charm-vault/src
Ryan Beisner 34e5885b6d Update series metadata
Ensure that EOL releases are removed from metadata
and tests, and that the current dev release is enabled
in metadata.  Dev release tests are enabled separately
because of chickens and eggs.

Change-Id: Idd0c81e3b3ab944411f2016a73a243c15131a158
2018-07-11 14:08:11 -05:00
..
actions Add support for tls-certificates interface 2018-06-06 08:18:30 +00:00
files/nagios Vault version in snap store may not start with 'v' 2018-06-14 13:51:25 +00:00
lib/charm Add support for tls-certificates interface 2018-06-06 08:18:30 +00:00
reactive Add support for tls-certificates interface 2018-06-06 08:18:30 +00:00
templates Add support for new secrets:vault-kv interface 2018-04-27 09:21:13 +01:00
tests Add support for tls-certificates interface 2018-06-06 08:18:30 +00:00
actions.yaml Add support for tls-certificates interface 2018-06-06 08:18:30 +00:00
config.yaml auto-unlock: make things clear about security 2018-05-08 14:34:54 +01:00
copyright Restructure charm to follow src dir format 2018-02-19 10:19:09 +00:00
icon.svg Add icon 2018-04-18 15:05:28 +01:00
layer.yaml Add support for tls-certificates interface 2018-06-06 08:18:30 +00:00
metadata.yaml Update series metadata 2018-07-11 14:08:11 -05:00
README.md Add basic network spaces support 2018-04-19 11:54:55 +01:00
test-requirements.txt Add functional tests 2018-04-12 11:20:16 +00:00
tox.ini Add support for using a vip for access 2018-04-17 14:48:23 +00:00
wheelhouse.txt Add support for tls-certificates interface 2018-06-06 08:18:30 +00:00

Overview

Vault secures, stores, and tightly controls access to tokens, passwords, certificates, API keys, and other secrets in modern computing. Vault handles leasing, key revocation, key rolling, and auditing. Through a unified API, users can access an encrypted Key/Value store and network encryption-as-a-service, or generate AWS IAM/STS credentials, SQL/NoSQL databases, X.509 certificates, SSH credentials, and more.

About the Charm

This charm installs Vault from the Ubuntu Snap Store and supports the PostgreSQL and MySQL storage backends. Note that Vault itself does not support PostgreSQL 10, so neither does this charm. If you're deploying on bionic, you'll need to deploy a 9.x version of PostgreSQL.

After deploying and relating the charm to postgresql, install the vault snap locally and use "vault init" to create the master key shards and the root token, and store them safely.

Network Spaces support

The vault charm directly supports network binding via the 'access' extra-binding and the 'cluster' peer relation. These allow the Vault API and inter-unit Cluster addresses to be configured using Juju network spaces.