secrets
Here are 678 public repositories matching this topic...
Hi,
This is a useful tool for any DevOps/SRE teams managing K8S clusters and apps.
One question though, will this be able to detect changes to Secrets stored in an external store like the GoDday one or the HashiCorp Vault.
thanks,
KK
-
Updated
Apr 7, 2022 - Java
-
Updated
Apr 8, 2022 - Go
-
Updated
Nov 17, 2021 - Python
-
Updated
Dec 23, 2020 - Shell
-
Updated
Jan 15, 2022 - Shell
-
Updated
Sep 19, 2021 - Go
-
Updated
Feb 25, 2022 - Go
New Provider Request
Manage secrets from Mac keychain
Details
- URL: https://support.apple.com/en-il/guide/mac-help/mchlf375f392/mac
- Modes: read+write
- GitHub projects: https://github.com/keybase/go-keychain
Starting at the "Create a staging environment", the steps described in the guide quickly outpace the explanations and it was not obvious to me what was going on. The quickstart assumes knowledge of concepts (environments, machines) that I would have liked to see brief explanations of.
The Quickstart could also use now.sh as an example deployment environment so that the user can follow along wit
-
Updated
Apr 8, 2022 - Shell
-
Updated
Oct 12, 2020 - JavaScript
-
Updated
Mar 26, 2022 - JavaScript
-
Updated
Apr 8, 2022 - Ruby
-
Updated
Mar 25, 2022 - Go
I am not sure if this belongs here, but I am having an issue when using this Github Action.
This is the link to the github run that failed:
https://github.com/jampp/migratron/pull/25/checks?check_run_id=456554120
and the content is:
Uploading distributions to https://test.pypi.org/legacy/
Uploading migratron-1.1.0-py3-none-any.whl
0%| | 0.00/30.5k [00:00<?, ?B/s]
100%|
-
Updated
Feb 16, 2022 - JavaScript
-
Updated
Apr 1, 2022 - HTML
-
Updated
Sep 29, 2021 - Go
-
Updated
Apr 5, 2022 - Java
-
Updated
Apr 8, 2022 - Python
I am running from a user through which test environment was created on aks.
I followed the steps mentioned in the quick start guide and below is the error I got when I describe the secret CRD.
Type Reason Age From Message
---- ------ ---- ---- -------
Warning ErrAzureVault 7m12
-
Updated
Apr 4, 2022 - C#
-
Updated
Jan 5, 2020 - Go
-
Updated
Dec 29, 2021 - Go
Update challenge 1
Thanks to @tghosth: we found out that
- trufflehog has too many versions with deteciton rules. so the trufflehog version / way of working needs to be explicit (E.g. th3 / docker does not work)
- it might be good to just add instrution to let people grep for the password
- it is a good idea to add git-secrets as a detection method: with either
git secrets --add 'password\s*=\s*.+'or `git secr
-
Updated
Feb 16, 2022 - Go
Improve this page
Add a description, image, and links to the secrets topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the secrets topic, visit your repo's landing page and select "manage topics."


Great tool. What if I want to search for a domain or org name in combination with all the signatures? Is this possible currently?