2020-12-08 19:21:00 +01:00
|
|
|
---
|
|
|
|
- name: Manage optional CA files on EL
|
|
|
|
block:
|
|
|
|
- name: Get the CA files that we want to trust
|
|
|
|
get_url: url={{ item.ca_url }} dest=/etc/pki/ca-trust/source/anchors/{{ item.ca }} owner=root group=root mode='0444'
|
|
|
|
with_items: '{{ trusted_ca_additional_ca_files }}'
|
|
|
|
register: ca_files_installation
|
|
|
|
|
|
|
|
- name: Trust the CA files
|
|
|
|
command: /bin/update-ca-trust extract
|
|
|
|
when: ca_files_installation is changed
|
|
|
|
|
|
|
|
when: ansible_distribution_file_variety == "RedHat"
|
|
|
|
tags: [ 'pki', 'trusted_ca', 'letsencrypt_ca' ]
|
|
|
|
|
|
|
|
- name: Manage the Letsencrypt CA files on EL
|
|
|
|
block:
|
2021-09-29 18:54:30 +02:00
|
|
|
- name: Download the letsencrypt CA files on EL
|
|
|
|
get_url:
|
2021-09-30 16:42:19 +02:00
|
|
|
url: '{{ trusted_ca_letsencrypt_ca_certificates_url }}/{{ item.ca_src }}'
|
2021-09-29 18:54:30 +02:00
|
|
|
dest: '/etc/pki/ca-trust/source/anchors/{{ item.ca }}'
|
|
|
|
owner: root
|
|
|
|
group: root
|
|
|
|
mode: 0444
|
|
|
|
loop: '{{ trusted_ca_letsencrypt_ca_files }}'
|
2020-12-08 19:21:00 +01:00
|
|
|
register: letsencrypt_ca_files_installation
|
|
|
|
|
2021-09-28 15:30:05 +02:00
|
|
|
- name: Rebuild the trust CA files on EL
|
2020-12-08 19:21:00 +01:00
|
|
|
command: /bin/update-ca-trust extract
|
|
|
|
when: letsencrypt_ca_files_installation is changed
|
|
|
|
|
2021-09-28 15:30:05 +02:00
|
|
|
- name: Ensure that the expired CA files are not present
|
|
|
|
file:
|
|
|
|
dest: '/etc/pki/ca-trust/source/anchors/{{ item }}'
|
|
|
|
state: absent
|
|
|
|
loop: '{{ expired_ca_letsencrypt_ca_files }}'
|
|
|
|
register: letsencrypt_ca_files_removal
|
|
|
|
|
|
|
|
- name: Rebuild the trust CA files on EL
|
|
|
|
command: /bin/update-ca-trust extract
|
|
|
|
when: letsencrypt_ca_files_removal is changed
|
|
|
|
|
2020-12-08 19:21:00 +01:00
|
|
|
when:
|
|
|
|
- trusted_ca_letsencrypt_install
|
|
|
|
- ansible_distribution_file_variety == "RedHat"
|
|
|
|
tags: [ 'pki', 'trusted_ca', 'letsencrypt_ca' ]
|
|
|
|
|
|
|
|
- name: Manage optional CA files on deb
|
|
|
|
block:
|
2021-10-08 13:41:21 +02:00
|
|
|
- name: Ensure that ca-certificates is installed and up to date
|
|
|
|
apt:
|
|
|
|
pkg: ca-certificates
|
|
|
|
state: latest
|
|
|
|
cache_valid_time: 1800
|
2020-12-08 19:21:00 +01:00
|
|
|
|
2020-12-08 19:30:40 +01:00
|
|
|
- name: Get the CA files that we want to trust on deb
|
2021-09-30 10:42:01 +02:00
|
|
|
get_url: url={{ item.ca_url }} dest={{ trusted_ca_deb_path }}/{{ item.ca }} owner=root group=root mode='0444'
|
2020-12-08 19:21:00 +01:00
|
|
|
with_items: '{{ trusted_ca_additional_ca_files }}'
|
|
|
|
register: ca_files_installation
|
|
|
|
|
2020-12-08 19:30:40 +01:00
|
|
|
- name: Trust the CA files on deb
|
2020-12-08 19:21:00 +01:00
|
|
|
command: /usr/sbin/update-ca-certificates
|
|
|
|
when: ca_files_installation is changed
|
|
|
|
|
|
|
|
when: ansible_distribution_file_variety == "Debian"
|
|
|
|
tags: [ 'pki', 'trusted_ca', 'letsencrypt_ca' ]
|
|
|
|
|
2021-09-30 19:49:02 +02:00
|
|
|
- name: Distrust the DST Root CA X3 in Ubuntu Trusty
|
|
|
|
block:
|
|
|
|
- name: Comment the mozilla/DST_Root_CA_X3.crt entry
|
|
|
|
lineinfile:
|
|
|
|
path: /etc/ca-certificates.conf
|
|
|
|
regexp: '^mozilla/DST_Root_CA_X3.crt'
|
|
|
|
line: '!mozilla/DST_Root_CA_X3.crt'
|
|
|
|
register: dst_x3_distrust
|
|
|
|
|
|
|
|
- name: Trust the CA files on deb
|
|
|
|
command: /usr/sbin/update-ca-certificates
|
|
|
|
when: dst_x3_distrust is changed
|
|
|
|
|
|
|
|
when:
|
|
|
|
- ansible_distribution_file_variety == "Debian"
|
|
|
|
- ansible_distribution_version is version_compare('14.04', '==')
|
|
|
|
tags: [ 'pki', 'obsolete_ca' ]
|
|
|
|
|
|
|
|
|
2020-12-08 19:21:00 +01:00
|
|
|
- name: Manage the Letsencrypt CA files on deb
|
|
|
|
block:
|
2021-09-29 18:54:30 +02:00
|
|
|
- name: Download the letsencrypt CA files on deb
|
|
|
|
get_url:
|
2021-09-30 16:42:19 +02:00
|
|
|
url: '{{ trusted_ca_letsencrypt_ca_certificates_url }}/{{ item.ca_src }}'
|
|
|
|
dest: '{{ trusted_ca_deb_path }}/{{ item.ca }}'
|
2021-09-29 18:54:30 +02:00
|
|
|
owner: root
|
|
|
|
group: root
|
|
|
|
mode: 0444
|
|
|
|
loop: '{{ trusted_ca_letsencrypt_ca_files }}'
|
2020-12-08 19:21:00 +01:00
|
|
|
register: letsencrypt_ca_files_installation
|
|
|
|
|
2020-12-08 19:30:40 +01:00
|
|
|
- name: Trust the CA files on deb
|
2020-12-08 19:21:00 +01:00
|
|
|
command: /usr/sbin/update-ca-certificates
|
|
|
|
when: letsencrypt_ca_files_installation is changed
|
|
|
|
|
2021-09-28 15:30:05 +02:00
|
|
|
- name: Ensure that the expired CA files are not present
|
|
|
|
file:
|
|
|
|
dest: '/etc/ssl/certs/{{ item }}'
|
|
|
|
state: absent
|
|
|
|
loop: '{{ expired_ca_letsencrypt_ca_files }}'
|
|
|
|
register: letsencrypt_ca_files_removal
|
|
|
|
|
2021-09-30 10:42:01 +02:00
|
|
|
- name: Ensure that the expired CA files are not present
|
|
|
|
file:
|
|
|
|
dest: '{{ trusted_ca_deb_path }}/{{ item }}'
|
|
|
|
state: absent
|
|
|
|
loop: '{{ expired_ca_letsencrypt_ca_files }}'
|
|
|
|
register: letsencrypt_ca_files_removal
|
|
|
|
|
2021-09-28 15:30:05 +02:00
|
|
|
- name: Trust the CA files on deb
|
|
|
|
command: /usr/sbin/update-ca-certificates
|
|
|
|
when: letsencrypt_ca_files_removal is changed
|
|
|
|
|
2020-12-08 19:21:00 +01:00
|
|
|
when:
|
|
|
|
- trusted_ca_letsencrypt_install
|
|
|
|
- ansible_distribution_file_variety == "Debian"
|
|
|
|
tags: [ 'pki', 'trusted_ca', 'letsencrypt_ca' ]
|
|
|
|
|