Configuration and documentation for the CNV Sandbox at the Mass Open Cloud (MOC).
-
playbook-preinstall.ymlSet up provisioning host and generate the install configuration.
-
playbook-postinstall.ymlFetches authentication credentials from the provisioning host and then uses the OpenShift API to perform post-configuration tasks (installing certificates, configuring SSO, installing CNV, etc).
Files with credentials and other secrets are encrypted using ansible-vault. The vault key itself is included in the repository and is encrypted using GPG to the identities listed in the [.vault_pgp_keys][] file.
-
Add the key fingerprint to
.vault_pgp_keys.We use key fingerprints rather than email addresses to ensure that we are using the correct key (you may have multiple keys with the same email address in your keychain).
-
Run the
scripts/rekey-vault-secret.shscript. This will decrypt the vault secret and then re-encrypt it to all the identities in the list.
If you want to replace the vault secret (e.g., you think the unencrypted secret has been compromised):
- Run the
scripts/rekey-vault-files.shscript. This will generate a new random key, useansible-vaultto rekey all vaulted files with the new key, and then encrypt the key to the identities in.vault_pgp_keys.