Compare commits

..

68 Commits

Author SHA1 Message Date
48fac8f21f
[skip ci] fix drone-matrix template 2023-02-08 21:15:49 +01:00
9f54dddfd3
ci: switch to molecule v4
All checks were successful
continuous-integration/drone/push Build is passing
2022-12-21 09:13:41 +01:00
fe24ff2a30
chore: use dedicated log dir for domain groups
All checks were successful
continuous-integration/drone/push Build is passing
2022-11-02 08:42:34 +01:00
4a2789378e
ci: update python images to 3.10
All checks were successful
continuous-integration/drone/push Build is passing
2022-07-02 21:52:57 +02:00
7d80858653
chore: switch to main as default branch
All checks were successful
continuous-integration/drone/push Build is passing
2022-06-20 22:19:56 +02:00
22f4eed9b7
chore: add auto-generated _docs folder to gitignore file
All checks were successful
continuous-integration/drone/push Build is passing
2022-03-03 21:15:25 +01:00
3bb0db9c7d
fix: add missing molecule python dependencies
All checks were successful
continuous-integration/drone/push Build is passing
2022-01-26 21:39:23 +01:00
a7a95b64c4 feat: add test for Rocky Linux 8 (#2)
Some checks failed
continuous-integration/drone/push Build is failing
Co-authored-by: Robert Kaussow <xoxys@rknet.org>
Co-committed-by: Robert Kaussow <xoxys@rknet.org>
2022-01-26 21:10:48 +01:00
4d6500c66d
chore: end of the year maintenance [skip ci] 2021-12-21 10:45:04 +01:00
c0606b4cf5
trigger ci run
All checks were successful
continuous-integration/drone/push Build is passing
2021-09-21 23:41:21 +02:00
b24c193f56
ci: switch to drone-matrix plugin
All checks were successful
continuous-integration/drone/push Build is passing
2021-09-21 22:36:22 +02:00
14604df568
fix venv command
All checks were successful
continuous-integration/drone/push Build is passing
2021-06-12 17:48:57 +02:00
a01ebed87c
feat: add option to customize virtualenv
Some checks failed
continuous-integration/drone/push Build is failing
2021-06-12 17:43:27 +02:00
34fa40dbc2
fix ci yapf command if no python files found
All checks were successful
continuous-integration/drone/push Build is passing
2021-06-08 00:26:19 +02:00
16bcbcc03e
fix ci yapf command if no python files found
All checks were successful
continuous-integration/drone/push Build is passing
2021-06-08 00:14:28 +02:00
4f84033eb4
ci: add python file checks to ci
All checks were successful
continuous-integration/drone/push Build is passing
2021-06-07 22:28:41 +02:00
e5be5f67a3
chore: replace flake8 config file and add autoformatting 2021-06-07 22:15:00 +02:00
ea7b90b01c
feat: add certbot_max_log_backups
All checks were successful
continuous-integration/drone/push Build is passing
2021-06-04 08:45:03 +02:00
ce1806c95b
chore: update collection xoxys.generl to v2.1.1
All checks were successful
continuous-integration/drone/push Build is passing
2021-05-16 17:01:06 +02:00
5983ed75e2
chore: update collection xoxys.generl to v2.1.0
All checks were successful
continuous-integration/drone/push Build is passing
2021-05-16 16:06:27 +02:00
87884852f5
[skip ci] cleanup metadata 2021-04-23 12:12:13 +02:00
d4e0a92b9d
use venv to install certbot
All checks were successful
continuous-integration/drone/push Build is passing
2021-04-17 12:20:07 +02:00
8acf3bd72c
[skip ci] update min_ansible_version to 2.10 2021-03-14 17:50:18 +01:00
fbbcd2bd70
[skip ci] fix molecule instance config formatting 2021-03-14 16:24:25 +01:00
3985b5bd41
[skip ci] update copyright year 2021-03-14 15:15:03 +01:00
1c4f90a7b6
fix: solve linting issues
All checks were successful
continuous-integration/drone/push Build is passing
2021-02-06 15:15:59 +01:00
1e85ee3908
fix: disable logs explicitly in molecule config
Some checks failed
continuous-integration/drone/push Build is failing
2021-02-04 22:42:38 +01:00
35883f4f88
chore: bump ansible-later standards to v0.2
Some checks failed
continuous-integration/drone/push Build is failing
2021-02-04 21:32:31 +01:00
b22d11b38d
fix molecule requirements
All checks were successful
continuous-integration/drone/push Build is passing
2020-11-29 23:13:31 +01:00
8db2e68355
prefix internal vars
All checks were successful
continuous-integration/drone/push Build is passing
2020-11-23 21:44:46 +01:00
d400ec20df
switch to native filters instead of molecule internals
All checks were successful
continuous-integration/drone/push Build is passing
2020-10-19 09:07:03 +02:00
3c0a186995
fix molecule destroy playbook
All checks were successful
continuous-integration/drone/push Build is passing
2020-10-04 12:40:45 +02:00
562c5f5637
add option to attach volumes
All checks were successful
continuous-integration/drone/push Build is passing
2020-10-03 17:12:28 +02:00
addc2e7c38
[skip ci] fix heading 2020-10-03 13:39:38 +02:00
2b161aabd0
move molecule tests to hcloud
All checks were successful
continuous-integration/drone/push Build is passing
2020-10-02 09:32:13 +02:00
66ebd89d52
trigger ci
All checks were successful
continuous-integration/drone/push Build is passing
2020-10-01 19:51:58 +02:00
6bda22a650
cleanup readme
Some checks failed
continuous-integration/drone/push Build is failing
2020-10-01 19:22:30 +02:00
3f38c11222
update email
All checks were successful
continuous-integration/drone/push Build is passing
2020-10-01 17:12:34 +02:00
4741e718af
remove docs downstream trigger as this doesnt work well for mass updates
Some checks failed
continuous-integration/drone/push Build is failing
2020-10-01 16:47:34 +02:00
9d038aae51
fix formatting
All checks were successful
continuous-integration/drone/push Build is passing
2020-10-01 11:20:23 +02:00
c1c7b95d1f
[skip ci] fix refs to migrated repos 2020-09-27 23:24:14 +02:00
6b66c92368
[skip ci] update collections 2020-09-04 23:17:07 +02:00
c047dfc9aa
migrate dependencies to collections
All checks were successful
continuous-integration/drone/push Build is passing
2020-08-19 18:39:03 +02:00
9d02eed848
fix typo
All checks were successful
continuous-integration/drone/push Build is passing
2020-07-18 17:24:28 +02:00
1987e2bc95 fix link to the license file
All checks were successful
continuous-integration/drone/push Build is passing
2020-06-04 15:15:58 +02:00
008376d8bf fix downstream repo
All checks were successful
continuous-integration/drone/push Build is passing
2020-05-25 23:01:26 +02:00
51d6e57bc1 use pip3 during molecule run
All checks were successful
continuous-integration/drone/push Build is passing
2020-05-23 02:06:26 +02:00
39ee3f55b7 make pip version configurabel
Some checks failed
continuous-integration/drone/push Build is failing
2020-05-22 23:34:25 +02:00
a05f19240e dont use state latest
Some checks failed
continuous-integration/drone/push Build is failing
2020-05-22 23:00:28 +02:00
8b68438b81 remove jinja2 delimiters from condition
Some checks failed
continuous-integration/drone/push Build is failing
2020-05-22 22:52:10 +02:00
e30f87f296 use default pip
Some checks failed
continuous-integration/drone/push Build is failing
2020-05-22 22:49:17 +02:00
c3b99671c5 fix typo
All checks were successful
continuous-integration/drone/push Build is passing
2020-05-22 22:26:37 +02:00
3b99eaf72d allow to control multiple cert groups
All checks were successful
continuous-integration/drone/push Build is passing
2020-05-22 22:21:55 +02:00
5219535989 install aways latest dependencies
All checks were successful
continuous-integration/drone/push Build is passing
2020-05-10 17:05:23 +02:00
a972a49a67 add explicit pip package state
All checks were successful
continuous-integration/drone/push Build is passing
2020-04-21 00:33:37 +02:00
3d538bfb70 fix credentials permission file
All checks were successful
continuous-integration/drone/push Build is passing
2020-04-21 00:25:08 +02:00
14e09868e5 add absolut path for certbot
All checks were successful
continuous-integration/drone/push Build is passing
2020-04-21 00:10:25 +02:00
2a3ed206cb try to fix certbot path
Some checks failed
continuous-integration/drone/push Build is failing
2020-04-20 23:45:34 +02:00
ad5c0a1f31 fix ansible warnings
Some checks failed
continuous-integration/drone/push Build is failing
2020-04-20 23:39:41 +02:00
0514e2d8ce refactor molecule tests for python
Some checks failed
continuous-integration/drone/push Build is failing
2020-04-20 23:31:55 +02:00
20b94d8e6c fix indentation 2020-04-20 23:25:13 +02:00
4741a72109 use pip to install certbot into user environemnt
Some checks failed
continuous-integration/drone/push Build is failing
2020-04-20 23:21:54 +02:00
f35134612d rename cron related variables
All checks were successful
continuous-integration/drone/push Build is passing
2020-04-20 22:47:48 +02:00
d5a78a348f remove cento8 testing for now
All checks were successful
continuous-integration/drone/push Build is passing
2020-04-19 23:52:54 +02:00
f6da8d9e5d fix variable name
Some checks failed
continuous-integration/drone/push Build is failing
2020-04-19 23:37:59 +02:00
c25d1c02be add missing credentials template
Some checks failed
continuous-integration/drone/push Build is failing
2020-04-19 23:35:00 +02:00
82774d6341 update drone config
Some checks failed
continuous-integration/drone/push Build is failing
2020-04-19 23:30:38 +02:00
89c425eef3 Merge pull request 'refactor role' (#1) from refactoring into master
Some checks reported errors
continuous-integration/drone/push Build was killed
2020-04-19 23:29:24 +02:00
34 changed files with 705 additions and 425 deletions

View File

@ -8,14 +8,36 @@ local PipelineLinting = {
steps: [
{
name: 'ansible-later',
image: 'xoxys/ansible-later',
image: 'thegeeklab/ansible-later',
commands: [
'ansible-later',
],
},
{
name: 'python-format',
image: 'python:3.11',
environment: {
PY_COLORS: 1,
},
commands: [
'pip install -qq yapf',
'[ -z "$(find . -type f -name *.py)" ] || (yapf -rd ./)',
],
},
{
name: 'python-flake8',
image: 'python:3.11',
environment: {
PY_COLORS: 1,
},
commands: [
'pip install -qq flake8',
'flake8',
],
},
],
trigger: {
ref: ['refs/heads/master', 'refs/tags/**', 'refs/pull/**'],
ref: ['refs/heads/main', 'refs/tags/**', 'refs/pull/**'],
},
};
@ -36,11 +58,9 @@ local PipelineDeployment(scenario='centos7') = {
steps: [
{
name: 'ansible-molecule',
image: 'xoxys/molecule:3',
image: 'thegeeklab/molecule:4',
environment: {
DO_API_KEY: { from_secret: 'do_api_key' },
MOLECULE_CUSTOM_MODULES_REPO: 'https://gitea.rknet.org/ansible/custom_modules',
MOLECULE_CUSTOM_FILTERS_REPO: 'https://gitea.rknet.org/ansible/custom_filters',
HCLOUD_TOKEN: { from_secret: 'hcloud_token' },
},
commands: [
'molecule test -s ' + scenario,
@ -51,7 +71,7 @@ local PipelineDeployment(scenario='centos7') = {
'linting',
],
trigger: {
ref: ['refs/heads/master', 'refs/tags/**'],
ref: ['refs/heads/main', 'refs/tags/**', 'refs/pull/**'],
},
};
@ -65,7 +85,7 @@ local PipelineDocumentation = {
steps: [
{
name: 'generate',
image: 'xoxys/ansible-doctor',
image: 'thegeeklab/ansible-doctor',
environment: {
ANSIBLE_DOCTOR_LOG_LEVEL: 'INFO',
ANSIBLE_DOCTOR_FORCE_OVERWRITE: true,
@ -87,31 +107,16 @@ local PipelineDocumentation = {
target_branch: 'docs',
},
when: {
ref: ['refs/heads/master'],
},
},
{
name: 'trigger',
image: 'plugins/downstream',
settings: {
server: 'https://drone.rknet.org',
token: { from_secret: 'drone_token' },
fork: true,
repositories: [
'ansible/ansible-galaxy',
],
},
when: {
ref: ['refs/heads/master'],
ref: ['refs/heads/main'],
},
},
],
trigger: {
ref: ['refs/heads/master', 'refs/tags/**', 'refs/pull/**'],
ref: ['refs/heads/main', 'refs/tags/**', 'refs/pull/**'],
},
depends_on: [
'testing-centos7',
'testing-centos8',
'testing-rocky8',
],
};
@ -128,11 +133,11 @@ local PipelineNotification = {
steps: [
{
name: 'matrix',
image: 'plugins/matrix',
image: 'thegeeklab/drone-matrix',
settings: {
homeserver: { from_secret: 'matrix_homeserver' },
roomid: { from_secret: 'matrix_roomid' },
template: 'Status: **{{ build.status }}**<br/> Build: [{{ repo.Owner }}/{{ repo.Name }}]({{ build.link }}) ({{ build.branch }}) by {{ build.author }}<br/> Message: {{ build.message }}',
template: 'Status: **{{ .Build.Status }}**<br/> Build: [{{ .Repo.Owner }}/{{ .Repo.Name }}]({{ .Build.Link }}){{ if .Build.Branch }} ({{ .Build.Branch }}){{ end }} by {{ .Commit.Author }}<br/> Message: {{ .Commit.Message.Title }}',
username: { from_secret: 'matrix_username' },
password: { from_secret: 'matrix_password' },
},
@ -143,14 +148,14 @@ local PipelineNotification = {
],
trigger: {
status: ['success', 'failure'],
ref: ['refs/heads/master', 'refs/tags/**'],
ref: ['refs/heads/main', 'refs/tags/**'],
},
};
[
PipelineLinting,
PipelineDeployment(scenario='centos7'),
PipelineDeployment(scenario='centos8'),
PipelineDeployment(scenario='rocky8'),
PipelineDocumentation,
PipelineNotification,
]

View File

@ -8,13 +8,29 @@ platform:
steps:
- name: ansible-later
image: xoxys/ansible-later
image: thegeeklab/ansible-later
commands:
- ansible-later
- name: python-format
image: python:3.11
commands:
- pip install -qq yapf
- "[ -z \"$(find . -type f -name *.py)\" ] || (yapf -rd ./)"
environment:
PY_COLORS: 1
- name: python-flake8
image: python:3.11
commands:
- pip install -qq flake8
- flake8
environment:
PY_COLORS: 1
trigger:
ref:
- refs/heads/master
- refs/heads/main
- refs/tags/**
- refs/pull/**
@ -35,19 +51,51 @@ workspace:
steps:
- name: ansible-molecule
image: xoxys/molecule:3
image: thegeeklab/molecule:4
commands:
- molecule test -s centos7
environment:
DO_API_KEY:
from_secret: do_api_key
MOLECULE_CUSTOM_FILTERS_REPO: https://gitea.rknet.org/ansible/custom_filters
MOLECULE_CUSTOM_MODULES_REPO: https://gitea.rknet.org/ansible/custom_modules
HCLOUD_TOKEN:
from_secret: hcloud_token
trigger:
ref:
- refs/heads/master
- refs/heads/main
- refs/tags/**
- refs/pull/**
depends_on:
- linting
---
kind: pipeline
name: testing-rocky8
platform:
os: linux
arch: amd64
concurrency:
limit: 1
workspace:
base: /drone/src
path: ${DRONE_REPO_NAME}
steps:
- name: ansible-molecule
image: thegeeklab/molecule:4
commands:
- molecule test -s rocky8
environment:
HCLOUD_TOKEN:
from_secret: hcloud_token
trigger:
ref:
- refs/heads/main
- refs/tags/**
- refs/pull/**
depends_on:
- linting
@ -62,7 +110,7 @@ platform:
steps:
- name: generate
image: xoxys/ansible-doctor
image: thegeeklab/ansible-doctor
environment:
ANSIBLE_DOCTOR_EXCLUDE_FILES: molecule/
ANSIBLE_DOCTOR_FORCE_OVERWRITE: true
@ -84,29 +132,17 @@ steps:
from_secret: gitea_username
when:
ref:
- refs/heads/master
- name: trigger
image: plugins/downstream
settings:
fork: true
repositories:
- ansible/ansible-galaxy
server: https://drone.rknet.org
token:
from_secret: drone_token
when:
ref:
- refs/heads/master
- refs/heads/main
trigger:
ref:
- refs/heads/master
- refs/heads/main
- refs/tags/**
- refs/pull/**
depends_on:
- testing-centos7
- testing-rocky8
---
kind: pipeline
@ -121,7 +157,7 @@ clone:
steps:
- name: matrix
image: plugins/matrix
image: thegeeklab/drone-matrix
settings:
homeserver:
from_secret: matrix_homeserver
@ -129,13 +165,13 @@ steps:
from_secret: matrix_password
roomid:
from_secret: matrix_roomid
template: "Status: **{{ build.status }}**<br/> Build: [{{ repo.Owner }}/{{ repo.Name }}]({{ build.link }}) ({{ build.branch }}) by {{ build.author }}<br/> Message: {{ build.message }}"
template: "Status: **{{ .Build.Status }}**<br/> Build: [{{ .Repo.Owner }}/{{ .Repo.Name }}]({{ .Build.Link }}){{ if .Build.Branch }} ({{ .Build.Branch }}){{ end }} by {{ .Commit.Author }}<br/> Message: {{ .Commit.Message.Title }}"
username:
from_secret: matrix_username
trigger:
ref:
- refs/heads/master
- refs/heads/main
- refs/tags/**
status:
- success
@ -146,6 +182,6 @@ depends_on:
---
kind: signature
hmac: c3eb21e904a1ceed464b6d86c674b7c0b6569ba1787b20cc716269ba7baf01b8
hmac: 6048ef83a64bc78c4f6c2cb20f3a5fabe27eef22e1195f8288c8376372dd9c0a
...

View File

@ -1,5 +0,0 @@
[flake8]
ignore = D101, D102, D103, D105, D107, E402, W503
max-line-length = 99
inline-quotes = double
exclude = .git,.tox,__pycache__,build,dist,tests,*.pyc,*.egg-info,.cache,.eggs,env*

2
.gitignore vendored
View File

@ -9,3 +9,5 @@ __pycache__/
*.py[cod]
*$py.class
# ---> Docs
/_docs

View File

@ -3,9 +3,10 @@ ansible:
custom_modules:
- iptables_raw
- openssl_pkcs12
- proxmox_kvm2
- proxmox_kvm
- ucr
- yum_versionlock
- corenetworks_dns
- corenetworks_token
rules:
exclude_files:

View File

@ -1,6 +1,6 @@
MIT License
Copyright (c) 2020 Robert Kaussow <mail@geeklabor.de>
Copyright (c) 2022 Robert Kaussow <mail@thegeeklab.de>
Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal

View File

@ -10,7 +10,3 @@ You can find the full documentation at [https://galaxy.geekdocs.de](https://gala
## License
This project is licensed under the MIT License - see the [LICENSE](LICENSE) file for details.
## Maintainers and Contributors
[Robert Kaussow](https://gitea.rknet.org/xoxys)

View File

@ -1,19 +1,31 @@
---
# @var certbot_version:description: Set a fix version of the certbot package to install.
# @var certbot_version: $ "_unset_"
# @var certbot_packages_extra:description: Extra packages to install with pip (e.g. DNS plugins).
certbot_packages_extra: []
certbot_virtualenv_command: /usr/bin/python3 -m venv
certbot_virtualenv: /opt/python3/certbot
certbot_user: root
certbot_initial_run_enabled: False
certbot_work_dir: /var/lib/letsencrypt
certbot_config_dir: /etc/letsencrypt
certbot_log_dir: /var/log/letsencrypt
certbot_max_log_backups: 30
certbot_preferred_challenges: dns
certbot_server: https://acme-v02.api.letsencrypt.org/directory
certbot_email: mail@example.com
certbot_rsa_key_size: 4096
certbot_domains:
certbot_domain_groups:
- name: example
domains:
- "*.example.com"
- example.com
init: False
# @var certbot_credentials:description: >
# Specify key value parairs for your credentials (e.g. plugin credentials).
@ -22,18 +34,18 @@ certbot_domains:
# @end
certbot_credentials: []
# @var certbot_bin:description: Location of the certbot binary. Default is to `~/.local/.bin/certbot`.
certbot_command_arguments:
- "certonly"
- "-n -d {{ certbot_domains | join(',') }}"
# @var certbot_scheduler_enabled:description: Enable scheduling via cron.
certbot_scheduler_enabled: True
# @var certbot_cron_enabled:description: Enable scheduling via cron.
certbot_cron_enabled: True
certbot_cron_minute: 30
certbot_cron_hour: 3
# @var certbot_cron_file:description: Use a file under /etc/cron.d but this will only work if `certbot_user`
# has write permissions for this location.
# @var certbot_cron_file:description: >
# Use a file under /etc/cron.d but this will only work if `certbot_user` has write permissions for this location.
# @end
# @var certbot_cron_file: $ "_unset_"
# @var certbot_cron_file:example: certbot-letsencrypt
certbot_cron_minute: "30"
certbot_cron_hour: "3"

View File

@ -1,18 +1,20 @@
# Standards: 0.1
# Standards: 0.2
---
galaxy_info:
# @meta author:value: [Robert Kaussow](https://gitea.rknet.org/xoxys)
author: Robert Kaussow <mail@geeklabor.de>
author: Robert Kaussow <mail@thegeeklab.de>
namespace: xoxys
role_name: certbot
# @meta description: >
# [![Source Code](https://img.shields.io/badge/gitea-source%20code-blue?logo=gitea&logoColor=white)](https://gitea.rknet.org/ansible/xoxys.certbot)
# [![Build Status](https://img.shields.io/drone/build/ansible/xoxys.certbot?logo=drone&server=https%3A%2F%2Fdrone.rknet.org)](https://drone.rknet.org/ansible/xoxys.certbot)
# [![License: MIT](https://img.shields.io/badge/license-MIT-blue.svg)](LICENSE)
# [![License: MIT](https://img.shields.io/badge/license-MIT-blue.svg)](https://gitea.rknet.org/ansible/xoxys.certbot/src/branch/main/LICENSE)
#
# Setup [certbot](https://certbot.eff.org/) Let's Encrypt client.
# @end
description: Setup certbot Let's Encrypt client
license: MIT
min_ansible_version: 2.8
min_ansible_version: 2.10
platforms:
- name: EL
versions:
@ -22,3 +24,5 @@ galaxy_info:
- letsencrypt
- certbot
dependencies: []
collections:
- community.general

View File

@ -2,8 +2,9 @@
- name: Converge
hosts: all
vars:
certbot_packages_extra:
- epel-release
python3_packages_extra:
- centos-release-scl
roles:
- role: xoxys.python3
- role: xoxys.certbot

View File

@ -5,36 +5,39 @@
gather_facts: false
no_log: "{{ molecule_no_log }}"
vars:
ssh_user: root
ssh_port: 22
keypair_name: molecule_key
keypair_path: "{{ lookup('env', 'MOLECULE_EPHEMERAL_DIRECTORY') }}/ssh_key"
ssh_user: root
ssh_path: "{{ lookup('env', 'MOLECULE_EPHEMERAL_DIRECTORY') }}/ssh_key"
tasks:
- name: Create local keypair
- name: Create SSH key
user:
name: "{{ lookup('env', 'USER') }}"
generate_ssh_key: true
ssh_key_file: "{{ keypair_path }}"
register: local_keypair
ssh_key_file: "{{ ssh_path }}"
force: true
register: generated_ssh_key
- name: Create remote keypair
digital_ocean_sshkey:
name: "{{ keypair_name }}"
ssh_pub_key: "{{ local_keypair.ssh_public_key }}"
- name: Register the SSH key name
set_fact:
ssh_key_name: "molecule-generated-{{ 12345 | random | to_uuid }}"
- name: Register SSH key for test instance(s)
hcloud_ssh_key:
name: "{{ ssh_key_name }}"
public_key: "{{ generated_ssh_key.ssh_public_key }}"
state: present
register: remote_keypair
- name: Create molecule instance(s)
digital_ocean_droplet:
hcloud_server:
name: "{{ item.name }}"
unique_name: true
region: "{{ item.region_id }}"
image: "{{ item.image_id }}"
size: "{{ item.size_id }}"
ssh_keys: "{{ remote_keypair.data.ssh_key.id }}"
wait: true
wait_timeout: 300
server_type: "{{ item.server_type }}"
ssh_keys:
- "{{ ssh_key_name }}"
image: "{{ item.image }}"
location: "{{ item.location | default(omit) }}"
datacenter: "{{ item.datacenter | default(omit) }}"
user_data: "{{ item.user_data | default(omit) }}"
api_token: "{{ lookup('env', 'HCLOUD_TOKEN') }}"
state: present
register: server
loop: "{{ molecule_yml.platforms }}"
@ -44,25 +47,49 @@
- name: Wait for instance(s) creation to complete
async_status:
jid: "{{ item.ansible_job_id }}"
register: digitalocean_jobs
until: digitalocean_jobs.finished
register: hetzner_jobs
until: hetzner_jobs.finished
retries: 300
loop: "{{ server.results }}"
- name: Create volume(s)
hcloud_volume:
name: "{{ item.name }}"
server: "{{ item.name }}"
location: "{{ item.location | default(omit) }}"
size: "{{ item.volume_size | default(10) }}"
api_token: "{{ lookup('env', 'HCLOUD_TOKEN') }}"
state: "present"
loop: "{{ molecule_yml.platforms }}"
when: item.volume | default(False) | bool
register: volumes
async: 7200
poll: 0
- name: Wait for volume(s) creation to complete
async_status:
jid: "{{ item.ansible_job_id }}"
register: hetzner_volumes
until: hetzner_volumes.finished
retries: 300
when: volumes.changed
loop: "{{ volumes.results }}"
# Mandatory configuration for Molecule to function.
- name: Populate instance config dict
set_fact:
instance_conf_dict: {
'instance': "{{ item.data.droplet.name }}",
'address': "{{ item.data.ip_address }}",
'user': "{{ ssh_user }}",
'port': "{{ ssh_port }}",
'identity_file': "{{ keypair_path }}",
'droplet_id': "{{ item.data.droplet.id }}",
'ssh_key_id': "{{ remote_keypair.data.ssh_key.id }}",
instance_conf_dict:
{
"instance": "{{ item.hcloud_server.name }}",
"ssh_key_name": "{{ ssh_key_name }}",
"address": "{{ item.hcloud_server.ipv4_address }}",
"user": "{{ ssh_user }}",
"port": "{{ ssh_port }}",
"identity_file": "{{ ssh_path }}",
"volume": "{{ item.item.item.volume | default(False) | bool }}",
}
loop: "{{ digitalocean_jobs.results }}"
loop: "{{ hetzner_jobs.results }}"
register: instance_config_dict
when: server.changed | bool
@ -73,7 +100,10 @@
- name: Dump instance config
copy:
content: "{{ instance_conf | to_json | from_json | molecule_to_yaml | molecule_header }}"
content: |
# Molecule managed
{{ instance_conf | to_nice_yaml(indent=2) }}
dest: "{{ molecule_instance_config }}"
when: server.changed | bool
@ -83,5 +113,8 @@
host: "{{ item.address }}"
search_regex: SSH
delay: 10
timeout: 320
loop: "{{ lookup('file', molecule_instance_config) | molecule_from_yaml }}"
loop: "{{ lookup('file', molecule_instance_config) | from_yaml }}"
- name: Wait for VM to settle down
pause:
seconds: 30

View File

@ -5,41 +5,62 @@
gather_facts: false
no_log: "{{ molecule_no_log }}"
tasks:
- block:
- name: Populate instance config
- name: Check existing instance config file
stat:
path: "{{ molecule_instance_config }}"
register: cfg
- name: Populate the instance config
set_fact:
instance_conf: "{{ lookup('file', molecule_instance_config) | molecule_from_yaml }}"
skip_instances: false
rescue:
- name: Populate instance config when file missing
set_fact:
instance_conf: {}
skip_instances: true
instance_conf: "{{ (lookup('file', molecule_instance_config) | from_yaml) if cfg.stat.exists else [] }}"
- name: Destroy molecule instance(s)
digital_ocean_droplet:
hcloud_server:
name: "{{ item.instance }}"
id: "{{ item.droplet_id }}"
api_token: "{{ lookup('env', 'HCLOUD_TOKEN') }}"
state: absent
register: server
loop: "{{ instance_conf | flatten(levels=1) }}"
when: not skip_instances
loop: "{{ instance_conf }}"
async: 7200
poll: 0
- name: Wait for instance(s) deletion to complete
async_status:
jid: "{{ item.ansible_job_id }}"
register: digitalocean_jobs
until: digitalocean_jobs.finished
register: hetzner_jobs
until: hetzner_jobs.finished
retries: 300
loop: "{{ server.results }}"
- name: Delete remote keypair
digital_ocean_sshkey:
fingerprint: "{{ item.ssh_key_id }}"
- pause:
seconds: 5
- name: Destroy volume(s)
hcloud_volume:
name: "{{ item.instance }}"
server: "{{ item.instance }}"
api_token: "{{ lookup('env', 'HCLOUD_TOKEN') }}"
state: "absent"
register: volumes
loop: "{{ instance_conf }}"
when: item.volume | default(False) | bool
async: 7200
poll: 0
- name: Wait for volume(s) deletion to complete
async_status:
jid: "{{ item.ansible_job_id }}"
register: hetzner_volumes
until: hetzner_volumes.finished
retries: 300
when: volumes.changed
loop: "{{ volumes.results }}"
- name: Remove registered SSH key
hcloud_ssh_key:
name: "{{ instance_conf[0].ssh_key_name }}"
state: absent
loop: "{{ instance_conf | flatten(levels=1) }}"
when: (instance_conf | default([])) | length > 0
# Mandatory configuration for Molecule to function.
@ -49,6 +70,9 @@
- name: Dump instance config
copy:
content: "{{ instance_conf | molecule_to_yaml | molecule_header }}"
content: |
# Molecule managed
{{ instance_conf | to_nice_yaml(indent=2) }}
dest: "{{ molecule_instance_config }}"
when: server.changed | bool

View File

@ -1,19 +1,24 @@
---
dependency:
name: galaxy
options:
role-file: molecule/requirements.yml
requirements-file: molecule/requirements.yml
env:
ANSIBLE_GALAXY_DISPLAY_PROGRESS: "false"
driver:
name: delegated
platforms:
- name: centos7-certbot
region_id: fra1
image_id: centos-7-x64
size_id: s-1vcpu-1gb
image: centos-7
server_type: cx11
lint: |
flake8
/usr/local/bin/flake8
provisioner:
name: ansible
env:
ANSIBLE_FILTER_PLUGINS: ${ANSIBLE_FILTER_PLUGINS:-./plugins/filter}
ANSIBLE_LIBRARY: ${ANSIBLE_LIBRARY:-./library}
log: False
verifier:
name: testinfra

View File

@ -3,7 +3,13 @@
hosts: all
gather_facts: false
tasks:
- name: Install python for Ansible
raw: test -e /usr/bin/python || (apt -y update && apt install -y python-minimal)
- name: Bootstrap python for Ansible
raw: |
command -v python3 python || (
(test -e /usr/bin/dnf && sudo dnf install -y python3) ||
(test -e /usr/bin/apt && (apt -y update && apt install -y python-minimal)) ||
(test -e /usr/bin/yum && sudo yum -y -qq install python3) ||
echo "Warning: Python not boostrapped due to unknown platform."
)
become: true
changed_when: false

View File

@ -2,13 +2,17 @@ import os
import testinfra.utils.ansible_runner
import warnings
warnings.filterwarnings("ignore", category=DeprecationWarning)
testinfra_hosts = testinfra.utils.ansible_runner.AnsibleRunner(
os.environ['MOLECULE_INVENTORY_FILE']).get_hosts('all')
os.environ["MOLECULE_INVENTORY_FILE"]
).get_hosts("all")
def test_certbot_is_installed(host):
certbot = host.package("certbot")
assert certbot.is_installed
pkg = host.pip_package.get_packages(pip_path="/opt/python3/certbot/bin/pip")
assert "certbot" in pkg
def test_certbot_run(host):
cmd = host.run("/usr/local/bin/certbot --help")
assert "Certbot can obtain and install HTTPS/TLS/SSL certificates." in cmd.stdout
assert cmd.succeeded

View File

@ -1,87 +0,0 @@
---
- name: Create
hosts: localhost
connection: local
gather_facts: false
no_log: "{{ molecule_no_log }}"
vars:
ssh_user: root
ssh_port: 22
keypair_name: molecule_key
keypair_path: "{{ lookup('env', 'MOLECULE_EPHEMERAL_DIRECTORY') }}/ssh_key"
tasks:
- name: Create local keypair
user:
name: "{{ lookup('env', 'USER') }}"
generate_ssh_key: true
ssh_key_file: "{{ keypair_path }}"
register: local_keypair
- name: Create remote keypair
digital_ocean_sshkey:
name: "{{ keypair_name }}"
ssh_pub_key: "{{ local_keypair.ssh_public_key }}"
state: present
register: remote_keypair
- name: Create molecule instance(s)
digital_ocean_droplet:
name: "{{ item.name }}"
unique_name: true
region: "{{ item.region_id }}"
image: "{{ item.image_id }}"
size: "{{ item.size_id }}"
ssh_keys: "{{ remote_keypair.data.ssh_key.id }}"
wait: true
wait_timeout: 300
state: present
register: server
loop: "{{ molecule_yml.platforms }}"
async: 7200
poll: 0
- name: Wait for instance(s) creation to complete
async_status:
jid: "{{ item.ansible_job_id }}"
register: digitalocean_jobs
until: digitalocean_jobs.finished
retries: 300
loop: "{{ server.results }}"
# Mandatory configuration for Molecule to function.
- name: Populate instance config dict
set_fact:
instance_conf_dict: {
'instance': "{{ item.data.droplet.name }}",
'address': "{{ item.data.ip_address }}",
'user': "{{ ssh_user }}",
'port': "{{ ssh_port }}",
'identity_file': "{{ keypair_path }}",
'droplet_id': "{{ item.data.droplet.id }}",
'ssh_key_id': "{{ remote_keypair.data.ssh_key.id }}",
}
loop: "{{ digitalocean_jobs.results }}"
register: instance_config_dict
when: server.changed | bool
- name: Convert instance config dict to a list
set_fact:
instance_conf: "{{ instance_config_dict.results | map(attribute='ansible_facts.instance_conf_dict') | list }}"
when: server.changed | bool
- name: Dump instance config
copy:
content: "{{ instance_conf | to_json | from_json | molecule_to_yaml | molecule_header }}"
dest: "{{ molecule_instance_config }}"
when: server.changed | bool
- name: Wait for SSH
wait_for:
port: "{{ ssh_port }}"
host: "{{ item.address }}"
search_regex: SSH
delay: 10
timeout: 320
loop: "{{ lookup('file', molecule_instance_config) | molecule_from_yaml }}"

View File

@ -1 +0,0 @@
default

View File

@ -1,54 +0,0 @@
---
- name: Destroy
hosts: localhost
connection: local
gather_facts: false
no_log: "{{ molecule_no_log }}"
tasks:
- block:
- name: Populate instance config
set_fact:
instance_conf: "{{ lookup('file', molecule_instance_config) | molecule_from_yaml }}"
skip_instances: false
rescue:
- name: Populate instance config when file missing
set_fact:
instance_conf: {}
skip_instances: true
- name: Destroy molecule instance(s)
digital_ocean_droplet:
name: "{{ item.instance }}"
id: "{{ item.droplet_id }}"
state: absent
register: server
loop: "{{ instance_conf | flatten(levels=1) }}"
when: not skip_instances
async: 7200
poll: 0
- name: Wait for instance(s) deletion to complete
async_status:
jid: "{{ item.ansible_job_id }}"
register: digitalocean_jobs
until: digitalocean_jobs.finished
retries: 300
loop: "{{ server.results }}"
- name: Delete remote keypair
digital_ocean_sshkey:
fingerprint: "{{ item.ssh_key_id }}"
state: absent
loop: "{{ instance_conf | flatten(levels=1) }}"
# Mandatory configuration for Molecule to function.
- name: Populate instance config
set_fact:
instance_conf: {}
- name: Dump instance config
copy:
content: "{{ instance_conf | molecule_to_yaml | molecule_header }}"
dest: "{{ molecule_instance_config }}"
when: server.changed | bool

View File

@ -1,9 +0,0 @@
---
- name: Prepare
hosts: all
gather_facts: false
tasks:
- name: Install python for Ansible
raw: test -e /usr/bin/python || (dnf -y install python3 && alternatives --set python /usr/bin/python3)
become: true
changed_when: false

View File

@ -1,14 +0,0 @@
import os
import testinfra.utils.ansible_runner
import warnings
warnings.filterwarnings("ignore", category=DeprecationWarning)
testinfra_hosts = testinfra.utils.ansible_runner.AnsibleRunner(
os.environ['MOLECULE_INVENTORY_FILE']).get_hosts('all')
def test_certbot_is_installed(host):
certbot = host.package("certbot")
assert certbot.is_installed

View File

@ -1 +1 @@
centos8
rocky8

10
molecule/requirements.yml Normal file
View File

@ -0,0 +1,10 @@
---
collections:
- name: https://gitea.rknet.org/ansible/xoxys.general/releases/download/v2.1.1/xoxys-general-2.1.1.tar.gz
- name: community.general
roles:
- src: https://gitea.rknet.org/ansible/xoxys.python3.git
name: xoxys.python3
scm: git
version: main

View File

@ -1,9 +1,6 @@
---
- name: Converge
hosts: all
vars:
certbot_packages_extra:
- epel-release
roles:
- role: xoxys.python3
- role: xoxys.certbot

120
molecule/rocky8/create.yml Normal file
View File

@ -0,0 +1,120 @@
---
- name: Create
hosts: localhost
connection: local
gather_facts: false
no_log: "{{ molecule_no_log }}"
vars:
ssh_port: 22
ssh_user: root
ssh_path: "{{ lookup('env', 'MOLECULE_EPHEMERAL_DIRECTORY') }}/ssh_key"
tasks:
- name: Create SSH key
user:
name: "{{ lookup('env', 'USER') }}"
generate_ssh_key: true
ssh_key_file: "{{ ssh_path }}"
force: true
register: generated_ssh_key
- name: Register the SSH key name
set_fact:
ssh_key_name: "molecule-generated-{{ 12345 | random | to_uuid }}"
- name: Register SSH key for test instance(s)
hcloud_ssh_key:
name: "{{ ssh_key_name }}"
public_key: "{{ generated_ssh_key.ssh_public_key }}"
state: present
- name: Create molecule instance(s)
hcloud_server:
name: "{{ item.name }}"
server_type: "{{ item.server_type }}"
ssh_keys:
- "{{ ssh_key_name }}"
image: "{{ item.image }}"
location: "{{ item.location | default(omit) }}"
datacenter: "{{ item.datacenter | default(omit) }}"
user_data: "{{ item.user_data | default(omit) }}"
api_token: "{{ lookup('env', 'HCLOUD_TOKEN') }}"
state: present
register: server
loop: "{{ molecule_yml.platforms }}"
async: 7200
poll: 0
- name: Wait for instance(s) creation to complete
async_status:
jid: "{{ item.ansible_job_id }}"
register: hetzner_jobs
until: hetzner_jobs.finished
retries: 300
loop: "{{ server.results }}"
- name: Create volume(s)
hcloud_volume:
name: "{{ item.name }}"
server: "{{ item.name }}"
location: "{{ item.location | default(omit) }}"
size: "{{ item.volume_size | default(10) }}"
api_token: "{{ lookup('env', 'HCLOUD_TOKEN') }}"
state: "present"
loop: "{{ molecule_yml.platforms }}"
when: item.volume | default(False) | bool
register: volumes
async: 7200
poll: 0
- name: Wait for volume(s) creation to complete
async_status:
jid: "{{ item.ansible_job_id }}"
register: hetzner_volumes
until: hetzner_volumes.finished
retries: 300
when: volumes.changed
loop: "{{ volumes.results }}"
# Mandatory configuration for Molecule to function.
- name: Populate instance config dict
set_fact:
instance_conf_dict:
{
"instance": "{{ item.hcloud_server.name }}",
"ssh_key_name": "{{ ssh_key_name }}",
"address": "{{ item.hcloud_server.ipv4_address }}",
"user": "{{ ssh_user }}",
"port": "{{ ssh_port }}",
"identity_file": "{{ ssh_path }}",
"volume": "{{ item.item.item.volume | default(False) | bool }}",
}
loop: "{{ hetzner_jobs.results }}"
register: instance_config_dict
when: server.changed | bool
- name: Convert instance config dict to a list
set_fact:
instance_conf: "{{ instance_config_dict.results | map(attribute='ansible_facts.instance_conf_dict') | list }}"
when: server.changed | bool
- name: Dump instance config
copy:
content: |
# Molecule managed
{{ instance_conf | to_nice_yaml(indent=2) }}
dest: "{{ molecule_instance_config }}"
when: server.changed | bool
- name: Wait for SSH
wait_for:
port: "{{ ssh_port }}"
host: "{{ item.address }}"
search_regex: SSH
delay: 10
loop: "{{ lookup('file', molecule_instance_config) | from_yaml }}"
- name: Wait for VM to settle down
pause:
seconds: 30

View File

@ -0,0 +1,78 @@
---
- name: Destroy
hosts: localhost
connection: local
gather_facts: false
no_log: "{{ molecule_no_log }}"
tasks:
- name: Check existing instance config file
stat:
path: "{{ molecule_instance_config }}"
register: cfg
- name: Populate the instance config
set_fact:
instance_conf: "{{ (lookup('file', molecule_instance_config) | from_yaml) if cfg.stat.exists else [] }}"
- name: Destroy molecule instance(s)
hcloud_server:
name: "{{ item.instance }}"
api_token: "{{ lookup('env', 'HCLOUD_TOKEN') }}"
state: absent
register: server
loop: "{{ instance_conf }}"
async: 7200
poll: 0
- name: Wait for instance(s) deletion to complete
async_status:
jid: "{{ item.ansible_job_id }}"
register: hetzner_jobs
until: hetzner_jobs.finished
retries: 300
loop: "{{ server.results }}"
- pause:
seconds: 5
- name: Destroy volume(s)
hcloud_volume:
name: "{{ item.instance }}"
server: "{{ item.instance }}"
api_token: "{{ lookup('env', 'HCLOUD_TOKEN') }}"
state: "absent"
register: volumes
loop: "{{ instance_conf }}"
when: item.volume | default(False) | bool
async: 7200
poll: 0
- name: Wait for volume(s) deletion to complete
async_status:
jid: "{{ item.ansible_job_id }}"
register: hetzner_volumes
until: hetzner_volumes.finished
retries: 300
when: volumes.changed
loop: "{{ volumes.results }}"
- name: Remove registered SSH key
hcloud_ssh_key:
name: "{{ instance_conf[0].ssh_key_name }}"
state: absent
when: (instance_conf | default([])) | length > 0
# Mandatory configuration for Molecule to function.
- name: Populate instance config
set_fact:
instance_conf: {}
- name: Dump instance config
copy:
content: |
# Molecule managed
{{ instance_conf | to_nice_yaml(indent=2) }}
dest: "{{ molecule_instance_config }}"
when: server.changed | bool

View File

@ -1,19 +1,24 @@
---
dependency:
name: galaxy
options:
role-file: molecule/requirements.yml
requirements-file: molecule/requirements.yml
env:
ANSIBLE_GALAXY_DISPLAY_PROGRESS: "false"
driver:
name: delegated
platforms:
- name: centos7-certbot
region_id: fra1
image_id: centos-8-x64
size_id: s-1vcpu-1gb
- name: rocky8-certbot
image: rocky-8
server_type: cx11
lint: |
flake8
/usr/local/bin/flake8
provisioner:
name: ansible
env:
ANSIBLE_FILTER_PLUGINS: ${ANSIBLE_FILTER_PLUGINS:-./plugins/filter}
ANSIBLE_LIBRARY: ${ANSIBLE_LIBRARY:-./library}
log: False
verifier:
name: testinfra

View File

@ -0,0 +1,15 @@
---
- name: Prepare
hosts: all
gather_facts: false
tasks:
- name: Bootstrap python for Ansible
raw: |
command -v python3 python || (
(test -e /usr/bin/dnf && sudo dnf install -y python3) ||
(test -e /usr/bin/apt && (apt -y update && apt install -y python-minimal)) ||
(test -e /usr/bin/yum && sudo yum -y -qq install python3) ||
echo "Warning: Python not boostrapped due to unknown platform."
)
become: true
changed_when: false

View File

@ -0,0 +1,18 @@
import os
import testinfra.utils.ansible_runner
testinfra_hosts = testinfra.utils.ansible_runner.AnsibleRunner(
os.environ["MOLECULE_INVENTORY_FILE"]
).get_hosts("all")
def test_certbot_is_installed(host):
pkg = host.pip_package.get_packages(pip_path="/opt/python3/certbot/bin/pip")
assert "certbot" in pkg
def test_certbot_run(host):
cmd = host.run("/usr/local/bin/certbot --help")
assert "Certbot can obtain and install HTTPS/TLS/SSL certificates." in cmd.stdout
assert cmd.succeeded

12
setup.cfg Normal file
View File

@ -0,0 +1,12 @@
[flake8]
ignore = D100, D101, D102, D103, D105, D107, E402, W503
max-line-length = 99
inline-quotes = double
exclude = .git,.tox,__pycache__,build,dist,tests,*.pyc,*.egg-info,.cache,.eggs,env*
[yapf]
based_on_style = google
column_limit = 99
dedent_closing_brackets = true
coalesce_brackets = true
split_before_logical_operator = true

View File

@ -1,17 +1,59 @@
---
- block:
- name: Install certbot
package:
name: "{{ item }}"
state: present
loop: "{{ certbot_packages_extra + __certbot_packages }}"
- name: Create certbot user '{{ certbot_user }}'
user:
name: "{{ certbot_user }}"
become: True
become_user: root
when: not certbot_user == 'root'
- block:
- name: Upgrade python dependencies
pip:
name: "{{ item }}"
virtualenv: "{{ certbot_virtualenv }}"
virtualenv_command: "{{ certbot_virtualenv_command }}"
extra_args: --upgrade
loop:
- pip
- setuptools
- name: Install dependencies
pip:
name: "{{ item }}"
virtualenv: "{{ certbot_virtualenv }}"
virtualenv_command: "{{ certbot_virtualenv_command }}"
environment:
TMPDIR: /opt/python3/tmp
loop: "{{ certbot_packages_extra }}"
- name: Install certbot
pip:
name: "{{ item }}"
virtualenv: "{{ certbot_virtualenv }}"
virtualenv_command: "{{ certbot_virtualenv_command }}"
loop: "{{ __certbot_packages }}"
- name: Adjust file permissions
file:
name: "{{ certbot_virtualenv }}"
recurse: True
mode: u+rwX,go+rX,go-w
state: directory
- name: Make certbot binaries executable
file:
name: "{{ certbot_virtualenv }}/bin/{{ item }}"
mode: 0755
loop: "{{ __certbot_binaries }}"
- name: Deploy certbot bin wrappers
template:
src: usr/local/bin/certbot-wrapper.j2
dest: "/usr/local/bin/{{ item }}"
owner: root
group: root
mode: 0755
loop: "{{ __certbot_binaries }}"
become: True
become_user: root
@ -21,7 +63,7 @@
path: "{{ item.name }}"
state: directory
mode: "{{ item.mode }}"
loop: "{{ certbot_environment }}"
loop: "{{ __certbot_environment }}"
loop_control:
label: "{{ item.name }}"
@ -29,27 +71,33 @@
template:
src: config/cli.ini.j2
dest: "{{ certbot_config_dir }}/cli.ini"
mode: 0640
- name: Deploy credentials file
template:
src: config/credentials.ini.j2
dest: "{{ certbot_config_dir }}/credentials.ini"
when: certbot_credentials
mode: 600
mode: 0600
when: certbot_credentials | default([]) | length > 0
- name: Schedule certbot run
cron:
name: Certbot automatic renewal
name: "Certbot automatic renewal: {{ item.name }}"
minute: "{{ certbot_cron_minute }}"
hour: "{{ certbot_cron_hour }}"
user: "{{ certbot_cron_user | default(certbot_user) }}"
job: >
certbot
{{ certbot_bin | default(__certbot_bin) }}
--config-dir {{ certbot_config_dir }}
--work-dir {{ certbot_work_dir }}
--logs-dir {{ certbot_log_dir }}
--logs-dir {{ certbot_log_dir }}/{{ item.name }}
--max-log-backups {{ certbot_max_log_backups }}
{{ certbot_command_arguments | join(' ') }}
-n -d {{ item.domains | join(',') }}
cron_file: "{{ certbot_cron_file | default(omit) }}"
when: certbot_scheduler_enabled
loop: "{{ certbot_domain_groups }}"
loop_control:
label: "{{ item.name }}"
when: certbot_cron_enabled
become: True
become_user: "{{ certbot_user }}"

View File

@ -1,17 +1,20 @@
---
- name: Initialise certbot
block:
- name: Initial run of certbot
command: >
certbot
{{ certbot_bin | default(__certbot_bin) }}
--config-dir {{ certbot_config_dir }}
--work-dir {{ certbot_work_dir }}
--logs-dir {{ certbot_log_dir }}
--logs-dir {{ certbot_log_dir }}/{{ item.name }}
--max-log-backups {{ certbot_max_log_backups }}
--agree-tos
{{ certbot_command_arguments | join(' ') }}
register: certbot_init
changed_when: certbot_init.rc == 130
-n -d {{ item.domains | join(',') }}
register: __certbot_init
changed_when: __certbot_init.rc == 130
ignore_errors: True
loop: "{{ certbot_domain_groups }}"
loop_control:
label: "{{ item.name }}"
when: item.init | default(False) | bool
become: True
become_user: "{{ certbot_user }}"
when: certbot_initial_run_enabled

View File

@ -0,0 +1,3 @@
{% for line in certbot_credentials %}
{{ line }}
{% endfor %}

View File

@ -0,0 +1,4 @@
#!/usr/bin/env sh
set -eo pipefail
exec {{ certbot_virtualenv }}/bin/{{ item }} "$@"

View File

@ -1,8 +1,16 @@
---
__certbot_packages:
- certbot
- "certbot{{ '==' + certbot_version if certbot_version is defined else '' }}"
__certbot_environment:
- { name: "{{ certbot_work_dir }}", mode: "0755" }
- { name: "{{ certbot_config_dir }}", mode: "0755" }
- { name: "{{ certbot_log_dir }}", mode: "0700" }
- name: "{{ certbot_work_dir }}"
mode: "0755"
- name: "{{ certbot_config_dir }}"
mode: "0755"
- name: "{{ certbot_log_dir }}"
mode: "0700"
__certbot_binaries:
- certbot
__certbot_bin: "/usr/local/bin/certbot"