Optimized cloudflare implementation

This commit is contained in:
Kevin Veen-Birkenbach 2025-04-29 02:20:10 +02:00
parent d796158c61
commit e5e394d470
No known key found for this signature in database
GPG Key ID: 44D8F11FD62F878E
13 changed files with 249 additions and 117 deletions

0
library/__init__.py Normal file
View File

View File

@ -0,0 +1,92 @@
#!/usr/bin/python
from __future__ import absolute_import, division, print_function
__metaclass__ = type
DOCUMENTATION = r'''
---
module: cert_check_exists
short_description: Check if a SSL certificate exists for a domain
description:
- Checks if any certificate covers the given domain.
options:
domain:
description:
- Domain name to check for in the certificates.
required: true
type: str
cert_base_path:
description:
- Path where certificates are stored.
required: false
type: str
default: /etc/letsencrypt/live
debug:
description:
- Enable verbose debug output.
required: false
type: bool
default: false
author:
- Kevin Veen-Birkenbach
'''
EXAMPLES = r'''
- name: Check if cert exists
cert_check_exists:
domain: "matomo.cymais.cloud"
cert_base_path: "/etc/letsencrypt/live"
register: result
'''
RETURN = r'''
exists:
description: True if a certificate covering the domain exists, false otherwise.
type: bool
returned: always
'''
import os
from ansible.module_utils.basic import AnsibleModule
from ansible.module_utils.cert_utils import CertUtils
def cert_exists(domain, cert_files, debug=False):
for cert_path in cert_files:
cert_text = CertUtils.run_openssl(cert_path)
if not cert_text:
continue
sans = CertUtils.extract_sans(cert_text)
if debug:
print(f"Checking {cert_path}: {sans}")
for entry in sans:
if entry == domain or (entry.startswith('*.') and domain.endswith('.' + entry[2:])):
return True
return False
def cert_check_exists(module):
domain = module.params['domain']
cert_base_path = module.params['cert_base_path']
debug = module.params['debug']
cert_files = CertUtils.list_cert_files(cert_base_path)
exists = cert_exists(domain, cert_files, debug)
module.exit_json(exists=exists)
def main():
module_args = dict(
domain=dict(type='str', required=True),
cert_base_path=dict(type='str', required=False, default='/etc/letsencrypt/live'),
debug=dict(type='bool', required=False, default=False),
)
module = AnsibleModule(
argument_spec=module_args,
supports_check_mode=True
)
cert_check_exists(module)
if __name__ == '__main__':
main()

View File

@ -5,7 +5,7 @@ __metaclass__ = type
DOCUMENTATION = r''' DOCUMENTATION = r'''
--- ---
module: find_cert_folder module: cert_folder_find
short_description: Find SSL certificate folder covering a given domain short_description: Find SSL certificate folder covering a given domain
description: description:
- Searches through certificates to find a folder that covers the given domain. - Searches through certificates to find a folder that covers the given domain.
@ -38,7 +38,7 @@ author:
EXAMPLES = r''' EXAMPLES = r'''
- name: Find cert folder for matomo.cymais.cloud - name: Find cert folder for matomo.cymais.cloud
find_cert_folder: cert_folder_find:
domain: "matomo.cymais.cloud" domain: "matomo.cymais.cloud"
certbot_flavor: "san" certbot_flavor: "san"
cert_base_path: "/etc/letsencrypt/live" cert_base_path: "/etc/letsencrypt/live"
@ -53,42 +53,18 @@ folder:
''' '''
import os import os
import subprocess
from ansible.module_utils.basic import AnsibleModule from ansible.module_utils.basic import AnsibleModule
from ansible.module_utils.cert_utils import CertUtils # IMPORT
def run_openssl(cert_path):
try:
output = subprocess.check_output(
['openssl', 'x509', '-in', cert_path, '-noout', '-text'],
universal_newlines=True
)
return output
except subprocess.CalledProcessError:
return ""
def extract_sans(cert_text):
dns_entries = []
in_san = False
for line in cert_text.splitlines():
line = line.strip()
if 'X509v3 Subject Alternative Name:' in line:
in_san = True
continue
if in_san:
if not line:
break
dns_entries += [e.strip().replace('DNS:', '') for e in line.split(',') if e.strip()]
return dns_entries
def find_matching_folders(domain, cert_files, flavor, debug): def find_matching_folders(domain, cert_files, flavor, debug):
exact_matches = [] exact_matches = []
wildcard_matches = [] wildcard_matches = []
for cert_path in cert_files: for cert_path in cert_files:
cert_text = run_openssl(cert_path) cert_text = CertUtils.run_openssl(cert_path)
if not cert_text: if not cert_text:
continue continue
sans = extract_sans(cert_text) sans = CertUtils.extract_sans(cert_text)
if debug: if debug:
print(f"Checking {cert_path}: {sans}") print(f"Checking {cert_path}: {sans}")
for entry in sans: for entry in sans:
@ -106,16 +82,13 @@ def find_matching_folders(domain, cert_files, flavor, debug):
else: else:
return [] return []
def find_cert_folder(module): def cert_folder_find(module):
domain = module.params['domain'] domain = module.params['domain']
certbot_flavor = module.params['certbot_flavor'] certbot_flavor = module.params['certbot_flavor']
cert_base_path = module.params['cert_base_path'] cert_base_path = module.params['cert_base_path']
debug = module.params['debug'] debug = module.params['debug']
cert_files = [] cert_files = CertUtils.list_cert_files(cert_base_path)
for root, dirs, files in os.walk(cert_base_path):
if 'cert.pem' in files:
cert_files.append(os.path.join(root, 'cert.pem'))
if debug: if debug:
print(f"Found {len(cert_files)} cert.pem files under {cert_base_path}") print(f"Found {len(cert_files)} cert.pem files under {cert_base_path}")
@ -126,7 +99,7 @@ def find_cert_folder(module):
if debug: if debug:
print("Fallback: searching SAN matches without SAN structure parsing") print("Fallback: searching SAN matches without SAN structure parsing")
for cert_path in cert_files: for cert_path in cert_files:
cert_text = run_openssl(cert_path) cert_text = CertUtils.run_openssl(cert_path)
if f"DNS:{domain}" in cert_text: if f"DNS:{domain}" in cert_text:
preferred.append(os.path.dirname(cert_path)) preferred.append(os.path.dirname(cert_path))
@ -151,7 +124,7 @@ def main():
supports_check_mode=True supports_check_mode=True
) )
find_cert_folder(module) cert_folder_find(module)
if __name__ == '__main__': if __name__ == '__main__':
main() main()

View File

@ -0,0 +1,39 @@
#!/usr/bin/python
import os
import subprocess
class CertUtils:
@staticmethod
def run_openssl(cert_path):
try:
output = subprocess.check_output(
['openssl', 'x509', '-in', cert_path, '-noout', '-text'],
universal_newlines=True
)
return output
except subprocess.CalledProcessError:
return ""
@staticmethod
def extract_sans(cert_text):
dns_entries = []
in_san = False
for line in cert_text.splitlines():
line = line.strip()
if 'X509v3 Subject Alternative Name:' in line:
in_san = True
continue
if in_san:
if not line:
break
dns_entries += [e.strip().replace('DNS:', '') for e in line.split(',') if e.strip()]
return dns_entries
@staticmethod
def list_cert_files(cert_base_path):
cert_files = []
for root, dirs, files in os.walk(cert_base_path):
if 'cert.pem' in files:
cert_files.append(os.path.join(root, 'cert.pem'))
return cert_files

View File

@ -12,7 +12,7 @@
name: "{{ item }}" name: "{{ item }}"
content: "{{ cloudflare_target_ip }}" content: "{{ cloudflare_target_ip }}"
ttl: 1 ttl: 1
proxied: "{{ cloudflare_target_ip }}" proxied: "{{ cloudflare_proxied | int }}"
loop: "{{ cloudflare_domains }}" loop: "{{ cloudflare_domains }}"
loop_control: loop_control:
label: "{{ item }}" label: "{{ item }}"

View File

@ -4,6 +4,14 @@
include_role: include_role:
name: docker-compose name: docker-compose
- name: "Seed BigBlueButton Database for Backup"
include_tasks: "{{ playbook_dir }}/roles/backup-docker-to-local/tasks/seed-database-to-backup.yml"
vars:
database_instance: "{{ application_id }}"
database_password: "{{ applications[application_id].credentials.postgresql_secret }}"
database_username: "postgres"
database_name: "" # Multiple databases
- name: "include role nginx-domain-setup for {{application_id}}" - name: "include role nginx-domain-setup for {{application_id}}"
include_role: include_role:
name: nginx-domain-setup name: nginx-domain-setup

View File

@ -1,7 +1,7 @@
ENABLE_COTURN=true ENABLE_COTURN=true
COTURN_TLS_CERT_PATH={{ certbot_cert_path }}/{{ ssl_cert_folder }}/fullchain.pem COTURN_TLS_CERT_PATH={{ certbot_cert_path }}/{{ ssl_cert_folder }}/fullchain.pem
COTURN_TLS_KEY_PATH={{ certbot_cert_path }}/{{ ssl_cert_folder }}/privkey.pem COTURN_TLS_KEY_PATH={{ certbot_cert_path }}/{{ ssl_cert_folder }}/privkey.pem
ENABLE_GREENLIGHT={{applications.bigbluebutton.enable_greenlight}} ENABLE_GREENLIGHT={{applications[application_id].enable_greenlight}}
# Enable Webhooks # Enable Webhooks
# used by some integrations # used by some integrations
@ -27,11 +27,11 @@ RECORDING_MAX_AGE_DAYS=365
# SECRETS # SECRETS
# ==================================== # ====================================
# important! change these to any random values # important! change these to any random values
SHARED_SECRET={{applications.bigbluebutton.credentials.shared_secret}} SHARED_SECRET={{applications[application_id].credentials.shared_secret}}
ETHERPAD_API_KEY={{applications.bigbluebutton.credentials.etherpad_api_key}} ETHERPAD_API_KEY={{applications[application_id].credentials.etherpad_api_key}}
RAILS_SECRET={{applications.bigbluebutton.credentials.rails_secret}} RAILS_SECRET={{applications[application_id].credentials.rails_secret}}
POSTGRESQL_SECRET={{applications.bigbluebutton.credentials.postgresql_secret}} POSTGRESQL_SECRET={{applications[application_id].credentials.postgresql_secret}}
FSESL_PASSWORD={{applications.bigbluebutton.credentials.fsesl_password}} FSESL_PASSWORD={{applications[application_id].credentials.fsesl_password}}
# ==================================== # ====================================
# CONNECTION # CONNECTION
@ -51,7 +51,7 @@ STUN_PORT={{ ports.public.stun[application_id] }}
# TURN SERVER # TURN SERVER
# uncomment and adjust following two lines to add an external TURN server # uncomment and adjust following two lines to add an external TURN server
TURN_SERVER=turns:{{domains[application_id]}}:{{ ports.public.turn[application_id] }}?transport=tcp TURN_SERVER=turns:{{domains[application_id]}}:{{ ports.public.turn[application_id] }}?transport=tcp
TURN_SECRET={{applications.bigbluebutton.credentials.turn_secret}} TURN_SECRET={{applications[application_id].credentials.turn_secret}}
# Allowed SIP IPs # Allowed SIP IPs
# due to high traffic caused by bots, by default the SIP port is blocked. # due to high traffic caused by bots, by default the SIP port is blocked.

View File

@ -1,52 +1,50 @@
--- ---
- name: "Remove Nginx configuration for deprecated domains" - name: Include task to remove deprecated nginx configs
ansible.builtin.command: include_tasks: remove_deprecated_nginx_configs.yml
cmd: >-
rm -fv /etc/nginx/conf.d/http/servers/*.{{ item }}.conf;
rm -fv /etc/nginx/conf.d/http/servers/{{ item }}.conf
loop: "{{ deprecated_domains }}" loop: "{{ deprecated_domains }}"
loop_control: loop_control:
label: "{{ item }}" label: "{{ item }}"
notify: restart nginx vars:
domain: "{{ item }}"
when: when:
- mode_cleanup | bool - mode_cleanup | bool
- run_once_nginx_domains_cleanup is not defined - run_once_nginx_domains_cleanup is not defined
# The revoking just works for the base domain ## The revoking just works for the base domain
- name: "Revoke Certbot certificate for {{ item }}" #- name: "Revoke Certbot certificate for {{ item }}"
ansible.builtin.command: # ansible.builtin.command:
cmd: "certbot revoke -n --cert-name {{ item }}" # cmd: "certbot revoke -n --cert-name {{ item }} --non-interactive"
become: true # become: true
loop: "{{ deprecated_domains }}" # loop: "{{ deprecated_domains }}"
loop_control: # loop_control:
label: "{{ item }}" # label: "{{ item }}"
when: # when:
- mode_cleanup | bool # - mode_cleanup | bool
- run_once_nginx_domains_cleanup is not defined # - run_once_nginx_domains_cleanup is not defined
register: certbot_revoke_result # register: certbot_revoke_result
failed_when: > # failed_when: >
certbot_revoke_result.rc != 0 and # certbot_revoke_result.rc != 0 and
'No certificate found with name' not in certbot_revoke_result.stderr # 'No certificate found with name' not in certbot_revoke_result.stderr
changed_when: > # changed_when: >
certbot_revoke_result.rc == 0 # certbot_revoke_result.rc == 0
#
# The deleting just works for the base domain ## The deleting just works for the base domain
- name: "Delete Certbot certificate for {{ item }}" #- name: "Delete Certbot certificate for {{ item }}"
ansible.builtin.command: # ansible.builtin.command:
cmd: "certbot delete -n --cert-name {{ item }}" # cmd: "certbot delete -n --cert-name {{ item }} --non-interactive"
become: true # become: true
loop: "{{ deprecated_domains }}" # loop: "{{ deprecated_domains }}"
loop_control: # loop_control:
label: "{{ item }}" # label: "{{ item }}"
when: # when:
- mode_cleanup | bool # - mode_cleanup | bool
- run_once_nginx_domains_cleanup is not defined # - run_once_nginx_domains_cleanup is not defined
register: certbot_delete_result # register: certbot_delete_result
failed_when: > # failed_when: >
certbot_delete_result.rc != 0 and # certbot_delete_result.rc != 0 and
'No certificate found with name' not in certbot_delete_result.stderr # 'No certificate found with name' not in certbot_delete_result.stderr
changed_when: > # changed_when: >
certbot_delete_result.rc == 0 # certbot_delete_result.rc == 0
- name: run the nginx_domains_cleanup role once - name: run the nginx_domains_cleanup role once
set_fact: set_fact:

View File

@ -0,0 +1,20 @@
---
- name: Find matching nginx configs for {{ domain }}
ansible.builtin.find:
paths: /etc/nginx/conf.d/http/servers
patterns: "*.{{ domain }}.conf"
register: find_result
- name: Remove wildcard nginx configs for {{ domain }}
ansible.builtin.file:
path: "{{ item.path }}"
state: absent
loop: "{{ find_result.files | default([]) }}"
when: item is defined
notify: restart nginx
- name: Remove exact nginx config for {{ domain }}
ansible.builtin.file:
path: "/etc/nginx/conf.d/http/servers/{{ domain }}.conf"
state: absent
notify: restart nginx

View File

@ -1,3 +1,9 @@
- name: "Check if certificate already exists for {{ domain }}"
cert_check_exists:
domain: "{{ domain }}"
cert_base_path: "{{ certbot_cert_path }}"
register: cert_check
- name: "receive certificate for {{ domain }}" - name: "receive certificate for {{ domain }}"
command: >- command: >-
certbot certonly certbot certonly
@ -21,3 +27,4 @@
{{ '--test-cert' if mode_test | bool else '' }} {{ '--test-cert' if mode_test | bool else '' }}
register: certbot_result register: certbot_result
changed_when: "'Certificate not yet due for renewal' not in certbot_result.stdout" changed_when: "'Certificate not yet due for renewal' not in certbot_result.stdout"
when: not cert_check.exists

View File

@ -1,24 +1,24 @@
- name: "Include flavor" - name: "Include flavor"
include_tasks: "{{ role_path }}/tasks/flavors/{{ certbot_flavor }}.yml" include_tasks: "{{ role_path }}/tasks/flavors/{{ certbot_flavor }}.yml"
- name: "Cleanup dedicated cert for {{ domain }}" #- name: "Cleanup dedicated cert for {{ domain }}"
command: >- # command: >-
certbot delete --cert-name {{ domain }} --non-interactive # certbot delete --cert-name {{ domain }} --non-interactive
when: # when:
- mode_cleanup | bool # - mode_cleanup | bool
# Cleanup mode is enabled # # Cleanup mode is enabled
- certbot_flavor != 'dedicated' # - certbot_flavor != 'dedicated'
# Wildcard certificate is enabled # # Wildcard certificate is enabled
- domain.split('.') | length == (primary_domain.split('.') | length + 1) and domain.endswith(primary_domain) # - domain.split('.') | length == (primary_domain.split('.') | length + 1) and domain.endswith(primary_domain)
# AND: The domain is a direct first-level subdomain of the primary domain # # AND: The domain is a direct first-level subdomain of the primary domain
- domain != primary_domain # - domain != primary_domain
# The domain is not the primary domain # # The domain is not the primary domain
register: certbot_result # register: certbot_result
failed_when: certbot_result.rc != 0 and ("No certificate found with name" not in certbot_result.stderr) # failed_when: certbot_result.rc != 0 and ("No certificate found with name" not in certbot_result.stderr)
changed_when: certbot_result.rc == 0 and ("No certificate found with name" not in certbot_result.stderr) # changed_when: certbot_result.rc == 0 and ("No certificate found with name" not in certbot_result.stderr)
- name: Find SSL cert folder for domain - name: Find SSL cert folder for domain
find_cert_folder: cert_folder_find:
domain: "{{ domain }}" domain: "{{ domain }}"
certbot_flavor: "{{ certbot_flavor }}" certbot_flavor: "{{ certbot_flavor }}"
cert_base_path: "{{ certbot_cert_path }}" cert_base_path: "{{ certbot_cert_path }}"

View File

@ -8,21 +8,17 @@
set_fact: set_fact:
www_domains: "{{ all_domains | select('match', '^www\\.') | list }}" www_domains: "{{ all_domains | select('match', '^www\\.') | list }}"
- name: Build redirect mappings for www domains
set_fact:
domain_mappings: >-
{{ www_domains
| map('regex_replace', '^www\\.(.+)$', '{ source: \"www.\\1\", target: \"\\1\" }')
| map('from_yaml')
| list
}}
- name: Include nginx-redirect-domain role for www-to-bare redirects - name: Include nginx-redirect-domain role for www-to-bare redirects
include_role: include_role:
name: nginx-redirect-domain name: nginx-redirect-domain
vars: vars:
domain_mappings: "{{ domain_mappings }}" domain_mappings: "{{ www_domains
when: certbot_flavor == 'dedicated' | map('regex_replace',
'^www\\.(.+)$',
'{ source: \"www.\\1\", target: \"\\1\" }')
| map('from_yaml')
| list
}}"
- name: Include DNS role to set redirects - name: Include DNS role to set redirects
include_role: include_role:
@ -31,5 +27,5 @@
cloudflare_api_token: "{{ certbot_dns_api_token }}" cloudflare_api_token: "{{ certbot_dns_api_token }}"
cloudflare_domains: "{{ www_domains }}" cloudflare_domains: "{{ www_domains }}"
cloudflare_target_ip: "{{ networks.internet.ip4 }}" cloudflare_target_ip: "{{ networks.internet.ip4 }}"
cloudflare_proxied_false: false cloudflare_proxied: false
when: dns_provider == 'cloudflare' when: dns_provider == 'cloudflare'

View File

@ -8,9 +8,8 @@
name: cleanup-docker-anonymous-volumes name: cleanup-docker-anonymous-volumes
when: mode_cleanup | bool when: mode_cleanup | bool
- name: "Show User Configuration (Important when mailu tokens are created automatic)" - name: Show all facts
debug: debug:
msg: var: ansible_facts
users: "{{users}}"
when: enable_debug | bool when: enable_debug | bool