Skip to content
Snippets Groups Projects
Commit e16b57aa authored by Maxim Krasilnikov's avatar Maxim Krasilnikov Committed by Matthew Mosesohn
Browse files

Store vault users passwords to credentials dir. Create vault and etcd roles...

Store vault users passwords to credentials dir. Create vault and etcd roles after start vault cluster (#1632)
parent fb30f659
No related branches found
No related tags found
No related merge requests found
...@@ -31,7 +31,7 @@ ...@@ -31,7 +31,7 @@
src: known_users.csv.j2 src: known_users.csv.j2
dest: "{{ kube_users_dir }}/known_users.csv" dest: "{{ kube_users_dir }}/known_users.csv"
backup: yes backup: yes
when: inventory_hostname in "{{ groups['kube-master'] }}" and kube_basic_auth|default(true) when: inventory_hostname in groups['kube-master'] and kube_basic_auth|default(true)
notify: set secret_changed notify: set secret_changed
# #
......
...@@ -111,7 +111,7 @@ vault_pki_mounts: ...@@ -111,7 +111,7 @@ vault_pki_mounts:
roles: roles:
- name: vault - name: vault
group: vault group: vault
password: "{{ lookup('pipe','date +%Y%m%d%H%M%S' + cluster_name + 'vault') | to_uuid }}" password: "{{ lookup('password', 'credentials/vault/vault length=15') }}"
policy_rules: default policy_rules: default
role_options: default role_options: default
etcd: etcd:
...@@ -123,7 +123,7 @@ vault_pki_mounts: ...@@ -123,7 +123,7 @@ vault_pki_mounts:
roles: roles:
- name: etcd - name: etcd
group: etcd group: etcd
password: "{{ lookup('pipe','date +%Y%m%d%H%M%S' + cluster_name + 'etcd') | to_uuid }}" password: "{{ lookup('password', 'credentials/vault/etcd length=15') }}"
policy_rules: default policy_rules: default
role_options: role_options:
allow_any_name: true allow_any_name: true
...@@ -138,7 +138,7 @@ vault_pki_mounts: ...@@ -138,7 +138,7 @@ vault_pki_mounts:
roles: roles:
- name: kube-master - name: kube-master
group: kube-master group: kube-master
password: "{{ lookup('pipe','date +%Y%m%d%H%M%S' + cluster_name + 'kube-master') | to_uuid }}" password: "{{ lookup('password', 'credentials/vault/kube-master length=15') }}"
policy_rules: default policy_rules: default
role_options: role_options:
allow_any_name: true allow_any_name: true
...@@ -146,7 +146,7 @@ vault_pki_mounts: ...@@ -146,7 +146,7 @@ vault_pki_mounts:
organization: "system:masters" organization: "system:masters"
- name: kube-node - name: kube-node
group: k8s-cluster group: k8s-cluster
password: "{{ lookup('pipe','date +%Y%m%d%H%M%S' + cluster_name + 'kube-node') | to_uuid }}" password: "{{ lookup('password', 'credentials/vault/kube-node length=15') }}"
policy_rules: default policy_rules: default
role_options: role_options:
allow_any_name: true allow_any_name: true
...@@ -154,7 +154,7 @@ vault_pki_mounts: ...@@ -154,7 +154,7 @@ vault_pki_mounts:
organization: "system:nodes" organization: "system:nodes"
- name: kube-proxy - name: kube-proxy
group: k8s-cluster group: k8s-cluster
password: "{{ lookup('pipe', 'date +%Y%m%d%H%M%S' + cluster_name + 'kube-proxy') | to_uuid }}" password: "{{ lookup('password', 'credentials/vault/kube-proxy length=15') }}"
policy_rules: default policy_rules: default
role_options: role_options:
allow_any_name: true allow_any_name: true
......
...@@ -6,7 +6,7 @@ ...@@ -6,7 +6,7 @@
create_mount_max_lease_ttl: "{{ item.max_lease_ttl }}" create_mount_max_lease_ttl: "{{ item.max_lease_ttl }}"
create_mount_description: "{{ item.description }}" create_mount_description: "{{ item.description }}"
create_mount_cert_dir: "{{ item.cert_dir }}" create_mount_cert_dir: "{{ item.cert_dir }}"
create_mount_config_ca_needed: "{{ item.name != vault_pki_mounts.kube.name }}" create_mount_config_ca_needed: item.name != vault_pki_mounts.kube.name
with_items: with_items:
- "{{ vault_pki_mounts.vault }}" - "{{ vault_pki_mounts.vault }}"
- "{{ vault_pki_mounts.etcd }}" - "{{ vault_pki_mounts.etcd }}"
......
...@@ -6,5 +6,5 @@ ...@@ -6,5 +6,5 @@
create_role_password: "{{ item.password }}" create_role_password: "{{ item.password }}"
create_role_policy_rules: "{{ item.policy_rules }}" create_role_policy_rules: "{{ item.policy_rules }}"
create_role_options: "{{ item.role_options }}" create_role_options: "{{ item.role_options }}"
create_role_mount_path: "{{ vault_pki_mounts.kube.name }}" create_role_mount_path: "{{ mount.name }}"
with_items: "{{ vault_pki_mounts.kube.roles }}" with_items: "{{ mount.roles }}"
...@@ -42,4 +42,10 @@ ...@@ -42,4 +42,10 @@
when: inventory_hostname == groups.vault|first when: inventory_hostname == groups.vault|first
- include: create_roles.yml - include: create_roles.yml
with_items:
- "{{ vault_pki_mounts.vault }}"
- "{{ vault_pki_mounts.etcd }}"
- "{{ vault_pki_mounts.kube }}"
loop_control:
loop_var: mount
when: inventory_hostname in groups.vault when: inventory_hostname in groups.vault
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Please register or to comment