-
### Proposal
Currently, there exists the normal `Secret` Auth Provider which you can use to reference an embedded token for your scaler. Since Kubernetes 1.22, there is the [Bound service account tok…
-
## Tasks Overview
- **Submit API Library Github Repo URL**: ✅ Submitted
- **GitHub Repository Creation**: ✅ Completed
- **Local Project Setup (git init, README.md, push to GitHub)**: ✅ Completed
-…
-
As a Ministry Security Officer, I would like secrets to be stored and controlled using Hashicorp Vault as this keeps the certificates within Government infrastructure.
**Acceptance Criteria**
- [ ] M…
-
Nix/Guix do not allow packages to contain things like:
- Private files.
- Device nodes.
- Setuid binaries.
They do this to enable 'purity' in builds, and may be a worthy goal, but in some sit…
-
With Hydra and snabb bot we have to store secrets besides the deployment. We don't want them to be exposed, so maybe we should consider encrypting them into git.
https://github.com/StackExchange/blac…
-
**Refactor:**
The readme should briefly describe the options for connecting to EE and link to them (additional .md files, one for each method). Currently the readme only describes initializing by c…
-
# Summary
Allow to deploy cluster configuration secret to other namespaces than the main argocd namespace like the applications in any namespace feature.
# Motivation
Deploying ArgoCD applica…
-
Piggybacking on #53, it would be awesome if a TOTP secret could be saved on each of the password fields, not just website, username and password, so that TOTP codes can be generated for websites that …
-
The DynamoDB Sessions store seems to me rather poorly implemented and/or documented.
First, the `Aws::SessionStore::DynamoDB::Table.create_table` does seems to ignore basically all the options set …
-
At the moment, secrets can be added to a per-pipeline environment file that is stored in S3. This works quite well, however in our case we give engineers that own the pipeline write-only access to the…