vault
Here are 1,042 public repositories matching this topic...
Describe the solution you'd like
Current op command has a get item with --fields flag which makes it a lot simpler to extract values from details or section fields.
The output function can be used with this:
{{- output "op" "get" "item" "some-id" "--fields" "some-field" }}
But it might be nicer to have a built-in onepassworditemFields function (or something)
CRD resource API Group version v1beta is deprecated in k8s 1.19.
kubernetes/kubernetes#90673
external-secret helm chart has apiextensions.k8s.io/v1beta1 crd resource.
https://github.com/external-secrets/kubernetes-external-secrets/blob/master/charts/kubernetes-external-secrets/crds/kubernetes-client.io_externalsecrets_crd.yaml#L2
but, less 1.17 use `v1b
Hi,
thank you for the library. It really improved the way I approach configuration files.
Finally I have types and proper sections.
What I am missing is schema: I would love to be able to enforce that some parameters are obligatory, their type and provide a description, also raise an exception if there is some unknown parameter is configured.
I think I could use something like marshmallow
-
Updated
Apr 26, 2021 - Java
-
Updated
Apr 26, 2021 - Go
Is your feature request related to a problem? Please describe.
Vault has backends for AWS like dynamo and s3. However to use them you should provide credentials. AWS support 2 solutions to eliminate this. IAM roles for Service Accounts and Instance profile roles.
Due to some unknown reason vault requires more time to start when using dynamic creds than explicit definition keys in s3 block o
-
Updated
Apr 24, 2021 - Go
So there is currently an hvac.v1.Client.sys.list_mounted_secrets_engines() method.
However, for obvious reasons this will fail as it will attempt to list all mounted secrets engines (as it calls /v1/sys/mounts).
The web UI, however, shows what mounts the current token has access to.
While poking around the live API documentation the other day (`VAULT_BASE_URI/ui/vault/api-explorer
-
Updated
Mar 11, 2020 - Go
-
Updated
Apr 28, 2021 - Go
-
Updated
Oct 28, 2020 - Go
-
Updated
Mar 10, 2017 - Perl
-
Updated
Apr 26, 2021 - Java
-
Updated
Feb 4, 2021 - HCL
-
Updated
Feb 17, 2021 - JavaScript
-
Updated
Apr 6, 2018 - Python
-
Updated
Apr 28, 2021 - Go
-
Updated
Mar 30, 2021 - HTML
-
Updated
Apr 5, 2021
-
Updated
Apr 28, 2021 - Java
Improve this page
Add a description, image, and links to the vault topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the vault topic, visit your repo's landing page and select "manage topics."


Consul Template version
v0.25.1
Expected behavior
Consul-template supports logging to file. Consul-template can be started as a service on Windows, and the resultant messages can be inspected. Consul offers
-log-filevia stdarg and Nomad offerslog_filein the config.Actual behavior
Consul-template only supports Syslog and stdout/stderr logging mechanisms. Windows d