Compare commits
No commits in common. "docs" and "main" have entirely different histories.
159
.drone.jsonnet
Normal file
159
.drone.jsonnet
Normal file
@ -0,0 +1,159 @@
|
||||
local PipelineLinting = {
|
||||
kind: 'pipeline',
|
||||
name: 'linting',
|
||||
platform: {
|
||||
os: 'linux',
|
||||
arch: 'amd64',
|
||||
},
|
||||
steps: [
|
||||
{
|
||||
name: 'ansible-later',
|
||||
image: 'thegeeklab/ansible-later',
|
||||
commands: [
|
||||
'ansible-later',
|
||||
],
|
||||
},
|
||||
{
|
||||
name: 'python-format',
|
||||
image: 'python:3.9',
|
||||
environment: {
|
||||
PY_COLORS: 1,
|
||||
},
|
||||
commands: [
|
||||
'pip install -qq yapf',
|
||||
'[ ! -z "$(find . -type f -name *.py)" ] && yapf -rd ./',
|
||||
],
|
||||
},
|
||||
{
|
||||
name: 'python-flake8',
|
||||
image: 'python:3.9',
|
||||
environment: {
|
||||
PY_COLORS: 1,
|
||||
},
|
||||
commands: [
|
||||
'pip install -qq flake8',
|
||||
'flake8',
|
||||
],
|
||||
},
|
||||
],
|
||||
trigger: {
|
||||
ref: ['refs/heads/main', 'refs/tags/**', 'refs/pull/**'],
|
||||
},
|
||||
};
|
||||
|
||||
local PipelineDeployment(scenario='rocky9') = {
|
||||
kind: 'pipeline',
|
||||
name: 'testing-' + scenario,
|
||||
platform: {
|
||||
os: 'linux',
|
||||
arch: 'amd64',
|
||||
},
|
||||
concurrency: {
|
||||
limit: 1,
|
||||
},
|
||||
workspace: {
|
||||
base: '/drone/src',
|
||||
path: '${DRONE_REPO_NAME}',
|
||||
},
|
||||
steps: [
|
||||
{
|
||||
name: 'ansible-molecule',
|
||||
image: 'thegeeklab/molecule:3',
|
||||
environment: {
|
||||
HCLOUD_TOKEN: { from_secret: 'hcloud_token' },
|
||||
},
|
||||
commands: [
|
||||
'molecule test -s ' + scenario,
|
||||
],
|
||||
},
|
||||
],
|
||||
depends_on: [
|
||||
'linting',
|
||||
],
|
||||
trigger: {
|
||||
ref: ['refs/heads/main', 'refs/tags/**', 'refs/pull/**'],
|
||||
},
|
||||
};
|
||||
|
||||
local PipelineDocumentation = {
|
||||
kind: 'pipeline',
|
||||
name: 'documentation',
|
||||
platform: {
|
||||
os: 'linux',
|
||||
arch: 'amd64',
|
||||
},
|
||||
steps: [
|
||||
{
|
||||
name: 'generate',
|
||||
image: 'thegeeklab/ansible-doctor',
|
||||
environment: {
|
||||
ANSIBLE_DOCTOR_LOG_LEVEL: 'INFO',
|
||||
ANSIBLE_DOCTOR_FORCE_OVERWRITE: true,
|
||||
ANSIBLE_DOCTOR_EXCLUDE_FILES: 'molecule/',
|
||||
ANSIBLE_DOCTOR_TEMPLATE: 'hugo-book',
|
||||
ANSIBLE_DOCTOR_ROLE_NAME: '${DRONE_REPO_NAME#*.}',
|
||||
ANSIBLE_DOCTOR_OUTPUT_DIR: '_docs/',
|
||||
},
|
||||
},
|
||||
{
|
||||
name: 'publish',
|
||||
image: 'plugins/gh-pages',
|
||||
settings: {
|
||||
remote_url: 'https://gitea.rknet.org/ansible/${DRONE_REPO_NAME}',
|
||||
netrc_machine: 'gitea.rknet.org',
|
||||
username: { from_secret: 'gitea_username' },
|
||||
password: { from_secret: 'gitea_token' },
|
||||
pages_directory: '_docs/',
|
||||
target_branch: 'docs',
|
||||
},
|
||||
when: {
|
||||
ref: ['refs/heads/main'],
|
||||
},
|
||||
},
|
||||
],
|
||||
trigger: {
|
||||
ref: ['refs/heads/main', 'refs/tags/**', 'refs/pull/**'],
|
||||
},
|
||||
depends_on: [
|
||||
'testing-rocky9',
|
||||
],
|
||||
};
|
||||
|
||||
local PipelineNotification = {
|
||||
kind: 'pipeline',
|
||||
name: 'notification',
|
||||
platform: {
|
||||
os: 'linux',
|
||||
arch: 'amd64',
|
||||
},
|
||||
clone: {
|
||||
disable: true,
|
||||
},
|
||||
steps: [
|
||||
{
|
||||
name: 'matrix',
|
||||
image: 'thegeeklab/drone-matrix',
|
||||
settings: {
|
||||
homeserver: { from_secret: 'matrix_homeserver' },
|
||||
roomid: { from_secret: 'matrix_roomid' },
|
||||
template: 'Status: **{{ .Build.Status }}**<br/> Build: [{{ .Repo.Owner }}/{{ .Repo.Name }}]({{ .Build.Link }}){{ if .Build.Branch }} ({{ .Build.Branch }}){{ end }} by {{ .Commit.Author }}<br/> Message: {{ .Commit.Message.Title }}',
|
||||
username: { from_secret: 'matrix_username' },
|
||||
password: { from_secret: 'matrix_password' },
|
||||
},
|
||||
},
|
||||
],
|
||||
depends_on: [
|
||||
'documentation',
|
||||
],
|
||||
trigger: {
|
||||
status: ['success', 'failure'],
|
||||
ref: ['refs/heads/main', 'refs/tags/**'],
|
||||
},
|
||||
};
|
||||
|
||||
[
|
||||
PipelineLinting,
|
||||
PipelineDeployment(scenario='rocky9'),
|
||||
PipelineDocumentation,
|
||||
PipelineNotification,
|
||||
]
|
153
.drone.yml
Normal file
153
.drone.yml
Normal file
@ -0,0 +1,153 @@
|
||||
---
|
||||
kind: pipeline
|
||||
name: linting
|
||||
|
||||
platform:
|
||||
os: linux
|
||||
arch: amd64
|
||||
|
||||
steps:
|
||||
- name: ansible-later
|
||||
image: thegeeklab/ansible-later
|
||||
commands:
|
||||
- ansible-later
|
||||
|
||||
- name: python-format
|
||||
image: python:3.9
|
||||
commands:
|
||||
- pip install -qq yapf
|
||||
- "[ ! -z \"$(find . -type f -name *.py)\" ] && yapf -rd ./"
|
||||
environment:
|
||||
PY_COLORS: 1
|
||||
|
||||
- name: python-flake8
|
||||
image: python:3.9
|
||||
commands:
|
||||
- pip install -qq flake8
|
||||
- flake8
|
||||
environment:
|
||||
PY_COLORS: 1
|
||||
|
||||
trigger:
|
||||
ref:
|
||||
- refs/heads/main
|
||||
- refs/tags/**
|
||||
- refs/pull/**
|
||||
|
||||
---
|
||||
kind: pipeline
|
||||
name: testing-rocky9
|
||||
|
||||
platform:
|
||||
os: linux
|
||||
arch: amd64
|
||||
|
||||
concurrency:
|
||||
limit: 1
|
||||
|
||||
workspace:
|
||||
base: /drone/src
|
||||
path: ${DRONE_REPO_NAME}
|
||||
|
||||
steps:
|
||||
- name: ansible-molecule
|
||||
image: thegeeklab/molecule:3
|
||||
commands:
|
||||
- molecule test -s rocky9
|
||||
environment:
|
||||
HCLOUD_TOKEN:
|
||||
from_secret: hcloud_token
|
||||
|
||||
trigger:
|
||||
ref:
|
||||
- refs/heads/main
|
||||
- refs/tags/**
|
||||
- refs/pull/**
|
||||
|
||||
depends_on:
|
||||
- linting
|
||||
|
||||
---
|
||||
kind: pipeline
|
||||
name: documentation
|
||||
|
||||
platform:
|
||||
os: linux
|
||||
arch: amd64
|
||||
|
||||
steps:
|
||||
- name: generate
|
||||
image: thegeeklab/ansible-doctor
|
||||
environment:
|
||||
ANSIBLE_DOCTOR_EXCLUDE_FILES: molecule/
|
||||
ANSIBLE_DOCTOR_FORCE_OVERWRITE: true
|
||||
ANSIBLE_DOCTOR_LOG_LEVEL: INFO
|
||||
ANSIBLE_DOCTOR_OUTPUT_DIR: _docs/
|
||||
ANSIBLE_DOCTOR_ROLE_NAME: ${DRONE_REPO_NAME#*.}
|
||||
ANSIBLE_DOCTOR_TEMPLATE: hugo-book
|
||||
|
||||
- name: publish
|
||||
image: plugins/gh-pages
|
||||
settings:
|
||||
netrc_machine: gitea.rknet.org
|
||||
pages_directory: _docs/
|
||||
password:
|
||||
from_secret: gitea_token
|
||||
remote_url: https://gitea.rknet.org/ansible/${DRONE_REPO_NAME}
|
||||
target_branch: docs
|
||||
username:
|
||||
from_secret: gitea_username
|
||||
when:
|
||||
ref:
|
||||
- refs/heads/main
|
||||
|
||||
trigger:
|
||||
ref:
|
||||
- refs/heads/main
|
||||
- refs/tags/**
|
||||
- refs/pull/**
|
||||
|
||||
depends_on:
|
||||
- testing-rocky9
|
||||
|
||||
---
|
||||
kind: pipeline
|
||||
name: notification
|
||||
|
||||
platform:
|
||||
os: linux
|
||||
arch: amd64
|
||||
|
||||
clone:
|
||||
disable: true
|
||||
|
||||
steps:
|
||||
- name: matrix
|
||||
image: thegeeklab/drone-matrix
|
||||
settings:
|
||||
homeserver:
|
||||
from_secret: matrix_homeserver
|
||||
password:
|
||||
from_secret: matrix_password
|
||||
roomid:
|
||||
from_secret: matrix_roomid
|
||||
template: "Status: **{{ .Build.Status }}**<br/> Build: [{{ .Repo.Owner }}/{{ .Repo.Name }}]({{ .Build.Link }}){{ if .Build.Branch }} ({{ .Build.Branch }}){{ end }} by {{ .Commit.Author }}<br/> Message: {{ .Commit.Message.Title }}"
|
||||
username:
|
||||
from_secret: matrix_username
|
||||
|
||||
trigger:
|
||||
ref:
|
||||
- refs/heads/main
|
||||
- refs/tags/**
|
||||
status:
|
||||
- success
|
||||
- failure
|
||||
|
||||
depends_on:
|
||||
- documentation
|
||||
|
||||
---
|
||||
kind: signature
|
||||
hmac: aaef009e2c8bb30a83837ba52368a718360a33d1628dca2b56bd200052296564
|
||||
|
||||
...
|
11
.gitignore
vendored
Normal file
11
.gitignore
vendored
Normal file
@ -0,0 +1,11 @@
|
||||
# ---> Ansible
|
||||
*.retry
|
||||
plugins
|
||||
library
|
||||
|
||||
# ---> Python
|
||||
# Byte-compiled / optimized / DLL files
|
||||
__pycache__/
|
||||
*.py[cod]
|
||||
*$py.class
|
||||
|
18
.later.yml
Normal file
18
.later.yml
Normal file
@ -0,0 +1,18 @@
|
||||
---
|
||||
ansible:
|
||||
custom_modules:
|
||||
- iptables_raw
|
||||
- openssl_pkcs12
|
||||
- proxmox_kvm
|
||||
- ucr
|
||||
- hashivault_unseal
|
||||
|
||||
rules:
|
||||
exclude_files:
|
||||
- molecule/
|
||||
- "LICENSE*"
|
||||
- "**/*.md"
|
||||
- "**/*.ini"
|
||||
|
||||
exclude_filter:
|
||||
- LINT0009
|
1
.prettierignore
Normal file
1
.prettierignore
Normal file
@ -0,0 +1 @@
|
||||
.drone*
|
21
LICENSE
Normal file
21
LICENSE
Normal file
@ -0,0 +1,21 @@
|
||||
MIT License
|
||||
|
||||
Copyright (c) 2023 Robert Kaussow <mail@thegeeklab.de>
|
||||
|
||||
Permission is hereby granted, free of charge, to any person obtaining a copy
|
||||
of this software and associated documentation files (the "Software"), to deal
|
||||
in the Software without restriction, including without limitation the rights
|
||||
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
|
||||
copies of the Software, and to permit persons to whom the Software is furnished
|
||||
to do so, subject to the following conditions:
|
||||
|
||||
The above copyright notice and this permission notice (including the next
|
||||
paragraph) shall be included in all copies or substantial portions of the
|
||||
Software.
|
||||
|
||||
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
||||
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS
|
||||
FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS
|
||||
OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY,
|
||||
WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF
|
||||
OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
|
10
README.md
Normal file
10
README.md
Normal file
@ -0,0 +1,10 @@
|
||||
# xoxys.vault
|
||||
|
||||
[![Build Status](https://img.shields.io/drone/build/ansible/xoxys.vault?logo=drone&server=https%3A%2F%2Fdrone.rknet.org)](https://drone.rknet.org/ansible/xoxys.vault)
|
||||
[![License: MIT](https://img.shields.io/badge/License-MIT-blue.svg?label=license)](LICENSE)
|
||||
|
||||
Setup HashiCorp Vaul secrets manager. You can find the full documentation at [https://galaxy.geekdocs.de](https://galaxy.geekdocs.de/roles/cloud/vault/).
|
||||
|
||||
## License
|
||||
|
||||
This project is licensed under the MIT License - see the [LICENSE](LICENSE) file for details.
|
273
_docs/index.md
273
_docs/index.md
@ -1,273 +0,0 @@
|
||||
---
|
||||
title: vault
|
||||
type: docs
|
||||
---
|
||||
|
||||
[![Source Code](https://img.shields.io/badge/gitea-source%20code-blue?logo=gitea&logoColor=white)](https://gitea.rknet.org/ansible/xoxys.vault)
|
||||
[![Build Status](https://img.shields.io/drone/build/ansible/xoxys.vault?logo=drone&server=https%3A%2F%2Fdrone.rknet.org)](https://drone.rknet.org/ansible/xoxys.vault)
|
||||
[![License: MIT](https://img.shields.io/badge/License-MIT-blue.svg?label=license)](https://gitea.rknet.org/ansible/xoxys.vault/src/branch/main/LICENSE)
|
||||
|
||||
Setup HashiCorp Vaul secrets manager.
|
||||
|
||||
<!--more-->
|
||||
|
||||
- [Requirements](#requirements)
|
||||
- [Default Variables](#default-variables)
|
||||
- [vault_auto_unseal](#vault_auto_unseal)
|
||||
- [vault_cap_add](#vault_cap_add)
|
||||
- [vault_cap_drop](#vault_cap_drop)
|
||||
- [vault_config_volume](#vault_config_volume)
|
||||
- [vault_data_volume](#vault_data_volume)
|
||||
- [vault_default_lease_ttl](#vault_default_lease_ttl)
|
||||
- [vault_disable_clustering](#vault_disable_clustering)
|
||||
- [vault_exposed_ports](#vault_exposed_ports)
|
||||
- [vault_image](#vault_image)
|
||||
- [vault_log_level](#vault_log_level)
|
||||
- [vault_max_lease_ttl](#vault_max_lease_ttl)
|
||||
- [vault_network](#vault_network)
|
||||
- [vault_network_ipv4_gateway](#vault_network_ipv4_gateway)
|
||||
- [vault_network_ipv4_subnet](#vault_network_ipv4_subnet)
|
||||
- [vault_network_ipv6_enabled](#vault_network_ipv6_enabled)
|
||||
- [vault_network_ipv6_gateway](#vault_network_ipv6_gateway)
|
||||
- [vault_network_ipv6_subnet](#vault_network_ipv6_subnet)
|
||||
- [vault_podman_args](#vault_podman_args)
|
||||
- [vault_ui](#vault_ui)
|
||||
- [vault_unseal_keys](#vault_unseal_keys)
|
||||
- [vault_url](#vault_url)
|
||||
- [vault_volumes](#vault_volumes)
|
||||
- [Dependencies](#dependencies)
|
||||
|
||||
---
|
||||
|
||||
## Requirements
|
||||
|
||||
- Minimum Ansible version: `2.10`
|
||||
|
||||
|
||||
## Default Variables
|
||||
|
||||
### vault_auto_unseal
|
||||
|
||||
#### Default value
|
||||
|
||||
```YAML
|
||||
vault_auto_unseal: false
|
||||
```
|
||||
|
||||
### vault_cap_add
|
||||
|
||||
#### Default value
|
||||
|
||||
```YAML
|
||||
vault_cap_add:
|
||||
- ipc_lock
|
||||
```
|
||||
|
||||
### vault_cap_drop
|
||||
|
||||
#### Default value
|
||||
|
||||
```YAML
|
||||
vault_cap_drop: []
|
||||
```
|
||||
|
||||
### vault_config_volume
|
||||
|
||||
#### Default value
|
||||
|
||||
```YAML
|
||||
vault_config_volume: vault-config
|
||||
```
|
||||
|
||||
### vault_data_volume
|
||||
|
||||
#### Default value
|
||||
|
||||
```YAML
|
||||
vault_data_volume: vault-data
|
||||
```
|
||||
|
||||
### vault_default_lease_ttl
|
||||
|
||||
#### Default value
|
||||
|
||||
```YAML
|
||||
vault_default_lease_ttl: 24h
|
||||
```
|
||||
|
||||
### vault_disable_clustering
|
||||
|
||||
#### Default value
|
||||
|
||||
```YAML
|
||||
vault_disable_clustering: true
|
||||
```
|
||||
|
||||
### vault_exposed_ports
|
||||
|
||||
Ports you want to publish outside of Docker. Vault is running on `8200` inside of the container.
|
||||
|
||||
#### Default value
|
||||
|
||||
```YAML
|
||||
vault_exposed_ports: []
|
||||
```
|
||||
|
||||
### vault_image
|
||||
|
||||
#### Default value
|
||||
|
||||
```YAML
|
||||
vault_image: docker.io/hashicorp/vault:latest
|
||||
```
|
||||
|
||||
### vault_log_level
|
||||
|
||||
#### Default value
|
||||
|
||||
```YAML
|
||||
vault_log_level: warn
|
||||
```
|
||||
|
||||
### vault_max_lease_ttl
|
||||
|
||||
#### Default value
|
||||
|
||||
```YAML
|
||||
vault_max_lease_ttl: 240h
|
||||
```
|
||||
|
||||
### vault_network
|
||||
|
||||
Name of the container network. If the name ends with `.network`, the network will be created with the specified configuration.
|
||||
Otherwise, the network must already exist and the container will be attached to the network.
|
||||
|
||||
#### Default value
|
||||
|
||||
```YAML
|
||||
vault_network: vault.network
|
||||
```
|
||||
|
||||
### vault_network_ipv4_gateway
|
||||
|
||||
#### Default value
|
||||
|
||||
```YAML
|
||||
vault_network_ipv4_gateway: _unset_
|
||||
```
|
||||
|
||||
### vault_network_ipv4_subnet
|
||||
|
||||
#### Default value
|
||||
|
||||
```YAML
|
||||
vault_network_ipv4_subnet: _unset_
|
||||
```
|
||||
|
||||
### vault_network_ipv6_enabled
|
||||
|
||||
#### Default value
|
||||
|
||||
```YAML
|
||||
vault_network_ipv6_enabled: false
|
||||
```
|
||||
|
||||
### vault_network_ipv6_gateway
|
||||
|
||||
#### Default value
|
||||
|
||||
```YAML
|
||||
vault_network_ipv6_gateway: _unset_
|
||||
```
|
||||
|
||||
#### Example usage
|
||||
|
||||
```YAML
|
||||
vault_network_ipv6_gateway: fd00:0:0:2::1
|
||||
```
|
||||
|
||||
### vault_network_ipv6_subnet
|
||||
|
||||
#### Default value
|
||||
|
||||
```YAML
|
||||
vault_network_ipv6_subnet: _unset_
|
||||
```
|
||||
|
||||
#### Example usage
|
||||
|
||||
```YAML
|
||||
vault_network_ipv6_subnet: fd00:0:0:2::/64
|
||||
```
|
||||
|
||||
### vault_podman_args
|
||||
|
||||
#### Default value
|
||||
|
||||
```YAML
|
||||
vault_podman_args:
|
||||
- --pids-limit=-1
|
||||
- --userns=host
|
||||
- --health-cmd='["wget", "--spider", "--proxy", "off", "http://localhost:8200/{{
|
||||
__vault_health_path }}"]'
|
||||
- --health-interval=5s
|
||||
- --health-timeout=5s
|
||||
- --health-retries=6
|
||||
- --health-on-failure=kill
|
||||
```
|
||||
|
||||
### vault_ui
|
||||
|
||||
#### Default value
|
||||
|
||||
```YAML
|
||||
vault_ui: true
|
||||
```
|
||||
|
||||
### vault_unseal_keys
|
||||
|
||||
#### Default value
|
||||
|
||||
```YAML
|
||||
vault_unseal_keys: []
|
||||
```
|
||||
|
||||
### vault_url
|
||||
|
||||
#### Default value
|
||||
|
||||
```YAML
|
||||
vault_url: http://localhost:8200
|
||||
```
|
||||
|
||||
### vault_volumes
|
||||
|
||||
> Define required docker volumes.
|
||||
|
||||
#### Default value
|
||||
|
||||
```YAML
|
||||
vault_volumes:
|
||||
- name: '{{ vault_config_volume }}'
|
||||
dest: /vault/config
|
||||
opts: Z
|
||||
- name: '{{ vault_data_volume }}'
|
||||
dest: /vault/file
|
||||
opts: Z
|
||||
```
|
||||
|
||||
#### Example usage
|
||||
|
||||
```YAML
|
||||
vault_volumes:
|
||||
- name: data
|
||||
# target location inside the container
|
||||
dest: /var/www/app/data
|
||||
type: volume
|
||||
```
|
||||
|
||||
|
||||
|
||||
## Dependencies
|
||||
|
||||
None.
|
65
defaults/main.yml
Normal file
65
defaults/main.yml
Normal file
@ -0,0 +1,65 @@
|
||||
---
|
||||
vault_image: "docker.io/hashicorp/vault:latest"
|
||||
vault_url: "http://localhost:8200"
|
||||
|
||||
vault_config_volume: "vault-config"
|
||||
vault_data_volume: "vault-data"
|
||||
|
||||
# @var vault_volumes:description: > Define required docker volumes.
|
||||
# @end
|
||||
# @var vault_volumes:example: >
|
||||
# vault_volumes:
|
||||
# - name: data
|
||||
# # target location inside the container
|
||||
# dest: /var/www/app/data
|
||||
# type: volume
|
||||
# @end
|
||||
vault_volumes:
|
||||
- name: "{{ vault_config_volume }}"
|
||||
dest: /vault/config
|
||||
opts: Z
|
||||
- name: "{{ vault_data_volume }}"
|
||||
dest: /vault/file
|
||||
opts: Z
|
||||
|
||||
# @var vault_network:description: >
|
||||
# Name of the container network. If the name ends with `.network`, the network will be created with the specified configuration.
|
||||
# Otherwise, the network must already exist and the container will be attached to the network.
|
||||
# @end
|
||||
vault_network: "vault.network"
|
||||
vault_network_ipv6_enabled: False
|
||||
# @var vault_network_ipv6_subnet:value: $ "_unset_"
|
||||
# @var vault_network_ipv6_subnet:example: $ "fd00:0:0:2::/64"
|
||||
# @var vault_network_ipv6_gateway:value: $ "_unset_"
|
||||
# @var vault_network_ipv6_gateway:example: $ "fd00:0:0:2::1"
|
||||
|
||||
# @var vault_network_ipv4_subnet:value: $ "_unset_"
|
||||
# @var vault_network_ipv4_gateway:value: $ "_unset_"
|
||||
|
||||
# @var vault_exposed_ports:description: >
|
||||
# Ports you want to publish outside of Docker. Vault is running on `8200` inside of the container.
|
||||
# @end
|
||||
vault_exposed_ports: []
|
||||
|
||||
vault_cap_add:
|
||||
- ipc_lock
|
||||
vault_cap_drop: []
|
||||
|
||||
vault_podman_args:
|
||||
- --pids-limit=-1
|
||||
- --userns=host
|
||||
- --health-cmd='["wget", "--spider", "--proxy", "off", "http://localhost:8200/{{ __vault_health_path }}"]'
|
||||
- --health-interval=5s
|
||||
- --health-timeout=5s
|
||||
- --health-retries=6
|
||||
- --health-on-failure=kill
|
||||
|
||||
vault_log_level: warn
|
||||
vault_default_lease_ttl: 24h
|
||||
vault_max_lease_ttl: 240h
|
||||
|
||||
vault_ui: True
|
||||
vault_disable_clustering: True
|
||||
|
||||
vault_unseal_keys: []
|
||||
vault_auto_unseal: False
|
14
handlers/main.yml
Normal file
14
handlers/main.yml
Normal file
@ -0,0 +1,14 @@
|
||||
---
|
||||
- name: Restart vault
|
||||
service:
|
||||
name: vault
|
||||
state: restarted
|
||||
daemon_reload: True
|
||||
listen: __vault_restart
|
||||
|
||||
- name: Reload vault
|
||||
service:
|
||||
name: vault
|
||||
state: reloaded
|
||||
daemon_reload: True
|
||||
listen: __vault_reload
|
27
meta/main.yml
Normal file
27
meta/main.yml
Normal file
@ -0,0 +1,27 @@
|
||||
# Standards: 0.2
|
||||
---
|
||||
galaxy_info:
|
||||
# @meta author:value: [Robert Kaussow](https://gitea.rknet.org/xoxys)
|
||||
author: "Robert Kaussow <mail@thegeeklab.de>"
|
||||
namespace: xoxys
|
||||
role_name: vault
|
||||
# @meta description: >
|
||||
# [![Source Code](https://img.shields.io/badge/gitea-source%20code-blue?logo=gitea&logoColor=white)](https://gitea.rknet.org/ansible/xoxys.vault)
|
||||
# [![Build Status](https://img.shields.io/drone/build/ansible/xoxys.vault?logo=drone&server=https%3A%2F%2Fdrone.rknet.org)](https://drone.rknet.org/ansible/xoxys.vault)
|
||||
# [![License: MIT](https://img.shields.io/badge/License-MIT-blue.svg?label=license)](https://gitea.rknet.org/ansible/xoxys.vault/src/branch/main/LICENSE)
|
||||
#
|
||||
# Setup HashiCorp Vaul secrets manager.
|
||||
# @end
|
||||
description: Setup HashiCorp Vaul secrets manager
|
||||
license: MIT
|
||||
min_ansible_version: "2.10"
|
||||
platforms:
|
||||
- name: EL
|
||||
versions:
|
||||
- "9"
|
||||
galaxy_tags: []
|
||||
dependencies: []
|
||||
collections:
|
||||
- xoxys.general
|
||||
- community.general
|
||||
- containers.podman
|
1
molecule/default
Symbolic link
1
molecule/default
Symbolic link
@ -0,0 +1 @@
|
||||
rocky9
|
3
molecule/pytest.ini
Normal file
3
molecule/pytest.ini
Normal file
@ -0,0 +1,3 @@
|
||||
[pytest]
|
||||
filterwarnings =
|
||||
ignore::DeprecationWarning
|
12
molecule/requirements.yml
Normal file
12
molecule/requirements.yml
Normal file
@ -0,0 +1,12 @@
|
||||
---
|
||||
collections:
|
||||
- name: https://gitea.rknet.org/ansible/xoxys.general
|
||||
type: git
|
||||
- name: community.general
|
||||
- name: containers.podman
|
||||
|
||||
roles:
|
||||
- src: https://gitea.rknet.org/ansible/xoxys.podman
|
||||
name: xoxys.podman
|
||||
scm: git
|
||||
version: main
|
9
molecule/rocky9/converge.yml
Normal file
9
molecule/rocky9/converge.yml
Normal file
@ -0,0 +1,9 @@
|
||||
---
|
||||
- name: Converge
|
||||
hosts: all
|
||||
roles:
|
||||
- role: xoxys.podman
|
||||
- role: xoxys.vault
|
||||
vars:
|
||||
vault_exposed_ports:
|
||||
- 127.0.0.1:8200:8200
|
120
molecule/rocky9/create.yml
Normal file
120
molecule/rocky9/create.yml
Normal file
@ -0,0 +1,120 @@
|
||||
---
|
||||
- name: Create
|
||||
hosts: localhost
|
||||
connection: local
|
||||
gather_facts: false
|
||||
no_log: "{{ molecule_no_log }}"
|
||||
vars:
|
||||
ssh_port: 22
|
||||
ssh_user: root
|
||||
ssh_path: "{{ lookup('env', 'MOLECULE_EPHEMERAL_DIRECTORY') }}/ssh_key"
|
||||
tasks:
|
||||
- name: Create SSH key
|
||||
user:
|
||||
name: "{{ lookup('env', 'USER') }}"
|
||||
generate_ssh_key: true
|
||||
ssh_key_file: "{{ ssh_path }}"
|
||||
force: true
|
||||
register: generated_ssh_key
|
||||
|
||||
- name: Register the SSH key name
|
||||
set_fact:
|
||||
ssh_key_name: "molecule-generated-{{ 12345 | random | to_uuid }}"
|
||||
|
||||
- name: Register SSH key for test instance(s)
|
||||
hcloud_ssh_key:
|
||||
name: "{{ ssh_key_name }}"
|
||||
public_key: "{{ generated_ssh_key.ssh_public_key }}"
|
||||
state: present
|
||||
|
||||
- name: Create molecule instance(s)
|
||||
hcloud_server:
|
||||
name: "{{ item.name }}"
|
||||
server_type: "{{ item.server_type }}"
|
||||
ssh_keys:
|
||||
- "{{ ssh_key_name }}"
|
||||
image: "{{ item.image }}"
|
||||
location: "{{ item.location | default(omit) }}"
|
||||
datacenter: "{{ item.datacenter | default(omit) }}"
|
||||
user_data: "{{ item.user_data | default(omit) }}"
|
||||
api_token: "{{ lookup('env', 'HCLOUD_TOKEN') }}"
|
||||
state: present
|
||||
register: server
|
||||
loop: "{{ molecule_yml.platforms }}"
|
||||
async: 7200
|
||||
poll: 0
|
||||
|
||||
- name: Wait for instance(s) creation to complete
|
||||
async_status:
|
||||
jid: "{{ item.ansible_job_id }}"
|
||||
register: hetzner_jobs
|
||||
until: hetzner_jobs.finished
|
||||
retries: 300
|
||||
loop: "{{ server.results }}"
|
||||
|
||||
- name: Create volume(s)
|
||||
hcloud_volume:
|
||||
name: "{{ item.name }}"
|
||||
server: "{{ item.name }}"
|
||||
location: "{{ item.location | default(omit) }}"
|
||||
size: "{{ item.volume_size | default(10) }}"
|
||||
api_token: "{{ lookup('env', 'HCLOUD_TOKEN') }}"
|
||||
state: "present"
|
||||
loop: "{{ molecule_yml.platforms }}"
|
||||
when: item.volume | default(False) | bool
|
||||
register: volumes
|
||||
async: 7200
|
||||
poll: 0
|
||||
|
||||
- name: Wait for volume(s) creation to complete
|
||||
async_status:
|
||||
jid: "{{ item.ansible_job_id }}"
|
||||
register: hetzner_volumes
|
||||
until: hetzner_volumes.finished
|
||||
retries: 300
|
||||
when: volumes.changed
|
||||
loop: "{{ volumes.results }}"
|
||||
|
||||
# Mandatory configuration for Molecule to function.
|
||||
|
||||
- name: Populate instance config dict
|
||||
set_fact:
|
||||
instance_conf_dict:
|
||||
{
|
||||
"instance": "{{ item.hcloud_server.name }}",
|
||||
"ssh_key_name": "{{ ssh_key_name }}",
|
||||
"address": "{{ item.hcloud_server.ipv4_address }}",
|
||||
"user": "{{ ssh_user }}",
|
||||
"port": "{{ ssh_port }}",
|
||||
"identity_file": "{{ ssh_path }}",
|
||||
"volume": "{{ item.item.item.volume | default(False) | bool }}",
|
||||
}
|
||||
loop: "{{ hetzner_jobs.results }}"
|
||||
register: instance_config_dict
|
||||
when: server.changed | bool
|
||||
|
||||
- name: Convert instance config dict to a list
|
||||
set_fact:
|
||||
instance_conf: "{{ instance_config_dict.results | map(attribute='ansible_facts.instance_conf_dict') | list }}"
|
||||
when: server.changed | bool
|
||||
|
||||
- name: Dump instance config
|
||||
copy:
|
||||
content: |
|
||||
# Molecule managed
|
||||
|
||||
{{ instance_conf | to_nice_yaml(indent=2) }}
|
||||
dest: "{{ molecule_instance_config }}"
|
||||
when: server.changed | bool
|
||||
|
||||
- name: Wait for SSH
|
||||
wait_for:
|
||||
port: "{{ ssh_port }}"
|
||||
host: "{{ item.address }}"
|
||||
search_regex: SSH
|
||||
delay: 10
|
||||
loop: "{{ lookup('file', molecule_instance_config) | from_yaml }}"
|
||||
|
||||
- name: Wait for VM to settle down
|
||||
pause:
|
||||
seconds: 30
|
78
molecule/rocky9/destroy.yml
Normal file
78
molecule/rocky9/destroy.yml
Normal file
@ -0,0 +1,78 @@
|
||||
---
|
||||
- name: Destroy
|
||||
hosts: localhost
|
||||
connection: local
|
||||
gather_facts: false
|
||||
no_log: "{{ molecule_no_log }}"
|
||||
tasks:
|
||||
- name: Check existing instance config file
|
||||
stat:
|
||||
path: "{{ molecule_instance_config }}"
|
||||
register: cfg
|
||||
|
||||
- name: Populate the instance config
|
||||
set_fact:
|
||||
instance_conf: "{{ (lookup('file', molecule_instance_config) | from_yaml) if cfg.stat.exists else [] }}"
|
||||
|
||||
- name: Destroy molecule instance(s)
|
||||
hcloud_server:
|
||||
name: "{{ item.instance }}"
|
||||
api_token: "{{ lookup('env', 'HCLOUD_TOKEN') }}"
|
||||
state: absent
|
||||
register: server
|
||||
loop: "{{ instance_conf }}"
|
||||
async: 7200
|
||||
poll: 0
|
||||
|
||||
- name: Wait for instance(s) deletion to complete
|
||||
async_status:
|
||||
jid: "{{ item.ansible_job_id }}"
|
||||
register: hetzner_jobs
|
||||
until: hetzner_jobs.finished
|
||||
retries: 300
|
||||
loop: "{{ server.results }}"
|
||||
|
||||
- pause:
|
||||
seconds: 5
|
||||
|
||||
- name: Destroy volume(s)
|
||||
hcloud_volume:
|
||||
name: "{{ item.instance }}"
|
||||
server: "{{ item.instance }}"
|
||||
api_token: "{{ lookup('env', 'HCLOUD_TOKEN') }}"
|
||||
state: "absent"
|
||||
register: volumes
|
||||
loop: "{{ instance_conf }}"
|
||||
when: item.volume | default(False) | bool
|
||||
async: 7200
|
||||
poll: 0
|
||||
|
||||
- name: Wait for volume(s) deletion to complete
|
||||
async_status:
|
||||
jid: "{{ item.ansible_job_id }}"
|
||||
register: hetzner_volumes
|
||||
until: hetzner_volumes.finished
|
||||
retries: 300
|
||||
when: volumes.changed
|
||||
loop: "{{ volumes.results }}"
|
||||
|
||||
- name: Remove registered SSH key
|
||||
hcloud_ssh_key:
|
||||
name: "{{ instance_conf[0].ssh_key_name }}"
|
||||
state: absent
|
||||
when: (instance_conf | default([])) | length > 0
|
||||
|
||||
# Mandatory configuration for Molecule to function.
|
||||
|
||||
- name: Populate instance config
|
||||
set_fact:
|
||||
instance_conf: {}
|
||||
|
||||
- name: Dump instance config
|
||||
copy:
|
||||
content: |
|
||||
# Molecule managed
|
||||
|
||||
{{ instance_conf | to_nice_yaml(indent=2) }}
|
||||
dest: "{{ molecule_instance_config }}"
|
||||
when: server.changed | bool
|
24
molecule/rocky9/molecule.yml
Normal file
24
molecule/rocky9/molecule.yml
Normal file
@ -0,0 +1,24 @@
|
||||
---
|
||||
dependency:
|
||||
name: galaxy
|
||||
options:
|
||||
role-file: molecule/requirements.yml
|
||||
requirements-file: molecule/requirements.yml
|
||||
env:
|
||||
ANSIBLE_GALAXY_DISPLAY_PROGRESS: "false"
|
||||
driver:
|
||||
name: delegated
|
||||
platforms:
|
||||
- name: rocky9-vault
|
||||
image: rocky-9
|
||||
server_type: cx11
|
||||
lint: |
|
||||
/usr/local/bin/flake8
|
||||
provisioner:
|
||||
name: ansible
|
||||
env:
|
||||
ANSIBLE_FILTER_PLUGINS: ${ANSIBLE_FILTER_PLUGINS:-./plugins/filter}
|
||||
ANSIBLE_LIBRARY: ${ANSIBLE_LIBRARY:-./library}
|
||||
log: False
|
||||
verifier:
|
||||
name: testinfra
|
15
molecule/rocky9/prepare.yml
Normal file
15
molecule/rocky9/prepare.yml
Normal file
@ -0,0 +1,15 @@
|
||||
---
|
||||
- name: Prepare
|
||||
hosts: all
|
||||
gather_facts: false
|
||||
tasks:
|
||||
- name: Bootstrap python for Ansible
|
||||
raw: |
|
||||
command -v python3 python || (
|
||||
(test -e /usr/bin/dnf && sudo dnf install -y python3) ||
|
||||
(test -e /usr/bin/apt && (apt -y update && apt install -y python-minimal)) ||
|
||||
(test -e /usr/bin/yum && sudo yum -y -qq install python3) ||
|
||||
echo "Warning: Python not boostrapped due to unknown platform."
|
||||
)
|
||||
become: true
|
||||
changed_when: false
|
28
molecule/rocky9/tests/test_default.py
Normal file
28
molecule/rocky9/tests/test_default.py
Normal file
@ -0,0 +1,28 @@
|
||||
import os
|
||||
|
||||
import testinfra.utils.ansible_runner
|
||||
|
||||
testinfra_hosts = testinfra.utils.ansible_runner.AnsibleRunner(
|
||||
os.environ["MOLECULE_INVENTORY_FILE"]
|
||||
).get_hosts("all")
|
||||
|
||||
|
||||
def test_vault_running_and_enabled(host):
|
||||
vault = host.service("vault")
|
||||
assert vault.is_running
|
||||
assert vault.is_enabled
|
||||
|
||||
|
||||
def test_vault_socket(host):
|
||||
# Verify the socket is listening for HTTP traffic
|
||||
assert host.socket("tcp://127.0.0.1:8200").is_listening
|
||||
|
||||
|
||||
def test_vault_conn(host):
|
||||
code = int(
|
||||
host.run(
|
||||
"curl -s -w '%{http_code}' http://127.0.0.1:8200/v1/sys/health?standbyok=true -o /dev/null" # noqa
|
||||
).stdout
|
||||
)
|
||||
|
||||
assert code == 501
|
12
setup.cfg
Normal file
12
setup.cfg
Normal file
@ -0,0 +1,12 @@
|
||||
[flake8]
|
||||
ignore = D100, D101, D102, D103, D105, D107, E402, W503
|
||||
max-line-length = 99
|
||||
inline-quotes = double
|
||||
exclude = .git,.tox,__pycache__,build,dist,tests,*.pyc,*.egg-info,.cache,.eggs,env*
|
||||
|
||||
[yapf]
|
||||
based_on_style = google
|
||||
column_limit = 99
|
||||
dedent_closing_brackets = true
|
||||
coalesce_brackets = true
|
||||
split_before_logical_operator = true
|
86
tasks/main.yml
Normal file
86
tasks/main.yml
Normal file
@ -0,0 +1,86 @@
|
||||
---
|
||||
- block:
|
||||
- name: Create network specs
|
||||
template:
|
||||
src: etc/containers/systemd/vault.network.j2
|
||||
dest: "/etc/containers/systemd/vault.network"
|
||||
owner: root
|
||||
group: root
|
||||
mode: "0640"
|
||||
when: vault_network | splitext | last == ".network"
|
||||
notify: __vault_restart
|
||||
|
||||
- name: Create container volumes
|
||||
containers.podman.podman_volume:
|
||||
name: "{{ item.name }}"
|
||||
options: "{{ item.options | default(omit) }}"
|
||||
state: "{{ item.state | default('present') }}"
|
||||
loop: "{{ vault_volumes }}"
|
||||
loop_control:
|
||||
label: "{{ item.name }}"
|
||||
when: item.type | default("volume") | lower == "volume"
|
||||
register: __vault_volumes_raw
|
||||
|
||||
- name: Register container volumes map
|
||||
set_fact:
|
||||
__vault_volumes_map: "{{ __vault_volumes_raw.results | json_query('[].volume') | items2dict(key_name='Name', value_name='Mountpoint') }}"
|
||||
|
||||
- name: Deploy vault env file
|
||||
template:
|
||||
src: etc/containers/systemd/vault.env.j2
|
||||
dest: "/etc/containers/systemd/vault.env"
|
||||
owner: root
|
||||
group: root
|
||||
mode: "0640"
|
||||
notify: __vault_restart
|
||||
|
||||
- name: Deploy vault config
|
||||
template:
|
||||
src: vault/config.hcl.j2
|
||||
dest: "{{ __vault_volumes_map[vault_config_volume] }}/config.hcl"
|
||||
owner: root
|
||||
group: root
|
||||
mode: "0644"
|
||||
notify: __vault_reload
|
||||
|
||||
- name: Create container specs
|
||||
template:
|
||||
src: etc/containers/systemd/vault.container.j2
|
||||
dest: "/etc/containers/systemd/vault.container"
|
||||
owner: root
|
||||
group: root
|
||||
mode: "0640"
|
||||
notify: __vault_restart
|
||||
|
||||
- name: Ensure service state
|
||||
systemd:
|
||||
name: "vault.service"
|
||||
state: started
|
||||
daemon_reload: True
|
||||
enabled: True
|
||||
become: True
|
||||
become_user: root
|
||||
|
||||
- block:
|
||||
- name: Flush handlers
|
||||
meta: flush_handlers
|
||||
|
||||
- name: Wait for Vault startup
|
||||
uri:
|
||||
url: "{{ vault_url }}/{{ __vault_health_path }}"
|
||||
follow_redirects: none
|
||||
method: GET
|
||||
register: __vault_http_result
|
||||
until: __vault_http_result.status == 200
|
||||
retries: 10
|
||||
delay: 3
|
||||
|
||||
- name: Unseal vault
|
||||
hashivault_unseal:
|
||||
keys: "{{ vault_unseal_keys }}"
|
||||
url: "{{ vault_url }}"
|
||||
become: True
|
||||
become_user: root
|
||||
when:
|
||||
- vault_auto_unseal | bool
|
||||
- vault_unseal_keys | length > 0
|
36
templates/etc/containers/systemd/vault.container.j2
Normal file
36
templates/etc/containers/systemd/vault.container.j2
Normal file
@ -0,0 +1,36 @@
|
||||
#jinja2: lstrip_blocks: True
|
||||
{{ ansible_managed | comment }}
|
||||
[Install]
|
||||
WantedBy=default.target
|
||||
|
||||
[Service]
|
||||
Restart=on-failure
|
||||
RestartSec=5s
|
||||
|
||||
ExecReload=/usr/bin/podman kill --signal=SIGHUP {{ __vault_container_name }}
|
||||
|
||||
[Container]
|
||||
Image={{ vault_image }}
|
||||
ContainerName={{ __vault_container_name }}
|
||||
Exec=/usr/local/bin/docker-entrypoint.sh server
|
||||
EnvironmentFile=/etc/containers/systemd/vault.env
|
||||
{% for item in vault_volumes %}
|
||||
Volume={{ item.name }}:{{ item.dest }}{{ ":" + item.opts if item.opts is defined else "" }}
|
||||
{% endfor %}
|
||||
{% if (vault_cap_add + vault_cap_drop) | length > 0 %}
|
||||
|
||||
{% if vault_cap_add | length > 0 %}
|
||||
AddCapability={{ vault_cap_add | join(" ") }}
|
||||
{% endif %}
|
||||
{% if vault_cap_drop | length > 0 %}
|
||||
DropCapability={{ vault_cap_drop | join(" ") }}
|
||||
{% endif %}
|
||||
{% endif %}
|
||||
|
||||
Network={{ vault_network }}
|
||||
{% for item in vault_exposed_ports %}
|
||||
PublishPort={{ item }}
|
||||
{% endfor %}
|
||||
{% for item in vault_podman_args %}
|
||||
PodmanArgs={{ item }}
|
||||
{% endfor %}
|
3
templates/etc/containers/systemd/vault.env.j2
Normal file
3
templates/etc/containers/systemd/vault.env.j2
Normal file
@ -0,0 +1,3 @@
|
||||
#jinja2: lstrip_blocks: True
|
||||
{{ ansible_managed | comment }}
|
||||
VAULT_ADDR={{ vault_url }}
|
19
templates/etc/containers/systemd/vault.network.j2
Normal file
19
templates/etc/containers/systemd/vault.network.j2
Normal file
@ -0,0 +1,19 @@
|
||||
#jinja2: lstrip_blocks: True
|
||||
{{ ansible_managed | comment }}
|
||||
[Network]
|
||||
{% if vault_network_ipv4_subnet is defined %}
|
||||
Subnet={{ vault_network_ipv4_subnet }}
|
||||
{% endif %}
|
||||
{% if vault_network_ipv4_gateway is defined %}
|
||||
Gateway={{ vault_network_ipv4_gateway }}
|
||||
{% endif %}
|
||||
IPv6={{ vault_network_ipv6_enabled | bool | lower }}
|
||||
{% if vault_network_ipv6_enabled | bool %}
|
||||
{% if vault_network_ipv6_subnet is defined %}
|
||||
Subnet={{ vault_network_ipv6_subnet }}
|
||||
{% endif %}
|
||||
{% if vault_network_ipv6_gateway is defined %}
|
||||
Gateway={{ vault_network_ipv6_gateway }}
|
||||
{% endif %}
|
||||
{% endif %}
|
||||
Label=app=vault
|
21
templates/vault/config.hcl.j2
Normal file
21
templates/vault/config.hcl.j2
Normal file
@ -0,0 +1,21 @@
|
||||
ui = {{ vault_ui | bool | lower }}
|
||||
api_addr = "{{ vault_url }}"
|
||||
disable_clustering = {{ vault_disable_clustering | bool | lower }}
|
||||
log_level = "{{ vault_log_level }}"
|
||||
|
||||
default_lease_ttl = "{{ vault_default_lease_ttl }}"
|
||||
max_lease_ttl = "{{ vault_max_lease_ttl }}"
|
||||
|
||||
storage "file" {
|
||||
path = "/vault/file"
|
||||
}
|
||||
|
||||
listener "tcp" {
|
||||
address = "[::]:8200"
|
||||
tls_disable = true
|
||||
}
|
||||
|
||||
telemetry {
|
||||
prometheus_retention_time = "1m"
|
||||
disable_hostname = true
|
||||
}
|
3
vars/main.yml
Normal file
3
vars/main.yml
Normal file
@ -0,0 +1,3 @@
|
||||
---
|
||||
__vault_container_name: vault-server
|
||||
__vault_health_path: v1/sys/health?standbyok=true&uninitcode=200
|
Loading…
Reference in New Issue
Block a user