vault
Here are 1,193 public repositories matching this topic...
Consul Template version
consul-template v0.25.0 (99efa64)
Configuration
Config: test.hcl
log_level = debug
template {
contents = "{{ key \"hello\" }}"
destination = "hello.txt"
exec {
command = "cat hello.txt"
}
}
template {
contents = "{{ key \"sleep\" }}"
destination = "sleep.txt"
exec {
command = "sleep 2s"
timeout = "4s"
I wanted to suggest this because I just started using this thing to document my own charts: https://github.com/norwoodj/helm-docs
Its trivial to use, just install the tool, use its comment syntax in your Chart.yaml and values.yaml and your done! You can customize it, but so far I haven't needed to use my own templating for it, just let it read the chart.yaml and values.yaml. It has examples in
-
Updated
Dec 3, 2021 - Python
-
Updated
Nov 17, 2021 - Go
-
Updated
Dec 10, 2021 - Java
-
Updated
Dec 11, 2021 - Go
Is your feature request related to a problem? Please describe.
Vault has backends for AWS like dynamo and s3. However to use them you should provide credentials. AWS support 2 solutions to eliminate this. IAM roles for Service Accounts and Instance profile roles.
Due to some unknown reason vault requires more time to start when using dynamic creds than explicit definition keys in s3 block o
-
Updated
Dec 12, 2021 - Go
So there is currently an hvac.v1.Client.sys.list_mounted_secrets_engines() method.
However, for obvious reasons this will fail as it will attempt to list all mounted secrets engines (as it calls /v1/sys/mounts).
The web UI, however, shows what mounts the current token has access to.
While poking around the live API documentation the other day (`VAULT_BASE_URI/ui/vault/api-explorer
-
Updated
Mar 11, 2020 - Go
-
Updated
Oct 28, 2020 - Go
-
Updated
Dec 9, 2021 - Java
-
Updated
Mar 10, 2017 - Perl
-
Updated
Aug 14, 2021 - HCL
-
Updated
Dec 15, 2021 - Shell
-
Updated
Dec 15, 2021 - Go
-
Updated
Dec 14, 2021 - Go
-
Updated
Nov 16, 2021 - JavaScript
-
Updated
Oct 17, 2021
Improve this page
Add a description, image, and links to the vault topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the vault topic, visit your repo's landing page and select "manage topics."
Overview of the Issue
Hello,
consul tls ca createcreates a private key file that is world-readable.Instead, it should create it with permissions
0600, to reduce the possibility of information disclosure (and subsequent elevation of privilege).Details
What I did
W