From ad1a28bf48a206fcd850566876cca399ee0bbb80 Mon Sep 17 00:00:00 2001 From: kibblewhite Date: Tue, 24 May 2022 00:22:36 +0200 Subject: [PATCH] Minor changes --- README.md | 8 +++--- Setup/vault/config/vault-cluster-keys.json | 31 ---------------------- 2 files changed, 5 insertions(+), 34 deletions(-) delete mode 100644 Setup/vault/config/vault-cluster-keys.json diff --git a/README.md b/README.md index c4946ca..1264b58 100644 --- a/README.md +++ b/README.md @@ -35,7 +35,9 @@ I took inspiration from this article to get me started: https://www.infoq.com/ar ## Getting Started -You'll need a running Vault service, and although it is beyond the scope of this project, there is included a ```Dockerfile``` and ```docker-compose.yml``` included to help get going ith a postgresql service backend and utlising Vault-Unseal (https://github.com/omegion/vault-unseal). +You'll need a running Vault service +- Although it is beyond the scope of this project, there is included a ```Dockerfile``` and ```docker-compose.yml``` included to help get going with a postgresql service backend and utilising Vault-Unseal (https://github.com/omegion/vault-unseal). + Include with this is the config files, entrypoint script which will need configuration (replace the vault shards), and the vault-db.sql for the postgres db. If you already have a running vault service, you will need to have access to the vault CLI, and then set the vault token environment variable as following: @@ -57,7 +59,7 @@ apk add nano curl ## Vault Configurations -- Create a username/password authenication method +- Create a username/password authentication method - This will be used to read role-id values and generate secret-id values from the staging approle secrets only, nothing more. - You can see that the paths defined in the ACL policy ```setup/vault/config/policies/approles/staging-userpass.hcl``` will allow access to this part of the system. - For the purpose of this documentation we will create a single username/password. However, this will not reflect the "real-world" configurations. @@ -66,7 +68,7 @@ apk add nano curl - Create the approle authentication method - Create the ACL policy that will allow access to the KV secrets store as path ```kv/data/staging/*``` - again this can be seen in the policy file ```setup/vault/policies/approle/staging-approle.hcl``` - Note the extra ```/data/``` path inserted after the ```kv/``` - this is to let the policy know that the path being accessed is for the version 2 secret store (kv-v2), and not version 1. - - For the purpose of documentation, we will create an approle named ```staging``` and apply the newly create policy to that approle entry. + - For the purpose of documentation, we will create an approle named ```staging``` and apply the newly created policy to that approle entry. Where it mentions to run a commmand "Only once per database", this means that once the command has been run, you do not need to run it again and can omit that step. If you are working on an existing service using an existing database, you can safely assume that this step has already been done. diff --git a/Setup/vault/config/vault-cluster-keys.json b/Setup/vault/config/vault-cluster-keys.json deleted file mode 100644 index 669d36e..0000000 --- a/Setup/vault/config/vault-cluster-keys.json +++ /dev/null @@ -1,31 +0,0 @@ -{ - "keys": [ - "dc761cbad9c291e6704010e73d66c7f59d3ceb65bff5ca8e216e222a6b239536e6", - "8818fbf9dc92e29491bbcc229f04d8169768aff51956b6ab8e7f858318e98f19e8", - "0f5349d2b998cf5165875a5f40c375295def2ae74b6134ca35953f7e353b47b2af", - "66dc75cf37a03372ad175f7895bfa3445a861c76cf6b41facc156473c9951f85f9", - "3c690fdd6e477cd9b9732e4e93d68a83e8dc84fe7489e53cf2333b2386486ff1f6", - "7ef1e03e087d893212ef0570dbc6db14249e3d9c44dfbab72cd615b973dc58b642", - "585dd96715b6602b3d63469bad4665c01eb882a1df59748386bf7e059a10fbb895", - "a9540105ef8f156c49f5543dbb0c7dd0f1497ec4017d1463e18092ceefa319b7b2", - "b059b9a6b77812dd68f14ec3392800864150f2956d49fb0afca3484ae8b53c6eec", - "ee6c77e769379f9f32482400222e3d59e60ee8c7679d0f5c1b288d39650fdf9f5a", - "43103b60831506633b84dc92acd8129a29a34f9d6676b3a27a47e91dfcb81aae1a", - "bfa209a58ce593f50392a3c6517e33a4375f8336978837cd90741bfd69fd34df08" - ], - "keys_base64": [ - "3HYcutnCkeZwQBDnPWbH9Z0862W/9cqOIW4iKmsjlTbm", - "iBj7+dyS4pSRu8winwTYFpdor/UZVrarjn+Fgxjpjxno", - "D1NJ0rmYz1Flh1pfQMN1KV3vKudLYTTKNZU/fjU7R7Kv", - "Ztx1zzegM3KtF194lb+jRFqGHHbPa0H6zBVkc8mVH4X5", - "PGkP3W5HfNm5cy5Ok9aKg+jchP50ieU88jM7I4ZIb/H2", - "fvHgPgh9iTIS7wVw28bbFCSePZxE37q3LNYVuXPcWLZC", - "WF3ZZxW2YCs9Y0abrUZlwB64gqHfWXSDhr9+BZoQ+7iV", - "qVQBBe+PFWxJ9VQ9uwx90PFJfsQBfRRj4YCSzu+jGbey", - "sFm5prd4Et1o8U7DOSgAhkFQ8pVtSfsK/KNISui1PG7s", - "7mx352k3n58ySCQAIi49WeYO6MdnnQ9cGyiNOWUP359a", - "QxA7YIMVBmM7hNySrNgSmimjT51mdrOiekfpHfy4Gq4a", - "v6IJpYzlk/UDkqPGUX4zpDdfgzaXiDfNkHQb/Wn9NN8I" - ], - "root_token": "hvs.fzlW81QcX9Gxlfd9s9v1Nltg" -} \ No newline at end of file