6eb22c5db2
* Added update CA trust step for etcd and kube/secrets roles * Added load_balancer_domain_name to certificate alt names if defined. Reset CA's in RedHat os. * Rename kube-cluster-ca.crt to vault-ca.crt, we need separated CA`s for vault, etcd and kube. * Vault role refactoring, remove optional cert vault auth because not not used and worked. Create separate CA`s fro vault and etcd. * Fixed different certificates set for vault cert_managment * Update doc/vault.md * Fixed condition create vault CA, wrong group * Fixed missing etcd_cert_path mount for rkt deployment type. Distribute vault roles for all vault hosts * Removed wrong when condition in create etcd role vault tasks.
29 lines
1 KiB
YAML
29 lines
1 KiB
YAML
---
|
|
- name: config_ca | Read root CA cert for Vault
|
|
command: "cat {{ config_ca_ca_pem }}"
|
|
register: vault_ca_cert_cat
|
|
|
|
- name: config_ca | Pull current CA cert from Vault
|
|
uri:
|
|
url: "{{ vault_leader_url }}/v1/{{ config_ca_mount_path }}/ca/pem"
|
|
headers: "{{ vault_headers }}"
|
|
return_content: true
|
|
status_code: 200,204
|
|
validate_certs: no
|
|
register: vault_pull_current_ca
|
|
|
|
- name: config_ca | Read root CA key for Vault
|
|
command: "cat {{ config_ca_ca_key }}"
|
|
register: vault_ca_key_cat
|
|
when: vault_ca_cert_cat.stdout.strip() != vault_pull_current_ca.content.strip()
|
|
|
|
- name: config_ca | Configure pki mount to use the found root CA cert and key
|
|
uri:
|
|
url: "{{ vault_leader_url }}/v1/{{ config_ca_mount_path }}/config/ca"
|
|
headers: "{{ vault_headers }}"
|
|
method: POST
|
|
body_format: json
|
|
body:
|
|
pem_bundle: "{{ vault_ca_cert_cat.stdout + '\n' + vault_ca_key_cat.stdout }}"
|
|
status_code: 204
|
|
when: vault_ca_cert_cat.stdout.strip() != vault_pull_current_ca.get("content","").strip()
|