6eb22c5db2
* Added update CA trust step for etcd and kube/secrets roles * Added load_balancer_domain_name to certificate alt names if defined. Reset CA's in RedHat os. * Rename kube-cluster-ca.crt to vault-ca.crt, we need separated CA`s for vault, etcd and kube. * Vault role refactoring, remove optional cert vault auth because not not used and worked. Create separate CA`s fro vault and etcd. * Fixed different certificates set for vault cert_managment * Update doc/vault.md * Fixed condition create vault CA, wrong group * Fixed missing etcd_cert_path mount for rkt deployment type. Distribute vault roles for all vault hosts * Removed wrong when condition in create etcd role vault tasks.
29 lines
1,020 B
YAML
29 lines
1,020 B
YAML
---
|
|
|
|
- name: boostrap/gen_vault_certs | Add the vault role
|
|
uri:
|
|
url: "{{ vault_leader_url }}/v1/{{ vault_ca_options.common_name }}/roles/vault"
|
|
headers: "{{ vault_headers }}"
|
|
method: POST
|
|
body_format: json
|
|
body: "{{ vault_default_role_permissions }}"
|
|
status_code: 204
|
|
when: inventory_hostname == groups.vault|first and vault_api_cert_needed
|
|
|
|
- include: ../shared/issue_cert.yml
|
|
vars:
|
|
issue_cert_alt_names: "{{ groups.vault + ['localhost'] }}"
|
|
issue_cert_hosts: "{{ groups.vault }}"
|
|
issue_cert_ip_sans: >-
|
|
[
|
|
{%- for host in groups.vault -%}
|
|
"{{ hostvars[host]['ansible_default_ipv4']['address'] }}",
|
|
{%- endfor -%}
|
|
"127.0.0.1","::1"
|
|
]
|
|
issue_cert_mount_path: "{{ vault_ca_options.common_name }}"
|
|
issue_cert_path: "{{ vault_cert_dir }}/api.pem"
|
|
issue_cert_headers: "{{ hostvars[groups.vault|first]['vault_headers'] }}"
|
|
issue_cert_role: vault
|
|
issue_cert_url: "{{ vault_leader_url }}"
|
|
when: vault_api_cert_needed
|