Adoptable Cookbooks List

Looking for a cookbook to adopt? You can now see a list of cookbooks available for adoption!
List of Adoptable Cookbooks

Supermarket Belongs to the Community

Supermarket belongs to the community. While Chef has the responsibility to keep it running and be stewards of its functionality, what it does and how it works is driven by the community. The chef/supermarket repository will continue to be where development of the Supermarket application takes place. Come be part of shaping the direction of Supermarket by opening issues and pull requests or by joining us on the Chef Mailing List.

Select Badges

Select Supported Platforms

Select Status

RSS

hashicorp-vault (58) Versions 2.2.0

Application cookbook for installing and configuring Vault.

Policyfile
Berkshelf
Knife
cookbook 'hashicorp-vault', '= 2.2.0', :supermarket
cookbook 'hashicorp-vault', '= 2.2.0'
knife supermarket install hashicorp-vault
knife supermarket download hashicorp-vault
README
Dependencies
Changelog
Quality 0%

hashicorp-vault cookbook

Build Status
Cookbook Version
Coverage
License

Application cookbook for installing and configuring Hashicorp Vault.

Vault is a tool, which when used properly, manages secure manage to
secrets for your infrastructure.

Platform Support

The following platforms have been certified with integration tests
using Test Kitchen:

  • CentOS (RHEL) 5.11, 6.7, 7.2
  • Ubuntu 12.04, 14.04

Basic Usage

This cookbook was designed from the ground up to make it dead simple
to install and configure the Vault daemon as a system service
using Chef. It highlights several of our best practices for developing
reusable infrastructure at Bloomberg.

This cookbook provides three sets of
[node attributes](attributes/default.rb) which can be used to fine
tune the default recipe which installs and configures Vault. The
values from these node attributes are fed directly into the custom
resources.

This cookbook can be added to the run list of all of the nodes that
you want to be part of the cluster. But the best way to use this is in
a wrapper cookbook which sets up a backend, and potentially even
TLS certificates. We provide an example Vault Cluster cookbook
which uses our Consul cookbook for a highly-available
storage solution.

Change Log

v2.1.0 (2016-03-17)

Full Changelog

Closed issues:

  • Getting warning message in Chef run #46

Merged pull requests:

v2.0.0 (2016-03-04)

Full Changelog

Implemented enhancements:

  • etcd in not supported as backend secret storage #25

Closed issues:

  • tls_disable attribute only accepts strings #40
  • Error executing action create on resource 'vault_config[/home/vault/.vault.json]' #39
  • undefined method `delete' for nil:NilClass #34
  • metadata updates #33
  • No method chef_vault_item #24
  • vault_config.rb doesn't writes out telemetry section properly #6

Merged pull requests:

v1.5.1 (2016-02-18)

Full Changelog

Merged pull requests:

v1.5.0 (2016-02-03)

Full Changelog

Closed issues:

  • ['vault']['config']['manage_certificate'] = false does not end up getting set on vault_config resource #31
  • Vault 0.2.0 - Does not like tls_disable entered as empty string #8

Merged pull requests:

v1.4.0 (2015-09-28)

Full Changelog

Closed issues:

  • Fails to start vault server on CentOS 7.1 #22
  • Add note into documentation about chef-vault coobook version #21
  • Spec test issue for vault_config: Chef::Provider does not implement #chef_vault_item #11

Merged pull requests:

v1.3.1 (2015-08-13)

Full Changelog

v1.3.0 (2015-08-13)

Full Changelog

v1.2.1 (2015-08-07)

Full Changelog

v1.2.0 (2015-08-04)

Full Changelog

Closed issues:

  • Vault service fails to start #5
  • Upgrading to Vault 0.2.0 #2

Merged pull requests:

  • fixing default attributes based on HWRP #3 (zarry)

v1.1.0 (2015-06-16)

Full Changelog

v1.0.1 (2015-06-15)

Full Changelog

v1.0.0 (2015-06-12)

* This Change Log was automatically generated by github_changelog_generator

Foodcritic Metric
            

2.2.0 failed this metric

FC009: Resource attribute not recognised: /tmp/cook/e38ec006c64ad31b2c71d07e/hashicorp-vault/libraries/vault_installation_package.rb:38
FC019: Access node attributes in a consistent manner: /tmp/cook/e38ec006c64ad31b2c71d07e/hashicorp-vault/libraries/vault_service.rb:95
FC038: Invalid resource action: /tmp/cook/e38ec006c64ad31b2c71d07e/hashicorp-vault/libraries/vault_installation_package.rb:49