Juju Charm - Vault secrets managment
Go to file
Liam Young b8b4f43092 Add tox.ini for building and flake8 tests
Add a tox.ini for creating virtualenvs and then executing builds,
flake8, unit tests and charm proof in those venvs. Example:

tox -e pep8
tox -e build
tox -e charm-proof
tox -e unit-tests

Partial-Bug: #1745966
2018-02-02 11:24:45 +00:00
files/nagios check_vault_version.py: OK is 0, not 1 2017-05-30 15:12:08 +12:00
reactive try to handle database removal 2017-06-13 14:04:44 +12:00
templates add SSL support 2017-05-12 14:28:49 +12:00
unit_tests Add tox.ini for building and flake8 tests 2018-02-02 11:24:45 +00:00
.gitignore Add tox.ini for building and flake8 tests 2018-02-02 11:24:45 +00:00
.stestr.conf Add tox.ini for building and flake8 tests 2018-02-02 11:24:45 +00:00
README.md add copyright, and some information about vault 2017-06-29 09:31:13 +12:00
config.yaml empty default value for nagios_servicegroups and fix description 2017-05-30 14:21:21 +12:00
copyright add copyright, and some information about vault 2017-06-29 09:31:13 +12:00
layer.yaml deploy a simple service check 2017-05-26 12:00:49 +12:00
metadata.yaml set series to xenial 2017-06-29 09:59:49 +12:00
requirements.txt Add tox.ini for building and flake8 tests 2018-02-02 11:24:45 +00:00
test-requirements.txt Add tox.ini for building and flake8 tests 2018-02-02 11:24:45 +00:00
tox.ini Add tox.ini for building and flake8 tests 2018-02-02 11:24:45 +00:00

README.md

Overview

Vault secures, stores, and tightly controls access to tokens, passwords, certificates, API keys, and other secrets in modern computing. Vault handles leasing, key revocation, key rolling, and auditing. Through a unified API, users can access an encrypted Key/Value store and network encryption-as-a-service, or generate AWS IAM/STS credentials, SQL/NoSQL databases, X.509 certificates, SSH credentials, and more.

About the Charm

This charm installs Vault from the Ubuntu Snap Store and supports the PostgreSQL storage backend only.

After deploying and relating the charm to postgresql, install the vault snap locally and use "vault init" to create the master key shards and the root token, and store them safely.