Fedora 41
Signed-off-by: Jason Rothstein <fdragon@fdragon.org>
This commit is contained in:
parent
4f03179cc9
commit
e10559639a
117
templates/Fedora/41/etc/my.cnf.d/hashicorp_key_management.cnf
Normal file
117
templates/Fedora/41/etc/my.cnf.d/hashicorp_key_management.cnf
Normal file
@ -0,0 +1,117 @@
|
|||||||
|
# Copyright (C) 2019-2022 MariaDB Corporation
|
||||||
|
#
|
||||||
|
# This is a default configuration for the Hashicorp Vault plugin.
|
||||||
|
# You can read more about the parameters of this plugin in the
|
||||||
|
# hashicorp_key_management.txt file.
|
||||||
|
#
|
||||||
|
# NOTE THAT YOU MUST MANUALLY UNCOMMENT THE "plugin-load-add"
|
||||||
|
# LINE AND ALL THE NECESSARY PARAMETERS BELOW, SETTING THEM
|
||||||
|
# TO APPROPRIATE VALUES!
|
||||||
|
#
|
||||||
|
[mariadb]
|
||||||
|
|
||||||
|
#
|
||||||
|
# To use Hashicorp Vault KMS, the plugin must be preloaded and
|
||||||
|
# activated on the server:
|
||||||
|
#
|
||||||
|
#plugin-load-add=hashicorp_key_management.so
|
||||||
|
|
||||||
|
# Most of its parameters should not be changed during plugin
|
||||||
|
# operation and therefore must be preconfigured as part of
|
||||||
|
# the server configuration:
|
||||||
|
|
||||||
|
#
|
||||||
|
# HTTP[s] URL that is used to connect to the Hashicorp Vault server.
|
||||||
|
# It must include the name of the scheme ("https://" for a secure
|
||||||
|
# connection) and, according to the API rules for storages of the
|
||||||
|
# key-value type in Hashicorp Vault, after the server address, the
|
||||||
|
# path must begin with the "/v1/" string (as prefix), for example:
|
||||||
|
# "https://127.0.0.1:8200/v1/my_secrets"
|
||||||
|
#
|
||||||
|
#hashicorp-key-management-vault-url="<url>"
|
||||||
|
|
||||||
|
#
|
||||||
|
# Authentication token that passed to the Hashicorp Vault
|
||||||
|
# in the request header:
|
||||||
|
#
|
||||||
|
#hashicorp-key-management-token="<token>"
|
||||||
|
|
||||||
|
#
|
||||||
|
# Optional path to the Certificate Authority (CA) bundle
|
||||||
|
# (is a file that contains root and intermediate certificates):
|
||||||
|
#
|
||||||
|
#hashicorp-key-management-vault-ca="<path>"
|
||||||
|
|
||||||
|
#
|
||||||
|
# Set the duration (in seconds) for the Hashicorp Vault server
|
||||||
|
# connection timeout. The allowed range is from 1 to 86400 seconds.
|
||||||
|
# The user can also specify a zero value, which means the default
|
||||||
|
# timeout value set by the libcurl library (currently 300 seconds):
|
||||||
|
#
|
||||||
|
#hashicorp-key-management-timeout=15
|
||||||
|
|
||||||
|
#
|
||||||
|
# Number of server request retries in case of timeout:
|
||||||
|
#
|
||||||
|
#hashicorp-key-management-retries=3
|
||||||
|
|
||||||
|
#
|
||||||
|
# Enable key caching (storing key values received from
|
||||||
|
# the Hashicorp Vault server in the local memory):
|
||||||
|
#
|
||||||
|
#hashicorp-key-management-caching-enabled="on"
|
||||||
|
|
||||||
|
#
|
||||||
|
# This parameter instructs the plugin to use the key values
|
||||||
|
# or version numbers taken from the cache in the event of a
|
||||||
|
# timeout when accessing the vault server. By default this
|
||||||
|
# option is disabled.
|
||||||
|
#
|
||||||
|
# Please note that key values or version numbers will be read
|
||||||
|
# from the cache when the timeout expires only after the number
|
||||||
|
# of attempts to read them from the storage server that specified
|
||||||
|
# by the hashicorp-key-management-retries parameter has been
|
||||||
|
# exhausted:
|
||||||
|
#
|
||||||
|
#hashicorp-key-management-use-cache-on-timeout="off"
|
||||||
|
|
||||||
|
#
|
||||||
|
# The time (in milliseconds) after which the value of the key
|
||||||
|
# stored in the cache becomes invalid and an attempt to read this
|
||||||
|
# data causes a new request send to the vault server. By default,
|
||||||
|
# cache entries become invalid after 60,000 milliseconds (after
|
||||||
|
# one minute).
|
||||||
|
#
|
||||||
|
# If the value of this parameter is zero, then the keys will always
|
||||||
|
# be considered invalid, but they still can be used if the vault
|
||||||
|
# server is unavailable and the corresponding cache operating mode
|
||||||
|
# (--[loose-]hashicorp-key-management-use-cache-on-timeout="on")
|
||||||
|
# is enabled.
|
||||||
|
#
|
||||||
|
#hashicorp-key-management-cache-timeout=0
|
||||||
|
|
||||||
|
#
|
||||||
|
# The time (in milliseconds) after which the information about
|
||||||
|
# latest version number of the key (which stored in the cache)
|
||||||
|
# becomes invalid and an attempt to read this information causes
|
||||||
|
# a new request send to the vault server.
|
||||||
|
#
|
||||||
|
# If the value of this parameter is zero, then information abount
|
||||||
|
# latest key version numbers always considered invalid, unless
|
||||||
|
# there is no communication with the vault server and use of the
|
||||||
|
# cache is allowed when the server is unavailable.
|
||||||
|
#
|
||||||
|
# By default, this parameter is zero, that is, the latest version
|
||||||
|
# numbers for the keys stored in the cache are considered always
|
||||||
|
# invalid, except when the vault server is unavailable and use
|
||||||
|
# of the cache is allowed on server failures.
|
||||||
|
#
|
||||||
|
#hashicorp-key-management-cache-version-timeout=0
|
||||||
|
|
||||||
|
#
|
||||||
|
# This parameter enables ("on", this is the default value) or disables
|
||||||
|
# ("off") checking the kv storage version during plugin initialization.
|
||||||
|
# The plugin requires storage to be version 2 or older in order for it
|
||||||
|
# to work properly.
|
||||||
|
#
|
||||||
|
#hashicorp-key-management-check-kv-version=on
|
@ -52,8 +52,8 @@ tls-version=TLSv1.2,TLSv1.3
|
|||||||
# you can put MariaDB-only options here
|
# you can put MariaDB-only options here
|
||||||
[mariadb]
|
[mariadb]
|
||||||
|
|
||||||
# This group is only read by MariaDB-10.5 servers.
|
# This group is only read by MariaDB-10.11 servers.
|
||||||
# If you use the same .cnf file for MariaDB of different versions,
|
# If you use the same .cnf file for MariaDB of different versions,
|
||||||
# use this group for options that older servers don't understand
|
# use this group for options that older servers don't understand
|
||||||
[mariadb-10.5]
|
[mariadb-10.11]
|
||||||
|
|
||||||
|
3
templates/Fedora/41/etc/my.cnf.d/provider_bzip2.cnf
Normal file
3
templates/Fedora/41/etc/my.cnf.d/provider_bzip2.cnf
Normal file
@ -0,0 +1,3 @@
|
|||||||
|
[server]
|
||||||
|
plugin_load_add=provider_bzip2
|
||||||
|
provider_bzip2=force_plus_permanent
|
3
templates/Fedora/41/etc/my.cnf.d/provider_lz4.cnf
Normal file
3
templates/Fedora/41/etc/my.cnf.d/provider_lz4.cnf
Normal file
@ -0,0 +1,3 @@
|
|||||||
|
[server]
|
||||||
|
plugin_load_add=provider_lz4
|
||||||
|
provider_lz4=force_plus_permanent
|
3
templates/Fedora/41/etc/my.cnf.d/provider_lzma.cnf
Normal file
3
templates/Fedora/41/etc/my.cnf.d/provider_lzma.cnf
Normal file
@ -0,0 +1,3 @@
|
|||||||
|
[server]
|
||||||
|
plugin_load_add=provider_lzma
|
||||||
|
provider_lzma=force_plus_permanent
|
3
templates/Fedora/41/etc/my.cnf.d/provider_lzo.cnf
Normal file
3
templates/Fedora/41/etc/my.cnf.d/provider_lzo.cnf
Normal file
@ -0,0 +1,3 @@
|
|||||||
|
[server]
|
||||||
|
plugin_load_add=provider_lzo
|
||||||
|
provider_lzo=force_plus_permanent
|
3
templates/Fedora/41/etc/my.cnf.d/provider_snappy.cnf
Normal file
3
templates/Fedora/41/etc/my.cnf.d/provider_snappy.cnf
Normal file
@ -0,0 +1,3 @@
|
|||||||
|
[server]
|
||||||
|
plugin_load_add=provider_snappy
|
||||||
|
provider_snappy=force_plus_permanent
|
@ -63,6 +63,36 @@ template_list:
|
|||||||
mode: '0644'
|
mode: '0644'
|
||||||
owner: 'root'
|
owner: 'root'
|
||||||
src: '{{ ansible_distribution }}/{{ ansible_distribution_major_version }}/etc/my.cnf.d/auth_gssapi.cnf'
|
src: '{{ ansible_distribution }}/{{ ansible_distribution_major_version }}/etc/my.cnf.d/auth_gssapi.cnf'
|
||||||
|
- dest: '/etc/my.cnf.d/hashicorp_key_management.cnf'
|
||||||
|
group: 'root'
|
||||||
|
mode: '0644'
|
||||||
|
owner: 'root'
|
||||||
|
src: '{{ ansible_distribution }}/{{ ansible_distribution_major_version }}/etc/my.cnf.d/hashicorp_key_management.cnf'
|
||||||
|
- dest: '/etc/my.cnf.d/provider_bzip2.cnf'
|
||||||
|
group: 'root'
|
||||||
|
mode: '0644'
|
||||||
|
owner: 'root'
|
||||||
|
src: '{{ ansible_distribution }}/{{ ansible_distribution_major_version }}/etc/my.cnf.d/provider_bzip2.cnf'
|
||||||
|
- dest: '/etc/my.cnf.d/provider_lz4.cnf'
|
||||||
|
group: 'root'
|
||||||
|
mode: '0644'
|
||||||
|
owner: 'root'
|
||||||
|
src: '{{ ansible_distribution }}/{{ ansible_distribution_major_version }}/etc/my.cnf.d/provider_lz4.cnf'
|
||||||
|
- dest: '/etc/my.cnf.d/provider_lzma.cnf'
|
||||||
|
group: 'root'
|
||||||
|
mode: '0644'
|
||||||
|
owner: 'root'
|
||||||
|
src: '{{ ansible_distribution }}/{{ ansible_distribution_major_version }}/etc/my.cnf.d/provider_lzma.cnf'
|
||||||
|
- dest: '/etc/my.cnf.d/provider_lzo.cnf'
|
||||||
|
group: 'root'
|
||||||
|
mode: '0644'
|
||||||
|
owner: 'root'
|
||||||
|
src: '{{ ansible_distribution }}/{{ ansible_distribution_major_version }}/etc/my.cnf.d/provider_lzo.cnf'
|
||||||
|
- dest: '/etc/my.cnf.d/provider_snappy.cnf'
|
||||||
|
group: 'root'
|
||||||
|
mode: '0644'
|
||||||
|
owner: 'root'
|
||||||
|
src: '{{ ansible_distribution }}/{{ ansible_distribution_major_version }}/etc/my.cnf.d/provider_snappy.cnf'
|
||||||
- dest: '/etc/phpMyAdmin/config.inc.php'
|
- dest: '/etc/phpMyAdmin/config.inc.php'
|
||||||
group: 'root'
|
group: 'root'
|
||||||
mode: '0644'
|
mode: '0644'
|
||||||
|
Loading…
x
Reference in New Issue
Block a user