applications/system

htvault-config - Configuration for Hashicorp Vault for use with htgettoken client

License: BSD
Vendor: Koji
Description:
Installs plugins and configuration for Hashicorp Vault for use with
htgettoken as a client.

Packages

htvault-config-1.15-1.osg36.el8.src [787.5 MiB] Changelog by Dave Dykstra (2023-03-02):
- Update vault-plugin-secrets-oauthapp to 3.1.1 which adds support for token
  exchange at a /sts path instead of /creds.  Keep applying the PR patch
  that also adds it under /creds for a transition period until htgettoken
  is updated everywhere to use the new path.
- Update vault-plugin-auth-jwt to 0.15.2.
- Update vault-plugin-auth-ssh to 0.3.0.
- Require vault >= 1.13.
- Require diffutils.
- Fix bug where the kerberos policydomain option was ignored.
htvault-config-1.14-1.osg36.el8.src [561.6 MiB] Changelog by Dave Dykstra (2023-01-17):
- Add auditlog configuration option.  As part of that, disable the
  vault systemd ProtectFull and ProtectHome options.
- Require vault >= 1.12.1.
- Update the vault-plugin-auth-jwt to the latest upstream commit.
- Include gox in the source tarball.
htvault-config-1.13-1.osg36.el8.src [485.7 MiB] Changelog by Dave Dykstra (2022-05-23):
- Remove support for old-style per issuer/role secret plugins.  Requires
   htgettoken >= 1.7.
 - Add ability to delete a previously defined configuration by using
   a keyword "delete:" under the configuration name and setting it to
   any value.
 - Update vault-plugin-auth-jwt to the latest commit (because the patches
   had been rebased on it).
htvault-config-1.12-1.osg36.el8.src [485.7 MiB] Changelog by Dave Dykstra (2022-03-23):
- Require vault-1.10.0 and update vault-plugin-auth-jwt to version 0.12.1
  and vault-plugin-auth-ssh to version 0.1.1.
htvault-config-1.11-1.osg36.el8.src [456.5 MiB] Changelog by Dave Dykstra (2021-12-01):
- Add support for ssh-agent authentication, including self-registering of
  ssh public keys.
htvault-config-1.10-1.osg36.el8.src [504.8 MiB] Changelog by Dave Dykstra (2021-11-15):
- Fix problem that /etc/krb5-<name>.keytab was preferred for first service
  only when the kerbservice was explicitly defined for an issuer.  Now it
  also works for default first kerberos service.
htvault-config-1.6-1.osg36.el8.src [447.4 MiB] Changelog by Dave Dykstra (2021-09-15):
- Update to vault-plugin-secrets-oauthapp 3.0.0-beta.4 which includes a
  replacement for PR #64.
htvault-config-1.4-1.osg36.el8.src [242.7 MiB] Changelog by Dave Dykstra (2021-07-20):
- Updated the token exchange PR for vault-plugin-secrets-oauthapp to
    send the client secret in the initial authorization request in the
    device flow
- Updated to vault-plugin-secrets-oauthapp-2.2.0
htvault-config-1.2-1.osg36.el8.src [201.2 MiB] Changelog by Dave Dykstra (2021-06-17):
- Update to vault-plugin-auth-jwt-0.9.4 and require vault-1.7.3
htvault-config-1.1-1.osg36.el8.src [195.7 MiB] Changelog by Dave Dykstra (2021-05-10):
- Correctly disable secret oauth module instead of incorrect auth module
  when something changes requiring clearing out of old secrets.
- Allow dashes in names by converting them in bash variables to
  underscores, and reject any other non-alphanumeric or underscore in
  names.
- Fix bug in RFC8693 token exchange pull request to puppetlabs plugin
  which caused comma-separated scopes to get sent to the token issuer
  instead of space-separated scopes.
htvault-config-0.5-1.osg36.el8.src [139.9 MiB] Changelog by Dave Dykstra (2021-02-19):
- Always reconfigure everything when systemd service is started, just don't
  disable/reenable oauthapp because that wipes out stored secrets.
- Support multiple roles per issuer.

Listing created by Repoview-0.6.6-4.el7