Skip to content

Releases: elastic/harp

cmd/harp/v0.1.7

20 Jan 07:28
cmd/harp/v0.1.7
fec450f
Compare
Choose a tag to compare
Go 1.15.7

cmd/harp-server/v0.1.7

20 Jan 07:32
cmd/harp-server/v0.1.7
fec450f
Compare
Choose a tag to compare

cmd/harp/v0.1.6

17 Dec 13:37
cmd/harp/v0.1.6
bbdc5a2
Compare
Choose a tag to compare

Changes

  • CSO
    • Add global region alias to support region unbounded secrets
    • Add local provider to infrastructure ring

cmd/harp-server/v0.1.6

17 Dec 13:45
cmd/harp-server/v0.1.6
bbdc5a2
Compare
Choose a tag to compare

Changes

  • harp server vault
    • Support --transformer keyName:key where key is generated from harp keygen to expose a transformer as a Vault Transit encryption backend.

Samples

Expose transformers using Vault Transit backend API.

harp server vault \
  --transformer fernet:$(harp keygen fernet) \
  --transformer aes-256:$(harp keygen aes-256) \
  --transformer secretbox:$(harp keygen secretbox)

You can use vault cli to encrypt or decrypt a secret :

$ export VAULT_ADDR=http://127.0.0.1:8200
$ vault write transit/encrypt/<keyName> plaintext=$(base64 <<< "my secret data")
Key           Value
---           -----
ciphertext    vault:v1:66hL0lIX0lXHFD6sDsl07ztaDStDrJLL7mKGei3zlups6cllARcUec7P4kg4JaA23AEqkNNGqg==

Then to decrypt :

$ export VAULT_ADDR=http://127.0.0.1:8200
$ vault write -format=json transit/decrypt/secretbox ciphertext=vault:v1:66hL0lIX0lXHFD6sDsl07ztaDStDrJLL7mKGei3zlups6cllARcUec7P4kg4JaA23AEqkNNGqg== \
    | jq -r ".data.plaintext" \
    | base64 -D
my secret data

This does not pretend to replace a full-featured Vault cluster, just expose using Vault compatible API a limited set of features at the bootstrap time during a deployment usable with Vault CLI, while Vault cluster is not deployed yet.
Once deployed, VAULT_ADDR just need to point to real Vault cluster at showtime.

cmd/harp/v0.1.5

10 Dec 10:43
cmd/harp/v0.1.5
f14c2ac
Compare
Choose a tag to compare

Changes

  • Secret value is encoded using a compound ASN.1 sequence to allow future improvements;
  • Vault support nested JSON value inserted via UI only, but not via CLI => Harp enforces simple secret key/value as 'string => string' to prevent nested secret tree where the user should dispatch secret across the secret tree. This produces an error on vault import, this error is now logged;

cmd/harp-server/v0.1.5

10 Dec 10:55
cmd/harp-server/v0.1.5
f14c2ac
Compare
Choose a tag to compare
Align to v0.1.5

cmd/harp/v0.1.4

05 Dec 16:17
cmd/harp/v0.1.4
9407e9c
Compare
Choose a tag to compare

Golang 1.15.6

cmd/harp-server/v0.1.4

05 Dec 16:26
cmd/harp-server/v0.1.4
9407e9c
Compare
Choose a tag to compare

Golang 1.15.6

cmd/harp/v0.1.3

25 Nov 11:35
cmd/harp/v0.1.3
7528eaf
Compare
Choose a tag to compare

cmd/harp-server/v0.1.3

25 Nov 11:37
cmd/harp-server/v0.1.3
7528eaf
Compare
Choose a tag to compare