Better Hashicorp Vault client
-
Updated
Aug 16, 2017 - Go
Better Hashicorp Vault client
A simple package for building command line applications in Go
This is a sample test harness in ASP.NET Core 6.0 providing a Web App to run in App Service fetching secrets from various Azure Key Vaults. This harness is designed to generate signal for testing and validating changes to the vault resource firewall, service endpoint and private endpoint configurations.
Docker Image containing packer ansible terraform vault azure cli
this vagrant configuration provisions a consul backed vault systemd service on a centos 7 virtualbox vm
CLI Client for Pleasant, mainly Password Server, written in GoLang.
Vault Cluster Replication Application replicates data between Vault clusters, ensuring consistency and availability for high availability and disaster recovery
Learning Vault / Consul Setup
Hashicorp-Vault companion. Based in manifests you can upload, download and copy secrets.
Using Doppler Secret Management direct in your golang runtime
Generic process automation based on secret values read from Vault
A sample code for Node.JS with Hashicorp involving Username and Password based Authentication
Glue for Trusted Third Parties & Hashicorp Vault
Token helper script for Hashicorp Vault client. get, store, erase vault token with gpg encryption by "pass" password manager.
Vault secret proxy sidecar using AWS IAM Auth
Add a description, image, and links to the vault-client topic page so that developers can more easily learn about it.
To associate your repository with the vault-client topic, visit your repo's landing page and select "manage topics."