Merge pull request 'Vaultサーバのセットアップファイルのデプロイ' (#2) from vault-server into master
Reviewed-on: #2
This commit is contained in:
commit
34a2f107e7
|
@ -1,8 +1,26 @@
|
||||||
# -------------------------------------------
|
# -------------------------------------------
|
||||||
# Specifying the default settings:
|
# Specifying the default settings:
|
||||||
# -------------------------------------------
|
# -------------------------------------------
|
||||||
|
|
||||||
|
case run_command('grep VERSION_ID /etc/os-release | awk -F\" \'{print $2}\'').stdout.chomp
|
||||||
|
when "20.04"
|
||||||
|
cmd = 'LANG=C ip a | grep "inet " | grep -v -E "(127|172)" | cut -d" " -f6 | perl -pe "s/\/.+//g"'
|
||||||
|
|
||||||
|
when "18.04"
|
||||||
|
cmd = 'LANG=C /sbin/ifconfig | grep "inet " | grep -v -E "(127|172)" | cut -d" " -f10'
|
||||||
|
|
||||||
|
else
|
||||||
|
cmd = 'LANG=C /sbin/ifconfig | grep "inet addr" | grep -v -E "(127|172)" | awk "{print $2;}" | cut -d: -f2 | cut -f 1 -d " " | tail -1'
|
||||||
|
end
|
||||||
|
ipaddr = run_command(cmd).stdout.chomp
|
||||||
|
|
||||||
|
hostname = run_command('uname -n').stdout.chomp
|
||||||
|
|
||||||
node.reverse_merge!({
|
node.reverse_merge!({
|
||||||
'vault' => {
|
'vault' => {
|
||||||
'manager' => false,
|
'manager' => false,
|
||||||
|
'ipaddr' => ipaddr,
|
||||||
|
'hostname' => hostname,
|
||||||
|
'ips' => ['192.168.10.141', '192.168.10.142', '192.168.10.143'],
|
||||||
}
|
}
|
||||||
})
|
})
|
||||||
|
|
|
@ -2,3 +2,6 @@ include_recipe './attributes.rb'
|
||||||
|
|
||||||
include_recipe './install.rb'
|
include_recipe './install.rb'
|
||||||
|
|
||||||
|
if node['vault']['manager']
|
||||||
|
include_recipe './setup.rb'
|
||||||
|
end
|
||||||
|
|
|
@ -0,0 +1,7 @@
|
||||||
|
{
|
||||||
|
"path": {
|
||||||
|
"identity/oidc/token/oidc-role": {
|
||||||
|
"policy": "read"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
|
@ -0,0 +1,20 @@
|
||||||
|
# Consul Managed PKI Mounts
|
||||||
|
path "/sys/mounts" {
|
||||||
|
capabilities = [ "read" ]
|
||||||
|
}
|
||||||
|
|
||||||
|
path "/sys/mounts/connect_root" {
|
||||||
|
capabilities = [ "create", "read", "update", "delete", "list" ]
|
||||||
|
}
|
||||||
|
|
||||||
|
path "/sys/mounts/connect_inter" {
|
||||||
|
capabilities = [ "create", "read", "update", "delete", "list" ]
|
||||||
|
}
|
||||||
|
|
||||||
|
path "/connect_root/*" {
|
||||||
|
capabilities = [ "create", "read", "update", "delete", "list" ]
|
||||||
|
}
|
||||||
|
|
||||||
|
path "/connect_inter/*" {
|
||||||
|
capabilities = [ "create", "read", "update", "delete", "list" ]
|
||||||
|
}
|
|
@ -0,0 +1,22 @@
|
||||||
|
# Deploy `Vault` server config:
|
||||||
|
template '/etc/vault.d/vault.hcl' do
|
||||||
|
owner 'vault'
|
||||||
|
group 'vault'
|
||||||
|
mode '644'
|
||||||
|
|
||||||
|
variables(HOSTNAME: node['vault']['hostname'], IPADDR: node['vault']['ipaddr'], IPS: node['vault']['ips'])
|
||||||
|
end
|
||||||
|
|
||||||
|
directory '/etc/vault.d/policies' do
|
||||||
|
owner 'vault'
|
||||||
|
group 'vault'
|
||||||
|
mode '755'
|
||||||
|
end
|
||||||
|
|
||||||
|
%w( consul-auto-config consul-connect-vault ).each do |conf|
|
||||||
|
remote_file "/etc/vault.d/policies/#{conf}.hcl" do
|
||||||
|
owner 'vault'
|
||||||
|
group 'vault'
|
||||||
|
mode '644'
|
||||||
|
end
|
||||||
|
end
|
|
@ -0,0 +1,31 @@
|
||||||
|
ui = true
|
||||||
|
|
||||||
|
disable_mlock = true
|
||||||
|
|
||||||
|
# service_registration "consul" {
|
||||||
|
# address = "127.0.0.1:8500"
|
||||||
|
# token = "19149728-ce09-2a72-26b6-d2fc3aeecdd8"
|
||||||
|
# }
|
||||||
|
|
||||||
|
storage "raft" {
|
||||||
|
path = "/opt/vault/data"
|
||||||
|
node_id = "<%= @HOSTNAME %>"
|
||||||
|
<% @IPS.each do |ip| %>
|
||||||
|
retry_join {
|
||||||
|
leader_api_addr = "http://<%= ip %>:8200"
|
||||||
|
}
|
||||||
|
<% end %>
|
||||||
|
}
|
||||||
|
|
||||||
|
api_addr = "http://<%= @IPADDR %>:8200"
|
||||||
|
cluster_addr = "http://<%= @IPADDR %>::8201"
|
||||||
|
|
||||||
|
# HTTPS listener
|
||||||
|
listener "tcp" {
|
||||||
|
address = "0.0.0.0:8200"
|
||||||
|
cluster_address = "0.0.0.0:8201"
|
||||||
|
|
||||||
|
tls_disable = true
|
||||||
|
# tls_cert_file = "/opt/vault/tls/tls.crt"
|
||||||
|
# tls_key_file = "/opt/vault/tls/tls.key"
|
||||||
|
}
|
Loading…
Reference in New Issue