6eb22c5db2
* Added update CA trust step for etcd and kube/secrets roles * Added load_balancer_domain_name to certificate alt names if defined. Reset CA's in RedHat os. * Rename kube-cluster-ca.crt to vault-ca.crt, we need separated CA`s for vault, etcd and kube. * Vault role refactoring, remove optional cert vault auth because not not used and worked. Create separate CA`s fro vault and etcd. * Fixed different certificates set for vault cert_managment * Update doc/vault.md * Fixed condition create vault CA, wrong group * Fixed missing etcd_cert_path mount for rkt deployment type. Distribute vault roles for all vault hosts * Removed wrong when condition in create etcd role vault tasks.
17 lines
678 B
YAML
17 lines
678 B
YAML
---
|
|
- include: ../shared/auth_backend.yml
|
|
vars:
|
|
auth_backend_description: A Username/Password Auth Backend primarily used for services needing to issue certificates
|
|
auth_backend_path: userpass
|
|
auth_backend_type: userpass
|
|
delegate_to: "{{ groups.vault|first }}"
|
|
run_once: true
|
|
|
|
- include: ../shared/create_role.yml
|
|
vars:
|
|
create_role_name: "{{ vault_etcd_role.name }}"
|
|
create_role_group: "{{ vault_etcd_role.group }}"
|
|
create_role_policy_rules: "{{ vault_etcd_role.policy_rules }}"
|
|
create_role_options: "{{ vault_etcd_role.role_options }}"
|
|
create_role_mount_path: "{{ vault_etcd_role.mount_path }}"
|
|
when: inventory_hostname in groups.etcd
|