Sak*_*ive 17 spring hashicorp-vault spring-vault
我将 Hashicorp 保险库用作机密存储,并通过 Ubuntu 20.04 上的 apt 存储库安装它。
之后,我添加了访问 UI 的根密钥,并且可以使用 UI 添加或删除机密。
每当我尝试使用命令行添加或获取机密时,都会收到以下错误:
jarvis@saki:~$ vault kv get secret/vault
Get "https://127.0.0.1:8200/v1/sys/internal/ui/mounts/secret/vault": http: server gave HTTP response to HTTPS client
Run Code Online (Sandbox Code Playgroud)
我的保险库配置如下所示:
# Full configuration options can be found at https://www.vaultproject.io/docs/configuration
ui = true
#mlock = true
#disable_mlock = true
storage "file" {
path = "/opt/vault/data"
}
#storage "consul" {
# address = "127.0.0.1:8500"
# path = "vault"
#}
# HTTP listener
#listener "tcp" {
# address = "127.0.0.1:8200"
# tls_disable = 1
#}
# HTTPS listener
listener "tcp" {
address = "0.0.0.0:8200"
tls_cert_file = "/opt/vault/tls/tls.crt"
tls_key_file = "/opt/vault/tls/tls.key"
}
# Example AWS KMS auto unseal
#seal "awskms" {
# region = "us-east-1"
# kms_key_id = "REPLACE-ME"
#}
# Example HSM auto unseal
#seal "pkcs11" {
# lib = "/usr/vault/lib/libCryptoki2_64.so"
# slot = "0"
# pin = "AAAA-BBBB-CCCC-DDDD"
# key_label = "vault-hsm-key"
# hmac_key_label = "vault-hsm-hmac-key"
#}
Run Code Online (Sandbox Code Playgroud)
Sak*_*ive 22
我解决了这个问题。虽然异常可能对多个类似问题很常见,但我通过导出运行此命令后生成的根令牌解决了该问题:
vault server -dev
Run Code Online (Sandbox Code Playgroud)
输出是这样的
...
You may need to set the following environment variable:
$ export VAULT_ADDR='http://127.0.0.1:8200'
The unseal key and root token are displayed below in case you want to
seal/unseal the Vault or re-authenticate.
Unseal Key: 1+yv+v5mz+aSCK67X6slL3ECxb4UDL8ujWZU/ONBpn0=
Root Token: s.XmpNPoi9sRhYtdKHaQhkHP6x
Development mode should NOT be used in production installations!
...
Run Code Online (Sandbox Code Playgroud)
运行这些命令,它应该这样做:
export VAULT_ADDR='http://127.0.0.1:8200'
Run Code Online (Sandbox Code Playgroud)
export VAULT_TOKEN="s.XmpNPoi9sRhYtdKHaQhkHP6x"
Run Code Online (Sandbox Code Playgroud)
然后运行以下命令检查状态:
vault status
Run Code Online (Sandbox Code Playgroud)
同样,对于许多不同的问题,错误消息可能是相似的。
Geo*_*ith 15
在 Windows 10 上的 PowerShell 中,我可以这样设置:
$Env:VAULT_ADDR='http://127.0.0.1:8200'
Run Code Online (Sandbox Code Playgroud)
然后
vault status
Run Code Online (Sandbox Code Playgroud)
正确返回。这是 Vault 1.7.3 的开发模式
您可以通过在命令行上指定 VAULT_ADDR 并按 Enter 键来回显它 - 与上面的设置行相同,但省略 = 符号及其后面的所有内容
$Env:VAULT_ADDR
Run Code Online (Sandbox Code Playgroud)
输出:
键值 --- ----- 密封类型 shamir 已初始化 true 已密封 false 共享总数 1 阈值 1 版本
1.7.3 存储类型 inmem 集群名称Vault-cluster-80649ba2 集群 ID 2a35e304-0836-2896-e927-66722e7ca488 HA 已启用
false
| 归档时间: |
|
| 查看次数: |
10929 次 |
| 最近记录: |