blob: 3da115c45e97a3ae2bd87ff8041e4c001948700a (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
|
# vim: ft=sh ts=4 sw=4 et
post_install () {
getent passwd vault > /dev/null || useradd \
-s /bin/nologin -c 'Vault daemon' -d /var/lib/vault -M -r -U vault
if [[ ! -d /var/lib/vault ]] ; then
mkdir /var/lib/vault
chown vault:vault /var/lib/vault
fi
cat <<EOF
The default configuration stores data in files under "/var/lib/vault",
and listens on "localhost" with TLS disabled. Please consider modifying
the configuration file "/etc/vault.hcl" to suit your needs. For more
information read: https://vaultproject.io/docs/config/index.html
A systemd unit for Vault has been installed, and daemon can be started
normally using "systemctl":
systemctl enable vault.service
systemctl start vault.service
IMPORTANT: Be sure to initialize the Vault backend using "vault init"!
EOF
setcap cap_ipc_lock=+ep /usr/bin/vault
}
post_upgrade () {
if [[ -d /var/lib/vault ]] ; then
local badperms=false
while read -r path ; do
if [[ $(stat --format=%U:%G "${path}") != vault:vault ]]
then
badperms=true
break
fi
done < <( find /var/lib/vault )
if ${badperms} ; then
echo 'Bad permissions detected in /var/lib/vault, fixing...'
chown -R vault:vault /var/lib/vault
fi
fi
post_install
}
|