vault.spec 6.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169
  1. ##
  2. ## vault.spec -- OpenPKG RPM Package Specification
  3. ## Copyright (c) 2000-2017 OpenPKG Foundation e.V. <http://openpkg.net/>
  4. ##
  5. ## Permission to use, copy, modify, and distribute this software for
  6. ## any purpose with or without fee is hereby granted, provided that
  7. ## the above copyright notice and this permission notice appear in all
  8. ## copies.
  9. ##
  10. ## THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESSED OR IMPLIED
  11. ## WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
  12. ## MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
  13. ## IN NO EVENT SHALL THE AUTHORS AND COPYRIGHT HOLDERS AND THEIR
  14. ## CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
  15. ## SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
  16. ## LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF
  17. ## USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
  18. ## ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
  19. ## OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
  20. ## OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
  21. ## SUCH DAMAGE.
  22. ##
  23. # package version
  24. %define V_vault_opkg 0.8.1
  25. %define V_vault_base 0.8.1
  26. %define V_vault_snap 20170816
  27. # package information
  28. Name: vault
  29. Summary: Security Manager
  30. URL: https://www.vaultproject.io/
  31. Vendor: Hashicorp
  32. Packager: OpenPKG Foundation e.V.
  33. Distribution: OpenPKG Community
  34. Class: EVAL
  35. Group: Networking
  36. License: MPL
  37. Version: %{V_vault_opkg}.%{V_vault_snap}
  38. Release: 20170816
  39. # list of sources
  40. Source0: http://download.openpkg.org/components/versioned/vault/vault-%{V_vault_snap}.tar.xz
  41. Source1: rc.vault
  42. Source2: vault.hcl
  43. Source3: vault-tls.sh
  44. # build information
  45. BuildPreReq: OpenPKG, openpkg >= 20160101, go
  46. PreReq: OpenPKG, openpkg >= 20160101, cfssl
  47. %description
  48. Vault is a tool for securely accessing secrets. A secret is
  49. anything that you want to tightly control access to, such as API
  50. keys, passwords, certificates, and more. Vault provides a unified
  51. interface to any secret, while providing tight access control and
  52. recording a detailed audit log.
  53. %track
  54. prog vault:release = {
  55. version = %{V_vault_base}
  56. url = https://github.com/hashicorp/vault/releases
  57. regex = v(\d+\.\d+\.\d+)\.tar\.gz
  58. }
  59. prog vault:snapshot = {
  60. version = %{V_vault_snap}
  61. url = http://download.openpkg.org/components/versioned/vault/
  62. regex = vault-(__VER__)\.tar\.xz
  63. }
  64. %prep
  65. %setup -q -n vault
  66. %build
  67. # build program
  68. export GOPATH=`pwd`
  69. cd src/github.com/hashicorp/vault
  70. go build -x -o bin/vault main.go
  71. %install
  72. # create directory hierarchy
  73. %{l_shtool} mkdir -f -p -m 755 \
  74. $RPM_BUILD_ROOT%{l_prefix}/bin \
  75. $RPM_BUILD_ROOT%{l_prefix}/etc/rc.d \
  76. $RPM_BUILD_ROOT%{l_prefix}/etc/vault \
  77. $RPM_BUILD_ROOT%{l_prefix}/var/vault/log \
  78. $RPM_BUILD_ROOT%{l_prefix}/var/vault/run \
  79. $RPM_BUILD_ROOT%{l_prefix}/var/vault/db
  80. # install program
  81. %{l_shtool} install -c -s -m 755 \
  82. src/github.com/hashicorp/vault/bin/vault \
  83. $RPM_BUILD_ROOT%{l_prefix}/bin/vault
  84. # install default configuration
  85. %{l_shtool} install -c -m 644 %{l_value -s -a} \
  86. %{SOURCE vault.hcl} \
  87. $RPM_BUILD_ROOT%{l_prefix}/etc/vault/
  88. %{l_shtool} install -c -m 644 %{l_value -s -a} \
  89. %{SOURCE vault-tls.sh} \
  90. $RPM_BUILD_ROOT%{l_prefix}/etc/vault/
  91. # install run-command script
  92. %{l_shtool} install -c -m 755 %{l_value -s -a} \
  93. %{SOURCE rc.vault} $RPM_BUILD_ROOT%{l_prefix}/etc/rc.d/
  94. # determine installation files
  95. %{l_rpmtool} files -v -ofiles -r$RPM_BUILD_ROOT \
  96. %{l_files_std} \
  97. '%config %{l_prefix}/etc/vault/*' \
  98. '%attr(-,%{l_rusr},%{l_rgrp}) %{l_prefix}/var/vault/*'
  99. %files -f files
  100. %clean
  101. %post
  102. if [ $1 -eq 1 ]; then
  103. # on initial installation, generate initial credentials
  104. echo "Generate initial TLS credentials..." | \
  105. %{l_rpmtool} msg -b -t notice
  106. ( cd $RPM_INSTALL_PREFIX/etc/vault && %{l_bash} vault-tls.sh ) || exit $?
  107. # on initial installation, display information about first steps
  108. ( echo "Your next steps should be:"
  109. echo "1. optionally (re)configure and (re)generate your TLS credentials:"
  110. echo " \$ cd $RPM_INSTALL_PREFIX/etc/vault"
  111. echo " \$ vi vault-tls.sh"
  112. echo " \$ sh vault-tls.sh"
  113. echo "2. start Vault server:"
  114. echo " \$ $RPM_INSTALL_PREFIX/bin/openpkg rc vault start"
  115. echo "3. prepare your client environment:"
  116. echo " \$ export VAULT_ADDR=\"https://127.0.0.1:8200\""
  117. echo " \$ export VAULT_CACERT=\"$RPM_INSTALL_PREFIX/etc/vault/vault-tls-ca.crt\""
  118. echo "4. initialize database (remember key and auth token):"
  119. echo " \$ $RPM_INSTALL_PREFIX/bin/vault init -key-shares=1 -key-threshold=1"
  120. echo "5. check status:"
  121. echo " \$ $RPM_INSTALL_PREFIX/bin/vault status"
  122. echo "6. unseal database (with remembered key):"
  123. echo " \$ $RPM_INSTALL_PREFIX/bin/vault unseal <key>"
  124. echo "7. authenticate against database (with remembered auth token):"
  125. echo " \$ $RPM_INSTALL_PREFIX/bin/vault auth <token>"
  126. echo "8. write data under <name>:"
  127. echo " \$ $RPM_INSTALL_PREFIX/bin/vault write secret/<name> value=<value>"
  128. echo "9. read data under <name>:"
  129. echo " \$ $RPM_INSTALL_PREFIX/bin/vault read -field=value secret/<name>"
  130. ) | %{l_rpmtool} msg -b -t notice
  131. elif [ $1 -eq 2 ]; then
  132. # after upgrade, restart service
  133. eval `%{l_rc} vault status 2>/dev/null`
  134. [ ".$vault_active" = .yes ] && %{l_rc} vault restart
  135. fi
  136. exit 0
  137. %preun
  138. if [ $1 -eq 0 ]; then
  139. # before erase, stop service and remove log files
  140. %{l_rc} vault stop 2>/dev/null
  141. rm -f $RPM_INSTALL_PREFIX/etc/vault/vault-tls-ca.crt >/dev/null 2>&1 || true
  142. rm -f $RPM_INSTALL_PREFIX/etc/vault/vault-tls-ca.key >/dev/null 2>&1 || true
  143. rm -f $RPM_INSTALL_PREFIX/etc/vault/vault-tls-sv.crt >/dev/null 2>&1 || true
  144. rm -f $RPM_INSTALL_PREFIX/etc/vault/vault-tls-sv.key >/dev/null 2>&1 || true
  145. rm -rf $RPM_INSTALL_PREFIX/var/vault/log/* >/dev/null 2>&1 || true
  146. rm -rf $RPM_INSTALL_PREFIX/var/vault/run/* >/dev/null 2>&1 || true
  147. rm -rf $RPM_INSTALL_PREFIX/var/vault/db/* >/dev/null 2>&1 || true
  148. fi
  149. exit 0