maybe chmod 0755 'cron.d'
maybe chmod 0644 'cron.d/.placeholder'
maybe chmod 0644 'cron.d/backup'
+maybe chmod 0644 'cron.d/certbot'
maybe chmod 0644 'cron.d/e2scrub_all'
maybe chmod 0644 'cron.d/php'
maybe chmod 0644 'cron.d/popularity-contest'
maybe chmod 0755 'ldap'
maybe chmod 0644 'ldap/ldap.conf'
maybe chmod 0644 'legal'
+maybe chmod 0755 'letsencrypt'
+maybe chmod 0644 'letsencrypt/cli.ini'
maybe chmod 0644 'libaudit.conf'
maybe chmod 0755 'libnl-3'
maybe chmod 0644 'libnl-3/classid'
maybe chmod 0644 'logrotate.d/aptitude'
maybe chmod 0644 'logrotate.d/bootlog'
maybe chmod 0644 'logrotate.d/btmp'
+maybe chmod 0644 'logrotate.d/certbot'
maybe chmod 0644 'logrotate.d/dbconfig-common'
maybe chmod 0644 'logrotate.d/dpkg'
maybe chmod 0644 'logrotate.d/fail2ban'
--- /dev/null
+# /etc/cron.d/certbot: crontab entries for the certbot package
+#
+# Upstream recommends attempting renewal twice a day
+#
+# Eventually, this will be an opportunity to validate certificates
+# haven't been revoked, etc. Renewal will only occur if expiration
+# is within 30 days.
+#
+# Important Note! This cronjob will NOT be executed if you are
+# running systemd as your init system. If you are running systemd,
+# the cronjob.timer function takes precedence over this cronjob. For
+# more details, see the systemd.timer manpage, or use systemctl show
+# certbot.timer.
+SHELL=/bin/sh
+PATH=/usr/local/sbin:/usr/local/bin:/sbin:/bin:/usr/sbin:/usr/bin
+
+0 */12 * * * root test -x /usr/bin/certbot -a \! -d /run/systemd/system && perl -e 'sleep int(rand(43200))' && certbot -q renew
--- /dev/null
+# Because we are using logrotate for greater flexibility, disable the
+# internal certbot logrotation.
+max-log-backups = 0
+# Adjust interactive output regarding automated renewal
+preconfigured-renewal = True
--- /dev/null
+/var/log/letsencrypt/*.log {
+ rotate 12
+ weekly
+ compress
+ missingok
+}
\ No newline at end of file
--- /dev/null
+/lib/systemd/system/certbot.timer
\ No newline at end of file