issues
search
southalc
/
vault
Puppet module for use with Hashicorp Vault
8
stars
8
forks
source link
issues
Newest
Newest
Most commented
Recently updated
Oldest
Least commented
Least recently updated
When a URI path doesn't exists on vault, return a fake value to preve…
#23
jsfrerot
opened
2 weeks ago
0
key filter for vault_hiera_hash lookup
#22
jsfrerot
opened
2 weeks ago
2
allow authentication via token for vault_cert
#21
nferch
opened
9 months ago
0
Fix approle services
#20
dmaes
closed
1 year ago
1
vault_cert causes corrective changes if info metadata is changed
#19
optiz0r
opened
1 year ago
0
Server Error: no parameter named 'cert_chain_owner'
#18
Enucatl
closed
1 year ago
4
Certificate chain with intermediate authority
#17
Enucatl
closed
1 year ago
4
try to JSON::parse values from vault_hiera_hash
#16
Enucatl
closed
2 years ago
4
Puppet CA not being loaded by default (I.. think?)
#15
jadestorm
closed
2 years ago
3
Resource type not found: Bool
#14
luckyraul
closed
2 years ago
1
Add support for vault_ssh_cert type
#13
optiz0r
closed
2 years ago
2
Optionally allow targeting a cert auth role name
#12
optiz0r
closed
2 years ago
0
Make fail_hard configurable from vault_hiera_hash
#11
gibbs
closed
2 years ago
1
Vault is not a class?
#10
jadestorm
closed
2 years ago
6
replace delete_suffix with gsub
#9
dmaes
closed
2 years ago
1
Fix expired certificate renewal
#8
optiz0r
closed
2 years ago
1
fix approle_agent vault-token.service
#7
dmaes
closed
2 years ago
0
Refactor shared functions
#6
southalc
closed
2 years ago
0
Fixup provider tests following refactor
#5
optiz0r
closed
2 years ago
1
Using hiera_data_hash causes puppet stack trace
#4
v1peractual
closed
2 years ago
6
Vault cert provider
#3
optiz0r
closed
3 years ago
6
vault_cert improvements
#2
optiz0r
closed
3 years ago
8
Consider renaming to avoid conflict with jsok/vault?
#1
optiz0r
closed
3 years ago
7