Use cert role to deploy a valid certificate for esphome.ccchh.net
This commit is contained in:
parent
ca3a30360f
commit
78023f5198
|
@ -1,4 +1,11 @@
|
||||||
esphome__version: "2023.3.2"
|
esphome__version: "2023.3.2"
|
||||||
|
cert__acme_account_email: jannes+letsencrypt-ccchh@grzb.de
|
||||||
|
cert__domains:
|
||||||
|
- "esphome.ccchh.net"
|
||||||
|
cert__bind_9_host: authoritative-dns
|
||||||
|
cert__bind_9_zone: ccchh.net
|
||||||
|
cert__handlers:
|
||||||
|
- Restart `nginx.service`
|
||||||
nginx__version_spec: ""
|
nginx__version_spec: ""
|
||||||
nginx__configurations:
|
nginx__configurations:
|
||||||
- name: esphome
|
- name: esphome
|
||||||
|
|
|
@ -4,4 +4,5 @@
|
||||||
hosts: esphome
|
hosts: esphome
|
||||||
roles:
|
roles:
|
||||||
- esphome
|
- esphome
|
||||||
|
- cert
|
||||||
- nginx
|
- nginx
|
||||||
|
|
|
@ -7,10 +7,14 @@ server {
|
||||||
listen 443 ssl http2;
|
listen 443 ssl http2;
|
||||||
listen [::]:443 ssl http2;
|
listen [::]:443 ssl http2;
|
||||||
|
|
||||||
ssl_certificate /etc/ssl/certs/ssl-cert-snakeoil.pem;
|
server_name esphome.ccchh.net;
|
||||||
ssl_certificate_key /etc/ssl/private/ssl-cert-snakeoil.key;
|
|
||||||
|
|
||||||
server_name esphome.z9;
|
ssl_certificate /etc/ansible_certs/certs/esphome.ccchh.net/fullchain.pem;
|
||||||
|
ssl_certificate_key /etc/ansible_certs/certs/esphome.ccchh.net/privkey.pem;
|
||||||
|
# verify chain of trust of OCSP response using Root CA and Intermediate certs
|
||||||
|
ssl_trusted_certificate /etc/ansible_certs/certs/esphome.ccchh.net/chain.pem;
|
||||||
|
|
||||||
|
add_header Strict-Transport-Security "max-age=63072000" always;
|
||||||
|
|
||||||
location / {
|
location / {
|
||||||
proxy_set_header Host $host;
|
proxy_set_header Host $host;
|
||||||
|
|
Loading…
Reference in a new issue