Skip to content
This repository was archived by the owner on Dec 24, 2022. It is now read-only.

Replacing keyczar by native Ansible vault. #64

Closed
wants to merge 2 commits into from

Conversation

dverdin
Copy link
Contributor

@dverdin dverdin commented Mar 15, 2019

Not working for now because password aren't decrypted. But all scripts (environment generation, etc.) are updated.
Some script might not be necessary anymore and replaced by simple calls to ansible-vault.
I'll cleanup after.

@racke
Copy link
Contributor

racke commented Mar 29, 2019

I started on a fresh VM with a fresh environment. The contents of the file environments/local/group_vars/sympa.yml are:

# Group vars for sympa servers


sympa:
  db:
    app_user: sympa
    app_password: "{{ lookup('file',inventory_dir+'/private/password/sympa_db_app_password') }}"
    readonly_user: sympareadonly
    readonly_password: "{{ lookup('file',inventory_dir+'/private/password/sympa_db_readonly_password') }}"
  lists_path: /var/lib/sympa/list_data
  arc_path: /var/lib/sympa/archives

Ansible simply uses the content of the files. That's the problem - and there is no benefit of having these files around, or?

@racke
Copy link
Contributor

racke commented Mar 30, 2019

Actually I don't understand why we need this scripting framework. Ansible could produce these environments from the "templates" as well and updates of your inventory would be more reliable. And it would be way more readable.

@racke
Copy link
Contributor

racke commented Apr 1, 2019

Documentation bug:

vault-password directory

This directory contains the secret used by keyczar to encrypt the secrets.

@dverdin
Copy link
Contributor Author

dverdin commented Apr 2, 2019

Sorry for my recent silence. I was on something else.

  • I fixed the README,
  • about the isolated files containing the passwords, I like the idea of having all the secrets in one place, that can optionally be stored/versioned separately from the rest of the environment. But as they are encrypted by default, that might be overkill, However, with the scripts, we can easily access one of the passwords by simply decrypting a file
  • about the scripts: I don't think they are absolutely necessary, though I regularly use the utility to encrypt/decrypt passwords to make tests and/or read in the database.

@racke
Copy link
Contributor

racke commented Jun 21, 2019

Superseded by #70

@racke racke closed this Jun 21, 2019
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants