Adoptable Cookbooks List

Looking for a cookbook to adopt? You can now see a list of cookbooks available for adoption!
List of Adoptable Cookbooks

Supermarket Belongs to the Community

Supermarket belongs to the community. While Chef has the responsibility to keep it running and be stewards of its functionality, what it does and how it works is driven by the community. The chef/supermarket repository will continue to be where development of the Supermarket application takes place. Come be part of shaping the direction of Supermarket by opening issues and pull requests or by joining us on the Chef Mailing List.

Select Badges

Select Supported Platforms

Select Status

RSS

hashicorp-vault (55) Versions 3.0.2

Application cookbook for installing and configuring Vault.

Policyfile
Berkshelf
Knife
cookbook 'hashicorp-vault', '= 3.0.2', :supermarket
cookbook 'hashicorp-vault', '= 3.0.2'
knife supermarket install hashicorp-vault
knife supermarket download hashicorp-vault
README
Dependencies
Changelog
Quality 83%

hashicorp-vault cookbook

Cookbook Version
Build Status
OpenCollective
OpenCollective
License

Application cookbook for installing and configuring Hashicorp Vault.

Vault is a tool, which when used properly, manages secure manage to
secrets for your infrastructure.

Platform Support

The following platforms have been certified with integration tests
using Test Kitchen:

  • CentOS (RHEL) 6.8, 7.2
  • Ubuntu 12.04, 14.04, 16.04

Basic Usage

This cookbook was designed from the ground up to make it dead simple
to install and configure the Vault daemon as a system service
using Chef. It highlights several of our best practices for developing
reusable infrastructure at Bloomberg.

This cookbook provides three sets of
[node attributes](attributes/default.rb) which can be used to fine
tune the default recipe which installs and configures Vault. The
values from these node attributes are fed directly into the custom
resources.

This cookbook can be added to the run list of all of the nodes that
you want to be part of the cluster. But the best way to use this is in
a wrapper cookbook which sets up a backend, and potentially even
TLS certificates. We provide an example Vault Cluster cookbook
which uses our Consul cookbook for a highly-available
storage solution.

Maintainers

This cookbook is maintained by the Sous Chefs. The Sous Chefs are a community of Chef cookbook maintainers working together to maintain important cookbooks. If you’d like to know more please visit sous-chefs.org or come chat with us on the Chef Community Slack in #sous-chefs.

Contributors

This project exists thanks to all the people who contribute.

Backers

Thank you to all our backers!

https://opencollective.com/sous-chefs#backers

Sponsors

Support this project by becoming a sponsor. Your logo will show up here with a link to your website.

https://opencollective.com/sous-chefs/sponsor/0/website
https://opencollective.com/sous-chefs/sponsor/1/website
https://opencollective.com/sous-chefs/sponsor/2/website
https://opencollective.com/sous-chefs/sponsor/3/website
https://opencollective.com/sous-chefs/sponsor/4/website
https://opencollective.com/sous-chefs/sponsor/5/website
https://opencollective.com/sous-chefs/sponsor/6/website
https://opencollective.com/sous-chefs/sponsor/7/website
https://opencollective.com/sous-chefs/sponsor/8/website
https://opencollective.com/sous-chefs/sponsor/9/website

Change Log

v3.0.2 (2019-06-11)

  • Changes the function names for config_prefix_path and data_path

v3.0.1 (2019-06-01)

  • added x_forwarded_for_* and cluster_addr config options
  • disabled unit tests as we cannot bundle install currently
  • upgrade to chef 13 minimum
  • migrate to circleci 2.0 testing
  • added option to set plugin_directory

v3.0.0 (2018-12-09)

  • added options to set seal options, ui, and disable_performance_standby
  • updated tests to test new config options
  • added Circle CI tests
  • removed support for Ubuntu 12.04 as it's EOL-ed
  • added Ubuntu 18.04 tests

v2.5.0 (2017-03-27)

Full Changelog

  • undefined method `cluster_address' for VaultCookbook::Resource::VaultConfig #93
  • Service Logging #89
  • disable_cache option #84
  • CentOS-- kitchen tests fail w/ sudo issue #78
  • Vault archive download address should be configurable #74
  • Vault 0.5.3 -> 0.6.0 is breaking. Cookbook major version should have been rev'd. #70
  • Initializing and unsealing #69
  • Added shasums for vault 0.6.4 and 0.6.5 #94 (onetwopunch)
  • Update test configuration, fix Travis builds #92 (legal90)
  • fix typo in error message #90 (chrisminton)
  • add additional ssl options to vault_secret #88 (chrisminton)
  • Vault 0.6.3 #87 (vijaybandari)
  • Fixes foodcritic, previous fix caused all checks to be ignored #86 (madeddie)
  • Add disable_cache config option #85 (madeddie)
  • Add log-level support for service #82 (vijaybandari)
  • Update Changelog #81 (legal90)
  • Enable passwordless sudo for tests #80 (legal90)
  • Add 0.6.2 support #79 (Ginja)
  • Add cluster_address for listener options #77 (freimer)
  • Refactor integration tests and Travis CI configuration #75 (legal90)
  • Fix init script syntax for compatibility with RHEL/CentOS 5 #73 (legal90)
  • Add support of Vault 0.6.1 #71 (legal90)
  • Create/Delete symbolic link to /usr/local/bin #68 (dpattmann)
  • Add default recipe to kitchen run_list #67 (dpattmann)
  • Remove 'godep restore' for vault versions > 0.5.0 #66 (dpattmann)

v2.4.0 (2016-06-24)

Full Changelog

  • Service doesn't come back after reboot because the default service directory is missing #55
  • Failing to run service as nonroot #54
  • Vault 0.6.0 #65 (axtl)
  • Create work dir before service starts as it does not persist across restarts #64 (willejs)
  • Liberate "build-essential" version constraint #63 (legal90)
  • vault_secret: Raise an exception if Vault read has failed #61 (legal90)

v2.3.0 (2016-06-09)

Full Changelog

  • What are bag_name, bag_item attributes used for? #58
  • Test against newer build-essential #57
  • Vault 0.5.3 update (with test fixes, build-essential update) #62 (axtl)
  • Fix default value of "leases" attribute #60 (legal90)
  • vault_secret: Save lease ID to the nested attribute #56 (legal90)

v2.2.0 (2016-04-19)

Full Changelog

  • Specifying 'root' removes root login shell #53
  • Configure consul backend in hashicorp-vault > 1.5.x #48
  • Prevent "vault" service to be restarted on update #52 (legal90)
  • Use custom templates for "systemd" and "sysvinit" service providers #51 (legal90)
  • Added a resource for reading secrets from Vault #49 (Ginja)

v2.1.1 (2016-03-17)

Full Changelog

  • Fixed typo in vault_config provider property #47 (Ginja)

v2.1.0 (2016-03-17)

Full Changelog

  • Getting warning message in Chef run #46
  • Fix binary installation for i386 architectures. #44 (johnbellone)

v2.0.0 (2016-03-04)

Full Changelog

  • etcd in not supported as backend secret storage #25
  • tls_disable attribute only accepts strings #40
  • Error executing action create on resource 'vault_config[/home/vault/.vault.json]' #39
  • undefined method `delete' for nil:NilClass #34
  • metadata updates #33
  • No method chef_vault_item #24
  • vault_config.rb doesn't writes out telemetry section properly #6
  • Fixed Install Issues #42 (Ginja)
  • Coerce tls_disable attribute to a string. #41 (CodeGnome)

v1.5.1 (2016-02-18)

Full Changelog

v1.5.0 (2016-02-03)

Full Changelog

  • ['vault']['config']['manage_certificate'] = false does not end up getting set on vault_config resource #31
  • Vault 0.2.0 - Does not like tls_disable entered as empty string #8
  • Multiple fixes #35 (sh9189)
  • Fix tls_disable with vault 0.4.0 #30 (shaneramey)
  • support vault 0.4.0 #28 (shaneramey)
  • Modify attributes to support vault 0.3.1 #26 (NickLaMuro)

v1.4.0 (2015-09-28)

Full Changelog

  • Fails to start vault server on CentOS 7.1 #22
  • Add note into documentation about chef-vault coobook version #21
  • Spec test issue for vault_config: Chef::Provider does not implement #chef_vault_item #11
  • Move test data bag item to standard location #19 (jeffbyrnes)
  • Clean up spec tests & switch to using Rake #18 (jeffbyrnes)
  • Pin chef-vault to specific ref #16 (jeffbyrnes)
  • Update Serverspec assertions as per Rspec 3 #15 (jeffbyrnes)
  • Make the TLS certificate management optional #13 (jeffbyrnes)
  • Update tests for SSL cert/key to match attributes #12 (jeffbyrnes)

v1.3.1 (2015-08-13)

Full Changelog

v1.3.0 (2015-08-13)

Full Changelog

v1.2.1 (2015-08-07)

Full Changelog

v1.2.0 (2015-08-04)

Full Changelog

  • Vault service fails to start #5
  • Upgrading to Vault 0.2.0 #2
  • fixing default attributes based on HWRP #3 (zarry)

v1.1.0 (2015-06-16)

Full Changelog

v1.0.1 (2015-06-15)

Full Changelog

v1.0.0 (2015-06-12)

- -This Change Log was automatically generated by github_changelog_generator-- -This Change Log was automatically generated by github_changelog_generator-

Collaborator Number Metric
            

3.0.2 passed this metric

Contributing File Metric
            

3.0.2 failed this metric

Failure: To pass this metric, your cookbook metadata must include a source url, the source url must be in the form of https://github.com/user/repo, and your repo must contain a CONTRIBUTING.md file

Foodcritic Metric
            

3.0.2 passed this metric

No Binaries Metric
            

3.0.2 passed this metric

Testing File Metric
            

3.0.2 passed this metric

Version Tag Metric
            

3.0.2 passed this metric