vmware-tanzu/secrets-manager
VMware Secrets Manager is a lightweight secrets manager to protect your sensitive data. It’s perfect for edge deployments where energy and footprint requirements are strict—See more: https://vsecm.com/
GoBSD-2-Clause
Pinned issues
Issues
- 0
Have an execution mode for VSecM Scout to respond without any kind of validation (the assumption is: something else (like an API gateway) will do the validation already
#1211 opened by v0lkan - 0
downscale the build server
#1210 opened by v0lkan - 0
- 0
Enable workloads with `vsecm-clerk` SPIFFEID to save raw secrets to VSecM Safe
#1207 opened by v0lkan - 0
Make VSecM Scout a VSecM Component
#1206 opened by v0lkan - 1
- 1
Remove the -a --append flag
#1185 opened by v0lkan - 1
implement secret kind raw — it wont' be associated with any SPIFFEID, it won't be a k8s secrets, it will be for an external operator to retrieve and parse.
#1184 opened by v0lkan - 0
Optimize Landing Page’s CSS for Production
#1113 opened by v0lkan - 1
kind:VSecMSecret
#1171 opened by v0lkan - 0
Ability to have an upstream Hashicorp Vault (or a compatible system, such as OpenBAO) as a backing store.
#1200 opened by v0lkan - 0
release v0.41.0
#1190 opened by v0lkan - 0
release v0.40.0
#1186 opened by v0lkan - 1
feat: GoLang SDK shall fetch data based on a jq filter
#1188 opened by v0lkan - 0
remove autoscaling from helm
#1187 opened by v0lkan - 0
Release v0.29.0
#1189 opened by v0lkan - 0
- 1
DRAFT: vsecm meta api
#1181 opened by v0lkan - 0
feat: add better support for secret versioning
#1182 opened by v0lkan - 0
feat: hub-spoke secrets relay
#1180 opened by v0lkan - 0
DRAFT: feat: multi-tenancy
#1179 opened by v0lkan - 0
have a /purge API to removed orphaned secret backups in VSecm Safe's persistent volume.
#1111 opened by v0lkan - 0
(feat) Use Different Root Keys Provided by External Users
#1106 opened by v0lkan - 0
(feat) an operator shall be able to retrieve a secret in encrypted form with their own public key
#1104 opened by v0lkan - 0
(feat) Rate Limiting
#1107 opened by v0lkan - 0
(feat) Ensure that Java SDK is functional
#1108 opened by v0lkan - 0
(feat) Storing Thousands of Large (Kubeconfig) Files
#1102 opened by v0lkan - 0
(feat) ACL For Secret Access
#1103 opened by v0lkan - 0
(feat) Hierarchical Secrets Management
#1105 opened by v0lkan - 0
(feat) Audit logging and log streaming
#1109 opened by v0lkan - 0
vsecm sentinel shall be able to use nested encryption
#1178 opened by v0lkan - 0
consider moving sdks out-of-tree
#1172 opened by v0lkan - 0
- 0
make sleep 5sec sleep time configurable
#1176 opened by v0lkan - 0
documentation about postgres mode
#1175 opened by v0lkan - 0
ADR: VSecM Safe shall not use more than one backing store at a time (to keep things simple and avoid synchronization issues)
#1174 opened by v0lkan - 0
- 6
Increase Unit Test Coverage to 50% Across all GoLang Files Throughtout the Project
#1100 opened by v0lkan - 2
SDK shall use older (yet still safer) GoLang version for the widest compatibility.
#1075 opened by v0lkan - 1
address todo:'s in postgres support
#1169 opened by v0lkan - 1
(chore) Update Roadmap: The roadmap is a bit lagging and does not reflect the current priorities
#1110 opened by v0lkan - 0
Add `-gcflags=all=-l` flag to the unit test execution
#1124 opened by gurkanguray - 3
package golang SDK with a separate go.mod file and a lower version than the main project for better backwards compatibility
#1119 opened by v0lkan - 0
- 1
- 0
VSecM Keystone should bail out and crash if it cannot initialize in timely manner.
#1115 opened by v0lkan - 0
- 1
A Secret Reconciler for CertManager
#1078 opened by v0lkan - 1
use a daemonset for spiffe CSI driver
#1037 opened by v0lkan - 0
release v0.39.0
#1038 opened by v0lkan