(require 'zoom-frm)
(zoom-in/out 1)
(zoom-frm-unzoom)
(zoom-in/out 8)
docker-compose down
rm -f puppet/manifests/secrets.pp
./start.sh
This demo was created for PuppetConf 2017
- presented by Ryan Prior, CyberArk software engineer
- co-presented with Jody Hunt, CyberArk global directory of customer success
- get Conjur: https://conjur.org
- on GitHub: https://github.com/cyberark/conjur (AGPLv3, PRs requested)
- the Puppet module: https://forge.puppet.com/cyberark/conjur
- this demo: https://github.com/ryanprior/conjur-puppet-demo
- on social media:
This is a manually managed “secrets” manifest which ops must keep private: file:thumb-drive/secrets.pp
cp thumb-drive/secrets.pp puppet/manifests/secrets.pp
./run-agent.sh
cp conjur/secrets.pp puppet/manifests/secrets.pp
docker-compose exec -T client /demo/load-secrets.sh
./generate-hostfactory-token.sh
Put this token in file:puppet/manifests/secrets.pp
./run-agent.sh
It’s in file:conjur/app.yml
docker-compose exec -T client sh -c '
conjur variable values add app/postgres-password "long director down so"
conjur variable values add app/vendor-oauth-token "ee16b985-c72b-4cd3-abec-af38c056db00"
'
What hosts have we created so far?
docker-compose exec -T client \
conjur list -k host
What are all the roles can fetch the app’s postgres password?
docker-compose exec -T client \
conjur resource permitted_roles \
variable:app/postgres-password \
execute