Skip to content

Commit d292940

Browse files
Merge branch 'role-domain-validation' of https://github.com/Keyfactor/hashicorp-vault-secretsengine into role-domain-validation
2 parents a10aee4 + 9486109 commit d292940

File tree

3 files changed

+39
-6
lines changed

3 files changed

+39
-6
lines changed

.goreleaser.yml

Lines changed: 3 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -36,11 +36,9 @@ archives:
3636
- format: zip
3737
name_template: '{{ .ProjectName }}_{{ .Version }}_{{ .Os }}_{{ .Arch }}'
3838
checksum:
39-
extra_files:
40-
- glob: 'integration-manifest.json'
41-
name_template: '{{ .ProjectName }}_{{ .Version }}_manifest.json'
42-
name_template: '{{ .ProjectName }}_{{ .Version }}_SHA256SUMS'
39+
name_template: '{{ .ArtifactName }}.{{ .Algorithm }}'
4340
algorithm: sha256
41+
split: true
4442
signs:
4543
- artifacts: checksum
4644
args:
@@ -56,8 +54,7 @@ signs:
5654
release:
5755
prerelease: auto
5856
extra_files:
59-
- glob: 'integration-manifest.json'
60-
name_template: '{{ .ProjectName }}_{{ .Version }}_manifest.json'
57+
- glob: 'installation.txt'
6158
# If you want to manually examine the release before its live, uncomment this line:
6259
draft: true
6360
changelog:

.vscode/settings.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,5 @@
1+
{
2+
"files.associations": {
3+
"*.yaml": "home-assistant"
4+
}
5+
}

installation.txt

Lines changed: 31 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,31 @@
1+
Note: The sha256 checksum for this build is provided along with the release.
2+
Use this value for <checksum> in the below steps.
3+
4+
sha256 checksum: <checksum>
5+
6+
1) make sure the vault is unsealed
7+
8+
2) make sure that $env:VAULT_ADDR is set appropriately
9+
- VAULT_ADDR is the url for the instance of vault, example: http://127.0.0.1:8200
10+
11+
3) disable and deregister a previous version of the plugin (if installed) by running:
12+
13+
> vault secrets disable <instance name>; vault plugin deregister secret <instance name>
14+
15+
4) run the following command to register the plugin:
16+
17+
> vault plugin register -sha256=<checksum> -command="keyfactor.exe" secret keyfactor
18+
19+
** the "command" value should correspond to the name of the binary. For Windows, this will be "keyfactor.exe", for linux this will be "keyfactor".
20+
** the last parameter ("keyfactor") corresponds to the name of the instance of the secrets engine and can be set to whatever identifier you choose.
21+
22+
5) enable the keyfactor secrets engine by running:
23+
24+
> vault secrets enable <instance name>
25+
26+
6) test the connection by requesting the ca
27+
28+
> vault read <instance name>/ca
29+
30+
31+
where "keyfactor" is the name of the plugin instance

0 commit comments

Comments
 (0)