diff --git a/data_bags/credentials/5apps_botka_xmpp.json b/data_bags/credentials/5apps_botka_xmpp.json
deleted file mode 100644
index 6299b0b..0000000
--- a/data_bags/credentials/5apps_botka_xmpp.json
+++ /dev/null
@@ -1,21 +0,0 @@
-{
- "id": "5apps_botka_xmpp",
- "password": {
- "encrypted_data": "DY7A6osNk5UpLZQMVZiQnKl+5eR5sRZeyENZa38qBTqOtzALhwgqxwULIgoV\nhs+q\n",
- "iv": "LMPDBACECul+dP/gwvrILA==\n",
- "version": 1,
- "cipher": "aes-256-cbc"
- },
- "webhook_token": {
- "encrypted_data": "v7F6EX5up25FNlNdg4Rwrh/vBxR/GWu3044mBlbErNKQi9tMgaS8GOJNCalK\n9PUf\n",
- "iv": "9U8CyeMgAZHsfkW9dlScEA==\n",
- "version": 1,
- "cipher": "aes-256-cbc"
- },
- "rs_logger_token": {
- "encrypted_data": "WPEhS0I6FxJ7hPDz7/71mYmHN4Gll2MJICkUvwuAS639eYZvpaGW96TAOleb\nlVtORxd7KnG+9mPLikXOxODEuA==\n",
- "iv": "cQM6JOcXmcLZfXdWCmFydA==\n",
- "version": 1,
- "cipher": "aes-256-cbc"
- }
-}
\ No newline at end of file
diff --git a/data_bags/credentials/5apps_schlupp_xmpp.json b/data_bags/credentials/5apps_schlupp_xmpp.json
deleted file mode 100644
index 006dbac..0000000
--- a/data_bags/credentials/5apps_schlupp_xmpp.json
+++ /dev/null
@@ -1,51 +0,0 @@
-{
- "id": "5apps_schlupp_xmpp",
- "password": {
- "encrypted_data": "PoT+Wn5X9/509Rt2XVHrvBk8khF9cbxluwQlgHI/PVSLWZ+JlcnvO1YF0xal\ng0hd\n",
- "iv": "kJPRQDvdPT0V9bHQeV/lrA==\n",
- "version": 1,
- "cipher": "aes-256-cbc"
- },
- "webhook_token": {
- "encrypted_data": "Gg4/3dSVtWmXq/Ce5fCDg+4AKPPjy90CI0Lp7DnPV4R+j+T467LEYYtgp038\nplyi\n",
- "iv": "FEhVZWtxFt85DeJcp2E6jA==\n",
- "version": 1,
- "cipher": "aes-256-cbc"
- },
- "rs_logger_token": {
- "encrypted_data": "5S6I1cenYT2qTvjtuXlgIestyI6tHcPzKw6Hvwe9b7tZ3tHF2j8gsCfqCPQR\nx3xhRJnH4PyhVkbCzr6dApNNZA==\n",
- "iv": "GWtGG5jqapw65Oes4zG4Xw==\n",
- "version": 1,
- "cipher": "aes-256-cbc"
- },
- "deploy_key": {
- "encrypted_data": "8nvIpT8zGVbs0JZvcDD8CPhdUVlZbwKBIbaXmnntKrCPun7iqMrixTIXN5Qu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\n8Ajg3k1paLzi09ypwLVWOzq+\n",
- "iv": "//Oik8zYVxlYLCJ/5zk2Jw==\n",
- "version": 1,
- "cipher": "aes-256-cbc"
- },
- "airtable_api_key": {
- "encrypted_data": "qDEztKIUYN6qU6dAbXi7leapA/+fK0beTZpEvFxvP9+0IrfSQ0mjagIU33ne\nkM/Y\n",
- "iv": "MdfLft5aSoC/yzZe7BRCyg==\n",
- "version": 1,
- "cipher": "aes-256-cbc"
- },
- "github_token": {
- "encrypted_data": "Rp1icQX6fbE8WImrY3NxkLcq10+CcCOG0nSED3ALtVaiY9gXtLb4mEPhgz6B\nqepZ5bG35W08ORxjBskpPudKMQ==\n",
- "iv": "9JTZWHikvB9+dfyht5UYmQ==\n",
- "version": 1,
- "cipher": "aes-256-cbc"
- },
- "aws_access_key_id": {
- "encrypted_data": "J7sNPOtA+lzj+7FjZlneadNcLZxBGz2x1JNeX0j0Rl/pSU7QZCaPFy8KCGj+\nIh8v\n",
- "iv": "K29ZdZdSAd+yJS8yNxkjpg==\n",
- "version": 1,
- "cipher": "aes-256-cbc"
- },
- "aws_secret_access_key": {
- "encrypted_data": "UFLVmj81LAMZheItVvEioQhecPYXLU9tzQVRFLOO1NKZLRK6oDNDPbvey5vO\ndzw1UiGD6LcrAFRPDYuwsQrteg==\n",
- "iv": "RCSCMBxVC8oF02R3l2ASxg==\n",
- "version": 1,
- "cipher": "aes-256-cbc"
- }
-}
\ No newline at end of file
diff --git a/data_bags/credentials/schlupp_5apps.json b/data_bags/credentials/schlupp_5apps.json
deleted file mode 100644
index 364749a..0000000
--- a/data_bags/credentials/schlupp_5apps.json
+++ /dev/null
@@ -1,33 +0,0 @@
-{
- "id": "schlupp_5apps",
- "nickserv_password": {
- "encrypted_data": "lbBdgTUfmpduKtGe016XIj5vXDIrCD6Zr6XC1GVrtAk=\n",
- "iv": "woPI4Urqdf+2My1sZnnM7Q==\n",
- "version": 1,
- "cipher": "aes-256-cbc"
- },
- "rs_logger_token": {
- "encrypted_data": "0eR75jl00C4fxpVWHwPxDPnOwuWXJOGKhcQ51Yx7PIQaQ1dxpR24PlE4iwfq\nXnlhiP+J9BVWko98QDb3LgxNBw==\n",
- "iv": "f4zGM+sgctpmON1uH0ylVw==\n",
- "version": 1,
- "cipher": "aes-256-cbc"
- },
- "webhook_token": {
- "encrypted_data": "hM0aE+B23vaovLPGKd9nw8LiiPnVcv6ZUMj+RnGGDSe0obVslaj0oMusiDuY\n8YU0\n",
- "iv": "AwUPMpO2W0fP51gKYvB4gw==\n",
- "version": 1,
- "cipher": "aes-256-cbc"
- },
- "rs_ops_token": {
- "encrypted_data": "Dweur0XEIuce23nQV4mMqX5WB7ozzfrr6Gz6cBA2kywriV2JhL6fvfWzUX3K\nGiBqTluJ1NXgIapjuxjmy8ssmw==\n",
- "iv": "wEuzcADN5cZdIghrYgQg8g==\n",
- "version": 1,
- "cipher": "aes-256-cbc"
- },
- "deploy_key": {
- "encrypted_data": "Zxaeht3wefd7GycwtJN/ufOPVhOPmb0HGJz8MWGNYTFmH9b3cZSKaVwG6S5+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\nae8hr7/pRkludQdmvem0X3TX\n",
- "iv": "C8kUHlS1U84I45JsAql/Qg==\n",
- "version": 1,
- "cipher": "aes-256-cbc"
- }
-}
\ No newline at end of file
diff --git a/site-cookbooks/5apps-hubot/CHANGELOG.md b/site-cookbooks/5apps-hubot/CHANGELOG.md
deleted file mode 100644
index 0cc231e..0000000
--- a/site-cookbooks/5apps-hubot/CHANGELOG.md
+++ /dev/null
@@ -1,4 +0,0 @@
-# 5apps-hubot CHANGELOG
-
-## 0.1.0
-- [Greg Karékinian] - Initial release of 5apps-hubot
diff --git a/site-cookbooks/5apps-hubot/README.md b/site-cookbooks/5apps-hubot/README.md
deleted file mode 100644
index d8318fa..0000000
--- a/site-cookbooks/5apps-hubot/README.md
+++ /dev/null
@@ -1,80 +0,0 @@
-# 5apps-hubot Cookbook
-
-TODO: Enter the cookbook description here.
-
-e.g.
-This cookbook makes your favorite breakfast sandwich.
-
-## Requirements
-
-TODO: List your cookbook requirements. Be sure to include any requirements this cookbook has on platforms, libraries, other cookbooks, packages, operating systems, etc.
-
-e.g.
-### Platforms
-
-- SandwichOS
-
-### Chef
-
-- Chef 12.0 or later
-
-### Cookbooks
-
-- `toaster` - 5apps-hubot needs toaster to brown your bagel.
-
-## Attributes
-
-TODO: List your cookbook attributes here.
-
-e.g.
-### 5apps-hubot::default
-
-
-
- Key |
- Type |
- Description |
- Default |
-
-
- ['5apps-hubot']['bacon'] |
- Boolean |
- whether to include bacon |
- true |
-
-
-
-## Usage
-
-### 5apps-hubot::default
-
-TODO: Write usage instructions for each cookbook.
-
-e.g.
-Just include `5apps-hubot` in your node's `run_list`:
-
-```json
-{
- "name":"my_node",
- "run_list": [
- "recipe[5apps-hubot]"
- ]
-}
-```
-
-## Contributing
-
-TODO: (optional) If this is a public cookbook, detail the process for contributing. If this is a private cookbook, remove this section.
-
-e.g.
-1. Fork the repository on Github
-2. Create a named feature branch (like `add_component_x`)
-3. Write your change
-4. Write tests for your change (if applicable)
-5. Run the tests, ensuring they all pass
-6. Submit a Pull Request using Github
-
-## License and Authors
-
-Authors: TODO: List authors
-
diff --git a/site-cookbooks/5apps-hubot/metadata.rb b/site-cookbooks/5apps-hubot/metadata.rb
deleted file mode 100644
index b445a18..0000000
--- a/site-cookbooks/5apps-hubot/metadata.rb
+++ /dev/null
@@ -1,12 +0,0 @@
-name '5apps-hubot'
-maintainer 'Kosmos'
-maintainer_email 'mail@kosmos.org'
-license 'All rights reserved'
-description 'Installs/Configures 5apps-hubot'
-long_description IO.read(File.join(File.dirname(__FILE__), 'README.md'))
-version '0.1.0'
-
-depends 'kosmos-nodejs'
-depends 'application_javascript'
-depends 'application_git'
-depends 'firewall'
diff --git a/site-cookbooks/5apps-hubot/recipes/xmpp_botka.rb b/site-cookbooks/5apps-hubot/recipes/xmpp_botka.rb
deleted file mode 100644
index dd9731f..0000000
--- a/site-cookbooks/5apps-hubot/recipes/xmpp_botka.rb
+++ /dev/null
@@ -1,98 +0,0 @@
-#
-# Cookbook Name:: 5apps-hubot
-# Recipe:: xmpp_botka
-#
-# Copyright 2016, Kosmos
-#
-# All rights reserved - Do Not Redistribute
-#
-
-unless node.chef_environment == "development"
- include_recipe "firewall"
- firewall_rule 'hubot_express_botka_xmpp' do
- port 8082
- protocol :tcp
- command :allow
- end
-end
-
-group "hubot" do
- gid 48268
-end
-
-user "hubot" do
- system true
- manage_home true
- comment "hubot user"
- uid 48268
- gid 48268
-
- shell "/bin/bash"
-end
-
-botka_xmpp_data_bag_item = Chef::EncryptedDataBagItem.load('credentials', '5apps_botka_xmpp')
-
-botka_xmpp_path = "/opt/botka_xmpp"
-application botka_xmpp_path do
- owner "hubot"
- group "hubot"
-
- git do
- user "hubot"
- group "hubot"
- repository "https://github.com/67P/botka.git"
- revision "master"
- end
-
- file "external-scripts.json" do
- mode "0640"
- owner "hubot"
- group "hubot"
- content [
- "hubot-help",
- "hubot-remotestorage-logger",
- ].to_json
- end
-
- npm_install do
- user "hubot"
- end
-
- execute "systemctl daemon-reload" do
- command "systemctl daemon-reload"
- action :nothing
- end
-
- template "/lib/systemd/system/botka_xmpp_nodejs.service" do
- source 'nodejs.systemd.service.erb'
- owner 'root'
- group 'root'
- mode '0644'
- variables(
- user: "hubot",
- group: "hubot",
- app_dir: botka_xmpp_path,
- entry: "#{botka_xmpp_path}/bin/hubot -a xmpp --name botka",
- environment: { "HUBOT_XMPP_USERNAME" => "botka@5apps.com/hubot",
- "HUBOT_XMPP_PASSWORD" => botka_xmpp_data_bag_item['password'],
- "HUBOT_XMPP_ROOMS" => "5info@muc.5apps.com,5ops@muc.5apps.com,core@muc.5apps.com,deploy@muc.5apps.com,storage@muc.5apps.com,watercooler@muc.5apps.com,hilti@muc.5apps.com,gymapp@muc.5apps.com,solarisbank@muc.5apps.com",
- "HUBOT_XMPP_HOST" => "xmpp.5apps.com",
- "HUBOT_RSS_PRINTSUMMARY" => "false",
- "EXPRESS_PORT" => "8082",
- "HUBOT_RSS_HEADER" => "Update:",
- "HUBOT_AUTH_ADMIN" => "basti,garret,greg",
- "REDIS_URL" => "redis://localhost:6379/5apps_botka_xmpp",
- "RS_LOGGER_USER" => "5apps@5apps.com",
- "RS_LOGGER_TOKEN" => botka_xmpp_data_bag_item['rs_logger_token'],
- "RS_LOGGER_SERVER_NAME" => "5apps",
- "WEBHOOK_TOKEN" => botka_xmpp_data_bag_item['webhook_token'] }
- )
-
- notifies :run, "execute[systemctl daemon-reload]", :delayed
- notifies :restart, "service[botka_xmpp_nodejs]", :delayed
- end
-
- service "botka_xmpp_nodejs" do
- action [:enable, :start]
- end
-end
diff --git a/site-cookbooks/5apps-hubot/recipes/xmpp_schlupp.rb b/site-cookbooks/5apps-hubot/recipes/xmpp_schlupp.rb
deleted file mode 100644
index 9647c8b..0000000
--- a/site-cookbooks/5apps-hubot/recipes/xmpp_schlupp.rb
+++ /dev/null
@@ -1,137 +0,0 @@
-#
-# Cookbook Name:: 5apps-hubot
-# Recipe:: xmpp_schlupp
-#
-# Copyright 2016, Kosmos
-#
-# All rights reserved - Do Not Redistribute
-#
-
-express_port = 8083
-express_domain = "hubot.5apps.com"
-
-unless node.chef_environment == "development"
- include_recipe "firewall"
- firewall_rule 'hubot_express_schlupp_xmpp' do
- port express_port
- protocol :tcp
- command :allow
- end
-end
-
-group "hubot" do
- gid 48268
-end
-
-user "hubot" do
- system true
- manage_home true
- comment "hubot user"
- uid 48268
- gid 48268
- shell "/bin/bash"
-end
-
-schlupp_xmpp_data_bag_item = Chef::EncryptedDataBagItem.load('credentials', '5apps_schlupp_xmpp')
-
-schlupp_xmpp_path = "/opt/schlupp_xmpp"
-application schlupp_xmpp_path do
- owner "hubot"
- group "hubot"
-
- git do
- user "hubot"
- group "hubot"
- repository "git@gitlab.com:5apps/schlupp.git"
- revision "master"
- deploy_key schlupp_xmpp_data_bag_item['deploy_key']
- end
-
- file "external-scripts.json" do
- mode "0640"
- owner "hubot"
- group "hubot"
- content [
- "hubot-auth",
- "hubot-help",
- "hubot-redis-brain",
- "hubot-rules",
- "hubot-shipit",
- "hubot-plusplus",
- "hubot-tell",
- "hubot-seen",
- "hubot-rss-reader",
- "hubot-incoming-webhook",
- "hubot-yubikey-invalidation",
- ].to_json
- end
-
- npm_install do
- user "hubot"
- end
-
- execute "systemctl daemon-reload" do
- command "systemctl daemon-reload"
- action :nothing
- end
-
- template "/lib/systemd/system/schlupp_xmpp_nodejs.service" do
- source 'nodejs.systemd.service.erb'
- owner 'root'
- group 'root'
- mode '0644'
- variables(
- user: "hubot",
- group: "hubot",
- app_dir: schlupp_xmpp_path,
- entry: "#{schlupp_xmpp_path}/bin/hubot -a xmpp --name schlupp",
- environment: { "HUBOT_XMPP_USERNAME" => "schlupp@5apps.com/hubot",
- "HUBOT_XMPP_PASSWORD" => schlupp_xmpp_data_bag_item['password'],
- "HUBOT_XMPP_ROOMS" => "5info@muc.5apps.com,5ops@muc.5apps.com,core@muc.5apps.com,deploy@muc.5apps.com,storage@muc.5apps.com,watercooler@muc.5apps.com,hilti@muc.5apps.com,test@muc.5apps.com,gymapp@muc.5apps.com,solarisbank@muc.5apps.com",
- "HUBOT_XMPP_HOST" => "xmpp.5apps.com",
- "HUBOT_RSS_PRINTSUMMARY" => "false",
- "EXPRESS_PORT" => express_port,
- "HUBOT_RSS_HEADER" => "Update:",
- "HUBOT_AUTH_ADMIN" => "basti,garret,greg",
- "REDIS_URL" => "redis://localhost:6379/5apps_schlupp_xmpp",
- "WEBHOOK_TOKEN" => schlupp_xmpp_data_bag_item['webhook_token'],
- "AIRTABLE_API_KEY" => schlupp_xmpp_data_bag_item['airtable_api_key'],
- "GITHUB_TOKEN" => schlupp_xmpp_data_bag_item['github_token'],
- "AWS_ACCESS_KEY_ID" => schlupp_xmpp_data_bag_item['aws_access_key_id'],
- "AWS_SECRET_ACCESS_KEY" => schlupp_xmpp_data_bag_item['aws_secret_access_key'] }
- )
-
- notifies :run, "execute[systemctl daemon-reload]", :delayed
- notifies :restart, "service[schlupp_xmpp_nodejs]", :delayed
- end
-
- service "schlupp_xmpp_nodejs" do
- action [:enable, :start]
- end
-end
-
-#
-# Nginx reverse proxy
-#
-unless node.chef_environment == "development"
- include_recipe "kosmos-base::letsencrypt"
-end
-
-include_recipe 'kosmos-nginx'
-
-template "#{node['nginx']['dir']}/sites-available/#{express_domain}" do
- source 'nginx_conf_hubot.erb'
- owner node["nginx"]["user"]
- mode 0640
- variables express_port: express_port,
- server_name: express_domain,
- ssl_cert: "/etc/letsencrypt/live/#{express_domain}/fullchain.pem",
- ssl_key: "/etc/letsencrypt/live/#{express_domain}/privkey.pem"
- notifies :reload, 'service[nginx]', :delayed
-end
-
-nginx_site express_domain do
- action :enable
-end
-
-nginx_certbot_site express_domain
diff --git a/site-cookbooks/5apps-hubot/templates/default/nginx_conf_hubot.erb b/site-cookbooks/5apps-hubot/templates/default/nginx_conf_hubot.erb
deleted file mode 100644
index 112b0ba..0000000
--- a/site-cookbooks/5apps-hubot/templates/default/nginx_conf_hubot.erb
+++ /dev/null
@@ -1,31 +0,0 @@
-#
-# Generated by Chef
-#
-upstream _express_<%= @server_name.gsub(".", "_") %> {
- server localhost:<%= @express_port %>;
-}
-
-server {
- <% if File.exist?(@ssl_cert) && File.exist?(@ssl_key) -%>
- listen 443 ssl http2;
- add_header Strict-Transport-Security "max-age=15768000";
- <% end -%>
-
- server_name <%= @server_name %>;
-
- access_log <%= node[:nginx][:log_dir] %>/<%= @server_name %>.access.log json;
- error_log <%= node[:nginx][:log_dir] %>/<%= @server_name %>.error.log warn;
-
- location / {
- # Increase number of buffers. Default is 8
- proxy_buffers 1024 8k;
-
- proxy_pass http://_express_<%= @server_name.gsub(".", "_") %>;
- proxy_http_version 1.1;
- }
-
- <% if File.exist?(@ssl_cert) && File.exist?(@ssl_key) -%>
- ssl_certificate <%= @ssl_cert %>;
- ssl_certificate_key <%= @ssl_key %>;
- <% end -%>
-}
diff --git a/site-cookbooks/5apps-hubot/templates/default/nodejs.systemd.service.erb b/site-cookbooks/5apps-hubot/templates/default/nodejs.systemd.service.erb
deleted file mode 100644
index 8dc98a9..0000000
--- a/site-cookbooks/5apps-hubot/templates/default/nodejs.systemd.service.erb
+++ /dev/null
@@ -1,17 +0,0 @@
-[Unit]
-Description=Start nodejs app
-Requires=redis-server.service
-After=redis-server.service
-
-[Service]
-ExecStart=<%= @entry %>
-WorkingDirectory=<%= @app_dir %>
-User=<%= @user %>
-Group=<%= @group %>
-<% unless @environment.empty? -%>
-Environment=<% @environment.each do |key, value| -%>'<%= key %>=<%= value %>' <% end %>
-<% end -%>
-Restart=always
-
-[Install]
-WantedBy=multi-user.target
diff --git a/site-cookbooks/5apps-xmpp_server/CHANGELOG.md b/site-cookbooks/5apps-xmpp_server/CHANGELOG.md
deleted file mode 100644
index 2668d1b..0000000
--- a/site-cookbooks/5apps-xmpp_server/CHANGELOG.md
+++ /dev/null
@@ -1,4 +0,0 @@
-# 5apps-xmpp_server CHANGELOG
-
-## 0.1.0
-- [Greg Karékinian] - Initial release of 5apps-xmpp_server
diff --git a/site-cookbooks/5apps-xmpp_server/README.md b/site-cookbooks/5apps-xmpp_server/README.md
deleted file mode 100644
index d7c325f..0000000
--- a/site-cookbooks/5apps-xmpp_server/README.md
+++ /dev/null
@@ -1,3 +0,0 @@
-# 5apps-xmpp_server Cookbook
-
-This cookbook installs prosody as 5apps' private XMPP server
diff --git a/site-cookbooks/5apps-xmpp_server/metadata.rb b/site-cookbooks/5apps-xmpp_server/metadata.rb
deleted file mode 100644
index 2946fe2..0000000
--- a/site-cookbooks/5apps-xmpp_server/metadata.rb
+++ /dev/null
@@ -1,11 +0,0 @@
-name '5apps-xmpp_server'
-maintainer 'Kosmos'
-maintainer_email 'mail@kosmos.org'
-license 'All rights reserved'
-description 'Installs/Configures 5apps-xmpp_server'
-long_description IO.read(File.join(File.dirname(__FILE__), 'README.md'))
-version '0.2.0'
-
-depends 'firewall'
-depends 'apt'
-depends 'backup'
diff --git a/site-cookbooks/5apps-xmpp_server/recipes/default.rb b/site-cookbooks/5apps-xmpp_server/recipes/default.rb
deleted file mode 100644
index 0dd353f..0000000
--- a/site-cookbooks/5apps-xmpp_server/recipes/default.rb
+++ /dev/null
@@ -1,44 +0,0 @@
-#
-# Cookbook Name:: 5apps-xmpp_server
-# Recipe:: default
-#
-# Copyright 2016, 5apps
-#
-# All rights reserved - Do Not Redistribute
-#
-
-unless node.chef_environment == "development"
- include_recipe "firewall"
- firewall_rule "xmpp" do
- port [5222, 5269, 5281]
- protocol :tcp
- command :allow
- end
-end
-
-apt_repository "prosody" do
- uri "https://packages.prosody.im/debian"
- # 15.04 doesn't get new packages anymore, use the ones built for 16.04
- distribution node["lsb"]["codename"] == "vivid" ? "xenial" : node["lsb"]["codename"]
- components ["main"]
- key "https://prosody.im/files/prosody-debian-packages.key"
-end
-
-# For SQL backend support
-package "lua-dbi-sqlite3"
-
-package "prosody" do
- version "0.10.0-1~xenial4"
-end
-
-service "prosody" do
- action [:enable]
-end
-
-unless node.chef_environment == "development"
- include_recipe "5apps-xmpp_server::letsencrypt"
-
- # backup the data dir and the config files
- node.override["backup"]["archives"]["prosody"] = ["/var/lib/prosody", "/etc/prosody"]
- include_recipe "backup"
-end
diff --git a/site-cookbooks/5apps-xmpp_server/recipes/letsencrypt.rb b/site-cookbooks/5apps-xmpp_server/recipes/letsencrypt.rb
deleted file mode 100644
index 3fa5a40..0000000
--- a/site-cookbooks/5apps-xmpp_server/recipes/letsencrypt.rb
+++ /dev/null
@@ -1,44 +0,0 @@
-# Generate a Let's Encrypt cert for 5apps.com, muc.5apps.com and xmpp.5apps.com
-
-include_recipe "kosmos-base::letsencrypt"
-
-prosody_post_hook = <<-EOF
-#!/usr/bin/env bash
-
-# Copy the prosody certificates and restart the server if it has been renewed
-# This is necessary because the prosody user doesn't have access to the
-# letsencrypt live folder
-for domain in $RENEWED_DOMAINS; do
- case $domain in
- # Do not copy over when renewing other 5apps.com domains
- 5apps.com)
- cp "${RENEWED_LINEAGE}/fullchain.pem" /etc/prosody/certs/5apps.com.crt
- cp "${RENEWED_LINEAGE}/privkey.pem" /etc/prosody/certs/5apps.com.key
- cp "${RENEWED_LINEAGE}/fullchain.pem" /etc/prosody/certs/muc.5apps.com.crt
- cp "${RENEWED_LINEAGE}/privkey.pem" /etc/prosody/certs/muc.5apps.com.key
- cp "${RENEWED_LINEAGE}/fullchain.pem" /etc/prosody/certs/xmpp.5apps.com.crt
- cp "${RENEWED_LINEAGE}/privkey.pem" /etc/prosody/certs/xmpp.5apps.com.key
- chown prosody:prosody /etc/prosody/certs/*
- chmod 600 /etc/prosody/certs/*.key
- chmod 640 /etc/prosody/certs/*.crt
- systemctl restart prosody
- ;;
- esac
-done
-EOF
-
-file "/etc/letsencrypt/renewal-hooks/post/prosody" do
- content prosody_post_hook
- mode 0755
- owner "root"
- group "root"
-end
-
-# Generate a Let's Encrypt cert (only if no cert has been generated before).
-# The renew cron will take care of renewing
-execute "letsencrypt cert for 5apps xmpp" do
- command "/usr/bin/certbot certonly --manual --preferred-challenges dns --manual-public-ip-logging-ok --agree-tos --manual-auth-hook \"/root/gandi_dns_certbot_hook.sh auth\" --manual-cleanup-hook \"/root/gandi_dns_certbot_hook.sh cleanup\" --email ops@5apps.com -d 5apps.com -d muc.5apps.com -d xmpp.5apps.com -n"
- not_if do
- File.exist?("/etc/prosody/certs/5apps.com.crt")
- end
-end