dns: use dedicated certificate for dnsdist
This commit is contained in:
parent
29627c5e36
commit
ae6b1bc58a
@ -1,5 +1,8 @@
|
|||||||
---
|
---
|
||||||
|
|
||||||
|
- name: Run acertmgr
|
||||||
|
command: /usr/bin/acertmgr
|
||||||
|
|
||||||
- name: Restart powerdns
|
- name: Restart powerdns
|
||||||
service: name={{ item }} state=restarted
|
service: name={{ item }} state=restarted
|
||||||
with_items:
|
with_items:
|
||||||
|
@ -14,6 +14,20 @@
|
|||||||
- pdns-recursor
|
- pdns-recursor
|
||||||
- pdns-server
|
- pdns-server
|
||||||
|
|
||||||
|
- name: Ensure certificates are available
|
||||||
|
command:
|
||||||
|
cmd: >
|
||||||
|
openssl req -x509 -nodes -newkey rsa:2048
|
||||||
|
-keyout /etc/dnsdist/{{ ansible_fqdn }}.key
|
||||||
|
-out /etc/dnsdist/{{ ansible_fqdn }}.crt
|
||||||
|
-days 730 -subj "/CN={{ ansible_fqdn }}"
|
||||||
|
creates: /etc/dnsdist/{{ ansible_fqdn }}.crt
|
||||||
|
notify: Restart dnsdist
|
||||||
|
|
||||||
|
- name: Configure certificate manager
|
||||||
|
template: src=certs.j2 dest=/etc/acertmgr/{{ ansible_fqdn }}_dns.conf
|
||||||
|
notify: Run acertmgr
|
||||||
|
|
||||||
- name: Create zone directory
|
- name: Create zone directory
|
||||||
file: path=/etc/powerdns/bind/ state=directory
|
file: path=/etc/powerdns/bind/ state=directory
|
||||||
|
|
||||||
|
15
roles/dns/templates/certs.j2
Normal file
15
roles/dns/templates/certs.j2
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
---
|
||||||
|
|
||||||
|
{{ ansible_fqdn }}:
|
||||||
|
- path: /etc/dnsdist/{{ ansible_fqdn }}.crt
|
||||||
|
user: _dnsdist
|
||||||
|
group: _dnsdist
|
||||||
|
perm: '400'
|
||||||
|
format: crt,ca
|
||||||
|
action: '/usr/sbin/service dnsdist restart'
|
||||||
|
- path: /etc/dnsdist/{{ ansible_fqdn }}.key
|
||||||
|
user: _dnsdist
|
||||||
|
group: _dnsdist
|
||||||
|
perm: '400'
|
||||||
|
format: key
|
||||||
|
action: '/usr/sbin/service dnsdist restart'
|
@ -4,9 +4,9 @@ setLocal('127.0.0.1:5353')
|
|||||||
|
|
||||||
newServer({address="127.0.0.1", qps=1, name="localhost"})
|
newServer({address="127.0.0.1", qps=1, name="localhost"})
|
||||||
|
|
||||||
addTLSLocal('127.0.0.1','/etc/nginx/ssl/{{ ansible_fqdn }}.crt', '/etc/nginx/ssl/{{ ansible_fqdn }}.key')
|
addTLSLocal('127.0.0.1','/etc/dnsdist/{{ ansible_fqdn }}.crt', '/etc/dnsdist/{{ ansible_fqdn }}.key')
|
||||||
addTLSLocal('{{ batman_ipv4 | ipaddr('address') }}','/etc/nginx/ssl/{{ ansible_fqdn }}.crt', '/etc/nginx/ssl/{{ ansible_fqdn }}.key')
|
addTLSLocal('{{ batman_ipv4 | ipaddr('address') }}','/etc/dnsdist/{{ ansible_fqdn }}.crt', '/etc/dnsdist/{{ ansible_fqdn }}.key')
|
||||||
addTLSLocal('{{ batman_ipv6 | ipaddr('address') }}','/etc/nginx/ssl/{{ ansible_fqdn }}.crt', '/etc/nginx/ssl/{{ ansible_fqdn }}.key')
|
addTLSLocal('{{ batman_ipv6 | ipaddr('address') }}','/etc/dnsdist/{{ ansible_fqdn }}.crt', '/etc/dnsdist/{{ ansible_fqdn }}.key')
|
||||||
|
|
||||||
-- disable security status polling via DNS
|
-- disable security status polling via DNS
|
||||||
setSecurityPollSuffix("")
|
setSecurityPollSuffix("")
|
||||||
|
Loading…
Reference in New Issue
Block a user