80086fd342
These are only used for TLS-everywhere, and fills up the kerberos principals that will need to be created for the certs used by the overcloud. With this, the metadata hook will format these principals correctly and will further pass them on to the nova metadata service. Where they can be used if there's a plugin enabled. bp tls-via-certmonger bp novajoin Change-Id: I873094bb69200052febda629fda698a7a782c031
42 lines
1.4 KiB
YAML
42 lines
1.4 KiB
YAML
heat_template_version: ocata
|
|
|
|
description: >
|
|
HAProxy deployment with TLS enabled, powered by certmonger
|
|
|
|
parameters:
|
|
ServiceNetMap:
|
|
default: {}
|
|
description: Mapping of service_name -> network name. Typically set
|
|
via parameter_defaults in the resource registry. This
|
|
mapping overrides those in ServiceNetMapDefaults.
|
|
type: json
|
|
DefaultPasswords:
|
|
default: {}
|
|
type: json
|
|
EndpointMap:
|
|
default: {}
|
|
description: Mapping of service endpoint -> protocol. Typically set
|
|
via parameter_defaults in the resource registry.
|
|
type: json
|
|
|
|
outputs:
|
|
role_data:
|
|
description: Role data for the HAProxy public TLS via certmonger role.
|
|
value:
|
|
service_name: haproxy_public_tls_certmonger
|
|
config_settings:
|
|
generate_service_certificates: true
|
|
tripleo::haproxy::service_certificate: '/etc/pki/tls/certs/overcloud-haproxy-external.pem'
|
|
certificates_specs:
|
|
haproxy-external:
|
|
service_pem: '/etc/pki/tls/certs/overcloud-haproxy-external.pem'
|
|
service_certificate: '/etc/pki/tls/certs/overcloud-haproxy-external.crt'
|
|
service_key: '/etc/pki/tls/private/overcloud-haproxy-external.key'
|
|
hostname: "%{hiera('cloud_name_external')}"
|
|
postsave_cmd: "" # TODO
|
|
principal: "haproxy/%{hiera('cloud_name_external')}"
|
|
metadata_settings:
|
|
- service: haproxy
|
|
network: external
|
|
type: vip
|