6bf74aa20d
This commit adds two new cli commands to allow an operator to read and write passwords into a configured Hashicorp Vault KV. Change-Id: Icf0eaf7544fcbdf7b83f697cc711446f47118a4d
69 lines
2.0 KiB
Bash
Executable File
69 lines
2.0 KiB
Bash
Executable File
#!/bin/bash
|
|
|
|
set -o xtrace
|
|
set -o errexit
|
|
|
|
export PYTHONUNBUFFERED=1
|
|
|
|
function install_vault {
|
|
if [[ "debian" == $BASE_DISTRO ]]; then
|
|
curl -fsSL https://apt.releases.hashicorp.com/gpg | sudo apt-key add -
|
|
sudo apt-add-repository "deb [arch=amd64] https://apt.releases.hashicorp.com $(lsb_release -cs) main"
|
|
sudo apt-get update -y && sudo apt-get install -y vault jq
|
|
else
|
|
sudo dnf install -y yum-utils
|
|
sudo dnf config-manager --add-repo https://rpm.releases.hashicorp.com/RHEL/hashicorp.repo
|
|
sudo dnf install -y vault jq
|
|
fi
|
|
}
|
|
|
|
function start_vault {
|
|
nohup vault server --dev &
|
|
# Give Vault some time to warm up
|
|
sleep 10
|
|
}
|
|
|
|
function test_vault {
|
|
TOKEN=$(vault token create -address 'http://127.0.0.1:8200' -format json | jq '.auth.client_token' --raw-output)
|
|
echo "${TOKEN}" | vault login -address 'http://127.0.0.1:8200' -
|
|
vault kv put -address 'http://127.0.0.1:8200' secret/foo data=bar
|
|
}
|
|
|
|
function test_writepwd {
|
|
TOKEN=$(vault token create -address 'http://127.0.0.1:8200' -format json | jq '.auth.client_token' --raw-output)
|
|
kolla-writepwd \
|
|
--passwords /etc/kolla/passwords.yml \
|
|
--vault-addr 'http://127.0.0.1:8200' \
|
|
--vault-token ${TOKEN} \
|
|
--vault-mount-point secret
|
|
}
|
|
|
|
function test_readpwd {
|
|
TOKEN=$(vault token create -address 'http://127.0.0.1:8200' -format json | jq '.auth.client_token' --raw-output)
|
|
cp etc/kolla/passwords.yml /tmp/passwords-hashicorp-vault.yml
|
|
kolla-readpwd \
|
|
--passwords /tmp/passwords-hashicorp-vault.yml \
|
|
--vault-addr 'http://127.0.0.1:8200' \
|
|
--vault-token ${TOKEN} \
|
|
--vault-mount-point secret
|
|
}
|
|
|
|
function teardown {
|
|
pkill vault
|
|
}
|
|
|
|
function test_hashicorp_vault_passwords {
|
|
echo "Setting up development Vault server..."
|
|
install_vault
|
|
start_vault
|
|
test_vault
|
|
echo "Write passwords to Hashicorp Vault..."
|
|
test_writepwd
|
|
echo "Read passwords from Hashicorp Vault..."
|
|
test_readpwd
|
|
echo "Cleaning up..."
|
|
teardown
|
|
}
|
|
|
|
test_hashicorp_vault_passwords
|