Skip to content
Snippets Groups Projects
  • Maxim Krasilnikov's avatar
    6eb22c5d
    Change single Vault pki mount to multi pki mounts paths for etcd and kube CA`s (#1552) · 6eb22c5d
    Maxim Krasilnikov authored
    * Added update CA trust step for etcd and kube/secrets roles
    
    * Added load_balancer_domain_name to certificate alt names if defined. Reset CA's in RedHat os.
    
    * Rename kube-cluster-ca.crt to vault-ca.crt, we need separated CA`s for vault, etcd and kube.
    
    * Vault role refactoring, remove optional cert vault auth because not not used and worked. Create separate CA`s fro vault and etcd.
    
    * Fixed different certificates set for vault cert_managment
    
    * Update doc/vault.md
    
    * Fixed condition create vault CA, wrong group
    
    * Fixed missing etcd_cert_path mount for rkt deployment type. Distribute vault roles for all vault hosts
    
    * Removed wrong when condition in create etcd role vault tasks.
    6eb22c5d
    History
    Change single Vault pki mount to multi pki mounts paths for etcd and kube CA`s (#1552)
    Maxim Krasilnikov authored
    * Added update CA trust step for etcd and kube/secrets roles
    
    * Added load_balancer_domain_name to certificate alt names if defined. Reset CA's in RedHat os.
    
    * Rename kube-cluster-ca.crt to vault-ca.crt, we need separated CA`s for vault, etcd and kube.
    
    * Vault role refactoring, remove optional cert vault auth because not not used and worked. Create separate CA`s fro vault and etcd.
    
    * Fixed different certificates set for vault cert_managment
    
    * Update doc/vault.md
    
    * Fixed condition create vault CA, wrong group
    
    * Fixed missing etcd_cert_path mount for rkt deployment type. Distribute vault roles for all vault hosts
    
    * Removed wrong when condition in create etcd role vault tasks.
upd_ca_trust.yml 972 B
---
- name: Gen_certs | target ca-certificates path
  set_fact:
    ca_cert_path: |-
      {% if ansible_os_family == "Debian" -%}
      /usr/local/share/ca-certificates/kube-ca.crt
      {%- elif ansible_os_family == "RedHat" -%}
      /etc/pki/ca-trust/source/anchors/kube-ca.crt
      {%- elif ansible_os_family in ["CoreOS", "Container Linux by CoreOS"] -%}
      /etc/ssl/certs/kube-ca.pem
      {%- endif %}
  tags: facts

- name: Gen_certs | add CA to trusted CA dir
  copy:
    src: "{{ kube_cert_dir }}/ca.pem"
    dest: "{{ ca_cert_path }}"
    remote_src: true
  register: kube_ca_cert

- name: Gen_certs | update ca-certificates (Debian/Ubuntu/Container Linux by CoreOS)
  command: update-ca-certificates
  when: kube_ca_cert.changed and ansible_os_family in ["Debian", "CoreOS", "Container Linux by CoreOS"]

- name: Gen_certs | update ca-certificates (RedHat)
  command: update-ca-trust extract
  when: kube_ca_cert.changed and ansible_os_family == "RedHat"