aboutsummaryrefslogtreecommitdiffstats
path: root/testing/vault
Commit message (Collapse)AuthorAgeFilesLines
* testing/vault: new upstream version 0.6.0Christian Kampka2016-06-191-5/+5
|
* testing/[various]: bump pkgrel for pre-install fixesPrzemyslaw Pawelczyk2016-04-251-1/+1
|
* Reorder arguments passed to addgroup/adduser in scripts.Przemyslaw Pawelczyk2016-04-251-1/+1
| | | | | | | Now all invocations have following order of arguments (if present): addgroup -S -g ... GROUP adduser -S -u ... -D -H -h ... -s ... -G ... -g ... USER
* Improve consistency of scripts using adduser/addgroup.Przemyslaw Pawelczyk2016-04-251-0/+1
| | | | | | | | | | | | Following rules have been applied: - script starts with shebang !#/bin/sh followed by blank line, - script ends with exit 0 prepended by blank line, - only stderr of adduser, addgroup or passwd is redirected to /dev/null, - getent passwd/group instances has been removed, - manual checking of file and group existence has been removed, - `|| true` instances has been removed. Comments and line wrapping have been preserved.
* Add -g option (GECOS/comment) to adduser in scripts.Przemyslaw Pawelczyk2016-04-251-1/+1
| | | | | | This way we can avoid ugly default: Linux user,,,
* testing/vault: new upstream version 0.5.2Christian Kampka2016-03-201-5/+4
|
* testing/vault: fix buildChristian Kampka2015-12-121-6/+6
|
* testing/vault: new upstream version 0.4.0Christian Kampka2015-12-122-273/+7
|
* testing/vault: fix checksumsBartłomiej Piotrowski2015-10-161-3/+3
|
* testing/vault: simplify init scriptChristian Kampka2015-10-163-34/+24
|
* testing/vault: upgrade to 0.3.1Christian Kampka2015-10-132-87/+101
|
* testing/vault: enable x86 againEivind Uggedal2015-09-291-1/+1
|
* testing/vault: disable compile for x86Francesco Colista2015-09-211-1/+1
|
* testing/vault: fix checksumFrancesco Colista2015-09-211-3/+3
|
* testing/vault: new aportChristian Kampka2015-09-215-0/+369
https://www.vaultproject.io Vault is a tool for securely accessing secrets. A secret is anything that you want to tightly control access to, such as API keys, passwords, certificates, and more. Vault provides a unified interface to any secret, while providing tight access control and recording a detailed audit log.