mirror of
https://github.com/hashicorp/vault-action.git
synced 2026-05-14 04:20:33 +00:00
give vault user permission to read certs
This commit is contained in:
parent
fa6714caca
commit
a1ad354bde
2 changed files with 9 additions and 1 deletions
|
|
@ -45,7 +45,12 @@ services:
|
|||
- 8200:8200
|
||||
privileged: true
|
||||
healthcheck:
|
||||
test: ["CMD-SHELL", "VAULT_ADDR=https://127.0.0.1:8200 VAULT_CACERT=/etc/vault/ca.crt VAULT_CLIENT_CERT=/etc/vault/client.crt VAULT_CLIENT_KEY=/etc/vault/client.key vault status; s=$$?; [ $$s -eq 0 ]"]
|
||||
# Exit 2 means sealed-but-running, which is acceptable during startup
|
||||
test:
|
||||
- CMD-SHELL
|
||||
- |
|
||||
export VAULT_ADDR=https://127.0.0.1:8200 VAULT_CACERT=/etc/vault/ca.crt VAULT_CLIENT_CERT=/etc/vault/client.crt VAULT_CLIENT_KEY=/etc/vault/client.key
|
||||
vault status; s=$$?; [ $$s -eq 0 ] || [ $$s -eq 2 ]
|
||||
interval: 1s
|
||||
timeout: 5s
|
||||
retries: 30
|
||||
|
|
|
|||
|
|
@ -89,6 +89,9 @@ mv client-key.pem client.key
|
|||
# ── Remove intermediates not needed at runtime ────────────────────────────────
|
||||
rm -f ca.csr server.csr client.csr ca-key.pem cfssl-config.json
|
||||
|
||||
# Ensure files are readable by the vault container user
|
||||
chmod 644 ./*.crt ./*.key
|
||||
|
||||
# ── Copy vault server config ──────────────────────────────────────────────────
|
||||
cp "$REPO_ROOT/integrationTests/e2e-tls/configs/config.hcl" config.hcl
|
||||
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue