Skip to content

lutece-platform/lutece-tech-plugin-adminvaultsecrets

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

16 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Alerte Line of code Coverage

Plugin vault

Introduction

This plugin allows the creation, modification, and deletion of confidential data stored in the HashiCorp Vault. Thanks to this plugin, you will be able to create applications in which you will be able to initialize and manage working environments,in order to store your data.

To facilitate the dialog with the Vault server, the plugin uses the Java Vault Driver library from Bettercloud which comes in and creates all the requests to query the Vault APIs.

Configuration

Configure the plugin properties file (webapp/WEB-INF/conf/plugins/vault.properties).

In particular, it is necessary to set up :

  • vault.rootToken – Root token generated at the creation of your Vault server
  • vault.environnement.list – List of keys corresponding to the predefined environment names. The value of these keys must then be defined in your I18N properties.
  • vault.vaultServerAdress – Address of the Vault servert
  • vault.addPolicyPath – Policy creation path via API. Default : « /v1/sys/policies/acl/ »
  • vault.addTokenPath – Token creation path via API. Default : « /v1/auth/token/revoke-accessor »
  • vault.secretPath – Main folder where applications, environments, and secrets are created. Default : « /secret »

    vault.rootToken=hvs.lSjuVlF7RSEXpSyLOsel2bVc
    vault.environnement.list=pr,ppr,dev,infra
    vault.vaultServerAdress=http://127.0.0.1:8200
    vault.addPolicyPath=/v1/sys/policies/acl/
    vault.addTokenPath=/v1/auth/token/revoke-accessor
    vault.secretPath=/secret

Usage

Maven documentation and reports

generated by xdoc2md - do not edit directly.

About

Plugin for managing admin vault secrets

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Contributors 3

  •  
  •  
  •