6eb22c5db2
* Added update CA trust step for etcd and kube/secrets roles * Added load_balancer_domain_name to certificate alt names if defined. Reset CA's in RedHat os. * Rename kube-cluster-ca.crt to vault-ca.crt, we need separated CA`s for vault, etcd and kube. * Vault role refactoring, remove optional cert vault auth because not not used and worked. Create separate CA`s fro vault and etcd. * Fixed different certificates set for vault cert_managment * Update doc/vault.md * Fixed condition create vault CA, wrong group * Fixed missing etcd_cert_path mount for rkt deployment type. Distribute vault roles for all vault hosts * Removed wrong when condition in create etcd role vault tasks.
20 lines
643 B
YAML
20 lines
643 B
YAML
---
|
|
|
|
- include: ../shared/pki_mount.yml
|
|
vars:
|
|
pki_mount_path: auth-pki
|
|
pki_mount_options:
|
|
description: PKI mount to generate certs for the Cert Auth Backend
|
|
config:
|
|
default_lease_ttl: "{{ vault_default_lease_ttl }}"
|
|
max_lease_ttl: "{{ vault_max_lease_ttl }}"
|
|
|
|
- name: shared/auth_mount | Create a dummy role for issuing certs from auth-pki
|
|
uri:
|
|
url: "{{ hostvars[groups.vault|first]['vault_leader_url'] }}/v1/auth-pki/roles/dummy"
|
|
headers: "{{ hostvars[groups.vault|first]['vault_headers'] }}"
|
|
method: POST
|
|
body_format: json
|
|
body:
|
|
{'allow_any_name': true}
|
|
status_code: 204
|