Skip to content

Instantly share code, notes, and snippets.

@vishalnayak
Created March 31, 2020 20:55
Show Gist options
  • Save vishalnayak/688efa332f4e7753da52a777480eb6d3 to your computer and use it in GitHub Desktop.
Save vishalnayak/688efa332f4e7753da52a777480eb6d3 to your computer and use it in GitHub Desktop.
#!/bin/bash
set -aex
pkill -9 vault || true
pkill -9 consul || true
sleep 2s
rm -rf consuldata
cat > /tmp/consulconfig.json -<<EOF
{
"datacenter": "east-aws",
"data_dir": "consuldata",
"log_level": "TRACE",
"node_name": "node1",
"server": true,
"acl" : {
"tokens": [
{
"master": "token"
}
]
},
"bootstrap": true
}
EOF
consul agent -ui -config-file /tmp/consulconfig.json > /tmp/consul.log 2>&1 &
sleep 5s
consul version
tee /tmp/vaultconfig.hcl << EOF
storage "consul" {
address = "127.0.0.1:8500"
path = "vault"
}
listener "tcp" {
address = "127.0.0.1:8200"
tls_disable = true
}
api_addr = "http://127.0.0.1:8200"
pid_file = "/tmp/vault.pid"
EOF
vault server -log-level=trace -config /tmp/vaultconfig.hcl > /tmp/vault.log 2>&1 &
sleep 5s
initResult=$(vault operator init -format=json -key-shares 1 -key-threshold 1)
unsealKey=$(echo $initResult | jq -r .unseal_keys_b64[0])
rootToken=$(echo $initResult | jq -r .root_token)
vault operator unseal $unsealKey
sleep 5s
vault login $rootToken
rm -rf /tmp/85kFile
mkfile -n 85k /tmp/85kFile
rm -rf /tmp/86kFile
mkfile -n 86k /tmp/86kFile
vault secrets enable kv
consul version
vault version
echo "writing 85kFile"
vault kv put kv/85k bar=@/tmp/85kFile
#vault kv get -format json kv/85k
echo "writing 86kFile"
vault kv put kv/86k bar=@/tmp/86kFile
#vault kv get -format json kv/86k
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment