Affected by GO-2024-2617
and 6 other vulnerabilities
GO-2024-2617: Authentication bypass in github.com/hashicorp/vault
GO-2024-2690: HashiCorpVault does not correctly validate OCSP responses in github.com/hashicorp/vault
GO-2024-2921: HashiCorp Vault Incorrectly Validated JSON Web Tokens (JWT) Audience Claims in github.com/hashicorp/vault
GO-2024-2982: Hashicorp Vault vulnerable to Improper Check or Handling of Exceptional Conditions in github.com/hashicorp/vault
GO-2024-3162: Vault SSH Secrets Engine Configuration Did Not Restrict Valid Principals By Default in github.com/hashicorp/vault
GO-2024-3191: Vault Community Edition privilege escalation vulnerability in github.com/hashicorp/vault
GO-2024-3246: Hashicorp Vault vulnerable to denial of service through memory exhaustion in github.com/hashicorp/vault
package
Version:
v1.14.8
Opens a new window with list of versions in this module.
Published: Dec 5, 2023
License: MPL-2.0
Opens a new window with license information.
Imports: 11
Opens a new window with list of imports.
Imported by: 0
Opens a new window with list of known importers.
README
¶
Vault Agent
Vault Agent is a client daemon that provides Auth-Auth, Caching, and Template
features.
Vault Agent provides a number of different helper features, specifically
addressing the following challenges:
- Automatic authentication
- Secure delivery/storage of tokens
- Lifecycle management of these tokens (renewal & re-authentication)
See the usage documentation on the Vault website here:
Documentation
¶
Package agent implements a daemon mode of Vault designed to provide helper
features like auto-auth, caching, and templating.
Agent has it's own configuration stanza and operates as a proxy to a Vault
service.
Source Files
¶
Directories
¶
|
|
|
|
|
|
internal
|
|
|
|
Package template is responsible for rendering user supplied templates to disk.
|
Package template is responsible for rendering user supplied templates to disk. |
Click to show internal directories.
Click to hide internal directories.