#
-# Cookbook Name:: letsencrypt
+# Cookbook:: letsencrypt
# Recipe:: default
#
-# Copyright 2017, OpenStreetMap Foundation
+# Copyright:: 2017, OpenStreetMap Foundation
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# limitations under the License.
#
+include_recipe "accounts"
include_recipe "apache"
+include_recipe "chef::knife"
keys = data_bag_item("chef", "keys")
directory "/etc/letsencrypt" do
owner "letsencrypt"
group "letsencrypt"
- mode 0o755
+ mode "755"
end
directory "/var/lib/letsencrypt" do
owner "letsencrypt"
group "letsencrypt"
- mode 0o755
+ mode "755"
end
directory "/var/log/letsencrypt" do
owner "letsencrypt"
group "letsencrypt"
- mode 0o700
+ mode "700"
end
directory "/srv/acme.openstreetmap.org" do
owner "letsencrypt"
group "letsencrypt"
- mode 0o755
+ mode "755"
end
directory "/srv/acme.openstreetmap.org/html" do
owner "letsencrypt"
group "letsencrypt"
- mode 0o755
+ mode "755"
end
ssl_certificate "acme.openstreetmap.org" do
directory "/srv/acme.openstreetmap.org/config" do
owner "letsencrypt"
group "letsencrypt"
- mode 0o755
+ mode "755"
end
directory "/srv/acme.openstreetmap.org/work" do
owner "letsencrypt"
group "letsencrypt"
- mode 0o755
+ mode "755"
end
directory "/srv/acme.openstreetmap.org/logs" do
owner "letsencrypt"
group "letsencrypt"
- mode 0o700
+ mode "700"
end
directory "/srv/acme.openstreetmap.org/.chef" do
owner "letsencrypt"
group "letsencrypt"
- mode 0o2775
+ mode "2775"
end
file "/srv/acme.openstreetmap.org/.chef/client.pem" do
content keys["letsencrypt"].join("\n")
owner "letsencrypt"
group "letsencrypt"
- mode 0o660
+ mode "660"
end
cookbook_file "/srv/acme.openstreetmap.org/.chef/knife.rb" do
source "knife.rb"
owner "letsencrypt"
group "letsencrypt"
- mode 0o660
+ mode "660"
end
remote_directory "/srv/acme.openstreetmap.org/bin" do
source "bin"
owner "root"
group "root"
- mode 0o755
+ mode "755"
files_owner "root"
files_group "root"
- files_mode 0o755
+ files_mode "755"
end
directory "/srv/acme.openstreetmap.org/requests" do
owner "root"
group "root"
- mode 0o755
+ mode "755"
end
certificates = search(:node, "letsencrypt:certificates").each_with_object({}) do |n, c|
source "request.erb"
owner "root"
group "letsencrypt"
- mode 0o754
+ mode "754"
variables details
end
user "letsencrypt"
group "letsencrypt"
subscribes :run, "template[/srv/acme.openstreetmap.org/requests/#{name}]"
+ not_if { kitchen? }
end
end
-Dir.each_child("/srv/acme.openstreetmap.org/requests") do |name|
+Dir.glob("*", :base => "/srv/acme.openstreetmap.org/requests") do |name|
next if certificates.include?(name)
file "/srv/acme.openstreetmap.org/requests/#{name}" do
source "check-certificates.erb"
owner "root"
group "root"
- mode 0o755
+ mode "755"
variables :certificates => certificates
end
-template "/etc/cron.d/letsencrypt" do
- source "cron.erb"
+systemd_service "letsencrypt-renew" do
+ description "Renew letsencrypt certificates"
+ exec_start "/srv/acme.openstreetmap.org/bin/renew"
+ user "letsencrypt"
+ sandbox :enable_network => true
+ read_write_paths [
+ "/srv/acme.openstreetmap.org/config",
+ "/srv/acme.openstreetmap.org/html",
+ "/srv/acme.openstreetmap.org/logs",
+ "/srv/acme.openstreetmap.org/work"
+ ]
+end
+
+systemd_timer "letsencrypt-renew" do
+ description "Renew letsencrypt certificates"
+ on_boot_sec "1h"
+ on_unit_inactive_sec "12h"
+end
+
+service "letsencrypt-renew.timer" do
+ action [:enable, :start]
+end
+
+systemd_service "letsencrypt-check" do
+ description "Check letsencrypt certificates"
+ exec_start "/srv/acme.openstreetmap.org/bin/check-certificates"
+ user "letsencrypt"
+ sandbox :enable_network => true
+end
+
+systemd_timer "letsencrypt-check" do
+ description "Check letsencrypt certificates"
+ on_boot_sec "2h"
+ on_unit_inactive_sec "12h"
+end
+
+service "letsencrypt-check.timer" do
+ action [:enable, :start]
+end
+
+template "/etc/logrotate.d/letsencrypt" do
+ source "logrotate.erb"
owner "root"
group "root"
- mode 0o644
+ mode "644"
end