitPerRun: 30
pulls:
markComment: |-
This pull request has been marked 'stale' due to lack of recent activity. If there is no further activity, the PR will be closed in another 30 days. Thank you for your contribution!
Please read [this blog post](https://www.jeffgeerling.com/blog/2020/enabling-stale-issue-bot-on-my-github-repositories) to see the reasons why I mark pull requests as stale.
unmarkComment: >-
This pull request is no longer marked for closure.
closeComment: >-
This pull request has been closed due to inactivity. If you feel this is in error, please reopen the pull request or file a new PR with the relevant details.
issues:
markComment: |-
This issue has been marked 'stale' due to lack of recent activity. If there is no further activity, the issue will be closed in another 30 days. Thank you for your contribution!
Please read [this blog post](https://www.jeffgeerling.com/blog/2020/enabling-stale-issue-bot-on-my-github-repositories) to see the reasons why I mark issues as stale.
unmarkComment: >-
This issue is no longer marked for closure.
closeComment: >-
This issue has been closed due to inactivity. If you feel this is in error, please reopen the issue or file a new issue with the relevant details.

View File

@ -19,12 +19,12 @@ jobs:
runs-on: ubuntu-latest runs-on: ubuntu-latest
steps: steps:
- name: Check out the codebase. - name: Check out the codebase.
uses: actions/checkout@v2 uses: actions/checkout@v4
with: with:
path: 'geerlingguy.certbot' path: 'geerlingguy.certbot'
- name: Set up Python 3. - name: Set up Python 3.
uses: actions/setup-python@v2 uses: actions/setup-python@v5
with: with:
python-version: '3.x' python-version: '3.x'
@ -41,40 +41,33 @@ jobs:
strategy: strategy:
matrix: matrix:
include: include:
- distro: centos8 - distro: rockylinux9
playbook: converge.yml playbook: converge.yml
experimental: false experimental: false
- distro: centos7 - distro: ubuntu2404
playbook: converge.yml playbook: converge.yml
experimental: false experimental: false
- distro: ubuntu1804 - distro: debian12
playbook: converge.yml playbook: converge.yml
experimental: false experimental: false
- distro: debian10
playbook: converge.yml
experimental: false
# Source install started failing recently.
# - distro: centos7
# playbook: playbook-source-install.yml
# experimental: false
- distro: centos7 - distro: rockylinux9
playbook: playbook-snap-install.yml playbook: playbook-snap-install.yml
experimental: true experimental: true
steps: steps:
- name: Check out the codebase. - name: Check out the codebase.
uses: actions/checkout@v2 uses: actions/checkout@v4
with: with:
path: 'geerlingguy.certbot' path: 'geerlingguy.certbot'
- name: Set up Python 3. - name: Set up Python 3.
uses: actions/setup-python@v2 uses: actions/setup-python@v5
with: with:
python-version: '3.x' python-version: '3.x'
- name: Install test dependencies. - name: Install test dependencies.
run: pip3 install ansible molecule[docker] docker run: pip3 install ansible molecule molecule-plugins[docker] docker
- name: Run Molecule tests. - name: Run Molecule tests.
run: molecule test run: molecule test

View File

@ -22,17 +22,19 @@ jobs:
runs-on: ubuntu-latest runs-on: ubuntu-latest
steps: steps:
- name: Check out the codebase. - name: Check out the codebase.
uses: actions/checkout@v2 uses: actions/checkout@v4
with: with:
path: 'geerlingguy.certbot' path: 'geerlingguy.certbot'
- name: Set up Python 3. - name: Set up Python 3.
uses: actions/setup-python@v2 uses: actions/setup-python@v5
with: with:
python-version: '3.x' python-version: '3.x'
- name: Install Ansible. - name: Install Ansible.
run: pip3 install ansible-base run: pip3 install ansible-core
- name: Trigger a new import on Galaxy. - name: Trigger a new import on Galaxy.
run: ansible-galaxy role import --api-key ${{ secrets.GALAXY_API_KEY }} $(echo ${{ github.repository }} | cut -d/ -f1) $(echo ${{ github.repository }} | cut -d/ -f2) run: >-
ansible-galaxy role import --api-key ${{ secrets.GALAXY_API_KEY }}
$(echo ${{ github.repository }} | cut -d/ -f1) $(echo ${{ github.repository }} | cut -d/ -f2)

34
.github/workflows/stale.yml vendored Normal file
View File

@ -0,0 +1,34 @@
---
name: Close inactive issues
'on':
schedule:
- cron: "55 12 * * 1" # semi-random time
jobs:
close-issues:
runs-on: ubuntu-latest
permissions:
issues: write
pull-requests: write
steps:
- uses: actions/stale@v8
with:
days-before-stale: 120
days-before-close: 60
exempt-issue-labels: bug,pinned,security,planned
exempt-pr-labels: bug,pinned,security,planned
stale-issue-label: "stale"
stale-pr-label: "stale"
stale-issue-message: |
This issue has been marked 'stale' due to lack of recent activity. If there is no further activity, the issue will be closed in another 30 days. Thank you for your contribution!
Please read [this blog post](https://www.jeffgeerling.com/blog/2020/enabling-stale-issue-bot-on-my-github-repositories) to see the reasons why I mark issues as stale.
close-issue-message: |
This issue has been closed due to inactivity. If you feel this is in error, please reopen the issue or file a new issue with the relevant details.
stale-pr-message: |
This pr has been marked 'stale' due to lack of recent activity. If there is no further activity, the issue will be closed in another 30 days. Thank you for your contribution!
Please read [this blog post](https://www.jeffgeerling.com/blog/2020/enabling-stale-issue-bot-on-my-github-repositories) to see the reasons why I mark issues as stale.
close-pr-message: |
This pr has been closed due to inactivity. If you feel this is in error, please reopen the issue or file a new issue with the relevant details.
repo-token: ${{ secrets.GITHUB_TOKEN }}

View File

@ -5,6 +5,9 @@ rules:
line-length: line-length:
max: 180 max: 180
level: warning level: warning
indentation:
spaces: 2
indent-sequences: consistent
ignore: | ignore: |
.github/stale.yml .github/workflows/stale.yml

View File

@ -1,6 +1,6 @@
# Ansible Role: Certbot (for Let's Encrypt) # Ansible Role: Certbot (for Let's Encrypt)
[![CI](https://github.com/geerlingguy/ansible-role-certbot/workflows/CI/badge.svg?event=push)](https://github.com/geerlingguy/ansible-role-certbot/actions?query=workflow%3ACI) [![CI](https://github.com/geerlingguy/ansible-role-certbot/actions/workflows/ci.yml/badge.svg)](https://github.com/geerlingguy/ansible-role-certbot/actions/workflows/ci.yml)
Installs and configures Certbot (for Let's Encrypt). Installs and configures Certbot (for Let's Encrypt).
@ -20,7 +20,7 @@ Controls how Certbot is installed. Available options are 'package', 'snap', and
certbot_auto_renew_user: "{{ ansible_user | default(lookup('env', 'USER')) }}" certbot_auto_renew_user: "{{ ansible_user | default(lookup('env', 'USER')) }}"
certbot_auto_renew_hour: "3" certbot_auto_renew_hour: "3"
certbot_auto_renew_minute: "30" certbot_auto_renew_minute: "30"
certbot_auto_renew_options: "--quiet --no-self-upgrade" certbot_auto_renew_options: "--quiet"
By default, this role configures a cron job to run under the provided user account at the given hour and minute, every day. The defaults run `certbot renew` (or `certbot-auto renew`) via cron every day at 03:30:00 by the user you use in your Ansible playbook. It's preferred that you set a custom user/hour/minute so the renewal is during a low-traffic period and done by a non-root user account. By default, this role configures a cron job to run under the provided user account at the given hour and minute, every day. The defaults run `certbot renew` (or `certbot-auto renew`) via cron every day at 03:30:00 by the user you use in your Ansible playbook. It's preferred that you set a custom user/hour/minute so the renewal is during a low-traffic period and done by a non-root user account.
@ -63,7 +63,7 @@ A list of domains (and other data) for which certs should be generated. You can
certbot_create_command: "{{ certbot_script }} certonly --standalone --noninteractive --agree-tos --email {{ cert_item.email | default(certbot_admin_email) }} -d {{ cert_item.domains | join(',') }}" certbot_create_command: "{{ certbot_script }} certonly --standalone --noninteractive --agree-tos --email {{ cert_item.email | default(certbot_admin_email) }} -d {{ cert_item.domains | join(',') }}"
The `certbot_create_command` defines the command used to generate the cert. The `certbot_create_command` defines the command used to generate the cert. See the full default command inside `defaults/main.yml` for a full example—and you can easily add in extra arguments that are not in the default command with the `certbot_create_extra_args` variable.
#### Standalone Certificate Generation #### Standalone Certificate Generation

View File

@ -4,7 +4,7 @@ certbot_auto_renew: true
certbot_auto_renew_user: "{{ ansible_user | default(lookup('env', 'USER')) }}" certbot_auto_renew_user: "{{ ansible_user | default(lookup('env', 'USER')) }}"
certbot_auto_renew_hour: "3" certbot_auto_renew_hour: "3"
certbot_auto_renew_minute: "30" certbot_auto_renew_minute: "30"
certbot_auto_renew_options: "--quiet --no-self-upgrade" certbot_auto_renew_options: "--quiet"
certbot_testmode: false certbot_testmode: false
certbot_hsts: false certbot_hsts: false
@ -13,13 +13,16 @@ certbot_hsts: false
# Parameters used when creating new Certbot certs. # Parameters used when creating new Certbot certs.
certbot_create_if_missing: false certbot_create_if_missing: false
certbot_create_method: standalone certbot_create_method: standalone
certbot_create_extra_args: ""
certbot_admin_email: email@example.com certbot_admin_email: email@example.com
certbot_expand: false
# Default webroot, overwritten by individual per-cert webroot directories # Default webroot, overwritten by individual per-cert webroot directories
certbot_webroot: /var/www/letsencrypt certbot_webroot: /var/www/letsencrypt
certbot_certs: [] certbot_certs: []
# - email: janedoe@example.com # - name: example.com
# email: janedoe@example.com
# webroot: "/var/www/html/" # webroot: "/var/www/html/"
# domains: # domains:
# - example1.com # - example1.com
@ -33,14 +36,21 @@ certbot_create_command: >-
{{ '--test-cert' if certbot_testmode else '' }} {{ '--test-cert' if certbot_testmode else '' }}
--noninteractive --agree-tos --noninteractive --agree-tos
--email {{ cert_item.email | default(certbot_admin_email) }} --email {{ cert_item.email | default(certbot_admin_email) }}
{{ '--expand' if certbot_expand else '' }}
{{ '--webroot-path ' if certbot_create_method == 'webroot' else '' }} {{ '--webroot-path ' if certbot_create_method == 'webroot' else '' }}
{{ cert_item.webroot | default(certbot_webroot) if certbot_create_method == 'webroot' else '' }} {{ cert_item.webroot | default(certbot_webroot) if certbot_create_method == 'webroot' else '' }}
{{ certbot_create_extra_args }}
--cert-name {{ cert_item_name }}
-d {{ cert_item.domains | join(',') }} -d {{ cert_item.domains | join(',') }}
{{ '--expand' if certbot_expand else '' }}
{{ '--pre-hook /etc/letsencrypt/renewal-hooks/pre/stop_services' {{ '--pre-hook /etc/letsencrypt/renewal-hooks/pre/stop_services'
if certbot_create_standalone_stop_services if certbot_create_standalone_stop_services and certbot_create_method == 'standalone'
else '' }} else '' }}
{{ '--post-hook /etc/letsencrypt/renewal-hooks/post/start_services' {{ '--post-hook /etc/letsencrypt/renewal-hooks/post/start_services'
if certbot_create_standalone_stop_services if certbot_create_standalone_stop_services and certbot_create_method == 'standalone'
else '' }}
{{ "--deploy-hook '" ~ cert_item.deploy_hook ~ "'"
if 'deploy_hook' in cert_item
else '' }} else '' }}
certbot_create_standalone_stop_services: certbot_create_standalone_stop_services:

View File

@ -7,12 +7,8 @@ galaxy_info:
description: "Installs and configures Certbot (for Let's Encrypt)." description: "Installs and configures Certbot (for Let's Encrypt)."
company: "Midwestern Mac, LLC" company: "Midwestern Mac, LLC"
license: "license (BSD, MIT)" license: "license (BSD, MIT)"
min_ansible_version: 2.4 min_ansible_version: 2.10
platforms: platforms:
- name: EL
versions:
- 7
- 8
- name: Fedora - name: Fedora
versions: versions:
- all - all

View File

@ -1,7 +1,7 @@
--- ---
- name: Converge - name: Converge
hosts: all hosts: all
become: true # become: true
vars: vars:
certbot_auto_renew_user: root certbot_auto_renew_user: root

View File

@ -1,14 +1,18 @@
--- ---
role_name_check: 1
dependency: dependency:
name: galaxy name: galaxy
options:
ignore-errors: true
driver: driver:
name: docker name: docker
platforms: platforms:
- name: instance - name: instance
image: "geerlingguy/docker-${MOLECULE_DISTRO:-centos7}-ansible:latest" image: "geerlingguy/docker-${MOLECULE_DISTRO:-rockylinux9}-ansible:latest"
command: ${MOLECULE_DOCKER_COMMAND:-""} command: ${MOLECULE_DOCKER_COMMAND:-""}
volumes: volumes:
- /sys/fs/cgroup:/sys/fs/cgroup:ro - /sys/fs/cgroup:/sys/fs/cgroup:rw
cgroupns_mode: host
privileged: true privileged: true
pre_build_image: true pre_build_image: true
provisioner: provisioner:

View File

@ -1,7 +1,7 @@
--- ---
- name: Converge - name: Converge
hosts: all hosts: all
become: true #become: true
vars: vars:
certbot_install_method: 'snap' certbot_install_method: 'snap'

View File

@ -1,7 +1,7 @@
--- ---
- name: Converge - name: Converge
hosts: all hosts: all
become: true #become: true
vars: vars:
certbot_install_method: 'source' certbot_install_method: 'source'

View File

@ -91,7 +91,8 @@
certbot_create_if_missing: true certbot_create_if_missing: true
certbot_create_standalone_stop_services: [] certbot_create_standalone_stop_services: []
certbot_certs: certbot_certs:
- domains: - name: certbot-test.servercheck.in
domains:
- certbot-test.servercheck.in - certbot-test.servercheck.in
nginx_vhosts: nginx_vhosts:
- listen: "443 ssl http2" - listen: "443 ssl http2"

View File

@ -1,7 +1,11 @@
--- ---
- name: Determine certificate name
set_fact:
cert_item_name: "{{ cert_item.name | default(cert_item.domains | first | replace('*.', '')) }}"
- name: Check if certificate already exists. - name: Check if certificate already exists.
stat: stat:
path: /etc/letsencrypt/live/{{ cert_item.domains | first | replace('*.', '') }}/cert.pem path: /etc/letsencrypt/live/{{ cert_item_name }}/cert.pem
register: letsencrypt_cert register: letsencrypt_cert
- name: Ensure pre and post hook folders exist. - name: Ensure pre and post hook folders exist.
@ -37,6 +41,23 @@
- certbot_create_standalone_stop_services is defined - certbot_create_standalone_stop_services is defined
- certbot_create_standalone_stop_services - certbot_create_standalone_stop_services
- name: Check if domains have changed
block:
- name: Register certificate domains
shell: "{{ certbot_script }} certificates --cert-name {{ cert_item_name }} | grep Domains | cut -d':' -f2"
changed_when: false
register: letsencrypt_cert_domains_dirty
- name: Cleanup domain list
set_fact:
letsencrypt_cert_domains: "{{ letsencrypt_cert_domains_dirty.stdout | trim | split(' ') | map('trim') | select('!=', '') | list | sort }}"
- name: Determine if domains have changed
set_fact:
letsencrypt_cert_domains_changed: "{{ letsencrypt_cert_domains != (cert_item.domains | map('trim') | select('!=', '') | list | sort) }}"
when: letsencrypt_cert.stat.exists
- name: Generate new certificate if one doesn't exist. - name: Generate new certificate if one doesn't exist.
command: "{{ certbot_create_command }}" command: "{{ certbot_create_command }}"
when: not letsencrypt_cert.stat.exists when: not letsencrypt_cert.stat.exists or letsencrypt_cert_domains_changed | default(false)

View File

@ -1,7 +1,11 @@
--- ---
- name: Determine certificate name
set_fact:
cert_item_name: "{{ cert_item.name | default(cert_item.domains | first | replace('*.', '')) }}"
- name: Check if certificate already exists. - name: Check if certificate already exists.
stat: stat:
path: /etc/letsencrypt/live/{{ cert_item.domains | first }}/cert.pem path: /etc/letsencrypt/live/{{ cert_item_name }}/cert.pem
register: letsencrypt_cert register: letsencrypt_cert
- name: Create webroot directory if it doesn't exist yet - name: Create webroot directory if it doesn't exist yet
@ -9,6 +13,23 @@
path: "{{ cert_item.webroot | default(certbot_webroot) }}" path: "{{ cert_item.webroot | default(certbot_webroot) }}"
state: directory state: directory
- name: Check if domains have changed
block:
- name: Register certificate domains
shell: "{{ certbot_script }} certificates --cert-name {{ cert_item_name }} | grep Domains | cut -d':' -f2"
changed_when: false
register: letsencrypt_cert_domains_dirty
- name: Cleanup domain list
set_fact:
letsencrypt_cert_domains: "{{ letsencrypt_cert_domains_dirty.stdout | trim | split(' ') | map('trim') | select('!=', '') | list | sort }}"
- name: Determine if domains have changed
set_fact:
letsencrypt_cert_domains_changed: "{{ letsencrypt_cert_domains != (cert_item.domains | map('trim') | select('!=', '') | list | sort) }}"
when: letsencrypt_cert.stat.exists
- name: Generate new certificate if one doesn't exist. - name: Generate new certificate if one doesn't exist.
command: "{{ certbot_create_command }}" command: "{{ certbot_create_command }}"
when: not letsencrypt_cert.stat.exists when: not letsencrypt_cert.stat.exists or letsencrypt_cert_domains_changed | default(false)

View File

@ -34,6 +34,7 @@
src: /snap/bin/certbot src: /snap/bin/certbot
dest: /usr/bin/certbot dest: /usr/bin/certbot
state: link state: link
ignore_errors: "{{ ansible_check_mode }}"
- name: Set Certbot script variable. - name: Set Certbot script variable.
set_fact: set_fact:

View File

@ -1,34 +1,11 @@
--- ---
# See: https://github.com/geerlingguy/ansible-role-certbot/issues/107 # See: https://github.com/geerlingguy/ansible-role-certbot/issues/107
- block: - name: Ensure dnf-plugins are installed on Rocky/AlmaLinux.
- name: Ensure dnf-plugins are installed on CentOS 8+.
yum: yum:
name: dnf-plugins-core name: dnf-plugins-core
state: present state: present
- block: - name: Enable DNF module for Rocky/AlmaLinux.
- name: Enable DNF module for CentOS 8.3+.
shell: | shell: |
dnf config-manager --set-enabled powertools dnf config-manager --set-enabled crb
args:
warn: false
register: dnf_module_enable
changed_when: false changed_when: false
when: ansible_facts['distribution_version'] is version('8.3', '>=')
- name: Enable DNF module for CentOS 8.08.2.
shell: |
dnf config-manager --set-enabled PowerTools
args:
warn: false
register: dnf_module_enable
changed_when: false
when: ansible_facts['distribution_version'] is version('8.2', '<=')
when:
- ansible_distribution == 'CentOS'
- ansible_distribution_major_version | int >= 8