klal
Some checks failed
Gitea Actions Demo / Explore-Gitea-Actions (push) Has been cancelled

This commit is contained in:
2025-11-18 22:04:10 +01:00
parent 0aaa0e0a30
commit 6f25202f8a
2 changed files with 114 additions and 0 deletions

View File

@@ -0,0 +1,27 @@
#!/bin/bash
mkdir /tmp/certgen 2>/dev/null
cd /tmp/certgen
openssl genrsa -aes256 -out ca-key.pem -passout pass:"foobarpwd" 4096
openssl req -new -x509 -days 365 -key ca-key.pem -sha256 -out ca.pem -subj "/C=SK/ST=Slovakia/L=SK/O=sectorq.eu/OU=IT/CN=sectorq.eu" -passin pass:"foobarpwd"
openssl genrsa -out server-key.pem 4096
if [[ `hostname` == "nas" ]]
then
IP=`ip route get 8.8.8.8 | head -1 | cut -d' ' -f8`
else
IP=`ip route get 8.8.8.8 | head -1 | cut -d' ' -f7`
fi
HOST=`uname -n`
openssl req -subj "/CN=$HOST" -sha256 -new -key server-key.pem -out server.csr
echo subjectAltName = DNS:$HOST,IP:$IP,IP:127.0.0.1 >> extfile.cnf
echo extendedKeyUsage = serverAuth >> extfile.cnf
openssl x509 -req -days 365 -sha256 -in server.csr -CA ca.pem -CAkey ca-key.pem \
-CAcreateserial -out server-cert.pem -extfile extfile.cnf -passin pass:"foobarpwd"
openssl genrsa -out key.pem 4096
openssl req -subj '/CN=client' -new -key key.pem -out client.csr
echo extendedKeyUsage = clientAuth > extfile-client.cnf
openssl x509 -req -days 365 -sha256 -in client.csr -CA ca.pem -CAkey ca-key.pem \
-CAcreateserial -out cert.pem -extfile extfile-client.cnf -passin pass:"foobarpwd"
rm -v client.csr server.csr extfile.cnf extfile-client.cnf
chmod -v 0400 ca-key.pem key.pem server-key.pem
chmod -v 0444 ca.pem server-cert.pem cert.pem

87
roles/cert_gen/tasks/main.yml Executable file
View File

@@ -0,0 +1,87 @@
- name: Cert gen
become: "{{ false if inventory_hostname == 'nas.home.lan' else true }}"
block:
- name: Create a directory for certs
ansible.builtin.file:
path: /tmp/certgen
state: directory
mode: '0700'
owner: root
group: root
- name: Copy cert generation script
ansible.builtin.copy:
src: certs.sh
dest: /tmp/certgen/certs.sh
mode: '0700'
owner: root
group: root
- name: Generate certs
ansible.builtin.command: /tmp/certgen/certs.sh
args:
chdir: /tmp/certgen
register: certgen
changed_when: "certgen.rc == 0"
- name: Copy generated certs to files
ansible.builtin.copy:
src: /tmp/certgen/server-key.pem
dest: /etc/docker/certs/
remote_src: true
mode: '0600'
owner: root
group: root
- name: Copy generated certs to files
ansible.builtin.copy:
src: /tmp/certgen/server-cert.pem
dest: /etc/docker/certs/
remote_src: true
mode: '0600'
owner: root
group: root
- name: Copy generated certs to files
ansible.builtin.copy:
src: /tmp/certgen/ca.pem
dest: /etc/docker/certs/
remote_src: true
mode: '0600'
owner: root
group: root
- name: Create a directory for certs on nas
ansible.builtin.file:
path: /media/nas/data/certs/docker/{{ inventory_hostname }}
state: directory
mode: '0777'
owner: jd
group: root
- name: Copy generated certs to files
ansible.builtin.copy:
src: /tmp/certgen/ca.pem
dest: /media/nas/data/certs/docker/{{ inventory_hostname }}
remote_src: true
mode: '0644'
owner: jd
group: root
- name: Copy generated certs to files
ansible.builtin.copy:
src: /tmp/certgen/key.pem
dest: /media/nas/data/certs/docker/{{ inventory_hostname }}
remote_src: true
mode: '0644'
owner: jd
group: root
- name: Copy generated certs to files
ansible.builtin.copy:
src: /tmp/certgen/cert.pem
dest: /media/nas/data/certs/docker/{{ inventory_hostname }}
remote_src: true
mode: '0644'
owner: jd
group: root
- name: Restart docker service
ansible.builtin.systemd:
name: docker
state: restarted