Crates.io | passivized_vault_client_versions |
lib.rs | passivized_vault_client_versions |
version | 0.0.10 |
source | src |
created_at | 2023-01-16 21:55:35.743485 |
updated_at | 2023-08-31 06:18:02.565161 |
description | Test support crate defining which Vault versions are tested against |
homepage | |
repository | https://github.com/iamjpotts/passivized_vault_client |
max_upload_size | |
id | 760617 |
size | 6,785 |
A client library for working with Vault through its REST api.
See the warning on REST api:
Backwards compatibility: At the current version, Vault does not yet promise backwards compatibility even with the v1
prefix. We'll remove this warning when this policy changes. At this point in time the core API
(that is, sys/ routes) change very infrequently, but various secrets engines/auth methods/etc. sometimes have minor
changes to accommodate new features as they're developed.
The above warning means this library could potentially break with newer versions of Vault.
The library is experimental, and tested with Vault 1.11 through 1.13.
To demo using PGP (GPG) to encrypt the unseal keys and root tokens generated by Vault, you can create several fake users, each with their own key pair.
$ gpg --quick-generate-key operator1@testuri.org
$ gpg --quick-generate-key operator2@testuri.org
$ gpg --quick-generate-key operator3@testuri.org
$ gpg --quick-generate-key root-user@testuri.org
Listing key pairs having private keys:
$ gpg -K
Export the public keys of each key pair:
$ gpg --output operator1.pgp --export operator1@testuri.org
$ gpg --output operator2.pgp --export operator2@testuri.org
$ gpg --output operator3.pgp --export operator3@testuri.org
$ gpg --output root-user.pgp --export root-user@testuri.org
Note: DO NOT use the "--armor" flag - Vault requires binary public keys.
All library features are available on Linux.
All library features are available on Macs, but because of limitations of Docker networking on Macs, all automated tests that require a live Vault server are disabled.
All library features are available on Windows, but because Hashicorp does not offer a Windows build of the Vault server, all automated tests that require a live Vault server are disabled.