From 6f25202f8a737bc82c81db855dd6fc1aef6da37c Mon Sep 17 00:00:00 2001 From: jaydee Date: Tue, 18 Nov 2025 22:04:10 +0100 Subject: [PATCH] klal --- roles/cert_gen/files/certs.sh | 27 +++++++++++ roles/cert_gen/tasks/main.yml | 87 +++++++++++++++++++++++++++++++++++ 2 files changed, 114 insertions(+) create mode 100644 roles/cert_gen/files/certs.sh create mode 100755 roles/cert_gen/tasks/main.yml diff --git a/roles/cert_gen/files/certs.sh b/roles/cert_gen/files/certs.sh new file mode 100644 index 0000000..151231b --- /dev/null +++ b/roles/cert_gen/files/certs.sh @@ -0,0 +1,27 @@ +#!/bin/bash +mkdir /tmp/certgen 2>/dev/null +cd /tmp/certgen + +openssl genrsa -aes256 -out ca-key.pem -passout pass:"foobarpwd" 4096 +openssl req -new -x509 -days 365 -key ca-key.pem -sha256 -out ca.pem -subj "/C=SK/ST=Slovakia/L=SK/O=sectorq.eu/OU=IT/CN=sectorq.eu" -passin pass:"foobarpwd" +openssl genrsa -out server-key.pem 4096 +if [[ `hostname` == "nas" ]] +then +IP=`ip route get 8.8.8.8 | head -1 | cut -d' ' -f8` +else +IP=`ip route get 8.8.8.8 | head -1 | cut -d' ' -f7` +fi +HOST=`uname -n` +openssl req -subj "/CN=$HOST" -sha256 -new -key server-key.pem -out server.csr +echo subjectAltName = DNS:$HOST,IP:$IP,IP:127.0.0.1 >> extfile.cnf +echo extendedKeyUsage = serverAuth >> extfile.cnf +openssl x509 -req -days 365 -sha256 -in server.csr -CA ca.pem -CAkey ca-key.pem \ + -CAcreateserial -out server-cert.pem -extfile extfile.cnf -passin pass:"foobarpwd" +openssl genrsa -out key.pem 4096 +openssl req -subj '/CN=client' -new -key key.pem -out client.csr +echo extendedKeyUsage = clientAuth > extfile-client.cnf +openssl x509 -req -days 365 -sha256 -in client.csr -CA ca.pem -CAkey ca-key.pem \ + -CAcreateserial -out cert.pem -extfile extfile-client.cnf -passin pass:"foobarpwd" +rm -v client.csr server.csr extfile.cnf extfile-client.cnf +chmod -v 0400 ca-key.pem key.pem server-key.pem +chmod -v 0444 ca.pem server-cert.pem cert.pem \ No newline at end of file diff --git a/roles/cert_gen/tasks/main.yml b/roles/cert_gen/tasks/main.yml new file mode 100755 index 0000000..25d8060 --- /dev/null +++ b/roles/cert_gen/tasks/main.yml @@ -0,0 +1,87 @@ +- name: Cert gen + become: "{{ false if inventory_hostname == 'nas.home.lan' else true }}" + block: + - name: Create a directory for certs + ansible.builtin.file: + path: /tmp/certgen + state: directory + mode: '0700' + owner: root + group: root + - name: Copy cert generation script + ansible.builtin.copy: + src: certs.sh + dest: /tmp/certgen/certs.sh + mode: '0700' + owner: root + group: root + - name: Generate certs + ansible.builtin.command: /tmp/certgen/certs.sh + args: + chdir: /tmp/certgen + register: certgen + changed_when: "certgen.rc == 0" + + - name: Copy generated certs to files + ansible.builtin.copy: + src: /tmp/certgen/server-key.pem + dest: /etc/docker/certs/ + remote_src: true + mode: '0600' + owner: root + group: root + - name: Copy generated certs to files + ansible.builtin.copy: + src: /tmp/certgen/server-cert.pem + dest: /etc/docker/certs/ + remote_src: true + mode: '0600' + owner: root + group: root + - name: Copy generated certs to files + ansible.builtin.copy: + src: /tmp/certgen/ca.pem + dest: /etc/docker/certs/ + remote_src: true + mode: '0600' + owner: root + group: root + + - name: Create a directory for certs on nas + ansible.builtin.file: + path: /media/nas/data/certs/docker/{{ inventory_hostname }} + state: directory + mode: '0777' + owner: jd + group: root + + - name: Copy generated certs to files + ansible.builtin.copy: + src: /tmp/certgen/ca.pem + dest: /media/nas/data/certs/docker/{{ inventory_hostname }} + remote_src: true + mode: '0644' + owner: jd + group: root + + - name: Copy generated certs to files + ansible.builtin.copy: + src: /tmp/certgen/key.pem + dest: /media/nas/data/certs/docker/{{ inventory_hostname }} + remote_src: true + mode: '0644' + owner: jd + group: root + - name: Copy generated certs to files + ansible.builtin.copy: + src: /tmp/certgen/cert.pem + dest: /media/nas/data/certs/docker/{{ inventory_hostname }} + remote_src: true + mode: '0644' + owner: jd + group: root + - name: Restart docker service + ansible.builtin.systemd: + name: docker + state: restarted +