-
Notifications
You must be signed in to change notification settings - Fork 107
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Vault MVP #1353
Vault MVP #1353
Conversation
core/src/epicli/data/common/ansible/playbooks/roles/vault/tasks/main.yml
Outdated
Show resolved
Hide resolved
...c/epicli/data/common/ansible/playbooks/roles/vault/templates/kubernetes/app-namespace.yml.j2
Show resolved
Hide resolved
log_and_print "Vault is already unsealed. Nothing to do."; | ||
elif [ "${command_result[1]}" = "1" ] ; then | ||
log_and_print "Unsealing Vault..."; | ||
grep --max-count=3 Unseal "$init_file_path" | awk '{print $4}' | while read -r line ; do |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Magic number. init
should be called with value and it should be passed here.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Will be done after MVP.
core/src/epicli/data/common/ansible/playbooks/roles/vault/files/vault/configure-vault.sh
Show resolved
Hide resolved
core/src/epicli/data/common/ansible/playbooks/roles/vault/files/vault/configure-vault.sh
Outdated
Show resolved
Hide resolved
core/src/epicli/data/common/ansible/playbooks/roles/vault/files/vault/configure-vault.sh
Show resolved
Hide resolved
VAULT_PROTOCOL="${3:?missing argument}"; | ||
|
||
PATH=$VAULT_INSTALL_PATH/bin:/usr/local/bin:$PATH; | ||
export VAULT_ADDR="$VAULT_PROTOCOL://$VAULT_IP:8200" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
port hard coded
...ommon/ansible/playbooks/roles/vault/templates/kubernetes/vault-endpoint-configuration.yml.j2
Show resolved
Hide resolved
...ommon/ansible/playbooks/roles/vault/templates/kubernetes/vault-endpoint-configuration.yml.j2
Show resolved
Hide resolved
core/src/epicli/data/common/ansible/playbooks/roles/vault/templates/vault/config.hcl.j2
Show resolved
Hide resolved
core/src/epicli/data/common/ansible/playbooks/roles/vault/templates/vault/policy-admin.hcl.j2
Show resolved
Hide resolved
fe12336
to
30d2cfb
Compare
@erzetpe can you please also link issues related to this PR? |
…es authentication automatically with kubernetes integration.
…kubectl invocations
… to configure-vault.sh
…arate autounseal from autoconfiguration option Change counter naming in unseal-vault.sh script, change error handling Remove todos, run user creation only, when specified in Epiphany configuration, change default provisioner user name Fixes and additional logging
* Review: shell scripts * Rename certificate_generate.yml
30d2cfb
to
d9e5a84
Compare
Changes requested here will be done after MVP.
This is version MVP of Hashicorp Vault with Kubernetes integration