Ansible Vault

用于 Hashicorp Vault 的 Ansible 角色。「🔑 Ansible role for Hashicorp Vault」

Github stars Tracking Chart

Ansible role to install Hashicorp Vault

Ansible Lint
Ansible Molecule
Average time to resolve an issue
Percentage of issues still open

This Ansible role performs a basic Vault
installation, including filesystem structure and example configuration.

It can also bootstrap a minimal development or evaluation server or HA
Consul-backed cluster in a Vagrant based environment. See
README_VAGRANT.md and the associated Vagrantfile for more details about the developer mode setup.

Installation

This role resides on GitHub pending the integration with Ansible Galaxy. To install this role create a roles/requirements.yml file in your Ansible project folder with the following contents:

- src: https://github.com/ansible-community/ansible-vault.git
  name: ansible-community.ansible-vault
  scm: git
  version: master

You can use git tag in the version attribute. Also you can honor its legacy name: brianshumate.ansible-vault.

Quick Start Guide

Basic installation is possible using the included site.yml playbook:

ansible-playbook -i hosts site.yml

You can also pass variables in using the --extra-vars option to the
ansible-playbook command:

ansible-playbook -i hosts site.yml --extra-vars "vault_datacenter=maui"

Specify a template file with a different backend definition
(see templates/backend_consul.j2):

ansible-playbook -i hosts site.yml --extra-vars "vault_backend_file=backend_file.j2"

You need to make sure that the template file backend_file.j2 is in the
role directory for this to work.

Requirements

This role requires Archlinux, AmazonLinux, FreeBSD, Debian or a RHEL based Linux distribution. It
might work with other software versions, but does work with the following
specific software and versions. Sorry, there is no planned support at the moment for Windows.

See the molecule scenarios
for currently tested distributions.

Warning

By default, this role may restart vault service when played (when there's a
configuration change, OS Packages installed/updated)

When there's no auto-unseal setup on your cluster, the restart may lead to a
situation where all Vault instances will be sealed and your cluster will be
down.

To avoid this situation, the service restart by the playbook can be disabled
by using the vault_service_restart role variable.

Setting this vault_service_restart to false will disable the vault
service restart by the playbook. You may have to restart the service manually
to load any new configuration deployed.

Role Variables

Misc

Vault Release Scheme

License

BSD-2-Clause

Author Information

Brian Shumate

Contributors

Special thanks to the folks listed in CONTRIBUTORS.md for their
contributions to this project.

Main metrics

Overview
Name With Owneransible-community/ansible-vault
Primary LanguageJinja
Program languageShell (Language Count: 4)
Platform
License:BSD 2-Clause "Simplified" License
所有者活动
Created At2016-10-14 03:42:58
Pushed At2024-12-15 00:42:01
Last Commit At2024-12-15 11:42:01
Release Count146
Last Release Namev3.0.0 (Posted on 2024-12-13 08:42:04)
First Release Namev1.0.0 (Posted on )
用户参与
Stargazers Count377
Watchers Count13
Fork Count193
Commits Count628
Has Issues Enabled
Issues Count115
Issue Open Count32
Pull Requests Count212
Pull Requests Open Count6
Pull Requests Close Count40
项目设置
Has Wiki Enabled
Is Archived
Is Fork
Is Locked
Is Mirror
Is Private