mirror of
https://github.com/hashicorp/vault.git
synced 2025-08-06 06:37:02 +02:00
fix script
This commit is contained in:
parent
dcb263ca70
commit
32d4240dd9
@ -1302,6 +1302,7 @@ scenario "dr_replication" {
|
||||
vault_root_token = step.create_secondary_cluster.root_token
|
||||
verify_pki_certs = false
|
||||
verify_aws_engine_creds = false
|
||||
verify_ssh_secrets = false
|
||||
}
|
||||
}
|
||||
|
||||
|
@ -992,6 +992,7 @@ scenario "pr_replication" {
|
||||
vault_root_token = step.create_secondary_cluster.root_token
|
||||
verify_pki_certs = false
|
||||
verify_aws_engine_creds = false
|
||||
verify_ssh_secrets = false
|
||||
}
|
||||
}
|
||||
|
||||
|
@ -9,14 +9,20 @@ fail() {
|
||||
exit 1
|
||||
}
|
||||
|
||||
log() {
|
||||
echo "[DEBUG] $1" >&2
|
||||
}
|
||||
|
||||
[[ -z "$VERIFY_SSH_SECRETS" ]] && fail "VERIFY_SSH_SECRETS env variable has not been set"
|
||||
[[ -z "$CA_KEY_TYPE" ]] && fail "CA_KEY_TYPE env variable has not been set"
|
||||
[[ -z "$VAULT_ADDR" ]] && fail "VAULT_ADDR env variable has not been set"
|
||||
[[ -z "$VAULT_TOKEN" ]] && fail "VAULT_TOKEN env variable has not been set"
|
||||
[[ -z "$VAULT_INSTALL_DIR" ]] && fail "VAULT_INSTALL_DIR env variable has not been set"
|
||||
|
||||
# Exit if VERIFY_SSH_SECRETS is set to false
|
||||
[[ "${VERIFY_SSH_SECRETS}" == false ]] && exit 0
|
||||
if [[ "$VERIFY_SSH_SECRETS" == "false" ]]; then
|
||||
log "VERIFY_SSH_SECRETS is false; exiting script"
|
||||
exit 0
|
||||
fi
|
||||
|
||||
binpath=${VAULT_INSTALL_DIR}/vault
|
||||
test -x "$binpath" || fail "unable to locate vault binary at $binpath"
|
||||
|
@ -21,8 +21,10 @@ log() {
|
||||
[[ -z "$VAULT_TOKEN" ]] && fail "VAULT_TOKEN env variable has not been set"
|
||||
[[ -z "$VAULT_INSTALL_DIR" ]] && fail "VAULT_INSTALL_DIR env variable has not been set"
|
||||
|
||||
# Exit if VERIFY_SSH_SECRETS is set to false
|
||||
[[ "${VERIFY_SSH_SECRETS}" == false ]] && exit 0
|
||||
if [[ "$VERIFY_SSH_SECRETS" == "false" ]]; then
|
||||
log "VERIFY_SSH_SECRETS is false; exiting script"
|
||||
exit 0
|
||||
fi
|
||||
|
||||
binpath=${VAULT_INSTALL_DIR}/vault
|
||||
test -x "$binpath" || fail "unable to locate vault binary at $binpath"
|
||||
|
@ -37,8 +37,10 @@ log "Starting env var checks"
|
||||
[[ -z "$DEFAULT_USER" ]] && fail "DEFAULT_USER env variable has not been set"
|
||||
[[ -z "$ALLOWED_USERS" ]] && fail "ALLOWED_USERS env variable has not been set"
|
||||
|
||||
# Exit if VERIFY_SSH_SECRETS is set to false
|
||||
[[ "${VERIFY_SSH_SECRETS}" == false ]] && exit 0
|
||||
if [[ "$VERIFY_SSH_SECRETS" == "false" ]]; then
|
||||
log "VERIFY_SSH_SECRETS is false; exiting script"
|
||||
exit 0
|
||||
fi
|
||||
|
||||
# Type-specific required vars
|
||||
case "$KEY_TYPE" in
|
||||
|
@ -16,8 +16,10 @@ fail() {
|
||||
[[ -z "$VAULT_TOKEN" ]] && fail "VAULT_TOKEN env variable has not been set"
|
||||
[[ -z "$VAULT_INSTALL_DIR" ]] && fail "VAULT_INSTALL_DIR env variable has not been set"
|
||||
|
||||
# Exit if VERIFY_SSH_SECRETS is set to false
|
||||
[[ "${VERIFY_SSH_SECRETS}" == false ]] && exit 0
|
||||
if [[ "$VERIFY_SSH_SECRETS" == "false" ]]; then
|
||||
log "VERIFY_SSH_SECRETS is false; exiting script"
|
||||
exit 0
|
||||
fi
|
||||
|
||||
SIGNED_KEY_PATH=$(mktemp)
|
||||
trap 'rm -f "$SIGNED_KEY_PATH"' EXIT
|
||||
|
Loading…
Reference in New Issue
Block a user