summaryrefslogtreecommitdiffstats
path: root/tools/docker-compose/ansible/roles/vault/tasks/plumb.yml
diff options
context:
space:
mode:
authorDjebran Lezzoum <ldjebran@gmail.com>2024-10-02 15:40:16 +0200
committerjessicamack <jmack@redhat.com>2024-10-15 23:43:32 +0200
commitf22b192fb4eac82dbe29d7c4c95c69dd6813382d (patch)
treea392fec43af0ee9b6f2680ffee1538b1547dc47a /tools/docker-compose/ansible/roles/vault/tasks/plumb.yml
parentPrettier DRF pages when using trusted proxy (#15579) (diff)
downloadawx-f22b192fb4eac82dbe29d7c4c95c69dd6813382d.tar.xz
awx-f22b192fb4eac82dbe29d7c4c95c69dd6813382d.zip
Remove LDAP authentication (#15546)
Remove LDAP authentication from AWX
Diffstat (limited to 'tools/docker-compose/ansible/roles/vault/tasks/plumb.yml')
-rw-r--r--tools/docker-compose/ansible/roles/vault/tasks/plumb.yml50
1 files changed, 0 insertions, 50 deletions
diff --git a/tools/docker-compose/ansible/roles/vault/tasks/plumb.yml b/tools/docker-compose/ansible/roles/vault/tasks/plumb.yml
index 0e87daef6f..f3fc709b84 100644
--- a/tools/docker-compose/ansible/roles/vault/tasks/plumb.yml
+++ b/tools/docker-compose/ansible/roles/vault/tasks/plumb.yml
@@ -78,56 +78,6 @@
secret_path: "/my_root/my_folder"
secret_version: ""
-- name: Create a HashiCorp Vault Credential for LDAP
- awx.awx.credential:
- credential_type: HashiCorp Vault Secret Lookup
- name: Vault LDAP Lookup Cred
- organization: Default
- controller_host: "{{ awx_host }}"
- controller_username: admin
- controller_password: "{{ admin_password }}"
- validate_certs: false
- inputs:
- api_version: "v1"
- default_auth_path: "ldap"
- kubernetes_role: ""
- namespace: ""
- url: "{{ vault_addr_from_container }}"
- username: "{{ vault_ldap_username }}"
- password: "{{ vault_ldap_password }}"
- register: vault_ldap_cred
- when: enable_ldap | bool
-
-- name: Create a credential from the Vault LDAP Custom Cred Type
- awx.awx.credential:
- credential_type: "{{ custom_vault_cred_type.id }}"
- controller_host: "{{ awx_host }}"
- controller_username: admin
- controller_password: "{{ admin_password }}"
- validate_certs: false
- name: Credential From HashiCorp Vault via LDAP Auth
- inputs: {}
- organization: Default
- register: custom_credential_via_ldap
- when: enable_ldap | bool
-
-- name: Use the Vault LDAP Credential the new credential
- awx.awx.credential_input_source:
- input_field_name: password
- target_credential: "{{ custom_credential_via_ldap.id }}"
- source_credential: "{{ vault_ldap_cred.id }}"
- controller_host: "{{ awx_host }}"
- controller_username: admin
- controller_password: "{{ admin_password }}"
- validate_certs: false
- metadata:
- auth_path: ""
- secret_backend: "ldap_engine"
- secret_key: "my_key"
- secret_path: "ldaps_root/ldap_secret"
- secret_version: ""
- when: enable_ldap | bool
-
- name: Create a HashiCorp Vault Credential for UserPass
awx.awx.credential:
credential_type: HashiCorp Vault Secret Lookup