- Description
- Setup - The basics of getting started with vault
- Limitations - OS compatibility, etc.
- Development - Guide for contributing to the module
Vault404 installs and starts runs Vault secret engine server.
- Files, folders and services all created by vault
- Service/configuration for vault
- User and group for running vault
puppetlabs-stdlib puppet-archive camptocamp-systemd camptocamp-openssl
Declare the vault class:
include 'vault'
Outside of vault limitations, its' probably limited to OS's with linux kernel and using systemd as a service manager. Tested with Ubuntu 18.04 and puppet 5.4.0
We are happy to recieve commits as long as they follow the rules and guidelines below. If you want to fork the module somewhere else this is also fine as long as you mention or link the original module along with the documentation and code.
Rules:
- All code must follow the Puppet Style Guide.
- Added code must pass the included tests. If you add new fuctions, please create puppet tests for these.
- Make sure not to break any existing code or functions of this module.
- New functions must be documented in the Github repository.
- All commits must follow the Github Commit Guide.
Guide:
- Fork the repo.
- Run the tests to verify that the module works as intended.
- Add new code, bugfixes and documentation if needed.
- Make sure that all the tests pass.
- Push to your fork and submit a pull request.
- Create an issue on Github if you have any problems.