-
Notifications
You must be signed in to change notification settings - Fork 4.3k
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
VAULT-33758: IPv6 address conformance for proxy and agent
This is a follow-up to our initial work[0] to address RFC-5952 §4 conformance for IPv6 addresses in Vault. The initial pass focused on the vault server configuration and start-up routines. This follow-up focuses on Agent and Proxy, with a few minor improvements for server. The approach generally mirrors the server implementation but also adds support for normalization with CLI configuration overrides. One aspect we do not normalize currently is Agent/Proxy client creation to the Vault server with credentials taken from environment variables, as it would require larger changes to the `api` module. In practice this ought to be fine for the majority of cases. [0]: #29228 Signed-off-by: Ryan Cragun <me@ryan.ec>
- Loading branch information
1 parent
b3baef9
commit fe20abb
Showing
22 changed files
with
1,295 additions
and
239 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
69 changes: 69 additions & 0 deletions
69
command/agent/config/test-fixtures/config-auto-auth-aws.hcl
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,69 @@ | ||
# Copyright (c) HashiCorp, Inc. | ||
# SPDX-License-Identifier: BUSL-1.1 | ||
|
||
pid_file = "./pidfile" | ||
log_file = "/var/log/vault/vault-agent.log" | ||
|
||
vault { | ||
address = "https://[2001:0db8::0001]:8200" | ||
} | ||
|
||
auto_auth { | ||
method { | ||
type = "aws" | ||
namespace = "/aws-namespace" | ||
config = { | ||
role = "foobar" | ||
} | ||
} | ||
|
||
sink { | ||
type = "file" | ||
config = { | ||
path = "/tmp/file-foo" | ||
} | ||
aad = "foobar" | ||
dh_type = "curve25519" | ||
dh_path = "/tmp/file-foo-dhpath" | ||
} | ||
|
||
sink { | ||
type = "file" | ||
wrap_ttl = "5m" | ||
aad_env_var = "TEST_AAD_ENV" | ||
dh_type = "curve25519" | ||
dh_path = "/tmp/file-foo-dhpath2" | ||
derive_key = true | ||
config = { | ||
path = "/tmp/file-bar" | ||
} | ||
} | ||
} | ||
|
||
listener "unix" { | ||
address = "/path/to/socket" | ||
tls_disable = true | ||
|
||
agent_api { | ||
enable_quit = true | ||
} | ||
} | ||
|
||
listener "tcp" { | ||
address = "2001:0db8::0001:8200" | ||
tls_disable = true | ||
} | ||
|
||
listener { | ||
type = "tcp" | ||
address = "[2001:0:0:1:0:0:0:1]:3000" | ||
tls_disable = true | ||
role = "metrics_only" | ||
} | ||
|
||
listener "tcp" { | ||
role = "default" | ||
address = "2001:db8:0:1:1:1:1:1:8400" | ||
tls_key_file = "/path/to/cakey.pem" | ||
tls_cert_file = "/path/to/cacert.pem" | ||
} |
Oops, something went wrong.