rgw crypt vault auth: token
rgw crypt vault secret engine: transit
rgw crypt vault prefix: /v1/transit/
+ rgw crypt sse s3 backend: vault
+ rgw crypt sse s3 vault auth: token
+ rgw crypt sse s3 vault secret engine: transit
+ rgw crypt sse s3 vault prefix: /v1/transit/
rgw:
client.0:
use-vault-role: client.0
ctx.cluster.only(client).run(args=['sudo', 'chmod', '600', token_path])
ctx.cluster.only(client).run(args=['sudo', 'chown', 'ceph', token_path])
+ vault_addr = "{}:{}".format(*ctx.vault.endpoints[vault_role])
rgw_cmd.extend([
- '--rgw_crypt_vault_addr', "{}:{}".format(*ctx.vault.endpoints[vault_role]),
- '--rgw_crypt_vault_token_file', token_path
+ '--rgw_crypt_vault_addr', vault_addr,
+ '--rgw_crypt_vault_token_file', token_path,
+ '--rgw_crypt_sse_s3_vault_addr', vault_addr,
+ '--rgw_crypt_sse_s3_vault_token_file', token_path,
])
elif pykmip_role is not None:
if not hasattr(ctx, 'pykmip'):