bf0af1cd3d
* using separated vault roles for generate certs with different `O` (Organization) subject field; * configure vault roles for issuing certificates with different `CN` (Common name) subject field; * set `CN` and `O` to `kubernetes` and `etcd` certificates; * vault/defaults vars definition was simplified; * vault dirs variables defined in kubernetes-defaults foles for using shared tasks in etcd and kubernetes/secrets roles; * upgrade vault to 0.8.1; * generate random vault user password for each role by default; * fix `serial` file name for vault certs; * move vault auth request to issue_cert tasks; * enable `RBAC` in vault CI;
21 lines
798 B
YAML
21 lines
798 B
YAML
---
|
|
- include: ../shared/issue_cert.yml
|
|
vars:
|
|
issue_cert_common_name: "{{ vault_pki_mounts.vault.roles[0].name }}"
|
|
issue_cert_alt_names: "{{ groups.vault + ['localhost'] }}"
|
|
issue_cert_hosts: "{{ groups.vault }}"
|
|
issue_cert_ip_sans: >-
|
|
[
|
|
{%- for host in groups.vault -%}
|
|
"{{ hostvars[host]['ansible_default_ipv4']['address'] }}",
|
|
{%- if hostvars[host]['ip'] is defined -%}
|
|
"{{ hostvars[host]['ip'] }}",
|
|
{%- endif -%}
|
|
{%- endfor -%}
|
|
"127.0.0.1","::1"
|
|
]
|
|
issue_cert_mount_path: "{{ vault_pki_mounts.vault.name }}"
|
|
issue_cert_path: "{{ vault_cert_dir }}/api.pem"
|
|
issue_cert_role: "{{ vault_pki_mounts.vault.roles[0].name }}"
|
|
issue_cert_url: "{{ vault_leader_url }}"
|
|
when: vault_api_cert_needed
|