You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/tools/chef_vault.md
+13-9Lines changed: 13 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,27 +12,31 @@ draft = false
12
12
weight = 50
13
13
+++
14
14
15
-
`chef-vault` is a Ruby Gem that's included in Chef Workstation and Chef
16
-
Infra Client. Chef Vault lets you encrypt a data bag item using asymmetric keys. When you provide Chef Vault with a list of public keys from your nodes, only the nodes with public keys entered on this list can decrypt the data bag item contents. Chef Vault is included in Chef Workstation and Chef Infra Client by way of the `chef-vault` Ruby Gem. `chef-vault` uses the `knife vault` subcommand.
15
+
Chef Vault lets you encrypt a data bag item using asymmetric keys and is included with Chef Workstation and Chef Infra Client.
16
+
When you provide Chef Vault with a list of public keys from your nodes, only nodes on that list can decrypt the data bag item contents.
17
+
`chef-vault` uses the `knife vault` subcommand.
17
18
18
19
{{< note >}}
19
20
20
-
Chef Vault doesn't currently support alternate keying mechanisms like GPG and Amazon KMS.
21
+
Chef Vault doesn't support alternate keying mechanisms like GPG or Amazon KMS.
21
22
22
23
{{< /note >}}
23
24
24
-
{{< warning >}}
25
+
## Key pair requirements
26
+
27
+
Chef Vault requires that Chef Infra Client is configured to use public and private key pairs.
28
+
Chef Vault is incompatible with Chef Infra Client instances that use a private key, such as `client.pem`, with a certificate set as its public identity in the Chef Infra Server database.
29
+
30
+
To update existing nodes to use `chef-vault`, re-register your Chef Infra Client nodes with Chef Infra Server, which generates public/private key pairs, and then install Chef Vault on each node.
25
31
26
-
To use Chef Vault, Chef Infra Client must be configured to use public and private key pairs. Chef Vault is incompatible with the practice of using Chef Infra Client with a private key, such as `client.pem`, and a certificate set as its public identity in the Chef Infra Server database. To update existing nodes to use `chef-vault`, first re-register your Chef Infra Client nodes with Chef Infra Server which will generate public/private key pairs, and then install Chef Vault on each node. If Chef Vault is used with a Chef Infra Client instance that has a private key, such as `client.pem`, and a certificate set as its public identity in the Chef Infra Server database, Chef Vault generates the following error:
32
+
If Chef Vault is used with a Chef Infra Client instance configured this way, Chef Vault generates the following error:
27
33
28
34
```text
29
35
## OpenSSL::PKey::RSAError
30
36
Neither PUB key nor PRIV key:: nested asn1 error
31
37
```
32
38
33
-
{{< /warning >}}
34
-
35
-
## Configuring config.rb for Chef Vault
39
+
## Configure Chef Vault
36
40
37
41
To set `client` as the default mode, add the following line to the `config.rb` file.
38
42
@@ -46,7 +50,7 @@ To set the default list of admins for creating and updating vaults, add the foll
0 commit comments