Ansible Vault

用于 Hashicorp Vault 的 Ansible 角色。「🔑 Ansible role for Hashicorp Vault」

Github星跟踪图

Ansible role to install Hashicorp Vault

Ansible Lint
Ansible Molecule
Average time to resolve an issue
Percentage of issues still open

This Ansible role performs a basic Vault
installation, including filesystem structure and example configuration.

It can also bootstrap a minimal development or evaluation server or HA
Consul-backed cluster in a Vagrant based environment. See
README_VAGRANT.md and the associated Vagrantfile for more details about the developer mode setup.

Installation

This role resides on GitHub pending the integration with Ansible Galaxy. To install this role create a roles/requirements.yml file in your Ansible project folder with the following contents:

- src: https://github.com/ansible-community/ansible-vault.git
  name: ansible-community.ansible-vault
  scm: git
  version: master

You can use git tag in the version attribute. Also you can honor its legacy name: brianshumate.ansible-vault.

Quick Start Guide

Basic installation is possible using the included site.yml playbook:

ansible-playbook -i hosts site.yml

You can also pass variables in using the --extra-vars option to the
ansible-playbook command:

ansible-playbook -i hosts site.yml --extra-vars "vault_datacenter=maui"

Specify a template file with a different backend definition
(see templates/backend_consul.j2):

ansible-playbook -i hosts site.yml --extra-vars "vault_backend_file=backend_file.j2"

You need to make sure that the template file backend_file.j2 is in the
role directory for this to work.

Requirements

This role requires Archlinux, AmazonLinux, FreeBSD, Debian or a RHEL based Linux distribution. It
might work with other software versions, but does work with the following
specific software and versions. Sorry, there is no planned support at the moment for Windows.

See the molecule scenarios
for currently tested distributions.

Warning

By default, this role may restart vault service when played (when there's a
configuration change, OS Packages installed/updated)

When there's no auto-unseal setup on your cluster, the restart may lead to a
situation where all Vault instances will be sealed and your cluster will be
down.

To avoid this situation, the service restart by the playbook can be disabled
by using the vault_service_restart role variable.

Setting this vault_service_restart to false will disable the vault
service restart by the playbook. You may have to restart the service manually
to load any new configuration deployed.

Role Variables

Misc

Vault Release Scheme

License

BSD-2-Clause

Author Information

Brian Shumate

Contributors

Special thanks to the folks listed in CONTRIBUTORS.md for their
contributions to this project.

主要指标

概览
名称与所有者ansible-community/ansible-vault
主编程语言Jinja
编程语言Shell (语言数: 4)
平台
许可证BSD 2-Clause "Simplified" License
所有者活动
创建于2016-10-14 03:42:58
推送于2024-12-15 00:42:01
最后一次提交2024-12-15 11:42:01
发布数146
最新版本名称v3.0.0 (发布于 2024-12-13 08:42:04)
第一版名称v1.0.0 (发布于 )
用户参与
星数377
关注者数13
派生数193
提交数628
已启用问题?
问题数115
打开的问题数32
拉请求数212
打开的拉请求数6
关闭的拉请求数40
项目设置
已启用Wiki?
已存档?
是复刻?
已锁定?
是镜像?
是私有?