feat(roles): integrate vault role to hashistack collection
This commit is contained in:
parent
b07cdea49c
commit
f2c4f67b54
8
molecule/vault_default/converge.yml
Normal file
8
molecule/vault_default/converge.yml
Normal file
@ -0,0 +1,8 @@
|
|||||||
|
---
|
||||||
|
- name: Converge
|
||||||
|
hosts: all
|
||||||
|
become: true
|
||||||
|
tasks:
|
||||||
|
- name: "Include ednz_cloud.hashistack.vault"
|
||||||
|
ansible.builtin.include_role:
|
||||||
|
name: "ednz_cloud.hashistack.vault"
|
37
molecule/vault_default/molecule.yml
Normal file
37
molecule/vault_default/molecule.yml
Normal file
@ -0,0 +1,37 @@
|
|||||||
|
---
|
||||||
|
dependency:
|
||||||
|
name: galaxy
|
||||||
|
options:
|
||||||
|
requirements-file: ./requirements.yml
|
||||||
|
driver:
|
||||||
|
name: docker
|
||||||
|
platforms:
|
||||||
|
- name: instance
|
||||||
|
image: geerlingguy/docker-${MOLECULE_TEST_OS}-ansible
|
||||||
|
command: ""
|
||||||
|
volumes:
|
||||||
|
- /sys/fs/cgroup:/sys/fs/cgroup
|
||||||
|
cgroupns_mode: host
|
||||||
|
privileged: true
|
||||||
|
pre_build_image: true
|
||||||
|
provisioner:
|
||||||
|
name: ansible
|
||||||
|
config_options:
|
||||||
|
defaults:
|
||||||
|
remote_tmp: /tmp/.ansible
|
||||||
|
verifier:
|
||||||
|
name: ansible
|
||||||
|
scenario:
|
||||||
|
name: vault_default
|
||||||
|
test_sequence:
|
||||||
|
- dependency
|
||||||
|
- cleanup
|
||||||
|
- destroy
|
||||||
|
- syntax
|
||||||
|
- create
|
||||||
|
- prepare
|
||||||
|
- converge
|
||||||
|
- idempotence
|
||||||
|
- verify
|
||||||
|
- cleanup
|
||||||
|
- destroy
|
13
molecule/vault_default/prepare.yml
Normal file
13
molecule/vault_default/prepare.yml
Normal file
@ -0,0 +1,13 @@
|
|||||||
|
---
|
||||||
|
- name: Prepare
|
||||||
|
hosts: all
|
||||||
|
become: true
|
||||||
|
tasks:
|
||||||
|
- name: "Install pre-required system packages"
|
||||||
|
ansible.builtin.include_role:
|
||||||
|
name: ednz_cloud.manage_apt_packages
|
||||||
|
vars:
|
||||||
|
manage_apt_packages_list:
|
||||||
|
- name: unzip
|
||||||
|
version: latest
|
||||||
|
state: present
|
4
molecule/vault_default/requirements.yml
Normal file
4
molecule/vault_default/requirements.yml
Normal file
@ -0,0 +1,4 @@
|
|||||||
|
---
|
||||||
|
# requirements file for molecule
|
||||||
|
roles:
|
||||||
|
- name: ednz_cloud.manage_apt_packages
|
185
molecule/vault_default/verify.yml
Normal file
185
molecule/vault_default/verify.yml
Normal file
@ -0,0 +1,185 @@
|
|||||||
|
---
|
||||||
|
- name: Verify
|
||||||
|
hosts: all
|
||||||
|
gather_facts: true
|
||||||
|
become: true
|
||||||
|
tasks:
|
||||||
|
- name: "Test: vault user and group"
|
||||||
|
block:
|
||||||
|
- name: "Getent user vault"
|
||||||
|
ansible.builtin.getent:
|
||||||
|
database: passwd
|
||||||
|
key: vault
|
||||||
|
register: vault_user
|
||||||
|
|
||||||
|
- name: "Getent group vault"
|
||||||
|
ansible.builtin.getent:
|
||||||
|
database: group
|
||||||
|
key: vault
|
||||||
|
register: vault_group
|
||||||
|
|
||||||
|
- name: "Verify vault user and group"
|
||||||
|
ansible.builtin.assert:
|
||||||
|
that:
|
||||||
|
- not vault_user.failed
|
||||||
|
- not vault_group.failed
|
||||||
|
- "'vault' in vault_user.ansible_facts.getent_passwd.keys()"
|
||||||
|
- "'/home/vault' in vault_user.ansible_facts.getent_passwd['vault']"
|
||||||
|
- "'/bin/false' in vault_user.ansible_facts.getent_passwd['vault']"
|
||||||
|
- "'vault' in vault_group.ansible_facts.getent_group.keys()"
|
||||||
|
|
||||||
|
- name: "Test: binary /usr/local/bin/vault"
|
||||||
|
block:
|
||||||
|
- name: "Stat binary /usr/local/bin/vault"
|
||||||
|
ansible.builtin.stat:
|
||||||
|
path: "/usr/local/bin/vault"
|
||||||
|
register: stat_usr_local_bin_vault
|
||||||
|
|
||||||
|
- name: "Verify binary /usr/local/bin/vault"
|
||||||
|
ansible.builtin.assert:
|
||||||
|
that:
|
||||||
|
- stat_usr_local_bin_vault.stat.exists
|
||||||
|
- stat_usr_local_bin_vault.stat.isreg
|
||||||
|
- stat_usr_local_bin_vault.stat.pw_name == 'root'
|
||||||
|
- stat_usr_local_bin_vault.stat.gr_name == 'root'
|
||||||
|
- stat_usr_local_bin_vault.stat.mode == '0755'
|
||||||
|
|
||||||
|
- name: "Test: directory /etc/vault.d"
|
||||||
|
block:
|
||||||
|
- name: "Stat directory /etc/vault.d"
|
||||||
|
ansible.builtin.stat:
|
||||||
|
path: "/etc/vault.d"
|
||||||
|
register: stat_etc_vault_d
|
||||||
|
|
||||||
|
- name: "Stat file /etc/vault.d/vault.env"
|
||||||
|
ansible.builtin.stat:
|
||||||
|
path: "/etc/vault.d/vault.env"
|
||||||
|
register: stat_etc_vault_d_vault_env
|
||||||
|
|
||||||
|
- name: "Stat file /etc/vault.d/vault.json"
|
||||||
|
ansible.builtin.stat:
|
||||||
|
path: "/etc/vault.d/vault.json"
|
||||||
|
register: stat_etc_vault_d_vault_json
|
||||||
|
|
||||||
|
- name: "Slurp file /etc/vault.d/vault.json"
|
||||||
|
ansible.builtin.slurp:
|
||||||
|
src: "/etc/vault.d/vault.json"
|
||||||
|
register: slurp_etc_vault_d_vault_json
|
||||||
|
|
||||||
|
- name: "Verify directory /etc/vault.d"
|
||||||
|
ansible.builtin.assert:
|
||||||
|
that:
|
||||||
|
- stat_etc_vault_d.stat.exists
|
||||||
|
- stat_etc_vault_d.stat.isdir
|
||||||
|
- stat_etc_vault_d.stat.pw_name == 'vault'
|
||||||
|
- stat_etc_vault_d.stat.gr_name == 'vault'
|
||||||
|
- stat_etc_vault_d.stat.mode == '0755'
|
||||||
|
- stat_etc_vault_d_vault_env.stat.exists
|
||||||
|
- stat_etc_vault_d_vault_env.stat.isreg
|
||||||
|
- stat_etc_vault_d_vault_env.stat.pw_name == 'vault'
|
||||||
|
- stat_etc_vault_d_vault_env.stat.gr_name == 'vault'
|
||||||
|
- stat_etc_vault_d_vault_env.stat.mode == '0600'
|
||||||
|
- stat_etc_vault_d_vault_json.stat.exists
|
||||||
|
- stat_etc_vault_d_vault_json.stat.isreg
|
||||||
|
- stat_etc_vault_d_vault_json.stat.pw_name == 'vault'
|
||||||
|
- stat_etc_vault_d_vault_json.stat.gr_name == 'vault'
|
||||||
|
- stat_etc_vault_d_vault_json.stat.mode == '0600'
|
||||||
|
- slurp_etc_vault_d_vault_json.content != ''
|
||||||
|
|
||||||
|
- name: "Test: directory /opt/vault"
|
||||||
|
block:
|
||||||
|
- name: "Stat directory /opt/vault"
|
||||||
|
ansible.builtin.stat:
|
||||||
|
path: "/opt/vault"
|
||||||
|
register: stat_opt_vault
|
||||||
|
|
||||||
|
- name: "Verify directory /opt/vault"
|
||||||
|
ansible.builtin.assert:
|
||||||
|
that:
|
||||||
|
- stat_opt_vault.stat.exists
|
||||||
|
- stat_opt_vault.stat.isdir
|
||||||
|
- stat_opt_vault.stat.pw_name == 'vault'
|
||||||
|
- stat_opt_vault.stat.gr_name == 'vault'
|
||||||
|
- stat_opt_vault.stat.mode == '0755'
|
||||||
|
|
||||||
|
- name: "Test: service vault"
|
||||||
|
block:
|
||||||
|
- name: "Get service vault"
|
||||||
|
ansible.builtin.service_facts:
|
||||||
|
|
||||||
|
- name: "Stat file /etc/systemd/system/vault.service"
|
||||||
|
ansible.builtin.stat:
|
||||||
|
path: "/etc/systemd/system/vault.service"
|
||||||
|
register: stat_etc_systemd_system_vault_service
|
||||||
|
|
||||||
|
- name: "Slurp file /etc/systemd/system/vault.service"
|
||||||
|
ansible.builtin.slurp:
|
||||||
|
src: "/etc/systemd/system/vault.service"
|
||||||
|
register: slurp_etc_systemd_system_vault_service
|
||||||
|
|
||||||
|
- name: "Verify service vault"
|
||||||
|
ansible.builtin.assert:
|
||||||
|
that:
|
||||||
|
- stat_etc_systemd_system_vault_service.stat.exists
|
||||||
|
- stat_etc_systemd_system_vault_service.stat.isreg
|
||||||
|
- stat_etc_systemd_system_vault_service.stat.pw_name == 'root'
|
||||||
|
- stat_etc_systemd_system_vault_service.stat.gr_name == 'root'
|
||||||
|
- stat_etc_systemd_system_vault_service.stat.mode == '0644'
|
||||||
|
- slurp_etc_systemd_system_vault_service.content != ''
|
||||||
|
- ansible_facts.services['vault.service'] is defined
|
||||||
|
- ansible_facts.services['vault.service']['source'] == 'systemd'
|
||||||
|
- ansible_facts.services['vault.service']['state'] == 'running'
|
||||||
|
- ansible_facts.services['vault.service']['status'] == 'enabled'
|
||||||
|
|
||||||
|
- name: "Test: bootstrap vault cluster"
|
||||||
|
block:
|
||||||
|
- name: "Command vault operator init"
|
||||||
|
ansible.builtin.command: "vault operator init -non-interactive -key-shares=3 -key-threshold=2 -format=json"
|
||||||
|
environment:
|
||||||
|
VAULT_ADDR: http://{{ ansible_default_ipv4.address }}:8200
|
||||||
|
changed_when: false
|
||||||
|
register: vault_operator_init
|
||||||
|
|
||||||
|
- name: "Test: unseal vault cluster"
|
||||||
|
vars:
|
||||||
|
vault_unseal_keys: "{{ vault_operator_init.stdout|from_json|json_query('unseal_keys_hex') }}"
|
||||||
|
block:
|
||||||
|
- name: "Command vault operator unseal"
|
||||||
|
ansible.builtin.command: "vault operator unseal -format=json {{ vault_unseal_keys[0] }}"
|
||||||
|
environment:
|
||||||
|
VAULT_ADDR: http://{{ ansible_default_ipv4.address }}:8200
|
||||||
|
changed_when: false
|
||||||
|
register: vault_operator_unseal_0
|
||||||
|
|
||||||
|
- name: "Command vault operator unseal"
|
||||||
|
ansible.builtin.command: "vault operator unseal -format=json {{ vault_unseal_keys[1] }}"
|
||||||
|
environment:
|
||||||
|
VAULT_ADDR: http://{{ ansible_default_ipv4.address }}:8200
|
||||||
|
changed_when: false
|
||||||
|
register: vault_operator_unseal_1
|
||||||
|
|
||||||
|
- name: "Verify vault operator unseal"
|
||||||
|
vars:
|
||||||
|
vault_seal_state_0: "{{ vault_operator_unseal_0.stdout|from_json|json_query('sealed') }}"
|
||||||
|
vault_seal_state_1: "{{ vault_operator_unseal_1.stdout|from_json|json_query('sealed') }}"
|
||||||
|
ansible.builtin.assert:
|
||||||
|
that:
|
||||||
|
- vault_seal_state_0
|
||||||
|
- not vault_seal_state_1
|
||||||
|
|
||||||
|
- name: "Test: vault interaction"
|
||||||
|
vars:
|
||||||
|
root_token: "{{ vault_operator_init.stdout|from_json|json_query('root_token') }}"
|
||||||
|
block:
|
||||||
|
- name: "Command vault secret enable"
|
||||||
|
ansible.builtin.command: "vault secrets enable -version=1 kv"
|
||||||
|
environment:
|
||||||
|
VAULT_ADDR: http://{{ ansible_default_ipv4.address }}:8200
|
||||||
|
VAULT_TOKEN: "{{ root_token }}"
|
||||||
|
changed_when: false
|
||||||
|
register: vault_secret_enable
|
||||||
|
|
||||||
|
- name: "Verify vault interaction"
|
||||||
|
ansible.builtin.assert:
|
||||||
|
that:
|
||||||
|
- vault_secret_enable.stdout == 'Success! Enabled the kv secrets engine at: kv/'
|
8
molecule/vault_with_raft_enabled/converge.yml
Normal file
8
molecule/vault_with_raft_enabled/converge.yml
Normal file
@ -0,0 +1,8 @@
|
|||||||
|
---
|
||||||
|
- name: Converge
|
||||||
|
hosts: all
|
||||||
|
become: true
|
||||||
|
tasks:
|
||||||
|
- name: "Include ednz_cloud.hashistack.vault"
|
||||||
|
ansible.builtin.include_role:
|
||||||
|
name: "ednz_cloud.hashistack.vault"
|
13
molecule/vault_with_raft_enabled/group_vars/all.yml
Normal file
13
molecule/vault_with_raft_enabled/group_vars/all.yml
Normal file
@ -0,0 +1,13 @@
|
|||||||
|
---
|
||||||
|
# defaults file for hashicorp_vault
|
||||||
|
|
||||||
|
#########################
|
||||||
|
# storage configuration #
|
||||||
|
#########################
|
||||||
|
|
||||||
|
vault_storage_configuration:
|
||||||
|
raft:
|
||||||
|
path: "{{ vault_data_dir }}"
|
||||||
|
node_id: "{{ ansible_hostname }}"
|
||||||
|
retry_join:
|
||||||
|
- leader_api_addr: "http://{{ vault_cluster_addr }}:8200"
|
37
molecule/vault_with_raft_enabled/molecule.yml
Normal file
37
molecule/vault_with_raft_enabled/molecule.yml
Normal file
@ -0,0 +1,37 @@
|
|||||||
|
---
|
||||||
|
dependency:
|
||||||
|
name: galaxy
|
||||||
|
options:
|
||||||
|
requirements-file: ./requirements.yml
|
||||||
|
driver:
|
||||||
|
name: docker
|
||||||
|
platforms:
|
||||||
|
- name: instance
|
||||||
|
image: geerlingguy/docker-${MOLECULE_TEST_OS}-ansible
|
||||||
|
command: ""
|
||||||
|
volumes:
|
||||||
|
- /sys/fs/cgroup:/sys/fs/cgroup
|
||||||
|
cgroupns_mode: host
|
||||||
|
privileged: true
|
||||||
|
pre_build_image: true
|
||||||
|
provisioner:
|
||||||
|
name: ansible
|
||||||
|
config_options:
|
||||||
|
defaults:
|
||||||
|
remote_tmp: /tmp/.ansible
|
||||||
|
verifier:
|
||||||
|
name: ansible
|
||||||
|
scenario:
|
||||||
|
name: vault_with_raft_enabled
|
||||||
|
test_sequence:
|
||||||
|
- dependency
|
||||||
|
- cleanup
|
||||||
|
- destroy
|
||||||
|
- syntax
|
||||||
|
- create
|
||||||
|
- prepare
|
||||||
|
- converge
|
||||||
|
- idempotence
|
||||||
|
- verify
|
||||||
|
- cleanup
|
||||||
|
- destroy
|
13
molecule/vault_with_raft_enabled/prepare.yml
Normal file
13
molecule/vault_with_raft_enabled/prepare.yml
Normal file
@ -0,0 +1,13 @@
|
|||||||
|
---
|
||||||
|
- name: Prepare
|
||||||
|
hosts: all
|
||||||
|
become: true
|
||||||
|
tasks:
|
||||||
|
- name: "Install pre-required system packages"
|
||||||
|
ansible.builtin.include_role:
|
||||||
|
name: ednz_cloud.manage_apt_packages
|
||||||
|
vars:
|
||||||
|
manage_apt_packages_list:
|
||||||
|
- name: unzip
|
||||||
|
version: latest
|
||||||
|
state: present
|
4
molecule/vault_with_raft_enabled/requirements.yml
Normal file
4
molecule/vault_with_raft_enabled/requirements.yml
Normal file
@ -0,0 +1,4 @@
|
|||||||
|
---
|
||||||
|
# requirements file for molecule
|
||||||
|
roles:
|
||||||
|
- name: ednz_cloud.manage_apt_packages
|
185
molecule/vault_with_raft_enabled/verify.yml
Normal file
185
molecule/vault_with_raft_enabled/verify.yml
Normal file
@ -0,0 +1,185 @@
|
|||||||
|
---
|
||||||
|
- name: Verify
|
||||||
|
hosts: all
|
||||||
|
gather_facts: true
|
||||||
|
become: true
|
||||||
|
tasks:
|
||||||
|
- name: "Test: vault user and group"
|
||||||
|
block:
|
||||||
|
- name: "Getent user vault"
|
||||||
|
ansible.builtin.getent:
|
||||||
|
database: passwd
|
||||||
|
key: vault
|
||||||
|
register: vault_user
|
||||||
|
|
||||||
|
- name: "Getent group vault"
|
||||||
|
ansible.builtin.getent:
|
||||||
|
database: group
|
||||||
|
key: vault
|
||||||
|
register: vault_group
|
||||||
|
|
||||||
|
- name: "Verify vault user and group"
|
||||||
|
ansible.builtin.assert:
|
||||||
|
that:
|
||||||
|
- not vault_user.failed
|
||||||
|
- not vault_group.failed
|
||||||
|
- "'vault' in vault_user.ansible_facts.getent_passwd.keys()"
|
||||||
|
- "'/home/vault' in vault_user.ansible_facts.getent_passwd['vault']"
|
||||||
|
- "'/bin/false' in vault_user.ansible_facts.getent_passwd['vault']"
|
||||||
|
- "'vault' in vault_group.ansible_facts.getent_group.keys()"
|
||||||
|
|
||||||
|
- name: "Test: binary /usr/local/bin/vault"
|
||||||
|
block:
|
||||||
|
- name: "Stat binary /usr/local/bin/vault"
|
||||||
|
ansible.builtin.stat:
|
||||||
|
path: "/usr/local/bin/vault"
|
||||||
|
register: stat_usr_local_bin_vault
|
||||||
|
|
||||||
|
- name: "Verify binary /usr/local/bin/vault"
|
||||||
|
ansible.builtin.assert:
|
||||||
|
that:
|
||||||
|
- stat_usr_local_bin_vault.stat.exists
|
||||||
|
- stat_usr_local_bin_vault.stat.isreg
|
||||||
|
- stat_usr_local_bin_vault.stat.pw_name == 'root'
|
||||||
|
- stat_usr_local_bin_vault.stat.gr_name == 'root'
|
||||||
|
- stat_usr_local_bin_vault.stat.mode == '0755'
|
||||||
|
|
||||||
|
- name: "Test: directory /etc/vault.d"
|
||||||
|
block:
|
||||||
|
- name: "Stat directory /etc/vault.d"
|
||||||
|
ansible.builtin.stat:
|
||||||
|
path: "/etc/vault.d"
|
||||||
|
register: stat_etc_vault_d
|
||||||
|
|
||||||
|
- name: "Stat file /etc/vault.d/vault.env"
|
||||||
|
ansible.builtin.stat:
|
||||||
|
path: "/etc/vault.d/vault.env"
|
||||||
|
register: stat_etc_vault_d_vault_env
|
||||||
|
|
||||||
|
- name: "Stat file /etc/vault.d/vault.json"
|
||||||
|
ansible.builtin.stat:
|
||||||
|
path: "/etc/vault.d/vault.json"
|
||||||
|
register: stat_etc_vault_d_vault_json
|
||||||
|
|
||||||
|
- name: "Slurp file /etc/vault.d/vault.json"
|
||||||
|
ansible.builtin.slurp:
|
||||||
|
src: "/etc/vault.d/vault.json"
|
||||||
|
register: slurp_etc_vault_d_vault_json
|
||||||
|
|
||||||
|
- name: "Verify directory /etc/vault.d"
|
||||||
|
ansible.builtin.assert:
|
||||||
|
that:
|
||||||
|
- stat_etc_vault_d.stat.exists
|
||||||
|
- stat_etc_vault_d.stat.isdir
|
||||||
|
- stat_etc_vault_d.stat.pw_name == 'vault'
|
||||||
|
- stat_etc_vault_d.stat.gr_name == 'vault'
|
||||||
|
- stat_etc_vault_d.stat.mode == '0755'
|
||||||
|
- stat_etc_vault_d_vault_env.stat.exists
|
||||||
|
- stat_etc_vault_d_vault_env.stat.isreg
|
||||||
|
- stat_etc_vault_d_vault_env.stat.pw_name == 'vault'
|
||||||
|
- stat_etc_vault_d_vault_env.stat.gr_name == 'vault'
|
||||||
|
- stat_etc_vault_d_vault_env.stat.mode == '0600'
|
||||||
|
- stat_etc_vault_d_vault_json.stat.exists
|
||||||
|
- stat_etc_vault_d_vault_json.stat.isreg
|
||||||
|
- stat_etc_vault_d_vault_json.stat.pw_name == 'vault'
|
||||||
|
- stat_etc_vault_d_vault_json.stat.gr_name == 'vault'
|
||||||
|
- stat_etc_vault_d_vault_json.stat.mode == '0600'
|
||||||
|
- slurp_etc_vault_d_vault_json.content != ''
|
||||||
|
|
||||||
|
- name: "Test: directory /opt/vault"
|
||||||
|
block:
|
||||||
|
- name: "Stat directory /opt/vault"
|
||||||
|
ansible.builtin.stat:
|
||||||
|
path: "/opt/vault"
|
||||||
|
register: stat_opt_vault
|
||||||
|
|
||||||
|
- name: "Verify directory /opt/vault"
|
||||||
|
ansible.builtin.assert:
|
||||||
|
that:
|
||||||
|
- stat_opt_vault.stat.exists
|
||||||
|
- stat_opt_vault.stat.isdir
|
||||||
|
- stat_opt_vault.stat.pw_name == 'vault'
|
||||||
|
- stat_opt_vault.stat.gr_name == 'vault'
|
||||||
|
- stat_opt_vault.stat.mode == '0755'
|
||||||
|
|
||||||
|
- name: "Test: service vault"
|
||||||
|
block:
|
||||||
|
- name: "Get service vault"
|
||||||
|
ansible.builtin.service_facts:
|
||||||
|
|
||||||
|
- name: "Stat file /etc/systemd/system/vault.service"
|
||||||
|
ansible.builtin.stat:
|
||||||
|
path: "/etc/systemd/system/vault.service"
|
||||||
|
register: stat_etc_systemd_system_vault_service
|
||||||
|
|
||||||
|
- name: "Slurp file /etc/systemd/system/vault.service"
|
||||||
|
ansible.builtin.slurp:
|
||||||
|
src: "/etc/systemd/system/vault.service"
|
||||||
|
register: slurp_etc_systemd_system_vault_service
|
||||||
|
|
||||||
|
- name: "Verify service vault"
|
||||||
|
ansible.builtin.assert:
|
||||||
|
that:
|
||||||
|
- stat_etc_systemd_system_vault_service.stat.exists
|
||||||
|
- stat_etc_systemd_system_vault_service.stat.isreg
|
||||||
|
- stat_etc_systemd_system_vault_service.stat.pw_name == 'root'
|
||||||
|
- stat_etc_systemd_system_vault_service.stat.gr_name == 'root'
|
||||||
|
- stat_etc_systemd_system_vault_service.stat.mode == '0644'
|
||||||
|
- slurp_etc_systemd_system_vault_service.content != ''
|
||||||
|
- ansible_facts.services['vault.service'] is defined
|
||||||
|
- ansible_facts.services['vault.service']['source'] == 'systemd'
|
||||||
|
- ansible_facts.services['vault.service']['state'] == 'running'
|
||||||
|
- ansible_facts.services['vault.service']['status'] == 'enabled'
|
||||||
|
|
||||||
|
- name: "Test: bootstrap vault cluster"
|
||||||
|
block:
|
||||||
|
- name: "Command vault operator init"
|
||||||
|
ansible.builtin.command: "vault operator init -non-interactive -key-shares=3 -key-threshold=2 -tls-skip-verify -format=json"
|
||||||
|
environment:
|
||||||
|
VAULT_ADDR: "http://{{ ansible_default_ipv4.address }}:8200"
|
||||||
|
changed_when: false
|
||||||
|
register: vault_operator_init
|
||||||
|
|
||||||
|
- name: "Test: unseal vault cluster"
|
||||||
|
vars:
|
||||||
|
vault_unseal_keys: "{{ vault_operator_init.stdout|from_json|json_query('unseal_keys_hex') }}"
|
||||||
|
block:
|
||||||
|
- name: "Command vault operator unseal"
|
||||||
|
ansible.builtin.command: "vault operator unseal -format=json -tls-skip-verify {{ vault_unseal_keys[0] }}"
|
||||||
|
environment:
|
||||||
|
VAULT_ADDR: "http://{{ ansible_default_ipv4.address }}:8200"
|
||||||
|
changed_when: false
|
||||||
|
register: vault_operator_unseal_0
|
||||||
|
|
||||||
|
- name: "Command vault operator unseal"
|
||||||
|
ansible.builtin.command: "vault operator unseal -format=json -tls-skip-verify {{ vault_unseal_keys[1] }}"
|
||||||
|
environment:
|
||||||
|
VAULT_ADDR: "http://{{ ansible_default_ipv4.address }}:8200"
|
||||||
|
changed_when: false
|
||||||
|
register: vault_operator_unseal_1
|
||||||
|
|
||||||
|
- name: "Verify vault operator unseal"
|
||||||
|
vars:
|
||||||
|
vault_seal_state_0: "{{ vault_operator_unseal_0.stdout|from_json|json_query('sealed') }}"
|
||||||
|
vault_seal_state_1: "{{ vault_operator_unseal_1.stdout|from_json|json_query('sealed') }}"
|
||||||
|
ansible.builtin.assert:
|
||||||
|
that:
|
||||||
|
- vault_seal_state_0
|
||||||
|
- not vault_seal_state_1
|
||||||
|
|
||||||
|
- name: "Test: vault interaction"
|
||||||
|
vars:
|
||||||
|
root_token: "{{ vault_operator_init.stdout|from_json|json_query('root_token') }}"
|
||||||
|
block:
|
||||||
|
- name: "Command vault secret enable"
|
||||||
|
ansible.builtin.command: "vault secrets enable -version=1 -tls-skip-verify kv"
|
||||||
|
environment:
|
||||||
|
VAULT_ADDR: "http://{{ ansible_default_ipv4.address }}:8200"
|
||||||
|
VAULT_TOKEN: "{{ root_token }}"
|
||||||
|
changed_when: false
|
||||||
|
register: vault_secret_enable
|
||||||
|
|
||||||
|
- name: "Verify vault interaction"
|
||||||
|
ansible.builtin.assert:
|
||||||
|
that:
|
||||||
|
- vault_secret_enable.stdout == 'Success! Enabled the kv secrets engine at: kv/'
|
96
roles/vault/defaults/main.yml
Normal file
96
roles/vault/defaults/main.yml
Normal file
@ -0,0 +1,96 @@
|
|||||||
|
---
|
||||||
|
# defaults file for hashicorp_vault
|
||||||
|
vault_version: latest
|
||||||
|
vault_start_service: true
|
||||||
|
vault_config_dir: "/etc/vault.d"
|
||||||
|
vault_data_dir: "/opt/vault"
|
||||||
|
vault_certs_dir: "{{ vault_config_dir }}/tls"
|
||||||
|
vault_logs_dir: "/var/log/vault"
|
||||||
|
|
||||||
|
vault_extra_files: false
|
||||||
|
vault_extra_files_list: []
|
||||||
|
|
||||||
|
vault_env_variables: {}
|
||||||
|
|
||||||
|
#######################
|
||||||
|
# extra configuration #
|
||||||
|
#######################
|
||||||
|
|
||||||
|
# You should prioritize adding configuration
|
||||||
|
# to the configuration entries below, this
|
||||||
|
# option should be used to add pieces of configuration not
|
||||||
|
# available through standard variables.
|
||||||
|
|
||||||
|
vault_extra_configuration: {}
|
||||||
|
|
||||||
|
###########
|
||||||
|
# general #
|
||||||
|
###########
|
||||||
|
|
||||||
|
vault_cluster_name: vault
|
||||||
|
vault_bind_addr: "0.0.0.0"
|
||||||
|
vault_cluster_addr: "{{ ansible_default_ipv4.address }}"
|
||||||
|
vault_enable_ui: true
|
||||||
|
vault_disable_mlock: false
|
||||||
|
vault_disable_cache: false
|
||||||
|
|
||||||
|
#########################
|
||||||
|
# storage configuration #
|
||||||
|
#########################
|
||||||
|
|
||||||
|
vault_storage_configuration:
|
||||||
|
file:
|
||||||
|
path: "{{ vault_data_dir }}"
|
||||||
|
|
||||||
|
##########################
|
||||||
|
# listener configuration #
|
||||||
|
##########################
|
||||||
|
|
||||||
|
vault_enable_tls: false
|
||||||
|
vault_listener_configuration:
|
||||||
|
tcp:
|
||||||
|
address: "{{ vault_cluster_addr }}:8200"
|
||||||
|
tls_disable: true
|
||||||
|
|
||||||
|
vault_tls_listener_configuration:
|
||||||
|
tcp:
|
||||||
|
tls_disable: false
|
||||||
|
tls_cert_file: "{{ vault_certs_dir }}/cert.pem"
|
||||||
|
tls_key_file: "{{ vault_certs_dir }}/key.pem"
|
||||||
|
tls_disable_client_certs: true
|
||||||
|
|
||||||
|
vault_certificates_extra_files_dir:
|
||||||
|
[]
|
||||||
|
# - src: ""
|
||||||
|
# dest: "{{ vault_certs_dir }}"
|
||||||
|
|
||||||
|
vault_extra_listener_configuration: {}
|
||||||
|
|
||||||
|
########################
|
||||||
|
# service registration #
|
||||||
|
########################
|
||||||
|
|
||||||
|
vault_enable_service_registration: false
|
||||||
|
vault_service_registration_configuration:
|
||||||
|
consul:
|
||||||
|
address: "127.0.0.1:8500"
|
||||||
|
scheme: "http"
|
||||||
|
token: ""
|
||||||
|
|
||||||
|
#########################
|
||||||
|
# plugins configuration #
|
||||||
|
#########################
|
||||||
|
|
||||||
|
vault_enable_plugins: false
|
||||||
|
vault_plugins_directory: "{{ vault_config_dir }}/plugins"
|
||||||
|
|
||||||
|
#################
|
||||||
|
# vault logging #
|
||||||
|
#################
|
||||||
|
|
||||||
|
vault_log_level: info
|
||||||
|
vault_enable_log_to_file: false
|
||||||
|
vault_log_to_file_configuration:
|
||||||
|
log_file: "{{ vault_logs_dir }}/vault.log"
|
||||||
|
log_rotate_duration: 24h
|
||||||
|
log_rotate_max_files: 30
|
2
roles/vault/handlers/main.yml
Normal file
2
roles/vault/handlers/main.yml
Normal file
@ -0,0 +1,2 @@
|
|||||||
|
---
|
||||||
|
# handlers file for hashicorp_vault
|
26
roles/vault/meta/main.yml
Normal file
26
roles/vault/meta/main.yml
Normal file
@ -0,0 +1,26 @@
|
|||||||
|
---
|
||||||
|
# meta file for hashicorp_vault
|
||||||
|
galaxy_info:
|
||||||
|
namespace: "ednz_cloud"
|
||||||
|
role_name: "hashicorp_vault"
|
||||||
|
author: "Bertrand Lanson"
|
||||||
|
description: "Install and configure hashicorp vault for debian-based distros."
|
||||||
|
license: "license (BSD, MIT)"
|
||||||
|
min_ansible_version: "2.10"
|
||||||
|
platforms:
|
||||||
|
- name: Ubuntu
|
||||||
|
versions:
|
||||||
|
- focal
|
||||||
|
- jammy
|
||||||
|
- noble
|
||||||
|
- name: Debian
|
||||||
|
versions:
|
||||||
|
- bullseye
|
||||||
|
- bookworm
|
||||||
|
galaxy_tags:
|
||||||
|
- "ubuntu"
|
||||||
|
- "debian"
|
||||||
|
- "hashicorp"
|
||||||
|
- "vault"
|
||||||
|
|
||||||
|
dependencies: []
|
74
roles/vault/tasks/configure.yml
Normal file
74
roles/vault/tasks/configure.yml
Normal file
@ -0,0 +1,74 @@
|
|||||||
|
---
|
||||||
|
# task/configure file for hashicorp_vault
|
||||||
|
- name: "Vault | Create vault.env"
|
||||||
|
ansible.builtin.template:
|
||||||
|
src: vault.env.j2
|
||||||
|
dest: "{{ vault_config_dir }}/vault.env"
|
||||||
|
owner: "{{ vault_user }}"
|
||||||
|
group: "{{ vault_group }}"
|
||||||
|
mode: "0600"
|
||||||
|
register: _vault_env_file
|
||||||
|
|
||||||
|
- name: "Vault | Copy vault.json template"
|
||||||
|
ansible.builtin.template:
|
||||||
|
src: vault.json.j2
|
||||||
|
dest: "{{ vault_config_dir }}/vault.json"
|
||||||
|
owner: "{{ vault_user }}"
|
||||||
|
group: "{{ vault_group }}"
|
||||||
|
mode: "0600"
|
||||||
|
register: _vault_config_file
|
||||||
|
|
||||||
|
- name: "Vault | Set restart-check variable"
|
||||||
|
ansible.builtin.set_fact:
|
||||||
|
_vault_service_need_restart: true
|
||||||
|
when: _vault_env_file.changed or
|
||||||
|
_vault_config_file.changed
|
||||||
|
|
||||||
|
- name: "Vault | Copy extra configuration files"
|
||||||
|
when: vault_extra_files
|
||||||
|
block:
|
||||||
|
- name: "Vault | Get extra file types"
|
||||||
|
ansible.builtin.stat:
|
||||||
|
path: "{{ item.src }}"
|
||||||
|
loop: "{{ vault_extra_files_list }}"
|
||||||
|
register: vault_extra_file_stat
|
||||||
|
delegate_to: localhost
|
||||||
|
|
||||||
|
- name: "Vault | Set list for file sources"
|
||||||
|
vars:
|
||||||
|
_vault_file_sources: []
|
||||||
|
ansible.builtin.set_fact:
|
||||||
|
_vault_file_sources: "{{ _vault_file_sources + [item.item] }}"
|
||||||
|
when: item.stat.isreg
|
||||||
|
loop: "{{ vault_extra_file_stat.results }}"
|
||||||
|
loop_control:
|
||||||
|
loop_var: item
|
||||||
|
delegate_to: localhost
|
||||||
|
|
||||||
|
- name: "Vault | Set list for directory sources"
|
||||||
|
vars:
|
||||||
|
_vault_dir_sources: []
|
||||||
|
ansible.builtin.set_fact:
|
||||||
|
_vault_dir_sources: "{{ _vault_dir_sources + [item.item] }}"
|
||||||
|
when: item.stat.isdir
|
||||||
|
loop: "{{ vault_extra_file_stat.results }}"
|
||||||
|
loop_control:
|
||||||
|
loop_var: item
|
||||||
|
delegate_to: localhost
|
||||||
|
|
||||||
|
- name: "Vault | Template extra file sources"
|
||||||
|
ansible.builtin.template:
|
||||||
|
src: "{{ item.src }}"
|
||||||
|
dest: "{{ item.dest | regex_replace('\\.j2$', '') }}"
|
||||||
|
owner: "{{ vault_user }}"
|
||||||
|
group: "{{ vault_group }}"
|
||||||
|
mode: "0700"
|
||||||
|
loop: "{{ _vault_file_sources }}"
|
||||||
|
when: _vault_file_sources is defined
|
||||||
|
|
||||||
|
- name: "Vault | Template extra directory sources"
|
||||||
|
ansible.builtin.include_tasks: recursive_copy_extra_dirs.yml
|
||||||
|
loop: "{{ _vault_dir_sources }}"
|
||||||
|
loop_control:
|
||||||
|
loop_var: dir_source_item
|
||||||
|
when: _vault_dir_sources is defined
|
151
roles/vault/tasks/install.yml
Normal file
151
roles/vault/tasks/install.yml
Normal file
@ -0,0 +1,151 @@
|
|||||||
|
---
|
||||||
|
# task/install file for hashicorp_vault
|
||||||
|
- name: "Vault | Get latest release of vault"
|
||||||
|
when: vault_version == 'latest'
|
||||||
|
block:
|
||||||
|
- name: "Vault | Get latest vault release from github api"
|
||||||
|
ansible.builtin.uri:
|
||||||
|
url: "{{ vault_github_api }}/hashicorp/vault/releases/latest"
|
||||||
|
return_content: true
|
||||||
|
register: _vault_latest_release
|
||||||
|
|
||||||
|
- name: "Vault | Set wanted vault version to latest tag"
|
||||||
|
ansible.builtin.set_fact:
|
||||||
|
_vault_wanted_version: "{{ _vault_latest_release.json['tag_name']|regex_replace('v', '') }}"
|
||||||
|
|
||||||
|
- name: "Vault | Set wanted vault version to {{ vault_version }}"
|
||||||
|
ansible.builtin.set_fact:
|
||||||
|
_vault_wanted_version: "{{ vault_version|regex_replace('v', '') }}"
|
||||||
|
when: vault_version != 'latest'
|
||||||
|
|
||||||
|
- name: "Vault | Get current vault version"
|
||||||
|
block:
|
||||||
|
- name: "Vault | Stat vault version file"
|
||||||
|
ansible.builtin.stat:
|
||||||
|
path: "{{ vault_config_dir }}/.version"
|
||||||
|
changed_when: false
|
||||||
|
check_mode: false
|
||||||
|
register: _vault_version_file
|
||||||
|
|
||||||
|
- name: "Vault | Get current vault version"
|
||||||
|
ansible.builtin.slurp:
|
||||||
|
src: "{{ _vault_version_file.stat.path }}"
|
||||||
|
when:
|
||||||
|
- _vault_version_file.stat.exists
|
||||||
|
- _vault_version_file.stat.isreg
|
||||||
|
register: _vault_current_version
|
||||||
|
|
||||||
|
- name: "Vault | Download and install vault binary"
|
||||||
|
when: _vault_current_version is not defined
|
||||||
|
or _vault_wanted_version != (_vault_current_version.content|default('')|b64decode)
|
||||||
|
block:
|
||||||
|
- name: "Vault | Set vault package name to download"
|
||||||
|
ansible.builtin.set_fact:
|
||||||
|
_vault_package_name: >-
|
||||||
|
vault_{{ _vault_wanted_version }}_linux_{{ vault_deb_architecture_map[ansible_architecture] }}.zip
|
||||||
|
_vault_shasum_file_name: >-
|
||||||
|
vault_{{ _vault_wanted_version }}_SHA256SUMS
|
||||||
|
|
||||||
|
- name: "Vault | Download checksum file for vault archive"
|
||||||
|
ansible.builtin.get_url:
|
||||||
|
url: "{{ vault_repository_url }}/{{ _vault_wanted_version }}/{{ _vault_shasum_file_name }}"
|
||||||
|
dest: "/tmp/{{ _vault_shasum_file_name }}"
|
||||||
|
mode: "0644"
|
||||||
|
register: _vault_checksum_file
|
||||||
|
until: _vault_checksum_file is succeeded
|
||||||
|
retries: 5
|
||||||
|
delay: 2
|
||||||
|
check_mode: false
|
||||||
|
|
||||||
|
- name: "Vault | Extract correct checksum from checksum file"
|
||||||
|
ansible.builtin.command:
|
||||||
|
cmd: 'grep "{{ _vault_package_name }}" /tmp/{{ _vault_shasum_file_name }}'
|
||||||
|
changed_when: false
|
||||||
|
register: _vault_expected_checksum_line
|
||||||
|
|
||||||
|
- name: "Vault | Parse the expected checksum"
|
||||||
|
ansible.builtin.set_fact:
|
||||||
|
_vault_expected_checksum: "{{ _vault_expected_checksum_line.stdout.split()[0] }}"
|
||||||
|
|
||||||
|
- name: "Vault | Download vault binary archive"
|
||||||
|
ansible.builtin.get_url:
|
||||||
|
url: "{{ vault_repository_url }}/{{ _vault_wanted_version }}/{{ _vault_package_name }}"
|
||||||
|
dest: "/tmp/{{ _vault_package_name }}"
|
||||||
|
mode: "0644"
|
||||||
|
checksum: "sha256:{{ _vault_expected_checksum }}"
|
||||||
|
register: _vault_binary_archive
|
||||||
|
until: _vault_binary_archive is succeeded
|
||||||
|
retries: 5
|
||||||
|
delay: 2
|
||||||
|
check_mode: false
|
||||||
|
|
||||||
|
- name: "Vault | Create temporary directory for archive decompression"
|
||||||
|
ansible.builtin.file:
|
||||||
|
path: /tmp/vault
|
||||||
|
state: directory
|
||||||
|
mode: "0755"
|
||||||
|
|
||||||
|
- name: "Vault | Unpack vault archive"
|
||||||
|
ansible.builtin.unarchive:
|
||||||
|
src: "/tmp/{{ _vault_package_name }}"
|
||||||
|
dest: "/tmp/vault"
|
||||||
|
owner: "{{ vault_user }}"
|
||||||
|
group: "{{ vault_group }}"
|
||||||
|
mode: "0755"
|
||||||
|
remote_src: true
|
||||||
|
|
||||||
|
- name: "Vault | Copy vault binary to {{ vault_binary_path }}"
|
||||||
|
ansible.builtin.copy:
|
||||||
|
src: /tmp/vault/vault
|
||||||
|
dest: "{{ vault_binary_path }}"
|
||||||
|
owner: root
|
||||||
|
group: root
|
||||||
|
mode: "0755"
|
||||||
|
remote_src: true
|
||||||
|
force: true
|
||||||
|
|
||||||
|
- name: "Vault | Update vault version file"
|
||||||
|
ansible.builtin.copy:
|
||||||
|
content: "{{ _vault_wanted_version }}"
|
||||||
|
dest: "{{ vault_config_dir }}/.version"
|
||||||
|
owner: "{{ vault_user }}"
|
||||||
|
group: "{{ vault_group }}"
|
||||||
|
mode: "0600"
|
||||||
|
|
||||||
|
- name: "Vault | Set restart-check variable"
|
||||||
|
ansible.builtin.set_fact:
|
||||||
|
_vault_service_need_restart: true
|
||||||
|
|
||||||
|
- name: "Vault | Cleanup temporary directory"
|
||||||
|
ansible.builtin.file:
|
||||||
|
path: "{{ item }}"
|
||||||
|
state: absent
|
||||||
|
loop:
|
||||||
|
- /tmp/vault
|
||||||
|
- /tmp/{{ _vault_package_name }}
|
||||||
|
- /tmp/{{ _vault_shasum_file_name }}
|
||||||
|
|
||||||
|
- name: "Vault | Copy systemd service file for vault"
|
||||||
|
ansible.builtin.template:
|
||||||
|
src: "vault.service.j2"
|
||||||
|
dest: "/etc/systemd/system/{{ vault_service_name }}.service"
|
||||||
|
owner: root
|
||||||
|
group: root
|
||||||
|
mode: "0644"
|
||||||
|
register: _vault_unit_file
|
||||||
|
|
||||||
|
- name: "Vault | Set reload-check & restart-check variable"
|
||||||
|
ansible.builtin.set_fact:
|
||||||
|
_vault_service_need_reload: true
|
||||||
|
_vault_service_need_restart: true
|
||||||
|
when: _vault_unit_file.changed # noqa: no-handler
|
||||||
|
|
||||||
|
- name: "Vault | Copy systemd service file for vault"
|
||||||
|
ansible.builtin.template:
|
||||||
|
src: "vault.service.j2"
|
||||||
|
dest: "/etc/systemd/system/vault.service"
|
||||||
|
owner: root
|
||||||
|
group: root
|
||||||
|
mode: "0644"
|
||||||
|
notify:
|
||||||
|
- "systemctl-daemon-reload"
|
43
roles/vault/tasks/main.yml
Normal file
43
roles/vault/tasks/main.yml
Normal file
@ -0,0 +1,43 @@
|
|||||||
|
---
|
||||||
|
# task/main file for hashicorp_vault
|
||||||
|
- name: "Vault | Set reload-check & restart-check variable"
|
||||||
|
ansible.builtin.set_fact:
|
||||||
|
_vault_service_need_reload: false
|
||||||
|
_vault_service_need_restart: false
|
||||||
|
|
||||||
|
- name: "Vault | Import merge_variables.yml"
|
||||||
|
ansible.builtin.include_tasks: merge_variables.yml
|
||||||
|
|
||||||
|
- name: "Vault | Import prerequisites.yml"
|
||||||
|
ansible.builtin.include_tasks: prerequisites.yml
|
||||||
|
|
||||||
|
- name: "Vault | Import install.yml"
|
||||||
|
ansible.builtin.include_tasks: "install.yml"
|
||||||
|
|
||||||
|
- name: "Vault | Import configure.yml"
|
||||||
|
ansible.builtin.include_tasks: configure.yml
|
||||||
|
|
||||||
|
- name: "Vault | Populate service facts"
|
||||||
|
ansible.builtin.service_facts:
|
||||||
|
|
||||||
|
- name: "Vault | Set restart-check variable"
|
||||||
|
ansible.builtin.set_fact:
|
||||||
|
_vault_service_need_restart: true
|
||||||
|
when: ansible_facts.services[vault_service_name~'.service'].state != 'running'
|
||||||
|
|
||||||
|
- name: "Vault | Enable service: {{ vault_service_name }}"
|
||||||
|
ansible.builtin.service:
|
||||||
|
name: "{{ vault_service_name }}"
|
||||||
|
enabled: true
|
||||||
|
|
||||||
|
- name: "Vault | Reload systemd daemon"
|
||||||
|
ansible.builtin.systemd:
|
||||||
|
daemon_reload: true
|
||||||
|
when: _vault_service_need_reload
|
||||||
|
|
||||||
|
- name: "Vault | Start service: {{ vault_service_name }}"
|
||||||
|
ansible.builtin.service:
|
||||||
|
name: "{{ vault_service_name }}"
|
||||||
|
state: restarted
|
||||||
|
throttle: 1
|
||||||
|
when: _vault_service_need_restart
|
73
roles/vault/tasks/merge_variables.yml
Normal file
73
roles/vault/tasks/merge_variables.yml
Normal file
@ -0,0 +1,73 @@
|
|||||||
|
---
|
||||||
|
# task/merge_variables file for hashicorp_vault
|
||||||
|
- name: "Vault | Merge listener configuration"
|
||||||
|
block:
|
||||||
|
- name: "Vault | Merge tls listener configuration"
|
||||||
|
vars:
|
||||||
|
_config_to_merge: "{{ vault_tls_listener_configuration }}"
|
||||||
|
ansible.builtin.set_fact:
|
||||||
|
vault_listener_configuration: "{{
|
||||||
|
vault_listener_configuration |
|
||||||
|
combine(_config_to_merge, recursive=true)
|
||||||
|
}}"
|
||||||
|
when: vault_enable_tls
|
||||||
|
|
||||||
|
- name: "Vault | Merge extra listener configuration"
|
||||||
|
vars:
|
||||||
|
_config_to_merge: "{{ vault_extra_listener_configuration }}"
|
||||||
|
ansible.builtin.set_fact:
|
||||||
|
vault_listener_configuration: "{{
|
||||||
|
vault_listener_configuration |
|
||||||
|
combine(_config_to_merge, recursive=true)
|
||||||
|
}}"
|
||||||
|
|
||||||
|
- name: "Vault | Add certificates directory to extra_files_dir"
|
||||||
|
ansible.builtin.set_fact:
|
||||||
|
vault_extra_files_list: "{{
|
||||||
|
vault_extra_files_list +
|
||||||
|
vault_certificates_extra_files_dir
|
||||||
|
| unique
|
||||||
|
| sort
|
||||||
|
}}"
|
||||||
|
|
||||||
|
- name: "Vault | Merge service registration configuration"
|
||||||
|
vars:
|
||||||
|
_config_to_merge:
|
||||||
|
service_registration: "{{ vault_service_registration_configuration }}"
|
||||||
|
ansible.builtin.set_fact:
|
||||||
|
vault_configuration: "{{
|
||||||
|
vault_configuration |
|
||||||
|
combine(_config_to_merge, recursive=true)
|
||||||
|
}}"
|
||||||
|
when: vault_enable_service_registration
|
||||||
|
|
||||||
|
- name: "Vault | Merge plugins configuration"
|
||||||
|
vars:
|
||||||
|
_config_to_merge:
|
||||||
|
plugin_directory: "{{ vault_plugins_directory }}"
|
||||||
|
ansible.builtin.set_fact:
|
||||||
|
vault_configuration: "{{
|
||||||
|
vault_configuration |
|
||||||
|
combine(_config_to_merge, recursive=true)
|
||||||
|
}}"
|
||||||
|
when: vault_enable_plugins
|
||||||
|
|
||||||
|
- name: "Vault | Merge logging configuration"
|
||||||
|
vars:
|
||||||
|
_config_to_merge: "{{ vault_log_to_file_configuration }}"
|
||||||
|
ansible.builtin.set_fact:
|
||||||
|
vault_configuration: "{{
|
||||||
|
vault_configuration |
|
||||||
|
combine(_config_to_merge, recursive=true)
|
||||||
|
}}"
|
||||||
|
when: vault_enable_log_to_file
|
||||||
|
|
||||||
|
- name: "Vault | Merge extra configuration settings"
|
||||||
|
vars:
|
||||||
|
_config_to_merge: "{{ vault_extra_configuration }}"
|
||||||
|
ansible.builtin.set_fact:
|
||||||
|
vault_configuration: "{{
|
||||||
|
vault_configuration |
|
||||||
|
combine(_config_to_merge, recursive=true)
|
||||||
|
}}"
|
||||||
|
when: vault_extra_configuration is defined
|
46
roles/vault/tasks/prerequisites.yml
Normal file
46
roles/vault/tasks/prerequisites.yml
Normal file
@ -0,0 +1,46 @@
|
|||||||
|
---
|
||||||
|
# task/prerequisites file for hashicorp_vault
|
||||||
|
- name: "Vault | Create group {{ vault_group }}"
|
||||||
|
ansible.builtin.group:
|
||||||
|
name: "{{ vault_group }}"
|
||||||
|
state: present
|
||||||
|
|
||||||
|
- name: "Vault | Create user {{ vault_user }}"
|
||||||
|
ansible.builtin.user:
|
||||||
|
name: "{{ vault_user }}"
|
||||||
|
group: "{{ vault_group }}"
|
||||||
|
shell: /bin/false
|
||||||
|
state: present
|
||||||
|
|
||||||
|
- name: "Vault | Create directory {{ vault_config_dir }}"
|
||||||
|
ansible.builtin.file:
|
||||||
|
path: "{{ vault_config_dir }}"
|
||||||
|
state: directory
|
||||||
|
owner: "{{ vault_user }}"
|
||||||
|
group: "{{ vault_group }}"
|
||||||
|
mode: "0755"
|
||||||
|
|
||||||
|
- name: "Vault | Create directory {{ vault_data_dir}}"
|
||||||
|
ansible.builtin.file:
|
||||||
|
path: "{{ vault_data_dir }}"
|
||||||
|
state: directory
|
||||||
|
owner: "{{ vault_user }}"
|
||||||
|
group: "{{ vault_group }}"
|
||||||
|
mode: "0755"
|
||||||
|
|
||||||
|
- name: "Vault | Create directory {{ vault_certs_dir }}"
|
||||||
|
ansible.builtin.file:
|
||||||
|
path: "{{ vault_certs_dir }}"
|
||||||
|
state: directory
|
||||||
|
owner: "{{ vault_user }}"
|
||||||
|
group: "{{ vault_group }}"
|
||||||
|
mode: "0755"
|
||||||
|
|
||||||
|
- name: "Vault | Create directory {{ vault_logs_dir }}"
|
||||||
|
ansible.builtin.file:
|
||||||
|
path: "{{ vault_logs_dir }}"
|
||||||
|
state: directory
|
||||||
|
owner: "{{ vault_user }}"
|
||||||
|
group: "{{ vault_group }}"
|
||||||
|
mode: "0755"
|
||||||
|
when: vault_enable_log_to_file
|
26
roles/vault/tasks/recursive_copy_extra_dirs.yml
Normal file
26
roles/vault/tasks/recursive_copy_extra_dirs.yml
Normal file
@ -0,0 +1,26 @@
|
|||||||
|
---
|
||||||
|
# task/recursive_copy_extra_dirs file for hashicorp_vault
|
||||||
|
- name: "Vault | Ensure destination directory exists"
|
||||||
|
ansible.builtin.file:
|
||||||
|
path: "{{ dir_source_item.dest }}"
|
||||||
|
recurse: true
|
||||||
|
state: directory
|
||||||
|
mode: "0775"
|
||||||
|
|
||||||
|
- name: "Vault | Create extra directory sources"
|
||||||
|
ansible.builtin.file:
|
||||||
|
path: "{{ dir_source_item.dest }}/{{ item.path }}"
|
||||||
|
state: directory
|
||||||
|
mode: "0775"
|
||||||
|
with_community.general.filetree: "{{ dir_source_item.src }}/"
|
||||||
|
when: item.state == 'directory'
|
||||||
|
|
||||||
|
- name: "Vault | Template extra directory sources"
|
||||||
|
ansible.builtin.template:
|
||||||
|
src: "{{ item.src }}"
|
||||||
|
dest: "{{ dir_source_item.dest }}/{{ item.path | regex_replace('\\.j2$', '') }}"
|
||||||
|
owner: "{{ vault_user }}"
|
||||||
|
group: "{{ vault_group }}"
|
||||||
|
mode: "0700"
|
||||||
|
with_community.general.filetree: "{{ dir_source_item.src }}/"
|
||||||
|
when: item.state == 'file'
|
4
roles/vault/templates/vault.env.j2
Normal file
4
roles/vault/templates/vault.env.j2
Normal file
@ -0,0 +1,4 @@
|
|||||||
|
# {{ ansible_managed }}
|
||||||
|
{% for item in vault_env_variables %}
|
||||||
|
{{ item }}="{{ vault_env_variables[item] }}"
|
||||||
|
{% endfor %}
|
1
roles/vault/templates/vault.json.j2
Normal file
1
roles/vault/templates/vault.json.j2
Normal file
@ -0,0 +1 @@
|
|||||||
|
{{ vault_configuration|to_nice_json }}
|
38
roles/vault/templates/vault.service.j2
Normal file
38
roles/vault/templates/vault.service.j2
Normal file
@ -0,0 +1,38 @@
|
|||||||
|
[Unit]
|
||||||
|
Description="HashiCorp Vault - A tool for managing secrets"
|
||||||
|
Documentation=https://www.vaultproject.io/docs/
|
||||||
|
Requires=network-online.target
|
||||||
|
After=network-online.target
|
||||||
|
ConditionFileNotEmpty={{ vault_config_dir }}/vault.json
|
||||||
|
StartLimitIntervalSec=60
|
||||||
|
StartLimitBurst=3
|
||||||
|
{% if vault_configuration.storage.consul is defined or vault_configuration.service_registration.consul is defined %}
|
||||||
|
Wants=consul.service
|
||||||
|
After=consul.service
|
||||||
|
{% endif %}
|
||||||
|
|
||||||
|
[Service]
|
||||||
|
Type=notify
|
||||||
|
EnvironmentFile=-{{ vault_config_dir }}/vault.env
|
||||||
|
User={{ vault_user }}
|
||||||
|
Group={{ vault_group }}
|
||||||
|
ProtectSystem=full
|
||||||
|
ProtectHome=read-only
|
||||||
|
PrivateTmp=yes
|
||||||
|
PrivateDevices=yes
|
||||||
|
SecureBits=keep-caps
|
||||||
|
AmbientCapabilities=CAP_IPC_LOCK
|
||||||
|
CapabilityBoundingSet=CAP_SYSLOG CAP_IPC_LOCK
|
||||||
|
NoNewPrivileges=yes
|
||||||
|
ExecStart={{ vault_binary_path }} server -config={{ vault_config_dir }}
|
||||||
|
ExecReload=/bin/kill --signal HUP $MAINPID
|
||||||
|
KillMode=process
|
||||||
|
KillSignal=SIGINT
|
||||||
|
Restart=on-failure
|
||||||
|
RestartSec=5
|
||||||
|
TimeoutStopSec=30
|
||||||
|
LimitNOFILE=65536
|
||||||
|
LimitMEMLOCK=infinity
|
||||||
|
|
||||||
|
[Install]
|
||||||
|
WantedBy=multi-user.target
|
26
roles/vault/vars/main.yml
Normal file
26
roles/vault/vars/main.yml
Normal file
@ -0,0 +1,26 @@
|
|||||||
|
---
|
||||||
|
# vars file for hashicorp_vault
|
||||||
|
vault_user: "vault"
|
||||||
|
vault_group: "vault"
|
||||||
|
vault_binary_path: /usr/local/bin/vault
|
||||||
|
vault_deb_architecture_map:
|
||||||
|
x86_64: "amd64"
|
||||||
|
aarch64: "arm64"
|
||||||
|
armv7l: "arm"
|
||||||
|
armv6l: "arm"
|
||||||
|
vault_architecture: "{{ vault_deb_architecture_map[ansible_architecture] | default(ansible_architecture) }}"
|
||||||
|
vault_service_name: "vault"
|
||||||
|
vault_github_api: https://api.github.com/repos
|
||||||
|
vault_github_project: hashicorp/vault
|
||||||
|
vault_github_url: https://github.com
|
||||||
|
vault_repository_url: https://releases.hashicorp.com/vault
|
||||||
|
|
||||||
|
vault_configuration:
|
||||||
|
cluster_name: "{{ vault_cluster_name }}"
|
||||||
|
cluster_addr: "{{ 'https' if vault_enable_tls else 'http'}}://{{ vault_cluster_addr }}:8201"
|
||||||
|
api_addr: "{{ 'https' if vault_enable_tls else 'http'}}://{{ vault_cluster_addr }}:8200"
|
||||||
|
ui: "{{ vault_enable_ui }}"
|
||||||
|
disable_mlock: "{{ vault_disable_mlock }}"
|
||||||
|
disable_cache: "{{ vault_disable_cache }}"
|
||||||
|
listener: "{{ vault_listener_configuration }}"
|
||||||
|
storage: "{{ vault_storage_configuration }}"
|
Loading…
Reference in New Issue
Block a user