mirror of
https://github.com/ceph/ceph
synced 2025-01-04 18:19:48 +00:00
2650ebe8af
* add 'rgw crypt vault prefix' config setting to allow restricting secret space in Vault where RGW can retrieve keys from * refuse Vault token file if permissions are too open * improve concatenation of URL paths to avoid constructing an invalid URL (missing or double '/') * doc: clarify SSE-KMS keys must be 256-bit long and base64 encoded, document Vault policies and tokens, plus other minor doc improvements * qa: check SHA256 signature of Vault zip download * qa: fix teuthology tests broken by previous PR which made SSE-KMS backend default to Barbican Signed-off-by: Andrea Baglioni <andrea.baglioni@workday.com> Signed-off-by: Sergio de Carvalho <sergio.carvalho@workday.com> |
||
---|---|---|
.. | ||
s3 | ||
swift | ||
admin.rst | ||
adminops.rst | ||
api.rst | ||
archive-sync-module.rst | ||
barbican.rst | ||
bucketpolicy.rst | ||
cloud-sync-module.rst | ||
compression.rst | ||
config-ref.rst | ||
dynamicresharding.rst | ||
elastic-sync-module.rst | ||
encryption.rst | ||
frontends.rst | ||
index.rst | ||
keystone.rst | ||
layout.rst | ||
ldap-auth.rst | ||
mfa.rst | ||
multisite.rst | ||
multitenancy.rst | ||
nfs.rst | ||
notifications.rst | ||
opa.rst | ||
placement.rst | ||
pools.rst | ||
pubsub-module.rst | ||
qat-accel.rst | ||
role.rst | ||
s3-notification-compatibility.rst | ||
s3.rst | ||
STSLite.rst | ||
swift.rst | ||
sync-modules.rst | ||
troubleshooting.rst | ||
vault.rst |