-
### Description
`not_after` argument is not supported on the `vault_pki_secret_backend_root_sign_intermediate` resource. This is a valid argument according to the Vault PKI API.
Although `ttl` arg…
-
Coming from Vault as a SecretsManager engine, I miss the Github Action feature that Vault implements as below:
```
|
```
https://github.com/hashicorp/vault-action#key-syntax
This way, the ac…
-
**Is your feature request related to a problem? Please describe.**
We found there is lots of file generated inside this path "/vault/data/sys/token/accessor/" in vault running on kubernetes every ti…
-
**Is your feature request related to a problem? Please describe.**
While working with the vault SDK to build a plugin, I wanted to set a parameter that has a default value. To do that I set `Default`…
-
Hi there, this should be possible using the vault function to pull the key from vault and assign it to a variable. You can not pull it directly to the "ssh_private_key" as the vault function is only a…
-
I will probably use K8s, but for the time being here's how to use the buildkit to inject secrets:
https://pythonspeed.com/articles/docker-build-secrets/
The other option is hashicorp vault but l…
-
Related to https://github.com/hashicorp/consul/issues/3957
#### Feature Description
The way the Consul ACL is structured at the moment makes it hard to have recommended ACL Production best pract…
-
Related to #1437 (which got closed because it's a 1-time job), it would be nice if the module had support to configure auto-tidy via pki/config/auto-tidy endpoint (api docs: https://developer.hashicor…
dmaes updated
12 months ago
-
## Summary
Currently there is not a robust way of exposing secrets for given users/groups in kuberentes jupyterlab.
## Proposed implementation
Using hashicorp vault within the QHub deploymen…
-
# Synopsis
As a BIG-IP provisioner, I need to be able to securely set my BIG-IP admin password but if my choice of tool is not supported, a fallback mechanism must be in place.
## Proposed
[x] …
memes updated
3 years ago