Skip to content

Ansible role to configure TLS certificate renewal via certbot for Opencast

License

Notifications You must be signed in to change notification settings

elan-ev/opencast_certbot

Repository files navigation

Ansible: Opencast Certbot Role

lint

This Ansible role configures TLS certificate renewal via certbot for Opencast.

Role Variables

  • opencast_certbot_letsencrypt_email
    • Email address for Let's Encrypt account (required)
    • This is used by Let's Encrypt to send certificate expiration warnings if necessary.
  • opencast_certbot_deploy_hook
    • Command to run after certbot has updated certificate. The value is optional. Already created certificates will not be updated.
  • opencast_certbot_enable_epel
    • On RedHat system certbot package is living in the EPEL repository. Here you can enable (value: true) or disable (value: false) installation of the epel-release package (default: true). On RedHat installation with Satellite this property can be handy.
    • On Debian based systems this property do nothing.

Dependencies

Certbot runs an ACME Webroot challenge to obtain a certificate. This requires a web server that exposes the path /var/lib/nginx/ (especially the subdirectory .well-known/acme-challenge) over HTTP. This can be done using the Ansible role elan.opencast_nginx or others. The elan.opencast_nginx role is no longer a hard dependency.

Example Playbook

Example of how to configure and use the role:

- hosts: servers
  become: true
  roles:
    - elan.opencast_nginx
    - role: elan.opencast_certbot
      opencast_certbot_letsencrypt_email: [email protected]
      opencast_certbot_deploy_hook: /usr/bin/systemctl reload nginx

About

Ansible role to configure TLS certificate renewal via certbot for Opencast

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published