Skip to content
#

vault

Here are 1,289 public repositories matching this topic...

consul
acpana
acpana commented Apr 18, 2022

overview

Today, the RequestRecorder records service RPC calls. If those take less than < 0ms, the recorder marks them as 0ms.

proposal

Make the RequestRecorder report the elapsed time for service calls that take less than < 0ms as decimal values, instead of 0.

notes

testing

If you take this on, I'd kindly advise to start in a TDD fashion. Write a test

good first issue
findkim
findkim commented May 12, 2020

Consul Template version

consul-template v0.25.0 (99efa64)

Configuration

Config: test.hcl

log_level = debug

template {
  contents = "{{ key \"hello\" }}"
  destination = "hello.txt"
  exec {
    command = "cat hello.txt"
  }
}

template {
  contents = "{{ key \"sleep\" }}"
  destination = "sleep.txt"
  exec {
    command = "sleep 2s"
    timeout = "4s"
 
dynaconf
rochacbruno
rochacbruno commented Mar 31, 2022

On lines
https://github.com/rochacbruno/dynaconf/blob/master/dynaconf/validator.py#L202-L205

validators.validate is calling from_env and it makes the variables to be reloaded from source files.

This is not good for testing.

Solution:

  1. Check if validation is happening on the same current env, then don't reload
  2. accept argument reload=False that will cause those lines to pass
Not a Bug RFC good first issue
alekskar
alekskar commented Jun 18, 2020

Is your feature request related to a problem? Please describe.
Vault has backends for AWS like dynamo and s3. However to use them you should provide credentials. AWS support 2 solutions to eliminate this. IAM roles for Service Accounts and Instance profile roles.
Due to some unknown reason vault requires more time to start when using dynamic creds than explicit definition keys in s3 block o

johnnybubonic
johnnybubonic commented Mar 2, 2021

So there is currently an hvac.v1.Client.sys.list_mounted_secrets_engines() method.

However, for obvious reasons this will fail as it will attempt to list all mounted secrets engines (as it calls /v1/sys/mounts).

The web UI, however, shows what mounts the current token has access to.

While poking around the live API documentation the other day (`VAULT_BASE_URI/ui/vault/api-explorer

good first issue system backend
mzfr
mzfr commented Jun 15, 2019

Currently pressing ctrl+c while scans are going on we get a big traceback.
It would be nice if we can handle that traceback and print something nice like Canceled by the user or something similar.

Read this to understand how to do it properly.

good first issue kwoc

Improve this page

Add a description, image, and links to the vault topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the vault topic, visit your repo's landing page and select "manage topics."

Learn more