Role is designed for Let's encrypt integration. It installs requested certificates and sets up automatic validation task to cron. Propper configured web server is required, see requirements.
There's a dontgen
tag that dosn't generate certificates but just shows you the generation commands and puts cron tasks.
For successful validation your web server should respond for both http and https request at the /.well-known/acme-challenge
URL with the content of letsencrypt_webroot
directory. See nginx example below. Built in web server will be used for the first time generation if no services listen to 80 and 443 ports.
Do not run multiple letsencrypt roles on the same host as cron tasks will be overwritten.
Certificate update tasks are placed to cron with 5 minutes interval starting from 4:04 in the 14th day of each month.
# {{ ansible_managed }}
location /.well-known/acme-challenge
{
root /var/www/letsencrypt;
error_page 404 =500 @500;
}
location @500 {
return 500;
}
# {{ ansible_managed }}
server {
listen 80;
server_name -;
server_tokens off;
include letsencrypt.conf;
location /
{
return 301 https://$host$request_uri;
}
}
server {
listen 443 ssl;
server_name {{ server }};
ssl on;
ssl_certificate /etc/letsencrypt/live/example.com/fullchain.pem;
ssl_certificate_key /etc/letsencrypt/live/example.com/privkey.pem;
include letsencrypt.conf;
}
upstream letsencrypt {
server front01.int:8080;
server front02.int:8080;
}
server {
listen 80;
server_name -;
location /.well-known/acme-challenge {
proxy_pass http://letsencrypt;
proxy_next_upstream error timeout invalid_header http_500;
proxy_connect_timeout 2;
}
location / {
return 301 https://$host$request_uri;
}
}
server {
listen 443 ssl;
server_name -;
ssl_certificate /etc/letsencrypt/live/{{ ansible_fdqn }}/fullchain.pem;
ssl_certificate_key /etc/letsencrypt/live/{{ ansible_fdqn }}/privkey.pem;
location /.well-known/acme-challenge {
proxy_pass http://letsencrypt;
proxy_next_upstream error timeout invalid_header http_500;
proxy_connect_timeout 2;
}
location / {
root /var/www/html;
}
}
server {
listen 8080;
include letsencrypt.conf;
}
In this example I replace error 404 with 500 one to set up Let's encrypt on multiple backends behind ha-proxy or on multiple frontends with standalone nginx.
variable name | default value | description |
---|---|---|
letsencrypt_path | /opt/letsencrypt | letsencrypt clone path |
letsencrypt_webroot | /var/www/letsencrypt | letsencrypt webroot |
letsencrypt_reload_nginx | True | if true , adds service nginx reload task to cron |
letsencrypt | none | list of dictionaries, see example below |
letsencrypt_group | False | name of group of hosts with identical or intersectional list of certificates. Will be used to calculate time for cron tasks to avoid simultaneous renewal. |
Variable is a list of dictionaries, each item should produce a key and a cron task.
email
is an emails address assigned to the list of domains in domains
array.
domains
is a list of domains included in a key. The first item in this list will be used in a path to certificates.
letsencrypt:
- { email: "[email protected]", domains: ["example.com", "www.example.com"] }
- { email: "[email protected]", domains: ["gitlab.example.com"] }
- { email: "[email protected]", domains: ["test.com", "test.net"] }
Here you are going to get the following certificate paths:
- /etc/letsencrypt/live/www.example.com/fullchain.pem
- /etc/letsencrypt/live/gitlab.example.com/fullchain.pem
- /etc/letsencrypt/live/test.net/fullchain.pem
Let's say you have 2 domain: test1.example.org
and test2.example.org
. test1.example.org
is on host1
and host2
, test2.example.org
is on host2
and host3
. Set letsencrypt
in host_vars for aech host, note that host2
should have two items in the letsencrypt
list. Place all three hosts to some group and set letsencrypt_group
to the name of this group for this group of hosts. All your certificate updates should be fired in different time now.
- hosts: servers
sudo: yes
vars:
letsencrypt:
- { email: "[email protected]", domains: ["example.com", "www.example.com"] }
- { email: "[email protected]", domains: ["gitlab.example.com"] }
- { email: "[email protected]", domains: ["test.com", "test.net"] }
roles:
- { role: letsencrypt, tags: cert }
BSD
When domain list for multiple domains (SAN) changed "let's encrypt" creates new certificate paths.
- Implement individual cron times for different servers
- Implement one by one generation if run on a group of hosts