Adoptable Cookbooks List

Looking for a cookbook to adopt? You can now see a list of cookbooks available for adoption!
List of Adoptable Cookbooks

Supermarket Belongs to the Community

Supermarket belongs to the community. While Chef has the responsibility to keep it running and be stewards of its functionality, what it does and how it works is driven by the community. The chef/supermarket repository will continue to be where development of the Supermarket application takes place. Come be part of shaping the direction of Supermarket by opening issues and pull requests or by joining us on the Chef Mailing List.

Select Badges

Select Supported Platforms

RSS

hashicorp-vault (17) Versions 2.1.1

Application cookbook for installing and configuring Vault.

Berkshelf/Librarian
Policyfile
Knife
cookbook 'hashicorp-vault', '= 2.1.1'
cookbook 'hashicorp-vault', '= 2.1.1', :supermarket
knife cookbook site install hashicorp-vault
knife cookbook site download hashicorp-vault
README
Dependencies
Changelog
Quality 0%

hashicorp-vault cookbook

Build Status Cookbook Version Coverage License

Application cookbook for installing and configuring Hashicorp Vault.

Vault is a tool, which when used properly, manages secure manage to secrets for your infrastructure.

Platform Support

The following platforms have been certified with integration tests using Test Kitchen:

  • CentOS (RHEL) 5.11, 6.7, 7.2
  • Ubuntu 12.04, 14.04

Basic Usage

This cookbook was designed from the ground up to make it dead simple to install and configure the Vault daemon as a system service using Chef. It highlights several of our best practices for developing reusable infrastructure at Bloomberg.

This cookbook provides three sets of node attributes which can be used to fine tune the default recipe which installs and configures Vault. The values from these node attributes are fed directly into the custom resources.

This cookbook can be added to the run list of all of the nodes that you want to be part of the cluster. But the best way to use this is in a wrapper cookbook which sets up a backend, and potentially even TLS certificates. We provide an example Vault Cluster cookbook which uses our Consul cookbook for a highly-available storage solution.

Change Log

v2.1.0 (2016-03-17)

Full Changelog

Closed issues:

  • Getting warning message in Chef run #46

Merged pull requests:

v2.0.0 (2016-03-04)

Full Changelog

Implemented enhancements:

  • etcd in not supported as backend secret storage #25

Closed issues:

  • tls_disable attribute only accepts strings #40
  • Error executing action create on resource 'vault_config[/home/vault/.vault.json]' #39
  • undefined method `delete' for nil:NilClass #34
  • metadata updates #33
  • No method chef_vault_item #24
  • vault_config.rb doesn't writes out telemetry section properly #6

Merged pull requests:

v1.5.1 (2016-02-18)

Full Changelog

Merged pull requests:

v1.5.0 (2016-02-03)

Full Changelog

Closed issues:

  • ['vault']['config']['manage_certificate'] = false does not end up getting set on vault_config resource #31
  • Vault 0.2.0 - Does not like tls_disable entered as empty string #8

Merged pull requests:

v1.4.0 (2015-09-28)

Full Changelog

Closed issues:

  • Fails to start vault server on CentOS 7.1 #22
  • Add note into documentation about chef-vault coobook version #21
  • Spec test issue for vault_config: Chef::Provider does not implement #chef_vault_item #11

Merged pull requests:

v1.3.1 (2015-08-13)

Full Changelog

v1.3.0 (2015-08-13)

Full Changelog

v1.2.1 (2015-08-07)

Full Changelog

v1.2.0 (2015-08-04)

Full Changelog

Closed issues:

  • Vault service fails to start #5
  • Upgrading to Vault 0.2.0 #2

Merged pull requests:

  • fixing default attributes based on HWRP #3 (zarry)

v1.1.0 (2015-06-16)

Full Changelog

v1.0.1 (2015-06-15)

Full Changelog

v1.0.0 (2015-06-12)

* This Change Log was automatically generated by github_changelog_generator

Foodcritic Metric
            

2.1.1 failed this metric

FC009: Resource attribute not recognised: /tmp/cook/8a8cb12931422e6b6bfcac45/hashicorp-vault/libraries/vault_installation_package.rb:38
FC019: Access node attributes in a consistent manner: /tmp/cook/8a8cb12931422e6b6bfcac45/hashicorp-vault/libraries/vault_service.rb:94
FC038: Invalid resource action: /tmp/cook/8a8cb12931422e6b6bfcac45/hashicorp-vault/libraries/vault_installation_package.rb:49