ceph/doc/radosgw
Sergio de Carvalho 2650ebe8af rgw: improvements to SSE-KMS with Vault
* add 'rgw crypt vault prefix' config setting to allow restricting
  secret space in Vault where RGW can retrieve keys from
* refuse Vault token file if permissions are too open
* improve concatenation of URL paths to avoid constructing an invalid
  URL (missing or double '/')
* doc: clarify SSE-KMS keys must be 256-bit long and base64 encoded,
  document Vault policies and tokens, plus other minor doc improvements
* qa: check SHA256 signature of Vault zip download
* qa: fix teuthology tests broken by previous PR which made SSE-KMS
  backend default to Barbican

Signed-off-by: Andrea Baglioni <andrea.baglioni@workday.com>
Signed-off-by: Sergio de Carvalho <sergio.carvalho@workday.com>
2019-11-12 13:51:25 +00:00
..
s3 Merge pull request #30600 from yuvalif/boto3_extensions_examples 2019-10-15 09:57:27 +03:00
swift
admin.rst
adminops.rst
api.rst
archive-sync-module.rst
barbican.rst rgw: improvements to SSE-KMS with Vault 2019-11-12 13:51:25 +00:00
bucketpolicy.rst
cloud-sync-module.rst
compression.rst
config-ref.rst rgw: improvements to SSE-KMS with Vault 2019-11-12 13:51:25 +00:00
dynamicresharding.rst
elastic-sync-module.rst
encryption.rst rgw: improvements to SSE-KMS with Vault 2019-11-12 13:51:25 +00:00
frontends.rst
index.rst
keystone.rst
layout.rst
ldap-auth.rst
mfa.rst
multisite.rst
multitenancy.rst
nfs.rst
notifications.rst
opa.rst
placement.rst
pools.rst
pubsub-module.rst
qat-accel.rst
role.rst
s3-notification-compatibility.rst
s3.rst
STSLite.rst
swift.rst
sync-modules.rst
troubleshooting.rst
vault.rst rgw: improvements to SSE-KMS with Vault 2019-11-12 13:51:25 +00:00