You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Allow config/database to return a list of configuration keys.
I'm writing a puppet module to interface with vault and setup database configurations as part of our automation system. For things like sys/policies or database/roles I can query a list of available keys under each path, and then query each key individually. This is important to puppet, because the vault module can build a set of Puppet::Type resources for each key. That way, if roles or policies are modified outside of a puppet operation, the next puppet run can "see" those changes and take them into account. This is useful, for instance, to allow Puppet to modify a configuration which was originally set up outside of Puppet.
Since I can't query a list of database configurations from this endpoint, I'll have to keep a list of configurations that Puppet has created inside a scratch file on the host, or within a Puppet::Fact. That means future runs of puppet will only "see" those specific database configurations a particular puppet agent has created. If they are changed outside of puppet, or multiple puppet agents create configurations, a specific agent will not see those changes.
Also to note, for the purposes of the current Puppet Provider model I'm working on, the vault CLI client should be able to retrieve this list of keys as well:
You can use the LIST custom HTTP verb or add the parameter ?list=true to the GET request. It looks like it is missing in the documentation. I'll add it shortly.
Feature Request:
Allow config/database to return a list of configuration keys.
I'm writing a puppet module to interface with vault and setup database configurations as part of our automation system. For things like sys/policies or database/roles I can query a list of available keys under each path, and then query each key individually. This is important to puppet, because the vault module can build a set of Puppet::Type resources for each key. That way, if roles or policies are modified outside of a puppet operation, the next puppet run can "see" those changes and take them into account. This is useful, for instance, to allow Puppet to modify a configuration which was originally set up outside of Puppet.
Since I can't query a list of database configurations from this endpoint, I'll have to keep a list of configurations that Puppet has created inside a scratch file on the host, or within a Puppet::Fact. That means future runs of puppet will only "see" those specific database configurations a particular puppet agent has created. If they are changed outside of puppet, or multiple puppet agents create configurations, a specific agent will not see those changes.
Environment:
Expected Behavior:
Actual Behavior:
Steps to Reproduce:
Run the curl commands.
The text was updated successfully, but these errors were encountered: