barbican-manage
is a utility that is used to control the barbican key
manager service database and Hardware Secure Module (HSM) plugin device. Use
cases include migrating the secret database or generating a Master Key
Encryption Key (MKEK) in the HSM. This command set should only be executed by
a user with admin privileges.
The standard pattern for executing a barbican-manage command is:
barbican-manage <category> <command> [<args>]
Running barbican-manage
without arguments shows a list of available command
categories. Currently, there are 2 supported categories: db and hsm.
Running with a category argument shows a list of commands in that category:
barbican-manage db --help
barbican-manage hsm --help
barbican-manage --version
shows the version number of barbican service.The following sections describe the available categories and arguments for barbican-manage.
Warning
Before executing barbican-manage db commands, make sure you are familiar with Database Migration first.
barbican-manage db revision [--db-url] [--message] [--autogenerate]
Create a new database version file.
barbican-manage db upgrade [--db-url] [--version]
Upgrade to a future version database.
barbican-manage db history [--db-url] [--verbose]
Show database changeset history.
barbican-manage db current [--db-url] [--verbose]
Show current revision of database.
barbican-manage db clean [--db-url] [--verbose] [--min-days] [--clean-unassociated-projects] [--soft-delete-expired-secrets] [--log-file]
Clean up soft deletions in the database. More documentation can be found here: Database Cleaning
barbican-manage db sync_secret_stores [--db-url] [--verbose] [--log-file]
Synchronize the secret_store database table with the configuration in barbican.conf. This is useful when multiple secret stores are enabled and new secret stores have been enabled.
barbican-manage hsm gen_mkek [--library-path] [--passphrase] [--slot-id] [--label] [--length]
Create a new Master key encryption key in HSM. This MKEK will be used to encrypt all project key encryption keys. Its label must be unique.
barbican-manage hsm gen_hmac [--library-path] [--passphrase] [--slot-id] [--label] [--length]
Create a new Master HMAC key in HSM. This HMAC key will be used to generate an authentication tag of encrypted project key encryption keys. Its label must be unique.
barbican-manage hsm rewrap_pkek [--dry-run]
Rewrap project key encryption keys after rotating to new MKEK and/or HMAC key(s) in HSM. The new MKEK and HMAC key should have already been generated using the above commands. The user will have to configure new MKEK and HMAC key labels in /etc/barbican/barbican.conf and restart barbican server before executing this command.
Except where otherwise noted, this document is licensed under Creative Commons Attribution 3.0 License. See all OpenStack Legal Documents.