Skip to content

Releases: elastic/harp

v0.1.7

20 Jan 08:34
v0.1.7
fec450f

Choose a tag to compare

Harp v0.1.7 - https://github.com/elastic/harp

Changes

  • Go toolchain constraints updated to [1.15.6, 1.15.7]
  • os/exec vulnerability mitigation - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3115 (not disclosed yet)
  • Fix container reader usage for bundle diff/dump
  • Dependencies have been updated
  • Tools have been updated (rebuild tools base image via mage docker:tools)
  • errorwrapping is now fixed and enforced by linter
  • CodeQL is executed on each PR + main
  • Snyk vulnerability scan for dependency is executed on each PR + main

Reference(s)

cmd/harp/v0.1.7

20 Jan 07:28
cmd/harp/v0.1.7
fec450f

Choose a tag to compare

Go 1.15.7

cmd/harp-server/v0.1.7

20 Jan 07:32
cmd/harp-server/v0.1.7
fec450f

Choose a tag to compare

cmd/harp/v0.1.6

17 Dec 13:37
cmd/harp/v0.1.6
bbdc5a2

Choose a tag to compare

Changes

  • CSO
    • Add global region alias to support region unbounded secrets
    • Add local provider to infrastructure ring

cmd/harp-server/v0.1.6

17 Dec 13:45
cmd/harp-server/v0.1.6
bbdc5a2

Choose a tag to compare

Changes

  • harp server vault
    • Support --transformer keyName:key where key is generated from harp keygen to expose a transformer as a Vault Transit encryption backend.

Samples

Expose transformers using Vault Transit backend API.

harp server vault \
  --transformer fernet:$(harp keygen fernet) \
  --transformer aes-256:$(harp keygen aes-256) \
  --transformer secretbox:$(harp keygen secretbox)

You can use vault cli to encrypt or decrypt a secret :

$ export VAULT_ADDR=http://127.0.0.1:8200
$ vault write transit/encrypt/<keyName> plaintext=$(base64 <<< "my secret data")
Key           Value
---           -----
ciphertext    vault:v1:66hL0lIX0lXHFD6sDsl07ztaDStDrJLL7mKGei3zlups6cllARcUec7P4kg4JaA23AEqkNNGqg==

Then to decrypt :

$ export VAULT_ADDR=http://127.0.0.1:8200
$ vault write -format=json transit/decrypt/secretbox ciphertext=vault:v1:66hL0lIX0lXHFD6sDsl07ztaDStDrJLL7mKGei3zlups6cllARcUec7P4kg4JaA23AEqkNNGqg== \
    | jq -r ".data.plaintext" \
    | base64 -D
my secret data

This does not pretend to replace a full-featured Vault cluster, just expose using Vault compatible API a limited set of features at the bootstrap time during a deployment usable with Vault CLI, while Vault cluster is not deployed yet.
Once deployed, VAULT_ADDR just need to point to real Vault cluster at showtime.

cmd/harp/v0.1.5

10 Dec 10:43
cmd/harp/v0.1.5
f14c2ac

Choose a tag to compare

Changes

  • Secret value is encoded using a compound ASN.1 sequence to allow future improvements;
  • Vault support nested JSON value inserted via UI only, but not via CLI => Harp enforces simple secret key/value as 'string => string' to prevent nested secret tree where the user should dispatch secret across the secret tree. This produces an error on vault import, this error is now logged;

cmd/harp-server/v0.1.5

10 Dec 10:55
cmd/harp-server/v0.1.5
f14c2ac

Choose a tag to compare

Align to v0.1.5

cmd/harp/v0.1.4

05 Dec 16:17
cmd/harp/v0.1.4
9407e9c

Choose a tag to compare

Golang 1.15.6

cmd/harp-server/v0.1.4

05 Dec 16:26
cmd/harp-server/v0.1.4
9407e9c

Choose a tag to compare

Golang 1.15.6

cmd/harp/v0.1.3

25 Nov 11:35
cmd/harp/v0.1.3
7528eaf

Choose a tag to compare