mirror of
https://github.com/kevinveenbirkenbach/computer-playbook.git
synced 2025-12-08 10:26:35 +00:00
- Replace legacy utils/run_once.yml with the new helpers utils/once_flag.yml and utils/once_finalize.yml - Introduce utils/compose_up.yml to ensure docker-compose stacks are up and to flush handlers safely without coupling to run-once flags - Migrate all affected roles (desk-*, dev-*, sys-ctl-*, sys-svc-*, web-app-*, web-svc-*, util-*) to the new run-once helpers - Rework sys-svc-msmtp to auto-load Mailu once per deploy, check reachability, and reuse the running stack instead of requiring multiple playbook passes - Adjust web-app-mailu to integrate cert deployment, handler flushing, and run-once handling so Mailu is fully initialized in a single deploy - Improve Matomo, CDN, logout and CSP/health-check related roles to cooperate with the new compose_up / once_* pattern - Simplify alarm/backup/timer/service orchestration (sys-ctl-alm-*, sys-bkp-provider, sys-timer-cln-bkps, etc.) by moving run-once logic into dedicated 01_core.yml files - Update integration tests so utils/once_flag.yml and utils/once_finalize.yml are recognised as valid run-once providers, keeping the global run_once_* guarantees consistent - Align frontend injection and service dependencies so Mastodon- and Mailu-related services can be brought up coherently within a single deployment cycle rather than several iterations
Nginx HTTPS Certificate Retrieval
🔥 Description
This role automates the retrieval of Let's Encrypt SSL/TLS certificates using Certbot for domains served via Nginx. It supports both single-domain and wildcard certificates, and can use either the DNS or webroot ACME challenge methods.
📖 Overview
Designed for Archlinux systems, this role handles issuing certificates per domain and optionally cleans up redundant certificates if wildcard certificates are used. It intelligently decides whether to issue a standard or wildcard certificate based on the domain structure and your configuration.
Key Features
- Single Domain and Wildcard Support: Handles both individual domains and wildcard domains (
*.example.com). - DNS and Webroot Challenges: Dynamically selects the correct ACME challenge method.
- Certificate Renewal Logic: Skips renewal if the certificate is still valid.
- Optional Cleanup: Deletes redundant domain certificates when wildcard certificates are used.
- Non-Interactive Operation: Fully automated using
--non-interactiveand--agree-tos.
🎯 Purpose
The Nginx HTTPS Certificate Retrieval role ensures that your Nginx-served domains have valid, automatically issued SSL/TLS certificates, improving web security without manual intervention.
🚀 Features
- ACME Challenge Selection: Supports DNS plugins or webroot method automatically.
- Wildcard Certificate Management: Issues wildcard certificates when configured, saving effort for subdomain-heavy deployments.
- Safe Cleanup: Ensures that no unused certificates are left behind.
- Flexible Control: Supports
MODE_TESTfor staging environment testing andMODE_CLEANUPfor cert cleanup operations.