mirror of
https://github.com/kevinveenbirkenbach/computer-playbook.git
synced 2025-09-20 09:16:03 +02:00
- Switch certbot flag from MODE_TEST → MODE_DUMMY in dedicated certs - Add sys-svc-dns defaults for CLOUDFLARE_NAMESERVERS - Introduce 02_nameservers.yml for NS cleanup + enforce, adjust task ordering (apex now 03_apex.yml) - Enforce quoting for Bluesky and Mailu TXT records - Add cleanup of MX/TXT/DMARC/DKIM in Mailu role - Normalize no_log handling in Nextcloud plugin - Simplify async conditionals in Collabora role Conversation: https://chatgpt.com/share/68cd20d8-9ba8-800f-b070-f7294f072c40
Nginx HTTPS Certificate Retrieval
🔥 Description
This role automates the retrieval of Let's Encrypt SSL/TLS certificates using Certbot for domains served via Nginx. It supports both single-domain and wildcard certificates, and can use either the DNS or webroot ACME challenge methods.
📖 Overview
Designed for Archlinux systems, this role handles issuing certificates per domain and optionally cleans up redundant certificates if wildcard certificates are used. It intelligently decides whether to issue a standard or wildcard certificate based on the domain structure and your configuration.
Key Features
- Single Domain and Wildcard Support: Handles both individual domains and wildcard domains (
*.example.com
). - DNS and Webroot Challenges: Dynamically selects the correct ACME challenge method.
- Certificate Renewal Logic: Skips renewal if the certificate is still valid.
- Optional Cleanup: Deletes redundant domain certificates when wildcard certificates are used.
- Non-Interactive Operation: Fully automated using
--non-interactive
and--agree-tos
.
🎯 Purpose
The Nginx HTTPS Certificate Retrieval role ensures that your Nginx-served domains have valid, automatically issued SSL/TLS certificates, improving web security without manual intervention.
🚀 Features
- ACME Challenge Selection: Supports DNS plugins or webroot method automatically.
- Wildcard Certificate Management: Issues wildcard certificates when configured, saving effort for subdomain-heavy deployments.
- Safe Cleanup: Ensures that no unused certificates are left behind.
- Flexible Control: Supports
MODE_TEST
for staging environment testing andMODE_CLEANUP
for cert cleanup operations.