Patrick de Ruiter 47aaaa2143
Initial commit: Terraform certificate automation module
- Add Vault AppRole and Ansible integration for certificates
- Configure policies and secret engines
- Add comprehensive documentation
2025-11-01 06:18:46 +01:00

45 lines
1.4 KiB
HCL
Executable File

locals {
secret_path = "secret/data/${var.environment}/${var.short_hostname}/certificate"
policy_name = "${var.environment}-${var.short_hostname}-cert-policy"
approle_name = "${var.environment}-${var.short_hostname}-approle"
}
resource "vault_policy" "cert_access" {
name = local.policy_name
policy = <<EOT
path "${local.secret_path}" {
capabilities = ["read"]
}
EOT
}
resource "vault_approle_auth_backend_role" "cert_role" {
backend = "approle"
role_name = local.approle_name
token_policies = [vault_policy.cert_access.name]
token_ttl = "1h"
token_max_ttl = "4h"
secret_id_ttl = "24h"
}
resource "vault_approle_auth_backend_role_secret_id" "cert_role_secret" {
backend = "approle"
role_name = vault_approle_auth_backend_role.cert_role.role_name
}
resource "ansible_host" "consul_template_node" {
inventory_hostname = var.short_hostname
groups = ["consul_template"]
vars = {
ansible_user = "ansible"
ansible_ssh_private_key_file = "~/.ssh/id_ed25519"
ansible_python_interpreter = "/usr/bin/python3"
vault_approle_role_id = vault_approle_auth_backend_role.cert_role.role_id
vault_approle_secret_id = vault_approle_auth_backend_role_secret_id.cert_role_secret.secret_id
vault_address = var.vault_address
environment = var.environment
short_hostname = var.short_hostname
}
}