--- - name: "Vault" block: - name: "Create consul token for service registration" when: - enable_consul - vault_enable_service_registration delegate_to: "{{ groups['consul_servers'] | first }}" vars: _consul_vault_sr_host: "{{ hostvars[groups['consul_servers'][0]].api_interface_address }}" _consul_vault_sr_port: "{{ hostvars[groups['consul_servers'][0]].consul_api_port[hostvars[groups['consul_servers'][0]].consul_api_scheme] }}" _consul_vault_sr_scheme: "{{ hostvars[groups['consul_servers'][0]].consul_api_scheme }}" run_once: true block: - name: "Create consul vault policy" community.general.consul_policy: token: "{{ _credentials.consul.root_token.secret_id }}" host: "{{ _consul_vault_sr_host }}" port: "{{ _consul_vault_sr_port }}" scheme: "{{ _consul_vault_sr_scheme }}" validate_certs: false state: present name: vault-policy rules: "{{ vault_service_registration_policy }}" register: _consul_vault_policy - name: "Create consul vault token" community.general.consul_token: token: "{{ _credentials.consul.root_token.secret_id }}" host: "{{ _consul_vault_sr_host }}" port: "{{ _consul_vault_sr_port }}" scheme: "{{ _consul_vault_sr_scheme }}" validate_certs: false accessor_id: "{{ _credentials.consul.tokens.vault.accessor_id }}" secret_id: "{{ _credentials.consul.tokens.vault.secret_id }}" policies: - id: "{{ _consul_vault_policy.policy.ID }}" state: present when: _consul_vault_policy.changed - name: "Include ednz_cloud.hashistack.hashicorp_consul" ansible.builtin.include_role: name: ednz_cloud.hashistack.hashicorp_vault - name: "Initialize vault cluster" # noqa: run-once[task] ednz_cloud.hashistack.vault_init: api_url: "{{ hashi_vault_configuration['api_addr'] }}" tls_verify: "{{ vault_tls_verify }}" key_shares: "{{ vault_seal_configuration['key_shares'] }}" key_threshold: "{{ vault_seal_configuration['key_threshold'] }}" run_once: true retries: 5 delay: 5 delegate_to: "{{ groups['vault_servers'] | first }}" register: _vault_init_secret until: not _vault_init_secret.failed - name: "Write vault configuration to file" # noqa: run-once[task] no-handler ansible.builtin.copy: content: "{{ _vault_init_secret.state | to_nice_yaml(indent=2) }}" dest: "{{ sub_configuration_directories.secrets }}/vault.yml" owner: "{{ lookup('env', 'USER') }}" group: "{{ lookup('env', 'USER') }}" mode: "0644" when: _vault_init_secret.changed run_once: true delegate_to: localhost # - name: "Load vault cluster variables necessary for unseal operation" # ansible.builtin.include_vars: # file: "{{ sub_configuration_directories.vault_servers }}/vault_config.yml" # name: _vault_cluster_config - name: "Load vault cluster variables necessary for unseal operation" ansible.builtin.import_tasks: file: ../misc/load_credentials_vars.yml - name: "Unseal the bootstrap node" # noqa: run-once[task] no-handler ednz_cloud.hashistack.vault_unseal: api_url: "{{ hashi_vault_configuration['api_addr'] }}" tls_verify: "{{ vault_tls_verify }}" key_shares: "{{ _credentials.vault['keys'] }}" run_once: true delegate_to: "{{ groups['vault_servers'] | first }}" when: _vault_init_secret.changed register: _vault_unseal_secret - name: "Unseal all vault nodes" ednz_cloud.hashistack.vault_unseal: api_url: "{{ hashi_vault_configuration['api_addr'] }}" tls_verify: "{{ vault_tls_verify }}" key_shares: "{{ _credentials.vault['keys'] }}" retries: 5 delay: 5 until: _unseal_status.changed or not _unseal_status.failed register: _unseal_status