** Install Server Certificate
The servers on Front use the same certificate (and key) to
-authenticate themselves to institute clients. They share the
-=/etc/server.crt= and =/etc/server.key= files, the latter only
-readable by ~root~.
+authenticate to institute clients. They share the =/etc/server.crt=
+and =/etc/server.key= files, the latter only readable by ~root~.
#+CAPTION: [[file:roles_t/front/tasks/main.yml][=roles_t/front/tasks/main.yml=]]
#+BEGIN_SRC conf :tangle roles_t/front/tasks/main.yml
- name: Install server certificate/key.
become: yes
copy:
- src: ../Secret/CA/pki/{{ item.path }}.{{ item.typ }}
- dest: /etc/server.{{ item.typ }}
+ src: "{{ item.src }}"
+ dest: "{{ item.dest }}"
mode: "{{ item.mode }}"
force: no
loop:
- - { path: "issued/{{ domain_name }}", typ: crt,
- mode: "u=r,g=r,o=r" }
- - { path: "private/{{ domain_name }}", typ: key,
- mode: "u=r,g=,o=" }
+ - src: "../Secret/CA/pki/issued/{{ domain_name }}.crt"
+ dest: "/etc/server.crt"
+ mode: "u=r,g=r,o=r"
+ - src: "../Secret/CA/pki/private/{{ domain_name }}.key"
+ dest: "/etc/server.key"
+ mode: "u=r,g=,o="
notify:
- - Restart Postfix.
- Restart Dovecot.
#+END_SRC
** Install Server Certificate
The servers on Core use the same certificate (and key) to authenticate
-themselves to institute clients. They share the =/etc/server.crt= and
+to institute clients. They share the =/etc/server.crt= and
=/etc/server.key= files, the latter only readable by ~root~.
#+CAPTION: [[file:roles_t/core/tasks/main.yml][=roles_t/core/tasks/main.yml=]]
- name: Install server certificate/key.
become: yes
copy:
- src: ../Secret/CA/pki/{{ item.path }}.{{ item.typ }}
- dest: /etc/server.{{ item.typ }}
+ src: "{{ item.src }}"
+ dest: "{{ item.dest }}"
mode: "{{ item.mode }}"
+ force: no
loop:
- - { path: "issued/core.{{ domain_priv }}", typ: crt,
- mode: "u=r,g=r,o=r" }
- - { path: "private/core.{{ domain_priv }}", typ: key,
- mode: "u=r,g=,o=" }
+ - src: "../Secret/CA/pki/issued/core.{{ domain_priv }}.crt"
+ dest: "/etc/server.crt"
+ mode: "u=r,g=r,o=r"
+ - src: "../Secret/CA/pki/private/core.{{ domain_priv }}.key"
+ dest: "/etc/server.key"
+ mode: "u=r,g=,o="
notify:
- - Restart Postfix.
- Restart Dovecot.
#+END_SRC
- name: Install server certificate/key.
become: yes
copy:
- src: ../Secret/CA/pki/{{ item.path }}.{{ item.typ }}
- dest: /etc/server.{{ item.typ }}
+ src: "{{ item.src }}"
+ dest: "{{ item.dest }}"
mode: "{{ item.mode }}"
+ force: no
loop:
- - { path: "issued/core.{{ domain_priv }}", typ: crt,
- mode: "u=r,g=r,o=r" }
- - { path: "private/core.{{ domain_priv }}", typ: key,
- mode: "u=r,g=,o=" }
+ - src: "../Secret/CA/pki/issued/core.{{ domain_priv }}.crt"
+ dest: "/etc/server.crt"
+ mode: "u=r,g=r,o=r"
+ - src: "../Secret/CA/pki/private/core.{{ domain_priv }}.key"
+ dest: "/etc/server.key"
+ mode: "u=r,g=,o="
notify:
- - Restart Postfix.
- Restart Dovecot.
- name: Install Chrony.
- name: Install server certificate/key.
become: yes
copy:
- src: ../Secret/CA/pki/{{ item.path }}.{{ item.typ }}
- dest: /etc/server.{{ item.typ }}
+ src: "{{ item.src }}"
+ dest: "{{ item.dest }}"
mode: "{{ item.mode }}"
force: no
loop:
- - { path: "issued/{{ domain_name }}", typ: crt,
- mode: "u=r,g=r,o=r" }
- - { path: "private/{{ domain_name }}", typ: key,
- mode: "u=r,g=,o=" }
+ - src: "../Secret/CA/pki/issued/{{ domain_name }}.crt"
+ dest: "/etc/server.crt"
+ mode: "u=r,g=r,o=r"
+ - src: "../Secret/CA/pki/private/{{ domain_name }}.key"
+ dest: "/etc/server.key"
+ mode: "u=r,g=,o="
notify:
- - Restart Postfix.
- Restart Dovecot.
- name: Install Postfix.