consul/test
Mitya_Eremeev 7d9c3dbe7b Added feature to get encrypt key from Vault
To use the feature we need to set the following options in config file:
use_vault = true
vault_address = http://<IP_ADDRESS:<IP_PORT>
vault_role_id = <ROLE_ID>
vault_secret_id = <SECRET_ID>
vault_secret_path = <deployments/unit/dev/user/passwords_yml>
vault_secret_mount_path = <secret_v2>
credential_name_in_vault_secret = <consul_encrypt>

https://github.com/hashicorp/consul/issues/2209
https://github.com/hashicorp/consul/issues/4685
https://github.com/hashicorp/consul/issues/5043
2024-11-13 18:39:01 +03:00
..
bin [COMPLIANCE] License changes (#18443) 2023-08-11 09:12:13 -04:00
ca test: update certs for 10 year expiry (#19481) 2023-11-07 14:57:52 -05:00
ca_path test: update certs for 10 year expiry (#19481) 2023-11-07 14:57:52 -05:00
client_certs test: update certs for 10 year expiry (#19481) 2023-11-07 14:57:52 -05:00
command/merge Add utility types to enable checking for unset flags 2017-02-07 20:14:41 -05:00
hostname test: update certs for 10 year expiry (#19481) 2023-11-07 14:57:52 -05:00
integration Added feature to get encrypt key from Vault 2024-11-13 18:39:01 +03:00
key [Cloud][CC-6925] Updates to pushing server state (#19682) 2023-12-04 10:25:18 -05:00
load [COMPLIANCE] License changes (#18443) 2023-08-11 09:12:13 -04:00
snapshot snapshot: read meta.json correctly. (#5193) 2019-01-08 17:06:28 +01:00
CA-GENERATION.md test: update certs for 10 year expiry (#19481) 2023-11-07 14:57:52 -05:00