Skip to content

Conversation

dviejokfs
Copy link
Contributor

Implement Hashicorp Vault integration

@adityajoshi12
Copy link
Contributor

Thanks for the PR @dviejokfs, I have a suggestion. How about using ESO for creating the certs and keys in the cluster using the vault PKI.

@dviejokfs
Copy link
Contributor Author

Thanks for the PR @dviejokfs, I have a suggestion. How about using ESO for creating the certs and keys in the cluster using the vault PKI.

I searched a bit about ESO since I've never used it before.

Is this something you are using? How is it better than directly interacting with Vault?

dviejokfs added 6 commits May 2, 2025 18:52
Signed-off-by: David VIEJO <[email protected]>
Signed-off-by: David VIEJO <[email protected]>
Signed-off-by: David VIEJO <[email protected]>
Signed-off-by: David VIEJO <[email protected]>
Signed-off-by: David VIEJO <[email protected]>
dviejokfs added a commit that referenced this pull request May 27, 2025
- Introduced a new Prometheus gauge metric `CurrentTimeSeconds` to track the current time in Unix Epoch format.
- Implemented a goroutine that updates the `CurrentTimeSeconds` metric every second, ensuring real-time monitoring of the current time.

These changes enhance the observability of the system by providing a metric for the current time, which can be useful for various monitoring and alerting purposes.

Signed-off-by: dviejokfs <[email protected]>
dviejokfs added a commit that referenced this pull request May 29, 2025
- Introduced a new Prometheus gauge metric `CurrentTimeSeconds` to track the current time in Unix Epoch format.
- Implemented a goroutine that updates the `CurrentTimeSeconds` metric every second, ensuring real-time monitoring of the current time.

These changes enhance the observability of the system by providing a metric for the current time, which can be useful for various monitoring and alerting purposes.
Signed-off-by: David VIEJO <[email protected]>
… updating related logic

- Updated the Fabric CA CRD to allow the `replicas` field to be nullable, providing more flexibility in deployment configurations.
- Modified the peer controller to use `Caname` instead of `Enrollid` for naming enroll requests.
- Refactored the credential store handling in the crypto material creation function to use a switch statement for better clarity and maintainability.

These changes improve the usability and robustness of the Fabric CA deployment and its associated components.

Signed-off-by: David VIEJO <[email protected]>
Signed-off-by: David VIEJO <[email protected]>
- Added `golang.org/x/oauth2` and `github.com/consensys/gnark-crypto` to `go.mod`.
- Removed unused Go and Node.js client example files, including `main.go`, `connection-org.yaml`, and related scripts.
- Cleaned up `go.mod` and `go.sum` by deleting unnecessary entries.

These changes streamline the project by updating dependencies and removing obsolete client implementations.

Signed-off-by: David VIEJO <[email protected]>
- Removed unused versions of `golang.org/x/oauth2` and `github.com/consensys/gnark-crypto`.
- Added indirect dependencies for `github.com/bits-and-blooms/bitset`, `github.com/consensys/bavard`, and updated `github.com/consensys/gnark-crypto` to v0.12.1.
- Updated `golang.org/x/oauth2` to v0.27.0.

These changes streamline the dependency management and ensure compatibility with the latest versions.

Signed-off-by: David VIEJO <[email protected]>
Signed-off-by: David VIEJO <[email protected]>
@dviejokfs dviejokfs merged commit 8605874 into main Jul 22, 2025
5 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants