{"id":284394,"status":"ok","playbook":{"id":3032,"items":{"plays":1,"tasks":3,"results":15,"hosts":5,"files":1,"records":0},"arguments":{"version":null,"verbosity":2,"private_key_file":"/home/ssh-gateway/.ssh/id_rsa","remote_user":"root","connection":"ssh","timeout":null,"ssh_common_args":null,"sftp_extra_args":null,"scp_extra_args":null,"ssh_extra_args":null,"ask_pass":false,"connection_password_file":null,"force_handlers":false,"flush_cache":false,"become":false,"become_method":"sudo","become_user":null,"become_ask_pass":false,"become_password_file":null,"tags":["all"],"skip_tags":[],"check":false,"diff":false,"inventory":["/home/ssh-gateway/ansible/zimbra/inv-prod"],"listhosts":false,"subset":null,"extra_vars":"Not saved by ARA as configured by 'ignored_arguments'","vault_ids":[],"ask_vault_pass":false,"vault_password_files":[],"forks":20,"module_path":null,"syntax":false,"listtasks":false,"listtags":false,"step":false,"start_at_task":null,"args":["install_zimbra_certificate_prod.yaml"]},"labels":[{"id":1,"name":"remote_user:root"},{"id":2,"name":"check:False"},{"id":3,"name":"tags:all"}],"started":"2025-05-28T05:27:27.445402+01:00","ended":"2025-05-28T05:28:48.823435+01:00","duration":"00:01:21.378033","name":null,"ansible_version":"2.16.11","client_version":"1.7.2","python_version":"3.10.10","server_version":"1.7.2","status":"completed","path":"/home/ssh-gateway/ansible/zimbra/install_zimbra_certificate_prod.yaml","controller":"ssh-gw-4.layershift.com","user":"root"},"play":{"id":3354,"items":{"tasks":3,"results":15},"started":"2025-05-28T05:27:27.483855+01:00","ended":"2025-05-28T05:28:48.531688+01:00","duration":"00:01:21.047833","name":"Playbook to install zimbra wildcard certificate on cluster","status":"completed"},"task":{"id":7150,"items":{"results":5},"path":"/home/ssh-gateway/ansible/zimbra/install_zimbra_certificate_prod.yaml","tags":[],"started":"2025-05-28T05:27:32.424480+01:00","ended":"2025-05-28T05:28:48.481162+01:00","duration":"00:01:16.056682","name":"Install certificate on host","uuid":"001851d0-75dc-577d-2092-00000000000a","action":"ansible.builtin.shell","lineno":28,"handler":false,"status":"completed","warnings":[],"deprecations":[],"exceptions":[],"file":5141},"host":{"id":115523,"name":"mbox1","changed":1,"failed":0,"ok":3,"skipped":0,"unreachable":0},"delegated_to":[],"content":{"changed":false,"cmd":"set -o pipefail\nchown zimbra.zimbra /tmp/commercial.key /tmp/ssl.crt /tmp/chain.crt\nsu -l zimbra -c \"cp -prf /tmp/commercial.key /opt/zimbra/ssl/zimbra/commercial/commercial.key\"\nsu -l zimbra -c \"zmcertmgr verifycrt comm /tmp/commercial.key /tmp/ssl.crt /tmp/chain.crt\"\nsu -l zimbra -c \"zmcertmgr deploycrt comm /tmp/ssl.crt /tmp/chain.crt\"\nsu -l zimbra -c \"zmlocalconfig -e ldap_starttls_required=true\"\nsu -l zimbra -c \"zmlocalconfig -e ldap_starttls_supported=1\"\nsu -l zimbra -c \"zmcontrol restart\"\nsu -l zimbra -c \"zmcertmgr viewdeployedcrt\"\n","delta":"0:01:14.606916","end":"2025-05-28 04:28:48.428003","invocation":{"module_args":{"_raw_params":"set -o pipefail\nchown zimbra.zimbra /tmp/commercial.key /tmp/ssl.crt /tmp/chain.crt\nsu -l zimbra -c \"cp -prf /tmp/commercial.key /opt/zimbra/ssl/zimbra/commercial/commercial.key\"\nsu -l zimbra -c \"zmcertmgr verifycrt comm /tmp/commercial.key /tmp/ssl.crt /tmp/chain.crt\"\nsu -l zimbra -c \"zmcertmgr deploycrt comm /tmp/ssl.crt /tmp/chain.crt\"\nsu -l zimbra -c \"zmlocalconfig -e ldap_starttls_required=true\"\nsu -l zimbra -c \"zmlocalconfig -e ldap_starttls_supported=1\"\nsu -l zimbra -c \"zmcontrol restart\"\nsu -l zimbra -c \"zmcertmgr viewdeployedcrt\"\n","_uses_shell":true,"argv":null,"chdir":null,"creates":null,"executable":"/bin/bash","expand_argument_vars":true,"removes":null,"stdin":null,"stdin_add_newline":true,"strip_empty_ends":true}},"msg":"","rc":0,"start":"2025-05-28 04:27:33.821087","stderr":"","stderr_lines":[],"stdout":"** Verifying '/tmp/ssl.crt' against '/tmp/commercial.key'\nCertificate '/tmp/ssl.crt' and private key '/tmp/commercial.key' match.\n** Verifying '/tmp/ssl.crt' against '/tmp/chain.crt'\nValid certificate chain: /tmp/ssl.crt: OK\n** Verifying '/tmp/ssl.crt' against '/opt/zimbra/ssl/zimbra/commercial/commercial.key'\nCertificate '/tmp/ssl.crt' and private key '/opt/zimbra/ssl/zimbra/commercial/commercial.key' match.\n** Verifying '/tmp/ssl.crt' against '/tmp/chain.crt'\nValid certificate chain: /tmp/ssl.crt: OK\n** Copying '/tmp/ssl.crt' to '/opt/zimbra/ssl/zimbra/commercial/commercial.crt'\n** Copying '/tmp/chain.crt' to '/opt/zimbra/ssl/zimbra/commercial/commercial_ca.crt'\n** Appending ca chain '/tmp/chain.crt' to '/opt/zimbra/ssl/zimbra/commercial/commercial.crt'\n** Importing cert '/opt/zimbra/ssl/zimbra/commercial/commercial_ca.crt' as 'zcs-user-commercial_ca' into cacerts '/opt/zimbra/common/lib/jvm/java/lib/security/cacerts'\n** NOTE: restart mailboxd to use the imported certificate.\n** Installing imapd certificate '/opt/zimbra/conf/imapd.crt' and key '/opt/zimbra/conf/imapd.key'\n** Copying '/opt/zimbra/ssl/zimbra/commercial/commercial.crt' to '/opt/zimbra/conf/imapd.crt'\n** Copying '/opt/zimbra/ssl/zimbra/commercial/commercial.key' to '/opt/zimbra/conf/imapd.key'\n** Creating file '/opt/zimbra/ssl/zimbra/jetty.pkcs12'\n** Creating keystore '/opt/zimbra/conf/imapd.keystore'\n** Installing ldap certificate '/opt/zimbra/conf/slapd.crt' and key '/opt/zimbra/conf/slapd.key'\n** Copying '/opt/zimbra/ssl/zimbra/commercial/commercial.crt' to '/opt/zimbra/conf/slapd.crt'\n** Copying '/opt/zimbra/ssl/zimbra/commercial/commercial.key' to '/opt/zimbra/conf/slapd.key'\n** Creating file '/opt/zimbra/ssl/zimbra/jetty.pkcs12'\n** Creating keystore '/opt/zimbra/mailboxd/etc/keystore'\n** Installing mta certificate '/opt/zimbra/conf/smtpd.crt' and key '/opt/zimbra/conf/smtpd.key'\n** Copying '/opt/zimbra/ssl/zimbra/commercial/commercial.crt' to '/opt/zimbra/conf/smtpd.crt'\n** Copying '/opt/zimbra/ssl/zimbra/commercial/commercial.key' to '/opt/zimbra/conf/smtpd.key'\n** Installing proxy certificate '/opt/zimbra/conf/nginx.crt' and key '/opt/zimbra/conf/nginx.key'\n** Copying '/opt/zimbra/ssl/zimbra/commercial/commercial.crt' to '/opt/zimbra/conf/nginx.crt'\n** Copying '/opt/zimbra/ssl/zimbra/commercial/commercial.key' to '/opt/zimbra/conf/nginx.key'\n** NOTE: restart services to use the new certificates.\n** Cleaning up 9 files from '/opt/zimbra/conf/ca'\n** Removing /opt/zimbra/conf/ca/ca.key\n** Removing /opt/zimbra/conf/ca/ca.pem\n** Removing /opt/zimbra/conf/ca/777b329e.0\n** Removing /opt/zimbra/conf/ca/commercial_ca_1.crt\n** Removing /opt/zimbra/conf/ca/65ff7287.0\n** Removing /opt/zimbra/conf/ca/commercial_ca_2.crt\n** Removing /opt/zimbra/conf/ca/fc5a8f99.0\n** Removing /opt/zimbra/conf/ca/commercial_ca_3.crt\n** Removing /opt/zimbra/conf/ca/ee64a828.0\n** Copying CA to /opt/zimbra/conf/ca\n** Copying '/opt/zimbra/ssl/zimbra/ca/ca.key' to '/opt/zimbra/conf/ca/ca.key'\n** Copying '/opt/zimbra/ssl/zimbra/ca/ca.pem' to '/opt/zimbra/conf/ca/ca.pem'\n** Creating CA hash symlink '777b329e.0' -> 'ca.pem'\n** Creating /opt/zimbra/conf/ca/commercial_ca_1.crt\n** Creating CA hash symlink '65ff7287.0' -> 'commercial_ca_1.crt'\n** Creating /opt/zimbra/conf/ca/commercial_ca_2.crt\n** Creating CA hash symlink 'fc5a8f99.0' -> 'commercial_ca_2.crt'\n** Creating /opt/zimbra/conf/ca/commercial_ca_3.crt\n** Creating CA hash symlink 'ee64a828.0' -> 'commercial_ca_3.crt'\nHost mbox1.mail.ls\n\tStopping vmware-ha...Done.\n\tStopping zmconfigd...Done.\n\tStopping zimlet webapp...Done.\n\tStopping zimbraAdmin webapp...Done.\n\tStopping zimbra webapp...Done.\n\tStopping service webapp...Done.\n\tStopping stats...Done.\n\tStopping onlyoffice...Done.\n\tStopping spell...Done.\n\tStopping snmp...Done.\n\tStopping cbpolicyd...Done.\n\tStopping archiving...Done.\n\tStopping opendkim...Done.\n\tStopping amavis...Done.\n\tStopping antivirus...Done.\n\tStopping antispam...Done.\n\tStopping proxy...Done.\n\tStopping memcached...Done.\n\tStopping mailbox...Done.\n\tStopping convertd...Done.\n\tStopping logger...Done.\n\tStopping dnscache...Done.\nHost mbox1.mail.ls\n\tStarting zmconfigd...Done.\n\tStarting convertd...Done.\n\tStarting mailbox...Done.\n\tStarting spell...Done.\n\tStarting onlyoffice...Done.\n\tStarting stats...Done.\n\tStarting service webapp...Done.\n\tStarting zimbra webapp...Done.\n\tStarting zimbraAdmin webapp...Done.\n\tStarting zimlet webapp...Done.\n- imapd: /opt/zimbra/conf/imapd.crt\nnotBefore=May 22 00:00:00 2025 GMT\nnotAfter=Jun 21 23:59:59 2026 GMT\nsubject=CN = *.mail.ls\nissuer=C = GB, ST = Greater Manchester, L = Salford, O = Sectigo Limited, CN = Sectigo RSA Domain Validation Secure Server CA\nSubjectAltName=*.mail.ls, mail.ls\n- ldap: /opt/zimbra/conf/slapd.crt\nnotBefore=May 22 00:00:00 2025 GMT\nnotAfter=Jun 21 23:59:59 2026 GMT\nsubject=CN = *.mail.ls\nissuer=C = GB, ST = Greater Manchester, L = Salford, O = Sectigo Limited, CN = Sectigo RSA Domain Validation Secure Server CA\nSubjectAltName=*.mail.ls, mail.ls\n- mailboxd: /opt/zimbra/mailboxd/etc/mailboxd.pem\nnotBefore=May 22 00:00:00 2025 GMT\nnotAfter=Jun 21 23:59:59 2026 GMT\nsubject=CN = *.mail.ls\nissuer=C = GB, ST = Greater Manchester, L = Salford, O = Sectigo Limited, CN = Sectigo RSA Domain Validation Secure Server CA\nSubjectAltName=*.mail.ls, mail.ls\n- mta: /opt/zimbra/conf/smtpd.crt\nnotBefore=May 22 00:00:00 2025 GMT\nnotAfter=Jun 21 23:59:59 2026 GMT\nsubject=CN = *.mail.ls\nissuer=C = GB, ST = Greater Manchester, L = Salford, O = Sectigo Limited, CN = Sectigo RSA Domain Validation Secure Server CA\nSubjectAltName=*.mail.ls, mail.ls\n- proxy: /opt/zimbra/conf/nginx.crt\nnotBefore=May 22 00:00:00 2025 GMT\nnotAfter=Jun 21 23:59:59 2026 GMT\nsubject=CN = *.mail.ls\nissuer=C = GB, ST = Greater Manchester, L = Salford, O = Sectigo Limited, CN = Sectigo RSA Domain Validation Secure Server CA\nSubjectAltName=*.mail.ls, mail.ls","stdout_lines":["** Verifying '/tmp/ssl.crt' against '/tmp/commercial.key'","Certificate '/tmp/ssl.crt' and private key '/tmp/commercial.key' match.","** Verifying '/tmp/ssl.crt' against '/tmp/chain.crt'","Valid certificate chain: /tmp/ssl.crt: OK","** Verifying '/tmp/ssl.crt' against '/opt/zimbra/ssl/zimbra/commercial/commercial.key'","Certificate '/tmp/ssl.crt' and private key '/opt/zimbra/ssl/zimbra/commercial/commercial.key' match.","** Verifying '/tmp/ssl.crt' against '/tmp/chain.crt'","Valid certificate chain: /tmp/ssl.crt: OK","** Copying '/tmp/ssl.crt' to '/opt/zimbra/ssl/zimbra/commercial/commercial.crt'","** Copying '/tmp/chain.crt' to '/opt/zimbra/ssl/zimbra/commercial/commercial_ca.crt'","** Appending ca chain '/tmp/chain.crt' to '/opt/zimbra/ssl/zimbra/commercial/commercial.crt'","** Importing cert '/opt/zimbra/ssl/zimbra/commercial/commercial_ca.crt' as 'zcs-user-commercial_ca' into cacerts '/opt/zimbra/common/lib/jvm/java/lib/security/cacerts'","** NOTE: restart mailboxd to use the imported certificate.","** Installing imapd certificate '/opt/zimbra/conf/imapd.crt' and key '/opt/zimbra/conf/imapd.key'","** Copying '/opt/zimbra/ssl/zimbra/commercial/commercial.crt' to '/opt/zimbra/conf/imapd.crt'","** Copying '/opt/zimbra/ssl/zimbra/commercial/commercial.key' to '/opt/zimbra/conf/imapd.key'","** Creating file '/opt/zimbra/ssl/zimbra/jetty.pkcs12'","** Creating keystore '/opt/zimbra/conf/imapd.keystore'","** Installing ldap certificate '/opt/zimbra/conf/slapd.crt' and key '/opt/zimbra/conf/slapd.key'","** Copying '/opt/zimbra/ssl/zimbra/commercial/commercial.crt' to '/opt/zimbra/conf/slapd.crt'","** Copying '/opt/zimbra/ssl/zimbra/commercial/commercial.key' to '/opt/zimbra/conf/slapd.key'","** Creating file '/opt/zimbra/ssl/zimbra/jetty.pkcs12'","** Creating keystore '/opt/zimbra/mailboxd/etc/keystore'","** Installing mta certificate '/opt/zimbra/conf/smtpd.crt' and key '/opt/zimbra/conf/smtpd.key'","** Copying '/opt/zimbra/ssl/zimbra/commercial/commercial.crt' to '/opt/zimbra/conf/smtpd.crt'","** Copying '/opt/zimbra/ssl/zimbra/commercial/commercial.key' to '/opt/zimbra/conf/smtpd.key'","** Installing proxy certificate '/opt/zimbra/conf/nginx.crt' and key '/opt/zimbra/conf/nginx.key'","** Copying '/opt/zimbra/ssl/zimbra/commercial/commercial.crt' to '/opt/zimbra/conf/nginx.crt'","** Copying '/opt/zimbra/ssl/zimbra/commercial/commercial.key' to '/opt/zimbra/conf/nginx.key'","** NOTE: restart services to use the new certificates.","** Cleaning up 9 files from '/opt/zimbra/conf/ca'","** Removing /opt/zimbra/conf/ca/ca.key","** Removing /opt/zimbra/conf/ca/ca.pem","** Removing /opt/zimbra/conf/ca/777b329e.0","** Removing /opt/zimbra/conf/ca/commercial_ca_1.crt","** Removing /opt/zimbra/conf/ca/65ff7287.0","** Removing /opt/zimbra/conf/ca/commercial_ca_2.crt","** Removing /opt/zimbra/conf/ca/fc5a8f99.0","** Removing /opt/zimbra/conf/ca/commercial_ca_3.crt","** Removing /opt/zimbra/conf/ca/ee64a828.0","** Copying CA to /opt/zimbra/conf/ca","** Copying '/opt/zimbra/ssl/zimbra/ca/ca.key' to '/opt/zimbra/conf/ca/ca.key'","** Copying '/opt/zimbra/ssl/zimbra/ca/ca.pem' to '/opt/zimbra/conf/ca/ca.pem'","** Creating CA hash symlink '777b329e.0' -> 'ca.pem'","** Creating /opt/zimbra/conf/ca/commercial_ca_1.crt","** Creating CA hash symlink '65ff7287.0' -> 'commercial_ca_1.crt'","** Creating /opt/zimbra/conf/ca/commercial_ca_2.crt","** Creating CA hash symlink 'fc5a8f99.0' -> 'commercial_ca_2.crt'","** Creating /opt/zimbra/conf/ca/commercial_ca_3.crt","** Creating CA hash symlink 'ee64a828.0' -> 'commercial_ca_3.crt'","Host mbox1.mail.ls","\tStopping vmware-ha...Done.","\tStopping zmconfigd...Done.","\tStopping zimlet webapp...Done.","\tStopping zimbraAdmin webapp...Done.","\tStopping zimbra webapp...Done.","\tStopping service webapp...Done.","\tStopping stats...Done.","\tStopping onlyoffice...Done.","\tStopping spell...Done.","\tStopping snmp...Done.","\tStopping cbpolicyd...Done.","\tStopping archiving...Done.","\tStopping opendkim...Done.","\tStopping amavis...Done.","\tStopping antivirus...Done.","\tStopping antispam...Done.","\tStopping proxy...Done.","\tStopping memcached...Done.","\tStopping mailbox...Done.","\tStopping convertd...Done.","\tStopping logger...Done.","\tStopping dnscache...Done.","Host mbox1.mail.ls","\tStarting zmconfigd...Done.","\tStarting convertd...Done.","\tStarting mailbox...Done.","\tStarting spell...Done.","\tStarting onlyoffice...Done.","\tStarting stats...Done.","\tStarting service webapp...Done.","\tStarting zimbra webapp...Done.","\tStarting zimbraAdmin webapp...Done.","\tStarting zimlet webapp...Done.","- imapd: /opt/zimbra/conf/imapd.crt","notBefore=May 22 00:00:00 2025 GMT","notAfter=Jun 21 23:59:59 2026 GMT","subject=CN = *.mail.ls","issuer=C = GB, ST = Greater Manchester, L = Salford, O = Sectigo Limited, CN = Sectigo RSA Domain Validation Secure Server CA","SubjectAltName=*.mail.ls, mail.ls","- ldap: /opt/zimbra/conf/slapd.crt","notBefore=May 22 00:00:00 2025 GMT","notAfter=Jun 21 23:59:59 2026 GMT","subject=CN = *.mail.ls","issuer=C = GB, ST = Greater Manchester, L = Salford, O = Sectigo Limited, CN = Sectigo RSA Domain Validation Secure Server CA","SubjectAltName=*.mail.ls, mail.ls","- mailboxd: /opt/zimbra/mailboxd/etc/mailboxd.pem","notBefore=May 22 00:00:00 2025 GMT","notAfter=Jun 21 23:59:59 2026 GMT","subject=CN = *.mail.ls","issuer=C = GB, ST = Greater Manchester, L = Salford, O = Sectigo Limited, CN = Sectigo RSA Domain Validation Secure Server CA","SubjectAltName=*.mail.ls, mail.ls","- mta: /opt/zimbra/conf/smtpd.crt","notBefore=May 22 00:00:00 2025 GMT","notAfter=Jun 21 23:59:59 2026 GMT","subject=CN = *.mail.ls","issuer=C = GB, ST = Greater Manchester, L = Salford, O = Sectigo Limited, CN = Sectigo RSA Domain Validation Secure Server CA","SubjectAltName=*.mail.ls, mail.ls","- proxy: /opt/zimbra/conf/nginx.crt","notBefore=May 22 00:00:00 2025 GMT","notAfter=Jun 21 23:59:59 2026 GMT","subject=CN = *.mail.ls","issuer=C = GB, ST = Greater Manchester, L = Salford, O = Sectigo Limited, CN = Sectigo RSA Domain Validation Secure Server CA","SubjectAltName=*.mail.ls, mail.ls"]},"created":"2025-05-28T05:28:48.463084+01:00","updated":"2025-05-28T05:28:48.463113+01:00","started":"2025-05-28T05:27:33.465551+01:00","ended":"2025-05-28T05:28:48.457932+01:00","duration":"00:01:14.992381","changed":false,"ignore_errors":false}