@@ -122,13 +122,14 @@ function configure_dataBags(){
122122 HASH_FUNCTION=" SHA256"
123123
124124 # # Data bags ##
125+ mkdir -p /var/chef/data/data_bag_encrypted/passwords/
125126 mkdir -p /var/chef/data/data_bag/passwords/
126127 mkdir -p /var/chef/data/data_bag/rBglobal/
127128 mkdir -p /var/chef/data/data_bag/certs/
128129 mkdir -p /var/chef/data/data_bag/backend/
129130
130131 # # DB opscode (chef) passwords
131- cat > /var/chef/data/data_bag /passwords/db_opscode_chef.json << -_RBEOF_
132+ cat > /var/chef/data/data_bag_encrypted /passwords/db_opscode_chef.json << -_RBEOF_
132133{
133134 "id": "db_opscode_chef",
134135 "username": "opscode_chef",
@@ -188,7 +189,6 @@ _RBEOF_
188189}
189190_RBEOF_
190191
191- mkdir -p /var/chef/data/data_bag_encrypted/passwords/
192192 cat > /var/chef/data/data_bag_encrypted/passwords/vrrp.json << -_RBEOF_
193193{
194194 "id": "vrrp",
@@ -199,7 +199,7 @@ _RBEOF_
199199_RBEOF_
200200
201201 # DB druid passwords
202- cat > /var/chef/data/data_bag /passwords/db_druid.json << -_RBEOF_
202+ cat > /var/chef/data/data_bag_encrypted /passwords/db_druid.json << -_RBEOF_
203203{
204204 "id": "db_druid",
205205 "username": "druid",
@@ -211,7 +211,7 @@ _RBEOF_
211211_RBEOF_
212212
213213 # DB redborder passwords
214- cat > /var/chef/data/data_bag /passwords/db_redborder.json << -_RBEOF_
214+ cat > /var/chef/data/data_bag_encrypted /passwords/db_redborder.json << -_RBEOF_
215215{
216216 "id": "db_redborder",
217217 "username": "redborder",
@@ -223,7 +223,7 @@ _RBEOF_
223223_RBEOF_
224224
225225 # DB radius passwords
226- cat > /var/chef/data/data_bag /passwords/db_radius.json << - _RBEOF2_
226+ cat > /var/chef/data/data_bag_encrypted /passwords/db_radius.json << - _RBEOF2_
227227{
228228 "id": "db_radius",
229229 "username": "radius",
@@ -235,7 +235,7 @@ _RBEOF_
235235_RBEOF2_
236236
237237 # Vault passwords
238- cat > /var/chef/data/data_bag /passwords/vault.json << -_RBEOF_
238+ cat > /var/chef/data/data_bag_encrypted /passwords/vault.json << -_RBEOF_
239239{
240240 "id": "vault",
241241 "hash_key": "$HASH_KEY ",
@@ -276,7 +276,7 @@ _RBEOF_
276276
277277 # webui secret token
278278 WEBISECRET=" ` < /dev/urandom tr -dc A-Za-z0-9 | head -c128 | sed ' s/ //g' ` "
279- cat > /var/chef/data/data_bag /passwords/webui_secret.json << -_RBEOF_
279+ cat > /var/chef/data/data_bag_encrypted /passwords/webui_secret.json << -_RBEOF_
280280{
281281 "id": "webui_secret",
282282 "secret": "$WEBISECRET "
@@ -285,7 +285,7 @@ _RBEOF_
285285
286286 # redis password token
287287 REDIS_SECRET=" ` < /dev/urandom tr -dc A-Za-z0-9 | head -c128 | sed ' s/ //g' ` "
288- cat > /var/chef/data/data_bag /passwords/redis.json << -_RBEOF_
288+ cat > /var/chef/data/data_bag_encrypted /passwords/redis.json << -_RBEOF_
289289{
290290 "id": "redis",
291291 "pass": "$REDIS_SECRET "
@@ -295,7 +295,7 @@ _RBEOF_
295295 # airflow password token
296296 AIRFLOW_USER=" airflow"
297297 AIRFLOW_SECRET=" ` < /dev/urandom tr -dc A-Za-z0-9 | head -c32 | sed ' s/ //g' ` "
298- cat > /var/chef/data/data_bag /passwords/db_airflow.json << -_RBEOF_
298+ cat > /var/chef/data/data_bag_encrypted /passwords/db_airflow.json << -_RBEOF_
299299{
300300 "id": "db_airflow",
301301 "user": "$AIRFLOW_USER ",
0 commit comments