This patch adds the missing access control data to enforce access control for adding/removing secrets in containers. Change-Id: I6879f566117db5ec0099ddad35ba649a3c674bd1 (cherry picked from commit
|2 months ago|
|api-guide/source||7 months ago|
|barbican||1 month ago|
|bin||2 years ago|
|devstack||9 months ago|
|doc||3 months ago|
|etc||1 year ago|
|functionaltests||2 months ago|
|playbooks/legacy||9 months ago|
|releasenotes||2 months ago|
|.coveragerc||5 years ago|
|.gitignore||3 years ago|
|.gitreview||2 months ago|
|.mailmap||8 years ago|
|.stestr.conf||3 years ago|
|.zuul.yaml||8 months ago|
|HACKING.rst||2 years ago|
|LICENSE||8 years ago|
|README.rst||7 months ago|
|apiary.apib||2 years ago|
|bindep.txt||9 months ago|
|requirements.txt||3 months ago|
|setup.cfg||3 months ago|
|setup.py||1 year ago|
|test-requirements.txt||4 months ago|
|tox.ini||2 months ago|
Barbican is a REST API designed for the secure storage, provisioning and management of secrets. It is aimed at being useful for all environments, including large ephemeral Clouds.
Barbican is an OpenStack project developed by the Barbican Project Team with support from Rackspace Hosting <http://www.rackspace.com/>_, EMC, Ericsson, Johns Hopkins University, HP, Red Hat, Cisco Systems, and many more.
The full documentation can be found on the Barbican Developer Documentation Site.
To file a bug, use our bug tracker on OpenStack Storyboard.
Release notes for the project can be found at https://docs.openstack.org/releasenotes/barbican.
Future design work is tracked at https://specs.openstack.org/openstack/barbican-specs.
For development questions or discussion, use the OpenStack-discuss mailing list at email@example.com and let us know what you think, just add [barbican] to the subject. You can also join our IRC channel #openstack-barbican on Freenode.
Please visit our Users, Developers and Operators documentation for details.
The current state of key management is atrocious. While Windows does have some decent options through the use of the Data Protection API (DPAPI) and Active Directory, Linux lacks a cohesive story around how to manage keys for application use.
Barbican was designed to solve this problem. The system was motivated by internal Rackspace needs, requirements from OpenStack and a realization that the current state of the art could use some help.
Barbican will handle many types of secrets, including:
For the symmetric and asymmetric key types, Barbican supports full life cycle management including provisioning, expiration, reporting, etc.