Protect vault secret with GPG
Encrypting the vault password with GPG protects the key when stored on disk and allows it to be accessed non-interactively, as long as the GnuPG agent is set up correctly.
This commit is contained in:
1
.gitignore
vendored
1
.gitignore
vendored
@@ -1 +1,2 @@
|
|||||||
|
/.vault-secret.gpg
|
||||||
.fact-cache
|
.fact-cache
|
||||||
|
|||||||
2
.vault-secret.sh
Executable file
2
.vault-secret.sh
Executable file
@@ -0,0 +1,2 @@
|
|||||||
|
#!/bin/sh
|
||||||
|
exec gpg --quiet --batch --decrypt "${0%.sh}.gpg"
|
||||||
@@ -6,3 +6,5 @@ inventory = hosts
|
|||||||
gathering = smart
|
gathering = smart
|
||||||
fact_caching = jsonfile
|
fact_caching = jsonfile
|
||||||
fact_caching_connection = .fact-cache
|
fact_caching_connection = .fact-cache
|
||||||
|
|
||||||
|
vault_password_file = .vault-secret.sh
|
||||||
|
|||||||
Reference in New Issue
Block a user