vault-gpg-plugin

"Transit like" secret backend plugin for PGP/GPG in Hashicorp Vault

MIT License

Stars
89

Bot releases are visible (Hide)

vault-gpg-plugin - 0.6.2 Latest Release

Published by github-actions[bot] about 1 year ago

Changelog

  • Fix path of the binary checksum file, reported in #314 (#316)
  • Build with Go 1.21 (#317)
  • golang.org/x/net: 0.14.0 -> 0.17.0, includes the fix for CVE-2023-39325 (#312)
  • github.com/sigstore/rekor: 1.2.2 -> 1.3.2 (#313)
vault-gpg-plugin - 0.6.1

Published by github-actions[bot] over 1 year ago

v0.6.1

  • e214860 Fix release pipeline

v0.6.0

  • Vault plugin multiplexing has been enabled #289
  • github.com/ProtonMail/go-crypto has been updated to v0.0.0-20230528122434-6f98819771a1 #285 #294 (Thanks @niranjan94)
  • Release process has been reworked and release content is now signed using Cosign #293
vault-gpg-plugin - 0.5.0

Published by LeSuisse almost 3 years ago

It is now possible to upload the signatures made via the endpoint gpg/:name/sign to a Rekor instance.

You can choose to upload information into the transparency when your create a new key, you only need to choose a value for the parameter transparency_log_address (e.g. the public instance https://rekor.sigstore.dev/). For existing keys you can update the parameter transparency_log_address with the new configuration update endpoint.

You can find more details about Rekor in the Rekor's documentation.

vault-gpg-plugin - 0.4.0

Published by LeSuisse almost 3 years ago

  • Built with Go 1.17
  • Builds are deterministic
  • github.com/ProtonMail/go-crypto/openpgp instead of the now deprecated golang.org/x/crypto/openpgp
vault-gpg-plugin - 0.3.0

Published by LeSuisse about 4 years ago

  • The endpoint POST /gpg/keys/:name now prevents overwriting existing keys – thanks @trishankatdatadog (#51)
  • Split HTTP API into separate doc – thanks @trishankatdatadog (#50)
vault-gpg-plugin - 0.2.4

Published by LeSuisse over 4 years ago

  • Prebuilt binaries work with Alpine amd64 (#28)
  • Built with Go 1.14
vault-gpg-plugin - 0.2.3

Published by LeSuisse about 5 years ago

  • Tested and built against HashiCorp Vault 1.2.2
  • Built with Go 1.13
vault-gpg-plugin - 0.2.2

Published by LeSuisse almost 6 years ago

Tested and built against HashiCorp Vault 1.0.0

vault-gpg-plugin - 0.2.1

Published by LeSuisse about 6 years ago

  • Tested and built against HashiCorp Vault 0.11.1
  • Built with Go 1.11
vault-gpg-plugin - 0.2.0

Published by LeSuisse over 6 years ago

  • New API endpoint show-session-key to decrypt the session key of one message. This can be useful to decrypt large message without having to transmit the whole message to Vault.
vault-gpg-plugin - 0.1.4

Published by LeSuisse over 6 years ago

  • Tested and built against HashiCorp Vault 0.9.4
  • Built with Go 1.10
  • [BUG_FIX] key_bits parameter to create a key can now be given as a int as expected
vault-gpg-plugin - 0.1.3

Published by LeSuisse over 6 years ago

  • Tested and built against HashiCorp Vault 0.9.3
  • Fix the inline documentation about key_bits usage
  • Add seal wrapping support (HashiCorp Vault Enterprise feature)
vault-gpg-plugin - 0.1.2

Published by LeSuisse almost 7 years ago

  • Plugin is usable when TLS is enabled
  • Tested and built against Hashicorp Vault 0.9.0
vault-gpg-plugin - 0.1.1

Published by LeSuisse about 7 years ago

  • Tested and built against Hashicorp Vault 0.8.3
  • Built with Go 1.9
vault-gpg-plugin - 0.1.0

Published by LeSuisse about 7 years ago

First release of the plugin 🎉