diff --git a/README.md b/README.md new file mode 100644 index 0000000..31386d9 --- /dev/null +++ b/README.md @@ -0,0 +1,18 @@ +# Overview + +Vault secures, stores, and tightly controls access to tokens, +passwords, certificates, API keys, and other secrets in modern +computing. Vault handles leasing, key revocation, key rolling, and +auditing. Through a unified API, users can access an encrypted +Key/Value store and network encryption-as-a-service, or generate +AWS IAM/STS credentials, SQL/NoSQL databases, X.509 certificates, +SSH credentials, and more. + +## About the Charm + +This charm installs Vault from the Ubuntu Snap Store and +supports the PostgreSQL storage backend only. + +After deploying and relating the charm to postgresql, install +the vault snap locally and use "vault init" to create the +master key shards and the root token, and store them safely. diff --git a/copyright b/copyright index 77cc3b6..a6441e1 100644 --- a/copyright +++ b/copyright @@ -1,3 +1,16 @@ -Copyright 2017 Canonical Ltd. +Format: http://dep.debian.net/deps/dep5/ -License to be determined. +Files: * +Copyright: Copyright 2017, Canonical Ltd. +License: GPL-3 + This program is free software: you can redistribute it and/or modify + it under the terms of the GNU General Public License version 3, as + published by the Free Software Foundation. + . + This program is distributed in the hope that it will be useful, + but WITHOUT ANY WARRANTY; without even the implied warranties of + MERCHANTABILITY, SATISFACTORY QUALITY, or FITNESS FOR A PARTICULAR + PURPOSE. See the GNU General Public License for more details. + . + You should have received a copy of the GNU General Public License + along with this program. If not, see . diff --git a/metadata.yaml b/metadata.yaml index 003d544..c84f059 100644 --- a/metadata.yaml +++ b/metadata.yaml @@ -1,8 +1,18 @@ name: vault maintainers: - Paul Collins -summary: a vault charm -description: seriously, it's just a vault charm +summary: a tool for managing secrets +description: | + Vault secures, stores, and tightly controls access to + tokens, passwords, certificates, API keys, and other + secrets in modern computing. Vault handles leasing, key + revocation, key rolling, and auditing. Through a unified + API, users can access an encrypted Key/Value store and + network encryption-as-a-service, or generate AWS IAM/STS + credentials, SQL/NoSQL databases, X.509 certificates, + SSH credentials, and more. +tags: + - security requires: db: interface: pgsql