first commit
This commit is contained in:
commit
cfe7db8716
8 changed files with 370 additions and 0 deletions
29
README.md
Normal file
29
README.md
Normal file
|
@ -0,0 +1,29 @@
|
||||||
|
# acme.sh
|
||||||
|
|
||||||
|
Thanks to [gmk/ansible-role-acme_sh](https://codeberg.org/gmk/ansible-role-acme_sh)
|
||||||
|
|
||||||
|
Install acme.sh with ansible.
|
||||||
|
|
||||||
|
## Configuration
|
||||||
|
```
|
||||||
|
# netcup settings
|
||||||
|
netcup_user: ID
|
||||||
|
netcup_api_key: KEY
|
||||||
|
netcup_api_password: PASSWORD
|
||||||
|
|
||||||
|
# certificate settings
|
||||||
|
acmesh_email: hostmaster@example.com
|
||||||
|
acme_domains:
|
||||||
|
- domain: example.com
|
||||||
|
keylength: ec-384
|
||||||
|
reloadcmd: "sudo systemctl reload nginx.service"
|
||||||
|
dnssleep: 900
|
||||||
|
- domain: example.org
|
||||||
|
san:
|
||||||
|
- www.example.com
|
||||||
|
- host.example.com
|
||||||
|
keylength: 3072
|
||||||
|
staging: true
|
||||||
|
key_group: www-data
|
||||||
|
key_mode: "0640"
|
||||||
|
```
|
26
defaults/main.yml
Normal file
26
defaults/main.yml
Normal file
|
@ -0,0 +1,26 @@
|
||||||
|
---
|
||||||
|
# defaults file for acme.sh
|
||||||
|
# netcup settings
|
||||||
|
# netcup_user: ID
|
||||||
|
# netcup_api_key: KEY
|
||||||
|
# netcup_api_password: PASSWORD
|
||||||
|
|
||||||
|
# certificate settings
|
||||||
|
# Add wildcards as san
|
||||||
|
# tls_cert_path: /etc/ssl/acme
|
||||||
|
# acmesh_email: hostmaster@example.com
|
||||||
|
# acme_domains:
|
||||||
|
# - domain: example.com
|
||||||
|
# san:
|
||||||
|
# - "*.example.com"
|
||||||
|
# keylength: ec-384
|
||||||
|
# reloadcmd: "sudo systemctl reload nginx.service"
|
||||||
|
# dnssleep: 900
|
||||||
|
# - domain: example.org
|
||||||
|
# san:
|
||||||
|
# - www.example.com
|
||||||
|
# - host.example.com
|
||||||
|
# keylength: 3072
|
||||||
|
# staging: true
|
||||||
|
# key_group: www-data
|
||||||
|
# key_mode: "0640"
|
11
handlers/main.yml
Normal file
11
handlers/main.yml
Normal file
|
@ -0,0 +1,11 @@
|
||||||
|
---
|
||||||
|
# handlers file for acme.sh
|
||||||
|
- name: Reload systemd daemon
|
||||||
|
ansible.builtin.systemd:
|
||||||
|
daemon_reload: true
|
||||||
|
|
||||||
|
- name: Restart acme_sh systemd timer
|
||||||
|
ansible.builtin.systemd:
|
||||||
|
name: acme_sh.timer
|
||||||
|
scope: system
|
||||||
|
state: restarted
|
52
meta/main.yml
Normal file
52
meta/main.yml
Normal file
|
@ -0,0 +1,52 @@
|
||||||
|
galaxy_info:
|
||||||
|
author: your name
|
||||||
|
description: your role description
|
||||||
|
company: your company (optional)
|
||||||
|
|
||||||
|
# If the issue tracker for your role is not on github, uncomment the
|
||||||
|
# next line and provide a value
|
||||||
|
# issue_tracker_url: http://example.com/issue/tracker
|
||||||
|
|
||||||
|
# Choose a valid license ID from https://spdx.org - some suggested licenses:
|
||||||
|
# - BSD-3-Clause (default)
|
||||||
|
# - MIT
|
||||||
|
# - GPL-2.0-or-later
|
||||||
|
# - GPL-3.0-only
|
||||||
|
# - Apache-2.0
|
||||||
|
# - CC-BY-4.0
|
||||||
|
license: license (GPL-2.0-or-later, MIT, etc)
|
||||||
|
|
||||||
|
min_ansible_version: 2.1
|
||||||
|
|
||||||
|
# If this a Container Enabled role, provide the minimum Ansible Container version.
|
||||||
|
# min_ansible_container_version:
|
||||||
|
|
||||||
|
#
|
||||||
|
# Provide a list of supported platforms, and for each platform a list of versions.
|
||||||
|
# If you don't wish to enumerate all versions for a particular platform, use 'all'.
|
||||||
|
# To view available platforms and versions (or releases), visit:
|
||||||
|
# https://galaxy.ansible.com/api/v1/platforms/
|
||||||
|
#
|
||||||
|
# platforms:
|
||||||
|
# - name: Fedora
|
||||||
|
# versions:
|
||||||
|
# - all
|
||||||
|
# - 25
|
||||||
|
# - name: SomePlatform
|
||||||
|
# versions:
|
||||||
|
# - all
|
||||||
|
# - 1.0
|
||||||
|
# - 7
|
||||||
|
# - 99.99
|
||||||
|
|
||||||
|
galaxy_tags: []
|
||||||
|
# List tags for your role here, one per line. A tag is a keyword that describes
|
||||||
|
# and categorizes the role. Users find roles by searching for tags. Be sure to
|
||||||
|
# remove the '[]' above, if you add tags to this list.
|
||||||
|
#
|
||||||
|
# NOTE: A tag is limited to a single word comprised of alphanumeric characters.
|
||||||
|
# Maximum 20 tags per role.
|
||||||
|
|
||||||
|
dependencies: []
|
||||||
|
# List your role dependencies here, one per line. Be sure to remove the '[]' above,
|
||||||
|
# if you add dependencies to this list.
|
213
tasks/main.yml
Normal file
213
tasks/main.yml
Normal file
|
@ -0,0 +1,213 @@
|
||||||
|
---
|
||||||
|
# tasks file for acme.sh
|
||||||
|
- name: Create system acme group
|
||||||
|
become: true
|
||||||
|
ansible.builtin.group:
|
||||||
|
name: "{{ acme_group }}"
|
||||||
|
state: present
|
||||||
|
system: true
|
||||||
|
|
||||||
|
- name: Create system acme user
|
||||||
|
become: true
|
||||||
|
ansible.builtin.user:
|
||||||
|
name: "{{ acme_user }}"
|
||||||
|
group: "{{ acme_group }}"
|
||||||
|
home: "{{ acme_home }}"
|
||||||
|
shell: "{{ acme_shell }}"
|
||||||
|
state: present
|
||||||
|
system: true
|
||||||
|
create_home: true
|
||||||
|
skeleton: false
|
||||||
|
|
||||||
|
- name: Ensure directories exist
|
||||||
|
ansible.builtin.file:
|
||||||
|
path: "{{ item }}"
|
||||||
|
state: directory
|
||||||
|
mode: "0755"
|
||||||
|
owner: "{{ acme_user }}"
|
||||||
|
group: "{{ acme_group }}"
|
||||||
|
loop:
|
||||||
|
- "{{ acme_home }}"
|
||||||
|
- "{{ acmesh_config_path }}"
|
||||||
|
- "{{ acmesh_install_path }}"
|
||||||
|
- "{{ acmesh_cert_path }}"
|
||||||
|
|
||||||
|
- name: Check acme.sh installation
|
||||||
|
ansible.builtin.stat:
|
||||||
|
path: "{{ acmesh_config_path }}/account.conf"
|
||||||
|
register: stat_account_conf
|
||||||
|
|
||||||
|
- name: Download and install acme.sh
|
||||||
|
when: not stat_account_conf.stat.exists
|
||||||
|
become: true
|
||||||
|
become_method: su
|
||||||
|
become_user: "{{ acme_user }}"
|
||||||
|
become_flags: '-s /bin/sh'
|
||||||
|
become_exe: "sudo su"
|
||||||
|
block:
|
||||||
|
- name: Create temporary directory for git repository
|
||||||
|
ansible.builtin.tempfile:
|
||||||
|
state: directory
|
||||||
|
prefix: acmesh_git_
|
||||||
|
register: acme_tmp_repo
|
||||||
|
changed_when: false
|
||||||
|
|
||||||
|
- name: Temporary clone acme.sh git repository
|
||||||
|
ansible.builtin.git:
|
||||||
|
dest: "{{ acme_tmp_repo.path }}"
|
||||||
|
clone: true
|
||||||
|
depth: 1
|
||||||
|
repo: "{{ acmesh_repository }}"
|
||||||
|
version: "{{ acmesh_version }}"
|
||||||
|
changed_when: false
|
||||||
|
|
||||||
|
- name: Make install script executable
|
||||||
|
ansible.builtin.file:
|
||||||
|
path: "{{ acme_tmp_repo.path }}/acme.sh"
|
||||||
|
mode: "0744"
|
||||||
|
owner: acme
|
||||||
|
group: acme
|
||||||
|
|
||||||
|
- name: Install acme.sh
|
||||||
|
ansible.builtin.command:
|
||||||
|
cmd: >
|
||||||
|
"{{ acme_tmp_repo.path }}/acme.sh"
|
||||||
|
--install
|
||||||
|
--home "{{ acmesh_install_path }}"
|
||||||
|
--config-home "{{ acmesh_config_path }}"
|
||||||
|
--cert-home "{{ acmesh_cert_path }}"
|
||||||
|
--accountemail "{{ acmesh_email | mandatory }}"
|
||||||
|
--nocron
|
||||||
|
chdir: "{{ acme_tmp_repo.path }}"
|
||||||
|
creates: "{{ acmesh_config_path }}/account.conf"
|
||||||
|
|
||||||
|
always:
|
||||||
|
- name: Delete temporary git clone
|
||||||
|
ansible.builtin.file:
|
||||||
|
path: "{{ acme_tmp_repo.path }}"
|
||||||
|
state: absent
|
||||||
|
changed_when: false
|
||||||
|
|
||||||
|
- name: "Set default CA [letsencrypt]"
|
||||||
|
ansible.builtin.lineinfile:
|
||||||
|
path: "{{ acmesh_config_path }}/account.conf"
|
||||||
|
regexp: '^DEFAULT_ACME_SERVER='
|
||||||
|
line: "DEFAULT_ACME_SERVER='https://acme-v02.api.letsencrypt.org/directory'"
|
||||||
|
|
||||||
|
- name: Create sudo config file
|
||||||
|
ansible.builtin.file:
|
||||||
|
path: "/etc/sudoers.d/60_user_{{ acme_user }}"
|
||||||
|
state: touch
|
||||||
|
mode: "0440"
|
||||||
|
owner: root
|
||||||
|
group: root
|
||||||
|
access_time: preserve
|
||||||
|
modification_time: preserve
|
||||||
|
|
||||||
|
- name: Configure sudo permissions
|
||||||
|
become: true
|
||||||
|
ansible.builtin.lineinfile:
|
||||||
|
path: "/etc/sudoers.d/60_user_{{ acme_user }}"
|
||||||
|
line: "{{ acme_user }} ALL=(ALL:ALL) NOPASSWD: /usr/bin/{{ item.reloadcmd | regex_replace('^sudo (.*)$', '\\1') }}"
|
||||||
|
state: present
|
||||||
|
validate: /usr/sbin/visudo -csf %s
|
||||||
|
loop: "{{ acme_domains }}"
|
||||||
|
when: acme_domains is defined
|
||||||
|
|
||||||
|
- name: Ensure directories exist
|
||||||
|
become: true
|
||||||
|
ansible.builtin.file:
|
||||||
|
path: "{{ item }}"
|
||||||
|
state: directory
|
||||||
|
mode: "0755"
|
||||||
|
owner: "{{ acme_user }}"
|
||||||
|
group: "{{ acme_group }}"
|
||||||
|
loop:
|
||||||
|
- "{{ tls_cert_path }}"
|
||||||
|
|
||||||
|
- name: Issue and install certificate
|
||||||
|
when: acme_domains is defined
|
||||||
|
become: true
|
||||||
|
become_method: su
|
||||||
|
become_user: "{{ acme_user }}"
|
||||||
|
become_flags: '-s /bin/sh'
|
||||||
|
become_exe: "sudo su"
|
||||||
|
block:
|
||||||
|
- name: Issue certificate with Netcup
|
||||||
|
ansible.builtin.command:
|
||||||
|
cmd: >
|
||||||
|
"{{ acmesh_install_path }}/acme.sh"
|
||||||
|
--issue
|
||||||
|
--dns dns_netcup
|
||||||
|
-d "{{ item.domain }}"
|
||||||
|
{% if item.san is defined %}
|
||||||
|
{% for san in item.san %}
|
||||||
|
-d "{{ san }}"
|
||||||
|
{% endfor %}
|
||||||
|
{% endif %}
|
||||||
|
{% if item.keylength is defined %}
|
||||||
|
--keylength "{{ item.keylength }}"
|
||||||
|
{% endif %}
|
||||||
|
{% if item.staging is defined %}
|
||||||
|
--staging
|
||||||
|
{% endif %}
|
||||||
|
{% if item.dnssleep is defined %}
|
||||||
|
--dnssleep {{ item.dnssleep }}
|
||||||
|
{% endif %}
|
||||||
|
creates: "{{ acmesh_cert_path }}/{{ item.domain }}_ecc/{{ item.domain }}.cer"
|
||||||
|
environment:
|
||||||
|
LE_WORKING_DIR: "{{ acmesh_install_path }}"
|
||||||
|
LE_CONFIG_HOME: "{{ acmesh_config_path }}"
|
||||||
|
NC_CID: "{{ netcup_user | mandatory }}"
|
||||||
|
NC_Apikey: "{{ netcup_api_key | mandatory }}"
|
||||||
|
NC_Apipw: "{{ netcup_api_password | mandatory }}"
|
||||||
|
loop: "{{ acme_domains }}"
|
||||||
|
|
||||||
|
- name: Install certificates
|
||||||
|
ansible.builtin.command:
|
||||||
|
cmd: >
|
||||||
|
"{{ acmesh_install_path }}/acme.sh"
|
||||||
|
--installcert
|
||||||
|
-d "{{ item.domain }}"
|
||||||
|
{% if 'ec' in item.keylength %}
|
||||||
|
--ecc
|
||||||
|
{% endif %}
|
||||||
|
--cert-file "{{ tls_cert_path }}/{{ item.domain }}.crt"
|
||||||
|
--key-file "{{ tls_cert_path }}/{{ item.domain }}.key"
|
||||||
|
--ca-file "{{ tls_cert_path }}/{{ item.domain }}.ca"
|
||||||
|
--fullchain-file "{{ tls_cert_path }}/{{ item.domain }}.fullchain"
|
||||||
|
{% if item.reloadcmd is defined %}
|
||||||
|
--reloadcmd '{{ item.reloadcmd }}'
|
||||||
|
{% endif %}
|
||||||
|
creates: "{{ tls_cert_path }}/{{ item.domain }}.crt"
|
||||||
|
environment:
|
||||||
|
LE_WORKING_DIR: "{{ acmesh_install_path }}"
|
||||||
|
LE_CONFIG_HOME: "{{ acmesh_config_path }}"
|
||||||
|
loop: "{{ acme_domains }}"
|
||||||
|
|
||||||
|
- name: Install systemd service
|
||||||
|
ansible.builtin.template:
|
||||||
|
src: acme_sh.service.j2
|
||||||
|
dest: /etc/systemd/system/acme_sh.service
|
||||||
|
owner: root
|
||||||
|
group: root
|
||||||
|
mode: "0644"
|
||||||
|
notify: Reload systemd daemon
|
||||||
|
|
||||||
|
- name: Install systemd timer
|
||||||
|
ansible.builtin.template:
|
||||||
|
src: acme_sh.timer.j2
|
||||||
|
dest: /etc/systemd/system/acme_sh.timer
|
||||||
|
owner: root
|
||||||
|
group: root
|
||||||
|
mode: "0644"
|
||||||
|
notify:
|
||||||
|
- Reload systemd daemon
|
||||||
|
- Restart acme_sh systemd timer
|
||||||
|
|
||||||
|
- name: Enable systemd timer
|
||||||
|
ansible.builtin.systemd:
|
||||||
|
name: acme_sh.timer
|
||||||
|
enabled: true
|
||||||
|
scope: system
|
||||||
|
state: started
|
14
templates/acme_sh.service.j2
Normal file
14
templates/acme_sh.service.j2
Normal file
|
@ -0,0 +1,14 @@
|
||||||
|
#jinja2: lstrip_blocks: True
|
||||||
|
# {{ ansible_managed }}
|
||||||
|
|
||||||
|
[Unit]
|
||||||
|
Description=Renew certificates using acme.sh
|
||||||
|
After=network-online.target
|
||||||
|
|
||||||
|
[Service]
|
||||||
|
Type=oneshot
|
||||||
|
ExecStart={{ acmesh_install_path }}/acme.sh --cron --home {{ acmesh_install_path }} --config-home {{ acmesh_config_path }}
|
||||||
|
User={{ acme_user }}
|
||||||
|
Group={{ acme_group }}
|
||||||
|
|
||||||
|
SuccessExitStatus=0 2
|
13
templates/acme_sh.timer.j2
Normal file
13
templates/acme_sh.timer.j2
Normal file
|
@ -0,0 +1,13 @@
|
||||||
|
#jinja2: lstrip_blocks: True
|
||||||
|
# {{ ansible_managed }}
|
||||||
|
|
||||||
|
[Unit]
|
||||||
|
Description=Daily Renew certificates using acme.sh
|
||||||
|
|
||||||
|
[Timer]
|
||||||
|
OnCalendar=*-*-* 04:00
|
||||||
|
RandomizedDelaySec=1h
|
||||||
|
Persistent=true
|
||||||
|
|
||||||
|
[Install]
|
||||||
|
WantedBy=timers.target
|
12
vars/main.yml
Normal file
12
vars/main.yml
Normal file
|
@ -0,0 +1,12 @@
|
||||||
|
---
|
||||||
|
acme_user: acme
|
||||||
|
acme_group: acme
|
||||||
|
acme_home: /opt/acme
|
||||||
|
acme_shell: /usr/sbin/nologin
|
||||||
|
|
||||||
|
acmesh_install_path: "{{ acme_home }}/acme.sh"
|
||||||
|
acmesh_config_path: "{{ acme_home }}/config"
|
||||||
|
acmesh_cert_path: "{{ acme_home }}/certs"
|
||||||
|
|
||||||
|
acmesh_repository: https://github.com/acmesh-official/acme.sh.git
|
||||||
|
acmesh_version: 3.0.7
|
Loading…
Add table
Add a link
Reference in a new issue