rewrite lego role

This commit is contained in:
Oli
2025-06-05 22:53:10 +00:00
parent 62fabb2277
commit 230feb9b0c
12 changed files with 247 additions and 71 deletions

View File

@@ -0,0 +1,14 @@
---
# lego_certificate_domains:
# - cn: "dns.ows.cx"
# sans: [*.dns.ows.cx]
# lego_certificate_destination:
# path: /etc/nginx/certs
# owner: root
# group: nginx
# lego_services_reload:
# name: nginx
# # OR
# command: /usr/sbin/nginx -s reload

View File

@@ -1,14 +1,21 @@
---
- name: Get latest lego version
github_release:
user: go-acme
repo: lego
action: latest_release
token: "{{ vault_github_token }}"
become: false
delegate_to: localhost
run_once: true
register: lego_version
when: lego_version is undefined
block:
- name: Get latest version from Github
github_release: # needs Python Module github3.py
user: go-acme
repo: lego
action: latest_release
token: "{{ vault_github_token }}"
register: lego_github_version
- name: "{{ lego_github_version }}"
set_fact:
lego_version: "{{ lego_github_version.tag }}"
- name: Set architecture alias
set_fact:
@@ -20,10 +27,10 @@
architecture_alias: "arm64" # noqa: var-naming[no-role-prefix]
when: ansible_architecture == "aarch64"
- name: "Download lego from GitHub ({{ lego_version.tag }})"
- name: "Download lego from GitHub"
get_url:
url: "https://github.com/go-acme/lego/releases/download/\
{{ lego_version.tag }}/lego_{{ lego_version.tag }}\
{{ lego_version }}/lego_{{ lego_version }}\
_linux_{{ architecture_alias }}.tar.gz"
dest: "/var/tmp/lego.tar.gz"
mode: "0644"
@@ -48,22 +55,44 @@
mode: "0755"
state: directory
- name: Copy ACME renew-hook script
template:
src: "renew-hook.sh.j2"
dest: "{{ lego_config_dir }}/renew-hook.sh"
mode: "0750"
vars:
lego_cert_dir: "{{ lego_config_dir }}/certificates"
- name: Register lego and create cert
command: |
{{ lego_install_dir }}/lego --accept-tos
{% for dns in certificate_domains %}
--domains="{{ dns }}"
{% endfor %}
{{ lego_cli_params | join(' ') }}
run
shell: >
{{ lego_install_dir }}/lego --accept-tos
--domains="{{ item.cn }}"
{% if item.sans is defined and item.sans %}
{% for san in item.sans %}--domains="{{ san }}" {% endfor %}
{% endif %}
{{ lego_cli_params | join(' ') }}
run &&
{{ lego_config_dir }}/renew-hook.sh '{{ item.cn }}'
args:
creates: "/var/lib/lego/accounts"
creates: "{{ lego_certificate_destination.path | default(lego_config_dir + '/certificates') }}/{{ item.cn }}.crt"
environment: '{ "{{ lego_provider|upper }}_API_KEY": "{{ vault_ionos_token_dns }}" }'
loop: "{{ lego_certificate_domains }}"
loop_control:
label: "{{ item.cn }}"
- name: Copy lego systemd service
template:
src: "{{ item }}.j2"
dest: "/etc/systemd/system/{{ item }}"
src: "lego.{{ item.1 }}.j2"
dest: "/etc/systemd/system/lego_{{ item.0.cn }}.{{ item.1 }}"
mode: "0644"
loop: [lego.service, lego.timer]
notify: [Restart lego_service, Restart lego_timer]
loop: "{{ lego_certificate_domains | product(['service', 'timer']) | list }}"
loop_control:
label: "lego_{{ item.0.cn }}.{{ item.1 }}"
- name: Start lego_timer
systemd:
daemon_reload: true
enabled: true
name: "lego_{{ item.cn }}.timer"
state: started
loop: "{{ lego_certificate_domains }}"

View File

@@ -1,19 +1,31 @@
## Managed by Ansible ##
[Unit]
Description=Run lego renew
Description=Renew Lets Encrypt certificate for {{ item.0.cn }}
After=network-online.target
[Service]
Type=oneshot
{% if lego_provider == "ionos" %}
Environment={{ lego_provider|upper }}_API_KEY={{ vault_ionos_token_dns }}
{% endif %}
ExecStart={{ lego_install_dir }}/lego \
{% for dns in certificate_domains %}
--domains="{{ dns }}" \
{% endfor %}
{{ lego_cli_params|join(' ') }} \
renew
--domains="{{ item.0.cn }}" \
{% if item.0.sans is defined and item.0.sans %}
{% for san in item.0.sans %}
--domains="{{ san }}" \
{% endfor %}
{% endif %}
{{ lego_cli_params | join(' ') }} \
renew \
--renew-hook="{{ lego_config_dir }}/renew-hook.sh {{ item.0.cn }}"
User=root
# Restart if renewal fails, but not too quickly
RestartSec=12h
Restart=on-failure
StartLimitInterval=72h
StartLimitBurst=3
[Install]
WantedBy=multi-user.target

View File

@@ -1,11 +1,11 @@
## Managed by Ansible ##
[Unit]
Description=Start lego renew
Description=Timer for Lets Encrypt certificate renewal of {{ item.0.cn }}
[Timer]
Persistent=true
OnCalendar=Mon 04:00:00
OnCalendar=Mon 03:00:00
RandomizedDelaySec=1h
[Install]

View File

@@ -0,0 +1,134 @@
#!/usr/bin/bash
## Managed by Ansible ##
# Variables set by Ansible
cert_src_path="{{ lego_cert_dir }}"
# Certificate destination variables (if defined)
cert_dest_path="{{ lego_certificate_destination.path | default('') }}"
cert_owner="{{ lego_certificate_destination.owner | default('') }}"
cert_group="{{ lego_certificate_destination.group | default('') }}"
# Service reload variables (if defined)
service_name="{{ lego_services_reload.name | default('') }}"
service_command="{{ lego_services_reload.command | default('') }}"
copy_certificate_files() {
local domain="$1"
local success=true
# Check if destination is defined
if [ -z "$cert_dest_path" ]; then
echo "No certificate destination defined, skipping copy"
return 0
fi
echo "Copying certificate files for $domain..."
echo "Copying to $cert_dest_path..."
# Create destination directory if it doesn't exist
mkdir -p "$cert_dest_path"
# Copy certificate files
cp "$cert_src_path/${domain}.crt" "$cert_dest_path/${domain}.crt" || success=false
cp "$cert_src_path/${domain}.key" "$cert_dest_path/${domain}.key" || success=false
# Copy issuer cert if it exists
if [ -f "$cert_src_path/${domain}.issuer.crt" ]; then
cp "$cert_src_path/${domain}.issuer.crt" "$cert_dest_path/${domain}.issuer.crt" || success=false
fi
# Set standard secure permissions
# 644 for certificates, 600 for keys
chmod 644 "$cert_dest_path/${domain}.crt" || success=false
chmod 600 "$cert_dest_path/${domain}.key" || success=false
# Set issuer cert permissions if it exists
if [ -f "$cert_dest_path/${domain}.issuer.crt" ]; then
chmod 644 "$cert_dest_path/${domain}.issuer.crt" || success=false
fi
# Set ownership if specified
if [ -n "$cert_owner" ] && [ -n "$cert_group" ]; then
if [ -f "$cert_dest_path/${domain}.issuer.crt" ]; then
chown "$cert_owner":"$cert_group" "$cert_dest_path/${domain}.crt" "$cert_dest_path/${domain}.key" "$cert_dest_path/${domain}.issuer.crt" || success=false
else
chown "$cert_owner":"$cert_group" "$cert_dest_path/${domain}.crt" "$cert_dest_path/${domain}.key" || success=false
fi
fi
if $success; then
echo "Certificate files copied successfully"
return 0
else
echo "Error copying certificate files"
return 1
fi
}
reload_service() {
local domain="$1"
local success=true
# Check if service reload is defined
if [ -z "$service_name" ] && [ -z "$service_command" ]; then
echo "No service reload defined, skipping reload"
return 0
fi
echo "Reloading service..."
if [ -n "$service_command" ]; then
echo "Running command: $service_command"
eval "$service_command" || success=false
elif [ -n "$service_name" ]; then
echo "Reloading $service_name..."
systemctl reload "$service_name" || systemctl restart "$service_name" || success=false
fi
if $success; then
echo "Service reloaded successfully"
return 0
else
echo "Error reloading service"
return 1
fi
}
# Check if domain is provided as parameter
if [ $# -lt 1 ]; then
echo "Error: Domain parameter is required"
echo "Usage: $0 <domain>"
exit 1
fi
# Get domain from parameter
domain="$1"
# Main execution
echo "Certificate renewal hook triggered for $domain"
# Call the functions
copy_certificate_files "$domain"
copy_result=$?
reload_service "$domain"
reload_result=$?
# Send webhook notification
message="$domain certificate was successfully renewed"
if [ -n "$cert_dest_path" ]; then
message="${message}, files copied"
fi
if [ -n "$service_name" ] || [ -n "$service_command" ]; then
message="${message}, and service reloaded"
fi
if [ $copy_result -eq 0 ] && [ $reload_result -eq 0 ]; then
echo "$message"
else
echo "$domain certificate was renewed but post-renewal tasks failed"
fi

View File

@@ -1,21 +1,17 @@
---
# Lego
lego_install_dir: "/usr/local/bin"
lego_config_dir: "/var/lib/lego"
lego_provider: "ionos"
lego_cert_mail: !vault |
lego_cli_params:
- --path={{ lego_config_dir }}
- --email={{ vault_lego_cert_mail }}
- --dns={{ lego_provider }}
- --key-type=ec256
vault_lego_cert_mail: !vault |
$ANSIBLE_VAULT;1.2;AES256;dtsv-dev
32353064653631636431646333633664363866666439306235303138306461313266343939346463
6565636462656666366133653638333433393730656362360a333363623561646436613530623662
34623331313964316464653333646134353037333065373063346164623037663235316361646666
3466623937663061340a643863633034633665316364313065303166643363653366363063303261
34316163616637633837333539626337356563616566346561333439646565373665
lego_cli_params:
- --path={{ lego_config_dir }}
- --email={{ lego_cert_mail }}
- --dns={{ lego_provider }}
- --key-type=ec384
# Certificates
certificate_domains:
- "twirling.de"
- "*.twirling.de"