open-vault/builtin/logical/nomad
Alexander Scheel 6f66e5cd48
Allow reading Nomad CA/Client cert configuration (#15809)
* Allow reading Nomad CA/Client cert configuration

In the Nomad secret engine, writing to /nomad/config/access allows users
to specify a CA certificate and client credential pair. However, these
values are not in the read of the endpoint, making it hard for operators
to see if these values were specified and if they need to be rotated.

Add `ca_cert` and `client_cert` parameters to the response, eliding the
`client_key` parameter as it is more sensitive (and should most likely
be replaced at the same time as `client_cert`).

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Add changelog

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Fix tests to expect additional fields

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Add test with existing CA/client cert+key

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
2022-06-10 10:09:54 -04:00
..
cmd/nomad
backend.go Bootstrap Nomad ACL system if no token is given (#12451) 2022-04-20 11:06:25 -07:00
backend_test.go Allow reading Nomad CA/Client cert configuration (#15809) 2022-06-10 10:09:54 -04:00
path_config_access.go Allow reading Nomad CA/Client cert configuration (#15809) 2022-06-10 10:09:54 -04:00
path_config_lease.go Run a more strict formatter over the code (#11312) 2021-04-08 09:43:39 -07:00
path_creds_create.go builtin: deprecate errwrap.Wrapf() throughout (#11430) 2021-04-22 11:20:59 -04:00
path_roles.go builtin: deprecate errwrap.Wrapf() throughout (#11430) 2021-04-22 11:20:59 -04:00
secret_token.go Run a more strict formatter over the code (#11312) 2021-04-08 09:43:39 -07:00