Compare commits

..

No commits in common. "master" and "5.1.1" have entirely different histories.

18 changed files with 77 additions and 117 deletions

View File

@ -19,14 +19,14 @@ jobs:
runs-on: ubuntu-latest
steps:
- name: Check out the codebase.
uses: actions/checkout@v4
uses: actions/checkout@v2
with:
path: 'geerlingguy.certbot'
- name: Set up Python 3.
uses: actions/setup-python@v5
uses: actions/setup-python@v2
with:
python-version: '3.13' # Can't go to 3.14+ until Ansible 13.x
python-version: '3.x'
- name: Install test dependencies.
run: pip3 install yamllint
@ -41,17 +41,15 @@ jobs:
strategy:
matrix:
include:
- distro: rockylinux9
- distro: centos8
playbook: converge.yml
experimental: false
- distro: ubuntu2404
- distro: centos7
playbook: converge.yml
experimental: false
- distro: debian12
- distro: ubuntu1804
playbook: converge.yml
experimental: false
<<<<<<< Updated upstream
=======
- distro: debian10
playbook: converge.yml
experimental: false
@ -59,22 +57,21 @@ jobs:
# - distro: centos7
# playbook: playbook-source-install.yml
# experimental: false
>>>>>>> Stashed changes
- distro: rockylinux9
- distro: centos7
playbook: playbook-snap-install.yml
experimental: true
steps:
- name: Check out the codebase.
uses: actions/checkout@v4
uses: actions/checkout@v2
with:
path: 'geerlingguy.certbot'
- name: Set up Python 3.
uses: actions/setup-python@v5
uses: actions/setup-python@v2
with:
python-version: '3.13' # Can't go to 3.14+ until Ansible 13.x
python-version: '3.x'
- name: Install test dependencies.
run: pip3 install ansible molecule molecule-plugins[docker] docker

View File

@ -22,14 +22,14 @@ jobs:
runs-on: ubuntu-latest
steps:
- name: Check out the codebase.
uses: actions/checkout@v4
uses: actions/checkout@v2
with:
path: 'geerlingguy.certbot'
- name: Set up Python 3.
uses: actions/setup-python@v5
uses: actions/setup-python@v2
with:
python-version: '3.13' # Can't go to 3.14+ until Ansible 13.x
python-version: '3.x'
- name: Install Ansible.
run: pip3 install ansible-core

View File

@ -1,6 +1,6 @@
# Ansible Role: Certbot (for Let's Encrypt)
[![CI](https://github.com/geerlingguy/ansible-role-certbot/actions/workflows/ci.yml/badge.svg)](https://github.com/geerlingguy/ansible-role-certbot/actions/workflows/ci.yml)
[![CI](https://github.com/geerlingguy/ansible-role-certbot/workflows/CI/badge.svg?event=push)](https://github.com/geerlingguy/ansible-role-certbot/actions?query=workflow%3ACI)
Installs and configures Certbot (for Let's Encrypt).

View File

@ -13,16 +13,13 @@ certbot_hsts: false
# Parameters used when creating new Certbot certs.
certbot_create_if_missing: false
certbot_create_method: standalone
certbot_create_extra_args: ""
certbot_admin_email: email@example.com
certbot_expand: false
# Default webroot, overwritten by individual per-cert webroot directories
certbot_webroot: /var/www/letsencrypt
certbot_certs: []
# - name: example.com
# email: janedoe@example.com
# - email: janedoe@example.com
# webroot: "/var/www/html/"
# domains:
# - example1.com
@ -36,22 +33,16 @@ certbot_create_command: >-
{{ '--test-cert' if certbot_testmode else '' }}
--noninteractive --agree-tos
--email {{ cert_item.email | default(certbot_admin_email) }}
{{ '--expand' if certbot_expand else '' }}
{{ '--webroot-path ' if certbot_create_method == 'webroot' else '' }}
{{ cert_item.webroot | default(certbot_webroot) if certbot_create_method == 'webroot' else '' }}
{{ certbot_create_extra_args }}
--cert-name {{ cert_item_name }}
-d {{ cert_item.domains | join(',') }}
{{ '--expand' if certbot_expand else '' }}
{{ '--pre-hook /etc/letsencrypt/renewal-hooks/pre/stop_services'
if certbot_create_standalone_stop_services and certbot_create_method == 'standalone'
else '' }}
{{ '--post-hook /etc/letsencrypt/renewal-hooks/post/start_services'
if certbot_create_standalone_stop_services and certbot_create_method == 'standalone'
else '' }}
{{ "--deploy-hook '" ~ cert_item.deploy_hook ~ "'"
if 'deploy_hook' in cert_item
else '' }}
certbot_create_standalone_stop_services:
- nginx

View File

@ -1,7 +1,7 @@
---
- name: Converge
hosts: all
# become: true
become: true
vars:
certbot_auto_renew_user: root
@ -9,7 +9,7 @@
pre_tasks:
- name: Update apt cache.
apt: update_cache=yes cache_valid_time=600
when: ansible_facts.os_family == 'Debian'
when: ansible_os_family == 'Debian'
changed_when: false
- name: Install dependencies (RedHat).
@ -18,11 +18,11 @@
- cronie
- epel-release
state: present
when: ansible_facts.os_family == 'RedHat'
when: ansible_os_family == 'RedHat'
- name: Install cron (Debian).
apt: name=cron state=present
when: ansible_facts.os_family == 'Debian'
when: ansible_os_family == 'Debian'
roles:
- geerlingguy.certbot

View File

@ -2,13 +2,11 @@
role_name_check: 1
dependency:
name: galaxy
options:
ignore-errors: true
driver:
name: docker
platforms:
- name: instance
image: "geerlingguy/docker-${MOLECULE_DISTRO:-rockylinux9}-ansible:latest"
image: "geerlingguy/docker-${MOLECULE_DISTRO:-centos7}-ansible:latest"
command: ${MOLECULE_DOCKER_COMMAND:-""}
volumes:
- /sys/fs/cgroup:/sys/fs/cgroup:rw

View File

@ -1,7 +1,7 @@
---
- name: Converge
hosts: all
#become: true
become: true
vars:
certbot_install_method: 'snap'
@ -10,16 +10,16 @@
pre_tasks:
- name: Update apt cache.
apt: update_cache=yes cache_valid_time=600
when: ansible_facts.os_family == 'Debian'
when: ansible_os_family == 'Debian'
changed_when: false
- name: Install cron (RedHat).
yum: name=cronie state=present
when: ansible_facts.os_family == 'RedHat'
when: ansible_os_family == 'RedHat'
- name: Install cron (Debian).
apt: name=cron state=present
when: ansible_facts.os_family == 'Debian'
when: ansible_os_family == 'Debian'
roles:
- geerlingguy.git

View File

@ -1,7 +1,7 @@
---
- name: Converge
hosts: all
#become: true
become: true
vars:
certbot_install_method: 'source'
@ -10,16 +10,16 @@
pre_tasks:
- name: Update apt cache.
apt: update_cache=yes cache_valid_time=600
when: ansible_facts.os_family == 'Debian'
when: ansible_os_family == 'Debian'
changed_when: false
- name: Install cron (RedHat).
yum: name=cronie state=present
when: ansible_facts.os_family == 'RedHat'
when: ansible_os_family == 'RedHat'
- name: Install cron (Debian).
apt: name=cron state=present
when: ansible_facts.os_family == 'Debian'
when: ansible_os_family == 'Debian'
roles:
- geerlingguy.git

View File

@ -91,8 +91,7 @@
certbot_create_if_missing: true
certbot_create_standalone_stop_services: []
certbot_certs:
- name: certbot-test.servercheck.in
domains:
- domains:
- certbot-test.servercheck.in
nginx_vhosts:
- listen: "443 ssl http2"
@ -111,19 +110,19 @@
pre_tasks:
- name: Update apt cache.
apt: update_cache=true cache_valid_time=600
when: ansible_facts.os_family == 'Debian'
when: ansible_os_family == 'Debian'
changed_when: false
- name: Install dependencies (RedHat).
yum: name={{ item }} state=present
when: ansible_facts.os_family == 'RedHat'
when: ansible_os_family == 'RedHat'
with_items:
- cronie
- epel-release
- name: Install cron (Debian).
apt: name=cron state=present
when: ansible_facts.os_family == 'Debian'
when: ansible_os_family == 'Debian'
roles:
- geerlingguy.certbot

View File

@ -1,11 +1,7 @@
---
- name: Determine certificate name
set_fact:
cert_item_name: "{{ cert_item.name | default(cert_item.domains | first | replace('*.', '')) }}"
- name: Check if certificate already exists.
stat:
path: /etc/letsencrypt/live/{{ cert_item_name }}/cert.pem
path: /etc/letsencrypt/live/{{ cert_item.domains | first | replace('*.', '') }}/cert.pem
register: letsencrypt_cert
- name: Ensure pre and post hook folders exist.
@ -28,7 +24,7 @@
mode: 0750
when:
- certbot_create_standalone_stop_services is defined
- certbot_create_standalone_stop_services is truthy
- certbot_create_standalone_stop_services
- name: Create post hook to start services.
template:
@ -39,25 +35,8 @@
mode: 0750
when:
- certbot_create_standalone_stop_services is defined
- certbot_create_standalone_stop_services is truthy
- name: Check if domains have changed
block:
- name: Register certificate domains
shell: "{{ certbot_script }} certificates --cert-name {{ cert_item_name }} | grep Domains | cut -d':' -f2"
changed_when: false
register: letsencrypt_cert_domains_dirty
- name: Cleanup domain list
set_fact:
letsencrypt_cert_domains: "{{ letsencrypt_cert_domains_dirty.stdout | trim | split(' ') | map('trim') | select('!=', '') | list | sort }}"
- name: Determine if domains have changed
set_fact:
letsencrypt_cert_domains_changed: "{{ letsencrypt_cert_domains != (cert_item.domains | map('trim') | select('!=', '') | list | sort) }}"
when: letsencrypt_cert.stat.exists
- certbot_create_standalone_stop_services
- name: Generate new certificate if one doesn't exist.
command: "{{ certbot_create_command }}"
when: not letsencrypt_cert.stat.exists or letsencrypt_cert_domains_changed | default(false)
when: not letsencrypt_cert.stat.exists

View File

@ -1,11 +1,7 @@
---
- name: Determine certificate name
set_fact:
cert_item_name: "{{ cert_item.name | default(cert_item.domains | first | replace('*.', '')) }}"
- name: Check if certificate already exists.
stat:
path: /etc/letsencrypt/live/{{ cert_item_name }}/cert.pem
path: /etc/letsencrypt/live/{{ cert_item.domains | first }}/cert.pem
register: letsencrypt_cert
- name: Create webroot directory if it doesn't exist yet
@ -13,23 +9,6 @@
path: "{{ cert_item.webroot | default(certbot_webroot) }}"
state: directory
- name: Check if domains have changed
block:
- name: Register certificate domains
shell: "{{ certbot_script }} certificates --cert-name {{ cert_item_name }} | grep Domains | cut -d':' -f2"
changed_when: false
register: letsencrypt_cert_domains_dirty
- name: Cleanup domain list
set_fact:
letsencrypt_cert_domains: "{{ letsencrypt_cert_domains_dirty.stdout | trim | split(' ') | map('trim') | select('!=', '') | list | sort }}"
- name: Determine if domains have changed
set_fact:
letsencrypt_cert_domains_changed: "{{ letsencrypt_cert_domains != (cert_item.domains | map('trim') | select('!=', '') | list | sort) }}"
when: letsencrypt_cert.stat.exists
- name: Generate new certificate if one doesn't exist.
command: "{{ certbot_create_command }}"
when: not letsencrypt_cert.stat.exists or letsencrypt_cert_domains_changed | default(false)
when: not letsencrypt_cert.stat.exists

View File

@ -2,7 +2,7 @@
- name: Load a variable file based on the OS type, or a default if not found.
include_vars: "{{ item }}"
with_first_found:
- "{{ ansible_facts.distribution }}-{{ ansible_facts.distribution_version }}.yml"
- "{{ ansible_facts.distribution }}.yml"
- "{{ ansible_facts.os_family }}.yml"
- "{{ ansible_distribution }}-{{ ansible_distribution_version }}.yml"
- "{{ ansible_distribution }}.yml"
- "{{ ansible_os_family }}.yml"
- "default.yml"

View File

@ -1,8 +1,6 @@
---
- name: Install Certbot.
package:
name: "{{ certbot_package }}"
state: present
package: "name={{ certbot_package }} state=present"
- name: Set Certbot script variable.
set_fact:

View File

@ -16,7 +16,7 @@
src: /var/lib/snapd/snap
dest: /snap
state: link
when: ansible_facts.os_family != "Debian"
when: ansible_os_family != "Debian"
- name: Update snap after install.
shell: snap install core; snap refresh core

View File

@ -2,7 +2,7 @@
- import_tasks: include-vars.yml
- import_tasks: setup-RedHat.yml
when: ansible_facts.os_family == 'RedHat'
when: ansible_os_family == 'RedHat'
- import_tasks: install-with-package.yml
when: certbot_install_method == 'package'

View File

@ -1,11 +1,30 @@
---
# See: https://github.com/geerlingguy/ansible-role-certbot/issues/107
- name: Ensure dnf-plugins are installed on Rocky/AlmaLinux.
- block:
- name: Ensure dnf-plugins are installed on CentOS 8+.
yum:
name: dnf-plugins-core
state: present
- name: Enable DNF module for Rocky/AlmaLinux.
- block:
- name: Enable DNF module for CentOS 8.3+.
shell: |
dnf config-manager --set-enabled crb
dnf config-manager --set-enabled powertools
register: dnf_module_enable
changed_when: false
when: ansible_facts['distribution_version'] is version('8.3', '>=')
- name: Enable DNF module for CentOS 8.08.2.
shell: |
dnf config-manager --set-enabled PowerTools
register: dnf_module_enable
changed_when: false
when: ansible_facts['distribution_version'] is version('8.2', '<=')
when:
- ansible_distribution == 'CentOS'
- ansible_distribution_major_version | int >= 8

View File

@ -3,11 +3,11 @@
{% for item in certbot_create_standalone_stop_services %}
echo "starting service {{ item }}"
{% if ansible_facts.service_mgr == 'systemd' %}
{% if ansible_service_mgr == 'systemd' %}
systemctl start {{ item }}
{% elif ansible_facts.service_mgr == 'upstart' %}
{% elif ansible_service_mgr == 'upstart' %}
initctl start {{ item }}
{% elif ansible_facts.service_mgr == 'openrc' %}
{% elif ansible_service_mgr == 'openrc' %}
rc-service {{ item }} start
{% else %}
service {{ item }} start

View File

@ -3,11 +3,11 @@
{% for item in certbot_create_standalone_stop_services %}
echo "stopping service {{ item }}"
{% if ansible_facts.service_mgr == 'systemd' %}
{% if ansible_service_mgr == 'systemd' %}
systemctl stop {{ item }}
{% elif ansible_facts.service_mgr == 'upstart' %}
{% elif ansible_service_mgr == 'upstart' %}
initctl stop {{ item }}
{% elif ansible_facts.service_mgr == 'openrc' %}
{% elif ansible_service_mgr == 'openrc' %}
rc-service {{ item }} stop
{% else %}
service {{ item }} stop