Add certbot configuration for proxmox
parent
93623264d6
commit
c83ab55174
|
@ -19,5 +19,5 @@ glob_service_certbot:
|
||||||
port: 53
|
port: 53
|
||||||
key:
|
key:
|
||||||
name: certbot_challenge.
|
name: certbot_challenge.
|
||||||
secret: "{{ vault.bind.keys['certbot_challenge.'].secret }}"
|
secret: "{{ vault.bind.rfc2136_keys['certbot_challenge.'].secret }}"
|
||||||
algorithm: HMAC-SHA512
|
algorithm: HMAC-SHA512
|
||||||
|
|
|
@ -12,7 +12,7 @@ loc_service_certbot:
|
||||||
port: 53
|
port: 53
|
||||||
key:
|
key:
|
||||||
name: certbot_challenge.
|
name: certbot_challenge.
|
||||||
secret: "{{ vault.bind.keys['certbot_challenge.'].secret }}"
|
secret: "{{ vault.bind.rfc2136_keys['certbot_challenge.'].secret }}"
|
||||||
algorithm: HMAC-SHA512
|
algorithm: HMAC-SHA512
|
||||||
"crans.eu":
|
"crans.eu":
|
||||||
zone: _acme-challenge.crans.org
|
zone: _acme-challenge.crans.org
|
||||||
|
@ -20,7 +20,7 @@ loc_service_certbot:
|
||||||
port: 53
|
port: 53
|
||||||
key:
|
key:
|
||||||
name: certbot_challenge.
|
name: certbot_challenge.
|
||||||
secret: "{{ vault.bind.keys['certbot_challenge.'].secret }}"
|
secret: "{{ vault.bind.rfc2136_keys['certbot_challenge.'].secret }}"
|
||||||
algorithm: HMAC-SHA512
|
algorithm: HMAC-SHA512
|
||||||
"crans.fr":
|
"crans.fr":
|
||||||
zone: _acme-challenge.crans.org
|
zone: _acme-challenge.crans.org
|
||||||
|
@ -28,7 +28,7 @@ loc_service_certbot:
|
||||||
port: 53
|
port: 53
|
||||||
key:
|
key:
|
||||||
name: certbot_challenge.
|
name: certbot_challenge.
|
||||||
secret: "{{ vault.bind.keys['certbot_challenge.'].secret }}"
|
secret: "{{ vault.bind.rfc2136_keys['certbot_challenge.'].secret }}"
|
||||||
algorithm: HMAC-SHA512
|
algorithm: HMAC-SHA512
|
||||||
|
|
||||||
loc_nginx:
|
loc_nginx:
|
||||||
|
|
|
@ -24,3 +24,19 @@ glob_service_proxmox_user:
|
||||||
dependencies:
|
dependencies:
|
||||||
- python3-jinja2
|
- python3-jinja2
|
||||||
- python3-ldap
|
- python3-ldap
|
||||||
|
|
||||||
|
loc_certbot:
|
||||||
|
- mail: root@crans.org
|
||||||
|
certname: adm.crans.org
|
||||||
|
domains: "*.adm.crans.org"
|
||||||
|
|
||||||
|
loc_service_certbot:
|
||||||
|
config:
|
||||||
|
"adm.crans.org":
|
||||||
|
zone: _acme-challenge.adm.crans.org
|
||||||
|
server: 172.16.10.147
|
||||||
|
port: 53
|
||||||
|
key:
|
||||||
|
name: certbot_adm_challenge.
|
||||||
|
secret: "{{ vault.bind.rfc2136_keys['certbot_adm_challenge.'].secret }}"
|
||||||
|
algorithm: HMAC-SHA512
|
||||||
|
|
|
@ -19,7 +19,7 @@ loc_service_certbot:
|
||||||
port: 53
|
port: 53
|
||||||
key:
|
key:
|
||||||
name: certbot_challenge.
|
name: certbot_challenge.
|
||||||
secret: "{{ vault.bind.keys['certbot_challenge.'].secret }}"
|
secret: "{{ vault.bind.rfc2136_keys['certbot_challenge.'].secret }}"
|
||||||
algorithm: HMAC-SHA512
|
algorithm: HMAC-SHA512
|
||||||
"adm.crans.org":
|
"adm.crans.org":
|
||||||
zone: _acme-challenge.adm.crans.org
|
zone: _acme-challenge.adm.crans.org
|
||||||
|
@ -27,7 +27,7 @@ loc_service_certbot:
|
||||||
port: 53
|
port: 53
|
||||||
key:
|
key:
|
||||||
name: certbot_adm_challenge.
|
name: certbot_adm_challenge.
|
||||||
secret: "{{ vault.bind.keys['certbot_adm_challenge.'].secret }}"
|
secret: "{{ vault.bind.rfc2136_keys['certbot_adm_challenge.'].secret }}"
|
||||||
algorithm: HMAC-SHA512
|
algorithm: HMAC-SHA512
|
||||||
|
|
||||||
loc_nginx:
|
loc_nginx:
|
||||||
|
|
|
@ -23,7 +23,7 @@ loc_service_certbot:
|
||||||
port: 53
|
port: 53
|
||||||
key:
|
key:
|
||||||
name: certbot_challenge.
|
name: certbot_challenge.
|
||||||
secret: "{{ vault.bind.keys['certbot_challenge.'].secret }}"
|
secret: "{{ vault.bind.rfc2136_keys['certbot_challenge.'].secret }}"
|
||||||
algorithm: HMAC-SHA512
|
algorithm: HMAC-SHA512
|
||||||
"adm.crans.org":
|
"adm.crans.org":
|
||||||
zone: _acme-challenge.adm.crans.org
|
zone: _acme-challenge.adm.crans.org
|
||||||
|
@ -31,5 +31,5 @@ loc_service_certbot:
|
||||||
port: 53
|
port: 53
|
||||||
key:
|
key:
|
||||||
name: certbot_adm_challenge.
|
name: certbot_adm_challenge.
|
||||||
secret: "{{ vault.bind.keys['certbot_adm_challenge.'].secret }}"
|
secret: "{{ vault.bind.rfc2136_keys['certbot_adm_challenge.'].secret }}"
|
||||||
algorithm: HMAC-SHA512
|
algorithm: HMAC-SHA512
|
||||||
|
|
|
@ -49,7 +49,7 @@ loc_service_certbot:
|
||||||
port: 53
|
port: 53
|
||||||
key:
|
key:
|
||||||
name: certbot_challenge.
|
name: certbot_challenge.
|
||||||
secret: "{{ vault.bind.keys['certbot_challenge.'].secret }}"
|
secret: "{{ vault.bind.rfc2136_keys['certbot_challenge.'].secret }}"
|
||||||
algorithm: HMAC-SHA512
|
algorithm: HMAC-SHA512
|
||||||
"adm.crans.org":
|
"adm.crans.org":
|
||||||
zone: _acme-challenge.adm.crans.org
|
zone: _acme-challenge.adm.crans.org
|
||||||
|
@ -57,7 +57,7 @@ loc_service_certbot:
|
||||||
port: 53
|
port: 53
|
||||||
key:
|
key:
|
||||||
name: certbot_adm_challenge.
|
name: certbot_adm_challenge.
|
||||||
secret: "{{ vault.bind.keys['certbot_adm_challenge.'].secret }}"
|
secret: "{{ vault.bind.rfc2136_keys['certbot_adm_challenge.'].secret }}"
|
||||||
algorithm: HMAC-SHA512
|
algorithm: HMAC-SHA512
|
||||||
|
|
||||||
loc_nginx:
|
loc_nginx:
|
||||||
|
|
1
hosts
1
hosts
|
@ -51,6 +51,7 @@ jitsi
|
||||||
mailman
|
mailman
|
||||||
postfix
|
postfix
|
||||||
reverseproxy
|
reverseproxy
|
||||||
|
virtu
|
||||||
vsftpd_mirror
|
vsftpd_mirror
|
||||||
|
|
||||||
[constellation:children]
|
[constellation:children]
|
||||||
|
|
|
@ -7,3 +7,9 @@
|
||||||
roles:
|
roles:
|
||||||
- service
|
- service
|
||||||
- certbot
|
- certbot
|
||||||
|
|
||||||
|
- hosts: virtu
|
||||||
|
vars:
|
||||||
|
certbot: "{{ loc_certbot | default(glob_certbot | default([])) }}"
|
||||||
|
roles:
|
||||||
|
- proxmox-certbot
|
||||||
|
|
|
@ -0,0 +1,4 @@
|
||||||
|
---
|
||||||
|
- name: import certificate to proxmox
|
||||||
|
shell: "/usr/bin/pvenode cert set /etc/letsencrypt/live/{{ item.certname }}/cert.pem /etc/letsencrypt/live/{{ item.certname }}/privkey.pem --force 1 --restart 1"
|
||||||
|
loop: "{{ certbot }}"
|
|
@ -0,0 +1,7 @@
|
||||||
|
---
|
||||||
|
- name: Deploy proxmox renewal-hooks
|
||||||
|
template:
|
||||||
|
src: letsencrypt/renewal-hooks/deploy/proxmox.j2
|
||||||
|
dest: /etc/letsencrypt/renewal-hooks/deploy/proxmox
|
||||||
|
mode: 0755
|
||||||
|
notify: import certificate to proxmox
|
|
@ -0,0 +1,3 @@
|
||||||
|
#!/bin/bash
|
||||||
|
|
||||||
|
pvenode cert set ${RENEWED_LINEAGE}/{cert,privkey}.pem --force 1 --restart 1
|
Loading…
Reference in New Issue