mirror of
https://github.com/kevinveenbirkenbach/computer-playbook.git
synced 2025-11-03 03:38:15 +00:00
Highlights
- Quote all file modes as strings ("0755"/"0770") across multiple roles to avoid YAML octal quirks and improve portability.
- Keycloak: introduce actions.{import_realm,update_ldap_bind} feature flags and wire them via vars/config.
- Implement idempotent LDAP bind updater (tasks/03_update-ldap-bind.yml):
* kcadm login with no_log protection,
* fetch LDAP UserStorage component by name,
* compare current bindDn/bindCredential and update only when changed.
- Keycloak realm import template: keep providerId="ldap" and set name from keycloak_ldap_component_name.
- Centralize Keycloak readiness check in tasks/main.yml; remove duplicate waits from 02_update_client_redirects.yml and 04_ssh_public_key.yml.
- 01_import.yml: fix typo (keycloak), quote modes, tidy spacing, and replace Jinja-in-Jinja fileglob with concatenation.
- 02_update_client_redirects.yml: correct assert fail_msg filename; keep login-first flow.
- Minor template/vars tidy-ups (spacing, comments, consistent variable usage).
Files touched (excerpt)
- roles/*/*: replace 0755/0770 → "0755"/"0770"
- roles/web-app-keycloak/config/main.yml: add actions map
- roles/web-app-keycloak/vars/main.yml: unify Keycloak vars and feature flags
- roles/web-app-keycloak/tasks/{01_import,02_update_client_redirects,03_update-ldap-bind,04_ssh_public_key,main}.yml
- roles/web-app-keycloak/templates/{docker-compose.yml.j2,import/realm.json.j2}
https://chatgpt.com/share/689bda16-b138-800f-8258-e13f6d7d8239
Nginx Docker Cert Deploy Role
🎉 Author: Kevin Veen-Birkenbach
This Ansible role simplifies the deployment of Let's Encrypt certificates into Docker Compose setups with Nginx. It supports both individual certificates per subdomain and a single wildcard certificate for all subdomains.
🚀 Features
- Automatically deploys Let's Encrypt certificates to Docker Compose setups.
- Supports both single-domain certificates and one wildcard certificate for all subdomains.
- Copies certificates to the target directory inside the container.
- Automatically reloads or restarts Nginx services when certificates are updated.
- Configures and manages a
systemdservice for automated certificate deployment. - Includes a
systemdtimer for scheduled renewals. - Handles dependent services like
sys-alm-compose.
🔧 Tasks Overview
1️⃣ Main Tasks
-
Add Deployment Script
- Copies
srv-proxy-6-6-tls-deploy.shto the administrator scripts directory.
- Copies
-
Create Certificate Directory
- Ensures
cert_mount_directoryexists with proper permissions.
- Ensures
-
Configure
systemdService- Deploys a
systemdservice file for the deployment process.
- Deploys a
-
Include
sys-timerRole- Schedules automatic certificate deployment using a
systemdtimer.
- Schedules automatic certificate deployment using a
2️⃣ Handlers
- Restart Nginx Service
- Restarts
srv-proxy-6-6-tls-deploywhenever a certificate update occurs.
- Restarts
🔧 Deploying Certificates into Docker Containers
The role automates copying certificates into Docker Compose setups.
1️⃣ Deployment Script (srv-proxy-6-6-tls-deploy.sh)
This script:
- Copies certificates to the correct container directory.
- Reloads Nginx inside all running containers.
- Restarts containers if needed.
Usage:
sh srv-proxy-6-6-tls-deploy.sh primary_domain /path/to/docker/compose
🎯 Summary
| Feature | Description |
|---|---|
| Single-domain & wildcard support | Use individual certs or a wildcard certificate |
| Automated renewal | Cronjob or systemd timer ensures auto-renewals |
| Docker-ready | Deploys certificates directly into Docker containers |
| Supports Nginx & Mailu | Compatible with multiple services |
| Systemd integration | Automates deployment via systemd |
🚀 Now your Nginx setup is fully automated and secured with Let's Encrypt! 🎉