summaryrefslogtreecommitdiffstats
path: root/puppet/services/haproxy-public-tls-certmonger.yaml
blob: f9d04ebdf6f4600da8c53775c34c4730e1ac1fe6 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
heat_template_version: ocata

description: >
  HAProxy deployment with TLS enabled, powered by certmonger

parameters:
  ServiceNetMap:
    default: {}
    description: Mapping of service_name -> network name. Typically set
                 via parameter_defaults in the resource registry.  This
                 mapping overrides those in ServiceNetMapDefaults.
    type: json
  DefaultPasswords:
    default: {}
    type: json
  RoleName:
    default: ''
    description: Role name on which the service is applied
    type: string
  RoleParameters:
    default: {}
    description: Parameters specific to the role
    type: json
  EndpointMap:
    default: {}
    description: Mapping of service endpoint -> protocol. Typically set
                 via parameter_defaults in the resource registry.
    type: json

outputs:
  role_data:
    description: Role data for the HAProxy public TLS via certmonger role.
    value:
      service_name: haproxy_public_tls_certmonger
      config_settings:
        generate_service_certificates: true
        tripleo::haproxy::service_certificate: '/etc/pki/tls/certs/overcloud-haproxy-external.pem'
      certificates_specs:
        haproxy-external:
          service_pem: '/etc/pki/tls/certs/overcloud-haproxy-external.pem'
          service_certificate: '/etc/pki/tls/certs/overcloud-haproxy-external.crt'
          service_key: '/etc/pki/tls/private/overcloud-haproxy-external.key'
          hostname: "%{hiera('cloud_name_external')}"
          postsave_cmd: "" # TODO
          principal: "haproxy/%{hiera('cloud_name_external')}"
      metadata_settings:
        - service: haproxy
          network: external
          type: vip