mirror of
https://git.lapiole.org/dani/ansible-roles.git
synced 2025-04-12 00:03:17 +02:00
Update to 2024-10-24 12:00
This commit is contained in:
parent
7ae7f41b2c
commit
882623afc1
@ -10,6 +10,8 @@ if [ -e /etc/profile.d/consul.sh ]; then
|
|||||||
fi
|
fi
|
||||||
{% if consul_conf.acl.enabled and consul_backup_token is defined %}
|
{% if consul_conf.acl.enabled and consul_backup_token is defined %}
|
||||||
export CONSUL_HTTP_TOKEN={{ consul_backup_token }}
|
export CONSUL_HTTP_TOKEN={{ consul_backup_token }}
|
||||||
|
# Give some time for the token to be replicated (if obtained from vault)
|
||||||
|
sleep 0.1
|
||||||
{% endif %}
|
{% endif %}
|
||||||
{% endif %}
|
{% endif %}
|
||||||
consul snapshot save -append-filename version,dc,node,status {{ consul_root_dir }}/backup/consul.snap
|
consul snapshot save -append-filename version,dc,node,status {{ consul_root_dir }}/backup/consul.snap
|
||||||
|
@ -11,6 +11,8 @@ if [ -e /etc/profile.d/nomad.sh ]; then
|
|||||||
fi
|
fi
|
||||||
{% if nomad_conf.acl.enabled and nomad_backup_token is defined %}
|
{% if nomad_conf.acl.enabled and nomad_backup_token is defined %}
|
||||||
export NOMAD_TOKEN={{ nomad_backup_token }}
|
export NOMAD_TOKEN={{ nomad_backup_token }}
|
||||||
|
# Give some time for the token to be replicated (if obtained from vault)
|
||||||
|
sleep 0.1
|
||||||
{% endif %}
|
{% endif %}
|
||||||
{% endif %}
|
{% endif %}
|
||||||
/usr/local/bin/nomad operator snapshot save {{ nomad_root_dir }}/backup/nomad.snap
|
/usr/local/bin/nomad operator snapshot save {{ nomad_root_dir }}/backup/nomad.snap
|
||||||
|
@ -1,5 +1,11 @@
|
|||||||
---
|
---
|
||||||
|
|
||||||
|
- name: Install dependencies
|
||||||
|
package:
|
||||||
|
name:
|
||||||
|
- jq
|
||||||
|
tags: vault
|
||||||
|
|
||||||
- name: Deploy systemd service unit
|
- name: Deploy systemd service unit
|
||||||
template: src=vault.service.j2 dest=/etc/systemd/system/vault.service
|
template: src=vault.service.j2 dest=/etc/systemd/system/vault.service
|
||||||
register: vault_unit
|
register: vault_unit
|
||||||
|
@ -7,5 +7,8 @@ if [ -e /etc/profile.d/vault.sh ]; then
|
|||||||
source /etc/profile.d/vault.sh
|
source /etc/profile.d/vault.sh
|
||||||
fi
|
fi
|
||||||
export VAULT_TOKEN={{ vault_backup_token }}
|
export VAULT_TOKEN={{ vault_backup_token }}
|
||||||
|
# Direct snapshot requ to the active leader, see
|
||||||
|
# https://support.hashicorp.com/hc/en-us/articles/22097624571155-Vault-snapshot-save-fails-with-message-Error-taking-snapshot-incomplete-snapshot-unable-to-read-SHA256SUMS-sealed-file
|
||||||
|
export VAULT_ADDR=$(vault status -format json | jq -r .leader_address)
|
||||||
vault operator raft snapshot save {{ vault_root_dir }}/backup/vault.snap
|
vault operator raft snapshot save {{ vault_root_dir }}/backup/vault.snap
|
||||||
{% endif %}
|
{% endif %}
|
||||||
|
@ -12,6 +12,16 @@ template {
|
|||||||
}
|
}
|
||||||
{% endif %}
|
{% endif %}
|
||||||
|
|
||||||
|
{% if nomad_conf.server.enabled %}
|
||||||
|
template {
|
||||||
|
source = "{{ vault_agent_root_dir }}/templates/nomad/vault.env.tpl"
|
||||||
|
destination = "/run/nomad/vault_config.env"
|
||||||
|
left_delimiter = "[["
|
||||||
|
right_delimiter = "]]"
|
||||||
|
perms = 0640
|
||||||
|
}
|
||||||
|
{% endif %}
|
||||||
|
|
||||||
{% if vault_agent_nomad.nomad_pki.enabled %}
|
{% if vault_agent_nomad.nomad_pki.enabled %}
|
||||||
template {
|
template {
|
||||||
source = "{{ vault_agent_root_dir }}/templates/nomad/agent_bundle.pem.tpl"
|
source = "{{ vault_agent_root_dir }}/templates/nomad/agent_bundle.pem.tpl"
|
||||||
|
@ -13,9 +13,9 @@ elif [ "$(echo ${VAULT_STATUS} | jq .initialized)" != "true" ]; then
|
|||||||
echo "Vault is not initialized yet, exiting"
|
echo "Vault is not initialized yet, exiting"
|
||||||
else
|
else
|
||||||
echo Updating Vault certificate to access Nomad API
|
echo Updating Vault certificate to access Nomad API
|
||||||
if [ -z "${VAULT_TOKEN}" -a -e /run/nomad/vault.env ]; then
|
if [ -z "${VAULT_TOKEN}" -a -e /run/nomad/vault_config.env ]; then
|
||||||
echo "Using VAULT_TOKEN from Nomad agent"
|
echo "Using VAULT_TOKEN from Nomad agent"
|
||||||
export $(cat /run/nomad/vault.env)
|
export $(cat /run/nomad/vault_config.env)
|
||||||
fi
|
fi
|
||||||
vault write {{ vault_agent_nomad.nomad_pki.cli.secret_path | default('nomad') }}/config/access \
|
vault write {{ vault_agent_nomad.nomad_pki.cli.secret_path | default('nomad') }}/config/access \
|
||||||
ca_cert="$(cat {{ nomad_root_dir }}/tls/ca.crt)" \
|
ca_cert="$(cat {{ nomad_root_dir }}/tls/ca.crt)" \
|
||||||
|
Loading…
x
Reference in New Issue
Block a user