mirror of
https://gitea.0xace.cc/ansible-galaxy/cacert.git
synced 2025-04-05 08:21:56 +00:00
add per host for groups certs
This commit is contained in:
parent
92dcddb528
commit
b08ea85b59
12
README.md
12
README.md
@ -9,7 +9,7 @@ Inventory example:
|
|||||||
- { host: "server-2", path: "/opt/certs" }
|
- { host: "server-2", path: "/opt/certs" }
|
||||||
groups:
|
groups:
|
||||||
- { group: "cacert_clients", path: "/opt/certs" }
|
- { group: "cacert_clients", path: "/opt/certs" }
|
||||||
- { group: "mygroupname", path: "/opt/certs" }
|
- { group: "mygroupname1", path: "/opt/certs" }
|
||||||
|
|
||||||
cacert_cn_certs:
|
cacert_cn_certs:
|
||||||
- name: mycertname.example.com
|
- name: mycertname.example.com
|
||||||
@ -20,10 +20,10 @@ Inventory example:
|
|||||||
- { host: "server-2", path: "/opt/certs", concat: "pem" }
|
- { host: "server-2", path: "/opt/certs", concat: "pem" }
|
||||||
groups:
|
groups:
|
||||||
- { group: "cacert_clients", path: "/opt/certs" }
|
- { group: "cacert_clients", path: "/opt/certs" }
|
||||||
- { group: "mygroupname", path: "/opt/certs" }
|
- { group: "mygroupname1", path: "/opt/certs" }
|
||||||
|
|
||||||
cacert_group_certs:
|
cacert_group_certs:
|
||||||
- name: mygroupcert
|
- name: mygroupcert.example.com
|
||||||
append_groups:
|
append_groups:
|
||||||
- consul
|
- consul
|
||||||
- patroni
|
- patroni
|
||||||
@ -34,5 +34,9 @@ Inventory example:
|
|||||||
- { host: "server-2", path: "/opt/certs", concat: "pem" }
|
- { host: "server-2", path: "/opt/certs", concat: "pem" }
|
||||||
groups:
|
groups:
|
||||||
- { group: "cacert_clients", path: "/opt/certs" }
|
- { group: "cacert_clients", path: "/opt/certs" }
|
||||||
- { group: "mygroupname", path: "/opt/certs" }
|
- { group: "mygroupname1", path: "/opt/certs" }
|
||||||
|
|
||||||
|
cacert_per_host_certs:
|
||||||
|
groups:
|
||||||
|
- { group: "mygroupname1", path: "/opt/koji/certs", concat: "pem" }
|
||||||
|
|
||||||
|
@ -24,8 +24,8 @@ cacert_ca_trust_anchors_update: False
|
|||||||
# - { group: "mygroupname", path: "/opt/certs" }
|
# - { group: "mygroupname", path: "/opt/certs" }
|
||||||
#
|
#
|
||||||
#cacert_group_certs:
|
#cacert_group_certs:
|
||||||
# - name: mygroupcert
|
# - name: mygroupcert.example.com
|
||||||
# host_groups:
|
# append_groups:
|
||||||
# - consul
|
# - consul
|
||||||
# - patroni
|
# - patroni
|
||||||
# hosts:
|
# hosts:
|
||||||
@ -36,4 +36,10 @@ cacert_ca_trust_anchors_update: False
|
|||||||
# groups:
|
# groups:
|
||||||
# - { group: "cacert_clients", path: "/opt/certs" }
|
# - { group: "cacert_clients", path: "/opt/certs" }
|
||||||
# - { group: "mygroupname", path: "/opt/certs" }
|
# - { group: "mygroupname", path: "/opt/certs" }
|
||||||
|
#
|
||||||
|
#cacert_per_host_certs:
|
||||||
|
# groups:
|
||||||
|
# - { group: "mygroupname1", path: "/opt/certs" }
|
||||||
|
# - { group: "mygroupname1", path: "/opt/certs", concat: "pem" }
|
||||||
|
# - { group: "mygroupname2", path: "/opt/certs" }
|
||||||
|
# - { group: "mygroupname2", path: "/opt/certs", concat: "pem" }
|
||||||
|
@ -0,0 +1,2 @@
|
|||||||
|
---
|
||||||
|
dependencies: []
|
@ -1,6 +1,16 @@
|
|||||||
- name: Create CA {{ cacert_ca_name }}
|
- name: Create CA {{ cacert_ca_name }}
|
||||||
when: inventory_hostname in groups[cacert_ca_group]
|
when: inventory_hostname in groups[cacert_ca_group]
|
||||||
block:
|
block:
|
||||||
|
- name: CA and certs | Install cryptography library
|
||||||
|
dnf:
|
||||||
|
name: python-cryptography
|
||||||
|
state: present
|
||||||
|
|
||||||
|
- name: CA and certs | Check if ssl gen dir exist
|
||||||
|
file:
|
||||||
|
name: "{{ cacert_ssl_gen_path }}"
|
||||||
|
state: directory
|
||||||
|
|
||||||
- name: Generate an OpenSSL private CA key with the default values (4096 bits, RSA)
|
- name: Generate an OpenSSL private CA key with the default values (4096 bits, RSA)
|
||||||
community.crypto.openssl_privatekey:
|
community.crypto.openssl_privatekey:
|
||||||
path: "{{ cacert_ssl_gen_path }}/{{ cacert_ca_name }}.key"
|
path: "{{ cacert_ssl_gen_path }}/{{ cacert_ca_name }}.key"
|
||||||
@ -19,7 +29,7 @@
|
|||||||
key_usage_critical: true
|
key_usage_critical: true
|
||||||
common_name: "{{ cacert_ca_name }}"
|
common_name: "{{ cacert_ca_name }}"
|
||||||
register: cacert_ca_csr
|
register: cacert_ca_csr
|
||||||
|
|
||||||
- name: Generate a Self Signed OpenSSL CA certificate
|
- name: Generate a Self Signed OpenSSL CA certificate
|
||||||
community.crypto.x509_certificate:
|
community.crypto.x509_certificate:
|
||||||
path: "{{ cacert_ssl_gen_path }}/{{ cacert_ca_name }}.crt"
|
path: "{{ cacert_ssl_gen_path }}/{{ cacert_ca_name }}.crt"
|
||||||
@ -42,16 +52,19 @@
|
|||||||
set_fact:
|
set_fact:
|
||||||
cacert_ca_key: "{{ cacert_ca_key_b64.content | b64decode }}"
|
cacert_ca_key: "{{ cacert_ca_key_b64.content | b64decode }}"
|
||||||
cacert_ca_cert: "{{ cacert_ca_cert_b64.content | b64decode }}"
|
cacert_ca_cert: "{{ cacert_ca_cert_b64.content | b64decode }}"
|
||||||
delegate_to: "{{ item }}"
|
delegate_to: "{{ fact_item }}"
|
||||||
delegate_facts: true
|
delegate_facts: true
|
||||||
run_once: true
|
|
||||||
with_items:
|
with_items:
|
||||||
- "{{ groups[cacert_ca_group] | default([]) }}"
|
- "{{ groups[cacert_ca_group] | default([]) }}"
|
||||||
- "{{ groups[cacert_clients_group] | default([]) }}"
|
- "{{ groups[cacert_clients_group] | default([]) }}"
|
||||||
|
loop_control:
|
||||||
|
loop_var: fact_item
|
||||||
|
|
||||||
- name: Distribute CA certificate to hosts
|
- name: Distribute CA certificate to hosts
|
||||||
become: true
|
become: true
|
||||||
when: inventory_hostname in groups.cacert_clients
|
when:
|
||||||
|
- cacert_ca_copy_to.hosts is defined
|
||||||
|
- inventory_hostname in groups.cacert_clients
|
||||||
block:
|
block:
|
||||||
- name: CA and cert | Check if dest dir exist on remote host
|
- name: CA and cert | Check if dest dir exist on remote host
|
||||||
file:
|
file:
|
||||||
@ -83,7 +96,7 @@
|
|||||||
register: ca_trust_anchors
|
register: ca_trust_anchors
|
||||||
when:
|
when:
|
||||||
- inventory_hostname == host_item.host
|
- inventory_hostname == host_item.host
|
||||||
|
|
||||||
- name: Update CA trust
|
- name: Update CA trust
|
||||||
shell: update-ca-trust extract
|
shell: update-ca-trust extract
|
||||||
loop: "{{ cacert_ca_copy_to.hosts }}"
|
loop: "{{ cacert_ca_copy_to.hosts }}"
|
||||||
@ -96,7 +109,9 @@
|
|||||||
|
|
||||||
- name: Distribute CA certificate to groups
|
- name: Distribute CA certificate to groups
|
||||||
become: true
|
become: true
|
||||||
when: inventory_hostname in groups[cacert_clients_group]
|
when:
|
||||||
|
- cacert_ca_copy_to.groups is defined
|
||||||
|
- inventory_hostname in groups[cacert_clients_group]
|
||||||
block:
|
block:
|
||||||
- name: CA and cert | Check if dest dir exist on remote host in group
|
- name: CA and cert | Check if dest dir exist on remote host in group
|
||||||
file:
|
file:
|
||||||
|
@ -1,23 +1,23 @@
|
|||||||
- name: CA and certs | Generate CN certs and keys
|
- name: CA and certs | Generate CN certs and keys
|
||||||
when: inventory_hostname in groups[cacert_ca_group]
|
when: inventory_hostname in groups[cacert_ca_group]
|
||||||
block:
|
block:
|
||||||
- name: Generate an OpenSSL private client key with the default values (4096 bits, RSA)
|
- name: Generate an OpenSSL private client key {{ item.name }} with the default values (4096 bits, RSA)
|
||||||
community.crypto.openssl_privatekey:
|
community.crypto.openssl_privatekey:
|
||||||
path: "{{ cacert_ssl_gen_path }}/{{ item.name }}.key"
|
path: "{{ cacert_ssl_gen_path }}/{{ item.name }}.key"
|
||||||
when: cacert_cert is not defined
|
when: cacert_cert is not defined
|
||||||
register: cacert_client_key_gen
|
register: cacert_client_key_gen
|
||||||
|
|
||||||
- name: Generate subject_alt_ips
|
- name: Generate subject_alt_ips for {{ item.name }}
|
||||||
set_fact:
|
set_fact:
|
||||||
client_subject_alt_ips: "{{ item.subject_alt_ips | map('regex_replace', '^', 'IP:') | list }}"
|
client_subject_alt_ips: "{{ item.subject_alt_ips | map('regex_replace', '^', 'IP:') | list }}"
|
||||||
when: item.subject_alt_ips is defined
|
when: item.subject_alt_ips is defined
|
||||||
|
|
||||||
- name: Generate subject_alt_names
|
- name: Generate subject_alt_names for {{ item.name }}
|
||||||
set_fact:
|
set_fact:
|
||||||
client_subject_alt_names: "{{ item.subject_alt_names | map('regex_replace', '^', 'DNS:') | list }}"
|
client_subject_alt_names: "{{ item.subject_alt_names | map('regex_replace', '^', 'DNS:') | list }}"
|
||||||
when: item.subject_alt_names is defined
|
when: item.subject_alt_names is defined
|
||||||
|
|
||||||
- name: Generate an OpenSSL Certificate Signing Request for client
|
- name: Generate an OpenSSL Certificate Signing Request for client {{ item.name }}
|
||||||
community.crypto.openssl_csr:
|
community.crypto.openssl_csr:
|
||||||
path: "{{ cacert_ssl_gen_path }}/{{ item.name }}.csr"
|
path: "{{ cacert_ssl_gen_path }}/{{ item.name }}.csr"
|
||||||
privatekey_path: "{{ cacert_ssl_gen_path }}/{{ item.name }}.key"
|
privatekey_path: "{{ cacert_ssl_gen_path }}/{{ item.name }}.key"
|
||||||
@ -27,7 +27,7 @@
|
|||||||
- item.subject_alt_names is not defined
|
- item.subject_alt_names is not defined
|
||||||
- item.subject_alt_ips is not defined
|
- item.subject_alt_ips is not defined
|
||||||
|
|
||||||
- name: Generate an OpenSSL Certificate Signing Request for client with subject_alt_name
|
- name: Generate an OpenSSL Certificate Signing Request for client {{ item.name }} with subject_alt_name
|
||||||
community.crypto.openssl_csr:
|
community.crypto.openssl_csr:
|
||||||
path: "{{ cacert_ssl_gen_path }}/{{ item.name }}.csr"
|
path: "{{ cacert_ssl_gen_path }}/{{ item.name }}.csr"
|
||||||
privatekey_path: "{{ cacert_ssl_gen_path }}/{{ item.name }}.key"
|
privatekey_path: "{{ cacert_ssl_gen_path }}/{{ item.name }}.key"
|
||||||
@ -36,7 +36,7 @@
|
|||||||
register: cacert_client_csr
|
register: cacert_client_csr
|
||||||
when: item.subject_alt_names is defined or item.subject_alt_ips is defined
|
when: item.subject_alt_names is defined or item.subject_alt_ips is defined
|
||||||
|
|
||||||
- name: Generate an OpenSSL certificate for client signed with your own CA certificate
|
- name: Generate an OpenSSL certificate for client {{ item.name }} signed with your own CA certificate
|
||||||
community.crypto.x509_certificate:
|
community.crypto.x509_certificate:
|
||||||
path: "{{ cacert_ssl_gen_path }}/{{ item.name }}.crt"
|
path: "{{ cacert_ssl_gen_path }}/{{ item.name }}.crt"
|
||||||
csr_path: "{{ cacert_ssl_gen_path }}/{{ item.name }}.csr"
|
csr_path: "{{ cacert_ssl_gen_path }}/{{ item.name }}.csr"
|
||||||
@ -56,40 +56,41 @@
|
|||||||
content: "{{ concated_crt_key.stdout }}"
|
content: "{{ concated_crt_key.stdout }}"
|
||||||
dest: "{{ cacert_ssl_gen_path }}/{{ item.name }}.pem"
|
dest: "{{ cacert_ssl_gen_path }}/{{ item.name }}.pem"
|
||||||
|
|
||||||
- name: Get CN key content
|
- name: Get CN key {{ item.name }} content
|
||||||
slurp:
|
slurp:
|
||||||
src: "{{ cacert_ssl_gen_path }}/{{ item.name }}.key"
|
src: "{{ cacert_ssl_gen_path }}/{{ item.name }}.key"
|
||||||
register: cacert_cn_certs_key_b64
|
register: cacert_cn_certs_key_b64
|
||||||
|
|
||||||
- name: Get CN cert content
|
- name: Get CN cert {{ item.name }} content
|
||||||
slurp:
|
slurp:
|
||||||
src: "{{ cacert_ssl_gen_path }}/{{ item.name }}.crt"
|
src: "{{ cacert_ssl_gen_path }}/{{ item.name }}.crt"
|
||||||
register: cacert_cn_certs_cert_b64
|
register: cacert_cn_certs_cert_b64
|
||||||
|
|
||||||
- name: Get CN cert and key concat content
|
- name: Get CN cert and key concat {{ item.name }} content
|
||||||
slurp:
|
slurp:
|
||||||
src: "{{ cacert_ssl_gen_path }}/{{ item.name }}.pem"
|
src: "{{ cacert_ssl_gen_path }}/{{ item.name }}.pem"
|
||||||
register: cacert_cn_certs_concat_b64
|
register: cacert_cn_certs_concat_b64
|
||||||
|
|
||||||
- name: Set facts about key and cert
|
- name: Set facts about {{ item.name }} key and cert
|
||||||
set_fact:
|
set_fact:
|
||||||
cacert_cn_certs_key: "{{ cacert_cn_certs_key_b64.content | b64decode }}"
|
cacert_cn_certs_key: "{{ cacert_cn_certs_key_b64.content | b64decode }}"
|
||||||
cacert_cn_certs_cert: "{{ cacert_cn_certs_cert_b64.content | b64decode }}"
|
cacert_cn_certs_cert: "{{ cacert_cn_certs_cert_b64.content | b64decode }}"
|
||||||
cacert_cn_certs_concat: "{{ cacert_cn_certs_concat_b64.content | b64decode }}"
|
cacert_cn_certs_concat: "{{ cacert_cn_certs_concat_b64.content | b64decode }}"
|
||||||
delegate_to: "{{ fact_item }}"
|
delegate_to: "{{ fact_item }}"
|
||||||
delegate_facts: true
|
delegate_facts: true
|
||||||
run_once: true
|
|
||||||
with_items:
|
with_items:
|
||||||
- "{{ groups[cacert_ca_group] | default([]) }}"
|
- "{{ groups[cacert_ca_group] | default([]) }}"
|
||||||
- "{{ groups[cacert_clients_group] | default([]) }}"
|
- "{{ groups[cacert_clients_group] | default([]) }}"
|
||||||
loop_control:
|
loop_control:
|
||||||
loop_var: fact_item
|
loop_var: fact_item
|
||||||
|
|
||||||
- name: Distribute CN certificates
|
- name: Distribute CN certificates to hosts
|
||||||
become: true
|
become: true
|
||||||
when: inventory_hostname in groups[cacert_clients_group]
|
when:
|
||||||
|
- item.hosts is defined
|
||||||
|
- inventory_hostname in groups[cacert_clients_group]
|
||||||
block:
|
block:
|
||||||
- name: CA and cert | Check if dest dir exist on remote hosts
|
- name: CA and cert | Check if dest dir exist on remote host
|
||||||
file:
|
file:
|
||||||
name: "{{ host_item.path }}"
|
name: "{{ host_item.path }}"
|
||||||
state: directory
|
state: directory
|
||||||
@ -99,7 +100,46 @@
|
|||||||
when:
|
when:
|
||||||
- inventory_hostname == host_item.host
|
- inventory_hostname == host_item.host
|
||||||
|
|
||||||
- name: CA and cert | Check if dest dir exist on remote hosts for groups
|
- name: Put CN key {{ item.name }} for host
|
||||||
|
copy:
|
||||||
|
content: "{{ cacert_cn_certs_key }}"
|
||||||
|
dest: "{{ host_item.path }}/{{ host_item.name | default(item.name) }}.key"
|
||||||
|
loop: "{{ item.hosts }}"
|
||||||
|
loop_control:
|
||||||
|
loop_var: host_item
|
||||||
|
when:
|
||||||
|
- host_item.concat is not defined
|
||||||
|
- inventory_hostname == host_item.host
|
||||||
|
|
||||||
|
- name: Put CN cert {{ item.name }} for host
|
||||||
|
copy:
|
||||||
|
content: "{{ cacert_cn_certs_cert }}"
|
||||||
|
dest: "{{ host_item.path }}/{{ host_item.name | default(item.name) }}.crt"
|
||||||
|
loop: "{{ item.hosts }}"
|
||||||
|
loop_control:
|
||||||
|
loop_var: host_item
|
||||||
|
when:
|
||||||
|
- host_item.concat is not defined
|
||||||
|
- inventory_hostname == host_item.host
|
||||||
|
|
||||||
|
- name: Put CN key and cert concat {{ item.name }} for host
|
||||||
|
copy:
|
||||||
|
content: "{{ cacert_cn_certs_concat }}"
|
||||||
|
dest: "{{ host_item.path }}/{{ host_item.name | default(item.name) }}.{{ host_item.concat | default('pem') }}"
|
||||||
|
loop: "{{ item.hosts }}"
|
||||||
|
loop_control:
|
||||||
|
loop_var: host_item
|
||||||
|
when:
|
||||||
|
- host_item.concat is defined
|
||||||
|
- inventory_hostname == host_item.host
|
||||||
|
|
||||||
|
- name: Distribute CN certificates to groups
|
||||||
|
become: true
|
||||||
|
when:
|
||||||
|
- item.groups is defined
|
||||||
|
- inventory_hostname in groups[cacert_clients_group]
|
||||||
|
block:
|
||||||
|
- name: CA and cert | Check if dest dir exist on remote host for groups
|
||||||
file:
|
file:
|
||||||
name: "{{ group_item.path }}"
|
name: "{{ group_item.path }}"
|
||||||
state: directory
|
state: directory
|
||||||
@ -109,37 +149,7 @@
|
|||||||
when:
|
when:
|
||||||
- "inventory_hostname in (groups[group_item.group] | map('extract', hostvars, ['inventory_hostname']) | join(','))"
|
- "inventory_hostname in (groups[group_item.group] | map('extract', hostvars, ['inventory_hostname']) | join(','))"
|
||||||
|
|
||||||
- name: Put CN key for host
|
- name: Put CN key {{ item.name }} for group
|
||||||
copy:
|
|
||||||
content: "{{ cacert_cn_certs_key }}"
|
|
||||||
dest: "{{ host_item.path }}/{{ host_item.name | default(item.name) }}.key"
|
|
||||||
loop: "{{ item.hosts }}"
|
|
||||||
loop_control:
|
|
||||||
loop_var: host_item
|
|
||||||
when:
|
|
||||||
- inventory_hostname == host_item.host
|
|
||||||
|
|
||||||
- name: Put CN cert for host
|
|
||||||
copy:
|
|
||||||
content: "{{ cacert_cn_certs_cert }}"
|
|
||||||
dest: "{{ host_item.path }}/{{ host_item.name | default(item.name) }}.crt"
|
|
||||||
loop: "{{ item.hosts }}"
|
|
||||||
loop_control:
|
|
||||||
loop_var: host_item
|
|
||||||
when:
|
|
||||||
- inventory_hostname == host_item.host
|
|
||||||
|
|
||||||
- name: Put CN key and cert concat for host
|
|
||||||
copy:
|
|
||||||
content: "{{ cacert_cn_certs_concat }}"
|
|
||||||
dest: "{{ host_item.path }}/{{ host_item.name | default(item.name) }}.{{ host_item.concat | default('pem') }}"
|
|
||||||
loop: "{{ item.hosts }}"
|
|
||||||
loop_control:
|
|
||||||
loop_var: host_item
|
|
||||||
when:
|
|
||||||
- inventory_hostname == host_item.host
|
|
||||||
|
|
||||||
- name: Put CN key for group
|
|
||||||
copy:
|
copy:
|
||||||
content: "{{ cacert_cn_certs_key }}"
|
content: "{{ cacert_cn_certs_key }}"
|
||||||
dest: "{{ group_item.path }}/{{ group_item.name | default(item.name) }}.key"
|
dest: "{{ group_item.path }}/{{ group_item.name | default(item.name) }}.key"
|
||||||
@ -147,9 +157,10 @@
|
|||||||
loop_control:
|
loop_control:
|
||||||
loop_var: group_item
|
loop_var: group_item
|
||||||
when:
|
when:
|
||||||
|
- group_item.concat is not defined
|
||||||
- "inventory_hostname in (groups[group_item.group] | map('extract', hostvars, ['inventory_hostname']) | join(','))"
|
- "inventory_hostname in (groups[group_item.group] | map('extract', hostvars, ['inventory_hostname']) | join(','))"
|
||||||
|
|
||||||
- name: Put CN cert for group
|
- name: Put CN cert {{ item.name }} for group
|
||||||
copy:
|
copy:
|
||||||
content: "{{ cacert_cn_certs_cert }}"
|
content: "{{ cacert_cn_certs_cert }}"
|
||||||
dest: "{{ group_item.path }}/{{ group_item.name | default(item.name) }}.crt"
|
dest: "{{ group_item.path }}/{{ group_item.name | default(item.name) }}.crt"
|
||||||
@ -157,9 +168,10 @@
|
|||||||
loop_control:
|
loop_control:
|
||||||
loop_var: group_item
|
loop_var: group_item
|
||||||
when:
|
when:
|
||||||
|
- group_item.concat is not defined
|
||||||
- "inventory_hostname in (groups[group_item.group] | map('extract', hostvars, ['inventory_hostname']) | join(','))"
|
- "inventory_hostname in (groups[group_item.group] | map('extract', hostvars, ['inventory_hostname']) | join(','))"
|
||||||
|
|
||||||
- name: Put CN key and cert concat for group
|
- name: Put CN key and cert concat {{ item.name }} for group
|
||||||
copy:
|
copy:
|
||||||
content: "{{ cacert_cn_certs_concat }}"
|
content: "{{ cacert_cn_certs_concat }}"
|
||||||
dest: "{{ group_item.path }}/{{ group_item.name | default(item.name) }}.{{ group_item.concat | default('pem') }}"
|
dest: "{{ group_item.path }}/{{ group_item.name | default(item.name) }}.{{ group_item.concat | default('pem') }}"
|
||||||
@ -167,4 +179,5 @@
|
|||||||
loop_control:
|
loop_control:
|
||||||
loop_var: group_item
|
loop_var: group_item
|
||||||
when:
|
when:
|
||||||
|
- group_item.concat is defined
|
||||||
- "inventory_hostname in (groups[group_item.group] | map('extract', hostvars, ['inventory_hostname']) | join(','))"
|
- "inventory_hostname in (groups[group_item.group] | map('extract', hostvars, ['inventory_hostname']) | join(','))"
|
||||||
|
@ -1,7 +1,8 @@
|
|||||||
- name: CA and certs | Generate group certs and keys
|
- name: CA and certs | Generate group certs and keys
|
||||||
when: inventory_hostname in groups[cacert_ca_group]
|
when:
|
||||||
|
- inventory_hostname in groups[cacert_ca_group]
|
||||||
block:
|
block:
|
||||||
- name: Generate subject_alt_ips
|
- name: Generate subject_alt_ips for {{ item.name }}
|
||||||
set_fact:
|
set_fact:
|
||||||
client_subject_alt_ips: "{{ groups[group_item] | map('extract', hostvars, ['ansible_host']) | map('regex_replace', '^', 'IP:') | list }}"
|
client_subject_alt_ips: "{{ groups[group_item] | map('extract', hostvars, ['ansible_host']) | map('regex_replace', '^', 'IP:') | list }}"
|
||||||
loop: "{{ item.append_groups }}"
|
loop: "{{ item.append_groups }}"
|
||||||
@ -13,7 +14,7 @@
|
|||||||
- debug:
|
- debug:
|
||||||
msg: "{{ client_subject_alt_ips }}"
|
msg: "{{ client_subject_alt_ips }}"
|
||||||
|
|
||||||
- name: Generate subject_alt_names
|
- name: Generate subject_alt_names for {{ item.name }}
|
||||||
set_fact:
|
set_fact:
|
||||||
client_subject_alt_names: "{{ groups[group_item] | map('extract', hostvars, ['inventory_hostname']) | map('regex_replace', '^', 'DNS:') | list }}"
|
client_subject_alt_names: "{{ groups[group_item] | map('extract', hostvars, ['inventory_hostname']) | map('regex_replace', '^', 'DNS:') | list }}"
|
||||||
loop: "{{ item.append_groups }}"
|
loop: "{{ item.append_groups }}"
|
||||||
@ -25,12 +26,12 @@
|
|||||||
- debug:
|
- debug:
|
||||||
msg: "{{ client_subject_alt_names }}"
|
msg: "{{ client_subject_alt_names }}"
|
||||||
|
|
||||||
- name: Generate an OpenSSL private client key with the default values (4096 bits, RSA)
|
- name: Generate an OpenSSL private client {{ item.name }} key with the default values (4096 bits, RSA)
|
||||||
community.crypto.openssl_privatekey:
|
community.crypto.openssl_privatekey:
|
||||||
path: "{{ cacert_ssl_gen_path }}/{{ item.name }}.key"
|
path: "{{ cacert_ssl_gen_path }}/{{ item.name }}.key"
|
||||||
register: cacert_client_key_gen
|
register: cacert_client_key_gen
|
||||||
|
|
||||||
- name: Generate an OpenSSL Certificate Signing Request for client with subject_alt_name
|
- name: Generate an OpenSSL Certificate Signing Request for client {{ item.name }} with subject_alt_name
|
||||||
community.crypto.openssl_csr:
|
community.crypto.openssl_csr:
|
||||||
path: "{{ cacert_ssl_gen_path }}/{{ item.name }}.csr"
|
path: "{{ cacert_ssl_gen_path }}/{{ item.name }}.csr"
|
||||||
privatekey_path: "{{ cacert_ssl_gen_path }}/{{ item.name }}.key"
|
privatekey_path: "{{ cacert_ssl_gen_path }}/{{ item.name }}.key"
|
||||||
@ -38,7 +39,7 @@
|
|||||||
subject_alt_name: "{{ ((client_subject_alt_ips | default([])) + (client_subject_alt_names | default([]))) }}"
|
subject_alt_name: "{{ ((client_subject_alt_ips | default([])) + (client_subject_alt_names | default([]))) }}"
|
||||||
register: cacert_client_csr
|
register: cacert_client_csr
|
||||||
|
|
||||||
- name: Generate an OpenSSL certificate for client signed with your own CA certificate
|
- name: Generate an OpenSSL certificate for client {{ item.name }} signed with your own CA certificate
|
||||||
community.crypto.x509_certificate:
|
community.crypto.x509_certificate:
|
||||||
path: "{{ cacert_ssl_gen_path }}/{{ item.name }}.crt"
|
path: "{{ cacert_ssl_gen_path }}/{{ item.name }}.crt"
|
||||||
csr_path: "{{ cacert_ssl_gen_path }}/{{ item.name }}.csr"
|
csr_path: "{{ cacert_ssl_gen_path }}/{{ item.name }}.csr"
|
||||||
@ -58,38 +59,39 @@
|
|||||||
content: "{{ concated_crt_key.stdout }}"
|
content: "{{ concated_crt_key.stdout }}"
|
||||||
dest: "{{ cacert_ssl_gen_path }}/{{ item.name }}.pem"
|
dest: "{{ cacert_ssl_gen_path }}/{{ item.name }}.pem"
|
||||||
|
|
||||||
- name: Get group key content
|
- name: Get group key {{ item.name }} content
|
||||||
slurp:
|
slurp:
|
||||||
src: "{{ cacert_ssl_gen_path }}/{{ item.name }}.key"
|
src: "{{ cacert_ssl_gen_path }}/{{ item.name }}.key"
|
||||||
register: cacert_group_certs_key_b64
|
register: cacert_group_certs_key_b64
|
||||||
|
|
||||||
- name: Get group cert content
|
- name: Get group cert {{ item.name }} content
|
||||||
slurp:
|
slurp:
|
||||||
src: "{{ cacert_ssl_gen_path }}/{{ item.name }}.crt"
|
src: "{{ cacert_ssl_gen_path }}/{{ item.name }}.crt"
|
||||||
register: cacert_group_certs_cert_b64
|
register: cacert_group_certs_cert_b64
|
||||||
|
|
||||||
- name: Get group cert and key concat content
|
- name: Get group cert and key concat {{ item.name }} content
|
||||||
slurp:
|
slurp:
|
||||||
src: "{{ cacert_ssl_gen_path }}/{{ item.name }}.pem"
|
src: "{{ cacert_ssl_gen_path }}/{{ item.name }}.pem"
|
||||||
register: cacert_group_certs_concat_b64
|
register: cacert_group_certs_concat_b64
|
||||||
|
|
||||||
- name: Set facts about key and cert
|
- name: Set facts about {{ item.name }} key and cert
|
||||||
set_fact:
|
set_fact:
|
||||||
cacert_group_certs_key: "{{ cacert_group_certs_key_b64.content | b64decode }}"
|
cacert_group_certs_key: "{{ cacert_group_certs_key_b64.content | b64decode }}"
|
||||||
cacert_group_certs_cert: "{{ cacert_group_certs_cert_b64.content | b64decode }}"
|
cacert_group_certs_cert: "{{ cacert_group_certs_cert_b64.content | b64decode }}"
|
||||||
cacert_group_certs_concat: "{{ cacert_group_certs_concat_b64.content | b64decode }}"
|
cacert_group_certs_concat: "{{ cacert_group_certs_concat_b64.content | b64decode }}"
|
||||||
delegate_to: "{{ fact_item }}"
|
delegate_to: "{{ fact_item }}"
|
||||||
delegate_facts: true
|
delegate_facts: true
|
||||||
run_once: true
|
|
||||||
with_items:
|
with_items:
|
||||||
- "{{ groups[cacert_ca_group] | default([]) }}"
|
- "{{ groups[cacert_ca_group] | default([]) }}"
|
||||||
- "{{ groups[cacert_clients_group] | default([]) }}"
|
- "{{ groups[cacert_clients_group] | default([]) }}"
|
||||||
loop_control:
|
loop_control:
|
||||||
loop_var: fact_item
|
loop_var: fact_item
|
||||||
|
|
||||||
- name: Distribute group certificates
|
- name: Distribute group certificates for hosts
|
||||||
become: true
|
become: true
|
||||||
when: inventory_hostname in groups[cacert_clients_group]
|
when:
|
||||||
|
- item.hosts is defined
|
||||||
|
- inventory_hostname in groups[cacert_clients_group]
|
||||||
block:
|
block:
|
||||||
- name: CA and cert | Check if dest dir exist on remote host
|
- name: CA and cert | Check if dest dir exist on remote host
|
||||||
file:
|
file:
|
||||||
@ -101,6 +103,45 @@
|
|||||||
when:
|
when:
|
||||||
- inventory_hostname == host_item.host
|
- inventory_hostname == host_item.host
|
||||||
|
|
||||||
|
- name: Put group key {{ item.name }} for host
|
||||||
|
copy:
|
||||||
|
content: "{{ cacert_group_certs_key }}"
|
||||||
|
dest: "{{ host_item.path }}/{{ host_item.name | default(item.name) }}.key"
|
||||||
|
loop: "{{ item.hosts }}"
|
||||||
|
loop_control:
|
||||||
|
loop_var: host_item
|
||||||
|
when:
|
||||||
|
- host_item.concat is not defined
|
||||||
|
- inventory_hostname == host_item.host
|
||||||
|
|
||||||
|
- name: Put group cert {{ item.name }} for host
|
||||||
|
copy:
|
||||||
|
content: "{{ cacert_group_certs_cert }}"
|
||||||
|
dest: "{{ host_item.path }}/{{ host_item.name | default(item.name) }}.crt"
|
||||||
|
loop: "{{ item.hosts }}"
|
||||||
|
loop_control:
|
||||||
|
loop_var: host_item
|
||||||
|
when:
|
||||||
|
- host_item.concat is not defined
|
||||||
|
- inventory_hostname == host_item.host
|
||||||
|
|
||||||
|
- name: Put group key and cert concat {{ item.name }} for host
|
||||||
|
copy:
|
||||||
|
content: "{{ cacert_group_certs_concat }}"
|
||||||
|
dest: "{{ host_item.path }}/{{ host_item.name | default(item.name) }}.{{ host_item.concat | default('pem') }}"
|
||||||
|
loop: "{{ item.hosts }}"
|
||||||
|
loop_control:
|
||||||
|
loop_var: host_item
|
||||||
|
when:
|
||||||
|
- host_item.concat is defined
|
||||||
|
- inventory_hostname == host_item.host
|
||||||
|
|
||||||
|
- name: Distribute group certificates for groups
|
||||||
|
become: true
|
||||||
|
when:
|
||||||
|
- item.groups is defined
|
||||||
|
- inventory_hostname in groups[cacert_clients_group]
|
||||||
|
block:
|
||||||
- name: CA and cert | Check if dest dir exist on remote host for group
|
- name: CA and cert | Check if dest dir exist on remote host for group
|
||||||
file:
|
file:
|
||||||
name: "{{ group_item.path }}"
|
name: "{{ group_item.path }}"
|
||||||
@ -111,37 +152,7 @@
|
|||||||
when:
|
when:
|
||||||
- "inventory_hostname in (groups[group_item.group] | map('extract', hostvars, ['inventory_hostname']) | join(','))"
|
- "inventory_hostname in (groups[group_item.group] | map('extract', hostvars, ['inventory_hostname']) | join(','))"
|
||||||
|
|
||||||
- name: Put group key for host
|
- name: Put group key {{ item.name }} for group
|
||||||
copy:
|
|
||||||
content: "{{ cacert_group_certs_key }}"
|
|
||||||
dest: "{{ host_item.path }}/{{ host_item.name | default(item.name) }}.key"
|
|
||||||
loop: "{{ item.hosts }}"
|
|
||||||
loop_control:
|
|
||||||
loop_var: host_item
|
|
||||||
when:
|
|
||||||
- inventory_hostname == host_item.host
|
|
||||||
|
|
||||||
- name: Put group cert for host
|
|
||||||
copy:
|
|
||||||
content: "{{ cacert_group_certs_cert }}"
|
|
||||||
dest: "{{ host_item.path }}/{{ host_item.name | default(item.name) }}.crt"
|
|
||||||
loop: "{{ item.hosts }}"
|
|
||||||
loop_control:
|
|
||||||
loop_var: host_item
|
|
||||||
when:
|
|
||||||
- inventory_hostname == host_item.host
|
|
||||||
|
|
||||||
- name: Put group key and cert concat for host
|
|
||||||
copy:
|
|
||||||
content: "{{ cacert_group_certs_concat }}"
|
|
||||||
dest: "{{ host_item.path }}/{{ host_item.name | default(item.name) }}.{{ host_item.concat | default('pem') }}"
|
|
||||||
loop: "{{ item.hosts }}"
|
|
||||||
loop_control:
|
|
||||||
loop_var: host_item
|
|
||||||
when:
|
|
||||||
- inventory_hostname == host_item.host
|
|
||||||
|
|
||||||
- name: Put group key for group
|
|
||||||
copy:
|
copy:
|
||||||
content: "{{ cacert_group_certs_key }}"
|
content: "{{ cacert_group_certs_key }}"
|
||||||
dest: "{{ group_item.path }}/{{ group_item.name | default(item.name) }}.key"
|
dest: "{{ group_item.path }}/{{ group_item.name | default(item.name) }}.key"
|
||||||
@ -149,9 +160,10 @@
|
|||||||
loop_control:
|
loop_control:
|
||||||
loop_var: group_item
|
loop_var: group_item
|
||||||
when:
|
when:
|
||||||
|
- group_item.concat is not defined
|
||||||
- "inventory_hostname in (groups[group_item.group] | map('extract', hostvars, ['inventory_hostname']) | join(','))"
|
- "inventory_hostname in (groups[group_item.group] | map('extract', hostvars, ['inventory_hostname']) | join(','))"
|
||||||
|
|
||||||
- name: Put group cert for group
|
- name: Put group cert {{ item.name }} for group
|
||||||
copy:
|
copy:
|
||||||
content: "{{ cacert_group_certs_cert }}"
|
content: "{{ cacert_group_certs_cert }}"
|
||||||
dest: "{{ group_item.path }}/{{ group_item.name | default(item.name) }}.crt"
|
dest: "{{ group_item.path }}/{{ group_item.name | default(item.name) }}.crt"
|
||||||
@ -159,9 +171,10 @@
|
|||||||
loop_control:
|
loop_control:
|
||||||
loop_var: group_item
|
loop_var: group_item
|
||||||
when:
|
when:
|
||||||
|
- group_item.concat is not defined
|
||||||
- "inventory_hostname in (groups[group_item.group] | map('extract', hostvars, ['inventory_hostname']) | join(','))"
|
- "inventory_hostname in (groups[group_item.group] | map('extract', hostvars, ['inventory_hostname']) | join(','))"
|
||||||
|
|
||||||
- name: Put group key and cert concat for group
|
- name: Put group key and cert concat {{ item.name }} for group
|
||||||
copy:
|
copy:
|
||||||
content: "{{ cacert_group_certs_concat }}"
|
content: "{{ cacert_group_certs_concat }}"
|
||||||
dest: "{{ group_item.path }}/{{ group_item.name | default(item.name) }}.{{ group_item.concat | default('pem') }}"
|
dest: "{{ group_item.path }}/{{ group_item.name | default(item.name) }}.{{ group_item.concat | default('pem') }}"
|
||||||
@ -169,5 +182,6 @@
|
|||||||
loop_control:
|
loop_control:
|
||||||
loop_var: group_item
|
loop_var: group_item
|
||||||
when:
|
when:
|
||||||
|
- group_item.concat is defined
|
||||||
- "inventory_hostname in (groups[group_item.group] | map('extract', hostvars, ['inventory_hostname']) | join(','))"
|
- "inventory_hostname in (groups[group_item.group] | map('extract', hostvars, ['inventory_hostname']) | join(','))"
|
||||||
|
|
||||||
|
@ -1,21 +1,23 @@
|
|||||||
- name: CA and certs | Check if ssl gen dir exist
|
|
||||||
file:
|
|
||||||
name: "{{ cacert_ssl_gen_path }}"
|
|
||||||
state: directory
|
|
||||||
when:
|
|
||||||
- inventory_hostname in groups[cacert_ca_group]
|
|
||||||
|
|
||||||
- name: CA and certs | Include CA
|
- name: CA and certs | Include CA
|
||||||
include_tasks: ca.yaml
|
include_tasks: ca.yaml
|
||||||
|
|
||||||
- name: CA and certs | Include CN certs
|
- name: CA and certs | Include CN certs
|
||||||
include_tasks: cn_certs.yaml
|
include_tasks: cn_certs.yaml
|
||||||
loop: "{{ cacert_cn_certs }}"
|
loop: "{{ cacert_cn_certs }}"
|
||||||
when:
|
when:
|
||||||
- cacert_cn_certs is defined
|
- cacert_cn_certs is defined
|
||||||
|
|
||||||
- name: CA and certs | Include group certs
|
- name: CA and certs | Include group certs
|
||||||
include_tasks: group_certs.yaml
|
include_tasks: group_certs.yaml
|
||||||
loop: "{{ cacert_group_certs }}"
|
loop: "{{ cacert_group_certs }}"
|
||||||
when:
|
when:
|
||||||
- cacert_group_certs is defined
|
- cacert_group_certs is defined
|
||||||
|
|
||||||
|
- name: CA and certs | Include per host certs for group
|
||||||
|
include_tasks: per_host_for_group_certs.yaml
|
||||||
|
loop: "{{ cacert_per_host_certs.groups }}"
|
||||||
|
loop_control:
|
||||||
|
loop_var: per_host_for_group_item
|
||||||
|
when:
|
||||||
|
- cacert_per_host_certs.groups is defined
|
||||||
|
|
||||||
|
37
tasks/per_host_for_group_certs.yaml
Normal file
37
tasks/per_host_for_group_certs.yaml
Normal file
@ -0,0 +1,37 @@
|
|||||||
|
- name: Construct facts for hosts from group {{ groups[item.group] }}
|
||||||
|
when: inventory_hostname in groups[cacert_ca_group]
|
||||||
|
block:
|
||||||
|
- name: Load cacert variables for Koji
|
||||||
|
include_vars: "{{ lookup('ansible.builtin.first_found', params) }}"
|
||||||
|
vars:
|
||||||
|
params:
|
||||||
|
files:
|
||||||
|
- "cacert.yaml"
|
||||||
|
paths:
|
||||||
|
- "vars"
|
||||||
|
|
||||||
|
- name: Construct facts for hosts from group {{ groups[item.group] }}
|
||||||
|
set_fact:
|
||||||
|
iter_hosts: "{{ temp_hosts }}"
|
||||||
|
vars:
|
||||||
|
temp_hosts: >-
|
||||||
|
[{%- for host in groups[per_host_for_group_item.group] -%}
|
||||||
|
{"name": "{{ host }}", "hosts": [{"host": "{{ host }}", "path": "{{ per_host_for_group_item.path }}"{{ ',"concat": "' ~ per_host_for_group_item.concat ~ '"' if per_host_for_group_item.concat }} }{{ "" if loop.last else "," }}]}
|
||||||
|
{%- endfor -%}]
|
||||||
|
delegate_to: "{{ per_host_for_group_fact_item }}"
|
||||||
|
delegate_facts: true
|
||||||
|
with_items:
|
||||||
|
- "{{ groups[cacert_ca_group] | default([]) }}"
|
||||||
|
- "{{ groups[cacert_clients_group] | default([]) }}"
|
||||||
|
loop_control:
|
||||||
|
loop_var: per_host_for_group_fact_item
|
||||||
|
|
||||||
|
- debug:
|
||||||
|
msg: "{{ iter_hosts }}"
|
||||||
|
|
||||||
|
- name: Create certificate for hosts in {{cn_group_item.group }}
|
||||||
|
when: inventory_hostname in groups[cacert_clients_group]
|
||||||
|
block:
|
||||||
|
- name: Test
|
||||||
|
include_tasks: cn_certs.yaml
|
||||||
|
loop: "{{ iter_hosts }}"
|
Loading…
x
Reference in New Issue
Block a user