An ansible role to install or update the teleport node service and teleport config on Debian based systems.
Works with any architecture that teleport has a binary for, see available teleport downloads.
If you add your own teleport config file template you can run any node services you want (ssh, app, database, kubernetes).
Please Check the teleport config file documentation for more information and confirm it is setup correctly.
- add idempotence tests to verify teleport is updated correctly (config, service and binary)
- add tests for variable templating
- lock down the versions of the linting tools
- investigate if installing teleport in a docker container is useful (currently not supported)
A running teleport cluster so that you can provide the following information:
- auth token (dynamic or static). Ex:
tctl nodes add --ttl=5m --roles=node | grep "invite token:" | grep -Eo "[0-9a-z]{32}"
- CA pin
- address of the authentication server
These are the default variables with their default values as defined in defaults/main.yml
teleport_version
The version of teleport to install. See teleport downloads for available versions.
teleport_architecture
Change teleport_architecture
any of the following:
arm-bin
if you are running on ARMv7 (32-bit) based devices.arm64-bin
if you are running on ARM64/ARMv8 (64-bit) based devices.amd64-bin
if you are running on x86_64/AMD64 based devices.386-bin
if you are running on i386/Intel based devices.
teleport_config_template
The template to use for the teleport configuration file. The default is templates/default_teleport.yaml.j2
. It contains a basic configuration that will enable the SSH service and add a command label showing node uptime.
There are many options available and you can substitute in your own template and add any variables you want.
teleport_service_template
The template to use for the teleport service file. The default is templates/default_teleport.service.j2
. You can substitute in your own template and add any variables you want.
teleport_ca_pin
The CA pin to use for the teleport configuration. This is optional, but recommended.
teleport_config_path
The path to the teleport configuration file. The default is /etc/teleport.yaml
.
teleport_auth_servers
The list of authentication servers to use for the teleport configuration. Examples are shown as defaults above.
backup_teleport_config
Runs a backup of the teleport configuration file before overwriting it. The default is yes
. See Upgrading Teleport for more information.
teleport_control_systemd
Default yes
. Controls if this role modifies the teleport service.
teleport_template_config
Default yes
. Controls if this role modifies the teleport config file.
When the role is run, it checks if the installed version matches the version specified in teleport_version
. If different then it will download the latest version and install it.
When performing an upgrade, a backup of the current configuration file in teleport_config_path
will be created and a new configuration file templated in its place. When doing this a teleport_auth_token
and teleport_ca_pin
do not need to be provided, as they are pulled from the existing configuration file, and then templated into the new configuration file.
This allows you to update values in the configuration file like labels and commands without having to store the auth token and ca pin.
This role reloads teleport.service
after any of the following occur:
- Teleport is installed or updated
- Teleport configuration file is updated
- Teleport service file is updated
None
For example to install teleport on a node:
- hosts: all
roles:
- mdsketch.teleport
vars:
# optional ssh labels
teleport_ssh_labels:
- k: "label_key"
v: "label_value"
teleport_auth_token: "super secret auth token"
teleport_ca_pin: "not as secret ca pin"
teleport_auth_server: "auth server"
teleport_proxy_server: "proxy server"
Created Teleport Config to /etc/teleport.yaml
---
version: v3
teleport:
auth_token: "super secret auth token"
ca_pin: "not as secret ca pin"
auth_server: auth server
proxy_server: proxy server
log:
output: stderr
severity: INFO
format:
output: text
diag_addr: ""
ssh_service:
enabled: "yes"
labels:
label_key: label_value
commands:
- name: hostname
command: [hostname]
period: 60m0s
- name: uptime
command: [uptime, -p]
period: 5m0s
- name: version
command: [teleport, version]
period: 60m0s
proxy_service:
enabled: "no"
https_keypairs: []
https_keypairs_reload_interval: 0s
acme: {}
auth_service:
enabled: "no"
MIT / BSD
This role was created in 2021 by Matthew Draws for KPM Power
- Matthew Draws: mdsketch