59 lines
1.6 KiB
YAML
59 lines
1.6 KiB
YAML
---
|
|
|
|
- name: cluster/systemd | Ensure mount points exist prior to vault.service startup
|
|
file:
|
|
mode: 0750
|
|
path: "{{ item }}"
|
|
state: directory
|
|
with_items:
|
|
- "{{ vault_config_dir }}"
|
|
- "{{ vault_log_dir }}"
|
|
- "{{ vault_secrets_dir }}"
|
|
- /var/lib/vault/
|
|
|
|
- name: cluster/systemd | Ensure the vault user has access to needed directories
|
|
file:
|
|
owner: vault
|
|
path: "{{ item }}"
|
|
recurse: true
|
|
with_items:
|
|
- "{{ vault_base_dir }}"
|
|
- "{{ vault_log_dir }}"
|
|
- /var/lib/vault
|
|
|
|
- name: cluster/systemd | Copy down vault.service systemd file
|
|
template:
|
|
src: "{{ vault_deployment_type }}.service.j2"
|
|
dest: /etc/systemd/system/vault.service
|
|
backup: yes
|
|
register: vault_systemd_placement
|
|
|
|
- name: Create vault service systemd directory
|
|
file:
|
|
path: /etc/systemd/system/vault.service.d
|
|
state: directory
|
|
|
|
- name: cluster/systemd | Add vault proxy env vars
|
|
template:
|
|
src: "http-proxy.conf.j2"
|
|
dest: /etc/systemd/system/vault.service.d/http-proxy.conf
|
|
backup: yes
|
|
when: http_proxy is defined or https_proxy is defined
|
|
|
|
- name: cluster/systemd | Enable vault.service
|
|
systemd:
|
|
daemon_reload: true
|
|
enabled: yes
|
|
name: vault
|
|
state: started
|
|
|
|
- name: cluster/systemd | Query local vault until service is up
|
|
uri:
|
|
url: "{{ vault_config.listener.tcp.tls_disable|d()|ternary('http', 'https') }}://localhost:{{ vault_port }}/v1/sys/health"
|
|
headers: "{{ vault_client_headers }}"
|
|
status_code: 200,429,500,501
|
|
register: vault_health_check
|
|
until: vault_health_check|succeeded
|
|
retries: 10
|
|
delay: "{{ retry_stagger | random + 3 }}"
|