|
| 1 | +--- |
| 2 | +- name: "Create vault-snapshot system user" |
| 3 | + user: |
| 4 | + name: vault-snapshot |
| 5 | + system: true |
| 6 | + shell: "/usr/bin/bash" |
| 7 | + group: vault |
| 8 | + createhome: false |
| 9 | + home: "{{ __hs_vault_snapshot_home_dir }}" |
| 10 | + password: >- |
| 11 | + {{ lookup('community.general.random_string', length=32, special=false) }} |
| 12 | +
|
| 13 | +
|
| 14 | +- name: "Create vault snapshot user home directory" |
| 15 | + file: |
| 16 | + path: "{{ __hs_vault_snapshot_home_dir }}" |
| 17 | + state: directory |
| 18 | + owner: vault-snapshot |
| 19 | + group: vault |
| 20 | + mode: 0700 |
| 21 | + |
| 22 | +- name: "Authorize snapshot user keys" |
| 23 | + ansible.posix.authorized_key: |
| 24 | + user: vault-snapshot |
| 25 | + key: "{{ _current_public_key }}" |
| 26 | + exclusive: false |
| 27 | + manage_dir: true |
| 28 | + loop: "{{ hs_vault_addon_snapshot_authorized_keys }}" |
| 29 | + loop_control: |
| 30 | + loop_var: _current_public_key |
| 31 | + |
| 32 | +- name: "[LOCAL] Render {{ _current_conf_addon }} addon" # noqa risky-file-permissions name[template] |
| 33 | + copy: |
| 34 | + src: "{{ role_path }}/files/{{ _current_conf_addon }}/" |
| 35 | + dest: "{{ hs_vault_terraform_work_dir }}/vault_addon_{{ _current_conf_addon }}/" |
| 36 | + delegate_to: localhost |
| 37 | + become: false |
| 38 | + when: |
| 39 | + - __hs_vault_is_first_master |
| 40 | + |
| 41 | +- name: "[LOCAL] Render backend tf file" |
| 42 | + template: |
| 43 | + src: "tf_backend_{{ hs_vault_terraform_backend_type }}.tf.j2" |
| 44 | + dest: "{{ hs_vault_terraform_work_dir }}/vault_addon_{{ _current_conf_addon }}/backend.tf" |
| 45 | + mode: 0644 |
| 46 | + delegate_to: localhost |
| 47 | + become: false |
| 48 | + when: |
| 49 | + - __hs_vault_is_first_master |
| 50 | + - hs_vault_terraform_backend_type is defined |
| 51 | + - (hs_vault_terraform_backend_type | length) > 0 |
| 52 | + - hs_vault_terraform_backend_type in ['s3'] |
| 53 | + |
| 54 | +- name: "[LOCAL] Apply {{ _current_conf_addon }} addon" # noqa name[template] |
| 55 | + cloud.terraform.terraform: |
| 56 | + project_path: "{{ hs_vault_terraform_work_dir }}/vault_addon_{{ _current_conf_addon }}" |
| 57 | + state: "present" # noqa args |
| 58 | + force_init: true |
| 59 | + backend_config: "{{ hs_vault_terraform_backend_config }}" |
| 60 | + init_reconfigure: true |
| 61 | + provider_upgrade: "{{ hs_tf_provider_upgrade | default(true) }}" |
| 62 | + workspace: "{{ hs_vault_cluster_name }}" |
| 63 | + environment: |
| 64 | + VAULT_ADDR: "{{ hs_vault_external_url }}" |
| 65 | + VAULT_TOKEN: "{{ vault_init_content.root_token }}" |
| 66 | + VAULT_CACERT: "{{ hs_vault_use_custom_ca | ternary(hs_vault_local_ca_cert, '') }}" |
| 67 | + TF_CLI_ARGS: "" |
| 68 | + TF_CLI_ARGS_init: "" |
| 69 | + TF_CLI_ARGS_plan: "" |
| 70 | + TF_CLI_ARGS_apply: "" |
| 71 | + TF_CLI_ARGS_destroy: "" |
| 72 | + register: tf_result |
| 73 | + throttle: 1 |
| 74 | + delegate_to: localhost |
| 75 | + become: false |
| 76 | + when: |
| 77 | + - __hs_vault_is_first_master |
| 78 | + |
| 79 | +- name: "[LOCAL] Render {{ _current_conf_addon }} addon outputs" # noqa name[template] |
| 80 | + copy: |
| 81 | + dest: "{{ hs_vault_local_secret_dir }}/vault_addon_{{ _current_conf_addon }}.yml" |
| 82 | + content: |- |
| 83 | + --- |
| 84 | + {{ |
| 85 | + { |
| 86 | + 'hs_vault_snapshot_token': tf_result.outputs.snapshot_token.value |
| 87 | + } | to_nice_yaml(indent=2) |
| 88 | + }} |
| 89 | + mode: 0600 |
| 90 | + delegate_to: localhost |
| 91 | + become: false |
| 92 | + when: |
| 93 | + - __hs_vault_is_first_master |
| 94 | + |
| 95 | +- name: "Load secret dir" |
| 96 | + include_vars: |
| 97 | + dir: "{{ hs_vault_local_secret_dir }}" |
| 98 | + ignore_unknown_extensions: true |
| 99 | + no_log: true |
| 100 | + |
| 101 | +- name: "Render snapshot user bash profile" |
| 102 | + copy: |
| 103 | + dest: "{{ __hs_vault_snapshot_home_dir }}/.bash_profile" |
| 104 | + content: |- |
| 105 | + export PATH="/usr/bin/vault:${PATH}" |
| 106 | + export VAULT_ADDR="https://{{ hs_vault_api_address }}:{{ hs_vault_api_port }}" |
| 107 | + export VAULT_TOKEN="{{ hs_vault_snapshot_token }}" |
| 108 | + mode: 0600 |
| 109 | + owner: vault-snapshot |
| 110 | + group: vault |
0 commit comments