mirror of
https://github.com/kubernetes-sigs/kubespray.git
synced 2026-05-22 16:27:51 -02:30
Remove Vault (#3684)
* Remove Vault * Remove reference to 'kargo' in the doc * change check order
This commit is contained in:
committed by
k8s-ci-robot
parent
b2b421840c
commit
3dcb914607
35
contrib/vault/roles/vault/templates/docker.service.j2
Normal file
35
contrib/vault/roles/vault/templates/docker.service.j2
Normal file
@@ -0,0 +1,35 @@
|
||||
[Unit]
|
||||
Description=hashicorp vault on docker
|
||||
Documentation=https://github.com/hashicorp/vault
|
||||
Wants=docker.socket
|
||||
After=docker.service
|
||||
|
||||
[Service]
|
||||
User=root
|
||||
Restart=always
|
||||
RestartSec=15s
|
||||
TimeoutStartSec=5
|
||||
LimitNOFILE=10000
|
||||
ExecReload={{ docker_bin_dir }}/docker restart {{ vault_container_name }}
|
||||
ExecStop={{ docker_bin_dir }}/docker stop {{ vault_container_name }}
|
||||
ExecStartPre=-{{ docker_bin_dir }}/docker rm -f {{ vault_container_name }}
|
||||
# Container has the following internal mount points:
|
||||
# /vault/file/ # File backend storage location
|
||||
# /vault/logs/ # Log files
|
||||
ExecStart={{ docker_bin_dir }}/docker run \
|
||||
--name {{ vault_container_name }} --net=host \
|
||||
--cap-add=IPC_LOCK \
|
||||
-v {{ vault_cert_dir }}:{{ vault_cert_dir }} \
|
||||
-v {{ vault_config_dir }}:{{ vault_config_dir }} \
|
||||
-v /etc/ssl:/etc/ssl \
|
||||
-v {{ etcd_cert_dir }}:{{ etcd_cert_dir }} \
|
||||
-v {{ vault_log_dir }}:/vault/logs \
|
||||
-v {{ vault_roles_dir }}:{{ vault_roles_dir }} \
|
||||
-v {{ vault_secrets_dir }}:{{ vault_secrets_dir }} \
|
||||
--entrypoint=vault \
|
||||
{{ vault_image_repo }}:{{ vault_image_tag }} \
|
||||
server --config={{ vault_config_dir }}/config.json \
|
||||
--log-level=trace
|
||||
|
||||
[Install]
|
||||
WantedBy=multi-user.target
|
||||
15
contrib/vault/roles/vault/templates/host.service.j2
Normal file
15
contrib/vault/roles/vault/templates/host.service.j2
Normal file
@@ -0,0 +1,15 @@
|
||||
[Unit]
|
||||
Description=vault
|
||||
After=network.target
|
||||
|
||||
[Service]
|
||||
AmbientCapabilities=CAP_IPC_LOCK
|
||||
ExecStart={{ bin_dir }}/vault server --config={{ vault_config_dir }}/config.json
|
||||
LimitNOFILE=40000
|
||||
NotifyAccess=all
|
||||
Restart=always
|
||||
RestartSec=10s
|
||||
User={{ vault_adduser_vars.name }}
|
||||
|
||||
[Install]
|
||||
WantedBy=multi-user.target
|
||||
2
contrib/vault/roles/vault/templates/http-proxy.conf.j2
Normal file
2
contrib/vault/roles/vault/templates/http-proxy.conf.j2
Normal file
@@ -0,0 +1,2 @@
|
||||
[Service]
|
||||
Environment={% if http_proxy %}"HTTP_PROXY={{ http_proxy }}"{% endif %} {% if https_proxy %}"HTTPS_PROXY={{ https_proxy }}"{% endif %} {% if no_proxy %}"NO_PROXY={{ no_proxy }}"{% endif %}
|
||||
45
contrib/vault/roles/vault/templates/rkt.service.j2
Normal file
45
contrib/vault/roles/vault/templates/rkt.service.j2
Normal file
@@ -0,0 +1,45 @@
|
||||
[Unit]
|
||||
Description=hashicorp vault on rkt
|
||||
Documentation=https://github.com/hashicorp/vault
|
||||
Wants=network.target
|
||||
|
||||
[Service]
|
||||
User=root
|
||||
Restart=on-failure
|
||||
RestartSec=10s
|
||||
TimeoutStartSec=5
|
||||
LimitNOFILE=40000
|
||||
# Container has the following internal mount points:
|
||||
# /vault/file/ # File backend storage location
|
||||
# /vault/logs/ # Log files
|
||||
ExecStartPre=-/usr/bin/rkt rm --uuid-file=/var/run/vault.uuid
|
||||
|
||||
ExecStart=/usr/bin/rkt run \
|
||||
--insecure-options=image \
|
||||
--volume hosts,kind=host,source=/etc/hosts,readOnly=true \
|
||||
--mount volume=hosts,target=/etc/hosts \
|
||||
--volume=volume-vault-file,kind=host,source=/var/lib/vault \
|
||||
--volume=volume-vault-logs,kind=host,source={{ vault_log_dir }} \
|
||||
--volume=vault-cert-dir,kind=host,source={{ vault_cert_dir }} \
|
||||
--mount=volume=vault-cert-dir,target={{ vault_cert_dir }} \
|
||||
--volume=vault-conf-dir,kind=host,source={{ vault_config_dir }} \
|
||||
--mount=volume=vault-conf-dir,target={{ vault_config_dir }} \
|
||||
--volume=vault-secrets-dir,kind=host,source={{ vault_secrets_dir }} \
|
||||
--mount=volume=vault-secrets-dir,target={{ vault_secrets_dir }} \
|
||||
--volume=vault-roles-dir,kind=host,source={{ vault_roles_dir }} \
|
||||
--mount=volume=vault-roles-dir,target={{ vault_roles_dir }} \
|
||||
--volume=etcd-cert-dir,kind=host,source={{ etcd_cert_dir }} \
|
||||
--mount=volume=etcd-cert-dir,target={{ etcd_cert_dir }} \
|
||||
docker://{{ vault_image_repo }}:{{ vault_image_tag }} \
|
||||
--uuid-file-save=/var/run/vault.uuid \
|
||||
--name={{ vault_container_name }} \
|
||||
--net=host \
|
||||
--caps-retain=CAP_IPC_LOCK \
|
||||
--exec vault -- \
|
||||
server \
|
||||
--config={{ vault_config_dir }}/config.json
|
||||
|
||||
ExecStop=-/usr/bin/rkt stop --uuid-file=/var/run/vault.uuid
|
||||
|
||||
[Install]
|
||||
WantedBy=multi-user.target
|
||||
Reference in New Issue
Block a user