Skip to content
Snippets Groups Projects
Commit 481a2218 authored by Robin Sonnabend's avatar Robin Sonnabend
Browse files

Simplify usage of acmetool with nginx

parent f40fe331
No related branches found
No related tags found
No related merge requests found
...@@ -6,4 +6,4 @@ acmetool_key_type: rsa ...@@ -6,4 +6,4 @@ acmetool_key_type: rsa
acmetool_rsa_key_size: 4096 acmetool_rsa_key_size: 4096
acmetool_mail: "{{ adminaddr }}" acmetool_mail: "{{ adminaddr }}"
acmetool_enable_proxy: true acmetool_services: ["nginx-proxy"]
...@@ -29,7 +29,7 @@ ...@@ -29,7 +29,7 @@
- name: initially configure acmetool - name: initially configure acmetool
# yamllint disable-line rule:line-length # yamllint disable-line rule:line-length
command: acmetool quickstart --expert --batch --response-file /var/lib/acme/quickstart-reponses.yml command: acmetool quickstart --expert --batch --response-file /var/lib/acme/quickstart-reponses.yml
when: not acmetool_status.stdout|search(acmetool_endpoint) when: not acmetool_status.stdout is search(acmetool_endpoint)
tags: tags:
- acmetool - acmetool
- config - config
...@@ -54,7 +54,6 @@ ...@@ -54,7 +54,6 @@
mode: '0755' mode: '0755'
notify: notify:
- reload systemd service files - reload systemd service files
when: acmetool_enable_proxy
tags: tags:
- acmetool - acmetool
- services - services
...@@ -68,7 +67,6 @@ ...@@ -68,7 +67,6 @@
mode: '0644' mode: '0644'
notify: notify:
- reload systemd service files - reload systemd service files
when: acmetool_enable_proxy
tags: tags:
- acmetool - acmetool
- services - services
......
{% if acmetool_enable_proxy %} SERVICES="{{acmetool_services|join(" ")}}"
SERVICES="nginx-proxy"
{% else %}
SERVICES="nginx"
{% endif %}
...@@ -3,11 +3,9 @@ server { ...@@ -3,11 +3,9 @@ server {
listen 443 ssl; listen 443 ssl;
server_name {{server.forward_hostnames.hostnames|default(server.forward_hostnames)|join(" ")}}; server_name {{server.forward_hostnames.hostnames|default(server.forward_hostnames)|join(" ")}};
ssl_certificate {{server.certificate}}; {% include "ssl-certificate" %}
ssl_trusted_certificate {{server.certificate}};
ssl_certificate_key {{server.private_key}};
{% if server.include_acme is defined and server.include_acme %} {% if server.include_acme|default(true) %}
include /etc/nginx/snippets/acmetool.conf; include /etc/nginx/snippets/acmetool.conf;
location / { location / {
......
...@@ -3,9 +3,7 @@ server { ...@@ -3,9 +3,7 @@ server {
listen 443 ssl; listen 443 ssl;
server_name {{ansible_all_ipv4_addresses|join(" ")}}; server_name {{ansible_all_ipv4_addresses|join(" ")}};
ssl_certificate {{server.certificate}}; {% include "ssl-certificate" %}
ssl_trusted_certificate {{server.certificate}};
ssl_certificate_key {{server.private_key}};
return 301 https://{{server.server_name}}$request_uri; return 301 https://{{server.server_name}}$request_uri;
} }
...@@ -13,7 +13,7 @@ server { ...@@ -13,7 +13,7 @@ server {
index {{server.indices|join(" ")}}; index {{server.indices|join(" ")}};
{% endif %} {% endif %}
{% if server.include_acme is defined and server.include_acme %} {% if server.include_acme|default(true) %}
include /etc/nginx/snippets/acmetool.conf; include /etc/nginx/snippets/acmetool.conf;
{% endif -%} {% endif -%}
......
...@@ -2,7 +2,7 @@ server { ...@@ -2,7 +2,7 @@ server {
listen {% if server.no_ssl is undefined or not server.no_ssl %}443 ssl{% else %}80{% endif %}; listen {% if server.no_ssl is undefined or not server.no_ssl %}443 ssl{% else %}80{% endif %};
server_name {{server.server_names|default([server.server_name])|join(" ")}}; server_name {{server.server_names|default([server.server_name])|join(" ")}};
{% if server.include_acme is defined and server.include_acme %} {% if server.include_acme|default(true) %}
include /etc/nginx/snippets/acmetool.conf; include /etc/nginx/snippets/acmetool.conf;
{% endif -%} {% endif -%}
...@@ -11,9 +11,7 @@ server { ...@@ -11,9 +11,7 @@ server {
{% endif %} {% endif %}
{% if server.no_ssl is undefined or not server.no_ssl %} {% if server.no_ssl is undefined or not server.no_ssl %}
ssl_certificate {{server.certificate}}; {% include "ssl-certificate" %}
ssl_trusted_certificate {{server.certificate}};
ssl_certificate_key {{server.private_key}};
{% endif %} {% endif %}
{% if server.cipher_strength is defined -%} {% if server.cipher_strength is defined -%}
ssl_ciphers '{{ciphers[server.cipher_strength]}}'; ssl_ciphers '{{ciphers[server.cipher_strength]}}';
......
...@@ -17,7 +17,7 @@ server { ...@@ -17,7 +17,7 @@ server {
{% endfor %} {% endfor %}
{% endif %} {% endif %}
{% if server.include_acme is defined and server.include_acme %} {% if server.include_acme|default(true) %}
include /etc/nginx/snippets/acmetool.conf; include /etc/nginx/snippets/acmetool.conf;
{% endif -%} {% endif -%}
......
ssl_certificate {{server.certificate|default("/var/lib/acme/live/" + server.server_name + "/fullchain")}};
ssl_trusted_certificate {{server.certificate|default("/var/lib/acme/live/" + server.server_name + "/fullchain")}};
ssl_certificate_key {{server.private_key|default("/var/lib/acme/live/" + server.server_name + "/privkey")}};
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Please register or to comment