A tool for secrets management, encryption as a service, and privileged access management
-
Updated
Oct 27, 2020 - Go
{{ message }}
A tool for secrets management, encryption as a service, and privileged access management
Manage your dotfiles across multiple diverse machines, securely.
External configuration (server and client) for Spring Cloud
Launch a subprocess with environment variables using data from @hashicorp Consul and Vault.
Hi,
thank you for the library. It really improved the way I approach configuration files.
Finally I have types and proper sections.
What I am missing is schema: I would love to be able to enforce that some parameters are obligatory, their type and provide a description, also raise an exception if there is some unknown parameter is configured.
I think I could use something like marshmallow
In https://github.com/godaddy/kubernetes-external-secrets/blob/master/charts/kubernetes-external-secrets/values.yaml
imagePullSecrets is child of image:
image:
repository: godaddy/kubernetes-external-secrets
tag: 6.0.0
pullPolicy: IfNotPresent
imagePullSecrets: []
but it templates/deployment.yaml:
it is referenced like
{{- if .Values.imagePullSecrets }
Is your feature request related to a problem? Please describe.
Vault has backends for AWS like dynamo and s3. However to use them you should provide credentials. AWS support 2 solutions to eliminate this. IAM roles for Service Accounts and Instance profile roles.
Due to some unknown reason vault requires more time to start when using dynamic creds than explicit definition keys in s3 block o
A flexible commandline tool for template rendering. Supports lots of local and remote datasources.
When specifying a vault URL, it should be possible to request round-robin discovery if the first returned vault is still sealed.
i.e.
http://vault.example.org might resolve to several addresses 10.11.11.2,10.11.11.4,10.11.11.5,10.11.11.6,10.11.11.7.
Currently if the client gets handed 1 address by DNS and it happens to be sealed, an exception is thrown. It would be convenient if the c
Run and manage Vault on Kubernetes simply and securely
Composable, observable and performant config handling for Go for the distributed processing era
Perl Multithreaded Multipart sync to Amazon Glacier
Run @hashicorp Vault on Google Kubernetes Engine (GKE) with Terraform
Container auto-configurations for spring-boot based integration tests
Client for HashiCorp's Vault
ansible lookup plugin for secrets stored in Vault(by HashiCorp)
Simplified secrets management solution
Cryptr: a GUI for Hashicorp's Vault
Simple to use, simple to deploy, one time self destruct messaging service, with hashicorp vault as a backend
secure interactive password manager with xchacha20poly1305, argon2id, and Go
Enable enthusiasts and administrators alike to easily provision highly available and production-ready Kubernetes clusters on Proxmox VE.
Add a description, image, and links to the vault topic page so that developers can more easily learn about it.
To associate your repository with the vault topic, visit your repo's landing page and select "manage topics."
Consul Template version
v0.25.1
Expected behavior
Consul-template supports logging to file. Consul-template can be started as a service on Windows, and the resultant messages can be inspected. Consul offers
-log-filevia stdarg and Nomad offerslog_filein the config.Actual behavior
Consul-template only supports Syslog and stdout/stderr logging mechanisms. Windows d