forked from infra/ansible
Fix certmgr actions for cron usage.
This commit is contained in:
parent
e7e49f356f
commit
2978ef8177
@ -42,4 +42,3 @@
|
||||
|
||||
- name: Enable acertmgr cronjob
|
||||
cron: name=certmgr special_time=daily job=/opt/acertmgr/acertmgr.py
|
||||
tags: certmgr
|
||||
|
@ -6,10 +6,10 @@
|
||||
group: root
|
||||
perm: '400'
|
||||
format: key
|
||||
action: 'service nginx restart'
|
||||
action: '/usr/sbin/service nginx restart'
|
||||
- path: /etc/nginx/ssl/{{ gogs_domain }}.crt
|
||||
user: root
|
||||
group: root
|
||||
perm: '400'
|
||||
format: crt,ca
|
||||
action: 'service nginx restart'
|
||||
action: '/usr/sbin/service nginx restart'
|
||||
|
@ -6,22 +6,22 @@
|
||||
group: postfix
|
||||
perm: '400'
|
||||
format: key
|
||||
action: 'service postfix restart'
|
||||
action: '/usr/sbin/service postfix restart'
|
||||
- path: /etc/postfix/ssl/{{ mail_server }}.crt
|
||||
user: postfix
|
||||
group: postfix
|
||||
perm: '400'
|
||||
format: crt,ca
|
||||
action: 'service postfix restart'
|
||||
action: '/usr/sbin/service postfix restart'
|
||||
- path: /etc/dovecot/ssl/{{ mail_server }}.key
|
||||
user: dovecot
|
||||
group: dovecot
|
||||
perm: '400'
|
||||
format: key
|
||||
action: 'service dovecot restart'
|
||||
action: '/usr/sbin/service dovecot restart'
|
||||
- path: /etc/dovecot/ssl/{{ mail_server }}.crt
|
||||
user: dovecot
|
||||
group: dovecot
|
||||
perm: '400'
|
||||
format: crt,ca
|
||||
action: 'service dovecot restart'
|
||||
action: '/usr/sbin/service dovecot restart'
|
||||
|
@ -6,10 +6,10 @@
|
||||
group: root
|
||||
perm: '400'
|
||||
format: key
|
||||
action: 'service nginx restart'
|
||||
action: '/usr/sbin/service nginx restart'
|
||||
- path: /etc/nginx/ssl/{{ mailman_domain }}.crt
|
||||
user: root
|
||||
group: root
|
||||
perm: '400'
|
||||
format: crt,ca
|
||||
action: 'service nginx restart'
|
||||
action: '/usr/sbin/service nginx restart'
|
||||
|
@ -6,10 +6,10 @@
|
||||
group: root
|
||||
perm: '400'
|
||||
format: key
|
||||
action: 'service nginx restart'
|
||||
action: '/usr/sbin/service nginx restart'
|
||||
- path: /etc/nginx/ssl/{{ owncloud_domain }}.crt
|
||||
user: root
|
||||
group: root
|
||||
perm: '400'
|
||||
format: crt,ca
|
||||
action: 'service nginx restart'
|
||||
action: '/usr/sbin/service nginx restart'
|
||||
|
@ -6,10 +6,10 @@
|
||||
group: prosody
|
||||
perm: '400'
|
||||
format: key
|
||||
action: 'service prosody restart'
|
||||
action: '/usr/sbin/service prosody restart'
|
||||
- path: /etc/prosody/certs/{{ prosody_domain }}.crt
|
||||
user: prosody
|
||||
group: prosody
|
||||
perm: '400'
|
||||
format: crt,ca
|
||||
action: 'service prosody restart'
|
||||
action: '/usr/sbin/service prosody restart'
|
||||
|
@ -40,7 +40,7 @@
|
||||
- name: Ensure certificates are available
|
||||
command: openssl req -x509 -nodes -newkey rsa:2048 -keyout /etc/ldap/ssl/srv.key -out /etc/ldap/ssl/srv.crt -days 730 -subj "/CN={{ slapd_hostname }}" creates=/etc/ldap/ssl/srv.crt
|
||||
notify: Restart slapd
|
||||
tags: nginx
|
||||
tags: ldap
|
||||
|
||||
- name: Start slapd
|
||||
service: name=slapd state=started enabled=yes
|
||||
|
@ -6,13 +6,13 @@ www.binary-kitchen.de binary-kitchen.de:
|
||||
group: root
|
||||
perm: '400'
|
||||
format: crt,ca
|
||||
action: 'service nginx restart'
|
||||
action: '/usr/sbin/service nginx restart'
|
||||
- path: /etc/nginx/ssl/www.binary-kitchen.de.key
|
||||
user: root
|
||||
group: root
|
||||
perm: '400'
|
||||
format: key
|
||||
action: 'service nginx restart'
|
||||
action: '/usr/sbin/service nginx restart'
|
||||
|
||||
www.ccc-r.de:
|
||||
- path: /etc/nginx/ssl/www.ccc-r.de.crt
|
||||
@ -20,10 +20,10 @@ www.ccc-r.de:
|
||||
group: root
|
||||
perm: '400'
|
||||
format: crt,ca
|
||||
action: 'service nginx restart'
|
||||
action: '/usr/sbin/service nginx restart'
|
||||
- path: /etc/nginx/ssl/www.ccc-r.de.key
|
||||
user: root
|
||||
group: root
|
||||
perm: '400'
|
||||
format: key
|
||||
action: 'service nginx restart'
|
||||
action: '/usr/sbin/service nginx restart'
|
||||
|
Loading…
Reference in New Issue
Block a user