forked from infra/ansible
Fix certmgr actions for cron usage.
This commit is contained in:
parent
e7e49f356f
commit
2978ef8177
@ -42,4 +42,3 @@
|
|||||||
|
|
||||||
- name: Enable acertmgr cronjob
|
- name: Enable acertmgr cronjob
|
||||||
cron: name=certmgr special_time=daily job=/opt/acertmgr/acertmgr.py
|
cron: name=certmgr special_time=daily job=/opt/acertmgr/acertmgr.py
|
||||||
tags: certmgr
|
|
||||||
|
@ -6,10 +6,10 @@
|
|||||||
group: root
|
group: root
|
||||||
perm: '400'
|
perm: '400'
|
||||||
format: key
|
format: key
|
||||||
action: 'service nginx restart'
|
action: '/usr/sbin/service nginx restart'
|
||||||
- path: /etc/nginx/ssl/{{ gogs_domain }}.crt
|
- path: /etc/nginx/ssl/{{ gogs_domain }}.crt
|
||||||
user: root
|
user: root
|
||||||
group: root
|
group: root
|
||||||
perm: '400'
|
perm: '400'
|
||||||
format: crt,ca
|
format: crt,ca
|
||||||
action: 'service nginx restart'
|
action: '/usr/sbin/service nginx restart'
|
||||||
|
@ -6,22 +6,22 @@
|
|||||||
group: postfix
|
group: postfix
|
||||||
perm: '400'
|
perm: '400'
|
||||||
format: key
|
format: key
|
||||||
action: 'service postfix restart'
|
action: '/usr/sbin/service postfix restart'
|
||||||
- path: /etc/postfix/ssl/{{ mail_server }}.crt
|
- path: /etc/postfix/ssl/{{ mail_server }}.crt
|
||||||
user: postfix
|
user: postfix
|
||||||
group: postfix
|
group: postfix
|
||||||
perm: '400'
|
perm: '400'
|
||||||
format: crt,ca
|
format: crt,ca
|
||||||
action: 'service postfix restart'
|
action: '/usr/sbin/service postfix restart'
|
||||||
- path: /etc/dovecot/ssl/{{ mail_server }}.key
|
- path: /etc/dovecot/ssl/{{ mail_server }}.key
|
||||||
user: dovecot
|
user: dovecot
|
||||||
group: dovecot
|
group: dovecot
|
||||||
perm: '400'
|
perm: '400'
|
||||||
format: key
|
format: key
|
||||||
action: 'service dovecot restart'
|
action: '/usr/sbin/service dovecot restart'
|
||||||
- path: /etc/dovecot/ssl/{{ mail_server }}.crt
|
- path: /etc/dovecot/ssl/{{ mail_server }}.crt
|
||||||
user: dovecot
|
user: dovecot
|
||||||
group: dovecot
|
group: dovecot
|
||||||
perm: '400'
|
perm: '400'
|
||||||
format: crt,ca
|
format: crt,ca
|
||||||
action: 'service dovecot restart'
|
action: '/usr/sbin/service dovecot restart'
|
||||||
|
@ -6,10 +6,10 @@
|
|||||||
group: root
|
group: root
|
||||||
perm: '400'
|
perm: '400'
|
||||||
format: key
|
format: key
|
||||||
action: 'service nginx restart'
|
action: '/usr/sbin/service nginx restart'
|
||||||
- path: /etc/nginx/ssl/{{ mailman_domain }}.crt
|
- path: /etc/nginx/ssl/{{ mailman_domain }}.crt
|
||||||
user: root
|
user: root
|
||||||
group: root
|
group: root
|
||||||
perm: '400'
|
perm: '400'
|
||||||
format: crt,ca
|
format: crt,ca
|
||||||
action: 'service nginx restart'
|
action: '/usr/sbin/service nginx restart'
|
||||||
|
@ -6,10 +6,10 @@
|
|||||||
group: root
|
group: root
|
||||||
perm: '400'
|
perm: '400'
|
||||||
format: key
|
format: key
|
||||||
action: 'service nginx restart'
|
action: '/usr/sbin/service nginx restart'
|
||||||
- path: /etc/nginx/ssl/{{ owncloud_domain }}.crt
|
- path: /etc/nginx/ssl/{{ owncloud_domain }}.crt
|
||||||
user: root
|
user: root
|
||||||
group: root
|
group: root
|
||||||
perm: '400'
|
perm: '400'
|
||||||
format: crt,ca
|
format: crt,ca
|
||||||
action: 'service nginx restart'
|
action: '/usr/sbin/service nginx restart'
|
||||||
|
@ -6,10 +6,10 @@
|
|||||||
group: prosody
|
group: prosody
|
||||||
perm: '400'
|
perm: '400'
|
||||||
format: key
|
format: key
|
||||||
action: 'service prosody restart'
|
action: '/usr/sbin/service prosody restart'
|
||||||
- path: /etc/prosody/certs/{{ prosody_domain }}.crt
|
- path: /etc/prosody/certs/{{ prosody_domain }}.crt
|
||||||
user: prosody
|
user: prosody
|
||||||
group: prosody
|
group: prosody
|
||||||
perm: '400'
|
perm: '400'
|
||||||
format: crt,ca
|
format: crt,ca
|
||||||
action: 'service prosody restart'
|
action: '/usr/sbin/service prosody restart'
|
||||||
|
@ -40,7 +40,7 @@
|
|||||||
- name: Ensure certificates are available
|
- name: Ensure certificates are available
|
||||||
command: openssl req -x509 -nodes -newkey rsa:2048 -keyout /etc/ldap/ssl/srv.key -out /etc/ldap/ssl/srv.crt -days 730 -subj "/CN={{ slapd_hostname }}" creates=/etc/ldap/ssl/srv.crt
|
command: openssl req -x509 -nodes -newkey rsa:2048 -keyout /etc/ldap/ssl/srv.key -out /etc/ldap/ssl/srv.crt -days 730 -subj "/CN={{ slapd_hostname }}" creates=/etc/ldap/ssl/srv.crt
|
||||||
notify: Restart slapd
|
notify: Restart slapd
|
||||||
tags: nginx
|
tags: ldap
|
||||||
|
|
||||||
- name: Start slapd
|
- name: Start slapd
|
||||||
service: name=slapd state=started enabled=yes
|
service: name=slapd state=started enabled=yes
|
||||||
|
@ -6,13 +6,13 @@ www.binary-kitchen.de binary-kitchen.de:
|
|||||||
group: root
|
group: root
|
||||||
perm: '400'
|
perm: '400'
|
||||||
format: crt,ca
|
format: crt,ca
|
||||||
action: 'service nginx restart'
|
action: '/usr/sbin/service nginx restart'
|
||||||
- path: /etc/nginx/ssl/www.binary-kitchen.de.key
|
- path: /etc/nginx/ssl/www.binary-kitchen.de.key
|
||||||
user: root
|
user: root
|
||||||
group: root
|
group: root
|
||||||
perm: '400'
|
perm: '400'
|
||||||
format: key
|
format: key
|
||||||
action: 'service nginx restart'
|
action: '/usr/sbin/service nginx restart'
|
||||||
|
|
||||||
www.ccc-r.de:
|
www.ccc-r.de:
|
||||||
- path: /etc/nginx/ssl/www.ccc-r.de.crt
|
- path: /etc/nginx/ssl/www.ccc-r.de.crt
|
||||||
@ -20,10 +20,10 @@ www.ccc-r.de:
|
|||||||
group: root
|
group: root
|
||||||
perm: '400'
|
perm: '400'
|
||||||
format: crt,ca
|
format: crt,ca
|
||||||
action: 'service nginx restart'
|
action: '/usr/sbin/service nginx restart'
|
||||||
- path: /etc/nginx/ssl/www.ccc-r.de.key
|
- path: /etc/nginx/ssl/www.ccc-r.de.key
|
||||||
user: root
|
user: root
|
||||||
group: root
|
group: root
|
||||||
perm: '400'
|
perm: '400'
|
||||||
format: key
|
format: key
|
||||||
action: 'service nginx restart'
|
action: '/usr/sbin/service nginx restart'
|
||||||
|
Loading…
Reference in New Issue
Block a user