https://github.com/richlamdev/tf-vault
Vault testing
https://github.com/richlamdev/tf-vault
Last synced: about 1 year ago
JSON representation
Vault testing
- Host: GitHub
- URL: https://github.com/richlamdev/tf-vault
- Owner: richlamdev
- Created: 2022-05-09T04:37:21.000Z (almost 4 years ago)
- Default Branch: master
- Last Pushed: 2022-09-15T04:58:20.000Z (over 3 years ago)
- Last Synced: 2025-03-20T16:01:56.414Z (about 1 year ago)
- Language: Jinja
- Size: 115 KB
- Stars: 0
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# development / testing with HashiCorp Vault.
## Requirements:
Based on the github modules located here:
https://github.com/TerryHowe/ansible-modules-hashivault
## Quick Start
1) Generate a SSH keypair, named ```id_ed25519_tf_acg``` and ensure the pair is available in your home directory .ssh. IE:\
```/home//.ssh/id_ed25519_tf_acg``` and\
```/home//.ssh/id_ed25519_tf_acg.pub```
2) Install Ansible Modules Hashivault from above github repo:
```pip install ansible-modules-hashivault```
3) Install sshuttle (assuming Debian/Ubuntu based distribution)
```sudo apt install sshuttle```
4) Deploy resources to AWS via Terraform. Assumes you have an AWS account to launch to. This was built with
temporary sandboxes via acloudguru.com.
Under the terraform/ directory execute:\
```terraform init```\
```terraform plan```\
```terraform apply```
5) connect to the EC2 instance via poor man's VPN - sshuttle with the login script located under terraform/ directory
```./connect.sh```
6) deploy ansible roles from the ansible/ directory\
```./deploy.sh```
### Notes:
These are horrible practices here. Not meant for production at all. (unseal and root tokens saved to local disk)
This is meant purely to learn/practice with vault with an ephemeral instance. (an alternative, use dev mode locally to practice with HashiCorp Vault)