Skip to content

Logunov/ansible-role-letsencrypt

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

32 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

letsencrypt

Role is designed for Let's encrypt integration. It installs requested certificates and sets up automatic validation task to cron. Propper configured web server is required, see requirements.

There's a dontgen tag that dosn't generate certificates but just shows you the generation commands and puts cron tasks.

Requirements

For successful validation your web server should respond for both http and https request at the /.well-known/acme-challenge URL with the content of letsencrypt_webroot directory. See nginx example below. Built in web server will be used for the first time generation if no services listen to 80 and 443 ports.

Do not run multiple letsencrypt roles on the same host as cron tasks will be overwritten.

Certificate update tasks are placed to cron with 5 minutes interval starting from 4:04 in the 14th day of each month.

nginx_example

/etc/nginx/letsencrypt.conf
# {{ ansible_managed }}
location /.well-known/acme-challenge
{
    root /var/www/letsencrypt;
    error_page 404 =500 @500;
}

location @500 {
    return 500;
}
/etc/nginx/sites-available/mysite.conf
behind ha-proxy
# {{ ansible_managed }}
server {
    listen 80;
    server_name -;
    server_tokens off;

    include letsencrypt.conf;

    location /
    {
        return 301 https://$host$request_uri;
    }
}
server {
        listen 443 ssl;
        server_name {{ server }};
        ssl on;
        ssl_certificate     /etc/letsencrypt/live/example.com/fullchain.pem;
        ssl_certificate_key /etc/letsencrypt/live/example.com/privkey.pem;

        include letsencrypt.conf;
}
standalone on multiple hosts
upstream letsencrypt {
    server front01.int:8080;
    server front02.int:8080;
}

server {
    listen 80;
    server_name -;

        location /.well-known/acme-challenge {
            proxy_pass http://letsencrypt;
            proxy_next_upstream     error timeout invalid_header http_500;
            proxy_connect_timeout   2;
        }

        location / {
        return 301 https://$host$request_uri;
        }
}
server {
        listen 443 ssl;
        server_name -;

        ssl_certificate /etc/letsencrypt/live/{{ ansible_fdqn }}/fullchain.pem;
        ssl_certificate_key /etc/letsencrypt/live/{{ ansible_fdqn }}/privkey.pem;


        location /.well-known/acme-challenge {
            proxy_pass http://letsencrypt;
            proxy_next_upstream     error timeout invalid_header http_500;
            proxy_connect_timeout   2;
        }

        location / {
            root /var/www/html;
        }
}

server {
    listen 8080;
    include letsencrypt.conf;
}

In this example I replace error 404 with 500 one to set up Let's encrypt on multiple backends behind ha-proxy or on multiple frontends with standalone nginx.

Role Variables

variable name default value description
letsencrypt_path /opt/letsencrypt letsencrypt clone path
letsencrypt_webroot /var/www/letsencrypt letsencrypt webroot
letsencrypt_reload_nginx True if true, adds service nginx reload task to cron
letsencrypt none list of dictionaries, see example below
letsencrypt_group False name of group of hosts with identical or intersectional list of certificates. Will be used to calculate time for cron tasks to avoid simultaneous renewal.

letsencryptvariable

Variable is a list of dictionaries, each item should produce a key and a cron task. email is an emails address assigned to the list of domains in domains array. domains is a list of domains included in a key. The first item in this list will be used in a path to certificates.

letsencrypt:
    - { email: "hostmaster@example.com", domains: ["example.com", "www.example.com"] }
    - { email: "hostmaster@example.com", domains: ["gitlab.example.com"] }
    - { email: "test@gmail.com",         domains: ["test.com", "test.net"] }

Here you are going to get the following certificate paths:

  • /etc/letsencrypt/live/www.example.com/fullchain.pem
  • /etc/letsencrypt/live/gitlab.example.com/fullchain.pem
  • /etc/letsencrypt/live/test.net/fullchain.pem

letsencrypt_group

Let's say you have 2 domain: test1.example.org and test2.example.org. test1.example.org is on host1 and host2, test2.example.org is on host2 and host3. Set letsencrypt in host_vars for aech host, note that host2 should have two items in the letsencrypt list. Place all three hosts to some group and set letsencrypt_group to the name of this group for this group of hosts. All your certificate updates should be fired in different time now.

Example Playbook

- hosts: servers
  become: yes
  vars:
      letsencrypt:
          - { email: "hostmaster@example.com", domains: ["example.com", "www.example.com"] }
          - { email: "hostmaster@example.com", domains: ["gitlab.example.com"] }
          - { email: "test@gmail.com",         domains: ["test.com", "test.net"] }

  roles:
      - { role: letsencrypt, tags: cert }

License

MIT

Known issues

When domain list for multiple domains (SAN) changed "let's encrypt" creates new certificate paths.

TODO

  • Implement individual cron times for different servers
  • Implement one by one generation if run on a group of hosts

About

No description, website, or topics provided.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published