mirror of
https://github.com/kevinveenbirkenbach/computer-playbook.git
synced 2025-08-30 07:18:09 +02:00
- Extend certbundle task to ignore 'The service is down for maintenance or had an internal error' as a fatal failure. - Add debug/warning output when this error occurs, so playbook does not stop but logs the issue. - Ensure changed_when does not mark run as changed if only maintenance error was hit. Ref: https://chatgpt.com/share/68af4e15-24cc-800f-b1dd-6a5f2380e35a
Nginx HTTPS Certificate Retrieval
🔥 Description
This role automates the retrieval of Let's Encrypt SSL/TLS certificates using Certbot for domains served via Nginx. It supports both single-domain and wildcard certificates, and can use either the DNS or webroot ACME challenge methods.
📖 Overview
Designed for Archlinux systems, this role handles issuing certificates per domain and optionally cleans up redundant certificates if wildcard certificates are used. It intelligently decides whether to issue a standard or wildcard certificate based on the domain structure and your configuration.
Key Features
- Single Domain and Wildcard Support: Handles both individual domains and wildcard domains (
*.example.com
). - DNS and Webroot Challenges: Dynamically selects the correct ACME challenge method.
- Certificate Renewal Logic: Skips renewal if the certificate is still valid.
- Optional Cleanup: Deletes redundant domain certificates when wildcard certificates are used.
- Non-Interactive Operation: Fully automated using
--non-interactive
and--agree-tos
.
🎯 Purpose
The Nginx HTTPS Certificate Retrieval role ensures that your Nginx-served domains have valid, automatically issued SSL/TLS certificates, improving web security without manual intervention.
🚀 Features
- ACME Challenge Selection: Supports DNS plugins or webroot method automatically.
- Wildcard Certificate Management: Issues wildcard certificates when configured, saving effort for subdomain-heavy deployments.
- Safe Cleanup: Ensures that no unused certificates are left behind.
- Flexible Control: Supports
MODE_TEST
for staging environment testing andMODE_CLEANUP
for cert cleanup operations.