Juju Charm - Vault secrets managment
Go to file
James Page 3b0e793feb Use secret_id's with vault-kv relation
In order to tighten the security around access to secrets stored
in a Vault KV secrets backend, generate a secret_id for each
accessing unit, using a response wrapping token which is passed
over the relation to the consuming application.

The consuming application will then use this token out-of-band of
Juju to retrieve the secret_id associated with the AppRole ID
directly from Vault.

Add a new action 'refresh-secrets' to force a renewal of secret_id's
and associated one-shot retrieval tokens across a deployment.

A token is only issued when a new approle is created or when
a refresh is initiated via the 'refresh-secrets' action.

Change-Id: I2cd173514377d65542ea4fa67ccf700ea4b6ab89
2018-05-08 12:46:01 +02:00
src Use secret_id's with vault-kv relation 2018-05-08 12:46:01 +02:00
unit_tests Use secret_id's with vault-kv relation 2018-05-08 12:46:01 +02:00
.gitignore Add support for using a vip for access 2018-04-17 14:48:23 +00:00
.gitreview Add .gitreview 2018-02-19 09:24:02 +00:00
.stestr.conf Add tox.ini for building and flake8 tests 2018-02-02 11:24:45 +00:00
copyright add copyright, and some information about vault 2017-06-29 09:31:13 +12:00
requirements.txt Add tox.ini for building and flake8 tests 2018-02-02 11:24:45 +00:00
test-requirements.txt Refactor status assessment 2018-04-19 11:46:31 +01:00
tox.ini Application version support 2018-04-17 09:36:46 +01:00